رمز بسيط، تكوّن من سلسلة روابط مُحاطة بدائرة، وهي رمز شائع للاتصال أو الارتباط التشعبي. تم تحديد خطوط الأيقونة بلون أسود داكن على الخلفية، مع إضافة عناصر عسكرية من الهوية الوطنية السعودية مثل الغترة والشماع والبشت السعودي، لتعكس الطابعة المحلية المميزة لجامعة القصيم.
روابط المواقع الالكترونية الرسمية التعليمية السعودية تنتهي بـ edu.sa
جميع روابط المواقع الرسمية التعليمية التابعة للجهات الحكومية في المملكة العربية السعودية تنتهي بـ .edu.sa
علامة لفتة سوداء اللون من الجلد البسيط، قبضة بدائرة سوداء، يعلوها رسم واضحي لغترة سعودية مع شماع وعقال، تبرز معالم البشت السعودي في. يرمز هذا التصميم إلى مفهوم الأمان وخصوصية البيانات الرقمية يعكس هوية جامعة القصيم.
المواقع الالكترونية الحكومية تستخدم بروتوكول HTTPS للتشفير و الأمان.
المواقع الالكترونية الآمنة في المملكة العربية السعودية تستخدم بروتوكول HTTPS للتشفير.
هيئة الحكومة الرقمية

أعضاء هيئة التدريس

المحتوى

يرتدي رجل يرتدي زيًا أبيض تقليديًا مع شماغ سعودي أحمر وأبيض داخل أحد المباني، مسجون في الكاميرا بتعبير حيادي كما لو كان يلتقط صورة لملف أعضاء هيئة التدريس في جامعة القصيم.
صورة عضو هيئة التدريس

دينا محمود ابراهيم حسين

أستاذ مشارك
كلية الحاسب،
قسم تقنية المعلومات

البيانات الشخصية

    المؤهلات العلمية

    • بكالوريوس في هندسة الحاسبات والتحكم الآلي
    • ماجستير في هندسة الحاسبات والتحكم الآلي
    • دكتوراه في هندسة الحاسبات والتحكم الآلي
    • Assistant Professor in Computers and Control Engineering Department, Faculty of Engineering, Tanta University, Egypt

    الاهتمامات البحثية

    • Computer Networks
    • WIRELESS SENSOR NETWORKS
    • Machine Learning
    • Deep Learning
    • Artificial Intelligence (AI)

