Khaled Shaalan

Khaled Shaalan
British University in Dubai · Faculty of Engineering and IT

PhD

About

329
Publications
367,027
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,826
Citations
Additional affiliations
January 2012 - present
January 2010 - December 2012
British University in Dubai
January 2010 - present

Publications

Publications (329)
Article
Full-text available
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet economy. Phishing attacks are now most often carried out by email. To better comprehend the existing research trend of phishing email detection, several review studies have been performed. However, it is important to assess this issue from different...
Article
Full-text available
Blockchain technologies have received considerable attention from academia and industry due to their distinctive characteristics, such as data integrity, security, decentralization, and reliability. However, their adoption rate is still scarce, which is one of the primary reasons behind conducting studies related to users’ satisfaction and adoption...
Article
Full-text available
Artificial intelligence (AI)-based voice assistants have become an essential part of our daily lives. Yet, little is known concerning what motivates students to use them in educational activities. Therefore, this research develops a theoretical model by extending the technology acceptance model (TAM) with subjective norm, enjoyment, facilitating co...
Article
Full-text available
The emergence of newer technology and rapid global changes has led to the development of technology-based education environments, wherein teachers and students interact via technological interfaces such as Google Glass. Very few educational institutions have, however, opted to use this interface. The reason for this tendency is not very well unders...
Preprint
Customs duty obligations are primary revenue sources for nations. Any under or over value can result in economic instability. The role of customs is safeguarding society and local businesses from criminally guided value manipulations. In this paper, a cluster-based approach to detect the customs commodity value manipulation is proposed. This approa...
Chapter
Text and content mining are the subcategory of data mining. This category of data mining is used to extract the information from web or web pages of a website. This mining identifies useful information from web content like web pages, search logs, and other website-related content. The extracted information can be used in many applications, for exa...
Chapter
Sentiment analysis (SA) is one of the most emerging field of study in natural language processing (NLP) domain that primarily focuses on the opinion extortion of people’s lingual and penned articulation. Considerable number of studies about sentiment analysis over Arabic language are probed to label its polarity into positive or negative since this...
Chapter
The Prevalence of information and its magnitude mandates a short description of the core of a document, an article, or legal documents. Abstractive summarization helps to concur with this problem utilizing the evolutions in machine learning and deep neural network. Attention-mechanism has extensively applied in the challenging issue of abstraction...
Chapter
The objective of this paper is to propose the use of a multi agent approach as a knowledge management system in a technology service provider (TSP) environment. The TSP shall ensure that the services provided are reliable and trustworthy to sustain in a competitive technology market. This is achieved by possessing a fleet of expert intellectual pro...
Chapter
Knowledge management is a fundamental process and an imperative framework on which organizations achieve competitive advantages. Companies realize that to benefit from the wide range of knowledge available, they must find ways of managing organizational knowledge. However, how companies manage their knowledge is dependent on the activities performe...
Chapter
Knowledge management (KM) is one of the most important systems that need to be applied in an organization. It has benefits for improving efficiency and productivity in a company to achieve organizational goals. One of the tools that will make finding knowledge easier for employees is the knowledge map. It allows for visualizing the knowledge and li...
Chapter
Knowledge management (KM) comprises of managing, planning, deploying, collecting, storing, reusing, and distributing the knowledge in organizations in an organized planned way. Applying KM in an organization aims to allow for ensuring overall success as it is a method that simplifies the entire process of dealing with knowledge. Some organizations...
Chapter
With the COVID-19 outbreak in 2020, information about the pandemic has been exponentially increasing and spreading across various social media platforms. People across the globe have been affected in a way or another because of different aspects such as the increase in infected cases, death rate increase, financial difficulties, social distancing,...
Chapter
This case study aims to examine the status quo of an information system in the context of talent management (TM), in a leading group of companies that is under the ports and industrial lands sector in the United Arab Emirates. This study identified the major issues encountered by the target organization from the perspective of the employee. It also...
Chapter
Recently Natural Language Processing (NLP) has excessive attention due to increased data available online. Although there is huge development in Arabic NLP, but still it is behind English NLP. The aim of this study is to examine the most useful qualitative research design that can be used in the field of Arabic Natural Language Processing in genera...
