Submissions from 2021
Classification and Analysis of Android Malware Images Using Feature Fusion Technique, Jaiteg Singh, Deepak Thakur, Tanya Gera, Babar Shah, Tamer Abuhmed, and Farman Ali
Hybrid Approach for Resource Allocation in Cloud Infrastructure Using Random Forest and Genetic Algorithm, Madhusudhan H S, Satish Kumar T, S.M.F D Syed Mustapha, Punit Gupta, and Rajan Prasad Tripathi
Smart pansharpening approach using kernel-based image filtering, Ahmad A.L. Smadi, Shuyuan Yang, Atif Mehmood, Ahed Abugabah, Min Wang, and Muzaffar Bashir
The use of mobile payment systems in post-COVID-19 economic recovery: Primary research on an emerging market for experience goods, Maiya M. Suyunchaliyeva, Raghav Nautiyal, Aijaz A. Shaikh, and Ravishankar Sharma
Visual comparison of clustering using link-based clustering method (Lbcm) without predetermining initial centroid information, S. M.F.D. Syed Mustapha, Biju Theruvil, and Mukesh Madanan
Cerebrovascular segmentation from MRA images, Fatma Taher and Ayman S El-Baz
A Novel MRA-Based Framework for Segmenting the Cerebrovascular System and Correlating Cerebral Vascular Changes to Mean Arterial Pressure, Fatma Taher, Heba Kandil, Yitzhak Gebru, Ali Mahmoud, Ahmed Shalaby, Shady El‐mashad, and Ayman El‐Baz
A comprehensive review of retinal vascular and optical nerve diseases based on optical coherence tomography angiography, Fatma Taher, Heba Kandil, Hatem Mahmoud, Ali Mahmoud, Ahmed Shalaby, Mohammed Ghazal, Marah Talal Alhalabi, Harpal Singh Sandhu, and Ayman El-Baz
Automatic cerebrovascular segmentation methods - a review, Fatma Taher and Neema Prakash
Early detection of lung cancer - A challenge, Fatma Taher, Neema Prakash, and Ashraf AlZaabi
An Overview of Lung Cancer Classification Algorithms and their Performances, F. Taher, N. Prakash, A. Shaffie, A. Soliman, and A. El-Baz
Big data quality framework: a holistic approach to continuous quality management, Ikbal Taleb, Mohamed Adel Serhani, Chafik Bouhaddioui, and Rachida Dssouli
Improved sine cosine algorithm with simulated annealing and singer chaotic map for Hadith classification, Mohammad Tubishat, Salinah Ja’afar, Norisma Idris, Mohammed Azmi Al-Betar, Mohammed Alswaitti, Hazim Jarrah, Maizatul Akmar Ismail, and Mardian Shah Omar
Entropy based features distribution for anti-ddos model in SDN, Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav Dahal, Wajahat Ali Khan, Asad Masood Khattak, and Bashir Hayat
EfficientNet-Lite and Hybrid CNN-KNN Implementation for Facial Expression Recognition on Raspberry Pi, Mohd Nadhir Ab Wahab, Anthony Tan Zhen Ren, Amril Nazir, Mohd Halim Mohd Noor, Muhammad Firdaus Akbar, and Ahmad Sufril Azlan Mohamed
Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing, Quadri Waseem, Wan Isni Sofiah Wan Din, Sultan S. Alshamrani, Abdullah Alharbi, and Amril Nazir
Long-distance running training system based on inertial sensor network, Yingjiao Xiang, Baishun Sun, Zhiqin Wang, and Fatma Taher
Sustainable maritime crude oil transportation: a split pickup and split delivery problem with time windows, Hiba Yahyaoui, Nadia Dahmani, and Saoussen Krichen
Systematic privacy impact assessment scheme for smart connected toys data privacy compliance, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung
Visible-Infrared Person Re-Identification via Homogeneous Augmented Tri-Modal Learning, Mang Ye, Jianbing Shen, and Ling Shao
A systematic review of emerging information technologies for sustainable data-centric health-care, Arnob Zahid, Jennifer Kay Poulsen, Ravi Sharma, and Stephen C. Wingreen
Deceptive Opinions Detection Using New Proposed Arabic Semantic Features, Amel Ziani, Nabiha Azizi, Didier Schwab, Djamel Zenakhra, Monther Aldwairi, Nassira Chekkai, Nawel Zemmal, and Marwa Hadj Salah
A Novel Efficient Quantum Random Access Memory, Mohammed Zidan, Abdel-Haleem Abdel-Aty, Ashraf Khalil, Mahmoud Abdel-Aty, and Hichem Eleuch
Submissions from 2020
