Najla Al-NabhanKing Saud University | KKUH · Department of Computer Science
Najla Al-Nabhan
Ph.D.
About
49
Publications
9,762
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
570
Citations
Publications
Publications (49)
Daily conversations contain rich emotional information, and identifying this emotional information has become a hot task in the field of natural language processing. The traditional dialogue sentiment analysis method studies one-to-one dialogues and cannot be effectively applied to multi-speaker dialogues. This paper focuses on the relationship bet...
Existing persona-based dialogue generation models focus on the semantic consistency between personas and responses. However, various influential factors can cause persona inconsistency, such as the speaking style in the context. Existing models perform inflexibly in speaking styles on various-persona-distribution datasets, resulting in persona styl...
With the development of multimodal sentiment analysis tasks, target-level/aspect-level multimodal sentiment analysis has received more attention, aiming to intelligently judge the sentiment orientation of target words using visual and textual information. Most existing methods mainly rely on combining the whole image and text while ignoring the imp...
Many real-world cooperative problems can be implemented using Multi-Agent Reinforcement Learning (MARL) techniques, such as urban traffic control or multi-role games. However, the policy learning of MARL algorithms contains features of long-trajectory training and partial observability, which leads to the sparsity of reward and the lack of decision...
Coordinating multiple agents with diverse tasks and changing goals without interference is a challenge. Multiagent reinforcement learning (MARL) aims to develop effective communication and joint policies using group learning. Some of the previous approaches required each agent to maintain a set of networks independently, resulting in no considerati...
Building a human-computer conversational system that can communicate with humans is a research hotspot in the field of artificial intelligence. Traditional dialogue systems tend to produce irrelevant and non-information responses, which reduce people’s interest in engaging in a conversation. This often leads to boring conversations. To alleviate th...
Currently, building an end-to-end dialogue system for multi-domain task-oriented dialogue has some enormous challenges. Dialogue systems must obtain entire dialogue states from all relevant domains in order to respond correctly. However, multiple domains are involved in the actual dialogue process, which increases the difficulty of obtaining the di...
This paper proposes a new method of locality preserving projection (LPP), which replaces the squared L2-norm minimization and maximization distances in the objective of conventional LPPW. The proposed method is termed as Simultaneous p- and s-orders Minmax Robust Locality Preserving Projection (psRLPP), which is robust to outlier samples. Then, we...
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners. In order to prevent privacy leakage, each owner assigns a corresponding privacy protection strategy. For the same shared contents, integratin...
With the development of social media, people tend to express their opinions on multimedia such as text, photos, audios, and videos. Meanwhile, more rumors hiding in multi-modal content are misleading social media users. The early rumor detection task aims to detect rumors before spreading. However, annotation on multi-modal data often involves a la...
Object detection is an essential technology in the computer vision domain and plays a vital role in intelligent transportation. Intelligent vehicles utilize object detection on images for environment perception. This work develops a target detection algorithm based on deep learning technologies, particularly convolutional neural networks and neural...
Crowd management is a considerable challenge in many countries including Saudi Arabia, where millions of pilgrims from all over the world visit Mecca to perform the sacred act of Hajj. This holy ritual requires large crowds to perform the same activities during specific times, which makes crowd management both critical and difficult. Without proper...
Text-based person re-identification (Re-id) is an important task in video surveillance, which consists of retrieving the corresponding person's image given a textual description from a large gallery of images. It is difficult to directly match visual contents with the textual descriptions due to the modality heterogeneity. On the one hand, the text...
Clustering is an important research direction in data mining. However, there is no one clustering algorithm that can be applied efficiently in all situation. Clustering ensemble is the best way to solve the above-mentioned problems. It combines the results of multiple clustering algorithms, and the final result is significantly better than a single...
In the era of social networks, the rapid growth of data mining in information retrieval and natural language processing makes automatic text summarization necessary. Currently, pretrained word embedding and sequence to sequence models can be effectively adapted in social network summarization to extract significant information with strong encoding...
Single-frame image super-resolution (SISR) technology in remote sensing is improving fast from a performance point of view. Deep learning methods have been widely used in SISR to improve the details of rebuilt images and speed up network training. However, these supervised techniques usually tend to overfit quickly due to the models’ complexity and...
