Submissions from 2020
A location-based ubiquitous crowdsourcing approach for the emergency supply of oxygen cylinders, May El Barachi, Faouzi Kamoun, Abderrazek Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
Personalized Computer-Aided Diagnosis for Mild Cognitive Impairment in Alzheimer's Disease Based on sMRI and C PiB-PET Analysis, Fatma El Zahraa A. El-Gamal, Mohammed M. Elmogy, Ashraf Khalil, Mohammed Ghazal, Jawad Yousaf, Xiaolu Qiu, Hassan H. Soliman, Ahmed Atwan, Hermann B. Frieboes, Gregory Neal Barnes, and Ayman S. El-Baz
Preface, Hany El Kady, Qusay H. Mahmoud, Huwida Said, and Omar AlFandi
Towards more secure EMV purchase transactions: A new security protocol formally analyzed by the Scyther tool, Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, and Guy Pujolle
Computer Aided Autism Diagnosis Using Diffusion Tensor Imaging, Yaser A. Elnakieb, Mohamed T. Ali, Ahmed Soliman, Ali H. Mahmoud, Ahmed M. Shalaby, Norah Saleh Alghamdi, Mohammed Ghazal, Ashraf Khalil, Andrew Switala, Robert S. Keynton, Gregory Neal Barnes, and Ayman El-Baz
User community detection via embedding of social network structure and temporal content, Hossein Fani, Eric Jiang, Ebrahim Bagheri, Feras Al-Obeidat, Weichang Du, and Mehdi Kargar
Evaluating active traffc management (ATM) strategies under non-recurring congestion: Simulation-based with benefit cost analysis case study, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, and Moulay Youssef El-Hansali
Toward the improvement of traffic incident management systems using Car2X technologies, Siham G. Farrag, Fatma Outay, Ansar Ul Haque Yasar, Davy Janssens, Bruno Kochan, and Nafaa Jabeur
Preface to the special issue on web information systems engineering (WISE 2018), Hakim Hacid, Wojciech Cellary, Hua Wang, and Yanchun Zhang
A green, energy, and trust-aware multi-objective cloud coalition formation approach, Souad Hadjres, Fatna Belqasmi, May El Barachi, and Nadjia Kara
Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss, Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, and Mohammad Mehedy Masud
NLH: A Blind Pixel-Level Non-Local Method for Real-World Image Denoising, Yingkun Hou, Jun Xu, Mingxia Liu, Guanghai Liu, Li Liu, Fan Zhu, and Ling Shao
MCMT-GAN: Multi-Task Coherent Modality Transferable GAN for 3D Brain Image Synthesis, Yawen Huang, Feng Zheng, Runmin Cong, Weilin Huang, Matthew R. Scott, and Ling Shao
AI Techniques for COVID-19, Adedoyin Ahmed Hussain, Ouns Bouachir, Fadi Al-Turjman, and Moayad Aloqaily
Trustworthy and sustainable smart city services at the edge, Yaser Jararweh, Safa Otoum, and Ismaeel Al Ridhawi
A multi-branch separable convolution neural network for pedestrian attribute recognition, Imran N. Junejo and Naveed Ahmed
Developing a green curriculum for introduction to information technology course, Sanaa Kaddoura
T-PCCE: Twitter Personality based Communicative Communities Extraction System for Big Data, Eleanna Kafeza, Andreas Kanavos, Christos Makris, Georgios Pispirigos, and Pantelis Vikatos
Behavioral and Migration Analysis of the Dynamic Customer Relationships on Twitter, Eleanna Kafeza, Christos Makris, Gerasimos Rompolas, and Feras Al-Obeidat
The IASO Self-Reporting System, Faouzi Kamoun, May El Barachi, Russell Hamilton, and Ahmed Ben Hadj Khelifa
A novel computer-aided diagnosis system for the early detection of hypertension based on cerebrovascular alterations, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Ashraf Khalil, Guruprasad Giridharan, Robert Keynton, J. Richard Jennings, and Ayman El-Baz
An Assortment of Evolutionary Computation Techniques (AECT) in gaming, Maham Khalid, Feras Al-Obeidat, Abdallah Tubaishat, Babar Shah, Saad Razzaq, Fahad Maqbool, and Muhammad Ilyas
Investigating Bias in Facial Analysis Systems: A Systematic Review, Ashraf Khalil, Soha Glal Ahmed, Asad Masood Khattak, and Nabeel Al-Qirim
On the optimality of route selection in grid wireless sensor networks: Theory and applications, Yaser Khamayseh, Wail Mardini, Monther Aldwairi, and Hussein Mouftah
A survey on sentiment analysis in Urdu: A resource-poor language, Asad Khattak, Muhammad Zubair Asghar, Anam Saeed, Ibrahim A. Hameed, Syed Asif Hassan, and Shakeel Ahmad
Applying deep neural networks for user intention identification, Asad Khattak, Anam Habib, Muhammad Zubair Asghar, Fazli Subhan, Imran Razzak, and Ammara Habib
Tweets classification and sentiment analysis for personalized tweets recommendation, Asad Masood Khattak, Rabia Batool, Fahad Ahmed Satti, Jamil Hussain, Wajahat Ali Khan, Adil Mehmood Khan, and Bashir Hayat
Fine-grained sentiment analysis for measuring customer satisfaction using an extended set of fuzzy linguistic hedges, Asad Khattak, Waqas Tariq Paracha, Muhammad Zubair Asghar, Nosheen Jillani, Umair Younis, Furqan Khan Saddozai, and Ibrahim A. Hameed
Adaptive real-time routing protocol for (M,k)-firm in industrial wireless multimedia sensor networks, Beom Su Kim, Sangdae Kim, Kyong Hoon Kim, Tae Eung Sung, Babar Shah, and Ki Il Kim
Uvis: A Formula-Based End-User Tool for Data Visualization, Mohammad Amin Amin Kuhail and Soren Lauesen
Considering students’ abilities in the academic advising process, Samia Loucif, Laila Gassoumi, and Joao Negreiros
The internet of things: Challenges and considerations for cybercrime investigations and digital forensics, Áine MacDermott, Thar Baker, Paul Buck, Farkhund Iqbal, and Qi Shi
Single image super-resolution algorithm using PSNR in the wavelet domain, A. Mahmou, F. Taher, A. Kunhu, and H. Al-Ahmad
Performance Evaluation of Data Dissemination Protocols for Connected Autonomous Vehicles, Fehda Malik Malik, Hasan Ali Khattak, Ahmad Almogren, Ouns Bouachir, Ikram Ud Din, and Aymen Altameem
Digital transformation in higher education: a framework for maturity assessment, Adam Marks, Maytha AL-Ali, Reem Atassi, Abedallah Zaid Abualkishik, and Yacine Rezgui
Factors influencing the acceptance of smart homes in Jordan, Ibrahim Mashal, Ahmed Shuhaiber, and Mohammad Daoud
A Guiding Framework for Vetting the Internet of Things, Fatma Masmoudi, Zakaria Maamar, Mohamed Sellami, Ali Ismail Awad, and Vanilson Burégio
Perceptions and misperceptions of smartphone use: Applying the social norms approach, John McAlaney, Mohamed Basel Almourad, Georgina Powell, and Raian Ali
A design-based research approach for developing data-focussed business curricula, Shah J. Miah, Ian Solomonides, and John G. Gammack
Machine Learning Techniques for Quantification of Knee Segmentation from MRI, Sujeet More, Jimmy Singla, Ahed Abugabah, and Ahmad Ali Alzubi
Framework for examination of software quality characteristics in conflict: A security and usability exemplar, Bilal Naqvi, Ahmed Seffah, and Alain Abran
Applications of unmanned aerial vehicle (UAV) in road safety, traffic and highway infrastructure management: Recent advances and challenges, Fatma Outay, Hanan Abdullah Mengash, and Muhammad Adnan
Exploration of Lifestyle Choices, Reproductive Health Knowledge, and Polycystic Ovary Syndrome (PCOS) Awareness Among Female Emirati University Students, Sreepoorna Pramodh
Ensuring Reliability and Low Cost When Using a Parallel VNF Processing Approach to Embed Delay-Constrained Slices, Nattakorn Promwongsa, Mohammad Abu-Lebdeh, Somayeh Kianpisheh, Fatna Belqasmi, Roch H. Glitho, Halima Elbiaze, Noel Crespi, and Omar Alfandi
A Comprehensive Survey of the Tactile Internet: State-of-the-art and Research Directions, Nattakorn Promwongsa, Amin Ebrahimzadeh, Diala Naboulsi, Somayeh Kianpisheh, Fatna Belqasmi, Roch Glitho, Noel Crespi, and Omar Alfandi
Mitigating the Impact of Congestion Minimization on Vehicles’ Emissions in a Transportation Road Network, S. Salman and S. Alaswad
Ubiquitous Health Profile (UHPr): a big data curation platform for supporting health data interoperability, Fahad Ahmed Satti, Taqdir Ali, Jamil Hussain, Wajahat Ali Khan, Asad Masood Khattak, and Sungyoung Lee
