Home About Publications Research Teaching
JabRef references
Matching entries: 0
settings...
AuthorTitleYearJournal/ProceedingsReftypeDOI/URL
Abdelhak, H., Ayesh, A. and Olivier, D. Cognitive Emotional Based Architecture for Crowd Simulation 2012 Journal of Intelligent Computing
Vol. 3(2), pp. 55-66 
article  
BibTeX:
@article{Abdelhak2012,
  author = {Abdelhak, Haifa and Ayesh, Aladdin and Olivier, Damien},
  title = {Cognitive Emotional Based Architecture for Crowd Simulation},
  journal = {Journal of Intelligent Computing},
  year = {2012},
  volume = {3},
  number = {2},
  pages = {55-66}
}
Abdelhamid, N., Ayesh, A., Thabtah, F., Ahmadi, S. and Hadi, W. MAC: A Multiclass Associative Classification Algorithm 2012 Journal of Information & Knowledge Management
Vol. 11(02), pp. 1250011 
article DOI URL 
Abstract: Associative classification (AC) is a data mining approach that uses association rule discovery methods to build classification systems (classifiers). Several research studies reveal that AC normally generates higher accurate classifiers than classic classification data mining approaches such as rule induction, probabilistic and decision trees. This paper proposes a new multiclass AC algorithm called MAC. The proposed algorithm employs a novel method for building the classifier that normally reduces the resulting classifier size in order to enable end-user to more understand and maintain it. Experimentations against 19 different data sets from the UCI data repository and using different common AC and traditional learning approaches have been conducted with reference to classification accuracy and the number of rules derived. The results show that the proposed algorithm is able to derive higher predictive classifiers than rule induction (RIPPER) and decision tree (C4.5) algorithms and very competitive to a known AC algorithm named MCAR. Furthermore, MAC is also able to produce less number of rules than MCAR in normal circumstances (standard support and confidence thresholds) and in sever circumstances (low support and confidence thresholds) and for most of the data sets considered in the experiments.

Keywords: Associative classification; associative rule; data mining; rule learning



Read More: http://www.worldscientific.com/doi/abs/10.1142/S0219649212500116
BibTeX:
@article{Abdelhamid2012,
  author = {Abdelhamid, Neda and Ayesh, Aladdin and Thabtah, Fadi and Ahmadi, Samad and Hadi, Wael},
  title = {MAC: A Multiclass Associative Classification Algorithm},
  journal = {Journal of Information & Knowledge Management},
  year = {2012},
  volume = {11},
  number = {02},
  pages = {1250011},
  url = {http://www.worldscientific.com/doi/abs/10.1142/S0219649212500116},
  doi = {http://doi.org/10.1142/S0219649212500116}
}
Abdelhamid, N., Ayesh, A. and Thabtah, F. Phishing detection based Associative Classification data mining 2014 Expert Systems with Applications
Vol. 41(13), pp. 5948 - 5959 
article DOI URL 
Abstract: Website phishing is considered one of the crucial security challenges for the online community due to the massive numbers of online transactions performed on a daily basis. Website phishing can be described as mimicking a trusted website to obtain sensitive information from online users such as usernames and passwords. Black lists, white lists and the utilisation of search methods are examples of solutions to minimise the risk of this problem. One intelligent approach based on data mining called Associative Classification (AC) seems a potential solution that may effectively detect phishing websites with high accuracy. According to experimental studies, AC often extracts classifiers containing simple ÒIf-ThenÓ rules with a high degree of predictive accuracy. In this paper, we investigate the problem of website phishing using a developed AC method called Multi-label Classifier based Associative Classification (MCAC) to seek its applicability to the phishing problem. We also want to identify features that distinguish phishing websites from legitimate ones. In addition, we survey intelligent approaches used to handle the phishing problem. Experimental results using real data collected from different sources show that AC particularly MCAC detects phishing websites with higher accuracy than other intelligent algorithms. Further, MCAC generates new hidden knowledge (rules) that other algorithms are unable to find and this has improved its classifiers predictive performance.
BibTeX:
@article{Abdelhamid2014,
  author = {Neda Abdelhamid and Aladdin Ayesh and Fadi Thabtah},
  title = {Phishing detection based Associative Classification data mining},
  journal = {Expert Systems with Applications},
  year = {2014},
  volume = {41},
  number = {13},
  pages = {5948 - 5959},
  url = {http://www.sciencedirect.com/science/article/pii/S0957417414001481},
  doi = {http://doi.org/10.1016/j.eswa.2014.03.019}
}
Abdelhamid, N., Ayesh, A. and Hadi, W. Multi-Label Rules Algorithm Based Associative Classification 2014 Parallel Processing Letters
Vol. 24(01) 
article DOI URL 
Abstract: Current associative classification (AC) algorithms generate only the most obvious class linked with a rule in the training data set and ignore all other classes. We handle this problem by proposing a learning algorithm based on AC called Multi-label Classifiers based Associative Classification (MCAC) that learns rules associated with multiple classes from single label data. MCAC algorithm extracts classifiers from the whole training data set discovering all possible classes connected with a rule as long as they have sufficient training data representation. Another distinguishing feature of the MCAC algorithm is the classifier building method that cuts down the number of rules treating one known problem in AC mining which is the exponential growth of rules. Experimentations using real application data related to a complex scheduling problem known as the trainer timetabling problem reveal that MCAC's predictive accuracy is highly competitive if contrasted with known AC algorithms.
