Submissions from 2024
Advancements in Microwave Technology for Congestive Heart Failure Diagnosis, M. Abdel-Aleim, Moath Alathbah, Fatma Taher, Mohamed Fathy Abo Sree, Thamer Alghamdi, and Sara Yehia Elshatlawy
Advancements in Microwave Technology for Brain Diagnosis: A Comprehensive Survey on Neurodegenerative Diseases, Tumors, and Stroke Detection, M. Abdel-Aleim, Ahmed F. Miligy, Fatma Taher, Mohamed Fathy Abo Sree, Assem H. Elfeky, and Sara Yehia Abdel Fatah
The Effects of Social Media on Self-Esteem, Alyazia Al Ahbabi, Alyazia Al Teneiji, Amira Al Shaer, Ghaya Al Jaberi, and Areej ElSayary
The Effect of Social Media on Anxiety and Stress, Alyazia AlAhbabi, Alyazia AlTeneiji, Amira AlShaer, Ghaya AlJaberi, and Areej ElSayary
One-Year-Ahead Neural Network-Based HVAC Electricity Consumption Optimization: The Influence of Occupancy Schedules, Maher Alaraj, Marianela Parodi, Mohammed Radi, Maysam F. Abbod, and Munir Majdalawieh
Smartphone Forensics: A Comparative Study of Common Mobile Phone Models, Abduljalil Alblooshi, Naser Aljneibi, Farkhund Iqbal, Richard Ikuesan, Mohamad Badra, and Zainab Khalid
Unlocking Transparency in Credit Scoring: Leveraging XGBoost with XAI for Informed Business Decision-Making, Maryam Alblooshi, Hessa Alhajeri, Meera Almatrooshi, and Maher Alaraj
Ensemble-based Cyber Intrusion Detection for Robust Smart City Protection, Alaa Alhowaide, Izzat Alsmadi, and Belal Alsinglawi
Classification of Phishing Webpages using Supervised Machine Learning Algorithms, Sameera Alkatheeri, Najla Alhajeri, Reem Alhashmi, and Sanaa Kaddoura
A Comparative Study of Machine Learning Models for Classification and Detection of Cybersecurity Threat in Hacking Forum, Shahad Alketbi, Maitha BinAmro, Aryaam Alhammadi, and Sanaa Kaddoura
Metaverse-Based Classroom: The Good and the Bad, Mousa Al-Kfairy, Maryam Alzaabi, Banan Snoh, Hamda Almarzooqi, and Wadha Alnaqbi
“V – Renter”: An AI-Driven C2C Platform for Renting Vehicles in the UAE, Lamya Almansoori, Hanan Albreiki, Shama Almehairi, and Ahmed Shuhaiber
A Federated MRI and ML Approach for Precision Healthcare Detection, Noof Almarar and Safa Otoum
‘FlyMe’ App: Shaping Stress-Free Travel Through Advanced Smart Alert Solution, Hamdah Almenhali, Khawla Ahmed, Maryam Nagi, Ahmed Shuhaiber, and Mohammad Tubishat
Towards a Deeper Understanding of Social Media Behavior: Patterns and Trends, Mohamed Basel Almourad, Mohammed Hussein, Emad Bataineh, and Zelal Wattar
Using AI to Detect Android Malware Families, Saed Alrabaee, Mousa Al-Kfairy, Mohammad Bany Taha, Omar Alfandi, Fatma Taher, and Ahmed Hashem El Fiky
Artificial Intelligence for Real-Time Disaster Management: A New Platform for Efficient Recovery and Volunteer Training, Murad Al-Rajab, Mahmoud Ahmed Soliman, Mohammed Nezam Al'asad, Yaqoob Arshad Jamil, Samia Loucif, and Ibrahim Al Qatawneh
A Comparative Review and Recommendations on Database Recovery Techniques, Maitha Alremeithi, Hamda Altamimi, Alaa Alshehhi, and Asad Khattak
Smart Schools – IoT for Student's Well-being, Maitha AlShamsi, Azza Alhouqani, and Fatna Belqasmi
Machine Learning-Based Classification Approach for Network Intrusion Detection System, Fatima Alshuaibi, Fatema Alshamsi, Amal Saeed, and Sanaa Kaddoura
Futuristic Blockchain Based Computer Vision Technique for Environmentally Informed Smoking Cessation: A Revolutionary Approach to Predictive Modeling, Usama Arshad, Sajid Anwar, Babar Shah, and Zahid Halim
A Neuroimaging ML-Based Framework for Anosmia Grading in Covid-19, Hossam Magdy Balaha, Mayada Elgendy, Ahmed Alksas, Mohamed Shehata, Norah Saleh Alghamdi, Fatma Taher, Mohammed Ghazal, Mahitab Ghoneim, Eslam Hamed, Fatma Sherif, Ahmed Elgarayhi, Mohammed Sallah, Mohamed Abdelbadie Salem, Elsharawy Kamal, Harpal Sandhu, and Ayman El-Baz
A Neuroimaging Yolov8-Based Cad Framework for Anosmia Grading in Covid-19, Hossam Magdy Balaha, Mayada Elgendy, Ahmed Alksas, Mohamed Shehata, Norah Saleh Alghamdi, Fatma Taher, Mohammed Ghazal, Mahitab Ghoneim, Eslam Hamed, Fatma Sherif, Ahmed Elgarayhi, Mohammed Sallah, Mohamed Abdelbadie Salem, Elsharawy Kamal, Harpal Sandhu, and Ayman El-Baz
Efficient Offloading in UAV-MEC IoT Networks: Leveraging Digital Twins and Energy Harvesting, Mehak Basharat, Muhammad Naeem, Asad M. Khattak, and Alagan Anpalagan
Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux, Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rutschle, and Abdelmalek Benzekri
Negative Effects on Productivity and Life Satisfaction Through Social Media, Abdulla Binsafwan, Zayed AlHameli, and Areej ElSayary
Authenticating HTTPS Connection without Relying on Certification Authorities, Sifan Waktole Dadi, Ahmad Samer Wazan, and Imran Taj
Building a Unified Healthcare Data System for the UAE: A Revolution in Data Management and Patient Care, Nadia Dahmani, Mayadah Al-Rabadi, Maitha Alhosani, Sara Bhrouz, and Naouf Almahri
Innovative Quadcopter Fabrication Techniques and Versatile Applications: Unlocking Boundless Possibilities, Khaled Abdo El-Alfy, Moath Alathbah, Fatma Taher, Thamer Alghamdi, and Mohamed Fathy Abo Sree
Innovative Pedagogy: A Case Study of Incidental and Context-Based Learning, Maisa El Gamal and Vasila Alkhaldi
Integrating Generative AI in Active Learning Environments: Enhancing Metacognition and Technological Skills, Areej ElSayary
The Relationship Between Personality Traits and Sustaining Young People's Well-Being: A Comprehensive Literature Review, Areej ElSayary, Maitha Aljneibi, and Reem Abuali
Navigating Digital Identities: The Influence of Online Interactions on Youth Cyber Psychology and Cyber Behavior, Areej ElSayary, Rafeeah Abdulaziz Alzaffin, and Maryam Eisa Alsuwaidi
Analysis of Version Number Attack using Multiple RPL Instances, Tawbah Ennab, Yaser Khamayseh, Wail Mardini, Yu Shen, and Burak Kantarci
Advancements in Underground Object Detection: Exploring Emerging Techniques and Technologies, Sara Yehia Abdel Fatah, Fatma Taher, Mohamed Khaled Gad Attya, Karim Ahmed Hosni, Moath Alathbah, Thamer Alghamdi, Mohamed Fathy Abo Sree, and M. Abdel-Aleim M.
