Fawaz S Al-Anzi

Fawaz S Al-Anzi
  • BSc MSc PhD
  • Professor(Full) at Kuwait University

About

109
Publications
20,396
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,199
Citations
Current institution
Kuwait University
Current position
  • Professor(Full)
Additional affiliations
May 2011 - August 2016
Kuwait University
Position
  • Founding Dean of College Computing Sciences and Engineering at Kuwait University
January 1996 - December 2016
Kuwait University
Position
  • Head of Faculty
Education
September 1990 - August 1995
Rensselaer Polytechnic Institute
Field of study
  • Computer Science
September 1989 - August 1990
Rensselaer Polytechnic Institute
Field of study
  • Computer Science
January 1983 - August 1987
Kuwait University
Field of study
  • Electrical Engineering

Publications

Publications (109)
Article
Full-text available
Arabic raw audio datasets were initially gathered to produce a corresponding signal spectrum, which was further used to extract the Mel-Frequency Cepstral Coefficients (MFCCs). The pronunciation dictionary, language model, and acoustic model were further derived from the MFCCs’ features. These output data were processed into Baidu’s Deep Speech mod...
Chapter
The task of classifying text documents into the various categories for which they have been previously defined is known as text classification. The number of text documents available online exhibits exponential growth, so it is essential that a model be implemented to better organize these documents to improve the search process. The curse of dimen...
Article
Social media networking sites, such as Instagram, Facebook, and Twitter, have become an inextricable part of our everyday lives. These social media networks are useful for sharing news, images, and other information. The study of social media sentiment has recently received a lot of attention, especially in Arabic sentiment analysis. Social media s...
Article
Speech is the primary method of communication among humans; it is the main form of communication to deliver emotions and thoughts. Intuitively, humans would find it convenient to communicate with machines through speech. The automatic speech recognition model’s primary goal is to transcribe or identify the word sequence represented by the acoustic...
Article
Full-text available
Early detection of significant abnormal changes is highly desirable for oil refinery processes, which consist of sophisticated unit operations handling hazardous and flammable inventories and operating at high temperature and pressure. Close monitoring and anomaly detection are vital for avoiding major accidents and losses and enable intervention b...
Article
Intrusion is any unwanted activity that can disrupt the normal functions of wired or wireless networks. Wireless mesh networking technology has been pivotal in providing an affordable means to deploy a network and allow omnipresent access to users on the Internet. A multitude of emerging public services rely on the widespread, high-speed, and inexp...
Article
Full-text available
It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption a...
Article
With the advancement and increased usage of intelligible smart devices, researchers have an intensified interest in the field of large-vocabulary speaker-independent continuous speech recognition. Although considerable research has been devoted to English speech recognition, less attention has been paid to the Arabic speech recognition. This paper...
Article
Full-text available
Environmental challenges are significant threats to the planet; most of them are human-made hazards. Researchers are studying various environmental threats and trying to flourish sustainable policy for protecting the environment from various challenges worldwide. In Kuwait, researchers are paying attention to these various challenges and trying to...
Article
It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard information protection against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorith...
Article
Full-text available
COVID-19 was declared a global pandemic by the World Health Organization in March 2020, and has infected more than 4 million people worldwide with over 300,000 deaths by early May 2020. Many researchers around the world incorporated various prediction techniques such as Susceptible-Infected-Recovered model, Susceptible-Exposed-Infected-Recovered mo...
Article
Full-text available
Today, the world is fighting against a dangerous epidemic caused by the novel coronavirus, also known as COVID-19. All have been impacted and countries are trying to recover from the social, economic, and health devastations of COVID-19. Recent epidemiology research has concentrated on using different prediction models to estimate the numbers of in...
Article
Full-text available
The Susceptible - Infected - Recovered (SIR) model is used in this research to analyze and predict the outbreak of coronavirus (COVID-19) in Kuwait. The time dependent SIR model is used to model the growth of COVID-19 and to predict future values of infection and recovery rates. This research presents an analysis on the impact of the preventive mea...
