Submitted:
13 April 2025
Posted:
14 April 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Data Set Description
2.2. High-Level Statistics
2.3. Data Visualization
2.4. Numeric Data Distributions
- Normal Distribution: Describes a symmetrical bell shape, often used to model real-world phenomena.
- Uniform Distribution: Describes equally likely values, suitable for random sampling situations.
- Exponential Distribution: Describes phenomena with high rates of decay and rare extreme values, often used in reliability and survival analysis.

3. Literature review
4. Proposed Methodology
3.1. Identification of Data Issues
3.2. Data Preprocessing Techniques
4. Data Science Techniques
4.1. Used Techniques


4. Model Validation
4.1. Evaluation Metrics
4.2. Types of Regression Metrics
4.3. Confusion Matrix
6. Conclusion and Discussion
References
- Freire, P.; Srivallapanondh, S.; Spinnler, B.; Napoli, A.; Costa, N.; Prilepsky, J.E.; Turitsyn, S.K. Computational complexity optimization of neural network-based equalizers in digital signal processing: A comprehensive approach. Journal of Lightwave Technology 2024, 42, 4177–4201. [Google Scholar] [CrossRef]
- Tang, X.; Wang, Z.; Cai, X.; Su, H.; Wei, C. Research on heterogeneous computation resource allocation based on data-driven method. In Proceedings of the 2024 6th International Conference on Data-driven Optimization of Complex Systems (DOCS); 2024; pp. 916–919. [Google Scholar] [CrossRef]
- Ding, H.; Huang, Q.; Alkhayyat, A. A computer aided system for skin cancer detection based on Developed version of the Archimedes Optimization algorithm. Biomedical Signal Processing and Control 2024, 90, 105870. [Google Scholar] [CrossRef]
- Dwivedi, R.; Awasthi, D.; Srivastava, V.K. An optimized dual image watermarking scheme based on redundant DWT and randomized SVD with henon mapping encryption. Circuits, Systems, and Signal Processing 2024, 43, 408–456. [Google Scholar] [CrossRef]
- Abdullah, A. Investigation of brain cancer with interfacing of 3-dimensional image processing. Indian Journal of Science & Technology 2019, 12, 1–12. [Google Scholar]
- Saeed, S.; Khan, H. Global mortality rate and statistical results of Coronavirus. Infectious Diseases and Tropical Medicine 2021, 1–12. [Google Scholar]
- Hayes, B.; Shier, J.; Fazekas, G.; McPherson, A.; Saitis, C. A review of differentiable digital signal processing for music and speech synthesis. Frontiers in Signal Processing 2024, 3, 1284100. [Google Scholar] [CrossRef]
- Jurdana, V. Local Rényi entropy-based Gini index for measuring and optimizing sparse time-frequency distributions. Digital signal processing 2024, 147, 104401. [Google Scholar] [CrossRef]
- Liu, H.; An, J.; Ng, D.W.K.; Alexandropoulos, G.C.; Gan, L. DRL-based orchestration of multi-user MISO systems with stacked intelligent metasurfaces. In Proceedings of the ICC 2024-IEEE International Conference on Communications; 2024; pp. 4991–4996. [Google Scholar] [CrossRef]
- Dogra, V.; Singh, A.; Verma, S.; Kavita, J.N.Z.; Talib, M.N. Analyzing DistilBERT for sentiment classification of banking financial news. In Intelligent Computing and Innovation on Data Science; Peng, S.L., Hsieh, S.Y., Gopalakrishnan, S., Duraisamy, B., Eds.; Springer, 2021; Volume 248, pp. 665–675. [Google Scholar] [CrossRef]
- Alkinani, M.H.; Almazroi, A.A.; Jhanjhi, N.Z.; Khan, N.A. 5G and IoT-based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors 2021, 21, 6905. [Google Scholar] [CrossRef]
- Babbar, H.; Rani, S.; Masud, M.; Verma, S.; Anand, D.; Jhanjhi, N. Load balancing algorithm for migrating switches in software-defined vehicular networks. Computational Materials and Continua 2021, 67, 1301–1316. [Google Scholar] [CrossRef]
- Saeed, S.; Abdullah, A. Combination of brain cancer with hybrid K-NN algorithm using statistical analysis of cerebrospinal fluid (CSF) surgery. International Journal of Computer Science and Network Security 2021, 21, 120–130. [Google Scholar]
- Saeed, S.; Abdullah, A. Analysis of lung cancer patients for data mining tool. International Journal of Computer Science and Network Security 2019, 19, 90–105. [Google Scholar]
