- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Topic Modeling
- Brain Tumor Detection and Classification
- Advanced Image Fusion Techniques
- Distributed and Parallel Computing Systems
- Natural Language Processing Techniques
- Anomaly Detection Techniques and Applications
- EEG and Brain-Computer Interfaces
- Text and Document Classification Technologies
- Image and Signal Denoising Methods
- Privacy, Security, and Data Protection
- Web Data Mining and Analysis
- Smart Systems and Machine Learning
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Handwritten Text Recognition Techniques
- Network Packet Processing and Optimization
- Image Enhancement Techniques
- Sentiment Analysis and Opinion Mining
- Caching and Content Delivery
- Radiation Effects in Electronics
- Data Mining Algorithms and Applications
- Imbalanced Data Classification Techniques
University of Ha'il
2021-2024
King Saud University
2020
University of Essex
2016-2017
As 5G and other technologies are widely used in the Internet of Vehicles, intrusion detection plays an increasingly important role as a vital tool for information security. However, due to rapid changes structure large data flow, complex diverse forms intrusion, traditional methods cannot ensure their accuracy real-time requirements be directly applied Vehicles. A new AA distributed combined deep learning method Vehicles based on Apache Spark framework is proposed response these problems....
The crime is difficult to predict; it random and possibly can occur anywhere at any time, which a challenging issue for society. study proposes prediction model by analyzing comparing three known classification algorithms: Naive Bayes, Random Forest, Gradient Boosting Decision Tree. analyzes the top ten crimes make predictions about different categories, account 97% of incidents. These two significant classes, that is, violent nonviolent, are created merging multiple smaller classes crimes....
The classical neural network has provided remarkable results to diagnose neurological disorders against neuroimaging data. However, in terms of efficient and accurate classification, some standpoints need be improved by utilizing high-speed computing tools. By integrating quantum phenomena with deep approaches, this study proposes an AlexNet–quantum transfer learning method neurodegenerative diseases using magnetic resonance imaging (MRI) dataset. hybrid model is constructed extracting...
With the rapid increase and complexity of IPv6 network traffic, traditional intrusion detection system Snort detects DoS attacks based on specific rules, which reduces performance IDS. To solve problem in environment, lightweight KNN optimization algorithm machine learning is adopted. First, double dimensionality reduction features achieved through information gain rate, discrete with more subfeatures are selected aggregated to further feature dimension actual operation. Secondly, rate used...
In recent years, federated learning has received widespread attention as a technology to solve the problem of data islands, and it begun be applied in fields such finance, healthcare, smart cities. The algorithm is systematically explained from three levels. First, defined through definition, architecture, classification learning, comparison with traditional distributed knowledge. Then, based on machine deep current types algorithms are classified, compared, analyzed in-depth. Finally,...
Abstract The oil & gas industry has adopted intelligent completions with Inflow Control Devices (ICDs) extensively to achieve selective production and water control from various zones of a single reservoir. conventional method modify the opening/closing state these ICDs involves coiled tubing (CT) hydraulic shifting tools. This technique, however, proven be inefficient, inaccurate, detrimental environment. A novel approach was devised overcome challenges improve operational efficiency,...
The significance of community structure in complex networks, such as social, biological, and online has been widely recognized. Detecting communities social media networks typically relies on two sources information: the network’s topological node attributes. Incorporating rich content attribute information poses both flexibility challenges for detection. Traditional approaches either focus mining one source or linearly combining results from sources, which fails to effectively fuse...
The most popular way to deceive online users nowadays is phishing.Consequently, increase cybersecurity, more efficient web page phishing detection mechanisms are needed.In this paper, we propose an approach that rely on websites image and URL deals with the issue of website recognition as a classification challenge.Our model uses webpage URLs images detect attack using convolution neural networks (CNNs) extract important features then classifies them into benign pages.The accuracy rate...
This research paper focus on a Machine learning model named Face Lock Algorithm with Gender and Age Classifier which will detect the face of user using classifier called Haar Cascade Frontal also provide an extra layer security to mobile applications websites by unlocking them only when algorithm confirms person as actual user. For this, it first take training data input from camera device, then train based according training. Training be done LBPH (Local Binary Pattern Histogram) uses...