A deep learning-based approach for automatic segmentation and quantification of the left ventricle from cardiac cine MR images, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Norah Saleh Alghamdi, Mohammed Ghazal, Garth Beache, Tamer Mohamed, Robert Keynton, and Ayman El-Baz
Lean-green manufacturing practices and their link with sustainability: A critical review, Wadhah Abualfaraa, Konstantinos Salonitis, Ahmed Al-Ashaab, and Maher Ala'raj
Intelligent traffic engineering in software-defined vehicular networking based on multi-path routing, Ahed Abugabah, Ahmad Ali Alzubi, Osama Alfarraj, Mohammed Al-Maitah, and Waleed S. Alnumay
Brain epilepsy seizure detection using bio-inspired krill herd and artificial alga optimized neural network approaches, Ahed Abugabah, Ahmad Ali AlZubi, Mohammed Al-Maitah, and Abdulaziz Alarifi
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks, Ahed Abugabah, Ahmad Ali AlZubi, Feras Al-Obeidat, Abdulaziz Alarifi, and Ayed Alwadain
Learning context-aware outfit recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang
Decentralized Telemedicine Framework for a Smart Healthcare Ecosystem, Ahed Abugabah, Nishara Nizamuddin, and Ahmad Ali Alzubi
Effects of smart city service channel- and user-characteristics on user satisfaction and continuance intention, Taghreed Abu Salim, May El Barachi, Okey Peter Onyia, and Sujith Samuel Mathew
Leveraging cloud computing for the semantic web: review and trends, Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Bani Hani, and Uchitha Jayawickrama
Improving M-Learners' Performance through Deep Learning Techniques by Leveraging Features Weights, Muhammad Adnan, Asad Habib, Jawad Ashraf, Babar Shah, and Gohar Ali
Integrated agent-based microsimulation framework for examining impacts of mobility-oriented policies, Muhammad Adnan, Fatma Outay, Shiraz Ahmed, Erika Brattich, Silvana di Sabatino, and Davy Janssens
Triggers and connection-making for serendipity via user interface in recommender systems, Ahmad Hassan Afridi and Fatma Outay
Examining queue-jumping phenomenon in heterogeneous traffic stream at signalized intersection using UAV-based data, Afzal Ahmed, Fatma Outay, Syeda Ofaq Raza Zaidi, Muhammad Adnan, and Dong Ngoduy
Dynamic Facial Dataset Capture and Processing for Visual Speech Recognition using an RGB-D Sensor, Naveed Ahmed, Mohammed Lataifeh, and Imran Junejo
On the Pilot Contamination Attack in Multi-Cell Multiuser Massive MIMO Networks, Noman Akbar, Shihao Yan, Asad Masood Khattak, and Nan Yang
Improving binary classification using filtering based on k-NN proximity graphs, Maher Ala’raj, Munir Majdalawieh, and Maysam F. Abbod
Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection., Monther Aldwairi, Yahya Flaifel, and Khaldoon Mhaidat
KPN-based parallelization of Wu–Manber algorithm on multi-core machines, Monther Aldwairi, Abdulmughni Y. Hamzah, and Moath Jarrah
Efficient and secure flash-based gaming CAPTCHA, Monther Aldwairi, Suaad Mohammed, and Megana Lakshmi Padmanabhan
Security techniques for intelligent spam sensing and anomaly detection in online social platforms, Monther Aldwairi and Lo'ai Tawalbeh
A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues, Omar Alfandi, Salam Khanji, Liza Ahmad, and Asad Khattak
SynergyChain: Blockchain-assisted Adaptive Cyberphysical P2P Energy Trading, Faizan Ali, Ouns Bouachir, Oznur Ozkasap, and Moayad Aloqaily
Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Omar Alfandi, and Oznur Ozkasap
A new intra-cluster scheduling scheme for real-time flows in wireless sensor networks, Gohar Ali, Fernando Moreira, Omar Alfandi, Babar Shah, and Mohammed Ilyas
Topic and sentiment aware microblog summarization for twitter, Syed Muhammad Ali, Zeinab Noorian, Ebrahim Bagheri, Chen Ding, and Feras Al-Obeidat
A fixed point iteration approach for analyzing the pull-in dynamics of beam-type electromechanical actuators, Heba Q. ALKafri and Vedat S. Erturk
