Submissions from 2020
Brain epilepsy seizure detection using bio-inspired krill herd and artificial alga optimized neural network approaches, Ahed Abugabah, Ahmad Ali AlZubi, Mohammed Al-Maitah, and Abdulaziz Alarifi
Data mining techniques for analyzing healthcare conditions of urban space-person lung using meta-heuristic optimized neural networks, Ahed Abugabah, Ahmad Ali AlZubi, Feras Al-Obeidat, Abdulaziz Alarifi, and Ayed Alwadain
Learning context-aware outfit recommendation, Ahed Abugabah, Xiaochun Cheng, and Jianfeng Wang
Decentralized Telemedicine Framework for a Smart Healthcare Ecosystem, Ahed Abugabah, Nishara Nizamuddin, and Ahmad Ali Alzubi
Effects of smart city service channel- and user-characteristics on user satisfaction and continuance intention, Taghreed Abu Salim, May El Barachi, Okey Peter Onyia, and Sujith Samuel Mathew
Leveraging cloud computing for the semantic web: review and trends, Oluwasegun Adedugbe, Elhadj Benkhelifa, Russell Campion, Feras Al-Obeidat, Anoud Bani Hani, and Uchitha Jayawickrama
Improving M-Learners' Performance through Deep Learning Techniques by Leveraging Features Weights, Muhammad Adnan, Asad Habib, Jawad Ashraf, Babar Shah, and Gohar Ali
Integrated agent-based microsimulation framework for examining impacts of mobility-oriented policies, Muhammad Adnan, Fatma Outay, Shiraz Ahmed, Erika Brattich, Silvana di Sabatino, and Davy Janssens
Triggers and connection-making for serendipity via user interface in recommender systems, Ahmad Hassan Afridi and Fatma Outay
Examining queue-jumping phenomenon in heterogeneous traffic stream at signalized intersection using UAV-based data, Afzal Ahmed, Fatma Outay, Syeda Ofaq Raza Zaidi, Muhammad Adnan, and Dong Ngoduy
Dynamic Facial Dataset Capture and Processing for Visual Speech Recognition using an RGB-D Sensor, Naveed Ahmed, Mohammed Lataifeh, and Imran Junejo
On the Pilot Contamination Attack in Multi-Cell Multiuser Massive MIMO Networks, Noman Akbar, Shihao Yan, Asad Masood Khattak, and Nan Yang
Improving binary classification using filtering based on k-NN proximity graphs, Maher Ala’raj, Munir Majdalawieh, and Maysam F. Abbod
Efficient Wu-Manber Pattern Matching Hardware for Intrusion and Malware Detection., Monther Aldwairi, Yahya Flaifel, and Khaldoon Mhaidat
KPN-based parallelization of Wu–Manber algorithm on multi-core machines, Monther Aldwairi, Abdulmughni Y. Hamzah, and Moath Jarrah
Efficient and secure flash-based gaming CAPTCHA, Monther Aldwairi, Suaad Mohammed, and Megana Lakshmi Padmanabhan
Security techniques for intelligent spam sensing and anomaly detection in online social platforms, Monther Aldwairi and Lo'ai Tawalbeh
A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues, Omar Alfandi, Salam Khanji, Liza Ahmad, and Asad Khattak
SynergyChain: Blockchain-assisted Adaptive Cyberphysical P2P Energy Trading, Faizan Ali, Ouns Bouachir, Oznur Ozkasap, and Moayad Aloqaily
Cyberphysical Blockchain-Enabled Peer-to-Peer Energy Trading, Faizan Safdar Ali, Moayad Aloqaily, Omar Alfandi, and Oznur Ozkasap
A new intra-cluster scheduling scheme for real-time flows in wireless sensor networks, Gohar Ali, Fernando Moreira, Omar Alfandi, Babar Shah, and Mohammed Ilyas
Topic and sentiment aware microblog summarization for twitter, Syed Muhammad Ali, Zeinab Noorian, Ebrahim Bagheri, Chen Ding, and Feras Al-Obeidat
A fixed point iteration approach for analyzing the pull-in dynamics of beam-type electromechanical actuators, Heba Q. ALKafri and Vedat S. Erturk
Probabilistic analysis of security attacks in cloud environment using hidden Markov models, Jamal N. Al-Karaki, Amjad Gawanmeh, Islam T. Almalkawi, and Omar Alfandi
Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog Model, Mohammed Al-Khafajiy, Safa Otoum, Thar Baker, Muhammad Asim, Zakaria Maamar, Moayad Aloqaily, Mark Taylor, and Martin Randles
Defining digital addiction: Key features from the literature, Mohamed Basel Almourad, John McAlaney, Tiffany Skinner, Megan Pleva, and Raian Ali
