Publications by authors named "Najla Al-Nabhan"

The annual Hajj presents diversified negative experiences to millions of pilgrims worldwide. The negative experiences and recommendations to overcome them as per pilgrims' feedback are yet to be analyzed from an aggregated perspective in the literature, which we do in this paper. To do so, first, we perform a large-scale survey (n=988) using our comprehensive questionnaire.

View Article and Find Full Text PDF

As a popular data representation technique, Nonnegative matrix factorization (NMF) has been widely applied in edge computing, information retrieval and pattern recognition. Although it can learn parts-based data representations, existing NMF-based algorithms fail to integrate local and global structures of data to steer matrix factorization. Meanwhile, semi-supervised ones ignore the important role of instances from different classes in learning the representation.

View Article and Find Full Text PDF

The typical aim of user matching is to detect the same individuals cross different social networks. The existing efforts in this field usually focus on the users' attributes and network embedding, but these methods often ignore the closeness between the users and their friends. To this end, we present a friend closeness based user matching algorithm (FCUM).

View Article and Find Full Text PDF

Community detection is a complex and meaningful process, which plays an important role in studying the characteristics of complex networks. In recent years, the discovery and analysis of community structures in complex networks has attracted the attention of many scholars, and many community discovery algorithms have been proposed. Many existing algorithms are only suitable for small-scale data, not for large-scale data, so it is necessary to establish a stable and efficient label propagation algorithm to deal with massive data and complex social networks.

View Article and Find Full Text PDF

The Internet of Medical Things (IoMT) is a brand new technology of combining medical devices and other wireless devices to access to the healthcare management systems. This article has sought the possibilities of aiding the current Corona Virus Disease 2019 (COVID-19) pandemic by implementing machine learning algorithms while offering emotional treatment suggestion to the doctors and patients. The cognitive model with respect to IoMT is best suited to this pandemic as every person is to be connected and monitored through a cognitive network.

View Article and Find Full Text PDF

The Industrial Internet of Things (IIoT) plays an important role in the development of smart factories. However, the existing IIoT systems are prone to suffering from single points of failure and unable to provide stable service. Meanwhile, with the increase of node scale and network quantity, the maintenance cost presents to be higher.

View Article and Find Full Text PDF

With XML becoming a promising standard for data storage, describing, transferring and exchanging information on the Internet, data security and privacy protection of XML become the focus of research in recent years. In order to achieve the authorization of legitimate user and ensure the secure access to sensitive information, in this paper, in the context of cloud storage, with the purpose of sharing sensitive XML information, a polynomial authorization scheme with Kerberos authentication was proposed, which was based on the users' access purpose and privacy policy. In this scheme, first, Kerberos authentication was used to identify the user, and then the polynomial whose coefficients were from the leaf node address was used to complete the authorization of user.

View Article and Find Full Text PDF

This paper presents an edge detection algorithm based on singular value eigenvector and gradient operator. In the proposed algorithm, the singular values of image blocks are first calculated, and the Sobel gradient template is extended to eight other directions. Then the gradient values of image pixels are determined according to the stability of the singular values of image blocks.

View Article and Find Full Text PDF

Most current automatic summarization methods are for English texts. The distinction between words in Chinese text is large, the types of parts of speech are many and complex, and polysemy or ambiguous words appear frequently. Therefore, compared with English text, Chinese text is more difficult to extract useful feature words.

View Article and Find Full Text PDF

Location-based Service has become the fastest growing activity related service that people use in their daily life due to the boom of location-aware mobile devices. In edge computing along with the benefits brought by LBS, privacy preservation becomes a more challenging issue because of the nature of the paradigm, in which peers may cooperate with each other to collect and analyze user's location data. To avoid potential information leakage and usage, user's exact location should not be exposed to the edge node.

View Article and Find Full Text PDF

In the last few decades, urban areas across the world have experienced rapid growth in transportation technology with a subsequent increase in transport-related challenges. These challenges have increased our need to employ technology for creating more intelligent solutions. One of the essential tools used to address challenges in traffic is providing vehicles with information about traffic conditions in nearby areas.

View Article and Find Full Text PDF