Follow


Submissions from 2021

Link

Drone-Based Cattle Detection Using Deep Neural Networks, R. Y. Aburasain, E. A. Edirisinghe, and Ali Albatay

WhatsApp Network Forensics: Discovering the IP Addresses of Suspects, Waqas Ahmed, Faisal Shahzad, Abdul Rehman Javed, Farkhund Iqbal, and Liaqat Ali

Link

SpeculoLab: A Protocol and a Tool for Identity Deception Experimentation in Social Networks, Noora Al Roken, Maryam Al Abdooli, Sumaya Khoory, and Hakim Hacid

Link

The Acceptance of Social Media Sites: An Empirical Study Using PLS-SEM and ML Approaches, Sawsan Al-Skaf, Enaam Youssef, Mohammed Habes, Khadija Alhumaid, and Said A. Salloum

Privacy-Preserving and Efficient Aggregation for Smart Grid based on Blockchain, Mohamad Badra and Rouba Borghol

Teaching and assessing creativity in STEAM education, Areej ElSayary

Transforming preservice teachers' learning in online courses: A framework of instructional design, Areej Elsayary

Link

Smart Guest Virtual Assistant with Automatic Guest Registration, Mohammed Hussain, Abdullah Hussein, and Mohamed Basel AlMourad

Discord Server Forensics: Analysis and Extraction of Digital Evidence, Farkhund Iqbal, Michał Motyliński, and Áine MacDermott

Link

Community Search in a Multi-Attributed Graph using Collaborative Similarity Measure and Node Filtering, Naveed Javaid, Kifayat Ullah Khan, Asad Masood Khattak, and Waqas Nawaz

Link

An IoT Application Business-Model on Top of Cloud and Fog Nodes, Zakaria Maamar, Mohammed Al-Khafajiy, and Murtada Dohan

Link

Orchestration- and choreography-based composition of Internet of Transactional Things, Zakaria Maamar, Muhammad Asim, Saoussen Cheikhrouhou, and Ayesha Qamar

Trust-empowered, IoT-driven legitimate data offloading, Zakaria Maamar, Noura Faci, Fadwa Yahya, and Ejub Kajan

Link

Cloud-edge coupling to mitigate execution failures, Zakaria Maamar and Mohammed Al Khafajiy

An Innovative and Decentralized Identity Framework Based on Blockchain Technology, Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, and Mohamad Badra

Link

FinTech in Bahrain: The Role of FinTech in Empowering Women, Haya Yusuf Mohamed, Allam Hamdan, Magdalena Karolak, Anjum Razzaque, and Bahaaeddin Alareeni

Link

A Predictive Framework for Haptic Enabled VR-based Remote Phobia Treatment in Cloud/Fog Environment, Farinaz Rasouli, Amin Ebrahimzadeh, Somayeh Kianpisheh, Nattakorn Promwongsa, Fatna Belqasmi, and Roch Glitho

Link

IT Teaching Labs: Innovations in a Distance Education Era, Ahmed Seffah, Mohammad Amin Kuhail, and Joao Negreiros

A Novel Framework for Accurate and Non-Invasive Pulmonary Nodule Diagnosis by Integrating Texture and Contour Descriptors, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, and Ayman El-Baz

Link

Abstraction-Based Outlier Detection for Image Data, Kirill Yakovlev, Imad Eddine Ibrahim Bekkouch, Adil Mehmood Khan, and Asad Masood Khattak

Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks, Benjamin Yankson, Javed Vali K, Patrick C. K. Hung, Farkhund Iqbal, and Liaqat Ali

Submissions from 2020

Link

Dynamic Graph Attention-Aware Networks for Session-Based Recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang

PDF

A review of challenges and barriers implementing RFID technology in the Healthcare sector, Ahed Abugabah, Nishara Nizamuddin, and Alaa Abuqabbeh

Link

Smart healthcare ecosystem for elderly patient care, A. Abugabah and N. Nizamuddin

Link

Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users, Hussain Ahmad, Areeba Arif, Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, and Babar Shah

Link

Blockchain-based chain of custody: Towards real-time tamper-proof evidence management, Liza Ahmad, Salam Khanji, Farkhund Iqbal, and Faouzi Kamoun

Link

A Hybrid Approach for Counting Templates in Images, Maher Ala'raj and Munir Majdalawieh

Link

Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault Tolerance, Omar Alfandi, Safa Otoum, and Yaser Jararweh

Link

Blockchain-assisted Decentralized Virtual Prosumer Grouping for P2P Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Oznur Ozkasap, and Ouns Bouachir

Link

Using Artificial Intelligence to Monitor the Evolution of Opinion Leaders' Sentiments: Case Study on Global Warming, Manar Alkhatib, May El Barachi, Sujith Samuel Mathew, and Farhad Oroumchian

Link

UniBud: A Virtual Academic Adviser, Abdulrahman Alkhoori, Mohammad Amin Kuhail, and Abdulla Alkhoori

Link

Visual Attention toward Human Face Recognizing for Autism Spectrum Disorder and Normal Developing Children: An Eye Tracking Study, Mohamed Basel Almourad and Emad Bataineh

Link

Cone-KG: A semantic knowledge graph with news content and social context for studying covid-19 news articles on social media, Feras Al-Obeidat, Oluwasegun Adedugbe, Anoud Bani Hani, Elhadj Benkhelifa, and Munir Majdalawieh

Link

The Socio-economic Impacts of Social Media Privacy and Security Challenges, Feras Al-Obeidat, Anoud Bani Hani, Oluwasegun Adedugbe, Munir Majdalawieh, and Elhadj Benkhelifa

Link

On minimizing synchronization cost in NFV-based environments, Zakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily, and Ouns Bouachir

Link

Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal

Link

Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication?, Fatima Alqubaisi, Ahmad Samer Wazan, Liza Ahmad, and David W. Chadwick

Mitigation of ground vibration from pile driving by circular arrays of rigid blocks placed on the ground surface, Lars V. Andersen, Peter Persson, and Andrew T. Peplow

Link

A WUSN-based Smart System for Water Flow Control, Nahom Aron, Bereket Yemane, Temesgen Mikael, Reem Salem, and Fatna Belqasmi

Link

Energy Efficiency in SDDC: Considering Server and Network Utilities, Beakal Gizachew Assefa, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily, and Ouns Bouachir

Link

A latent model for ad hoc table retrieval, Ebrahim Bagheri and Feras Al-Obeidat

Link

Capturing Public Concerns about Coronavirus Using Arabic Tweets: An NLP-Driven Approach, Mohammed Bahja, Rawad Hammad, and Mohammed Amin Kuhail

Link

Sentiment analysis on predicting presidential election: Twitter used case, Nedaa Baker Al Barghuthi and Huwida E. Said

Link

A secure fog-based platform for SCADA-based IoT critical infrastructure, Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, and Mohammad Hammoudeh

Link

A Semantic Model for Context-Based Fake News Detection on Social Media, Anoud Bani-Hani, Oluwasegun Adedugbe, Elhadj Benkhelifa, Munir Majdalawieh, and Feras Al-Obeidat

Link

Thing Mutation as a Countermeasure to Safeguard IoT, Bita Banihashemi, Zakaria Maamar, Noura Faci, and Emir Ugljanin

Link

Optimal maintenance policies for degrading hydrocarbon pipelines using Markov decision process, Eric Bediako, Suzan Alaswad, Yisha Xiang, and Zhigang Tian

Link

Reliability Analysis of Crude Unit Overhead Piping Based on Wall Thickness Degradation Process, Eric Bediako, Yisha Xiang, Susan Alaswad, Liao Ying, and Liudong Xing

Link

A knowledge-based approach to manage configurable business processes, Wehbi Benallal, Mahmoud Barhamgi, Djamal Benslimane, Zakaria Maamar, Noura Faci, and Ameni Bellaaj

Link

A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic Surgery, Francis Boabang, Roch Glitho, Halima Elbiaze, Fatna Belqami, and Omar Alfandi

