Recent Submissions

  • Rationale for “Liking” on Social Networking Sites 

    Khalil, Ashraf; Dhir, Amandeep; Kaur, Puneet (Sage Publication, 2018)
    The “like” feature is popularly utilized by online social media users for different reasons including socializing, giving feedback and giving or seeking attention as well as for pure affection. The “like” function is a ...
  • Identifying Personalized Autism Related Impairments Using Resting Functional MRI and ADOS Reports 

    Hajidiab, Hassan; Dekhil, Omar; Shalaby, Ahmed (Springer, 2018)
    In this study, a personalized computer aided diagnosis system for autism spectrum disorder is introduced. The proposed system uses resting state functional MRI data to build local classifiers, global classifier, and correlate ...
  • On the Relationship between Hybrid Probabilistic Logic Programs and Stochastic Satisfiability 

    Saad Emad (Springer, 2008)
    In this paper we study the relationship between Stochastic Satisfiability (SSAT) (Papadimitriou 1985; Littman, Majercik, & Pitassi 2001) and Extended Hybrid Probabilistic Logic Programs (EHPP) with probabilistic answer ...
  • Complexity Analysis of Featured-Based Image Matching 

    Hajjdiab Hassan; Laganiere Robert (World Academy of Science, Engineering and Technology, 2009)
    A fundamental problem in computer vision is to map a pixel in one image to a pixel in another image of the same scene. This is called the image correspondence problem. Many algorithms have been proposed in literature to ...
  • Qualitative and Quantitative Reasoning in Hybrid Probabilistic Logic Programs 

    Saad Emad (2007)
    Reasoning with qualitative and quantitative uncertainty is required in some real-world applications [6]. However, current extensions to logic programming with uncertainty support representing and reasoning with either ...
  • Text mining with rapidminer 

    Dilek Tapucu; Gurdal Ertek; Inanc Arin (John & Willey Publication, 2013)
    The goal of this chapter is to introduce the text mining capabilities of RAPIDMINER through a use case. The use case involves mining reviews for hotels at TripAdvisor.com, a popular web portal. We will be demonstrating ...
  • Development of a Simplified Computerized Tool to Measure the Visibility of Open Spaces 

    Meziani, Rim; Ghazal, Mohammed; Hajjdiab, Hassan (14th International Conference on Computers in Urban Planning and Urban Management, At MIT, Cambridge, MA, USA, 2015-07)
    The objective of this research is to create a simple computerized tool to measure the visibility of open spaces by testing different scenarios and building arrangements and comparing their visibility graphs to be created ...
  • Comparison-Based System-Level Fault Diagnosis: A Neural Network Approach 

    Elhadef, Mourad; Amiya Nayak (IEEE Computer Society, 2012)
    We consider the fault identification problem, also known as the system-level self-diagnosis, in multiprocessor and multicomputer systems using the comparison approach. In this diagnosis model, a set of tasks is assigned ...
  • A Multimetric Approach for Discriminating Distributed Denial of Service Attacks from Flash Crowds 

    Mourad Elhadef (Springer, 2016)
    Distributed Denial of Service (DDoS) attack, whether at the application or network layer, continues to be a critical threat to the Internet. In a DDoS attack, attackers run a massive number of queries through the victim’s ...
  • Interactive Mobile Application for Testing Children with Dysgraphia 

    Tasbeeh Raza; Hera Arif; Samanbar Darvagheh; Hajjdiab, Hassan (ACM, 2017)
    Raza, T. F., Arif, H., Darvagheh, S. H., & Hajjdiab, H. (2017, February). Interactive Mobile Application for Testing Children with Dysgraphia. In Proceedings of the 9th International Conference on Machine Learning and ...
  • Mathematical Modeling of Current Harmonics Caused by Personal Computers 

    Rana Abdul Jabbar Khan; Muhammad Akmal (Institute of Advanced Engineering and Science (IAES, 2008)
    Personal computers draw non-sinusoidal current with odd harmonics more significantly. Power Quality of distribution networks is severely affected due to the flow of these generated harmonics during the operation of electronic ...
  • A Comparision between Steganography Software Tools 

    Arif, Hera; Hajjdiab, Hassan (IEEE, 2016-05-26)
    The process of hiding data in a medium that is insignificant, ordinary and not a secret is referred to as Steganography. This medium may be an image, text, video, audio, pdf, etc. The main advantage of Steganography is ...
  • Arabic Tweets Sentimental Analysis using Machine Learning 

    Alomari, Khaled Mohammad; ElSherif, Hatem M.; Shaalan, Khaled (Springer, 2017-06)
    The continuous rapid growth of electronic Arabic contents in social media channels and in Twitter particularly poses an opportunity for opinion mining research. Nevertheless, it is hindered by either the lack of sentimental ...
  • A novel structural-based approach to model the age hardening behaviour of aluminium alloys 

