Follow

Submissions from 2021

Link

A Comparative Study of AI-Based Intrusion Detection Techniques in Critical Infrastructures, Safa Otoum, Burak Kantarci, and Hussein Mouftah

Link

Enabling Trustworthiness in Sustainable Energy Infrastructure Through Blockchain and AI-Assisted Solutions, Safa Otoum and Hussein T. Mouftah

Link

Securing Critical IoT Infrastructures with Blockchain-Supported Federated Learning, Safa Otoum, Ismaeel Al Ridhawi, and Hussein Mouftah

Link

Preventing and Controlling Epidemics Through Blockchain-Assisted AI-Enabled Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah

Link

Simulation of connected driving in hazardous weather conditions: General and extensible multiagent architecture and models, Fatma Outay, Stéphane Galland, Nicolas Gaud, and Abdeljalil Abbas-Turki

PDF

Toward an Intelligent Driving Behavior Adjustment Based on Legal Personalized Policies Within the Context of Connected Vehicles, Fatma Outay, Nafaa Jabeur, Hedi Haddad, Zied Bouyahia, and Hana Gharrad

PDF

Multi-level Resource Sharing Framework using Collaborative Fog Environment for Smart Cities, Tariq Qayyum, Zouheir Trabelsi, Asad Waqar Malik, and Kadhim Hayawi

Link

Generalizing AI: Challenges and Opportunities for Plug and Play AI Solutions, Ismaeel Al Ridhawi, Safa Otoum, Moayad Aloqaily, and Azzedine Boukerche

Link

Designing Reduced Congestion Road Networks via an Elitist Adaptive Chemical Reaction Optimization, Sinan Salman and Suzan Alaswad

PDF

Designing a relational model to identify relationships between suspicious customers in anti-money laundering (AML) using social network analysis (SNA), Abdul Khalique Shaikh, Malik Al-Shamli, and Amril Nazir

PDF

Information, communications and media technologies for sustainability: Constructing data-driven policy narratives, Ravishankar Sharma, Aijaz A. Shaikh, Stephen Bekoe, and Gautam Ramasubramanian

PDF

Classification and Analysis of Android Malware Images Using Feature Fusion Technique, Jaiteg Singh, Deepak Thakur, Tanya Gera, Babar Shah, Tamer Abuhmed, and Farman Ali

PDF

Hybrid Approach for Resource Allocation in Cloud Infrastructure Using Random Forest and Genetic Algorithm, Madhusudhan H S, Satish Kumar T, S.M.F D Syed Mustapha, Punit Gupta, and Rajan Prasad Tripathi

PDF

Smart pansharpening approach using kernel-based image filtering, Ahmad A.L. Smadi, Shuyuan Yang, Atif Mehmood, Ahed Abugabah, Min Wang, and Muzaffar Bashir

PDF

The use of mobile payment systems in post-COVID-19 economic recovery: Primary research on an emerging market for experience goods, Maiya M. Suyunchaliyeva, Raghav Nautiyal, Aijaz A. Shaikh, and Ravishankar Sharma

Link

Visual comparison of clustering using link-based clustering method (Lbcm) without predetermining initial centroid information, S. M.F.D. Syed Mustapha, Biju Theruvil, and Mukesh Madanan

PDF

Cerebrovascular segmentation from MRA images, Fatma Taher and Ayman S El-Baz

PDF

A Novel MRA-Based Framework for Segmenting the Cerebrovascular System and Correlating Cerebral Vascular Changes to Mean Arterial Pressure, Fatma Taher, Heba Kandil, Yitzhak Gebru, Ali Mahmoud, Ahmed Shalaby, Shady El‐mashad, and Ayman El‐Baz

PDF

A comprehensive review of retinal vascular and optical nerve diseases based on optical coherence tomography angiography, Fatma Taher, Heba Kandil, Hatem Mahmoud, Ali Mahmoud, Ahmed Shalaby, Mohammed Ghazal, Marah Talal Alhalabi, Harpal Singh Sandhu, and Ayman El-Baz

PDF

Automatic cerebrovascular segmentation methods - a review, Fatma Taher and Neema Prakash

PDF

Early detection of lung cancer - A challenge, Fatma Taher, Neema Prakash, and Ashraf AlZaabi

Link

An Overview of Lung Cancer Classification Algorithms and their Performances, F. Taher, N. Prakash, A. Shaffie, A. Soliman, and A. El-Baz

PDF

Big data quality framework: a holistic approach to continuous quality management, Ikbal Taleb, Mohamed Adel Serhani, Chafik Bouhaddioui, and Rachida Dssouli