Link

Accident Recognition via 3D CNNs for Automated Traffic Monitoring in Smart Cities, Mikhail Bortnikov, Adil Khan, Asad Masood Khattak, and Muhammad Ahmad

Link

UAV-Assisted Vehicular Communication for Densely Crowded Environments, Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, and Haythem Bany Salameh

Link

ECCV (14) - SipMask: Spatial Information Preservation for Fast Image and Video Instance Segmentation, Jiale Cao, Rao Muhammad Anwer, Hisham Cholakkal, Fahad Shahbaz Khan, Yanwei Pang, and Ling Shao

Link

Learning Attentive and Hierarchical Representations for 3D Shape Recognition, Jiaxin Chen, Jie Qin, Yuming Shen, Li Liu, Fan Zhu, and Ling Shao

The impact of grouping efficiency measures in cellular manufacturing systems, Nadia Dahmani and Adnan Mukattash

Link

Towards an Automatic Identification of Microservices from Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki

Link

Automatic Microservices Identification from a Set of Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki

Link

Suitability of Blockchain for Collaborative Intrusion Detection Systems, Nahom Aron Dawit, Sujith Samuel Mathew, and Kadhim Hayawi

Link

Quality-dependent adaptation in a swarm of drones for environmental monitoring, Giulia De Masi and Eliseo Ferrante

Link

Zealots Attack and the Revenge of the Commons: Quality vs Quantity in the Best-of-n, Giulia De Masi, Judhi Prasetyo, Elio Tuci, and Eliseo Ferrante

Link

CLNet: A Compact Latent Network for Fast Adjusting Siamese Trackers, Xingping Dong, Jianbing Shen, Ling Shao, and Fatih Porikli

Link

Building Trusted Startup Teams from LinkedIn Attributes: A Higher Order Probabilistic Analysis, Georgios Drakopoulos, Eleana Kafeza, Phivos Mylonas, and Haseena Al Katheeri

Link

One Dimensional Cross-Correlation Methods for Deterministic and Stochastic Graph Signals with A Twitter Application in Julia, Georgios Drakopoulos and Eleanna Kafeza

Link

Learning to Learn with Variational Information Bottleneck for Domain Generalization, Yingjun Du, Jun Xu, Huan Xiong, Qiang Qiu, Xiantong Zhen, Cees G.M. Snoek, and Ling Shao

Link

MetaNorm: Learning to Normalize Few-Shot Batches Across Domains, Yingjun Du, Xiantong Zhen, Ling Shao, and Cees G. M. Snoek

Link

Evaluating Citizens' Sentiments in Smart Cities: A Deep Learning Approach, Abdallah Elabora, Manar Alkhatib, Sujith Samuel Mathew, and May El Barachi

Link

Stabilization of active acetylene by-product via sequestration of co2, M. El Gamal, A. M.O. Mohamed, and S. Hameedi

Link

PraNet: Parallel Reverse Attention Network for Polyp Segmentation, Deng Ping Fan, Ge Peng Ji, Tao Zhou, Geng Chen, Huazhu Fu, Jianbing Shen, and Ling Shao

Link

BBS-Net: RGB-D Salient Object Detection with a Bifurcated Backbone Strategy Network, Deng Ping Fan, Yingjie Zhai, Ali Borji, Jufeng Yang, and Ling Shao

Link

Exploiting Deep Neural Networks for Intention Mining, Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, and Muhammad Zubair Asghar

Link

Elaboration and Characterization of ZnO/FTO thin films under different concentrations - Study dedicated to the photovoltaic systems - Study d, Slimani Hamza, Dagher Sawsan, Bessous Noureddine, Benhaoua Atmane, Laouini Salah Eddine, Mimouni Mourad, Ghougali Mebrouk, Chaabia Nacer, Fawwaz Al Khatib, Boshra Akhozheya, Maisa El Gamal, and Ali Tliba

Link

Fane-KG: A semantic knowledge graph for context-based fake news detection on social media, Anoud Bani Hani, Oluwasegun Adedugbe, Feras Al-Obeidat, Elhadj Benkhelifa, and Munir Majdalawieh

Link

State of the Art in Digital Forensics for Small Scale Digital Devices, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, and Farkhund Iqbal

Link

Meteorology of the Red Planet by dust devils, Fares M. Howari, Imen Ben Salem, Manish Sharma, Cijo Xavier, Yousef Nazzal, and Fatima Alaydaroos

Link

Application of hyperspectral imaging technique to determine the quality of Photo and Thermal exposed and contaminated pharmaceutical formulations: A cost effective way of quality testing, Fares M. Howari, Cijo Xavier, Manish Sharma, Yousef Nazzal, Imen Ben Salem, and Fatima Alaydaroos

Link

Layer-Wise Conditioning Analysis in Exploring the Learning Dynamics of DNNs, Lei Huang, Jie Qin, Li Liu, Fan Zhu, and Ling Shao

Link

VAE-GAN based zero-shot outlier detection, Bekkouch Imad Ibrahim, Dragos Constantin Nicolae, Adil Khan, Syed Imran Ali, and Asad Khattak

Link

Detection and Analysis of Drive-by Downloads and Malicious Websites, Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, and Monther Aldwairi

Link

Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models, Salman Jan, Shahrulniza Musa, Toqeer Ali, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, and Babar Shah

Link

A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach, Sanaa Kaddoura, Omar Alfandi, and Nadia Dahmani

Link

Promoting Teaching Practices in IT Higher Education, Sanaa Kaddoura and Rima Grati

Link

Legal smart contracts in ethereum block chain: Linking the dots, Eleanna Kafeza, Syed Juned Ali, Irene Kafeza, and Haseena Alkatheeri

Link

Forecasting with deep learning: S&P 500 index, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib

Link

Stock price forecast with deep learning, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib

PDF

A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders, Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri

Link

AI and machine learning: A mixed blessing for cybersecurity, Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, and Thar Baker

Link

Analysis of the Importance of Systolic Blood Pressure Versus Diastolic Blood Pressure in Diagnosing Hypertension: MRA Study., Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Adel Elmaghraby, and Ayman El-Baz

Link

Dynamic framework to mining Internet of Things for multimedia services, Yaser Khamayseh, Wail Mardini, J. William Atwood, and Monther Aldwairi

Link

Towards a Novel Intrusion Detection Architecture using Artificial Intelligence, Salam Khanji and Asad Khattak

Link

Interpretable and Generalizable Person Re-identification with Query-Adaptive Convolution and Temporal Lifting, Shengcai Liao and Ling Shao

Link

Interpretable Neural Network Decoupling, Yuchao Li, Rongrong Ji, Shaohui Lin, Baochang Zhang, Chenqian Yan, Yongjian Wu, Feiyue Huang, and Ling Shao

Link

Internet of Things, Zakaria Maamar

Link

Thingsourcing to Enable IoT Collaboration, Zakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, and Said Elnaffar

Link

OWL-T for a Semantic Description of IoT, Zakaria Maamar, Noura Faci, Ejub Kajan, Muhammad Asim, and Ayesha Qamar

Link

Process-of-Things: Weaving film industry’s practices into the Internet-of-Things, Zakaria Maamar, Noura Faci, Ejub Kajan, Safet Purković, and Emir Ugljanin

Link

Bridging the gap between business processes and IoT, Zakaria Maamar, Ejub Kajan, Ikbel Guidara, Leyla Moctar-M'baba, and Mohamed Sellami

Link

Atomicity in the Internet of Transactional Things (Io2T), Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, and Maj Alshibly

Link

Towards an Approach for Validating the Internet-of-Transactional-Things, Zakaria Maamar, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, and Bita Banihashemi

Link

Structure Preserving Stain Normalization of Histopathology Images Using Self Supervised Semantic Guidance, Dwarikanath Mahapatra, Behzad Bozorgtabar, Jean Philippe Thiran, and Ling Shao

