Mohammed Abdullah Al-Hagery

Mohammed Abdullah Al-Hagery
Qassim University · Department of Computer Science

Professor. Dr

About

56
Publications
34,757
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
164
Citations
Introduction
Additional affiliations
September 2013 - present
Qassim University
Position
  • Lecturer
August 2007 - present
Qassim University
Position
  • Head of Department
February 2005 - August 2007
University of Science and Technology Yemen.
Position
  • Member of CS academic staff 2005 to august 2007
Description
  • Lecturer and Head of Computer Science Dept

Publications

Publications (56)
Article
Full-text available
Vehicle tailgating or simply tailgating is a hazardous driving habit. Tailgating occurs when a vehicle moves very close behind another one while not leaving adequate separation distance in case the vehicle in front stops unexpectedly; this separation distance is technically called “Assured Clear Distance Ahead” (ACDA) or Safe Driving Distance. Adva...
Article
Full-text available
Analyzing the sentiment of Arabic texts is still a big research challenge due to the special characteristics and complexity of the Arabic language. Few studies have been conducted on Arabic sentiment analysis (ASA) compared to English or other Latin languages. In addition, most of the existing studies on ASA analyzed datasets collected from Twitter...
Article
Full-text available
Activated carbon is one of the most highly proven adsorbents for organic chemicals from wastewater. It acts as a filter and adsorbs various chemicals from the wastewater. It has large pore size and strong adsorptive capacity. The quality of wastewater is generally determined by chemical oxygen demand (COD), biochemical oxygen demand (BOD5), total s...
Article
Full-text available
Different types of pandemics that have appeared from time to time have changed many aspects of daily life. Some governments encourage their citizens to use certain applications to help control the spread of disease and to deliver other services during lockdown. The Saudi government has launched several mobile apps to control the pandemic and have m...
Article
In present digital era, data science techniques exploit artificial intelligence (AI) techniques who start and run small and medium-sized enterprises (SMEs) to have an impact and develop their businesses. Data science integrates the conventions of econometrics with the technological elements of data science. It make use of machine learning (ML), pre...
Article
In recent years, Brain-Computer Interface (BCI) system gained much popularity since it aims at establishing the communication between human brain and computer. BCI systems are applied in several research areas such as neuro-rehabilitation, robots, exoeskeletons, etc. Electroencephalography (EEG) is a technique commonly applied in capturing brain si...
Article
Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is pr...
Article
Full-text available
Time series forecasting plays a significant role in numerous applications, including but not limited to, industrial planning, water consumption, medical domains, exchange rates, and consumer price index. The main problem is insufficient forecasting accuracy. The present study proposes hybrid forecasting methods to address this need. The proposed me...
Article
Full-text available
Over-/underspeeding is one of the leading causes of road accidents. Traditional systems of detecting and reporting speed-limit violations are not suitable for smart cities. Even the sophisticated conventional systems that use cameras or RFIDs for automating speed-limit violations have several drawbacks, including cost, complexity, reliability, and...
Article
Full-text available
Renewable energy is one of the essential elements of the social and economic development in any civilized country. The use of fossil fuels and the non-renewable form of energy has many adverse effects on the most of ecosystems. Given the high potential of renewable energy sources in Yemen and the absence of similar studies in the region, this study...
Article
This paper details the examination of a particular case of data compression, where the compression algorithm removes the redundancy from data, which occurs when edge-based compression algorithms compress (previously compressed) pixelated images. The newly created redundancy can be removed using another round of compression. This work utilized the J...
Article
Full-text available
Background Bi-gram distance (BI-DIST) is a recent approach to measure the distance between two strings that have an important role in a wide range of applications in various areas. The importance of BI-DIST is due to its representational and computational efficiency, which has led to extensive research to further enhance its efficiency. However, de...
Article
Full-text available
A great number of works in sentiment classification have been developed, usually involving machine learning algorithms. The ensemble classifier is a subfield of machine learning that combines different base classifiers to form one powerful classifier. In the text classification, the ensemble classifier cannot process the text directly. Instead, it...
Article
Full-text available