Link

Improved sine cosine algorithm with simulated annealing and singer chaotic map for Hadith classification, Mohammad Tubishat, Salinah Ja’afar, Norisma Idris, Mohammed Azmi Al-Betar, Mohammed Alswaitti, Hazim Jarrah, Maizatul Akmar Ismail, and Mardian Shah Omar

PDF

Entropy based features distribution for anti-ddos model in SDN, Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav Dahal, Wajahat Ali Khan, Asad Masood Khattak, and Bashir Hayat

PDF

EfficientNet-Lite and Hybrid CNN-KNN Implementation for Facial Expression Recognition on Raspberry Pi, Mohd Nadhir Ab Wahab, Anthony Tan Zhen Ren, Amril Nazir, Mohd Halim Mohd Noor, Muhammad Firdaus Akbar, and Ahmad Sufril Azlan Mohamed

PDF

Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing, Quadri Waseem, Wan Isni Sofiah Wan Din, Sultan S. Alshamrani, Abdullah Alharbi, and Amril Nazir

Link

Long-distance running training system based on inertial sensor network, Yingjiao Xiang, Baishun Sun, Zhiqin Wang, and Fatma Taher

PDF

Sustainable maritime crude oil transportation: a split pickup and split delivery problem with time windows, Hiba Yahyaoui, Nadia Dahmani, and Saoussen Krichen

Link

Systematic privacy impact assessment scheme for smart connected toys data privacy compliance, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung

Link

Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning, Mang Ye, Jianbing Shen, and Ling Shao

Link

A systematic review of emerging information technologies for sustainable data-centric health-care, Arnob Zahid, Jennifer Kay Poulsen, Ravi Sharma, and Stephen C. Wingreen

PDF

Deceptive Opinions Detection Using New Proposed Arabic Semantic Features, Amel Ziani, Nabiha Azizi, Didier Schwab, Djamel Zenakhra, Monther Aldwairi, Nassira Chekkai, Nawel Zemmal, and Marwa Hadj Salah

PDF

A Novel Efficient Quantum Random Access Memory, Mohammed Zidan, Abdel-Haleem Abdel-Aty, Ashraf Khalil, Mahmoud Abdel-Aty, and Hichem Eleuch

Submissions from 2020

Link

A deep learning-based approach for automatic segmentation and quantification of the left ventricle from cardiac cine MR images, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Norah Saleh Alghamdi, Mohammed Ghazal, Garth Beache, Tamer Mohamed, Robert Keynton, and Ayman El-Baz

PDF

Lean-green manufacturing practices and their link with sustainability: A critical review, Wadhah Abualfaraa, Konstantinos Salonitis, Ahmed Al-Ashaab, and Maher Ala'raj

PDF

Intelligent traffic engineering in software-defined vehicular networking based on multi-path routing, Ahed Abugabah, Ahmad Ali Alzubi, Osama Alfarraj, Mohammed Al-Maitah, and Waleed S. Alnumay

Link

Brain epilepsy seizure detection using bio-inspired krill herd and artificial alga optimized neural network approaches, Ahed Abugabah, Ahmad Ali AlZubi, Mohammed Al-Maitah, and Abdulaziz Alarifi

Link

Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks, Ahed Abugabah, Ahmad Ali AlZubi, Feras Al-Obeidat, Abdulaziz Alarifi, and Ayed Alwadain

PDF

Learning context-aware outfit recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang

PDF

Decentralized Telemedicine Framework for a Smart Healthcare Ecosystem, Ahed Abugabah, Nishara Nizamuddin, and Ahmad Ali Alzubi

Link

Effects of smart city service channel- and user-characteristics on user satisfaction and continuance intention, Taghreed Abu Salim, May El Barachi, Okey Peter Onyia, and Sujith Samuel Mathew

Link

Leveraging cloud computing for the semantic web: review and trends, Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Bani Hani, and Uchitha Jayawickrama

PDF

Improving M-Learners' Performance through Deep Learning Techniques by Leveraging Features Weights, Muhammad Adnan, Asad Habib, Jawad Ashraf, Babar Shah, and Gohar Ali

Link

Integrated agent-based microsimulation framework for examining impacts of mobility-oriented policies, Muhammad Adnan, Fatma Outay, Shiraz Ahmed, Erika Brattich, Silvana di Sabatino, and Davy Janssens

Link

Triggers and connection-making for serendipity via user interface in recommender systems, Ahmad Hassan Afridi and Fatma Outay

