Abstract is missing.
- Data-Oriented Approach for the Dial-A-Ride ProblemNegin Alisoltani, Mahdi Zargayouna, Ludovic Leclercq. 1-6 [doi]
- Blockchain-Based Contract Signing Protocol for Confidential ContractsMacià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal. 1-6 [doi]
- Securing Intelligent Communications on the Vehicular AdHoc Networks using Fuzzy Logic Based Trust OLSRYoussef Inedjaren, Besma Zeddini, Mohamed Maachaoui, Jean-Pierre Barbot. 1-6 [doi]
- A Multi-Level Fusion Approach for Climate Variation Study using Multi-Source Data - Case Study: AlgeriaMohamed Amir Abbas, Nadjia Benblidia, Nour El Islam Bachari. 1-7 [doi]
- Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic DetectionFiras Saidi, Zouheir Trabelsi, Henda Ben Ghezela. 1-9 [doi]
- Modeling and Virtualization of Cultural HeritageBoumediene Belkhouche, Wadha Al Ketbi, Aysha Al Neyadi, Shaikha Al Nuaimi, Eiman Al Hassani. 1-8 [doi]
- A Model-Driven Engineering Approach for Business Process Based SaaS Services CompositionNajla Fattouch, Mouna Rekik 0001, Abderrahim Ait Wakrime, Khouloud Boukadi. 1-8 [doi]
- A Language for Controller-Less Internet of Things Orchestration Based on Label ForwardingCharif Mahmoudi, Fabrice Mourlin. 1-7 [doi]
- An Unsupervised Incremental Virtual Learning Method for Financial Fraud DetectionTian Ma, Shiyou Qian, Jian Cao, Guangtao Xue, Jiadi Yu, Yanmin Zhu, Minglu Li 0001. 1-6 [doi]
- Nested Workflows for Loosely Coupled HPC SimulationsWael R. Elwasif, Ane Lasa, Philip C. Roth, Timothy Reed Younkin, Mark R. Cianciosa. 1-8 [doi]
- Facial Expression Recognition using Convolution Neural Network Enhancing with Pre-Processing StagesFaten Khemakhem, Hela Ltifi. 1-7 [doi]
- Design and Testing of a Practical Smart Walking Cane for the Visually ImpairedNada M. Obaid, Ibrahim A. Hamad, Ali M. Madkhane, Yousif A. Hamad, Fadi T. El-Hassan. 1-5 [doi]
- A Design of an Enhanced Redundant SIP Model for Securing SIP-Based NetworksMohammad Rasoi Saleem Al Saidat. 1-6 [doi]
- Usability Evaluation of Lexicographic e-ServicesDiana Alhafi, Anton Deik, Elhadj Benkhelifa, Mustafa Jarrar. 1-7 [doi]
- A Look into Privacy-Preserving BlockchainsNida Khan, Mohamed Nassar 0001. 1-6 [doi]
- Hapicare: A Healthcare Monitoring System with Self-Adaptive Coaching using Probabilistic ReasoningHossain Kordestani, Roghayeh Mojarad, Abdelghani Chibani, Aomar Osmani, Yacine Amirat, Kamel Barkaoui, Wagdy Zahran. 1-8 [doi]
- Cancer Detection in Breast Histopathology with Convolution Neural Network Based ApproachTasleem Kausar, Mingjiang Wang, M. S. S. Malik. 1-5 [doi]
- Cryptographically Enforced Access Control in Blockchain-Based PlatformsShadan Ghaffaripour, Ali Miri. 1-7 [doi]
- An Automatic Dental Decay Treatment Prediction using a Deep Convolutional Neural Network on X-Ray ImagesMajed Bouchahma, Sana Ben Hammouda, Samia Kouki, Mouza Alshemaili, Khalid Samara. 1-4 [doi]
- Bypassing Full Disk Encryption with Virtual Machine IntrospectionYacine Hebbal. 1-8 [doi]
- Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT ApplicationsJesus Pacheco, Victor H. Benitez, Cihan Tunc, Clarisa Grijalva. 1-6 [doi]
- Image Feature Detectors for Deepfake Video DetectionFaten F. Kharbat, Tarik Elamsy, Ahmed Mahmoud, Rami Abdullah. 1-4 [doi]
- Fundamentals of Feature Selection: An Overview and ComparisonAmina Benkessirat, Nadjia Benblidia. 1-6 [doi]
- Children Immunization App (CImA), Low-Cost Digital Solution for Supporting Syrian Refugees in Zaatari Camp in Jordan - General DescriptionZiad El-Khatib, Soha El-Halabi, Mohamad Abu Khdeir, Yousef S. Khader. 1-5 [doi]
- Automatic Hate Speech Detection on Social Media: A Brief SurveyAhlam Alrehili. 1-6 [doi]
- Enabling High Performance Fog Computing through Fog-2-Fog Coordination ModelMohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, Aseel Hussien. 1-6 [doi]
- Computational Serendipitous Recommender System Frameworks: A Literature SurveyFakhri Abbas, Xi Niu. 1-8 [doi]
- Single-Path Network Coding Authentication for Software-Defined Named Data NetworkingRyma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah. 1-8 [doi]
- Gamification-Based Apps for PTSD: An Analysis of Functionality and CharacteristicsNidal Drissi, Sofia Ouhbi, Mohammed Abdou Janati Idrissi, Mounir Ghogho. 1-6 [doi]
- Study by the FDTD Method of Multiband Microstrip Patch Antenna Loaded with L-Shaped SlotAmel Boufrioua, Elhachmi Ksouri, Meriem Harbadji. 1-4 [doi]
- Multi-Oriented Real-Time Arabic Scene Text Detection with Deep Fully Convolutional NetworksM. Saifeddine Hadj Sassi, Ines Beltaief, Manel Zekri, Sadok Ben Yahia. 1-6 [doi]
- Drone Forensics: A Case Study on DJI Phantom 4Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, Áine MacDermott. 1-6 [doi]
- Queries-Based Profile Evolution using Genetic AlgorithmNour El Houda Boulkrinat, Nadjia Benblidia, Abdelkrim Meziane. 1-6 [doi]
- A Lightweight Deep Autoencoder-Based Approach for Unsupervised Anomaly DetectionGcinizwe Dlamini, Rufina Galieva, Muhammad Fahim. 1-5 [doi]
- Towards a Performant Multilingual Model Based on Ensemble Learning to Enhance Sentiment AnalysisOtman Manad, Tarek Menouer, Patrice Darmon. 1-8 [doi]
- Smart Homes as an IoT Application: Predicting Attitudes and BehavioursAhmed Shuhaiber, Ibrahim Mashal, Osama Alsaryrah. 1-7 [doi]
- Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse AttackZouheir Trabelsi, Safaa Zeidan. 1-8 [doi]
- Different Word Representation for Text Classification: A Comparative StudyEman Alsagour, Lubna Alhenki, Mohammed Al-Dhelaan. 1-2 [doi]
- Graph-Based Visualization of Stochastic Dominance in Statistical ComparisonsGürdal Ertek, Gül Tokdemir, Mohamad Mustafa Hammoudi. 1-7 [doi]
- Detection and Tracking of Fingertips for Geometric Transformation of Objects in Virtual EnvironmentMohammad Mahmudul Alam, S. M. Mahbubur Rahman. 1-8 [doi]
- A Meta Language for Cyber-Physical Systems and Threats: Application on Autonomous VehicleSamir Ouchani, Abdelaziz Khaled. 1-8 [doi]
- Image Segmentation of Bright Field Activated Sludge Microscopic Images using Gaussian Mixture ModelHumaira Nisar, Goh Jinn Herng, Teh Peh Chiong. 1-7 [doi]