BibTeX:
@article{Abdelhamid2014a,
  author = {Neda Abdelhamid and Aladdin Ayesh and Wael Hadi},
  title = {Multi-Label Rules Algorithm Based Associative Classification},
  journal = {Parallel Processing Letters},
  year = {2014},
  volume = {24},
  number = {01},
  url = {http://www.worldscientific.com/doi/abs/10.1142/S0129626414500017},
  doi = {http://doi.org/10.1142/S0129626414500017}
}
Abdelhamid, N., Ayesh, A. and Thabtah, F. Emerging Trends in Associative Classification Data Mining 2015 International Journal of Electronics and Electrical Engineering
Vol. 3(1), pp. 50-53 
article URL 
Abstract: Utilising association rule discovery to learn
classifiers in data mining is known as Associative
Classification (AC). In the last decade, AC algorithms
proved to be effective in devising high accurate classification
systems from various types of supervised data sets. Yet,
there are new emerging trends and that can further enhance
the performance of current AC methods or necessitate the
development of new methods. This paper sheds the light on
four possible new research trends within AC that could
enhance the predictive performance of the classifier or their
quality in terms of rules. These possible research directions
are considered starting research points for other scholars in
rule based classification in data mining.
BibTeX:
@article{Abdelhamid2015,
  author = {Abdelhamid, Neda and Ayesh, Aladdin and Thabtah, F.Fadi},
  title = {Emerging Trends in Associative Classification Data Mining},
  journal = {International Journal of Electronics and Electrical Engineering},
  year = {2015},
  volume = {3},
  number = {1},
  pages = {50-53},
  url = {http://www.ijeee.net/uploadfile/2014/0507/20140507041500642.pdf}
}
Alkhawlani, M. and Ayesh, A. Access Network Selection based on Fuzzy Logic and Genetic Algorithms 2008 Advances in Artificial Intelligence
Vol. 1(1), pp. 1-12 
article DOI URL 
Abstract: In the next generation of heterogeneous wireless networks (HWNs), a large number of different radio access technologies (RATs) will be integrated into a common network. In this type of networks, selecting the most optimal and promising access network (AN) is an important consideration for overall networks stability, resource utilization, user satisfaction, and quality of service (QoS) provisioning. This paper proposes a general scheme to solve the access network selection (ANS) problem in the HWN. The proposed scheme has been used to present and design a general multicriteria software assistant (SA) that can consider the user, operator, and/or the QoS view points. Combined fuzzy logic (FL) and genetic algorithms (GAs) have been used to give the proposed scheme the required scalability, flexibility, and simplicity. The simulation results show that the proposed scheme and SA have better and more robust performance over the random-based selection.
BibTeX:
@article{Alkhawlani2008,
  author = {Alkhawlani, Mohammed and Ayesh, Aladdin},
  title = {Access Network Selection based on Fuzzy Logic and Genetic Algorithms},
  journal = {Advances in Artificial Intelligence},
  year = {2008},
  volume = {1},
  number = {1},
  pages = {1-12},
  url = {http://www.hindawi.com/journals/aai/2008/793058/},
  doi = {http://doi.org/10.1155/2008/793058}
}
Alkhawlani, M. and Ayesh, A. Access Network Selection for co-existed WWAN, WMAN, and WLAN using Combined Fuzzy Logic and AHP 2008 International Journal of Innovative Computing and Applications (IJICA)
Vol. 1(4), pp. 219 - 231 
article DOI URL 
Abstract: Access network selection (ANS) is the radio resource mechanism that is responsible for selecting the most optimal and promising access network (AN) for a new service request in the next generation wireless network (NGWN). Selecting the most optimal and promising AN is an important consideration for overall networks stability, resource utilisation, user satisfaction, and quality of service (QoS) provisioning. Choosing a non optimal network can result in problems such as the use of expensive access types or poor service experience. This paper presents and designs a multi criteria ANS algorithm that considers NGWN environment with a co-existed WWAN, WMAN, and WLAN. A combination of parallel fuzzy logic and analytic hierarchy process (AHP) has been used to achieve scalable, flexible, simple, general, and adaptable solution. The simulation results show that the proposed algorithm has better and more robust performance over the random based, the terminal speed based, and the service type based selection algorithms that are used as reference algorithms.
