Submissions from 2024
Exploring Usability Challenges of E-Services in University Academic Portal: An Eye-Tracking Analysis of Participant’s Navigation and Searching Behavior, Mohamed Basel Almourad, Emad Bataineh, and Zeal Wattar
Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication, Mohamad Al-Samhouri, Maher Abur-rous, and Nuria Novas
Target-vs-One and Target-vs-All Classification of Epilepsy Using Deep Learning Technique, Adnan Amin, Feras Al-Obeidat, Nasir Ahmed Algeelani, Ahmed Shudaiber, and Fernando Moreira
Features Extraction and Structure Similarities Measurement of Complex Networks, Haji Gul, Feras Al-Obeidat, Munir Majdalawieh, Adnan Amin, and Fernando Moreira
Healthcare Robots with Islamic Practices, Patrick C. K. Hung, Farkhund Iqbal, and Inon Wiratsin
Smart Toys, Patrick C. K. Hung, Farkhund Iqbal, and Benjamin Yankson
Design of a Blockchain-Based Patient Record Tracking System, Huwida E. Said, Nedaa B. Al Barghuthi, Sulafa M. Badi, and Shini Girija
Blockchain-Enabled Loyalty Points for Tokens as Digital Money, Aijaz A. Shaikh, Hamda Al Breiki, Sana Khan, Ravishankar Sharma, and Nadia Dahmani
Predicting Heating/Cooling Loads with the Zoetrope Genetic Programming (ZGP) Versus Other Machine Learning Methods, Raed Abu Zitar, Abdallah Aljasmi, Amal El Fallah Seghrouchni, and Frederic Barbaresco
Submissions from 2023
The Impact of Data Normalization on KNN Rendering, Hassan I. Abdalla and Aneela Altaf
Numerical Similarity Measures Versus Jaccard for Collaborative Filtering, Hassan I. Abdalla, Yasmeen A. Amer, Loc Nguyen, Ali A. Amer, and Basheer Mohamad Al-Maqaleh
Left ventricle segmentation and quantification using deep learning, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Mohammed Ghazal, Ali Mahmoud, and Ayman S. El-Baz
Artificial Intelligence Applications in Cybersecurity, Tesfahiwet Abrham, Sanaa Kaddoura, and Hamda Al Breiki
Security Risk Assessment of Blockchain-Based Patient Health Record Systems, Nedaa B. Al Barghuthi, Huwida E. Said, Sulafa M. Badi, and Shini Girija
Chatbot Design Challenges and the Effect on User Behavior, Shurooq Almutairi, Sana A. Khan, Mohammad Amin Kuhail, and Imran Taj
Digital twin for healthcare immersive services: fundamentals, architectures, and open issues, Moayad Aloqaily, Ouns Bouachir, and Fakhri Karray
Efficient Detection of Skin Cancer Using Deep Learning Techniques and a Comparative Analysis Study, Mehtab Hashim, Asad Masood Khattak, and Imran Taj
Chapter 2 - Supervised machine learning techniques to protect IoT healthcare environment against cyberattacks, Sanaa Kaddoura, Amal El Arid, and Auday Al-Dulaimy
Metaverse Forensics, Faouzi Kamoun, Farkhund Iqbal, Siem Zeresenay, Zainab Khalid, Richard Ikuesan, and Sened Abraham
Medical image analysis for the early prediction of hypertension, Heba Kandil, Ahmed Soliman, Ali Mahmoud, Fatma Taher, and Ayman S. El-Baz
Recent Developments in Chatbot Usability and Design Methodologies, Mohammad Amin Kuhail, Shahbano Farooq, and Shurooq Almutairi
An Approach-Based on Allen’s Interval Algebra to Provision Resources for Disrupted Business Processes, Zakaria Maamar, Fadwa Yahya, and Lassaad Ben Ammar
Blockchain Based Secure Interoperable Framework for the Internet of Medical Things, Wajid Rafique, Babar Shah, Saqib Hakak, and Maqbool (Software Competence Center Hagenberg Khan
How Can Blockchain Technology Be Used to Manage the COVID-19 Vaccine Supply Chain? A Systematic Literature Review and Future Research Directions, Huwida Said, Nedaa Baker Al Barghuthi, Sulafa Badi, and Shini Girija