- Facial Image Pre-Processing and Emotion Classification: A Deep Learning ApproachAlramzana Nujum Navaz, Mohamed Adel Serhani, Sujith Samuel Mathew. 1-8 [doi]
- Information Security Risk Communication: A User-Centric ApproachManal Alohali, Nathan L. Clarke, Steven Furnell. 1-10 [doi]
- Performance Evaluation of Sensor Deployment Strategies in WSNs Towards IoTIbtihal Alablani, Mohammed Alenazi. 1-8 [doi]
- Towards a Serious Game for Amazigh Language LearningSiham Boulaknadel, Yassine Tazouti, Youssef Fakhri. 1-5 [doi]
- The Impact of SMOTE and Grid Search on Maintainability Prediction ModelsElmidaoui Sara, Cheikhi Laila, Idri Ali. 1-8 [doi]
- Automatic Clustering of Attacks in Intrusion Detection SystemsMohammad Shojafar, Rahim Taheri, Zahra Pooranian, Reza Javidan, Ali Miri, Yaser Jararweh. 1-8 [doi]
- Cooperative Agents Based Data Placement Approach for Data Intensive WorkflowsRihab Derouiche, Zaki Brahmi, Mohamed Mohsen Gammoudi. 1-8 [doi]
- Cluster-Based Intrusion Detection Method for Internet of ThingsSarika Choudhary, Nishtha Kesswani. 1-8 [doi]
- ICSAC: Towards Outliers Rejection and Multi-Model Identification in Keypoint-Based Matching of Partial Near-DuplicatesAhmad Obeid, Abdulrahman Takiddeen, Andrzej Stefan Sluzek. 1-5 [doi]
- A Study on Trust Models in Cloud ComputingAmândio Balcão Filho, Ferrucio de Franco Rosa, Rodrigo Ruiz, Rodrigo Bonacin, Mario Jino. 1-8 [doi]
- Fuzzy Logic Based Security Trust Evaluation for IoT EnvironmentsAhmad Khalil, Nader Mbarek, Olivier Togni. 1-8 [doi]
- Arabic Text-Based Video Indexing and Retrieval System Enhanced by Semantic Content and Relevance FeedbackMohamed Hamroun 0001, Sonia Lajmi, Henri Nicolas, Ikram Amous. 1-8 [doi]
- A Novel Online Machine Learning Based RSU Prediction Scheme for Intelligent Vehicular NetworksNoura Aljeri, Azzedine Boukerche. 1-8 [doi]
- Using Series of Infrared Data and SVM for Breast Normality EvaluationA. S. Araujo, T. A. E. da Silva, Maira Beatriz Hernandez Moran, Aura Conci. 1-8 [doi]
- Analysis of the Current State of Cloud Forensics: The Evolving Nature of Digital ForensicsBenjamin Yankson, Adam Davis. 1-8 [doi]
- Implementing and Scaling up Telemedicine Initiatives: Beyond User-CenterednessLena Otto. 1-6 [doi]
- A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and CanadaHaifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, Djedjiga Mouheb. 1-7 [doi]
- IoT Devices Hardware Modeling for Executing Blockchain and Smart Contracts ApplicationsRoland Kromes, François Verdier. 1-6 [doi]
- A Survey of In-Lined Reference Monitors: Policies, Applications and ChallengesFadi Yilmaz, Meera Sridhar. 1-8 [doi]
- BL.Frailty: Towards an ICT-Based Platform for Frailty Assessment at HomeElyes Lamine, Katarzyna Borgiel, Hervé Pingaud, Marie-Noëlle Cufi, Christophe Bortolaso, Mustapha Derras. 1-6 [doi]
- URL-Based Tweet Credibility EvaluationHamda Slimi, Ibrahim Bounhas, Yahya Slimani. 1-6 [doi]
- Spectrometer as an Ubiquitous Sensor for IoT Applications Targeting Food QualityDina Samak, Sarah Jad, Nour Nabil, Amr Wassal, Marwan Torki. 1-7 [doi]
