Atif Alamri

Atif Alamri
King Saud University | KKUH · Department of Software Engineering

Ph.D. in Computer Science

About

190
Publications
89,375
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,559
Citations
Additional affiliations
September 2010 - present
King Saud University
Position
  • Professor (Associate)

Publications

Publications (190)
Article
Among the various reasons behind vehicle accidents, drivers' aggressiveness and distractions play a significant role. Deep learning (DL) algorithms inside a car mobile edge (CME) have been used for driver monitoring and to perform automated decision-making processes. Training and retraining the DL models in resource-constrained CME devices come wit...
Preprint
Full-text available
Blockchain technology is among the fastest-growing technologies in the world today. It has been adopted in diverse areas but mostly in financial systems, such as Bitcoin cryptocurrency. Therefore, it is a niche that has attracted interest from researchers from various fields, including computer science. Other areas where Blockchain is being embrace...
Article
Full-text available
Currently, the number of traffic accidents has been increased globally. One of the main reasons for this increase is the distraction of the driver on the road. Distracted driving can cause collisions and cause injury, death, or property damage. New techniques can help to mitigate this problem, and one of the recent approaches is to employ body wear...
Article
Full-text available
Visual programming languages (VPLs) are inevitable tools to attract more people to the programming world. In this article, a novel VPL—programming without coding technology (PWCT)—is introduced. The main objective behind developing this tool was to create a general-purpose VPL that also possesses textual languages’ capabilities. PWCT is a language...
Article
Full-text available
Recent years have seen increasing utilization of deep learning methods to analyze large collections of medical data and signals effectively in the Internet of Medical Things (IoMT) environment. Application of these methods to medical signals and images can help caregivers form proper decision-making. One of the important IoMT medical application ar...
Data
The compressed ADBsDataset file ontains five csv files The CollectedDataSamples file is csv file contains all samples of aggressive driving behaviors. It is collected from accelerometer (Accel_X, Accel_Y, Accel_Z) and gyroscope (Gyro_X, Gyro_Y, Gyro_Z) of Wearable Shimmer3 IMU Unit sensor, as well as, the Timestamp, Class_Number, Class_Label, Clas...
Article
Full-text available
The original version of this article unfortunately contained a mistake. In the originally published version, the acknowledgments information is missing. The article’s acknowledgments information is provided below.
Article
Full-text available
The integration of Cloud computing and Internet of Things led to rapid growth in the edge computing field. This would not be achievable without combining the data centers’ managing systems with much more restrained technologies. One significantly effective and lightweight solution to this issue is presented by the Docker technology. It is able to m...
Article
There are a lot of hidden dangers in the change of human skin conditions, such as the sunburn caused by long-time exposure to ultraviolet radiation, which not only has aesthetic impact causing psychological depression and lack of self-confidence, but also may even be life-threatening due to skin canceration. Current skin disease researches adopt th...
Article
Full-text available
With the increasing demand for automated, remote, intelligent, and real-time healthcare services in smart cities, smart healthcare monitoring is necessary to provide improved and complete care to residents. In this monitoring, health-related media or signals collected from smart-devices/objects are transmitted and processed to cater to the need for...
Article
Reducing energy loads while maintaining the degree of hotness and coldness plays an essential role in designing energy-efficient buildings. Some previous methods have been proposed for predicting building energy loads using traditional machine learning methods. However, these traditional methods suffer from overfitting problems, which leads to inac...
Article
In Internet of Medical Things (IoMT) environment, feature selection is an efficient way of identifying the most discriminant health-related features from the original feature-set. Feature selection not only finds the best informative features, but also helps in reducing the overall dimensions of the given dataset. In this paper, the actual feature-...
Article
Full-text available
Smart home systems can provide health care services for people with special needs in their own homes. Briefly defined, such a smart home has special electronics to enable the remote control of automated devices specifically designed for remote health care to ensure the safety of the patient at home and the supervision of their health status. These...
Article
The importance of information credibility in society cannot be underestimated given that it is at the heart of all decision-making. Generally, more information is better; however, knowing the value of this information is essential for decision-making processes. Information credibility defines a measure of the fitness of information for consumption....
Article
Cloud computing refers to providing computing services and resources over the Internet. The cloud provider is an organization or company which offers the services to the consumer at different levels of features and characteristics. However, as the growth of cloud services as well as cloud service providers are increasing rapidly, it is becoming a c...
Conference Paper
Full-text available
The emergence of edge computing has its basis in the integration of the Internet of Things (IoT) with the Cloud computing. In order to make it possible, management technologies of data centers have to be combined with significantly more limited devices. The Docker technology, which provides a very lightweight and effective virtualization solution,...
Article
Full-text available
Exergames platform can be more appealing to the users if they can interact with emotion. Therefore, in this paper, we propose an automatic emotion recognition system from speech to be embedded in the Exergames platform. While playing and doing exercise, the user expresses his or her feeling by uttering some phrases. The speech is recorded by an omn...
Preprint
Full-text available
Wireless sensor networks (WSNs) have become one of the main research topics in computer science in recent years, primarily owing to the significant challenges imposed by these networks and their immense applicability. WSNs have been employed for a diverse group of monitoring applications, with emphasis on industrial control scenarios, traffic manag...
Presentation
Full-text available
in this presentation, we described briefly our research paper entitled "Cost Efficient Edge Intelligence Framework Using Docker Containers", which accepted for publishing in The 16th IEEE International Conference on Pervasive Intelligence and Computing (PICOM2018).
Article
Full-text available
This paper contains data on Performance Prediction for Cloud Service Selection. To measure the performance metrics of any system you need to analyze the features that affect these performance, these features are called " workload parameters". The data described here is collected from the KSA Ministry of Finance that contains 28,147 instances from 1...
Method
Full-text available
This Figure displays the different components of a cost-efficient edge intelligence framework using Docker containers which applied to human activity recognition scenario in the healthcare systems. The proposed framework depends on central servers to control the sensing network. The framework distributes the load of the data classification and gath...
Article
Technology enhanced learning (TEL) such as online learning environment with adaptive technologies has gained growing interest in recent past in the field of teaching and learning. In this context, mobile learning has got much momentum and is exemplified by diverse characteristics associated with the technologies and devices used, the enormous size...
Article
Crowd density estimation, which aims to analyze the density level of people in a crowded scene, has become a major topic in intelligent video surveillance. Different methods have been proposed, but there are still many difficulties and challenges such as occlusions mitigating making it a focus of research. Considering that many types of features ar...
Article
Full-text available
Online Social Networks (OSNs) have recently been the subject of numerous studies that have attempted to develop effective methods for classifying and analyzing big content. Some of the key contributions of these studies to current scientific understanding include the identification of underlying topics within content (posts and messages), determina...
Article
Full-text available
Microgrid is a community-based power generation and distribution system that interconnects smart homes with renewable energy sources (RESs). Microgrid efficiently and economically generates power for electricity consumers and operates in both islanded and grid-connected modes. In this study, we proposed optimization schemes for reducing electricity...
Article
Full-text available
Demand side management (DSM) is one of the most challenging areas in smart grids, which provides multiple opportunities for residents to minimize electricity cost. In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and...
Article
Full-text available
Demand side management (DSM) is one of the most challenging areas in smart grids, which provides multiple opportunities for residents to minimize electricity cost. In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and...
Article
Energy management of residential buildings plays an important role in a smart grid. Region specific fuzzy logic strategies are proposed recently. However, no such approach exists that covers all regions of the world. A fuzzy logic based strategy for the construction of fuzzy controller covering the entire globe would be cost effective due to the in...
Article
Full-text available
Information hiding aims to embed secret data into the multimedia such as image, audio, video, and text. In this study, two new quantum information hiding approaches are put forward. A quantum steganography approach is proposed to hide a quantum secret image into a quantum cover image. The quantum secret image is encrypted first using a controlled-...
