Mohammad T. Alshammari

ORCID: 0000-0001-9109-0395
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Learning Styles and Cognitive Differences
  • Online Learning and Analytics
  • Innovative Teaching and Learning Methods
  • Perovskite Materials and Applications
  • Metaheuristic Optimization Algorithms Research
  • Vehicular Ad Hoc Networks (VANETs)
  • Conducting polymers and applications
  • Nanowire Synthesis and Applications
  • Educational Games and Gamification
  • Chalcogenide Semiconductor Thin Films
  • Spam and Phishing Detection
  • Silicon and Solar Cell Technologies
  • Thin-Film Transistor Technologies
  • Virtual Reality Applications and Impacts
  • Advanced Malware Detection Techniques
  • Evolutionary Algorithms and Applications
  • Digital Media Forensic Detection
  • Network Security and Intrusion Detection
  • Intelligent Tutoring Systems and Adaptive Learning
  • IoT and Edge/Fog Computing
  • E-Learning and Knowledge Management
  • Image Processing Techniques and Applications
  • Blockchain Technology Applications and Security
  • Context-Aware Activity Recognition Systems
  • Misinformation and Its Impacts

University of Ha'il
2017-2025

Al-Sabah Hospital
2025

Kuwait Petroleum Corporation (Kuwait)
2022

University of Birmingham
2014-2016

Perovskite solar cells (PSCs) have drawn significant consideration as a competing cell technology because of the drastic advance in their power conversion efficiency (PCE) over last two decades. The interfaces between electron transport layer (ETL) and absorber hole (HTL) major impact on performance PSCs. In this paper, we investigated defect ETL/absorber layer/HTL calibrated experimental lead-based lead-free influence is studied order to find optimum value for maximum possible PCE. While...

10.1109/access.2021.3114383 article EN cc-by IEEE Access 2021-01-01

The rapid expansion of medical data poses numerous challenges for Machine Learning (ML) tasks due to their potential include excessive noisy, irrelevant, and redundant features. As a result, it is critical pick the most pertinent features classification task, which referred as Feature Selection (FS). Among FS approaches, wrapper methods are designed select appropriate subset In this study, two intelligent approaches implemented using new meta-heuristic algorithm called Sand Cat Swarm...

10.3390/electronics12092042 article EN Electronics 2023-04-28

Gamification is often proposed as a promising solution to traditional e-learning systems by the incorporation of game elements and mechanisms enhance motivation, engagement students’ learning. However, most current studies lack careful thorough experimental evaluation on effect gamification are normally applied science learning for adults which makes it difficult generalize findings other domains. This paper addresses this issue offering controlled experiment with 58 elementary school...

10.18421/tem92-51 article EN TEM Journal 2020-05-27

Security attacks on legitimate websites to steal users’ information, known as phishing attacks, have been increasing. This kind of attack does not just affect individuals’ or organisations’ websites. Although several detection methods for proposed using machine learning, deep and other approaches, their accuracy still needs be enhanced. paper proposes an optimized stacking ensemble method website detection. The optimisation was carried out a genetic algorithm (GA) tune the parameters...

10.3390/electronics10111285 article EN Electronics 2021-05-28

In this work, we report on the effect of substituting active intrinsic i-layer a conventional pin structure lead-free perovskite solar cell (PSC) by homo p-n junction, keeping thickness layer constant. It is expected that when substituted one can increase collection efficiency photo-generated electrons and holes due to built-in electric field junction. The impact technological physical device parameters performance have been worked out. was found p-side must be wider than n-side, while its...

10.3390/en14185741 article EN cc-by Energies 2021-09-12

The driving experience in fifth-generation (5G)-assisted vehicular fog computing systems has improved thanks to recent advancements intelligent transportation. However, the present system setup, phenomenon of providing low computation overhead with massive serving capability is crucial. In existing scenario, computational complexity rises when an authenticated driver travels from one roadside unit (RSU) area another RSU region and must undergo re-authentication by RSU. this paper, efficient...

10.1109/access.2024.3372390 article EN cc-by-nc-nd IEEE Access 2024-01-01

The fast development of vehicle technology and the appearance 5G networks have brought new opportunities as well challenges for vehicular fog computing. On one hand, these advances would bring a safer, more efficient, comfortable car onto our roads; but on other, they open up huge security privacy vulnerabilities. Current solutions typically offer inadequate coverage, rendering susceptible to diverse attacks. We present first holistic solution that combines entity authentication with...

10.1109/access.2024.3429179 article EN cc-by-nc-nd IEEE Access 2024-01-01

Artificial intelligence tools like ChatGPT can impact an individual's cognitive processes, such as thinking, learning, and problem-solving. Recent studies have explored in education, but they mainly rely on educator learner surveys for feedback report qualitative data findings. There is also a lack of controlled experiments measuring the effect integrating into Adaptive E-learning Systems (AESs) learning. This paper aims to fill this research gap by evaluating AESs incorporating learning...

