A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

Faculty members

Content

Inside a building, a man dressed in a traditional white uniform with a red and white Saudi shemagh wears a neutral expression as if he were taking a picture of a faculty file at Qassim University.
Photo of the faculty member

Dina Mahmoud Ibrahim Hussein

College
section

Personal data

    Scientific qualifications

    • B. SC. in Computers and Control Engineering Department, Faculty of Engineering, Tanta University, Egypt
    • M. SC. in Computers and Control Engineering Department, Faculty of Engineering, Tanta University, Egypt
    • PhD. in Computers and Control Engineering Department, Faculty of Engineering, Tanta University, Egypt
    • Assistant Professor in Computers and Control Engineering Department, Faculty of Engineering, Tanta University, Egypt

    Research interests

    • Computer Networks
    • WIRELESS SENSOR NETWORKS
    • Machine Learning
    • Deep Learning
    • Artificial Intelligence (AI)

    Published research

    • Deep-chest: A multi-classification deep learning model for diagnosing COVID-19, pneumonia, and lung cancer chest diseases (2021-01-01)
    • TinyML: Enabling of inference deep learning models on ultra-low-power IoT edge devices for AI applications (2022-01-01)
    • Deep learning framework for pneumonia detection from chest X-ray images (2020-01-01)
    • Buildings' energy consumption prediction models based on buildings' characteristics: research trends, taxonomy, and performance measures (2022-01-01)
    • BrainGAN: A Framework for Generating and Classifying Brain MRI Images Using GAN Architectures and CNN Models (2022-01-01)
    • DeepDiabetic: an identification system of diabetic eye diseases using deep neural networks (2024-01-01)
    • Enhancing the vector-based forwarding routing protocol for underwater wireless sensor networks: a clustering approach (2014-01-01)
    • DDD TinyML: A TinyML-based driver drowsiness detection model using deep learning (2023-01-01)
    • Internet of Things technology based on LoRaWAN revolution (2019-01-01)
    • Automatic Cyber Bullying Detection in Arabic Social Media (2019-01-01)
    • HLR-Net: A Hybrid Lip-Reading Model Based on Deep Convolutional Neural Networks (2021-01-01)
    • EduGram: Education Development Based on Hologram Technology. (2021-01-01)
    • Tuning deep neural networks for predicting energy consumption in arid climate based on buildings characteristics (2021-01-01)
    • Raspberry Pi-Based Smart Infant Monitoring System (2019-01-01)
    • PainMeter: automatic assessment of pain intensity levels from multiple physiological signals using machine learning (2024-01-01)
    • Comparative study between hologram technology and augmented reality (2020-01-01)
    • The use of statistical and machine learning tools to accurately quantify the energy performance of residential buildings (2022-01-01)
    • Detecting Credit Card Fraud using Machine Learning. (2021-01-01)
    • Augmenting healthy brain magnetic resonance images using generative adversarial networks (2023-01-01)
    • An efficient electricity theft detection based on deep learning (2025-01-01)
    • Deep smart cities: A review of smart cities applications based an inference of deep learning upon iot devices (2025-01-01)
    • Deep-risk: deep learning-based mortality risk predictive models for COVID-19 (2022-01-01)
    • Improving Date Fruit Classification Using CycleGAN-Generated Dataset (2022-01-01)
    • Using machine learning algorithms for automatic cyber bullying detection in Arabic social media (2020-01-01)
    • A speeded-up robust scale-invariant feature transform currency recognition algorithm (2018-01-01)
    • Original Research Article TinyML: Adopting Tiny Machine Learning in Smart Cities (2024-01-01)
    • Federated intelligence for smart grids: a comprehensive review of security and privacy strategies (2025-01-01)
    • A New Technique for Underwater Wireless Sensor Networks: Modified-Slotted-ALOHA Protocol (2020-01-01)
    • A review study on SQL injection attacks, prevention, and detection (2021-01-01)
    • Improving LoRaWAN Performance Using Reservation ALOHA (2020-01-01)
    • Secure Multimodal Authentication using Gaze and Touch PIN (2019-01-01)
    • Contention-based MAC protocol in underwater wireless sensor networks: Slotted_CS_ALOHA proposed protocol (2016-01-01)
    • Effectiveness of adopting cloud-based E-learning at Qassim University (2022-01-01)
    • Buffering_Slotted_ALOHA protocol for underwater acoustic sensor networks based on the slot status (2021-01-01)
    • Comparative study between emergency response mobile applications (2019-01-01)
    • Improved FP-growth Algorithm with Multiple Minimum Supports using Maximum Constraints (2015-01-01)
    • A Review on Brain-Computer Interface (BCI) Spellers: P300 Speller (2020-01-01)
    • Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance. (2019-01-01)
    • Bounded Side-based Clustering VBF Routing Protocol in Underwater Wireless Sensor Networks (2015-01-01)
    • V-EduGram: Voice-based control technique of hologram technology in education (2022-01-01)
    • Sensitive Data Exposure: Data Forwarding and Storage in a Cloud Environment. (2021-01-01)
    • Improved duplicate record detection using ASCII code Q-gram indexing technique (2018-01-01)
    • Agent-based simulation for coordinating emergency response: A review study (2018-01-01)
    • Applying augmented reality technology to an e-learning system (2018-01-01)