Smart Shopping Application: Indoor Navigation System for Shops, Fithi Fessehatsion Ghebreamlak, Merry Zeray Semereab, Saron Bokretsion Ghebremichael, and Ahed Abugabah
Enhancing parking efficiency: An innovative vehicle scheduling algorithm, Noman Gul, Asad Masood Khattak, Muhammad Imran Taj, Nagarajan Chandrashekaran, Bashir Hayat, and Awais Ahmad
On Digital Art Generation Using Generative Adversarial Networks, Kadhim Hayawi, Sakib Shahriar, and Hakim Hacid
Security Awareness and Forensic Investigation of Junior Zenbo Robot, Ala Abu Hilal, Tariq Abu Hilal, and Hasan Abu Hilal
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics, Richard Ikuesan, Farkhund Iqbal, and Abdul Kadhim Hayawi
Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo Robot, Farkhund Iqbal, Abdullah Kazim, Aine MacDermott, Richard Ikuesan, Musaab Hasan, and Andrew Marrington
Assessing the Impact of Virtual Reality on Enhancing Consumer Satisfaction in the Context of Streaming Services: The Case of Netflix, Heba Ismail, Hala Joudeh, Hala Hamadeh, Heba El Zaher, and Ashraf Khalil
Violent Behavior Detection in Surveillance Videos Using MoSIFT and SVM, Zahoor Jan, Babar Shah, Mohsin Khan, Mansoor Nasir, and Faryal Tahir
Graph Neural Networks in PyTorch for Link Prediction in Industry 4.0 Process Graphs, Eleanna Kafeza, Georgios Drakpopoulos, and Phivos Mylonas
Proposing an Effective Deep Learning Model for Vitamin D Deficiency Diagnosis, Asad Khattak, Junaid Asghar, Naila Tabassum, Hayat Ullah, Aurangzeb Khan, and Zubair Asghar
Boruta-AttLSTM: A Novel Deep Learning Architecture for Soil Moisture Prediction, Bamory Ahmed Toru Koné, Bassem Bouaziz, Rima Grati, and Khouloud Boukadi
Sentiment Analysis of Hacker Forums with Deep Learning to Predict Potential Cyberattacks, Bulcha Mardassa, Ashenafi Beza, Abdullah Al Madhan, and Monther Aldwairi
Personal Cybersecurity Tracker, Bulcha Mardassa, Ashenafi Beza, Akewak Kebede, and Fatna Belqasmi
A Novel Health Care System for Improving Dermatological Diagnosis: A Model for Skin Lesion Classification, Atif Mehmood, Ahed Abugabah, and Farah Shahid
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates, David A.Cordova Morales, Ahmad Samer Wazan, David W. Chadwick, Romain Laborde, April Rains Reyes Maramara, and Kalil Cabral
The era of Generative AI: Transforming Academic Libraries, Education, and Research, Nikesh Narayanan
Deep Learning for Enhancing Diabetes Prediction, Uzma Naz, Ashraf Khalil, Asad Khattak, Muhammad Ali Raza, Junaid Asghar, and Muhammad Zubair Asghar
Exploring the Efficacy of ChatGPT in Adapting Reading Materials for Undergraduate Students, Larysa Nikolayeva
GaLaPaGoS: A Design Pattern for Sustainability of ICT Interactive Software and Services, Shola Oyedeji, Mikhail O. Adisa, Ahmed Seffah, Felipe Leon Coello, and Bilal Naqvi
Evaluating the Efficacy of Large Language Models in Identifying Phishing Attempts, Het Patel, Umair Rehman, and Farkhund Iqbal
Surrounded Serenity, Malak Quota
Global Knowledge, Local Impact: Domain Adaptation and Classification for Obesity in the UAE, Mohsin Raza, Asad Khattak, Wasim Abbas, and Adil Khan
Efficient Diagnoses of Breast Cancer Disease Using Deep Learning Technique, Muhammad Ali Raza, Asad Masood Khattak, Wasim Abbas, and Muhammad Zubair Asghar
HybridCRS-TMS: Integrating Collaborative Recommender System and TOPSIS for Optimal Transport Mode Selection, Mouna Rekik, Rima Grati, Ichrak Benmohamed, and Khouloud Boukadi
Predicting Song Popularity Through Machine Learning and Sentiment Analysis on Social Networks, Gerasimos Rompolas, Athanasios Smpoukis, Eleanna Kafeza, and Christos Makris
Sustainable Industrial Agriculture in the UAE: Leveraging IoT and AI Technologies, Reem Salem, Buthaina Aidaros, and Fatna Belqasmi
A Novel Approach for 3D Renal Segmentation Using a Modified GAN Model and Texture Analysis, Israa Sharaby, Ahmed Alksas, Hossam Magdy Balaha, Ali Mahmoud, Mohammed Badawy, Mohamed Abou El-Ghar, Ashraf Khalil, Mohammed Ghazal, Sohail Contractor, and Ayman El-Baz
A Multi-Layered Trust Model in the Internet of Things Smart Home Ecosystem, Ahmed Shuhaiber and Ibrahim Mashal
A Framework to Prevent Cybercrime in the UAE, Abdallah Tubaishat and Humaid Alaleeli
Unveiling Challenges and Solutions with Intelligence in the Dark and Deep Web, Abdallah Tubaishat, Mariam Aljouhi, and April Maramara
Security Issues in the Deep and Dark Web: What to know?, Abdallah Tubaishat and April Rains Maramara
An Improved Golden Jackal Optimization Based on New Local Search Operator for Global Optimization: Invited Paper, Mohammad Tubishat, Mustafa Rawshdeh, and Shahed Obeidat
Effectiveness of Internal Evaluation Metrics for Community Detection Based on Clustering, Muhammad Wasim, Ubaid Ullah, Feras Al-Obeidat, Adnan Amin, and Fernando Moreira
Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI, Ahmad Samer Wazan, Romain Laborde, Abdelmalek Benzekri, and Imran Taj
Blockchain-enabled Energy Trading and Battery-based Sharing in Microgrids, Abdulrezzak Zekiye, Ouns Bouachir, Oznur Ozkasap, and Moayad Aloqaily
Submissions from 2023
Towards Boosting Federated Learning Convergence: A Computation Offloading & Clustering Approach, Sawsan AbdulRahman, Ouns Bouachir, Safa Otoum, and Azzam Mourad
Clinical Informatics System to Understand Lung Cancer Using Transfer Learning-Based Computer-Aided Application, Ahed Abugabah, Atif Mehmood, and Farah Shahid
Smart Health Care Management System for Diagnosis of Lungs Cancer, Ahed Abugabah, Farah Shahid, Amjad Alafeef, and Rizwan Khan
Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation, Remilekun Adeopatoye, Richard Adeyemi Ikuesan, Taurai Hungwe, Victor Kebande, and Mehdi Sookhak
Asma’ak: An Emarati Sign Language Translator, Maha Ahmed, Shaikha Jasem, Khawla Saleh, Asad Khattak, and Omar Alfandi
Exploring Sentiment and Topic Patterns in Metaverse Marketplace-Related Tweets, Ahmed Al-Adaileh, Mousa Al-Kfairy, Mahmoud Khasawneh, and Nabil El Moutawakil El Alami
Predicting heart disease risk in patients using various kinds of analytical models, Fatma Mohamed Al-Ali, Feras Al-Obeidat, and Hanan Saleh Al-Messabi
Decentralized Road Conditions Assessment for Smart Mobility Management in Abu Dhabi, A. Albasir and J. Ben-Othman
DocCert: Nostrification, Document Verification and Authenticity Blockchain Solution, Monther Aldwairi, Mohamad Badra, and Rouba Borghol
Towards an Infrastructure and Architecture of Nanotechnology in Agriculture for Abu Dhabi, Salama Alhameli, Amna Almazrouei, Amal Almenhali, and Ahmed Shuhaiber
Effective Task Scheduling in Critical Fog Applications Using Critical Task Indexing Scheduler (CTIS), Ammad Ali, Imran Taj, Asad Khattak, Bashir Hayat, Noman Gul, and Muhammad Ali
Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks, Jamal N. Al-Karaki, Amjad Gawanmeh, and Claude Fachkha
Immersive Cybersecurity Teaching/Training Using Gamification on the Metaverse: A Hands-On Case Study*, Jamal N. Al-Karaki, Awni Itradat, and Selam Mekonen
Advancing CyberSecurity Education and Training: Practical Case Study of Running Capture the Flag (CTF) on the Metaverse vs. Physical Settings, Jamal N. Al-Karaki, Marwan Omar, Amjad Gawanmeh, and Angel Jones
A Sentiment Analysis Approach for Identifying Users' Security and Privacy Perception of Metaverse In Twitter, Mousa Al-Kfairy, Ahmed Al-Adaileh, Mohammad Tubishat, Omar Alfandi, Maitha Binamro, and Ayham Alomari
A Review of the Factors Influencing Users' Perception of Metaverse Security and Trust, Mousa Al-kfairy, Ayham Alomari, Mahmood Al-Bashayreh, Omar Alfandi, May Altaee, and Mohammad Tubishat
IoT-Based Surveillance Camera Distribution Using Triangle Geometry, Islam T. Almalkawi, Loiy Al-Abed, Jamal N. Al-Karaki, and Manel Guerrero Zapata
'Robpha': A Robotic-Based Pharmacy for a Smart Hospital, Lamya Almansoori, Fatima Almusabi, Meera Alharbi, Ahmed Shuhaiber, and Mohammad Tubishat
Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM, Omar Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, Majed Almehrzi, and Ahmed Alshamsi
‘My Household’ Application: A Smart Mobile Application for Household Management, Hamda Almenhali, Meera Almansoori, Noura Alhamed, and Ahmed Shuhaiber
Review of Fundamental, Security, and Privacy in Metaverse, Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Hussam Al Hamadi, Fatma Taher, and Taher M. Ghazal
An Intelligent Application of Real Time Speed Estimation: An Enhanced Detection and Tracking Approach Towards Vehicle Speed Estimation, Ala Alsanabani, Ahed Abugabah, and Licheng Jiao
Smart Application for Real Time Detection: An Improved Lightweight Detector for Real-Time Vehicle Detection, Ala Alsanabani, Ahed Abugabah, and Licheng Jiao
Towards an approach for weaving Open Digital Rights Language into Role-Based Access Control, Aisha Saif Alshamsi, Zakaria Maamar, and Mohammad-Amin Kuhail
'AI-Teacher' Assistant System: A Smart Attendance and Participation tracking system for students, Mouza Alzaabi, Mahra Almeheiri, Shuaa Alqubaisi, and Ahmed Shuhaiber
Towards Privacy-Aware Federated Learning for User-Sensitive Data, Muhammad Asad and Safa Otoum
