Abstract is missing.
- Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement LearningNaram Mhaisen, Noora Fetais, Ahmed Massoud. 1-6 [doi]
- Finding Behavioural and Imaging Biomarkers of Major Depressive Disorder (MDD) using Artificial Intelligence: A ReviewSarah Sheikh, Khaled Shaban. 7-12 [doi]
- Application of artificial intelligence in electrical power systemsShahbaz Hussain, Rashid Alammari, Atif Iqbal, Abdullatif Shikfa. 13-17 [doi]
- A novel Conceptual Machine Learning Method using Random Conceptual DecompositionMohamed A. Ali, Ali Jaoua, Somaya Ali Al-Máadeed. 18-22 [doi]
- A Novel Design of Gesture and Voice Controlled Solar-Powered Smart Wheel Chair with Obstacle DetectionA. K. M. Bahalul Haque, Shawan Shurid, Afsana Tasnim Juha, Md. Shadman Sadique, Abu Sayem Mohammad Asaduzzaman. 23-28 [doi]
- Drone Detection Approach Based on Radio-Frequency Using Convolutional Neural NetworkSara Al-Emadi, Felwa Al-Senaid. 29-34 [doi]
- Design and Implementation of a RF Based Anti-Drone SystemAbdularahman Hasan Abunada, Ahmed Yousif Osman, Amith Khandakar, Muhammad Enamul Hoque Chowdhury, Tamer Khattab, Farid Touati. 35-42 [doi]
- Low Power Deep-Learning Architecture for Mobile IoT IntelligenceOsman Elgawi, A. M. Mutawa. 43-47 [doi]
- Crowd Counting: A Survey of Machine Learning ApproachesMohamed Abdou, Abdelkarim Erradi. 48-54 [doi]
- Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based techniqueShahbaz Hussain, Rashid Alammari, Atif Iqbal, Abdullatif Shikfa. 55-60 [doi]
- MBT: A Context Aware Mission Based TrackerKazimhan Peker, Deniz Turgay Altilar. 61-66 [doi]
- Experimental Investigation and Uncertainty Prediction of The Load-Carrying Capacity of Composite Double Hat for Lattice Core Sandwich Panels Using Artificial Neural NetworkOthman Laban, Samer Gowid, Elsadig Mahdi. 67-72 [doi]
- Deployment of Deep Learning Models on Resource-Deficient Devices for Object DetectionAmeema Zainab, Dabeeruddin Syed. 73-78 [doi]
- Automatic and Secure Electronic Gate System Using Fusion of License Plate, Car Make Recognition and Face DetectionGhaida Saadouli, Maha Ibrahim Elburdani, Razan Mohammed Al-Qatouni, Suchithra Kunhoth, Somaya Al-Máadeed. 79-84 [doi]
- Palm Oil Fresh Fruit Bunch Grading System Using Multispectral Image Analysis in HSVAgung W. Setiawan, Oktavian E. Prasetya. 85-88 [doi]
- An Image-Based Method for Soiling QuantificationMingda Yang, Jim Ji, Bing Guo. 89-94 [doi]
- CNN Features vs Classical Features for Largescale Cultural Image RetrievalAbdelhak Belhi, Abdelaziz Bouras. 95-99 [doi]
- Effect of Color Enhancement on Early Detection of Skin Cancer using Convolutional Neural NetworkAgung W. Setiawan. 100-103 [doi]
- Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing TechniquesLina Al-Sahan, Fatima Al-Jabiri, Nora Abdelsalam, Amr Mohamed, Tarek Elfouly, Mohamed Abdallah. 104-111 [doi]
- Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks ApproachMhd Saria Allahham, Tamer Khattab, Amr Mohamed. 112-117 [doi]
- A vision-based zebra crossing detection method for people with visual impairmentsYounes Akbari, Hanadi Hassen, Nandhini Subramanian, Jayakanth Kunhoth, Somaya Al-Máadeed, Wael K. M. Alhajyaseen. 118-123 [doi]
- LFR face dataset: Left-Front-Right dataset for pose-invariant face recognition in the wildOmar ElHarrouss, Noor Almaadeed, Somaya Al-Máadeed. 124-130 [doi]
