Abdullah Alharbi

Abdullah Alharbi
University of Tabuk · Department of Mechanical Engineering

About

83
Publications
46,982
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,566
Citations
Introduction

Publications

Publications (83)
Article
Full-text available
The Internet of Things (IoT) market is experiencing exponential growth, with projections increasing from 15 billion dollars to an estimated 75 billion dollars by 2025. Quantum computing has emerged as a key enabler for managing the rapid expansion of IoT technology, serving as the foundation for quantum computing support. However, the adoption of q...
Article
Full-text available
The research interest in this field is that females are not aware of their health conditions until they develop tumour, especially when breast cancer is concerned. The breast cancer risk factors include genetics, heredity, and sedentary lifestyle. The prime concern for the mortality rate among females is breast cancer, and breast cancer is on the r...
Article
Full-text available
The Internet of Things (IoT) has evolved at a revolutionary pace in the last two decades of computer science. It is becoming increasingly fashionable for the IoT to be rebranded as the “Social Internet of Things” (SIoT), and this is drawing the attention of the scientific community. Smart items in the Internet of Things (IoT) ecosystem can locate r...
Article
Full-text available
Nowadays, the COVID-19 virus disease is spreading rampantly. There are some testing tools and kits available for diagnosing the virus, but it is in a limited count. To diagnose the presence of disease from radiological images, automated COVID-19 diagnosis techniques are needed. The enhancement of AI (Artificial Intelligence) has been focused in pre...
Article
Mobile Cloud Computing (MCC) results from the evolution of several Internet-based technologies that allow mobile consumers to gain cloud computing advantages and attain green computing by utilizing their cellphones. MCC's use may be restricted because of increasing energy utilization and restricted access to energy supplies. This challenge may be t...
Article
Full-text available
The COVID-19 infection, which began in December 2019, has claimed many lives and impacted all aspects of human life. With time, COVID-19 was identified as a pandemic outbreak by the World Health Organization (WHO), putting massive pressure on global health. During this ongoing pandemic, the exponential growth of social media platforms has provided...
Article
Full-text available
The purpose of automatic text summarising technology is to condense a given text while properly portraying the main information in the original text in a summary. To present generative text summarising approaches, on the other hand, restructure the original language and introduce new words when constructing summary sentences, which can easily lead...
Article
Full-text available
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
Article
Full-text available
Datasets with the imbalanced class distribution are difficult to handle with the standard classification algorithms. In supervised learning, dealing with the problem of class imbalance is still considered to be a challenging research problem. Various machine learning techniques are designed to operate on balanced datasets; therefore, the state of t...
Article
Full-text available
White blood cells (WBCs) are the important constituent of a blood cell. These blood cells are responsible for defending the body against infections. Abnormalities identified in WBC smears lead to the diagnosis of disease types such as leukocytosis, hepatitis, and immune system disorders. Digital image analysis for infection detection at an early st...
Article
Full-text available
Component-based software engineering is concerned with the development of software that can satisfy the customer prerequisites through reuse or independent development. Coupling and cohesion measurements are primarily used to analyse the better software design quality, increase the reliability and reduced system software complexity. The complexity...
Article
Full-text available
Reading and writing English have greater significance in learning oral English and comprehensive skills. Artificial Intelligence (AI) is important in many aspects of our lives, including education, healthcare, business, and so on. AI has allowed for significant advancements in the educational system. It has quickly risen to the top of the list of t...
Article
Full-text available
A document’s keywords provide high-level descriptions of the content that summarize the document’s central themes, concepts, ideas, or arguments. These descriptive phrases make it easier for algorithms to find relevant information quickly and efficiently. It plays a vital role in document processing, such as indexing, classification, clustering, an...
Article
Full-text available
People’s lives are influenced by social media. It is an essential source for sharing news, awareness, detecting events, people’s interests, etc. Social media covers a wide range of topics and events to be discussed. Extensive work has been published to capture the interesting events and insights from datasets. Many techniques are presented to detec...
Article
Full-text available
Infectious Disease Prediction aims to anticipate the aspects of both seasonal epidemics and future pandemics. However, a single model will most likely not capture all the dataset’s patterns and qualities. Ensemble learning combines multiple models to obtain a single prediction that uses the qualities of each model. This study aims to develop a stac...
