Mashael M. Asiri

ORCID: 0000-0002-5128-7684
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Hearing Impairment and Communication
  • Hand Gesture Recognition Systems
  • Spam and Phishing Detection
  • Music and Audio Processing
  • Water Quality Monitoring and Analysis
  • UAV Applications and Optimization
  • Sentiment Analysis and Opinion Mining
  • Chaos-based Image/Signal Encryption
  • Advanced Wireless Communication Technologies
  • Speech Recognition and Synthesis
  • COVID-19 diagnosis using AI
  • Brain Tumor Detection and Classification
  • Human Pose and Action Recognition
  • Water Quality Monitoring Technologies
  • Information and Cyber Security
  • Air Quality and Health Impacts
  • Energy Efficient Wireless Sensor Networks
  • Text and Document Classification Technologies
  • Digital and Cyber Forensics
  • Hydrological Forecasting Using AI
  • Software Engineering Research
  • Currency Recognition and Detection

King Khalid University
2022-2024

King Khaled Hospital
2024

King Salman Center for Disability Research
2023

The construction of an automatic voice pathology detection system employing machine learning algorithms to study abnormalities is crucial for the early pathologies and identifying specific type from which patients suffer. This paper’s primary objective construct a deep model accurate speech identification. Manual audio feature extraction was employed as foundation categorization process. Incorporating additional piece information, i.e., gender, via two-level classifier most critical aspect...

10.3390/su15043204 article EN Sustainability 2023-02-09

Load forecasting in Smart Grids (SG) is a major module of current energy management systems, that play vital role optimizing resource allocation, improving grid stability, and assisting the combination renewable sources (RES). It contains predictive electricity consumption forms over certain time intervals. Forecasting remains stimulating task as load data has exhibited changing patterns because factors such weather change shifts usage behaviour. The beginning advanced analytics machine...

10.1109/access.2024.3358182 article EN cc-by-nc-nd IEEE Access 2024-01-01

The rapid evolution of communication systems towards the next generation has led to an increased deployment Internet Things (IoT) devices for various real-time applications. However, these often face limitations in terms processing power and battery life, which can hinder overall system performance. Additionally, applications such as augmented reality surveillance require intensive computations within tight timeframes. This research focuses on investigating a mobile edge computing (MEC)...

10.1016/j.jksuci.2023.101646 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-07-19

Cancer seems to have a vast number of deaths due its heterogeneity, aggressiveness, and significant propensity for metastasis. The predominant categories cancer that may affect males females occur worldwide are colon lung cancer. A precise on-time analysis this can increase the survival rate improve appropriate treatment characteristics. An efficient effective method speedy accurate recognition tumours in areas is provided as an alternative methods. Earlier diagnosis disease on front...

10.1038/s41598-024-71302-9 article EN cc-by-nc-nd Scientific Reports 2024-09-03

In today’s age of information and communication technology (ICT), many companies are using advanced digital technologies as well the application to grow company effectively manage their processes. The risk management plays a crucial role in protecting important data assets an enterprise. key objective is safeguard infrastructure from ICT-related harm. An efficient cost effective managing mechanism integral aspect extensive safety system for technology. A successful approach IT would strive...

10.3390/app12125911 article EN cc-by Applied Sciences 2022-06-10

The forthcoming era of the automotive industry, known as Automotive-Industry 5.0, will leverage latest advancements in 6G communications technology to enable reliable, computationally advanced, and energy-efficient exchange data between diverse onboard sensors, drones other vehicles. We propose a non-orthogonal multiple access (NOMA) multi-drone network order address requirements enormous connections, various quality services (QoS), ultra-reliability, low latency upcoming sixth-generation...

10.1016/j.jksuci.2023.03.025 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-04-14

Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid development of smart cities. To develop environment, enhancements to execution, sustainability, security traditional mechanisms become mandatory. Intrusion detection systems (IDS) can be considered an effective solutions achieve environment. This article introduces intrusion using chaotic poor rich optimization with deep learning model (IDCPRO-DLM) for ubiquitous atmospheres. The IDCPRO-DLM follows...

10.3390/su15086902 article EN Sustainability 2023-04-19

The Internet of Things (IoT) based Wireless Sensor Networks (WSNs) contain interconnected autonomous sensor nodes (SN), which wirelessly communicate with each other and the wider internet structure. Intrusion detection to secure IoT-based WSNs is critical for identifying responding great security attacks threats that can cooperate integrity, availability, privacy network its data. Machine learning (ML) algorithms are deployed detecting difficult patterns subtle anomalies in IoT Artificial...

10.1109/access.2023.3335124 article EN cc-by-nc-nd IEEE Access 2023-01-01

Environmental sustainability is the rate of renewable resource harvesting, pollution control, and non-renewable exhaustion. Air a significant issue confronted by environment particularly highly populated countries like India. Due to increased population, number vehicles also continues increase. Each vehicle has its individual emission rate; however, arises when crosses standard value quality air gets degraded. Owing technological advances in machine learning (ML), it possible develop...