- Efficient Keyword Spotting through Hardware-Aware Conditional Execution of Deep Neural NetworksJuan Sebastian P. Giraldo, Chris O'Connor, Marian Verhelst. 1-8 [doi]
- Towards an Edge-Based Architecture for Real-Time Collaborative EditorsMona Al-Ghamdi, Asma Cherif, Abdessamad Imine. 1-8 [doi]
- Selecting the Best Optimal Feature Correspondence with Deep LearningKamalkhan Artykbayev, Askhat Temir, M. Fatih Demirci. 1-6 [doi]
- English vs Arabic Sentiment Analysis: A Survey Presenting 100 Work Studies, Resources and ToolsImane Guellil, Faiçal Azouaou, Alessandro Valitutti. 1-8 [doi]
- A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACCKhalid Alsubhi, Fawaz Alsolami, Abdullah Algarni, E. Albassam, Maher Khemakhem, Fathy Alburaei Eassa, Kamal M. Jambi, M. Usman Ashraf. 1-8 [doi]
- Exploiting Ethereum Smart Contracts for Clinical Trial ManagementI. A. Omar, Raja Jayaraman, K. Salah, Mecit Can Emre Simsekler. 1-6 [doi]
- Towards Optimistic Access Control for Cloud-Based Collaborative EditorsOlfa Abusalem, Asma Cherif, Abdessamad Imine. 1-8 [doi]
- Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across HomesFlávia Dias Casagrande, Evi Zouganeli. 1-8 [doi]
- Motion-Based Gait Recognition for Recognizing People in Traditional Gulf ClothingMohammad Asif Towheed, Wasif Kiyani, Mumtaz Ummar, Tamer Shanableh, Salam Dhou. 1-6 [doi]
- Multi-Layer Laser Scanner Strategy for Obstacle Detection and TrackingDominique Gruyer, Mohamed Cherif Rahal. 1-8 [doi]
- Evaluating Skills Dimensions: Case Study on Occupational Changes in the UAEReem Al Junaibi, Mohammed Omar, Zeyar Aung, Armin Alibasic, George Westerman, Wei Lee Woon. 1-8 [doi]
- Using a Hierarchical Softmax Based on the Huffman Coding Tree for Authenticating Arabic TweetsBashar Talafha, Mohammad Al-Smadi, Mahmoud Al-Ayyoub, Yaser Jararweh, Patrick Juola. 1-5 [doi]
- Hierarchical Timed Colored Petri-Net Based Modeling and Evaluation of a Bank Credit Monitoring SystemAdel Ben Mnaouer, Marina M. Wanis, Moayad Aloqaily. 1-7 [doi]
- Reducing Traffic Congestion by LSTM-LOF FrameworkDou El Kefel Mansouri, Seif-Eddine Benkabou, Bachir Kaddar, Josep-Lluís Larriba-Pey, Khalid Benabdeslem. 1-8 [doi]
- One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay ChatSicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri. 1-8 [doi]
- Face Recognition using Eigen-Faces and Extension Neural NetworkYousef Shatnawi, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub. 1-7 [doi]
- SSD: Cache or Tier an Evaluation of SSD Cost and Efficiency using MapReduceFatimah Alsayoud, Ali Miri. 1-8 [doi]
- Question to Question Similarity Analysis using Morphological, Syntactic, Semantic, and Lexical FeaturesMuntaha Al-Asa'd, Nour Al-Khdour, Mutaz Bni Younes, Enas Khwaileh, Mahmoud Hammad, Mohammad Al-Smadi. 1-6 [doi]
- Optimal U-Net Architecture for Object Recognition Problems in Multispectral Satellite ImageryPovilas Gudzius, Olga Kurasova, Ernestas Filatovas. 1-2 [doi]
