- Web Data Mining and Analysis
- IoT and Edge/Fog Computing
- Natural Language Processing Techniques
- Text and Document Classification Technologies
- Network Security and Intrusion Detection
- IoT-based Smart Home Systems
- Smart Grid Security and Resilience
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Energy Efficient Wireless Sensor Networks
- Topic Modeling
- Web visibility and informetrics
- Smart Grid Energy Management
- IoT Networks and Protocols
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Advanced Malware Detection Techniques
- Data Quality and Management
- Anomaly Detection Techniques and Applications
- Spam and Phishing Detection
- Information Retrieval and Search Behavior
- Energy Load and Power Forecasting
- Biometric Identification and Security
- Smart Systems and Machine Learning
- Microgrid Control and Optimization
University of Ha'il
2020-2024
Old Dominion University
2015-2017
Abstract A smart city is an idea that realized by the computing of a large amount data collected through sensors, cameras, and other electronic methods to provide services, manage resources solve daily life problems. The transformation conventional grid one step in direction towards realization. An electric composed control stations, generation centres, transformers, communication lines, distributors, which helps transferring power from station domestic commercial consumers. Present grids...
Abstract The Internet of Things (IoT) are standard inter connected devices aimed at join everyday object to the internet. This ecosystem include manufacturing, agriculture, smart cities, industry, as well healthcare. capacity controlling and monitoring objects physical world using IoT generate numerous opportunities. However some extra cost is also added make device globally accessible. aggressive growth devices, multifariousness network technology, diversity use cases a question mark...
Today, challenges such as a high false-positive rate, low detection slow processing speed, and big feature dimension are all part of intrusion detection. To address these issues, decision trees (DTs), deep neural networks (DNNs), principal component analysis (PCA) available. Through higher rate lower the research-based model DT-PCA-DNN increases speed systems (IDSs). minimize overall data volume accelerate processing, DT is used to initially differentiate data. Differentiate DTs save...
It has long been suspected that web archives and search engines favor Western English language webpages. In this article, we quantitatively explore how well indexed archived Arabic webpages are as compared to those from other languages. We began by sampling 15,092 unique URIs three different website directories: DMOZ (multilingual), Raddadi, Star28 (the last two primarily language). Using identification tools, eliminated pages not in the (e.g., English-language versions of Aljazeera pages)...
With the continuous rise of various social media, security problems caused by disseminating news in networks have become increasingly prominent. Among them, dissemination false has brought a significant threat to cyberspace. A method based on influence maximization is proposed change premise network space. This article employed Louvain clustered local degree centrality (LCLD) and random maximum (RMD) algorithm extract most influential node set via maximization. Subsequently, TextCNN...
It is has long been anecdotally known that web archives and search engines favor Western English-language sites. In this paper we quantitatively explore how well indexed archived are Arabic language We began by sampling 15,092 unique URIs from three different website directories: DMOZ (multi-lingual), Raddadi Star28 (both primarily language). Using identification tools eliminated pages not in the (e.g., English versions of Al-Jazeera sites) culled collection to 7,976 definitely pages. then...
The most effective threat for wireless sensor networks (WSN) is Vampire attacks on nodes as they can stretch the network connectivity among them and influence network’s energy, which drain network. attack has particular malicious nature of in widely exploit features combined routing protocol. Fuzzy rules fuzzy sets are highly optimal techniques mitigating vampire network, quantify uncertain behaviour nodes. This study aims to propose a novel technique using probabilistic chain set with...
Quantifying the captures of a URI over time is useful for researchers to identify extent which Web page has been archived. Memento TimeMaps provide format list mementos (URI-Ms) along with brief metadata, like Memento-Datetime, each URI-M. However, when some URI-Ms are dereferenced, they simply redirect different URI-M (instead unique representation at datetime), often also present in TimeMap. This infers that confidently obtaining an accurate count quantifying number non-forwarding URI-R...
Memento TimeMaps [5] list identifiers for archival web captures (URI-Ms). When some URI-Ms are dereferenced, they redirect to a different URI-M instead of unique representation at the datetime. This suggests that confidently obtaining an accurate count quantifying number non-forwarding Original Resource URI (URI-R) is not possible using TimeMap alone and magnitude equivalent representations it identifies. work represents abbreviated version full technical report describing this phenomena in...
Abstract Due to the realization of 5G technology, Internet things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) are proposed here address those issues....
Rich material is buried in the entity’s textual description information, its hierarchical-type and graph’s topological structure information knowledge graph. As a result, these data can be useful supplement to triple terms of improving performance. To appropriately exploit social Internet Things (IoT) data, entity details are first encoded using artificial-intelligence (AI)-based convolutional neural networks (CNNs). The unit vector then projected into given relational space thus restricting...
Efficient classification methods are crucial for accurately predicting co-occurring diabetic and thyroid diseases, addressing substantial global health challenges. These conditions affect individuals across diverse demographics, including males, females, infants, adolescents, the elderly. This study employs ML algorithms to forecast diseases (DTD). Utilizing a dataset sourced from UCI Machine Learning Repository, feature selection techniques were applied identify relevant attributes optimize...
Abstract Energy efficiency is critical for prolonging the survivability of wireless sensor networks (WSNs), and clustering algorithms play a significant role in achieving this goal. An application‐specific network requires adapted methods techniques to meet its requirements. A vast amount research has been done on optimizing energy consumption enhancing lifetime nodes. To increase WSNs, we present evaluate an energy‐efficient algorithm based distributed fuzzy logic (EECADFL). High...
Abstract Developing wireless technology and the exploitation of automated systems has demanded an innovative method handling objects that share multimedia information. The monitoring automation system progressed towards Multimedia Internet Things (M-IoT) whereas circumstance is entirely transformed to meet requirements fast-moving world. (IoT) engrosses abundant makes those think intelligently, which decides on their own by perceiving situation circumstance. incorporation IoT into real-time...