Hend Alkahtani

Hend Alkahtani
  • Professor (Associate) at Princess Nourah bint Abdulrahman University

About

60
Publications
12,721
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,088
Citations
Introduction
Current institution
Princess Nourah bint Abdulrahman University
Current position
  • Professor (Associate)

Publications

Publications (60)
Article
Full-text available
Background Faculty members' perceptions of blended learning are critical to developing effective strategies to improve its quality and prepare for its implementation under the new normal conditions. This study introduces a new FBL scale to address this issue, as no exclusive tool focuses on health sciences faculty members. Materials and methods Th...
Article
Full-text available
Background World Health Organization (WHO) identified noncommunicable diseases as the foremost risk to public health globally and the cause of approximately 80% of premature deaths. However, Cardiovascular diseases account for most of these premature deaths and established threats to public health. Recently, digitization of health consultancy servi...
Article
Full-text available
Enhanced technologies of the future are gradually improving the digital landscape. Internet of Things (IoT) technology is an advanced technique that is quickly increasing owing to the development of a network of organized online devices. In today’s digital era, the IoT is considered one of the most robust technologies. However, attackers can effort...
Article
Full-text available
Objectives To implement state-of-the-art deep learning architectures such as Deep-Residual-U-Net and DeepLabV3+ for precise segmentation of hippocampus and ventricles, in functional magnetic resonance imaging (fMRI). Integrate VGG-16 with Random Forest (VGG-16-RF) and VGG-16 with Support Vector Machine (VGG-16-SVM) to enhance the binary classificat...
Article
Consumer product recognition involves utilizing computer vision (CV) and machine learning (ML) systems for identifying and recognizing numerous consumer goods in video or image frames. This technology determines applications in retail, e-commerce, security systems, and inventory management. The purpose is to automate the detection of certain produc...
Article
Full-text available
Currently, there is no unified Electronic Health Record (EHR) system connecting major healthcare organizations such as hospitals, medical centers, and specialists. Blockchain technology, with its unique features, provides an ideal platform for developing a large‐scale electronic health record system. In this article, the authors introduce HealthCha...
Article
Full-text available
IoT is the technology that aids the interconnection of all kinds of devices over the internet to replace data, monitor devices and enhance actuators to create outcomes. Cyber-physical systems (CPS) contain control and computation components, which are compactly assured with physical procedures. The internet plays a prominent role in modern lives, a...
Article
Full-text available
With the rapid expansion of the Internet of Things (IoT), cloud storage has emerged as one of the cornerstones of data management, facilitating ubiquitous access and seamless sharing of information. However, with the involvement of a third party, traditional cloud‐based storage systems are plagued by security and availability concerns, stemming fro...
Article
Full-text available
Vehicular Adhoc Network (VANET) suffers from the loss of perilous data packets and disruption of links due to the fast movement of vehicles and dynamic network topology. Moreover, the reliability of the vehicular network is also threatened by malicious vehicles and messages. The malicious vehicle can promulgate fake messages to the node to misguide...
Article
Full-text available
Most existing methods for detecting fraudulent news or other forms of disinformation primarily rely on user profiling or content analysis, determining whether a given article aligns with a user’s stylistic or content-related preferences. This research departs from conventional approaches by concentrating not only on the characteristics of shared co...
Article
Full-text available
Mild cognitive impairment (MCI) is a cognitive disease that primarily affects elderly persons.Patients with MCI have impairments in one or more cognitive areas, such as memory, attention,language, and problem-solving. The risk of Alzheimer’s disease development is 10 times higher among individuals who meet the MCI diagnosis than in those who do not...
Article
Full-text available
In recent years, the extensive use of facial recognition technology has raised concerns about data privacy and security for various applications, such as improving security and streamlining attendance systems and smartphone access. In this study, a blockchain-based decentralized facial recognition system (DFRS) that has been designed to overcome th...
Article
Full-text available
In this present time, Human Activity Recognition (HAR) has been of considerable aid in the case of health monitoring and recovery. The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance. Although many research works conducted on Smart...
Preprint
Full-text available
The increasing demand for massive connectivity and high data rates has made the efficient use of existing spectrum resources an increasingly challenging problem. Non-orthogonal multiple access (NOMA) is a potential solution for future heterogeneous networks (HetNets) due to its high capacity and spectrum efficiency. In this study, we analyze an upl...
Article
Full-text available
The AES (Advance Encryption Standard) has made the development of new block ciphers unnecessary; it is now the de facto standard for most uses of block ciphers. However, the AES is still not well-suited for very limited contexts like RFID (Radio-Frequency Identification) tags and WSN(Wireless Sensor Networks), despite recent implementation advancem...
Article
Full-text available
Widespread adoption of internet of things (IoT) for automation, monitoring and control in various engineering, business and industrial applications poses serious challenges of data security and cyber-attacks to IoT networks. Blockchain enabled IoT networks, due to their immutability, transparency, and accountability, are commonly employed to ensure...
Article
Full-text available
