09/02/2017
12:34 PM

الأبحاث - تقنية المعلومات



Department of Information Technology Researches

 

Title

Author/s

Citation

Year

Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems

A Alkhalifah, S Al Amro

JOURNAL OF COMPUTERS 12 (2), 174-182

2017

TripleFCA: FCA-based approach to enhance Semantic Web data management

Saleh Albahli, Austin Melton

The IEEE 40th Computer Software and Applications Conference (COMPSAC) | Atlanta, Georgia USA.

June 2016

Using indirect coupling metrics to predict package maintainability and testability

Saleh Almugrin, Waleed Albattah, Austin Melton

Journal of Systems and Software 121: 298-310

2016

Modeling of E-procurement System through UML using Data Mining Technique for Supplier Performance

A AlKhalifah, GA Ansari

Internation Conference on Software Networking (ICSN),

2016

Apparent Resolution Enhancement: Structural Similarity Perspective

Rehan Ullah Khan

international journal of computer applications (IJCA)

2016

Design and nalysis of an Effective Secure Cloud System at Qassim University

Khalil H. A. Al-Shqeerat, Mohammad Ali A. Hammoudeh,

Mohammad Ijaz Abbasi

International Journal of Computer Science and Information Security ISSN 1947 5500 August 2016 Volume 14 No. 8 pp. 12-15

2016

Risk based Test Case Prioritization using UML State Machine Diagram

Ansari, G.A, Rhmann and Saxena V

International Journal of Applied Information Systems (IJAIS) Vol. 11, No.-7, pp. 15-21,

2016

Multi-Objectives and Multi-Constrained Genetic Algorithms with Hybrid Immigrants Scheme for Dynamic Routing Problems in   Mobile Networks

Khalil Ibrahim Mohammad Abuzanouneh

International Journal  and Computer Science (IJACS) , 2016

2016

Storing RDF Triples in RDBs: A Study of Performance and Scalability issues

Saleh Albahli, Austin Melton

The 2016 IEEE/WIC/ACM International Conference on Web Intelligence  | Omaha, Nebraska USA.

Oct 2016

Integrative Machine Learning Augmentation

Rehan Ullah Khan

IEEE ICET

2016

“Modeling of E-procurement System through UML using Data Mining Technique for Supplier Performance

Ali Khalifah, Ansari G.A

IEEE International Conference on Software Networking(ICSN) May 23-26, in Jiju-Islan, South  Korea

2016

Design and Analysis of an Efective secure Cloud system at Qassim univesity

1 Muhmmad iaz

2  Khalil H A Al-Shqeerat

3.Mohammad Ali

International Journal of Computer and Internet Security (IJCIS)

2016

Parallel And Distributed GA with Multiple-Objectives to Improve and Develop of Evolutionary Algorithm

Khalil Ibrahim Mohammad Abuzanouneh

Article Published in International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7 Issue 5, 2016.

2016

RDF Data Management: A survey of RDBMS-Based Approaches

Saleh Albahli, Austin Melton

The 6th International Conference on Web Intelligence, Mining and Semantics | Nîmes France

June 2016

Enhancing E-Learning System in Qassim University by Implementing Moodle as a Tool

Ajlan S. Al-Ajlan, Mohammad Ali A. Hammoudeh

International Journal of Computer Science and Network Security (IJCSNS),

ISSN 1738-7906

September 2016 Vol.16, No.9 pp. 7-14

2016

Laser Irradiation Effect on The Optical Properties of a-Se88Te-12-xAlx Thin Films

I.Uddin, H.Howari, and Ansari, G.A.

International Journal Chalcogenide Letter, Bucharest ,Romania Vol. 13, No. 3, pp 117-125,

2016

World Wide Web: A Survey of its Development and Possible Future Trends.

Abdulelah A. Algosaibi, Saleh Albahli, Austin Melton

The 16th International Conference on Internet Computing and Big| Las Vegas, Nevada USA.

Jan 2016

Bit Error Rate Performance of RFID Signal in SDR Communication

Muhammad IslamAnwar H. Rehanullah Khan, Shabana Habib

Journal of Applied Sciences

2016

CLB-AODV: A Communication Load Balanced Dynamic Wireless Sensor Networks Topology Management Algorithm based on AODV

Randa K. Ahmed, Dina M. Ibrahim, and Amany M. Sarhan

The 11th IEEE International Conference on Computer Engineering and Systems (ICCES), Ain Shams University, Cairo, Egypt

2016

Analysis of Free-text Keystroke Dynamics for Arabic Language Using Euclidean Distance

Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham and Fatimah Alkhudier

IIT’16 by the Collage of Information Technology (CIT) of the United Arab Emirates University (UAEU)

2016

Contention-based MAC Protocol in UWSNs: Slotted_CS_ALOHA Proposed Protocol

Ehab M Khater, Dina M. Ibrahim, and Mohamed T. Faheem Saidahmed

The 11th IEEE International Conference on Computer Engineering and Systems (ICCES), Ain Shams University, Cairo, Egypt

2016

State of the art of fuzzy methods for gene regulatory networks inference.