Guaranteed lifetime protocol for IoT based wireless sensor networks with multiple constraints, Babar Shah, Ali Abbas, Gohar Ali, Farkhund Iqbal, Asad Masood Khattak, Omar Alfandi, and Ki Il Kim
Digital innovation & enterprise in the sharing economy: An action research agenda, Aijaz A. Shaikh, Ravishankar Sharma, and Heikki Karjaluoto
Residents' perceptions of smart energy metres, Ahmed Haitham Shuhaiber
Accurate Segmentation of Cerebrovasculature from TOF-MRA Images Using Appearance Descriptors, Fatma Taher, Ahmed Soliman, Heba Kandil, Ali Mahmoud, Ahmed Shalaby, Georgy Gimel'Farb, and Ayman El-Baz
A novel binary chaotic genetic algorithm for feature selection and its utility in affective computing and healthcare, Madiha Tahir, Abdallah Tubaishat, Feras Al-Obeidat, Babar Shah, Zahid Halim, and Muhammad Waqas
Screening of Murabaha business process through Quran and hadith: a text mining analysis, Issam Tlemsani, Farhi Marir, and Munir Majdalawieh
Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture, Lewis Tseng, Liwen Wong, Safa Otoum, Moayad Aloqaily, and Jalel Ben Othman
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis, Lewis Tseng, Xinyu Yao, Safa Otoum, Moayad Aloqaily, and Yaser Jararweh
An energy efficient routing approach for IoT enabled underwater wsns in smart cities, Nighat Usman, Omar Alfandi, Saeeda Usman, Asad Masood Khattak, Muhammad Awais, Bashir Hayat, and Ahthasham Sajid
Gene encoder: a feature selection technique through unsupervised deep learning-based clustering for large gene expression data, Uzma, Feras Al-Obeidat, Abdallah Tubaishat, Babar Shah, and Zahid Halim
Extracting temporal and causal relations based on event networks, Duc Thuan Vo, Feras Al-Obeidat, and Ebrahim Bagheri
Surpassing Real-World Source Training Data: Random 3D Characters for Generalizable Person Re-Identification, Yanan Wang, Shengcai Liao, and Ling Shao
Learning Enriched Features for Real Image Restoration and Enhancement., Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming-Hsuan Yang, and Ling Shao
On the Validation of Web X.509 Certificates by TLS interception products, Ahmad Samer Wazan, Romain Laborde, David Chadwick, Remi Venant, Abdelmalek Benzekri, Eddie Billoir, and Omar Alfandi
On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao
STAR: A Structure and Texture Aware Retinex Model, Jun Xu, Yingkun Hou, Dongwei Ren, Li Liu, Fan Zhu, Mengyang Yu, Haoqian Wang, and Ling Shao
A novel scalable representative-based forecasting approach of service quality, Hamdi Yahyaoui, Hala S. Own, Ahmed Agwa, and Zakaria Maamar
Video scene parsing: An overview of deep learning methods and datasets, Xiyu Yan, Huihui Gong, Yong Jiang, Shu Tao Xia, Feng Zheng, Xinge You, and Ling Shao
Particle Swarm Optimization Based Swarm Intelligence for Active Learning Improvement: Application on Medical Data Classification, Nawel Zemmal, Nabiha Azizi, Mokhtar Sellami, Soraya Cheriguene, Amel Ziani, Monther AlDwairi, and Nadjette Dendani
Submissions from 2019
Towards an efficient data fragmentation, allocation, and clustering approach in a distributed environment, Hassan Abdalla and Abdel Monim Artoli
A New Approach to Information Extraction in User-Centric E-Recruitment Systems, Malik Nabeel Ahmed Awan, Sharifullah Khan, Khalid Latif, and Asad Masood Khattak
MultiPLZW: A novel multiple pattern matching search in LZW-compressed data, Monther Aldwairi, Abdulmughni Y. Hamzah, and Moath Jarrah
Students’ acceptance of CDIO as a crowdsourcing and gamification methodology in IT classrooms: A multiple regression model, Monther Aldwairi and Ahmed Shuhaiber
Empirical Investigation of Key Factors for SaaS Architecture Dimension, Saiqa Aleem, Faheem Ahmed, Rabia Batool, and Asad Khattak
The effect of culture and organisational culture on administrative corruption, Salem A. Al-Jundi, Ahmed Shuhaiber, and Shaban S. Al-Emara