    الأبحاث المنشورة

    • Deep-chest: Multi-classification deep learning model for diagnosing COVID-19, pneumonia, and lung cancer chest diseases (2021-01-01)
    • TinyML: Enabling of inference deep learning models on ultra-low-power IoT edge devices for AI applications (2022-01-01)
    • Deep-pneumonia framework using deep learning models based on chest X-ray images (2020-01-01)
    • Buildings' energy consumption prediction models based on buildings’ characteristics: Research trends, taxonomy, and performance measures (2022-01-01)
    • BrainGAN: brain MRI image generation and classification framework using GAN architectures and CNN models (2022-01-01)
    • DeepDiabetic: an identification system of diabetic eye diseases using deep neural networks (2024-01-01)
    • Enhancing the vector-based forwarding routing protocol for underwater wireless sensor networks: a clustering approach (2014-01-01)
    • DDD TinyML: A TinyML-based driver drowsiness detection model using deep learning (2023-01-01)
    • Internet of Things technology based on LoRaWAN revolution (2019-01-01)
    • Automatic Cyber Bullying Detection in Arabic Social Media (2019-01-01)
    • HLR-Net: A Hybrid Lip-Reading Model Based on Deep Convolutional Neural Networks (2021-01-01)
    • EduGram: Education Development Based on Hologram Technology. (2021-01-01)
    • Tuning deep neural networks for predicting energy consumption in arid climate based on buildings characteristics (2021-01-01)
    • Raspberry Pi-Based Smart Infant Monitoring System (2019-01-01)
    • PainMeter: automatic assessment of pain intensity levels from multiple physiological signals using machine learning (2024-01-01)
    • Comparative study between hologram technology and augmented reality (2020-01-01)
    • The use of statistical and machine learning tools to accurately quantify the energy performance of residential buildings (2022-01-01)
    • Detecting Credit Card Fraud using Machine Learning. (2021-01-01)
    • Augmenting healthy brain magnetic resonance images using generative adversarial networks (2023-01-01)
    • An efficient electricity theft detection based on deep learning (2025-01-01)
    • Deep smart cities: A review of smart cities applications-based an inference of deep learning upon iot devices (2025-01-01)
    • Deep-risk: deep learning-based mortality risk predictive models for COVID-19 (2022-01-01)
    • Improving Date Fruit Classification Using CycleGAN-Generated Dataset (2022-01-01)
    • Using machine learning algorithms for automatic cyber bullying detection in Arabic social media (2020-01-01)
    • A speeded up robust scale-invariant feature transform currency recognition algorithm (2018-01-01)
    • Original Research Article TinyML: Adopting tiny machine learning in smart cities (2024-01-01)
    • Federated intelligence for smart grids: a comprehensive review of security and privacy strategies (2025-01-01)
    • A New technique for Underwater Wireless Sensor Network: Modified-Slotted-ALOHA Protocol (2020-01-01)
    • A review study on SQL injection attacks, prevention, and detection (2021-01-01)
    • Improving LoRaWAN Performance Using Reservation ALOHA (2020-01-01)
    • Gaze Touch Cross PIN: Secure Multimodal Authentication using Gaze and Touch PIN (2019-01-01)
    • Contention-based mac protocol in uwsns: Slotted_cs_aloha proposed protocol (2016-01-01)
    • Effectiveness of adopting cloud-based E-learning at Qassim University (2022-01-01)
    • Buffering_Slotted_ALOHA protocol for underwater acoustic sensor networks based on the slot status (2021-01-01)
    • Comparative study between emergency response mobile applications (2019-01-01)
    • Improved FP-growth Algorithm with Multiple Minimum Supports using Maximum Constraints (2015-01-01)
    • A Review on Brain-Computer Interface (BCI) Spellers: P300 Speller (2020-01-01)
    • Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance. (2019-01-01)
    • Bounded Side-based Clustering VBF Routing Protocol in Underwater Wireless Sensor Networks (2015-01-01)
    • V-EduGram: Voice-based control technique of hologram technology in education (2022-01-01)
    • Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment. (2021-01-01)
    • Improved duplicate record detection using ASCII code Q-gram indexing technique (2018-01-01)
    • Agent-based simulation for coordination emergency response: A review study (2018-01-01)
    • Applying augmented reality technology for an e-learning system (2018-01-01)
    • Coloured petri net model for vector-based forwarding routing protocol (2014-01-01)
    • Review of ALOHA-based MAC protocols for underwater wireless sensor networks. (2022-01-01)
    • Patient Assistance System: A Proposed Structure (2019-01-01)
    • Modelling and Performance Enhancement of Underwater Wireless Sensor Networks by Petri Nets (2014-01-01)
    • RNN Diabetic framework for identifying diabetic eye diseases (2025-01-01)
    • Mushakkal: detecting Arabic Clickbait using CNN with various optimizers (2024-01-01)
    • Coordination emergency response framework (cerf): a proposed model (2018-01-01)
