Wael Ghazi Alnahari

Wael Ghazi Alnahari
Verified
Wael verified their affiliation via an institutional email.
Verified
Wael verified their affiliation via an institutional email.
King Abdulaziz University · Department of Information Systems

Master of Science

About

8
Publications
3,983
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
38
Citations
Introduction
Wael Alnahari currently studies at the College of Computers and Information Systems, King Abdulaziz University.
Additional affiliations
August 2019 - November 2022
University of Bisha
Position
  • Master's Student
Description
  • Master's Student at University of Bisha in College of Computers and Information Technologies (Cybersecurity)
November 2017 - May 2024
WJN Cybersecurity Company
Position
  • CEO
Description
  • CISO at WJN Cybersecurity Company
Education
May 2024 - February 2028
King Abdulaziz University
Field of study
  • Information Systems
August 2019 - November 2022
University of Bisha
Field of study
  • Cybersecurity
August 2009 - August 2013
King Abdulaziz University
Field of study
  • Human Resource Management

Publications

Publications (8)
Conference Paper
Full-text available
IoT is an emerging topic in the field of IT that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machin...
Conference Paper
Full-text available
The advancement of technology and wide adoption of the Internet of Things (IoT) across the board will soon make the smart city a reality. Many governments are currently planning on rapidly transforming their cities into smart cities, while others are currently building new smart cities. These smart cities demand the installation of millions and in...
Preprint
Full-text available
In this report, a sample of disaster recovery plan DRP and a business continuity plan BCP is made for WJN LLC. The plan includes risks from natural, environmental, technical, and other factors. The plans are ready to implement in the company.
Preprint
Full-text available
In this paper, I proposed an iris recognition system by using deep learning via neural networks (CNN). Although CNN is used for machine learning, the recognition is achieved by building a non-trained CNN network with multiple layers. The main objective of the code the test pictures’ category (aka person name) with a high accuracy rate after having...
Preprint
Full-text available
IoT is an emerging topic in the field of IT that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentication of IoT is necessary for ensuring that machin...
Preprint
Full-text available
The Internet of Things (IoT) is an emerging topic in the field of information technology (IT) that has attracted the interest of researchers from different parts of the world. Authentication of IoT includes the establishment of a model for controlling access to IoT devices through the internet and other unsecured network platforms. Strong authentic...
Technical Report
Full-text available
In this paper, I proposed an iris recognition system by using deep learning via convolutional neural networks (CNN). Although CNN is used for machine learning, the recognition is achieved by building a non-trained CNN network with multiple layers. The main objective of the code is recognizing test pictures’ category (aka person name) with high accu...

Questions

Question (1)
Question
(36) So when they came to Solomon, he said, "Do you provide me with wealth? But what Allah has given me is better than what He has given you. Rather, it is you who rejoice in your gift. (37) Return to them, for we will surely come to them with soldiers that they will be powerless to encounter, and we will surely expel them therefrom in humiliation, and they will be debased." (38) [Solomon] said, "O assembly [of jinn], which of you will bring me her throne before they come to me in submission?" (39) A powerful one from among the jinn said, "I will bring it to you before you rise from your place, and indeed, I am for this [task] strong and trustworthy." (40) Said one who had knowledge from the Scripture, "I will bring it to you before your glance returns to you." And when [Solomon] saw it placed before him, he said, "This is from the favor of my Lord to test me whether I will be grateful or ungrateful. And whoever is grateful - his gratitude is only for [the benefit of] himself. And whoever is ungrateful - then indeed, my Lord is Free of need and Generous." (41) He said, "Disguise for her her throne; we will see whether she will be guided [to truth] or will be of those who is not guided." (42) So when she arrived, it was said [to her], "Is your throne like this?" She said, "[It is] as though it was it." [Solomon said], "And we were given knowledge before her, and we have been Muslims [in submission to Allah]. (43) And that which she was worshipping other than Allah had averted her [from submission to Him]. Indeed, she was from a disbelieving people." (44) She was told, "Enter the palace." But when she saw it, she thought it was a body of water and uncovered her shins [to wade through]. He said, "Indeed, it is a palace [whose floor is] made smooth with glass." She said, "My Lord, indeed I have wronged myself, and I submit with Solomon to Allah, Lord of the worlds."

Network

Cited By