Article
Full-text available
Data security, complete system control, and missed storage and computing opportunities in personal portable devices are some of the major limitations of the centralized cloud environment. Among these limitations, security is a prime concern due to potential unauthorized access to private data. Biometrics, in particular, is considered sensitive data...
Article
Cloud computing is a computing model that has experienced significant growth in the world in contemporary time. Cloud providers offer services to consumers at different levels of performance, costs, and configurations. Many enterprises and organizations are planning to move their services to a cloud platform. The most challenging issue for them is...
Article
Over the past few years, active research on algorithm development for the optimal operations of HEMSs has been performed. The objective is to compute optimized schedules for shiftable home appliances (SHAs). This is based on the demand response (DR) synergized with renewable energy sources (RESs) and ESS optimal dispatch (DRSREOD). An improved algo...
Article
Full-text available
With the emergence of automated environments, energy demand by consumers is increasing rapidly. More than 80% of total electricity is being consumed in the residential sector. This brings a challenging task of maintaining the balance between demand and generation of electric power. In order to meet such challenges, a traditional grid is renovated b...
Article
In recent years, the smart city concept, which involves multiple disciplines, for example, smart healthcare, smart transportation, and smart community, has become popular because of its ability to improve urban citizens' quality of life. However, most services in these areas of smart cities have become data-driven, thus generating big data that req...
Article
Full-text available
Trusted computing architecture ensures the behavior of software that runs on a user machine by protecting software-level attacks. Due to the potential of exposing a user’s private information while accessing a system, many studies have focused on analyzing existing protocols to develop new methods based on biometrics or additional devices to add ne...
Article
Full-text available
Developing IoT, Data Computing and Cloud Computing software requires different programming skills and different programming languages. This cause a problem for many companies and researchers that need to hires many programmers to develop a complete solution. The problem is related directly to the financial cost and the development time which are ve...
Article
In this paper, we investigate traffic engineering (TE) methods in Cognitive Radio Wireless Mesh Networks (CR-WMNs) through joint selection of link-channel pairs at each forwarding router and allocating powers on those so as to boost up overall network throughput. We first present an optimization framework, Centralized Optimal Traffic Engineering (C...
Article
Given the flexibility and potential of cloud technologies, cloud-based rehabilitation frameworks have shown encouraging results as assistive tools for post-stroke disability rehabilitation exercises and treatment. To treat post-stroke disability, cloud-based rehabilitation offers great advantages over conventional, clinic-based rehabilitation, prov...
Article
Full-text available
In recent years, the Cloud Radio Access Network (CRAN) has become a promising solution for increasing network capacity in terms of high data rates and low latencies for fifth-generation (5G) cellular networks. In CRAN, the traditional base stations (BSs) are decoupled into remote radio heads (RRHs) and base band units (BBUs) that are respectively r...
Article
A conventional power grid is criticized by its poor capability of power usage management, especially in handling dynamically varying power demands over time. The concept of smart grid has been introduced to mitigate this problem by satisfying not only real-time power demands, but also by restricting power usage within the capacity. Its consistent o...
Article
Full-text available
The current proliferation of large amounts of multimedia data creates an unprecedented challenge for security analysts in the context of Cyber Situational Awareness. Due to this phenomenal growth of multimedia data, security analysts have to invest enormous time and efforts in filtering and correlating multimedia data in order to make informed deci...
Article
Full-text available
In a smart grid, several optimization techniques have been developed to schedule load in the residential area. Most of these techniques aim at minimizing the energy consumption cost and the comfort of electricity consumer. Conversely, maintaining a balance between two conflicting objectives: energy consumption cost and user comfort is still a chall...
Article
Full-text available
Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate, and treat a patient using telecommunication technology. To diagnose and evaluate a patient, the healthcare professionals need to access the electronic medical record (EMR) of the patient, which might contain huge multimedia big data i...