Edge Computing for the Metaverse: Balancing Security and Privacy Concerns, Muhammad Asad, Safa Otoum, and Omar Al Fandi
BOLT: A Bayesian Online Learning Framework for Time Sensitive Networks in Metaverse, Venkatraman Balasubramanian, Ouns Bouachir, and Ala'a Al-Habashnat
Analytical Study for Vehicle Mobility Modeling, J. Ben-Othman and L. Mokdad
Implementing the Principle of Least Privilege Using Linux Capabilities: Challenges and Perspectives, Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, and Abdelmalek Benzekri
Deep Neural Networks Based Multiclass Animal Detection and Classification in Drone Imagery, Changrong Chen, E. A. Edirisinghe, Andrew Leonce, Gregory Simkins, Tamer Khafaga, Moayyed Sher Shah, and Umar Yahya
MELoNS - A Modular and Extendable Simulator for LoRaWAN Network, Mi Chen, Lynda Mokdad, and Jalel Ben Othman
Robustness and Resilience of LoRaWAN Facing Greedy Behaviors on the MAC Layer, Mi Chen, Lynda Mokdad, and Jalel Ben Othman
Applying Neutralisation Theory to Better Understand Ransomware Offenders, Lena Connolly, Hervé Borrion, Budi Arief, and Sanna Kaddoura
The Positive Social Psychology Intervention of Using Design Thinking to Improve Learners' Wellbeing in Interdisciplinary Courses, Areej ElSayary
Design of Compact Flexible UWB Antenna Using Different Substrate Materials for WBAN Applications, Sara Yehia Abdel Fatah, Fatma Taher, Taha A. Elwi, Mohamed Fathy Abo Sree, Mohammad Alibakhshikenari, Bal S. Virdee, Patrizia Livreri, Naser Ojaroudi Parchin, Chan Hwang See, Giovanni Pau, Iyad Dayoub, and Ernesto Limiti
Flexible Antenna Design for Wearable Telemedicine Applications, Sara Yehia Abdel Fatah, Fatma Taher, Taha A. Elwi, Mohamed Fathy Abo Sree, Mohammad Alibakhshikenart, Bal S. Virdee, Patrizia Livreri, Naser Ojaroudi Patchin, Chan Hwang See, Giovanni Pau, Iyad Dayoub, and Ernesto Limiti
Design and Fabrication a W-Shape Form Dual-Band Flexible Antenna For Biomedical Applications, Sara Yehia Abdel Fatah, Fatma Taher, Mohammad T. Haweel, Hussam Al Hamadi, Khaled Hassan Mohamadien, and Mohamed Fathy Abo Sree
Towards a Novel Approach for Smart Agriculture Predictability, Rima Grati, Myriam Aloulou, and Khouloud Boukadi
Message from AICCSA'2022 Program Chairs, Rima Grati and Cihan Tunc
Provenance-based smart parking system with multilevel fog nodes, Noman Gul, Asad Masood Khattak, Muhammad Ali, Bashir Hayat, Awais Ahmad, and Wasim Abbas
Simulating Vehicular Mobility: A Comprehensive Framework Using MATLAB SimEvents, H. A. Hachemane and J. Ben-Othman
Addressing the Public Health Misinformation Challenge with Real-Time Data Fusion, Anoud Bani Hani, Haleama Alsabbah, Munir Majdalawieh, and Nawel Bessadet
Leveraging Nucleotide Dependencies for Improved mRNA Vaccine Degradation Prediction, Kadhim Hayawi, Sakib Shahriar, and Hany Alashwal
Modeling and Evaluation of the Internet of Things Communication Protocols in Security Constrained Systems, Colton Helbig, Safa Otoum, and Yaser Jararweh
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio, Farkhund Iqbal, Ahmad Abbasi, Abdul Rehman Javed, Gautam Srivastava, Zunera Jalil, and Thippa Reddy Gadekallu
Broadband MIMO Antenna with Self-Complementary Resonating Structures for 5G Smartphones, Tanvir Islam, Fatma Taher, Naser Ojaroudi Parchin, Ahmed S. I. Amar, and Mohamed Fathy Abo Sree
Efficient Diagnosis of Liver Disease using Deep Learning Technique, Nosheen Jillani, Asad Masood Khattak, Muhammad Zubair Asghar, and Hayyat Ullah
Deep Reinforcement Learning-Based Energy Efficiency Optimization for Flying LoRa Gateways, Mohammed Jouhari, Khalil Ibrahimi, Jalel Ben Othman, and El Mehdi Amhoud
Swift Search An open-source search engine, Fenil Kaneria, Shafaq Khan, and Nishara Nizamuddin
Automated Tool for NoSQL to SQL Migration, Shafaq Khan, Ajish Kalia, Haleh Mehdipour Dastjerdi, and Nishara Nizamuddin
Computerized Irrigation Scheduling, Bamory Ahmed Toru Koné, Rima Grati, Bassem Bouaziz, and Khouloud Boukadi
Explainable Machine Learning for Evapotranspiration Prediction, Bamory Koné, Rima Grati, Bassem Bouaziz, and Khouloud Boukadi
DDoS Attack Detection in Edge-IIoT using Ensemble Learning, Fariba Laiq, Feras Al-Obeidat, Adnan Amin, and Fernando Moreira
A Complete Transmitted Message in DTNs with a Stable Coalition in Dynamic Structures, Y. Larabi, K. Ibrahimi, J. Ben-Othman, and E. Amhoud
Global Differential Privacy for Distributed Metaverse Healthcare Systems, Mehdi Letafati and Safa Otoum
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks, Nisha Thorakkattu Madathil, Saed Alrabaee, Mousa Al-kfairy, Rafat Damseh, and Abdelkader N Belkacem
Building Trust in Supply Chains: The Blockchain-QR Code Advantage, Munir Majdalawieh
A Cloud-Native Knowledge Management Framework for Patient-Generated Health Data, Munir Majdalawieh, Anoud Bani Hani, Haleama Al-Sabbah, Oluwasegun Adedugbe, and Elhadj Benkhelifa
Semantic Knowledge Graphs for Scalable Knowledge Discovery and Acquisition in Public Health, Munir Majdalawieh, Haleama Al Sabbah, Anoud Bani Hani, Oluwasegun Adedugbe, and Elhadj Benkhelifa
Clinical Informatics System to Understand Lung Cancer Using Transfer Learning-Based Computer Aided Application-I, Atif Mehmood, Ahed Abugabah, and Farah Shahid
Optimizing Traffic Flow with Policy Iteration Method: A Study on 9-Intersection Network Management, A. Merbah and J. Ben-Othman
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device, Mathew Nicho and Ibrahim Sabry
The Impact of Big Data Analytics on the E-Commerce Businesses, Riham Mahmoud Saad, Munir Majdalawieh, Maher AlARaj, and Harry J Foxwell
FedVANET-TP: Federated Trajectory Prediction Model for VANETs, T. M. Sakho and J. Ben Othman
Analysis of the Chemical Reaction Optimization Algorithm, Sinan Salman
Instashoppers Users’ Concerns in UAE: Trust and Security Issues, Obsa Sandaba and Mousa Al-Kfairy
Exploring Immersive Learning in the Metaverse: A Prototype for Interactive Virtual Classroom, Shoug Al Seiari, Hessa Al Kaabi, and Jamal N. Al-Karaki
Blockchain-enabled Platform for a Meta Customer Loyalty Program, Aijaz A. Shaikh, Nadia Dahmani, Sana Khan, and Ravishankar Sharma
An AI-Based CAP Framework for Wilms’ Tumor Preoperative Chemotherapy Susceptibility, I. Sharaby, A. Alksas, A. Nashat, H. M. Balaha, M. Shehata, M. Gayhart, A. Mahmoud, M. Ghazal, A. Khalil, R. T. Abouelkheir, A. Elmahdy, A. Abdelhalim, A. Mosbah, and A. El-Baz
On the Feasibility of Zero-Trust Architecture in Assuring Security in Metaverse, Fatema Al Shehhi and Safa Otoum
A Best Practice Model of CDIO Implementation in IT Classrooms: Gamification Crowdsourcing Approach, Ahmed Shuhaiber and Monther Aldwairi
The Development of Smart E-Portfolio Generator System for University students: An SDLC Approach, Ahmed Shuhaiber, Aysha Alkuwaiti, Mera Alremeithi, and Hamda Almenhali
A Smart Desk: A Smart Solution for Young Students, Ahmed Shuhaiber, Rund Hiyasat, Amjad Abuelsamen, Nasreen Ghanem, Mouza Alhammadi, and Alreem Alghafri
Breaking Boundaries: Exploring Blockchain's Impact on UAE Organizations, Ahmed Shuhaiber, Nishara Nizamuddin, and Amal Amer
Robust Intelligent System for COVID-19 Detection using CT-Scan, Ahmad Al Smadi, Ahed Abugabah, and Ahmad Mohammad Al-smadi
Variable elimination algorithm in Bayesian networks: An updated version, Linda Smail
Performance Evaluation of SDN-WISE in Mobile Wireless Sensors Networks, Amine Tcherak, Mohamed Ould Khaoua, and Samia Loucif
On Efficient Routing for SDN-Based Wireless Sensor Networks, Amine Tcherak, Samia Loucif, and Mohamed Ould Khaoua
On the Viability of Federated Deep Autoencoder for Botnet Threat Detection, Belsabel Teklemariam, Saron Bokretsion, Safa Otoum, and Bassem Ouni
Phishing Detection Using Deep Learning and Machine Learning Algorithms: Comparative Analysis, Betiel Tesfom, Feven Belay, Snit Daniel, Reem Salem, and Safa Otoum
Incorporating Feature Penalty in Reinforcement Learning for Ludo Game, A. Tubaishat, S. Anwar, F. Al-Obeidat, B. Shah, and S. Razzaq
Quran Wordnet: A Framework for Semantic and Sentiment Search, Abdallah Tubaishat, Saad Razzaq, Fahad Maqbool, Muhammad Ilyas, and Muhammad Shahrose Khan
Message from AICCSA'2022 General Chairs, Genoveva Vargas-Solar and Zakaria Maamar
Ghaf Tree Detection from Unmanned Aerial Vehicle Imagery Using Convolutional Neural Networks, Guoxu Wang, Andrew Leonce, E. A. Edirisinghe, Tamer Khafaga, Gregory Simkins, Umar Yahya, and Moayyed Sher Shah
Deep Neural Network Based Automatic Litter Detection in Desert Areas Using Unmanned Aerial Vehicle Imagery, Guoxu Wang, Andrew Leonce, Hakim Hacid, and E. A. Edirisinghe
Submissions from 2022
Evaluating Web Search Engines’ Results for Personalization and User Tracking, Shamma AalGhardaqa, Tasnim Said, Amal Abdulrahman, Arsiema Yohannes, and Monther Aldwairi
A Brief Comparison of K-means and Agglomerative Hierarchical Clustering Algorithms on Small Datasets, Hassan I. Abdalla
Towards Highly-Efficient k-Nearest Neighbor Algorithm for Big Data Classification, Hassan I. Abdalla and Ali A. Amer
