Eiad Yafi

Eiad Yafi
  • PhD Computer Science
  • Visiting Researcher at University of Technology Sydney

About

80
Publications
46,363
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,217
Citations
Introduction
Eiad Yafi currently a Visiting Researcher at the University of Technology Sydney. Eiad does research in Information Retrieval , Artificial Intelligence, Cloud Computing, ICTD and Human Computer Interactions.
Current institution
University of Technology Sydney
Current position
  • Visiting Researcher

Publications

Publications (80)
Conference Paper
Full-text available
Cryptocurrency exchanges have garnered significant attention in recent years, prompting widespread interest and investment in digital assets. With this growing trend comes an array of perceived risks and uncertainties that have captured the public's attention. As such, understanding the beliefs and sentiments of the public towards these risks assoc...
Article
Full-text available
The global response to the COVID-19 pandemic meant that many organizations worldwide had to shift to remote work at short notice, greatly impacting the entire software development process. Agile processes handled during this period's drastic changes were invaluable because of the iteration approach. This research aims to improve the agile developme...
Article
Full-text available
Requirements Agile approaches have transformed engineering. This paper shows how RE in Agile software development has evolved from documentation-heavy to collaborative, adaptable, and customer-focused. Agile was born in the mid-1990s when the industry realized it needed to respond to changing client needs and market volatility. This evolution inclu...
Article
Full-text available
Requirements Agile approaches have transformed engineering. This paper shows how RE in Agile software development has evolved from documentation-heavy to collaborative, adaptable, and customer-focused. Agile was born in the mid-1990s when the industry realized it needed to respond to changing client needs and market volatility. This evolution inclu...
Article
Full-text available
Facebook is one of the most popular social networking sites. However, Facebook intrusion or addiction is a growing concern as it involves an excessive attachment to Facebook, which disrupts daily functioning. To date, few studies have examined whether cross-cultural differences in the measurement of Facebook addiction exist. The aim of this study w...
Chapter
Full-text available
The uncertainty of the pandemic needs agile change management to tackle COVID-19 in business. Agile change management is a proactive technique for managing COVID-19 in a fast-paced business context. It improves corporate agility to respond to uncertainty, driving competitive growth and efficiency. As consumer and technology markets evolve, agile ch...
Article
Full-text available
span lang="EN-US">In this study, a novel approach geared toward predicting the estimated number of coronavirus disease (COVID-19) cases was developed. Combining long short-term memory (LSTM) neural networks with particle swarm optimization (PSO) along with grey wolf optimization (GWO) employ hybrid optimization algorithm techniques. This investigat...
Conference Paper
Cryptocurrency exchanges have garnered significant attention in recent years, prompting widespread interest and investment in digital assets. With this growing trend comes an array of perceived risks and uncertainties that have captured the public's attention. As such, understanding the beliefs and sentiments of the public towards these risks assoc...
Article
Full-text available
Background The world in recent years has seen a pandemic of global scale. To counter the widespread loss of life and severe repercussions, researchers developed vaccinations at a fast pace to immunize the population. While the vaccines were developed and tested through extensive human trials, historically vaccines have been known to evoke mixed sen...
Article
The transmission of viral diseases, such as COVID-19, influenza, and other viral strains, poses a substantial worldwide challenge. In the context of health, it is necessary to possess a comprehensive comprehension, meticulous examination, and precise anticipation of the dissemination of this infectious disease. Nonetheless, the presence of diverse...
Article
Full-text available
Although live streaming via social media offers consumers real-time shopping experiences and potentially increases sales volume, the intangible values carried by live streaming from the streamer’s perspective are relatively unknown. Building upon the Trust Transfer Theory, this study examined the values behind Instagram live streaming that could po...
Chapter
In the current pandemic scenario, healthcare data tends to be an important asset among organizations. The major challenge is to handle the data effectively while maintaining the privacy and security of the data. In a real-world, context healthcare data proves to be heterogeneous. Hence, managing such significance to big data has ardently laid numer...
Article
Full-text available
Determining the optimal feature set is a challenging problem, especially in an unsupervised domain. To mitigate the same, this paper presents a new unsupervised feature selection method, termed as densest feature graph augmentation with disjoint feature clusters. The proposed method works in two phases. The first phase focuses on finding the maxima...
Article
Analyzing people's behavior through the Internet of things (IoT) and artificial intelligence technologies has become one of life's rapidly developing and interfering areas. Autism disorder is becoming more common and spreading quickly. Because of this, there is a growing need to use IoT technologies to train and rehabilitate people with autism diso...
Article
Full-text available
