Faiz Abdullah Alotaibi

ORCID: 0009-0007-1908-4928
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Technology Adoption and User Behaviour
  • AI in cancer detection
  • Knowledge Management and Sharing
  • Internet Traffic Analysis and Secure E-voting
  • COVID-19 diagnosis using AI
  • Context-Aware Activity Recognition Systems
  • Misinformation and Its Impacts
  • Advanced Authentication Protocols Security
  • Traffic Prediction and Management Techniques
  • Industrial Vision Systems and Defect Detection
  • Library Science and Information Literacy
  • Brain Tumor Detection and Classification
  • AI in Service Interactions
  • Digital Marketing and Social Media
  • IoT and Edge/Fog Computing
  • Emotion and Mood Recognition
  • Coastal wetland ecosystem dynamics
  • Distributed Control Multi-Agent Systems
  • Automated Road and Building Extraction
  • PAPR reduction in OFDM
  • Advanced Technologies in Various Fields
  • RFID technology advancements

King Saud University
2022-2025

King Salman Center for Disability Research
2023

Manchester Metropolitan University
2020

Load forecasting in Smart Grids (SG) is a major module of current energy management systems, that play vital role optimizing resource allocation, improving grid stability, and assisting the combination renewable sources (RES). It contains predictive electricity consumption forms over certain time intervals. Forecasting remains stimulating task as load data has exhibited changing patterns because factors such weather change shifts usage behaviour. The beginning advanced analytics machine...

10.1109/access.2024.3358182 article EN cc-by-nc-nd IEEE Access 2024-01-01

Network security is essential to our daily communications and networks. Cybersecurity researchers initiate the significance of emerging proficient network intrusion detection systems (IDS) for providing secure While attackers endure progress novel kinds attacks sizes develop, necessity effectual IDS becomes significant. Additionally, aims offer confidentiality, integrity, availability data communicated in networked computers by avoiding illegal access network. Several studies executed...

10.1016/j.aej.2023.11.078 article EN cc-by-nc-nd Alexandria Engineering Journal 2023-12-07

Network security is a critical aspect of information technology, targeting to safeguard the confidentiality, integrity, and availability data transmitted across computer networks. Intrusion Detection Systems (IDS) plays an essential role, serving as vigilant sentinels against illegal access, malicious actions, potential threats. IDS operates on analysing network or system activities, analyzing patterns, detecting anomalies that may specify breaches. The enhancement via integration feature...

10.1016/j.aej.2024.01.073 article EN cc-by-nc-nd Alexandria Engineering Journal 2024-02-06

Facial emotion recognition (FER) stands as a pivotal artificial intelligence (AI)-driven technology that exploits the capabilities of computer-vision techniques for decoding and comprehending emotional expressions displayed on human faces. With use machine-learning (ML) models, specifically deep neural networks (DNN), FER empowers automatic detection classification broad spectrum emotions, encompassing surprise, happiness, sadness, anger, more. Challenges in include handling variations...

10.3390/electronics12224608 article EN Electronics 2023-11-11

Malicious user recognition for spectrum sensing in Cognitive Radio Networks (CRNs) is a serious safety feature to safeguard effective and trustworthy process of these systems. Spectrum permits CRNs identify employ accessible bands. As well as it available prospective interference mischievous actions. To preserve network integrity, malicious consumers vital. Deep learning (DL) based consumer classification powers advanced neural frameworks recognize flag possible threats inside network. By...

10.1109/access.2024.3367993 article EN cc-by-nc-nd IEEE Access 2024-01-01

Collective intelligence systems like Chat Generative Pre-Trained Transformer (ChatGPT) have emerged. They brought both promise and peril to cybersecurity privacy protection. This study introduces novel approaches harness the power of artificial (AI) big data analytics enhance security in this new era. Contributions could explore topics such as: leveraging natural language processing (NLP) ChatGPT-like strengthen information security; evaluating privacy-enhancing technologies maximize utility...

10.7717/peerj-cs.2264 article EN cc-by PeerJ Computer Science 2024-09-20

Lung and colon cancers are deadly diseases that can develop concurrently in organs undesirably affect human life some special cases. The detection of these from histopathological images poses a complex challenge medical diagnostics. Advanced image processing techniques, including deep learning algorithms, offer solution by analyzing intricate patterns structures slides. integration artificial intelligence analysis not only improves the proficiency cancer but also holds potential to increase...

10.1109/access.2023.3346894 article EN cc-by-nc-nd IEEE Access 2023-12-25

ABSTRACTChatGPT is becoming more and popular in the healthcare sector as a way to deliver quick easy access health information. However, little known about how participants view ChatGPT when seeking To find participants' perspectives on using for information pinpoint areas where ChatGPT's functionality design should be improved. Sixteen individuals who had used look underwent semi-structured interviews. Themes were found via thematic data analysis. was use handy getting They did, however,...

