- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Radiomics and Machine Learning in Medical Imaging
- Technology Adoption and User Behaviour
- AI in cancer detection
- Knowledge Management and Sharing
- Internet Traffic Analysis and Secure E-voting
- COVID-19 diagnosis using AI
- Context-Aware Activity Recognition Systems
- Misinformation and Its Impacts
- Advanced Authentication Protocols Security
- Traffic Prediction and Management Techniques
- Industrial Vision Systems and Defect Detection
- Library Science and Information Literacy
- Brain Tumor Detection and Classification
- AI in Service Interactions
- Digital Marketing and Social Media
- IoT and Edge/Fog Computing
- Emotion and Mood Recognition
- Coastal wetland ecosystem dynamics
- Distributed Control Multi-Agent Systems
- Automated Road and Building Extraction
- PAPR reduction in OFDM
- Advanced Technologies in Various Fields
- RFID technology advancements
King Saud University
2022-2025
King Salman Center for Disability Research
2023
Manchester Metropolitan University
2020
Load forecasting in Smart Grids (SG) is a major module of current energy management systems, that play vital role optimizing resource allocation, improving grid stability, and assisting the combination renewable sources (RES). It contains predictive electricity consumption forms over certain time intervals. Forecasting remains stimulating task as load data has exhibited changing patterns because factors such weather change shifts usage behaviour. The beginning advanced analytics machine...
Network security is essential to our daily communications and networks. Cybersecurity researchers initiate the significance of emerging proficient network intrusion detection systems (IDS) for providing secure While attackers endure progress novel kinds attacks sizes develop, necessity effectual IDS becomes significant. Additionally, aims offer confidentiality, integrity, availability data communicated in networked computers by avoiding illegal access network. Several studies executed...
Network security is a critical aspect of information technology, targeting to safeguard the confidentiality, integrity, and availability data transmitted across computer networks. Intrusion Detection Systems (IDS) plays an essential role, serving as vigilant sentinels against illegal access, malicious actions, potential threats. IDS operates on analysing network or system activities, analyzing patterns, detecting anomalies that may specify breaches. The enhancement via integration feature...
Facial emotion recognition (FER) stands as a pivotal artificial intelligence (AI)-driven technology that exploits the capabilities of computer-vision techniques for decoding and comprehending emotional expressions displayed on human faces. With use machine-learning (ML) models, specifically deep neural networks (DNN), FER empowers automatic detection classification broad spectrum emotions, encompassing surprise, happiness, sadness, anger, more. Challenges in include handling variations...
Malicious user recognition for spectrum sensing in Cognitive Radio Networks (CRNs) is a serious safety feature to safeguard effective and trustworthy process of these systems. Spectrum permits CRNs identify employ accessible bands. As well as it available prospective interference mischievous actions. To preserve network integrity, malicious consumers vital. Deep learning (DL) based consumer classification powers advanced neural frameworks recognize flag possible threats inside network. By...
Collective intelligence systems like Chat Generative Pre-Trained Transformer (ChatGPT) have emerged. They brought both promise and peril to cybersecurity privacy protection. This study introduces novel approaches harness the power of artificial (AI) big data analytics enhance security in this new era. Contributions could explore topics such as: leveraging natural language processing (NLP) ChatGPT-like strengthen information security; evaluating privacy-enhancing technologies maximize utility...
Lung and colon cancers are deadly diseases that can develop concurrently in organs undesirably affect human life some special cases. The detection of these from histopathological images poses a complex challenge medical diagnostics. Advanced image processing techniques, including deep learning algorithms, offer solution by analyzing intricate patterns structures slides. integration artificial intelligence analysis not only improves the proficiency cancer but also holds potential to increase...
ABSTRACTChatGPT is becoming more and popular in the healthcare sector as a way to deliver quick easy access health information. However, little known about how participants view ChatGPT when seeking To find participants' perspectives on using for information pinpoint areas where ChatGPT's functionality design should be improved. Sixteen individuals who had used look underwent semi-structured interviews. Themes were found via thematic data analysis. was use handy getting They did, however,...