BibTeX:
@article{Alkhawlani2008a,
  author = {Alkhawlani, Mohammed and Ayesh, Aladdin},
  title = {Access Network Selection for co-existed WWAN, WMAN, and WLAN using Combined Fuzzy Logic and AHP},
  journal = {International Journal of Innovative Computing and Applications (IJICA)},
  year = {2008},
  volume = {1},
  number = {4},
  pages = {219 - 231},
  url = {http://www.inderscience.com/offer.php?id=26965},
  doi = {http://doi.org/10.1504/IJICA.2008.026965}
}
Al-Obaidy, M., Ayesh, A. and Sheta, A. Optimizing the Communication Distance of an Ad hoc Wireless Sensor Networks by Genetic Algorithms 2008 Artificial Intelligence Review
Vol. 29(3-4), pp. 183-194 
article DOI URL 
Abstract: In this paper we provide our preliminary idea of using Genetic Algorithms (GAs) to solve the ad hoc Wireless Sensor Networks (WSNs) distance optimization problem. Our objective is to minimize the communication distance over a distributed sensor network. The proposed sensor network will be autonomously divided into set of k-clusters (k is unknown) to reduce the energy consumption for the overall network. On doing this, we use GAs to specify; the location of cluster-heads, the number of clusters and the cluster-mumbers which, if chosen, will minimize the communication distance over the distributed sensor network.
BibTeX:
@article{Al-Obaidy2009,
  author = {Al-Obaidy, M. and Ayesh, A. and Sheta, A.},
  title = {Optimizing the Communication Distance of an Ad hoc Wireless Sensor Networks by Genetic Algorithms},
  journal = {Artificial Intelligence Review},
  year = {2008},
  volume = {29},
  number = {3-4},
  pages = {183-194},
  url = {10.1007/s10462-009-9148-z},
  doi = {http://link.springer.com/article/10.1007%2Fs10462-009-9148-z}
}
Alotaibi, A., Ayesh, A. and Hall, R. Managing Admission in Saudi Universities: a System Approach 2016 International Journal of Information and Education Technology
Vol. 6(4)The 6th International Conference on E-Education, E-Business, E-Management and E-Learning- IC4E, pp. 314-321 
article DOI  
BibTeX:
@article{Alotaibi2016,
  author = {Awad Alotaibi and Aladdin Ayesh and Richard Hall},
  title = {Managing Admission in Saudi Universities: a System Approach},
  booktitle = {The 6th International Conference on E-Education, E-Business, E-Management and E-Learning- IC4E},
  journal = {International Journal of Information and Education Technology},
  year = {2016},
  volume = {6},
  number = {4},
  pages = {314-321},
  doi = {http://doi.org/10.7763/IJIET.2016.V6.706}
}
Alqrainy, S. and Ayesh, A.S. Developing a Tagset for Automated POS Tagging in Arabic 2006 WSEAS Transactions on Computers
Vol. 5(11), pp. 2787-2792 
article URL 
Abstract: Arabic language has much more syntactical and morphological information. Diacritics, which are marks placed over and below the letters of Arabic word, play a great role in adding linguistic attributes to Arabic word in part-of-speech tagging system. This paper describes a tagset that were built based on the inflectional morphology system which derived from traditional Arabic grammatical theory. The tagset developed represent an early stage of research related to automatic morphosyntactic annotation in Arabic language. This paper aims to present a general tagset for use in diacritics-based automated tagging system that is underdevelopment by the author.

Key-Words: - Part-of-Speech (POS), Arabic Language, Tagset, Diacritics, Syntactical, Morphological.
