Abdelzahir Abdelmaboud

Abdelzahir Abdelmaboud
  • Doctor of Philosophy
  • Professor (Assistant) at King Khalid University

Associate Professor King Khalid University

About

71
Publications
23,445
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,174
Citations
Current institution
King Khalid University
Current position
  • Professor (Assistant)

Publications

Publications (71)
Article
Full-text available
Localization is crucial in wireless sensor networks for various applications, such as tracking objects in outdoor environments where GPS (Global Positioning System) or prior installed infrastructure is unavailable. However, traditional techniques involve many anchor nodes, increasing costs and reducing accuracy. Existing solutions do not address th...
Article
Full-text available
This manuscript proposes an automatic reading detection system for an analogue gauge using a combination of deep learning, machine learning, and image processing. The study suggests image-processing techniques in manual analogue gauge reading that include generating readings for the image to provide supervised data to address difficulties in unsupe...
Article
Infectious disease is a particular type of disorder triggered by organisms and transmitted directly or indirectly from an infected one like COVID-19. The global economy and public health are immensely affected by COVID-19, a recently emerging infectious disease. Artificial Intelligence can be helpful to predict the severity rating of COVID-19 which...
Article
Full-text available
Objective The modern era of cognitive intelligence in clinical space has led to the rise of ‘Medical Cognitive Virtual Agents’ (MCVAs) which are labeled as intelligent virtual assistants interacting with users in a context-sensitive and ambient manner. They aim to augment users' cognitive capabilities thereby helping both patients and medical exper...
Article
Full-text available
The proliferation of the Internet of Things (IoT) devices has led to a surge in Internet traffic characterized by variabilities in Quality of Service (QoS) demands. Managing these devices and traffic effectively proves challenging, particularly within conventional IoT network architectures lacking centralized management. However, the advent of Soft...
Article
Full-text available
With the rapid development of Internet of Things (IoT) technology, Terminal Devices (TDs) are more inclined to offload computing tasks to higher-performance computing servers, thereby solving the problems of insufficient computing capacity and rapid battery consumption of TD. The emergence of Multi-access Edge Computing (MEC) technology provides ne...
Article
Full-text available
The democratic welfare government is equally committed to quality-driven, impartial, and egalitarian education. The major contribution of this study is to examine the problems and opportunities posed by the incorporation of digital technology in the classroom via the lens of Classroom 4.0 (CLSR4) and education 4.0. The commitment of the democratic...
Article
Full-text available
Software Defined Networks (SDN) offer dynamic reconfigurability and scalability, revolutionizing traditional networking. However, countering Distributed Denial of Service (DDoS) attacks remains a formidable challenge for both traditional and SDN-based networks. The integration of Machine Learning (ML) into SDN holds promise for addressing these thr...
Article
The Internet of Things has a bootloader and applications responsible for initializing the device’s hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digi...
Article
Full-text available
Software-defined networking (SDN) is a networking architecture with improved efficiency achieved by moving networking decisions from the data plane to provide them critically at the control plane. In a traditional SDN, typically, a single controller is used. However, the complexity of modern networks due to their size and high traffic volume with v...
Article
The correction of grammatical errors in natural language processing is a crucial task as it aims to enhance the accuracy and intelligibility of written language. However, developing a grammatical error correction (GEC) framework for low-resource languages presents significant challenges due to the lack of available training data. This article propo...
Article
Full-text available
Due to the rapid propagation characteristic of the Coronavirus (COVID-19) disease, manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of infection. Despite, new automated diagnostic methods have been brought on board, particularly methods based on artificial intelligence using different medical da...
Article
Full-text available
Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of...
Article
Full-text available
A significant majority of the population in India makes their living through agriculture. Different illnesses that develop due to changing weather patterns and are caused by pathogenic organisms impact the yields of diverse plant species. The present article analyzed some of the existing techniques in terms of data sources, pre-processing technique...
Article
Full-text available
The computational complexity of resource allocation processes, in cognitive radio networks (CRNs), is a major issue to be managed. Furthermore, the complicated solution of the optimal algorithm for handling resource allocation in CRNs makes it unsuitable to adopt in real-world applications where both cognitive users, CRs, and primary users, PUs, ex...