Article
The Vector Space Model (VSM) is widely used in data mining and Information Retrieval (IR) systems as a common document representation model. However, there are some challenges to this technique such as high dimensional space and semantic looseness of the representation. Consequently, the Latent Semantic Indexing (LSI) was suggested to reduce the fe...
Article
The vector space model (VSM) is a textual representation method that is widely used in documents classification. However, it remains to be a space-challenging problem. One attempt to alleviate the space problem is by using dimensionality reduction techniques, however, such techniques have deficiencies such as losing some important information. In t...
Article
Fisher's discriminant analysis; also called linear discriminant analysis (LDA), is a popular dimensionality reduction technique that is widely used for features extraction. LDA aims at finding an optimal linear transformation based on maximizing a class separability. Even though LDA shows useful results in various pattern recognition problems, such...
Article
Full-text available
The pronunciation variation is a well-known phenomenon that has been widely investigated for automatic speech recognition (ASR). The knowledge-based phonological rules are generally used to capture the accurate phonetic realization in order to minimize the mismatch between the ASR dictionary and the actual phonetic representation of the speech sign...
Article
With the rapid growth of textual content on the Internet, automatic text categorization is a comparatively more effective solution in information organization and knowledge management. Feature selection, one of the basic phases in statistical-based text categorization, crucially depends on the term weighting methods In order to improve the performa...
Article
The term frequency – inverse document frequency (TF-IDF) weighting scheme is widely used in text classification for weighting the features of the vector space model (VSM). It aims at enhancing words’ discriminating capabilities by weighing up the less frequently used words and, at the same time, weighing down the high frequency words (i.e., the com...
Article
Environment is increasingly becoming an important issue in the world of politics and global economy as well as people's life. Environmental deterioration resulted from human activity; misuse of natural resources. Pollution is now a global issue that ecologically, economically and politically requires imminent, intelligent and global solutions. This...
Article
Full-text available
Cosine similarity is one of the most popular measures in text classification problems. In this paper, we use this important measure to investigate the performance of Arabic language text classification. Vector space model (VSM) is generally used as a model to represent textual information as features vectors. However, Latent Semantic Indexing (LSI)...
Article
Full-text available
Environment is increasingly becoming an important issue in the world of politics and global economy as well as people's life. Environmental deterioration resulted from human activity; misuse of natural resources. Pollution is now a global issue that ecologically, economically and politically requires imminent, intelligent and global solutions. This...
Article
Intrusion is something which is unsolicited activity and which might be used to interrupt the functions of wireless network. If we talk about wireless networks, having centralized monitoring policy; therefore it is very much easy to detect and eliminate intrusions efficiently. But when we look forward to wireless scenario, especially in the multi h...
Conference Paper
Cloud security is a broad topic and any combination of policies, technologies, and controls to protect data, infrastructure and services from possible attacks. Security requirements in the cloud are very much different from traditional environments. Since cloud has a dynamic nature with small customer ownership of infrastructure, has broken traditi...
Conference Paper
The term Cloud Computing is not something that appeared overnight, it may come from the time when computer system remotely accessed the applications and services. Cloud computing is Ubiquitous technology and receiving a huge attention in the scientific and industrial community. Cloud computing is ubiquitous, next generation's in-formation technolog...
Article
Full-text available
Cloud computing describes highly scalable computing resources provided as an external service via the internet. Economically, the main feature of cloud computing is that customers only use what they need, and only pay for what they actually use. Resources are available to be accessed from the cloud at any time, and from any location via the interne...
Article
We address the two-stage multi-machine assembly scheduling problem. The first stage consists of m independently working machines where each machine produces its own component. The second stage consists of two independent and identical assembly machines. The objective is to come up with a schedule that minimizes total or mean completion time for all...
