Mohammed Hadwan

Mohammed Hadwan
Qassim University · College of Computer

Doctor of Philosophy
Looking for interested researchers in AI area to share & discuss new ideas that can contribute to the human development

About

54
Publications
18,119
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
309
Citations
Citations since 2016
39 Research Items
248 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Introduction
Mohammed Hadwan is an Associate Professor currently working at the department of information technology, college of Computer, Qassim University, Saudi Arabia. He has his PhD. from Universiti Kebangsaan Malaysia (UKM) in 2011. His research interest is in all Artificial Intelligence (AI) related research topics. Optimization, Machine learning, the Internet of Things (IoT), smart cities, Indoor Navigations Systems, Expert systems are among interesting research topics.
Additional affiliations
April 2016 - present
Qassim University
Position
  • Professor (Associate)
Description
  • I am teaching several subjects at IT department such as AI, E-commerce, Decision support systems, IT project management...
Education
January 2007 - November 2011
Universiti Kebangsaan Malaysia
Field of study
  • computer science
June 2004 - April 2006
Universiti Sains Malaysia
Field of study
  • Computer Science

Publications

Publications (54)
Article
Full-text available
Depression is a widespread and serious phenomenon in public health in all societies. In Saudi society, depression is one of the diseases that the community is may refuse to disclose it. There are no studies have analyzed this disease within the Saudi community. The main research objective is to discover the depression level of Saudi People's. In ad...
Article
Full-text available
The attention-based encoder-decoder technique, known as the transformer , is used to enhance the performance of end-to-end automatic speech recognition (ASR). This research focuses on applying ASR end-to-end transformer-based models for the Arabic language, as the researchers' community pays little attention to it. The Muslims Holy Qur'an book is w...
Article
Full-text available
Managing physical objects in the network's periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems' ef...
Article
Full-text available
Deep learning is the one of approaches of machine learning that uses algorithms for building a model based on complex unstructured data. The Muslims Holy Qur’an book is written using Arabic diacritized text. In this paper, a traditional method to build a robust Qur’an versus recognition is proposed. The MFCC is used to extract features. These featu...
Article
Full-text available
Analyzing the sentiment of Arabic texts is still a big research challenge due to the special characteristics and complexity of the Arabic language. Few studies have been conducted on Arabic sentiment analysis (ASA) compared to English or other Latin languages. In addition, most of the existing studies on ASA analyzed datasets collected from Twitter...
Article
Full-text available
Different types of pandemics that have appeared from time to time have changed many aspects of daily life. Some governments encourage their citizens to use certain applications to help control the spread of disease and to deliver other services during lockdown. The Saudi government has launched several mobile apps to control the pandemic and have m...
Article
Full-text available
The labor force is one of the most critical components of advanced countries, as an investment in the labor force leads to the country's economic development. The development of the labor force and human resources requires the development of education to obtain outputs that comply with the labor market requirements. In recent years, technology has...
Article
A real-life problem is the rostering of nurses at hospitals. It is a famous nondeterministic, polynomial time (NP)-hard combinatorial optimization problem. Handling the real-world nurse rostering problem (NRP) constraints in distributing workload equally between available nurses is still a difficult task to achieve. The international shortage of nu...
Article
Full-text available
Dipper throated optimization (DTO) algorithm is a novel with avery efficient metaheuristic inspired by the dipper throated bird. DTO has itsunique hunting technique by performing rapid bowing movements. To showthe efficiency of the proposed algorithm, DTO is tested and compared tothe algorithms of Particle Swarm Optimization (PSO), Whale Optimizati...
Article
Full-text available
For people with Autism Spectrum Disorder (ASD), using technological tools, such as augmented reality (AR) and serious games remain a new and unexplored option. To attract people with ASD who have communicative, social, emotional and attention deficit disorders to behavioral treatments , an attractive environment is needed that ensures continuity du...
Article
Full-text available
A specific phobia is a common anxiety-related disorder that can be treated efficiently using different therapies including exposure therapy or cognitive therapy. One of the most famous methods to treat a specific phobia is exposure therapy. Exposure therapy involves exposing the target patient to the anxiety source or its context without the intent...
Article
Full-text available
A real-life problem is the rostering of nurses at hospitals. It is a famous nondeterministic, polynomial time (NP) -hard combinatorial optimization problem. Handling the real-world nurse rostering problem (NRP) constraints in distributing workload equally between available nurses is still a difficult task to achieve. The international shortage of n...
Article
Full-text available
Coronavirus (COVID-19) is the most prevalent coronavirus infection with respiratory symptoms such as fever, cough, dyspnea, pneumonia, and weariness being typical in the early stages. On the other hand, COVID-19 has a direct impact on the circulatory and respiratory systems as it causes a failure to some human organs or severe respiratory distress...
Conference Paper
Full-text available
The Nurse Rostering Problem (NRP) is one of the NP-hard problems that are difficult to solve for optimality. NRP deals with the distribution of working shifts to the staff nurses at healthcare organizations under given rules. Normally, NRP aims at generating a duty roster that satisfies all of the hard constraints (mandatory) and as many soft const...
