Asma Al-Shargabi

Asma Al-Shargabi
  • PhD in Computer Science
  • Professor (Assistant) at Qassim University

About

24
Publications
7,210
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
336
Citations
Current institution
Qassim University
Current position
  • Professor (Assistant)

Publications

Publications (24)
Article
Full-text available
In recent years, Arabic natural language processing has achieved remarkable advancements, particularly with the advent of large language models that have enhanced the analysis of diverse Arabic texts, including literary and artistic works such as poetry. However, these models encounter specific challenges when dealing with Arabic poetry, which is c...
Article
Full-text available
The emergence of 6G cognitive radio IoT networks introduces both opportunities and complexities in spectrum access and security. Blockchain technology has emerged as a viable solution to address these challenges, offering enhanced security, transparency, and efficiency in spectrum management. This survey paper offers a thorough analysis of recent a...
Article
Full-text available
Accurate and timely diagnosis of pulmonary diseases is critical in the field of medical imaging. While deep learning models have shown promise in this regard, the current methods for developing such models often require extensive computing resources and complex procedures, rendering them impractical. This study focuses on the development of a light...
Article
Full-text available
Despite the increasing reliance on the Internet of Things (IoT) as a basic infrastructure for future applications. Integrating blockchain technology with IoT extensively helps provide basic security requirements owing to the built-in security structure of the blockchain. Healthcare IoT applications are one of the industries that will be revolutioni...
Article
Full-text available
Presents corrections to the paper, (Correction to “Blockchain-IoT Healthcare Applications and Trends: A Review”).
Article
Full-text available
Websites can improve their security and protect against harmful Internet attacks by incorporating CAPTCHA verification, which assists in distinguishing between human users and robots. Among the various types of CAPTCHA, the most prevalent variant involves text-based challenges that are intentionally designed to be easily understandable by humans wh...
Article
Full-text available
The Internet of Things (IoT) is emerging from its infancy and establishing itself as a component of the future Internet. However, the ability to manage a huge number of IoT devices is one of the IoT technical challenges. To implement access control, traditional schemes typically rely on a trusted central organization. Traditional centralized access...
Article
Full-text available
Blockchain has recently attracted significant academic attention in research fields beyond the financial industry. In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment. The use of blockchain in IoT applications is still in its early stages, particularly at the low end of the computing s...
Article
Full-text available
Software testing is a vital part of software engineering process. Automated testing makes this process more accurate and more efficient. Due to the large number and the variety of testing tools, a comprehensive taxonomy of these features is necessary. This research aims at developing a comprehensive taxonomy for testing tools to help software devel...
Article
Full-text available
In recent times, Human activity recognition (HAR) becomes a major challenging issue among computer vision applications in day to day lives. The HAR is mainly envisioned to be utilized with other technologies, namely Internet of Things (IoT) and sensor technologies. Due to the advancements of deep learning (DL) approaches, automated high level featu...
Chapter
Proactive is one main aspect of ubiquitous context-aware systems in IoT environment. Ubiquitous context-aware systems in IoT environment needs a light-weight intelligent prediction techniques especially within fog and edge computing environment where technologies capabilities are poor. On the other hand, the data that ubiquitous context-aware syste...
Conference Paper
During testing of programs, developers face two types of errors: syntax errors, and logical errors. Generally, logical errors in programming are more difficult to detect. To figure out the reason of that errors, it should trace the source code manually to find the potential instructions that may cause the problem. Consequently the testing will spen...
Article
Full-text available
Due to the ever-increasing number and diversity of data sources, and the continuous flow of data that are inevitably redundant and unused to the cloud, the Internet of Things (IoT) brings several problems including network bandwidth, the consumption of network energy, cloud storage, especially for paid volume, and I/O throughput as well as handling...
Article
Full-text available
Abstract Purpose – This paper aims to introduce a comprehensive framework for quality of context in pervasive context-aware systems. The framework includes the context quality characteristics, the quality policy, the quality calculation methods and the quality control algorithm. Design/methodology/approach – This study used the constructive researc...
Article
Full-text available
Context-aware Systems (CASs) are becoming increasingly popular and can be found in the areas of wearable computing, mobile computing, robotics, adaptive and intelligent user interfaces. Sensors are the corner stone of context capturing however, sensed context data are commonly prone to imperfection due to the technical limitations of sensors, their...
Conference Paper
Full-text available
In Pervasive computing environment, context-aware systems face many challenges to keep high quality performance. One-challenge faces context-aware systems is conflicted values come from different sensors because of different reasons. These conflicts affect the quality of context and as a result the quality of service as a whole. This paper is exten...
Article
Full-text available
In Pervasive computing environment, context-aware systems face many challenges to keep high quality performance. One-challenge faces context-aware systems is conflicted values come from different sensors because of different reasons. These conflicts affect the quality of context and as a result the quality of service as a whole. This paper is exten...
Conference Paper
Full-text available
The first step for determining the quality of context (QoC) in context aware systems (CASs) is to make sure that there are no conflicts among the values of each context element collected from different resources/sensors. This work is an extension of our approach RCCAR ( Resolving Context Conflicts Using Association Rules ) which proposes a solution...
Conference Paper
Full-text available
Context-aware systems (CASs) face many challenges to keep high quality performance. One challenge faces CASs is conflicted values come from different sensors because of different reasons. These conflicts affect the quality of context (QoC) and as a result the quality of service as a whole. This paper conducts a novel approach called RCCAR resolves...
Article
Full-text available
This paper presents an applied study in data mining and knowledge discovery. It aims at discovering patterns within historical students' academic and financial data at UST (University of Science and Technology) from the year 1993 to 2005 in order to contribute improving academic performance at UST. Results show that these rules concentrate on three...

Network

Cited By