Submissions from 2023
Smart Health Care Management System for Diagnosis of Lungs Cancer, Ahed Abugabah, Farah Shahid, Amjad Alafeef, and Rizwan Khan
Decentralized Road Conditions Assessment for Smart Mobility Management in Abu Dhabi, A. Albasir and J. Ben-Othman
Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM, Omar Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, Majed Almehrzi, and Ahmed Alshamsi
Smart Application for Real Time Detection: An Improved Lightweight Detector for Real-Time Vehicle Detection, Ala Alsanabani, Ahed Abugabah, and Licheng Jiao
Towards an approach for weaving Open Digital Rights Language into Role-Based Access Control, Aisha Saif Alshamsi, Zakaria Maamar, and Mohammad-Amin Kuhail
MELoNS - A Modular and Extendable Simulator for LoRaWAN Network, Mi Chen, Lynda Mokdad, and Jalel Ben Othman
Applying Neutralisation Theory to Better Understand Ransomware Offenders, Lena Connolly, Hervé Borrion, Budi Arief, and Sanna Kaddoura
The Positive Social Psychology Intervention of Using Design Thinking to Improve Learners' Wellbeing in Interdisciplinary Courses, Areej ElSayary
Design and Fabrication a W-Shape Form Dual-Band Flexible Antenna For Biomedical Applications, Sara Yehia Abdel Fatah, Fatma Taher, Mohammad T. Haweel, Hussam Al Hamadi, Khaled Hassan Mohamadien, and Mohamed Fathy Abo Sree
Towards a Novel Approach for Smart Agriculture Predictability, Rima Grati, Myriam Aloulou, and Khouloud Boukadi
Message from AICCSA'2022 Program Chairs, Rima Grati and Cihan Tunc
Simulating Vehicular Mobility: A Comprehensive Framework Using MATLAB SimEvents, H. A. Hachemane and J. Ben-Othman
Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems, Colton Helbig, Safa Otoum, and Yaser Jararweh
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio, Farkhund Iqbal, Ahmad Abbasi, Abdul Rehman Javed, Gautam Srivastava, Zunera Jalil, and Thippa Reddy Gadekallu
Efficient Diagnosis of Liver Disease using Deep Learning Technique, Nosheen Jillani, Asad Masood Khattak, Muhammad Zubair Asghar, and Hayyat Ullah
Swift Search An open-source search engine, Fenil Kaneria, Shafaq Khan, and Nishara Nizamuddin
Automated Tool for NoSQL to SQL Migration, Shafaq Khan, Ajish Kalia, Haleh Mehdipour Dastjerdi, and Nishara Nizamuddin
A Complete Transmitted Message in DTNs with a Stable Coalition in Dynamic Structures, Y. Larabi, K. Ibrahimi, J. Ben-Othman, and E. Amhoud
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks, Nisha Thorakkattu Madathil, Saed Alrabaee, Mousa Al-kfairy, Rafat Damseh, and Abdelkader N Belkacem
Optimizing Traffic Flow with Policy Iteration Method: A Study on 9-Intersection Network Management, A. Merbah and J. Ben-Othman
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device, Mathew Nicho and Ibrahim Sabry
Blockchain-enabled Platform for a Meta Customer Loyalty Program, Aijaz A. Shaikh, Nadia Dahmani, Sana Khan, and Ravishankar Sharma
Performance Evaluation of SDN-WISE in Mobile Wireless Sensors Networks, Amine Tcherak, Mohamed Ould Khaoua, and Samia Loucif
Message from AICCSA'2022 General Chairs, Genoveva Vargas-Solar and Zakaria Maamar
Submissions from 2022
Evaluating Web Search Engines’ Results for Personalization and User Tracking, Shamma AalGhardaqa, Tasnim Said, Amal Abdulrahman, Arsiema Yohannes, and Monther Aldwairi
A Brief Comparison of K-means and Agglomerative Hierarchical Clustering Algorithms on Small Datasets, Hassan I. Abdalla
Towards Highly-Efficient k-Nearest Neighbor Algorithm for Big Data Classification, Hassan I. Abdalla and Ali A. Amer
A machine learning-based approach for smart agriculture via stacking-based ensemble learning and feature selection methods, Emna Ben Abdallah, Rima Grati, and Khouloud Boukadi
A Deep Learning Approach for Real-time Detection of Epileptic Seizures using EEG, Kiyan Afsari, May El Barachi, Stefano Fasciani, and Fatna Belqasmi
Towards a global C2C Crowdsourcing Smart Shopper System: An SDLC Development Approach, Alyazia Albreiki, Ayesha Almemari, and Ahmed Shuhaiber
What’s in my Fridge?, Salama Alfzari, Alqahtani Nowaier, and Ahmed Shuhaiber
Motivation and Hurdles for the Student Adoption of Metaverse-based Classroom: A Qualitative Study, Mousa Al-Kfairy, Omar Al-Fandi, Mewael Alema, and May Altaee
Conceptualising the Role of the UAE Innovation Strategy in University-Industry knowledge Diffusion Process, Mousa Al-Kfairy, Munir Majdalawieh, and Saed Alrabaee
The intercorrelations among risk factors and trust dimensions in S-commerce: An empirical investigation from the user experience, Mousa Al-kfairy and Ahmed Shuhaiber
The Impact of Personal Lifestyle and Personal Innovativeness on Insta Shopping Purchase Intention, Mousa Al-Kfairy, Ahmed Shuhaiber, and Mewael Alema Hailu
Sustainable Concrete Using Industrial By-product Waste, Vasila Alkhaldi, Abdel-Hamid I. Mourad, and Maisa El Gamal
Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains, Alshaima Almarzooqi, Jawahir Mahmoud, Bayena Alzaabi, Arsiema Ghebremichael, and Monther Aldwairi
Do Autistic and Normal Developing Children Behave Differently When They are Presented with Sad Face Emotion, Mohamed Basel Almourad, Emad Bataineh, and Zelal Wattar
Dynamic Facial Recognition in Autism: The Case of Happy Face Expression, Mohamed Basel Almourad, Emad Bataineh, and Zelal Wattar
Twitter sentiment analysis to understand students' perceptions about online learning during the Covid'19, Feras Al-Obeidat, Mariam Ishaq, Ahmed Shuhaiber, and Adnan Amin
Using Self-labeling and Co-Training to Enhance Bots Labeling in Twitter, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal
Efforts and Suggestions for Improving Cybersecurity Education, Saed Alrabaee, Mousa Al-Kfairy, and Ezedin Barka
Students’ Satisfaction with Online Learning Environments - Post COVID-19, Amal Alrayes, Ons Al-Shamaileh, Nishara Nizamuddin, and Fatima Ahmed
Determinants of Students’ Satisfaction with Higher Education Institutions in Face-to-Face and Online Learning Environments, Ons Al-Shamaileh, Nishara Nizamuddin, and Reem Atassi
Towards a Smart Electric Grid in Abu Dhabi: Models' analysis and an Infrastructure and Architecture Proposition, Abdulla Naser Alzaabi, Dheyab Al Kaabi, and Ahmed Shuhaiber
Resource and Heterogeneity-aware Clients Eligibility Protocol in Federated Learning, Muhammad Asad, Safa Otoum, and Saima Shaukat
An Efficient Classification of Emotions in Students' Feedback using Deep Neural Network, Muhammad Zubair Asghar, Asad Masood Khattak, Nouman Khan, Muhammad Mansoor Alam, Adidah Lajis, Mohd Khairil Rahmat, and Haidawati Mohamad Nasir
Scheduling Household Appliances using Genetic Algorithms, Maram Assi, Ramzi A. Haraty, Sergio Thoumi, Sanaa Kaddoura, and Nahla A. Belal
DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem, Meryeme Ayache, Amjad Gawanmeh, and Jamal N. Al-Karaki
BeverageMaster: Smart Beverage Ordering Assistant, Zeinab Abdel Aziz, Balgees Alharmoodi, and Mohammad Amin Kuhail
Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems, Himanshi Babbar, Ouns Bouachir, Shalli Rani, and Moayad Aloqaily
Evaluation of Supervised Machine Learning Approaches for Credit Card Fraud Detection, Alhanof Mabruk Balobid, Jawaher Saleh Binamro, Sewit Tewoldemedhin Yohannes, and Sanaa Kaddoura
Combining Named Entity Recognition and Emotion Analysis of Tweets for Early Warning of Violent Actions, May El Barachi, Sujith Samuel Mathew, and Manar AlKhatib
A Sensor-Embedded Smart Carton for the Real-Time Monitoring of Perishable Foods' Lifetime, May El Barachi, Sinan Salman, and Sujith Mathew
Virtual Radar: A Novel and Advanced Tool for Monitoring Virtualized Networks, Fatna Belqasmi, May El Barachi, and Hani (Microsoft Nemati
Optimization of the Deployment of Wireless Sensor Networks Dedicated to Fire Detection in Smart Car Parks using Chaos Whale Optimization Algorithm, Slimane Charafeddine Benghelima, Mohamed Ould-Khaoua, Ali Benzerbadj, Oumaya Baala, and Jalel Ben-Othman
On Modelling and Analyzing Composite Resources’ Consumption Cycles using Time Petri-Nets, Amel Benna, Fatma Masmoudi, Mohamed Sellami, Zakaria Maamar, and Rachid Hadjidj
