- Usability and User Interface Design
- Interactive and Immersive Displays
- Software Engineering Techniques and Practices
- Mobile Ad Hoc Networks
- Vehicular Ad Hoc Networks (VANETs)
- Online Learning and Analytics
- Opportunistic and Delay-Tolerant Networks
- Electronic Health Records Systems
- Software System Performance and Reliability
- Energy Efficient Wireless Sensor Networks
- Software Engineering Research
- Advanced MIMO Systems Optimization
- Online and Blended Learning
- Innovative Teaching and Learning Methods
- Tactile and Sensory Interactions
- Hand Gesture Recognition Systems
- Anomaly Detection Techniques and Applications
- Advanced Wireless Communication Techniques
- Smart Grid Security and Resilience
- Teaching and Learning Programming
- Network Security and Intrusion Detection
- Context-Aware Activity Recognition Systems
- Imbalanced Data Classification Techniques
- Human Pose and Action Recognition
- Financial Distress and Bankruptcy Prediction
King Abdulaziz University
2016-2025
University of Jeddah
2021
National University of Modern Languages
2017-2020
Mzumbe University
2017
University of Ha'il
2017
University of the Punjab
2017
Laboratoire d'Informatique de Paris-Nord
2017
Qom Islamic Azad University
2017
With the advances in Artificial Intelligence (AI) and increasing volume of online educational data, Deep Learning techniques have played a critical role predicting student performance. Recent developments assisted instructors determining strengths weaknesses achievement. This understanding will benefit from adopting necessary interventions to assist students improving their performance, helping at-risk failure students, preventing dropout rates. The review analyzed 46 studies between 2019...
The recent pandemic has raised significant challenges worldwide. In higher education, the necessity to adopt efficient strategies sustain education during crisis is mobilizing diverse, complementary, and integrative action in response. this research article, we rise challenge of designing implementing a transparent strategy for social media awareness at King Abdulaziz University (KAU). We introduce framework impact, termed KAU Pandemic Framework. This includes factors with most important...
In Urdu, part of speech (POS) tagging is a challenging task as it both inflectionally and derivationally rich morphological language. Verbs are generally conceived highly inflected object in Urdu comparatively to nouns. POS used preliminary linguistic text analysis diverse natural language processing domains such processing, information extraction, machine translation, others. It that first identifies appropriate syntactic categories for each word running second assigns the predicted tag all...
Uplink and Downlink channel estimation in massive Multiple Input Output (MIMO) systems is an intricate issue because of the increasing matrix dimensions. The feedback overhead using traditional codebook schemes very large, which consumes more bandwidth decreases overall system efficiency. purpose this paper to decrease by taking advantage sparse attributes also optimize Energy Efficiency (EE) system. To cope with issue, we propose a novel approach Compressed-Sensing (CS), Block...
In the field of Cyber Threat Intelligence (CTI), scarcity high-quality and labelled datasets that include Indicators Compromise (IoCs) impact design implementation robust predictive models are capable classifying IoCs in online communication, specifically social media contexts where users potentially highly exposed to cyber threats. Thus, generation synthetic can be utilized fill this gap develop effective CTI systems. Therefore, study aims fine-tune OpenAI’s Large Language Model (LLM),...
Realization of navigation in virtual environments remains a challenge as it involves complex operating conditions. Decomposition such complexity is attainable by fusion sensors and machine learning techniques. Identifying the right combination sensory information appropriate technique vital ingredient for translating physical actions to movements. The contributions our work include: (i) Synchronization movements using suitable multiple sensor units, (ii) selection significant features an...
The use of Multi-touch interfaces for collaborative learning has received significant attention. Their ability to synchronously accommodate multiple users is an advantage in co-located design tasks. This paper explores the interface’s potential Unified Modeling Language diagramming by comparing it a PC-based tool, looking at Collaborative Learning Skills and amount physical interactions both conditions. results show that even though participants talked more condition, table increased...
Breast cancer (BC) has affected many women around the world. To accomplish classification and detection of BC, several computer-aided diagnosis (CAD) systems have been introduced for analysis mammogram images. This is because by human radiologist a complex time-consuming task. Although CAD are used to primarily analyze disease offer best therapy, it still essential enhance present integrating novel approaches technologies in order provide explicit performances. Presently, deep learning (DL)...
