Search Results - "Alothaim, Abdulrahman"
-
1
Predicting emotions in online social networks: challenges and opportunities
Published in Multimedia tools and applications (01-03-2022)“…Online social networking has become a popular means of information exchange and social interactions. Users of these platforms generate massive amounts of data…”
Get full text
Journal Article -
2
AraXLNet: pre-trained language model for sentiment analysis of Arabic
Published in Journal of big data (31-05-2022)“…The Arabic language is a complex language with little resources; therefore, its limitations create a challenge to produce accurate text classification tasks…”
Get full text
Journal Article -
3
Emotion Analysis of Arabic Tweets: Language Models and Available Resources
Published in Frontiers in artificial intelligence (30-03-2022)“…One of the most popular social media platforms is Twitter. Emotion analysis and classification of tweets have become a significant research topic recently. The…”
Get full text
Journal Article -
4
Identifying Learning Leaders in Online Social Networks Based on Community of Practice Theoretical Framework and Information Entropy
Published in IEEE access (2024)“…The dynamic shifts in educational settings have led scholars to explore online social networks (OSNs) as emergent environment for learning communities…”
Get full text
Journal Article -
5
Rumor gatekeepers: Unsupervised ranking of Arabic twitter authorities for information verification
Published in Journal of King Saud University. Computer and information sciences (01-07-2024)“…The advent of online social networks (OSNs) has catalyzed the formation of novel learning communities. Identifying experts within OSNs has become a critical…”
Get full text
Journal Article -
6
Affect Analysis in Arabic Text: Further Pre-Training Language Models for Sentiment and Emotion
Published in Applied sciences (01-05-2023)“…One of the main tasks in the field of natural language processing (NLP) is the analysis of affective states (sentiment and emotional) based on written text,…”
Get full text
Journal Article -
7
Investigation of Cyber-Security and Cyber-Crimes in Oil and Gas Sectors Using the Innovative Structures of Complex Intuitionistic Fuzzy Relations
Published in Entropy (Basel, Switzerland) (27-08-2021)“…Recently, there has been enormous development due to advancements in technology. Industries and enterprises are moving towards a digital system, and the oil…”
Get full text
Journal Article -
8
Guaranteeing Correctness of Machine Learning Based Decision Making at Higher Educational Institutions
Published in IEEE access (2021)“…State-of-the-art software technologies have enabled Higher Education Institutions to record and store large amounts of student data. Analyzing this large…”
Get full text
Journal Article -
9
Online Extremism Detection in Textual Content: A Systematic Literature Review
Published in IEEE access (2021)“…Social media networks such as Twitter, Facebook, YouTube, blogs, and discussion forums are becoming powerful tools that extremist groups use to disseminate…”
Get full text
Journal Article -
10
Prioritization-Based Taxonomy of Global Software Development Challenges: A FAHP Based Analysis
Published in IEEE access (2021)“…Global Software Development (GSD) continues to receive interest from software industry due to potential economic benefits. Management of GSD projects is not…”
Get full text
Journal Article -
11
A Multicriteria Decision Making Taxonomy of IOT Security Challenging Factors
Published in IEEE access (01-01-2021)“…Internet of things (IoT) is leading a new digital age. IoT is regarded as the significant frontier that can improve almost all aspect of our lives. Currently,…”
Get full text
Journal Article -
12
Toward Successful DevOps: A Decision-Making Framework
Published in IEEE access (2022)“…DevOps (development and operations) is a set of collaborative practices that automate delivery of new software updates with the aim to reduce the development…”
Get full text
Journal Article -
13
Exploratory Data Analysis and Classification of a New Arabic Online Extremism Dataset
Published in IEEE access (2021)“…The dissemination of extremist ideas and causes online has intensified over the last decade. Extremist organizations use social media to gain publicity and new…”
Get full text
Journal Article -
14
Prioritization of global software requirements' engineering barriers: An analytical hierarchy process
Published in IET software (01-08-2021)“…Software industry is adopting global software development (GSD) due to its potential to produce quality products at a lower cost. However, the GSD firms face…”
Get full text
Journal Article -
15
Analysis of Cybersecurities within Industrial Control Systems Using Interval-Valued Complex Spherical Fuzzy Information
Published in Computational intelligence and neuroscience (22-02-2022)“…Technology affects almost every aspect of life and is constantly changing. Digital communication technology has made it easier and faster to connect people all…”
Get full text
Journal Article -
16
Happy to Continue: Satisfaction, Commitment, and Persistence to Use Technology-Supported Collaborative Work Practices
Published in Group decision and negotiation (01-12-2022)“…This study focused on the persistent use of technology-supported collaborative work practices. Using the lenses of the technology transition model and yield…”
Get full text
Journal Article -
17
Selection of DevOps best test practices: A hybrid approach using ISM and fuzzy TOPSIS analysis
Published in Journal of software : evolution and process (01-05-2022)“…Testing is a complex phase in DevOps process due to need of an automated process that provides feedback at different strategies of continuous development and…”
Get full text
Journal Article -
18
Analysis of Communication and Network Securities Using the Concepts of Complex Picture Fuzzy Relations
Published in Computational intelligence and neuroscience (2021)“…In our lives, we cannot avoid the uncertainty. Randomness, rough knowledge, and vagueness lead us to uncertainty. In mathematics, the fuzzy set (FS) theory and…”
Get full text
Journal Article -
19
Proving Reliability of Image Processing Techniques in Digital Forensics Applications
Published in Security and communication networks (2022)“…Binary images have found its place in many applications, such as digital forensics involving legal documents, authentication of images, digital books,…”
Get full text
Journal Article -
20
Predicting the Behavioral Intention to Use Collaborative Meeting Technologies: A Goal Attainment Mediated by Meeting Satisfaction Model
Published in 2015 48th Hawaii International Conference on System Sciences (01-01-2015)“…Although meeting technologies offer great benefits in increasing productivity of teamwork, their organizational adoption is often challenging. Various studies…”
Get full text
Conference Proceeding Journal Article