Article
Full-text available
Sentiment analysis was nominated as a hot research topic a decade ago for its increasing importance in analyzing the people’s opinions extracted from social media platforms. Although the Arabic language has a significant share of the content shared across social media platforms, its content’s sentiment analysis is still limited due to its complex m...
Article
Full-text available
Purpose: The need for computerized medical assistance for accurate detection of brain hemorrhage from Computer Tomography (CT) images is more mandatory than conventional clinical tests. Recent technologies and advanced computerized algorithms follow Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) techniques to improve m...
Article
Full-text available
Education 4.0 imitates Industry 4.0 in many aspects such as technology, customs, challenges, and benefits. The remarkable advancement in embryonic technologies, including IoT (Internet of Things), Fog Computing, Cloud Computing, and Augmented and Virtual Reality (AR/VR), polishes every dimension of Industry 4.0. The constructive impacts of Industry...
Article
Full-text available
It has been a software trend to build large-scale complex systems with high reliability. Due to the size of the software and the dynamic requirements of the stakeholders, it becomes hard to test those softwares manually. This may lead the software to fatal failures and cause irrecoverable catastrophic damages. To be safe, the software system must b...
Article
Full-text available
Breast cancer has now overtaken lung cancer as the world's most commonly diagnosed cancer, with thousands of new cases per year. Early detection and classification of breast cancer are necessary to overcome the death rate. Recently, many deep learning-based studies have been proposed for automatic diagnosis and classification of this deadly disease...
Article
Full-text available
Generally, software developers make errors during the distributed software development process; therefore, software testing delay is a significant concern. Some of the software mistakes are minor, but others may be costly or harmful. Since things can still go wrong—individuals encounter mistakes from time to time—there is a need to double-check any...
Article
Full-text available
Many researchers are drawn to mobile wireless sensor networks (WSN) and the Internet of Things (IoT) because of the significant challenges of power consumption and network connectivity. A technique that takes into consideration the characteristics such as network probability, the identified region of individual nodes, and the radius of the whole id...
Article
Full-text available
For analytical approach-based word recognition techniques, the task of segmenting the word into individual characters is a big challenge, specifically for cursive handwriting. For this, a holistic approach can be a better option, wherein the entire word is passed to an appropriate recognizer. Gurumukhi script is a complex script for which a holisti...
Article
Full-text available
Cyber-attacks are becoming progressively complicated; hence, the functional issues of intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect intrusions may jeopardize the trustworthiness of security services, such as privacy preservation, authenticity, and accessibility. To fight these risks, different organizations n...
Article
Civil engineering has a specific position for different forms of concrete as a century-old material. One of the most popular materials for human consumption is made from this substance. In recent years, solutions have been presented for the manufacturing of concrete, making concrete environmentally friendly and also making current waste useable as...
Article
Full-text available
Online sales and purchases are increasing daily, and they generally involve credit card transactions. This not only provides convenience to the end-user but also increases the frequency of online credit card fraud. In the recent years, in some countries, this fraud increase has led to an exponential increase in credit card fraud detection, which ha...
Article
Full-text available
A wireless body area network (WBAN) is a technology that is widely employed in the medical sector. It is a low-cost network that allows for mobility and variation. It can be used for long-distance, semiautonomous remote monitoring without interfering with people’s regular schedules. Detection devices are embedded in the human body in a simple WBAN...
Article
Full-text available
It is very important to keep structures and constructional elements in service during and after exposure to elevated temperatures. Investigation of the structural behaviour of different components and structures at elevated temperatures is an approach to manipulate the serviceability of the structures during heat exposure. Channel connectors are wi...
Article
Full-text available
Biomedical imaging technologies are designed to offer functional, anatomical, and molecular details related to the internal organs. Photoacoustic imaging (PAI) is becoming familiar among researchers and industrialists. The PAI is found useful in several applications of brain and cancer imaging such as prostate cancer, breast cancer, and ovarian can...
