default search action
ICCR 2022: Dubai, UAE
- 2022 International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, October 6-7, 2022. IEEE 2022, ISBN 978-1-6654-6122-1
- Turki Fahed Al Masaeid, Hamzah Elrehail, Ayesha Kalim:
Educational technology partnerships and entrepreneurship education: the impact of technology on students' achievements. 1-5 - Sunil Kaushik, Akashdeep Bhardwaj, Ateeq Ur Rehman, Salil Bharany, Saida Harguem, Saigeeta Kukunuru, Ossma Ali Thawabeh:
Designing an MI-PCA based Agile Intrusion Detection System. 1-7 - Fatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, Sagheer Abbas, Hussam M. N. Al Hamadi:
Drones network security enhancement using smart based block-chain technology. 1-6 - Mufleh Amin Jarrah, Tayseer M. AL Afaishat, Ghassan Issa Al Omari, Hamza Salim Khraim:
The mediating effect of attitudes on the relationship between e-learning adoption and business students' performance in Jordanian universities. 1-13 - Liaqat Ali, Nizar Sahawneh, Yousuf Agha, Saira Kanwal, Imran, Nouh Sabri Elmitwally:
Activity Based Easy Learning Of PushDown Automata. 1-8 - Inturi Susmitha, Roseline J. Femila, Vinay Sivasamy:
Detection of forest fire using support vector machine in comparison with random forest to measure accuracy, precision and recall. 1-6 - Mohammad A. K. Alsmairat, Noor Al-Ma'aitah, Ibrahim Alrafaty:
Modelling of Critical Success Factors Affecting the Adoption of Enterprise Resources Planning: A mediated Model. 1-10 - Mohammad Kamrul Hasan, Ma Junjie, A K. M. Ahasan Habib, Abdullah Al Mamun, Taher M. Ghazal, Rashid A. Saeed:
IoT-Based Warehouse Management System. 1-6 - Saida Harguem, Sunita Marwaha, Samar Noaman, Naeem Ali, Nasir Ali, Khadija Kanwal:
Influencing Factors of E-Learning Towards E-Learner's Satisfaction. 1-9 - Gurpartap Singh, Anup Lal Yadav, Satbir S. Sehgal:
JavaScript Quiz Game. 1-5 - Sourav Verma, Sonali Dash, Ankita Joshi, Kavita:
A Detailed Study of Blockchain and dapps. 1-5 - Eric Khoo Jiun Hooi, Anazida Zainal, Mohamad Nizam Kassim, Zaily Ayub:
Feature Encoding For High Cardinality Categorical Variables Using Entity Embeddings: A Case Study in Customs Fraud Detection. 1-5 - Tamer Mohamed, Amer Ibrahim, Tauqeer Faiz, Waseem Alhasan, Ayesha Atta, Vansh Mago, Muhammad Ahzam Ejaz, Salman Munir:
Intelligent Hand Gesture Recognition System Empowered With CNN. 1-8 - Mys. Karthik Yasaswy, Arasu Sivagami, V. Suresh:
Vehicular Grounding Situation For Intelligent Transportation Administration Using AODV to Decrease the Round Trip in Urban and Semi Urban Using Smart Transport Techniques Comparing With Traffic Analysis Zone Networks. 1-6 - D. Pandy, R. Sharma, Suresh Sharma:
Simulation Comparison of Capacitance Voltage Characteristics in Nickel Oxide and Silicon dioxide-based MOS Capacitor. 1-5 - Ayushi, Damandeep Kaur, Satbir S. Sehgal:
Agile Lifestyle of Development. 1-5 - D. Alaik Venu Madhav, A. Raja, Jayalakshmi Somasundaram:
Comparative Analysis on PAPR Reduction scheme by using Novel Enhanced Active Constellation Scheme with selective level mapping for OFDM based systems. 1-4 - Kirti Sharma, Kshamta, Ankita Joshi:
API LED Connectivity Approach. 1-3 - Ghassan Issa Al Omari, Raed Ibrahim Ibrahim, Mazen Alomari, Mohammad Ali Al-Qudah:
The Impact of Emotional Intelligence on Transformational Leadership in the Jordanian Islamic banks. 1-11 - Aman Kumar Gupta, Sugandhi Midha, Vaibhav Uniyal:
Voice Controlled Personal Assistant. 1-3 - Vijayalakshmi. R, B. Sudha, Maged Farouk, Gouher Ahmed:
An Empirical Study of Association Among Financial Literacy, Financial Attitude and Financial Behaviour of Gen - Z. 1-6 - Mys. Karthik Yasaswy, T. Manimegalai, Jayalakshmi Somasundaram:
Crop Yield Prediction in Agriculture Using Gradient Boosting Algorithm Compared with Random Forest. 1-4 - Srinidhi Vasudevan, Anna Piazza, Madeline Carr:
Qualitative Factors in Organizational Cyber Resilience. 1-5 - Mashary N. Alrasheedy, Ravie Chandren Muniyandi, Fariza Fauzi:
Text-Based Emotion Detection and Applications: A Literature Review. 1-9 - Mohammad Salahat, Harish K. G. Nair, Rasha Almajed, Naila Samar Naz, Aziz Ur Rehman, Muhammad Sheraz Javeid:
Diagnosis Ovarian Cancer & Prostate Cancer using Mamdani System of Fuzzy Interface. 1-10 - Ahmad Asyraf Mustafar, Noor Faridatul Ainun Zainal, Tajul Azhar Mohd Tajul Ariffin, Siti Norul Huda Sheikh Abdullah, Kauthar Mohd Daud, Yau Ti Dun:
Cyber-attack Group Representation based on Adversary Artifacts with Machine Learning. 1-6 - Taher M. Ghazal, Mohammad Kamrul Hasan, Amelia Natasya Abdul Wahab, Amer Ibrahim, Wasim Ahmad Khan, Neha Zulfiqar Raza, Ayesha Atta, Beenu Mago:
Towards Privacy Provisioning for Internet of Things (IoT). 1-7 - Atul Duvedi, Azhar Ashraf, Shikha Uniyal Gairola:
A Comparitive Study on Routing Protocols: RIP, OSPF and EIGRP. 1-4 - Sami Ghoul, Rossilawati Sulaiman:
Imperceptible Image Steganography Technique Using a Novel PIT-Based Technique. 1-7 - Ketan, Shanu Khare, Maninder Kaur, Tarun Parashar:
Online Voting System. 1-7 - Shahan Yamin Siddiqui, Ali Sheraz Akram, Hafiz Muhammad Usama, Alaa M. Momani, Nidal A. Al-Dmour, Waleed T. Al-Sit:
Improved Hybrid Model for Phishing Detection by Using Machine Learning. 1-5 - A. Hareesh, K. Vidhya, V. Suresh:
Skin Lesion Classification in Dermoscopic Images with High Accuracy using Support Vector Machine Comparing with Random Forest Method. 1-6 - Abdulghader Abu Reemah A Abdullah, Adamu Sa'ad Madaki, Ibrahim Mohamed, Nurhizam Safie Bin Mohd, Kamsuriah Ahmad:
The Impact of IT on Knowledge Sharing Environment and Management Practice. 1-7 - Neyara Radwan, Haitham M. Alzoubi, Nizar Sahawneh, Areej Fatima, Abdur Rehman, Shan Khan:
An Intelligent Approach for Predicting Bankruptcy Empowered with Machine Learning Technique. 1-5 - Muhammad Arslan Aslam, Muhammad Zonain, Salman Muneer, Omar Sattar, Mohammad Salahat, Muhammad Saleem:
Neurological Disorder Detection Using OCT Scan Image of Eye. 1-13 - M. Chakradhar, Cyril Robinson Azariah J, V. Suresh:
Simulation Comparison of Electrical Characterization in PZT and PVDF on Copper (Cu) substrate based MEMS piezoelectric harvester. 1-5 - Srinidhi Vasudevan:
DeFi: A risky business or silver bullet for SMEs? 1-5 - Ayesha Atta, Muhammad Adnan Khan, Muhammad Asif, Ghassan F. Issa, Raed A. Said, Tauqeer Faiz:
Classification of Skin Cancer empowered with convolutional neural network. 1-6 - D. Satyanarayana, Aisha Said Alasmi:
Detection and Mitigation of DDOS based Attacks using Machine Learning Algorithm. 1-5 - Aviral Jindal, Deepika, Abhishek Joshi:
Real-Time Drowsiness System Using Image Processing. 1-7 - Mubashra Mehmood, Noor Fatima, Abedallah Zaid Abualkishik, Umer Farooq, Amer Ibrahim, Kakul Agha:
An Empirical Study Exploring the Factors of Stress Level among Doctors. 1-8 - Islahuddin Jalal, Khairul Azmi Abu Bakar, Zarina Shukur, Norleyza Jailani:
Achieving liveness in validators' performance efficiency consensus (VPEC) based blockchain system using the Zakat principles. 1-5 - Sachin Kumar, Damandeep Kaur, Anjum Parvez:
Prediction of Prices Car Price Prediction with Machne Learning. 1-4 - Jyothi Swaroop, T. J. Nagalakshmi, S. Subash Sharma:
Girl Child Security System based on IOT Technology with GPS Tracker Comparing with Fuzzy Classifier Based Safety Device. 1-6 - Mafia Rasheed, Muhammad Adnan Khan, Nouh Sabri Elmitwally, Ghassan F. Issa, Taher M. Ghazal, Hamza Alrababah, Beenu Mago:
Heart Disease Prediction Using Machine Learning Method. 1-6 - Izza Ramzan, Fizza Ramzan, Muhammad Ibrahim, Naseem Abidi, Amer Hani Al-Kassem, Riktesh Srivastava:
Showrooming and Webrooming: Investigating the Consumer's Path to Purchase Intention. 1-11 - Atif Ali, Khushboo Farid Khan Ghouri, Hina Naseem, Tariq Rahim Soomro, Wathiq Mansoor, Alaa M. Momani:
Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National Security. 1-5 - Barween Al Kurdi, Hammad Raza, Salman Muneer, Muhammad Bux Alvi, Naseem Abidi, Muhammad Turki Alshurideh:
Estate Price Predictor for Multan City Townships Using Marching Learning. 1-5 - Aeshah Alhammad, Maryati Mohd. Yusof, Dian Indrayani Jambari:
A Review of Cyber Threats to Medical Devices Integration with Electronic Medical Records. 1-6 - Rachid Alami, Hamzah Elrehail, Amro Alzghoul:
Reducing cognitive dissonance in health care: Design of a new Positive psychology intervention tool to regulate professional stress among nurses. 1-8 - Nurdiana Jamal, Jasni Mohamad Zain:
A Review on Nature, Cybercrime and Best Practices of Digital Footprints. 1-6 - Gunasekhar Reddy Thummala, Radhika Baskar, N. Thiyaneswaran:
Prediction of Heart Disease Using Naive Bayes in Comparison with KNN Based on Accuracy. 1-4 - Shivam Singh, Shreya Bansal, Anjum Parvez:
A Deep-Learning Method to Predicting Traffic Accidents Due to Drowse. 1-6 - Uzma Jafar, Mohd Juzaiddin Ab Aziz, Zarina Shukur, Hafiz Adnan Hussain:
A Cost-efficient and Scalable Framework for E-Voting System based on Ethereum Blockchain. 1-6 - Shahan Yamin Siddiqui, Muhammad Ubaid Ullah, Aqsa Anwar, Alaa M. Momani, Liaqat Ali, Mohammed Salahat:
Fusion Based Self Diagnosis Expert System Empowered with Leven-berg Marquardt Algorithm. 1-6 - Divyansh Singh, Reema Goyal, Anil Kumar Dixit:
Decentralize Smart Contract Voting System. 1-5 - Zina Ahmed Abohaia:
Challenges and Opportunities of Integrating, and Securing IoT technology in public places. 1-8 - Vaibhav Dalip, Anup Lal Yadav, Ankita Joshi:
Custom Analytics Module and Admin Panel for Websites built in PHP (Laravel). 1-4 - Mohammad Rustom Al Nasar, Iftikhar Nasir, Tamer Mohamed, Nouh Sabri Elmitwally, Mahmoud M. Al-Sakhnini, Tayba Asgher:
Detection of Dengue Disease Empowered with Fused Machine Learning. 1-10 - Kamal Kishore, Shanu Khare, Vaibhav Uniyal, Sahil Verma:
Performance and stability Comparison of React and Flutter: Cross-platform Application Development. 1-4 - GA. Uday Kiran, K. Chanthirasekaran, N. Thiyaneswaran:
Design of Micro-Strip Patch Antenna using Metamaterial Substrate to improve the Directivity compared to FR4 Substrate. 1-7 - Umang Srivastava, Bhupinder Kaur, Amit Semwal:
Blockchain Technology in Requisites of Openscience, Bigdata It's Applications. 1-4 - Karamath Ateeq, P. RamLal, Ossma Ali Thawabeh, Ahmad Arsalan, Muhammad Burhan, Muhammad Umar Nasir:
NABA: Novel Adaptive Broadcast Storm Avoidance in NDN and SDN based FANET. 1-5 - Muaadh Mukred, Burkan Hawash, Mohammed Islam Nofal, Umi Asma' Mokhtar, Zawiyah Mohammad Yusof:
Big Data and Electronic Records Management Systems for Public Sector Organizations Competency. 1-7 - Tishya Shakya, R. Beaulah Jeyavathana, P. Kiran Kumar:
Improved Accuracy in Automatic Detection of Tuberculosis Disease from Lung CT images using Support Vector Machine Classifier over K-Nearest Neighbours Classifier. 1-5 - Nikhil Tyagi, Reema Goyal, Reeta Rautela:
Real Time Drowsiness Detection System. 1-3 - Tahir Alyas, Karamath Ateeq, Mohammed Alqahtani, Saigeeta Kukunuru, Nadia Tabassum, Rukshanda Kamran:
Security Analysis for Virtual Machine Allocation in Cloud Computing. 1-9 - Muhammad Turki Alshurideh, Bader Y. Obeidat, Vorobeva Victoria, Haitham M. Alzoubi, Areej Fatima, Amna Ilyas, Iqra Rustam:
A Systematic Literature Review of Security in 5G based Social Networks. 1-5 - Omar Kassem Khalil, Rasha Hasan:
Modeling the Influence of data amount on the response time of CRUD Operations under Oracle. 1-5 - Ahmad Mustafa Mohamad Al-Aboosi, Siti Norul Huda Sheikh Abdullah, Mohd Zamri Murah, Ghassan Saleh Al-Dharhani:
Cybersecurity Trends in Health Information Systems. 1-4 - Ala Abdelrazaq Alhammadi, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Ernesto Damiani:
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model. 1-9 - Mounir El Khatib, Afnan Ibrahim, Shamma Al Blooshi, Sara Almansoori, Ali El Khatib:
Digital Transformation and Disruptive Technologies: Effect of 3D Printing on Managing Projects. 1-13 - Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, Munir Ahmad, Naseem Abidi, Haitham M. Alzoubi, Ali A. Alzoubi:
The Threat of Deep Fake Technology to Trusted Identity Management. 1-5 - B. Sumanth, G. Ramkumar, Vinay Sivasamy:
Bone Fracture Identification using ANN Algorithm and Comparing the Accuracy with SVM Algorithm. 1-5 - Aditya Thakkar, Kavita, Sonali Dash, Sanjeev Kumar Joshi:
Sorting Algorithm visualizer. 1-5 - Lukesh Singh, Shanu Khare, Anjum Parvez, Sahil Verma:
Research Paper on Path-finding Algorithm Visualizer. 1-4 - Utkarsh Raj, Navneet Kaur, Babita Rawat:
English Algorithm Translation to C Program using Syntax Directed Translation Schema. 1-3 - Atif Ali, Nafees Ahmed Somroo, Umer Farooq, Muhammad Asif, Iman Akour, Wathiq Mansoor:
Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation. 1-12 - Odai Ali Ali Sharfadeen AL-Azazi, Azah Anir Norman, Norjihan Binti Abdul Ghani:
Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017-2022). 1-8 - Khaled Mohamed Kayed Alhyasat, Nahia Mourad, Omar Sattar, Faiz Rasool, Ali Sheraz Akram, Tayba Asgher:
Estimation of Virtual Trust on Driverless Cars using Type-1 Fuzzy logic. 1-11 - M. Muniteja, M. K. Mariam Bee, V. Suresh:
Detection and classification of Melanoma image of skin cancer based on Convolutional Neural Network and comparison with Coactive Neuro Fuzzy Inference System. 1-5 - Waleed T. Al-Sit, Karamath Ateeq, Syed Quadir Moinuddin, Shoukat Aslam, Abdur Rehman, Tayba Asgher, Ossma Ali Thawabeh:
Direct Trust in Cloud Computing Based on Fuzzy Logic. 1-6 - Aabhas Kumar, Damandep Kaur, Abhishek Kumar Pathak:
VOICE ASSISTANT USING PYTHON. 1-4 - Kanhaiya Jee, Amanpreet Kaur, Abhishek Joshi:
Machine Learning in Healthcare Industry: An Analysis. 1-4 - Saira Kanwal, Muhammad Adnan Khan, Areej Fatima, Mahmoud M. Al-Sakhnini, Omar Sattar, Hamza Alrababah:
IA2SKAbs: Intelligent automated and accurate system for classification of kidney abnormalities. 1-10 - Nidal A. Al-Dmour, Mohammad Salahat, Harish K. G. Nair, Nayab Kanwal, Muhammad Saleem, Nauman Aziz:
Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert System. 1-6 - Nikhil Barya, Azhar Ashraf, Maninder Kaur, Shikha Uniyal Gairola:
Classification and Analysis of Virtual Private Network. 1-5 - Swati Sharma, Shanu Khare, Vaibhav Unival, Sahil Verma:
Hybrid Development in Flutter and its Widgits. 1-4 - Sunny Kumar, Sonali Dash, Lakshmipriya Vinjamuri, Kavita:
Development of an Email System using Java and comparison with other Email Applications. 1-5 - S. Koti Niteesh Reddy, S. Prem Kumar, R. Karthikeyan:
Shape Based Feature Extraction for Currency recognition and compare the accuracy and sensitivity with ORB algorithm. 1-5 - Naman Thakur, Satnam Singh Saini, Abhishek Kumar Pathak:
Data Mining Model Framework for GTD (Global Terrorism Database). 1-5 - Kapil Joshi, Richa Pandey, Salil Bharany, Ateeq Ur Rehman, Nasser Taleb, Deepak Kalra:
Customization of Bookkeeping system for Blockchain System Analysis: A Review. 1-5 - Anurag Sharma, Amanpreet Kaur, Amit Semwal:
Supervised and Unsupervised Prediction Application of Machine Learning. 1-5 - Mahdi Sahlabadi, Morteza Saberikamarposhti, Ravie Chandren Muniyandi, Zarina Shukur:
Using Cycling 3D Chaotic Map and DNA Sequences for Introducing a Novel Algorithm for Color Image Encryption. 1-7 - Ashish Srivastava, Shreya Bansal, Satbir S. Sehgal:
Real-Time Based Driver's Drowsiness and Fatigue Detection System. 1-6 - Ghassan F. Issa, Khaled Shaalan, Yara Shaalan, Hafiza Afia Saeed, Noor Fatima, Abd Ur Rehman:
Brain Stroke Prediction Using ANN. 1-9 - Vaibhav Rathor, Navneet Kaur, Reeta Rautela:
Employee Hiring using Machine Learning. 1-3 - Ahmad Firdaus, Ghassan Saleh Al-Dharhani, Zahian Ismail, Mohd Faizal Ab Razak:
The Summer Heat of Cryptojacking Season: Detecting Cryptojacking using Heatmap and Fuzzy. 1-5 - K. Tejasree, G. Gulothungan, R. Navaneethan:
Computational Model Based Approach to Analyze Calcium (Ca2+) Concentration Effects in Ventricular Cells for Action Potential Generation Using Euler Integration Method-A Simulation Study. 1-5 - Shivam, Sugandhi Midha, Bharti Ramola:
Cryptography in Network Security. 1-5 - Ali Lamjid, Khairul Akram Zainol Ariffin, Mohd Juzaiddin AB Aziz, Nor Samsiah Sani:
Determine the optimal Hidden Layers and Neurons in the Generative Adversarial Networks topology for the Intrusion Detection Systems. 1-7 - Shubham Bhardwaj, Divya K, Abhishek Kumar Pathak:
Real-Time Gesture Recognition System using CNN. 1-3 - Ritik Sharma, Sugandhi Midha, Amit Semwal:
Predictive Analysis on Multimodal Medicare Application. 1-5 - H. Sudarsan Kumar Raju, M. Nalini, P. Senthil Murugan:
Performance Analysis of Multi-objective Data Placement Technique and Sine Optimization Algorithm to Measure Prediction in Large Volume of Data Storage. 1-5 - Urooj Yousuf Khan, Tariq Rahim Soomro, Muhammad Nawaz Brohi:
iFogSim: A Tool for Simulating Cloud and Fog Applications. 1-5 - Ansh Jain, Gurinder Singh, Amit Semwal:
Smart Attenedence System Using Face Recognition. 1-3 - Devansh Mehta, Sanjeev Kumar Joshi:
Hiding Information in images using LSBSteganography technique. 1-4 - Aqila Begum, Sophia Rahaman, Jesus Cuauhtemoc Tellez Gaytan:
Fintech and Leverage Of Virtual Reality An Outlook From UAE. 1-7 - Mounir El Khatib, Sara Bin Khadim, Wadha Al Ketbi, Noura Hamad Al Kuwaiti, Ali El Khatib:
Digital Transformation and Disruptive Technologies: Effect of Blockchain on Managing Construction Projects. 1-9 - Swasti Jain, Sonali Dash, Rajesh Deorari, Kavita:
Object Detection Using Coco Dataset. 1-4 - S. Mahesh, G. Ramkuma, K. Anjaneyulu:
Smart face detection and recognition in Pose variant images using Alexnet CNN compare accuracy with SVM. 1-4 - Liaqat Ali, Mahmoud M. Al-Sakhnini, Deepak Kalra, Farheen Afzaal, Madiha Pervaiz, Muhammad Farrukh Khan:
Distributed Search Engine Query Optimization Using Artificial Neural Network. 1-5 - Priyanshu Sharma, Damandeep Kaur, Bharti Ramola:
JavaScript API Deprecation Landscape: A Mining Study. 1-5 - Shardeep Kaur Sooch, Darpan Anand, Rajesh Deorari:
Brain Tumor detection with GLCM feature extraction and hybrid classification approach. 1-5