Link

Examining queue-jumping phenomenon in heterogeneous traffic stream at signalized intersection using UAV-based data, Afzal Ahmed, Fatma Outay, Syeda Ofaq Raza Zaidi, Muhammad Adnan, and Dong Ngoduy

Link

Dynamic Facial Dataset Capture and Processing for Visual Speech Recognition using an RGB-D Sensor, Naveed Ahmed, Mohammed Lataifeh, and Imran Junejo

Link

On the Pilot Contamination Attack in Multi-Cell Multiuser Massive MIMO Networks, Noman Akbar, Shihao Yan, Asad Masood Khattak, and Nan Yang

PDF

Improving binary classification using filtering based on k-NN proximity graphs, Maher Ala’raj, Munir Majdalawieh, and Maysam F. Abbod

Link

Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection., Monther Aldwairi, Yahya Flaifel, and Khaldoon Mhaidat

Link

KPN-based parallelization of Wu–Manber algorithm on multi-core machines, Monther Aldwairi, Abdulmughni Y. Hamzah, and Moath Jarrah

Link

Efficient and secure flash-based gaming CAPTCHA, Monther Aldwairi, Suaad Mohammed, and Megana Lakshmi Padmanabhan

PDF

Security techniques for intelligent spam sensing and anomaly detection in online social platforms, Monther Aldwairi and Lo'ai Tawalbeh

Link

A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues, Omar Alfandi, Salam Khanji, Liza Ahmad, and Asad Khattak

Link

SynergyChain: Blockchain-assisted Adaptive Cyberphysical P2P Energy Trading, Faizan Ali, Ouns Bouachir, Oznur Ozkasap, and Moayad Aloqaily

Link

Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Omar Alfandi, and Oznur Ozkasap

PDF

A new intra-cluster scheduling scheme for real-time flows in wireless sensor networks, Gohar Ali, Fernando Moreira, Omar Alfandi, Babar Shah, and Mohammed Ilyas

Link

Topic and sentiment aware microblog summarization for twitter, Syed Muhammad Ali, Zeinab Noorian, Ebrahim Bagheri, Chen Ding, and Feras Al-Obeidat

Link

A fixed point iteration approach for analyzing the pull-in dynamics of beam-type electromechanical actuators, Heba Q. ALKafri and Vedat S. Erturk

Link

Probabilistic analysis of security attacks in cloud environment using hidden Markov models, Jamal N. Al-Karaki, Amjad Gawanmeh, Islam T. Almalkawi, and Omar Alfandi

Link

Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model, Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, and Martin Randles

PDF

Defining digital addiction: Key features from the literature, Mohamed Basel Almourad, John McAlaney, Tiffany Skinner, Megan Pleva, and Raian Ali

Link

Consistently accurate forecasts of temperature within buildings from sensor data using ridge and lasso regression, Feras Al-Obeidat, Bruce Spencer, and Omar Alfandi

Link

Identifying major tasks and minor tasks within online reviews, Feras Al-Obeidat, Bruce Spencer, and May Al Taei

Link

An energy trade framework using smart contracts: Overview and challenges, Moayad Aloqaily, Azzedine Boukerche, Ouns Bouachir, Fariea Khalid, and Sobia Jangsher

Link

Providing secure and reliable communication for next generation networks in smart cities, Ismaeel Al Ridhawi, Safa Otoum, Moayad Aloqaily, Yaser Jararweh, and Thar Baker

PDF

A set theory based similarity measure for text clustering and classification, Ali A. Amer and Hassan I. Abdalla

Link

Just-in-time customer churn prediction in the telecommunication sector, Adnan Amin, Feras Al-Obeidat, Babar Shah, May Al Tae, Changez Khan, Hamood Ur Rehman Durrani, and Sajid Anwar

Link

Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert, Sajid Anwar, Feras Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, and Jonathan Loo

PDF

Bodacious-instance coverage mechanism for wireless sensor network, Shahzad Ashraf, Omar Alfandi, Arshad Ahmad, Asad Masood Khattak, Bashir Hayat, Kyong Hoon Kim, and Ayaz Ullah

PDF

Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, and Yaser Jararweh

Link

Neural embedding-based specificity metrics for pre-retrieval query performance prediction, Ebrahim Bagheri, Negar Arabzadeh, Fattane Zarrinkalam, Jelena Jovanovic, and Feras Al-Obeidat

PDF

A Framework for online social network volatile data analysis: A case for the fast fashion industry, Anoud Bani-Hani, Feras Al-Obeidat, Elhadj Benkhelifa, and Oluwasegun Adedugbe