Article
We address the two-stage multi-machine assembly scheduling problem to minimize mean completion times of all jobs. This problem has many applications in practice including the queries scheduling on distributed database systems This problem has been recently addressed in the literature for which an efficient heuristic, called SAK, was developed for t...
Article
In computer security terminologies, SQL Injection Attacks (SQLIAs) are attacks that pose a security threats to web applications by manipulating, modifying, retrieving or destructing sensitive information underlying database server through web applications. This type of attacks could compromise data confidentiality, integrity and availability of dat...
Article
Full-text available
The rapid development in Information and Communication Technology has had a significant impact on traditional educational systems and learning. Today, E-Learning has become a widely accepted way of learning. With increasing numbers of users, a wide range of learning services and the growth of educational content, E-Learning has emerged as the mode...
Article
This paper focuses on developing prototype architecture for intelligent decision support systems that can help top political decision makers in Kuwait. The system is intended to be used to strengthen bilateral economic relationship between Kuwait and friendly nations. The scope of the study is conducted within two sectors that are closely linked to...
Article
Full-text available
The research literature provides strong evidence that characteristics of buildings and their indoor environments influ-ence the prevalence of several adverse health effects. Kuwait is considered one of the countries with harshest weather conditions. It is estimated that Kuwaitis spend most of their times indoors. Indoor environments quality should...
Article
Full-text available
In this paper, we present an extension of the classical Resource Constrained Project Scheduling Problem (RCPSP). We present a new type of resource constraints in which staff members are involved. We present a new model where staff members can have several skills with different proficiency, i.e., a staff member is able to perform more than one kind...
Article
Full-text available
In this paper, we present an extension of the classical Resource Constrained Project Scheduling Problem (RCPSP). We present a new type of resource constraints in which staff members are involved. We present a new model where staff members can have several skills with different proficiency, i.e., a staff member is able to perform more than one kind...
Article
Full-text available
We address the two-stage assembly scheduling problem where there are m machines at the first stage and an assembly machine at the second stage. The objective is to schedule the available n jobs so that total completion time of all n jobs is minimized. Setup times are treated as separate from processing times. This problem is NP-hard, and therefore...
Article
Full-text available
We consider a two-stage assembly flowshop scheduling problem with the objective of minimizing a weighted sum of makespan and maximum lateness. The problem is known to be NP-hard, and therefore, we propose heuristics to solve the problem. The proposed heuristics are Tabu search (Tabu), particle swarm optimization (PSO), and self-adaptive differentia...
Article
Full-text available
In this paper, we address the two-stage assembly flowshop scheduling problem with a weighted sum of makespan and mean completion time criteria, known as bicriteria. Since the problem is NP-hard, we propose heuristics to solve the problem. Specifically, we propose three heuristics; simulated annealing (SA), ant colony optimization (ACO), and self-ad...
Article
Adequate mathematical modeling and efficient algorithm design of natural languages require the existence of solid basic building blocks of knowledge of that particular natural language. It is unfortunate that Arabic language did not have the same attention as other Latin based natural languages in developing tools, mathematical models and databases...
Article
The two-stage assembly flowshop scheduling problem has been addressed with respect to different criteria in the literature where setup times are ignored. For some applications, setup times are essential to be explicitly considered since they may take considerable amount of time. We address the two-stage assembly flowshop scheduling problem with res...
Article
We study two deterministic scheduling problems that combine batching and deterioration features. In both problems, there is a certain demand for identical good quality items to be produced in batches. In the first problem, each batch is assigned an individual machine that requires a cost and a time to be activated. All the machines are identical, w...
Article
Full-text available
We address the three-machine flowshop scheduling problem to minimise maximum lateness, where setup times are considered separate from processing times. We establish a dominance relation for the problem where it specifies which of the two adjacent jobs should precede in an optimal solution. Moreover, we propose three heuristics: Earliest Due Date (E...