BibTeX:
@article{Alqrainy2006,
  author = {Alqrainy, Shihadeh and Ayesh, Aladdin S.},
  title = {Developing a Tagset for Automated POS Tagging in Arabic},
  journal = {WSEAS Transactions on Computers},
  year = {2006},
  volume = {5},
  number = {11},
  pages = {2787-2792},
  url = {https://www.dora.dmu.ac.uk/handle/2086/1002}
}
Alqrainy, S., Ayesh, A. and Almuaidi, H. Automated Tagging System And Tagset Design For Arabic Text 2010 International Journal of Computational Linguistics Research
Vol. 1(2), pp. 55-62 
article  
BibTeX:
@article{Alqrainy2010,
  author = {Alqrainy, Shihadeh and Ayesh, Aladddin and Almuaidi, Hasan},
  title = {Automated Tagging System And Tagset Design For Arabic Text},
  journal = {International Journal of Computational Linguistics Research},
  year = {2010},
  volume = {1},
  number = {2},
  pages = {55-62}
}
Alruily, M., Ayesh, A. and Zedan, H. Arabic Language in the Context of Information Extraction Task 2011 International Journal of Computational Linguistics Research
Vol. 2(2), pp. 83-90 
article  
BibTeX:
@article{Alruily2011,
  author = {Alruily, Meshrif and Ayesh, Aladdin and Zedan, Hussien},
  title = {Arabic Language in the Context of Information Extraction Task},
  journal = {International Journal of Computational Linguistics Research},
  year = {2011},
  volume = {2},
  number = {2},
  pages = {83-90}
}
Alruily, M., Ayesh, A. and Zedan, H. Crime profiling for the Arabic language using computational linguistic techniques 2014 Information Processing & Management
Vol. 50(2), pp. 315 - 341 
article DOI URL 
Abstract: Arabic is a widely spoken language but few mining tools have been developed to process Arabic text. This paper examines the crime domain in the Arabic language (unstructured text) using text mining techniques. The development and application of a Crime Profiling System (CPS) is presented. The system is able to extract meaningful information, in this case the type of crime, location and nationality, from Arabic language crime news reports. The system has two unique attributes; firstly, information extraction that depends on local grammar, and secondly, dictionaries that can be automatically generated. It is shown that the CPS improves the quality of the data through reduction where only meaningful information is retained. Moreover, the Self Organising Map (SOM) approach is adopted in order to perform the clustering of the crime reports, based on crime type. This clustering technique is improved because only refined data containing meaningful keywords extracted through the information extraction process are inputted into it, i.e. the data are cleansed by removing noise. The proposed system is validated through experiments using a corpus collated from different sources; it was not used during system development. Precision, recall and F-measure are used to evaluate the performance of the proposed information extraction approach. Also, comparisons are conducted with other systems. In order to evaluate the clustering performance, three parameters are used: data size, loading time and quantization error.

Keywords -- Arabic language; Crime domain; Pattern recognition; Clustering; Information extraction; Syntactic analysis
BibTeX:
@article{Alruily2014,
  author = {Meshrif Alruily and Aladdin Ayesh and Hussein Zedan},
  title = {Crime profiling for the Arabic language using computational linguistic techniques},
  journal = {Information Processing & Management },
  year = {2014},
  volume = {50},
  number = {2},
  pages = {315 - 341},
  url = {http://www.sciencedirect.com/science/article/pii/S0306457313000988},
  doi = {http://doi.org/10.1016/j.ipm.2013.09.001}
}
AlSerhan, H.M. and Ayesh, A.S. An Application of Neural Network for Extracting Arabic Word Roots 2006 WSEAS Transactions on Computers
Vol. 5(11), pp. 2623-2627 
article URL 
Abstract: A good Arabic stemming algorithm is needed in many applications such as: natural
language processing, computerized language translation, compression of data, spells checking and
in information retrieval. Arabic language is considered to be one of the worldÕs most complicated
languages due to the complexity of its morphological structure, so it has huge morphological
variations and rules. Majority of the existing Arabic stemming algorithms use a large set of
rules and many algorithms also refer to existing pattern and root files. This requires large
storage and access time. In this paper, a novel numerical approach for stemming Arabic words
is described. The present approach attempts to exploit numerical relations between characters
by using backpropagation neural network. The empirical positive results show that the stemming
problem can be solved by neural network.

Keywords:- Backpropagation Neural Networks, Stemming, Natural Language Processing
(NLP), Arabic Language.
BibTeX:
@article{AlSerhan2006a,
  author = {AlSerhan, Hasan M. and Ayesh, Aladdin S.},
  title = {An Application of Neural Network for Extracting Arabic Word Roots},
  journal = {WSEAS Transactions on Computers},
  year = {2006},
  volume = {5},
  number = {11},
  pages = {2623-2627},
  url = {http://www.wseas.us/e-library/conferences/2006cscc/papers/534-998.pdf}
}
AlZahrani, S., Ayesh, A. and Zedan, H. Multi-agent Based Dynamic e-Learning Environment 2009 International Journal of Information Technology and Web Engineering (IJITWE)
Vol. 4, issue 2, pp. 61-77 
article URL 
BibTeX:
@article{AlZahrani2009,
  author = {AlZahrani, S. and Ayesh, A. and Zedan, H.},
  title = {Multi-agent Based Dynamic e-Learning Environment },
  journal = {International Journal of Information Technology and Web Engineering (IJITWE)},
