A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

Faculty members

Content

Experimental launch

Inside a building, a man dressed in a traditional white uniform with a red and white Saudi shemagh wears a neutral expression as if he were taking a picture of a faculty file at Qassim University.
Photo of the faculty member

abdalla ibrahim abdalla musa

Lecturer
College: College of Computer
Department of Computer Science

Personal data

    Scientific qualifications

    • BSc in Computer Science
    • MSc in Computer Science and Application
    • MPhil in Computer Science

    Research interests

    • Software engineering
    • Machine Learning
    • Databases
    • Cybersecurity

    Published research

    • Improved Random Forest Algorithm for Cognitive Radio Networks' Distributed Channel and Resource Allocation Performance'' (2023-01-01)
    • Smart Solutions for Climate Resilience Harnessing Machine Learning and Sustainable WSNs (2025-01-01)
    • Integration of Fog Computing for Health Record Management Using Blockchain Technology. (2022-01-01)
    • An Efficient Plant Disease Detection: Possibility Neutrosophic Hypersoft Set Approach with Whale Optimization Algorithm. (2025-01-01)
    • Navigating Resource Scarcity in a Changing Climate: AI-Powered Perspectives on Mental Health (2024-01-01)
    • A Study on Cybersecurity Awareness among Sudanese Companies during Covid-19 (2022-01-01)
    • Robust Diabetic Retinopathy Detection and Grading using Neutrosophic Topological Vector Space on Fundus Imaging. (2025-01-01)
    • Efficient multipath model based cross layer routing techniques for Gauss Markov movable node management in MANET (2024-01-01)
    • Attention-Guided Hybrid Network for Cervical Cancer Classification (2025-01-01)
    • Neutrosophic Net-RBF Neural Networks with Bayesian Optimization Based Sentiment Analysis on Low Resource Language. (2025-01-01)
    • Indian Sign Language Detection and Translation Using Deep Learning (2025-01-01)
    • Enhancing Network Security using Possibility Neutrosophic Hypersoft Set for Cyberattack Detection. (2025-01-01)
    • AI-enabled risk identification and traffic prediction in vehicular Ad hoc Networks (2024-01-01)
    • Adaptive Multi-Scale Feature Extraction for Cervical Cancer Classification Using Dynamic Hierarchical Pooling (2025-01-01)
    • IoT Based Smart Agriculture To Avoid Post Harvest Losses Using Machine Learning Algorithms (2023-01-01)
    • Public-Keycryptography (2012-01-01)
    • Automated Credit Card Risk Assessment using Fuzzy Parameterized Neutrosophic Hypersoft Expert Set. (2025-01-01)
    • Integrating Machine Learning with Two-Person Intuitionistic Neutrosophic Soft Games for Cyberthreat Detection in Blockchain Environment (2024-01-01)
    • for Cognitive Radio Networks' Distributed Channel and Resource Allocation Performance (2023-01-01)
    • Deep Learning, Ensemble and Supervised Machine Learning for Arabic Speech Emotion Recognition (2024-01-01)

    Teaching materials

    • Computer Programming 3- Object Oriented Programming
    • Computer Programming 2- C Programming
    • Data Structures
    • Artifical Intelligence LAB
    • Introduction to Computer and Internet
    • Introduction to Computer and Networks
    • Computer Networks
    • Database Management System

    Cookies

    This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy