Yasser Alharbi

ORCID: 0000-0002-6523-628X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection
  • Topic Modeling
  • Brain Tumor Detection and Classification
  • Advanced Image Fusion Techniques
  • Distributed and Parallel Computing Systems
  • Natural Language Processing Techniques
  • Anomaly Detection Techniques and Applications
  • EEG and Brain-Computer Interfaces
  • Text and Document Classification Technologies
  • Image and Signal Denoising Methods
  • Privacy, Security, and Data Protection
  • Web Data Mining and Analysis
  • Smart Systems and Machine Learning
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Handwritten Text Recognition Techniques
  • Network Packet Processing and Optimization
  • Image Enhancement Techniques
  • Sentiment Analysis and Opinion Mining
  • Caching and Content Delivery
  • Radiation Effects in Electronics
  • Data Mining Algorithms and Applications
  • Imbalanced Data Classification Techniques

University of Ha'il
2021-2024

King Saud University
2020

University of Essex
2016-2017

As 5G and other technologies are widely used in the Internet of Vehicles, intrusion detection plays an increasingly important role as a vital tool for information security. However, due to rapid changes structure large data flow, complex diverse forms intrusion, traditional methods cannot ensure their accuracy real-time requirements be directly applied Vehicles. A new AA distributed combined deep learning method Vehicles based on Apache Spark framework is proposed response these problems....

10.1155/2022/3424819 article EN Mathematical Problems in Engineering 2022-03-19

The crime is difficult to predict; it random and possibly can occur anywhere at any time, which a challenging issue for society. study proposes prediction model by analyzing comparing three known classification algorithms: Naive Bayes, Random Forest, Gradient Boosting Decision Tree. analyzes the top ten crimes make predictions about different categories, account 97% of incidents. These two significant classes, that is, violent nonviolent, are created merging multiple smaller classes crimes....

10.1155/2022/4830411 article EN cc-by Complexity 2022-01-01

The classical neural network has provided remarkable results to diagnose neurological disorders against neuroimaging data. However, in terms of efficient and accurate classification, some standpoints need be improved by utilizing high-speed computing tools. By integrating quantum phenomena with deep approaches, this study proposes an AlexNet–quantum transfer learning method neurodegenerative diseases using magnetic resonance imaging (MRI) dataset. hybrid model is constructed extracting...

10.3390/math11020376 article EN cc-by Mathematics 2023-01-10

With the rapid increase and complexity of IPv6 network traffic, traditional intrusion detection system Snort detects DoS attacks based on specific rules, which reduces performance IDS. To solve problem in environment, lightweight KNN optimization algorithm machine learning is adopted. First, double dimensionality reduction features achieved through information gain rate, discrete with more subfeatures are selected aggregated to further feature dimension actual operation. Secondly, rate used...

10.1155/2021/8000869 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

In recent years, federated learning has received widespread attention as a technology to solve the problem of data islands, and it begun be applied in fields such finance, healthcare, smart cities. The algorithm is systematically explained from three levels. First, defined through definition, architecture, classification learning, comparison with traditional distributed knowledge. Then, based on machine deep current types algorithms are classified, compared, analyzed in-depth. Finally,...

10.1155/2022/8514562 article EN Mathematical Problems in Engineering 2022-04-01

Abstract The oil & gas industry has adopted intelligent completions with Inflow Control Devices (ICDs) extensively to achieve selective production and water control from various zones of a single reservoir. conventional method modify the opening/closing state these ICDs involves coiled tubing (CT) hydraulic shifting tools. This technique, however, proven be inefficient, inaccurate, detrimental environment. A novel approach was devised overcome challenges improve operational efficiency,...

10.2523/iptc-25012-ea article EN International Petroleum Technology Conference 2025-02-17

The significance of community structure in complex networks, such as social, biological, and online has been widely recognized. Detecting communities social media networks typically relies on two sources information: the network’s topological node attributes. Incorporating rich content attribute information poses both flexibility challenges for detection. Traditional approaches either focus mining one source or linearly combining results from sources, which fails to effectively fuse...

10.1142/s0218126624500804 article EN Journal of Circuits Systems and Computers 2023-08-20

The most popular way to deceive online users nowadays is phishing.Consequently, increase cybersecurity, more efficient web page phishing detection mechanisms are needed.In this paper, we propose an approach that rely on websites image and URL deals with the issue of website recognition as a classification challenge.Our model uses webpage URLs images detect attack using convolution neural networks (CNNs) extract important features then classifies them into benign pages.The accuracy rate...

10.5121/ijcnc.2020.12503 article EN International journal of Computer Networks & Communications 2020-09-30

This research paper focus on a Machine learning model named Face Lock Algorithm with Gender and Age Classifier which will detect the face of user using classifier called Haar Cascade Frontal also provide an extra layer security to mobile applications websites by unlocking them only when algorithm confirms person as actual user. For this, it first take training data input from camera device, then train based according training. Training be done LBPH (Local Binary Pattern Histogram) uses...

10.1080/03772063.2021.1982418 article EN IETE Journal of Research 2021-10-19

The digital news preservation and management of low-resource languages are challenging tasks, especially in vast collections. Unique identification individual objects is possible with well-defined attributes to assure efficient management, such as access, retrieval, preservation, usability, transformability. metadata element set required maximize the available related objects. To create a comprehensive that contains all necessary data about It more complicated when archive articles from...

