Fadwa Alrowais

ORCID: 0000-0002-8447-198X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Brain Tumor Detection and Classification
  • IoT and Edge/Fog Computing
  • Smart Grid Energy Management
  • Hand Gesture Recognition Systems
  • AI in cancer detection
  • Video Surveillance and Tracking Methods
  • IoT-based Smart Home Systems
  • Functional Brain Connectivity Studies
  • Human Pose and Action Recognition
  • Machine Fault Diagnosis Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Microgrid Control and Optimization
  • Gait Recognition and Analysis
  • Electric Vehicles and Infrastructure
  • Antenna Design and Analysis
  • Generative Adversarial Networks and Image Synthesis
  • Context-Aware Activity Recognition Systems
  • Energy Efficient Wireless Sensor Networks
  • Fire Detection and Safety Systems
  • Fuzzy Logic and Control Systems
  • Digital Imaging for Blood Diseases
  • Face and Expression Recognition

Princess Nourah bint Abdulrahman University
2019-2025

Benha University
2020

Edinburgh Napier University
2020

Yes Technologies (United States)
2020

Gautam Buddha University
2019-2020

University of Southampton
2014

To prolong the function of wireless sensor networks (WSNs), lifetime system has to be increased. WSNs can calculated by using a few generic parameters, such as time until death first node and other parameters according application. Literature indicates that choosing most appropriate cluster head clustering is one successful ways improve lifespan WSN. The drawback protocols based on probabilistic model. Sometimes they select two heads for different clusters which are very close each results...

10.1109/access.2020.2985495 article EN cc-by IEEE Access 2020-01-01

Currently, the amount of Internet Things (IoT) applications is enhanced for processing, analyzing, and managing created big data from smart city. Certain other cities were location-based services, transportation management, urban design, amongst others. There are several challenges under these containing privacy, security, mining, visualization. The blockchain-assisted IoT application (BIoT) offering new computing to secure cities. blockchain a transparent data-sharing decentralized...

10.3390/app12125893 article EN cc-by Applied Sciences 2022-06-09

The application of Internet Things (IoT) has been emerging as a new platform in wireless technologies primarily the field designing electric vehicles. To overcome all issues existing vehicles and for protecting environment, should be introduced by integrating an intellectual device called sensor over body vehicle with less cost. Therefore, this article confers need importance introducing IoT based technology which monitors battery life Since are implemented internet, online monitoring system...

10.3390/en14041072 article EN cc-by Energies 2021-02-18

A planar, microstrip line-fed, quad-port, multiple-input-multiple-output (MIMO) antenna with dual-band rejection features is proposed for ultra-wideband (UWB) applications. The MIMO design consists of four identical octagonal-shaped radiating elements, which are placed orthogonally to each other. property (3.5 GHz and 5.5 corresponding Wi-MAX WLAN bands) was obtained by introducing a hexagonal-shaped complementary split-ring resonator (HCSRR) in the radiators designed antenna. etched on...

10.3390/app10051715 article EN cc-by Applied Sciences 2020-03-02

A compact, low-profile, coplanar waveguide (CPW)-fed quad-port multiple-input-multiple-output (MIMO)/diversity antenna with triple band-notched (Wi-MAX, WLAN, and X-band) characteristics is proposed for super-wideband (SWB) applications. The design contains four similar truncated-semi-elliptical-self-complementary (TSESC) radiating patches, which are excited through tapered CPW feed lines. complementary slot matching the patch introduced in ground plane of truncated semi-elliptical element...

10.3390/s20030624 article EN cc-by Sensors 2020-01-22

Breast cancer is a common cause of female mortality in developing countries. Screening and early diagnosis can play an important role the prevention treatment these cancers. This study proposes ensemble learning-based voting classifier that combines logistic regression stochastic gradient descent with deep convoluted features for accurate detection cancerous patients. Deep are extracted from microscopic fed to classifier. idea provides optimized framework accurately classifies malignant...

10.3390/cancers14236015 article EN Cancers 2022-12-06

Prostate cancer is the main cause of death over globe. Earlier detection and classification highly important to improve patient health. Previous studies utilized statistical machine learning (ML) techniques for prostate detection. However, several challenges that exist in investigation process are existence high dimensionality data less number training samples. Metaheuristic algorithms can be used resolve curse rate artificial intelligence (AI) techniques. With this motivation, article...

10.1155/2022/7364704 article EN cc-by Journal of Healthcare Engineering 2022-03-10

Among the most prominent field in human-computer interface (HCI) is emotion recognition using facial expressions. Posed variations, accessories, and non-uniform illuminations are some of difficulties field. Emotion detection with help traditional methods has shortcoming mutual optimization feature extraction classification. Computer vision (CV) technology improves HCI by visualizing natural world a digital platform like human brain. In CV technique, advances machine learning artificial...

10.1109/access.2023.3264260 article EN cc-by-nc-nd IEEE Access 2023-01-01

Recently, Internet of Things (IoT) devices produces massive quantity data from distinct sources that get transmitted over public networks. Cybersecurity becomes a challenging issue in the IoT environment where existence cyber threats needs to be resolved. The development automated tools for threat detection and classification using machine learning (ML) artificial intelligence (AI) become essential accomplish security environment. It is needed minimize issues related gadgets effectively....

