Follow

Submissions from 2021

Link

2 Left ventricle segmentation for cine MR using deep learning, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Mohammed Ghazal, Ali H. Mahmoud, Ayman El-Baz, and Jasjit S. Suri

Link

Palm Tree Detection in Drone Images Using Deep Convolutional Neural Networks: Investigating the Effective Use of YOLO V3, R. Y. Aburasain, E. A. Edirisinghe, and Ali Albatay

Link

Chapter 21 Artificial intelligence and data analytics for geosciences and remote sensing theory and application, Feras Al-Obeidat, Farhi Marir, Fares M. Howari, Abdel-Mohsen O. Mohamed, and Neil Banerjee

Link

Some Socio-demographic Usage Patterns in Ephemeral Content Sharing Social Networks: The Case of Snapchat, Ons Al-Shamaileh, Anas Aloudat, Amal Alrayes, and Hakim Hacid

Link

Solving the Multi-objective 2-Dimensional Vector Packing Problem Using ϵ-constraint Method, Nadia Dahmani, Saoussen Krichen, El-Ghazali Talbi, and Sanaa Kaddoura

Link

3 Computational methods for identifying left ventricle heart pathologies, Ahmed Elnakib, Mohammed Ghazal, Fatma Taher, Ali H. Mahmoud, and Ayman El-Baz

Link

CropWaterNeed: A Machine Learning Approach for Smart Agriculture, Malek Fredj, Rima Grati, and Khouloud Boukadi

Link

A Guiding Framework for IoT Servitization, Zakaria Maamar, Noura Faci, and Fadwa Yahya

Link

A Transactional Approach to Enforce Resource Availabilities: Application to the Cloud, Zakaria Maamar, Mohamed Sellami, and Fatma Masmoudi

Link

Secure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users, Daniel Maldonado-Ruiz, Mohamad Badra, Nour El Madhoun, and Jenny Torres

Link

Digital Transformation in Higher Education: Maturity and Challenges Post COVID-19, Adam Marks, Maytha AL-Ali, Reem Attasi, Abdellah Abu Elkishk, and Yacine Rezgui

Link

RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators, Ahmad Samer Wazan, David W. Chadwick, Remi Venant, Romain Laborde, and Abdelmalek Benzekri

Link

Semi-supervised Time Series Anomaly Detection Model Based on LSTM Autoencoder, Hui Xiao, Donghai Guan, Rui Zhao, Weiwei Yuan, Yaofeng Tu, and Asad Masood Khattak

Link

An IoT-Based Non-invasive Diabetics Monitoring System for Crucial Conditions, Hermon Yehdego, Safa Otoum, and Omar Alfandi

Link

Hard Disk Failure Prediction via Transfer Learning, Rui Zhao, Donghai Guan, Yuanfeng Jin, Hui Xiao, Weiwei Yuan, Yaofeng Tu, and Asad Masood Khattak

Submissions from 2020

Link

System Dynamics Modeling of Logistics Hub Capacity: The Dubai Logistics Corridor Case Study, Alberto De Marco, Hussein Fakhry, Marco Postorino, Zakaria Maamar, and Hakim Hacid

Link

10 A noninvasive approach for the early detection of diabetic retinopathy, Winston Furtado, Ahmed Shalaby, Ali H. Mahmoud, Ashraf Khallaf, Ashraf Khalil, Mohammed Ghazal, Fatma Taher, Jasjit S. Suri, Guruprasad Giridharan, and Ayman El-Baz

Link

Analyzing Network Level Information, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Artificial Intelligence And Digital Forensics, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Authorship Analysis Approaches, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Authorship Attribution With Few Training Samples, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Criminal Information Mining, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Cybersecurity And Cybercrime Investigation, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Messaging Forensics In Perspective, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

Writeprint Mining For Authorship Attribution, Farkhund Iqbal, Mourad Debbabi, and Benjamin C. M. Fung

Link

A Survey of Approaches for Estimating Meteorological Visibility Distance Under Foggy Weather Conditions, Faouzi Kamoun, Hazar Chaabani, Fatma Outay, and Ansar-Ul-Haque Yasar

Link

Correction to: A Recursive Co-occurrence Text Mining of the Quran to Build Corpora for Islamic Banking Business Processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh

Submissions from 2018

Link

Model course syllabus: Management of security issues in wearable technology, Michelle C. Antero