Chapter
The main aim of this paper is to identify the most important issues and problems that we faced in the UAE in the case of coronavirus pandemic and try to come up with solutions that will enhance the overall response of organizations and individuals to this crisis. Moreover, we want to investigate the importance of knowledge management in spreading i...
Chapter
Queue Management is significant to improve the provided healthcare services. Despite previous studies on technology adoption and users’ intention to use various technologies in healthcare, users’ acceptance of queue management solutions (QMS) have rarely been measured. End users in healthcare domain and their acceptance for information technologies...
Chapter
Social media platforms are massive sources of information and knowledge, considering their nature that heavily relies on the concept of media sharing in the form of visuals, written, or other multimedia formats. The ease of accessing these channels and contributing to them is what makes it a very unique yet challenging source to manage. The variety...
Chapter
In this century, we have witnessed tremendous growth in the application of technology in our day-to-day life. One such life influencing factor is social media. In a manner or other, each individual’s life is influenced by social media. Individuals and organizations rely more on social media to interact with people, acquire knowledge, promote busine...
Chapter
Full-text available
This paper aims to explore the relationship between knowledge management (KM) and organizational performance (OP). Systematic literature review was conducted to look at different practices for KM in different sectors and locations to build a good background about the relation between KM and OP. Many of researchers investigated the impacts and benef...
Article
Full-text available
Integration between information systems is critical, especially in the healthcare domain, since interoperability requirements are related to patients’ data confidentiality, safety, and satisfaction. The goal of this study is to propose a solution based on the integration between queue management solution (QMS) and the electronic medical records (EM...
Book
This book sheds light on the emerging research trends in intelligent systems and their applications. It mainly focuses on four different themes, including Artificial Intelligence and Soft Computing, Information Security and Networking, Medical Informatics, and Advances in Information Systems. Each chapter contributes to the aforementioned themes by...
Article
Full-text available
Understanding the factors affecting the use of healthcare technologies is a crucial topic that has been extensively studied, specifically during the last decade. These factors were studied using different technology acceptance models and theories. However, a systematic review that offers extensive understanding into what affects healthcare technolo...
Article
Full-text available
Captioning of images has been a major concern for the last decade, with most of the efforts aimed at English captioning. Due to the lack of work done for Arabic, relying on translation as an alternative to creating Arabic captions will lead to accumulating errors during translation and caption prediction. When working with Arabic datasets, preproce...
Article
Full-text available
Comparing two sets of documents to identify new topics is useful in many applications, like discovering trending topics from sets of scientific papers, emerging topic detection in microblogs, and interpreting sentiment variations in Twitter. In this paper, the main topic-modeling-based approaches to address this task are examined to identify limita...
Article
Full-text available
In the case of compromised databases or interested database managers, CryptDB has been built for validated and realistic protection. CryptDB operates through encrypted data while executing SQL queries. The key concept of the SQL-aware encryption technique is to map SQL operations to encryption methods, adjustable query-driven encryption which facil...
Chapter
Despite the growing need for IT graduates, the retention rate in software-related undergraduate programs is still a major concern. This stems from the difficulty and complexity of programming concepts for a large number of students. To handle this situation, this research introduces the "PROBSOL" application that is offered in three different platf...
Article
The main objective of this systematic review is to analyse the up-to-date knowledge management in virtual learning environments studies. In that, 94 research articles ranged between 2005 and 2020 were critically analysed. Subsequently, the researchers integrated the findings to display the output with one result. Various countries hosted the studie...
Book
This book sheds light on the emerging research trends in intelligent systems and their applications. It mainly focuses on three different themes, including software engineering, ICT in education, and management information systems. Each chapter contributes to the aforementioned themes by discussing the recent design, developments, and modifications...
Conference Paper
Analytics in educational environments has received much attention during the last few years. Maintaining a high retention rate is still a major concern in higher educational institutions. Therefore, this research aims to early detect students at risk using three machine learning predictive models, namely support vector machine (SVM), neural network...
Conference Paper
Full-text available
We present our progress in developing a novel algorithm to extract synonyms from bilingual dictionaries. Identification and usage of synonyms play a significant role in improving the performance of information access applications. The idea is to construct a translation graph from translation pairs, then to extract and consolidate cyclic paths to fo...
