Follow

Submissions from 2019

Link

Social-media based assessment of academic programs, Abdullah Hussein and Mohammed Hussain

Backtracking assessment of IT and engineering courses, Abdullah M. Hussein and Mohammed Hussain

PDF

A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction, Farkhund Iqbal, Jahanzeb Maqbool Hashmi, Benjamin C.M. Fung, Rabia Batool, Asad Masood Khattak, Saiqa Aleem, and Patrick C.K. Hung

Link

Drone forensics: Examination and analysis, Farkhund Iqbal, Benjamin Yankson, Maryam A. AlYammahi, Naeema AlMansoori, Suaad Mohammed Qayed, Babar Shah, and Thar Baker

PDF

Dynamic Adaptation for WPANs Collision Prevention in eHealth Environments, Youssef Iraqi and Loubna Mekouar

Link

IP/MPLS networks with hardened pipes: service concepts, traffic engineering and design considerations, Faouzi Kamoun and Fatma Outay

Link

Success factors model for green computing implementations, Shafaq Naheed Khan, Manal Abdulla Aljaberi, and Suadad Muammar

PDF

Role assigning and taking in cloud computing, Shafaq Naheed Khan, Mathew Nicho, Haifa Takruri, Zakaria Maamar, and Faouzi Kamoun

PDF

A lightweight perceptron-based intrusion detection system for fog computing, Belal Sudqi Khater, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Mohammed Abdulla Hussain, and Ashraf Ahmed Ibrahim

Link

An Efficient Real-Time Data Dissemination Multicast Protocol for Big Data in Wireless Sensor Networks, Beom Su Kim, Monther Aldwairi, and Ki Il Kim

PDF

Wireless sensor networks for big data systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, and Kyong Hoon Kim

Link

A forwarder based temperature aware routing protocol in wireless body area networks, Beom Su Kim, Ki Il Kim, Babar Shah, and Sana Ullah

Link

Automatic identification of rhetorical relations among intra-sentence discourse segments in Arabic, Samira Lagrini, Nabiha Azizi, Mohammed Redjimi, and Monther Al Dwairi

Link

Toward an automatic summarisation of Arabic text depending on rhetorical relations, Samira Lagrini, Nabiha Azizi, Mohammed Redjimi, and Monther Al Dwairi

Link

Semantic Web Services Composition in the astrophysics domain: Issues and solutions, Thierry Louge, Mohamed Hedi Karray, Bernard Archimede, Zakaria Maamar, and Michael Mrissa

Link

Open challenges in vetting the internet‐of‐things, Zakaria Maamar, Ejub Kajan, Muhammad Asim, and Thar Baker Shamsa

PDF

Speech enhancement Algorithm based on super-Gaussian modeling and orthogonal polynomials, Basheera M. Mahmmod, Abd Rahman Ramli, Thar Baker, Feras Al-Obeidat, Sadiq H. Abdulhussain, and Wissam A. Jassim

Link

Research challenges and opportunities in blockchain and cryptocurrencies, Qusay H. Mahmoud, Michael Lescisin, and May AlTaei

Link

What makes Jordanian residents buy smart home devices?: A factorial investigation using PLS-SEM, Ibrahim Mashal and Ahmed Shuhaiber

Link

Impact of Privatisation and Broader Reforms on the Competitiveness of the Cement Manufacturing Industry in Pakistan, Maqsood Memon and Yaseen Ghulam

Link

A metadesign theory for tailorable decision support, Shah Jahan Miah, John G. Gammack, and Judy McKay

Link

A big-data analytics method for capturing visitor activities and flows: the case of an island country, Shah Jahan Miah, Huy Quan Vu, and John Gammack

Link

A Location Analytics Method for the Utilisation of Geotagged Photos in Travel Marketing Decision-Making, Shah Jahan Miah, Huy Quan Vu, and John G. Gammack

PDF

Methodologies for designing healthcare analytics solutions: A literature analysis, Shah J. Miah, John Gammack, and Najmul Hasan

PDF

Follow-up decision support tool for public healthcare: A design research perspective, Shah J. Miah, Najmul Hasan, and John Gammack

PDF

Emerging Insights of Health Informatics Research: A Literature Analysis for Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, and John Gammack

Link

IT governance practices in the Gulf Cooperation Council region, Suadad Muammar and Mathew Nicho

Developing a faster pattern matching algorithms for intrusion detection system, Ibrahim Obeidat and Mazen AlZubi

PDF

Intensive pre-processing of KDD Cup 99 for network intrusion classification using machine learning techniques, Ibrahim M. Obeidat, Nabhan Hamadneh, Mouhammd Alkasassbeh, Mohammad Almseidin, and Mazen Ibrahim AlZubi

Link

Investigation of the impact of a wireless Fog Warning System with respect to road traffic on a highway, Fatma Outay, Absar Ul Haque Ahmar, Faouzi Kamoun, Ansar Ul Haque Yasar, Christoph Sommer, Nafaa Jabeur, and Samar El-Amine

Link

Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach, Fatma Outay, Bilal Taha, Hazar Chaabani, Faouzi Kamoun, Naoufel Werghi, and Ansar Ul Haque Yasar

Link

A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties, Ayesha Qamar, Muhammad Asim, Zakaria Maamar, Saad Saeed, and Thar Baker

Link

Energy production predication via Internet of Thing based machine learning system, Pedro P. Rebouças Filho, Samuel L. Gomes, Navar M.Mendonça e Nascimento, Cláudio M.S. Medeiros, Fatma Outay, and Victor Hugo C. de Albuquerque

Link

A location-sensitive and network-aware broker for recommending Web services, Saad Saeed, Muhammad Asim, Thar Baker, and Zakaria Maamar

PDF

Compromised user credentials detection in a digital enterprise using behavioral analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, and Sajid Anwar

Link

Computer-Aided Diagnostic System for Early Detection of Acute Renal Transplant Rejection Using Diffusion-Weighted MRI, Mohamed Shehata, Fahmi Khalifa, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Mohamed Abou El-Ghar, Amy C. Dwyer, Georgy Gimel'Farb, Robert S. Keynton, and Ayman El-Baz

Link

Understanding users’ acceptance of smart homes, Ahmed Shuhaiber and Ibrahim Mashal

Link

Dynamic Clustering for IoT Key Management in Hostile Application Area, Soumaya Souaidi, Tayeb Kenaza, Badis Djamaa, and Monther Aldwairi

Link

Accurately forecasting temperatures in smart buildings using fewer sensors, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi

PDF

The security of big data in fog-enabled iot applications including blockchain: A survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, and Ibrahim Ghafir

Link

A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT, Noshina Tariq, Muhammad Asim, Zakaria Maamar, M. Zubair Farooqi, Noura Faci, and Thar Baker

Link

User behavior prediction via heterogeneous information preserving network embedding, Weiwei Yuan, Kangya He, Guangjie Han, Donghai Guan, and Asad Masood Khattak

Link

QoS enhancement with deep learning-based interference prediction in mobile IoT, Saniya Zafar, Sobia Jangsher, Ouns Bouachir, Moayad Aloqaily, and Jalel Ben Othman

Link

Combining RSS-SVM with genetic algorithm for Arabic opinions analysis, Amel Ziani, Nabiha Azizi, Djamel Zenakhra, Soraya Cheriguene, and Monther Aldwairi

Submissions from 2018

Link

Data from: Fuzziness-based active learning framework to enhance hyperspectral image classification performance for discriminative and generative classifiers, Muhammad Ahmad, Stanislav Protasov, Adil Mehmood Khan, Rasheed Hussain, Asad Masood Khattak, and Wajahat Ali Khan

PDF

Fuzziness-based active learning framework to enhance hyperspectral image classification performance for discriminative and generative classifiers, Muhammad Ahmad, Stanislav Protasov, Adil Mehmood Khan, Rasheed Hussain, Asad Masood Khattak, and Wajahat Ali Khan

Link

Anomaly payload signature generation system based on efficient tokenization methodology, Monther Aldwairi, Wail Mardini, and Alaa Alhowaide

Link

A Consumer Perspective on Digital Games: Factors for Successful Game Development, Saiqa Aleem, Luiz Fernando Capretz, and Faheem Ahmed