Al Qazlan, Tuqyah Abdullah, Aboubekeur Hamdi-Cherif, and Chafia Kara-Mohamed.

The Scientific World Journal, Volume 2015 (Mar 2015) Article ID 148010

2015

Secure Defensive Mechanisms: An Appropriate Categorisation

Suliman A. Alsuhibany, Waleed Albattah

IEEE International Conference on Data Science and Data Intensive Systems, DSDIS 2015

2015

Minutiae based Automatic Fingerprint Recognition: Machine Learning Approaches

Amjad Ali, Rehanullah Khan, Irfan Ullah, Adnan Daud Khan

IEEE CITUCC

2015

Land Usage Analysis: A Random Forest Approach

Nasru Minallah, Hidayat Ur Rahman, , Ali Alkhalifah, Rehanullah Khan

IEEE 7th International Conference on Recent Advances in Space Technologies (RAST 2015), to appear

2015

On the Performance Analysis of Classifier Fusion for Land Cover Classification

Nasru Minallah , Ali Alkhalifah, Rehan Ullah Khan, Hidayat Ur

IEEE 7th International Conference on Recent Advances in Space Technologies (RAST 2015), to appear

2015

Band Analysis for Land Use in Multi Spectral Images

Hidayat Ur Rahman, Nasruminallah, Ali Alkhalifah, Rehan Ullah Khan

International Journal of Computer Applications

2015

Twin Dipole Fano Resonances in Symmetric Three Layered

Adnan Daud Khan, Muhammad Amin, Amjad Ali, Rehan Ullah Khan

Springer Journal of Plasmonics

2015

Translating a specialist book under title Managing and Using Information Systems

Dr. Mohammad Ali A. Hammoudeh in Collaboration with the Dr. Ajlan Al-Ajlan Vice-Dean of Academic Affairs

5th Edition, 2013, KERI E. PEARLSON, 417 pages

2015

Enhancing DCCP-TCPlike Mechanism for Wireless Sensor Networks

Mai Z. Ibrahim, Dina M. Ibrahim, and Amany M. Sarhan

The 10th IEEE International Conference on Computer Engineering and Systems (ICCES), Ain Shams University, Cairo, Egypt

2015

Improved FP-growth Algorithm with Multiple Minimum Supports using Maximum Constraints

Elsayeda M.Elgaml, Dina M. Ibrahim and ElSayed A. Sallam

The 17th International Conference on Computer Science and Technology (ICCST 2015), pp. 1354- 1361, Dubai, UAE

2015

ohStore: Ontology hierarchy solution to improve RDF data management

Saleh Albahli, Austin Melton

The 9th International Conference for Internet Technology and Secured Transactions (ICITST) | London, UK

Dec 2014

A Cloud-Based Cross Language Search Engine for Quranic Application,

Zameer Ahmed Adhoni, Husam Al Hamad, Abdul Ahad Siddiqi and Zaheer Ahmed Adhoni

IEEE CONFERENCE the  16th International Conference on Advanced Communications Technology (ICACT2014), February 2014, at Pyeongchang, Korea

2014

An Empirical Study to Compare Sequential Forward Selection vs. Sequential Backward Elimination in Ensemble Feature Selection Setting

Faten Alrusayni, Adel Aloraini

SDMA 2014 Symposium on Data Mining and Applications

2014

Gene regulatory networks estimation using uniting Bayesian subnetworks

Jowharah Al-Shobaili and Prof. Aboubekeur Hamdi-Cherif

In Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, MEDES’14, ACM, 15-17 September 2014, Qassim, Saudi Arabia, pp. 95-100.

2014

Creating Decision Trees from Rules using RBDT‐1.

Abdelhalim, Amany, Issa Traore, and Youssef Nakkabi.