Smart RFID application in health care: Using RFID technology for smart inventory and logistic systems in hospitals, Arne Bochem, Ahed Abugabah, and Ahmad Al Smadi
AI-based Blockchain for the Metaverse: Approaches and Challenges, Ouns Bouachir, Moayad Aloqaily, Fakhri Karray, and Abdulmotaleb Elsaddik
Dealing with complex routing requirements using an MCDM based approach, Mohamed R. Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, and Jalel Ben Othman
Trust Evolution Game in Blockchain, Hamda Al Breiki
Towards a Tangible Blocky Coding Design for Visually Impaired Children, Jennifer Alejandra Cardenas Castaneda, Patrick C. K. Hung, Farkhund Iqbal, and Rafiq Ahmad
An MDP model-based initial strategy prediction method for LoRaWAN, Mi Chen, Lynda Mokdad, Cedric Charmois, Jalel Ben-Othman, and Jean-Michel Fourneau
LoRaLOFT-A Local Outlier Factor-based Malicious Nodes detection Method on MAC Layer for LoRaWAN, Mi Chen, Lynda Mokdad, Jalel Ben Othman, and Jean-Michel Fourneau
The Impacts of the CEO’s Network Effect on Digitalization and Agile Leadership in China, Xihui Chen, Victor Chang, Patricia Baudier, and Kienpin Tee
Welcome Wagons: A Block Chain based Web Application for Car Booking, Nadia Dahmani, Suja A. Alex, S. Gayathri Sadhana, S. Geethanjali Jayasree, and T.P. Akhil Jinu
THECOG 2022 - Transforms In Behavioral And Affective Computing (Revisited), Georgios Drakopoulos and Eleanna Kafeza
Developing Preservice Teachers' Design Thinking Mindset Using Interactive Technology, Areej Elsayary
Establishing Social, Cognitive and Teacher Presences to Develop Students' Digital Competencies Through Their Engagements in Online Learning, Areej ELSayary and Lawrence Meda
Design A Microstrip Bandpass Filter Antenna from 2 GHz to 4.7 GHz for Biomedical Applications, Sara Yehia Abdel Fatah, F. Taher, Khaled Hassan Mohamadien, Mohamed T. Haweel, and Mohamed Fathy Abo Sree
A Hybrid Edge-assisted Machine Learning Approach for Detecting Heart Disease, Vahideh Hayyolalam, Safa Otoum, and Öznur Özkasap
Remote Robotic Surgery: Joint Placement and Scheduling of VNF-FGs, Amina Hentati, Amin Ebrahimzadeh, Roch H. Glitho, Fatna Belqasmi, and Rabeb Mizouni
Deep Learning based Animal Detection and Tracking in Drone Video Footage, Thani Jintasuttisak, Andrew Leonce, Moayyed Sher Shah, Tamer Khafaga, Greg Simkins, and Eran Edirisinghe
Mobile Deep Classification of UAE Banknotes for the Visually Challenged, Ashraf Khalil, Maha Yaghi, Tasnim Basmaji, Mohamed Faizal, Zia Farhan, Ali Ali, and Mohammed Ghazal
Cross-Location Activity Recognition using Adversarial Learning, Asad Khattak and Adil Khan
False Data Injection Attack on Atmospheric Electric Field in Thunderstorm Warning, Xiang Li, Kadhim Hayawi, Yi Chen, Shih Yu Chang, Hong Wen, Pin-Han Ho, Ling Yang, and Qiyuan Yin
Multi-party Contract Management for Microservices, Zakaria Maamar, Noura Faci, Joyce El Haddad, Fadwa Yahya, and Mohammad Askar
On the Use of Allen’s Interval Algebra in the Coordination of Resource Consumption by Transactional Business Processes, Zakaria Maamar, Fadwa Yahya, and Lassaad Ben Ammar
Librarians and Research Data in the Current Information Terrain, Judith Mavodza
Beware of Titles: Analysing Media Reporting of Cybercrime in UK and UAE, Maitha Khaled Al Mazrouei, Danica Čigoja Piper, and Lena Yuryna Connolly
Smart Health Care System for Early Detection of COVID-19 Using X-ray Scans, Atif Mehmood, Ahed Abugabah, and Ahmad Al Smadi
Super-Node Topology for Effective Students’ Advising, Loubna Mekouar, Fatna Belqasmi, and Muna Bader
FALSE: Fake News Automatic and Lightweight Solution, Fatema Al Mukhaini, Shaikhah Al Abdoulie, Aisha Al Kharuosi, Amal El Ahmad, and Monther Aldwairi
A Human Evacuation System for Smart Cities, Hessa Ali Nasser, Kholood Khalid Al Blooki, and Sanaa Kaddoura
Evaluating Machine Learning Methods for Intrusion Detection in IoT, Mathew Nicho and Shini Girija
Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats, Mathew Nicho and Shini Girija
Critical Analytical Insights of Palliative Care Process Modelling in a Regional Cancer Care, Yousra Odeh, Dina Tbaishat, Omar Shamieh, and Mohammad Odeh
Realizing Health 4.0 in Beyond 5G Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein Mouftah
Energy Efficient Virtual Network Embedding in Virtualized Wireless Sensor Networks, Vahid Maleki Raee, Amin Ebrahimzadeh, Marsa Rayani, Roch. H. Glitho, May El Barachi, and Fatna Belqasmi
On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification, Sakib Shahriar, Rozita Dara, and Kadhim Hayawi
NFTGAN: Non-Fungible Token Art Generation Using Generative Adversarial Networks, Sakib Shahriar and Kadhim Hayawi
On the Feasibility of Federated Learning for Neurodevelopmental Disorders: ASD Detection Use-Case, Hala Shamseddine, Safa Otoum, and Azzam Mourad
‘Sidekick’ Application: A Smart Mobile Application for Generation Z, Ahmed Shuhaiber, Safiyah Alhosani, Fatima Albadi, and Qwainsa Almarri
Information Systems in Medical Settings: A Covid-19 Detection System Using X-Ray Scans, Ahmad Al Smadi, Ahed Abugabah, Shadrack Fred Mahenge, and Farah Shahid
AI-Enabled Health 4.0: An IoT-Based COVID-19 Diagnosis Use-Case, Xiaoyu Song, Wei Pan, Ismaeel Al Ridhawi, Ali Abbas, and Safa Otoum
Covid-19 Detection Based on Chest X-Ray Images Using DCT Compression and NN, Fatma Taher, Reem T Haweel, Usama Mohammad Hassan Al Bastaki, Eman Abdelwahed, Tariq Rehman, and Tarek I Haweel
Design and implementation of 2.6 GHz Phase shift using microstrip technology for mobile broadband application, F. Taher, Ahmed Shokry Tonsy, Hesham Hanafy M T Azab, Hussam Al Hamadi, Mohammad T. Haweel, and Mohamed Fathy Abo Sree
Critical Analysis of Palliative Homecare Using the i∗ Framework's Strategic and Social Requirements Modelling Applied to a Cancer Care Organisation, Dina Tbaishat, Yousra Odeh, Faten F. Kharbat, Omar Shamieh, and Mohammad Odeh
Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs), Zouheir Trabelsi, Tariq Qayyum, Kadhim Hayawi, and Muhammad Ali
IoT Enhancements for an In-house Calm Computing Environment, Athanasios Tsoukalas, Steven Annor, Eleanna Kafeza, and Anthony Tzes
STKE: Temporal Knowledge Graph Embedding in the Spherical Coordinate System, Shibo Wang, Ruinan Liu, Linshan Shen, and Asad Masood Khattak
Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory, Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, and Azzam Mourad
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network, Zhibo Zhang, Ernesto Damiani, Hussam Al Hamadi, Chan Yeob Yeun, and Fatma Taher
Submissions from 2021
Pros and cons of Blockchain-based approaches in Education, Dua’a Abu Hamdi and Omar Alfandi
Drone-Based Cattle Detection Using Deep Neural Networks, R. Y. Aburasain, E. A. Edirisinghe, and Ali Albatay
Visual Pseudo Haptics for a Dynamic Squeeze / Grab Gesture in Immersive Virtual Reality, Naveed Ahmed, Mohammed Lataifeh, and Imran Junejo
Crowd Modeling using Temporal Association Rules, Rizwan Ahmed, Muhammad Shahzad Rafiq, and Imran N. Junejo
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects, Waqas Ahmed, Faisal Shahzad, Abdul Rehman Javed, Farkhund Iqbal, and Liaqat Ali
Multicriteria Decision Making Using TOPSIS Method: An Accurate Selection of Deserving Candidates, Rahman Ali and Asad Masood Khatak
IoT Protocols – MQTT versus CoAP, Alyaziya Almheiri and Zakaria Maamar
Blockchain and FL-based Network Resource Management for Interactive Immersive Services, Moayad Aloqaily, Ouns Bouachir, and Ismaeel Al Ridhawi
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka, Eiman Alothali, Hany Alashwal, Motamen Salih, and Kadhim Hayawi
SpeculoLab: A Protocol and a Tool for Identity Deception Experimentation in Social Networks, Noora Al Roken, Maryam Al Abdooli, Sumaya Khoory, and Hakim Hacid
The Acceptance of Social Media Sites: An Empirical Study Using PLS-SEM and ML Approaches, Sawsan Al-Skaf, Enaam Youssef, Mohammed Habes, Khadija Alhumaid, and Said A. Salloum
Towards a personalized recommendation model in location-based social networks, Reem Atassi, Ons Al-Shamaileh, and Hakim Hacid
Privacy-Preserving and Efficient Aggregation for Smart Grid based on Blockchain, Mohamad Badra and Rouba Borghol
Islamic Education and youth culture Exploring tolerance in UAE Islamic Education classrooms, Naved Bakali and Mariam Alhashmi
Towards Automatic Narrative Coherence Prediction, Filip Bendevski, Jumana Ibrahim, Tina Krulec, Theodore Waters, Nizar Habash, Hanan Salam, Himadri Mukherjee, and Christin Camia
Lightweight IDS for UAV Networks: A Periodic Deep Reinforcement Learning-based Approach, Omar Bouhamed, Ouns Bouachir, Moayad Aloqaily, and Ismaeel Al Ridhawi
AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless Networks, Nadia Charef, Adel Ben Mnaouer, and Ouns Bouachir
Student Perceptions of an Asychronous Online Discussion Board Used to Assess the Professional Skills, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov
THECOG - Transforms in Behavioral and Affective Computing, Georgios Drakopoulos and Eleanna Kafeza
Approximate High Dimensional Graph Mining With Matrix Polar Factorization: A Twitter Application, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Spyros Sioutas
Process Mining Analytics for Industry 4.0 with Graph Signal Processing, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Spyros Sioutas
A Hybrid Machine Learning Approach for Sentiment Analysis of Partially Occluded Faces, May El Barachi, Manar Alkhatib, and Sujith Samuel Mathew
Teaching and assessing creativity in STEAM education, Areej ElSayary
Transforming preservice teachers' learning in online courses: A framework of instructional design, Areej Elsayary
AI based Login System using Facial Recognition, Siem Girmay, Faniel Samsom, and Asad Masood Khattak
Bitcoin Price Forecasting: Linear Discriminant Analysis with Sentiment Evaluation, Ikhlaas Gurrib, Firuz Kamalov, and Linda Smail
Formal Modeling and Verification of Property-based Resource Consumption Cycles, Rania Ben Halima, Kais Klai, Mohamed Sellami, and Zakaria Maamar
Remote sensing and GIS based approaches to estimate evapotranspiration in the arid and semi-arid regions, Fares M. Howari, Manish Sharma, Cijo M. Xavier, Yousef Nazzal, Imen Ben Salem, and Fatima Al Aydaroos
Smart Guest Virtual Assistant with Automatic Guest Registration, Mohammed Hussain, Abdullah Hussein, and Mohamed Basel AlMourad
Discord Server Forensics: Analysis and Extraction of Digital Evidence, Farkhund Iqbal, Michał Motyliński, and Áine MacDermott
Community Search in a Multi-Attributed Graph using Collaborative Similarity Measure and Node Filtering, Naveed Javaid, Kifayat Ullah Khan, Asad Masood Khattak, and Waqas Nawaz
Classification of malicious and benign websites by network features using supervised machine learning algorithms, Sanaa Kaddoura
Evaluation of Supervised Machine Learning Algorithms for Multi-class Intrusion Detection Systems, Sanaa Kaddoura, Amal El Arid, and Mirna Moukhtar
Knowledge Engineering in the Social Era, Ejub Kajan and Zakaria Maamar
Comparative analysis of activation functions in neural networks, Firuz Kamalov, Amril Nazir, Murodbek Safaraliev, Aswani Kumar Cherukuri, and Rita Zgheib
A Novel Deep Reinforcement Learning-based Approach for Task-offloading in Vehicular Networks, S. M. Ahsan Kazmi, Safa Otoum, Rasheed Hussain, and Hussein T. Mouftah
Impact of Model Ensemble On the Fairness of Classifiers in Machine Learning, Patrik Joslin Kenfack, Adil Mehmood Khan, S.M. Ahsan Kazmi, Rasheed Hussain, Alma Oracevic, and Asad Masood Khattak
Forensic Analysis of the Cisco WebEx Application, Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, and Liaqat Ali Khan
Detecting Arabic Fake News Using Machine Learning, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, and Yaser Jararweh
Efficient In-Network Caching in NDN-based Connected Vehicles, Hasan Ali Khattak, Farkhanda Zafar Raja, Moayad Aloqaily, and Ouns Bouachir
Temporal behavioural analysis of extremists on social media: A machine learning based approach, Saad Lutfi, Rand Yasin, May El Barachi, Farhad Oroumchian, Ajala Imene, and Sujith Samuel Mathew
An IoT Application Business-Model on Top of Cloud and Fog Nodes, Zakaria Maamar, Mohammed Al-Khafajiy, and Murtada Dohan
Orchestration- and choreography-based composition of Internet of Transactional Things, Zakaria Maamar, Muhammad Asim, Saoussen Cheikhrouhou, and Ayesha Qamar
A Data-based Guiding Framework for Digital Transformation, Zakaria Maamar, Saoussen Cheikhrouhou, and Said Elnaffar
Trust-empowered, IoT-driven legitimate data offloading, Zakaria Maamar, Noura Faci, Fadwa Yahya, and Ejub Kajan
Cloud-edge coupling to mitigate execution failures, Zakaria Maamar and Mohammed Al Khafajiy
Blockchain-based Secure CIDS Operation, Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, and Mohammad Mehedy Masud
An Innovative and Decentralized Identity Framework Based on Blockchain Technology, Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, and Mohamad Badra
The Super-Node Topology in Collaborative Learning, Loubna Mekouar, Muna Bader, and Fatna Belqasmi
Super-Node Topology In Collaborative Learning: Concrete Examples And Benefits, Loubna Mekouar, Fatna Belqasmi, and Muna Bader
FinTech in Bahrain: The Role of FinTech in Empowering Women, Haya Yusuf Mohamed, Allam Hamdan, Magdalena Karolak, Anjum Razzaque, and Bahaaeddin Alareeni
Inter relationship between the attributes of talent management process in information technology sector, Anupama Nair, Beena Salim Saji, and Shaindra Sewbaran
Modeling Evasive Malware Authoring Techniques, Mathew Nicho and Maitha Alkhateri
Application of Consumptive Metrics to Measure Internship Alignment, Mathew Nicho, Emad Bataineh, and Tarannum Parkar
IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats, Mathew Nicho and Shini Girija
Federated Reinforcement Learning-Supported IDS for IoT-steered Healthcare Systems, Safa Otoum, Nadra Guizani, and Hussein Mouftah
What do developers reply to? An empirical study of the top Unmanned Aerial Vehicles (UAVs) apps, Fatma Outay, Haroon Malik, and David Dampier
Effect of Social Hierarchy on Conflict in teams: From a Structural Perspective, Jin Park
A Predictive Framework for Haptic Enabled VR-based Remote Phobia Treatment in Cloud/Fog Environment, Farinaz Rasouli, Amin Ebrahimzadeh, Somayeh Kianpisheh, Nattakorn Promwongsa, Fatna Belqasmi, and Roch Glitho
Persuasive Technology in Games: A Brief Review and Reappraisal, Umair Rehman, Muhammad Umair Shah, Amir Zaib Abbasi, Farkhund Iqbal, Ali Arsalan, and Muhammad Umair Javaid
Semantic composition of cloud services, Mouna Rekik, Khouloud Boukadi, and Rima Grati
Planning the supply of emergency medical products to cope with pandemics, Sinan Salman, Suzan Alaswad, Ramzi Hammami, and Imen Nouira
Discovering Influential Twitter Authors Via Clustering And Ranking On Apache Storm, Christina Saravanos, Georgios Drakopoulos, Andreas Kanavos, Eleanna Kafeza, and Christos Makris
IT Teaching Labs: Innovations in a Distance Education Era, Ahmed Seffah, Mohammad Amin Kuhail, and Joao Negreiros
A Novel Framework for Accurate and Non-Invasive Pulmonary Nodule Diagnosis by Integrating Texture and Contour Descriptors, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, and Ayman El-Baz
An Alternate Account on the Ethical Implications of Autonomous Vehicles, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Mohammed Hussain, and Fazli Wahid
Towards A Smarter Energy Metering System For A Smarter City: A Regression-Based Model From Users’ Perspective, Ahmed Shuhaiber, Nabil Adam, and Mohammad Sh.Daoud
Cardiovascular Segmentation Methods Based on Weak or no Prior, Fatma Taher and Neema Prakash
Which Virtualization Technology is Right for My Online IT Educational Labs?, Ahmad Samer Wazan, Mohammad Amin Kuhail, Kadhim Hayawi, and Rémi Venant
Forensic Analysis of Fitbit Versa: Android vs iOS, Joseph Williams, Aine Macdermott, Kellyann Stamp, and Farkhund Iqbal
Abstraction-Based Outlier Detection for Image Data, Kirill Yakovlev, Imad Eddine Ibrahim Bekkouch, Adil Mehmood Khan, and Asad Masood Khattak
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks, Benjamin Yankson, Javed Vali K, Patrick C. K. Hung, Farkhund Iqbal, and Liaqat Ali
Study of radical views on social media: Classification and group dynamics analysis, Rand Yasin, Saad Lutfi, Ajala Imene, Farhad Oroumchian, May El Barachi, and Sujith Samuel Mathew
