- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Hearing Impairment and Communication
- Hand Gesture Recognition Systems
- Spam and Phishing Detection
- Music and Audio Processing
- Water Quality Monitoring and Analysis
- UAV Applications and Optimization
- Sentiment Analysis and Opinion Mining
- Chaos-based Image/Signal Encryption
- Advanced Wireless Communication Technologies
- Speech Recognition and Synthesis
- COVID-19 diagnosis using AI
- Brain Tumor Detection and Classification
- Human Pose and Action Recognition
- Water Quality Monitoring Technologies
- Information and Cyber Security
- Air Quality and Health Impacts
- Energy Efficient Wireless Sensor Networks
- Text and Document Classification Technologies
- Digital and Cyber Forensics
- Hydrological Forecasting Using AI
- Software Engineering Research
- Currency Recognition and Detection
King Khalid University
2022-2024
King Khaled Hospital
2024
King Salman Center for Disability Research
2023
The construction of an automatic voice pathology detection system employing machine learning algorithms to study abnormalities is crucial for the early pathologies and identifying specific type from which patients suffer. This paper’s primary objective construct a deep model accurate speech identification. Manual audio feature extraction was employed as foundation categorization process. Incorporating additional piece information, i.e., gender, via two-level classifier most critical aspect...
Load forecasting in Smart Grids (SG) is a major module of current energy management systems, that play vital role optimizing resource allocation, improving grid stability, and assisting the combination renewable sources (RES). It contains predictive electricity consumption forms over certain time intervals. Forecasting remains stimulating task as load data has exhibited changing patterns because factors such weather change shifts usage behaviour. The beginning advanced analytics machine...
The rapid evolution of communication systems towards the next generation has led to an increased deployment Internet Things (IoT) devices for various real-time applications. However, these often face limitations in terms processing power and battery life, which can hinder overall system performance. Additionally, applications such as augmented reality surveillance require intensive computations within tight timeframes. This research focuses on investigating a mobile edge computing (MEC)...
Cancer seems to have a vast number of deaths due its heterogeneity, aggressiveness, and significant propensity for metastasis. The predominant categories cancer that may affect males females occur worldwide are colon lung cancer. A precise on-time analysis this can increase the survival rate improve appropriate treatment characteristics. An efficient effective method speedy accurate recognition tumours in areas is provided as an alternative methods. Earlier diagnosis disease on front...
In today’s age of information and communication technology (ICT), many companies are using advanced digital technologies as well the application to grow company effectively manage their processes. The risk management plays a crucial role in protecting important data assets an enterprise. key objective is safeguard infrastructure from ICT-related harm. An efficient cost effective managing mechanism integral aspect extensive safety system for technology. A successful approach IT would strive...
The forthcoming era of the automotive industry, known as Automotive-Industry 5.0, will leverage latest advancements in 6G communications technology to enable reliable, computationally advanced, and energy-efficient exchange data between diverse onboard sensors, drones other vehicles. We propose a non-orthogonal multiple access (NOMA) multi-drone network order address requirements enormous connections, various quality services (QoS), ultra-reliability, low latency upcoming sixth-generation...
Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid development of smart cities. To develop environment, enhancements to execution, sustainability, security traditional mechanisms become mandatory. Intrusion detection systems (IDS) can be considered an effective solutions achieve environment. This article introduces intrusion using chaotic poor rich optimization with deep learning model (IDCPRO-DLM) for ubiquitous atmospheres. The IDCPRO-DLM follows...
The Internet of Things (IoT) based Wireless Sensor Networks (WSNs) contain interconnected autonomous sensor nodes (SN), which wirelessly communicate with each other and the wider internet structure. Intrusion detection to secure IoT-based WSNs is critical for identifying responding great security attacks threats that can cooperate integrity, availability, privacy network its data. Machine learning (ML) algorithms are deployed detecting difficult patterns subtle anomalies in IoT Artificial...