Computational Intelligence

2014

Transliteration of Knowledge Retrieval in Urdu from Holy Quran using state of the art Information Technologies

Zameer Ahmed Adhoni, Abdul Ahad Siddiqi

IEEE CONFERENCE International Conference on Reliability Optimization & Information Technology,6-8 February 2014,INDIA Conference Record Number: 32243

2014

An API for Quran Portal Using Drupal Technology

Zameer Ahmed Adhoni, Husam Al Hamad

IEEE CONFERENCE 5th International Conference on the  Applications of Digital Information and Web    Technologies (ICADIWT) February 17-19, Bangalore India

2014

Annealing Harmony Search Algorithm to Solve Nurse Rostering Problem

Hadwan, M., Aybo, M., Gallab, A., & Alabbadi, A

Journal of Art and Science (IJAS) Malta

2014

Modelling of CVBF Algorithm using Coloured Petri Nets

Dina M. Ibrahim, ElSayed A. Sallam, Tarek E. ElTobely, and Mohmoud M. Fahmy

The 9th IEEE International Conference on Computer Engineering and Systems (ICCES), Ain Shams University, pp. 26-31, Cairo, Egypt

2014

Enhancing the Vector-Based Forwarding Routing Protocol for Underwater Wireless Sensor Networks: A Clustering Approach

Dina M. Ibrahim, Mohmoud M. Fahmy, Tarek E. ElTobely, and ElSayed A. Sallam

The Tenth International Conference on Wireless and Mobile Communications (ICWMC 2014), Seville, Spain

2014

Coloured Petri Net Model for Vector-Based Forwarding Routing Protocol

Dina M. Ibrahim, ElSayed A. Sallam, Tarek E. ElTobely, and Mohmoud M. Fahmy

The International Conference in Computing Technology and Information Management (ICCTIM2014), pp. 169-176, Dubai, UAE

2014

Detection and mitigation of malicious JavaScript using information flow control

Sayed, Bassam, Issa Traoré, and Amany Abdelhalim.

12th Annual International Conference on Privacy, Security and Trust (PST. IEEE, 2014.

2014

FO2L – A First-Order Logic Language for Knowledge Base System Implementation

Kara-Mohamed, Chafia, N. I. Al-Osily, R. A. Al-Marshad, M. S. Al-Twijary, J.Al-Robe’an, A. Hamdi-Cherif

INTERNATIONAL JOURNAL OF SYSTEMS APPLICATIONS, ENGINEERING & DEVELOPMENT Issue 5, Volume 7, 2013

2013

Intelligent Parsing and Grammatical Inference–A Knowledge-Based Approach.

Kara-Mohamed, Chafia, and Aboubekeur Hamdi-Cherif.

The Research Bulletin of Jordan ACM, 2(3):137-143

ISSN:2078-7952 (print) EISSN: 2078-7960

2013

The Role of Identity Management Systems in Enhancing Protection of User Privacy

Ali Alkhalifah and John D'Ambra

The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012), IEEE, Kuala Lumpur, Malaysia

July 2012

Factors Effecting the Adoption of Identity Management Systems: An Empirical Study

Ali Alkhalifah and John D'Ambra

The 16th Pacific Asia Conference on Information Systems (PACIS2012), Ho Chi Minh city, Vietnam, July 2012

2012

The Role of Trust in the Initial Adoption of Identity Management Systems

Ali Alkhalifah and John D'Ambra

The 21st International Conference on Information Systems Development (ISD2012), Prato, Italy, August 2012

2012

High level anti-phishing countermeasure: A case study

Abdullah M. Alnajim

World Congress on Internet Security, WorldCIS 2011, London, UK, 21-23. IEEE 2011

2011

Enforcing Honesty in Fair Exchange Protocols.

Dr.Abdullah Alaraj and Malcolm Munro

In the book: Emergent Web Intelligence. To be published as a book chapter by Springer Verlag

2009

Detecting Phishing Websites: On the Effectiveness of Users' Tips

Abdullah M. Alnajim

Journal of Digital Information Management 277-282 (2009)

2009

An efficient e-Commerce Fair Exchange Protocol that encourages Customer and Merchant to be Honest

Dr.Abdullah Alaraj and Malcolm Munro

In the proceedings of the 27th International Conference on Computer Safety, Reliability and Security, (SafeComp 2008). Lecture Notes In Computer Science, LNCS, Vol. 5219, pp. 193-206

2008

An e-Commerce Fair Exchange Protocol that Enforces the Customer to be Honest.

Dr.Abdullah Alaraj and Malcolm Munro

International Journal of Product Lifecycle Management, IJPLM. Inderscience publisher, Vol. 3, No. 2/3, pp. 114-131, 2008

2008

An e-commerce Fair Exchange Protocol for exchanging Digital Products and Payments”

Dr.Abdullah Alaraj and Malcolm Munro

In Proceedings of IEEE/ACM ICDIM'2007, Lyon, October 2007. pp. 248-253

2008

An Efficient Fair Exchange Protocol that Enforces the Merchant to be Honest”

Dr.Abdullah Alaraj and Malcolm Munro

In Proceedings of IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2007, CollaborateCom, New York, November, pp. 196-202

2007