Linda Mohaisen

ORCID: 0000-0001-9308-3578
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Graph Labeling and Dimension Problems
  • Video Surveillance and Tracking Methods
  • Information and Cyber Security
  • Advanced Image Fusion Techniques
  • Mobile Ad Hoc Networks
  • Emotion and Mood Recognition
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Insurance and Financial Risk Management
  • User Authentication and Security Systems
  • graph theory and CDMA systems
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Remote-Sensing Image Classification
  • Privacy-Preserving Technologies in Data
  • Fire Detection and Safety Systems
  • Interactive and Immersive Displays
  • Face recognition and analysis
  • Digital Media Forensic Detection
  • Energy Efficient Wireless Sensor Networks
  • Synthetic Aperture Radar (SAR) Applications and Techniques
  • Network Security and Intrusion Detection
  • Human Mobility and Location-Based Analysis
  • Internet Traffic Analysis and Secure E-voting
  • Hand Gesture Recognition Systems

King Abdulaziz University
2022-2025

University of Alabama in Huntsville
2017

The rapid growth of smart technologies and services has intensified the challenges surrounding identity authentication techniques.Biometric credentials are increasingly being used for verification due to their advantages over traditional methods, making it crucial safeguard privacy people's biometric data in various scenarios.This paper offers an in-depth exploration privacy-preserving techniques potential threats systems.It proposes a noble thorough taxonomy survey techniques, as well...

10.32604/cmc.2024.047870 article EN Computers, materials & continua/Computers, materials & continua (Print) 2024-01-01

In this paper, we consider the NP-hard problem of finding minimum connected resolving set graphs. A vertex B a graph G resolves if every is uniquely identified by its vector distances to vertices in B. subgraph induced nontrivial G. The cardinality minimal metric dimension and solved heuristically binary version an enhanced Harris Hawk Optimization (BEHHO) algorithm. This first attempt determine heuristically. BEHHO combines classical HHO with opposition-based learning, chaotic local search...

10.32604/iasc.2023.032930 article EN cc-by Intelligent Automation & Soft Computing 2023-01-01

Hyperspectral (HS) imaging is a valuable technique for accurately classifying materials because of the abundance spectral information and high resolution it provides. However, characteristics images (HSI), such as high-dimensional features redundancy, pose significant challenges to data processing. Traditional dimensionality reduction methods often have loss, computational complexity, easy ignore strong correlation between HSI bands when dealing with data. Although other can achieve...

10.1145/3715698 article EN ACM Transactions on Multimedia Computing Communications and Applications 2025-01-29

10.32604/cmc.2025.061421 article EN Computers, materials & continua/Computers, materials & continua (Print) 2025-01-01

We consider, in this paper, the NP-hard problem of finding minimum connected domination metric dimension graphs. A vertex set B a graph G = (V, E) resolves if every is uniquely identified by its vector distances to vertices B. resolving subgraph <math xmlns="http://www.w3.org/1998/Math/MathML" id="M1"><mover accent="true"><mi>B</mi><mo>¯</mo></mover></math> induced nontrivial G. dominating that does not belong neighbor some The cardinality smallest G, minimal set, and are respectively....

10.1155/2022/6076369 article EN Scientific Programming 2022-10-06

The spatiotemporal remote sensing images have a significant importance in forest ecological monitoring, carbon management, and other related fields. Spatiotemporal data fusion technology of combines high temporal resolution to address the current limitation single sensors obtaining resolution. This has gained widespread attention recent years. However, models still exhibit some shortcomings dealing with land cover changes, such as poor clustering results, inaccurate incremental calculations,...

10.1109/jstars.2023.3296468 article EN cc-by IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2023-01-01

Vehicular Ad Hoc Networks (VANETs) are increasingly playing a fundamental role in improving driving safety. However, VANETs sparse environment may add risk to The probability of low density vehicles rural area at midnight is very high. Consequently, the packet will be lost due lack other vehicles, and arrival following accident unavoidable. To overcome this problem, VANET integrated with Wireless Sensor Network (WSN). most challenging features their high mobility. This mobility causes sensor...