Moral Dilemmas in Social Robots: An Exploratory Study for Future Research, Muhammad Umair Shah, Patrick C. K. Hung, Farkhund Iqbal, Robee Kassandra Adajar, and Inon Wiratsin
‘E-Barter’ Exchanging System: Toward a Smart and Sustainable Community, Ahmed Shuhaiber, Heyam Salem Ali Alfayadhi, May Mohammed AlAwlaqi, and Maitha Abdulnasser Awadh Ali
Trust in Smart Homes: The Power of Social Influences and Perceived Risks, Ahmed Shuhaiber, Wed Alkarbi, and Sara Almansoori
Early Lung Cancer Detection by Using Artificial Intelligence System, Fatma Taher
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities, Yichao Wang, Sophia Roscoe, Budi Arief, Lena Connolly, Hervé Borrion, and Sanaa Kaddoura
Introduction to Artificial Intelligence, Sewit T. Yohannes, Simar Mansi, and Sanaa Kaddoura
Comparative Analysis of Machine Learning Algorithms for Author Age and Gender Identification, Zarah Zainab, Feras Al-Obeidat, Fernando Moreira, Haji Gul, and Adnan Amin
Submissions from 2022
A Machine Learning Approach for a Robust Irrigation Prediction via Regression and Feature Selection, Emna Ben Abdallah, Rima Grati, Malek Fredj, and Khouloud Boukadi
UX in the Arab World - Research Trends and Challenges for a Better Understanding and Collaboration, Ons Al-Shamaileh and Ahmed Seffah
Managerial Conflict Among the Software Development Team, Madnia Ashraf, Abdallah Tubaishat, Feras Al-Obeidat, and Ali Raza
Toward a Configurable Thing Composition Language for the SIoT, Soura Boulaares, Salma Sassi, Djamal Benslimane, Zakaria Maamar, and Sami Faiz
Simulating Blockchain Consensus Protocols in Julia: Proof of Work vs Proof of Stake, Georgios Drakopoulos, Eleanna Kafeza, Ioanna Giannoukou, Phivos Mylonas, and Spyros Sioutas
New Security Protocols for Offline Point-of-Sale Machines, Nour El Madhoun and Emmanuel (Orange Bertin
Real-World Protein Particle Network Reconstruction Based on Advanced Hybrid Features, Haji Gul, Feras Al-Obeidat, Fernando Moreira, Muhammad Tahir, and Adnan Amin
Snapshot of Research Issues in Service Robots, Patrick C. K. Hung, Farkhund Iqbal, Saiqa Aleem, and Laura Rafferty
A Comparative Study of Autoregressive and Neural Network Models: Forecasting the GARCH Process, Firuz Kamalov, Ikhlaas Gurrib, Sherif Moussa, and Amril Nazir
Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network, Zainab Khalid, Farkhund Iqbal, Khalil Al-Hussaeni, Aine MacDermott, and Mohammed Hussain
Social Media Analytics for Non-Governmental Organizations, Shanghao Li, Dickson K. W. Chiu, Eleanna Kafeza, and Kevin K. W. Ho
An Approach for Mitigating Disruptions on Resources’ Consumption Cycles, Zakaria Maamar, Fatma Masmoudi, and Ejub Kajan
An Intelligent Information System and Application for the Diagnosis and Analysis of COVID-19, Atif Mehmood, Ahed Abugabah, Ahmad A. L. Smadi, and Reyad Alkhawaldeh
A General Framework of Particle Swarm Optimization, Loc Nguyen, Ali A. Amer, and Hassan I. Abdalla
Replacing Human Input in Spam Email Detection Using Deep Learning, Mathew Nicho, Farzan Majdani, and Christopher D. McDermott
Object-Oriented Software Testing: A Review, Ali Raza, Babar Shah, Madnia Ashraf, and Muhammad Ilyas
A Job Killer or a Job Creator? The Adoption of AI in Organizations, Ahmed Shuhaiber
Developing and Validating a Model of Intention to Use a Smart Energy Metering System, Ahmed Shuhaiber and Nabil (Transpower Adam
Dual Learning Model for Multiclass Brain Tumor Classification, Rohit Thanki and Sanaa Kaddoura
Submissions from 2021
Towards a Modular Ontology for Cloud Consumer Review Mining, Emna Ben Abdallah, Khouloud Boukadi, and Rima Grati