Content-based image retrieval (CBIR) in the healthcare field is an advanced technology that leverages visual or content features of medical images to retrieve similar from vast data. This has significant applications healthcare, including diagnosis, research, and treatment planning. It a diagnostic tool enhances explainability computer-aided diagnoses (CAD) systems provides decision-making support for professionals. A conventional way CBIR learning distance metric by converting into feature...
Google Scholar has become an important search platform for students in higher education, and, as such, can be regarded a competitor to university libraries. Previous research explored students’ intention use (GS) and University Digital Libraries (UDLs), but there is lack of comparative studies that explore preferences between these two platforms. Therefore, this study seeks the behaviour select group users, international postgraduate more specifically compares factors influence their (UDLs)....
In recent research, fake news detection in social networking using Machine Learning (ML) and Deep (DL) models has gained immense attention. The current research article presents the Bio-inspired Artificial Intelligence with Natural Language Processing Deceptive Content Detection (BAINLP-DCD) technique for networking. goal of proposed BAINLP-DCD is to detect presence deceptive or content on media. order accomplish this, algorithm applies data preprocessing transform input dataset into a...
The IPv4 address architecture has been declared ended finally due to the fast growth of Internet Things (IoT). IPv6 is becoming a next-generation communication protocol and provides all requirements that industry needs. A smart home an emerging technological revolution in which IoT-based physical objects are linked make human life more comfortable. There several resource-constrained devices interconnecting with 6LoWPAN control remotely. channels used by cellular vulnerable increase security...
Gastrointestinal (GI) cancer comprises esophageal, gastric, colon and rectal tumors. The diagnosis of GI often relies on medical imaging modalities namely magnetic resonance (MRI), histopathological slides, endoscopy, computed tomography (CT) scans. This provides particular details about the size, location, characteristics high death rate for patients shows that it is possible to increase analysis a more personalized therapy strategy which leads improved prognosis few side effects although...
The effective usage of energy becomes crucial for the successful deployment and operation unmanned aerial vehicles (UAVs) in different applications, such as surveillance, transportation, communication networks. increasing demand UAVs industries agriculture, logistics, emergency response has led to development more sophisticated advanced UAVs. However, limited onboard resource poses a major problem their long-term endurance. In addition, artificial intelligence (AI) machine learning (ML)...
Abstract Signal detection in orthogonal time frequency space modulation is one of the critical aspects for enhancing throughput beyond fifth-generation framework, especially challenging environments characterized by high mobility and multipath propagation. In this work, we proposed a hybrid algorithm combining zero-forcing equalization (ZFE) minimum square error (MMSE), also known as ZFE–MMSE, with Rician Rayleigh channels 64 256 quadrature amplitude modulation. The combination ZFE MMSE...
Poetry is a significant aspect of any language. Many cultures and the history nations are recognized in poems. Compared to prose, each poem has rhythmic structure that quite different. The language its set lyrical structures for poems, known as meters. Detecting meters Arabic poems complicated lengthy procedure. text must be encrypted using Arudi method classify poem's meter, which requires complex rule-based transformation before another rules classifies Applying deep learning (DL) meter...
Purpose This study examines the use of search engine, Google Scholar, from perspective a specific group, that international postgraduate students. Based on theory task perceived performance and effort expectancy influencing intention to use, further factors system, individual, social organisational, in student context are explored. Design/methodology/approach The questionnaire for measurement 11 was developed related studies e-library data were collected 200 students studying UK. Analysis...
Wireless Sensor Networks (WSNs) contain several small, autonomous sensor nodes (SNs) able to process, transfer, and wirelessly sense data. These networks find applications in various domains like environmental monitoring, industrial automation, healthcare, surveillance. Node Localization (NL) is a major problem WSNs, aiming define the geographical positions of sensors correctly. Accurate localization essential for distinct WSN comprising target tracking, data routing. Therefore, this paper...