    Al-Khedher, Mohammad; Yassar, R S; Pezeshki, C; Field, D P (IOP Publishing Ltd, 2006-06-08)
    A new approach based on an artificial neural networks (ANN) model was used to model the ageing behaviour of an Al–Mg–Si alloy. A systematic combination of hardness measurements, transmission electron microscopy (TEM), image ...
  • Intelligent mapping and locomotion system for blind guidance robot 

    Bisher, Ahmad M.; Al-Khedher, Mohammad (IEEE, 2008-05-29)
    Robot movement in its working environment requires tracking the correct path between the start point and the end point. This paper employs artificial intelligence methodologies in mapping and path search procedures for ...
  • Development of a Global Web-Based Industrial Process Control Laboratory for Undergraduate and Graduate Engineering Technology Education 

    Al-Khedher, Mohammad; McDonald, Dale B. (researchgate, 2008-11)
    Web technology provides powerful, online, educational tools for teaching and demonstration of automated processes. This paper describes a fundamental global initiative to establish laboratory cooperation based upon integrated ...
  • Vehicle Tracking Using an Efficient and Low Cost Embedded System with GPS and GSM 

    Ramadan, Montaser; Al-Khedher, Mohammad; Alkheder, Sharaf (The American Society of Mechanical Engineers, 2011-12)
    In this paper, we present a smart monitoring system of vehicles using embedded controller, Global Positioning System (GPS) and Global System of Mobile (GSM). The system allows users to visualize and track the location of ...
  • Practical Investigation of an Acoustic Encoder 

    Al Kabi, Alia; Al-Khedher, Mohammad; Salahat, Mazouz (IFSA Publishing, S.L., 2011-03)
    In this work a trial has been made to explore the possibility of designing an acoustic speed encoder. In order to realize that a virtual open-end circular air tube was utilized to create a standing wave with a given frequency ...
  • Hybrid GPS-GSM Localization of Automobile Tracking System 

    Al-Khedher, Mohammad (Cornell University, 2012-01-12)
    An integrated GPS-GSM system is proposed to track vehicles using Google Earth application. The remote module has a GPS mounted on the moving vehicle to identify its current position, and to be transferred by GSM with other ...
  • Design radius requirements for simple horizontal curves on three-dimensional alignments 

    Easa, Said M; Dabbour, Essam (NRC Research Press, 2003)
    : Current North American design guides have established mathematical relationships to calculate the minimum radius required for horizontal curves as a function of design speed, maximum superelevation, and maximum side fric- ...
  • Three-Dimensional Model for Stop-Control Intersection Sight Distance 

    Easa, Said M; Dabbour, Essam; Ali, Muhammad Z. A. (American Society of Civil Engineers, 2004)
    Intersection sight distance (ISD) is the sight distance to be provided at intersections between a minor road and a major road. Current AASHTO policy provides an equation and charts for the required at-grade ISD so that a ...
  • Sight-Distance Requirements for Left-Turning Vehicles at Two-Way Stop-Controlled Intersections 

    Dabbour, Essam; Easa, Said M (American Society of Civil Engineers, 2016)
    The current highway geometric design guide provides a method for calculating intersection sight distance at two-way stop- controlled intersections by assuming that a departing driver on the minor road that would start from ...
  • Simple Visual CAPTCHA Approach 

    Arif, Hera; Hajjdiab, Hassan; Khalil, Ashraf (IEEE, 2016-09-15)
    The internet has become a place where various on-line activities of different natures are carried out. Most activities require strict security measures to ensure the integrity of on-line systems such as e-commerce and ...
  • A Comparative Study of Web Language Support for Mobile Web Browsers 

    Siek, Katie A.; Khalil, Ashraf; Liu, Yong; Kay H. Connelly, Kay H.; Edmonds, Nick (Terre Haute Indiana, 2004)
    The surg of ubiquitous devices and WiFi in the last few years have given the general public access to information via the world wide web from anywhere at anytime. Mobile web access challenges de- velopers to create web ...
  • On Negotiating Automatic Device Configuration in Smart Environments 

    Connell, Kay; Khalil, Ashraf (IEEE, 2004-03)
    It is desirable for mobile devices to automatically configure themselves based on the context of the environment and user preferences for both convenience and security purposes. Having the cell phone switch the ringer off ...
  • Investigating Financial Literacy among Emiratis 

    Khalil, Ashraf; Abdallah, Salam; (World Academy of Science, Engineering and Technology, 2012)
    Financial literacy is one of the key factors needed in making informed financial decisions. As businesses continue to be more profit driven, more financial and economic intrigues arise that continue to put individuals at ...
  • Improving Cell Phone Awareness by Using Calendar Information 