10.32604/csse.2023.030188 article EN cc-by Computer Systems Science and Engineering 2022-08-16

Automated facial emotion recognition (FER) is one of the important fields human-computer interaction (HCI). FER remains challenging due to accessories, non-uniform illumination, pose variation, etc. Emotion detection exploiting conventional algorithms has demerit mutual optimization classification and feature extraction. Artificial intelligence (AI) techniques can be employed identify automatically. Deep learning (DL) driven models have recently allowed for designing an end-to-end process....

10.1109/access.2023.3284457 article EN cc-by-nc-nd IEEE Access 2023-01-01

Artificial intelligence (AI) in music improvisation offers promising new avenues for developing human creativity. The difficulty of writing dynamic, flexible musical compositions real time is discussed this article. We explore using reinforcement learning (RL) techniques to create more interactive and responsive creation systems. Here, the structures train an RL agent navigate complex space possibilities provide improvisations. melodic framework input data initially identified bi-directional...

10.7717/peerj-cs.2265 article EN cc-by PeerJ Computer Science 2025-01-24

In the rapidly evolving landscape of artificial intelligence (AI) and Internet Things (IoT), significance device diagnostics prognostics is paramount for guaranteeing dependable operation upkeep intricate systems. The capacity to precisely diagnose preemptively predict potential failures holds considerably amplify maintenance efficiency, diminish downtime, optimize resource allocation. wealth information offered by telemetry data gathered from IoT devices presents an opportunity...

10.1038/s41598-025-89266-9 article EN cc-by-nc-nd Scientific Reports 2025-03-04

Object detection is a computer vision based technique which used to detect instances of semantic objects particular class in digital images and videos. Crowd density analysis one the commonly utilized applications object detection. Since crowd classification techniques face challenges like non-uniform density, occlusion, inter-scene, intra-scene deviations, convolutional neural network (CNN) models are useful. This paper presents Metaheuristics with Deep Transfer Learning Enabled Intelligent...

10.3390/app12136665 article EN cc-by Applied Sciences 2022-06-30

Nowadays, there are ample amounts of Internet Things (IoT) devices interconnected to the networks, and with technological improvement, cyberattacks security threads, for example, botnets, rapidly evolving emerging high-risk attacks. A botnet is a network compromised that controlled by cyber attackers, frequently employed perform different cyberattacks. Such attack disrupts IoT evolution disrupting services networks devices. Detecting botnets in an environment includes finding abnormal...

10.1109/access.2023.3332690 article EN cc-by-nc-nd IEEE Access 2023-01-01

Among various biometric methods, palm vein authentication has taken significant attention because of its uniqueness, stability and non-intrusiveness. In this paper, we propose a model using convolutional neural networks (CNN), which is the most popular deep learning architecture Bayesian optimization. First foremost, region interest (ROI) extracted as an image filtered by Jerman enhancement filter to enhance gray levels patterns. The proposed CNN allows different numbers layers be added...

10.1109/access.2020.3045424 article EN cc-by IEEE Access 2020-12-17

The Internet of Things (IoT) has gained more popularity in research because its large-scale challenges and implementation. But security was the main concern when witnessing fast development applications size. It a dreary task to independently set systems every IoT gadget upgrade them according newer threats. Additionally, machine learning (ML) techniques optimally use colossal volume data generated by devices. Deep Learning (DL) related were modelled for attack detection IoT. current address...

10.32604/csse.2023.035589 article EN cc-by Computer Systems Science and Engineering 2023-01-01

Effective intelligent fault diagnosis of rotating machinery using its vibrational signals has a considerable influence on certain analysis factors such as the reliability, performance, and productivity variety modern manufacturing machines. Traditional approaches lack generalization schemes add burden extracting features from data-driven cases. On other hand, Deep Learning (DL) studies have reported capabilities higher than expectations researchers' objectives. In this context, paper...

10.1109/access.2021.3071796 article EN cc-by IEEE Access 2021-01-01

Sign language has played a crucial role in the lives of impaired people having hearing and speaking disabilities. They can send messages via hand gesture movement. Arabic Language (ASL) recognition is very difficult task because its high complexity increasing intraclass similarity. may be utilized for communication sentences, letters, or words using diverse signs hands. Such helps to bridge gap between with impairment other also makes it easy express their opinions. Recently, large number...

10.3390/healthcare10091606 article EN Healthcare 2022-08-24

The problem of producing a natural language description an image for describing the visual content has gained more attention in processing (NLP) and computer vision (CV). It can be driven by applications like retrieval or indexing, virtual assistants, understanding, support visually impaired people (VIP). Though VIP uses other senses, touch hearing, recognizing objects events, quality life those persons is lower than standard level. Automatic Image captioning generates captions that will...

10.32604/csse.2023.035529 article EN cc-by Computer Systems Science and Engineering 2023-01-01

Mobile edge computing (MEC) provides effective cloud services and functionality at the device, to improve quality of service (QoS) end users by offloading high computation tasks. Currently, introduction deep learning (DL) hardware technologies paves a method in detecting current traffic status, data offloading, cyberattacks MEC. This study introduces an artificial intelligence with metaheuristic based technique for Secure MEC (AIMDO-SMEC) systems. The proposed AIMDO-SMEC incorporates...

10.32604/cmc.2022.025204 article EN Computers, materials & continua/Computers, materials & continua (Print) 2022-01-01
Coming Soon ...