Published in: Computers, Materials & Continua
Sep 22, 2022
One aspect of cybersecurity incorporates the study of Portable Executable (PE) file maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations; this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi-Layer Perceptron (NN-MLPC) algorithms were utilized d...
Published in: Applied Sciences Journal
Sep 20, 2022
The recent advancement in autonomous robotics is directed toward designing a reliable system that can detect and track multiple objects in the surrounding environment for navigation and guidance purposes. This paper aims to survey the recent development in this area and present the latest trends that tackle the challenges of multiple object tracking, such as heavy occlusion, dynamic background, and illumination changes. Our research includes Multiple Object Tracking (MOT) methods incorpora...
Published in: Uncertain Supply Chain Management
Sep 15, 2022
Currently, artificial intelligence and marketing strategies have become significant factors for improving the business capabilities that lead to improved business performance. Thus, the current study investigates the impacts of artificial intelligence and marketing strategies on the organizational performance of the tourism industry in the UAE. The present study also examines the mediating role of organizational capabilities in linking artificial intelligence, marketing strategies, and organiza...
Published in: Academic Journal of Interdisciplinary StudiesOpen AccessVolume 11, Issue 5, Pages 125 - 138September 2022
Sep 02, 2022
The study addressed the impact of COVID-19 on public rights and freedoms. The research question is to what extent it is possible to achieve compatibility between preserving public health in light of the COVID-19 pandemic and protecting the basic rights and freedoms of individuals, and how the Jordanian government dealt with the pandemic by resorting to exceptional legislation in this regard. To address this problem the study focused on the legislative basis which the Jordanian government relied...
Published in: Journal of King Saud University - Computer and Information Sciences
Sep 01, 2022
The application of model transformations is a critical component in Model-Driven Engineering (MDE). To ensure the correctness of the generated models, these model transformations need to be extensively tested. However, during the regression testing of these model transformations, it becomes too costly to frequently run a large number of test cases. Test case prioritization techniques are needed to rank the test cases and help the tester during the regression testing to be more efficient. The ob...
Published in: International Journal of Critical Infrastructure Protection
Sep 01, 2022
Internet of Things (IoT) has come a long way since its inception. However, the standardization process in IoT systems for a secure IoT solution is still in its early days. Numerous quality review articles have been contributed by researchers on existing frameworks, architectures, as well as the threats to IoT on different layers. However, most of the existing work neglects the security aspects of firmware in the IoT ecosystem. As such, there is a lack of comprehensive survey on IoT firmware sec...
Copyright © 2026 Al Ain University. All Rights Reserved.