- Service-Oriented Architecture and Web Services
- Software Engineering Research
- Software Testing and Debugging Techniques
- Software System Performance and Reliability
- Advanced Software Engineering Methodologies
- Software Reliability and Analysis Research
- Natural Language Processing Techniques
- Energy Efficient Wireless Sensor Networks
- Scientific Computing and Data Management
- Metaheuristic Optimization Algorithms Research
- Business Process Modeling and Analysis
- Topic Modeling
- Second Language Acquisition and Learning
- Software Engineering Techniques and Practices
- Distributed and Parallel Computing Systems
- Advanced Computational Techniques and Applications
- Information Technology Governance and Strategy
- Traffic Prediction and Management Techniques
- Semantic Web and Ontologies
- Model-Driven Software Engineering Techniques
- Evolutionary Algorithms and Applications
- Advanced Data Storage Technologies
- Context-Aware Activity Recognition Systems
- Teaching and Learning Programming
- Traffic and Road Safety
Umm al-Qura University
2014-2024
Universiti Malaysia Pahang Al-Sultan Abdullah
2021
King Abdulaziz University
2019
Ontology has been increasingly implemented to facilitate the Internet of Things (IoT) activities, such as tracking and information discovery, storage, exchange, object addressing. However, a complete understanding using ontology in IoT mechanism remains lacking. The main goal this research is recognize use process investigate services activities. A systematic literature review (SLR) conducted predefined protocols analyze about usage ontologies IoT. following conclusions are obtained from...
Sophisticated Intrusion attacks against various types of networks are ever increasing today with the exploitation modern technologies which often severely affect wireless networks. In order to improve effectiveness intrusion detection systems (IDSs), data analysis methods such as mining and classification integrated IDSs. Though, numerous studies have contributed in ways utilization for IDS, effective solution depends on network setting where IDS is deployed. this paper, we propose an...
Different applications require different level of security where the scarce resource plays effective role.In order to protect private medical data in internet things (IoT) field, search for optimal encryption algorithm is a must.Electronic sensors are used collect from patient's body acquiring its transmission healthcare system securely.It essential ensure trust and secrecy starting point-sensors throughout treatment prevent any unauthorized access or unneeded interruption.Thus, beginning...
The development of science and technology has led to the era Industry 4.0. core concept is combination "material informationization". In supply chain manufacturing process, "material" physical entity world realized by data, identity, intelligence, information. 4.0 a disruptive transformation upgrade intelligent industrialization based on Internet-of-Things Big Data in traditional industrialization. goal "maximizing production efficiency, minimizing costs, maximizing individual needs human...
Abstract Writing correct E nglish sentences can be challenging. Furthermore, writing formulaic sequences especially difficult because accepted combinations do not follow clear rules governing which words appear together in a sequence. One solution is to provide examples of usage accompanied by statistical feedback from web‐based applications for learners emulate. The goal the study was investigate whether such dedicated program that provides instant word and detailed results who used these...
Due to massive increase in road vehicles, the rate of traffic accidents increases rapidly. These cause injuries, disabilities and may even result loss lives. To analyze accident data, one needs understand formalize dataset. Mostly, this data is stored relational databases or raw text format. This paper proposes a framework store big platform (Casandra). will enable fast accurate analyses technique that use platforms. The applying deep learning techniques build prediction classification...
Road safety researchers working on road accident data have witnessed success in traffic accidents analysis through the application analytic techniques, though, little progress was made into prediction of injury. This paper applies advanced analytics methods to predict injury severity levels and evaluates their performance. The study uses predictive modelling techniques identify risk key factors that contributes severity. publicly available from UK department transport covers period 2005...
Abstract This paper presents the data description of African buffalo optimization algorithm (ABO). ABO is a recently-designed that inspired by migrant behaviour buffalos in vast landscape. Organizing their large herds could be over thousand using just two principal sounds, /maaa/ and /waaa/ calls present good foundation for development an algorithm. Since elaborate descriptions manual workings algorithms are rare literature, this aims at solving problem, hence it our main contribution. It...
