Abstract is missing.
- Real Time Pedestrian Detection Using Robust Enhanced YOLOv3+Chintakindi Balaram Murthy, Mohammad Farukh Hashmi. 1-5 [doi]
- Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A ReviewSamson Otieno Ooko, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma. 1-5 [doi]
- Practice of Applied Edge Analytics in Intelligent Learning FrameworkKayal Padmanandam, Lakshmi Lingutla. 1-8 [doi]
- A seq2seq Neural Network based Conversational Agent for Gulf Arabic DialectTahani Alshareef, Muazzam Ahmed Siddiqui. 1-7 [doi]
- Optimization of Migration Cost for Network Function Virtualization ReplacementFadia Shoura, Ammar Gharaibeh, Sahel Alouneh. 1-7 [doi]
- COVID-19 Impact on E-Commerce in UAEAhmad Ghandour, Brendon J. Woodford. 1-8 [doi]
- Electronic stethoscope for detecting heart abnormalities in athletesBatyrkhan Omarov, Aidar Batyrbekov, Azizah Suliman, Bakhytzhan Omarov, Yerlan Sabdenbekov, Serik Aknazarov. 1-5 [doi]
- DNA Sequence Error Corrections based on TensorFlowHassanin M. Al-Barhamtoshy, Rania Ahmed Younis. 1-5 [doi]
- Learning the Structure of the Tree and Tree Augmented Naive Bayesian from Incomplete and Imbalanced DataIssam Salman. 1-7 [doi]
- Migrating Relational Databases into XML DocumentsAbdelsalam M. Maatuk, Tawfig M. Abdelaziz, Muhammad Akhtar Ali. 1-11 [doi]
- Machine Learning and Soft RoboticsNada Masood Mirza. 1-5 [doi]
- Applicable strategy to choose and deploy a MOOC platform with multilingual AQG featureYounes-aziz Bachiri, Hicham Mouncif. 1-6 [doi]
- Trust and reputation in Wireless Sensors networksLara Saleh, Anas Abu Taleb, Walid A. Salameh. 1-6 [doi]
- A New Approach in Islamic Learning: Performance Evaluation of Motion Recognition System for Salat MovementNor Azrini Jaafar, Nor Azman Ismail, Yusman Azimi Yusoff. 1-6 [doi]
- Studying and Analyzing the Fog-based Internet of Robotic ThingsNoha El Menbawy, Hesham Arafat, Mohamed S. Saraya, Amr M. T. Ali-Eldin. 1-8 [doi]
- An IoT Based Healthcare using ECGRami Hodrob, Mahmoud Obaid, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha Sail AbuShanab. 1-4 [doi]
- A Deep CNN Approach for Plant Disease DetectionFatma Marzougui, Mohamed Elleuch, Monji Kherallah. 1-6 [doi]
- A Cluster Center Initialization Method using Hyperspace-based Multi-level Thresholding (HMLT): Application to Color Ancient Document Image DenoisingWalid Elhedda, Maroua Mehri, Mohamed-Ali Mahjoub. 1-6 [doi]
- Keystroke Identifier Using Fuzzy Logic to Increase Password SecurityAdnan Shaout, Nathan Schmidt. 1-8 [doi]
- Recovery of Mobile Game Design PatternsMaria Khan, Ghulam Rasool. 1-7 [doi]
- Sensitivity of different optimization solvers in LSTM algorithm for temperature forecast over Mars at Jezero Crater landing siteMohamed Eltahan, Karim Moharm, Nour Daoud. 1-5 [doi]
- Managing Moral Hazard Impact in Decision Making ProcessBelkacem Athamena, Zina Houhamdi, Ghaleb A. El Refae. 1-5 [doi]
- Internet of Vehicles (IoV): A Survey of Challenges and SolutionsJawaher Abdulwahab Fadhil, Qusay Idrees Sarhan. 1-10 [doi]
- A Structured Approach towards Robust Database Collection for Language IdentificationDeepti Deshwal, Pardeep Sangwan, Divya Kumar. 1-6 [doi]
- Arabic Reading Comprehension Benchmarks Created SemiautomaticallyMariam Biltawi, Arafat Awajan, Sara Tedmori. 1-6 [doi]
- Social-aware Web API Recommendation in IoTMarwa Meissa, Saber Benharzallah, Laïd Kahloul, Okba Kazar. 1-5 [doi]
- Collaborative Team Construction in Open Multi-Agents SystemZina Houhamdi, Belkacem Athamena. 1-7 [doi]
- Evaluation of Class Decomposition based on Clustering Validity and K-means AlgorithmBilal Sowan, Nasim Matar, Firas Omar, Mohammad Alauthman, Mohammed Eshtay. 1-6 [doi]