The immense growth of new technological interventions has forced researchers and scientists around the globe to adopt the widely anticipated technology of Machine Learning (ML) and Artificial Intelligence (AI). ML and AI have generously prospected itself from the past decade in the discovery of knowledge from databases. Several ML and AI based adop...
Article
Full-text available
Purpose of the study: The benefits of the internet during a pandemic bring opportunities for cybercrimes, such as online data theft and leakage of consumers’ personal data. For this reason, the objectives of this study are 1) to determine the phenomenon of misuse of consumer’s personal data amidst COVID-after19 in Indonesia and 2) to describe strat...
Article
A novel feature selection approach is presented in this paper. Sammon’s Stress Function transforms the high dimension data to a lower dimension data set. A data set is divided into small partitions. The features are assigned randomly to these partitions. Using GA with Sammon Error as fitness value, a small, desired number of features are selected f...
Preprint
Full-text available
Background: The world in recent years has seen a pandemic of global scale. To counter the widespread loss of life and severe repercussions, researchers developed vaccinations at a fast pace to immunize the population. While the vaccines were developed and tested through extensive human trials, historically vaccines have been known to evoke mixed se...
Article
Full-text available
According to findings made during a survey performed at malls, consumers have difficulty determining their best preferences and requirements while shopping. Local marketers confront several obstacles. They don't have access to a platform that may aid in the expansion and growth of their sales and business. Following this statistic, Shopick was crea...
Article
Full-text available
Artificial intelligence (AI) is one of the emerging technologies. In recent decades, artificial intelligence (AI) has gained widespread acceptance in a variety of fields, including virtual support, healthcare, and security. Human-Computer Interaction (HCI) is a field that has been combining AI and human-computer engagement over the past several yea...
Chapter
Deep learning (DL) gives you methodologies, approaches, and apparatuses that can help resolving analytic and predictive hitches in a miscellany of medicinal areas and used for the inquiry of the wild of controlled edges and their mixtures for forecast of illness development, elimination of medicinal information for consequence investigation, remedy...
Article
Full-text available
This work aims to examine the impact of green training on green environmental performance through the mediating role of green competencies and motivation on the adoption of green human resource management. The convenience sampling technique was employed to collect data through an online survey undertaken at public and private universities in Malays...
Article
Full-text available
A significant increase has been observed in the use of Underwater Wireless Sensor Networks (UWSNs) over the last few decades. However, there exist several associated challenges with UWSNs, mainly due to the nodes’ mobility, increased propagation delay, limited bandwidth, packet duplication, void holes, and Doppler/multi-path effects. To address the...
Article
Full-text available
Pop-up advertisements have become prevalent on websites. When users click on the banner, they navigate a separate window; banner and pop-up advertisements contain attractive audio-visual and animated graphics. This intrusive advertising has not explicitly regulated Indonesia's current legislation, including Electronic Transaction and Information La...
Article
Full-text available
We present ARTYCUL (ARTifact popularitY for CULtural heritage), a machine learning(ML)-based framework that graphically represents the footfall around an artifact on display at a museum or a heritage site. The driving factor of this framework was the fact that the presence of security cameras has become universal, including at sites of cultural her...
Article
This study proposes a conceptual structure for the success of the real-time healthcare program in developing countries. Whilst developing and some developed countries face a significant challenge in adopting the application of real-time healthcare, this work aims to analyze the perspectives of healthcare practitioners in Malaysia. Since 1997, Malay...
Article
Cloud computing (CC) is a distributed and centralized network of interconnected and interrelated systems that has emerged as an area of incredible impact, potential, and growth in the IT domain. In the last few years, this paradigm has thrived to become the fastest evolutionary segment for business and various industries. Despite the many advantage...
Article
Full-text available
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Preprint
Full-text available
Smart city is synchronized with digital environment and its transportation system is vitalized with RFID sensors, Internet of Things (IoT) and Artificial Intelligence. However, without user's behavioral assessment of technology, the ultimate usefulness of smart mobility cannot be achieved. This paper aims to formulate the research framework for pre...
Preprint
Full-text available
Internet of Things (IoT) occupies a vital aspect of our everyday lives. IoT networks composed of smart-devices which communicate and transfer the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make these devices threatened and prone to a severe kind of threats. In this paper,...
Conference Paper
The Domain Name System (DNS) is an essential building block or component infrastructure of the Internet. Nearly every network applications depend on it to operate properly and the role of DNS. The purpose of this research project is to alleviate the network issue at Universiti Kuala Lumpur, Malaysian Institute of Information Technology (UniKL MIIT)...