This paper describes the new t-way strategy based Late Acceptance Hill Climbing algorithm, called LAHC, for constraints test generation.Unlike earlier competing work, LAHC does not require significant tuning in order to have it working.In fact, merely requires minor adjustment of common controlling parameters involving iteration and population size depending on given system configuration.Our benchmarking results been promising as gives competitive most configurations considered.
Many organizations nowadays own a number of legacy software systems and maintain them functional to fulfill their daily business operations. However, cannot always accommodate newly emerging needs, thus might negatively impact organization's shares in the market. So, CEOs need recognize limitation identify best action for dealing with these considering possible options at hand. One solution is replace entire system brand new off-the-shelf systems. Equally, improving architecture can be valid...
Emperor Penguin Optimizer (EPO) is a recently developed population-based meta-heuristic algorithm that simulates the huddling behavior of emperor penguins. Mixed results have been observed on performance EPO in solving general optimization problems. Within EPO, two parameters need to be tuned (namely f and l) ensure good balance between exploration (i.e., roaming unknown locations) exploitation manipulating current known best). Since search contour varies depending problem, tuning <italic...
Developing software systems according to the Component-based Software Development (CBSD) model has proven be one of prominent development approaches nowadays. However, integrating components build a complete working system always been considered as an obstacle that requires substantial effort and may considerably delay process. The lack effective characterization component interfaces only focus on functional characteristics ignore architectural is main cause this difficulty. Therefore, work...
With the advancement of human life, there is big increase in chronic diseases especially heart diseases. This due to environmental pollution, lack exercise, eating habits and closed environments. We propose a proactive health monitoring system for cardiac patients. consists electronic bands wear by patients collect real-time status an e-health process collected data. The complete data framework that will be develop solve major healthcare problems. provide measure all suffering from like...
Enterprise organizations require flexible software systems that can handle emerging market needs from time to time, chiefly ensure the organization has a competitive edge in market. On other hand, several still possess legacy systems, which have definite functionalities but may limit their development progress comply with e-business needs. Off-theshelf might be one possible option if decision for replacement is made. Equally, improving architecture of system valid consider as well. The on...
Large amounts of data have been produced at a rapid rate since the invention computers. This condition is key motivation for up-to-date and forthcoming research frontiers. Replication one mechanisms managing data, it improves accessibility reliability in distributed database environment. In recent years, amount various grows rapidly with widely available low-cost technology. Although we packed still lacked knowledge. Nevertheless, if impractical used replication, this will cause waste...
Software development of sensor nodes in Wireless Sensor Network (WSN) is mostly done an ad-hoc manner. There no standard framework available yet that formalizes and engineers the source code resulting a long process for WSN applications might be hard to manage. This paper establishes can utilized systematically automate node construction. It also sheds some light on proposed system facilitates developing using our best practices software engineering field. The main objective this work...
Knowledge management in a structured system is complicated task that requires common, standardized methods are acceptable to all actors system. Ontology, this regard, primary element and plays central role knowledge management, interoperability between various departments, better decision making. The ontology construction for systems comprises logical structural complications. Researchers have already proposed variety of domain schemes. However, these schemes do not involve some important...
An international association advancing the multidisciplinary study of informing systems. Founded in 1998, Informing Science Institute (ISI) is a global community academics shaping future science.
The architectural aspects of software systems are not always explicitly exposed to customers when a product is presented them by vendors. Therefore, might be put at major risk if new emerging business needs come light that require modification some the core processes within their organizations. So they need replace existing or re-architect old ones comply with standards. This paper describes proposed framework helps organizations build comprehensive view system architecture prior dealing...
Current machine translators have reached an unprecedented level of sophistication in dealing with not only isolated words, but also longer sentences and paragraphs. Despite the advances achieved this field, several challenges remain to be resolved for translation (MT) on par professional human translation, including quality grammar context accuracy, pragmatics, relevance, choice vocabulary ability translate large files effectively based list's criteria. Another extremely problematic area...
Many Geographic Information Systems (GIS) are currently built according to the N-Tier architectural style. Despite advantages of this style in terms simplicity for GIS business domain, it lacks many capabilities related several key characteristics that might affect reusability and extensibility systems. Service-oriented architecture (SOA), on other hand, can better serve continual changing nature requirements by facilitating faster more reliable implementation requirements. This paper...