Article
Full-text available
Speech recognition has been an active field of research in the last few decades since it facilitates better human–computer interaction. Native language automatic speech recognition (ASR) systems are still underdeveloped. Punjabi ASR systems are in their infancy stage because most research has been conducted only on adult speech systems; however, le...
Article
Full-text available
This research work proposes a new stack-based generalization ensemble model to forecast the number of incidences of conjunctivitis disease. In addition to forecasting the occurrences of conjunctivitis incidences, the proposed model also improves performance by using the ensemble model. Weekly rate of acute Conjunctivitis per 1000 for Hong Kong is c...
Article
Full-text available
Semantic tags can enrich citation graphs by inter-connecting papers with citation reasons. One of the best sources of knowledge to tell the reason for citation is the author himself. Integrating these reasons in an authoring system can help authors to choose a reason while citing. We examined various Human and Automatic authoring systems for integr...
Article
Full-text available
Machine learning has grown in popularity in recent years as a method for evaluating financial text data, with promising results in stock price projection from financial news. Various research has looked at the relationship between news events and stock prices, but there is little evidence on how different sentiments (negative, neutral, and positive...
Article
Full-text available
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ensure optimum software retreat. The accurate assessment of software's durability and security is a...
Article
Full-text available
Exposure to fine and ultrafine particles in the atmosphere has become a major concern for human health and environmental protection in the Kingdom of Saudi Arabia (KSA). Due to the interaction effects of dust pollutant types and climate change in physical and human habitats, a deeper assessment of air contamination characteristics of airborne dust...
Article
Full-text available
Fake news is challenging to detect due to mixing accurate and inaccurate information from reliable and unreliable sources. Social media is a data source that is not trustworthy all the time, especially in the COVID-19 outbreak. During the COVID-19 epidemic, fake news is widely spread. The best way to deal with this is early detection. Accordingly,...
Article
Full-text available
Machine learning (ML) is one of the dominating technologies practiced in both the industrial and academic domains throughout the world. ML algorithms can examine the threats and respond to intrusions and security incidents swiftly in an instinctive way. It plays a critical function in providing a proactive security mechanism in the cybersecurity do...
Article
Full-text available
Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuit...
Article
Full-text available
The proposed research motivates the 6G cellular networking for the Internet of Everything’s (IoE) usage empowerment that is currently not compatible with 5G. For 6G, more innovative technological resources are required to be handled by Mobile Edge Computing (MEC). Although the demand for change in service from different sectors, the increase in IoE...
Article
Full-text available
Data mining is an information exploration methodology with fascinating and understandable patterns and informative models for vast volumes of data. Agricultural productivity growth is the key to poverty alleviation. However, due to a lack of proper technical guidance in the agriculture field, crop yield differs over different years. Mining techniqu...
Article
Full-text available
Underwater wireless sensor networks (UWSNs) gained the attention of researchers due to their substantial applications in various fields. The major application areas of UWSN are environmental monitoring, underwater oil and gas extraction and military surveillance, smart farming, communication, and others. However, UWSNs are also prone to significant...
Article
Full-text available
Considering rising pollution as well as fuel expenses, it has now become critical to transition to a sustainable method of transportation. As a result, automakers have begun to spend on research and development in the electric vehicle (EV) industry. The amount of EVs has expanded rapidly in recent years. This is owing to new improved technology, pa...
Preprint
Full-text available
Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and al...
Preprint
Full-text available
Deep learning is a rapidly growing research area having state of art achievement in various applications including but not limited to speech recognition, object recognition, machine translation, and image segmentation. In the current modern industrial manufacturing system, Machine Health Surveillance System (MHSS) is achieving increasing popularity...
Article
Full-text available
Recently, there is a rapid and wide increase in fake news, defined as provably incorrect information spread with the goal of fraud. The spread of this type of misinformation is a severe danger to social cohesiveness and well-being since it increases political polarisation and people’s distrust of their leaders. Thus, fake news is a phenomenon that...
Article
Full-text available
The phenomenon of Global Software Development (GSD) has attracted the interest of businesses all over the world. It brings together partners from various national and corporate cultures to develop applications with numerous advantages, including access to a vast labor pool, cost savings, and round the clock growth. GSD, on the other hand, is techno...
