ADU Repository
Browse by
Recent Submissions
-
Role Of Game-Based Teaching In Leadership Skills Development
(ProQuest, 2021-03)Research related to Game-Based Teaching (GBT) has intensified recently with the increase in the technological advancement of teaching methodologies. The adoption of GBT leads to several benefits for improved learning and ... -
Smart teledentistry healthcare architecture for medical big data analysis using IoT-enabled environment
(ELSEVIER, 2022-09)The current spread out in Big Data analytics and the medical Internet of Things (IoT) originated the recognition of smart health. Smart health is the integration of devices, sensors, cameras, and objects or things embedded ... -
An Improved Method for Measurement of Gross National Happiness Using Social Network Services
(Springer Link, 2014)Studies on the measurement of happiness have been utilized in a variety of areas; in particular, it has played an important role in the measurement of society stability. As the number of users of Social Network Services ... -
Agglomerative Hierarchical Clustering for Information Retrieval Using Latent Semantic Index
(IEEE, 2015-12)Web clustering has been a highly interesting research field in Information Retrieval (IR) for many years. Considering the amount of web sites listed with an ambiguous query on major search engines, many researchers opted ... -
Synthetic Blood Smears Generation Using Locality Sensitive Hashing and Deep Neural Networks
(IEEE, 2020-06)Peripheral Blood Smear (PBS) analysis is a vital routine test carried out by hematologists to assess some aspects of humans' health status. PBS analysis is prone to human errors and utilizing computer-based analysis can ... -
An optimized IoT-enabled big data analytics architecture for edge-cloud computing
(IEEE Xplore, 2023-02)The awareness of edge computing is attaining eminence and is largely acknowledged with the rise of the Internet of Things (IoT). Edge-enabled solutions offer efficient computing and control at the network edge to resolve ... -
Code Readability Management of High-level Programming Languages: A Comparative Study
(The Science and Information Organization, 2020-03)Quality can never be an accident and therefore, software engineers are paying immense attention to produce quality software product. Source code readability is one of those important factors that play a vital role in ... -
Quality Improvement of Audit Processes Duration by the Implementation of Lean Six Sigma (LSS) in the Aviation Industry of UAE: A Case Study
(ResearchGate, 2020-06)Continuous and sustainable quality improvement is a crucial driver for every industry. Most of the industries require deploying and sustaining continuous quality improvement through the latest tools and techniques. The ... -
Self- Directed Learning Through Youtube: Challenges, Opportunities, And Trends In The United Arab Emirates
(ResearchGate, 2020-06)Self-directed learning has dramatically altered the landscape of education through digital disruption of social media sites. The growing need for self-directed learning led to the rise of YouTube as a global platform for ... -
D-Talk: Sign Language Recognition System for People with Disability using Machine Learning and Image Processing
(ResearchGate, 2020-07)Communication plays a significant role in making the world a better place. Communication creates bonding and relations among the people, whether persona, social, or political views. Most people communicate efficiently ... -
Mood Detection Based on Arabic Text Documents using Machine Learning Methods
(ResearchGate, 2020-09)Document text classification is utilized for information feature extraction and retrieval as the primary source of digitizing the written information using text classification techniques. Text classification can provide ... -
Achieving Operational Excellence Through Artificial Intelligence: Driving Forces and Barriers
(Frontiers, 2021-07)This paper presents an in-depth literature review on the driving forces and barriers for achieving operational excellence through artificial intelligence (AI). Artificial intelligence is a technological concept spanning ... -
Effect of cutting on productivity and associated weeds of canola
(ResearchGate, 2013-12)Dual-purpose canola means cutting or grazing the crop and then letting it to re-grow and produce grain with no or little yield penalty similar to dual-purpose cereals. A field experiment was conducted to study the effect ... -
Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City
(Tech Science Press, 2021-01)The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer ... -
Harnessing Iot Advantages In The Disruptive Era: UAE Retail Industry
(ProQuest, 2021-03)In the dynamic and competitive retail environment, retailer constantly quest to find out ways of understand the customers need and formulate strategies to transcend their rising expectations. Understanding the digital savvy ... -
Employee Retention Prediction In Corporate Organizations Using Machine Learning Methods
(ProQuest, 2021-03)Employee Retention is the capability of an organization to maintain its employees. The concept is emerging as a key setback to organizations. Payments, organization culture, job satisfaction, remuneration, and flexibility ... -
Role of CD10 immunohistochemical expression in predicting aggressive behavior of phylloides tumors