- An image steganography approach based on k-least significant bits (k-LSB)Omar ElHarrouss, Noor Almaadeed, Somaya Al-Máadeed. 131-135 [doi]
- Emotional Stability Detection Using Convolutional Neural NetworksEalaf S. Hussein, Uvais Qidwai, Mohamed Al-Meer. 136-140 [doi]
- Novel Face Liveness Detection Using Fusion of Features and Machine Learning ClassifiersSudeep Thepade, Prasad Jagdale, Amit Bhingurde, Shwetali Erandole. 141-145 [doi]
- Early Image Detection Using Event Based VisionAlkhzami Alharami, Yin Yang, Dena Althani, Chen Shoushun, Amine Bermak. 146-149 [doi]
- SDN-based Malware Detection and Mitigation: The Case of ExPetr RansomwareElpida Rouka, Celyn Birkinshaw, Vassilios G. Vassilakis. 150-155 [doi]
- Machine Learning Techniques for Network Anomaly Detection: A SurveySohaila Eltanbouly, May Bashendy, Noora Alnaimi, Zina Chkirbene, Aiman Erbad. 156-162 [doi]
- Hybrid Machine Learning for Network Anomaly Intrusion DetectionZina Chkirbene, Sohaila Eltanbouly, May Bashendy, Noora Alnaimi, Aiman Erbad. 163-170 [doi]
- Using Deep Learning Techniques for Network Intrusion DetectionSara Al-Emadi, Aisha Al-Mohannadi, Felwa Al-Senaid. 171-176 [doi]
- Performance Evaluation of Physical Attacks against E2E Autoencoder over Rayleigh Fading ChannelAbdullatif Albaseer, Bekir Sait Ciftler, Mohamed M. Abdallah 0001. 177-182 [doi]
- Traffic Analysis Attacks on Tor: A SurveyLamiaa Basyoni, Noora Fetais, Aiman Erbad, Amr Mohamed, Mohsen Guizani. 183-188 [doi]
- Blockchain-based Authentication for 5G NetworksZaher Haddad, Mostafa M. Fouda, Mohamed Mahmoud, Mohamed M. Abdallah 0001. 189-194 [doi]
- Fast Binary Network Intrusion Detection based on Matched Filter OptimizationHajar Saif Alsaadi, Rachid Hedjam, Abderezak Touzene, Abdelhamid Abdessalem. 195-199 [doi]
- Proactive Forensics: Keystroke Logging from the Cloud as Potential Digital Evidence for Forensic Readiness PurposesSheunesu M. Makura, H. S. Venter, Adeyemi Richard Ikuesan, Victor R. Kebande, Nickson M. Karie. 200-205 [doi]
- Social Networks Spam Detection Using Graph-Based Features Analysis and Sequence of Interactions Between UsersKhaled A. Al-Thelaya, Tamim S. Al-Nethary, Emad Y. Ramadan. 206-211 [doi]
- Cyber Attack Detection for a Nonlinear Binary Crude Oil Distillation ColumnH. M. Sabbir Ahmad, Nader Meskin. 212-218 [doi]
- Malicious Node Detection in Wireless Sensor Network using Swarm Intelligence OptimizationNoora Al-Maslamani, Mohamed M. Abdallah 0001. 219-224 [doi]
- Performance Evaluation of No-Pairing ECC-Based KPABE on IoT PlatformsUla Hijawi, Devrim Unal, Ridha Hamila, Adel Gastli, omar Ellabban. 225-230 [doi]
- On Sharing Models Instead of Data using Mimic learning for Smart Health ApplicationsMohamed Baza, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, Kemal Akkaya. 231-236 [doi]
- Driver Drowsiness Detection Model Using Convolutional Neural Networks Techniques for Android ApplicationRateb Jabbar, Mohammed Shinoy, Mohamed Kharbeche, Khalifa Al-Khalifa, Moez Krichen, Kamel Barkaoui. 237-242 [doi]
- Identification of Potential Risk Factors of Diabetes for the Qatari PopulationSaleh Musleh, Tanvir Alam, Abdesselam Bouzerdoum, Samir B. Belhaouari, Hamza Baali. 243-246 [doi]
- Classification of Sleep Arousal using Compact CNNAhmed M. Eldaraa, Hamza Baali, Abdesselam Bouzerdoum, Samir B. Belhaouari, Tanvir Alam, Anas S. Abdel Rahman. 247-253 [doi]