- AccessNet: A Three Layered Visual Based Access Authentication System for Restricted ZonesMd. Farukh Hashmi, B. Kiran Kumar Ashish, Satyarth Katiyar, Avinash G. Keskar. 1-7 [doi]
- Performance Analysis of Lane Detection Algorithm using Partial Hough TransformP. Maya, C. Tharini. 1-4 [doi]
- An embedded system for identifying memory systems and mental image schemas after the Intellectual Style InventoryMai Saleh, Osama El-Sharkawy. 1-4 [doi]
- Arabic handwriting recognition: Between handcrafted methods and deep learning techniquesAicha Korichi, Sihem Slatnia, Oussama Aiadi, Najiba Tagougui, Monji Kherallah. 1-6 [doi]
- A New Technique of ECG Denoising based on LWT and Total Variation Minimization ECG DenoisingMourad Talbi, Riadh Baazaoui, Med Salim Bouhlel. 1-6 [doi]
- Optimizing the Energy Consumption Level in LoRaWan NetworksAlá F. Khalifeh, Khaled Aldahdouh, Sahel Alouneh. 1-6 [doi]
- Students' Perception of Online Assessment During the COVID-19 Pandemic: The Case of Undergraduate Students in the UAEElham T. Hussain, Sumya Daoud, Hussam Alrabaiah, Amjad Kamal Owais. 1-6 [doi]
- House Price Prediction using Machine Learning Algorithm - The Case of Karachi City, PakistanMaida Ahtesham, Narmeen Zakaria Bawany, Kiran Fatima. 1-5 [doi]
- Comparison of Tree Based Classifications and Neural Network Based ClassificationB. Sarada, Madhavi Dandu, Saikonda Krishna Tarun. 1-3 [doi]
- A Distributed Fault Tolerance Mechanism for an IoT Healthcare systemMeriem Zaiter, Salima Hacini. 1-6 [doi]
- The Role of E-diagnosis Knowledge Based System on Omani Society: Skin Disease as CaseNour-Eldin Mohamed Elshaiekh, Khalfan Zahran Al Hiji. 1-4 [doi]
- Sentiment Analysis and Classification of Restaurant Reviews using Machine LearningKanwal Zahoor, Narmeen Zakaria Bawany, Soomaiya Hamid. 1-6 [doi]
- A secure and efficient anonymous certificateless signcryption for Key Distribution Scheme for Smart GridJennifer Batamuliza, Damien Hanyurwimfura. 1-7 [doi]
- Longest Common Subsequence based Multistage Collaborative Filtering for Recommender SystemsDilip Singh Sisodia, Inakollu NehaPriyanka, Prodduturi Amulya. 1-5 [doi]
- Application of Encryption Algorithms with RMI ProtocolRana Riad K. AL-Taie, Hiba A. Abu-Alsaad. 1-6 [doi]
- Building an Intelligent Telemonitoring System for Heart Failure: The Use of the Internet of Things, Big Data, and Machine LearningShorouq Eletter, Tahira Yasmin, Ghaleb Elrefae, Hashem Aliter, Abdullah Elrefae. 1-5 [doi]
- Investigating the Lack of Utilization of Information and Communication Technologies in Saudi SchoolsNouf Aljuhani, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy. 1-7 [doi]
- Comparison study between conventional machine learning and distributed multi-task learning modelsSalam Hamdan, Sufyan Almajali, Moussa Ayyash. 1-5 [doi]
- Visual Steganography and Encryption Tachniques with Hardware ImplementationHare Ram Sah, Hemang Shrivastava, Manoj Ramaiya. 1-7 [doi]
- Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPUShweta Sharma, C. Rama Krishna, Rakesh Kumar. 1-6 [doi]
- QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithmIdir Aoudia, Laïd Kahloul, Saber Benharzallah, Okba Kazar. 1-9 [doi]
- Improving Arabic dependency parsers by using dependency relationsDana Halabi, Arafat Awajan, Ebaa Fayyoumi. 1-7 [doi]
- MOOC's Student Results Classification by Comparing PNN and other Classifiers with Features SelectionAhmed Mahmoud Nazif, Ahmed Ahmed Hesham Sedky, Osama Mohamed Badawy. 1-9 [doi]
- Modified Fuzzy C-Means Clustering Approach to Solve the Capacitated Vehicle Routing ProblemMohamed A. Wahby Shalaby, Ayman R. Mohammed, Sally Kassem. 1-7 [doi]