Link

Pink Ocean Strategy: Democratizing Business Knowledge for Social Growth and Innovation, Evangelos Markopoulos, Maria Barbara Ramonda, Lisa Marie Carolin Winter, Haseena Al Katheeri, and Hannu Vanharanta

Link

Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data, Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, and Muhsin Cheratta

Link

On the need for cultural sensitivity in digital wellbeing tools and messages: A UK-China comparison, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali

Link

Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali

Link

WorldCIST (2) - On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison., John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali

Link

Bi-orthogonal wavelets for investigating Gibbs effects via oblique extension principle, Mutaz Mohammad

Link

Digital Forensic Acquisition and Analysis of Discord Applications, Michal Motylinski, Aine MacDermott, Farkhund Iqbal, Mohammed Hussain, and Saiqa Aleem

Link

ECCV (22) - Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G. M. Snoek, and Ling Shao

Link

Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G.M. Snoek, and Ling Shao

Link

Evaluating IT Governance Structure Implementation in the Gulf Cooperation Council Region, Mathew Nicho and Suadad Muamaar

Link

A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks, Safa Otoum, Burak Kantarci, and Hussein T. Mouftah

Link

Blockchain-Supported Federated Learning for Trustworthy Vehicular Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah

PDF

Contextual healing: Privacy through interpretation management, Fatma Outay and Rula Sayaf

Link

Phishout: Effective phishing detection using selected features, Suhail Paliath, Mohammad Abu Qbeitah, and Monther Aldwairi

Link

The effect of differential quality and differential zealotry in the best-of-n problem, Judhi Prasetyo, Giulia De Masi, Elio Tuci, and Eliseo Ferrante

Link

Quaternionic Channel-based Modulation For Dual-polarized Antennas, Sara Shakil Qureshi, Syed Ali Hassan, and Sajid Ali

On the use of elitism to improve convergence of the chemical reaction optimization algorithm in discrete optimization problems, Sinan Salman

Network design using chemical reaction optimization and markov-chain traffic assignment, Sinan Salman and Suzan Alaswad

Vehicles' emissions consideration in transportation network design using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad

Link

A Comprehensive Framework for Accurate Classification of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

Access Permissions for Apple Watch Applications: A Study on Users' Perceptions, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, and Ali Arsalan

Link

Invertible Zero-Shot Recognition Flows, Yuming Shen, Jie Qin, Lei Huang, Li Liu, Fan Zhu, and Ling Shao

Link

Algorithm Appreciation: Algorithmic Performance, Developmental Processes, and User Interactions, Donghee Shin, Bouziane Zaid, and Mohammed Ibahrine

Link

A predictive model of users’ behavior and values of smart energy meters using PLS-SEM, Ahmed Shuhaiber

Trust in smart energy meters: The role of perceived values, Ahmed Shuhaiber

Link

Panel: Autonomy Control at Work: Cars, Robots, Drones and Satellites, Roy Sterritt, Petr Skobelev, Mario Döller, Iaria Dini, Claudius Stern, Giulia De Masi, Timothy Patten, and Pedro Forero

Link

Precise Cerebrovascular Segmentation, F. Taher, A. Soliman, H. Kandil, A. Mahmoud, A. Shalaby, G. Gimel'farb, and A. El-Baz

Link

Improving the impact of power efficiency in mobile cloud applications using cloudlet model, Lo'ai Tawalbeh, Mohammad A. Tawalbeh, and Monther Aldwairi

Link

Building a security framework for smart cities: A case study from UAE, Abdallah Tubaishat and Mariam Al Jouhi

Link

Optimizing the Efficiency of Machine Learning Techniques, Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, and Asad Masood Khattak

Link

Automatic C-Plane Detection in Pelvic Floor Transperineal Volumetric Ultrasound, Helena Williams, Laura Cattani, Mohammad Yaqub, Carole Sudre, Tom Vercauteren, Jan Deprest, and Jan D’hooge

Link

Region Graph Embedding Network for Zero-Shot Learning, Guo Sen Xie, Li Liu, Fan Zhu, Fang Zhao, Zheng Zhang, Yazhou Yao, Jie Qin, and Ling Shao

Link

Count- and Similarity-Aware R-CNN for Pedestrian Detection, Jin Xie, Hisham Cholakkal, Rao Muhammad Anwer, Fahad Shahbaz Khan, Yanwei Pang, Ling Shao, and Mubarak Shah

Link

ICML - On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao

Link

A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination, Fadwa Yahya, Zakaria Maamar, and Khouloud Boukadi

Link

4P based forensics investigation framework for smart connected toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung

Link

ECCV (17) - Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-Identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo

Link

Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo

Link

Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain

Link

Learning Enriched Features for Real Image Restoration and Enhancement, Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming Hsuan Yang, and Ling Shao

Link

Unsupervised Domain Adaptation with Noise Resistible Mutual-Training for Person Re-identification, Fang Zhao, Shengcai Liao, Guo Sen Xie, Jian Zhao, Kaihao Zhang, and Ling Shao

Link

M2Net : Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients, Tao Zhou, Huazhu Fu, Yu Zhang, Changqing Zhang, Xiankai Lu, Jianbing Shen, and Ling Shao

Submissions from 2019

Link

Delay and energy based message delivery in delay tolerant networks, Ali Abbas, Babar Shah, Muhammad Habib, Francis Chow, Raza Hasan, and Ki Il Kim

Link

A Novel Deep Learning Approach for Left Ventricle Automatic Segmentation in Cardiac Cine MR, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz

Link

Automatic segmentation and functional assessment of the left ventricle using u-net fully convolutional network, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz

Healthcare applications of intelligent information systems: A novel technique for medical image fusion, Ahed Abugabah and Ahmad Alsmadi

Link

Data Mining in Health Care Sector: Literature Notes, Ahed Abugabah, Ahmad Al Smadi, and Alaa Abuqabbeh

Link

Towards an end-user layer for data integrity, Lu'ay Abu-Rayyan, Hakim Hacid, and Andrew Leoncé

Link

The effect of demand variability on supply chain performance, Suzan Alaswad, Sinan Salman, Arwa Alhashmi, Hawra Almarzooqi, and Meera Alhammadi

Link

Blockchain in Supply Chain Trading, Nedaa Baker Al Barghuthi, Hussam Juma Mohamed, and Huwida E. Said

Link

State of Art of the Effectiveness in Adopting Blockchain Technology-UAE Survey Study, Nedaa Baker Al Barghuthi, Cornelius Ncube, and Huwida Said

Link

Readiness, Safety, and Privacy on Adopting Autonomous Vehicle Technology: UAE Case Study, Nedaa Baker Al Barghuthi and Huwida Said

Link

Online peer support groups to combat digital addiction: User acceptance and rejection factors, Manal Aldhayan, Sainabou Cham, Theodoros Kostoulas, Mohamed Basel Almourad, and Raian Ali

Link

n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems, Monther Aldwairi and Duaa Alansari

Link

Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak

Link

Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak

Link

Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith

Link

Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal

Link

Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi

Link

Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien

Link

Using Data Mining Techniques to Identify Construction Claims Causes: A Case Study, Vasila Al Khaldi, Nazar Zaki, Essam Zaneldin, and Elfadil A. Mohamed

Link

Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh

Link

A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh

Link

Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler

Link

Cross-Linguistic Twitter Analysis of Discussion Themes before, during and after Ramadan, Aamna Alshehhi, Justin Thomas, Roy Welsch, and Zeyar Aung

Link

Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said

Link

A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair

Link

Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira

Link

Mitigation of ground vibrations by circular arrays of rigid blocks, Lars V. Andersen, Andrew T. Peplow, and Peter Persson

Link

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi

Link

A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal

PDF

Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi

Link

A relational approach to exploring inequalities within the human resource management model in the Middle East, Safiya Banu, Nicolina Kamenou-Aigbekaen, and Laura Galloway

Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh

Link

Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov

Link

EDBT/ICDT Workshops - Privacy-Preserving Data Analysis Workflows for eScience., Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi

Privacy-preserving data analysis workflows for eScience, Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi

Link

Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi

Link

Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi

Link

Testbed of QoS Ad-Hoc network designed for cooperative multi-drone tasks, Ouns Bouachir, Moayad Aloqaily, Fabien Garcia, Nicolas Larrieu, and Thierry Gayraud

Link

Corrigendum to Norm-based and commitment-driven agentification of the Internet of Things [Internet of Things volume 6 (2019) 100042], Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy

Link

Norm-based and commitment-driven agentification of the Internet of Things, Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy

Link

Digital addiction: Negative life experiences and potential for technology-assisted solutions, Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, and Raian Ali

Link

An Active Noise Correction Graph Embedding Method Based on Active Learning for Graph Noisy Data, Zhiyuan Cui, Donghai Guan, Cong Li, Weiwei Guan, and Asad Masood Khattak

Link

Student proficiency profiles through the computing professional skills assessment, Maurice Danaher, Kevin Schoepp, Anthony Rhodes, and Tiffany Cammidge

Link

Dynamic Neural Network for Business and Market Analysis, Javier de Arquer Rilo, Abir Hussain, May Al-Taei, Thar Baker, and Dhiya Al-Jumeily

Link

Deep Learning Based Method for Computer Aided Diagnosis of Diabetic Retinopathy, Omar Dekhil, Ahmed Naglah, Mohamed Shaban, Mohammed Ghazal, Fatma Taher, and Ayman Elbaz

Link

A Novel Fully Automated CAD System for Left Ventricle Volume Estimation, Omar Dekhil, Fatma Taher, Fahmi Khalifa, Garth Beache, Adel Elmaghraby, and Ayman El-Baz

Link

Proof systems in blockchains: A survey, Georgios Drakopoulos, Eleanna Kafeza, and Haseena Al Katheeri

PDF

In Situ Mutation for Active Things in the IoT Context, Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami

Link

The socio-net of things modeling framework, Amjad Fayoumi, Juliana Sutanto, and Zakaria Maamar

Link

Human Activity Recognition Using Deep Models and Its Analysis from Domain Adaptation Perspective, Nikita Gurov, Adil Khan, Rasheed Hussain, and Asad Khattak

Link

Drone forensics: A case study on DJI phantom 4, Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, and Aine MacDermott

Link

Internet of Things Platform for Transparency and Traceability of Food Supply Chain, Ahmed Haroon, Mehak Basharat, Asad Masood Khattak, and Waleed Ejaz

Link

Detection of SQL Injection Attacks: A Machine Learning Approach, Musaab Hasan, Zayed Balbahaith, and Mohammed Tarique

Link

A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb

Link

Smart Home Systems Security, Abir Hussain, Deimante Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily

Link

Market basket analysis of student attendance records, Mohammed Hussain and Abdullah Hussein

Link

Novel robust digital watermarking in mid-rank co-efficient based on DWT and RT transform, Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, and Babar Shah

Link

A fog-based architecture for remote phobia treatment, Yassine Jebbar, Fatna Belqasmi, Roch Glitho, and Omar Alfandi

Link

Psychological vulnerability as an integral component of comprehensive vulnerability assessment: Informing policy and practice in disaster risk reduction, Jigar Jogia and Gayan Wedawatta

Link

Restriction-based fragmentation of business processes over the cloud, Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, and Thar Baker

Link

A CAD System for the Early Prediction of Hypertension based on Changes in Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Guruprasad Giridharan, and Ayman El-Baz

Link

Using 3-D CNNs and Local Blood Flow Information to Segment Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Ali Mahmoud, Adel Elmaghraby, and Ayman El-Baz

Link

Memory Forensics: Recovering Chat Messages and Encryption Master Key, Abdullah Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, and Khalil Al-Hussaeni

Link

Congestion Control in Wireless Sensor Networks based on Support Vector Machine, Grey Wolf Optimization and Differential Evolution, Hafiza Syeda Zainab Kazmi, Nadeem Javaid, Muhammad Imran, and Fatma Outay

Link

An Application of Using Support Vector Machine Based on Classification Technique for Predicting Medical Data Sets, Mohammed Khalaf, Abir Jaafar Hussain, Omar Alafandi, Dhiya Al-Jumeily, Mohamed Alloghani, Mahmood Alsaadi, Omar A. Dawood, and Dhafar Hamed Abd

Link

Urban sensing: Towards security efficient sensing network scheme, Salam Khanji, Mohamad Badra, Omar Alfandi, and Rouba Borghol

Link

ZigBee Security Vulnerabilities: Exploration and Evaluating, Salam Khanji, Farkhund Iqbal, and Patrick Hung

Link

Boosting IoT Efficiency and Security through Blockchain: Blockchain-based Car Insurance Process - A Case Study, Salam Khanji, Farkhund Iqbal, Zakaria Maamar, and Hakim Hacid

Link

Blockchain technology as a support infrastructure in E-Government evolution at Dubai economic department, Shafaq Naheed Khan, Mohammed Shael, and Munir Majdalawieh

Link

Smart meter security: Vulnerabilities, threat impacts, and countermeasures, Asad Masood Khattak, Salam Khanji, and Wajahat Ali Khan

Link

Stock market trend prediction using supervised learning, Asad Masood Khattak, Habib Ullah, Hassan Ali Khalid, Ammara Habib, Muhammad Zubair Asghar, and Fazal Masud Kundi

Link

Speculo: A tool for multiple identities exploration and detection in social networks, Sumaya Khoory, Noora Al Roken, Maryam Al Abdooli, and Hakim Hacid

Link

Parking availability forecasting model, Mohammad Amin Kuhail, Manohar Boorlu, Neeraj Padarthi, and Collin Rottinghaus

Link

Noise Reduction in Network Embedding, Cong Li, Donghai Guan, Zhiyuan Cui, Weiwei Yuan, Asad Masood Khattak, and Muhammad Fahim

Link

Robot computing for music visualization, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal

Link

Towards a music visualization on robot (MVR) prototype, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal

Cognitive Computing Meets the Internet of Things, Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami

Link

Towards a Resource-aware Thing Composition Approach, Zakaria Maamar, Saoussen Cheikhrouhou, Muhammad Asim, Ayesha Qamar, Thar Bake, and Emir Ugljanin

PDF

Everything-as-a-Thing for Abstracting the Internet-of-Things, Zakaria Maamar, Noura Faci, Mohamed Sellami, Emir Ugljanin, and Ejub Kajan

Link

Towards a seamless coordination of cloud and fog, Zakaria Maamar, Emir Ugljanin, Thar Baker, Mohammed Al Khafajiy, Noura Faci, and Vanilson Burégio

Link

Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches, Aine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, and Babar Shah

Advancing digital transformation: Integrated digital transformation framework for a successful deployment, Munir Majdalawieh

Link

A recursive co-occurrence text mining of the quran to build corpora for islamic banking business processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh

Link

Advanced mineral carbonation: An approach to accelerate CO2 sequestration using steel production wastes and integrated fluidized bed reactor, Abdel Mohsen Onsy Mohamed, Maisa El-Gamal, and Suhaib Hameedi

Link

Humanoid robots as teaching assistants in an arab school, Omar Mubin, Mariam Alhashmi, Rama Baroud, and Fady S. Alnajjar

Link

Facial image pre-processing and emotion classification: A deep learning approach, Alramzana Nujum Navaz, Serhani Mohamed Adel, and Sujith Samuel Mathew

Link

A Novel Game Theoretic Approach for Forming Coalitions between IMS Cloud Providers, Hani Nemati, May El Barachi, Nadjia Kara, and Fatna Belqasmi

Link

Applying system dynamics to model advanced persistent threats, Mathew Nicho and Hussein Fakhry

PDF

Dimensions of 'socio' vulnerabilities of advanced persistent threats, Mathew Nicho and Christopher D. McDermott

Link

Improving collaboration in blended learning environments through differentiated activities and mobile-assisted language learning tools, Ajda Osifo