- Virtualization vs. Containerization: Towards a Multithreaded Performance Evaluation ApproachAmro Abuabdo, Ziad A. Al-Sharif. 1-6 [doi]
- Business Process Mapping: A Case StudySabah Al-Fedaghi, Yazan Mohamad. 1-8 [doi]
- A Deep Learning Approach to Extracting Adverse Drug ReactionsFeras Odeh, Adel Taweel. 1-6 [doi]
- Determination, Prioritization and Analysis of User Requirements to Prevention AppsBernhard Breil, Thomas Lux, Lisanne Kremer, Laura Rühl, Jennifer Apolinário-Hagen. 1-5 [doi]
- NOMA Based on Dynamic Scheduling Algorithm with Priority Assignment for V2X CommunicationsAla Din Trabelsi, Hend Marouane, Emna Bouhamed, Faouzi Zarai. 1-8 [doi]
- Automated Twitter Author Clustering with Unsupervised Learning for Social Media ForensicsSicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri. 1-8 [doi]
- Detecting Drivers Smartphone: A Learned Features Approach using Aggregated Scalogram ImagesMohammad Madine, Ammar Battah, Aaminah Khan, Naoufel Werghi. 1-5 [doi]
- Investigating the Use of Deep Neural Networks for Software Defect PredictionMohamed Samir, Mohammad El-Ramly, Amr Kamel. 1-6 [doi]
- Predictors of Readmissions and Length of Stay for Diabetes Related PatientsLama Alturki, Khawlah Aloraini, Amina Aldughayshim, Saleh Albahli. 1-8 [doi]
- Towards Optimizing the Placement of Security Testing Components for Internet of Things ArchitecturesMoez Krichen, Roobaea Alroobaea. 1-2 [doi]
- Unstructured Medical Text Classification using Linguistic Analysis: A Supervised Deep Learning ApproachAhmad Al-Doulat, Islam Obaidat, Minwoo Lee. 1-7 [doi]
- DISERTO: Semantics-Based Tool for Automatic and Virtual Data IntegrationMaroua Masmoudi, Mohamed-Hedi Karray, Sana Ben Abdallah Ben Lamine, Hajer Baazaoui Zghal, Bernard Archimède. 1-8 [doi]
- JMentor: An Ontology-Based Framework for Software Understanding and ReuseMajdi Rawashdeh, Awny Alnusair, Muder Almiani, Lina Sawalha. 1-8 [doi]
- JSANDS: A Stillbirth and Neonatal Deaths Surveillance SystemYousef S. Khader, Mohammad S. Alyahya, Anwar Batieha, Adel Taweel. 1-5 [doi]
- A Preference-Based Interactive Tool for Safe Rescheduling of Groups for HajjFaizan Ur Rehman, Emad A. Felemban. 1-2 [doi]
- Outperforming State-of-the-Art Systems for Aspect-Based Sentiment AnalysisBashar Talafha, Mahmoud Al-Ayyoub, Analle Abuammar, Yaser Jararweh. 1-5 [doi]
- CONCORD: Improving Communication using Consumer-Count DetectionFarah Fargo, Shobha Vissapragada, Samantika Sury. 1-11 [doi]
- Drone Forensics: A Case Study on a DJI Mavic AirMaryam Yousef, Farkhund Iqbal. 1-3 [doi]
- Towards a Blockchain-Based Decentralized Reputation System for Public Fog NodesMazin Debe, K. Salah, Muhammad Habib Ur Rehman, Davor Svetinovic. 1-6 [doi]
- On the Use of Neural Text Generation for the Task of Optical Character RecognitionMahnaz Mohammadi, Sardar F. Jaf, Andrew Stephen McGough, Toby P. Breckon, Peter Matthews, Georgios Theodoropoulos 0001, Boguslaw Obara. 1-8 [doi]
- Influence Maximization Problem in Social Networks: An OverviewMyriam Jaouadi, Lotfi Ben Romdhane. 1-8 [doi]