  year = {2009},
  volume = {4, issue 2},
  pages = {61-77},
  url = {http://www.scopus.com/record/display.url?eid=2-s2.0-70249121476&origin=inward&txGid=A584A50C68AE72A3B5A07C012FE89AE9.mw4ft95QGjz1tIFG9A1uw%3a30}
}
Ayesh, A. Guest editorial: Perception and Emotion Based Reasoning Special Issue 2003 Informatica
Vol. 27(2), pp. 117-118 
article URL 
BibTeX:
@article{Ayesh2003,
  author = {Ayesh, Aladdin},
  title = {Guest editorial: Perception and Emotion Based Reasoning Special Issue},
  journal = {Informatica},
  year = {2003},
  volume = {27},
  number = {2},
  pages = {117-118},
  url = {http://www.informatica.si/PDF/Informatica_2003_2.pdf}
}
Ayesh, A. Perception and Emotion Based Reasoning: A Connectionist Approach 2003 Informatica
Vol. 27(2), pp. 119-126 
article URL 
Abstract: Our reasoning process uses and is influenced by our perception model of the environment stimuli and by our memorization of related experiences, beliefs, and emotions that are associated with each stimulus, whilst taking in considerations other factors such as time and space. These two processes of modelling and memorization happen in real time while interspersing with each other in a manner they almost seem as if they are one process. This is often referred to as cognition. In this paper we provide a simplified model of this complicated relationship between emotions, perceptions and our behaviour to produce a model that can be used in software agents and humanized robots. (pp. 119-126)

Keywords: Connectionism, Cognitive Maps, Perception, Emotions, Automated Reasoning, Reasoning about Actions
BibTeX:
@article{Ayesh2003a,
  author = {Ayesh, Aladdin},
  title = {Perception and Emotion Based Reasoning: A Connectionist Approach},
  journal = {Informatica},
  year = {2003},
  volume = {27},
  number = {2},
  pages = {119-126},
  url = {http://www.informatica.si/PDF/Informatica_2003_2.pdf}
}
Ayesh, A. Integrative Cognitive-Causation Maps: Preliminary Report 2009 ICGST International Journal on Artificial Intelligence and Machine Learning, AIML
Vol. 9(1), pp. 35-40 
article URL 
Abstract: One of the main concerns of reasoning about space is the recognition of objects. This recognition can be seen as mere pattern recognition through some form of template matching. However, the necessarily recognition for interactive cognitive systems requires some form of understanding of the object and give its existence in the environment a meaning represented by its relations to other existences in that environment. Data anchoring and symbol grounding aim to deliver such understanding or cognitive recognition of objects and space. In this paper, we take this further by proposing a form to define objects in space based on frames, cognitive maps, Aristotle causation, and cognition especially emotions.
BibTeX:
@article{Ayesh2009b,
  author = {Ayesh, A.},
  title = {Integrative Cognitive-Causation Maps: Preliminary Report},
  journal = {ICGST International Journal on Artificial Intelligence and Machine Learning, AIML},
  year = {2009},
  volume = {9},
  number = {1},
  pages = {35--40},
  url = {http://www.icgst.com/paper.aspx?pid=P1120835001}
}
Ayesh, A. Emotionally Expressive Music based Interaction Language for Social Robots 2009 ICGST International Journal on Automation, Robotics and Autonomous Systems
Vol. 09(1), pp. 1-10 
article URL 
Abstract: Sound is perhaps the most elementary and yet common communication vehicle used by humans and animals alike. Similarly, reactive robots that are based on animal intelligence require real-time simple communication mechanisms to imitate their animal examples. They would require their own natural language in which sound blocks can be contained in meaningful structures without the complexity of human's natural language. Furthermore, this natural language of animal like robots should be scalable to evolve depending on the available resources to each species of robots. In this paper, we propose such language based on tonal music vocabulary and drawing on recent relevant research. Specifications of the language and case studies of using these specifications are provided to demonstrate its applicability in multi-robots and human-robot interactions.
BibTeX:
@article{Ayesh2009c,
  author = {Ayesh, Aladdin},
  title = {Emotionally Expressive Music based Interaction Language for Social Robots},
  journal = {ICGST International Journal on Automation, Robotics and Autonomous Systems},
  year = {2009},
  volume = {09},
  number = {1},
  pages = {1-10},
  url = {http://www.icgst.com/paper.aspx?pid=P1130824001}
}
Ayesh, A. Swarms-Based Emotions Modelling 2009 Int. J. Bio-Inspired Computation
Vol. 1(Issue 1/2), pp. 118-124 
article DOI URL 
Abstract: Emotion modelling started to attract the interest of researchers from knowledge representation, reasoning and decision-making fields. The advances in cognitive systems development and applications encouraged this interest. Whilst there are many psychological theories and models of emotions, there were few that made the translation to computational models. In addition, the physiological elements of emotions and emotional energies were not considered in computational terms at all whilst they would be of great benefits in developing synthetic believable characters in games and virtual realities. This paper aims to break though and move beyond the Darwinian based computational models of emotions by proposing a swarms-based emotional model. This model will be shown to be more of a framework for implementing a variety of particle based emotional algorithms.
