About
18
Publications
11,743
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
260
Citations
Introduction
Publications
Publications (18)
Access to clean and sufficient water is considered a basic right for humans and other living organisms sharing the environment. However, factors like rapid urban growth, climate change, population increase, and the overproduction of industrial and agricultural goods have contributed to water shortages and quality problems in many communities worldw...
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high-level security is required. Problems arise due to unauthorized use of data in the image. One of the methods used to secure...
Wastewater management is a mechanism that is used to extract and refine pollutants from wastewater or drainage that can be recycled to the water supply with minimal environmental effects. New methods and techniques are required to ensure safe and smart wastewater management systems in smart cities because of the present deteriorating environmental...
Organizations and individuals worldwide are becoming increasingly vulnerable to cyberattacks as phishing continues to grow and the number of phishing websites grows. As a result, improved cyber defense necessitates more effective phishing detection (PD). In this paper, we introduce a novel method for detecting phishing sites with high accuracy. Our...
Skin cancer is one of the most serious forms of the disease, and it can spread to other parts of the body if not detected early. Therefore, it is crucial to diagnose and treat skin cancer patients at an early stage. Due to the fact that a manual diagnosis of skin cancer is both time-consuming and expensive, an incorrect diagnosis is made due to the...
Credit card use poses a significant security issue on a global scale, with rule-based algorithms and traditional anomaly detection being two of the most often used methods. However, they are resource-intensive, time-consuming, and erroneous. Given fewer instances than legal payments, the dataset imbalance has become a serious issue. On the other ha...
Android malware security tools that can swiftly identify and categorize various malware classes to create rapid response strategies have been trendy in recent years. Although many application fields have demonstrated the usefulness of implementing Machine Learning and deep learning methods to provide automation and self-learning services, the scarc...
Skin cancer is one of the most severe forms of the disease, and it can spread to other parts of the body if not detected early. Therefore, diagnosing and treating skin cancer patients at an early stage is crucial. Since a manual skin cancer diagnosis is both time-consuming and expensive, an incorrect diagnosis is made due to the high similarity bet...
Devices which are part of the Internet of Things (IoT) have strong connections; they generate and consume data, which necessitates data transfer among various devices. Smart gadgets collect sensitive information, perform critical tasks, make decisions based on indicator information, and connect and interact with one another quickly. Securing this s...
The coronavirus disease pandemic (COVID-19) is a contemporary disease. It first appeared in 2019 and has sparked a lot of attention in the public media and recent studies due to its rapid spread around the world in recent years and the fact that it has infected millions of individuals. Many people have died in such a short time. In recent years, se...
malware is malicious software (harmful program files) that targets and damage computers, devices, networks, and servers. Many types of malware exist, including worms, viruses, trojan horses, etc. With the increase in technology and devices every day, malware is significantly propagating more and more on a daily basis. The rapid growth in the number...
Information extraction from Arabic tweets has attracted the attention of researchers due to the huge data accessibility for the swift expansion of social media platforms. With the increasing use of social web applications, information extraction from the various platforms has gained importance for understanding the trending post and events predicti...
The reliance on information systems within business in all
societies, brings about the need for trust and security in their use.
Technology is considered to be the foundation for securing such
systems. However, technology alone is not enough, since users
make mistakes, both in unwittingly and intentionally, which is
why there is a need for well-def...
Ministries of Education are integrating different Learning Management Systems (LMS) to enhance teaching and learning during the lockdown to avoid academic loss. The key factor for delivering a high-quality education through LMS platforms is teachers' acceptance and adoption of the platform. Madrasati platform (which means My school) was introduced...
E-learning is an essential approach, and one which complements the traditional teaching approach. The use of e-learning has increased due to the rapid development of Information and Communication Technology (ICT). This growth has encouraged many institutions to adopt e-learning and use it to train, teach, and deliver learning to students. However,...
E learning is an essential approach, and one which complements the traditional teaching
approach. The use of e learning has increased due to the rapid development of Information
and Communication Technology (ICT). This growth has encouraged many institutions to
adopt e learning and use it to train, teach, and deliver learning to students. Howeve...
E learning is an essential approach, and one which complements the traditional teaching
approach. The use of e learning has increased due to the rapid development of Information and Communication Technology (ICT). This growth has encouraged many institutions to adopt e learning and use it to train, teach, and deliver learning to students. However,...
In the last few years, the cloud-computing paradigm experienced a considerable growth, making it the de-facto technology fueling almost all major online services. Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in...
Questions
Questions (3)
Has anyone come across questions that could be used to measure 'user interface language' as a factor in a framework for IT acceptance?
I'm looking for a references that provide an answer to the following question:
What is the minimum number of game elements that is required to call an e-learning system "A gamified e-learning system"?
Thanks
Hi,
Can I measure the motivation of students by asking direct questions such as 'The use of the system has motivated me' or do I need to use one of the motivation theories such as Theories of Motivation and ARCS model?
Thanks