about.jpg

Filter by

Dyadchurn: Customer churn prediction using strong social ties

The increase in mobile phone subscriptions in recent years, has led to near market saturation in the telecom industry. As a result, it has become harder for telecom providers to acquire new customers, and the need for retaining existing ones has become of paramount importance. Because of fierce competition between different telecom providers and because the ease of which customers can move from

Artificial Intelligence

A dynamic system development method for startups migrate to c loud

Cloud computing has become the most convenient environment for startups to run, build and deploy their products. Most startups work on availing platforms as a solution for problems related to education, health, traffic and others. Many of these platforms are mobile applications. With platforms as a service (PaaS), startups can provision their applications and gain access to a suite of IT

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Developing a Greenometer for green manufacturing assessment

In this paper a toolbox (Greenometer) to assess the greenness level of manufacturing companies is proposed. The assessment approach is based on capturing the relative greenness position of any company among other industries from different sectors as well as within the same sector. The assessment was based on selected greenness attributes and their composing indicators at each of the two levels of

Healthcare

In silico identification of potential key regulatory factors in smoking-induced lung cancer

Background: Lung cancer is a leading cause of cancer-related death worldwide and is the most commonly diagnosed cancer. Like other cancers, it is a complex and highly heterogeneous disease involving multiple signaling pathways. Identifying potential therapeutic targets is critical for the development of effective treatment strategies. Methods: We used a systems biology approach to identify

Artificial Intelligence
Circuit Theory and Applications
Innovation, Entrepreneurship and Competitiveness

Sensor Faults Detection and Estimation for a Dfig Equipped Wind Turbine

Doubly Fed Induction Generator (DFIG) based on wind turbines demand a high degree of reliability and availability and they are characterized by expensive and safety critical maintenance work. This paper deals with a new strategy for detection and estimation of current sensor faults in the stator and rotor of a DFIG. First, a state space model of a DFIG is developed based on voltages and flux

Energy and Water
Mechanical Design

Experimental digital forensics of subscriber identification module (SIM) Card

[No abstract available]

Software and Communications

Quantitave dynamic taint analysis of privacy leakage in android Arabic apps

Android smartphones are ubiquitous all over the world, and organizations that turn profits out of data mining user personal information are on the rise. Many users are not aware of the risks of accepting permissions from Android apps, and the continued state of insecurity, manifested in increased level of breaches across all large organizations means that personal information is falling in the

JSDES - An automated de-obfuscation system for malicious javascript

Malicious scripts used in web-based attacks have recently been reported as one of the top internet security threats. However, anti-malware solutions develop and integrate various techniques to defend against malicious scripts, attackers have been increasingly applying different counter techniques to hide their malicious intents and evade detection. One of the most popular techniques used is code

A postmortem forensic analysis for a JavaScript based attack

[No abstract available]

Pre-Encrypted user data for secure passive UHF RFID communication

A pre-encryption algorithm for passive ultra-high frequency (UHF) radio frequency identification (RFID) systems is described. The algorithm is based on advanced encryption standard (AES) as the core encryption technique with two extra steps; first step is random key generation and the second step is data randomization, which increase the immunity of the encryption process against attacks. The