(ResearchGate, 2015)Phylloides tumors are rare breast neoplasms with a variable clinical course depending on the tumor category. Along with histologic features, the role of immunohistochemical staining has been studied in predicting their ... -
On the Commoditization of Artificial Intelligence
(Frontiers, 2021-10)As artificial intelligence's potential and pervasiveness continue to increase, its strategic importance, effects, and management must be closely examined. Societies, governments, and business organizations need to view ... -
Bank regulation, ownership and risk taking behavior in the MENA region: policy implications for banks in emerging economies
(Springer Link, 2023-01)This paper investigates the impact of bank regulation and ownership on the risk-taking behavior of financial institutions in the MENA region. We test the hypothesis that the effect of regulation on bank risk depends on the ... -
A Comprehensive Survey on Blockchain-Based C-ITS Applications: Classification, Challenges, and Open Issues
(ELSEVIER, 2023-05)Cooperative Intelligent Transport Systems (C-ITS) aim to improve road safety and provide comfort to both drivers and passengers by enabling vehicles, infrastructure, and other road users to exchange environmental and driving ... -
An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM
(IEEE Xplore, 2022-09)The industry of shared self-driving is increasingly interested in the Message Queuing Telemetry Transport (MQTT) solution to develop and evaluate their autonomous and shared mobility services. This solution would have the ... -
Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN)
(Springer Link, 2022-07)Proposals for Information Centric Networking (ICN) have recently emerged to rethink the foundations of the Internet and design a native data-oriented network architecture. Among the current ICN projects, Named Data Networking ... -
Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network
(Inderscience Publishers (IEL), 2018)Several medium access control (MAC) protocols were proposed to provide high-performance for vehicular ad hoc network (VANET). For instance, the contention-free MAC allows several vehicles to share the same communication ... -
Application of Rail Segmentation in the Monitoring of Autonomous Train’s Frontal Environment
(Springer Link, 2022-06)One of the key factors in achieving an autonomous vehicle is understanding and modeling the driving environment. This step requires a considerable amount of data acquired from a wide range of sensors. To bridge the gap ... -
Railset: A unique dataset for railway anomaly detection
(IEEE Xplore, 2022-12)Understanding the driving environment is one of the key factors in achieving an autonomous vehicle. In particular, the detection of anomalies in the traffic lane is a high priority scenario, as it directly involves vehicle's ... -
Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks
(IEEE Xplore, 2021-11)Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have ... -
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
(MDPI, 2022-12)Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency ... -
An Analytical Model of Bluetooth Performance Considering Physical and MAC Layers’ Effects
(IEEE Xplore, 2021-06)This paper presents an analytical model for the average Packet Error Rate (PER) of Bluetooth in Basic Rate (BR) mode. The effects of the physical layer and the MAC layer are taken into account. A Nakagami-m block fading ... -
A trust framework for centralized TDMA scheduling mechanism in Vehicular Ad hoc Networks
(IGI Global, 2020-10)Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. ... -
A study on priority-based centralized tdma slot scheduling algorithm for vehicular ad hoc networks
(Gale, 2018-04)Vehicular Ad hoc NETworks, known as VANETs, are deployed to reduce the risk of road accidents as well as to improve passenger comfort by allowing vehicles to exchange different kinds of data. Medium Access Control protocols ... -
An optimized multi-hop broadcast scheme for mesh networks with node failures
(IEEE Xplore, 2018-08)The flooding scheme represents one of the fundamental operations in wireless mesh networks. It plays an important role in the design of network and application protocols. Many solutions have been studied to address flooding ... -
TDMA scheduling strategies for vehicular ad hoc networks: From a distributed to a centralized approach
(IEEE Xplore, 2018-09)Vehicular Ad hoc NETworks, known as VANETs, are deployed to reduce the risk of road accidents as well as to improve passenger comfort and safety by allowing vehicles to exchange different kinds of data. Medium Access Control ... -
An approach for implementing key performance indicators of a discrete manufacturing simulator based on the ISO 22400 standard
(IEEE Xplore, 2018-05)Performance measurement tools and techniques have become very significant in today's industries for increasing the efficiency of their processes in order to face the competitive market. The first step towards performance ... -
The Impact of Quality E-payment System on Customer Satisfaction
(JC review, 2020)The electronic payment system (e-payment system) is one of the modern methods to facilitate the completion of transactions. The success of the e-payment system depends on customer satisfaction with its use. This study was ... -