- Saeed, S.; Abdullah, A.; Jhanjhi, N.Z.; Naqvi, M.; Nayyar, A. New techniques for efficiently k-NN algorithm for brain tumor detection. Multimedia Tools and Applications 2022, 81, 18595–18616. [Google Scholar] [CrossRef]
- Saeed, S.; Abdullah, A.; Naqvi, M. Implementation of Fourier transformation with brain cancer and CSF images. Indian Journal of Science & Technology 2019, 12, 1–16. [Google Scholar]
- Shetty, R.; Bhat, V.S.; Pujari, J. Content-based medical image retrieval using deep learning-based features and hybrid meta-heuristic optimization. Biomedical Signal Processing and Control 2024, 92, 106069. [Google Scholar] [CrossRef]
- Yousaf, M.Z.; Singh, A.R.; Khalid, S.; Bajaj, M.; Kumar, B.H.; Zaitsev, I. Enhancing HVDC transmission line fault detection using disjoint bagging and bayesian optimization with artificial neural networks and scientometric insights. Scientific Reports 2024, 14, 23610. [Google Scholar] [CrossRef]
- Du, H.; Wang, J.; Qian, W.; Zhang, X.; Wang, Q. Rotating machinery fault diagnosis based on parameter-optimized variational mode decomposition. Digital Signal Processing 2024, 153, 104590. [Google Scholar] [CrossRef]
- Elshazly, E.A.; El-Shafai, W.; El-Hoseny, H.; El-Rabaie, E.S.M.; Zahran, O.; Abdelwahab, S.A. . & Abd El-Samie, F.E. Software design and FPGA implementation of optimized medical image fusion techniques. Multimedia Tools and Applications 2025, 1–31. [Google Scholar] [CrossRef]
- Hollweg, G.V.; Evald, P.J.D.D.O.; Mattos, E.; Borin, L.C.; Tambara, R.V.; Montagner, V.F. Optimized parametrization of adaptive controllers for enhanced current regulation in grid-tied converters. International Journal of Adaptive Control and Signal Processing 2024, 38, 200–220. [Google Scholar] [CrossRef]
- Thamma, S.R. A Comprehensive Evaluation and Methodology on Enhancing Computational Efficiency through Accelerated Computing. 2024.
- Ismail, N.A.; Khadra, S.A.; Attiya, G.M.; Abdulrahman, S.E.S. Optimizing SIKE for blockchain-based IoT ecosystems with resource constraints. The Journal of Supercomputing 2025, 81, 1–44. [Google Scholar] [CrossRef]
- Li, W.X.; Wang, C.; Wei, H.; Hou, S.; Cao, C.; Pan, C.; Wen, K. Unified Sparse Optimization via Quantum Architectures and Hybrid Techniques. Quantum Science and Technology 2025. [Google Scholar] [CrossRef]
- Aldughayfiq, B.; Ashfaq, F.; Jhanjhi, N.Z.; Humayun, M. Explainable AI for retinoblastoma diagnosis: Interpreting deep learning models with LIME and SHAP. Diagnostics 2023, 13, 1932. [Google Scholar] [CrossRef] [PubMed]
- Kumar, M.S.; Vimal, S.; Jhanjhi, N.Z.; Dhanabalan, S.S.; Alhumyani, H.A. Blockchain based peer to peer communication in autonomous drone operation. Energy Reports 2021, 7, 7925–7939. [Google Scholar] [CrossRef]
- Aherwadi, N.; Mittal, U.; Singla, J.; Jhanjhi, N.Z.; Yassine, A.; Hossain, M.S. Prediction of fruit maturity, quality, and its life using deep learning algorithms. Electronics 2022, 11, 4100. [Google Scholar] [CrossRef]
- Jena, K.K.; Bhoi, S.K.; Malik, T.K.; Sahoo, K.S.; Jhanjhi, N.Z.; Bhatia, S.; Amsaad, F. E-learning course recommender system using collaborative filtering models. Electronics 2022, 12, 157. [Google Scholar] [CrossRef]
- Gill, S.H.; Razzaq, M.A.; Ahmad, M.; Almansour, F.M.; Haq, I.U.; Jhanjhi, N.Z.; Masud, M. Security and privacy aspects of cloud computing: A smart campus case study. Intelligent Automation & Soft Computing 2022, 31, 117–128. [Google Scholar]
- Muzafar, S.; Jhanjhi, N.Z. Success stories of ICT implementation in Saudi Arabia. In Employing Recent Technologies for Improved Digital Governance; IGI Global. 2020; pp. 151–163.
- Alferidah, D.K.; Jhanjhi, N.Z. Cybersecurity impact over bigdata and iot growth. In Proceedings of the 2020 International Conference on Computational Intelligence (ICCI); 2020; pp. 103–108. [Google Scholar] [CrossRef]
- Alkinani, M.H.; Almazroi, A.A.; Jhanjhi, N.Z.; Khan, N.A. 5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle. Sensors 2021, 21, 6905. [Google Scholar] [CrossRef]
- Shah, I.A.; Jhanjhi, N.Z.; Laraib, A. Cybersecurity and blockchain usage in contemporary business. In Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications; IGI Global: 2023; pp. 49–64.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).