Link

Gauging the Effectiveness of Educational Technology Integration in Education: What the Best-Quality Meta-Analyses Tell Us, Robert M. Bernard, Eugene Borokhovski, Richard F. Schmid, and Rana M. Tamim

Link

The promise and perils of wearable technologies, John Gammack and Andrew Marrington

Link

Smart Toys, Patrick C. K. Hung, Farkhund Iqbal, and Benjamin Yankson

Link

Reconciling Culture and Digital Literacy in the United Arab Emirates, Tony Jewels and Rozz Albon

Link

A new perspective on the swiss cheese model applied to understanding the anatomy of healthcare data breaches, Faouzi Kamoun and Mathew Nicho

Link

Conclusions: Where next for wearables?, Don Kerr and John Gammack

Submissions from 2017

Link

The promise and perils of wearable technologies, John Gammack and Andrew Marrington

Link

A Security Threat Analysis of Smart Home Network with Vulnerable Dynamic Agents, Laura Rafferty, Farkhund Iqbal, and Patrick C. K. Hung

Link

Privacy Preservation Framework for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C. K. Hung

Submissions from 2016

Link

Towards a Typology of Business Models for NFC-Based Mobile Payment Services, Faouzi Kamoun

Link

Does Interface Design Influence Consumers' Security Perception?, Faouzi Kamoun and Mohanad Halaweh

Link

Conclusions: Where next for wearables?, Don Kerr and John Gammack

Submissions from 2015

Link

Aspect-Oriented Paradigm, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Dynamic Matching and Weaving Semantics in Executable UML, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Model-Based Security, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Model-Driven Architecture and Model Transformations, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Security Aspect Specification, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Security Aspect Weaving, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Static Matching and Weaving Semantics in Activity Diagrams, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Dynamic Matching and Weaving Semantics in \lambda -Calculus, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima

Link

Effective alignment of disciplinary and institutional accreditation and assessment: A UAE computing case study, Kevin Schoepp, Maurice Danaher, and Leon Jololian

Link

Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid, Suleyman Uludag, Sherali Zeadally, and Mohamad Badra

Submissions from 2014

Inclusion in higher education: A case study, Christopher C. Butts, Kizzy M. Parks, Lavious Felix Daniels, and Elizabeth Sanz

Link

Social web services management, Zakaria Maamar, Noura Faci, Ejub Kajan, and Emir Ugljanin

Link

Business process trends, Mark Von Rosing, August Wilhelm Scheer, Henrik Von Scheel, Adam D.M. Svendsen, Alex Kokkonen, Andrew M. Ross, Anette Falk Bøgebjerg, Anni Olsen, Antony Dicks, Asif Qumer Gill, Bas Bach, Bob J. Storms, Callie Smit, Cay Clemmensen, Christopher K. Swierczynski, Clemens Utschig-Utschig, Dan Moorcroft, Daniel T. Jones, David Coloma-Guerrero, Deb Boykin, Dickson Hunja Muhita, Duarte Gonçalves, Fabrizio Maria Maggi, Fan Zhao, Fatima Senghore, Fatma Dandashi, Fred A. Cummins, Freek P. Stoffel, Gabriel Von Scheel, and Gabriella Von Rosing

Link

Social media and business process management, Henrik von Scheel, Zakaria Maamar, and Mona von Rosing

Submissions from 2013

Link

Mobile NFC Services: Adoption Factors and a Typology of Business Models, Faouzi Kamoun

Submissions from 2012

Link

CSMA, Khouloud Boukadi, Lucien Vincent, Chirine Ghedira, and Zakaria Maamar

Submissions from 2011

Link

How similar or different are we? A perception of diversity in global virtual teams, Gaelle Picherit-Duthler

Submissions from 2010

Link

A Framework for the Implementation of Eco-Efficient Business Systems, Maha Shakir

Submissions from 2009

Link

Evaluation of fuzzy models to support online-trust assessment, Fahim Akhter and Zakaria Maamar

Link

IP Address Management: Challenges, Solutions and Future Perspectives, Faouzi Kamoun

Submissions from 2008

Link

A Fuzzy Logic-Based Approach for Supporting Decision-Making Process in B2C Electronic Commerce Transaction, Fahim Akhter, Zakaria Maamar, and Dave Hobbs

Submissions from 2007

Link

Design Methodology for Mobile Information Systems, Z. Maamar and Q. Mahmoud