Article
With the enormous growth and volume of Online Social Networks (OSNs) along with their features and a huge number of socially-connected users, it becomes difficult to explain the true semantic value of the published content to detect user behavior. Without understanding the contextual background, it is practically impossible to differentiate between...
Article
Sybil attacks have grown prevalent in Twitter and other social networks owing to the increase in the number of users now found on these very popular platforms. Sybil accounts are thus escalating in number with many of the operators of these accounts always adapting their techniques to evade detection. Such is the complexity of many Sybil profiles t...
Article
Sybil attacks are increasingly prevalent in online social networks. A malicious user can generate a huge number of fake accounts to produce spam, impersonate other users, commit fraud, and reach many legitimate users. For security reasons, such fake accounts have to be detected and deactivated immediately. Various defense schemes have been proposed...
Article
Full-text available
Smart grid is an emerging technology which is considered to be an ultimate solution to meet the increasing power demand challenges. Modern communication technologies have enabled the successful implementation of smart grid (SG), which aims at provision of demand side management mechanisms (DSM), such as demand response (DR). In this paper, we propo...
Article
Full-text available
Today’s buildings are responsible for about 40% of total energy consumption and 30–40% of carbon emissions, which are key concerns for the sustainable development of any society. The excessive usage of grid energy raises sustainability issues in the face of global changes, such as climate change, population, economic growths, etc. Traditionally, th...
Article
Identifying malicious users in online social networks (OSNs) is a challenging task that demands a great deal of skill and knowledge because these users can have multiple forms: Sybils, bots, spammers, phishers, impersonations or fake accounts. Different types of research methodologies have been proposed to solve this problem; hence, there are varie...
Article
Full-text available
In directional wireless sensor networks (DSNs), sensor nodes with directional antennas provide extended network lifetime and better coverage performance. However, one of the key challenges of directional nodes is to discover their neighbors due to difficulty in achieving synchronization among their directed transmissions and receptions. Existing so...
Article
Full-text available
Body area networks (BANs) are configured with a great number of ultra-low power consumption wearable devices, which constantly monitor physiological signals of the human body and thus realize intelligent monitoring. However, the collection and transfer of human body signals consume energy, and considering the comfort demand of wearable devices, bot...
Article
Cryptographic key distribution is always a major problem in large scale wireless communications such as Acoustic Sensor Networks (ASNs) based on wireless sensors in an Internet of Things (IoT) environment. Because of the resource constraints of the nodes in such networks, the traditional cryptographic primitives are not suitable solutions. Our ende...
Article
Nowadays, there is an ever-increasing migration of people to urban areas. Health care services is one of the most challenging aspects that is greatly affected by the vast influx of people to city centers. Consequently, cities around the world are investing heavily in digital transformation in an effort to provide healthier ecosystem for people. In...
Article
Full-text available
The increasing number of next-generation multimedia services and social media applications in cloud computing put additional challenges in efficient resource provisioning that targets to minimize under or over utilization of resources as well as to increase user satisfaction. Most of the works in the literature focused either on resource estimation...
Article
Full-text available
Traditional power grid and its demand-side management (DSM) techniques are centralized and mainly focus on industrial consumers. The ignorance of residential and commercial sectors in DSM activities degrades the overall performance of a conventional grid. Therefore, the concept of DSM and demand response (DR) via residential sector makes the smart...
Article
Full-text available
Localization is one of the major aspects in underwater wireless sensor networks (UWSNs). Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance and monitoring. Due to the inefficiency of the global positioning system (GPS) in UWSN, it is very difficult...
Article
Full-text available
Recent advances in wireless sensor networks for ubiquitous health and activity monitoring systems have triggered the possibility of addressing human needs in smart environments through recognizing human real-time activities. While the nature of streams in such networks requires efficient recognition techniques, it is also subject to suspicious infe...
Chapter
Online social networks such as Twitter are among the most important sources of information in the current era of information overload, restiveness, and uncertainty. Therefore, it is necessary to develop a model for verifying information from Twitter, which is a challenging task. We propose a new credibility assessment model for identifying implausi...