Abstract is missing.
- Markov Augmented Neural Networks for Streaming Video ClassificationAdnan Shaout, Brennan Crispin. 1-7 [doi]
- An Intelligent Real Time Road Sign SystemAdnan Shaout, Ali Hassani. 8-13 [doi]
- CASCloud: An Open Source Private Cloud for Higher EducationGaurav Bhatia, Ismail Hamed Al Sulti. 14-20 [doi]
- Performance Comparison of Two Algorithms for Arbitrary Shapes ClusteringMariam Khader, Ghazi Al-Naymat. 20-26 [doi]
- Semi Supervised Prediction Model in Educational Data MiningIsmail Hmiedi, Hassan Najadat, Zain Halloush, Ibtihal Jalabneh. 27-31 [doi]
- Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data StorageKhalid Kaabneh, Rakan Alhwaidi. 32-37 [doi]
- Opinion Mining: Applications TrendsIbtisam Mohammed Albahri. 38-41 [doi]
- Android Malware Detection and Categorization Based on Conversation-level Network Traffic FeaturesMohammad Kamel A. Abuthawabeh, Khaled W. Mahmoud. 42-47 [doi]
- Mobility prediction as a time function for mobile networks in 3-D space: A FrameworkMohammad Al-hattab, Nuha Hamada. 48-51 [doi]
- Bee Hive MonitorAdnan Shaout, Nathan Schmidt. 52-57 [doi]
- Application of Fuzzy Neural Networks in Robotic Path PlanningNada Masood Mirza. 58-62 [doi]
- The Impact of Transitive Class Relations on Measuring the Degree of Class CohesionSuleiman H. Mustafa, Ru'ya Alawneh. 63-69 [doi]
- Does Social Media Affects Users' Well-BeingWalaa S. Mahmoud, Ajayeb S. Abu Daabes. 78-80 [doi]
- A Meta-strategy for Multi-issue NegotiationSafeyah Tawil, Khalid Mansour, Yaser Al-Lahham. 81-86 [doi]
- Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values ImputationHazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib. 87-90 [doi]
- A Model-Oriented Requirements Traceability Framework for Small and Medium Software IndustriesGullelala Jadoon, Muhammad Shafi, Sadaqat Jan. 91-96 [doi]
- Medical patient appointments management using smart software system in UAEAyman Odeh, Raghad Abdelhadi, Hussien Odeh. 97-101 [doi]
- Modeling Collision Avoidance Field for Overtaking Moving ObstaclesMohammed Mahmod Shuaib. 102-106 [doi]
- Techniques For Face Verification: Literature ReviewGhaliya AlFarsi, Jasiya Jabbar, Ragad M. Tawafak, Abir Alsidiri, Maryam ALSinani. 107-112 [doi]
- Knowledge Sharing Platform for Multi-site OrganisationAhmad Ghandour. 113-117 [doi]
- Power Controlled Medium Access Control Design For Cognitive Radio Ad-Hoc NetworkAla'eddin Masadeh, Haythem Bany Salameh, Ahmad I. Abu-El-Haija. 118-123 [doi]
- Data Exfiltration Techniques and Data Loss Prevention SystemHamzeh AlKilani, Mohammed Nasereddin, Ali Hadi, Sara Tedmori. 124-127 [doi]
- An Analytical Hierarchical Process Model to Select Programming Language for Novice Programmers for Data Analytics ApplicationsAhmad A. Bany Abdelnabi. 128-132 [doi]
- Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAEZuhrieh A. Shanaa, Enas Abulibdeh. 133-137 [doi]
- Sentiment Analysis of Yelp using Advanced V ModelAdnan Shaout, Udit Gami. 138-143 [doi]
- Fuzzy Based Threat Assessment Model (FTAM)Nevrus Kaja, Adnan Shaout, Di Ma. 144-149 [doi]
- Factors Influencing Education and E-learning Technology in UAE Universities as a Predictor of Community SatisfactionHussein Salem Alsrehan. 150-158 [doi]
- A Framework for Smart Capacity Estimation at Crowded Area using WSNNaeem A. Nawaz, Hamid Raza Malik, Ahmed Jaber Alshaor. 159-164 [doi]
- Diversifying The Teaching Methods : Student's Perceptions of Smart LearningEnas Abulibdeh, Abdalla Abu Libdeh, Fuad A. Trayek, Ghadah Murshidi. 165-170 [doi]
- Higher Education Units Assessment Based on Data Envelopment Analysis and Clustering TechniquesHassan Najadat, Qutaibah Althebyan, Yasmin Al-Omary. 171-177 [doi]
- Technology for Promoting Academic Integrity: The Impact of Using Turnitin on Reducing PlagiarismSumaya Daoud, Hussam Alrabaiah, Eman Zaitoun. 178-181 [doi]
- A Hybrid Model of Ensemble Method and Data Envelopment Analysis (DEA) for E-government Websites Efficiency EvaluationHassan Najadat, Amer Badarneh, Sawsan Alodibat. 182-187 [doi]
- A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase ApproachQutaibah Althebyan. 188-192 [doi]
- A New e-Tendering Model For Fully Automated Tendering ProcessAbdallah Qusef, Mohammad Daradkah, George Sammour, Aalaa Albadarneh. 193-201 [doi]
- Automatic Recovery of Unit Tests after Code RefactoringAlaa Jaradat, Abdallah Qusef. 202-208 [doi]
- RBF Neural Network Model to Increase the Performance of Solar PanelsMohammed Ali Taleb, Jamal Haydar, Walid Fahs, Ali Mokdad. 209-213 [doi]
- Priority-Based Channel Access for SAN Protocol in M2M CommunicationMohammad Shurman, Wafaa Alkahla, Haya Hasan. 214-217 [doi]
- Enhanced E-Voting Protocol Based on Public Key CryptographyHani Mahmouad AlMimi, Samar A. Shahin, Mohammad Sh. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi. 218-221 [doi]
- Inter-destination Synchronization : A Comparison between Master-Slave and Synchronization-Manager TechniquesShahab Ud Din, Bilal Ahmad, Ayman Ahmed, Mohammed Amin, Samer Aoudi. 222-229 [doi]
- Privacy Preserving of Shared Data in Deep LearningAhmad Al-Qerem, Eman Al Nagi. 230-234 [doi]
- Loan Default Prediction Model Improvement through Comprehensive Preprocessing and Features SelectionAhmad Al-Qerem, Ghazi Al-Naymat, Mays Alhasan. 235-240 [doi]
- Image Generation Using Different Models Of Generative Adversarial NetworkAhmad Al-Qerem, Yasmeen Shaher Alsalman, Khalid Mansour. 241-245 [doi]
- Image Caption Generation Using A Deep ArchitectureAnsar Hani, Najiba Tagougui, Monji Kherallah. 246-251 [doi]
- IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDSMohammad M. Shurman, Rami M. Khrais, Abdulrahman A. Yateem. 252-254 [doi]
- Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical FeaturesMohammed Ajam, Hussein Kanaan, Lina El Khansa, Mohammad Ayache. 255-258 [doi]
- Freezing of Gait Detection: Deep Learning ApproachMostafa Abdallah, Ali Saad, Mohammad Ayache. 259-261 [doi]
- Ethical Issues in Artificial Intelligence in UAEAhmad Ghandour, Brendon J. Woodford. 262-266 [doi]
- User Identification Algorithm based-on Devices RecognitionZina Houhamdi, Belkacem Athamena. 267-274 [doi]
- Zero-Day Attack Detection and Prevention in Software-Defined NetworksHuthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi, Qutaibah Althebyan. 278-282 [doi]
- Design and Simulation of 90 nm Threshold Logic Carry-Look-Ahead AdderTasneem AlSalem, Lina Nazzal, Marah Samara, Mawahib Hussein Sulieman. 283-286 [doi]
- Privacy Paradoxes in the Middle East: A Content Analysis from InstagramFaten F. Kharbat, Ajayeb S. Abu Daabes. 287-288 [doi]