    Khalil, Ashraf; Connelly, Kay (Springer, 2005-09)
    The many benefits that cell phones provide are at times overshadowed by the problems they create, as when one person’s cell phone disrupts a group activity, such as a class, meeting or movie. Cell phone interruption is ...
  • Harnessing social dynamics through persuasive technology to promote healthier lifestyle 

    Khalil, Ashraf; Abdallah, Salam (Elsevier, 2013)
    In light of current calls by medical professionals to confront the global issue of obesity and related illnesses, we developed a mobile application called STEP UP that monitors physical activity and provides data that can ...
  • Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing 

    Khalil, Ashraf; Connelly, Kay (Citeseer, 2004)
    The study, which examined 24 surveys, concluded that surveys are unlikely to accurately reflect the consumers’ true privacy preferences and concerns. Even though the privacy issues pertaining to the consumer market are ...
  • Usability Practice and Awareness in UAE 

    Khalil, Ashraf; Abdallah, Salam (IEEE, 2011-10-10)
    Poor usability in interactive software systems is still a major problem for users and buyers. In this paper we report the results of a research of usability practice and awareness in UAE, conducted in 2011. The research ...
  • Underpinnings of Internet Parenting Styles: The Development and Validation of the Internet Parenting Scale Using Repeated Cross-Sectional Studies 

    Khalil, Ashraf; Dhir, Amandeep (SAGE Publications, 2017)
    The overwhelming majority of parents tend to mediate their children’s Internet use via different Internet parenting styles. Recent research suggests that Internet parent- ing is closely related to the Internet use behavior, ...
  • Image Analysis 

    Hajjdiab, Hassan; Khalil, Ashraf (IEEE, 2012-03-28)
    With the proliferation of Web services, it is imperative to minimize spamming and security risks. Spammers use software to automate the process of creating fake online accounts to be used later as a source of spam and ...
  • Harnessing social dynamics through persuasive technology to promote healthier lifestyle 

    Khalil, Ashraf; Abdallah, Salam (Elsevier, 2013-03-01)
    In light of current calls by medical professionals to confront the global issue of obesity and related illnesses, we developed a mobile application called STEP UP that monitors physical activity and provides data that can ...
  • Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing 

    Khalil, Ashraf; Connelly, Kay (Citeseer, 2004-01-05)
    With the increasing popularity of ubiquitous computing and context-aware services, the privacy challenges posed by such technologies remain one of the biggest concerns. Several research efforts have been aimed at better ...
  • Driver’s Big Brother: How Smartphones Can Increase Driver’s Awareness 

    Khalil, Ashraf; Elnaffar, Said (SPARC Europe., 2012-06-01)
    Using mobile devices while driving has been widely shown to pose serious safety risk. Various approaches aim at mitigating the risk of mobile devices while driving. Some initiatives have focused on increasing drivers’ ...
  • Mobiles Privacy 

    Khalil, Ashraf; Connelly, Kay (Association for Computing Machinery, 2006-11-01)
    The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with context information about the receivers, has ...
  • Context-Aware Configuration: A Study on Improving Cell Phone Awareness 

    Khalil, Ashraf; Connelly, Kay (Springer Berlin/Heidelberg, 2005-07-05)
    As the number of mobile devices we carry grows, the job of manag- ing those devices throughout the day becomes cumbersome. This is especially true for cell phones. Despite the many benefits they provide, cell phones create ...
  • Towards Automatic Device Configuration in Smart Environments 

    Connelly, Kay; Khalil, Ashraf (Citeseer, 2003-10)
    As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethical ways without being detected is becoming ...
  • The Internet Hunt Revisited: Personal Information Accessible via the Web 

    Connelly, Kay; Jagatic, Tom; Khalil, Ashraf (Proceedings of www, 2004)
    In June 1993, Rick Gates posted an unusual Internet Hunt[4] to his monthly contest in usenet (alt.internet.services): he presented a simple email address and asked his contest participants to find out what they could about ...
  • A Collaborative Approach to Minimize Cellphone Interruptions 

    Khali, Ashraf; Connelly, Kay (IEEE, 2016-09-05)
    In this paper, we present a collaborative approach to minimizing in- appropriate cellphone interruptions. The approach uses Bluetooth technology to discover and communicate with the surrounding cell phones in order to read ...
  • A Fault-Tolerant Intersection Control Algorithm Under the Connected Intelligent Vehicles Environment 

    Elhadef, Mourad (Springer, 2016)
    In this paper, we introduce a fault-tolerant inVANETs-based intersection control algorithm which relies on vehicle-to-vehicle or vehicle-to-infrastructure communications to control the traffic and grant the privilege to ...