Search Results - "Alreshidi, Abdulrahman"

Refine Results
  1. 1

    Facial Emotion Recognition Using Hybrid Features by Alreshidi, Abdulrahman, Ullah, Mohib

    Published in Informatics (Basel) (01-03-2020)
    “…Facial emotion recognition is a crucial task for human-computer interaction, autonomous vehicles, and a multitude of multimedia applications. In this paper, we…”
    Get full text
    Journal Article
  2. 2

    Architecting Software for the Internet of Thing Based Systems by Alreshidi, Abdulrahman, Ahmad, Aakash

    Published in Future internet (01-07-2019)
    “…Context—Internet of Thing (IoT) based systems support any-time/place computations by interconnecting humans, systems, services, devices, and things that…”
    Get full text
    Journal Article
  3. 3

    Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing by Al-Mekhlafi, Zeyad Ghaleb, Al-Shareeda, Mahmood A, Manickam, Selvakumar, Mohammed, Badiea Abdulkarem, Alreshidi, Abdulrahman, Alazmi, Meshari, Alshudukhi, Jalawi Sulaiman, Alsaffar, Mohammad, Rassem, Taha H

    Published in Sensors (Basel, Switzerland) (28-03-2023)
    “…Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle…”
    Get full text
    Journal Article
  4. 4

    FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks by Mohammed, Badiea Abdulkarem, Al-Shareeda, Mahmood A., Manickam, Selvakumar, Al-Mekhlafi, Zeyad Ghaleb, Alreshidi, Abdulrahman, Alazmi, Meshari, Alshudukhi, Jalawi Sulaiman, Alsaffar, Mohammad

    Published in IEEE access (2023)
    “…The fifth-generation (5G) technology-enabled vehicular network has been widely used in intelligent transportation in recent years. Since messages shared among…”
    Get full text
    Journal Article
  5. 5

    Optimization of K-means clustering method using hybrid capuchin search algorithm by Qtaish, Amjad, Braik, Malik, Albashish, Dheeb, Alshammari, Mohammad T., Alreshidi, Abdulrahman, Alreshidi, Eissa Jaber

    Published in The Journal of supercomputing (2024)
    “…This work presents Hybrid Capuchin Search Algorithm (HCSA) as a meta-heuristic method to deal with the vexing problems of local optima traps and initialization…”
    Get full text
    Journal Article
  6. 6

    PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning by Altamimi, Ahmed B., Ahmed, Muzammil, Khan, Wilayat, Alsaffar, Mohammad, Ahmad, Aakash, Khan, Zawar Hussain, Alreshidi, Abdulrahman

    Published in IEEE access (01-01-2023)
    “…Cyber security confronts a tremendous challenge of maintaining the confidentiality and integrity of user's private information such as password and PIN code…”
    Get full text
    Journal Article
  7. 7

    Hybrid Techniques for Diagnosis with WSIs for Early Detection of Cervical Cancer Based on Fusion Features by Mohammed, Badiea Abdulkarem, Senan, Ebrahim Mohammed, Al-Mekhlafi, Zeyad Ghaleb, Alazmi, Meshari, Alayba, Abdulaziz M., Alanazi, Adwan Alownie, Alreshidi, Abdulrahman, Alshahrani, Mona

    Published in Applied sciences (01-09-2022)
    “…Cervical cancer is a global health problem that threatens the lives of women. Liquid-based cytology (LBC) is one of the most used techniques for diagnosing…”
    Get full text
    Journal Article
  8. 8

    Software Engineering for IoT-Driven Data Analytics Applications by Ahmad, Aakash, Fahmideh, Mahdi, Altamimi, Ahmed B., Katib, Iyad, Albeshri, Aiiad, Alreshidi, Abdulrahman, Alanazi, Adwan Alownie, Mehmood, Rashid

    Published in IEEE access (2021)
    “…Internet of Things Driven Data Analytics (IoT-DA) has the potential to excel data-driven operationalisation of smart environments. However, limited research…”
    Get full text
    Journal Article
  9. 9

    Mining Patterns from Change Logs to Support Reuse-Driven Evolution of Software Architectures by Ahmad, Aakash, Pahl, Claus, Altamimi, Ahmed B., Alreshidi, Abdulrahman

    Published in Journal of computer science and technology (01-11-2018)
    “…Modern software systems are subject to a continuous evolution under frequently varying requirements and changes in systems’ operational environments. Lehman’s…”
    Get full text
    Journal Article
  10. 10

