Usama A. Badawi

ORCID: 0000-0003-2649-702X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Distributed systems and fault tolerance
  • Water Quality Monitoring Technologies
  • Identification and Quantification in Food
  • Online and Blended Learning
  • Context-Aware Activity Recognition Systems
  • IoT and Edge/Fog Computing
  • Distributed and Parallel Computing Systems
  • Technology Adoption and User Behaviour
  • E-Learning and COVID-19
  • Supply Chain Resilience and Risk Management
  • Remote-Sensing Image Classification
  • Information Retrieval and Data Mining
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Visual Attention and Saliency Detection
  • Image Processing and 3D Reconstruction
  • Outsourcing and Supply Chain Management
  • Internet of Things and AI
  • Air Traffic Management and Optimization
  • Organizational and Employee Performance
  • Metaheuristic Optimization Algorithms Research
  • Advanced Statistical Methods and Models
  • COVID-19 epidemiological studies
  • Medical Image Segmentation Techniques

Imam Abdulrahman Bin Faisal University
2017-2023

Cairo University
2006-2018

Salam University
2016

Following the outbreak of novel coronavirus (COVID-19) in China late December 2019, more than 217 countries became almost immediately infected resulting pandemic. Consequently, many them decided to close their educational institutions as a way preventing spread this virus. For them, though, closure made unable deliver learning materials students owing inability provide right technology for purpose. To assist with digitalizing during time, study reviews most common technologies used delivery...

10.1016/j.imu.2021.100632 article EN cc-by Informatics in Medicine Unlocked 2021-01-01

Purpose: The study investigates the role of institutional pressures and environmental orientation in implementing green supply chain practices (GSCPs) firms. aim is to construct a comprehensive model based on theory (InT) resource-based view (RBV) that will help effect GSCPs performance-based outcomes industrial Study Design: adopted cross-sectional design, data were collected from 351 management professionals different manufacturing companies Saudi Arabia. Furthermore, questionnaire was...

10.3390/su14031523 article EN Sustainability 2022-01-28

Image recognition process could be plagued by many problems including noise, overlap, distortion, errors in the outcomes of segmentation, and impediment objects within image. Based on feature selection combination theory between major extracted features, this study attempts to establish a system that recognize fish object image utilizing texture, anchor points, statistical measurements. Then, generic classification is executed with application an innovative evaluation through meta-heuristic...

10.11591/ijece.v9i6.pp5192-5204 article EN International Journal of Electrical and Computer Engineering (IJECE) 2019-10-29

In the last few years, use of educational technology, particularly concept Learning Management System (LMS), has increased rapidly. With this fast development, question arises as how to manage LMS obtain success and efficiency in online courses. One important factors that have received many citations literature studies (and a special position information system research) is user satisfaction. It crucial factor can predict or failure any LMS. relation, research examined affect satisfaction...

10.3844/jcssp.2018.453.465 article EN cc-by Journal of Computer Science 2018-04-01

Aircraft turnaround operations are the activities conducted to prepare an inbound aircraft at airport for a following outbound flight that is scheduled same aircraft. The of include both and exchanges passengers, crew, catering services, cargo baggage handling. Hence, appears importance up on all done during stage deliver true picture airline operation control centre (OCC) automatically. This enables OCC take quick proper decisions regarding how face any obstacles punctuality, determine...

10.1080/09537287.2012.655800 article EN Production Planning & Control 2012-02-07

The conventional Hotelling’s charts are evidently inefficient as it has resulted in disorganized data with outliers, and therefore, this study proposed the application of a novel alternative robust approach. For scale estimator , approach encompasses use Hodges-Lehmann vector covariance matrix place arithmetic mean matrix, respectively. chart was examined performance wise. purpose, simulated bivariate bootstrap datasets were used two conditions, namely independent variables dependent...

10.11591/ijece.v9i6.pp4721-4727 article EN International Journal of Electrical and Computer Engineering (IJECE) 2019-10-29

JavaSpaces service is a Distributed Shared Memory (DSM) implementation. It has been introduced by Sun Microsystems as of the Jini system. Currently, support client side fault tolerance. enables both transaction and mobile coordination mechanisms for such purpose. The application failures could be detected recovered. However, server may occur during runtime. Therefore, it important to supply with mechanism that handles type dynamically. On other hand, An example system supports tolerance over...