Ontology Evolution Using Recoverable SQL Logs, Awais Yousaf, Asad Masood Khattak, and Kifayat Ullah Khan
Submissions from 2020
An Interactive Data Assignment Algorithm for Non-Replicated DDBMSs, Hassan I. Abdalla and Abdelmonim M. Artoli
Dynamic Graph Attention-Aware Networks for Session-Based Recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang
A review of challenges and barriers implementing RFID technology in the Healthcare sector, Ahed Abugabah, Nishara Nizamuddin, and Alaa Abuqabbeh
Smart healthcare ecosystem for elderly patient care, A. Abugabah and N. Nizamuddin
A Cloud Computing Capability Model for Large-Scale Semantic Annotation, Oluwasegun Adedugbe, Elhadj Benkhelifa, and Anoud Bani-Hani
Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users, Hussain Ahmad, Areeba Arif, Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, and Babar Shah
Blockchain-based chain of custody: Towards real-time tamper-proof evidence management, Liza Ahmad, Salam Khanji, Farkhund Iqbal, and Faouzi Kamoun
A Hybrid Approach for Counting Templates in Images, Maher Ala'raj and Munir Majdalawieh
Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault Tolerance, Omar Alfandi, Safa Otoum, and Yaser Jararweh
State of the Art in Digital Forensics for Small Scale Digital Devices, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, and Farkhund Iqbal
Blockchain-assisted Decentralized Virtual Prosumer Grouping for P2P Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Oznur Ozkasap, and Ouns Bouachir
Using Artificial Intelligence to Monitor the Evolution of Opinion Leaders' Sentiments: Case Study on Global Warming, Manar Alkhatib, May El Barachi, Sujith Samuel Mathew, and Farhad Oroumchian
UniBud: A Virtual Academic Adviser, Abdulrahman Alkhoori, Mohammad Amin Kuhail, and Abdulla Alkhoori
Visual Attention toward Human Face Recognizing for Autism Spectrum Disorder and Normal Developing Children: An Eye Tracking Study, Mohamed Basel Almourad and Emad Bataineh
Cone-KG: A semantic knowledge graph with news content and social context for studying covid-19 news articles on social media, Feras Al-Obeidat, Oluwasegun Adedugbe, Anoud Bani Hani, Elhadj Benkhelifa, and Munir Majdalawieh
The Socio-economic Impacts of Social Media Privacy and Security Challenges, Feras Al-Obeidat, Anoud Bani Hani, Oluwasegun Adedugbe, Munir Majdalawieh, and Elhadj Benkhelifa
On minimizing synchronization cost in NFV-based environments, Zakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily, and Ouns Bouachir
Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal
Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication?, Fatima Alqubaisi, Ahmad Samer Wazan, Liza Ahmad, and David W. Chadwick
Mitigation of ground vibration from pile driving by circular arrays of rigid blocks placed on the ground surface, Lars V. Andersen, Peter Persson, and Andrew T. Peplow
A WUSN-based Smart System for Water Flow Control, Nahom Aron, Bereket Yemane, Temesgen Mikael, Reem Salem, and Fatna Belqasmi
Energy Efficiency in SDDC: Considering Server and Network Utilities, Beakal Gizachew Assefa, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily, and Ouns Bouachir
A latent model for ad hoc table retrieval, Ebrahim Bagheri and Feras Al-Obeidat
Capturing Public Concerns about Coronavirus Using Arabic Tweets: An NLP-Driven Approach, Mohammed Bahja, Rawad Hammad, and Mohammed Amin Kuhail
Sentiment analysis on predicting presidential election: Twitter used case, Nedaa Baker Al Barghuthi and Huwida E. Said
A secure fog-based platform for SCADA-based IoT critical infrastructure, Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, and Mohammad Hammoudeh
Fane-KG: A semantic knowledge graph for context-based fake news detection on social media, Anoud Bani Hani, Oluwasegun Adedugbe, Feras Al-Obeidat, Elhadj Benkhelifa, and Munir Majdalawieh
A Semantic Model for Context-Based Fake News Detection on Social Media, Anoud Bani-Hani, Oluwasegun Adedugbe, Elhadj Benkhelifa, Munir Majdalawieh, and Feras Al-Obeidat
Thing Mutation as a Countermeasure to Safeguard IoT, Bita Banihashemi, Zakaria Maamar, Noura Faci, and Emir Ugljanin
Optimal maintenance policies for degrading hydrocarbon pipelines using Markov decision process, Eric Bediako, Suzan Alaswad, Yisha Xiang, and Zhigang Tian
Reliability Analysis of Crude Unit Overhead Piping Based on Wall Thickness Degradation Process, Eric Bediako, Yisha Xiang, Susan Alaswad, Liao Ying, and Liudong Xing
A knowledge-based approach to manage configurable business processes, Wehbi Benallal, Mahmoud Barhamgi, Djamal Benslimane, Zakaria Maamar, Noura Faci, and Ameni Bellaaj
A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic Surgery, Francis Boabang, Roch Glitho, Halima Elbiaze, Fatna Belqami, and Omar Alfandi
Accident Recognition via 3D CNNs for Automated Traffic Monitoring in Smart Cities, Mikhail Bortnikov, Adil Khan, Asad Masood Khattak, and Muhammad Ahmad
UAV-Assisted Vehicular Communication for Densely Crowded Environments, Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, and Haythem Bany Salameh
ECCV (14) - SipMask: Spatial Information Preservation for Fast Image and Video Instance Segmentation, Jiale Cao, Rao Muhammad Anwer, Hisham Cholakkal, Fahad Shahbaz Khan, Yanwei Pang, and Ling Shao
Learning Attentive and Hierarchical Representations for 3D Shape Recognition, Jiaxin Chen, Jie Qin, Yuming Shen, Li Liu, Fan Zhu, and Ling Shao
The impact of grouping efficiency measures in cellular manufacturing systems, Nadia Dahmani and Adnan Mukattash
Towards an Automatic Identification of Microservices from Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki
Automatic Microservices Identification from a Set of Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki
Suitability of Blockchain for Collaborative Intrusion Detection Systems, Nahom Aron Dawit, Sujith Samuel Mathew, and Kadhim Hayawi
Quality-dependent adaptation in a swarm of drones for environmental monitoring, Giulia De Masi and Eliseo Ferrante
Zealots Attack and the Revenge of the Commons: Quality vs Quantity in the Best-of-n, Giulia De Masi, Judhi Prasetyo, Elio Tuci, and Eliseo Ferrante
CLNet: A Compact Latent Network for Fast Adjusting Siamese Trackers, Xingping Dong, Jianbing Shen, Ling Shao, and Fatih Porikli
Building Trusted Startup Teams from LinkedIn Attributes: A Higher Order Probabilistic Analysis, Georgios Drakopoulos, Eleana Kafeza, Phivos Mylonas, and Haseena Al Katheeri
One Dimensional Cross-Correlation Methods for Deterministic and Stochastic Graph Signals with A Twitter Application in Julia, Georgios Drakopoulos and Eleanna Kafeza
Learning to Learn with Variational Information Bottleneck for Domain Generalization, Yingjun Du, Jun Xu, Huan Xiong, Qiang Qiu, Xiantong Zhen, Cees G.M. Snoek, and Ling Shao
MetaNorm: Learning to Normalize Few-Shot Batches Across Domains, Yingjun Du, Xiantong Zhen, Ling Shao, and Cees G. M. Snoek
Evaluating Citizens' Sentiments in Smart Cities: A Deep Learning Approach, Abdallah Elabora, Manar Alkhatib, Sujith Samuel Mathew, and May El Barachi
Stabilization of active acetylene by-product via sequestration of co2, M. El Gamal, A. M.O. Mohamed, and S. Hameedi
PraNet: Parallel Reverse Attention Network for Polyp Segmentation, Deng Ping Fan, Ge Peng Ji, Tao Zhou, Geng Chen, Huazhu Fu, Jianbing Shen, and Ling Shao
Exploiting Deep Neural Networks for Intention Mining, Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, and Muhammad Zubair Asghar
Elaboration and Characterization of ZnO/FTO thin films under different concentrations - Study dedicated to the photovoltaic systems - Study d, Slimani Hamza, Dagher Sawsan, Bessous Noureddine, Benhaoua Atmane, Laouini Salah Eddine, Mimouni Mourad, Ghougali Mebrouk, Chaabia Nacer, Fawwaz Al Khatib, Boshra Akhozheya, Maisa El Gamal, and Ali Tliba
Meteorology of the Red Planet by dust devils, Fares M. Howari, Imen Ben Salem, Manish Sharma, Cijo Xavier, Yousef Nazzal, and Fatima Alaydaroos