    • Coffee leaf diseases quadruple classifier (CLQC) model using deep learning (2023-01-01)
    • Cross site scripting attack review (2021-01-01)
    • Anomaly Detection in Wireless Sensor Networks: A Proposed Framework (2020-01-01)
    • Histopathological cancer detection based on deep learning and stain images (2024-01-01)
    • Educational impact and ethical considerations in using Chatbots in academia (2024-01-01)
    • Broken authentication and session management vulnerabilities (2021-01-01)
    • The impact of using SR-SIFT algorithm on various banknotes (2020-01-01)
    • PathGazePIN: Gaze and Path-based Authentication Entry Method (2019-01-01)
    • A communication load balanced dynamic wireless sensor network topology management algorithm based on AODV (CLB-AODV) (2016-01-01)
    • Modelling of CVBF Algorithm using Coloured Petri Nets (2014-01-01)
    • CV content recognition using YOLOv8 and Tesseract-OCR deep learning (2026-01-01)
    • GANCHEST: a multi-GAN-based framework for chest CXR image generation and validation (2025-01-01)
    • A Federated Learning-Based Framework for Accurately Identifying Human Activity in the Environment (2025-01-01)
    • PRDTinyML: deep learning-based TinyML-based pedestrian detection model in autonomous vehicles for smart cities (2025-01-01)
    • A comprehensive review of brain diseases classification using deep learning techniques (2023-01-01)
    • Diabetes based eye disease detection methods using deep learning and gan techniques: An overview (2023-01-01)
    • Common attacks on near field communication technology (2022-01-01)
    • Data enhancement for date fruit classification using DCGAN (2021-01-01)
    • Open web application security project components with known vulnerabilities: a comprehensive study (2021-01-01)
    • Analysing the steps of currency recognition systems (2020-01-01)
    • Configuration of WiMAX network supporting VoIP handover using OPNET simulator (2020-01-01)
    • Enhancing DCCP-TCP-like mechanism for wireless sensor networks (2015-01-01)
    • Smart grid false data injection detection through federated learning with deep learning models (2026-01-01)
    • Detecting bitcoin fraud using graph neural networks (2026-01-01)
    • Detecting bitcoin fraud using graph neural networks (2026-01-01)
    • Explainable multi stream deep learning for fine grained camel breed classification using a Novel Arabian and Non Arabian dataset (2025-01-01)
    • Critical_TSA: Twitter Sentiment Analysis in Critical Event Using Python (2025-01-01)
    • Enhancing Arabic Dialect Classification with Deep Learning Techniques (2025-01-01)
    • Web-based attacks detection using deep learning techniques: a comprehensive review (2025-01-01)
    • Leveraging Deep Learning Models for Retinoblastoma Detection (2025-01-01)
    • Recognizing geographical locations using a GAN-based text-to-image approach (2025-01-01)
    • An Investigation on Diabetes-Based Eye Disease Detection Methods using Deep Learning and GAN Techniques (2024-01-01)
    • Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media (2021-01-01)
    • Comparative Study between Hologram Technology and Augmented Reality (2021-01-01)
    • Improving LoRaWAN Performance Using Reservation ALOHA (2021-01-01)
    • A Multi-layer Machine Learning-based Intrusion Detection System for Wireless Sensor Networks (2021-01-01)
    • The Effect of Spelling with User’s Mother Tongue on P300 Speller Performance (2020-01-01)
    • ISeCure (2020-01-01)
    • ISeCure (2020-01-01)
    • ISeCure (2020-01-01)
    • Destroying Embedded Malicious code in Image (DEMI): A Proposed Method (2019-01-01)
    • PathGazePIN: Gaze and Path-based Authentication Entry Method (2019-01-01)
    • Agent-based Analysis Study in Emergency (2019-01-01)
    • Protocol Converter between Mobile IP and WATM Wireless Networks (2018-01-01)
    • A Speeded up Robust Scale-Invariant Feature Transform Currency Recognition Algorithm (2018-01-01)
    • A Query Optimization Strategy for Autonomous Distributed Database Systems (2018-01-01)
    • Petri Net-Based Design of Internetworking Protocol Converters (2008-01-01)
    • Timed Petri Net-Based Converter for Heterogeneous Internetworking Protocols (2006-01-01)
    • Ceramic Powders, edited by P. Vincenzini, 1983 367 (1983-01-01)
    • Using Deep Learning Techniques and Deep Convolutional Generative Adversarial Network (DCGAN) to detect Traffic Violations (2026-01-01)
    • Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance (2019-01-01)

    المواد التدريسية

    • Graduation Projects
    • Computer Networks
    • Computer Networks Labs
    • Wireless and Mobile Data Networks
    • Communication Skills
    • General Physics
    • Logic Design
    • Logic Design Labs
    • Web Application Security (Master Students)
    • Advanced Topics in Information Technology (Master Students)

    ملفات تعريف الارتباط

    هذا الموقع يستخدم ملفات تعريف الارتباط الخاصة لضمان سهولة الاستخدام، وتحسين تجربتك أثناء التصفح، كما يوضح الأحكام والسياسات المتعلقة بخصوصية المستخدم. من خلال الاستمرار في تصفح هذا الموقع، فإنك تقر بقبول استخدام ملفات تعريف الارتباط، وما جاء في سياسة الخصوصية