Abdalla Alameen

ORCID: 0000-0003-4197-4859
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Service-Oriented Architecture and Web Services
  • Software-Defined Networks and 5G
  • Face and Expression Recognition
  • Face recognition and analysis
  • Advanced Multi-Objective Optimization Algorithms
  • Academic integrity and plagiarism
  • Cryptography and Data Security
  • EEG and Brain-Computer Interfaces
  • ECG Monitoring and Analysis
  • Learning Styles and Cognitive Differences
  • Intelligent Tutoring Systems and Adaptive Learning
  • Functional Brain Connectivity Studies
  • Wireless Body Area Networks
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Cryptographic Implementations and Security
  • Web Applications and Data Management
  • Software Reliability and Analysis Research
  • Smart Parking Systems Research
  • Advanced Optical Network Technologies
  • Online and Blended Learning
  • Access Control and Trust

Prince Sattam Bin Abdulaziz University
2015-2025

Social networking sites are widely used by university students. This study investigated the purposes for which social and their effects on learning, interaction, sleep duration.A cross-sectional was conducted among 300, 17-29-year-old female students at Prince Sattam bin Abdul Aziz University. A questionnaire to collect data. Chi-squared (Fisher's exact test) test analyze data.The results showed that 97% of media applications. Only 1% them academic purposes. Whereas 35% these platforms chat...

10.1016/j.sjbs.2021.01.010 article EN cc-by-nc-nd Saudi Journal of Biological Sciences 2021-01-21

Researchers are interested in Facial Emotion Recognition (FER) because it could be useful many ways and has promising applications. The main task of FER is to identify recognize the original facial expressions users from digital inputs. Feature extraction emotion recognition make up majority traditional FER. Deep Neural Networks, specifically Convolutional Network (CNN), popular highly used due their inherent image feature process. This work presents a novel method dubbed as...

10.3390/math11030776 article EN cc-by Mathematics 2023-02-03

A program’s bug, fault, or mistake that results in unintended is known as a software defect fault. Software flaws are programming errors due to mistakes the requirements, architecture, source code. Finding and fixing bugs soon they arise crucial goal of development can be achieved various ways. So, selecting handful optimal subsets features from any dataset prime approach. Indirectly, classification performance improved through selection features. novel approach feature (FS) has been...

10.3390/math11112438 article EN cc-by Mathematics 2023-05-25

Abstract Meta-Heuristic (MH) algorithms have recently proven successful in a broad range of applications because their strong capabilities picking the optimal features and removing redundant irrelevant features. Artificial Ecosystem-based Optimization (AEO) shows extraordinary ability exploration stage poor exploitation its stochastic nature. Dwarf Mongoose Algorithm (DMOA) is recent MH algorithm showing high capability. This paper proposes AEO-DMOA Feature Selection (FS) by integrating AEO...

10.1007/s44196-023-00279-6 article EN cc-by International Journal of Computational Intelligence Systems 2023-06-16

Clinical methods for dementia detection are expensive and prone to human errors. Despite various computer-aided using electroencephalography (EEG) signals artificial intelligence, a consistent separation of Alzheimer's disease (AD) normal-control (NC) subjects remains elusive. This paper proposes low-complexity EEG-based AD CNN called LEADNet generate disease-specific features. employs spatiotemporal EEG as input, two convolution layers feature generation, max-pooling layer asymmetric...

10.1109/access.2024.3435768 article EN cc-by IEEE Access 2024-01-01

In this article, we have built a prototype of decentralized IoT based biometric face detection framework for cities that are under lockdown during COVID-19 outbreaks. To impose restrictions on public movements, utilized using three-layered edge computing architecture. We deep learning multi-task cascading to recognize the face. For proposal compared with state art methods various benchmarking dataset such as FDDB and WIDER FACE. Furthermore, also conducted experiments latency load...

10.1109/access.2020.3021983 article EN cc-by IEEE Access 2020-01-01

Many real-world expensive industrial and engineering multi-objective optimization problems (MOPs) are driven by historical, experimental, or simulation data. In such scenarios, due to the cost time required, we only left with a small amount of labeled data perform optimization. These offline data-driven MOPs usually solved evolutionary algorithms (MOEAs) help surrogate models constructed from historical The key challenge in developing these MOEAs is that they have replace multiple...

10.3390/math13010158 article EN cc-by Mathematics 2025-01-03

The life expectancy of the elderly has substantially increased compared to earlier times. primary factors are greater awareness nutrition, environment, and personal hygiene. Advances in science technology have also extended lifespans aging population. Traditional care methods inadequate address this situation. To maintain socioeconomic structure, there is a need for integration advanced frameworks. In context, we propose smart framework called human activity Internet Things-enabled...

