Submissions from 2019
A Review on the Cerebrovascular Segmentation Methods, Fatma Taher, Ali Mahmoud, Ahmed Shalaby, and Ayman El-Baz
Colorizing gray level images by using wavelet filters, F. Taher, M. Darweesh, and H. Al-Ahmad
Security in cloud computing: State-of-the-art, key features, challenges, and opportunities, Abdallah Tubaishat
Improving Complex Network Controllability via Link Prediction, Ran Wei, Weiwei Yuan, Donghai Guan, Asad Masood Khattak, and Muhammad Fahim
A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, Babar Shah, Patrick C.K. Hung, and Anna Priscilla De Albuquerque
HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, and Patrick Hung
Drone forensics: A case study on a DJI mavic air, Maryam Yousef and Farkhund Iqbal
Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination, Saniya Zafar, Sobia Jangsher, Moayad Aloqaily, Ouns Bouachir, and Jalel Ben Othman
Active Sampling Based on MMD for Model Adaptation, Qi Zhang, Donghai Guan, Weiwei Yuan, and Asad Masood Khattak
Submissions from 2018
Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches, Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, and Asad Khattak
Green computing: Awareness and practices, Ahed Abugabah and Amira Abubaker
A novel framework for software defined wireless sensor networks, Khandakar Ahmed, Nazmus S. Nafi, Waleed Ejaz, Mark A. Gregory, and Asad M. Khattak
Towards Inclusive Social Networks for the Developing World, Christian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch Glitho, and Jules Degila
Characterizing realistic signature-based intrusion detection benchmarks, Monther Aldwairi, Mohammad A. Alshboul, and Asmaa Seyam
Detecting Fake News in Social Media Networks, Monther Aldwairi and Ali Alwahedi
Seamless WSN Connectivity Using Diverse Wireless Links, Omar Alfandi, Jagadeesha Rb, and John Beachboard
Large scale image dataset construction using distributed crawling with hadoop YARN, Rahman Ali, Asmat Ali, Asad Masood Khatak, and Muhammad Saqlain Aslam
A case-based meta-learning and reasoning framework for classifiers selection, Rahman Ali, Aasad Masood Khatak, Francis Chow, and Sungyoung Lee
Malware detection using DNS records and domain name features, Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, and Fatna Belqasmi
Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics, Feras Al-Obeidat, Eleanna Kafeza, and Bruce Spencer
Detecting Malware Domains: A Cyber-Threat Alarm System, Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, and Monther Aldwairi
Penetration and security of openssh remote secure shell service on raspberry Pi 2, Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor Albuainain, and Maktoom Alkubaisi
Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation, Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, and Omar Alfandi
Intelligent information systems and image processing: A novel pan-sharpening technique based on Multiscale decomposition, Ahmad Al Smadi and Ahed Abugabah
E-Healthcare Knowledge Creation Platform Using Action Research, May Al Taei, Eleanna Kafeza, and Omar Alfandi
Just-in-time Customer Churn Prediction: With and Without Data Transformation, Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood Ur Rahman Durani, and Sajid Anwar
Configurable data acquisition for cloud-centric IoT, Muhammad Bilal Amin, Muhammad Sadiq, Wajahat Ali Khan, Asad Masood Khattak, Usman Akhtar, and Sungyoung Lee
Impact of document representation on neural ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat
Highlighting the Future of Autonomous Vehicle Technology in 2020-2050, Nedaa Baker Al Barghuthi, Deepa Pavithran, and Huwida E. Said
Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, Alagan Anpalagan, and Omar Alfandi
An understanding of consumption trends of smart phones on university campus: A comparison study, Emad Bataineh and Sara Alamodi
Usability analysis on Dubai e-government portal using eye tracking methodology, Emad Bataineh, Basel Al Mourad, and Fazouzi Kammoun
Multi-classifier system for authorship verification task using word embeddings, Nacer Eddine Benzebouchi, Nabiha Azizi, Monther Aldwairi, and Nadir Farah
Drone Forensics: Challenges and New Insights, Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, and Andrew Marrington
Estimating meteorological visibility range under foggy weather conditions: A deep learning approach, Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, and Ansar Ul Haque Yasar
A novel feature selection-based sequential ensemble learning method for class noise detection in high-dimensional data, Kai Chen, Donghai Guan, Weiwei Yuan, Bohan Li, Asad Masood Khattak, and Omar Alfandi
Empowering Graduates for Knowledge Economies in Developing Countries, Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, and Julie Bauld Wallace
Stopword detection for streaming content, Hossein Fani, Masoud Bashari, Fattane Zarrinkalam, Ebrahim Bagheri, and Feras Al-Obeidat
Rumor Detection in Business Reviews Using Supervised Machine Learning, Ammara Habib, Saima Akbar, Muhammad Zubair Asghar, Asad Masood Khattak, Rahman Ali, and Ulfat Batool
Analysis of symbolic models of biometric data and their use for action and user identification, James Alexander Hughes, Joseph Alexander Brown, Adil Mehmood Khan, Asad Masood Khattak, and Mark Daley
Remote Data Acquisition Using Raspberry Pi3, Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, and Omar Alfandi
Cloud Digital Forensics Evaluation and Crimes Detection, Raja Jabir and Omar Alfandi
Malware Classification with Deep Convolutional Neural Networks, Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D.B. Bruce, Yang Wang, and Farkhund Iqbal
An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Ki Il Kim, and Babar Shah
Mobility and Temperature Aware QoS Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim
Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions, Alavi Kunhu, Hussain Al-Ahmad, and Fatma Taher
Toward a reliable service-based approach to software application development, Qusay Mahmoud, Ian Andrusiak, and May AlTaei
Higher education analytics: New trends in program assessments, Adam Marks and Maytha AL-Ali
An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches, Shaikha Saleh Mohamed, Nedaa Baker Al Barghuthi, and Huwida Said
A process model for implementing information systems security governance, Mathew Nicho
When spear phishers craft contextually convincing emails, Mathew Nicho, Hussein Fakhry, and Uche Egbue
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane, Mathew Nicho and Shafaq Naheed Khan
Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun
Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi
Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung
The X-supply game, Sinan Salman and Suzan Alaswad
A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz
Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi
A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat
Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane
Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow
An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi
Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak
Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Submissions from 2017
Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah
Evaluation of healthcare enterprise information systems: A structural equation model, Ahed Abugabah
Unsupervised geometrical feature learning from hyperspectral data, Muhammad Ahmad, Adil Mehmood Khan, Rasheed Hussain, Stanislav Protasov, Francis Chow, and Asad Masood Khattak
FLUKES: Autonomous log forensics, intelligence and visualization tool, Monther Aldwairi and Hesham H. Alsaadi
Architecture guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, Asad Khatak, and Raja Muhammad Ubaid Ullah
The best practice in implementing itil service transition for successful it service production, Mohamed Basel Almourad, Mohammed Hussain, and Feras Al-Obeidat
Identifying Major Tasks from On-line Reviews, Feras Al-Obeidat and Bruce Spencer
Compromised user credentials detection using temporal features: A prudent based approach, Adnan Amin, Sajid Anwar, Babar Shah, and Asad Masood Khattak
Variants of spray and forwarding scheme in delay tolerant networks, Mohammad Abdul Azim, Babar Shah, Beom Su Kim, Kyong Hoon Kim, and Ki Il Kim
The Creation of an Arabic Emotion Ontology Based on E-Motive, Anoud Bani-Hani, Munir Majdalweieh, and Feras Obeidat
Designing And Implementing B2B Applications Using Argumentative Agents, Jamal Bentahar, Nanjangud Narendra, Zakaria Maamar, Rafiul Alam, and Philippe Thiran
A Neural network approach to visibility range estimation under foggy weather conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, and Ansar Ul Haque Yasar
The computing professional skills assessment utilized with graduate students, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov
Large residual multiple view 3D CNN for false positive reduction in pulmonary nodule detection, Anton Dobrenkii, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan
Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems, Muhammad Fahim, Thar Baker, Asad Masood Khattak, and Omar Alfandi
Physical activity recognizer based on multimodal sensors in smartphone for ubiquitous-lifecare services, Muhammad Fahim, Asad Masood Khattak, Saiqa Aleem, and Haseena Al Katheeri
Joint workload scheduling and BBU allocation in cloud-RAN for 5G networks, Lilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, and Asad Masood Khattak
Deep learning models for bone suppression in chest radiographs, Maxim Gusarev, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Multimedia File Signature Analysis for Smartphone Forensics, D. Hamdi, F. Iqbal, T. Baker, and B. Shah
Securing the internet of things: A worst-case analysis of trade-off between query-anonymity and communication-cost, Kadhim Hayawi, Pin Han Ho, Sujith Samuel Mathew, and Limei Peng
A novel approach for analyzing student interaction with educational systems, Mohammed Hussain, M. Basel Al-Mourad, Abdullah Hussein, Sujith Mathew, and Essam Morsy
Continuous health monitoring using smartphones-A case-study for monitoring diabetic patients in UAE, A. J. Jihad, Sujith Samuel Mathew, Sujni Paul, and D. Ponmary Pushpalatha
Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance, Eleanna Kafeza, Christos Makris, and Gerasimos Rompolas
Forensic analysis of xbox one and playstation 4 gaming consoles, Salam Khanji, Raja Jabir, Farkhund Iqbal, and Andrew Marrington
Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD), Asad M. Khattak, Farkhund Iqbal, Patrick C.K. Hung, Jwo Shiun Sun, Guan Pu Pan, and Jing Jie Lin
Ongoing Research Agenda on the Internet of Things (IoT) in the Context of Artificial Intelligence (AI), Zakaria Maamar
A reference framework for enterprise computing curriculum, Munir Majdalawieh and Adam Marks
Learning systems' learning analytics, Adam Marks, Maytha Al-Ali, and Kees Rietsema
Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro, Rima Masri and Monther Aldwairi
From the Internet of Things to the web of things-enabling by sensing as-A service, Sujith Samuel Mathew, Yacine Atif, and May El-Barachi
A Decision support framework for public healthcare: An approach to follow-up support service, Shah Jahan Miah, John G. Gammack, Rashadul Hasan, and Najmul Hasan
Developing a framework towards design understanding for crowdsourcing research: A content analysis, Shah Jahan Miah, Najmul Hasan, Don Kerr, and John G. Gammack
Gamifying Foundational STEM Skills, Jim Morey, John Gammack, and Erik Thornquist
Towards safer roads through cooperative hazard awareness and avoidance in connected vehicles, Fatma Outay, Faouzi Kammoun, Florent Kaisser, and Mohammed Atiquzzaman