- A Genetic Algorithm-Based XML Information Retrieval ModelFatma-Zohra Bessai Mechmache, Karima Hammouche, Zaia Alimazighi. 1-5 [doi]
- A WebGIS Decision Support System for Wadi El Natrun Rural Land ManagementSayed Ahmed, Ahmed Kotb, Ehab Samir, Marwa Moustafa, Eslam Farg, Ahmed Abd Elhay, Sayed M. Arafat. 1-7 [doi]
- Towards a Hybrid Data Partitioning Technique for Secure Data OutsourcingSultan Badran, Nabil Arman, Mousa Farajallah. 1-9 [doi]
- A Long-Short-Term-Memory Based Model for Predicting ATM Replenishment AmountMuhammad Asad, Muhammad Shahzaib, Yusra Abbasi, Muhammad Rafi. 1-6 [doi]
- Virtual Reality Applications in Education DomainGhaliya AlFarsi, Azmi Bin Mohd Yusof. 1-7 [doi]
- A Framework for Improving Data Quality in Data Warehouse: A Case StudyTaghrid Z. Ali, Tawfig M. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili. 1-8 [doi]
- Exploring Cyber Security Measures in Smart CitiesRami Mustafa A. Mohammad, Mamoun Masoud Abdulqader. 1-7 [doi]
- Algerian Dialect Sentiment Analysis: Sate of ArtSalima Brachemi-Meftah, Fatiha Barigou. 1-7 [doi]
- A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer NetworksDanijela Protic, Miomir Stankovic. 1-8 [doi]
- A multi agent broker framework and decision support for enhanced cloud computing discoveryMohamed Galal Hafez Rady, Mohamed Shaheen Elgamel, Osama Mohamed Badawy. 1-7 [doi]
- Diabetes Disease Prediction Using Artificial IntelligenceMuntather Ayad, Hussein Kanaan, Mohammad Ayache. 1-6 [doi]
- A Comparative Analysis of Machine Learning Techniques for Classification and Detection of MalwareMaryam Al-Janabi, Ahmad Mousa Altamimi. 1-9 [doi]
- Automated Brain Tumor Segmentation in MRI using Superpixel Over-segmentation and ClassificationAya Mourad, Ahmed Afifi, Arabi E. Keshk. 1-8 [doi]
- A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible VisionsShaymaa M. Hamandi, Abdul Monem S. Rahma, Rehab F. Hassan. 1-9 [doi]
- Human Gait Identification System Based on Transfer LearningLayla Hashem, Roaa Al-Harakeh, Ali Cherry. 1-6 [doi]
- Cloud Computing Failures, Recovery Approaches and Management ToolsLara Saleh, Waleed Al-Sitt. 1-10 [doi]
- Mining Patients' Reviews in Online Health Communities for Adverse Drug Reaction Detection of Antiepileptic DrugsAnwar Ali Yahya, Yousef Asiri, Ibrahim Alyami. 1-6 [doi]
- Transfer Learning to improve Arabic handwriting text RecognitionZouhaira Noubigh, Anis Mezghani, Monji Kherallah. 1-6 [doi]
- Hybrid SMS Spam Filtering System Using Machine Learning TechniquesHind Baaqeel, Rachid Zagrouba. 1-8 [doi]
- Modified Clustering Algorithms for Energy Harvesting Wireless Sensor Networks- A SurveyDeivanai Gurusamy, Sadik Abas. 1-11 [doi]
- Sense Inventories for Arabic TextsMarwah Alian, Arafat Awajan. 1-4 [doi]
- An analytical study of student satisfaction with the Statistics courses in e-learning as a new experience after Covid-19 at Al Ain UniversityMaha Rahrouh, Mamdouh Ghanem. 1-6 [doi]
- A Novel Method to Verify the Search Results of Database Queries on Cloud ComputingSafaa Hraiz, Ghazi Al-Naymat, Arafat Awajan. 1-7 [doi]
- Wireless Sensor Network MAC Energy - efficiency Protocols: A SurveyGhassan Samara. 1-5 [doi]
- On Detecting Online Radicalization and Extremism Using Natural Language ProcessingShynar Mussiraliyeva, Milana Bolatbek, Batyrkhan Omarov, Zhanar Medetbek, Gulshat Baispay, Ruslan Ospanov. 1-5 [doi]
- Fuzzy logic Applied to Smart Baby's Health and Feeding Sequence Monitoring SystemJean Claude Tuyisenge, Nirere Gaudence, Didacienne Mukanyiligira, Jean Pierre Nyakuri. 1-7 [doi]
- Issues and Challenges for Content-Based Video Search Engines A SurveyAhmad Sedky Adly, M. S. Abdelwahab, Islam Hegazy, Taha ElArif. 1-18 [doi]