Probabilistic analysis of security attacks in cloud environment using hidden Markov models, Jamal N. Al-Karaki, Amjad Gawanmeh, Islam T. Almalkawi, and Omar Alfandi
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model, Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, and Martin Randles
Defining digital addiction: Key features from the literature, Mohamed Basel Almourad, John McAlaney, Tiffany Skinner, Megan Pleva, and Raian Ali
Consistently accurate forecasts of temperature within buildings from sensor data using ridge and lasso regression, Feras Al-Obeidat, Bruce Spencer, and Omar Alfandi
Identifying major tasks and minor tasks within online reviews, Feras Al-Obeidat, Bruce Spencer, and May Al Taei
An energy trade framework using smart contracts: Overview and challenges, Moayad Aloqaily, Azzedine Boukerche, Ouns Bouachir, Fariea Khalid, and Sobia Jangsher
Providing secure and reliable communication for next generation networks in smart cities, Ismaeel Al Ridhawi, Safa Otoum, Moayad Aloqaily, Yaser Jararweh, and Thar Baker
A set theory based similarity measure for text clustering and classification, Ali A. Amer and Hassan I. Abdalla
Just-in-time customer churn prediction in the telecommunication sector, Adnan Amin, Feras Al-Obeidat, Babar Shah, May Al Tae, Changez Khan, Hamood Ur Rehman Durrani, and Sajid Anwar
Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert, Sajid Anwar, Feras Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, and Jonathan Loo
Bodacious-instance coverage mechanism for wireless sensor network, Shahzad Ashraf, Omar Alfandi, Arshad Ahmad, Asad Masood Khattak, Bashir Hayat, Kyong Hoon Kim, and Ayaz Ullah
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, and Yaser Jararweh
Neural embedding-based specificity metrics for pre-retrieval query performance prediction, Ebrahim Bagheri, Negar Arabzadeh, Fattane Zarrinkalam, Jelena Jovanovic, and Feras Al-Obeidat
A Framework for online social network volatile data analysis: A case for the fast fashion industry, Anoud Bani-Hani, Feras Al-Obeidat, Elhadj Benkhelifa, and Oluwasegun Adedugbe
Selective subtraction for handheld cameras, Adeel A. Bhutta, Imran Nazir Junejo, and Hassan Foroosh
Blockchain and Fog Computining for Cyberphysical Systems: The Case of Smart Industry, Ouns Bouachir, Moayad Aloqaily, Lewis Tseng, and Azzedine Boukerche
Towards a better understanding of drone forensics: A case study of parrot AR drone 2.0, Hana Bouafif, Faouzi Kamoun, and Farkhund Iqbal
Outlier Detection: Methods, Models, and Classification, Azzedine Boukerche, Lining Zheng, and Omar Alfandi
Business process specification, verification, and deployment in a mono-cloud, multi-edge context, Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, and Zakaria Maamar
An approach to the acquisition of tacit knowledge based on an ontological model, Wahid Chergui, Samir Zidat, and Farhi Marir
Context-Aware Block Net for Small Object Detection., Lisha Cui, Pei Lv, Xiaoheng Jiang, Zhimin Gao, Bing Zhou, Luming Zhang, Ling Shao, and Mingliang Xu
Collaborative problem-solving through asynchronous discussion, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging, B. D. Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi
Learning paradigms for communication and computing technologies in IoT systems, Waleed Ejaz, Mehak Basharat, Salman Saadat, Asad Masood Khattak, Muhammad Naeem, and Alagan Anpalagan
IoV-based Deployment and Scheduling of Charging Infrastructure in Intelligent Transportation Systems, Waleed Ejaz, Muhammad Naeem, Shree Krishna Sharma, Asad Masood Khattak, Muhammad Rashid Ramzan, Amjad Ali, and Alagan Anpalagan
A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders, May El Barachi, Faouzi Kamoun, Abderrazek Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