10.1080/0194262x.2023.2250835 article EN Science & Technology Libraries 2023-09-08

Content-based image retrieval (CBIR) in the healthcare field is an advanced technology that leverages visual or content features of medical images to retrieve similar from vast data. This has significant applications healthcare, including diagnosis, research, and treatment planning. It a diagnostic tool enhances explainability computer-aided diagnoses (CAD) systems provides decision-making support for professionals. A conventional way CBIR learning distance metric by converting into feature...

10.1109/access.2024.3367430 article EN cc-by-nc-nd IEEE Access 2024-01-01

Google Scholar has become an important search platform for students in higher education, and, as such, can be regarded a competitor to university libraries. Previous research explored students’ intention use (GS) and University Digital Libraries (UDLs), but there is lack of comparative studies that explore preferences between these two platforms. Therefore, this study seeks the behaviour select group users, international postgraduate more specifically compares factors influence their (UDLs)....

10.1177/09610006221111197 article EN cc-by-nc Journal of Librarianship and Information Science 2022-07-13

In recent research, fake news detection in social networking using Machine Learning (ML) and Deep (DL) models has gained immense attention. The current research article presents the Bio-inspired Artificial Intelligence with Natural Language Processing Deceptive Content Detection (BAINLP-DCD) technique for networking. goal of proposed BAINLP-DCD is to detect presence deceptive or content on media. order accomplish this, algorithm applies data preprocessing transform input dataset into a...

10.3390/biomimetics8060449 article EN cc-by Biomimetics 2023-09-23

The IPv4 address architecture has been declared ended finally due to the fast growth of Internet Things (IoT). IPv6 is becoming a next-generation communication protocol and provides all requirements that industry needs. A smart home an emerging technological revolution in which IoT-based physical objects are linked make human life more comfortable. There several resource-constrained devices interconnecting with 6LoWPAN control remotely. channels used by cellular vulnerable increase security...

10.1109/access.2023.3336763 article EN cc-by IEEE Access 2023-01-01

Gastrointestinal (GI) cancer comprises esophageal, gastric, colon and rectal tumors. The diagnosis of GI often relies on medical imaging modalities namely magnetic resonance (MRI), histopathological slides, endoscopy, computed tomography (CT) scans. This provides particular details about the size, location, characteristics high death rate for patients shows that it is possible to increase analysis a more personalized therapy strategy which leads improved prognosis few side effects although...

10.1109/access.2024.3351773 article EN cc-by-nc-nd IEEE Access 2024-01-01

The effective usage of energy becomes crucial for the successful deployment and operation unmanned aerial vehicles (UAVs) in different applications, such as surveillance, transportation, communication networks. increasing demand UAVs industries agriculture, logistics, emergency response has led to development more sophisticated advanced UAVs. However, limited onboard resource poses a major problem their long-term endurance. In addition, artificial intelligence (AI) machine learning (ML)...

10.1109/access.2024.3383031 article EN cc-by-nc-nd IEEE Access 2024-01-01

Abstract Signal detection in orthogonal time frequency space modulation is one of the critical aspects for enhancing throughput beyond fifth-generation framework, especially challenging environments characterized by high mobility and multipath propagation. In this work, we proposed a hybrid algorithm combining zero-forcing equalization (ZFE) minimum square error (MMSE), also known as ZFE–MMSE, with Rician Rayleigh channels 64 256 quadrature amplitude modulation. The combination ZFE MMSE...

10.1515/eng-2024-0008 article EN cc-by Open Engineering 2024-01-01

Poetry is a significant aspect of any language. Many cultures and the history nations are recognized in poems. Compared to prose, each poem has rhythmic structure that quite different. The language its set lyrical structures for poems, known as meters. Detecting meters Arabic poems complicated lengthy procedure. text must be encrypted using Arudi method classify poem's meter, which requires complex rule-based transformation before another rules classifies Applying deep learning (DL) meter...

10.1145/3676963 article EN ACM Transactions on Asian and Low-Resource Language Information Processing 2024-07-10

Purpose This study examines the use of search engine, Google Scholar, from perspective a specific group, that international postgraduate students. Based on theory task perceived performance and effort expectancy influencing intention to use, further factors system, individual, social organisational, in student context are explored. Design/methodology/approach The questionnaire for measurement 11 was developed related studies e-library data were collected 200 students studying UK. Analysis...

10.1108/ajim-10-2019-0304 article EN Aslib Journal of Information Management 2020-07-03

Wireless Sensor Networks (WSNs) contain several small, autonomous sensor nodes (SNs) able to process, transfer, and wirelessly sense data. These networks find applications in various domains like environmental monitoring, industrial automation, healthcare, surveillance. Node Localization (NL) is a major problem WSNs, aiming define the geographical positions of sensors correctly. Accurate localization essential for distinct WSN comprising target tracking, data routing. Therefore, this paper...

10.3390/s23218699 article EN cc-by Sensors 2023-10-25
Coming Soon ...