10.3390/app13116797 article EN cc-by Applied Sciences 2023-06-02

The use of computer-based technologies by non-native Arabic-speaking teachers for teaching native students can result in higher learner engagement. In this study, a machine translation (MT) system is developed... | Find, read and cite all the research you need on Tech Science Press

10.32604/iasc.2021.014995 article EN cc-by Intelligent Automation & Soft Computing 2021-01-01

This paper deals with the necessary steps to be followed in upgrading traditional e-Learning system new Adaptive system. The framework, which is an important part of implementation, also covered paper. Before implementing adaptive learning system, existing needs reviewed. A survey was conducted find practical feedback from both users: students and instructors recognize their belief about current Results are discussed frame strategy implement issues can addressed. To confirm feedback, a...

10.3991/ijet.v14i21.11030 article EN International Journal of Emerging Technologies in Learning (iJET) 2019-11-18

Wireless body sensor networks (WBSNs) plays a vital role in monitoring health conditions of patients and is low-cost solution for dealing with several healthcare applications. Processing large amounts data making feasible decisions emergency cases are the major challenges WBSNs. Thus, this article addresses these by designing deep learning approach risk assessment proposing Fractional Cat-based Salp Swarm Algorithm (FCSSA). At first, WBSN nodes utilized sensing from patient records to...

10.4018/ijbdcn.2020010105 article EN International Journal of Business Data Communications and Networking 2019-12-23

We have designed an anti-plagiarism software to detect plagiarism in students' assignments, especially written homework, and research reports, which will hereinafter be collectively referred as student work. used our university network gather work plagiarism. . To collect data, we a domain name system store the data based on respective location, time, subject each was assigned Once were collected, they sent extraction module remove unwanted data. The remaining then fed similarity index...

10.1080/08989621.2020.1822171 article EN Accountability in Research 2020-09-10

System supported smart parking can reduce traffic by making it stress free to locate empty spaces, hence lowering the risk of unfocussed driving. In this study, we propose a system using deep learning and an application-based approach. This has two modules, one module detects recognizes license plate (LP), other selects space; both modules use techniques. We used that work independently detect recognize LP image vehicle. To space, only techniques were used. The compared with state-of-the-art...

10.32604/csse.2021.014915 article EN cc-by Computer Systems Science and Engineering 2020-12-29

Abstract Wireless body sensor networks (WBSNs) play a vital role in monitoring the health conditions of patients and are low-cost solution for dealing with several healthcare applications. However, processing large amount data making feasible decisions emergency cases major challenges attributed to WBSNs. Thus, this paper addresses these by designing deep learning approach risk assessment proposing fractional cat based salp swarm algorithm (FCSSA). At first, WBSN nodes utilized sensing from...

10.1515/bams-2019-0016 article EN Bio-Algorithms and Med-Systems 2019-10-23

Not long ago, there has been a dramatic augment in the attractiveness of cloud computing systems that depends resources on-demand, bill on pay-as-you-go basis, and multiplex many users same physical infrastructure. It is considered as an essential pool resources, which are offered to through Internet. Without troubling fundamental infrastructure, pay-per-use provided by technology. Scheduling significant dilemma provider serve multiple environment. This proposal plans implement optimal task...

10.1080/19393555.2020.1769780 article EN Information Security Journal A Global Perspective 2020-06-01

In recent years, the web has been an indispensable part of business all over world and browsers have become backbones today's systems applications. Unfortunately, number application attacks increased a great deal, so matter concern is securing One most serious cyber-attacks by cross site request forgery (CSRF). CSRF recognized among major threats to applications top ten worst vulnerabilities for attack, attacker takes liberty be authorized take sensitive action on target website behalf user...

10.14569/ijacsa.2015.060610 article EN cc-by International Journal of Advanced Computer Science and Applications 2015-01-01

The most important challenge in an Ethernet Passive Optical Network (EPON) is bandwidth allocation. This because it a mandatory service to satisfy the end users' level agreement (SLA). Dynamic allocation of on diversified characteristics services such as high definition video, audio cloud computing resource sharing, and virtual reality games required, especially point-to-point multipoint-to-point architectures. Hence, we propose integrated Unified Bandwidth Allocation Scheme (UDBAS)...

10.1109/access.2020.3042282 article EN cc-by IEEE Access 2020-01-01
Coming Soon ...