PDF

The covcrav project: Architecture and design of a cooperative v2v crash avoidance system, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, and Ansar Yasar

PDF

V2V and V2I communications for traffic safety and CO2 emission reduction: A performance evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, and Ansar Yasar

Link

Social networks and leadership emergence, Jin Park

Link

Computation of axisymmetric vibration transmission using a well-conditioned system for elastic layers over a half–space, Andrew T. Peplow, Lars V. Andersen, and Peter Persson

Link

How building adjacency affects occupant-perceivable vibrations due to urban sources: A parametric study, Peter Persson, Loukas F. Kallivokas, Lars V. Andersen, and Andrew T. Peplow

Link

Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild, Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi

Link

Digital investigation of wireless sensor networks - IRIS mote, Argianto Rahartomo, Arne Bochem, and Omar Alfandi

Link

Holistic User eXperience in Mobile Augmented Reality Using User eXperience Measurement Index, Fahad Ahmed Satti, Jamil Hussain, Hafiz Syed Muhammad Bilal, Wajahat Ali Khan, Asad Masood Khattak, Ju Eun Yeon, and Sungyoung Lee

Link

Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing, Fahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, and Sungyoung Lee

Link

Radiomic-based framework for early diagnosis of lung cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

On the Integration of CT-Derived Features for Accurate Detection of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz

Link

A New System for Lung Cancer Diagnosis based on the Integration of Global and Local CT Features, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

A Novel CT-Based Descriptors for Precise Diagnosis of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

Early Assessment of Acute Renal Rejection Post-transplantation: A Combined Imaging and Clinical Biomarkers Protocol, Mohamed Shehata, Fatma Taher, Mohammed Ghazal, Ali Mahmoud, Garth Beache, Mohamed Abou El-Ghar, Amy C. Dwyer, Adel Elmaghraby, and Ayman El-Baz

Link

Smart homes as an IoT application: Predicting attitudes and behaviours, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah

Link

The Role of Smart Homes' Attributes on Users' Acceptance, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah

PDF

Forecasting Temperature in a Smart Home with Segmented Linear Regression, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat

Link

Faculty perception of engineering student cheating and effective measures to curb it, Sami W. Tabsh, Hany A. El Kadi, and Akmal S. Abdelfatah

Link

A Review on the Cerebrovascular Segmentation Methods, Fatma Taher, Ali Mahmoud, Ahmed Shalaby, and Ayman El-Baz

Link

Colorizing gray level images by using wavelet filters, F. Taher, M. Darweesh, and H. Al-Ahmad

Link

Security in cloud computing: State-of-the-art, key features, challenges, and opportunities, Abdallah Tubaishat

Link

Improving Complex Network Controllability via Link Prediction, Ran Wei, Weiwei Yuan, Donghai Guan, Asad Masood Khattak, and Muhammad Fahim

Link

A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, Babar Shah, Patrick C.K. Hung, and Anna Priscilla De Albuquerque

PDF

HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, and Patrick Hung

Link

Drone forensics: A case study on a DJI mavic air, Maryam Yousef and Farkhund Iqbal

Link

Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination, Saniya Zafar, Sobia Jangsher, Moayad Aloqaily, Ouns Bouachir, and Jalel Ben Othman

Link

Active Sampling Based on MMD for Model Adaptation, Qi Zhang, Donghai Guan, Weiwei Yuan, and Asad Masood Khattak

Submissions from 2018

Link

Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches, Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, and Asad Khattak

Link

Green computing: Awareness and practices, Ahed Abugabah and Amira Abubaker

Link

A novel framework for software defined wireless sensor networks, Khandakar Ahmed, Nazmus S. Nafi, Waleed Ejaz, Mark A. Gregory, and Asad M. Khattak

Link

Towards Inclusive Social Networks for the Developing World, Christian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch Glitho, and Jules Degila

Link

A Survey of Resource Management Challenges in Multi-cloud Environment: Taxonomy and Empirical Analysis, Bandar Aldawsari, Thar Baker, Muhammad Asim, Zakaria Maamar, Dhiya Al-Jumeily, and Mohammed Alkhafajiy

Link

Characterizing realistic signature-based intrusion detection benchmarks, Monther Aldwairi, Mohammad A. Alshboul, and Asmaa Seyam

PDF

Detecting fake news in social media networks, Monther Aldwairi and Ali Alwahedi

Link

Seamless WSN Connectivity Using Diverse Wireless Links, Omar Alfandi, Jagadeesha Rb, and John Beachboard

Link

Large scale image dataset construction using distributed crawling with hadoop YARN, Rahman Ali, Asmat Ali, Asad Masood Khatak, and Muhammad Saqlain Aslam

Link

A case-based meta-learning and reasoning framework for classifiers selection, Rahman Ali, Aasad Masood Khatak, Francis Chow, and Sungyoung Lee

Link

Malware detection using DNS records and domain name features, Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, and Fatna Belqasmi

Link

Analyzing the Behavior of Autistic and Normal Developing Children Using Eye Tracking Data, Mohamed Basel Almourad, Emad Bataineh, Joana Stocker, and Farhi Marir

Link

Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics, Feras Al-Obeidat, Eleanna Kafeza, and Bruce Spencer

Link

Detecting Malware Domains: A Cyber-Threat Alarm System, Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, and Monther Aldwairi

Link

Penetration and security of openssh remote secure shell service on raspberry Pi 2, Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor Albuainain, and Maktoom Alkubaisi

Link

Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation, Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, and Omar Alfandi

Link

Intelligent information systems and image processing: A novel pan-sharpening technique based on Multiscale decomposition, Ahmad Al Smadi and Ahed Abugabah

Link

E-Healthcare Knowledge Creation Platform Using Action Research, May Al Taei, Eleanna Kafeza, and Omar Alfandi

Link

Just-in-time Customer Churn Prediction: With and Without Data Transformation, Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood Ur Rahman Durani, and Sajid Anwar

Link

Configurable data acquisition for cloud-centric IoT, Muhammad Bilal Amin, Muhammad Sadiq, Wajahat Ali Khan, Asad Masood Khattak, Usman Akhtar, and Sungyoung Lee

Link

Impact of document representation on neural ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat

Link

Highlighting the Future of Autonomous Vehicle Technology in 2020-2050, Nedaa Baker Al Barghuthi, Deepa Pavithran, and Huwida E. Said

Link

Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting, M. Basharat, W. Ejaz, M. Naeem, A. M. Khattak, A. Anpalagan, and O. Alfandi

An understanding of consumption trends of smart phones on university campus: A comparison study, Emad Bataineh and Sara Alamodi

Link

Visual attention toward socially rich context information for autism spectrum disorder (ASD) and normal developing children: An eye tracking study, Emad Bataineh, Mohamed Basel Almourad, Farhi Marir, and Joana Stocker

Link

Usability analysis on Dubai e-government portal using eye tracking methodology, Emad Bataineh, Basel Al Mourad, and Fazouzi Kammoun

Link

Multi-classifier system for authorship verification task using word embeddings, Nacer Eddine Benzebouchi, Nabiha Azizi, Monther Aldwairi, and Nadir Farah

Link

Drone Forensics: Challenges and New Insights, Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, and Andrew Marrington

Link

News, Fake News, and Critical Authority, John M. Budd and Kristine N. Stewart

PDF

Estimating meteorological visibility range under foggy weather conditions: A deep learning approach, Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, and Ansar Ul Haque Yasar

Link

Formal specification and verification of cloud resource allocation using timed petri-nets, Saoussen Cheikhrouhou, Nesrine Chabouh, Slim Kallel, and Zakaria Maamar

Link

A novel feature selection-based sequential ensemble learning method for class noise detection in high-dimensional data, Kai Chen, Donghai Guan, Weiwei Yuan, Bohan Li, Asad Masood Khattak, and Omar Alfandi

Link

Empowering Graduates for Knowledge Economies in Developing Countries, Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, and Julie Bauld Wallace