Consistently accurate forecasts of temperature within buildings from sensor data using ridge and lasso regression, Feras Al-Obeidat, Bruce Spencer, and Omar Alfandi
Identifying major tasks and minor tasks within online reviews, Feras Al-Obeidat, Bruce Spencer, and May Al Taei
An energy trade framework using smart contracts: Overview and challenges, Moayad Aloqaily, Azzedine Boukerche, Ouns Bouachir, Fariea Khalid, and Sobia Jangsher
Providing secure and reliable communication for next generation networks in smart cities, Ismaeel Al Ridhawi, Safa Otoum, Moayad Aloqaily, Yaser Jararweh, and Thar Baker
A set theory based similarity measure for text clustering and classification, Ali A. Amer and Hassan I. Abdalla
Just-in-time customer churn prediction in the telecommunication sector, Adnan Amin, Feras Al-Obeidat, Babar Shah, May Al Tae, Changez Khan, Hamood Ur Rehman Durrani, and Sajid Anwar
Countering Malicious URLs in Internet of Things Using a Knowledge-Based Approach and a Simulated Expert, Sajid Anwar, Feras Al-Obeidat, Abdallah Tubaishat, Sadia Din, Awais Ahmad, Fakhri Alam Khan, Gwanggil Jeon, and Jonathan Loo
Bodacious-instance coverage mechanism for wireless sensor network, Shahzad Ashraf, Omar Alfandi, Arshad Ahmad, Asad Masood Khattak, Bashir Hayat, Kyong Hoon Kim, and Ayaz Ullah
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography, Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Salman Yussof, Omar Alfandi, Ahed Abugabah, and Yaser Jararweh
Neural embedding-based specificity metrics for pre-retrieval query performance prediction, Ebrahim Bagheri, Negar Arabzadeh, Fattane Zarrinkalam, Jelena Jovanovic, and Feras Al-Obeidat
A Framework for online social network volatile data analysis: A case for the fast fashion industry, Anoud Bani-Hani, Feras Al-Obeidat, Elhadj Benkhelifa, and Oluwasegun Adedugbe
Selective subtraction for handheld cameras, Adeel A. Bhutta, Imran Nazir Junejo, and Hassan Foroosh
Blockchain and Fog Computining for Cyberphysical Systems: The Case of Smart Industry, Ouns Bouachir, Moayad Aloqaily, Lewis Tseng, and Azzedine Boukerche
Towards a better understanding of drone forensics: A case study of parrot AR drone 2.0, Hana Bouafif, Faouzi Kamoun, and Farkhund Iqbal
Outlier Detection: Methods, Models, and Classification, Azzedine Boukerche, Lining Zheng, and Omar Alfandi
Business process specification, verification, and deployment in a mono-cloud, multi-edge context, Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, and Zakaria Maamar
An approach to the acquisition of tacit knowledge based on an ontological model, Wahid Chergui, Samir Zidat, and Farhi Marir
Context-Aware Block Net for Small Object Detection., Lisha Cui, Pei Lv, Xiaoheng Jiang, Zhimin Gao, Bing Zhou, Luming Zhang, Ling Shao, and Mingliang Xu
Collaborative problem-solving through asynchronous discussion, Maurice Danaher, Anthony Rhodes, and Ashley Ater Kranov
IoT-BSFCAN: A smart context-aware system in IoT-Cloud using mobile-fogging, B. D. Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi
Learning paradigms for communication and computing technologies in IoT systems, Waleed Ejaz, Mehak Basharat, Salman Saadat, Asad Masood Khattak, Muhammad Naeem, and Alagan Anpalagan
IoV-based Deployment and Scheduling of Charging Infrastructure in Intelligent Transportation Systems, Waleed Ejaz, Muhammad Naeem, Shree Krishna Sharma, Asad Masood Khattak, Muhammad Rashid Ramzan, Amjad Ali, and Alagan Anpalagan
A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders, May El Barachi, Faouzi Kamoun, Abderrazek Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
Personalized Computer-Aided Diagnosis for Mild Cognitive Impairment in Alzheimer's Disease Based on sMRI and C PiB-PET Analysis, Fatma El Zahraa A. El-Gamal, Mohammed M. Elmogy, Ashraf Khalil, Mohammed Ghazal, Jawad Yousaf, Xiaolu Qiu, Hassan H. Soliman, Ahmed Atwan, Hermann B. Frieboes, Gregory Neal Barnes, and Ayman S. El-Baz