    An Improved Multiple Features and Machine Learning-Based Approach for Detecting Clickbait News on Social Networks by Al-Sarem, Mohammed, Saeed, Faisal, Al-Mekhlafi, Zeyad Ghaleb, Mohammed, Badiea Abdulkarem, Hadwan, Mohammed, Al-Hadhrami, Tawfik, Alshammari, Mohammad T., Alreshidi, Abdulrahman, Alshammari, Talal Sarheed

    Published in Applied sciences (01-10-2021)
    “…The widespread usage of social media has led to the increasing popularity of online advertisements, which have been accompanied by a disturbing spread of…”
    Get full text
    Journal Article
  11. 11

    A New Macroscopic Traffic Flow Characterization Incorporating Traffic Emissions by Qaiser, Tanveer, Altamimi, Ahmed B., Khan, Fayaz A., Alsaffar, Mohammad, Alreshidi, Abdulrahman, Khattak, Khurram S., Khan, Zawar H., Khan, Wilayat

    Published in Applied sciences (29-04-2023)
    “…Densely populated cities have led to increased traffic congestion and, consequently, increased greenhouse gas emissions from vehicles. Thus, it is important to…”
    Get full text
    Journal Article
  12. 12

    Adaptive Security for Self-Protection of Mobile Computing Devices by Ahmad, Aakash, Malik, Asad Waqar, Alreshidi, Abdulrahman, Khan, Wilayat, Sajjad, Maryam

    Published in Mobile networks and applications (01-04-2023)
    “…Mobile computing has emerged as a pervasive technology that empowers its users with portable computation and context-aware communication. Smart systems and…”
    Get full text
    Journal Article
  13. 13
  14. 14

    A Novel Hybrid, BERT and Deep Learning Model Network Intrusion Detection System for Healthcare Electronics by Alferaidi, Ali, Yadav, Kusum, Alharbi, Yasser, Alreshidi, Eissa Jaber, Alreshidi, Abdulrahman, Aboshosha, Bassam W., Sharma, Rohit, Alkhayyat, Ahmed, Aray, Daniel Gavilanes

    Published in IEEE transactions on consumer electronics (10-06-2024)
    “…IoMT has become an attractive playground for cybercriminals due to its market value and rapid growth. As the amount of sensitive data transmitted across IT…”
    Get full text
    Journal Article
  15. 15
  16. 16

    Challenges in human centric intelligent systems for wireless sensor networks: A state of art by Alferaidi, Ali, Yadav, Kusum, Alharbi, Yasser, Alshudukhi, Jalawi Sulaiman, Alreshidi, Abdulrahman, Alreshidi, Eissa Jaber, Kachout, Mnaouer, Sharif, Md Haidar

    “…Human centric computing is a technique that is gaining more attention nowadays and integrates innovative processing methods for analyzing extensive data…”
    Get full text
    Journal Article
  17. 17

    Transforming academic assessment: The metaverse‐backed Web 3 secure exam system by Razzaq, Abdul, Zhang, Tao, Numair, Muhammad, Alreshidi, Abdulrahman, Jing, Cheng, Aljaloud, Abdulaziz, Ghayyur, Shahbaz A. K., Ahmed, Salman, Qurat Ul Ain, Mumtaz

    “…Metaverse—a three‐dimensional computational environment—combines physical and virtual reality to enable social relationships and immersive experiences by…”
    Get full text
    Journal Article
  18. 18

    Software Architecture for Mobile Cloud Computing Systems by Alreshidi, Abdulrahman, Ahmad, Aakash, B. Altamimi, Ahmed, Sultan, Khalid, Mehmood, Rashid

    Published in Future internet (01-11-2019)
    “…Mobile cloud computing (MCC) has recently emerged as a state-of-the-art technology for mobile systems. MCC enables portable and context-aware computation via…”
    Get full text
    Journal Article
  19. 19

    Towards Security as a Service to Protect the Critical Resources of Mobile Computing Devices by Alreshidi, Abdulrahman

    Published 07-03-2019
    “…We introduce a novel method to detect movement of interest in crowd scenes. For this purpose, we consider regions of interest and discretize them into a number…”
    Get full text
    Journal Article
  20. 20

    A generic high-level specification language for non-functional properties of component-based systems by Alreshidi, Abdulrahman Nassar

    Published 01-01-2016
    “…The component-based software development is helpful in providing reuse of the components and reducing complexity of software systems. Different components work…”
    Get full text
    Dissertation