BibTeX:
@article{Ayesh2009d,
  author = {Ayesh, Aladdin},
  title = {Swarms-Based Emotions Modelling},
  journal = {Int. J. Bio-Inspired Computation},
  year = {2009},
  volume = {1},
  number = {Issue 1/2},
  pages = {118-124},
  url = {http://www.inderscience.com/info/inarticle.php?artid=22780},
  doi = {http://doi.org/10.1504/IJBIC.2009.022780}
}
Ayesh, A. and Sheta, A. Editorial: Special Issue on Bio-Inspired Computation for Engineering Applications 2010 Int. J. Bio-Inspired Computation
Vol. 2(6), pp. 363-364 
article  
BibTeX:
@article{Ayesh2010,
  author = {Ayesh, Aladdin and Sheta, A.},
  title = {Editorial: Special Issue on Bio-Inspired Computation for Engineering Applications },
  journal = {Int. J. Bio-Inspired Computation},
  year = {2010},
  volume = {2},
  number = {6},
  pages = {363-364}
}
Ayesh, A. AI in Games: Can intelligence be defined as abstract mental processes or does the body we inhabit play a role in that intelligence? 2013 ITNOW
Vol. 55 (4), pp. 18-19. 
article  
BibTeX:
@article{Ayesh2013,
  author = {Ayesh, Aladdin},
  title = {AI in Games: Can intelligence be defined as abstract mental processes or does the body we inhabit play a role in that intelligence?},
  journal = {ITNOW},
  year = {2013},
  volume = {55 },
  number = {4},
  pages = {18-19.}
}
Ayesh, A., Joseph, C., Perril, S. and Thomas, S. Aesthetics of a Robot: Case study on AIBO Dog Robots for Buddy-ing Devices 2014 Journal of Intelligent Computing
Vol. 5(1), pp. 1-15 
article URL 
Abstract: The more embedded and ubiquitous computing devices are introduced in everyday domestic applications, the more important the aesthetics of interfaces become. In this paper, our interest is the aesthetics of domestic robots as an example of buddy-ing physical devices. We report on observations of using Sony AIBO dogs in outreach programs to new and untraditional user groups. The sessions were part of Narrative Lab workshops and Institute of Creative Technology (IOCT) Salon workshops. In the case of Narrative Lab workshop, AIBO robots were introduced to writers who were exploring new means of inspiration and writing in new media. A more elaborate study was conducted with undergraduate Humanities students. The observations in this paper will focus on the reactions towards the dog look and behaviour. It explores the relationships between the behaviours demonstrated, the physical appearance of the robot, and the users‰Ûª perceptions. We call upon aesthetics theories, aesthetics of interfaces, aesthetic metrics, and art theories research in our analysis of these observations. The outcome will be in the form of a framework to assess physical domestic devices design for buddy-ing interaction leading to design guidelines.
BibTeX:
@article{Ayesh2014,
  author = {Aladdin Ayesh and Chris Joseph and Simon Perril and Sue Thomas},
  title = {Aesthetics of a Robot: Case study on AIBO Dog Robots for Buddy-ing Devices},
  journal = {Journal of Intelligent Computing},
  year = {2014},
  volume = {5},
  number = {1},
  pages = {1-15},
  url = {http://www.dline.info/jic/v5n1.php}
}
Ayesh, A. Serious Gaming 2014 ITNOW
Vol. 56(1), pp. 60-61 
article DOI URL 
BibTeX:
@article{Ayesh2014a,
  author = {Ayesh, Aladdin},
  title = {Serious Gaming},
  journal = {ITNOW},
  year = {2014},
  volume = {56},
  number = {1},
  pages = {60-61},
  url = {http://itnow.oxfordjournals.org/content/56/1/60.abstract},
  doi = {http://doi.org/10.1093/itnow/bwu028}
}
Ayesh, A. and Blewitt, W. Models for Computational Emotions from Psychological Theories Using Type-II Fuzzy Logic 2015 Cognitive Computation
Vol. 7(3), pp. 309-332 
article DOI URL 
Abstract: Emotions have been subject of research and deliberation in philosophy and psychology mainstream for a long time. In contrast, emotions have only emerged in artificial intelligence research as a serious topic in the last two decades. Year 2000, in particular, experienced a shift in attitude towards emotions and their relationship to human reasoning and humanÐcomputer interaction. This paper presents the second part of our research in this area, which aimed at interpreting psychological theories of emotions computationally and translating them into machine-implementable models. We continue with the previously selected psychological theories, namely Millenson (the psychology of emotion: theories of emotion perspective, Wiley, Hoboken, 1967) and Scherer (Soc Sci Inf 44(4):695Ð729, 2005), with exploration of the nature of emotional state. Fuzzy logic (FL) type-II is utilised here as a tool to capture the finer details of the psychological and computational interpretations of these theories. The paper presents a full theoretical formalism in FL type-II accompanied by implementation, using the De Montfort University Type-II Fuzzy Logic Toolbox, and detailed discussion of the complexity of the modelsÕ computational interpretation and implementation.
