Follow

Submissions from 2019

Link

A Novel Fully Automated CAD System for Left Ventricle Volume Estimation, Omar Dekhil, Fatma Taher, Fahmi Khalifa, Garth Beache, Adel Elmaghraby, and Ayman El-Baz

Link

Proof systems in blockchains: A survey, Georgios Drakopoulos, Eleanna Kafeza, and Haseena Al Katheeri

PDF

In Situ Mutation for Active Things in the IoT Context, Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami

Link

The socio-net of things modeling framework, Amjad Fayoumi, Juliana Sutanto, and Zakaria Maamar

Link

Human Activity Recognition Using Deep Models and Its Analysis from Domain Adaptation Perspective, Nikita Gurov, Adil Khan, Rasheed Hussain, and Asad Khattak

Link

Drone forensics: A case study on DJI phantom 4, Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, and Aine MacDermott

Link

Internet of Things Platform for Transparency and Traceability of Food Supply Chain, Ahmed Haroon, Mehak Basharat, Asad Masood Khattak, and Waleed Ejaz

Link

Smart Home Systems Security, Abir Hussain, Deimante Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily

Link

Market basket analysis of student attendance records, Mohammed Hussain and Abdullah Hussein

Link

Novel robust digital watermarking in mid-rank co-efficient based on DWT and RT transform, Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, and Babar Shah

Link

A fog-based architecture for remote phobia treatment, Yassine Jebbar, Fatna Belqasmi, Roch Glitho, and Omar Alfandi

Link

Restriction-based fragmentation of business processes over the cloud, Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, and Thar Baker

Link

A CAD System for the Early Prediction of Hypertension based on Changes in Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Guruprasad Giridharan, and Ayman El-Baz

Link

Using 3-D CNNs and Local Blood Flow Information to Segment Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Ali Mahmoud, Adel Elmaghraby, and Ayman El-Baz

Link

Memory Forensics: Recovering Chat Messages and Encryption Master Key, Abdullah Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, and Khalil Al-Hussaeni

Link

Congestion Control in Wireless Sensor Networks based on Support Vector Machine, Grey Wolf Optimization and Differential Evolution, Hafiza Syeda Zainab Kazmi, Nadeem Javaid, Muhammad Imran, and Fatma Outay

Link

An Application of Using Support Vector Machine Based on Classification Technique for Predicting Medical Data Sets, Mohammed Khalaf, Abir Jaafar Hussain, Omar Alfandi, Dhiya Al-Jumeily, Mohamed Alloghani, Mahmood Alsaadi, Omar A. Dawood, and Dhafar Hamed Abd

Link

Urban sensing: Towards security efficient sensing network scheme, Salam Khanji, Mohamad Badra, Omar Alfandi, and Rouba Borghol

Link

ZigBee Security Vulnerabilities: Exploration and Evaluating, Salam Khanji, Farkhund Iqbal, and Patrick Hung

Link

Boosting IoT Efficiency and Security through Blockchain: Blockchain-based Car Insurance Process - A Case Study, Salam Khanji, Farkhund Iqbal, Zakaria Maamar, and Hakim Hacid

Link

Blockchain technology as a support infrastructure in E-Government evolution at Dubai economic department, Shafaq Naheed Khan, Mohammed Shael, and Munir Majdalawieh

Link

Smart meter security: Vulnerabilities, threat impacts, and countermeasures, Asad Masood Khattak, Salam Khanji, and Wajahat Ali Khan

Link

Stock market trend prediction using supervised learning, Asad Masood Khattak, Habib Ullah, Hassan Ali Khalid, Ammara Habib, Muhammad Zubair Asghar, and Fazal Masud Kundi

Link

Speculo: A tool for multiple identities exploration and detection in social networks, Sumaya Khoory, Noora Al Roken, Maryam Al Abdooli, and Hakim Hacid

Link

Parking availability forecasting model, Mohammad Amin Kuhail, Manohar Boorlu, Neeraj Padarthi, and Collin Rottinghaus

Link

Noise Reduction in Network Embedding, Cong Li, Donghai Guan, Zhiyuan Cui, Weiwei Yuan, Asad Masood Khattak, and Muhammad Fahim

Link

Robot computing for music visualization, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal

Link

Towards a music visualization on robot (MVR) prototype, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal

Link

Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches, Aine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, and Babar Shah

Link

Advancing digital transformation: Integrated digital transformation framework for a successful deployment, Munir Majdalawieh

Link

A recursive co-occurrence text mining of the quran to build corpora for islamic banking business processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh

Link

Facial image pre-processing and emotion classification: A deep learning approach, Alramzana Nujum Navaz, Serhani Mohamed Adel, and Sujith Samuel Mathew

Link

A Novel Game Theoretic Approach for Forming Coalitions between IMS Cloud Providers, Hani Nemati, May El Barachi, Nadjia Kara, and Fatna Belqasmi

Link

Applying system dynamics to model advanced persistent threats, Mathew Nicho and Hussein Fakhry

PDF

Dimensions of 'socio' vulnerabilities of advanced persistent threats, Mathew Nicho and Christopher D. McDermott

PDF

The covcrav project: Architecture and design of a cooperative v2v crash avoidance system, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, and Ansar Yasar

PDF

V2V and V2I communications for traffic safety and CO2 emission reduction: A performance evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, and Ansar Yasar

Link

Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild, Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi

Link

Digital investigation of wireless sensor networks - IRIS mote, Argianto Rahartomo, Arne Bochem, and Omar Alfandi

Link

Holistic User eXperience in Mobile Augmented Reality Using User eXperience Measurement Index, Fahad Ahmed Satti, Jamil Hussain, Hafiz Syed Muhammad Bilal, Wajahat Ali Khan, Asad Masood Khattak, Ju Eun Yeon, and Sungyoung Lee

Link

Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing, Fahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, and Sungyoung Lee

Link

Radiomic-based framework for early diagnosis of lung cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

On the Integration of CT-Derived Features for Accurate Detection of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz

Link

A New System for Lung Cancer Diagnosis based on the Integration of Global and Local CT Features, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

A Novel CT-Based Descriptors for Precise Diagnosis of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

Higher Education 4.0: Uni for nothin’, MOOCs for free?, Ravi Sharma, Kevin Jones, Warwick Anderson, and Anushia Inthiran

Link

Early Assessment of Acute Renal Rejection Post-transplantation: A Combined Imaging and Clinical Biomarkers Protocol, Mohamed Shehata, Fatma Taher, Mohammed Ghazal, Ali Mahmoud, Garth Beache, Mohamed Abou El-Ghar, Amy C. Dwyer, Adel Elmaghraby, and Ayman El-Baz

Link

Smart homes as an IoT application: Predicting attitudes and behaviours, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah

Link

The Role of Smart Homes' Attributes on Users' Acceptance, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah

PDF

Forecasting Temperature in a Smart Home with Segmented Linear Regression, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat

Link

Faculty perception of engineering student cheating and effective measures to curb it, Sami W. Tabsh, Hany A. El Kadi, and Akmal S. Abdelfatah

Link

A Review on the Cerebrovascular Segmentation Methods, Fatma Taher, Ali Mahmoud, Ahmed Shalaby, and Ayman El-Baz

Link

Colorizing gray level images by using wavelet filters, F. Taher, M. Darweesh, and H. Al-Ahmad

Link

Security in cloud computing: State-of-the-art, key features, challenges, and opportunities, Abdallah Tubaishat

Link

Improving Complex Network Controllability via Link Prediction, Ran Wei, Weiwei Yuan, Donghai Guan, Asad Masood Khattak, and Muhammad Fahim

Link

A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, Babar Shah, Patrick C.K. Hung, and Anna Priscilla De Albuquerque

PDF

HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, and Patrick Hung

Link

Drone forensics: A case study on a DJI mavic air, Maryam Yousef and Farkhund Iqbal

Link

Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination, Saniya Zafar, Sobia Jangsher, Moayad Aloqaily, Ouns Bouachir, and Jalel Ben Othman

Link

Active Sampling Based on MMD for Model Adaptation, Qi Zhang, Donghai Guan, Weiwei Yuan, and Asad Masood Khattak

Submissions from 2018

Link

Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches, Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, and Asad Khattak

Link

Green computing: Awareness and practices, Ahed Abugabah and Amira Abubaker

Link

A novel framework for software defined wireless sensor networks, Khandakar Ahmed, Nazmus S. Nafi, Waleed Ejaz, Mark A. Gregory, and Asad M. Khattak

Link

Towards Inclusive Social Networks for the Developing World, Christian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch Glitho, and Jules Degila

Link

Characterizing realistic signature-based intrusion detection benchmarks, Monther Aldwairi, Mohammad A. Alshboul, and Asmaa Seyam

PDF

Detecting Fake News in Social Media Networks, Monther Aldwairi and Ali Alwahedi

Link

Seamless WSN Connectivity Using Diverse Wireless Links, Omar Alfandi, Jagadeesha Rb, and John Beachboard

Link

Large scale image dataset construction using distributed crawling with hadoop YARN, Rahman Ali, Asmat Ali, Asad Masood Khatak, and Muhammad Saqlain Aslam

Link

A case-based meta-learning and reasoning framework for classifiers selection, Rahman Ali, Aasad Masood Khatak, Francis Chow, and Sungyoung Lee

Link

Malware detection using DNS records and domain name features, Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, and Fatna Belqasmi

Link

Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics, Feras Al-Obeidat, Eleanna Kafeza, and Bruce Spencer

Link

Detecting Malware Domains: A Cyber-Threat Alarm System, Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, and Monther Aldwairi

Link

Penetration and security of openssh remote secure shell service on raspberry Pi 2, Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor Albuainain, and Maktoom Alkubaisi

Link

Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation, Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, and Omar Alfandi

Link

Intelligent information systems and image processing: A novel pan-sharpening technique based on Multiscale decomposition, Ahmad Al Smadi and Ahed Abugabah

Link

E-Healthcare Knowledge Creation Platform Using Action Research, May Al Taei, Eleanna Kafeza, and Omar Alfandi

Link

Just-in-time Customer Churn Prediction: With and Without Data Transformation, Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood Ur Rahman Durani, and Sajid Anwar

Link

Configurable data acquisition for cloud-centric IoT, Muhammad Bilal Amin, Muhammad Sadiq, Wajahat Ali Khan, Asad Masood Khattak, Usman Akhtar, and Sungyoung Lee

Link

Impact of document representation on neural ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat

Link

Highlighting the Future of Autonomous Vehicle Technology in 2020-2050, Nedaa Baker Al Barghuthi, Deepa Pavithran, and Huwida E. Said

Link

Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, Alagan Anpalagan, and Omar Alfandi

An understanding of consumption trends of smart phones on university campus: A comparison study, Emad Bataineh and Sara Alamodi

Link

Usability analysis on Dubai e-government portal using eye tracking methodology, Emad Bataineh, Basel Al Mourad, and Fazouzi Kammoun

Link

Multi-classifier system for authorship verification task using word embeddings, Nacer Eddine Benzebouchi, Nabiha Azizi, Monther Aldwairi, and Nadir Farah

Link

Drone Forensics: Challenges and New Insights, Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, and Andrew Marrington

PDF

Estimating meteorological visibility range under foggy weather conditions: A deep learning approach, Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, and Ansar Ul Haque Yasar

Link

A novel feature selection-based sequential ensemble learning method for class noise detection in high-dimensional data, Kai Chen, Donghai Guan, Weiwei Yuan, Bohan Li, Asad Masood Khattak, and Omar Alfandi

Link

Empowering Graduates for Knowledge Economies in Developing Countries, Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, and Julie Bauld Wallace

Link

Stopword detection for streaming content, Hossein Fani, Masoud Bashari, Fattane Zarrinkalam, Ebrahim Bagheri, and Feras Al-Obeidat

Link

Rumor Detection in Business Reviews Using Supervised Machine Learning, Ammara Habib, Saima Akbar, Muhammad Zubair Asghar, Asad Masood Khattak, Rahman Ali, and Ulfat Batool

Link

Analysis of symbolic models of biometric data and their use for action and user identification, James Alexander Hughes, Joseph Alexander Brown, Adil Mehmood Khan, Asad Masood Khattak, and Mark Daley

Link

Remote Data Acquisition Using Raspberry Pi3, Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, and Omar Alfandi

Link

Cloud Digital Forensics Evaluation and Crimes Detection, Raja Jabir and Omar Alfandi

Link

Malware Classification with Deep Convolutional Neural Networks, Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D.B. Bruce, Yang Wang, and Farkhund Iqbal

Link

An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Ki Il Kim, and Babar Shah

Link

Mobility and Temperature Aware QoS Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim

Link

Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions, Alavi Kunhu, Hussain Al-Ahmad, and Fatma Taher

Link

Toward a reliable service-based approach to software application development, Qusay Mahmoud, Ian Andrusiak, and May AlTaei

Link

Higher education analytics: New trends in program assessments, Adam Marks and Maytha AL-Ali

Link

An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches, Shaikha Saleh Mohamed, Nedaa Baker Al Barghuthi, and Huwida Said