Article
Full-text available
Social media including Facebook has been acknowledged to play a vital role in firms achieving superior performance. Malaysia is a multicultural country in which the Malaysian Chinese are considered to be the most successful entrepreneurs. There is, however, a lack of research regarding the influence of Facebook usage on firm performance among Malay...
Conference Paper
Full-text available
In recent years, Internet of Things (IoT) occupies a vital aspect of our daily lives. IoT networks composed of smart-devices which communicate and exchange the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make the devices more vulnerable and prone to a severe kind of threats...
Conference Paper
Za'atari Syrian Refugee Camp in Jordan is home to about 83,000 people fleeing the violence in Syria. Building on a multi-year engagement at Za'atari, we developed an information-enabled community engagement approach to identify and address challenges at the camp, engage community members in problem solving and increase self-reliance. Using HCI mixe...
Article
Full-text available
Purpose This study aims to assess consumers’ beliefs in three Middle Eastern Arab countries regarding attitudinal and behavioural responses towards permission-based direct email marketing (hereafter DEM) and the moderating role of gender in the hypothesised path model. Design/methodology/approach Structural equation modelling was used to test the...
Article
Full-text available
Information security is critical to the development of modern internet technologies. The features of blockchain technology such as distributed approaches, decentralized mechanism, password mechanism, and scripted mechanism present a completely new perspective for the development of internet information security technology. Cloud storage, like any o...
Article
Full-text available
Information and communication technologies (ICTs) have been considered as a strong mechanism for improving business growth and achieving competitive advantage. ICT based network competence is critical for developing and maintaining long-term relationships with customers, suppliers and other relevant parties. Assuming the mediating role of ICT based...
Article
Full-text available
Utilising qualitative techniques, this research is aimed at investigating total quality management (TQM) implementation practices within a humanitarian setting. The extensive survey instrument of professionals working for the UN organisations operating in the Middle East is used to reveal TQM use within International Non-Government organisations (I...
Conference Paper
Full-text available
Social networking sites have become an important means of communication used for professional, private, recreational, or information purposes. Many studies have shown that the way we present ourselves on Facebook depends on some personality dimensions. The important question is whether this relation is universal or depends on culture. The main aim...
Preprint
Full-text available
Total Quality Management (TQM) is a strategic approach of upholding high benchmarks of work in every single phase of a firm's processes based on the commitment of all parties (that are involved in this firm’s activities) to improving the quality of goods or services. We were motivated by the paucity of peer-review studies focusing on the plight of...
Chapter
Full-text available
Cybercrime is not only a social ill but it does also pose a tremendous threat to our virtual world of personal, corporate and national data security. The recent global cyberattack of WannaCry ransomware has created an adverse effect on worldwide financials, healthcare and educational sectors, highlighting the poor state of cyber security and its fa...
Article
Full-text available
Cloud computing usage is rapidly increasing in a various range of services and it is seen on trend to revolutionize the way the IT companies doing businesses. The recent advances in mobile, social media companies and online businesses have given rise to success and propagation for the environment of the cloud. However, When uploading the users' dat...
Article
Full-text available
Spike Response Function (SRF) plays an important role in the temporal coding Spiking Neural Network (SNN) as it has a significant role to determine when the neuron should fire. This paper studies the important role of the SRF in the SNN learning stability. It proposes a novel method to find out the rules to update delay for each class to make SRF s...
Article
Full-text available
Mobile Crowd Sensing (MCS) technology enables mobile devices, such as smart-phones or other android-based devices that are equipped with embedded sensors to gather relevant data for research work. Typically, the MCS application field ranges from online social-media monitoring, transportation system monitoring, atmosphere monitoring and etc. The inh...
Article
Full-text available
Loneliness, Friendship, and Facebook Intrusion. A Study in Poland, Slovakia, Syria, Malaysia, and Ecuador With the increa sing popu larity of Facebook, a new social phenomenon connected with its extensive use has appeared: namely, Facebook intrusion. The main aim of the study was to examine the mediating role of loneliness in the relation between f...
Conference Paper
Full-text available
We share insights from exploratory research with Syrian youth at the Za'atari Refugee Camp in Jordan about the role of information and mobile technology in their daily lives, and how they serve as information, communication and technology (ICT) wayfarers. Survey findings (n=174) show most youth own mobiles and SIM cards, and WhatsApp and Google are...
Conference Paper