Application of hyperspectral imaging technique to determine the quality of Photo and Thermal exposed and contaminated pharmaceutical formulations: A cost effective way of quality testing, Fares M. Howari, Cijo Xavier, Manish Sharma, Yousef Nazzal, Imen Ben Salem, and Fatima Alaydaroos
Layer-Wise Conditioning Analysis in Exploring the Learning Dynamics of DNNs, Lei Huang, Jie Qin, Li Liu, Fan Zhu, and Ling Shao
VAE-GAN based zero-shot outlier detection, Bekkouch Imad Ibrahim, Dragos Constantin Nicolae, Adil Khan, Syed Imran Ali, and Asad Khattak
Detection and Analysis of Drive-by Downloads and Malicious Websites, Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, and Monther Aldwairi
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models, Salman Jan, Shahrulniza Musa, Toqeer Ali, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, and Babar Shah
A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach, Sanaa Kaddoura, Omar Alfandi, and Nadia Dahmani
Promoting Teaching Practices in IT Higher Education, Sanaa Kaddoura and Rima Grati
Legal smart contracts in ethereum block chain: Linking the dots, Eleanna Kafeza, Syed Juned Ali, Irene Kafeza, and Haseena Alkatheeri
Forecasting with deep learning: S&P 500 index, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib
Stock price forecast with deep learning, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib
A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders, Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
AI and machine learning: A mixed blessing for cybersecurity, Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, and Thar Baker
Analysis of the Importance of Systolic Blood Pressure Versus Diastolic Blood Pressure in Diagnosing Hypertension: MRA Study., Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Adel Elmaghraby, and Ayman El-Baz
Dynamic framework to mining Internet of Things for multimedia services, Yaser Khamayseh, Wail Mardini, J. William Atwood, and Monther Aldwairi
Towards a Novel Intrusion Detection Architecture using Artificial Intelligence, Salam Khanji and Asad Khattak
Interpretable and Generalizable Person Re-identification with Query-Adaptive Convolution and Temporal Lifting, Shengcai Liao and Ling Shao
Interpretable Neural Network Decoupling, Yuchao Li, Rongrong Ji, Shaohui Lin, Baochang Zhang, Chenqian Yan, Yongjian Wu, Feiyue Huang, and Ling Shao
Internet of Things, Zakaria Maamar
Thingsourcing to Enable IoT Collaboration, Zakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, and Said Elnaffar
OWL-T for a Semantic Description of IoT, Zakaria Maamar, Noura Faci, Ejub Kajan, Muhammad Asim, and Ayesha Qamar
Process-of-Things: Weaving film industry’s practices into the Internet-of-Things, Zakaria Maamar, Noura Faci, Ejub Kajan, Safet Purković, and Emir Ugljanin
Bridging the gap between business processes and IoT, Zakaria Maamar, Ejub Kajan, Ikbel Guidara, Leyla Moctar-M'baba, and Mohamed Sellami
Atomicity in the Internet of Transactional Things (Io2T), Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, and Maj Alshibly
Towards an Approach for Validating the Internet-of-Transactional-Things, Zakaria Maamar, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, and Bita Banihashemi
Structure Preserving Stain Normalization of Histopathology Images Using Self Supervised Semantic Guidance, Dwarikanath Mahapatra, Behzad Bozorgtabar, Jean Philippe Thiran, and Ling Shao
Pink Ocean Strategy: Democratizing Business Knowledge for Social Growth and Innovation, Evangelos Markopoulos, Maria Barbara Ramonda, Lisa Marie Carolin Winter, Haseena Al Katheeri, and Hannu Vanharanta
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data, Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, and Muhsin Cheratta
On the need for cultural sensitivity in digital wellbeing tools and messages: A UK-China comparison, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
WorldCIST (2) - On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison., John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Bi-orthogonal wavelets for investigating Gibbs effects via oblique extension principle, Mutaz Mohammad
Digital Forensic Acquisition and Analysis of Discord Applications, Michal Motylinski, Aine MacDermott, Farkhund Iqbal, Mohammed Hussain, and Saiqa Aleem
ECCV (22) - Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G. M. Snoek, and Ling Shao
Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G.M. Snoek, and Ling Shao
Evaluating IT Governance Structure Implementation in the Gulf Cooperation Council Region, Mathew Nicho and Suadad Muamaar
A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks, Safa Otoum, Burak Kantarci, and Hussein T. Mouftah
Blockchain-Supported Federated Learning for Trustworthy Vehicular Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah
Contextual healing: Privacy through interpretation management, Fatma Outay and Rula Sayaf
PhishOut: PhishOut: Effective Phishing Detection Using Selected Features, Suhail Paliath, Mohammad Abu Qbeitah, and Monther Aldwairi
The effect of differential quality and differential zealotry in the best-of-n problem, Judhi Prasetyo, Giulia De Masi, Elio Tuci, and Eliseo Ferrante
Quaternionic Channel-based Modulation For Dual-polarized Antennas, Sara Shakil Qureshi, Syed Ali Hassan, and Sajid Ali
On the use of elitism to improve convergence of the chemical reaction optimization algorithm in discrete optimization problems, Sinan Salman
Network design using chemical reaction optimization and markov-chain traffic assignment, Sinan Salman and Suzan Alaswad
Vehicles' emissions consideration in transportation network design using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad
A Comprehensive Framework for Accurate Classification of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
Access Permissions for Apple Watch Applications: A Study on Users' Perceptions, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, and Ali Arsalan
Invertible Zero-Shot Recognition Flows, Yuming Shen, Jie Qin, Lei Huang, Li Liu, Fan Zhu, and Ling Shao
Algorithm Appreciation: Algorithmic Performance, Developmental Processes, and User Interactions, Donghee Shin, Bouziane Zaid, and Mohammed Ibahrine
A predictive model of users’ behavior and values of smart energy meters using PLS-SEM, Ahmed Shuhaiber
Trust in smart energy meters: The role of perceived values, Ahmed Shuhaiber
Panel: Autonomy Control at Work: Cars, Robots, Drones and Satellites, Roy Sterritt, Petr Skobelev, Mario Döller, Iaria Dini, Claudius Stern, Giulia De Masi, Timothy Patten, and Pedro Forero
Precise Cerebrovascular Segmentation, F. Taher, A. Soliman, H. Kandil, A. Mahmoud, A. Shalaby, G. Gimel'farb, and A. El-Baz
Improving the impact of power efficiency in mobile cloud applications using cloudlet model, Lo'ai Tawalbeh, Mohammad A. Tawalbeh, and Monther Aldwairi
Building a security framework for smart cities: A case study from UAE, Abdallah Tubaishat and Mariam Al Jouhi
Optimizing the Efficiency of Machine Learning Techniques, Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, and Asad Masood Khattak
Automatic C-Plane Detection in Pelvic Floor Transperineal Volumetric Ultrasound, Helena Williams, Laura Cattani, Mohammad Yaqub, Carole Sudre, Tom Vercauteren, Jan Deprest, and Jan D’hooge
Region Graph Embedding Network for Zero-Shot Learning, Guo Sen Xie, Li Liu, Fan Zhu, Fang Zhao, Zheng Zhang, Yazhou Yao, Jie Qin, and Ling Shao
Count- and Similarity-Aware R-CNN for Pedestrian Detection, Jin Xie, Hisham Cholakkal, Rao Muhammad Anwer, Fahad Shahbaz Khan, Yanwei Pang, Ling Shao, and Mubarak Shah
ICML - On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao
A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination, Fadwa Yahya, Zakaria Maamar, and Khouloud Boukadi
4P based forensics investigation framework for smart connected toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung
ECCV (17) - Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-Identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain
Learning Enriched Features for Real Image Restoration and Enhancement, Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming Hsuan Yang, and Ling Shao
Unsupervised Domain Adaptation with Noise Resistible Mutual-Training for Person Re-identification, Fang Zhao, Shengcai Liao, Guo Sen Xie, Jian Zhao, Kaihao Zhang, and Ling Shao
M2Net : Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients, Tao Zhou, Huazhu Fu, Yu Zhang, Changqing Zhang, Xiankai Lu, Jianbing Shen, and Ling Shao
Submissions from 2019
Delay and energy based message delivery in delay tolerant networks, Ali Abbas, Babar Shah, Muhammad Habib, Francis Chow, Raza Hasan, and Ki Il Kim
A Novel Deep Learning Approach for Left Ventricle Automatic Segmentation in Cardiac Cine MR, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Automatic segmentation and functional assessment of the left ventricle using u-net fully convolutional network, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Healthcare applications of intelligent information systems: A novel technique for medical image fusion, Ahed Abugabah and Ahmad Alsmadi
Data Mining in Health Care Sector: Literature Notes, Ahed Abugabah, Ahmad Al Smadi, and Alaa Abuqabbeh
Towards an end-user layer for data integrity, Lu'ay Abu-Rayyan, Hakim Hacid, and Andrew Leoncé
The effect of demand variability on supply chain performance, Suzan Alaswad, Sinan Salman, Arwa Alhashmi, Hawra Almarzooqi, and Meera Alhammadi
Blockchain in Supply Chain Trading, Nedaa Baker Al Barghuthi, Hussam Juma Mohamed, and Huwida E. Said
State of Art of the Effectiveness in Adopting Blockchain Technology-UAE Survey Study, Nedaa Baker Al Barghuthi, Cornelius Ncube, and Huwida Said
Readiness, Safety, and Privacy on Adopting Autonomous Vehicle Technology: UAE Case Study, Nedaa Baker Al Barghuthi and Huwida Said
Online peer support groups to combat digital addiction: User acceptance and rejection factors, Manal Aldhayan, Sainabou Cham, Theodoros Kostoulas, Mohamed Basel Almourad, and Raian Ali
n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems, Monther Aldwairi and Duaa Alansari
Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak
Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak
Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith
A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb
Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal
Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi
Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien
Using Data Mining Techniques to Identify Construction Claims Causes: A Case Study, Vasila Al Khaldi, Nazar Zaki, Essam Zaneldin, and Elfadil A. Mohamed
Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh
A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh
Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler
Cross-Linguistic Twitter Analysis of Discussion Themes before, during and after Ramadan, Aamna Alshehhi, Justin Thomas, Roy Welsch, and Zeyar Aung
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said
A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair
Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira
Mitigation of ground vibrations by circular arrays of rigid blocks, Lars V. Andersen, Andrew T. Peplow, and Peter Persson
A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi
A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal
Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi
A relational approach to exploring inequalities within the human resource management model in the Middle East, Safiya Banu, Nicolina Kamenou-Aigbekaen, and Laura Galloway
Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh
Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov
EDBT/ICDT Workshops - Privacy-Preserving Data Analysis Workflows for eScience., Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Privacy-preserving data analysis workflows for eScience, Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi
Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi
Testbed of QoS Ad-Hoc network designed for cooperative multi-drone tasks, Ouns Bouachir, Moayad Aloqaily, Fabien Garcia, Nicolas Larrieu, and Thierry Gayraud
Corrigendum to Norm-based and commitment-driven agentification of the Internet of Things [Internet of Things volume 6 (2019) 100042], Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Norm-based and commitment-driven agentification of the Internet of Things, Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Digital addiction: Negative life experiences and potential for technology-assisted solutions, Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, and Raian Ali
An Active Noise Correction Graph Embedding Method Based on Active Learning for Graph Noisy Data, Zhiyuan Cui, Donghai Guan, Cong Li, Weiwei Guan, and Asad Masood Khattak
Student proficiency profiles through the computing professional skills assessment, Maurice Danaher, Kevin Schoepp, Anthony Rhodes, and Tiffany Cammidge
What is Academic Writing?, Peter Davidson
Dynamic Neural Network for Business and Market Analysis, Javier de Arquer Rilo, Abir Hussain, May Al-Taei, Thar Baker, and Dhiya Al-Jumeily
Deep Learning Based Method for Computer Aided Diagnosis of Diabetic Retinopathy, Omar Dekhil, Ahmed Naglah, Mohamed Shaban, Mohammed Ghazal, Fatma Taher, and Ayman Elbaz
A Novel Fully Automated CAD System for Left Ventricle Volume Estimation, Omar Dekhil, Fatma Taher, Fahmi Khalifa, Garth Beache, Adel Elmaghraby, and Ayman El-Baz
Proof systems in blockchains: A survey, Georgios Drakopoulos, Eleanna Kafeza, and Haseena Al Katheeri
In Situ Mutation for Active Things in the IoT Context, Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami
The socio-net of things modeling framework, Amjad Fayoumi, Juliana Sutanto, and Zakaria Maamar
Human Activity Recognition Using Deep Models and Its Analysis from Domain Adaptation Perspective, Nikita Gurov, Adil Khan, Rasheed Hussain, and Asad Khattak
Drone forensics: A case study on DJI phantom 4, Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, and Aine MacDermott
Internet of Things Platform for Transparency and Traceability of Food Supply Chain, Ahmed Haroon, Mehak Basharat, Asad Masood Khattak, and Waleed Ejaz
Detection of SQL Injection Attacks: A Machine Learning Approach, Musaab Hasan, Zayed Balbahaith, and Mohammed Tarique
Smart Home Systems Security, Abir Hussain, Deimante Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily
Market basket analysis of student attendance records, Mohammed Hussain and Abdullah Hussein
Raising Children’s Cultural Awareness: A Task-Based Approach, Nadine Jaafarawi
Novel robust digital watermarking in mid-rank co-efficient based on DWT and RT transform, Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, and Babar Shah
A fog-based architecture for remote phobia treatment, Yassine Jebbar, Fatna Belqasmi, Roch Glitho, and Omar Alfandi
Psychological vulnerability as an integral component of comprehensive vulnerability assessment: Informing policy and practice in disaster risk reduction, Jigar Jogia and Gayan Wedawatta
Restriction-based fragmentation of business processes over the cloud, Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, and Thar Baker
A CAD System for the Early Prediction of Hypertension based on Changes in Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Guruprasad Giridharan, and Ayman El-Baz
Using 3-D CNNs and Local Blood Flow Information to Segment Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Ali Mahmoud, Adel Elmaghraby, and Ayman El-Baz
Memory Forensics: Recovering Chat Messages and Encryption Master Key, Abdullah Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, and Khalil Al-Hussaeni
Congestion Control in Wireless Sensor Networks based on Support Vector Machine, Grey Wolf Optimization and Differential Evolution, Hafiza Syeda Zainab Kazmi, Nadeem Javaid, Muhammad Imran, and Fatma Outay
An Application of Using Support Vector Machine Based on Classification Technique for Predicting Medical Data Sets, Mohammed Khalaf, Abir Jaafar Hussain, Omar Alfandi, Dhiya Al-Jumeily, Mohamed Alloghani, Mahmood Alsaadi, Omar A. Dawood, and Dhafar Hamed Abd
Urban sensing: Towards security efficient sensing network scheme, Salam Khanji, Mohamad Badra, Omar Alfandi, and Rouba Borghol
ZigBee Security Vulnerabilities: Exploration and Evaluating, Salam Khanji, Farkhund Iqbal, and Patrick Hung
