


default search action
IIT 2018: Al Ain, United Arab Emirates
- 2018 International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, November 18-19, 2018. IEEE 2018, ISBN 978-1-5386-6673-9
- Mohammed Baziyad, Tamer Rabie, Ibrahim Kamel:
Extending steganography payload capacity using the L*a*b* color space. 1-6 - Emad Hamadaqa, Ahmad Abadleh
, Ayoub Mars, Wael Adi:
Highly Secured Implantable Medical Devices. 7-12 - Eva Habeeb, Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari:
Voronoi-based Secure kNN Queries over Spatial Data at the Cloud. 13-17 - Ayoub Mars, Wael Adi:
Clone-Resistant Entities for Vehicular Security. 18-23 - Djedjiga Mouheb
, Rutana Ismail, Shaheen Al Qaraghuli, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Offensive Messages in Arabic Social Media Communications. 24-29 - Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai:
Proposals on IoT Communication through MQTT over L2 Network and their Performance Evaluation. 30-35 - Asma Al Khaili, Aisha Al Mamari, Hoda H. Amer
, Walid Ibrahim
:
An Affordable System for Remotely Monitoring Water Quality in Residential Water Tanks. 36-41 - Abderrahmane Lakas, Boumediene Belkhouche, Omar Benkraouda, Amin Shuaib, Hussain Jaffar Alasmawi:
A Framework for a Cooperative UAV-UGV System for Path Discovery and Planning. 42-46 - Zuhoor Al-Khanjari, Iman Al-Kindi:
Integrating MOOC with Open Source Moodle: The New Direction of Learning at Sultan Qaboos University. 47-51 - Fedeyya Almansoori, Prashanth Reddy Marpu, Zeyar Aung:
Improved Power Control Approach for Better Data Throughput in CubeSat Nanosatellites. 52-57 - Fatima Yassine, Mamoun Adel Awad
:
Migrating from SQL to NOSQL Database: Practices and Analysis. 58-62 - Marc Haßler, André Pomp, Christian Kohlschein, Tobias Meisen
:
STIDes Revisited - Tackling Global Time Shifts and Scaling. 63-68 - Ikbal Taleb
, Mohamed Adel Serhani, Rachida Dssouli:
Big Data Quality Assessment Model for Unstructured Data. 69-74 - N. AlRayhi, Khaled Salah, N. Al-Kork, Ahmed Bentiba, Zouheir Trabelsi, M. Ajmal Azad
:
Cloud Automation to Run Large-Scale Quantum Chemical Simulations. 75-80 - Obada Al Zoubi, Mariette Awad
:
Dynamic Area Search with Shared Memory: A Meta-Framework to Improve Pathfinding Algorithms. 81-87 - Riwa Mouawi, Mariette Awad
, Ali Chehab
, Imad H. Elhajj, Ayman I. Kayssi:
Towards a Machine Learning Approach for Detecting Click Fraud in Mobile Advertizing. 88-92 - Sarah S. Alduayj, Kashif Rajpoot
:
Predicting Employee Attrition using Machine Learning. 93-98 - Reem A. Alassaf, Khawla A. Alsulaim, Noura Y. Alroomi, Nouf S. Alsharif, Mishael F. Aljubeir, Sunday Olusanya Olatunji, Alaa Y. Alahmadi
, Mohammed Imran
, Rahma A. Alzahrani, Nora S. Alturayeif:
Preemptive Diagnosis of Chronic Kidney Disease Using Machine Learning Techniques. 99-104 - Heba M. Ismail
, Boumediene Belkhouche:
A Reusable Software Architecture for Personalized Learning Systems. 105-110 - Mohammad Fraiwan, Fida'a Al-Quran
, Basheer Al-Duwairi:
Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks. 111-116 - Tasneem Salah, M. Jamal Zemerly
, Chan Yeob Yeun
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
IoT Applications: From Mobile Agents to Microservices Architecture. 117-122 - Upul Jayasinghe
, Gyu Myoung Lee, Áine MacDermott
:
Trust-Based Data Controller for Personal Information Management. 123-128 - Alsaleh Saad, Alwaleed Alhumaid:
How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members. 129-134 - Muhammad Fahad Nasir, Ahmad Ali, Wasib Javed, Asim Altaf Shah, Junaid Imtiaz:
Effect on Detection and False Alarm Probabilities For Various Amplitude Modulation Techniques. 135-140 - Mayank Tiwary, Shanya Sharma, Pritish Mishra
, Hesham El-Sayed, Mukesh Prasad
, Deepak Puthal:
Building Scalable Mobile Edge Computing by Enhancing Quality of Services. 141-146 - Mustapha Younes Taleb, Salah Merniz, Saad Harous
:
Distributed Rate and Congestion Control hybrid scheme for VANETs. 147-150 - Mansoor Alblooshi, Khaled Salah, Yousof Al-Hammadi
:
Blockchain-based Ownership Management for Medical IoT (MIoT) Devices. 151-156 - May AlTaei, Nedaa Baker Al Barghuthi
, Qusay H. Mahmoud, Sonia Al Barghuthi, Huwida Said
:
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges. 157-162 - Palwasha W. Shaikh
, Issam W. Damaj:
Analysis of Pipelined KATAN Ciphers under Handle-C for FPGAs. 163-168 - Juhar Ahmed Abdella
, Nazar Zaki, Khaled Shuaib:
Automatic Detection of Airline Ticket Price and Demand: A review. 169-174 - Eiman Alothali, Nazar Zaki, Elfadil A. Mohamed, Hany Al Ashwal
:
Detecting Social Bots on Twitter: A Literature Review. 175-180 - Fatima Al Shamsi, Sarah Bamatraf, Talal Rahwan, Zeyar Aung, Davor Svetinovic
:
Correlation Analysis of Popularity and Interoperability in Open Source Projects. 181-186 - Loveleen Kaur, Ashutosh Mishra
:
A comparative analysis of evolutionary algorithms for the prediction of software change. 187-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.