An unprecedented 65 million people around the world are forcibly displaced. As stakeholders call for technological innovation to address the realities of the global migration crisis, HCI researchers in and outside of academia engage with the issues faced by humanitarian responders, refugees and communities. Our exploratory study at UNHCR Za'atari S...
Article
Full-text available
For displaced people, migrating into Europe has highly complex information needs about the journey and destination. Each new need presents problems of where to seek information, how to trust or distrust information, and financial and other costs. The outcomes of receiving poor or false information can cause bodily harm or death, loss of family, or...
Conference Paper
Cellular users are frequently affected by unfair channel allocation by the base station. A cluster, which typically has 3, 7, 19, or 21 cells can accommodate many User Equipments (UEs). The demarcation boundary between adjacent cells is ambiguous and as such, a radio transmission in a cell from a particular eNode Base Station (eNBs) may leak into n...
Conference Paper
With 83,000 Syrian refugees, Za'atari camp in Jordan has become the second largest home for displaced people. Engagements with refugees residing in the camp and stakeholders within the United Nations High Commissioner for Refugees (UNHCR) indicated that food is an integral part of communicating refugee identities and may play a role in meeting UNHC...
Conference Paper
The underlying element that supports the device communication in the MANET is the wireless connection capability. Each node has the ability to communicate with other nodes via the creation of routing path. However, due to the fact that nodes in MANET are autonomous and the routing paths created are only based on current condition of the network, so...
Poster
Full-text available
The general aim of our paper is to determine whether the cultural and psychological factors have influence on Facebook use. We check this relations among five countries: Poland, Slovakia, Syria, Ecuador and Malesia. These countries were selected as they differ as far as political, industrial, economic, societal, and technological development is con...
Conference Paper
We conducted participatory design workshops at the UNHCR Za'atari refugee camp in Jordan to learn how Syrian youth help others using information and technology. We asked 144 young people to create paper prototypes of visionary devices for helping their community and analyzed the designs for themes using qualitative techniques. The 61 drawings helpe...
Conference Paper
The quantity of data transmitted in the network intensified rapidly with the increased dependency on social media applications, sensors for data acquisitions and smartphones utilizations. Typically, such data is unstructured and originates from multiple sources in different format. Consequently, the abstraction of data for rendering is difficult, t...
Conference Paper
ICTs have been globally accepted as a component of education that has the ability to enhance and develop skills that youth need to participate and be successful in the modern economy. Until now, a very large portion of Syrian youth is missing the opportunities that ICTs have to offer. Thus, putting constraints on Syrian economic, cultural and socia...
Conference Paper
Full-text available
Social networks produce enormous amount of data every single minute. In numbers, each day 55 million status are updated in Facebook and 500 million tweets are sent. More than 30 billion pieces of content are shared on Facebook every month. Identifying the significance of this vast quantity of data presents challenges for data mining and sentiments...
Article
Full-text available
Association rules are an important problem in data mining. Massively increasing volume of data in real life databases has motivated researchers to design novel and incremental algorithms for association rules mining. In this paper, we propose an incremental association rules mining algorithm that integrates shocking interestingness criterion during...
Article
Association rules are an important problem in data mining. Massively increasing volume of data in real life databases has motivated researchers to design novel and incremental algorithms for association rules mining. In this paper, we propose an incremental association rules mining algorithm that integrates shocking interestingness criterion during...
Conference Paper
Full-text available
Association rules are an important problem in data mining. Massively increasing volume of data in real life databases has motivated researchers to design novel and incremental algorithms for association rules mining. In this paper, we propose an incremental association rules mining algorithm that integrates shocking interestingness criterion during...
Article
Full-text available
Knowledge Discovery of Databases (KDD) is the process of extracting previously unknown but useful and significant information from large massive volume of databases. Data Mining is a stage in the entire process of KDD which applies an algorithm to extract interesting patterns. Usually, such algorithms generate huge volume of patterns. These pattern...

Questions

Questions (2)
Question
In-line with the recent Teams outage, I believe more work has to be done in the area of decentralised communicaiton. Business can't afford dependency on a single tool/product and decentralisation is key to ensure no damage is made in case of future outage of any key product/tool. If you're carry out research that tackle this issue, please share your thoughts here
Question
How do researchers demonstrate understanding of the nexus between teaching and learning, research and scholarship? What are the examples of such demonstration from students and researchers perspectives?

Network

Cited By