The Internet of Things (IoT) is the fourth technological revolution in the global information industry after computers, the Internet, and mobile communication networks. It combines radio-frequency identification devices, infrared sensors, global positioning systems, and various other technologies. Information sensing equipment is connected via the...
Article
Full-text available
There are huge tons of transactions being accomplished online every day. This implies that ecommerce is facing the problem of data and information overloads. While customers are shopping via websites, they spend a lot of time to search for the required products based on their needs. This problem can easily be alleviated by having an accurate recomm...
Article
Full-text available
Educational Data Mining (EDM) helps to recognize the performance of students and predict their academic achievements that include the successes aspects and failures, negative aspects and challenges. In the educational systems, a massive amount of students' data has been collected, which has become difficult for officials to search through and obtai...
Article
Full-text available
The field of using Data Mining (DM) techniques in educational environments is typically identified as Educational Data Mining (EDM). EDM is rapidly becoming an important field of research due to its ability to extract valuable knowledge from various educational datasets. During the past decade, an increasing interest has arisen within many practica...
Article
Full-text available
Educational institutions contain a vast collection of data accumulated for years, so it is difficult to use this data to solve problems related to the progress of the educational process and also contribute to achieving quality. For this reason, the use of data mining techniques helps to extract hidden knowledge that helps in making the decisions n...
Article
Full-text available
Depression is a widespread and serious phenomenon in public health in all societies. In Saudi society, depression is one of the diseases that the community is may refuse to disclose it. There are no studies have analyzed this disease within the Saudi community. The main research objective is to discover the depression level of Saudi People's. In ad...
Article
Full-text available
p> Arab users of social media have significantly increased, thus increasing the opportunities for extracting knowledge from various areas of life such as trade, education, psychological health services, etc. The active Arab presence on Twitter motivates many researchers to classify and analysis Arabic tweets from numerous aspects. This study aimed...
Article
Full-text available
The Natural Language Processing (NLP) is a process to automate the text or speech of Natural Languages. This automation is mainly conducted for Western languages. The Arabic Language got less focus in this area. This paper presents a Model to recognize an Arabic sentence. A new morphological model based on regular expressions is developed to recogn...
Article
Full-text available
Precise predictions of renewable energy sources play a vital role in bringing them into the electric grid. This research presents one of the most powerful machine learning algorithms to forecast the hourly global solar radiance. This study utilizes artificial neural networks (ANN) as the machine learning predictor due to its ability to tackle the n...
Article
Nowadays, there is a significant increase in the medical data that we should take advantage of that. The application of the machine learning via the data mining processes, such as data classification depends on using a single classification algorithm or those complained as ensemble models. The objective of this work is to improve the classification...
Article
Arab users of social media have significantly increased, thus increasing the opportunities for extracting knowledge from various areas of life such as trade, education, psychological health services, etc. The active Arab presence on Twitter motivates many researchers to classify and analysis Arabic tweets from numerous aspects. This study aimed to...
Article
Full-text available
Nowadays, there is a significant increase in the medical data that we should take advantage of it. The application of the machine learning via the data mining processes, such as data classification, depends on using a single classification algorithm or those combined such as ensemble models. The objective of this work is to improve the classificati...
Article
Full-text available
More solar-based electricity generation stations have been established markedly in recent years as new and an important source of renewable energy. That is to ensure a more efficient, reliable integration of solar power to overcome several challenges such as, the future forecasting, the costly equipment in the metrological stations. One of the effe...
Article
Full-text available
The level of the student may change at the undergraduate level from his level in intermediate or secondary school. Educational and personal factors may affect the performance of university students, especially in the first year of university. In this study, we measure a relationship between a Grade Point Average (GPA) of the students at Qassim Univ...
Article