Conference Paper
Full-text available
The case study implements an ERP integration system on a local ceramic company system specifically for Quality Management. This report will cover the basic operation of the ceramic. After introducing the ceramic production scheme, we scan a total of 7 papers on ERP system implementation analysis in different fields. Two of them will be represented...
Conference Paper
Full-text available
The concept of using two neural networks to translate one Sequence to another sequence presented by google in 2014 has led to a revolutionary result of translation between the input sequence as source language and the output sequence as the target language. It overcomes the weakness of previous translation methods. On the other hand, C#.Net program...
Preprint
In February 2021, the media around the world celebrated the success of three main space missions to Mars, Emirates hope mission from United Arab Emirates, followed by Tianwen-1, from China, and finally Mars 2020 mission from NASA. The aim of this research is to conduct a sentimental analysis of these tweets using a VADER-Multi, a method that is par...
Article
IoT (Internet of Things) sensors usually generate a large amount of data that is shared with a centralized cloud to provide various services. Traditional IoT architecture is heavily centralized, where data stored in a cloud environment is prone to several kinds of threats. As such, both data generated by sensors as well as IoT network shall be prot...
Article
Full-text available
Sentiment Analysis tools allow decision-makers to monitor changes of opinions on social media towards entities, events, products, solutions, and services. These tools provide dashboards for tracking positive, negative, and neutral sentiments for platforms like Twitter where millions of users express their opinions on various topics. However, so far...
Article
Full-text available
The paper proposes three modeling techniques to improve the performance evaluation of the call center agent. The first technique is speech processing supported by an attention layer for the agent’s recorded calls. The speech comprises 65 features for the ultimate determination of the context of the call using the Open-Smile toolkit. The second tech...
Conference Paper
Full-text available
A sufficient amount of annotated data is usually required to fine-tune pre-trained language models for downstream tasks. Unfortunately, attaining labeled data can be costly, especially for multiple language varieties and dialects. We propose to self-train pre-trained language models in zero- and few-shot scenarios to improve performance on data-sca...
Chapter
Full-text available
The recent decade has included huge achievements in the development for information technologies in healthcare. Now, these technologies can be employed as part of the response to the COVID-19 pandemic. Information technologies in healthcare are crucial to store, manage and exchange the clinical data. On the other hand, the success or failure of a s...
Chapter
Full-text available
An incredible volume of research was conducted to examine the students’ acceptance of e-learning systems through the platforms of higher education institutions (HEIs). However, little debate was made concerning the exploration of the factors influencing the acceptance of e-learning systems via social media applications. Accordingly, this study exte...
Chapter
Full-text available
In recent years, significant development has ensued confronting e-learning academically and practically. This evolution in information technologies attempts to capitalize on individual intervention and interaction in the learning process to be more efficient and effective, especially in e-learning adopted in virtual communities. The main concern in...
Chapter
Full-text available
Even though startups have limited human and financial resources, they can utilize these resources for success and overcome the obstacles against knowledge management (KM) usage. This paper conducts a systematic literature review of KM in startups and small and medium enterprises (SMEs). This systematic review answers three research questions includ...
Chapter
Several studies were carried out earlier to investigate the determinants affecting cloud computing adoption at the individual level. However, the question of what impacts the cloud computing adoption at the organizational level is still not yet fully answered. Therefore, this research develops an integrated theoretical model to explore the factors...
Chapter
Today, exists an innovative thinking amongst the educators and learners in the use of e-learning method in the Higher Education Institutions (HEIs) worldwide. Be that as it may, the E-learning framework requires immense up-front infrastructure with many establishments which isn’t anything but difficult to be overseen. Cloud computing accompanies an...
Chapter
Full-text available
Learning analytics has emerged as a new domain for identifying students’ behaviors, academic performance, academic achievement, and other related learning issues. Given its paramount importance and recency, several review studies were conducted. However, the previous reviews have mainly focused on the behavioral, affective, cognitive, and metacogni...
Chapter
Full-text available
Recently Natural Language Processing (NLP) has excessive attention due to increased data available online and needs processing. Nevertheless, the huge development in the NLP but still Arabic Natural Language Processing (ANLP) faces many challenges and grief from researchers' leakage compared with English NLP. Mainly this study has three divisions....