PDF

Selective subtraction for handheld cameras, Adeel A. Bhutta, Imran Nazir Junejo, and Hassan Foroosh

Link

Blockchain and Fog Computining for Cyberphysical Systems: The Case of Smart Industry, Ouns Bouachir, Moayad Aloqaily, Lewis Tseng, and Azzedine Boukerche

Link

Towards a better understanding of drone forensics: A case study of parrot AR drone 2.0, Hana Bouafif, Faouzi Kamoun, and Farkhund Iqbal

Link

Outlier Detection: Methods, Models, and Classification, Azzedine Boukerche, Lining Zheng, and Omar Alfandi

PDF

Business process specification, verification, and deployment in a mono-cloud, multi-edge context, Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, and Zakaria Maamar

PDF

An approach to the acquisition of tacit knowledge based on an ontological model, Wahid Chergui, Samir Zidat, and Farhi Marir

Link

Context-Aware Block Net for Small Object Detection., Lisha Cui, Pei Lv, Xiaoheng Jiang, Zhimin Gao, Bing Zhou, Luming Zhang, Ling Shao, and Mingliang Xu

Link

Collaborative problem-solving through asynchronous discussion, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov

Link

IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging, B. D. Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi

Link

Learning paradigms for communication and computing technologies in IoT systems, Waleed Ejaz, Mehak Basharat, Salman Saadat, Asad Masood Khattak, Muhammad Naeem, and Alagan Anpalagan

PDF

IoV-based Deployment and Scheduling of Charging Infrastructure in Intelligent Transportation Systems, Waleed Ejaz, Muhammad Naeem, Shree Krishna Sharma, Asad Masood Khattak, Muhammad Rashid Ramzan, Amjad Ali, and Alagan Anpalagan

Link

A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders, May El Barachi, Faouzi Kamoun, Abderrazek Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri

PDF

Personalized Computer-Aided Diagnosis for Mild Cognitive Impairment in Alzheimer's Disease Based on sMRI and C PiB-PET Analysis, Fatma El Zahraa A. El-Gamal, Mohammed M. Elmogy, Ashraf Khalil, Mohammed Ghazal, Jawad Yousaf, Xiaolu Qiu, Hassan H. Soliman, Ahmed Atwan, Hermann B. Frieboes, Gregory Neal Barnes, and Ayman S. El-Baz

Link

Preface, Hany El Kady, Qusay H. Mahmoud, Huwida Said, and Omar AlFandi

Link

Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool, Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, and Guy Pujolle

PDF

Computer Aided Autism Diagnosis Using Diffusion Tensor Imaging, Yaser A. Elnakieb, Mohamed T. Ali, Ahmed Soliman, Ali H. Mahmoud, Ahmed M. Shalaby, Norah Saleh Alghamdi, Mohammed Ghazal, Ashraf Khalil, Andrew Switala, Robert S. Keynton, Gregory Neal Barnes, and Ayman El-Baz

Link

User community detection via embedding of social network structure and temporal content, Hossein Fani, Eric Jiang, Ebrahim Bagheri, Feras Al-Obeidat, Weichang Du, and Mehdi Kargar

PDF

Evaluating active traffc management (ATM) strategies under non-recurring congestion: Simulation-based with benefit cost analysis case study, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, and Moulay Youssef El-Hansali

Link

Toward the improvement of traffic incident management systems using Car2X technologies, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, Davy Janssens, Bruno Kochan, and Nafaa Jabeur

Link

Preface to the special issue on web information systems engineering (WISE 2018), Hakim Hacid, Wojciech Cellary, Hua Wang, and Yanchun Zhang

Link

A green, energy, and trust-aware multi-objective cloud coalition formation approach, Souad Hadjres, Fatna Belqasmi, May El Barachi, and Nadjia Kara

PDF

Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss, Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, and Mohammad Mehedy Masud

Link

NLH: A Blind Pixel-Level Non-Local Method for Real-World Image Denoising, Yingkun Hou, Jun Xu, Mingxia Liu, Guanghai Liu, Li Liu, Fan Zhu, and Ling Shao

Link

MCMT-GAN: Multi-Task Coherent Modality Transferable GAN for 3D Brain Image Synthesis, Yawen Huang, Feng Zheng, Runmin Cong, Weilin Huang, Matthew R. Scott, and Ling Shao

PDF

AI Techniques for COVID-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, and Moayad Aloqaily

Link

Trustworthy and sustainable smart city services at the edge, Yaser Jararweh, Safa Otoum, and Ismaeel Al Ridhawi