Abdullah Alzahrani

Abdullah Alzahrani
  • Doctor of Philosophy
  • Assistant professor at Shaqra University, PhD, Vice dean for educational affairs @ College of science and humanities in Al Quwaiiyah at Shaqra University

About

18
Publications
11,743
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
260
Citations
Current institution
Shaqra University
Current position
  • Assistant professor at Shaqra University, PhD, Vice dean for educational affairs @ College of science and humanities in Al Quwaiiyah

Publications

Publications (18)
Article
Full-text available
Access to clean and sufficient water is considered a basic right for humans and other living organisms sharing the environment. However, factors like rapid urban growth, climate change, population increase, and the overproduction of industrial and agricultural goods have contributed to water shortages and quality problems in many communities worldw...
Article
Full-text available
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high-level security is required. Problems arise due to unauthorized use of data in the image. One of the methods used to secure...
Article
Full-text available
Wastewater management is a mechanism that is used to extract and refine pollutants from wastewater or drainage that can be recycled to the water supply with minimal environmental effects. New methods and techniques are required to ensure safe and smart wastewater management systems in smart cities because of the present deteriorating environmental...
Article
Full-text available
Organizations and individuals worldwide are becoming increasingly vulnerable to cyberattacks as phishing continues to grow and the number of phishing websites grows. As a result, improved cyber defense necessitates more effective phishing detection (PD). In this paper, we introduce a novel method for detecting phishing sites with high accuracy. Our...
Article
Full-text available
Skin cancer is one of the most serious forms of the disease, and it can spread to other parts of the body if not detected early. Therefore, it is crucial to diagnose and treat skin cancer patients at an early stage. Due to the fact that a manual diagnosis of skin cancer is both time-consuming and expensive, an incorrect diagnosis is made due to the...
Article
Full-text available
Credit card use poses a significant security issue on a global scale, with rule-based algorithms and traditional anomaly detection being two of the most often used methods. However, they are resource-intensive, time-consuming, and erroneous. Given fewer instances than legal payments, the dataset imbalance has become a serious issue. On the other ha...
Article
Full-text available
Android malware security tools that can swiftly identify and categorize various malware classes to create rapid response strategies have been trendy in recent years. Although many application fields have demonstrated the usefulness of implementing Machine Learning and deep learning methods to provide automation and self-learning services, the scarc...
Article
Full-text available
Skin cancer is one of the most severe forms of the disease, and it can spread to other parts of the body if not detected early. Therefore, diagnosing and treating skin cancer patients at an early stage is crucial. Since a manual skin cancer diagnosis is both time-consuming and expensive, an incorrect diagnosis is made due to the high similarity bet...
Article
Full-text available
Devices which are part of the Internet of Things (IoT) have strong connections; they generate and consume data, which necessitates data transfer among various devices. Smart gadgets collect sensitive information, perform critical tasks, make decisions based on indicator information, and connect and interact with one another quickly. Securing this s...
Article
Full-text available
The coronavirus disease pandemic (COVID-19) is a contemporary disease. It first appeared in 2019 and has sparked a lot of attention in the public media and recent studies due to its rapid spread around the world in recent years and the fact that it has infected millions of individuals. Many people have died in such a short time. In recent years, se...
Article
Full-text available
malware is malicious software (harmful program files) that targets and damage computers, devices, networks, and servers. Many types of malware exist, including worms, viruses, trojan horses, etc. With the increase in technology and devices every day, malware is significantly propagating more and more on a daily basis. The rapid growth in the number...
Article
Full-text available
Information extraction from Arabic tweets has attracted the attention of researchers due to the huge data accessibility for the swift expansion of social media platforms. With the increasing use of social web applications, information extraction from the various platforms has gained importance for understanding the trending post and events predicti...
Article
Full-text available
The reliance on information systems within business in all societies, brings about the need for trust and security in their use. Technology is considered to be the foundation for securing such systems. However, technology alone is not enough, since users make mistakes, both in unwittingly and intentionally, which is why there is a need for well-def...
Article
Full-text available
Ministries of Education are integrating different Learning Management Systems (LMS) to enhance teaching and learning during the lockdown to avoid academic loss. The key factor for delivering a high-quality education through LMS platforms is teachers' acceptance and adoption of the platform. Madrasati platform (which means My school) was introduced...
Article
Full-text available
E-learning is an essential approach, and one which complements the traditional teaching approach. The use of e-learning has increased due to the rapid development of Information and Communication Technology (ICT). This growth has encouraged many institutions to adopt e-learning and use it to train, teach, and deliver learning to students. However,...
Conference Paper
E learning is an essential approach, and one which complements the traditional teaching approach. The use of e learning has increased due to the rapid development of Information and Communication Technology (ICT). This growth has encouraged many institutions to adopt e learning and use it to train, teach, and deliver learning to students. Howeve...
Conference Paper
Full-text available
E learning is an essential approach, and one which complements the traditional teaching approach. The use of e learning has increased due to the rapid development of Information and Communication Technology (ICT). This growth has encouraged many institutions to adopt e learning and use it to train, teach, and deliver learning to students. However,...
Article
Full-text available
In the last few years, the cloud-computing paradigm experienced a considerable growth, making it the de-facto technology fueling almost all major online services. Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in...

Questions

Questions (3)
Question
Has anyone come across questions that could be used to measure 'user interface language' as a factor in a framework for IT acceptance?
Question
I'm looking for a references that provide an answer to the following question: 
What is the minimum number of game elements that is required to call an e-learning system "A gamified e-learning system"?
Thanks
Question
Hi,
Can I measure the motivation of students by asking direct questions such as 'The use of the system has motivated me' or do I need to use one of the motivation theories such as Theories of Motivation and ARCS model?
Thanks

Network

Cited By