Chapter
Full-text available
Modern technology has become an integral part of our daily lives. Every day generates the need for new technologies so that we can coexist and integrate into contemporary life. Virtual reality (VR) is becoming imperative in some life areas, such as medicine, space, and education, for experiments and training. The start of the COVID-19 pandemic reve...
Article
Full-text available
Tracking social media sentiment on a desired target is certainly an important query for many decision-makers in fields like services, politics, entertainment, manufacturing, etc. As a result, there has been a lot of focus on Sentiment Analysis. Moreover, some studies took one step ahead by analyzing subjective texts further to understand possible m...
Chapter
Full-text available
The sophistication and efficiency of systems is undeniably advancing. As businesses evolve, questions on its past performance is beside the point but its anticipated functions and relevance in the future. With the use of software in commerce at the core of every business today, the overlook of how omnichannel transactions operates is an awe with th...
Article
Full-text available
This paper aims to understand the impact of eLearning capabilities on organizational performance. It also addresses the obstacles of organizational learning using eLearning methods and highlighting some emerging trends and technologies that will impact the eLearning experience in organizations. It examines a brief history of knowledge management an...
Cover Page
Full-text available
ACLing is a conference series devoted to AI in Computational Linguistics (CL), Intelligent Text Processing, Natural Language Processing (NLP), Human Language Technologies (HLT), Natural-Language Human-Computer Interaction (HCI), and Speech Processing (SP). ACLing 2021 will take place on 4-5 June 2021, and because of the COVID-19 situation, it will...
Preprint
Full-text available
A sufficient amount of annotated data is required to fine-tune pre-trained language models for downstream tasks. Unfortunately, attaining labeled data can be costly, especially for multiple language varieties/dialects. We propose to self-train pre-trained language models in zero- and few-shot scenarios to improve the performance on data-scarce dial...
Chapter
Full-text available
The importance of analyzing social networks lies in enabling researchers to understand better the relationships among network actors over time through social data mining and patterns examining social network growth. This paper aims to analyze the topology structure and critical influences on Facebook for employees’ group of cybersecurity awareness....
Chapter
Full-text available
Security and efficiency of transferred data is the main concern in big data and cloud computing service. Fully Homomorphic Encryption is one of the most recent solutions that ensure the security and confidently. This paper expected to lead precise writing on the subject of Fully Homomorphic Encryption and its Application. The primary point of the a...
Chapter
Full-text available
Natural Language Processing (NLP) applications on real-life textual content require a suitable fit for purpose corpora, which can accommodate the ambiguity of the domain. Researchers in the field managed to synthesize gold-standard corpora in many domains and for varying tasks, assisted by domain experts and linguists. The wealth of information bur...
Chapter
Full-text available
The rapidly advancing technology and the globalizing market have espoused the notion of knowledge management (KM) as an appropriate plan in the highly competitive commercial contexts. The importance of knowledge is evident in multidimensional society and the corporate domain. The use of acquaintance and information has currently increased in every...
Chapter
Full-text available
Effective and efficient management of project teams and effective knowledge sharing policy imposed by organization have significant positive impact on the knowledge sharing among software development team. Thus, organizations should enhance and improve its culture in order to offer an effective knowledge sharing process that leads to project succes...
Chapter
Full-text available
In the twenty-first century, with the evolution of Information Technology and Artificial Intelligence, Knowledge Management seems to be more advanced and sophisticated. Knowledge management has been studied and discussed for a long time by several researchers from academia and business sector due to its vitality for the success of organizations. Ad...
Chapter
Full-text available
Healthcare is considered a pillar for keeping humans alive, thus managing their health through diagnosing and treating the disease or illness is a must, in addition to preventing it. Knowledge management (KM) in healthcare domain plays a substantial role in the implementation of different processes to ensure the existence of good and outstanding he...
Article
Full-text available
Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks. Despite constant updating of the methods of avoiding such cyber-attacks, the ultimate outcome is c...
Preprint
Full-text available
We present our progress in developing a novel algorithm to extract synonyms from bilingual dictionaries. Identification and usage of synonyms play a significant role in improving the performance of information access applications. The idea is to construct a translation graph from translation pairs, then to extract and consolidate cyclic paths to fo...