Article
Full-text available
Predicting student performance for educational organizations such as universities, community colleges, schools, and training centers will enhance the overall results of these organizations. Big data can be extracted from the internal systems of these organizations, such as exam records, statistics about virtual courses, and e-learning systems. Find...
Article
Full-text available
Agricultural food production is projected to be 70% higher by 2050 than it is today, with the world population rising to more than 9 billion, 34% higher than it is now. The farmers have been forced to produce more with the same resources. This pressure means that optimizing productivity is one of the main objectives of the producers but also in a s...
Article
Full-text available
From the past half of a century, identification of the relevant documents is deemed an active area of research due to the rapid increase of data on the web. The traditional models to retrieve relevant documents are based on bibliographic information such as Bibliographic coupling, Co-citations, and Direct citations. However, in the recent past, the...
Article
Full-text available
The need for timely identification of Distributed Denial-of-Service (DDoS) attacks in the Internet of Things (IoT) has become critical in minimizing security risks as the number of IoT devices deployed rapidly grows globally and the volume of such attacks rises to unprecedented levels. Instant detection facilitates network security by speeding up w...
Article
Full-text available
Plant diseases can cause a considerable reduction in the quality and number of agricultural products. Guava, well known to be the tropics’ apple, is one significant fruit cultivated in tropical regions. It is attacked by 177 pathogens, including 167 fungal and others such as bacterial, algal, and nematodes. In addition, postharvest diseases may cau...
Article
Full-text available
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and military are crucial to operational success. Communication and data sharing between these devices have increas...
Article
Full-text available
The Web Search Engine (WSE) is a software system used to retrieve data from the web successfully. WSE uses the user’s search queries to build the user’s profile and provide personalized results. Users’ search queries hold identifiable information that could compromise the privacy of the respective user. This work proposes a multi-group distributed...
Article
Full-text available
The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online. The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it. To aid the law enforcement agencies in curbing the illicit trade of firearms on cryptomarkets, this paper has proposed an automated technique em...
Article
Full-text available
COVID-19 pandemic has unleashed an unprecedented humanitarian crisis in the world at present. With each passing day, the number of patients afflicted with Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is rising at an alarming pace, so much so that some countries are now combating the second wave of the contagion. As the death ratio d...
Article
Full-text available
Online forums have become the main source of knowledge over the Internet as data are constantly flooded into them. In most cases, a question in a web forum receives several responses, making it impossible for the question poster to obtain the most suitable answer. Thus, an important problem is how to automatically extract the most appropriate and h...
Article
Full-text available
Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studie...
Article
Full-text available
Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft...
Article
Full-text available
Data replications effectively replicate the same data to various multiple locations to accomplish the objective of zero loss of information in case of failures without any downtown. Dynamic data replication strategies (providing run time location of replicas) in clouds should optimize the key performance indicator parameters, like response time, re...
Article
Full-text available
In recent years, numerous attempts have been made to enhance the living standard for old-aged people. Ambient Assisted Living (AAL) is an evolving interdisciplinary field aimed at the exploitation of knowledge and communication technology in health and tele-monitoring systems to combat the impact of the growing aging population. AAL systems are des...
Article
Full-text available
In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and tech...
Article
Full-text available
Low heart rate causes a risk of death, heart disease, and cardiovascular diseases. Therefore, monitoring the heart rate is critical because of the heart’s function to discover its irregularity to detect the health problems early. Rapid technological advancement (e.g., artificial intelligence and stream processing technologies) allows healthcare sec...
Article
Full-text available
A high-accuracy gait data prediction model can be used to design prosthesis and orthosis for people having amputations or ailments of the lower limb. The objective of this study is to observe the gait data of different subjects and design a neural network to predict future gait angles for fixed speeds. The data were recorded via a Biometrics goniom...
Article
Full-text available
The web graph can be used to get insight into the internal structure and connectivity of the Tor dark web. This paper analyzes the internal structure of the Tor dark web graph and examines the presence of bow-tie structure as found in the World Wide Web. The web graph is generated from the data collected by the Python crawler customized to scrape d...