The digital news preservation and management of low-resource languages are challenging tasks, especially in vast collections. Unique identification individual objects is possible with well-defined attributes to assure efficient management, such as access, retrieval, preservation, usability, transformability. metadata element set required maximize the available related objects. To create a comprehensive that contains all necessary data about It more complicated when archive articles from...
Contrast enhancement techniques serve the purpose of diminishing image noise and increasing contrast relevant structures. In context medical images, where differentiation between normal abnormal tissues can be quite subtle, precise interpretation might become challenging when levels are relatively elevated. The Fast Local Laplacian Filter (FLLF) is proposed to deliver a more present clearer observer; this achieved through reduction levels. study, FLLF strengthened images its unique...
The modern perspective to deal with bulky data generations schemes of latest technologies in terms dimensionality and sample size extract meaningful information also support automated knowledge discovery pattern recognition process form datasets a lot Data Mining (DM) Machine Learning (ML) techniques developed. In each dataset features are the key factors for machine learning task. research mindset classification algorithms focused get high accuracy by taking account prior less focus on...
Abstract Human centric computing is a technique that gaining more attention nowadays and integrates innovative processing methods for analyzing extensive data collection. intelligent systems focus on handling the interactions between customers, companies, communities of to represent social institutional concepts effectively. However, this interaction companies customers will lead various privacy challenges in human systems. This paper briefly studies cyber‐physical In parallel, article...
Multi-focus image fusion produces a unification of multiple images having different areas in focus, which contain necessary and detailed information the individual image. The paper is proposing novel idea pre-processing step environment sharpening techniques applied before step. This article multi-focus hybrid for fusion, based on enhancement, helps to identify key features minor details then performed enhanced images. In we introduced new method that combines Laplacian Filter (LF) with...
Cloud computing gives beneficial services to share large scale of information, storage resources, and knowledge for research. users deploy their own applications related data on a pay-as-you-go basis. virtual machines (VMs) usually host these data-intensive applications. The performance often depends workload types I/O or computation, volume, CPU attributes nodes CNs, the VMs number same CN network status between SNs CNs. Therefore, application jobs in have different completion times based...
Retrieving a specific digital information object from multi-lingual huge and evolving news archives is challenging complicated against user query. The processing becomes more difficult to understand analyze when low-resourced morphologically complex languages like Urdu Arabic scripts are included in the archive. Computing similarity query among articles collections may be inaccurate time-consuming at run time. This paper introduces Similarity Measure based on Transliteration Words (SMTW)...
The developed world has focused on Web preservation compared to the developing world, especially news for future generations. However, published online is volatile because of constant changes in technologies used disseminate information and formats publication. News became more complicated challenging when archive began contain articles from low-resourced morphologically complex languages like Urdu Arabic, along with English articles. digital story framework enriched eighteen sources Urdu,...
Abstract Due to the realization of 5G technology, Internet things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) are proposed here address those issues....
The Underwater Internet of Things (UIoTs), as a specific genre (IoTs), represent networked devices that exploit sensors and objects (deployed underwater) to collect process oceanic data. data represents multitude valuable information exploratory artefacts, including but not limited underwater temperatures, acidity, types classification marine life, quality sea water, minerals. When applied context-sensitive collected from UIoTs, analytics can provide insights into the stakeholders (e.g....
The formulation of connectivity needs for connected visual world programmes, as well a method disseminating specifications from the consumer layer to communications still unresolved academic problems. We offer paradigm interconnectivity, which reflects an infrastructure perspective on dispersed simulated system, complementary existing study. concept goes deeper into capability requirements shared virtualized entities that vary result user activities. main aim article is discuss information...
In this study, we introduced a preprocessing novel transformation approach for multifocus image fusion. the image, fusion has generated high informative by merging two source images with different areas or objects in focus. Acutely means sharpening performed on before applying techniques. paper, along concept, new technique, Laplacian filter + discrete Fourier transform (LF DFT), is also proposed. The LF used to recognize meaningful discontinuities an image. DFT recognizes that rapid change...
Movie reviews reflect how the public feels about a movie they have watched. However, because many are posted on various websites, it is practically impossible to read each one. Summarizing all can help people make informed decisions without reading through of them. Previous studies used different machine learning and deep techniques for sentiment analysis (SA), but few combined comprehensive hyperparameter tuning novel datasets better performance. This paper presents an SA approach using...