Full-text available
div style="’text-align: justify;">Mining in data is an important step for knowledge discovery, which leads to extract new patterns from datasets. It is a widespread methodology that has the capability to help ministries, companies, and experts for diving into the data to find important insights and patterns to help them take suitable decisions. The...
Conference Paper
Full-text available
N-gram distance (N-DIST) was developed by Kondrak's lately to measure the distance between two strings. It was found that, this distance could be computed by a smart dynamic programming procedure. The N-DIST has played important roles in a wide array of applications due to its representational and computational efficiency. To effect a more sensible...
Article
Full-text available
Real-World datasets accumulated over a number of years tend to be incomplete, inconsistent and contain noisy data, this, in turn, will cause an inconsistency of data warehouses. Data owners are having hundred-millions to billions of records written in different languages, hence continuously increases the need for comprehensive, efficient techniques...
Article
Full-text available
Mining in data is an important step for knowledge discovery, which leads to extract new patterns from datasets. It is a widespread methodology that has the capability to help ministries, companies, and experts for diving into the data to find important insights and patterns to help them take suitable decisions. The farmers and marketers of the date...
Conference Paper
Full-text available
Text classification is the process of categorizing text documents to a predefined group of categories. This paper aims to provide experimental evaluations of six well-known classification models in classifying large Arabic documents. These models are Nave Bayes (NB), Support Vector Machine (SVM), Random Forest, Logistic Regression, Decision Tree (D...
Chapter
Full-text available
Nurse Rostering Problem (NRP) is a well-known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem becomes more serious due to the shortage of nurses. Thus, this work aims to tackle this problem by h...
Article
Full-text available
Logical analysis of data (LAD) is an important subfield of supervised machine learning and data mining. It is a methodology for data analysis, which uses concepts of optimization, combinatorics and Boolean functions. LAD is a binary classification that used for Boolean data with high explanatory power. Because patterns are the most important buildi...
Conference Paper
Nurse Rostering Problem (NRP) is a well-known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem becomes more serious due to the shortage of nurses. Thus, this work aims to tackle this problem by h...
Conference Paper
Nurse Rostering Problem (NRP) is a well known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem becomes more serious due to the international shortage of nurses. Attempting to strike the balance b...
Article
Full-text available
Global universities are subject to the academic ranking every year. One of the common ranking types that are applied annually is called the Academic Ranking of World Universities (ARWU). It developed by a team of researchers and experts. The ARWU is composed of a set of common criteria related to academic tasks and it does not include any indicatio...
Article
Full-text available
Knowledge Data Discovery (KDD) in Breast Cancer data set includes; data collection, data preprocessing, data mining, knowledge extraction, patterns validation, and results visualization. Where, this disease is considered as one of the deadly diseases in the world. The research problem is that there are many machine learning classifiers with differe...
Article
Full-text available
A large number of scientific papers are retrieved using Search Engines from the electronic databases. Some of these Engines are limited and others have designed for a general purpose. A number of researchers wish to prepare a survey of a particular topic. They are facing a problem to find the most related topics to a particular research title. The...
Article
Full-text available
Websites hide thousands of links and sub-links. Websites‘ links contain a huge amount of information and knowledge. This research concentrates mainly on the difficulty of early prediction of web structure size at the beginning of Website Development Life Cycle(WDLC), especially during planning and gathering requirements. There is a lack of finding...
Article
Full-text available
The availability of huge amounts of medical data in hospitals and other health organizations leads to the need for powerful data analysis tools to extract useful knowledge. For many years ago, researchers are concentrating on applying statistical methods and Data Mining tools to improve data analysis relevant to large historical data sets. There is...
Article
Full-text available
The World Wide Web includes several types of website applications. Mainly these applications are related to business, organizations, companies, and others. There is a lack to get raw data sets to study the behavior of the internal structure of each type of these websites. Where websites structures include treasure of links, and sub-links, in additi...