Article
Full-text available
We study two deterministic scheduling problems that combine batching and deterioration features. In both problems, there is a certain demand for identical good quality items to be produced in batches. In the first problem, each batch is assigned an individual machine that requires a cost and a time to be activated. All the machines are identical, w...
Article
Full-text available
Many dominance relations have been established in the literature for scheduling problems where they are mainly used in implicit enumeration techniques to further reduce the search space for finding an optimal solution. In this paper, we propose a novel method for discovering dominance relations for scheduling problems. We discover dominance relatio...
Article
Full-text available
In this paper we address the two-stage assembly flowshop scheduling problem with respect to the makespan criterion where setup times are considered as separate from processing times. We formulate the problem and obtain a dominance relation. Moreover, we propose two evolutionary heuristics: a Particle Swarm Optimization (PSO) and a Tabu search. We a...
Article
Full-text available
The problem of scheduling a set of jobs with unit operation times in a job shop to minimize total completion time is addressed. It is shown that this problem can be modeled as finding the optimal coloring of a special mixed graph. Subgraph of such a mixed graph without edges represents union of paths, and subgraph without arcs represents union of c...
Conference Paper
In this paper, we address the two-stage assembly scheduling problem to minimize maximum lateness where setup times are treated as separate and sequence-independent. This problem has many applications including computer assembly problem. We propose a dominance relation and present three heuristics. Computational experiments are conducted to compare...
Article
Full-text available
This paper presents a stochastic model to evaluate the reliability and availability of a network service configuration consisting of a centralized database server and two distributed database server sets for a local/metropolitan area network. The centralized server monitors and controls the distributed database servers, which can be remotely separa...
Article
The assembly flowshop scheduling problem has been addressed recently in the literature. There are many problems that can be modeled as assembly flowshop scheduling problems including queries scheduling on distributed database systems and computer manufacturing. The problem has been addressed with respect to either makespan or total completion time...
Article
Full-text available
The problem of scheduling on a multi-stage parallel-processor architecture in computer centres is addressed with the objective of minimizing average completion time of a set of requests. The problem is modelled as a flexible flowshop problem for which few heuristics exist in the flowshop scheduling literature. A new three-phase heuristic is propose...
Article
Full-text available
In this paper, we address the three-machine flowshop scheduling problem. Setup times are considered separate from processing times, and the objective is to minimize total completion time. We show that the three-site distributed database scheduling problem can be modeled as a three-machine flowshop scheduling problem. A lower bound is developed and...
Article
Full-text available
In this paper, we address the two-stage assembly scheduling problem where there are m machines at the first stage and an assembly machine at the second stage. The objective is to schedule the jobs on the machines so that total completion time of all n jobs is minimized. Optimal solutions are obtained for two special cases. A simulated annealing heu...
Article
Full-text available
In this paper, we address the three-machine flowshop scheduling problem. Setup times are considered separate from processing times, and the objective is to minimize total completion time. We show that the three-site distributed database scheduling problem can be modeled as a three-machine flowshop scheduling problem. A lower bound is developed and...
Article
Full-text available
This research addresses the scheduling problem of multimedia object requests, which is an important problem in information systems, in particular, for World Wide Web applications. The performance measure considered is the variance of response time which is crucial as end users expect fair treatment to their service requests. This problem is known t...
Article
Full-text available
Due to the entry of Kuwait into WTO and the expected liberalization of petroleum management, the oil market is to become more competitive. However, the space limitation and public increasing awareness of environmental protection issues and stricter regulation passed by Environmental Public Authority (EPA) in Kuwait make the need for full utilizatio...
Article
Full-text available
The two-stage flowshop scheduling problem with separate setup times to minimize maximum lateness is addressed in this paper. It is well known that this problem is strongly NP-hard and that there exists at least one optimal solution which is a permutation schedule. A polynomial hybrid genetic based algorithm is proposed to find an approximate soluti...