10.32604/cmc.2022.029604 article EN Computers, materials & continua/Computers, materials & continua (Print) 2022-01-01

Recent developments of semiconductor and communication technologies have resulted in the interconnection numerous devices offering seamless services, which is termed as Internet Everything (IoE). It a subset Things (IoT) finds helpful several applications namely smart city, home, precise agriculture, healthcare, logistics, etc. Despite benefits IoE, it limited to processing storage abilities, resulting degradation device safety, privacy, efficiency. Security privacy become major concerns...

10.3390/app12084026 article EN cc-by Applied Sciences 2022-04-15

In smart video surveillance systems, violence detection becomes challenging to ensure public safety and security. With the proliferation of cameras in areas, there is an increasing need for automated algorithms that can accurately efficiently detect violent behavior real time. This article presents a Tuna Swarm Optimization with Deep Learning Enabled Violence Detection (TSODL-VD) technique classify actions videos. The TSODL-VD enables recognition be measure avoid chaotic situations....

10.1109/access.2023.3310885 article EN cc-by-nc-nd IEEE Access 2023-01-01

ChatGPT, developed by OpenAI, is an advanced language model that excels at generating human-like text responses in conversational settings. As ChatGPT interacts with the user, it creates a range of sentiments from them, involving neutral, positive, or negative expressions. Sentiment analysis (SA), also called opinion mining, branch natural processing (NLP) defines emotional tone sentiment conveyed textual data. (SA) plays major role understanding how people respond and perceive different...

10.1109/access.2023.3315609 article EN cc-by-nc-nd IEEE Access 2023-01-01

This study investigates the public’s perceptions of digital innovations in pharmacy, with a focus on health informatics and medication management. Despite rapid development these technologies, comprehensive understanding how various demographics perceive interact them is lacking hence, this research aims to bridge gap by offering insights into public attitudes factors influencing adoption tools pharmacy practice, as KSA population healthcare professionals after Covid-19 has observed...

10.24294/jipd.v8i8.5450 article EN Journal of Infrastructure Policy and Development 2024-08-16

Antibiotics become an emerging contaminant and receive more interests due to its ecotoxicological strong stability in water ecosystems. Antibiotic adsorption onto carbon materials are biochars among the wastewater mechanisms. This research used machine learning (ML) techniques generate general forecasting model for sulfamethoxazole (SMX) tetracycline (TC) on CBM. Dirichlet design parameters a combined combination of Neumann boundary situation applied system differential equations. In...

10.1155/2022/6292200 article EN cc-by-nc Adsorption Science & Technology 2022-01-01

Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention different application areas. However, IoT environment is highly susceptible cyber-attacks because memory, processing, restrictions. Since traditional models are not adequate for accomplishing security the environment, recent developments deep learning (DL) find beneficial. This study introduces novel hybrid metaheuristics...

10.32604/csse.2023.031063 article EN cc-by Computer Systems Science and Engineering 2022-11-03

malware is malicious software (harmful program files) that targets and damage computers, devices, networks, servers. Many types of exist, including worms, viruses, trojan horses, etc. With the increase in technology devices every day, significantly propagating more on a daily basis. The rapid growth number computers rise directly proportional to attacks—most these attacks target organizations, customers, companies, main goal steal critical data passwords, blackmail, propagation this may be...

10.3390/electronics11223665 article EN Electronics 2022-11-09

Devices which are part of the Internet Things (IoT) have strong connections; they generate and consume data, necessitates data transfer among various devices. Smart gadgets collect sensitive information, perform critical tasks, make decisions based on indicator connect interact with one another quickly. Securing this is most vital challenges. A Network Intrusion Detection System (IDS) often used to identify eliminate malicious packets before can enter a network. This operation must be done...

10.3390/electronics11234017 article EN Electronics 2022-12-03

Activated carbon is one of the most highly proven adsorbents for organic chemicals from wastewater. It acts as a filter and adsorbs various has large pore size strong adsorptive capacity. The quality wastewater generally determined by chemical oxygen demand (COD), biochemical (BOD 5) , total suspended solids (TSSs), phosphorus (TP), nitrogen (TN). Wastewater contaminant measurement significant saving aquatic life reusing treated water. Adsorption contaminants that contribute indicators uses...

10.1155/2022/3410872 article EN cc-by-nc Adsorption Science & Technology 2022-01-01

Sarcasm detection has received considerable interest in online social media networks due to the dramatic expansion Internet usage. is a linguistic expression of dislikes or negative emotions by using overstated language constructs. Recently, detecting sarcastic posts on networking platforms gained popularity, especially since comments form tweets typically involve positive words that describe undesirable characteristics. Simultaneously, emergence machine learning (ML) algorithms made it...

10.3390/app12147119 article EN cc-by Applied Sciences 2022-07-14
Coming Soon ...