2 Left ventricle segmentation for cine MR using deep learning, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Mohammed Ghazal, Ali H. Mahmoud, Ayman El-Baz, and Jasjit S. Suri
Palm Tree Detection in Drone Images Using Deep Convolutional Neural Networks: Investigating the Effective Use of YOLO V3, R. Y. Aburasain, E. A. Edirisinghe, and Ali Albatay
Chapter 21 Artificial intelligence and data analytics for geosciences and remote sensing theory and application, Feras Al-Obeidat, Farhi Marir, Fares M. Howari, Abdel-Mohsen O. Mohamed, and Neil Banerjee
Some Socio-demographic Usage Patterns in Ephemeral Content Sharing Social Networks: The Case of Snapchat, Ons Al-Shamaileh, Anas Aloudat, Amal Alrayes, and Hakim Hacid
Fandet Semantic Model: An OWL Ontology for Context-Based Fake News Detection on Social Media, Anoud Bani-Hani, Oluwasegun Adedugbe, Elhadj Benkhelifa, and Munir Majdalawieh
Solving the Multi-objective 2-Dimensional Vector Packing Problem Using ϵ-constraint Method, Nadia Dahmani, Saoussen Krichen, El-Ghazali Talbi, and Sanaa Kaddoura
3 Computational methods for identifying left ventricle heart pathologies, Ahmed Elnakib, Mohammed Ghazal, Fatma Taher, Ali H. Mahmoud, and Ayman El-Baz
CropWaterNeed: A Machine Learning Approach for Smart Agriculture, Malek Fredj, Rima Grati, and Khouloud Boukadi
Blockchain for Healthcare and Medical Systems, Sanaa Kaddoura and Rima Grati
Playing First-Person Perspective Games with Deep Reinforcement Learning Using the State-of-the-Art Game-AI Research Platforms, Adil Khan, Asad Masood Khattak, Muhammad Zubair Asghar, Muhammad Naeem, and Aziz Ud Din
Playing Doom with Anticipator-A3C Based Agents Using Deep Reinforcement Learning and the ViZDoom Game-AI Research Platform, Adil Khan, Muhammad Naeem, Asad Masood Khattak, Muhammad Zubair Asghar, and Abdul Haseeb Malik
An Efficient Supervised Machine Learning Technique for Forecasting Stock Market Trends, Asad Khattak, Adil Khan, Habib Ullah, Muhammad Usama Asghar, Areeba Arif, Fazal Masud Kundi, and Muhammad Zubair Asghar
A Guiding Framework for IoT Servitization, Zakaria Maamar, Noura Faci, and Fadwa Yahya
A Transactional Approach to Enforce Resource Availabilities: Application to the Cloud, Zakaria Maamar, Mohamed Sellami, and Fatma Masmoudi
Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users, Daniel Maldonado-Ruiz, Mohamad Badra, Nour El Madhoun, and Jenny Torres
Digital Transformation in Higher Education: Maturity and Challenges Post COVID-19, Adam Marks, Maytha AL-Ali, Reem Attasi, Abdellah Abu Elkishk, and Yacine Rezgui
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators, Ahmad Samer Wazan, David W. Chadwick, Remi Venant, Romain Laborde, and Abdelmalek Benzekri
Semi-supervised Time Series Anomaly Detection Model Based on LSTM Autoencoder, Hui Xiao, Donghai Guan, Rui Zhao, Weiwei Yuan, Yaofeng Tu, and Asad Masood Khattak
An IoT-Based Non-invasive Diabetics Monitoring System for Crucial Conditions, Hermon Yehdego, Safa Otoum, and Omar Alfandi
Hard Disk Failure Prediction via Transfer Learning, Rui Zhao, Donghai Guan, Yuanfeng Jin, Hui Xiao, Weiwei Yuan, Yaofeng Tu, and Asad Masood Khattak
Submissions from 2020
System Dynamics Modeling of Logistics Hub Capacity: The Dubai Logistics Corridor Case Study, Alberto De Marco, Hussein Fakhry, Marco Postorino, Zakaria Maamar, and Hakim Hacid
10 A noninvasive approach for the early detection of diabetic retinopathy, Winston Furtado, Ahmed Shalaby, Ali H. Mahmoud, Ashraf Khallaf, Ashraf Khalil, Mohammed Ghazal, Fatma Taher, Jasjit S. Suri, Guruprasad Giridharan, and Ayman El-Baz