Article
This paper presents a hybrid evolutionary algorithm for constrained multiple destinations routing problem. The problem can be formulated as minimising tree cost under several constraints or QoS metrics. Computing such constrained multicast tree has been proven to be NP-complete. The proposed hybrid algorithm is based on a population based increment...
Article
In this paper, two new models for generating diacritics for Arabic names are proposed. The first proposed model is called N-gram model. It is a stochastic model that is based on generating a corpus database of N-grams extracted from a large database of names with their corresponding probability according to an N-gram position in a text (Bhal et al....
Article
This article addresses the problem of standard Romanization of Arabic names using undiacritized-Arabic forms and their corresponding non-standard Romanization. The Romanization of Arabic names has long been studied and standardized. Huge amounts of non-standard Arabic databases of Romanized names exist that are in use in many private and government...
Article
Full-text available
The authors consider the multimedia object requests scheduling problem, an important problem in information systems such as World Wide Web applications. The problem can be modelled as a flowshop scheduling problem for which many solutions have been proposed with respect to different objective functions. This article considers the objective function...
Article
Article
The authors consider the multimedia object requests scheduling problem, an important problem in information systems such as World Wide Web applications. The problem can be modelled as a flowshop scheduling problem for which many solutions have been proposed with respect to different objective functions. This article considers the objective function...
Conference Paper
Full-text available
In this paper, we consider the problem of scheduling on a multi-stage multiserver architecture in computer centers to enhance quality of service through minimizing the average completion time of a set of requests. This problem is known to be an NP-hard combinatorial problem. We show that the problem can modeled as a flexible flowshop problem for wh...
Article
Full-text available
In this paper, we consider the problem of scheduling on a multi-stage parallel-server architecture in computer centers to minimize the total or average completion time of a set of requests. The problem is modeled as a flexible flowshop problem for which few heuristics to minimize total completion time exist in the flowshop scheduling literature. We...
Article
The multimedia data objects scheduling problem for WWW applications is modeled using the two-machine flowshop problem of minimizing maximum lateness with separate setup times. We establish three dominance relations, and propose four heuristics. Also, we conduct computational experiments to compare the performance of the proposed heuristics and that...
Article
This paper presents two grammars for reading numbers of classical andmodern Arabic language. The grammars make use of the structured Arabiccounting system to present an accurate and compact grammar that can beeasily implemented in different platforms. Automating the process ofreading numbers from its numerical representation to its sentential formh...
Article
Full-text available
In this study, we show that the three-tiered client-server database Internet connectivity problem is equivalent to the two-machine flowshop problem with separate set-up times. We consider the total completion time as the performance measure. This problem is known to be NP-hard. Therefore, we propose improved heuristics for the problem and discuss t...
Article
Full-text available
The two-machine flowshop problem of minimizing maximum lateness with separate setup times is used to model minimizing lateness of multimedia data object requests in Internet applications. We propose using a new genetic based algorithm (GA) to improve on existing methods in solving this problem. Also, we conduct computational experiments to compare...
Article
Full-text available
The two-machine owshop problem of minimizing maximum lateness with separate setup times is used to model the multimedia data objects allocation problem for Internet applications. We establish three dominance relations, and propose four three-phase heuristic algorithms with O(n ) computational complexity. Also, we conduct computational experiments t...
Article
In this paper, an improved parallel cell pair-interchange placement algorithm implementation using the SIMD computational model is presented. The improved implementation of the algorithm makes use of converting the broadcast step to a p-p packet routing problem, using a bounded edge-width communication model. We show that this model is feasible in...
Conference Paper
Full-text available
An optimal self-stabilizing algroithm is presented that finds the strongly connected components of a directed graph on an underlying network after O(C) rounds, where C is the length of the longest cycle in the graph. Because the algorithm is self-stabilizing, it is resilient to transient faults and does not require initialization. The proposed algo...

Network

Cited By