10.18421/tem141-45 article EN TEM Journal 2025-02-27

10.14569/ijacsa.2025.01602108 article EN International Journal of Advanced Computer Science and Applications 2025-01-01

We present a chemiresistor sensor for NO2 leaks. The uses the organometallic semiconductor copper(II)phthalocyanine (CuPc) and is manufactured characterised easier than previously described organic transistor gas sensors. Resistance R high but within range of modern voltage buffers. weakly responds to several gases, with either small increase (NH3, H2S), or decrease (SO2) R. However, response low at environmental pollution levels. Response also near- zero permitted long-term exposure. Our...

10.20944/preprints202503.2088.v1 preprint EN 2025-03-27

ABSTRACT Introduction There is a growing adoption of artificial intelligence (AI) in the field medical imaging. AI can potentially enhance patient care, improve workflow, and analyze patient's data. This study aimed to explore radiographers' knowledge, perceptions, expectations toward integrating into imaging highlight one available applications by evaluating an AI‐based software that generates chest reports. Methods A cross‐sectional survey was distributed radiographers ( n = 50) requesting...

10.1002/hsr2.70465 article EN cc-by-nc Health Science Reports 2025-03-27

Aim/Purpose: Effective e-learning systems need to incorporate student characteristics such as learning style and knowledge level in order provide a more personalized adaptive experience. However, there is investigate how when adaptivity based on characteristics, importantly, evaluate its value enhancement. This study aims bridge that gap by examining the effect of different modes material adaptation their sequences students systems. Background: E-learning aim acceptability interactivity...

10.28945/4459 article EN Journal of Information Technology Education Research 2019-01-01

One of the most important challenges in design piezoelectric energy harvester is its narrow bandwidth. Most input vibration sources are exposed to frequency variation during their operation. The harvester’s bandwidth makes it difficult for track variations source frequency. Thus, output power and overall performance expected decline from designed value. This current study aims solve problem main objective achieve broadening which carried out by segmenting material into n segments; where...

10.3390/mi12080973 article EN cc-by Micromachines 2021-08-17

Traditional e-learning systems have been, typically, designed for a generic learner, irrespective of individual knowledge, skills and learning styles. In contrast, adaptive can enhance by taking into account different learner characteristics personalising material. Although large number incorporating style been deployed, there is lack comprehensive, comparative evaluations. This paper attempts to bridge this gap comparing systems. It considers three main perspectives: the model, domain model...

10.1109/cisis.2014.12 article EN 2014-07-01

This work inspects the utilization of all-polymer solar cells (APSCs) in indoor applications under LED illumination, with a focus on boosting efficiency through simulation-based design. The study employs SCAPS TCAD device simulator to investigate performance APSCs white illumination at 1000 lux, power density 0.305 mW/cm2. Initially, is validated against experimental results obtained from fabricated cell utilizing CD1:PBN-21 as an absorber blend and PEDOT:PSS hole transportation layer (HTL),...

10.3390/polym16101412 article EN Polymers 2024-05-16

Traditional e-learning systems are typically designed for generic learners irrespective of individual requirements. In contrast, adaptive take into account learner characteristics such as learning style and level knowledge in order to provide more personalised learning. The contribution this paper is threefold. First, a framework aimed at enhancing proposed. Second, specific approach adaptivity based on put forward within the framework. Third, validated evaluated determine their...

10.1109/hicss.2015.13 article EN 2015-01-01

The widespread usage of social media has led to the increasing popularity online advertisements, which have been accompanied by a disturbing spread clickbait headlines. Clickbait dissatisfies users because article content does not match their expectation. Detecting posts in networks is an important task fight this issue. use phrases that are mainly posted attract user’s attention order click onto specific fake link/website. That means headlines utilize misleading titles, could carry hidden...

10.3390/app11209487 article EN cc-by Applied Sciences 2021-10-13

Teaching computer security is one of the most challenging tasks in science, because need to successfully integrate abstract concepts and practical applications. Several e-learning systems have been developed address this issue. However, they usually provide same material sequence irrespective characteristics students, such as their knowledge level learning style. In paper, an approach style adaptivity proposed for teaching security. An system was more personalised adaptive learning, based on...

10.1145/2729094.2742614 article EN 2015-06-22

Phishing attacks are security that do not affect only individuals' or organizations' websites but may Internet of Things (IoT) devices and networks. IoT environment is an exposed for such attacks. Attackers use thingbots software the dispersal hidden junk emails noticed by users. Machine deep learning other methods were used to design detection these However, there still a need enhance accuracy. Optimization ensemble classification method phishing website (PW) proposed in this study. A...

10.32604/csse.2022.020414 article EN cc-by Computer Systems Science and Engineering 2021-10-08
Coming Soon ...