Analyzing Network Level Information, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Artificial Intelligence And Digital Forensics, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Authorship Analysis Approaches, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Authorship Attribution With Few Training Samples, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Criminal Information Mining, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Cybersecurity And Cybercrime Investigation, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Messaging Forensics In Perspective, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
Writeprint Mining For Authorship Attribution, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung
A Survey of Approaches for Estimating Meteorological Visibility Distance Under Foggy Weather Conditions, Faouzi Kamoun, Hazar Chaabani, Fatma Outay, and Ansar-Ul-Haque Yasar
Correction to: A Recursive Co-occurrence Text Mining of the Quran to Build Corpora for Islamic Banking Business Processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh
Submissions from 2019
Computational Analysis Techniques: A Case Study On Fmri For Autism Spectrum Disorder, Omar Dekhil, Ali Mahmoud, Ahmed Shalaby, Ahmed Soliman, Fatma Taher, Hassan Hajjdiab, Ashraf Khalil, Mohammed Ghazal, Robert Keynton, Gregory Barnes, and Ayman El-Baz
A Noninvasive Image-Based Approach Toward An Early Diagnosis Of Autism, Yaser ElNakieb, Ahmed Shalaby, Ali Mahmoud, Hassan Hajjdiab, Ashraf Khalil, Mohammed Ghazal, Fatma Taher, Ahmed Soliman, Robert Keynton, Gregory Barnes, and Ayman El-Baz
Novel Approaches For Segmenting Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Ali Mahmoud, Ahmed Shalaby, Fatma Taher, Mohammed Ghazal, Adel Elmagraby, and Ayman El-Baz
Towards A Robust Cad System For Early Diagnosis Of Autism Using Structural Mri, Ali Mahmoud, Yaser ElNakieb, Ahmed Shalaby, Ahmed Soliman, Fatma Taher, Hassan Hajjdiab, Ashraf Khalil, Mohammed Ghazal, Robert Keynton, Jasjit S. Suri, Gregory N. Barnes, and Ayman El-Baz
Early Diagnosis System For Lung Nodules Based On The Integration Of A Higher-Order Mgrf Appearance Feature Model And 3d-Cnn, Ahmed Shaffie, Ahmed Soliman, Ali Mahmoud, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Adel Elmaghraby, and Ayman El-Baz
Submissions from 2018
Model course syllabus: Management of security issues in wearable technology, Michelle C. Antero
Gauging the Effectiveness of Educational Technology Integration in Education: What the Best-Quality Meta-Analyses Tell Us, Robert M. Bernard, Eugene Borokhovski, Richard F. Schmid, and Rana M. Tamim
The promise and perils of wearable technologies, John Gammack and Andrew Marrington
Smart Toys, Patrick C. K. Hung, Farkhund Iqbal, and Benjamin Yankson
Reconciling Culture and Digital Literacy in the United Arab Emirates, Tony Jewels and Rozz Albon
A new perspective on the swiss cheese model applied to understanding the anatomy of healthcare data breaches, Faouzi Kamoun and Mathew Nicho
Conclusions: Where next for wearables?, Don Kerr and John Gammack
Submissions from 2017
The promise and perils of wearable technologies, John Gammack and Andrew Marrington
A Security Threat Analysis of Smart Home Network with Vulnerable Dynamic Agents, Laura Rafferty, Farkhund Iqbal, and Patrick C. K. Hung
Privacy Preservation Framework for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C. K. Hung
Submissions from 2016
Towards a Typology of Business Models for NFC-Based Mobile Payment Services, Faouzi Kamoun
Does Interface Design Influence Consumers' Security Perception?, Faouzi Kamoun and Mohanad Halaweh