Article
Full-text available
Today’s world is increasingly dependent on technology directly or indirectly. The rapid technological advancement has impacted people to adopt the technology. As cryptocurrency recently commenced, few studies have attempted to investigate this use of technology. In this study, the technology readiness aspects- Optimism, Innovativeness, Discomfort,...
Article
Full-text available
Early diagnosis and assessment of fatal diseases and acute infections on chest X-ray (CXR) imaging may have important therapeutic implications and reduce mortality. In fact, many respiratory diseases have a serious impact on the health and lives of people. However, certain types of infections may include high variations in terms of contrast, size a...
Article
Full-text available
Huge data volumes are generated by connected devices, every organization try to make use of its full potential. IoT data is more valuable than ever but without analytic power, data generated by IoT devices and solutions would offer limited added value and insights. We have explored the role of proper data processing and analytics in IoT and find ou...
Article
Full-text available
Nowadays, online product reviews have been at the heart of the product assessment process for a company and its customers. They give feedback to a company on improving product quality, planning, and monitoring its business schemes in order to increase sale and gain more profit. They are also helpful for customers to select the right products in les...
Article
Full-text available
Deep Learning algorithms are becoming common in solving different supervised and unsupervised learning problems. Different deep learning algorithms were developed in last decade to solve different learning problems in different domains such as computer vision, speech recognition, machine translation, etc. In the research field of computer vision, i...
Article
Full-text available
In the digital multimedia era, digital forensics is becoming an emerging area of research thanks to the large amount of image and video files generated. Ensuring the integrity of such media is of great importance in many situations. This task has become more complex, especially with the progress of symmetrical and asymmetrical network structures wh...
Article
Full-text available
In mobile ad hoc networks (MANETs), the topology differs very often due to mobile nodes (MNs). The flat network organization has high topology maintenance messages overload. To reduce this message overload in MANET, clustering organizations are recommended. Grouping MANET into MNs has the advantage of controlling congestion and easily repairing the...
Article
Full-text available
Huge data on the web come from discussion forums, which contain millions of threads. Discussion threads are a valuable source of knowledge for Internet users, as they have information about numerous topics. The discussion thread related to single topic comprises a huge number of reply posts, which makes it hard for the forum users to scan all the r...
Article
Full-text available
With the increased usage of Web 2.0 and data-affluent tools such as social media platforms and web blog services, the challenge of extracting public sentiment and disseminating personal health information has become more common than ever in the last decade. This paper proposes a novel model for Dengue disease detection based on social media posts a...
Article
Full-text available
Background: Healthcare providers working in Saudi Arabia come from various nationalities, cultures, and training backgrounds. This study aimed to assess the perceptions of healthcare providers working in Riyadh hospitals about ethical dilemmas and solutions. Methods: This is a cross-sectional study among physicians working in Riyadh’s private and g...
Article
Full-text available
We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is extremely challenging and important for many applications. The proposed approach involves developing new probabilistic support vector machines (SVMs) kernels from a flexi...
Article
Full-text available
Objective: There are growing concerns about ethical issues in the healthcare system. This study was conducted to determine the nature of common ethical issues faced by healthcare providers in a tertiary-care hospital in KSA. Method: This cross-sectional study comprised a self-administered questionnaire given to the physicians working at King Abd...
Article
Full-text available
Anomaly-based intrusion detection systems (IDSs) have been deployed to monitor network activity and to protect systems and the Internet of Things (IoT) devices from attacks (or intrusions). The problem with these systems is that they generate a huge amount of inappropriate false alarms whenever abnormal activities are detected and they are not too...
Article
Background: The relationship and interactions between physicians and the pharmaceutical industry can affect patient care. A physician's practice can be influenced by this relationship. It is believed that these interactions are common among doctors in Saudi Arabia. Aims: This study was undertaken to assess the frequency of such relationships and...
Article
Full-text available
Background The prevalence of pulmonary non-tuberculous mycobacteria (NTM) disease is increasing worldwide. The aim of this study was to assess the frequency and clinical significance of NTM isolated from respiratory specimens at King Abdul-Aziz Medical City-Riyadh, Saudi Arabia.Method The medical records of all patients who had at least one respira...

Network

Cited By