A machine learning-based approach for smart agriculture via stacking-based ensemble learning and feature selection methods, Emna Ben Abdallah, Rima Grati, and Khouloud Boukadi
A Deep Learning Approach for Real-time Detection of Epileptic Seizures using EEG, Kiyan Afsari, May El Barachi, Stefano Fasciani, and Fatna Belqasmi
Towards a global C2C Crowdsourcing Smart Shopper System: An SDLC Development Approach, Alyazia Albreiki, Ayesha Almemari, and Ahmed Shuhaiber
What’s in my Fridge?, Salama Alfzari, Alqahtani Nowaier, and Ahmed Shuhaiber
Motivation and Hurdles for the Student Adoption of Metaverse-based Classroom: A Qualitative Study, Mousa Al-Kfairy, Omar Al-Fandi, Mewael Alema, and May Altaee
Conceptualising the Role of the UAE Innovation Strategy in University-Industry knowledge Diffusion Process, Mousa Al-Kfairy, Munir Majdalawieh, and Saed Alrabaee
The intercorrelations among risk factors and trust dimensions in S-commerce: An empirical investigation from the user experience, Mousa Al-kfairy and Ahmed Shuhaiber
The Impact of Personal Lifestyle and Personal Innovativeness on Insta Shopping Purchase Intention, Mousa Al-Kfairy, Ahmed Shuhaiber, and Mewael Alema Hailu
Sustainable Concrete Using Industrial By-product Waste, Vasila Alkhaldi, Abdel-Hamid I. Mourad, and Maisa El Gamal
Detecting Malicious Domains Using Statistical Internationalized Domain Name Features in Top Level Domains, Alshaima Almarzooqi, Jawahir Mahmoud, Bayena Alzaabi, Arsiema Ghebremichael, and Monther Aldwairi
Do Autistic and Normal Developing Children Behave Differently When They are Presented with Sad Face Emotion, Mohamed Basel Almourad, Emad Bataineh, and Zelal Wattar
Dynamic Facial Recognition in Autism: The Case of Happy Face Expression, Mohamed Basel Almourad, Emad Bataineh, and Zelal Wattar
Twitter sentiment analysis to understand students' perceptions about online learning during the Covid'19, Feras Al-Obeidat, Mariam Ishaq, Ahmed Shuhaiber, and Adnan Amin
Using Self-labeling and Co-Training to Enhance Bots Labeling in Twitter, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal
Efforts and Suggestions for Improving Cybersecurity Education, Saed Alrabaee, Mousa Al-Kfairy, and Ezedin Barka
Students’ Satisfaction with Online Learning Environments - Post COVID-19, Amal Alrayes, Ons Al-Shamaileh, Nishara Nizamuddin, and Fatima Ahmed
Determinants of Students’ Satisfaction with Higher Education Institutions in Face-to-Face and Online Learning Environments, Ons Al-Shamaileh, Nishara Nizamuddin, and Reem Atassi
Towards a Smart Electric Grid in Abu Dhabi: Models' analysis and an Infrastructure and Architecture Proposition, Abdulla Naser Alzaabi, Dheyab Al Kaabi, and Ahmed Shuhaiber
Resource and Heterogeneity-aware Clients Eligibility Protocol in Federated Learning, Muhammad Asad, Safa Otoum, and Saima Shaukat
An Efficient Classification of Emotions in Students' Feedback using Deep Neural Network, Muhammad Zubair Asghar, Asad Masood Khattak, Nouman Khan, Muhammad Mansoor Alam, Adidah Lajis, Mohd Khairil Rahmat, and Haidawati Mohamad Nasir
Scheduling Household Appliances using Genetic Algorithms, Maram Assi, Ramzi A. Haraty, Sergio Thoumi, Sanaa Kaddoura, and Nahla A. Belal
DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem, Meryeme Ayache, Amjad Gawanmeh, and Jamal N. Al-Karaki
BeverageMaster: Smart Beverage Ordering Assistant, Zeinab Abdel Aziz, Balgees Alharmoodi, and Mohammad Amin Kuhail
Evaluation of Deep Learning Models in ITS Software-Defined Intrusion Detection Systems, Himanshi Babbar, Ouns Bouachir, Shalli Rani, and Moayad Aloqaily
Evaluation of Supervised Machine Learning Approaches for Credit Card Fraud Detection, Alhanof Mabruk Balobid, Jawaher Saleh Binamro, Sewit Tewoldemedhin Yohannes, and Sanaa Kaddoura
Combining Named Entity Recognition and Emotion Analysis of Tweets for Early Warning of Violent Actions, May El Barachi, Sujith Samuel Mathew, and Manar AlKhatib
A Sensor-Embedded Smart Carton for the Real-Time Monitoring of Perishable Foods' Lifetime, May El Barachi, Sinan Salman, and Sujith Mathew
Virtual Radar: A Novel and Advanced Tool for Monitoring Virtualized Networks, Fatna Belqasmi, May El Barachi, and Hani (Microsoft Nemati
Optimization of the Deployment of Wireless Sensor Networks Dedicated to Fire Detection in Smart Car Parks using Chaos Whale Optimization Algorithm, Slimane Charafeddine Benghelima, Mohamed Ould-Khaoua, Ali Benzerbadj, Oumaya Baala, and Jalel Ben-Othman
On Modelling and Analyzing Composite Resources’ Consumption Cycles using Time Petri-Nets, Amel Benna, Fatma Masmoudi, Mohamed Sellami, Zakaria Maamar, and Rachid Hadjidj
Smart RFID application in health care: Using RFID technology for smart inventory and logistic systems in hospitals, Arne Bochem, Ahed Abugabah, and Ahmad Al Smadi
AI-based Blockchain for the Metaverse: Approaches and Challenges, Ouns Bouachir, Moayad Aloqaily, Fakhri Karray, and Abdulmotaleb Elsaddik
Dealing with complex routing requirements using an MCDM based approach, Mohamed R. Bouakouk, Abdelkrim Abdelli, Lynda Mokdad, and Jalel Ben Othman
Trust Evolution Game in Blockchain, Hamda Al Breiki
Towards a Tangible Blocky Coding Design for Visually Impaired Children, Jennifer Alejandra Cardenas Castaneda, Patrick C. K. Hung, Farkhund Iqbal, and Rafiq Ahmad
An MDP model-based initial strategy prediction method for LoRaWAN, Mi Chen, Lynda Mokdad, Cedric Charmois, Jalel Ben-Othman, and Jean-Michel Fourneau
LoRaLOFT-A Local Outlier Factor-based Malicious Nodes detection Method on MAC Layer for LoRaWAN, Mi Chen, Lynda Mokdad, Jalel Ben Othman, and Jean-Michel Fourneau
The Impacts of the CEO’s Network Effect on Digitalization and Agile Leadership in China, Xihui Chen, Victor Chang, Patricia Baudier, and Kienpin Tee
Welcome Wagons: A Block Chain based Web Application for Car Booking, Nadia Dahmani, Suja A. Alex, S. Gayathri Sadhana, S. Geethanjali Jayasree, and T.P. Akhil Jinu
The key principles of effective online classes, Peter Davidson and Jaime Buchanan
THECOG 2022 - Transforms In Behavioral And Affective Computing (Revisited), Georgios Drakopoulos and Eleanna Kafeza
Developing Preservice Teachers' Design Thinking Mindset Using Interactive Technology, Areej Elsayary
Establishing Social, Cognitive and Teacher Presences to Develop Students' Digital Competencies Through Their Engagements in Online Learning, Areej ELSayary and Lawrence Meda
Design A Microstrip Bandpass Filter Antenna from 2 GHz to 4.7 GHz for Biomedical Applications, Sara Yehia Abdel Fatah, F. Taher, Khaled Hassan Mohamadien, Mohamed T. Haweel, and Mohamed Fathy Abo Sree
A Hybrid Edge-assisted Machine Learning Approach for Detecting Heart Disease, Vahideh Hayyolalam, Safa Otoum, and Öznur Özkasap
Remote Robotic Surgery: Joint Placement and Scheduling of VNF-FGs, Amina Hentati, Amin Ebrahimzadeh, Roch H. Glitho, Fatna Belqasmi, and Rabeb Mizouni
Deep Learning based Animal Detection and Tracking in Drone Video Footage, Thani Jintasuttisak, Andrew Leonce, Moayyed Sher Shah, Tamer Khafaga, Greg Simkins, and Eran Edirisinghe
Mobile Deep Classification of UAE Banknotes for the Visually Challenged, Ashraf Khalil, Maha Yaghi, Tasnim Basmaji, Mohamed Faizal, Zia Farhan, Ali Ali, and Mohammed Ghazal
Cross-Location Activity Recognition using Adversarial Learning, Asad Khattak and Adil Khan
False Data Injection Attack on Atmospheric Electric Field in Thunderstorm Warning, Xiang Li, Kadhim Hayawi, Yi Chen, Shih Yu Chang, Hong Wen, Pin-Han Ho, Ling Yang, and Qiyuan Yin
Multi-party Contract Management for Microservices, Zakaria Maamar, Noura Faci, Joyce El Haddad, Fadwa Yahya, and Mohammad Askar
On the Use of Allen’s Interval Algebra in the Coordination of Resource Consumption by Transactional Business Processes, Zakaria Maamar, Fadwa Yahya, and Lassaad Ben Ammar
Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking, Munir Majdalawieh, Anoud Bani-Hani, Mohammed Hussain, and Aisha Alshamsi
Librarians and Research Data in the Current Information Terrain, Judith Mavodza
Beware of Titles: Analysing Media Reporting of Cybercrime in UK and UAE, Maitha Khaled Al Mazrouei, Danica Čigoja Piper, and Lena Yuryna Connolly
Smart Health Care System for Early Detection of COVID-19 Using X-ray Scans, Atif Mehmood, Ahed Abugabah, and Ahmad Al Smadi
Super-Node Topology for Effective Students’ Advising, Loubna Mekouar, Fatna Belqasmi, and Muna Bader
FALSE: Fake News Automatic and Lightweight Solution, Fatema Al Mukhaini, Shaikhah Al Abdoulie, Aisha Al Kharuosi, Amal El Ahmad, and Monther Aldwairi
A Human Evacuation System for Smart Cities, Hessa Ali Nasser, Kholood Khalid Al Blooki, and Sanaa Kaddoura
Evaluating Machine Learning Methods for Intrusion Detection in IoT, Mathew Nicho and Shini Girija
Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats, Mathew Nicho and Shini Girija
Critical Analytical Insights of Palliative Care Process Modelling in a Regional Cancer Care, Yousra Odeh, Dina Tbaishat, Omar Shamieh, and Mohammad Odeh
Realizing Health 4.0 in Beyond 5G Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein Mouftah