BibTeX:
@article{Ayesh2015,
  author = {Ayesh, Aladdin and Blewitt, William},
  title = {Models for Computational Emotions from Psychological Theories Using Type-II Fuzzy Logic},
  journal = {Cognitive Computation},
  publisher = {Springer US},
  year = {2015},
  volume = {7},
  number = {3},
  pages = {309-332},
  url = {http://dx.doi.org/10.1007/s12559-014-9286-8},
  doi = {http://doi.org/10.1007/s12559-014-9286-8}
}
Ayesh, A. and Blewitt, W. Models for Computational Emotions from Psychological Theories Using Type I Fuzzy Logic 2015 Cognitive Computation
Vol. 7(3), pp. 285-308 
article DOI URL 
Abstract: Emotions have been subject of research and deliberation in philosophy and psychology mainstream for a long time. In contrast, emotions have only emerged in artificial intelligence research as a serious topic in the last two decades. Year 2000, in particular, experienced a shift in attitude towards emotions and their relationship to human reasoning and humanÐcomputer interaction. This shift continued slowly but surely over the years and computational emotions can be seen as a mainstream research topic within artificial intelligence and cognitive systems. In this paper, we attempt to contribute to the development of this area by interpreting psychological theories of emotions computationally and translating them into machine implementable models. These models are generic and application independent which most of the current computational emotions models lack. We have selected two psychological theories, namely Millenson (The psychology of emotion: theories of emotion perspective, vol 4. Wiley, New Jersey, pp 35Ð36, 1967) and Scherer (Soc Sci Inf 44(4):695Ð729, 2005), that lend themselves, with varying degrees of difficulty, to the computational interpretation. Fuzzy logic was utilised as a tool to keep the fidelity of psychological interpretation of emotion. The paper discusses in details the computational interpretation of these psychological models and presents a full theoretical formalism in fuzzy logic type 1, implementation and detailed analysis of this psychologically grounded generic computational models.
BibTeX:
@article{Ayesh2015a,
  author = {Ayesh, Aladdin and Blewitt, William},
  title = {Models for Computational Emotions from Psychological Theories Using Type I Fuzzy Logic},
  journal = {Cognitive Computation},
  publisher = {Springer US},
  year = {2015},
  volume = {7},
  number = {3},
  pages = {285-308},
  url = {http://dx.doi.org/10.1007/s12559-014-9287-7},
  doi = {http://doi.org/10.1007/s12559-014-9287-7}
}
Ayesh, A., Arevalillo-Herráez, M. and Ferri, F.J. Towards Psychologically based Personalised Modelling of Emotions Using Associative Classifiers 2016 International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)
Vol. 10(2), pp. 52-64 
article DOI  
BibTeX:
@article{Ayesh2016,
  author = {Ayesh, Aladdin and Arevalillo-Herráez, Miguel and Ferri, Francesc J.},
  title = {Towards Psychologically based Personalised Modelling of Emotions Using Associative Classifiers},
  journal = {International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)},
  year = {2016},
  volume = {10},
  number = {2},
  pages = {52-64},
  doi = {http://doi.org/10.4018/IJCINI.2016040103}
}
Braik, M., Sheta, A. and Ayesh, A. Image Enhancement Using Particle Swarm Optimization 2007 The International Journal of Innovative Computing and Applications (IJICA)
Vol. 1(2), pp. 138 - 145 
article URL 
Abstract: Particle Swarm Optimisation (PSO) algorithm represents a new approach to optimisation problems. In this paper, image enhancement is presented as an optimisation problem to which PSO is applied. This application is done within a nouvelle automatic image enhancement technique encompassing a real-coded particle swarms algorithm. The enhancement process is a non-linear optimisation problem with several constraints. Based upon a mathematical model of the social interactions of swarms, the algorithm has been shown to be effective at finding good solutions of the enhancement problem by adapting the parameters of a novel extension to a local enhancement technique similar to statistical scaling. This enhances the contrast and detail in the image according to an objective fitness criterion. The proposed algorithm has been compared with Genetic Algorithms (GAs) to a number of tested images. The obtained results using grey scale images indicate that PSO is better than GAs in terms of the computational time and both the objective evaluation and maximisation of the number of pixels in the edges of the tested images.