Article
Full-text available
New technologies drive educational shifts, transforming offline to online learning. This study investigates e-learning and cloud computing integration to understand synergies and their potential impact. The study addresses two primary research questions: the influence of e-learning on factors like architecture, software, performance, security, hard...
Article
Full-text available
Crypto-ransomware attacks pose a significant cyber threat due to the irreversible effect of encryption employed to deny access to the data on the victim’s device. Existing state-of-the-art solutions are developed based on two assumptions: the availability of sufficient data to perform detection during the pre-encryption phase, and that ransomware b...
Article
Full-text available
Regression testing is a widely used approach to confirm the correct functionality of the software in incremental development. The use of test cases makes it easier to test the ripple effect of changed requirements. Rigorous testing may help in meeting the quality criteria that is based on the conformance to the requirements as given by the intended...
Article
Full-text available
University timetabling problems are a yearly challenging task and are faced repeatedly each semester. The problems are considered non-polynomial time (NP) and combinatorial optimization problems (COP), which means that they can be solved through optimization algorithms to produce the aspired optimal timetable. Several techniques have been used to s...
Article
Full-text available
Vector control schemes have recently been used to drive linear induction motors (LIM) in high-performance applications. This trend promotes the development of precise and efficient control schemes for individual motors. This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulatio...
Article
Full-text available
Wireless Body Area Network (WBAN) is a special purpose wireless sensors network designed to connect various self-autonomous medical sensors and appliances located inside and outside of human body. Interests in human Healthcare Monitoring System (HMS) are based on WBAN due to the increasing aging population and chronically ill patients at home. HMS...
Article
Full-text available
Multi-focus image fusion (MIF) uses fusion rules to combine two or more images of the same scene with various focus values into a fully focused image. An all-in-focus image refers to a fully focused image that is more informative and useful for visual perception. A fused image with high quality is essential for maintaining shift-invariant and direc...
Article
Full-text available
Internet availability and its integration with smart technologies have favored everyday objects and things and offered new areas, such as the Internet of Things (IoT). IoT refers to a concept where smart devices or things are connected and create a network. This new area has suffered from big data handling and security issues. There is a need to de...
Article
Full-text available
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with the increase in the number of IoT applications and devices globally. To address routing attacks in RPL-based IoT, several security solutions have been proposed in literat...
Article
Full-text available
Requirement elicitation represents one of the most vital phases in information system (IS) and software development projects. Selecting suitable elicitation techniques is critical for eliciting the correct specification in various projects. Recent studies have revealed that improper novice practices in this phase have increased the failure rate in...
Article
Full-text available
Green communications have witnessed significant attention being paid to the next generation of wireless systems research and development. This is due to growing use of sensor- and battery-oriented smart wireless devices. The related literature in green communications for next-generation wireless systems majorly relies on transmission and sensing po...
Article
Full-text available
Unmanned Aerial Vehicle (UAV) deployment and placement are largely dependent upon the available energy, feasible scenario, and secure network. The feasible placement of UAV nodes to cover the cellular networks need optimal altitude. The under or over-estimation of nodes’ air timing leads to of resource waste or inefficiency of the mission. Multiple...
Article
Full-text available
Tuberculosis (TB) is a communicable pulmonary disorder and countries with low and middle-income share a higher TB burden as compared to others. The year 2020–2021 universally saw a brutal pandemic in the form of COVID-19, that crushed various lives, health infrastructures, programs, and economies worldwide at an unprecedented speed. The gravity of...
Article
Full-text available
In recent days, internet of things is widely implemented in Wireless Sensor Network (WSN). It comprises of sensor hubs associated together through the WSNs. The WSN is generally affected by the power in battery due to the linked sensor nodes. In order to extend the lifespan of WSN, clustering techniques are used for the improvement of energy consum...
Article
Full-text available
Cyber-Physical System (CPS) involves the combination of physical processes with computation and communication systems. The recent advancements made in cloud computing, Wireless Sensor Network (WSN), healthcare sensors, etc. tend to develop CPS as a proficient model for healthcare applications especially, home patient care. Though several techniques...
Article
Full-text available
[Context and Motivation] Before eliciting and gathering requirements for a software project, it is considered pivotal to know about concerned stakeholders. It becomes hard to elicit the actual system requirements without identifying relevant stakeholders, leading the software project to failure. Despite the paramount importance of stakeholder ident...
Article
Full-text available
Internet of Things (IoT) with e-learning is widely employed to collect data from various smart devices and share it with other ones for efficient e-learning applications. At the same time, machine learning (ML) and data mining approaches are presented for accomplishing prediction and classification processes. With this motivation, this study focuse...
Article
Full-text available
In agriculture, rice plant disease diagnosis has become a challenging issue, and early identification of this disease can avoid huge loss incurred from less crop productivity. Some of the recently-developed computer vision and Deep Learning (DL) approaches can be commonly employed in designing effective models for rice plant disease detection and c...
Article
Full-text available
Generally, software testing is considered as a proficient technique to achieve improvement in quality and reliability of the software. But, the quality of test cases has a considerable influence on fault revealing capability of software testing activity. Test Case Prioritization (TCP) remains a challenging issue since prioritizing test cases is uns...
Article
Full-text available
Line-of-sight clarity and assurance are essential because they are considered the golden rule in wireless network planning, allowing the direct propagation path to connect the transmitter and receiver and retain the strength of the signal to be received. Despite the increasing literature on the line of sight with different scenarios, no comprehensi...
Article
Full-text available
The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as well as trustworthiness, are all i...
Article
Full-text available
The Smart City concept revolves around gathering real time data from citizen, personal vehicle, public transports, building, and other urban infrastructures like power grid and waste disposal system. The understandings obtained from the data can assist municipal authorities handle assets and services effectually. At the same time, the massive incre...
Research
The research community has well recognized the importance of requirement elicitation. Recent research has shown the continuous decreasing success rate of IS projects in the last five years due to the complexity of the requirement conflict refinement process. Requirement conflict is at the heart of requirement elicitation. It is also considered the...
Article
Full-text available
The rapid advancement in the area of the Internet of Vehicles (IoV) has provided numerous comforts to users due to its capability to support vehicles with wireless data communication. The exchange of information among vehicle nodes is critical due to the rapid and changing topologies, high mobility of nodes, and unpredictable network conditions. Fi...
Article
Full-text available
Although numerous case studies have determined the critical success factors (CSFs) for enterprise resource planning (ERP) during adoption and implementation stages, empirical investigations of CSFs for ERP in post-implementation stages (after going live) are in scarcity. As such, this study examined the influence of top management support and vendo...
Article
Full-text available
Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor’s cloud platform instead of an on-premises network, enabling companies to connect through the Internet. The goal of this study was to rank and prioritise the factors driving cloud ERP adoption by organisations and to identify the critical issues in terms of sec...
Article
Full-text available
Rock-fall is a natural threat resulting in many annual economic costs and human casualties. Constructive measures including detection or prediction of rock-fall and warning road users at the appropriate time are required to prevent or reduce the risk. This article presents a hybrid early warning system (HEWS) to reduce the rock-fall risks. In this...
Article
Full-text available
The use of unmanned aerial vehicles or drones are a valuable technique in coping with issues related to life in the general public’s daily routines. Given the growing number of drones in low-altitude airspace, linking drones to form the Internet of drones (IoD) is a highly desirable trend to improve the safety as well as the quality of flight. Howe...
Article
Full-text available
Wireless Sensor Networks (WSNs) have gained great significance from researchers and industry due to their wide applications. Energy and resource conservation challenges are facing the WSNs. Nevertheless, clustering techniques offer many solutions to address the WSN issues, such as energy efficiency, service redundancy, routing delay, scalability, a...
Article
Due to the rapid increase in the exchange of text information via internet networks, the security and the reliability of digital content have become a major research issue. The main challenges faced by researchers are authentication, integrity verification, and tampering detection of the digital contents. In this paper, a Robust English Text Waterm...
Article
Full-text available
In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alph...
Article
Full-text available
Text information depends primarily on natural languages processing. Improving the security and usability of text information shared through the public internet has therefore been the most demanding problem facing researchers. In contact and knowledge sharing through the Internet, the authentication of content and the identification of digital conte...
Article
Full-text available
The rock-fall is a natural hazard that results in many economic damages and human losses annually, and thus proactive policies to prevent rock-fall hazard are needed. Such policies require predicting the rock-fall occurrence and deciding to alert the road users at the appropriate time. Thus, this study develops a rock-fall early warning system base...
Article
Full-text available
Peer-to-Peer (P2P) electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer. It also decreases the quantity of line loss incurred in Smart Grid (SG). But, uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer. In recent ti...
Article
Full-text available
Analogy-Based Estimation (ABE) is one of the promising estimation models used for predicting the software development effort. Researchers proposed different variants of the ABE model, but still, the most suitable procedure could not be produced for accurate estimation. In this study, an artificial Bee colony guided Analogy-Based Estimation (BABE) m...
Chapter
Plagiarism is to steal others’ work using their words directly or indirectly without a credit citation. Copying others’ ideas is another type of plagiarism that may occur in many areas but the most serious one is the academic plagiarism. Academic misconduct forms high-profile plagiarism cases at universities. Therefore, technical solutions are stri...
Article
Full-text available
The exponential growth in the number of smart devices connected to the Internet of Things (IoT), and associated with various IoT-based smart applications and services, raises interoperability challenges which could affect the sustainability of IoT services. IoT software applications are built using different software platforms and embedded in diver...
Chapter
This paper focuses on online computer laboratories and traditional computer laboratories attempting to improve the academic performance of students’ practical skills. It also explores the differences of participants in online computer laboratory compared to traditional stated laboratory. The method used is a laboratory experiment with two groups. T...
Conference Paper
Full-text available
Recently, there is high rate of rock fall risk that affecting road, railways, people and forest. Studies with different methods have been developed to deal with risk analysis and early warning system. This paper proposed one of the modern emerge technology based on hybrid system of computer vision and control theory. The system works as a real-time...
Article
Full-text available
This paper provided a general study of Wireless Body Area Network (WBAN) in health monitoring system as well as the study of the application of wearable and implanted Bio-Medical-Sensors (BMS) which are used to monitor the vital signs of a patient in early detection. Energy efficiency is a significant issue in WBAN which can be achieved by reducing...
Article
Full-text available
This paper aims to identify the most important and significant factors in two different areas of learning: combined and traditional learning. Several critical issues have not yet been resolved to achieve the full potential of the learning outcomes in the two domains. The objective of this paper is to review the critical factors that have a great in...
Article
Context: Developments in cloud computing have made it attractive for consumers to migrate their applications to the cloud environment. However, in the crowded cloud market, application customers and providers face the problem of how to assess and choose appropriate service providers for migrating their applications to the cloud. Objective: The main...
Article
Context: Cloud computing is a new computing technology that provides services to consumers and businesses. Due to the increasing use of these services, the quality of service (QoS) of cloud computing has become an important and essential issue since there are many open challenges which need to be addressed related to trust in cloud services. Many r...
Article
Full-text available
In the last few years, component-based software has gained widespread notice and acceptance as a method that facilitates the development of existing large, complex, and very critical systems by integrating prefabricated small pieces of software called components. Component integration becomes an essential stage in the component-based software devel...
Conference Paper
Recently, component-based software has earned widespread notice and acceptance as a method that facilitates the development of today's large, complex and very critical systems by integrating prefabricated small pieces of software called components or COTS. Components integration becomes an essential stage in the component-based software development...
Chapter
Cloud computing has become more attractive for consumers to migrate their applications to the cloud environment. However, because of huge cloud environments, application customers and providers face the problem of how to assess and make decisions to choose appropriate service providers for migrating their applications to the cloud. Many approaches...

Network

Cited By