Abstract is missing.
- Extending steganography payload capacity using the L*a*b* color spaceMohammed Baziyad, Tamer Rabie, Ibrahim Kamel. 1-6 [doi]
- Highly Secured Implantable Medical DevicesEmad Hamadaqa, Ahmad Abadleh, Ayoub Mars, Wael Adi. 7-12 [doi]
- Voronoi-based Secure kNN Queries over Spatial Data at the CloudEva Habeeb, Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari. 13-17 [doi]
- Clone-Resistant Entities for Vehicular SecurityAyoub Mars, Wael Adi. 18-23 [doi]
- Detection of Offensive Messages in Arabic Social Media CommunicationsDjedjiga Mouheb, Rutana Ismail, Shaheen Al Qaraghuli, Zaher Al Aghbari, Ibrahim Kamel. 24-29 [doi]
- Proposals on IoT Communication through MQTT over L2 Network and their Performance EvaluationYuya Sasaki 0003, Tetsuya Yokotani, Hiroaki Mukai. 30-35 [doi]
- An Affordable System for Remotely Monitoring Water Quality in Residential Water TanksAsma Al Khaili, Aisha Al Mamari, Hoda H. Amer, Walid Ibrahim. 36-41 [doi]
- A Framework for a Cooperative UAV-UGV System for Path Discovery and PlanningAbderrahmane Lakas, Boumediene Belkhouche, Omar Benkraouda, Amin Shuaib, Hussain Jaffar Alasmawi. 42-46 [doi]
- Integrating MOOC with Open Source Moodle: The New Direction of Learning at Sultan Qaboos UniversityZuhoor Al-Khanjari, Iman Al-Kindi. 47-51 [doi]
- Improved Power Control Approach for Better Data Throughput in CubeSat NanosatellitesFedeyya Almansoori, Prashanth Reddy Marpu, Zeyar Aung. 52-57 [doi]
- Migrating from SQL to NOSQL Database: Practices and AnalysisFatima Yassine, Mamoun Adel Awad. 58-62 [doi]
- STIDes Revisited - Tackling Global Time Shifts and ScalingMarc Haßler, André Pomp, Christian Kohlschein, Tobias Meisen. 63-68 [doi]
- Big Data Quality Assessment Model for Unstructured DataIkbal Taleb, Mohamed Adel Serhani, Rachida Dssouli. 69-74 [doi]
- Cloud Automation to Run Large-Scale Quantum Chemical SimulationsN. AlRayhi, Khaled Salah, N. Al-Kork, A. Bentiba, Zouheir Trabelsi, M. Ajmal Azad. 75-80 [doi]
- Dynamic Area Search with Shared Memory: A Meta-Framework to Improve Pathfinding AlgorithmsObada Al Zoubi, Mariette Awad. 81-87 [doi]
- Towards a Machine Learning Approach for Detecting Click Fraud in Mobile AdvertizingRiwa Mouawi, Mariette Awad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. 88-92 [doi]
- Predicting Employee Attrition using Machine LearningSarah S. Alduayj, Kashif Rajpoot. 93-98 [doi]
- Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning TechniquesReem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, Nouf S. Alsharif, Mishael F. Aljubeir, Sunday O. Olatunji, Alaa Y. Alahmadi, Mohammed Imran, Rahma A. Alzahrani, Nora S. Alturayeif. 99-104 [doi]
- A Reusable Software Architecture for Personalized Learning SystemsHeba Ismail, Boumediene Belkhouche. 105-110 [doi]
- Defense Analysis Against Store and Forward Distributed Reflective Denial of Service AttacksM. Fraiwan, Fidaa Al-Quran, Basheer Al-Duwairi. 111-116 [doi]
- IoT Applications: From Mobile Agents to Microservices ArchitectureTasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi. 117-122 [doi]
- Trust-Based Data Controller for Personal Information ManagementUpul Jayasinghe, Gyu Myoung Lee, Áine MacDermott. 123-128 [doi]
- How Terrorist Groups Use Social Networking Media to Attract and Recruit New MembersAlsaleh Saad, Alwaleed Alhumaid. 129-134 [doi]
- Effect on Detection and False Alarm Probabilities For Various Amplitude Modulation TechniquesMuhammad Fahad Nasir, Ahmad Ali, Wasib Javed, Asim Altaf Shah, Junaid Imtiaz. 135-140 [doi]
- Building Scalable Mobile Edge Computing by Enhancing Quality of ServicesMayank Tiwary, Shanya Sharma, Pritish Mishra, Hesham El-Sayed, Mukesh Prasad, Deepak Puthal. 141-146 [doi]
- Distributed Rate and Congestion Control hybrid scheme for VANETsMustapha Younes Taleb, Salah Merniz, Saad Harous. 147-150 [doi]
- Blockchain-based Ownership Management for Medical IoT (MIoT) DevicesMansoor Alblooshi, Khaled Salah, Y. Alhammadi. 151-156 [doi]
- Blockchain for UAE Organizations: Insights from CIOs with Opportunities and ChallengesMay AlTaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, Huwida Said. 157-162 [doi]
- Analysis of Pipelined KATAN Ciphers under Handle-C for FPGAsPalwasha W. Shaikh, Issam W. Damaj. 163-168 [doi]
- Automatic Detection of Airline Ticket Price and Demand: A reviewJuhar Ahmed Abdella, Nazar Zaki, Khaled Shuaib. 169-174 [doi]
- Detecting Social Bots on Twitter: A Literature ReviewEiman Alothali, Nazar Zaki, Elfadil A. Mohamed, Hany Al Ashwal. 175-180 [doi]
- Correlation Analysis of Popularity and Interoperability in Open Source ProjectsFatima Al Shamsi, Sarah Bamatraf, Talal Rahwan, Zeyar Aung, Davor Svetinovic. 181-186 [doi]
- A comparative analysis of evolutionary algorithms for the prediction of software changeLoveleen Kaur, Ashutosh Mishra. 187-192 [doi]