The effective usage of energy becomes crucial for the successful deployment and operation of unmanned aerial vehicles (UAVs) in different applications, such as surveillance, transportation, and communication networks. The increasing demand for UAVs in different industries such as agriculture, logistics, and emergency response has led to the develop...
Article
Full-text available
Cyber-physical systems (CPSs) are affected by cyberattacks once they are more connected to cyberspace. Advanced CPSs are highly complex and susceptible to attacks such as false data injection attacks (FDIA) targeted to mislead the systems and make them unstable. Leveraging an integration of anomaly detection methods, real-time monitoring, and machi...
Article
Full-text available
According to the World Health Organization (WHO), congenital heart disorders (CHDs) impact a significant proportion of babies worldwide, with prevalence rates ranging from 0.8% to 1.2%. Phonocardiography (PCG) is the leading non-invasive method for detecting congenital heart defects (CHDs), offering important information about cardiac signals i.e....
Article
Full-text available
Social media presents both opportunities and risks for any firm. The Internet has recently made everything possible. Due to its low cost and rapid speed, it is in high demand. Due to the virtual technique of interacting through various social media apps like Instagram, WhatsApp, Twitter, Facebook, etc., people are drawn to social networking. Despit...
Article
Full-text available
COVID-19, a novel pathogen that emerged in late 2019, has the potential to cause pneumonia with unique variants upon infection. Hence, the development of efficient diagnostic systems is crucial in accurately identifying infected patients and effectively mitigating the spread of the disease. However, the system poses several challenges because of th...
Article
Full-text available
Facial expressions serve as crucial indicators of an individual's psychological state, playing a pivotal role in face-to-face communication. This research focuses on advancing collaboration between machines and humans by undertaking a thorough investigation into facial expressions. Specifically, we delve into the analysis of emotional variations re...
Article
Full-text available
The COVID-19 epidemic poses a worldwide threat that transcends provincial, philosophical, spiritual, radical, social, and educational borders. By using a connected network, a healthcare system with the Internet of Things (IoT) functionality can effectively monitor COVID-19 cases. IoT helps a COVID-19 patient recognize symptoms and receive better th...
Article
Full-text available
Test case selection is to minimize the time and effort spent on software testing in real-time practice. During software testing, software firms need techniques to finish the testing in a stipulated time while uncompromising on quality. The motto is to select a subset of test cases rather than take up all available test cases to uncover most bugs. O...
Article
Full-text available
Parkinson’s disease (PD) affects a large proportion of elderly people. Symptoms include tremors, slow movement, rigid muscles, and trouble speaking. With the aging of the developed world’s population, this number is expected to rise. The early detection of PD and avoiding its severe consequences require a precise and efficient system. Our goal is t...
Article
Full-text available
Vision impairment affects an individual’s quality of life, posing challenges for visually impaired people (VIPs) in various aspects such as object recognition and daily tasks. Previous research has focused on developing visual navigation systems to assist VIPs, but there is a need for further improvements in accuracy, speed, and inclusion of a wide...
Article
Full-text available
Wind patterns can change due to climate change, causing more storms, hurricanes, and quiet spells. These changes can dramatically affect wind power system performance and predictability. Researchers and practitioners are creating more advanced wind power forecasting algorithms that combine more parameters and data sources. Advanced numerical weathe...
Article
Full-text available
In this study, we discussed our contribution to building a data analytic framework that supports clinical statistics and analysis by leveraging a scalable standards-based data model named Fast Healthcare Interoperability Resource (FHIR). We developed an intelligent algorithm that is used to facilitate the clinical data analytics process on FHIR-bas...
Article
Full-text available
Systolic arrays are an integral part of many modern machine learning (ML) accelerators due to their efficiency in performing matrix multiplication that is a key primitive in modern ML models. Current state-of-the-art in systolic array-based accelerators mainly target area and delay optimizations with power optimization being considered as a seconda...
Article
Full-text available
The fast development of the Internet of Things (IoT) and widespread utilization in a large number of areas, such as vehicle IoT, industrial control, healthcare, and smart homes, has made IoT security increasingly prominent. Ransomware is a type of malware which encrypts the victim’s records and demands a ransom payment for restoring access. The eff...
Article
Full-text available
The task of analyzing sentiment has been extensively researched for a variety of languages. However, due to a dearth of readily available Natural Language Processing methods, Urdu sentiment analysis still necessitates additional study by academics. When it comes to text processing, Urdu has a lot to offer because of its rich morphological structure...
Article
Full-text available
Facial expression recognition (FER) remains a hot research area among computer vision researchers and still becomes a challenge because of high intra-class variations. Conventional techniques for this problem depend on hand-crafted features, namely, LBP, SIFT, and HOG, along with that a classifier trained on a database of videos or images. Many exe...
Article
Full-text available
Background: Alzheimer’s, the predominant formof dementia, is a neurodegenerative brain disorder with no known cure. With the lack of innovative findings to diagnose and treat Alzheimer’s, the number of middle-aged people with dementia is estimated to hike nearly to 13 million by the end of 2050. The estimated cost of Alzheimer’s and other related a...
Article
Full-text available