Link

Impact of credibility on opinion analysis in social media, Fatima Zohra Ennaji, Lobna Azaza, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane

Link

Stopword detection for streaming content, Hossein Fani, Masoud Bashari, Fattane Zarrinkalam, Ebrahim Bagheri, and Feras Al-Obeidat

Link

Rumor Detection in Business Reviews Using Supervised Machine Learning, Ammara Habib, Saima Akbar, Muhammad Zubair Asghar, Asad Masood Khattak, Rahman Ali, and Ulfat Batool

Link

Analysis of symbolic models of biometric data and their use for action and user identification, James Alexander Hughes, Joseph Alexander Brown, Adil Mehmood Khan, Asad Masood Khattak, and Mark Daley

Link

Remote Data Acquisition Using Raspberry Pi3, Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, and Omar Alfandi

Link

Cloud Digital Forensics Evaluation and Crimes Detection, Raja Jabir and Omar Alfandi

Link

Malware Classification with Deep Convolutional Neural Networks, Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D.B. Bruce, Yang Wang, and Farkhund Iqbal

Impact of IoT device saturation on home WiFi networks, Dylan Kauling, May AlTaei, and Qusay H. Mahmoud

Link

An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Ki Il Kim, and Babar Shah

Link

Mobility and Temperature Aware QoS Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim

Link

Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions, Alavi Kunhu, Hussain Al-Ahmad, and Fatma Taher

Link

Thing federation as a service: Foundations and demonstration, Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, and Hasna El Alaoui El Abdallaoui

Link

How to agentify the Internet-of-Things?, Zakaria Maamar, Noura Faci, Khouloud Boukadi, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Rafael Angarita

Link

Storytelling integration of the internet of things into business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, Emir Ugljanin, and Quan Z. Sheng

Link

Toward a reliable service-based approach to software application development, Qusay Mahmoud, Ian Andrusiak, and May AlTaei

Link

Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and Hadith, Munir Majdalawieh, Farhi Marir, and Issam Tiemsani

Link

Higher education analytics: New trends in program assessments, Adam Marks and Maytha AL-Ali

Link

An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches, Shaikha Saleh Mohamed, Nedaa Baker Al Barghuthi, and Huwida Said

PDF

A process model for implementing information systems security governance, Mathew Nicho

When spear phishers craft contextually convincing emails, Mathew Nicho, Hussein Fakhry, and Uche Egbue

Link

A decision matrix model to identify and evaluate APT vulnerabilities at the user plane, Mathew Nicho and Shafaq Naheed Khan

Link

Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun

Link

Computation of a well-conditioned dynamic stiffness matrix for elastic layers overlying a half-space, Andrew T. Peplow

Link

The best-of-n problem with dynamic site qualities: Achieving adaptability with stubborn individuals, Judhi Prasetyo, Giulia De Masi, Pallavi Ranjan, and Eliseo Ferrante

Link

Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi

Link

Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung

The X-supply game, Sinan Salman and Suzan Alaswad

Link

Developing Information Literacy in Interdisciplinary Classrooms: Engaging with Diverse Literacies, Kristen M. Schuster and Kristine N. Stewart

Link

A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz

Link

Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah

Link

The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi

Link

Bayesian network model for temperature forecasting in Dubai, L. Smail

Link

Junction trees construction: Application to Bayesian networks, L. Smail

PDF

A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat

Link

Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane

Link

Adoption Challenges of the Internet of Things: ASurvey, Abdallah Tubaishat and Suhail Paliath

Link

Initiating and tracking social actions to adapt and improve smart city's business processes, Emir Ugljanin, Dragan H. Stojanović, Ejub Kajan, and Zakaria Maamar

Link

Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow

Link

Application of fuzzy logic to assess the quality of BPMN models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben-Abdallah, and Zakaria Maamar

PDF

An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi

Link

Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak

Link

Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Submissions from 2017

PDF

Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah

Link

Evaluation of healthcare enterprise information systems: A structural equation model, Ahed Abugabah

Link

Unsupervised geometrical feature learning from hyperspectral data, Muhammad Ahmad, Adil Mehmood Khan, Rasheed Hussain, Stanislav Protasov, Francis Chow, and Asad Masood Khattak

Link

FLUKES: Autonomous log forensics, intelligence and visualization tool, Monther Aldwairi and Hesham H. Alsaadi

Link

Architecture guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, Asad Khatak, and Raja Muhammad Ubaid Ullah

The best practice in implementing itil service transition for successful it service production, Mohamed Basel Almourad, Mohammed Hussain, and Feras Al-Obeidat

PDF

Identifying Major Tasks from On-line Reviews, Feras Al-Obeidat and Bruce Spencer

Link

Compromised user credentials detection using temporal features: A prudent based approach, Adnan Amin, Sajid Anwar, Babar Shah, and Asad Masood Khattak

Link

Efficiency of nearly periodic structures for mitigation of ground vibration, Lars V. Andersen, Andrew Peplow, and P. Bucinskas

PDF

Variation in models for simple dynamic structure-soil-structure interaction problems, L. V. Andersen, A. Peplow, P. Bucinskas, P. Persson, and K. Persson

Link

Variants of spray and forwarding scheme in delay tolerant networks, Mohammad Abdul Azim, Babar Shah, Beom Su Kim, Kyong Hoon Kim, and Ki Il Kim

PDF

The Creation of an Arabic Emotion Ontology Based on E-Motive, Anoud Bani-Hani, Munir Majdalweieh, and Feras Obeidat

Link

When Informing Doesn't Inform [Abstract], John Beachboard and Martine Robinson Beachboard

Link

Obstacle-aware resource allocation in business processes, Farah Bellaaj, Mohamed Sellami, Sami Bhiri, and Zakaria Maamar

Link

Configurable structure tree as a means to manage configurable business processes, Wehbi Benallal, Mahmoud Barhamgi, Djamal Benslimane, and Zakaria Maamar

Leveraging the affordances of mobile learning for vocabulary gains, Michael Bowles

PDF

A Neural network approach to visibility range estimation under foggy weather conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, and Ansar Ul Haque Yasar

An evaluation of seasonal patterns of thermal conditions inside a vegetated courtyard area of a Mediterranean city (Athens), Ioannis Charalampopoulos, Fotoula Droulia, Areti Tseliou, and Ioannis Tsiros

Link

Large residual multiple view 3D CNN for false positive reduction in pulmonary nodule detection, Anton Dobrenkii, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Link

Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan

PDF

Production of durable and cost effective sewer pipes using petroleum and industrial waste by-products, Maisa El Gamal, Amr El-Dieb, Khaled El-Sawy, Amr Sweedan, and Abdel Mohsen Mohamed

Academic reading on a collaborative, online platform, Jenny Eppard and Preeya Reddy

Localising content for an XMOOC in the UAE, Jenny Eppard and Preeya Reddy

A framework for flipped learning, Jenny Eppard and Aicha Rochdi

Link

Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems, Muhammad Fahim, Thar Baker, Asad Masood Khattak, and Omar Alfandi

Link

Physical activity recognizer based on multimodal sensors in smartphone for ubiquitous-lifecare services, Muhammad Fahim, Asad Masood Khattak, Saiqa Aleem, and Haseena Al Katheeri

Link

Joint workload scheduling and BBU allocation in cloud-RAN for 5G networks, Lilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, and Asad Masood Khattak

Link

Basis independence of implicitly defined hamiltonian circuit dynamics, Jon Pierre Fortney

Link

Deep learning models for bone suppression in chest radiographs, Maxim Gusarev, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Link

The application of narrow-band NDVI as a tool for mapping mangrove environment in Abu Dhabi, Hassan Hajjdiab, Haitham Farok, and Fares M. Howari

Link

Multimedia File Signature Analysis for Smartphone Forensics, D. Hamdi, F. Iqbal, T. Baker, and B. Shah