- Smart City Applications: Promoting comfort, health and well-being through Sustainable Smart Urban Design (S2UD) in Msheireb DowntownEman Al-Fadala, Fodil Fadli. 254-261 [doi]
- A Natural User Interface and Blockchain-Based In-Home Smart Health Monitoring SystemMd. Abdur Rahman, Khalid Abualsaud, Stuart J. Barnes, Md. Mamunur Rashid, Syed Maruf Abdullah. 262-266 [doi]
- Investigating Potential Risk Factors for Cardiovascular Diseases in Adult Qatari PopulationAtiq ur Rehman, Tanvir Alam, Samir Brahim Belhaouari. 267-270 [doi]
- Breast Mass Tumor Classification using Deep LearningAnas S. Abdel Rahman, Samir B. Belhaouari, Abdesselam Bouzerdoum, Hamza Baali, Tanvir Alam, Ahmed M. Eldaraa. 271-276 [doi]
- A Malware Detection Method for Health Sensor Data Based on Machine LearningHanwen Liu, Xiaohan Helu, Chengjie Jin, Hui Lu, Zhihong Tian, Xiaojiang Du, Khalid Abualsaud. 277-282 [doi]
- Towards an Integrated Health and Wellness Program Using Human-IoT InteractionMohammed Tahri Sqalli, Dena Al-Thani. 283-290 [doi]
- An Intelligent and Secure Health Monitoring System Based on AgentMaroua Ahmid, Okba Kazar, Saber Benharzallah, Laïd Kahloul, Abdelhak Merizig. 291-296 [doi]
- A Cloud-based Solution for Rapid and Smart Neuropathy DetectionTooba Salahuddin, Uvais Qidwai. 297-301 [doi]
- Cyber Physical Systems and Smart Homes in Healthcare: Current State and ChallengesSara Amin, Tooba Salahuddin, Abdelaziz Bouras. 302-309 [doi]
- Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrityRateb Jabbar, Noora Fetais, Moez Krichen, Kamel Barkaoui. 310-317 [doi]
- A Surgical-Oriented Liver Segmentation Approach Using Deep LearningAlhusain Abdalla, Nouraldeen Ahmed, Sarada Dakua, Shidin Balakrishnan, Julien Abinahed. 318-322 [doi]
- RSSI -based Classification for Indoor Localization in Wireless Sensor NetworksSandy Mahfouz, Patrick Nader, Pierre E. Abi-Char. 323-328 [doi]
- OntoM: An Ontological Approach for Automatic ClassificationTahani H. Abu Musa, Abdelaziz Bouras, Abdelhak Belhi, Houssem Gasmi. 329-334 [doi]
- A novel CRLH transmission Line using Spiral ResonatorA. Krishna, A. F. Abdelaziz, T. Khattab. 335-338 [doi]
- Towards a Comprehensive Study of Fatigue Deducing Techniques for Evaluating the Quality of Experience of Haptic-Visual ApplicationsMohammad Alja'afreh, Somaya Al-Máadeed, Jihad M. Alja'am, Abdulmotaleb El-Saddik. 339-344 [doi]
- Can We Build a Search Engine over Spark?Sara Al-Rasbi, Tamer Elsayed. 345-350 [doi]
- Downlink user selection for massive-MIMO-OFDM systems using ZF precodingNajoua Achoura, Ridha Bouallegue. 351-354 [doi]
- Local Bitcoin Network Simulator for Performance Evaluation using Lightweight VirtualizationLina Alsahan, Noureddine Lasla, Mohamed Abdallah. 355-360 [doi]
- Smart Medicine Planner for Visually Impaired PeopleAmena Jassim Al-Haider, Sakina Mansour Al-Sharshani, Hamean Salem Al-Sheraim, Nandhini Subramanian, Somaya Al-Máadeed, Mohamed Zied Chaari. 361-366 [doi]
- Integrating Blockchain Technology in 5G enabled IoT: A ReviewRaseena M. Haris, Somayya Al-Maadeed. 367-371 [doi]
- A Dual Active Bridge based Wireless Power Transfer System for EV Battery Charging Controlled Using High Speed FPGAMohammed A. Al-Hitmi, Atif Iqbal, S. Rahman, Pandav Kiran Maroti, Mohammad Meraj, Hassan Mehrjerdi. 372-376 [doi]
- A multi-Agent based model for task scheduling in cloud-fog computing platformFadoua Fellir, Adnane El-Attar, Khalid Nafil, Lawrence Chung. 377-382 [doi]