Link

SafePath: Differentially-private publishing of passenger trajectories in transportation systems, Khalil Al-Hussaeni, Benjamin C.M. Fung, Farkhund Iqbal, Gaby G. Dagher, and Eun G. Park

Link

Differentially private multidimensional data publishing, Khalil Al-Hussaeni, Benjamin C.M. Fung, Farkhund Iqbal, Junqiang Liu, and Patrick C.K. Hung

Link

Knowledge-based reasoning and recommendation framework for intelligent decision making, Rahman Ali, Muhammad Afzal, Muhammad Sadiq, Maqbool Hussain, Taqdir Ali, Sungyoung Lee, and Asad Masood Khattak

Link

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, Shadi Aljawarneh, Monther Aldwairi, and Muneer Bani Yassein

Link

The Opinion Management Framework: Identifying and addressing customer concerns extracted from online product reviews, Feras Al-Obeidat, Bruce Spencer, and Eleanna Kafeza

Link

A best-practice model of university-students relationship development: An empirical study, Raed Musbah Alqirem, Husam Mustafa Alnaimi, and Ahmed Shuhaiber

Link

Arabic authorship attribution: An extensive study on twitter posts, Malik H. Altakrori, Farkhund Iqbal, Benjamin C.M. Fung, Steven H.H. Ding, and Abdallah Tubaishat

Link

Long-term integrity and non-repudiation protocol for multiple entities, Mohamad Badra and Rouba Borghol

Link

Neural word and entity embeddings for ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat

Link

Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications, Thar Baker, Bandar Aldawsari, Muhammad Asim, Hissam Tawfik, Zakaria Maamar, and Rajkumar Buyya

Link

A survey and taxonomy on nonorthogonal multiple-access schemes for 5G networks, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, and Alagan Anpalagan

Link

An analytical study on the holy Quran based on the order of words in Arabic and conjunction, Rahima Bentrcia, Samir Zidat, and Farhi Marir

PDF

Extracting semantic relations from the Quranic Arabic based on Arabic conjunctive patterns, Rahima Bentrcia, Samir Zidat, and Farhi Marir

Link

Security and privacy challenges in smart cities, Trevor Braun, Benjamin C.M. Fung, Farkhund Iqbal, and Babar Shah

PDF

Context mining of sedentary behaviour for promoting self-awareness using a smartphone, Muhammad Fahim, Thar Baker, Asad Masood Khattak, Babar Shah, Saiqa Aleem, and Francis Chow

Link

Entity linking of tweets based on dominant entity candidates, Yue Feng, Fattane Zarrinkalam, Ebrahim Bagheri, Hossein Fani, and Feras Al-Obeidat

Link

Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches, Virginia N.L. Franqueira, Joanne Bryce, Noora Al Mutawa, and Andrew Marrington

Link

Hacking in the cloud, Nick Gregorio, Janahan Mathanamohan, Qusay H. Mahmoud, and May AlTaei

Preface, Hakim Hacid, Wojciech Cellary, Hua Wang, Hye Young Paik, and Rui Zhou

Link

An SLA-Aware Cloud Coalition Formation Approach for Virtualized Networks, Souad Hadjres, Nadjia Kara, May El Barachi, and Fatna Belqasmi

Link

A secure and decentralised SIP for mobile ad hoc networks, Mohammed Hussain and Dhafer Ben Khedher

Link

A study of detecting child pornography on smart phone, Farkhund Iqbal, Andrew Marrington, Patrick C.K. Hung, Jing Jie Lin, Guan Pu Pan, Shih Chia Huang, and Benjamin Yankson

Link

Disruptive Classroom Technologies: A Framework For Innovation In Education, Nadine Jaafarawi and Afshan Parkar

Link

Advanced Temporal Constraints for Business Processes Modelling and Execution, Eleanna Kafeza

PDF

An enhanced mobility and temperature aware routing protocol through multi-criteria decision making method in wireless body area networks, Beom Su Kim, Babar Shah, Feras Al-Obediat, Sana Ullah, Kyong Hoon Kim, and Ki Il Kim

Link

Opportunistic mining of top-n high utility patterns, Junqiang Liu, Xingxing Zhang, Benjamin C.M. Fung, Jiuyong Li, and Farkhund Iqbal