10.3844/jcssp.2014.671.679 article EN cc-by Journal of Computer Science 2014-04-01

<span>The field of wild fish classification faces many challenges such as the amount training data, pose variation and uncontrolled environmental settings. This research work introduces a hybrid genetic algorithm (GA) that integrates simulated annealing (SA) with back-propagation (GSB classifier) to make process. The is based on determining suitable set extracted features using color signature texture well shape features. Four main classes images have been classified, namely, food,...

10.11591/ijece.v12i3.pp2488-2500 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2022-03-14

The predictive directional greedy routing (PDGR) protocol is widely utilized in highway settings within vehicular ad hoc networks (VANETs). However, PDGR encounters a notable challenge when packets lack suitable vehicle directionally, leading to network disconnections. This triggers shift carry and forward recovery mode due outdated neighbor information the vehicle's table (VNT). To address this, our study proposes an improved fuzzy logic-based (IPDGR). novel algorithm dynamically adjusts...

10.11591/ijece.v15i1.pp493-504 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2024-11-18

<span lang="EN-US">Susceptible exposed infectious recovered (SEIR) is among the epidemiological models used in forecasting spread of disease large populations. SEIR a fitting model for coronavirus (COVID-19) prediction. Somehow, its original form, could not measure impact lockdowns. So, equations system utilized this study, variable was included to evaluate varying levels social distance on transmission COVID-19. Additionally, we applied artificial intelligence utilizing deep neural...

10.11591/ijece.v13i4.pp4761-4776 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2023-04-03

Diffie-Hellman key agreement protocol is the first and most famous protocol, but it has many flaws drawbacks. Therefore, this paper proposes a new two-pass authenticated (AK) extent its capabilities to support confirmation as three-pass with (AKC). The present protocols are based on problem working over elliptic curve group in setting of asymmetric techniques.

10.1109/mwscas.2003.1562329 article EN 2006-01-05

In this report, we present an encryption algorithm that can be used for hardware-implemented applications to secure data communications, is based on hiding a number of bits from plain text message into random vector bits, the locations hidden are determined by key known sender and receiver, call hybrid (HHEA). The name demonstrates two basic operations algorithm, these include inserting part plaintext cover hide it recognition, is, there no conventional ciphered text, just in bit string,...

10.1109/mwscas.2003.1562321 article EN 2006-01-05

The aim of this study is to design, build and validate a scale for the measurement Saudi industrial Organizations' SC Management Practices (SCMP), also evaluate its efficiency at various SCM measurements. analysis identified 20 constructs (SCMPs) based on comprehensive literature review; namely Strategic Partnership Suppliers (SPS), Customer Relationship (CR), Information Sharing (IS), Quality (IQ), Postponement (PST), Agreed Vision Goals (AVG), Risks Rewards (SRR), Lean Manufacturing (LM),...

10.5267/j.uscm.2021.10.010 article EN Uncertain Supply Chain Management 2021-11-08

Various feature selection algorithms are usually employed to improve classification models’ overall performance. Optimization typically accompany such select the optimal set of features. Among most currently attractive trends within optimization hybrid metaheuristics. The present paper presents two Stages Local Search models for based on WOA (Whale Algorithm) and Great Deluge (GD). GD Algorithm is integrated with algorithm exploitation by identifying promising regions during search. Another...

10.32604/cmc.2023.033509 article EN Computers, materials & continua/Computers, materials & continua (Print) 2023-01-01

<p><span lang="EN-US">In this digital age, the widespread use of images and availability image editors have made credibility controversial. To confirm many forgery detection types are arises, copy-move is consisting transforming any by duplicating a part image, to add or hide existing objects. Several methods been proposed in literature detect forgery, these key point-based block-based find duplicated areas. However, drawback ability handle smooth region. In addition,...

10.11591/ijece.v13i2.pp2363-2374 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2022-12-11

distributed systems, that are based on constructing a network of heterogeneous computers, suffer from the problem failing components during system run time.In case failure, applications must be restarted scratch.The main goal this research is to add dynamic failure recovery technique JavaSpaces server.So, client continues its jobs while failures occur in system.Also, new evaluated by analyzing and testing.

10.5120/ijca2016908243 article EN International Journal of Computer Applications 2016-04-15

Elderly chronic diseases are the main cause of death in world, accounting 60% all death. Because elderly with at early stages has no observed symptoms, and then symptoms starts to appear, it is critical observe as possible avoid any complication. This paper presents an expert system for Health Care (EHC) home tailored specific needs Elderly. The proposed EHC aims develop integrated multidisciplinary method employ communication technologies information covering real health people, mainly...

10.48550/arxiv.1908.03518 preprint EN public-domain arXiv (Cornell University) 2019-01-01
Coming Soon ...