Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Physical Sciences and Mathematics

Enhanced Label Noise Filtering With Multiple Voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, Wajahat Ali Khan Dec 2019

Enhanced Label Noise Filtering With Multiple Voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, Wajahat Ali Khan

All Works

© 2019 by the authors. Label noises exist in many applications, and their presence can degrade learning performance. Researchers usually use filters to identify and eliminate them prior to training. The ensemble learning based filter (EnFilter) is the most widely used filter. According to the voting mechanism, EnFilter is mainly divided into two types: single-voting based (SVFilter) and multiple-voting based (MVFilter). In general, MVFilter is more often preferred because multiple-voting could address the intrinsic limitations of single-voting. However, the most important unsolved issue in MVFilter is how to determine the optimal decision point (ODP). Conceptually, the decision point is a …


Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a …


Follow-Up Decision Support Tool For Public Healthcare: A Design Research Perspective, Shah J. Miah, Najmul Hasan, John Gammack Oct 2019

Follow-Up Decision Support Tool For Public Healthcare: A Design Research Perspective, Shah J. Miah, Najmul Hasan, John Gammack

All Works

© 2019, Korean Society of Medical Informatics. All rights reserved. Objectives: Mobile health (m-Health) technologies may provide an appropriate follow-up support service for patient groups with post-treatment conditions. While previous studies have introduced m-Health methods for patient care, a smart system that may provide follow-up communication and decision support remains limited to the management of a few specific types of diseases. This paper introduces an m-Health solution in the current climate of increased demand for electronic information exchange. Methods: Adopting a novel design science research approach, we developed an innovative solution model for post-treatment follow-up decision support interaction for use …


Dimensions Of 'Socio' Vulnerabilities Of Advanced Persistent Threats, Mathew Nicho, Christopher D. Mcdermott Sep 2019

Dimensions Of 'Socio' Vulnerabilities Of Advanced Persistent Threats, Mathew Nicho, Christopher D. Mcdermott

All Works

© 2019 University of Split, FESB. Advanced Persistent Threats (APT) are highly targeted and sophisticated multi-stage attacks, utilizing zero day or near zero-day malware. Directed at internetworked computer users in the workplace, their growth and prevalence can be attributed to both socio (human) and technical (system weaknesses and inadequate cyber defenses) vulnerabilities. While many APT attacks incorporate a blend of socio-technical vulnerabilities, academic research and reported incidents largely depict the user as the prominent contributing factor that can weaken the layers of technical security in an organization. In this paper, our objective is to explore multiple dimensions of socio factors …


Cross-Company Customer Churn Prediction In Telecommunication: A Comparison Of Data Transformation Methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar Jun 2019

Cross-Company Customer Churn Prediction In Telecommunication: A Comparison Of Data Transformation Methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar

All Works

© 2018 Elsevier Ltd Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, …


Triplet Loss Network For Unsupervised Domain Adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, Asad Masood Khattak May 2019

Triplet Loss Network For Unsupervised Domain Adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, Asad Masood Khattak

All Works

© 2019 by the authors. Domain adaptation is a sub-field of transfer learning that aims at bridging the dissimilarity gap between different domains by transferring and re-using the knowledge obtained in the source domain to the target domain. Many methods have been proposed to resolve this problem, using techniques such as generative adversarial networks (GAN), but the complexity of such methods makes it hard to use them in different problems, as fine-tuning such networks is usually a time-consuming task. In this paper, we propose a method for unsupervised domain adaptation that is both simple and effective. Our model (referred to …


A Fina Világbajnokság (2017) Önkénteseinek Szerepe Budapest Sportturizmusában, Viktória Szenyéri, Gábor Michalkó, Anestis Fotiadis Apr 2019

A Fina Világbajnokság (2017) Önkénteseinek Szerepe Budapest Sportturizmusában, Viktória Szenyéri, Gábor Michalkó, Anestis Fotiadis

All Works

Volunteers are indispensable in the organization of international mega sport events. Their activity is really important not only during these world-level meetings, but also after the competition has ended, as they play an important role in furthering the life of the events and in maintaining interest in the host location. Although the practice of volunteering in Hungary is still in its infancy, its social status and popularity are developing dynamically. The 2017 FINA Championships in Budapest is considered to be a milestone in the evolution of Hungarian volunteer work. The volunteers took part in a variety of roles in order …