Effect of consumer innovativeness on new product purchase intentions through learning process and perceived value, Salem A. Al-Jundi, Ahmed Shuhaiber, and Reshmi Augustine
Improving fog computing performance via Fog-2-Fog collaboration, Mohammed Al-khafajiy, Thar Baker, Hilal Al-Libawy, Zakaria Maamar, Moayad Aloqaily, and Yaser Jararweh
Analysis of WCAG 2.0 data accessibility success criterion of e-government websites, Mohamed Basel Al Mourad, Mohammed Hussein, Faouzi Kamoun, and Zelal Wattar
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, Andrew Marrington, and Janet C. Read
Combining machine learning and metaheuristics algorithms for classification method PROAFTN, Feras Al-Obeidat, Nabil Belacel, and Bruce Spencer
Why some people do not use Facebook?, Anas Aloudat, Ons Al-Shamaileh, and Katina Michael
Customer churn prediction in telecommunication industry using data certainty, Adnan Amin, Feras Al-Obeidat, Babar Shah, Awais Adnan, Jonathan Loo, and Sajid Anwar
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, and Sajid Anwar
Android malware detection through generative adversarial networks, Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki l.L. Kim, and Sajid Anwar
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks, Raja Waseem Anwar, Anazida Zainal, Fatma Outay, Ansar Yasar, and Saleem Iqbal
Exploring deep neural networks for rumor detection, Muhammad Zubair Asghar, Ammara Habib, Anam Habib, Adil Khan, Rehman Ali, and Asad Khattak
A Novel Quality and Reliability-Based Approach for Participants' Selection in Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, and Kiyan Afsari
Non-Orthogonal Radio Resource Management for RF Energy Harvested 5G Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, and Hyung Seok Kim
Fog computing enabling industrial internet of things: State-of-the-art and research challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, and Mikael Gidlund
Triplet loss network for unsupervised domain adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, and Asad Masood Khattak
Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, and Chirine Ghedira Guegan
ER-AE: Differentially-private Text Generation for Authorship Anonymization, Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, and Farkhund Iqbal
Time efficient segmented technique for dynamic programming based algorithms with FPGA implementation, Talal Bonny, Ridhwan Al Debsi, and Mohamed Basel Almourad
Personalized social query expansion using social annotations, Mohamed Reda Bouadjenek, Hakim Hacid, and Mokrane Bouzeghoub
Integrated database system with spatial information for disaster risk management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, and Ki Il Kim
Improved Identity Management with Verifiable Credentials and FIDO, David W. Chadwick, Romain Laborde, Arnaud Oglaza, Remi Venant, Samer Wazan, and Manreet Nijjar
An authentic-based privacy preservation protocol for smart e-healthcare systems in iot, B. D. Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi
Learning Stylometric Representations for Authorship Analysis, Steven H.H. Ding, Benjamin C.M. Fung, Farkhund Iqbal, and William K. Cheung
Using Academic Reading Circles to Assist Students, studying in a second language, with the Case-based Analysis of Cyberethical issues, Kirk Lloyd Barclay Dowswell
Unmanned aerial vehicles enabled IoT platform for disaster management, Waleed Ejaz, Muhammad Awais Azam, Salman Saadat, Farkhund Iqbal, and Abdul Hanan
Relevance-based entity selection for ad hoc retrieval, Faezeh Ensan and Feras Al-Obeidat
Enhanced label noise filtering with multiple voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, and Wajahat Ali Khan
Enhancing the teaching and learning process using video streaming servers and forecasting techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, and Kamal Uddin Sarker