Boosting IoT Efficiency and Security through Blockchain: Blockchain-based Car Insurance Process - A Case Study, Salam Khanji, Farkhund Iqbal, Zakaria Maamar, and Hakim Hacid
Blockchain technology as a support infrastructure in E-Government evolution at Dubai economic department, Shafaq Naheed Khan, Mohammed Shael, and Munir Majdalawieh
Smart meter security: Vulnerabilities, threat impacts, and countermeasures, Asad Masood Khattak, Salam Khanji, and Wajahat Ali Khan
Stock market trend prediction using supervised learning, Asad Masood Khattak, Habib Ullah, Hassan Ali Khalid, Ammara Habib, Muhammad Zubair Asghar, and Fazal Masud Kundi
Speculo: A tool for multiple identities exploration and detection in social networks, Sumaya Khoory, Noora Al Roken, Maryam Al Abdooli, and Hakim Hacid
Parking availability forecasting model, Mohammad Amin Kuhail, Manohar Boorlu, Neeraj Padarthi, and Collin Rottinghaus
Noise Reduction in Network Embedding, Cong Li, Donghai Guan, Zhiyuan Cui, Weiwei Yuan, Asad Masood Khattak, and Muhammad Fahim
Robot computing for music visualization, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal
Towards a music visualization on robot (MVR) prototype, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal
Cognitive Computing Meets the Internet of Things, Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami
Towards a Resource-aware Thing Composition Approach, Zakaria Maamar, Saoussen Cheikhrouhou, Muhammad Asim, Ayesha Qamar, Thar Bake, and Emir Ugljanin
Everything-as-a-Thing for Abstracting the Internet-of-Things, Zakaria Maamar, Noura Faci, Mohamed Sellami, Emir Ugljanin, and Ejub Kajan
Towards a seamless coordination of cloud and fog, Zakaria Maamar, Emir Ugljanin, Thar Baker, Mohammed Al Khafajiy, Noura Faci, and Vanilson Burégio
Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches, Aine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, and Babar Shah
Advancing digital transformation: Integrated digital transformation framework for a successful deployment, Munir Majdalawieh
A recursive co-occurrence text mining of the quran to build corpora for islamic banking business processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh
Advanced mineral carbonation: An approach to accelerate CO2 sequestration using steel production wastes and integrated fluidized bed reactor, Abdel Mohsen Onsy Mohamed, Maisa El-Gamal, and Suhaib Hameedi
Humanoid robots as teaching assistants in an arab school, Omar Mubin, Mariam Alhashmi, Rama Baroud, and Fady S. Alnajjar
Facial image pre-processing and emotion classification: A deep learning approach, Alramzana Nujum Navaz, Serhani Mohamed Adel, and Sujith Samuel Mathew
A Novel Game Theoretic Approach for Forming Coalitions between IMS Cloud Providers, Hani Nemati, May El Barachi, Nadjia Kara, and Fatna Belqasmi
Applying system dynamics to model advanced persistent threats, Mathew Nicho and Hussein Fakhry
Dimensions of 'socio' vulnerabilities of advanced persistent threats, Mathew Nicho and Christopher D. McDermott
The covcrav project: Architecture and design of a cooperative v2v crash avoidance system, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, and Ansar Yasar
V2V and V2I communications for traffic safety and CO2 emission reduction: A performance evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, and Ansar Yasar
Social networks and leadership emergence, Jin Park
Computation of axisymmetric vibration transmission using a well-conditioned system for elastic layers over a half–space, Andrew T. Peplow, Lars V. Andersen, and Peter Persson
How building adjacency affects occupant-perceivable vibrations due to urban sources: A parametric study, Peter Persson, Loukas F. Kallivokas, Lars V. Andersen, and Andrew T. Peplow
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild, Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi
Digital investigation of wireless sensor networks - IRIS mote, Argianto Rahartomo, Arne Bochem, and Omar Alfandi
Holistic User eXperience in Mobile Augmented Reality Using User eXperience Measurement Index, Fahad Ahmed Satti, Jamil Hussain, Hafiz Syed Muhammad Bilal, Wajahat Ali Khan, Asad Masood Khattak, Ju Eun Yeon, and Sungyoung Lee
Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing, Fahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, and Sungyoung Lee
Radiomic-based framework for early diagnosis of lung cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
On the Integration of CT-Derived Features for Accurate Detection of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz
A New System for Lung Cancer Diagnosis based on the Integration of Global and Local CT Features, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
A Novel CT-Based Descriptors for Precise Diagnosis of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
Higher Education 4.0: Uni for nothin’, MOOCs for free?, Ravi Sharma, Kevin Jones, Warwick Anderson, and Anushia Inthiran
Early Assessment of Acute Renal Rejection Post-transplantation: A Combined Imaging and Clinical Biomarkers Protocol, Mohamed Shehata, Fatma Taher, Mohammed Ghazal, Ali Mahmoud, Garth Beache, Mohamed Abou El-Ghar, Amy C. Dwyer, Adel Elmaghraby, and Ayman El-Baz
Smart homes as an IoT application: Predicting attitudes and behaviours, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah
The Role of Smart Homes' Attributes on Users' Acceptance, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah
Forecasting Temperature in a Smart Home with Segmented Linear Regression, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat
Whose Responsibility is it Anyway?, Kristine N. Stewart and Judith Mavodza
Faculty perception of engineering student cheating and effective measures to curb it, Sami W. Tabsh, Hany A. El Kadi, and Akmal S. Abdelfatah
A Review on the Cerebrovascular Segmentation Methods, Fatma Taher, Ali Mahmoud, Ahmed Shalaby, and Ayman El-Baz
Colorizing gray level images by using wavelet filters, F. Taher, M. Darweesh, and H. Al-Ahmad
Security in cloud computing: State-of-the-art, key features, challenges, and opportunities, Abdallah Tubaishat
Improving Complex Network Controllability via Link Prediction, Ran Wei, Weiwei Yuan, Donghai Guan, Asad Masood Khattak, and Muhammad Fahim
A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, Babar Shah, Patrick C.K. Hung, and Anna Priscilla De Albuquerque
HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, and Patrick Hung
Drone forensics: A case study on a DJI mavic air, Maryam Yousef and Farkhund Iqbal
Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination, Saniya Zafar, Sobia Jangsher, Moayad Aloqaily, Ouns Bouachir, and Jalel Ben Othman
Active Sampling Based on MMD for Model Adaptation, Qi Zhang, Donghai Guan, Weiwei Yuan, and Asad Masood Khattak
Proceedings of the Applied Linguistics and Language Teaching Conference 2018: Teaching and Learning in a Globalized World, Wafa Zoghbor, Suhair Al-Alami, and Thomaï Alexiou
Submissions from 2018
Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches, Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, and Asad Khattak
Green computing: Awareness and practices, Ahed Abugabah and Amira Abubaker
A novel framework for software defined wireless sensor networks, Khandakar Ahmed, Nazmus S. Nafi, Waleed Ejaz, Mark A. Gregory, and Asad M. Khattak
Towards Inclusive Social Networks for the Developing World, Christian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch Glitho, and Jules Degila
A Survey of Resource Management Challenges in Multi-cloud Environment: Taxonomy and Empirical Analysis, Bandar Aldawsari, Thar Baker, Muhammad Asim, Zakaria Maamar, Dhiya Al-Jumeily, and Mohammed Alkhafajiy
Characterizing realistic signature-based intrusion detection benchmarks, Monther Aldwairi, Mohammad A. Alshboul, and Asmaa Seyam
Detecting Fake News in Social Media Networks, Monther Aldwairi and Ali Alwahedi
Seamless WSN Connectivity Using Diverse Wireless Links, Omar Alfandi, Jagadeesha Rb, and John Beachboard
Large scale image dataset construction using distributed crawling with hadoop YARN, Rahman Ali, Asmat Ali, Asad Masood Khatak, and Muhammad Saqlain Aslam