Energy Efficient Virtual Network Embedding in Virtualized Wireless Sensor Networks, Vahid Maleki Raee, Amin Ebrahimzadeh, Marsa Rayani, Roch. H. Glitho, May El Barachi, and Fatna Belqasmi
On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification, Sakib Shahriar, Rozita Dara, and Kadhim Hayawi
NFTGAN: Non-Fungible Token Art Generation Using Generative Adversarial Networks, Sakib Shahriar and Kadhim Hayawi
On the Feasibility of Federated Learning for Neurodevelopmental Disorders: ASD Detection Use-Case, Hala Shamseddine, Safa Otoum, and Azzam Mourad
‘Sidekick’ Application: A Smart Mobile Application for Generation Z, Ahmed Shuhaiber, Safiyah Alhosani, Fatima Albadi, and Qwainsa Almarri
Information Systems in Medical Settings: A Covid-19 Detection System Using X-Ray Scans, Ahmad Al Smadi, Ahed Abugabah, Shadrack Fred Mahenge, and Farah Shahid
AI-Enabled Health 4.0: An IoT-Based COVID-19 Diagnosis Use-Case, Xiaoyu Song, Wei Pan, Ismaeel Al Ridhawi, Ali Abbas, and Safa Otoum
Covid-19 Detection Based on Chest X-Ray Images Using DCT Compression and NN, Fatma Taher, Reem T Haweel, Usama Mohammad Hassan Al Bastaki, Eman Abdelwahed, Tariq Rehman, and Tarek I Haweel
Design and implementation of 2.6 GHz Phase shift using microstrip technology for mobile broadband application, F. Taher, Ahmed Shokry Tonsy, Hesham Hanafy M T Azab, Hussam Al Hamadi, Mohammad T. Haweel, and Mohamed Fathy Abo Sree
Critical Analysis of Palliative Homecare Using the i∗ Framework's Strategic and Social Requirements Modelling Applied to a Cancer Care Organisation, Dina Tbaishat, Yousra Odeh, Faten F. Kharbat, Omar Shamieh, and Mohammad Odeh
Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs), Zouheir Trabelsi, Tariq Qayyum, Kadhim Hayawi, and Muhammad Ali
IoT Enhancements for an In-house Calm Computing Environment, Athanasios Tsoukalas, Steven Annor, Eleanna Kafeza, and Anthony Tzes
STKE: Temporal Knowledge Graph Embedding in the Spherical Coordinate System, Shibo Wang, Ruinan Liu, Linshan Shen, and Asad Masood Khattak
Towards Bilateral Client Selection in Federated Learning Using Matching Game Theory, Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, and Azzam Mourad
Soft systems modelling of design artefacts for blockchain-enabled precision healthcare as a service, Arnob Zahid, Ravishankar Sharma, Stephen C. Wingreen, and Anushia Inthiran
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network, Zhibo Zhang, Ernesto Damiani, Hussam Al Hamadi, Chan Yeob Yeun, and Fatma Taher
Submissions from 2021
Pros and cons of Blockchain-based approaches in Education, Dua’a Abu Hamdi and Omar Alfandi
Drone-Based Cattle Detection Using Deep Neural Networks, R. Y. Aburasain, E. A. Edirisinghe, and Ali Albatay
Visual Pseudo Haptics for a Dynamic Squeeze / Grab Gesture in Immersive Virtual Reality, Naveed Ahmed, Mohammed Lataifeh, and Imran Junejo
Crowd Modeling using Temporal Association Rules, Rizwan Ahmed, Muhammad Shahzad Rafiq, and Imran N. Junejo
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects, Waqas Ahmed, Faisal Shahzad, Abdul Rehman Javed, Farkhund Iqbal, and Liaqat Ali
Multicriteria Decision Making Using TOPSIS Method: An Accurate Selection of Deserving Candidates, Rahman Ali and Asad Masood Khatak
IoT Protocols – MQTT versus CoAP, Alyaziya Almheiri and Zakaria Maamar
Blockchain and FL-based Network Resource Management for Interactive Immersive Services, Moayad Aloqaily, Ouns Bouachir, and Ismaeel Al Ridhawi
Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka, Eiman Alothali, Hany Alashwal, Motamen Salih, and Kadhim Hayawi
SpeculoLab: A Protocol and a Tool for Identity Deception Experimentation in Social Networks, Noora Al Roken, Maryam Al Abdooli, Sumaya Khoory, and Hakim Hacid
The Acceptance of Social Media Sites: An Empirical Study Using PLS-SEM and ML Approaches, Sawsan Al-Skaf, Enaam Youssef, Mohammed Habes, Khadija Alhumaid, and Said A. Salloum
Towards a personalized recommendation model in location-based social networks, Reem Atassi, Ons Al-Shamaileh, and Hakim Hacid
Privacy-Preserving and Efficient Aggregation for Smart Grid based on Blockchain, Mohamad Badra and Rouba Borghol
Islamic Education and youth culture Exploring tolerance in UAE Islamic Education classrooms, Naved Bakali and Mariam Alhashmi
Towards Automatic Narrative Coherence Prediction, Filip Bendevski, Jumana Ibrahim, Tina Krulec, Theodore Waters, Nizar Habash, Hanan Salam, Himadri Mukherjee, and Christin Camia
Lightweight IDS for UAV Networks: A Periodic Deep Reinforcement Learning-based Approach, Omar Bouhamed, Ouns Bouachir, Moayad Aloqaily, and Ismaeel Al Ridhawi
AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless Networks, Nadia Charef, Adel Ben Mnaouer, and Ouns Bouachir
Student Perceptions of an Asychronous Online Discussion Board Used to Assess the Professional Skills, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov
THECOG - Transforms in Behavioral and Affective Computing, Georgios Drakopoulos and Eleanna Kafeza
Approximate High Dimensional Graph Mining With Matrix Polar Factorization: A Twitter Application, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Spyros Sioutas
Process Mining Analytics for Industry 4.0 with Graph Signal Processing, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Spyros Sioutas
A Hybrid Machine Learning Approach for Sentiment Analysis of Partially Occluded Faces, May El Barachi, Manar Alkhatib, and Sujith Samuel Mathew
Teaching and assessing creativity in STEAM education, Areej ElSayary
Transforming preservice teachers' learning in online courses: A framework of instructional design, Areej Elsayary
AI based Login System using Facial Recognition, Siem Girmay, Faniel Samsom, and Asad Masood Khattak
Bitcoin Price Forecasting: Linear Discriminant Analysis with Sentiment Evaluation, Ikhlaas Gurrib, Firuz Kamalov, and Linda Smail
Formal Modeling and Verification of Property-based Resource Consumption Cycles, Rania Ben Halima, Kais Klai, Mohamed Sellami, and Zakaria Maamar
Remote sensing and GIS based approaches to estimate evapotranspiration in the arid and semi-arid regions, Fares M. Howari, Manish Sharma, Cijo M. Xavier, Yousef Nazzal, Imen Ben Salem, and Fatima Al Aydaroos
Smart Guest Virtual Assistant with Automatic Guest Registration, Mohammed Hussain, Abdullah Hussein, and Mohamed Basel AlMourad
Discord Server Forensics: Analysis and Extraction of Digital Evidence, Farkhund Iqbal, Michał Motyliński, and Áine MacDermott
Community Search in a Multi-Attributed Graph using Collaborative Similarity Measure and Node Filtering, Naveed Javaid, Kifayat Ullah Khan, Asad Masood Khattak, and Waqas Nawaz
Classification of malicious and benign websites by network features using supervised machine learning algorithms, Sanaa Kaddoura
Evaluation of Supervised Machine Learning Algorithms for Multi-class Intrusion Detection Systems, Sanaa Kaddoura, Amal El Arid, and Mirna Moukhtar
Knowledge Engineering in the Social Era, Ejub Kajan and Zakaria Maamar
Comparative analysis of activation functions in neural networks, Firuz Kamalov, Amril Nazir, Murodbek Safaraliev, Aswani Kumar Cherukuri, and Rita Zgheib
A Novel Deep Reinforcement Learning-based Approach for Task-offloading in Vehicular Networks, S. M. Ahsan Kazmi, Safa Otoum, Rasheed Hussain, and Hussein T. Mouftah
Impact of Model Ensemble On the Fairness of Classifiers in Machine Learning, Patrik Joslin Kenfack, Adil Mehmood Khan, S.M. Ahsan Kazmi, Rasheed Hussain, Alma Oracevic, and Asad Masood Khattak
Forensic Analysis of the Cisco WebEx Application, Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, and Liaqat Ali Khan
Detecting Arabic Fake News Using Machine Learning, Ashwaq Khalil, Moath Jarrah, Monther Aldwairi, and Yaser Jararweh
Efficient In-Network Caching in NDN-based Connected Vehicles, Hasan Ali Khattak, Farkhanda Zafar Raja, Moayad Aloqaily, and Ouns Bouachir
Temporal behavioural analysis of extremists on social media: A machine learning based approach, Saad Lutfi, Rand Yasin, May El Barachi, Farhad Oroumchian, Ajala Imene, and Sujith Samuel Mathew
An IoT Application Business-Model on Top of Cloud and Fog Nodes, Zakaria Maamar, Mohammed Al-Khafajiy, and Murtada Dohan
Orchestration- and choreography-based composition of Internet of Transactional Things, Zakaria Maamar, Muhammad Asim, Saoussen Cheikhrouhou, and Ayesha Qamar
A Data-based Guiding Framework for Digital Transformation, Zakaria Maamar, Saoussen Cheikhrouhou, and Said Elnaffar
Trust-empowered, IoT-driven legitimate data offloading, Zakaria Maamar, Noura Faci, Fadwa Yahya, and Ejub Kajan
Cloud-edge coupling to mitigate execution failures, Zakaria Maamar and Mohammed Al Khafajiy
Blockchain-based Secure CIDS Operation, Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, and Mohammad Mehedy Masud
An Innovative and Decentralized Identity Framework Based on Blockchain Technology, Daniel Maldonado-Ruiz, Jenny Torres, Nour El Madhoun, and Mohamad Badra
The Super-Node Topology in Collaborative Learning, Loubna Mekouar, Muna Bader, and Fatna Belqasmi
Super-Node Topology In Collaborative Learning: Concrete Examples And Benefits, Loubna Mekouar, Fatna Belqasmi, and Muna Bader
FinTech in Bahrain: The Role of FinTech in Empowering Women, Haya Yusuf Mohamed, Allam Hamdan, Magdalena Karolak, Anjum Razzaque, and Bahaaeddin Alareeni
Inter relationship between the attributes of talent management process in information technology sector, Anupama Nair, Beena Salim Saji, and Shaindra Sewbaran
Modeling Evasive Malware Authoring Techniques, Mathew Nicho and Maitha Alkhateri
Application of Consumptive Metrics to Measure Internship Alignment, Mathew Nicho, Emad Bataineh, and Tarannum Parkar
IoTVT Model: A Model Mapping IoT Sensors to IoT Vulnerabilities and Threats, Mathew Nicho and Shini Girija
Federated Reinforcement Learning-Supported IDS for IoT-steered Healthcare Systems, Safa Otoum, Nadra Guizani, and Hussein Mouftah
What do developers reply to? An empirical study of the top Unmanned Aerial Vehicles (UAVs) apps, Fatma Outay, Haroon Malik, and David Dampier
Effect of Social Hierarchy on Conflict in teams: From a Structural Perspective, Jin Park
A Predictive Framework for Haptic Enabled VR-based Remote Phobia Treatment in Cloud/Fog Environment, Farinaz Rasouli, Amin Ebrahimzadeh, Somayeh Kianpisheh, Nattakorn Promwongsa, Fatna Belqasmi, and Roch Glitho
Persuasive Technology in Games: A Brief Review and Reappraisal, Umair Rehman, Muhammad Umair Shah, Amir Zaib Abbasi, Farkhund Iqbal, Ali Arsalan, and Muhammad Umair Javaid
Semantic composition of cloud services, Mouna Rekik, Khouloud Boukadi, and Rima Grati
Planning the supply of emergency medical products to cope with pandemics, Sinan Salman, Suzan Alaswad, Ramzi Hammami, and Imen Nouira
Discovering Influential Twitter Authors Via Clustering And Ranking On Apache Storm, Christina Saravanos, Georgios Drakopoulos, Andreas Kanavos, Eleanna Kafeza, and Christos Makris
IT Teaching Labs: Innovations in a Distance Education Era, Ahmed Seffah, Mohammad Amin Kuhail, and Joao Negreiros
A Novel Framework for Accurate and Non-Invasive Pulmonary Nodule Diagnosis by Integrating Texture and Contour Descriptors, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, and Ayman El-Baz
An Alternate Account on the Ethical Implications of Autonomous Vehicles, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Mohammed Hussain, and Fazli Wahid
Towards A Smarter Energy Metering System For A Smarter City: A Regression-Based Model From Users’ Perspective, Ahmed Shuhaiber, Nabil Adam, and Mohammad Sh.Daoud
Cardiovascular Segmentation Methods Based on Weak or no Prior, Fatma Taher and Neema Prakash
Which Virtualization Technology is Right for My Online IT Educational Labs?, Ahmad Samer Wazan, Mohammad Amin Kuhail, Kadhim Hayawi, and Rémi Venant
Forensic Analysis of Fitbit Versa: Android vs iOS, Joseph Williams, Aine Macdermott, Kellyann Stamp, and Farkhund Iqbal
Abstraction-Based Outlier Detection for Image Data, Kirill Yakovlev, Imad Eddine Ibrahim Bekkouch, Adil Mehmood Khan, and Asad Masood Khattak
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks, Benjamin Yankson, Javed Vali K, Patrick C. K. Hung, Farkhund Iqbal, and Liaqat Ali
Study of radical views on social media: Classification and group dynamics analysis, Rand Yasin, Saad Lutfi, Ajala Imene, Farhad Oroumchian, May El Barachi, and Sujith Samuel Mathew
Ontology Evolution Using Recoverable SQL Logs, Awais Yousaf, Asad Masood Khattak, and Kifayat Ullah Khan
Submissions from 2020
An Interactive Data Assignment Algorithm for Non-Replicated DDBMSs, Hassan I. Abdalla and Abdelmonim M. Artoli
Dynamic Graph Attention-Aware Networks for Session-Based Recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang
A review of challenges and barriers implementing RFID technology in the Healthcare sector, Ahed Abugabah, Nishara Nizamuddin, and Alaa Abuqabbeh
Smart healthcare ecosystem for elderly patient care, A. Abugabah and N. Nizamuddin
A Cloud Computing Capability Model for Large-Scale Semantic Annotation, Oluwasegun Adedugbe, Elhadj Benkhelifa, and Anoud Bani-Hani
Applying Deep Neural Networks for Predicting Dark Triad Personality Trait of Online Users, Hussain Ahmad, Areeba Arif, Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, and Babar Shah
Blockchain-based chain of custody: Towards real-time tamper-proof evidence management, Liza Ahmad, Salam Khanji, Farkhund Iqbal, and Faouzi Kamoun
A Hybrid Approach for Counting Templates in Images, Maher Ala'raj and Munir Majdalawieh
Sentiment analysis on predicting presidential election: Twitter used case, Nedaa Baker Al Barghuthi and Huwida E. Said
Blockchain Solution for IoT-based Critical Infrastructures: Byzantine Fault Tolerance, Omar Alfandi, Safa Otoum, and Yaser Jararweh
State of the Art in Digital Forensics for Small Scale Digital Devices, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, and Farkhund Iqbal
Blockchain-assisted Decentralized Virtual Prosumer Grouping for P2P Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Oznur Ozkasap, and Ouns Bouachir
Using Artificial Intelligence to Monitor the Evolution of Opinion Leaders' Sentiments: Case Study on Global Warming, Manar Alkhatib, May El Barachi, Sujith Samuel Mathew, and Farhad Oroumchian
UniBud: A Virtual Academic Adviser, Abdulrahman Alkhoori, Mohammad Amin Kuhail, and Abdulla Alkhoori
Visual Attention toward Human Face Recognizing for Autism Spectrum Disorder and Normal Developing Children: An Eye Tracking Study, Mohamed Basel Almourad and Emad Bataineh
Cone-KG: A semantic knowledge graph with news content and social context for studying covid-19 news articles on social media, Feras Al-Obeidat, Oluwasegun Adedugbe, Anoud Bani Hani, Elhadj Benkhelifa, and Munir Majdalawieh
The Socio-economic Impacts of Social Media Privacy and Security Challenges, Feras Al-Obeidat, Anoud Bani Hani, Oluwasegun Adedugbe, Munir Majdalawieh, and Elhadj Benkhelifa
On minimizing synchronization cost in NFV-based environments, Zakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily, and Ouns Bouachir
Characteristics of Similar-Context Trending Hashtags in Twitter: A Case Study, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal
Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication?, Fatima Alqubaisi, Ahmad Samer Wazan, Liza Ahmad, and David W. Chadwick
Mitigation of ground vibration from pile driving by circular arrays of rigid blocks placed on the ground surface, Lars V. Andersen, Peter Persson, and Andrew T. Peplow
A WUSN-based Smart System for Water Flow Control, Nahom Aron, Bereket Yemane, Temesgen Mikael, Reem Salem, and Fatna Belqasmi
Energy Efficiency in SDDC: Considering Server and Network Utilities, Beakal Gizachew Assefa, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily, and Ouns Bouachir
A latent model for ad hoc table retrieval, Ebrahim Bagheri and Feras Al-Obeidat
Capturing Public Concerns about Coronavirus Using Arabic Tweets: An NLP-Driven Approach, Mohammed Bahja, Rawad Hammad, and Mohammed Amin Kuhail
A secure fog-based platform for SCADA-based IoT critical infrastructure, Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, and Mohammad Hammoudeh
Fane-KG: A semantic knowledge graph for context-based fake news detection on social media, Anoud Bani Hani, Oluwasegun Adedugbe, Feras Al-Obeidat, Elhadj Benkhelifa, and Munir Majdalawieh
A Semantic Model for Context-Based Fake News Detection on Social Media, Anoud Bani-Hani, Oluwasegun Adedugbe, Elhadj Benkhelifa, Munir Majdalawieh, and Feras Al-Obeidat
Thing Mutation as a Countermeasure to Safeguard IoT, Bita Banihashemi, Zakaria Maamar, Noura Faci, and Emir Ugljanin
Optimal maintenance policies for degrading hydrocarbon pipelines using Markov decision process, Eric Bediako, Suzan Alaswad, Yisha Xiang, and Zhigang Tian
Reliability Analysis of Crude Unit Overhead Piping Based on Wall Thickness Degradation Process, Eric Bediako, Yisha Xiang, Susan Alaswad, Liao Ying, and Liudong Xing
A knowledge-based approach to manage configurable business processes, Wehbi Benallal, Mahmoud Barhamgi, Djamal Benslimane, Zakaria Maamar, Noura Faci, and Ameni Bellaaj
A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic Surgery, Francis Boabang, Roch Glitho, Halima Elbiaze, Fatna Belqami, and Omar Alfandi
Accident Recognition via 3D CNNs for Automated Traffic Monitoring in Smart Cities, Mikhail Bortnikov, Adil Khan, Asad Masood Khattak, and Muhammad Ahmad
UAV-Assisted Vehicular Communication for Densely Crowded Environments, Ouns Bouachir, Moayad Aloqaily, Ismaeel Al Ridhawi, Omar Alfandi, and Haythem Bany Salameh
ECCV (14) - SipMask: Spatial Information Preservation for Fast Image and Video Instance Segmentation, Jiale Cao, Rao Muhammad Anwer, Hisham Cholakkal, Fahad Shahbaz Khan, Yanwei Pang, and Ling Shao
Learning Attentive and Hierarchical Representations for 3D Shape Recognition, Jiaxin Chen, Jie Qin, Yuming Shen, Li Liu, Fan Zhu, and Ling Shao
The impact of grouping efficiency measures in cellular manufacturing systems, Nadia Dahmani and Adnan Mukattash
Towards an Automatic Identification of Microservices from Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki
Automatic Microservices Identification from a Set of Business Processes, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki
Suitability of Blockchain for Collaborative Intrusion Detection Systems, Nahom Aron Dawit, Sujith Samuel Mathew, and Kadhim Hayawi
Quality-dependent adaptation in a swarm of drones for environmental monitoring, Giulia De Masi and Eliseo Ferrante
Zealots Attack and the Revenge of the Commons: Quality vs Quantity in the Best-of-n, Giulia De Masi, Judhi Prasetyo, Elio Tuci, and Eliseo Ferrante
CLNet: A Compact Latent Network for Fast Adjusting Siamese Trackers, Xingping Dong, Jianbing Shen, Ling Shao, and Fatih Porikli
Building Trusted Startup Teams from LinkedIn Attributes: A Higher Order Probabilistic Analysis, Georgios Drakopoulos, Eleana Kafeza, Phivos Mylonas, and Haseena Al Katheeri
One Dimensional Cross-Correlation Methods for Deterministic and Stochastic Graph Signals with A Twitter Application in Julia, Georgios Drakopoulos and Eleanna Kafeza
Learning to Learn with Variational Information Bottleneck for Domain Generalization, Yingjun Du, Jun Xu, Huan Xiong, Qiang Qiu, Xiantong Zhen, Cees G.M. Snoek, and Ling Shao
MetaNorm: Learning to Normalize Few-Shot Batches Across Domains, Yingjun Du, Xiantong Zhen, Ling Shao, and Cees G. M. Snoek
Evaluating Citizens' Sentiments in Smart Cities: A Deep Learning Approach, Abdallah Elabora, Manar Alkhatib, Sujith Samuel Mathew, and May El Barachi
Stabilization of active acetylene by-product via sequestration of co2, M. El Gamal, A. M.O. Mohamed, and S. Hameedi
PraNet: Parallel Reverse Attention Network for Polyp Segmentation, Deng Ping Fan, Ge Peng Ji, Tao Zhou, Geng Chen, Huazhu Fu, Jianbing Shen, and Ling Shao
Exploiting Deep Neural Networks for Intention Mining, Anam Habib, Nosheen Jelani, Asad Masood Khattak, Saima Akbar, and Muhammad Zubair Asghar
Elaboration and Characterization of ZnO/FTO thin films under different concentrations - Study dedicated to the photovoltaic systems - Study d, Slimani Hamza, Dagher Sawsan, Bessous Noureddine, Benhaoua Atmane, Laouini Salah Eddine, Mimouni Mourad, Ghougali Mebrouk, Chaabia Nacer, Fawwaz Al Khatib, Boshra Akhozheya, Maisa El Gamal, and Ali Tliba
Meteorology of the Red Planet by dust devils, Fares M. Howari, Imen Ben Salem, Manish Sharma, Cijo Xavier, Yousef Nazzal, and Fatima Alaydaroos
Application of hyperspectral imaging technique to determine the quality of Photo and Thermal exposed and contaminated pharmaceutical formulations: A cost effective way of quality testing, Fares M. Howari, Cijo Xavier, Manish Sharma, Yousef Nazzal, Imen Ben Salem, and Fatima Alaydaroos
Layer-Wise Conditioning Analysis in Exploring the Learning Dynamics of DNNs, Lei Huang, Jie Qin, Li Liu, Fan Zhu, and Ling Shao
VAE-GAN based zero-shot outlier detection, Bekkouch Imad Ibrahim, Dragos Constantin Nicolae, Adil Khan, Syed Imran Ali, and Asad Khattak
Detection and Analysis of Drive-by Downloads and Malicious Websites, Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, and Monther Aldwairi
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models, Salman Jan, Shahrulniza Musa, Toqeer Ali, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, and Babar Shah
A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach, Sanaa Kaddoura, Omar Alfandi, and Nadia Dahmani
Promoting Teaching Practices in IT Higher Education, Sanaa Kaddoura and Rima Grati
Legal smart contracts in ethereum block chain: Linking the dots, Eleanna Kafeza, Syed Juned Ali, Irene Kafeza, and Haseena Alkatheeri
Forecasting with deep learning: S&P 500 index, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib
Stock price forecast with deep learning, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib
A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders, Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
AI and machine learning: A mixed blessing for cybersecurity, Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, and Thar Baker
Analysis of the Importance of Systolic Blood Pressure Versus Diastolic Blood Pressure in Diagnosing Hypertension: MRA Study., Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Adel Elmaghraby, and Ayman El-Baz
Dynamic framework to mining Internet of Things for multimedia services, Yaser Khamayseh, Wail Mardini, J. William Atwood, and Monther Aldwairi
Towards a Novel Intrusion Detection Architecture using Artificial Intelligence, Salam Khanji and Asad Khattak
Interpretable and Generalizable Person Re-identification with Query-Adaptive Convolution and Temporal Lifting, Shengcai Liao and Ling Shao
Interpretable Neural Network Decoupling, Yuchao Li, Rongrong Ji, Shaohui Lin, Baochang Zhang, Chenqian Yan, Yongjian Wu, Feiyue Huang, and Ling Shao
Internet of Things, Zakaria Maamar
Thingsourcing to Enable IoT Collaboration, Zakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, and Said Elnaffar
OWL-T for a Semantic Description of IoT, Zakaria Maamar, Noura Faci, Ejub Kajan, Muhammad Asim, and Ayesha Qamar
Process-of-Things: Weaving film industry’s practices into the Internet-of-Things, Zakaria Maamar, Noura Faci, Ejub Kajan, Safet Purković, and Emir Ugljanin
Bridging the gap between business processes and IoT, Zakaria Maamar, Ejub Kajan, Ikbel Guidara, Leyla Moctar-M'baba, and Mohamed Sellami
Atomicity in the Internet of Transactional Things (Io2T), Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, and Maj Alshibly
Towards an Approach for Validating the Internet-of-Transactional-Things, Zakaria Maamar, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, and Bita Banihashemi
Structure Preserving Stain Normalization of Histopathology Images Using Self Supervised Semantic Guidance, Dwarikanath Mahapatra, Behzad Bozorgtabar, Jean Philippe Thiran, and Ling Shao
Pink Ocean Strategy: Democratizing Business Knowledge for Social Growth and Innovation, Evangelos Markopoulos, Maria Barbara Ramonda, Lisa Marie Carolin Winter, Haseena Al Katheeri, and Hannu Vanharanta
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data, Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, and Muhsin Cheratta
On the need for cultural sensitivity in digital wellbeing tools and messages: A UK-China comparison, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
WorldCIST (2) - On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison., John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Bi-orthogonal wavelets for investigating Gibbs effects via oblique extension principle, Mutaz Mohammad
Digital Forensic Acquisition and Analysis of Discord Applications, Michal Motylinski, Aine MacDermott, Farkhund Iqbal, Mohammed Hussain, and Saiqa Aleem
ECCV (22) - Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G. M. Snoek, and Ling Shao
Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G.M. Snoek, and Ling Shao
Evaluating IT Governance Structure Implementation in the Gulf Cooperation Council Region, Mathew Nicho and Suadad Muamaar
A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks, Safa Otoum, Burak Kantarci, and Hussein T. Mouftah
Blockchain-Supported Federated Learning for Trustworthy Vehicular Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah
Contextual healing: Privacy through interpretation management, Fatma Outay and Rula Sayaf
PhishOut: PhishOut: Effective Phishing Detection Using Selected Features, Suhail Paliath, Mohammad Abu Qbeitah, and Monther Aldwairi
The effect of differential quality and differential zealotry in the best-of-n problem, Judhi Prasetyo, Giulia De Masi, Elio Tuci, and Eliseo Ferrante
Quaternionic Channel-based Modulation For Dual-polarized Antennas, Sara Shakil Qureshi, Syed Ali Hassan, and Sajid Ali
On the use of elitism to improve convergence of the chemical reaction optimization algorithm in discrete optimization problems, Sinan Salman
Network design using chemical reaction optimization and markov-chain traffic assignment, Sinan Salman and Suzan Alaswad
Vehicles' emissions consideration in transportation network design using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad
A Comprehensive Framework for Accurate Classification of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
Access Permissions for Apple Watch Applications: A Study on Users' Perceptions, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, and Ali Arsalan
Invertible Zero-Shot Recognition Flows, Yuming Shen, Jie Qin, Lei Huang, Li Liu, Fan Zhu, and Ling Shao
Algorithm Appreciation: Algorithmic Performance, Developmental Processes, and User Interactions, Donghee Shin, Bouziane Zaid, and Mohammed Ibahrine
A predictive model of users’ behavior and values of smart energy meters using PLS-SEM, Ahmed Shuhaiber
Trust in smart energy meters: The role of perceived values, Ahmed Shuhaiber
Panel: Autonomy Control at Work: Cars, Robots, Drones and Satellites, Roy Sterritt, Petr Skobelev, Mario Döller, Iaria Dini, Claudius Stern, Giulia De Masi, Timothy Patten, and Pedro Forero