With the development of wireless technology, users not only have wireless access to the Internet, but this has also sparked the emergence of Wireless Ad-hoc Networks (WANETs); this promising networking paradigm has the potential to adopt the shape of new emergent networks such as the Internet of Things (IoT), Vehicular Ad-hoc Networks (VANET) and W...
Article
Full-text available
Floods are one of the most severe and most frequent natural calamities. It causes enormous economic damage and even leads to higher mortality rates. Studies on damage detection of roads using artificial intelligence (AI) methods gained more attention currently, especially in the development of smart cities. Therefore, this study designs an optimal...
Article
Full-text available
In medical informatics, deep learning-based models are being used to predict and diagnose cardiovascular diseases (CVDs). These models can detect clinical signs, recognize phenotypes, and pick treatment methods for complicated illnesses. One approach to predicting CVDs is to collect a large dataset of patient medical records and use it to train a d...
Article
Full-text available
Smart farming helps to increase yield by smartly deciding the steps that should be practised in the season. A few components of precision farming are recommending the crops for cultivation, predicting the weather conditions, examining the soil; determining the pesticides, and fertilizers that have to be used. Smart Farming utilizes advanced technol...
Article
Full-text available
IoT-based remote health monitoring is a promising technology to support patients who are unable to travel to medical facilities. Due to the sensitivity of health data, it is important to secure it against all possible threats. While a great deal of work has been done to secure IoT device-cloud communication and health records on the cloud, insider...
Article
Full-text available
Microgrid (MG) technologies offer users attractive characteristics such as enhanced power quality, stability, sustainability, and environmentally friendly energy through a control and Energy Management System (EMS). Microgrids are enabled by integrating such distributed energy sources into the utility grid. The microgrid concept is proposed to crea...
Article
Full-text available
Due to the exponential increase in internet and social media users, fake news travels rapidly, and no one is immune to its adverse effects. Various machine learning approaches have evaluated text and images to categorize false news over time, but they lack a comprehensive representation of relevant features. This paper presents an automated method...
Article
Full-text available
Traction applications, such as electric and hybrid vehicles, require the electrical motor to be operated at low load conditions during most of their driving cycle. Permanent magnet (PM) motors in this case may not be an optimal choice due to their poor efficiency under low load conditions despite the fact that they exhibit the best output character...
Article
Full-text available
COVID-19 has become a very transmissible disease that has had a worldwide impact, resulting in a huge number of infections and fatalities. Testing is critical to the pandemic’s successful response because it helps detect illnesses and so attenuate (isolate/cure) them and now vaccination is a life-safer innovation against the pandemic which helps to...
Article
Full-text available
Background and aim: Machine learning methods are examined by many researchers to identify weeds in crop images captured by drones. However, metaheuristic optimization is rarely used in optimizing the machine learning models used in weed classification. Therefore, this research targets developing a new optimization algorithm that can be used to opti...
Article
Full-text available
Several academicians have been actively contributing to establishing a practical solution to storing and distributing medical images and test reports in the research domain of health care in recent years. Current procedures mainly rely on cloud-assisted centralized data centers, which raise maintenance expenditure, necessitate a large amount of sto...
Article
Full-text available
Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' ef...
Article
Full-text available
Blockchain technology has emerged as a promising candidate for space exploration and sustainable energy systems. This transformative technology offers secure and decentralized strategies to process and manipulate space resources. Remote sensing provides viable potential with the coexistence of open data from various sources, such as short-range sen...
Article
Full-text available
Background Higher education institutions (HEIs) shifted from in-person attendance to blended and online learning due to the COVID-19 lockdowns. Objective This study investigated the students' perception of satisfaction, convenience, engagement, and learning towards blended and online courses conducted before, during, and after the COVID-19 lockdow...
Article
Full-text available
Tuberculosis is curable, still the world’s second inflectional murderous disease, and ranked 13th (in 2020) by the World Health Organization on the list of leading death causes. One of the reasons for its fatality is the unavailability of modern technology and human experts for early detection. This study represents a precise and reliable machine v...
Article
Full-text available
Purpose: Telehealth, Internet interventions, or digital apps provide healthcare to isolated regions and can span borders. The purpose of this research was to assess the use of the Seha application, public perceptions toward the application, and factors that affect its utilization. Methods: The cross-sectional method was used to analyze the quant...
Chapter
The precise and proficient detection of the kidney boundary in low-contrast images is considered as the main difficulty in the detection of kidney boundary in MRI image. The exact identification of a kidney shape in medical images with decreased non-kidney components to acquire insignificant false edge detection is adequately vital for several appl...
Article
Full-text available
Background: Information system use has substantially increased among the organization based on its effective integration of the resources and improved performance. The increasing reliance on the information system serves as a great security threat for the firms. Objective: The study intends to evaluate the security of the information system in the...

Network

Cited By