    • Coloured Petri net model for vector-based forwarding routing protocol (2014-01-01)
    • Review of ALOHA-based MAC protocols for underwater wireless sensor networks. (2022-01-01)
    • Patient Assistance System: A Proposed Structure (2019-01-01)
    • Modelling and Performance Enhancement of Underwater Wireless Sensor Networks by Petri Nets (2014-01-01)
    • RNN Diabetic framework for identifying diabetic eye diseases (2025-01-01)
    • Mushakkal: Detecting Arabic Clickbait Using CNN With Various Optimizers (2024-01-01)
    • Coordination Emergency Response Framework (CERF): A Proposed Model (2018-01-01)
    • Coffee Leaf Disease Quadruple Classifier (CLQC) Model Using Deep Learning (2023-01-01)
    • Cross-site scripting (XSS) attack review (2021-01-01)
    • Anomaly Detection in Wireless Sensor Networks: A Proposed Framework (2020-01-01)
    • Histopathological Cancer Detection Based on Deep Learning and Stain Images (2024-01-01)
    • Educational impact and ethical considerations in using chatbots in academia (2024-01-01)
    • Broken authentication and session management vulnerabilities (2021-01-01)
    • The impact of using the SR-SIFT algorithm on various banknotes (2020-01-01)
    • PathGazePIN: Gaze and Path-based Authentication Entry Method (2019-01-01)
    • A communication load-balanced dynamic wireless sensor network topology management algorithm based on AODV (CLB-AODV) (2016-01-01)
    • Modelling of CVBF Algorithm using Coloured Petri Nets (2014-01-01)
    • CV content recognition using YOLOv8 and Tesseract-OCR deep learning (2026-01-01)
    • GANCHEST: a multi-GAN-based framework for chest CXR image generation and validation (2025-01-01)
    • A Federated Learning-Based Framework for Accurately Identifying Human Activity in the Environment (2025-01-01)
    • PRDTinyML: A TinyML-based Pedestrian Detection Model for Autonomous Vehicles in Smart Cities (2025-01-01)
    • A comprehensive review of brain disease classification using deep learning techniques (2023-01-01)
    • Diabetes-based eye disease detection methods using deep learning and GAN techniques: An overview (2023-01-01)
    • Common attacks on near field communication technology (2022-01-01)
    • Data enhancement for date fruit classification using DCGAN (2021-01-01)
    • Open Web Application Security Project components with known vulnerabilities: A comprehensive study (2021-01-01)
    • Analyzing the steps of currency recognition systems (2020-01-01)
    • Configuration of WiMAX network supporting VoIP handover using OPNET simulator (2020-01-01)
    • Enhancing DCCP-TCP-like mechanism for wireless sensor networks (2015-01-01)
    • Smart grid false data injection detection through federated learning with deep learning models (2026-01-01)
    • Detecting Bitcoin fraud using graph neural networks (2026-01-01)
    • Detecting Bitcoin fraud using graph neural networks (2026-01-01)
    • Explainable Multi-Stream Deep Learning for Fine-Grained Camel Breed Classification Using a Novel Arabian and Non-Arabian Dataset (2025-01-01)
    • Critical_TSA: Twitter Sentiment Analysis in Critical Event Using Python (2025-01-01)
    • Enhancing Arabic Dialect Classification with Deep Learning Techniques (2025-01-01)
    • Web-based attack detection using deep learning techniques: a comprehensive review (2025-01-01)
    • Leveraging Deep Learning Models for Retinoblastoma Detection (2025-01-01)
    • Recognizing geographical locations using a GAN-based text-to-image approach (2025-01-01)
    • An Investigation on Diabetes-Based Eye Disease Detection Methods using Deep Learning and GAN Techniques (2024-01-01)
    • Using Machine Learning Algorithms for Automatic Cyberbullying Detection in Arabic Social Media (2021-01-01)
    • Comparative Study between Hologram Technology and Augmented Reality (2021-01-01)
    • Improving LoRaWAN Performance Using Reservation ALOHA (2021-01-01)
    • A Multi-layer Machine Learning-based Intrusion Detection System for Wireless Sensor Networks (2021-01-01)
    • The Effect of Spelling with User’s Mother Tongue on P300 Speller Performance (2020-01-01)
    • isecure (2020-01-01)
    • isecure (2020-01-01)
    • isecure (2020-01-01)
    • Destroying Embedded Malicious Code in Images (DEMI): A Proposed Method (2019-01-01)
    • PathGazePIN: Gaze and Path-based Authentication Entry Method (2019-01-01)
    • Agent-based Analysis Study in Emergencies (2019-01-01)
    • Protocol Converter between Mobile IP and WATM Wireless Networks (2018-01-01)
    • A Speeded Up Robust Scale-Invariant Feature Transform Currency Recognition Algorithm (2018-01-01)
    • A Query Optimization Strategy for Autonomous Distributed Database Systems (2018-01-01)
    • Petri Net-Based Design of Internetworking Protocol Converters (2008-01-01)
    • Timed Petri Net-Based Converter for Heterogeneous Internetworking Protocols (2006-01-01)
    • Ceramic Powders, edited by P. Vincenzini, 1983, 367 (1983-01-01)
    • Using Deep Learning Techniques and Deep Convolutional Generative Adversarial Network (DCGAN) to Detect Traffic Violations (2026-01-01)
    • Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance (2019-01-01)

    Teaching materials

    • Graduation Projects
    • Computer Networks
    • Computer Networks Labs
    • Wireless and Mobile Data Networks
    • Communication Skills
    • General Physics
    • Logic Design
    • Logic Design Labs
    • Web Application Security (Master Students)
    • Advanced Topics in Information Technology (Master Students)

    Cookies

    This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy