Follow

Submissions from 2022

PDF

Multi-BSM: An Anomaly Detection and Position Falsification Attack Mitigation Approach in Connected Vehicles, Zouheir Trabelsi, Syed Sarmad Shah, and Kadhim Hayawi

Link

Discriminator-based adversarial networks for knowledge graph completion, Abdallah Tubaishat, Tehseen Zia, Rehana Faiz, Feras Al Obediat, Babar Shah, and David Windridge

Link

Dynamic generalized normal distribution optimization for feature selection, Mohammad Tubishat, Zainab Rawshdeh, Hazim Jarrah, Zenab Mohamed Elgamal, Ashraf Elnagar, and Maen T. Alrashdan

Link

B2S4B: A Platform for Smart City Business Processes Management and Adaptation, Emir Ugljanin, Dragan Stojanović, Ejub Kajan, and Zakaria Maamar

PDF

Detecting High-Risk Factors and Early Diagnosis of Diabetes Using Machine Learning Methods, Zahid Ullah, Farrukh Saleem, Mona Jamjoom, Bahjat Fakieh, Faris Kateb, Abdullah Marish Ali, and Babar Shah

PDF

LogUAD: Log unsupervised anomaly detection based on word2Vec, Jin Wang, Changqing Zhao, Shiming He, Yu Gu, Osama Alfarraj, and Ahed Abugabah

PDF

RootAsRole: a security module to manage the administrative privileges for Linux, Ahmad Samer Wazan, David W Chadwick, Remi Venant, Eddie Billoir, Romain Laborde, Liza Ahmad, and Mustafa Kaiiali

PDF

Augmented Reality-Based English Language Learning: Importance And State Of The Art, Mohammad Wedyan, Jannat Falah, Omar Elshaweesh, Salsabeel F. M. Alfalah, and Moutaz Alazab

Link

Enhanced Gaussian Bare-Bones Grasshopper Optimization: Mitigating the Performance Concerns for Feature Selection, Zhangze Xu, Ali Asghar Heidari, Fangjun Kuang, Ashraf Khalil, Majdi Mafarja, Siyang Zhang, Huiling Chen, and Zhifang Pan

Link

Trust-based management in IoT federations, Hamdi Yahyaoui, Zakaria Maamar, Mohamed Alkhafajiy, and Hamid Al-Hamadi

Link

Reducing Ransomware Crime: Analysis of Victims’ Payment Decisions, Alena Yuryna Connolly and Hervé Borrion

PDF

Autonomous Driving and Connected Mobility Modeling: Smart Dynamic Traffic Monitoring and Enforcement System for Connected and Autonomous Mobility, Dimitrios Zavantis, Fatma Outay, Youssef El-Hansali, Ansar Yasar, Elhadi Shakshuki, and Haroon Malik

PDF

A Novel Text Mining Approach for Mental Health Prediction Using Bi-LSTM and BERT Model, Kamil Zeberga, Muhammad Attique, Babar Shah, Farman Ali, Yalew Zelalem Jembre, and Tae-Sun Chung

PDF

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research, Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, and Fatma Taher

Submissions from 2021

PDF

Boolean logic algebra driven similarity measure for text based applications, Hassan I. Abdalla and Ali A. Amer

PDF

Vector arithmetic in the triangular grid, Khaled Abuhmaidan, Monther Aldwairi, and Benedek Nagy

PDF

Optimal Clustering in Wireless Sensor Networks for the Internet of Things Based on Memetic Algorithm: MemeWSN, Masood Ahmad, Babar Shah, Abrar Ullah, Fernando Moreira, Omar Alfandi, Gohar Ali, and Abdul Hameed

PDF

Niching grey wolf optimizer for multimodal optimization problems, Rasel Ahmed, Amril Nazir, Shuhaimi Mahadzir, Mohammad Shorfuzzaman, and Jahedul Islam

Link

Empirical examination of societal, financial and technology-related challenges amid COVID-19 in service supply chains: evidence from emerging market, Mian M. Ajmal, Mehmood Khan, Muhammad Kashif Shad, Haseena AlKatheeri, and Fauzia Jabeen

Link

Socio-economic and technological new normal in supply chain management: lessons from COVID-19 pandemic, Mian M. Ajmal, Mehmood Khan, Muhammad Kashif Shad, Haseena AlKatheeri, and Fauzia Jabeen

PDF

Modelling customers credit card behaviour using bidirectional LSTM neural networks, Maher Ala’raj, Maysam F. Abbod, and Munir Majdalawieh

PDF

Modeling and forecasting of COVID-19 using a hybrid dynamic model based on SEIRD with ARIMA corrections, Maher Ala'raj, Munir Majdalawieh, and Nishara Nizamuddin

Link

Data-driven based HVAC optimisation approaches: A Systematic Literature Review, Maher Ala’raj, Mohammed Radi, Maysam F. Abbod, Munir Majdalawieh, and Marianela Parodi

Link

Counterfactual explanation of Bayesian model uncertainty, Gohar Ali, Feras Al-Obeidat, Abdallah Tubaishat, Tehseen Zia, Muhammad Ilyas, and Alvaro Rocha

PDF

Estimation and Interpretation of Machine Learning Models with Customized Surrogate Model, Mudabbir Ali, Asad Masood Khattak, Zain Ali, Bashir Hayat, Muhammad Idrees, Zeeshan Pervez, Kashif Rizwan, Tae Eung Sung, and Ki Il Kim

PDF

Digital wellbeing tools through users lens, Mohamed Basel Almourad, Amen Alrobai, Tiffany Skinner, Mohammed Hussain, and Raian Ali

Link

A microservices persistence technique for cloud-based online social data analysis, Feras Al-Obeidat, Anoud Bani-Hani, Oluwasegun Adedugbe, Munir Majdalawieh, and Elhadj Benkhelifa

Link

(CDRGI)-Cancer detection through relevant genes identification, Feras Al-Obeidat, Álvaro Rocha, Maryam Akram, Saad Razzaq, and Fahad Maqbool

Link

Parallel tensor factorization for relational learning, Feras Al-Obeidat, Álvaro Rocha, Muhammad Shahrose Khan, Fahad Maqbool, and Saad Razzaq

Link

Design Guidelines for Blockchain-Assisted 5G-UAV Networks, Moayad Aloqaily, Ouns Bouachir, Azzedine Boukerche, and Ismaeel Al Ridhawi

PDF

SynergyGrids: blockchain-supported distributed microgrid energy trading, Moayad Aloqaily, Ouns Bouachir, Öznur Özkasap, and Faizan Safdar Ali

Link

An Adaptive UAV Positioning Model for Sustainable Smart Transportation, Moayad Aloqaily, Ouns Bouachir, Ismaeel Al Ridhawi, and Anthony Tzes

Link

Trustworthy Cooperative UAV-Based Data Management in Densely Crowded Environments, Moayad Aloqaily, Yaser Jararweh, and Ouns Bouachir

PDF

Hybrid feature selection approach to identify optimal features of profile metadata to detect social bots in Twitter, Eiman Alothali, Kadhim Hayawi, and Hany Alashwal

Link

Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models, Khalifa Al-Room, Farkhund Iqbal, Thar Baker, Babar Shah, Benjamin Yankson, Aine MacDermott, and Patrick C.K. Hung

Link

P2P islamic investments using blockchain, smart contract and E-negotiation, Hasan Al-Sakran and Ons Al-Shamaileh

PDF

An efficient scheme for interference mitigation in 6G-IoT wireless networks, Fahd N. Al-Wesabi, Imran Khan, Nadhem Nemri, Mohammed A. Al-Hagery, Huda G. Iskander, Quang Ngoc Nguyen, Babar Shah, and Ki Il Kim

Link

DL Multi-sensor information fusion service selective information scheme for improving the Internet of Things based user responses, Ahmad A. AlZubi, Ahed Abugabah, Mohammed Al-Maitah, and Firas Ibrahim AlZobi

Link

Enhancing recommendation systems performance using highly-effective similarity measures, Ali A. Amer, Hassan I. Abdalla, and Loc Nguyen

Scalable Edge Computing for IoT and Multimedia Applications Using Machine Learning, Mohammad Babar, Muhammad Sohail Khan, Usman Habib, Babar Shah, Farman Ali, and Dongho Song

Link

ENROUTE: An Entropy Aware Routing Scheme for Information-Centric Networks (ICN), Bitan Banerjee, Sibendu Paul, Omar Alfandi, Arnab Raha, and Amitava Mukherjee

PDF

Data-fusion for epidemiological analysis of covid-19 variants in UAE, Anoud Bani-Hani, Anaïs Lavorel, and Newel Bessadet

Link

A novel sentiment analysis framework for monitoring the evolving public opinion in real-time: Case study on climate change, May El Barachi, Manar AlKhatib, Sujith Mathew, and Farhad Oroumchian

Link

A Survey on Blockchain for Information Systems Management and Security, David Berdik, Safa Otoum, Nikolas Schmidt, Dylan Porter, and Yaser Jararweh

PDF

Real-time privacy preserving framework for Covid-19 contact tracing, Akashdeep Bhardwaj, Ahmed A. Mohamed, Manoj Kumar, Mohammed Alshehri, and Ahed Abugabah

PDF

A comprehensive review on medical diagnosis using machine learning, Kaustubh Arun Bhavsar, Ahed Abugabah, Jimmy Singla, Ahmad Ali AlZubi, Ali Kashif Bashir, and Nikita

PDF

Convolutional Neural Network Based Vehicle Classification in Adverse Illuminous Conditions for Intelligent Transportation Systems, Muhammad Atif Butt, Asad Masood Khattak, Sarmad Shafique, Bashir Hayat, Saima Abid, Ki Il Kim, Muhammad Waqas Ayub, Ahthasham Sajid, and Awais Adnan

PDF

Variational Autoencoders and Wasserstein Generative Adversarial Networks for Improving the Anti-Money Laundering Process, ZhiYuan Chen, Waleed Soliman, Amril Nazir, and Mohammad Shorfuzzaman

Link

Applying the computing professional skills assessment method to esl students in a computing program, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov

Link

Assessment of learning outcomes through an asynchronous on-line discussion board, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov

Link

A multi-model based microservices identification approach, Mohamed Daoud, Asmae El Mezouari, Noura Faci, Djamal Benslimane, Zakaria Maamar, and Aziz El Fazziki

Link

Mitigating Disinformation and Building Trust in Social Media, Joanna F. Defranco, Nir Kshetri, Ravi Sharma, Diana Rojas-Torres, and Jeffrey Voas

Link

Transform-based graph topology similarity metrics, Georgios Drakopoulos, Eleanna Kafeza, Phivos Mylonas, and Lazaros Iliadis

PDF

Smart Dynamic Traffic Monitoring and Enforcement System, Youssef El-Hansali, Fatma Outay, Ansar Yasar, Siham Farrag, Muhammad Shoaib, Muhammad Imran, and Hammad Hussain Awan

PDF

Impact of stress and hypertension on the cerebrovasculature, Nada Elsaid, Ahmed Saied, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohiuddin Hadi, Guruprasad Giridharan, Richard Jennings, Manuel Casanova, Robert Keynton, and Ayman El-Baz

PDF

Early assessment of lung function in coronavirus patients using invariant markers from chest X-rays images, Mohamed Elsharkawy, Ahmed Sharafeldeen, Fatma Taher, Ahmed Shalaby, Ahmed Soliman, Ali Mahmoud, Mohammed Ghazal, Ashraf Khalil, Norah Saleh Alghamdi, Ahmed Abdel Khalek Abdel Razek, Eman Alnaghy, Moumen T. El-Melegy, Harpal Singh Sandhu, Guruprasad A. Giridharan, and Ayman El-Baz

PDF

A Hybrid Machine Learning Framework for Predicting Students’ Performance in Virtual Learning Environment, Edmund Evangelista

Link

A review on the integration of deep learning and service-oriented architecture, Marcelo Fantinato, Sarajane Marques Peres, Eleanna Kafeza, Dickson K.W. Chiu, and Patrick C.K. Hung

Link

A Machine Learning Framework for Handling Delayed/Lost Packets in Tactile Internet Remote Robotic Surgery, Boabang Francis, Amin Ebrahimzadeh, Roch Glitho, Halima Elbiaze, Martin Maier, and Fatna Belqami

PDF

Utility and Professional Attitudes toward Assistive Technology in UAE Special Needs Centers, Mohammad Fteiha, Deena Elsori, Ashraf Khalil, and Ghanem AlBustami

Link

A Coarse-to-Fine Facial Landmark Detection Method Based on Self-attention Mechanism, Pengcheng Gao, Ke Lu, Jian Xue, Ling Shao, and Jiayi Lyu

PDF

Q-learning based routing protocol for congestion avoidance, Daniel Godfrey, Beom Su Kim, Haoran Miao, Babar Shah, Bashir Hayat, Imran Khan, Tae Eung Sung, and Ki Il Kim

Link

Economics of Artificial Intelligence in the Gulf Cooperation Council Countries, Mamduh M. Hanafi, Nir Kshetri, and Ravi Sharma

PDF

Vaccine versus variants (3Vs): Are the COVID-19 vaccines effective against the variants? A systematic review, Kadhim Hayawi, Sakib Shahriar, Mohamed Adel Serhani, Hany Alashwal, and Mohammad M. Masud

Link

ANTi-Vax: A Novel Twitter Dataset for COVID-19 Vaccine Misinformation Detection, Kadhim Hayawi, Sakib Shahriar, Mohamed Adel Serhani, Ikbal Taleb, and Sujith Samuel Mathew

PDF

Adversarial Reconstruction Loss for Domain Generalization, Bekkouch Imad Eddine Ibrahim, Dragos Constantin Nicolae, Adil Khan, S. M. Ahsan Kazmi, Asad Masood Khattak, and Bulat Ibragimov

PDF

Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, and Abdul Rehman Javed

PDF

Tweet-to-Act: Towards Tweet-Mining Framework for Extracting Terrorist Attack-related Information and Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, and Abdul Rehman Javed

Link

COVID-19 Patient Count Prediction Using LSTM, Muhammad Iqbal, Feras Al-Obeidat, Fahad Maqbool, Saad Razzaq, Sajid Anwar, Abdallah Tubaishat, Muhammad Shahrose Khan, and Babar Shah

PDF

Opposition-based Quantum Bat Algorithm to Eliminate Lower-order Harmonics of Multilevel Inverters, Jahedul Islam, Sheikh Tanzim Meraj, Ammar Masaoud, Md Apel Mahmud, Amril Nazir, Muhammad Ashad Kabir, Md Moinul Hossain, and Farhan Mumtaz

Link

A Case Study on the Deployment of a Tactile Internet Application in a Hybrid Cloud, Edge, and Mobile Ad Hoc Cloud Environment, Yassine Jebbar, Nattakorn Promwongsa, Fatna Belqasmi, and Roch H. Glitho

Link

Combining Fields of Experts (FoE) and K-SVD methods in pursuing natural image priors, Feng Jiang, Zhi Yuan Chen, Amril Nazir, Wu Zhen Shi, Wei Xiang Lim, Shao Hui Liu, and Seung Min Rho

Link

Factors affecting managers' intention to adopt green supply chain management practices: evidence from manufacturing firms in Jordan, Luay Jum'a, Muhammad Ikram, Ziad Alkalha, and Maher Alaraj

PDF

Multi-branch Gabor Wavelet Layers for Pedestrian Attribute Recognition, Imran N. Junejo

PDF

Pedestrian attribute recognition using two-branch trainable Gabor wavelets network, Imran N. Junejo

Link

Depthwise Separable Convolutional Neural Networks for Pedestrian Attribute Recognition, Imran N. Junejo and Naveed Ahmed

PDF

Pedestrian attribute recognition using trainable Gabor wavelets, Imran N Junejo, Naveed Ahmed, and Mohammad Lataifeh

Link

An approach to reinforce active learning in higher education for IT students, Sanaa Kaddoura and Fatima Al Husseiny

PDF

A parallelized database damage assessment approach after cyberattack for healthcare systems, Sanaa Kaddoura, Ramzi A. Haraty, Karam Al Kontar, and Omar Alfandi

Link

On-Line Learning on Information Security Based on Critical Thinking Andragogy, Sanaa Kaddoura and Fatima Al Husseiny

PDF

Analyzing the effect of negation in sentiment polarity of facebook dialectal arabic text, Sanaa Kaddoura, Maher Itani, and Chris Roast

Link

From generating process views over inter-organizational business processes to achieving their temporal consistency, Slim Kallel, Saoussen Cheikhrouhou, Zakaria Maamar, Nawal Guermouche, and Mohamed Jmaiel

PDF

A smart dynamic crowd evacuation system for exhibition centers, Faouzi Kamoun, May El Barachi, Fatna Belqasmi, and Abderrazak Hachani

PDF

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments, Bashar Ahmad Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, and Adam Marks

Link

Congestion avoidance in wireless sensor network using software defined network, Ahmed Nawaz Khan, Muhammad Adnan Tariq, Muhammad Asim, Zakaria Maamar, and Thar Baker

Link

Blockchain smart contracts: Applications, challenges, and future trends, Shafaq Naheed Khan, Faiza Loukil, Chirine Ghedira-Guegan, Elhadj Benkhelifa, and Anoud Bani-Hani

PDF

Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security, Belal Sudqi Khater, Ainuddin Wahid Abdul Wahab, Mohd YamaniIdna Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim, Mohammad Arif Amin, and Hisham A. Shehadeh

PDF

Automatic Detection of Citrus Fruit and Leaves Diseases Using Deep Neural Network Model, Asad Khattak, Muhammad Usama Asghar, Ulfat Batool, Muhammad Zubair Asghar, Hayat Ullah, Mabrook Al-Rakhami, and Abdu Gumaei

Link

An efficient deep learning technique for facial emotion recognition, Asad Khattak, Muhammad Zubair Asghar, Mushtaq Ali, and Ulfat Batool

PDF

Enhanced concept-level sentiment analysis system with expanded ontological relations for efficient classification of user reviews, Asad Khattak, Muhammad Zubair Asghar, Zain Ishaq, Waqas Haider Bangyal, and Ibrahim A. Hameed

PDF

Hybrid Deep Learning Architecture to Forecast Maximum Load Duration Using Time-of-Use Pricing Plans, Jinseok Kim, Babar Shah, and Ki Il Kim

Link

Survey on communication for mobile sinks in wireless sensor networks: Mobility pattern perspective, Sangdae Kim, Beom Su Kim, Babar Shah, Sana Ullah, and Ki Il Kim

Link

Computing and socioeconomic transformations, Nir Kshetri, Jeffrey Voas, and Ravi Sharma

MyMajor: Assisting IT students with major selection, Mohammad A. Kuhail, Haseena Al Katheeri, and Joao Negreiros

PDF

Characterizing Visual Programming Approaches for End-User Developers: A Systematic Review, Mohammad Amin Kuhail, Shahbano Farooq, Rawad Hammad, and Mohammed Bahja

Link

Teaching Recursive Thinking using Unplugged Activities, Mohammad A. Kuhail, Joao Negreiros, and Ahmed Seffah

PDF

Automatic Fall Risk Detection based on Imbalanced Data, Yen-Hung Liu, Patrick C. K. Hung, Farkhund Iqbal, and Benjamin C. M. Fung

PDF

Swarm Differential Privacy for Purpose-Driven Data-Information-Knowledge-Wisdom Architecture, Yingbo Li, Yucong Duan, Zakaria Maamar, Haoyang Che, Anamaria-Beatrice Spulber, and Stelios Fuentes

Link

Time-centric and resource-driven composition for the Internet of Things, Zakaria Maamar, Noura Faci, Mohammed Al-Khafajiy, and Murtada Dohan

Link

Semantic thingsourcing for the Internet of Things, Zakaria Maamar, Noura Faci, Said Elnaffar, Fadwa Yahya, Khouloud Boukadi, and Djamal Benslimane