Preface, Hany El Kady, Qusay H. Mahmoud, Huwida Said, and Omar AlFandi
Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool, Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, and Guy Pujolle
Computer Aided Autism Diagnosis Using Diffusion Tensor Imaging, Yaser A. Elnakieb, Mohamed T. Ali, Ahmed Soliman, Ali H. Mahmoud, Ahmed M. Shalaby, Norah Saleh Alghamdi, Mohammed Ghazal, Ashraf Khalil, Andrew Switala, Robert S. Keynton, Gregory Neal Barnes, and Ayman El-Baz
User community detection via embedding of social network structure and temporal content, Hossein Fani, Eric Jiang, Ebrahim Bagheri, Feras Al-Obeidat, Weichang Du, and Mehdi Kargar
Evaluating active traffc management (ATM) strategies under non-recurring congestion: Simulation-based with benefit cost analysis case study, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, and Moulay Youssef El-Hansali
Toward the improvement of traffic incident management systems using Car2X technologies, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, Davy Janssens, Bruno Kochan, and Nafaa Jabeur
Preface to the special issue on web information systems engineering (WISE 2018), Hakim Hacid, Wojciech Cellary, Hua Wang, and Yanchun Zhang
A green, energy, and trust-aware multi-objective cloud coalition formation approach, Souad Hadjres, Fatna Belqasmi, May El Barachi, and Nadjia Kara
Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss, Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, and Mohammad Mehedy Masud
NLH: A Blind Pixel-Level Non-Local Method for Real-World Image Denoising, Yingkun Hou, Jun Xu, Mingxia Liu, Guanghai Liu, Li Liu, Fan Zhu, and Ling Shao
MCMT-GAN: Multi-Task Coherent Modality Transferable GAN for 3D Brain Image Synthesis, Yawen Huang, Feng Zheng, Runmin Cong, Weilin Huang, Matthew R. Scott, and Ling Shao
AI Techniques for COVID-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, and Moayad Aloqaily
Trustworthy and sustainable smart city services at the edge, Yaser Jararweh, Safa Otoum, and Ismaeel Al Ridhawi
A multi-branch separable convolution neural network for pedestrian attribute recognition, Imran N. Junejo and Naveed Ahmed
Developing a green curriculum for introduction to information technology course, Sanaa Kaddoura
T-PCCE: Twitter Personality based Communicative Communities Extraction System for Big Data, Eleanna Kafeza, Andreas Kanavos, Christos Makris, Georgios Pispirigos, and Pantelis Vikatos
Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter, Eleanna Kafeza, Christos Makris, Gerasimos Rompolas, and Feras Al-Obeidat
The IASO Self-Reporting System, Faouzi Kamoun, May El Barachi, Russell Hamilton, and Ahmed Ben Hadj Khelifa
A novel computer-aided diagnosis system for the early detection of hypertension based on cerebrovascular alterations, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Ashraf Khalil, Guruprasad Giridharan, Robert Keynton, J. Richard Jennings, and Ayman El-Baz
An Assortment of Evolutionary Computation Techniques (AECT) in gaming, Maham Khalid, Feras Al-Obeidat, Abdallah Tubaishat, Babar Shah, Saad Razzaq, Fahad Maqbool, and Muhammad Ilyas
Investigating Bias in Facial Analysis Systems: A Systematic Review, Ashraf Khalil, Soha Glal Ahmed, Asad Masood Khattak, and Nabeel Al-Qirim
On the optimality of route selection in grid wireless sensor networks: Theory and applications, Yaser Khamayseh, Wail Mardini, Monther Aldwairi, and Hussein Mouftah
A survey on sentiment analysis in Urdu: A resource-poor language, Asad Khattak, Muhammad Zubair Asghar, Anam Saeed, Ibrahim A. Hameed, Syed Asif Hassan, and Shakeel Ahmad
Applying deep neural networks for user intention identification, Asad Khattak, Anam Habib, Muhammad Zubair Asghar, Fazli Subhan, Imran Razzak, and Ammara Habib
Tweets classification and sentiment analysis for personalized tweets recommendation, Asad Masood Khattak, Rabia Batool, Fahad Ahmed Satti, Jamil Hussain, Wajahat Ali Khan, Adil Mehmood Khan, and Bashir Hayat