Article
Full-text available
Time series forecasting plays a significant role in numerous applications, including but not limited to, industrial planning, water consumption, medical domains, exchange rates, and consumer price index. The main problem is insufficient forecasting accuracy. The present study proposes hybrid forecasting methods to address this need. The proposed me...
Cover Page
Full-text available
Yemen Research Organization organizes Webinar: How to Find A Research Topic and A Potential Supervisor Speaker: Dr. Murad Rassam Associate Professor of Network and Information Security Taiz University, Yemen Time: Saturday 30 October 2021 4:00 pm Sana'a Time Online Platform: ZOOM Join Zoom Meeting https://zoom.us/j/98553350585... Meeting ID:...
Article
Full-text available
The widespread usage of social media has led to the increasing popularity of online advertisements, which have been accompanied by a disturbing spread of clickbait headlines. Clickbait dissatisfies users because the article content does not match their expectation. Detecting clickbait posts in online social networks is an important task to fight th...
Article
Full-text available
span>Decision support systems (DSS) are useful business intelligence (BI) tools as they help managers in large organizations make the best out of many decisions. Decisions are based on various types of raw data, models, documents, knowledge, and past experiences. This paper examines numerous criteria of decision support systems in the educational e...
Article
Full-text available
Background Bi-gram distance (BI-DIST) is a recent approach to measure the distance between two strings that have an important role in a wide range of applications in various areas. The importance of BI-DIST is due to its representational and computational efficiency, which has led to extensive research to further enhance its efficiency. However, de...
Article
Full-text available
Steganography and data security are extremely important for all organizations. This research introduces a novel stenographic method called multi-stage protection using the pixel selection technique (MPPST). MPPST is developed based on the features of the pixel and analysis technique to extract the pixel's characteristics and distribution of cover-i...
Article
Full-text available
Steganography and data security are extremely important for all organizations. This research introduces a novel stenographic method called multi-stage protection using the pixel selection technique (MPPST). MPPST is developed based on the features of the pixel and analysis technique to extract the pixel's characteristics and distribution of cover-i...
Article
Full-text available
Due to the information revolution, one of the biggest challenges of e-commerce is the huge data that needs to be processed and analyzed to gain benefits from it. Big Data Analytics (BDA) aims to improve the decision-making process by analyzing and understanding big data, e.g., messages, social media posts, etc. Furthermore, BDA capabilities are use...
Article
Full-text available
Nowadays personal names are not the only way to refer to celebrities and experts from different fields, instead, they can be referred to by their aliases on the web. Associated aliases have remarkable importance in retrieving information about the personal name from the websites. Therefore, disclosing aliases can have an important role in overcomin...
Article
The growth of cloud computing (CC) is noticeable in Saudi Arabia, especially in educational institutions. To have an effective E-learning platform, CC is widely used due to its capabilities. This research studying the factors affects the adoption of cloud-based E-learning at Qassim University (QU) from the student’s perspective. A model proposed to...
Article
The growth of cloud computing (CC) is noticeable in Saudi Arabia, especially in educational institutions. To have an effective E-learning platform, CC is widely used due to its capabilities. This research studying the factors affects the adoption of cloud-based E-learning at Qassim University (QU) from the student’s perspective. A model proposed to...
Article
Full-text available
With the advancements in technology, smart entities are becoming increasingly intelligent, therefore, increasing their interaction capabilities with their surrounding environment. Apart from the traditional smart low profile devices, these entities now involve cars, mobiles, televisions, and extend to universities and smart cities. One of the bi-pr...
Article
Full-text available
In the last few years, the use of social media and social networking sites (SNSs) increased and dramatically involved in our daily life activities. Users reliably communicate and share information through these SNSs such as Facebook, Twitter and Instagram. The popularity and reliability of SNSs introduced social commerce (S-commerce) as a novel bus...
Conference Paper
Full-text available
N-gram distance (N-DIST) was developed by Kondrak's lately to measure the distance between two strings. It was found that, this distance could be computed by a smart dynamic programming procedure. The N-DIST has played important roles in a wide array of applications due to its representational and computational efficiency. To effect a more sensible...
Conference Paper
Full-text available
A great deal of research has been done to find out an accurate algorithm for name matching that would play major role in the application process. Researchers have developed several algorithms to measure the similarity of string, but most of them are designed mainly to deal with Latin-based languages. However, dealing with the Arabic context is a ch...
Article
Full-text available
Recitation and listening of the Holy Quran with Tajweed is an essential activity as a Muslim and is a part of the faith. In this article, we use a machine learning approach for the Quran Reciter recognition. We use the database of Twelve Qari who recites the last Ten Surah of Quran. The twelve Qari thus represents the 12-class problem. Two approach...
Chapter
Full-text available
Nurse Rostering Problem (NRP) is a well-known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem becomes more serious due to the shortage of nurses. Thus, this work aims to tackle this problem by h...