This paper discusses the roles of communication and coordination (C&C) in agile teams.C&C are important activities that a project manager has to deal with tactically during development software projects avoid consequences.Their importance further increases especially case distributed (DSD).C&C considered as drivers accomplish successfully within budget schedule.There several issues associated poor C&C those can lead fail such deficit, delay delivery, conflicts among team members, unclear...
In this paper, we propose a random access protocol for vehicular-to-infrastructure communications. We consider the case where an unmanned aerial vehicle (UAV) provides assistance to roadside unit enhance system throughput. traditional carrier sense multiple schemes (CSMA), senses channel first and it does not transmit data until is free. However, CSMA has been shown be often wasteful of resources includes potentially unbounded delays in dense networks. use capture effect, collisions can...
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave cooperatively in packet routing. To reduce hazards from malicious and enhance security of network, this paper extends an On-Demand Multipath Distance Vector (AOMDV) routing protocol, named as Integrated Incentive Trust-based optimal path identification AOMDV (IIT-AOMDV) for MANET. The proposed IIT-AOMDV protocol integrates Intrusion Detection System (IDS) with Bayesian (BN) based trust payment model. IDS utilises...
Encouraging collaborative software design through the use of multi-touch interfaces has become increasingly important, because such surfaces can accommodate more than one user concurrently, which is particularly useful for design. In this paper, potential using MT-CollabUML application explored. This exploration done by looking at how students' collaboration might be enhanced in Unified Modeling Language (UML) comparing traditional paper-based environment with contemporary table environment.
Multi-touch interfaces facilitate collaborative learning and, thus, represent a promising educational technology. Their ability to synchronously accommodate multiple users is an advantage in co-located design tasks. This paper explores the multi-touch interface's potential Unified Modelling Language (UML) diagramming by comparing it PC-based tool. The results of study demonstrate that use table enables increase equity participation, enhanced collaboration amongst team members, and...
The rapid proliferation of low-power wireless devices enables the industrial users to improve productivity and safety plants as well efficient management system. This can be achieved through significant increase in data collection, remote monitoring, control promoting development Internet Things (IoT) applications. However, environment is typically harsh causing high link quality variations topology changes. used this are also resource constrained terms energy, memory, processing power. In...
The Internet of Things (IoT) is one the emergent technologies with advanced developments in several applications like creating smart environments, enabling Industry 4.0, etc. As IoT devices operate via an inbuilt and limited power supply, effective utilization available energy plays a vital role designing environment. At same time, communication wireless mediums poses security as challenging issue. Recently, intrusion detection systems (IDS) have paved way to detect presence intrusions With...
Fingerprint recognition is best known and generally used as a biometric technology because of their high acceptability, immutability, uniqueness. A fingerprint consists ridges valleys pattern also furrows. These patterns fully develop in the mother's womb remain constant throughout whole lifetime individual. The ridge bifurcation termination are main minutiae features that extracted for identification individuals system. aim this paper to enhance performance systems using classifiers. To...
Abstract In order to solve the problem of traditional gray prediction model (GM) during determination accuracy buildings’ energy savings and its poor fitting data, idea a fractional based on first-order one-variable GM(1,1) is applied. We use GM–backpropagation (GM-BP) neural network optimal establish GM-BP network. Example calculation shows that can improve savings, selecting further decrease error level when using This work has an important guiding role in buildings.
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave cooperatively in packet routing. To reduce hazards from malicious and enhance security of network, this paper extends an On-Demand Multipath Distance Vector (AOMDV) routing protocol, named as Integrated Incentive Trust-based optimal path identification AOMDV (IIT-AOMDV) for MANET. The proposed IIT-AOMDV protocol integrates Intrusion Detection System (IDS) with Bayesian (BN) based trust payment model. IDS utilises...
The use of multi-touch interfaces for collaborative software design has received significant attention. Multi-touch surfaces can accommodate more than one user synchronously which is particularly useful tasks with open-ended nature. In this paper, we explore the potential using technology Unified Modeling Language (UML) by comparing it PC-based design. Results show that table enhanced collaboration amongst team members and increased shared contribution.
Developing large-scale exams for a massive number of preparatory year students by small designated committee exam developers is common practice in colleges and universities around the world. However, adopting this approach, some higher institutions might be confronted with obstacles such as unavailability skilful proper resources. To address issue, we proposed CrowdyQ, virtual crowdsourcing platform, to investigate impact involving large same-subject university instructors creation...