


default search action
IIT 2018: Al Ain, United Arab Emirates
- 2018 International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, November 18-19, 2018. IEEE 2018, ISBN 978-1-5386-6673-9

- Mohammed Baziyad, Tamer Rabie, Ibrahim Kamel:

Extending steganography payload capacity using the L*a*b* color space. 1-6 - Emad Hamadaqa, Ahmad Abadleh

, Ayoub Mars, Wael Adi:
Highly Secured Implantable Medical Devices. 7-12 - Eva Habeeb, Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari:

Voronoi-based Secure kNN Queries over Spatial Data at the Cloud. 13-17 - Ayoub Mars, Wael Adi:

Clone-Resistant Entities for Vehicular Security. 18-23 - Djedjiga Mouheb

, Rutana Ismail, Shaheen Al Qaraghuli, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Offensive Messages in Arabic Social Media Communications. 24-29 - Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai:

Proposals on IoT Communication through MQTT over L2 Network and their Performance Evaluation. 30-35 - Asma Al Khaili, Aisha Al Mamari, Hoda H. Amer

, Walid Ibrahim
:
An Affordable System for Remotely Monitoring Water Quality in Residential Water Tanks. 36-41 - Abderrahmane Lakas, Boumediene Belkhouche, Omar Benkraouda, Amin Shuaib, Hussain Jaffar Alasmawi:

A Framework for a Cooperative UAV-UGV System for Path Discovery and Planning. 42-46 - Zuhoor Al-Khanjari, Iman Al-Kindi:

Integrating MOOC with Open Source Moodle: The New Direction of Learning at Sultan Qaboos University. 47-51 - Fedeyya Almansoori, Prashanth Reddy Marpu, Zeyar Aung:

Improved Power Control Approach for Better Data Throughput in CubeSat Nanosatellites. 52-57 - Fatima Yassine, Mamoun Adel Awad

:
Migrating from SQL to NOSQL Database: Practices and Analysis. 58-62 - Marc Haßler, André Pomp, Christian Kohlschein, Tobias Meisen

:
STIDes Revisited - Tackling Global Time Shifts and Scaling. 63-68 - Ikbal Taleb

, Mohamed Adel Serhani, Rachida Dssouli:
Big Data Quality Assessment Model for Unstructured Data. 69-74 - N. AlRayhi, Khaled Salah, N. Al-Kork, Ahmed Bentiba, Zouheir Trabelsi, M. Ajmal Azad

:
Cloud Automation to Run Large-Scale Quantum Chemical Simulations. 75-80 - Obada Al Zoubi, Mariette Awad

:
Dynamic Area Search with Shared Memory: A Meta-Framework to Improve Pathfinding Algorithms. 81-87 - Riwa Mouawi, Mariette Awad

, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. 88-92 - Sarah S. Alduayj, Kashif Rajpoot

:
Predicting Employee Attrition using Machine Learning. 93-98 - Reem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, Nouf S. Alsharif, Mishael F. Aljubeir, Sunday Olusanya Olatunji, Alaa Y. Alahmadi

, Mohammed Imran
, Rahma A. Alzahrani, Nora S. Alturayeif:
Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning Techniques. 99-104 - Heba M. Ismail

, Boumediene Belkhouche:
A Reusable Software Architecture for Personalized Learning Systems. 105-110 - Mohammad Fraiwan, Fida'a Al-Quran

, Basheer Al-Duwairi:
Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks. 111-116 - Tasneem Salah, M. Jamal Zemerly

, Chan Yeob Yeun
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
IoT Applications: From Mobile Agents to Microservices Architecture. 117-122 - Upul Jayasinghe

, Gyu Myoung Lee, Áine MacDermott
:
Trust-Based Data Controller for Personal Information Management. 123-128 - Alsaleh Saad, Alwaleed Alhumaid:

How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members. 129-134 - Muhammad Fahad Nasir, Ahmad Ali, Wasib Javed, Asim Altaf Shah, Junaid Imtiaz:

Effect on Detection and False Alarm Probabilities For Various Amplitude Modulation Techniques. 135-140 - Mayank Tiwary, Shanya Sharma, Pritish Mishra

, Hesham El-Sayed, Mukesh Prasad
, Deepak Puthal:
Building Scalable Mobile Edge Computing by Enhancing Quality of Services. 141-146 - Mustapha Younes Taleb, Salah Merniz, Saad Harous

:
Distributed Rate and Congestion Control hybrid scheme for VANETs. 147-150 - Mansoor Alblooshi, Khaled Salah, Yousof Al-Hammadi

:
Blockchain-based Ownership Management for Medical IoT (MIoT) Devices. 151-156 - May AlTaei, Nedaa Baker Al Barghuthi

, Qusay H. Mahmoud, Sonia Al Barghuthi, Huwida Said
:
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges. 157-162 - Palwasha W. Shaikh

, Issam W. Damaj:
Analysis of Pipelined KATAN Ciphers under Handle-C for FPGAs. 163-168 - Juhar Ahmed Abdella

, Nazar Zaki, Khaled Shuaib:
Automatic Detection of Airline Ticket Price and Demand: A review. 169-174 - Eiman Alothali, Nazar Zaki, Elfadil A. Mohamed, Hany Al Ashwal

:
Detecting Social Bots on Twitter: A Literature Review. 175-180 - Fatima Al Shamsi, Sarah Bamatraf, Talal Rahwan, Zeyar Aung, Davor Svetinovic

:
Correlation Analysis of Popularity and Interoperability in Open Source Projects. 181-186 - Loveleen Kaur, Ashutosh Mishra

:
A comparative analysis of evolutionary algorithms for the prediction of software change. 187-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