- A Microservice-Based Approach for Increasing Software Reusability in Health ApplicationsMarcio Alexandre Pereira da Silva, Valéria Cesário Times, André Magno Costa de Araújo, Paulo Caetano da Silva. 1-8 [doi]
- On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular NetworksFarhan Ahmad, Asma Adnane, Chaker Abdelaziz Kerrache, Fatih Kurugollu, Iain Phillips. 1-7 [doi]
- Decentralized Access Control Infrastructure using Blockchain for Big DataOussama Mounnan, Anas Abou El Kalam, Lamia El Haourani. 1-8 [doi]
- Automated Anomaly Detection Assisted by Discrimination Model for Time SeriesJunfeng Wu, Li Yao, Bin Liu 0026, Zheyuan Ding. 1-7 [doi]
- A Decision-Making Support System for Operational Coordination of Home Health Care ServicesLiwen Zhang, Elyes Lamine, Franck Fontanili, Christophe Bortolaso, Mustapha Derras, Hervé Pingaud. 1-6 [doi]
- Hadath: From Social Media Mapping to Multi-Resolution Event-Enriched MapsFaizan Ur Rehman, Imad Afyouni, Ahmed Lbath, Saleh M. Basalamah. 1-8 [doi]
- Vehicular Cloud Architectures: Taxonomy, Security and ChallengesSoukeina Zouaidi, Abdelfettah Belghith, Ilhem Lengliz. 1-8 [doi]
- Review on Healthcare Supply ChainAhmad Wassim Al Gendy, Arij Lahmar. 1-10 [doi]
- Predicting Patients' Health Behavior Based on Their Privacy PreferencesSouad Sadki, Hanan El Bakkali, Driss Allaki, Anas Chenguiti Ansari. 1-8 [doi]
- An Interactive Framework to Develop and Align Business Process ModelsDorob Wali Ahmad, Waqar Haque. 1-8 [doi]
- Secondary Use of Research Data: A Review of Availability and Utilization of Public Use Files and Initial Steps for the Development of a Process to Facilitate Medical Research Data DonationFelix Holl, Louisa Reschke, Stefan Müller-Mielitz, Marina Fotteler, Walter Swoboda. 1-5 [doi]
- Predicting Semantic Textual Similarity of Arabic Question Pairs using Deep LearningOmar Einea, Ashraf Elnagar. 1-5 [doi]
- On the Blockchain-Based General-Purpose Public Key InfrastructureVictor Osmov, Atadjan Kurbanniyazov, Rasheed Hussain, Alma Oracevic, S. M. Ahsan Kazmi, Fatima Hussain. 1-8 [doi]
- An Insight into ICP Monitoring of Patients with Hydrocephalus using Data Science ApproachH. Alsmadi, Ahmed J. Aljaaf, A. Hussain, J. Mutafina, R. Al-Jumeily, T. Baker, Conor Mallucci. 1-2 [doi]
- Analysis of Static and Dynamic Infrared Images for Thyroid Nodules InvestigationJosé R. González, Aura Conci, Maira Beatriz Hernandez Moran, Adriel S. Araujo, A. Paes, Charbel Damião, W. G. Fiirst. 1-7 [doi]
- A Modernized Model for Performance Requirements and Their InterdependenciesAhmad Alwadi, Abdulrahman Nahhas, Sascha Bosse, Naoum Jamous, Klaus Turowski. 1-8 [doi]
- Correlation-Based Sensor Activity Scheduling Mechanisms for Wireless Sensor NetworksGhina Saad, Hassan Harb, Chady Abou Jaoude, Ali Jaber. 1-8 [doi]
- Mining the Global Terrorism Dataset using Machine Learning AlgorithmsAlaa S. Alsaedi, Arwa S. Almobarak, Saad T. Alharbi. 1-7 [doi]
- Detection of Arabic Non-Referential Pronouns using Self-Training Method and Similarity MeasuresSaoussen Mathlouthi Bouzid, Chiraz Ben Othmane Zribi. 1-8 [doi]