The present study proposes an assessment of the Added Value (AV) in seasonal mean temperature regional simulations by the Rossby Centre Regional Climate Atmospheric Model version 4 (RCA4) over West Africa, with emphasize on the contribution the driving Global Climate Models (GCMs) and the downscaling experiment. The results show that the AV by RCA4...
The typical aim of user matching is to detect the same individuals cross different social networks. The existing efforts in this field usually focus on the users' attributes and network embedding, but these methods often ignore the closeness between the users and their friends. To this end, we present a friend closeness based user matching algorith...
Simulation is a powerful tool for improving, evaluating and analyzing the performance of new and existing systems. Traffic simulators provide tools for studying transportation systems in smart cities as they describe the evolution of traffic to the highest level of detail. There are many types of traffic simulators that allow simulating traffic in...
Social media has recently become one of the most used media in the world. This has resulted in a great hotbed for the growth of rumors, as anyone can spread knowledge and opinions without confirmation. Previous works on rumor detection focused on hand-extracted features and spent less effort on text representation. In this research, a novel method...
Community detection is a complex and meaningful process, which plays an important role in studying the characteristics of complex networks. In recent years, the discovery and analysis of community structures in complex networks has attracted the attention of many scholars, and many community discovery algorithms have been proposed. Many existing al...
Many real-world problems can be abstracted into graph classification problems. Recently, graph convolutional networks have achieved great success in the task of node classification and link prediction. However, when using graph convolution network to process the task of graph classification, either global topology information or local information i...
Diagnosability is an important characteristic indicator to determine whether the system is stable and reliable. In this paper, the general architecture of event-state-combination diagnosability is investigated. The contributions are threefold. First, the notion of event-state-combination diagnosability is formalized. Roughly speaking, an event-stat...
In this work, we solve the adaptive actuator backlash compensation control problem of uncertain nonlinear systems. A new generalized backlash model is first proposed, which takes both the actuator perturbation and unidentifiable coupling into account, and hence captures the practical backlash behavior more accurately. Nevertheless, such a model mak...
As a popular data representation technique, Nonnegative matrix factorization (NMF) has been widely applied in edge computing, information retrieval and pattern recognition. Although it can learn parts-based data representations, existing NMF-based algorithms fail to integrate local and global structures of data to steer matrix factorization. Meanwh...
Blockchain is an innovated and revolutionized technology, which has attracted wide attention from academia and industry. At present, blockchain has been widely used in certificate management and credential delivery in network access authentication. In a large-scale multidomain Internet of Things (IoT) environment, one of the important issues is cro...
Cloud computing is widely used for its powerful and accessible computing and storage capacity. However, with the development trend of Internet of Things (IoTs), the distance between cloud and terminal devices can no longer meet the new requirements of low latency and real-time interaction of IoTs. Fog has been proposed as a complement to the cloud...
The Industrial Internet of Things (IIoT) plays an important role in the development of smart factories. However, the existing IIoT systems are prone to suffering from single points of failure and unable to provide stable service. Meanwhile, with the increase of node scale and network quantity, the maintenance cost presents to be higher. Such a disa...
The impressive growth and advancement of Unmanned Aerial Vehicles (UAVs)-enabled solutions and systems has motivated their employment in variety of applications ranging from military and security to surveillance, entertainment, business, and media. In most of these applications, UAVs were employed to tackle critical operations. Most of operations r...
Internet of Things (IoT) and its enabling technologies are major components of future smart cities. With the growing number of devices connecting to the Internet, it has become necessary for the IoT network infrastructure to enhance its capabilities and capture such scalability. Understanding the IoT infrastructure is the first step in influencing...
Internet of Things (IoT) is one of the promising technologies for tackling issues of modern cities by creating a massive world-wide network of interconnected physical objects embedded with electronics, software, sensors, and network connectivity. IoT-Enabled Smart City Buildings today vulnerable to several types of hazards. As IoT and its enabling...
Conversation generation is an important natural language processing task and has attracted much attention in recent years. The realization of the coversation model is also of great significance to the field of social computing, helping to build artificial intelligence robots on social networks. The open domain conversation model model is fundamenta...