The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir Apr 2019

The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the …


Wireless Sensor Networks For Big Data Systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim Apr 2019

Wireless Sensor Networks For Big Data Systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Before discovering meaningful knowledge from big data systems, it is first necessary to build a data-gathering infrastructure. Among many feasible data sources, wireless sensor networks (WSNs) are rich big data sources: a large amount of data is generated by various sensor nodes in large-scale networks. However, unlike typical wireless networks, WSNs have serious deficiencies in terms of data reliability and communication owing to the limited capabilities of the nodes. Moreover, a considerable amount of sensed data are of no interest, meaningless, and redundant when a large number of sensor nodes is …


Compromised User Credentials Detection In A Digital Enterprise Using Behavioral Analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, Sajid Anwar Apr 2019

Compromised User Credentials Detection In A Digital Enterprise Using Behavioral Analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, Sajid Anwar

All Works

© 2018 In today's digital age, the digital transformation is necessary for almost every competitive enterprise in terms of having access to the best resources and ensuring customer satisfaction. However, due to such rewards, these enterprises are facing key concerns around the risk of next-generation data security or cybercrime which is continually increasing issue due to the digital transformation four essential pillars—cloud computing, big data analytics, social and mobile computing. Data transformation-driven enterprises should ready to handle this next-generation data security problem, in particular, the compromised user credential (CUC). When an intruder or cybercriminal develops trust relationships as a legitimate …


Enhancing The Teaching And Learning Process Using Video Streaming Servers And Forecasting Techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, Kamal Uddin Sarker Apr 2019

Enhancing The Teaching And Learning Process Using Video Streaming Servers And Forecasting Techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, Kamal Uddin Sarker

All Works

© 2019 by the authors. Higher educational institutes (HEI) are adopting ubiquitous and smart equipment such as mobile devices or digital gadgets to deliver educational content in a more effective manner than the traditional approaches. In present works, a lot of smart classroom approaches have been developed, however, the student learning experience is not yet fully explored. Moreover, module historical data over time is not considered which could provide insight into the possible outcomes in the future, leading new improvements and working as an early detection method for the future results within the module. This paper proposes a framework by …


Emerging Insights Of Health Informatics Research: A Literature Analysis For Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, John Gammack Feb 2019

Emerging Insights Of Health Informatics Research: A Literature Analysis For Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, John Gammack

All Works

This paper presents a contemporary literature review to provide insights into the current health informatics literature. The objective of this study is to identify emerging directions of current health informatics research from the latest and existing studies in the health informatics domain. We analyse existing health informatics studies using a thematic analysis, so that justified sets of research agenda can be outlined on the basis of these findings. We selected articles that are published in the science direct online database. The selected 73 sample articles (published from 2014 to 2018 in premier health informatics journals) are considered as representative samples …


Integrated Database System With Spatial Information For Disaster Risk Management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, Ki Il Kim Jan 2019

Integrated Database System With Spatial Information For Disaster Risk Management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, Ki Il Kim

All Works

© 2019 AECE. Despite availability of various image sources for specific areas, a new disaster management system is likely to be implemented by using only one of them. Thus, its applicability and extensibility are severely limited. In addition, real-time update for the disaster area is one of the crucial functions for search and rescue activities. To meet the aforementioned requirements, in this paper, we propose a new spatial data infrastructure by defining the methodological scheme for the raster information. The proposed system has four respective layers to reduce the management cost as well as provide a flexible architecture. In each …


Effect Of Consumer Innovativeness On New Product Purchase Intentions Through Learning Process And Perceived Value, Salem A. Al-Jundi, Ahmed Shuhaiber, Reshmi Augustine Jan 2019

Effect Of Consumer Innovativeness On New Product Purchase Intentions Through Learning Process And Perceived Value, Salem A. Al-Jundi, Ahmed Shuhaiber, Reshmi Augustine

All Works

© 2019, © 2019 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. Prior research on the impact of consumer innovativeness on new product purchase intentions experienced confusion about the definition of innovativeness and the interest in a specific domain. To fill the gaps, this study builds a new model to examine the multivariate effects of different variables on new product purchase intentions in general and the interplay between all latent variables. We tested a sample of 438 responses that reflect the perspectives of the public in the Emirate of Abu Dhabi, United …


