Follow

Submissions from 2020

PDF

Perceptions and misperceptions of smartphone use: Applying the social norms approach, John McAlaney, Mohamed Basel Almourad, Georgina Powell, and Raian Ali

Link

A design-based research approach for developing data-focussed business curricula, Shah J. Miah, Ian Solomonides, and John G. Gammack

PDF

Machine Learning Techniques for Quantification of Knee Segmentation from MRI, Sujeet More, Jimmy Singla, Ahed Abugabah, and Ahmad Ali Alzubi

PDF

Framework for examination of software quality characteristics in conflict: A security and usability exemplar, Bilal Naqvi, Ahmed Seffah, and Alain Abran

Link

Applications of unmanned aerial vehicle (UAV) in road safety, traffic and highway infrastructure management: Recent advances and challenges, Fatma Outay, Hanan Abdullah Mengash, and Muhammad Adnan

PDF

Exploration of Lifestyle Choices, Reproductive Health Knowledge, and Polycystic Ovary Syndrome (PCOS) Awareness Among Female Emirati University Students, Sreepoorna Pramodh

Link

Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices, Nattakorn Promwongsa, Mohammad Abu-Lebdeh, Somayeh Kianpisheh, Fatna Belqasmi, Roch H. Glitho, Halima Elbiaze, Noel Crespi, and Omar Alfandi

PDF

A Comprehensive Survey of the Tactile Internet: State-of-the-art and Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, and Omar Alfandi

PDF

Mitigating the Impact of Congestion Minimization on Vehicles’ Emissions in a Transportation Road Network, S. Salman and S. Alaswad

Link

Ubiquitous Health Profile (UHPr): a big data curation platform for supporting health data interoperability, Fahad Ahmed Satti, Taqdir Ali, Jamil Hussain, Wajahat Ali Khan, Asad Masood Khattak, and Sungyoung Lee

Link

Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints, Babar Shah, Ali Abbas, Gohar Ali, Farkhund Iqbal, Asad Masood Khattak, Omar Alfandi, and Ki Il Kim

PDF

Digital innovation & enterprise in the sharing economy: An action research agenda, Aijaz A. Shaikh, Ravishankar Sharma, and Heikki Karjaluoto

Link

Residents' perceptions of smart energy metres, Ahmed Haitham Shuhaiber

PDF

Accurate Segmentation of Cerebrovasculature from TOF-MRA Images Using Appearance Descriptors, Fatma Taher, Ahmed Soliman, Heba Kandil, Ali Mahmoud, Ahmed Shalaby, Georgy Gimel'Farb, and Ayman El-Baz

Link

A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare, Madiha Tahir, Abdallah Tubaishat, Feras Al-Obeidat, Babar Shah, Zahid Halim, and Muhammad Waqas

Link

Screening of Murabaha business process through Quran and hadith: a text mining analysis, Issam Tlemsani, Farhi Marir, and Munir Majdalawieh

Link

Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture, Lewis Tseng, Liwen Wong, Safa Otoum, Moayad Aloqaily, and Jalel Ben Othman

Link

Blockchain-based database in an IoT environment: challenges, opportunities, and analysis, Lewis Tseng, Xinyu Yao, Safa Otoum, Moayad Aloqaily, and Yaser Jararweh

PDF

An energy efficient routing approach for IoT enabled underwater wsns in smart cities, Nighat Usman, Omar Alfandi, Saeeda Usman, Asad Masood Khattak, Muhammad Awais, Bashir Hayat, and Ahthasham Sajid

Link

Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data, Uzma, Feras Al-Obeidat, Abdallah Tubaishat, Babar Shah, and Zahid Halim

Link

Extracting temporal and causal relations based on event networks, Duc Thuan Vo, Feras Al-Obeidat, and Ebrahim Bagheri

Link

Surpassing Real-World Source Training Data: Random 3D Characters for Generalizable Person Re-Identification, Yanan Wang, Shengcai Liao, and Ling Shao

Link

Learning Enriched Features for Real Image Restoration and Enhancement., Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming-Hsuan Yang, and Ling Shao

PDF

On the Validation of Web X.509 Certificates by TLS interception products, Ahmad Samer Wazan, Romain Laborde, David Chadwick, Remi Venant, Abdelmalek Benzekri, Eddie Billoir, and Omar Alfandi

Link

On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao

Link

STAR: A Structure and Texture Aware Retinex Model, Jun Xu, Yingkun Hou, Dongwei Ren, Li Liu, Fan Zhu, Mengyang Yu, Haoqian Wang, and Ling Shao

Link

A novel scalable representative-based forecasting approach of service quality, Hamdi Yahyaoui, Hala S. Own, Ahmed Agwa, and Zakaria Maamar

Link

Video scene parsing: An overview of deep learning methods and datasets, Xiyu Yan, Huihui Gong, Yong Jiang, Shu Tao Xia, Feng Zheng, Xinge You, and Ling Shao

Link

Particle Swarm Optimization Based Swarm Intelligence for Active Learning Improvement: Application on Medical Data Classification, Nawel Zemmal, Nabiha Azizi, Mokhtar Sellami, Soraya Cheriguene, Amel Ziani, Monther AlDwairi, and Nadjette Dendani

Submissions from 2019

PDF

Towards an efficient data fragmentation, allocation, and clustering approach in a distributed environment, Hassan Abdalla and Abdel Monim Artoli

PDF

A New Approach to Information Extraction in User-Centric E-Recruitment Systems, Malik Nabeel Ahmed Awan, Sharifullah Khan, Khalid Latif, and Asad Masood Khattak

Link

MultiPLZW: A novel multiple pattern matching search in LZW-compressed data, Monther Aldwairi, Abdulmughni Y. Hamzah, and Moath Jarrah

Students’ acceptance of CDIO as a crowdsourcing and gamification methodology in IT classrooms: A multiple regression model, Monther Aldwairi and Ahmed Shuhaiber

Link

Empirical Investigation of Key Factors for SaaS Architecture Dimension, Saiqa Aleem, Faheem Ahmed, Rabia Batool, and Asad Khattak

Link

The effect of culture and organisational culture on administrative corruption, Salem A. Al-Jundi, Ahmed Shuhaiber, and Shaban S. Al-Emara

PDF

Effect of consumer innovativeness on new product purchase intentions through learning process and perceived value, Salem A. Al-Jundi, Ahmed Shuhaiber, and Reshmi Augustine

Link

Improving fog computing performance via Fog-2-Fog collaboration, Mohammed Al-khafajiy, Thar Baker, Hilal Al-Libawy, Zakaria Maamar, Moayad Aloqaily, and Yaser Jararweh

PDF

Analysis of WCAG 2.0 data accessibility success criterion of e-government websites, Mohamed Basel Al Mourad, Mohammed Hussein, Faouzi Kamoun, and Zelal Wattar

Link

Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, Andrew Marrington, and Janet C. Read

PDF

Combining machine learning and metaheuristics algorithms for classification method PROAFTN, Feras Al-Obeidat, Nabil Belacel, and Bruce Spencer

Link

Why some people do not use Facebook?, Anas Aloudat, Ons Al-Shamaileh, and Katina Michael

Link

Customer churn prediction in telecommunication industry using data certainty, Adnan Amin, Feras Al-Obeidat, Babar Shah, Awais Adnan, Jonathan Loo, and Sajid Anwar

PDF

Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, and Sajid Anwar

Link

Android malware detection through generative adversarial networks, Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki l.L. Kim, and Sajid Anwar

Link

BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks, Raja Waseem Anwar, Anazida Zainal, Fatma Outay, Ansar Yasar, and Saleem Iqbal

Link

Exploring deep neural networks for rumor detection, Muhammad Zubair Asghar, Ammara Habib, Anam Habib, Adil Khan, Rehman Ali, and Asad Khattak

PDF

A Novel Quality and Reliability-Based Approach for Participants' Selection in Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, and Kiyan Afsari

PDF

Non-Orthogonal Radio Resource Management for RF Energy Harvested 5G Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, and Hyung Seok Kim

PDF

Fog computing enabling industrial internet of things: State-of-the-art and research challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, and Mikael Gidlund

PDF

Triplet loss network for unsupervised domain adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, and Asad Masood Khattak

PDF

Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, and Chirine Ghedira Guegan

Link

ER-AE: Differentially-private Text Generation for Authorship Anonymization, Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, and Farkhund Iqbal

Link

Time efficient segmented technique for dynamic programming based algorithms with FPGA implementation, Talal Bonny, Ridhwan Al Debsi, and Mohamed Basel Almourad

Link

Personalized social query expansion using social annotations, Mohamed Reda Bouadjenek, Hakim Hacid, and Mokrane Bouzeghoub

Link

Integrated database system with spatial information for disaster risk management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, and Ki Il Kim

Link

Improved Identity Management with Verifiable Credentials and FIDO, David W. Chadwick, Romain Laborde, Arnaud Oglaza, Remi Venant, Samer Wazan, and Manreet Nijjar

PDF

An authentic-based privacy preservation protocol for smart e-healthcare systems in iot, B. D. Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi

Link

Learning Stylometric Representations for Authorship Analysis, Steven H.H. Ding, Benjamin C.M. Fung, Farkhund Iqbal, and William K. Cheung

PDF

Unmanned aerial vehicles enabled IoT platform for disaster management, Waleed Ejaz, Muhammad Awais Azam, Salman Saadat, Farkhund Iqbal, and Abdul Hanan

Link

Relevance-based entity selection for ad hoc retrieval, Faezeh Ensan and Feras Al-Obeidat

PDF

Enhanced label noise filtering with multiple voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, and Wajahat Ali Khan

PDF

Enhancing the teaching and learning process using video streaming servers and forecasting techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, and Kamal Uddin Sarker

Link

Social-media based assessment of academic programs, Abdullah Hussein and Mohammed Hussain

Backtracking assessment of IT and engineering courses, Abdullah M. Hussein and Mohammed Hussain

PDF

A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction, Farkhund Iqbal, Jahanzeb Maqbool Hashmi, Benjamin C.M. Fung, Rabia Batool, Asad Masood Khattak, Saiqa Aleem, and Patrick C.K. Hung

Link

Drone forensics: Examination and analysis, Farkhund Iqbal, Benjamin Yankson, Maryam A. AlYammahi, Naeema AlMansoori, Suaad Mohammed Qayed, Babar Shah, and Thar Baker

PDF

Dynamic Adaptation for WPANs Collision Prevention in eHealth Environments, Youssef Iraqi and Loubna Mekouar

Link

IP/MPLS networks with hardened pipes: service concepts, traffic engineering and design considerations, Faouzi Kamoun and Fatma Outay

Link

Success factors model for green computing implementations, Shafaq Naheed Khan, Manal Abdulla Aljaberi, and Suadad Muammar

PDF

Role assigning and taking in cloud computing, Shafaq Naheed Khan, Mathew Nicho, Haifa Takruri, Zakaria Maamar, and Faouzi Kamoun

PDF

A lightweight perceptron-based intrusion detection system for fog computing, Belal Sudqi Khater, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Mohammed Abdulla Hussain, and Ashraf Ahmed Ibrahim

Link

An Efficient Real-Time Data Dissemination Multicast Protocol for Big Data in Wireless Sensor Networks, Beom Su Kim, Monther Aldwairi, and Ki Il Kim

PDF

Wireless sensor networks for big data systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, and Kyong Hoon Kim

Link

A forwarder based temperature aware routing protocol in wireless body area networks, Beom Su Kim, Ki Il Kim, Babar Shah, and Sana Ullah

Link

Automatic identification of rhetorical relations among intra-sentence discourse segments in Arabic, Samira Lagrini, Nabiha Azizi, Mohammed Redjimi, and Monther Al Dwairi

Link

Toward an automatic summarisation of Arabic text depending on rhetorical relations, Samira Lagrini, Nabiha Azizi, Mohammed Redjimi, and Monther Al Dwairi

Link

Semantic Web Services Composition in the astrophysics domain: Issues and solutions, Thierry Louge, Mohamed Hedi Karray, Bernard Archimede, Zakaria Maamar, and Michael Mrissa

Link

Open challenges in vetting the internet‐of‐things, Zakaria Maamar, Ejub Kajan, Muhammad Asim, and Thar Baker Shamsa

PDF

Speech enhancement Algorithm based on super-Gaussian modeling and orthogonal polynomials, Basheera M. Mahmmod, Abd Rahman Ramli, Thar Baker, Feras Al-Obeidat, Sadiq H. Abdulhussain, and Wissam A. Jassim

Link

Research challenges and opportunities in blockchain and cryptocurrencies, Qusay H. Mahmoud, Michael Lescisin, and May AlTaei

Link

What makes Jordanian residents buy smart home devices?: A factorial investigation using PLS-SEM, Ibrahim Mashal and Ahmed Shuhaiber

Link

Impact of Privatisation and Broader Reforms on the Competitiveness of the Cement Manufacturing Industry in Pakistan, Maqsood Memon and Yaseen Ghulam

Link

A metadesign theory for tailorable decision support, Shah Jahan Miah, John G. Gammack, and Judy McKay

Link

A big-data analytics method for capturing visitor activities and flows: the case of an island country, Shah Jahan Miah, Huy Quan Vu, and John Gammack

Link

A Location Analytics Method for the Utilisation of Geotagged Photos in Travel Marketing Decision-Making, Shah Jahan Miah, Huy Quan Vu, and John G. Gammack

PDF

Methodologies for designing healthcare analytics solutions: A literature analysis, Shah J. Miah, John Gammack, and Najmul Hasan

PDF

Follow-up decision support tool for public healthcare: A design research perspective, Shah J. Miah, Najmul Hasan, and John Gammack

PDF

Emerging Insights of Health Informatics Research: A Literature Analysis for Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, and John Gammack

Link

IT governance practices in the Gulf Cooperation Council region, Suadad Muammar and Mathew Nicho

Developing a faster pattern matching algorithms for intrusion detection system, Ibrahim Obeidat and Mazen AlZubi

PDF

Intensive pre-processing of KDD Cup 99 for network intrusion classification using machine learning techniques, Ibrahim M. Obeidat, Nabhan Hamadneh, Mouhammd Alkasassbeh, Mohammad Almseidin, and Mazen Ibrahim AlZubi

Link

Investigation of the impact of a wireless Fog Warning System with respect to road traffic on a highway, Fatma Outay, Absar Ul Haque Ahmar, Faouzi Kamoun, Ansar Ul Haque Yasar, Christoph Sommer, Nafaa Jabeur, and Samar El-Amine

Link

Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach, Fatma Outay, Bilal Taha, Hazar Chaabani, Faouzi Kamoun, Naoufel Werghi, and Ansar Ul Haque Yasar

Link

A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties, Ayesha Qamar, Muhammad Asim, Zakaria Maamar, Saad Saeed, and Thar Baker

Link

Energy production predication via Internet of Thing based machine learning system, Pedro P. Rebouças Filho, Samuel L. Gomes, Navar M.Mendonça e Nascimento, Cláudio M.S. Medeiros, Fatma Outay, and Victor Hugo C. de Albuquerque

Link

A location-sensitive and network-aware broker for recommending Web services, Saad Saeed, Muhammad Asim, Thar Baker, and Zakaria Maamar

PDF

Compromised user credentials detection in a digital enterprise using behavioral analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, and Sajid Anwar

Link

Computer-Aided Diagnostic System for Early Detection of Acute Renal Transplant Rejection Using Diffusion-Weighted MRI, Mohamed Shehata, Fahmi Khalifa, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Mohamed Abou El-Ghar, Amy C. Dwyer, Georgy Gimel'Farb, Robert S. Keynton, and Ayman El-Baz

Link

Understanding users’ acceptance of smart homes, Ahmed Shuhaiber and Ibrahim Mashal

Link

Dynamic Clustering for IoT Key Management in Hostile Application Area, Soumaya Souaidi, Tayeb Kenaza, Badis Djamaa, and Monther Aldwairi