- Spatial-color mode detection in UV pairwise projection of the CIE LUV color spaceHalima Remmach, Raja Touahni, Abderrahmane Sbihi. 383-388 [doi]
- On Accommodating VR Traffic for mHealth Applications in Rural Areas with Limited Impact on IoT TrafficWaleed Bin Owais, Elias Yaacoub. 389-393 [doi]
- A model for predicting room occupancy based on motion sensor dataChristos Sardianos, Iraklis Varlamis, Christos Chronis, George Dimitrakopoulos, Yassine Himeur, Abdullah Alsalemi, Faycal Bensaali, Abbes Amira. 394-399 [doi]
- Machine Learning-based Regression and Classification Models for Oil Assessment of Power TransformersNeha Kamalraj Bhatia, Ayman H. El-Hag, Khaled Bashir Shaban. 400-403 [doi]
- Actuator Fault Diagnosis in Multi-Zone HVAC Systems using 2D Convolutional Neural NetworksMariam Elnour, Nader Meskin. 404-409 [doi]
- Effectiveness of Speed Limit Pavement Markings at Transition Zones Along ExpresswaysChristian J. R. Samson, Fadi Kahil, Khalid G. M. Mohamed, Qinaat Hussain, Wael K. M. Alhajyaseen. 410-414 [doi]
- Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoTUla Hijawi, Adel Gastli, Ridha Hamila, omar Ellabban, Devrim Unal. 415-421 [doi]
- PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing ServiceSowmya Kudva, Renat Norderhaug, Shahriar Badsha, Shamik Sengupta, A. S. M. Kayes. 422-428 [doi]
- Performance of Hybrid Cognitive RF/VLC Systems in Vehicle-to-Vehicle CommunicationsEman Mohamed H. Abouzohri, Mohamed M. Abdallah. 429-434 [doi]
- Role of Research and Higher Education on Industry 4.0, Material Science as an exampleMariam Al Ali AlMaadeed, Deepalekshmi Ponnamma. 435-439 [doi]
- Using Deep Learning to Predict Stock Movements Direction in Emerging Markets: The Case of Qatar Stock ExchangeSaleh S. Alhazbi, Ahmed Ben Said, Alanoud Al-Maadid. 440-444 [doi]
- Design of $2\times 2$ Microstrip Patch Antenna Array at 28 GHz for Millimeter Wave CommunicationMohamed Yusuf Mohamed, Absir Mohamud Dini, Md Mohiuddin Soliman, Abu Zafar Md. Imran. 445-450 [doi]
- Reputation Based Traffic Event Validation and Vehicle Authentication using Blockchain TechnologyMuhammed Samir Al-Ali, Hasan Abbas Al-Mohammed, Mahdi Alkaeed. 451-456 [doi]
- Quantifying Empathy in Virtual Reality: An OutlineWaleed Bin Owais, Elias Yaacoub. 457-462 [doi]
- Virtualization in Distributed Hot and Cold Storage for IoT Data Retrieval without CachingTomoki Ito, Hirofumi Noguchi, Misao Kataoka, Takuma Isoda, Tutomu Murase. 463-468 [doi]
- Generating Images from Arabic Story-Text using Scene GraphJezia Zakraoui, Moutaz Saleh, Usman Asghar, Jihad Mohamad Al Ja'am, Somaya Al-Máadeed. 469-475 [doi]
- FacebookVideoLive18: A Live Video Streaming Dataset for Streams Metadata and Online Viewers LocationsEmna Baccour, Aiman Erbad, Kashif Bilal, Amr Mohamed, Mohsen Guizani, Mounir Hamdi. 476-483 [doi]
- A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity ManagementAbdulbadi Sabir, Noora Fetais. 484-489 [doi]
- A Scene-to-Speech Mobile based Application: Multiple Trained Models ApproachAbdel Ghani Karkar, Jayakanth Kunhoth, Somaya Al-Máadeed. 490-497 [doi]
- Responsibility Attribution Against Data BreachesA. S. M. Kayes, Mohammad Hammoudeh, Shahriar Badsha, Paul A. Watters, Alex Ng, Fatma Mohammed, Mofakharul Islam. 498-503 [doi]