With the application of data mining in many fields such as information science, bioinformatics, and network intrusion detection, more and more data are showing new features such as strong structuration and complex relationships between data. As a complex data structure, a graph can be used to describe the relationship between things. Traditional gr...
With the rapid expansion of data volume, traditional data storage methods have been unable to meet the practical application requirements of blockchain cloud storage. Aiming for the cloud storage problem of blockchain, a new storage access method for predicting dynamic file load is proposed. By predicting the load status of cloud storage files in a...
In the last few decades, urban areas across the world have experienced rapid growth in transportation technology with a subsequent increase in transport-related challenges. These challenges have increased our need to employ technology for creating more intelligent solutions. One of the essential tools used to address challenges in traffic is provid...
Computing connected dominating sets (CDSs) have been widely used to construct virtual backbones in wireless sensor networks, in order to control topology, facilitate routing and extend network lifetime. Constructing a minimum CDS is an NP-hard problem. For any CDS algorithm, the size of the constructed CDS is usually considered to be the most impor...
Wireless sensing technology becomes a new scientific instrument for physical and environmental monitoring. The technology involves deploying a large number of tiny sensor nodes that cooperatively sense and report a specific condition at various locations to the base station. This class of applications faces many challenges, mainly caused by communi...
Wireless sensing technology is becoming a new scientific instrument for environmental monitoring under extreme conditions. This class of applications requires reliable, energy-efficient, and self-organizing approaches. Connected dominating sets (CDSs) have been widely used for virtual backbone construction in unstructured wireless sensor networks t...
Energy efficiency is one of the major issues in wireless sensor networks (WSNs) and their applications. Distributed techniques with low message and time complexities are expected in WSNs. Connected dominating sets (CDSs) have been widely used for virtual backbone construction in WSNs to control topology, facilitate routing, and extend network lifet...
Future Wireless Sensor Networks (WSNs) will be composed of a large number of densely deployed sensors. A key feature of such networks is that their nodes are untethered and unattended. Distributed techniques are expected in WSNs. Computing Connected Dominating Sets (CDSs) have been widely used for virtual backbone construction in WSNs to control to...
This invention introduces a cooperative energy-efficient packet routing protocol for wireless sensor networks (WSNs) that achieves between 25%-50% energy saving compared to the existing WSNs routing algorithms. This invention is very important as it improves the performance of WSNs for real world applications. Generally speaking, this class of netw...
A cooperative packet routing for wireless sensor networks is described. In one aspect, a transient sensor node in a wireless sensor network receives a packet from a source node, wherein the packet is targeted for receipt by a base station. The transient sensor node, responsive to receiving the packet, estimates how much operational energy remains i...
Future Wireless Sensor Networks (WSNs) will be composed of a large number of densely deployed sensors. A key feature of such networks is that their nodes are untethered and unattended. Distributed techniques are expected in WSNs. Computing Connected Dominating Sets (CDSs) have been widely used for virtual backbone construction in WSNs to control to...
Future Wireless Sensor Networks (WSNs) will be composed of a large number of densely deployed sensors. A key feature of such networks is that their nodes are untethered and unattended. Distributed techniques are expected in WSNs. Connected Dominating Sets (CDSs) have been widely used for virtual backbone construction in WSNs to control topology, fa...
Abstract: Wireless Sensor Networks (WSNs) are gaining more interest in a variety of
applications. Of their different characteristics and challenges, network management and lifetime
elongation are the most considered issues in WSN based systems. Connected Dominating Set
(CDS) is known to be an efficient strategy to control network topology, reduce o...
Wireless sensor networks (WSNs) are gaining more interest in variety of applications. Of their different characteristics and challenges, network lifetime and efficiency are the most considered issues in WSN-based systems. The scarcest WSN's resource is energy, and one of the most energy-expensive operations is route discovery and data transmission....
In this work, we present the design of two novel algorithms for constructing connected dominating set (CDS) in wireless sensor networks (WSNs). Both algorithms are intended to minimize CDS size. The first algorithm has a performance factor of 5 from the optimal solution, which outperforms the best-published results (5.8+ ln 4) in [1]. The second al...