10.1177/21582440231201368 article EN cc-by SAGE Open 2023-10-01

Contrast enhancement techniques serve the purpose of diminishing image noise and increasing contrast relevant structures. In context medical images, where differentiation between normal abnormal tissues can be quite subtle, precise interpretation might become challenging when levels are relatively elevated. The Fast Local Laplacian Filter (FLLF) is proposed to deliver a more present clearer observer; this achieved through reduction levels. study, FLLF strengthened images its unique...

10.3390/a16120531 article EN cc-by Algorithms 2023-11-21

The modern perspective to deal with bulky data generations schemes of latest technologies in terms dimensionality and sample size extract meaningful information also support automated knowledge discovery pattern recognition process form datasets a lot Data Mining (DM) Machine Learning (ML) techniques developed. In each dataset features are the key factors for machine learning task. research mindset classification algorithms focused get high accuracy by taking account prior less focus on...

10.1109/access.2022.3152963 article EN cc-by IEEE Access 2022-01-01

Abstract Human centric computing is a technique that gaining more attention nowadays and integrates innovative processing methods for analyzing extensive data collection. intelligent systems focus on handling the interactions between customers, companies, communities of to represent social institutional concepts effectively. However, this interaction companies customers will lead various privacy challenges in human systems. This paper briefly studies cyber‐physical In parallel, article...

10.1002/ett.4850 article EN Transactions on Emerging Telecommunications Technologies 2023-08-29

Multi-focus image fusion produces a unification of multiple images having different areas in focus, which contain necessary and detailed information the individual image. The paper is proposing novel idea pre-processing step environment sharpening techniques applied before step. This article multi-focus hybrid for fusion, based on enhancement, helps to identify key features minor details then performed enhanced images. In we introduced new method that combines Laplacian Filter (LF) with...

10.14569/ijacsa.2020.0110555 article EN International Journal of Advanced Computer Science and Applications 2020-01-01

Cloud computing gives beneficial services to share large scale of information, storage resources, and knowledge for research. users deploy their own applications related data on a pay-as-you-go basis. virtual machines (VMs) usually host these data-intensive applications. The performance often depends workload types I/O or computation, volume, CPU attributes nodes CNs, the VMs number same CN network status between SNs CNs. Therefore, application jobs in have different completion times based...

10.1109/icbdsc.2016.7460362 article EN 2016-03-01

Retrieving a specific digital information object from multi-lingual huge and evolving news archives is challenging complicated against user query. The processing becomes more difficult to understand analyze when low-resourced morphologically complex languages like Urdu Arabic scripts are included in the archive. Computing similarity query among articles collections may be inaccurate time-consuming at run time. This paper introduces Similarity Measure based on Transliteration Words (SMTW)...

10.3390/app13074435 article EN cc-by Applied Sciences 2023-03-31

The developed world has focused on Web preservation compared to the developing world, especially news for future generations. However, published online is volatile because of constant changes in technologies used disseminate information and formats publication. News became more complicated challenging when archive began contain articles from low-resourced morphologically complex languages like Urdu Arabic, along with English articles. digital story framework enriched eighteen sources Urdu,...

10.3390/app13158566 article EN cc-by Applied Sciences 2023-07-25

Abstract Due to the realization of 5G technology, Internet things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure transfer (DT) and linear scaling Rock Hyraxes swarm‐based convolutional neural network (LSRHS‐CNN) are proposed here address those issues....

10.1049/cmu2.12336 article EN cc-by-nc-nd IET Communications 2022-01-18

The Underwater Internet of Things (UIoTs), as a specific genre (IoTs), represent networked devices that exploit sensors and objects (deployed underwater) to collect process oceanic data. data represents multitude valuable information exploratory artefacts, including but not limited underwater temperatures, acidity, types classification marine life, quality sea water, minerals. When applied context-sensitive collected from UIoTs, analytics can provide insights into the stakeholders (e.g....

10.1080/03772063.2022.2027286 article EN IETE Journal of Research 2022-02-14

The formulation of connectivity needs for connected visual world programmes, as well a method disseminating specifications from the consumer layer to communications still unresolved academic problems. We offer paradigm interconnectivity, which reflects an infrastructure perspective on dispersed simulated system, complementary existing study. concept goes deeper into capability requirements shared virtualized entities that vary result user activities. main aim article is discuss information...

10.1080/03772063.2021.2012280 article EN IETE Journal of Research 2022-02-18

10.1007/s13198-022-01729-8 article EN International Journal of Systems Assurance Engineering and Management 2022-07-24

In this study, we introduced a preprocessing novel transformation approach for multifocus image fusion. the image, fusion has generated high informative by merging two source images with different areas or objects in focus. Acutely means sharpening performed on before applying techniques. paper, along concept, new technique, Laplacian filter + discrete Fourier transform (LF DFT), is also proposed. The LF used to recognize meaningful discontinuities an image. DFT recognizes that rapid change...

10.1155/2021/7000991 article EN Journal of Healthcare Engineering 2021-12-11

Movie reviews reflect how the public feels about a movie they have watched. However, because many are posted on various websites, it is practically impossible to read each one. Summarizing all can help people make informed decisions without reading through of them. Previous studies used different machine learning and deep techniques for sentiment analysis (SA), but few combined comprehensive hyperparameter tuning novel datasets better performance. This paper presents an SA approach using...

10.21833/ijaas.2024.08.016 article EN International Journal of ADVANCED AND APPLIED SCIENCES 2024-08-01
Coming Soon ...