Link

Securing the internet of things: A worst-case analysis of trade-off between query-anonymity and communication-cost, Kadhim Hayawi, Pin Han Ho, Sujith Samuel Mathew, and Limei Peng

Link

Local mean consistency on numerical solutions of stochastic wave equation with cubic nonlinearities on 2D rectangles, Haziem M. Hazaimeh

PDF

Mean Square Consistency on Numerical Solutions of Stochastic Wave Equation with Cubic Nonlinearities on 2D Rectangles, Haziem M. Hazaimeh

Link

A study of children facial recognition for privacy in smart TV, Patrick C.K. Hung, Kamen Kanev, Farkhund Iqbal, David Mettrick, Laura Rafferty, Guan Pu Pan, Shih Chia Huang, and Benjamin C.M. Fung

Link

A novel approach for analyzing student interaction with educational systems, Mohammed Hussain, M. Basel Al-Mourad, Abdullah Hussein, Sujith Mathew, and Essam Morsy

Link

Continuous health monitoring using smartphones-A case-study for monitoring diabetic patients in UAE, A. J. Jihad, Sujith Samuel Mathew, Sujni Paul, and D. Ponmary Pushpalatha

Link

Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance, Eleanna Kafeza, Christos Makris, and Gerasimos Rompolas

Link

Forensic analysis of xbox one and playstation 4 gaming consoles, Salam Khanji, Raja Jabir, Farkhund Iqbal, and Andrew Marrington

Link

Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD), Asad M. Khattak, Farkhund Iqbal, Patrick C.K. Hung, Jwo Shiun Sun, Guan Pu Pan, and Jing Jie Lin

Link

Privacy-aware in the IoT applications: A systematic literature review, Faiza Loukil, Chirine Ghedira-Guegan, Aïcha Nabila Benharkat, Khouloud Boukadi, and Zakaria Maamar

Link

Ongoing Research Agenda on the Internet of Things (IoT) in the Context of Artificial Intelligence (AI), Zakaria Maamar

Link

Detecting and tackling run-time obstacles in social business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, and Sylvain Lefebvre

Link

A reference framework for enterprise computing curriculum, Munir Majdalawieh and Adam Marks

Link

Learning systems' learning analytics, Adam Marks, Maytha Al-Ali, and Kees Rietsema

Link

Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro, Rima Masri and Monther Aldwairi

Link

From the Internet of Things to the web of things-enabling by sensing as-A service, Sujith Samuel Mathew, Yacine Atif, and May El-Barachi

A Decision support framework for public healthcare: An approach to follow-up support service, Shah Jahan Miah, John G. Gammack, Rashadul Hasan, and Najmul Hasan

Developing a framework towards design understanding for crowdsourcing research: A content analysis, Shah Jahan Miah, Najmul Hasan, Don Kerr, and John G. Gammack

Link

Gamifying Foundational STEM Skills, Jim Morey, John Gammack, and Erik Thornquist

Link

Towards safer roads through cooperative hazard awareness and avoidance in connected vehicles, Fatma Outay, Faouzi Kammoun, Florent Kaisser, and Mohammed Atiquzzaman

PDF

ConVeh: Driving Safely into a Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, and Samar El-Amine

PDF

Geologic environments for nuclear waste repositories, Evan K. Paleologos, Abdel Mohsen O. Mohamed, and Kosmas Pavlopoulos

Variations within simple models for structure-soil interaction, Andrew Peplow, Lars Andersen, and Paulius Bucinskas

PDF

Environmental vibration reduction utilizing an array of mass scatterers, A. T. Peplow, L. V. Andersen, and P. Bucinskas

Link

Authorship attribution of Arabic tweets, Abdullateef Rabab'Ah, Mahmoud Al-Ayyoub, Yaser Jararweh, and Monther Aldwairi

PDF

Towards a Privacy Rule Conceptual Model for Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, and Shih-Chia Huang

Reading while listening on mobile devices: An innovative approach to enhance reading, Aicha Rochdi and Jenny Eppard

Urban road network crisis response management: Time-sensitive decision optimization, Sinan Salman and Suzan Alaswad

Link

SONAR: Automatic detection of cyber security events over the twitter stream, Quentin Le Sceller, El Mouatez Billah Karbab, Mourad Debbabi, and Farkhund Iqbal

Link

Predictors of graduate employability in Indian information technology sector, Nidhi Sehgal and Saboohi Nasim

Junction trees constructions in Bayesian networks, Linda Smail

Link

Factorization of computations in Bayesian networks: Interpretation of factors, Linda Smail and Zineb Azouz

PDF

SAND - A dashboard for analyzing employees' social actions over google hangouts, Edvan Soares, Marcos Eduardo, Vanilson Burégio, Emir Ugljanin, and Zakaria Maamar

PDF

Selecting Sensors when Forecasting Temperature in Smart Buildings, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi

Link

Staying on track: The buffering effect of culture on leadership strength and derailment potential, Mary F. Sully de Luque, Yi Zhang, and Jean Brittain Leslie

Safe city: Introducing a flawless model and implementation guidelines to reduce crime rate and response time, Abdallah Tubaishat and Rami Elsayed

Link

The role of expats, local residents and tourists in defining a destination: A branding case study for Abu Dhabi tourism, Nataša Slak Valek

PDF

A fuzzy logic-based approach for assessing the quality of business process models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben Abdallah, and Zakaria Maamar

Link

Collusion attacks in Internet of Things: Detection and mitigation using a fog based model, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub, and Monther Al Dwairi

Link

A sequential inspection and replacement policy for degradation-based systems, Zhicheng Zhu, Yisha Xiang, Suzan Alaswad, and C. Richard Cassady

Submissions from 2016

Link

Bounded message delay with threshold time constraint in delay tolerant networks (DTNs), Ali Abbas, Babar Shah, Feras Al-Obeidat, and Farkhund Iqbal

Information quality of enterprise systems in healthcare: An empirical study, Ahed Abugabah

PDF

An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment, Mohammad Abu-Lebdeh, Fatna Belqasmi, and Roch Glitho

Link

Gait fingerprinting-based user identification on smartphones, Muhammad Ahmad, Adil Mehmood Khan, Joseph Alexander Brown, Stanislav Protasov, and Asad Masood Khattak

Link

Challenges in managing real-time data in health information system (HIS), Usman Akhtar, Asad Masood Khattak, and Sungyoung Lee

Link

Secure and efficient multiparty computation on genomic data, Md Momin Al Aziz, Mohammad Z. Hasan, Noman Mohammed, and Dima Alhadidi

Link

Calculating the speed of vehicles using Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Mehdi Akbari Gurabi, Alberto Rivera Diaz, Md Istiak Mehedi, and Dieter Hogrefe

PDF

An Algorithm for Inferring Big Data Objects Correlation Using Word Net, M. Basel Almourad, Mohammed Hussain, and Talal Bonny

PDF

Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington

Link

Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data, Feras Al-Obeidat, Leonardo Feltrin, and Farhi Marir

Link

A meta-heuristic approach for developing PROAFTN with decision tree, Feras Al-Obeidat, Babar Shah, Asad Masood Khattak, and Ali Abbas

Predicting students' performance using mutli-criteria classification: A case study, Feras Al-Obeidat and Abdallah Tubasihat

Link

Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service, Wael Alrahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, and Azzam Mourad

Link

Magec: An image searching tool for detecting forged images in forensic investigation, S. Al Sharif, M. Al Ali, N. Al Reqabi, F. Iqbal, T. Baker, and A. Marrington

Link

White-Hat Hacking Framework for Promoting Security Awareness, S. Al-Sharif, F. Iqbal, T. Baker, and A. Khattack

Link

Evaluating dispersion forces for optimization of van der Waals complexes using a non-empirical functional, Alya A. Arabi

Link

A credibility and classification-based approach for opinion analysis in social networks, Lobna Azaza, Fatima Zohra Ennaji, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane

PDF

A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra

Link

Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar

PDF

A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer

Link

Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee

Link

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe

Link

Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung

Link

Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra

Link

Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah

Link

Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah

PDF

Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli

Link

Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan

Link

Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar

Link

Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry

Link

A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew

Link

Interdiscursive strategies of metaphor-driven rhetoric in Romanian discourses on a political crisis, Cornelia Ilie and Ariadna ŞtefǍnescu

Link

Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said

Link

Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid

Link

Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said

Link

Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi

Link

Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet

Link

On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami

PDF

Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat

Link

Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali

Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque

Link

A data visualisation for horizontal eye-movements, Jim Morey and John Gammack

Link

Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra

Al Ain Oases Mapping Project: Qattārah Oasis, past and present (poster), Timothy Power, Peter Sheehan, Shamsa Mohamed Al Dhaheri, Mariyam Abd Al Aziz Al Hammadi, Khuloud Ibrahim Al Hammadi, Afra Adnan Al Noaimi, Ayesha Muhsen Al Subaihi, Hamda Hasan Al Omar, Fatima Thani Al-Romeithi, Muzna Khalifa Al Mansoori, Leqa Jawher Al Zaabi, Zainab Rubaiya Al Naemi, Mohamed Khalifa, and Mohamed Al Dhaheri

PDF

An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli

Link

Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah

Link

The computing professional skills assessment: An innovative method for assessing ABET's student outcomes, Kevin Schoepp, Maurice Danaher, and Ashley Ater Kranov

Link

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak

Link

A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim

Link

Comparison of Lauritzen-Spiegelhalter and successive restrictions algorithms for computing probability distributions in Bayesian networks, Linda Smail

PDF

Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi

PDF

Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat

Link

How to Restrict Web 2.0 Applications Use in the Workplace? Example of Google+ Hangouts, Emir Ugljanin, Noura Faci, Vanilson Buregio, and Zakaria Maamar

Link

Tracking users' actions over social media: Application to Facebook, Emir Ugljanin, Noura Faci, Mohamed Sellami, and Zakaria Maamar

Link

Integrating Content and English-Language Learning in a Middle Eastern Information Technology College: Investigating Faculty Perceptions, Practices and Capabilities, Norman Williams, John Beachboard, and Robert Bohning

Link

Towards a meta-modeling approach for social business process requirements capture, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben-Abdallah

Link

IoT end-user applications provisioning in the cloud: State of the art, Sami Yangui, Roch H. Glitho, Fatna Belqasmi, Monique J. Morrow, and Paul A. Polakos

Link

Android device hacking tricks and countermeasures, Khulood Al Zaabi

Link

Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks, Khulood Ali Al Zaabi

Submissions from 2015

Link

Smart parking system for vehicles, Sripriya Srikant Adhatarao, Omar Alfandi, Arne Bochem, and Dieter Hogrefe

Link

Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters, Monther Aldwairi and Koloud Al-Khamaiseh

Link

Challenges of leveraging mobile sensing devices in wireless healthcare, Omar Alfandi, Suhail Ahmed, May El Barachi, and Adil Khan

Link

Received signal strength indication for movement detection, Omar Alfandi, Arne Bochem, Kirill Bulert, Dieter Hogrefe, and Alwin Maier

Link

Social learning on the move - A research roadmap, Dima Alhadidi, Zakaria Maamar, and Farhi Marir

Link

Towards HSS as a virtualized service for 5G networks, Hanieh Alipour, Fatna Belqasmi, Mohammad Abu-Lebdeh, and Roch Glitho

Link

Consumers Attitude towards the Use of Mobile Health Apps: An Empirical Review, Ayesha Almarri and Tariq Bhatti

Link

Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington

Link

Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal

Intelligent cloud computing first international conference, ICC 2014 Muscat, Oman, february 24–26, 2014 revised selected papers, Asma Al-Saidi, Rudolf Fleischer, Zakaria Maamar, and Omer F. Rana

Link

A new information model towards context-aware service provisioning in the Internet-of-Things, Mohab Aly, May Elbarachi, and Rachida Dssouli

Link

A novel cryptography based privacy preserving solution for urban mobility and traffic control, Mohamad Badra and Elyes Ben Hamida

Link

An innovative platform for person-centric health and wellness support, Oresti Banos, Muhammad Bilal Amin, Wajahat Ali Khan, Muhammad Afzel, Mahmood Ahmad, Maqbool Ali, Taqdir Ali, Rahman Ali, Muhammad Bilal, Manhyung Han, Jamil Hussain, Maqbool Hussain, Shujaat Hussain, Tae Ho Hur, Jae Hun Bang, Thien Huynh-The, Muhammad Idris, Dong Wook Kang, Sang Beom Park, Hameed Siddiqui, Le Ba Vui, Muhammad Fahim, Asad Masood Khattak, Byeong Ho Kang, and Sungyoung Lee

Link

NGNaaS: NGNs as cloud computing services, Fatna Belqasmi, May El Barachi, Jose M.Alcaraz Calero, Mohamad Badra, and Omar Alfandi

Link

Sandboxing: Aid in digital forensic research, Asif Iqbal, Hanan Alobaidli, Mario Guimaraes, and Oliver Popov

PDF

Exploring the extent to which English LIS Masters programs in the UAE and Qatar meet the skills and knowledge needs of employers in the library and information studies field, Nicole Johnston, Judith Mavodza, and Jassim Mohammed Jirjees

Link

An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center, Faouzi Kamoun, Omar Alfandi, and Sami Miniaoui

Link

Weaving risk identification into crowdsourcing lifecycle, Faouzi Kamoun, Dima Alhadidi, and Zakaria Maamar

Link

Correlating health and wellness analytics for personalized decision making, Wajahat Ali Khan, Muhammad Idris, Taqdir Ali, Rahman Ali, Shujaat Hussain, Maqbool Hussain, Muhammad Bilal Amin, Asad Masood Khattak, Yuan Weiwei, Muhammad Afzal, Sungyoung Lee, and Byeong Ho Kang

Link

'Controlling' Web 2.0 Applications in the Workplace, Zakaria Maamar, Vanilson Buregio, Noura Faci, Djamal Benslimane, and Quan Z. Sheng

Link

Collaborative enterprise applications based on business and social artifacts, Zakaria Maamar, Vanilson Burégio, and Mohamed Sellami

Link

Business reputation of social networks of web services, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli

Link

Using incentives to analyze social web services’ behaviors, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli

Link

Enterprise 2.0: Research challenges and opportunities, Zakaria Maamar, Noura Faci, Ejub Kajan, Khouloud Boukadi, Sherif Sakr, Mohamed Boukhebouze, Soraya Kouadri Mostéfaoui, Vanilson Burégio, Fadwa Yahya, Valérie Monfort, and Romain Hennion

Link

A framework of enriching business processes life-cycle with tagging information, Zakaria Maamar, Sherif Sakr, Ahmed Barnawi, and Seyed Mehdi Reza Beheshti

Link

SUPER: Social-based business process management framework, Zakaria Maamar, Sherif Sakr, Noura Faci, Mohamed Boukhebouze, and Ahmed Barnawi

Link

Analyzing social web services' capabilities, Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, and Mohamed Sellami

Link

Secure and private management of healthcare databases for data mining, Noman Mohammed, Samira Barouti, Dima Alhadidi, and Rui Chen

Link

Interface development for a gaze-controlled reading support application, Jim Morey, John Gammack, and Erik S. Thornquist

How can one learn mathematical word problems in a second language? A cognitive load perspective, Jase Moussa-Inaty, Mark Causapin, and Timothy Groombridge

PDF

Distributed computing and artificial intelligence, 12th international conference, Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, and Farkhund Iqbal

Link

Impact of Sybil attacks on Web services trust assessment, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Sybil tolerance and probabilistic databases to compute web services trust, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Web services trust assessment based on probabilistic databases, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Mathematics and mobile learning, Fayez Sayed

PDF

Innovative Public Libraries in United Arab Emirates: Taking library services in public spaces, Mary Sengati-Zimba, Judith Mavodza, and Emad Abu Eid