Wordnet-Based Criminal Networks Mining For Cybercrime Investigation, Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington Jan 2019

Wordnet-Based Criminal Networks Mining For Cybercrime Investigation, Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington

All Works

© 2019 IEEE. Cybercriminals exploit the opportunities provided by the information revolution and social media to communicate and conduct underground illicit activities, such as online fraudulence, cyber predation, cyberbullying, hacking, blackmailing, and drug smuggling. To combat the increasing number of criminal activities, structure and content analysis of criminal communities can provide insight and facilitate cybercrime forensics. In this paper, we propose a framework to analyze chat logs for crime investigation using data mining and natural language processing techniques. The proposed framework extracts the social network from chat logs and summarizes conversation into topics. The crime investigator can use information visualizer …


Non-Orthogonal Radio Resource Management For Rf Energy Harvested 5g Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, Hyung Seok Kim Jan 2019

Non-Orthogonal Radio Resource Management For Rf Energy Harvested 5g Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, Hyung Seok Kim

All Works

© 2013 IEEE. Fifth generation (5G) networks are expected to support a large number of devices, provide spectral efficiency and energy efficiency. Non-orthogonal multiple access (NOMA) has been recently investigated to accommodate a large number of devices as well as spectral efficiency. On the other hand, energy efficiency in 5G networks can be addressed using energy harvesting. In this paper, we investigate NOMA in 5G networks with RF energy harvesting to maximize the number of admitted users as well as system throughput. We model a mathematical framework to optimize user grouping, power allocation, and time allocation for information transfer and …


Hicss - Modeling Privacy Preservation In Smart Connected Toys By Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, Patrick Hung Jan 2019

Hicss - Modeling Privacy Preservation In Smart Connected Toys By Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, Patrick Hung

All Works

No abstract provided.


Neuroprotective Effects Of Melatonin And Celecoxib Against Ethanol-Induced Neurodegeneration: A Computational And Pharmacological Approach, Lina T. Al Kury, Alam Zeb, Zain Ul Abidin, Nadeem Irshad, Imran Malik, Arooj Mohsin Alvi, Atif Ali Khan Khalil, Sareer Ahmad, Muhammad Faheem, Arif Ullah Khan, Fawad Ali Shah, Shupeng Li Jan 2019

Neuroprotective Effects Of Melatonin And Celecoxib Against Ethanol-Induced Neurodegeneration: A Computational And Pharmacological Approach, Lina T. Al Kury, Alam Zeb, Zain Ul Abidin, Nadeem Irshad, Imran Malik, Arooj Mohsin Alvi, Atif Ali Khan Khalil, Sareer Ahmad, Muhammad Faheem, Arif Ullah Khan, Fawad Ali Shah, Shupeng Li

All Works

© 2019 Al Kury et al. This work is published and licensed by Dove Medical Press Limited. Purpose: Melatonin and celecoxib are antioxidants and anti-inflammatory agents that exert protective effects in different experimental models. In this study, the neuroprotective effects of melatonin and celecoxib were demonstrated against ethanol-induced neuronal injury by in silico, morphological, and biochemical approaches. Methods: For the in silico study, 3-D structures were constructed and docking analysis performed. For in vivo studies, rats were treated with ethanol, melatonin, and celecoxib. Brain samples were collected for biochemical and morphological analysis. Results: Homology modeling was performed to build 3-D …


Speech Enhancement Algorithm Based On Super-Gaussian Modeling And Orthogonal Polynomials, Basheera M. Mahmmod, Abd Rahman Ramli, Thar Baker, Feras Al-Obeidat, Sadiq H. Abdulhussain, Wissam A. Jassim Jan 2019

Speech Enhancement Algorithm Based On Super-Gaussian Modeling And Orthogonal Polynomials, Basheera M. Mahmmod, Abd Rahman Ramli, Thar Baker, Feras Al-Obeidat, Sadiq H. Abdulhussain, Wissam A. Jassim

All Works

© 2020 Lippincott Williams and Wilkins. All rights reserved. Different types of noise from the surrounding always interfere with speech and produce annoying signals for the human auditory system. To exchange speech information in a noisy environment, speech quality and intelligibility must be maintained, which is a challenging task. In most speech enhancement algorithms, the speech signal is characterized by Gaussian or super-Gaussian models, and noise is characterized by a Gaussian prior. However, these assumptions do not always hold in real-life situations, thereby negatively affecting the estimation, and eventually, the performance of the enhancement algorithm. Accordingly, this paper focuses on …


Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan Jan 2019

Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan

All Works

© 2013 IEEE. Testing is a vital component of the system development life cycle. As information systems infrastructure move from native computing to cloud-based and virtualized platforms, it becomes necessary to evaluate their effectiveness to ensure completion of organizational goals. However, the complexity and scale of virtualized environments make this process difficult. Additionally, inherited and novel issues further complicate this process, while relatively high costs can be constraining. Enabling service-driven environments to provide this evaluation is therefore beneficial for both providers and users. No such complete service offering currently exists. This paper is therefore aimed to benefit industry and academia …


Effective Evaluation Of The Non-Technical Skills In The Computing Discipline, Maurice Danaher, Kevin Schoepp, Ashley Ater Kranov Jan 2019

Effective Evaluation Of The Non-Technical Skills In The Computing Discipline, Maurice Danaher, Kevin Schoepp, Ashley Ater Kranov

All Works

© 2019, Journal of Information Technology Eucation Research. Aim/Purpose Assessing non-technical skills is very difficult and current approaches typically assess the skills separately. There is a need for better quality assessment of these skills at undergraduate and postgraduate levels. Background A method has been developed for the computing discipline that assesses all six non-technical skills prescribed by ABET (Accreditation Board for Engineering and Technology), the accreditation board for engineering and technology. It has been shown to be a valid and reliable method for undergraduate students Methodology The method is based upon performance-based assessment where a team of students discuss and …


A Novel Quality And Reliability-Based Approach For Participants' Selection In Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, Kiyan Afsari Jan 2019

A Novel Quality And Reliability-Based Approach For Participants' Selection In Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, Kiyan Afsari

All Works

© 2013 IEEE. With the advent of mobile crowdsensing, we now have the possibility of tapping into the sensing capabilities of smartphones carried by citizens every day for the collection of information and intelligence about cities and events. Finding the best group of crowdsensing participants that can satisfy a sensing task in terms of data types required, while satisfying the quality, time, and budget constraints is a complex problem. Indeed, the time-constrained and location-based nature of crowdsensing tasks, combined with participants' mobility, render the task of participants' selection, a difficult task. In this paper, we propose a comprehensive and practical …


Towards An Efficient Data Fragmentation, Allocation, And Clustering Approach In A Distributed Environment, Hassan Abdalla, Abdel Monim Artoli Jan 2019

Towards An Efficient Data Fragmentation, Allocation, And Clustering Approach In A Distributed Environment, Hassan Abdalla, Abdel Monim Artoli

All Works

© 2019 by the authors. Data fragmentation and allocation has for long proven to be an efficient technique for improving the performance of distributed database systems' (DDBSs). A crucial feature of any successful DDBS design revolves around placing an intrinsic emphasis on minimizing transmission costs (TC). This work; therefore, focuses on improving distribution performance based on transmission cost minimization. To do so, data fragmentation and allocation techniques are utilized in this work along with investigating several data replication scenarios. Moreover, site clustering is leveraged with the aim of producing a minimum possible number of highly balanced clusters. By doing so, …


Using Mobile Learning Tools In Higher Education: A Uae Case, Jenny Eppard, Zeina Hojeij, Pinar Ozdemir-Ayber, Marlieke Rodjan-Helder, Sandra Baroudi Jan 2019

Using Mobile Learning Tools In Higher Education: A Uae Case, Jenny Eppard, Zeina Hojeij, Pinar Ozdemir-Ayber, Marlieke Rodjan-Helder, Sandra Baroudi

All Works

© International Association of Online Engineering. Research indicates that mobile learning (ML), has the potential to transform teaching and learning. Despite its benefits, mobile learning adoption is a challenging process which requires support to facilitate its integration. The focus of this article is to investigate the factors that could affect ML acceptance. The quantitative and qualitative data collected from the surveys revealed additional information regarding the pedagogical benefits of and obstacles to mobile learning integration. Even though participants in this study reported to be late adopters of technology, they maintained that ML is useful for learning, specifically ubiquitous learning. Teachers …


V2v And V2i Communications For Traffic Safety And Co2 Emission Reduction: A Performance Evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, Ansar Yasar Jan 2019