10.3390/app13064008 article EN cc-by Applied Sciences 2023-03-21

Brain stress monitoring has emerged as a critical research area for understanding and managing neurological health issues. This burgeoning field aims to provide accurate information prediction about individuals' levels by analyzing behavioral data physiological signals. To address this emerging problem, study proposes an innovative approach that uses attention mechanism-based XLNet model (called BrainNet) continuous level prediction. The proposed analyzes streams of brain data, including...

10.3389/fncom.2024.1482994 article EN cc-by Frontiers in Computational Neuroscience 2024-10-24

In this paper, we consider the NP-hard problem of finding minimum dominant resolving set graphs.A vertex B a connected graph G resolves if every is uniquely identified by its vector distances to vertices in B. A dominating that does not belong neighbor some The metric dimension cardinality number set.The computed binary version Archimedes optimization algorithm (BAOA).The objects BAOA are encoded and used represent which one belongs feasibility enforced repairing such an additional generated...

10.32604/iasc.2023.031947 article EN Intelligent Automation & Soft Computing 2023-01-01

Frame duplication forgery is the most common inter-frame video type to alter contents of digital sequences. It can be used for removing or duplicating some events within same Most existing frame detection methods fail detect highly similar frames in surveillance videos. In this paper, we propose a method based on textural feature analysis Firstly, compute single-level 2-D wavelet decomposition each forged Secondly, features are extracted using Gray Level Co-Occurrence Matrix (GLCM). Four...

10.3390/electronics12224597 article EN Electronics 2023-11-10

This paper presents the Smart Grocery Shopping system (GROCAFAST), a for optimizing grocery shopping experience and improving efficiency shoppers. The GROCAFAST consists of mobile app server component. allows shoppers to create, manage, update lists while providing store navigation assistance. component processes data, generates optimized route maps, maintains an inventory database, facilitates online chat room. Unlike existing systems, is cost-effective as it does not rely on any extra...

10.14569/ijacsa.2024.01504116 article EN International Journal of Advanced Computer Science and Applications 2024-01-01

Facial emotion recognition (FER) can serve as a valuable tool for assessing emotional states, which are often linked to mental health. However, health encompasses broad range of factors that go beyond facial expressions. While FER provides insights into certain aspects well-being, it be used in conjunction with other assessments form more comprehensive understanding an individual's This research work proposes framework human using UNet image segmentation and transfer learning the...

10.3389/fncom.2024.1485121 article EN cc-by Frontiers in Computational Neuroscience 2024-12-11

Forest height is a key forest parameter which of great significance for monitoring resources, calculating biomass, and observing the global carbon cycle. Because PolInSAR system could provide various object information including height, shape direction sensitivity, spatial distribution, it becomes powerful means measuring height. The proposed framework utilizes deep learning builds upon traditional DEM differencing coherence amplitude inversion algorithms. By using L band data, new CNN model...

10.1109/jstars.2023.3328403 article EN cc-by-nc-nd IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2023-01-01

Nowadays, the Internet of Things (IoT) has become immensely popular in various fields like healthcare, smart cities, and industrial automation. IoT networks are expanding rapidly, including different devices with limited capabilities terms power storage which make security a crucial issue. Network Intrusion Detection System is one most famous solutions that used to identify types attack extract their features (e.g. IP addresses attackers). The address valuable feature can malicious traffic...

10.1109/jiot.2023.3347492 article EN IEEE Internet of Things Journal 2023-12-26

Studies have shown that in today’s urban areas, drivers lose a significant amount of time searching for available on-street parking spaces. Cruising cause numerous problems, such as wasting gasoline and emitting gasses lead to air pollution. To solve this issue, the industry academia made great efforts lessen cruising drivers’ problems by providing management solutions can help enhance efficient use limited free However, these two main limitations, scalability privacy. This paper proposes...

10.3390/electronics12194160 article EN Electronics 2023-10-07
Coming Soon ...