- KUNUZ: A Multi-Purpose Reusable Test Collection for Classical Arabic Document EngineeringIbrahim Bounhas, Souheila Ben Guirat. 1-8 [doi]
- Perpetual Energy Restoration by Multiple Mobile Robots in Circular Sensor NetworksEman Omar, Paola Flocchini, Nicola Santoro. 1-8 [doi]
- Autonomic Resource Management for Power, Performance, and Security in Cloud EnvironmentFarah Fargo, Olivier Franza, Cihan Tunc, Salim Hariri. 1-4 [doi]
- Blockchain Technology: Characteristics, Security and Privacy; Issues and SolutionsMuneer O. Bani Yassein, Farah Shatnawi, Saif Rawashdeh, Wail Mardini. 1-8 [doi]
- Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications?Ahmed Ibrahim, Mohammad El-Ramly, Amr Badr. 1-7 [doi]
- Assessing Context-Aware Data ConsistencyGoutam Mylavarapu, K. Ashwin Viswanathan, Johnson P. Thomas. 1-6 [doi]
- Accelerated Shadow Detection and Removal MethodEdward Richter, Ryan Raettig, Joshua Mack, Spencer Valancius, Burak Unal, Ali Akoglu. 1-8 [doi]
- A Genetic-Frog Leaping Algorithm for Large Dataset Document ClusteringLubna AlHenaki, Manar Hosny. 1-4 [doi]
- CMHWN: Coverage Maximization of Heterogeneous Wireless NetworkHamid Mcheick, Monah Shouki Bou Hatoum, Alia Ghaddar. 1-7 [doi]
- A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 StandardSalwa Alem, David Espes, Eric Martin, Laurent Nana, Florent de Lamotte. 1-8 [doi]
- MacNabbs: Knowledge Extraction from Unstructured Data using Semantic Analysis and User Activity LoggingAlibek Jakupov, Julien Mercadal, Besma Zeddini. 1-7 [doi]
- Intra and Inter Spatial Color Descriptor for Content Based Image RetrievalImen Ben Rejeb, Sonia Ouni, Ezzeddine Zagrouba. 1-8 [doi]
- Effect of Invisible Exertions on Computed Tomography Radiologists in Saudi HospitalsSaad Aldoihi, Omar Hammami. 1-4 [doi]
- M2MHub: A Blockchain-Based Approach for Tracking M2M Message ProvenanceDarren Saguil, Qiao Xue, Qusay H. Mahmoud. 1-8 [doi]
- Quality Model for Evaluating and Choosing a Stream Processing Framework ArchitectureHamid Mcheick, Youness Dendane, Fábio Petrillo, Souhail Ben Ali. 1-7 [doi]
- An Unsupervised Method for Detecting Style Breaches in a DocumentMaryam Elamine, Seifeddine Mechti, Lamia Hadrich Belguith. 1-6 [doi]
- New Graph Distance Based on Stable Marriage Formulation for Deformable 3D Objects RecognitionKamel Madi, Eric Paquet, Hamamache Kheddouci. 1-8 [doi]
- Service-Oriented Architecture for Multiscale Traffic SimulationsXavier Boulet, Mahdi Zargayouna, Gérard Scémama, Fabien Leurent. 1-8 [doi]
- Detection of Arabic Cyberbullying on Social Networks using Machine LearningDjedjiga Mouheb, Raghad Albarghash, Mohamad Fouzi Mowakeh, Zaher Al Aghbari, Ibrahim Kamel. 1-5 [doi]
- Shoplifting Smart Stores using Adversarial Machine LearningMohamed Nassar 0001, Abdallah Itani, Mahmoud Karout, Mohamad El Baba, Omar Al Samman Kaakaji. 1-6 [doi]
- Architecture and Conceptual Formalization of Cyber-Mission OperationsRogério Winter, Ferrucio de Franco Rosa, Rodrigo Bonacin, Mario Jino. 1-8 [doi]