Precise Cerebrovascular Segmentation, F. Taher, A. Soliman, H. Kandil, A. Mahmoud, A. Shalaby, G. Gimel'farb, and A. El-Baz
Improving the impact of power efficiency in mobile cloud applications using cloudlet model, Lo'ai Tawalbeh, Mohammad A. Tawalbeh, and Monther Aldwairi
Building a security framework for smart cities: A case study from UAE, Abdallah Tubaishat and Mariam Al Jouhi
Optimizing the Efficiency of Machine Learning Techniques, Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, and Asad Masood Khattak
Automatic C-Plane Detection in Pelvic Floor Transperineal Volumetric Ultrasound, Helena Williams, Laura Cattani, Mohammad Yaqub, Carole Sudre, Tom Vercauteren, Jan Deprest, and Jan D’hooge
Region Graph Embedding Network for Zero-Shot Learning, Guo Sen Xie, Li Liu, Fan Zhu, Fang Zhao, Zheng Zhang, Yazhou Yao, Jie Qin, and Ling Shao
Count- and Similarity-Aware R-CNN for Pedestrian Detection, Jin Xie, Hisham Cholakkal, Rao Muhammad Anwer, Fahad Shahbaz Khan, Yanwei Pang, Ling Shao, and Mubarak Shah
ICML - On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao
A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination, Fadwa Yahya, Zakaria Maamar, and Khouloud Boukadi
4P based forensics investigation framework for smart connected toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung
ECCV (17) - Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-Identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain
Learning Enriched Features for Real Image Restoration and Enhancement, Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming Hsuan Yang, and Ling Shao
Unsupervised Domain Adaptation with Noise Resistible Mutual-Training for Person Re-identification, Fang Zhao, Shengcai Liao, Guo Sen Xie, Jian Zhao, Kaihao Zhang, and Ling Shao
M2Net : Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients, Tao Zhou, Huazhu Fu, Yu Zhang, Changqing Zhang, Xiankai Lu, Jianbing Shen, and Ling Shao
Submissions from 2019
Delay and energy based message delivery in delay tolerant networks, Ali Abbas, Babar Shah, Muhammad Habib, Francis Chow, Raza Hasan, and Ki Il Kim
A Novel Deep Learning Approach for Left Ventricle Automatic Segmentation in Cardiac Cine MR, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Automatic segmentation and functional assessment of the left ventricle using u-net fully convolutional network, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Healthcare applications of intelligent information systems: A novel technique for medical image fusion, Ahed Abugabah and Ahmad Alsmadi
Data Mining in Health Care Sector: Literature Notes, Ahed Abugabah, Ahmad Al Smadi, and Alaa Abuqabbeh
Towards an end-user layer for data integrity, Lu'ay Abu-Rayyan, Hakim Hacid, and Andrew Leoncé
The effect of demand variability on supply chain performance, Suzan Alaswad, Sinan Salman, Arwa Alhashmi, Hawra Almarzooqi, and Meera Alhammadi
Blockchain in Supply Chain Trading, Nedaa Baker Al Barghuthi, Hussam Juma Mohamed, and Huwida E. Said
State of Art of the Effectiveness in Adopting Blockchain Technology-UAE Survey Study, Nedaa Baker Al Barghuthi, Cornelius Ncube, and Huwida Said
Readiness, Safety, and Privacy on Adopting Autonomous Vehicle Technology: UAE Case Study, Nedaa Baker Al Barghuthi and Huwida Said
Online peer support groups to combat digital addiction: User acceptance and rejection factors, Manal Aldhayan, Sainabou Cham, Theodoros Kostoulas, Mohamed Basel Almourad, and Raian Ali
n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems, Monther Aldwairi and Duaa Alansari
Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak
Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak
Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith
A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb
Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal
Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi
Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien
Using Data Mining Techniques to Identify Construction Claims Causes: A Case Study, Vasila Al Khaldi, Nazar Zaki, Essam Zaneldin, and Elfadil A. Mohamed
Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh
A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh
Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler
Cross-Linguistic Twitter Analysis of Discussion Themes before, during and after Ramadan, Aamna Alshehhi, Justin Thomas, Roy Welsch, and Zeyar Aung
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said
A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair
Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira
Mitigation of ground vibrations by circular arrays of rigid blocks, Lars V. Andersen, Andrew T. Peplow, and Peter Persson
A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi
A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal
Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi
A relational approach to exploring inequalities within the human resource management model in the Middle East, Safiya Banu, Nicolina Kamenou-Aigbekaen, and Laura Galloway
Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh
Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov
EDBT/ICDT Workshops - Privacy-Preserving Data Analysis Workflows for eScience., Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Privacy-preserving data analysis workflows for eScience, Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi
Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi
Testbed of QoS Ad-Hoc network designed for cooperative multi-drone tasks, Ouns Bouachir, Moayad Aloqaily, Fabien Garcia, Nicolas Larrieu, and Thierry Gayraud
Corrigendum to Norm-based and commitment-driven agentification of the Internet of Things [Internet of Things volume 6 (2019) 100042], Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Norm-based and commitment-driven agentification of the Internet of Things, Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Digital addiction: Negative life experiences and potential for technology-assisted solutions, Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, and Raian Ali
Are Women Holding Half the Sky? A Case Study of Chinese Listed Companies, Haviour Xihui Chen and Kienpin Tee
An Active Noise Correction Graph Embedding Method Based on Active Learning for Graph Noisy Data, Zhiyuan Cui, Donghai Guan, Cong Li, Weiwei Guan, and Asad Masood Khattak
Student proficiency profiles through the computing professional skills assessment, Maurice Danaher, Kevin Schoepp, Anthony Rhodes, and Tiffany Cammidge
What is Academic Writing?, Peter Davidson
Dynamic Neural Network for Business and Market Analysis, Javier de Arquer Rilo, Abir Hussain, May Al-Taei, Thar Baker, and Dhiya Al-Jumeily
Deep Learning Based Method for Computer Aided Diagnosis of Diabetic Retinopathy, Omar Dekhil, Ahmed Naglah, Mohamed Shaban, Mohammed Ghazal, Fatma Taher, and Ayman Elbaz
A Novel Fully Automated CAD System for Left Ventricle Volume Estimation, Omar Dekhil, Fatma Taher, Fahmi Khalifa, Garth Beache, Adel Elmaghraby, and Ayman El-Baz
Proof systems in blockchains: A survey, Georgios Drakopoulos, Eleanna Kafeza, and Haseena Al Katheeri
In Situ Mutation for Active Things in the IoT Context, Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami
The socio-net of things modeling framework, Amjad Fayoumi, Juliana Sutanto, and Zakaria Maamar
Human Activity Recognition Using Deep Models and Its Analysis from Domain Adaptation Perspective, Nikita Gurov, Adil Khan, Rasheed Hussain, and Asad Khattak
Drone forensics: A case study on DJI phantom 4, Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, and Aine MacDermott
Internet of Things Platform for Transparency and Traceability of Food Supply Chain, Ahmed Haroon, Mehak Basharat, Asad Masood Khattak, and Waleed Ejaz
Detection of SQL Injection Attacks: A Machine Learning Approach, Musaab Hasan, Zayed Balbahaith, and Mohammed Tarique
Smart Home Systems Security, Abir Hussain, Deimante Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily
Market basket analysis of student attendance records, Mohammed Hussain and Abdullah Hussein
Raising Children’s Cultural Awareness: A Task-Based Approach, Nadine Jaafarawi
Novel robust digital watermarking in mid-rank co-efficient based on DWT and RT transform, Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, and Babar Shah
A fog-based architecture for remote phobia treatment, Yassine Jebbar, Fatna Belqasmi, Roch Glitho, and Omar Alfandi
Psychological vulnerability as an integral component of comprehensive vulnerability assessment: Informing policy and practice in disaster risk reduction, Jigar Jogia and Gayan Wedawatta
Restriction-based fragmentation of business processes over the cloud, Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, and Thar Baker
A CAD System for the Early Prediction of Hypertension based on Changes in Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Guruprasad Giridharan, and Ayman El-Baz
Using 3-D CNNs and Local Blood Flow Information to Segment Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Ali Mahmoud, Adel Elmaghraby, and Ayman El-Baz