Abrar Alajlan

Abrar Alajlan
King Saud University | KKUH · Self-Development Skills Department

About

19
Publications
19,052
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
135
Citations
Education
January 2012 - January 2015
University of Bridgeport
Field of study
  • Computer Science
August 2009 - July 2011
Troy University
Field of study
  • MBA-Information Systems
June 2004 - June 2008
Umm Al-Qura University
Field of study
  • Computer Science

Publications

Publications (19)
Article
Full-text available
Cloud computing is one example of a technological revolution that has drastically altered the way traditional commercial operations are conducted. Because cloud platforms are fundamentally revolutionizing the area of computing, they must provide safe transmission and storage of user data by assuring the confidentiality, integrity, and availability...
Article
Full-text available
Lane detection is a technique that uses geometric features as an input to the autonomous vehicle to automatically distinguish lane markings. To process the intricate features present in the lane images, traditional computer vision (CV) techniques are typically time-consuming, need more computing resources, and use complex algorithms. To address thi...
Article
Full-text available
Modern information technology (IT) is well developed, and almost everyone uses the features of IT and services within the Internet. However, people are being affected due to cybersecurity threats. People can adhere to the recommended cybersecurity guidelines, rules, adopted standards, and cybercrime preventive measures to largely mitigate these thr...
Preprint
Full-text available
The ignorance of or lack of knowledge about cybersecurity aspects causes a critical problem regarding confidentiality and privacy. This security problem will continue to exist even if the user possesses less expertise in information security. The modern IT technologies are well developed, and almost everyone uses the features of IT technologies and...
Book
This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the si...
Article
Full-text available
Predicting students’ performance is one of the crucial issue for learning contexts, since it helps to develop alternative recommendation systems for academically weak students. Thus, several methods and practices have been applied for educational improvement. However, most of the existing methods do not determine the performance of the students. In...
Article
Full-text available
There has been a remarkable growth in many different real-time systems in the area of autonomous mobile robots. This paper focuses on the collaboration of efficient multi-sensor systems to create new optimal motion planning for mobile robots. A proposed algorithm is used based on a new model to produce the shortest and most energy-efficient path fr...
Article
Full-text available
The field of autonomous mobile robotics has recently gained many researchers' interests. Due to the specific needs required by various applications of mobile robot systems, especially in navigation, designing a real time obstacle avoidance and path following robot system has become the backbone of controlling robots in unknown environments. Therefo...
Conference Paper
Full-text available
Autonomous mobile robots have been widely used in many researches and applications. Mobile robots can be programmed to do specific tasks such as collision avoidance and trajectory planning. Various types of sensors and actuators are mounted on these robots for sensing the surrounding environment and making decisions accordingly. In this paper, we d...
Article
Full-text available
The flexible use of sensors has made them an attractive device to be deployed in almost every field of life such as health, military and home. Recent advancement in electronics and wireless communications has witnessed the development of low cost-sensor devices. While wireless sensor networks (WSNs) are flexible to use and less costly, they need to...
Article
Full-text available
Autonomous mobile robots have become a very popular and interesting topic in the last decade. Each of them are equipped with various types of sensors such as GPS, camera, infrared and ultrasonic sensors. These sensors are used to observe the surrounding environment. However, these sensors sometimes fail and have inaccurate readings. Therefore, the...
Conference Paper
Full-text available
Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpo...
Conference Paper
Full-text available
Abstract— Wireless sensor networks (WSNs) have gained a lot of considerations in recent years and have significant impacts on different application areas. Wireless sensors have been successfully deployed in different computing environments to measure, gather and process the raw information in the sensing area to the observers. Sensor networks provi...
Conference Paper
Full-text available
To search for an element in an unsorted database, it requires O(N) operations using classical computers, where it takes only O(√N) operations in quantum systems. In this paper, we provide an in-depth look at the existing quantum searching algorithms and emphasize the quantum entanglement feature to propose a new technique for sorting N elements and...
Article
Full-text available
Sensor networks provide a number of extensive programming challenges for Wireless Sensor Networks (WSNs) application programmers. Application developers have proposed various WSNs programming models to avoid these challenges and make WSN programming much easier. In this paper we proposed a new programming model to find the best routing path in WSNs...
Article
Full-text available
In order to maximize the network's lifetime and ensure the connectivity among the nodes, most topology management practices use a subgroup of nodes for routing. This paper provides an in-depth look at existing topology management control algorithms in Multi-state structure. We suggest a new algorithm based on Geographical Adaptive Fidelity (GAF) an...

Network

Cited By