Poster
Full-text available
Huge amounts of medical data are available currently that can leads to useful knowledge after applying powerful data analysis tools. Since diabetes been called the modern society diseases. Reliable prediction methodology to diagnose this disease will support medical professionals in this field. The research concentrates upon predictive analysis of...
Poster
Full-text available
Discovery in Databases" process, or KDD), a field at the intersection of computer science and statistics, is the process that attempts to discover patterns in large data sets. The main objective of this paper is using the data mining techniques and tools for breast cancer early prediction, and to connect the technical field with medical field to se...
Article
Full-text available
Software maintenance is important and difficult to measure. The cost of maintenance is the most ever during the phases of software development. One of the most critical processes in software development is the reduction of software maintainability cost based on the quality of source code during design step, however, a lack of quality models and mea...
Article
Full-text available
The traditional techniques and methods used by students during systems development at the College of Computer, Qassim University is leading to this study. It leads to identify problems that hinder the construction and development of information systems, and identify their causes. The most important stages of systems development are analysis and des...
Article
The lifetime of a product depends on its maintainability. It is proved that a lot of cost spent towards maintainability. Researchers experienced difficulties to measure and improve software understandability and maintainability then software quality. In this work a proposed Model-Based Factors (MBF) is created to help developers to increase softwar...
Article
Full-text available
The lifetime of a product depends on its maintainability. It is proved that a lot of cost spent towardsmaintainability. Researchers experienced difficulties to measure and improve software understandabilityand maintainability then software quality. In this work a proposed Model-Based Factors (MBF) iscreated to help developers to increase software u...
Article
Full-text available
The efficiency and performance of multitasking operating systems essentially depend on the nature of CPU scheduling algorithm. Computer CPU is one of the main important resources and as Round Robin algorithm (RR) is considered as one of the most widely used scheduling algorithms. This research provides a proposed method that takes into account the...
Article
Full-text available
Yemen, the government and citizens are trying to evolve and keep pace with developed countries in various fields. In order to accomplish this task, some important requirements and mechanisms should be studied carefully so as not to lead to negative results, as well as with the application of the concept of e Government in the Republic of Yemen shou...
Article
Full-text available
Function Point (FP) is a software size measure, which includes the standard FP and many different models derived from it. The standard FP method created by Albrecht in 1979 is currently known as the International FP User group (IFPUG) version, which consists of three main parts: The first part is five components, and the second is the complexity we...
Thesis
Full-text available
Abstract: Function points are intended to measure the amount of functionality in a system as described by a specification. Function points are first proposed in 1979 and currently they are known as the International Function Points User Group (IFPUG) version 4.1. Function points are computed through three steps. The first step is counting the numb...

Questions

Questions (15)
Question
Dear, Could you please help me to identify 6 main Core Courses names for the Artificial Intelligence
just names only.
Kindly, I need your help
Thank you in advance.
Question
Just I'm asking for a quick search method for collecting references for a scooping and a systematic review paper instead of the manual search in IEEE, Elsevier, springer, other DBs.
Thanks in advance for your help.
Question
In the coming months the RG old factor will be permanently removed and new factor only will be applied, which is Research Interest.
and based on what this new factor will be calculated?
How to define the components of Research Interest ?

Network

Cited By

Projects

Projects (6)
Project
The aim of this project is to develop novel algorithms for name matching. this project help in improving the search engines by matching the names with different spellings for famous people.
Project
The ultimate goal of this project is to discover and classify the Cyberbullying problem in Tweeter's contents in the Arabic language in Saudi Arabia. Hence, this study will increase the duty of government and criminal laws to protect the community from cyberbullying by take actions and make sanctions. In addition, the Ministry of Education will consider how a subject like “ethics of social media” very important recently. Besides that, it will be one of the hot research field, challenges of the Arabic language, and challenges of Twitter data.