V2v And V2i Communications For Traffic Safety And Co2 Emission Reduction: A Performance Evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, Ansar Yasar

All Works

© 2019 The Authors. Published by Elsevier B.V. In this paper, we consider a special scenario where connected (V2V and V2I) vehicular technologies are used to alert motorists when they approach a hazardous zone, such as a low visibility area, and recommend proper speeds. We present the principles of the proposed safety driving system and compare the performance of V2V and V2I communications in terms of road safety effectiveness and network communication efficiency. This performance analysis is based on extensive computer simulation experiments by adapting the iTetris platform under various scenarios. We also explore, via simulations, whether CHAA systems, based …


Role Assigning And Taking In Cloud Computing, Shafaq Naheed Khan, Mathew Nicho, Haifa Takruri, Zakaria Maamar, Faouzi Kamoun Jan 2019

Role Assigning And Taking In Cloud Computing, Shafaq Naheed Khan, Mathew Nicho, Haifa Takruri, Zakaria Maamar, Faouzi Kamoun

All Works

© 2019 - IOS Press and the authors. All rights reserved. The widespread use of cloud computing (CC) has brought to the forefront information technology (IT) governance issues, rendering the lack of expertise in handling CC-based IT controls a major challenge for business enterprises and other societal organizations. In the cloud-computing context, this study identifies and ranks the determinants of role assigning and taking by IT people. The study's integrative research links CC and IT governance to humane arrangements, as it validates and ranks role assigning and taking components through in-depth interviews with twelve IT decision-makers and forty-four Information Systems …


The Covcrav Project: Architecture And Design Of A Cooperative V2v Crash Avoidance System, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, Ansar Yasar Jan 2019

The Covcrav Project: Architecture And Design Of A Cooperative V2v Crash Avoidance System, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, Ansar Yasar

All Works

© 2019 The Authors. Published by Elsevier B.V. Systems capable of warning motorists against hazardous driving conditions are extremely useful for next-generation cooperative situational awareness and collision avoidance systems. In this paper, we present some preliminary results related to the COVCRAV project which aims to develop an on-board Road Hazard Signaling (RHS) system based on a crowd-apprising model. Unlike other approaches that rely on the automatic detection of dangerous situations via onboard sensors or warning messages received from roadside units, our approach enables drivers to interact directly with a touchscreen Driver Vehicle Interface (DVI) to notify nearby vehicles about the …


Methodologies For Designing Healthcare Analytics Solutions: A Literature Analysis, Shah J. Miah, John Gammack, Najmul Hasan Jan 2019

Methodologies For Designing Healthcare Analytics Solutions: A Literature Analysis, Shah J. Miah, John Gammack, Najmul Hasan

All Works

© The Author(s) 2019. Healthcare analytics has been a rapidly emerging research domain in recent years. In general, healthcare solution design studies focus on developing analytic solutions that enhance product, process and practice values for clinical and non-clinical decision support. The objective of this study is to explore the scope of healthcare analytics research and in particular its utilisation of design and development methodologies. Using six prominent electronic databases, qualifying articles between 2010 and mid-2018 were sourced and categorised. A total of 52 articles on healthcare analytics solutions were selected for relevant content on public healthcare. The research team scrutinised …


Online Authentication Methods Used In Banks And Attacks Against These Methods, Anoud Bani-Hani, Munir Majdalweieh, Aisha Alshamsi Jan 2019

Online Authentication Methods Used In Banks And Attacks Against These Methods, Anoud Bani-Hani, Munir Majdalweieh, Aisha Alshamsi

All Works

© 2019 The Authors. Published by Elsevier B.V. Growing threats and attacks to online banking security (e.g. phishing, identity theft) motivates most banks to look for and use stronger authentication methods instead of using a normal username and password authentication. The main objective of the research is to identify the most common online authentication methods used widely in international banks and compare it with the methods used in six banks operating in UAE. In addition, this research will cover the current authentication threats and attacks against these methods. Two well-defined comparison matrices [15], one based on characteristics and second one …


Cognitive Computing Meets The Internet Of Things, Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, Mohamed Sellami Jan 2019

Cognitive Computing Meets The Internet Of Things, Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, Mohamed Sellami

All Works

This paper discusses the blend of cognitive computing with the Internet-of-Things that should result into developing cognitive things. Today's things are confined into a data-supplier role, which d ...