- Cloud Computing and Resource Management
- Distributed systems and fault tolerance
- Water Quality Monitoring Technologies
- Identification and Quantification in Food
- Online and Blended Learning
- Context-Aware Activity Recognition Systems
- IoT and Edge/Fog Computing
- Distributed and Parallel Computing Systems
- Technology Adoption and User Behaviour
- E-Learning and COVID-19
- Supply Chain Resilience and Risk Management
- Remote-Sensing Image Classification
- Information Retrieval and Data Mining
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Visual Attention and Saliency Detection
- Image Processing and 3D Reconstruction
- Outsourcing and Supply Chain Management
- Internet of Things and AI
- Air Traffic Management and Optimization
- Organizational and Employee Performance
- Metaheuristic Optimization Algorithms Research
- Advanced Statistical Methods and Models
- COVID-19 epidemiological studies
- Medical Image Segmentation Techniques
Imam Abdulrahman Bin Faisal University
2017-2023
Cairo University
2006-2018
Salam University
2016
Following the outbreak of novel coronavirus (COVID-19) in China late December 2019, more than 217 countries became almost immediately infected resulting pandemic. Consequently, many them decided to close their educational institutions as a way preventing spread this virus. For them, though, closure made unable deliver learning materials students owing inability provide right technology for purpose. To assist with digitalizing during time, study reviews most common technologies used delivery...
Purpose: The study investigates the role of institutional pressures and environmental orientation in implementing green supply chain practices (GSCPs) firms. aim is to construct a comprehensive model based on theory (InT) resource-based view (RBV) that will help effect GSCPs performance-based outcomes industrial Study Design: adopted cross-sectional design, data were collected from 351 management professionals different manufacturing companies Saudi Arabia. Furthermore, questionnaire was...
Image recognition process could be plagued by many problems including noise, overlap, distortion, errors in the outcomes of segmentation, and impediment objects within image. Based on feature selection combination theory between major extracted features, this study attempts to establish a system that recognize fish object image utilizing texture, anchor points, statistical measurements. Then, generic classification is executed with application an innovative evaluation through meta-heuristic...
In the last few years, use of educational technology, particularly concept Learning Management System (LMS), has increased rapidly. With this fast development, question arises as how to manage LMS obtain success and efficiency in online courses. One important factors that have received many citations literature studies (and a special position information system research) is user satisfaction. It crucial factor can predict or failure any LMS. relation, research examined affect satisfaction...
Aircraft turnaround operations are the activities conducted to prepare an inbound aircraft at airport for a following outbound flight that is scheduled same aircraft. The of include both and exchanges passengers, crew, catering services, cargo baggage handling. Hence, appears importance up on all done during stage deliver true picture airline operation control centre (OCC) automatically. This enables OCC take quick proper decisions regarding how face any obstacles punctuality, determine...
The conventional Hotelling’s charts are evidently inefficient as it has resulted in disorganized data with outliers, and therefore, this study proposed the application of a novel alternative robust approach. For scale estimator , approach encompasses use Hodges-Lehmann vector covariance matrix place arithmetic mean matrix, respectively. chart was examined performance wise. purpose, simulated bivariate bootstrap datasets were used two conditions, namely independent variables dependent...
JavaSpaces service is a Distributed Shared Memory (DSM) implementation. It has been introduced by Sun Microsystems as of the Jini system. Currently, support client side fault tolerance. enables both transaction and mobile coordination mechanisms for such purpose. The application failures could be detected recovered. However, server may occur during runtime. Therefore, it important to supply with mechanism that handles type dynamically. On other hand, An example system supports tolerance over...
<span>The field of wild fish classification faces many challenges such as the amount training data, pose variation and uncontrolled environmental settings. This research work introduces a hybrid genetic algorithm (GA) that integrates simulated annealing (SA) with back-propagation (GSB classifier) to make process. The is based on determining suitable set extracted features using color signature texture well shape features. Four main classes images have been classified, namely, food,...
The predictive directional greedy routing (PDGR) protocol is widely utilized in highway settings within vehicular ad hoc networks (VANETs). However, PDGR encounters a notable challenge when packets lack suitable vehicle directionally, leading to network disconnections. This triggers shift carry and forward recovery mode due outdated neighbor information the vehicle's table (VNT). To address this, our study proposes an improved fuzzy logic-based (IPDGR). novel algorithm dynamically adjusts...
<span lang="EN-US">Susceptible exposed infectious recovered (SEIR) is among the epidemiological models used in forecasting spread of disease large populations. SEIR a fitting model for coronavirus (COVID-19) prediction. Somehow, its original form, could not measure impact lockdowns. So, equations system utilized this study, variable was included to evaluate varying levels social distance on transmission COVID-19. Additionally, we applied artificial intelligence utilizing deep neural...
Diffie-Hellman key agreement protocol is the first and most famous protocol, but it has many flaws drawbacks. Therefore, this paper proposes a new two-pass authenticated (AK) extent its capabilities to support confirmation as three-pass with (AKC). The present protocols are based on problem working over elliptic curve group in setting of asymmetric techniques.
In this report, we present an encryption algorithm that can be used for hardware-implemented applications to secure data communications, is based on hiding a number of bits from plain text message into random vector bits, the locations hidden are determined by key known sender and receiver, call hybrid (HHEA). The name demonstrates two basic operations algorithm, these include inserting part plaintext cover hide it recognition, is, there no conventional ciphered text, just in bit string,...
The aim of this study is to design, build and validate a scale for the measurement Saudi industrial Organizations' SC Management Practices (SCMP), also evaluate its efficiency at various SCM measurements. analysis identified 20 constructs (SCMPs) based on comprehensive literature review; namely Strategic Partnership Suppliers (SPS), Customer Relationship (CR), Information Sharing (IS), Quality (IQ), Postponement (PST), Agreed Vision Goals (AVG), Risks Rewards (SRR), Lean Manufacturing (LM),...
Various feature selection algorithms are usually employed to improve classification models’ overall performance. Optimization typically accompany such select the optimal set of features. Among most currently attractive trends within optimization hybrid metaheuristics. The present paper presents two Stages Local Search models for based on WOA (Whale Algorithm) and Great Deluge (GD). GD Algorithm is integrated with algorithm exploitation by identifying promising regions during search. Another...
<p><span lang="EN-US">In this digital age, the widespread use of images and availability image editors have made credibility controversial. To confirm many forgery detection types are arises, copy-move is consisting transforming any by duplicating a part image, to add or hide existing objects. Several methods been proposed in literature detect forgery, these key point-based block-based find duplicated areas. However, drawback ability handle smooth region. In addition,...
distributed systems, that are based on constructing a network of heterogeneous computers, suffer from the problem failing components during system run time.In case failure, applications must be restarted scratch.The main goal this research is to add dynamic failure recovery technique JavaSpaces server.So, client continues its jobs while failures occur in system.Also, new evaluated by analyzing and testing.
Elderly chronic diseases are the main cause of death in world, accounting 60% all death. Because elderly with at early stages has no observed symptoms, and then symptoms starts to appear, it is critical observe as possible avoid any complication. This paper presents an expert system for Health Care (EHC) home tailored specific needs Elderly. The proposed EHC aims develop integrated multidisciplinary method employ communication technologies information covering real health people, mainly...