Link

Software agents meet internet of things, Zakaria Maamar, Noura Faci, Slim Kallel, Mohamed Sellami, and Emir Ugljanin

PDF

Enhanced teamwork communication model for electronic clinical pathways in healthcare, Wasef Mater, Monther Aldwairi, and Roliana Ibrahim

Link

Evaluating User Vulnerabilities Vs Phisher Skills In Spear Phishing, Mathew Nicho, Hussein Fakhry, and Uche Egbue

Explore like a local: Student generated websites as representation of emirati perspectives on Dubai tourism, Michael R. Ogden, Melissa Lee Price, and Noela Michael

Link

Concurrent direct assessment of foundation skills for general education, Anthony Rhodes, Maurice Danaher, and Ashley Ater Kranov

PDF

Business process analytics and big data systems: A roadmap to bridge the gap, Sherif Sakr, Zakaria Maamar, Ahmed Awad, Boualem Benatallah, and Wil M.P. Van Der Aalst

Link

Alleviating road network congestion: Traffic pattern optimization using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad

Link

Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks, Ana Serrano Mamolar, Zeeshan Pervez, Jose M. Alcaraz Calero, and Asad Masood Khattak

PDF

A generalized deep learning-based diagnostic system for early diagnosis of various types of pulmonary nodules, Ahmed Shaffie, Ahmed Soliman, Luay Fraiwan, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor van Berkel, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz

Link

Fuzzy searching and routing in unstructured mobile peer-to-peer networks, Babar Shah, Farkhund Iqbal, Omar Alfandi, Yoonsoo Kim, Seok Yoon Kang, and Ki Il Kim

PDF

A Cloud-Based Architecture for Multimedia Conferencing Service Provisioning, Abbas Soltanian, Fatna Belqasmi, Sami Yangui, Mohammad A. Salahuddin, Roch Glitho, and Halima Elbiaze

Link

Concepções Pessoais de Competência e Rendimento Acadêmico: Estudo Longitudinal no Ensino Secundário Português, Joana Stocker and Luisa Faria

Hijacked destination images? Autonomous representations of Dubai and Abu Dhabi in The Amazing Race, U.S.A, Russell B. Williams

Link

Collusion attacks mitigation in internet of things: a fog based model, Qussai Yaseen, Monther Aldwairi, Yaser Jararweh, Mahmoud Al-Ayyoub, and Brij Gupta

PDF

Energy-efficient region shift scheme to support mobile sink group in wireless sensor networks, Yongbin Yim, Kyong Hoon Kim, Monther Aldwairi, and Ki Il Kim

Link

Classification with class noises through probabilistic sampling, Weiwei Yuan, Donghai Guan, Tinghuai Ma, and Asad Masood Khattak

Link

Socialized healthcare service recommendation using deep learning, Weiwei Yuan, Chenliang Li, Donghai Guan, Guangjie Han, and Asad Masood Khattak

Submissions from 2017

Link

Adaptive Forwarding Scheme for Bounded Time Constraint in Delay Tolerant Networks, Ali Abbas, Babar Shah, and Ki Il Kim

Link

Integrating RFID with Healthcare Information Systems: Toward Smart Hospitals, Ahed Abugabah

PDF

RFID adoption in healthcare organizations in UAE, Ahed Abugabah

Link

Feature extraction and selection for Arabic tweets authorship authentication, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdullateef Rabab’ah, and Monther Aldwairi

PDF

Secure approximation of edit distance on genomic data, Md Momin Al Aziz, Dima Alhadidi, and Noman Mohammed

PDF

Pattern matching of signature-based ids using myers algorithm under mapreduce framework, Monther Aldwairi, Ansam M. Abu-Dalo, and Moath Jarrah

Link

Detection of drive-by download attacks using machine learning approach, Monther Aldwairi, Musaab Hasan, and Zayed Balbahaith

Link

Analyzing students’ performance using multi-criteria classification, Feras Al-Obeidat, Abdallah Tubaishat, Anna Dillon, and Babar Shah

Link

A prudent based approach for compromised user credentials detection, Adnan Amin, Babar Shah, Sajid Anwar, Feras Al-Obeidat, Asad Masood Khattak, and Awais Adnan