Fine-grained sentiment analysis for measuring customer satisfaction using an extended set of fuzzy linguistic hedges, Asad Khattak, Waqas Tariq Paracha, Muhammad Zubair Asghar, Nosheen Jillani, Umair Younis, Furqan Khan Saddozai, and Ibrahim A. Hameed
Adaptive real-time routing protocol for (M,k)-firm in industrial wireless multimedia sensor networks, Beom Su Kim, Sangdae Kim, Kyong Hoon Kim, Tae Eung Sung, Babar Shah, and Ki Il Kim
Uvis: A Formula-Based End-User Tool for Data Visualization, Mohammad Amin Amin Kuhail and Soren Lauesen
Considering students’ abilities in the academic advising process, Samia Loucif, Laila Gassoumi, and Joao Negreiros
The internet of things: Challenges and considerations for cybercrime investigations and digital forensics, Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, and Qi Shi
Single image super-resolution algorithm using PSNR in the wavelet domain, A. Mahmou, F. Taher, A. Kunhu, and H. Al-Ahmad
Performance Evaluation of Data Dissemination Protocols for Connected Autonomous Vehicles, Fehda Malik Malik, Hasan Ali Khattak, Ahmad Almogren, Ouns Bouachir, Ikram Ud Din, and Aymen Altameem
Digital transformation in higher education: a framework for maturity assessment, Adam Marks, Maytha AL-Ali, Reem Atassi, Abedallah Zaid Abualkishik, and Yacine Rezgui
Factors influencing the acceptance of smart homes in Jordan, Ibrahim Mashal, Ahmed Shuhaiber, and Mohammad Daoud
A Guiding Framework for Vetting the Internet of Things, Fatma Masmoudi, Zakaria Maamar, Mohamed Sellami, Ali Ismail Awad, and Vanilson Burégio
Perceptions and misperceptions of smartphone use: Applying the social norms approach, John McAlaney, Mohamed Basel Almourad, Georgina Powell, and Raian Ali
A design-based research approach for developing data-focussed business curricula, Shah J. Miah, Ian Solomonides, and John G. Gammack
Machine Learning Techniques for Quantification of Knee Segmentation from MRI, Sujeet More, Jimmy Singla, Ahed Abugabah, and Ahmad Ali Alzubi
Framework for examination of software quality characteristics in conflict: A security and usability exemplar, Bilal Naqvi, Ahmed Seffah, and Alain Abran
Applications of unmanned aerial vehicle (UAV) in road safety, traffic and highway infrastructure management: Recent advances and challenges, Fatma Outay, Hanan Abdullah Mengash, and Muhammad Adnan
Exploration of Lifestyle Choices, Reproductive Health Knowledge, and Polycystic Ovary Syndrome (PCOS) Awareness Among Female Emirati University Students, Sreepoorna Pramodh
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices, Nattakorn Promwongsa, Mohammad Abu-Lebdeh, Somayeh Kianpisheh, Fatna Belqasmi, Roch H. Glitho, Halima Elbiaze, Noel Crespi, and Omar Alfandi
A Comprehensive Survey of the Tactile Internet: State-of-the-art and Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, and Omar Alfandi
Mitigating the Impact of Congestion Minimization on Vehicles’ Emissions in a Transportation Road Network, S. Salman and S. Alaswad
Ubiquitous Health Profile (UHPr): a big data curation platform for supporting health data interoperability, Fahad Ahmed Satti, Taqdir Ali, Jamil Hussain, Wajahat Ali Khan, Asad Masood Khattak, and Sungyoung Lee
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints, Babar Shah, Ali Abbas, Gohar Ali, Farkhund Iqbal, Asad Masood Khattak, Omar Alfandi, and Ki Il Kim
Digital innovation & enterprise in the sharing economy: An action research agenda, Aijaz A. Shaikh, Ravishankar Sharma, and Heikki Karjaluoto
Residents' perceptions of smart energy metres, Ahmed Haitham Shuhaiber
Accurate Segmentation of Cerebrovasculature from TOF-MRA Images Using Appearance Descriptors, Fatma Taher, Ahmed Soliman, Heba Kandil, Ali Mahmoud, Ahmed Shalaby, Georgy Gimel'Farb, and Ayman El-Baz
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare, Madiha Tahir, Abdallah Tubaishat, Feras Al-Obeidat, Babar Shah, Zahid Halim, and Muhammad Waqas