Conference Paper
Nurse Rostering Problem (NRP) is a well-known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem becomes more serious due to the shortage of nurses. Thus, this work aims to tackle this problem by h...
Conference Paper
Nurse Rostering Problem (NRP) is a well known NP-Hard combinatorial optimization problem. The fact is that coping real-world constraints in allocating the shift duties fairly among the available nurses is still a hard task to accomplish. The problem becomes more serious due to the international shortage of nurses. Attempting to strike the balance b...
Article
Full-text available
Harmony Search Algorithm (HSA) is a relatively new nature-inspired algorithm. It evolves solutions in the problem search space by mimicking the musical improvisation process in seeking agreeable harmony measured by aesthetic standards. The Nurse Rostering Problem (NRP) is a well-known NP-hard scheduling problem that aims at allocating the required...
Article
Full-text available
Drawing up the nurses' duty roster is one of the main key issues that are faced by hospital managements, this study focuses on Nurse Rostering Problem (NRP), an NP-hard problem, that is difficult to solve for optimality. Harmony Search Algorithm (HSA) refers to the meta-heuristic algorithm inspired by the improvisation of Jazz musicians. Due to the...
Article
Full-text available
Harmony Search Algorithm (HSA) is a relatively new nature-inspired algorithm. HSA is a population based metaheuristic that inspired by the improvisation of jazz musicians. It evolves solutions by mimicking the musical improvisation process in searching for agreeable harmony. Many variants of HSA have proposed to solve different types of optimizatio...
Presentation
Full-text available
A detailed presentation on hybridizing Harmony search with other metaheuristic approaches.
Conference Paper
Full-text available
Nurse Rostering problem (NRP) represents a subclass of scheduling problems that are difficult to solve for optimality. It deals with assigning shifts to staff nurses subject to satisfying required workload and other constraints. The constraints are classified into hard constraints (compulsory) and soft constraints (should be satisfied as much as po...
Article
Full-text available
The Nurse Rostering Problem (NRP) is one of the NP-hard problems that are difficult to solve for optimality. NRP deals with the distribution of working shifts to the staff nurses at healthcare organizations under given rules. Normally, NRP aims at generating a duty roster that satisfies all of the hard constraints (mandatory) and as many soft const...
Article
Full-text available
Nurse Rostering Problem (NRP) concerns about producing a high quality workable duty roster for the available staff nurses. The aim of this work is to present a greedy constructive heuristic algorithm to generate a feasible initial solution by satisfying the hard constraints. Basically the initial solution includes three steps: first we start by des...
Conference Paper
Full-text available
The paper, at hand, introduces a semi-cyclic shift patterns approach (SCSPA) that solves nurse rostering problem (NRP) at the Medical Centre, Universiti Kebangsaan Malaysia (UKMMC). Since night shift is the most problematic shift to assign due to the extra constraints that it has, the paper proposes a combination of semi-cyclic approach, which firs...
Poster
Full-text available
This study investigates the Nurse Rostering Problem (NRP) which is one of the most difficult problems in the timetabling areas. The researcher finds that the study of the relationships between the nurses’ duty roster and the use of automated nurse roster tools has gained the attraction of the researchers in the current time. In addition, the resear...
Conference Paper
Full-text available
Nurse Rostering problem (NRP) is an NP-Hard problem, which is difficult to solve for its optimality. This work aims to ensure the availability of enough nurses, by giving them fair consideration during the rostering period. In order to achieve this, we proposed a greedy constructive heuristic algorithm based on the idea of generating the most requi...
Conference Paper
The nurse rostering problem (NRP) is a task of assigning duties fairly among available nurses at healthcare organizations for specific periods of time defined as shifts. NRP belongs to NP-hard problems for which an optimal solution is difficult to be obtained. This paper reports on the practical nurse rostering problem and issues at Hospital Univer...
Conference Paper
Full-text available
Nurse rostering problem solved by Harmony search algorithm. The dataset used in this paper is gathered from a real-world hospital in Malaysia belonging to a National University Malaysia called University Kebangsaan Malaysia Medical Center UKMMC.
Thesis
Full-text available
Steganography is the art and science of hidden writing in such a way that no one knows about the existence of the secret message. Thus, it refers to the practice of hiding secret messages in communications over a public channel using a digital carrier. The purpose of this project is to investigate and present a review of one of the most important i...

Questions

Questions (10)
Question
Which software do you use for citations? please share with us the name of the software, advantages, and disadvantages if possible...
Question
It is compulsory to wear masks when you go outside the home in many countries. upper face detection needs to be explored more and more especially if COVID-19 prolongs. People working in image processing and face detection can investigate face detection with masks and the images are widely available on social media. I was thinking about this idea today while i was wearing masks and pass through a CCTV camera at my workplace.

Network

Cited By

Projects

Projects (4)
Project
The goal is to introduce novel metaheuristic based algorithms to solve Nurse rostering problems. Benchmark datasets and real-world datasets are used to test the proposed algorithms in this project.
Project
The aim of this project is to develop novel algorithms for name matching. this project help in improving the search engines by matching the names with different spellings for famous people.