Ahmed Alsanad

ORCID: 0000-0003-1702-8643
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Techniques and Practices
  • Outsourcing and Supply Chain Management
  • Multi-Criteria Decision Making
  • Software Engineering Research
  • Text and Document Classification Technologies
  • Sustainable Supply Chain Management
  • Optimization and Mathematical Programming
  • IoT and Edge/Fog Computing
  • Sentiment Analysis and Opinion Mining
  • Technology Assessment and Management
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Big Data and Business Intelligence
  • EEG and Brain-Computer Interfaces
  • Privacy-Preserving Technologies in Data
  • Spam and Phishing Detection
  • Cloud Computing and Resource Management
  • Topic Modeling
  • Face recognition and analysis
  • Face and Expression Recognition
  • Time Series Analysis and Forecasting
  • IoT Networks and Protocols
  • Biometric Identification and Security
  • Neuroscience and Neural Engineering
  • Stock Market Forecasting Methods

King Saud University
2018-2025

Lappeenranta-Lahti University of Technology
2021

In this article, a comprehensive overview of the Crow Search Algorithm (CSA) is introduced with detailed discussions, which intended to keep researchers interested in swarm intelligence algorithms and optimization problems. CSA new algorithm recently developed, simulates crow behavior storing excess food retrieving it when needed. theory, searcher, surrounding environment search space, randomly location feasible solution. Among all locations, where most stored considered be global optimal...

10.1109/access.2020.3024108 article EN cc-by IEEE Access 2020-01-01

Development and Operations (DevOps) is a methodology that aims to establish collaboration between programmers operators automate the continuous delivery of new software reduce development life cycle produce quality software. Development, Security, (DevSecOps) developing DevOps concept, which integrates security methods into process. DevSecOps process where built in ensure application confidentiality, integrity, availability. This paper identify prioritize challenges associated with...

10.1016/j.infsof.2022.106894 article EN cc-by Information and Software Technology 2022-02-27

At present, super-resolution algorithms are employed to tackle the challenge of low image resolution, but it is difficult extract differentiated feature details based on various inputs, resulting in poor generalization ability.Given this situation, study first analyzes features some extraction modules current superresolution algorithm and then proposes an adaptive fusion block (AFB) for extraction.This module mainly comprises dynamic convolution, attention mechanism, pixel-based gating...

10.32604/cmes.2024.050853 article EN Computer Modeling in Engineering & Sciences 2024-01-01

Reducing energy loads while maintaining the degree of hotness and coldness plays an essential role in designing energy-efficient buildings. Some previous methods have been proposed for predicting building using traditional machine learning methods. However, these suffer from overfitting problems, which leads to inaccurate prediction results. To achieve high accuracy results, ensemble approach is this paper. The uses extreme gradient boosting (XGBoost) algorithm avoid problems builds...

10.1109/access.2019.2909470 article EN cc-by-nc-nd IEEE Access 2019-01-01

Global human pollutant activities have raised greenhouse gas (GHG) emissions, which directly affected the climate. Fossil fuel-based energy has brought a negative impact on environment and is considered one of largest sources GHG emissions. It envisaged that emissions will increase in future due to rapid population growth industrialization. Thus, it imperative mitigate climate variability reduce GHGs by adopting renewable (RE) for electricity generation. In this regard, multi-criteria...

10.3390/pr8070825 article EN Processes 2020-07-13

Recent advancements in natural language processing have given rise to numerous pre-training models question-answering systems. However, with the constant evolution of algorithms, data, and computing power, increasing size complexity these led increased training costs reduced efficiency. This study aims minimize inference time such while maintaining computational performance. It also proposes a novel Distillation model for PAL-BERT (DPAL-BERT), specifically, employs knowledge distillation,...

10.32604/cmes.2024.052622 article EN Computer Modeling in Engineering & Sciences 2024-01-01

Abstract Healthcare systems face various issues related to complex networks of intermediaries and a lack transaction traceability. The most critical are the fragmentation healthcare data, obstacles in providing efficient research services, clinical trial reporting, high cost mismanagement drug supply chain, patient data security, fake drugs. Blockchain technology has potential address these criticalities as it build traceability mechanisms promises new business models by enabling incentive...

10.1002/smr.2500 article EN cc-by Journal of Software Evolution and Process 2022-08-08

This paper aims to propose a new methodology for spherical cubic fuzzy (SCF) multicriteria decision-making (MCDM) utilizing the TOPSIS method that uses incomplete weight information. At first, maximum deviation model is suggested determine criteria of values. An MCDM introduced using SCF information, based on proposed method. Also, validate effectiveness numerical example given. Finally, comprehensive and structured analysis existing work in comparison with previous

10.1155/2021/2284051 article EN cc-by Mathematical Problems in Engineering 2021-06-25

This paper aims to implement an analytical method, known as the Laplace homotopy perturbation transform technique, for result of fractional‐order Whitham–Broer–Kaup equations. The technique is a mixture transformation and technique. Fractional derivatives with Mittag‐Leffler exponential laws in sense Caputo are considered. Moreover, this show equations both see their difference real‐world problem. efficiency operators confirmed by outcome actual results Some problems have been presented...

10.1155/2021/7979365 article EN cc-by Complexity 2021-01-01

DevOps is a combination of collaborative and multidisciplinary efforts an organization to control continuous delivery updates new software while guaranteeing their reliability correctness. In the industry, implementation (development operations units) faces many challenges that are specifically associated with security. The objective this study identify develop prioritization based taxonomy security challenges. total eighteen were extracted using systematic literature review approach further...

10.1109/access.2020.2998819 article EN cc-by IEEE Access 2020-01-01

In current era, DevOps gain much interaction in software industry as it provides the flexible development environment. To meet continuous and operations, mainly focus, to integrate data from heterogeneous source. While adoption, quality assessment of integrated environment, is important challenging at same time. This study aims identify critical factors that could negatively impact process DevOps. We have used systematic literature review (SLR) approach a total 13 factors. The finding SLR...

10.1109/access.2020.2976803 article EN cc-by IEEE Access 2020-01-01

The software organizations rapidly adopting global development (GSD) to gain the economic and strategic benefits. Besides, GSD faces many challenges that mainly concerned with requirements change management (RCM). This study aims identify empirically validate factors can negatively influence RCM process in GSD. To this end, literature review questionnaire survey were conducted for investigation validation of challenges. A total 31 identified. We have further classified identified...

10.1109/access.2020.3035829 article EN cc-by IEEE Access 2020-01-01

The study proposed the classification and recognition of hand gestures using electromyography (EMG) signals for controlling upper limb prosthesis. In this research, EMG were measured through an embedded system by wearing a band MYO gesture control. order to observe behavior these change movements, data was acquired from 10 healthy subjects (five male five females) performing four movements. After extracting MYO, supervised approach applied recognize different performed with 5-fold...

10.3390/electronics10111322 article EN Electronics 2021-05-31

Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data transmitted WMSN from IoMT over an insecure channel vulnerable several threats needs proper attention be secured adversaries. In contrast addressing...

10.1155/2021/9954089 article EN cc-by Journal of Healthcare Engineering 2021-07-22

DevOps (development and operations) is a set of collaborative practices that automate delivery new software updates with the aim to reduce development life cycle produce quality products. Software organizations face several barriers while adopting as integration operation teams requires merger different processes, tools, skill sets. This study aims develop prioritization-based framework best based on evidence collected from industry experts. To attain aims, firstly, systematic literature...

10.1109/access.2022.3174094 article EN cc-by IEEE Access 2022-01-01
Coming Soon ...