Lulwah M. Alkwai

ORCID: 0000-0002-6424-961X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Web Data Mining and Analysis
  • IoT and Edge/Fog Computing
  • Natural Language Processing Techniques
  • Text and Document Classification Technologies
  • Network Security and Intrusion Detection
  • IoT-based Smart Home Systems
  • Smart Grid Security and Resilience
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Energy Efficient Wireless Sensor Networks
  • Topic Modeling
  • Web visibility and informetrics
  • Smart Grid Energy Management
  • IoT Networks and Protocols
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Advanced Malware Detection Techniques
  • Data Quality and Management
  • Anomaly Detection Techniques and Applications
  • Spam and Phishing Detection
  • Information Retrieval and Search Behavior
  • Energy Load and Power Forecasting
  • Biometric Identification and Security
  • Smart Systems and Machine Learning
  • Microgrid Control and Optimization

University of Ha'il
2020-2024

Old Dominion University
2015-2017

Abstract A smart city is an idea that realized by the computing of a large amount data collected through sensors, cameras, and other electronic methods to provide services, manage resources solve daily life problems. The transformation conventional grid one step in direction towards realization. An electric composed control stations, generation centres, transformers, communication lines, distributors, which helps transferring power from station domestic commercial consumers. Present grids...

10.1111/exsy.12832 article EN Expert Systems 2021-09-27

Abstract The Internet of Things (IoT) are standard inter connected devices aimed at join everyday object to the internet. This ecosystem include manufacturing, agriculture, smart cities, industry, as well healthcare. capacity controlling and monitoring objects physical world using IoT generate numerous opportunities. However some extra cost is also added make device globally accessible. aggressive growth devices, multifariousness network technology, diversity use cases a question mark...

10.1049/cmu2.12514 article EN cc-by IET Communications 2022-10-18

Today, challenges such as a high false-positive rate, low detection slow processing speed, and big feature dimension are all part of intrusion detection. To address these issues, decision trees (DTs), deep neural networks (DNNs), principal component analysis (PCA) available. Through higher rate lower the research-based model DT-PCA-DNN increases speed systems (IDSs). minimize overall data volume accelerate processing, DT is used to initially differentiate data. Differentiate DTs save...

10.1155/2022/6488571 article EN Mathematical Problems in Engineering 2022-05-09

It has long been suspected that web archives and search engines favor Western English language webpages. In this article, we quantitatively explore how well indexed archived Arabic webpages are as compared to those from other languages. We began by sampling 15,092 unique URIs three different website directories: DMOZ (multilingual), Raddadi, Star28 (the last two primarily language). Using identification tools, eliminated pages not in the (e.g., English-language versions of Aljazeera pages)...

10.1145/3041656 article EN ACM transactions on office information systems 2017-06-05

With the continuous rise of various social media, security problems caused by disseminating news in networks have become increasingly prominent. Among them, dissemination false has brought a significant threat to cyberspace. A method based on influence maximization is proposed change premise network space. This article employed Louvain clustered local degree centrality (LCLD) and random maximum (RMD) algorithm extract most influential node set via maximization. Subsequently, TextCNN...

10.1109/msmc.2023.3276575 article EN IEEE Systems Man and Cybernetics Magazine 2023-10-01

It is has long been anecdotally known that web archives and search engines favor Western English-language sites. In this paper we quantitatively explore how well indexed archived are Arabic language We began by sampling 15,092 unique URIs from three different website directories: DMOZ (multi-lingual), Raddadi Star28 (both primarily language). Using identification tools eliminated pages not in the (e.g., English versions of Al-Jazeera sites) culled collection to 7,976 definitely pages. then...

10.1145/2756406.2756912 article EN 2015-06-12

The most effective threat for wireless sensor networks (WSN) is Vampire attacks on nodes as they can stretch the network connectivity among them and influence network’s energy, which drain network. attack has particular malicious nature of in widely exploit features combined routing protocol. Fuzzy rules fuzzy sets are highly optimal techniques mitigating vampire network, quantify uncertain behaviour nodes. This study aims to propose a novel technique using probabilistic chain set with...

10.1155/2022/4948190 article EN Mathematical Problems in Engineering 2022-06-14

Quantifying the captures of a URI over time is useful for researchers to identify extent which Web page has been archived. Memento TimeMaps provide format list mementos (URI-Ms) along with brief metadata, like Memento-Datetime, each URI-M. However, when some URI-Ms are dereferenced, they simply redirect different URI-M (instead unique representation at datetime), often also present in TimeMap. This infers that confidently obtaining an accurate count quantifying number non-forwarding URI-R...

10.1109/jcdl.2017.7991601 preprint EN 2017-06-01

Memento TimeMaps [5] list identifiers for archival web captures (URI-Ms). When some URI-Ms are dereferenced, they redirect to a different URI-M instead of unique representation at the datetime. This suggests that confidently obtaining an accurate count quantifying number non-forwarding Original Resource URI (URI-R) is not possible using TimeMap alone and magnitude equivalent representations it identifies. work represents abbreviated version full technical report describing this phenomena in...

10.5555/3200334.3200384 article EN arXiv (Cornell University) 2017-06-19

Abstract Due to the realization of 5G technology, Internet things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) are proposed here address those issues....

10.1049/cmu2.12336 article EN cc-by-nc-nd IET Communications 2022-01-18

Rich material is buried in the entity’s textual description information, its hierarchical-type and graph’s topological structure information knowledge graph. As a result, these data can be useful supplement to triple terms of improving performance. To appropriately exploit social Internet Things (IoT) data, entity details are first encoded using artificial-intelligence (AI)-based convolutional neural networks (CNNs). The unit vector then projected into given relational space thus restricting...

10.1109/msmc.2022.3198023 article EN IEEE Systems Man and Cybernetics Magazine 2022-10-01

Efficient classification methods are crucial for accurately predicting co-occurring diabetic and thyroid diseases, addressing substantial global health challenges. These conditions affect individuals across diverse demographics, including males, females, infants, adolescents, the elderly. This study employs ML algorithms to forecast diseases (DTD). Utilizing a dataset sourced from UCI Machine Learning Repository, feature selection techniques were applied identify relevant attributes optimize...

10.52783/jes.3344 article EN cc-by-nd Deleted Journal 2024-05-03

Abstract Energy efficiency is critical for prolonging the survivability of wireless sensor networks (WSNs), and clustering algorithms play a significant role in achieving this goal. An application‐specific network requires adapted methods techniques to meet its requirements. A vast amount research has been done on optimizing energy consumption enhancing lifetime nodes. To increase WSNs, we present evaluate an energy‐efficient algorithm based distributed fuzzy logic (EECADFL). High...

10.1002/itl2.549 article EN Internet Technology Letters 2024-06-05

Abstract Developing wireless technology and the exploitation of automated systems has demanded an innovative method handling objects that share multimedia information. The monitoring automation system progressed towards Multimedia Internet Things (M-IoT) whereas circumstance is entirely transformed to meet requirements fast-moving world. (IoT) engrosses abundant makes those think intelligently, which decides on their own by perceiving situation circumstance. incorporation IoT into real-time...

10.21203/rs.3.rs-946443/v1 preprint EN cc-by Research Square (Research Square) 2021-10-25
Coming Soon ...