- Machine Learning Approach for Detecting News Agencies' Linguistic Style in ArabicAmal AlQamash, Saleh Alhazbi. 504-510 [doi]
- Design and Implementation of a Threat-Specific Security Risk Assessment ToolArmstrong Nhlabatsi, Alaa Hussein, Noora Fetais, Khaled M. Khan. 511-518 [doi]
- State of the Art Models for Fake News Detection TasksWissam Antoun, Fady Baly, Rim Achour, Amir Hussein, Hazem M. Hajj. 519-524 [doi]
- Representation Learning for Improved Generalization of Adversarial Domain Adaptation with Text ClassificationAlaa Khaddaj, Hazem Hajj. 525-531 [doi]
- Detecting Suspicious Activities of Digital Trolls During the Political CrisisShaaban Sahmoud, Hayder Safi. 532-537 [doi]
- An Improvement of Support Vector Machine Imputation Algorithm Based on Multiple Iteration and Grid Search StrategiesJie Wang, Daiwei Li, Haiqing Zhang, Xi Yu, Aicha Sekhari, Yacine Ouzrout, Abdelaziz Bouras. 538-543 [doi]
- Virtual Reality Module Depicting Catheter-Associated Urinary Tract Infection as Educational Tool to Reduce Antibiotic Resistant Hospital-Acquired Bacterial InfectionsYosra Magdi Mekki, Mohamed Magdi Mekki, Mohamed Ali Hammami, Susu M. Zughaier. 544-548 [doi]
- Wireless Power Transmission for the Internet of Things (IoT)Mohamed Zied Chaari, Somaya Al-Máadeed. 549-554 [doi]
- Understanding Link Fabrication Attack in Software Defined Network using Formal MethodsSuleman khan, Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Abdullah Gani, Ahmed Abdelaziz. 555-562 [doi]
- Design and Implementation of Multi-Protocol Data Networks Interface Detector in Heterogeneous IoTsHasan Tariq, Abderrazak Abdaoui, Farid Touati, Mohammed Abdulla E. Al-Hitmi, Damiano Crescini, Adel Ben Manouer. 563-569 [doi]
- Peer Selection in Device-to-Device Communication Based on Multi-Attribute Decision MakingFeras ZenAlden, Suhaidi Hassan, Adib Habbal. 570-574 [doi]
- Semi-synchronous Multiple Transmission Control / Collision Inference Exploiting Capture Effect for Collision and against CollisionKensuke Hiroshima, Tutomu Murase. 575-580 [doi]
- Modern QoS Solutions in WSAN: An Overview of Energy Aware Routing Protocols and ApplicationsAhmad Zaza, Sara Al-Emadi, Suleiman Kharroub. 581-589 [doi]
- An Adaptive Decision-Driven Architecture for Information-Centric Internet-of-Things ApplicationsR. R. Darwish. 590-596 [doi]
- Fire Alarm System for Smart Cities Using Edge ComputingAsma Mahgoub, Nourhan Tarrad, Rana Elsherif, Loay Ismail, Abdulla K. Al-Ali. 597-602 [doi]
- The Internet of Things (IoT) in Tunisian Education and Healthcare: Prospects and Barriers to Improved Educational and Medical OutcomesSihem Hamlaoui, Alan S. Weber. 603-607 [doi]
- Performance Evaluation of Hyperledger FabricSalma Shalaby, Alaa Awad Abdellatif, Abdulla Al-Ali, Amr Mohamed, Aiman Erbad, Mohsen Guizani. 608-613 [doi]
- An Ontological Framework for Opportunistic Composition of IoT SystemsVatsala Nundloll, Yehia Elkhatib, Abdessalam Elhabbash, Gordon S. Blair. 614-621 [doi]
- An IoT-Based Intelligent System for Real-Time Parking Monitoring and Automatic BillingRiad Kanan, Houssam Arbess. 622-626 [doi]
- IoT Based on-the-fly Visual Defect Detection in Railway TracksNoora Alnaimi, Uvais Qidwai. 627-631 [doi]
- Improved Burst Detection for Physical Layer of SDR Wideband Waveform using Zadoff-Chu SequenceHaseeb Ur Rehman, Muhammad Zeeshan, Tabinda Ashraf, Saad Rehman, Shoab Ahmed Khan. 632-637 [doi]