Search Results - "Alreshidi, Abdulrahman"
-
1
Facial Emotion Recognition Using Hybrid Features
Published in Informatics (Basel) (01-03-2020)“…Facial emotion recognition is a crucial task for human-computer interaction, autonomous vehicles, and a multitude of multimedia applications. In this paper, we…”
Get full text
Journal Article -
2
Architecting Software for the Internet of Thing Based Systems
Published in Future internet (01-07-2019)“…Context—Internet of Thing (IoT) based systems support any-time/place computations by interconnecting humans, systems, services, devices, and things that…”
Get full text
Journal Article -
3
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
Published in Sensors (Basel, Switzerland) (28-03-2023)“…Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle…”
Get full text
Journal Article -
4
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
Published in IEEE access (2023)“…The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation in recent years. Since messages shared among…”
Get full text
Journal Article -
5
Optimization of K-means clustering method using hybrid capuchin search algorithm
Published in The Journal of supercomputing (2024)“…This work presents Hybrid Capuchin Search Algorithm (HCSA) as a meta-heuristic method to deal with the vexing problems of local optima traps and initialization…”
Get full text
Journal Article -
6
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
Published in IEEE access (01-01-2023)“…Cyber security confronts a tremendous challenge of maintaining the confidentiality and integrity of user's private information such as password and PIN code…”
Get full text
Journal Article -
7
Hybrid Techniques for Diagnosis with WSIs for Early Detection of Cervical Cancer Based on Fusion Features
Published in Applied sciences (01-09-2022)“…Cervical cancer is a global health problem that threatens the lives of women. Liquid-based cytology (LBC) is one of the most used techniques for diagnosing…”
Get full text
Journal Article -
8
Software Engineering for IoT-Driven Data Analytics Applications
Published in IEEE access (2021)“…Internet of Things Driven Data Analytics (IoT-DA) has the potential to excel data-driven operationalisation of smart environments. However, limited research…”
Get full text
Journal Article -
9
Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures
Published in Journal of computer science and technology (01-11-2018)“…Modern software systems are subject to a continuous evolution under frequently varying requirements and changes in systems’ operational environments. Lehman’s…”
Get full text
Journal Article -
10
An Improved Multiple Features and Machine Learning-Based Approach for Detecting Clickbait News on Social Networks
Published in Applied sciences (01-10-2021)“…The widespread usage of social media has led to the increasing popularity of online advertisements, which have been accompanied by a disturbing spread of…”
Get full text
Journal Article -
11
A New Macroscopic Traffic Flow Characterization Incorporating Traffic Emissions
Published in Applied sciences (29-04-2023)“…Densely populated cities have led to increased traffic congestion and, consequently, increased greenhouse gas emissions from vehicles. Thus, it is important to…”
Get full text
Journal Article -
12
Adaptive Security for Self-Protection of Mobile Computing Devices
Published in Mobile networks and applications (01-04-2023)“…Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and…”
Get full text
Journal Article -
13
-
14
A Novel Hybrid, BERT and Deep Learning Model Network Intrusion Detection System for Healthcare Electronics
Published in IEEE transactions on consumer electronics (10-06-2024)“…IoMT has become an attractive playground for cybercriminals due to its market value and rapid growth. As the amount of sensitive data transmitted across IT…”
Get full text
Journal Article -
15
-
16
Challenges in human centric intelligent systems for wireless sensor networks: A state of art
Published in Transactions on emerging telecommunications technologies (01-04-2024)“…Human centric computing is a technique that is gaining more attention nowadays and integrates innovative processing methods for analyzing extensive data…”
Get full text
Journal Article -
17
Transforming academic assessment: The metaverse‐backed Web 3 secure exam system
Published in Computer applications in engineering education (01-11-2024)“…Metaverse—a three‐dimensional computational environment—combines physical and virtual reality to enable social relationships and immersive experiences by…”
Get full text
Journal Article -
18
Software Architecture for Mobile Cloud Computing Systems
Published in Future internet (01-11-2019)“…Mobile cloud computing (MCC) has recently emerged as a state-of-the-art technology for mobile systems. MCC enables portable and context-aware computation via…”
Get full text
Journal Article -
19
Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices
Published 07-03-2019“…We introduce a novel method to detect movement of interest in crowd scenes. For this purpose, we consider regions of interest and discretize them into a number…”
Get full text
Journal Article -
20
A generic high-level specification language for non-functional properties of component-based systems
Published 01-01-2016“…The component-based software development is helpful in providing reuse of the components and reducing complexity of software systems. Different components work…”
Get full text
Dissertation