A case-based meta-learning and reasoning framework for classifiers selection, Rahman Ali, Aasad Masood Khatak, Francis Chow, and Sungyoung Lee
Malware detection using DNS records and domain name features, Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, and Fatna Belqasmi
Analyzing the Behavior of Autistic and Normal Developing Children Using Eye Tracking Data, Mohamed Basel Almourad, Emad Bataineh, Joana Stocker, and Farhi Marir
Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics, Feras Al-Obeidat, Eleanna Kafeza, and Bruce Spencer
Detecting Malware Domains: A Cyber-Threat Alarm System, Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, and Monther Aldwairi
Penetration and security of openssh remote secure shell service on raspberry Pi 2, Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor Albuainain, and Maktoom Alkubaisi
Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation, Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, and Omar Alfandi
Intelligent information systems and image processing: A novel pan-sharpening technique based on Multiscale decomposition, Ahmad Al Smadi and Ahed Abugabah
E-Healthcare Knowledge Creation Platform Using Action Research, May Al Taei, Eleanna Kafeza, and Omar Alfandi
Just-in-time Customer Churn Prediction: With and Without Data Transformation, Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood Ur Rahman Durani, and Sajid Anwar
Configurable data acquisition for cloud-centric IoT, Muhammad Bilal Amin, Muhammad Sadiq, Wajahat Ali Khan, Asad Masood Khattak, Usman Akhtar, and Sungyoung Lee
Impact of document representation on neural ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat
Highlighting the Future of Autonomous Vehicle Technology in 2020-2050, Nedaa Baker Al Barghuthi, Deepa Pavithran, and Huwida E. Said
Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, Alagan Anpalagan, and Omar Alfandi
An understanding of consumption trends of smart phones on university campus: A comparison study, Emad Bataineh and Sara Alamodi
Visual attention toward socially rich context information for autism spectrum disorder (ASD) and normal developing children: An eye tracking study, Emad Bataineh, Mohamed Basel Almourad, Farhi Marir, and Joana Stocker
Usability analysis on Dubai e-government portal using eye tracking methodology, Emad Bataineh, Basel Al Mourad, and Fazouzi Kammoun
Multi-classifier system for authorship verification task using word embeddings, Nacer Eddine Benzebouchi, Nabiha Azizi, Monther Aldwairi, and Nadir Farah
Drone Forensics: Challenges and New Insights, Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, and Andrew Marrington
News, Fake News, and Critical Authority, John M. Budd and Kristine N. Stewart
Estimating meteorological visibility range under foggy weather conditions: A deep learning approach, Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, and Ansar Ul Haque Yasar
Formal specification and verification of cloud resource allocation using timed petri-nets, Saoussen Cheikhrouhou, Nesrine Chabouh, Slim Kallel, and Zakaria Maamar
A novel feature selection-based sequential ensemble learning method for class noise detection in high-dimensional data, Kai Chen, Donghai Guan, Weiwei Yuan, Bohan Li, Asad Masood Khattak, and Omar Alfandi
Empowering Graduates for Knowledge Economies in Developing Countries, Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, and Julie Bauld Wallace
Impact of credibility on opinion analysis in social media, Fatima Zohra Ennaji, Lobna Azaza, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane
Stopword detection for streaming content, Hossein Fani, Masoud Bashari, Fattane Zarrinkalam, Ebrahim Bagheri, and Feras Al-Obeidat
Rumor Detection in Business Reviews Using Supervised Machine Learning, Ammara Habib, Saima Akbar, Muhammad Zubair Asghar, Asad Masood Khattak, Rahman Ali, and Ulfat Batool
Analysis of symbolic models of biometric data and their use for action and user identification, James Alexander Hughes, Joseph Alexander Brown, Adil Mehmood Khan, Asad Masood Khattak, and Mark Daley
Remote Data Acquisition Using Raspberry Pi3, Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, and Omar Alfandi
Cloud Digital Forensics Evaluation and Crimes Detection, Raja Jabir and Omar Alfandi
Malware Classification with Deep Convolutional Neural Networks, Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D.B. Bruce, Yang Wang, and Farkhund Iqbal
Impact of IoT device saturation on home WiFi networks, Dylan Kauling, May AlTaei, and Qusay H. Mahmoud
An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Ki Il Kim, and Babar Shah
Mobility and Temperature Aware QoS Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim
Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions, Alavi Kunhu, Hussain Al-Ahmad, and Fatma Taher
Thing federation as a service: Foundations and demonstration, Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, and Hasna El Alaoui El Abdallaoui
How to agentify the Internet-of-Things?, Zakaria Maamar, Noura Faci, Khouloud Boukadi, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Rafael Angarita
Storytelling integration of the internet of things into business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, Emir Ugljanin, and Quan Z. Sheng
Toward a reliable service-based approach to software application development, Qusay Mahmoud, Ian Andrusiak, and May AlTaei
Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and Hadith, Munir Majdalawieh, Farhi Marir, and Issam Tiemsani
Higher education analytics: New trends in program assessments, Adam Marks and Maytha AL-Ali
An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches, Shaikha Saleh Mohamed, Nedaa Baker Al Barghuthi, and Huwida Said
A process model for implementing information systems security governance, Mathew Nicho
When spear phishers craft contextually convincing emails, Mathew Nicho, Hussein Fakhry, and Uche Egbue
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane, Mathew Nicho and Shafaq Naheed Khan
Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun
Computation of a well-conditioned dynamic stiffness matrix for elastic layers overlying a half-space, Andrew T. Peplow
The best-of-n problem with dynamic site qualities: Achieving adaptability with stubborn individuals, Judhi Prasetyo, Giulia De Masi, Pallavi Ranjan, and Eliseo Ferrante
Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi
Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung
The X-supply game, Sinan Salman and Suzan Alaswad
Developing Information Literacy in Interdisciplinary Classrooms: Engaging with Diverse Literacies, Kristen M. Schuster and Kristine N. Stewart
Developing Information Literacy in Interdisciplinary Classrooms: Engaging with Diverse Literacies, Kristen M. Schuster and Kristine N. Stewart
Librarians participating in service learning at federal universities in the United Arab Emirates, Mary Sengati-Zimba and Judith Mavodza
A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz
Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi
Bayesian network model for temperature forecasting in Dubai, L. Smail
Junction trees construction: Application to Bayesian networks, L. Smail
A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat
Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane
Adoption Challenges of the Internet of Things: ASurvey, Abdallah Tubaishat and Suhail Paliath
Initiating and tracking social actions to adapt and improve smart city's business processes, Emir Ugljanin, Dragan H. Stojanović, Ejub Kajan, and Zakaria Maamar
Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow
Information literacy outside the classroom, Melanie Wood
Application of fuzzy logic to assess the quality of BPMN models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben-Abdallah, and Zakaria Maamar
An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi
Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak
Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Submissions from 2017
Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah