الابحاث العلمية

مجالات البحث الرئيسية

  

الإنتاج العلمي لأعضاء قسم هندسة الحاسب الآلي والشبكات

Google Scholar Papper Title Name No

https://scholar.google.com/citations?user=_WFzKc0AAAAJ&hl=en

Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications

 

SBXception: A Shallower and Broader Xception Architecture for Efficient Classification of Skin Lesions

 

A systematic analysis of deep learning methods and potential attacks in internet-of-things surfaces

 

Adversarial Approaches to Tackle Imbalanced Data in Machine Learning

 

A Novel Computer Assisted Genomic Test Method to Detect Breast Cancer in Reduced Cost and Time Using Ensemble Technique

 

Interoperability Requirements for Blockchain-Enabled Electronic Health Records in Healthcare: A Systematic Review and Open

Research Challenges

Dr.Abdoh Jabbari

1

https://scholar.google.com/citations?user=JgkX1dsAAAAJ&hl=ar&oi=ao

ELSA: Energy-Efficient Linear Sensor Architecture for Smart City Applications

 

Blockchain-Based Framework for Interoperable Electronic Health Records for an Improved Healthcare System

An Overview of Vehicle OBD-II Port Countermeasures‏

Dr. Abdulmalik Humayed

2

https://scholar.google.com/citations?hl=en&view_op=list_works&gmla=AJsN-F6yVFMVpw1Vu7atjn34v6HeDfgHjAKbQczd_ZbVqflkjpIJNaaBgOPIb1hhg1sXrqJoNge_qNXXOkJUn0mwtHPQUnQyJQ&user=898JNcwAAAAJ

Effects of User Equipment and Integrated Access and Backhaul Schedulers on the Throughput of 5G Millimeter-Wave Networks

 

Enhancing Vehicular Ad Hoc Network (VANET) Protocols

Validation of VANET message dissemination algorithms otherwise

vulnerable to broadcast storms in urban contexts

Cluster Merging Scheme in VANETs

 

Clusters Merging and Forwarding Schemes in Vehicular Ad Hoc

Networks on Highway and Urban Scenarios

Dr.Osama AlQahtani

3

 

https://scholar.google.com.au/citations?hl=en&user=xkCEiEEAAAAJ&view_op=list_works&sortby=pubdate

Acknowledgment to Reviewers of Sensors in 2021

Aircraft classification based on PCA and feature fusion techniques in convolutional neural network

Dr.Mohammed Y Aalsalem

4

https://scholar.google.com/citations?user=ptZY3ckAAAAJ&hl=en&oi=ao

PAPR reduction in multicarrier modulation techniques based visible light communication systems

PAPR Reduction in DCO-OFDM Based WDM VLC

 

PAPR Reduction in PAM-DMT based WDM VLC

 

PAPR Reduction in DCO-OFDM and PAM-DMT Based VLC Systems

Dr. Hussien Alrakah

5

https://scholar.google.com/citations?user=EYSLdZAAAAAJ&hl=ar

novel HEOMGA approach for class imbalance problem in the

application of customer churn

Voice Spoofing Countermeasure for Logical Access Attacks

Detection

Retinal Vessel Extraction via Assisted Multi-Channel Feature Map

and U-Net

A Comparative Study for Predicting Burned Areas of a Forest Fire

Using Soft Computing Techniques

Remote Patient Monitoring: Data Sharing and Prediction Using

Machine Learning

An efficient Trust Management Technique using ID3 Algorithm

with Blockchain in Smart building and IoT

Pandemic disease detection through wireless communication using

infrared image based on deep learning

 

Dr.Mohammed Hameed Alhameed

6

https://scholar.google.com/citations?user=HB8gp1UAAAAJ&hl=en&oi=ao

IWQP4Net: An Efficient Convolution Neural Network for Irrigation Water Quality Prediction

An efficient parallel reptile search algorithm and snake optimizer approach for feature selection

 

An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection

Dr. Salahaldeen Duraibi

7

https://scholar.google.com/citations?hl=ar&user=AzkFg6QAAAAJ

LoRaWAN-implemented node localisation in a sandstorm

environment based on received signal strength indicator

Dr. Ibrahim Aqeel

8

https://scholar.google.com/citations?hl=en&user=xIBysKoAAAAJ&view_op=list_works&sortby=pubdate

A Multidimensional Blockchain Framework For Mobile Internet of Things

Dr. Hussein Zangoti

9

https://scholar.google.com/citations?user=i9eJijUAAAAJ&hl=en

Countering Concurrent Login Attacks in “Just Tap” Push-based Autantication: A Redesign and Usability Evaluations

Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications

Two-factor password-autanticated key exchange with end-to-end security

A hidden-password online password manager

On the Security and Usability of New Paradigms of Web Authentication

Analyzing teh Security of OTP 2FA in teh Face of Malicious Terminals

Dr.Mohammed Jubur

10
 

Energy Minimized Federated Fog Computing over Passive Optical Networks

 

Energy Efficient Resource Allocation in Federated Fog Computing Networks

Dr.Abdullah M. Alqahtani

11

https://scholar.google.com/citations?user=zcyUMXUAAAAJ&hl=en

Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study.

Mobile Edge Computing: Security and privacy issues, challenges

and countermeasures

Blockchain Framework for Secure COVID-19 Pandemic Data

Handling and Protection.

Recent Privacy and Security Issues in Internet of Things Network Layer: A Systematic Review

 

IoT and Blockchain Integration Challenges

Mr.Malik Zaib Alam

12

https://scholar.google.com/citations?user=jc_aaUkAAAAJ&hl=en

IoT based cost-effective smart parking system

 

A Systematic Review of the Future of Education in Perspective of Block Chain

 

Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications

 

Interference Limited Area based Resource Allocation for Device-to-Device Communication in an Underlaying Cellular Network

 

Blockchain for 5G-Enabled IoHT—A Framework for Secure

Healthcare Automation

 

ETMA: Efficient Transformer-Based Multilevel Attention Framework for Multimodal Fake News Detection

 

Significance of Internet-of-Things Edge and Fog Computing in Education Sector

 

IoT Edge and Fog Computing Architecture for Educational Systems in Universities

 

Software Requirement Ambiguity Avoidance Framework (SRAAF) for Selecting Suitable Requirement Elicitation Techniques for Software Projects

Mr.Haneef Khan

13

https://scholar.google.com/citations?user=T4jhEMQAAAAJ&hl=en

A modified Smell Agent Optimization for Global Optimization and Industrial Engineering Design Problems

 

Artificial Ecosystem-Based Optimization with Dwarf Mongoose Optimization for Feature Selection and Global Optimization Problems

IWQP4Net: An Efficient Convolution Neural Network for Irrigation Water Quality Prediction

 

A Comparative Study for Predicting Burned Areas of a Forest Fire Using Soft Computing Techniques

Boosting Ant Colony Optimization with Reptile Search Algorithm for Churn Prediction

An efficient parallel reptile search algorithm and snake optimizer approach for feature selection

Colonial competitive evolutionary Rao algorithm for optimal engineering design

A Deep Batch Normalized Convolution Approach for Improving COVID-19 Detection from Chest X-ray Images

Machine Learning Predictive Models for Coronary Artery Disease. SN Computer Science, 2(5), 1-11.

Mr.Ibrahim Al-Shourbaji

14
 

Design of a Novel Edge-Centric Cloud Architecture for m-Learning Performance Effectiveness by Leveraging Distributed Computing Paradigms’ Potentials

 

Relay Node-Based Routing Algorithm for Reducing Latency in Industrial Mobile Communication Network

 

Minimized Computations of Deep Learning Technique for Early Diagnosis of Diabetic Retinopathy using IoT-based Medical Devices

 Mobile learning new trends in emerging computing paradigms: An analytical approach seeking performance efficiency

Enhanced Algorithmic Modelling and Architecture in Deep Reinforcement Learning Based on wireless communication Fintech Technology

Mobile learning evolution and emerging computing paradigms: An edge-based cloud architecture for reduced latencies and quick response time

Determining Mobile Learning Potentialities in Emerging Computing Paradigms: an Exploratory Approach for Performance Optimization.

 

Mr.Mohiuddin Ali Khan

15

https://scholar.google.com/citations?user=VsWSLgsAAAAJ&hl=en&oi=ao

IoT based cost-effective smart parking system

Blockchain for 5G-Enabled IoHT—A Framework for Secure

Healthcare Automation

Prediction of Compressive Strength of Geopolymer Concrete by Using Random Forest Algorithm

Unbalanced Credit Card Fraud Detection Data: A Machine

Learning-Oriented Comparative Study of Balancing Techniques

IoT Edge and Fog Computing Architecture for Educational Systems in Universities

Multi-View Clustering Based on Multiple Manifold Regularized

Non-Negative Sparse Matrix Factorization

Mobile Edge Computing: Security and privacy issues, challenges

and countermeasures

Mr.Mohammad Rafeek Khan

16

https://scholar.google.com/citations?hl=en&user=08-SZTEAAAAJ

Cataract eye detection by optik image analysis using encoder basis Boltzmann architecture integrated with internet of things and data mining

 

MRI-Based Effective Ensemble Frameworks for Predicting Human Brain Tumor

 

Analysis of Receive Signal Strength Indicator (RSSI) on Pulse Oximetry Data Delivery via Bluetooth Low Energy (BLE)

 

Sustainable electric vehicles fault detection based on monitoring by deep Learning Architectures in feature extraction and classification

 

Generating Image Captions Using Bahdanau Attention Mechanism

and Transfer Learning

 

Intelligent -Based Ensemble Deep Learning Model for Security

Improvement in Real-Time Wireless Communication

 

Minimized Computations of Deep Learning Technique for Early Diagnosis of Diabetic Retinopathy Using IoT-Based Medical

Devices

 

Blockchain Framework for Secure COVID-19 Pandemic Data

Handling and Protection

Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records

Interoperability Requirements for Blockchain-Enabled Electronic

Health Records in Healthcare: A Systematic Review and Open Research Challenges

A MACHINE LEARNING IMPLEMENTED SYSTEM AND METHOD FOR CORONA RECOGNITION BASED ON VISIBLE

LIGHT COLOR

Mr.Faheem Reegu

17

https://scholar.google.com/citations?user=kuTesFAAAAAJ&hl=en

IoT based cost-effective smart parking system

A Systematic Review of the Future of Education in Perspective of Block Chain

Blockchain for 5G-Enabled IoHT—A Framework for Secure

Healthcare Automation

IoT and Blockchain Integration Challenges

 

A review of deep neural network-based uncertainty quantification

methods for the classification of breast cancer

Mobile Edge Computing: Security and privacy issues, challenges

and countermeasures

Mr.Mohammad Imran Alam

18

https://scholar.google.com/citations?user=zL3pTpsAAAAJ&hl=en

Cataract eye detection by optik image analysis using encoder basis Boltzmann architecture integrated with internet of things and data mining

 

5G-Enabled Smart Devices and Multi-access Edge Computing for Improving the Healthcare System

 

IoT and Blockchain Integration Challenges

 

Mobile Edge Computing: Security and privacy issues, challenges and countermeasures

Mr.Sarfaraz Ahmed

19

https://scholar.google.com/citations?user=0A8sr6UAAAAJ&hl=en

Cataract eye detection by optik image analysis using encoder basis Boltzmann architecture integrated with internet of things and data mining

 

 

Mobile Edge Computing: Security and privacy issues, challenges

and countermeasures

Mr.Arshad Ahmad Dar

20

https://scholar.google.com/citations?user=LlGNG2UAAAAJ&hl=en

Cataract eye detection by optik image analysis using encoder basis Boltzmann architecture integrated with internet of things and data mining

 

Recent Privacy and Security Issues in Internet of Things Network

Layer: A Systematic Review

Mr.Wasim Ahmad Bhat

21
 

Cataract eye detection by optik image analysis using encoder basis Boltzmann architecture integrated with internet of things and data mining

 

 

Blockchain Framework for Secure COVID-19 Pandemic Data

Handling and Protection.

Mr.Adeel ahmad

22

https://scholar.google.com/citations?user=friUdw8AAAAJ&hl=en

Deep Learning Based Detection and Classification of Anomaly

Texts in Social Media

 

 

A smart healthcare system for measuring and monitoring psychophysiological parameters in humans

Mr.Mohammed ali sohail

23
  The COVID-19: Saudi Government's Comprehensive Guide to Safety Measures Analysis with Big Data

Mr.Mr. Syed Ameen Quadri

24

https://scholar.google.com/citations?user=JFQO7FIAAAAJ

A hybrid encryption system for communication and financial

transactions using RSA and a novel symmetric key algorithm

A Study Examining the Effectiveness of Artificial Intelligence in Predicting Human Behavior Changes in Their Lifestyle of Post

Covid Exposure

 

The COVID-19: Saudi Government's Comprehensive Guide to

Safety Measures Analysis with Big Data

Mr.Prakash kuppuswamy

25

https://scholar.google.com/citations?user=mbgGzvcAAAAJ&hl=en

Cataract eye detection by optik image analysis using encoder basis Boltzmann architecture integrated with internet of things and data mining

Mr.Asif Ali Khan

26

https://scholar.google.com/citations?user=Zn27QC4AAAAJ&hl=en

"Machine Learning Applications in Wireless Sensor Networks: A Review", International Journal of Science & Engineering Development Research

Mr.Phiros Mansur

27

الفريق البحثي في هندسة الحاسب الآلي والشبكات

Group-1

IoT

Group-2

IoT/Blockchain

Group-3

IoT/Blockchain

Group-4

Machine Learning

 

Group-5

Machine Learning

Group-6

Machine Learning/Cloud Computing

Dr.Hussain AlRakah

Dr. Ibrahim Aqeel

Mr. Asif Ali Khan

Mr. Adeel

Dr. Abdullah

 

 

Dr.Abdul Malik

Mr. Fahad Mafa

Mr. Haneef Khan

Mr. Mohammad Alam

Mr. Malik Zaib

 

Dr.Jaboor

Dr. Hussain Zangoti

Mr. Faheem Reegu

Mr. Arshad Ahmad Dar

Mr. Sarfaraz Wahaj

 

Dr.Salah

Mr. Ibrahim Alshorbaji

Mr. Rizwan

Dr.Mohammad AL-Hameed

Mr. Ali Athathi

Mr. Mohiuddin Ali Khan

Mr. Mohammad Rafeeq Khan

 

Dr.Osama

Mr. Sohail

Mr. Mustafa

Dr.Abdullah

 

أخر تعديل
الثلاثاء 25 ربيع الأول 1445
هل كانت هذه الصفحة مفيدة؟
من فضلك أخبرنا بالسبب(يمكنك تحديد خيارات متعددة)
أنـا
من فضلك أخبرنا بالسبب(يمكنك تحديد خيارات متعددة)
أنا