Distributed model for customer churn prediction using convolutional neural network
(emerald insight, 2021-06)The purpose of the proposed model is to assist the e-business to predict the churned users using machine learning. This paper aims to monitor the customer behavior and to perform decision-making accordingly. The proposed ... -
Capital regulation, competition and risk-taking: Policy implications for banking sector stability in the MENA region
(ELSEVIER, 2022)This paper investigates how capital requirements and bank competition affect banks' financial soundness in the Middle East and North Africa (MENA) region. We test the hypothesis that regulatory capital positively impacts ... -
Autism spectrum disorder diagnosis using optimal machine learning methods
(Science and Information (SAI) Organization Limited, 2020)Autism spectrum disorder (ASD) is the disorder of communication and behavior that affects children and adults. It can be diagnosed at any stage of life. Most importantly, the first two years of life, regardless of ethnicity, ... -
Energy aware smart city management system using data analytics and Internet of Things
(ELSEVIER, 2021-04)The rise of Internet of Things (IoT) concept founded the realization of a smart city. Energy management has lately turn out to be a vital concern for the services of a smart city as IoT devices consume massive energy ... -
Phenomenological theory of First-order prefreezing
(ACS Publications, 2019-04)Prefreezing is the prewetting of the crystalline phase at the interface of a melt to a solid substrate via a first-order phase transition. We present a phenomenological theory of prefreezing and analyze thermodynamic ... -
Hypothetico-deductive method: A comparative analysis
(ResearchGate, 2015-04)This paper presents the analysis of hypothetico-deductive method and its applications in different domains. Design/Methodology/Approach: The author explains hypothetico-deductive method various phases ... -
Handwriting Recognition using Artificial Intelligence Neural Network and Image Processing
(ProQuest, 2020-08)Due to increased usage of digital technologies in all sectors and in almost all day to day activities to store and pass information, Handwriting character recognition has become a popular subject of research. Handwriting ... -
Improving Service Quality Of Smart Banking Using Quality Management Methods In UAE
(r, 2020-06)The banking service has evolved with advancements in the field of technology. Many Banks work very hard to provide all services that customers need through different applications. All these services are always under ... -
The context of global software development: challenges, best practices and benefits
(OJS, 2011-10)Global Software Development (GSD) environment is based on a contractual relationship between client and vendor organizations in which a client outsources all or some part of its software development activities to a vendor. ... -
A compact planar dual band-notched monopole antenna for UWB application
(Wiley Online Library, 2014)A compact UWB monopole band-notched antenna with simple structure and small size is proposed and studied in this article. The size of the antenna is 33 × 29.6 × 1.6 mm. The proposed antenna has an impedance bandwidth ... -
Milk marketing and value chain constraints
(AGRIS, 2008)Milk provides several essential dietary components for humans of all ages. In Pakistan, milk production during 2007-08 has been reported to be 34 million tonnes (about 58% from buffaloes, 35% from cattle) and the rest from ... -
Competition, capital growth and risk-taking in emerging markets: Policy implications for banking sector stability during COVID-19 pandemic
(PLOS ONE, 2021-06)This paper investigates how banking competition and capital level impact on the risk-taking behavior of banking institutions in the Middle East and North Africa (MENA) region. The topic is perceived to be of significant ... -
Implementing and visualizing ISO 22400 key performance indicators for monitoring discrete manufacturing systems
(MDPI, 2018-09)The employment of tools and techniques for monitoring and supervising the performance of industrial systems has become essential for enterprises that seek to be more competitive in today’s market. The main reason is the ... -
A Six Sigma based risk management framework for handling undesired effects associated with delays in project completion
(emerald insight, 2013-08)The purpose of this paper is to develop a risk management framework, combined with Six Sigma tool and techniques, to help handle the undesired effects that can occur during the project execution. There exist various risk ... -
SafeCity: Toward Safe and Secured Data Management Design for IoT-enabled Smart City Planning
(IEEE Xplore, 2020-08)The interaction among different Internet of Things (IoT) sensors and devices become massive and insecure over the Internet as we probe to smart cities. These heterogeneous devices produce an enormous amount of data that ... -
Secure and Resilient Demand Side Management Engine using Machine Learning for IoT-enabled Smart Grid
(ELSEVIER, 2020-03)The national security, economy, and healthcare heavily rely on the reliable distribution of electricity. The incorporation of communication technologies and sensors in the power structures, recognized as the smart grid ...