Environmental sustainability is the rate of renewable resource harvesting, pollution control, and non-renewable exhaustion. Air a significant issue confronted by environment particularly highly populated countries like India. Due to increased population, number vehicles also continues increase. Each vehicle has its individual emission rate; however, arises when crosses standard value quality air gets degraded. Owing technological advances in machine learning (ML), it possible develop...
Recent developments of semiconductor and communication technologies have resulted in the interconnection numerous devices offering seamless services, which is termed as Internet Everything (IoE). It a subset Things (IoT) finds helpful several applications namely smart city, home, precise agriculture, healthcare, logistics, etc. Despite benefits IoE, it limited to processing storage abilities, resulting degradation device safety, privacy, efficiency. Security privacy become major concerns...
In smart video surveillance systems, violence detection becomes challenging to ensure public safety and security. With the proliferation of cameras in areas, there is an increasing need for automated algorithms that can accurately efficiently detect violent behavior real time. This article presents a Tuna Swarm Optimization with Deep Learning Enabled Violence Detection (TSODL-VD) technique classify actions videos. The TSODL-VD enables recognition be measure avoid chaotic situations....
ChatGPT, developed by OpenAI, is an advanced language model that excels at generating human-like text responses in conversational settings. As ChatGPT interacts with the user, it creates a range of sentiments from them, involving neutral, positive, or negative expressions. Sentiment analysis (SA), also called opinion mining, branch natural processing (NLP) defines emotional tone sentiment conveyed textual data. (SA) plays major role understanding how people respond and perceive different...
This study investigates the public’s perceptions of digital innovations in pharmacy, with a focus on health informatics and medication management. Despite rapid development these technologies, comprehensive understanding how various demographics perceive interact them is lacking hence, this research aims to bridge gap by offering insights into public attitudes factors influencing adoption tools pharmacy practice, as KSA population healthcare professionals after Covid-19 has observed...
Antibiotics become an emerging contaminant and receive more interests due to its ecotoxicological strong stability in water ecosystems. Antibiotic adsorption onto carbon materials are biochars among the wastewater mechanisms. This research used machine learning (ML) techniques generate general forecasting model for sulfamethoxazole (SMX) tetracycline (TC) on CBM. Dirichlet design parameters a combined combination of Neumann boundary situation applied system differential equations. In...
Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention different application areas. However, IoT environment is highly susceptible cyber-attacks because memory, processing, restrictions. Since traditional models are not adequate for accomplishing security the environment, recent developments deep learning (DL) find beneficial. This study introduces novel hybrid metaheuristics...
malware is malicious software (harmful program files) that targets and damage computers, devices, networks, servers. Many types of exist, including worms, viruses, trojan horses, etc. With the increase in technology devices every day, significantly propagating more on a daily basis. The rapid growth number computers rise directly proportional to attacks—most these attacks target organizations, customers, companies, main goal steal critical data passwords, blackmail, propagation this may be...
Devices which are part of the Internet Things (IoT) have strong connections; they generate and consume data, necessitates data transfer among various devices. Smart gadgets collect sensitive information, perform critical tasks, make decisions based on indicator connect interact with one another quickly. Securing this is most vital challenges. A Network Intrusion Detection System (IDS) often used to identify eliminate malicious packets before can enter a network. This operation must be done...
Activated carbon is one of the most highly proven adsorbents for organic chemicals from wastewater. It acts as a filter and adsorbs various has large pore size strong adsorptive capacity. The quality wastewater generally determined by chemical oxygen demand (COD), biochemical (BOD 5) , total suspended solids (TSSs), phosphorus (TP), nitrogen (TN). Wastewater contaminant measurement significant saving aquatic life reusing treated water. Adsorption contaminants that contribute indicators uses...
Sarcasm detection has received considerable interest in online social media networks due to the dramatic expansion Internet usage. is a linguistic expression of dislikes or negative emotions by using overstated language constructs. Recently, detecting sarcastic posts on networking platforms gained popularity, especially since comments form tweets typically involve positive words that describe undesirable characteristics. Simultaneously, emergence machine learning (ML) algorithms made it...