Personalized Computer-Aided Diagnosis for Mild Cognitive Impairment in Alzheimer's Disease Based on sMRI and C PiB-PET Analysis, Fatma El Zahraa A. El-Gamal, Mohammed M. Elmogy, Ashraf Khalil, Mohammed Ghazal, Jawad Yousaf, Xiaolu Qiu, Hassan H. Soliman, Ahmed Atwan, Hermann B. Frieboes, Gregory Neal Barnes, and Ayman S. El-Baz
Preface, Hany El Kady, Qusay H. Mahmoud, Huwida Said, and Omar AlFandi
Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool, Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, and Guy Pujolle
Computer Aided Autism Diagnosis Using Diffusion Tensor Imaging, Yaser A. Elnakieb, Mohamed T. Ali, Ahmed Soliman, Ali H. Mahmoud, Ahmed M. Shalaby, Norah Saleh Alghamdi, Mohammed Ghazal, Ashraf Khalil, Andrew Switala, Robert S. Keynton, Gregory Neal Barnes, and Ayman El-Baz
User community detection via embedding of social network structure and temporal content, Hossein Fani, Eric Jiang, Ebrahim Bagheri, Feras Al-Obeidat, Weichang Du, and Mehdi Kargar
Evaluating active traffc management (ATM) strategies under non-recurring congestion: Simulation-based with benefit cost analysis case study, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, and Moulay Youssef El-Hansali
Toward the improvement of traffic incident management systems using Car2X technologies, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, Davy Janssens, Bruno Kochan, and Nafaa Jabeur
Preface to the special issue on web information systems engineering (WISE 2018), Hakim Hacid, Wojciech Cellary, Hua Wang, and Yanchun Zhang
A green, energy, and trust-aware multi-objective cloud coalition formation approach, Souad Hadjres, Fatna Belqasmi, May El Barachi, and Nadjia Kara
Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss, Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, and Mohammad Mehedy Masud
NLH: A Blind Pixel-Level Non-Local Method for Real-World Image Denoising, Yingkun Hou, Jun Xu, Mingxia Liu, Guanghai Liu, Li Liu, Fan Zhu, and Ling Shao
MCMT-GAN: Multi-Task Coherent Modality Transferable GAN for 3D Brain Image Synthesis, Yawen Huang, Feng Zheng, Runmin Cong, Weilin Huang, Matthew R. Scott, and Ling Shao
AI Techniques for COVID-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, and Moayad Aloqaily
Trustworthy and sustainable smart city services at the edge, Yaser Jararweh, Safa Otoum, and Ismaeel Al Ridhawi
A multi-branch separable convolution neural network for pedestrian attribute recognition, Imran N. Junejo and Naveed Ahmed
Developing a green curriculum for introduction to information technology course, Sanaa Kaddoura
T-PCCE: Twitter Personality based Communicative Communities Extraction System for Big Data, Eleanna Kafeza, Andreas Kanavos, Christos Makris, Georgios Pispirigos, and Pantelis Vikatos
Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter, Eleanna Kafeza, Christos Makris, Gerasimos Rompolas, and Feras Al-Obeidat
The IASO Self-Reporting System, Faouzi Kamoun, May El Barachi, Russell Hamilton, and Ahmed Ben Hadj Khelifa
A novel computer-aided diagnosis system for the early detection of hypertension based on cerebrovascular alterations, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Ashraf Khalil, Guruprasad Giridharan, Robert Keynton, J. Richard Jennings, and Ayman El-Baz
An Assortment of Evolutionary Computation Techniques (AECT) in gaming, Maham Khalid, Feras Al-Obeidat, Abdallah Tubaishat, Babar Shah, Saad Razzaq, Fahad Maqbool, and Muhammad Ilyas
Investigating Bias in Facial Analysis Systems: A Systematic Review, Ashraf Khalil, Soha Glal Ahmed, Asad Masood Khattak, and Nabeel Al-Qirim
On the optimality of route selection in grid wireless sensor networks: Theory and applications, Yaser Khamayseh, Wail Mardini, Monther Aldwairi, and Hussein Mouftah
A survey on sentiment analysis in Urdu: A resource-poor language, Asad Khattak, Muhammad Zubair Asghar, Anam Saeed, Ibrahim A. Hameed, Syed Asif Hassan, and Shakeel Ahmad
Applying deep neural networks for user intention identification, Asad Khattak, Anam Habib, Muhammad Zubair Asghar, Fazli Subhan, Imran Razzak, and Ammara Habib