BibTeX:
@article{Braik2007,
  author = {Braik, Malik and Sheta, Alaa and Ayesh, Aladdin},
  title = {Image Enhancement Using Particle Swarm Optimization},
  journal = {The International Journal of Innovative Computing and Applications (IJICA)},
  publisher = {Inderscience Publishers},
  year = {2007},
  volume = {1},
  number = {2},
  pages = {138 - 145},
  url = {http://www.inderscience.com/search/index.php?action=record&rec_id=16795&prevQuery=&ps=10&m=or}
}
Daoud, M.S., Ayesh, A., Al-Fayoumi, M. and Hopgood, A.A. Location Prediction Based on a Sector Snapshot for Location-Based Services 2014 Journal of Network and Systems Management
Vol. 22(1), pp. 23-49 
article DOI URL 
Abstract: In location-based services (LBSs), the service is provided based on the usersÕ locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. Such techniques are the new Markov-based mobility prediction (NMMP) and prediction location model (PLM) that deal with inner cell structure and different levels of prediction, respectively. The NMMP and PLM techniques suffer from complex computation, accuracy rate regression, and insufficient accuracy. In this paper, a novel cell splitting algorithm is proposed. Also, a new prediction technique is introduced. The cell splitting is universal so it can be applied to all types of cells. Meanwhile, this algorithm is implemented to the Micro cell in parallel with the new prediction technique. The prediction technique, compared with two classic prediction techniques and the experimental results, show the effectiveness and robustness of the new splitting algorithm and prediction technique.
BibTeX:
@article{Daoud2014,
  author = {Daoud, Mohammad Sharif and Ayesh, Aladdin and Al-Fayoumi, Mustafa and Hopgood , Adrian A.},
  title = {Location Prediction Based on a Sector Snapshot for Location-Based Services},
  journal = {Journal of Network and Systems Management},
  year = {2014},
  volume = {22},
  number = {1},
  pages = {23-49},
  url = {http://link.springer.com/article/10.1007%2Fs10922-012-9258-9},
  doi = {http://doi.org/10.1007/s10922-012-9258-9}
}
Lim, Y.M., Chee, K.N. and Ayesh, A. Socio-Demographic Differences In The Perceptions Of Learning Management System (Lms) Design 2013 International Journal of Software Engineering & Applications (IJSEA)
Vol. 4(5), pp. 15-35 
article URL 
Abstract: Learner centred design (LCD) focuses on creating an e-learning system that can fulfil individual needs
through personalization, nevertheless there are still many technical challenges. Besides, losing balanced
focus on both of the learners and the instructors does not help to create a successful e-learning system.
User-centred design helps to improve the usability of a system as it integrates requirements and user
interface designs based on usersÕ needs. The findings of this research prove that even the users are
provided with the same LMS, not everyone has the same perceptions or tolerance levels of the seven design
factors that may cause frustrations to the users, and not everyone has the same satisfaction level of
navigation experience and interface design. It is important for the LMS developers to understand that the
variations between roles, genders, experiences and ages exist and should not be ignored when designing
the system.

KEYWORDS: Learning Management System, Socio-demographics Differences, User-centred Design, User Interface
Design, User Satisfactions
BibTeX:
@article{Lim2013a,
  author = {Lim, Yee Mei and Chee, Keh Niang and Ayesh, Aladdin},
  title = {Socio-Demographic Differences In The Perceptions Of Learning Management System (Lms) Design},
  journal = {International Journal of Software Engineering & Applications (IJSEA)},
  year = {2013},
  volume = {4},
  number = {5},
  pages = {15-35},
  url = {http://airccse.org/journal/ijsea/papers/4513ijsea02.pdf}
}
Lim, Y., Ayesh, A. and Stacey, M. The Motivation/Attitude-driven Behavior (MADB) Model in E-Learning and the Effects on Mouse Dynamics 2016 International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)
Vol. 10(3), pp. 38-52 
article  
BibTeX:
@article{Lim2016,
  author = {Lim, YeeMei and Ayesh, Aladdin and Stacey, Martin},
  title = {The Motivation/Attitude-driven Behavior (MADB) Model in E-Learning and the Effects on Mouse Dynamics},
  journal = {International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)},
  year = {2016},
  volume = {10},
  number = {3},
  pages = {38-52}
}
Mu noz-Salinas, R., Aguirre, E., García-Silvente, M., Ayesh, A. and Góngora, M. Multi-Agent System For People Detection And Tracking Using Stereo Vision In Mobile Robots 2009 Robotica
Vol. 27(05), pp. 715-727 
article DOI URL 
Abstract: People detection and tracking are essential capabilities in order to achieve a natural humanÐrobot interaction. A great portion of the research in that area has been focused on monocular techniques. However, the use of stereo vision for these purposes concentrates a great interest nowadays. This paper presents a multi-agent system that implements a basic set of perceptual-motor skills providing mobile robots with primitive interaction capabilities. The skills designed use stereo and ultrasound information to enable mobile robots to (i) detect an interested user who desires to interact with the robot, (ii) keep track of the user while they move in the environment without confusing them with other people, and (iii) follow the user along the environment avoiding obstacles in the way. The system presented has been evaluated in several real-life experiments achieving good results and real-time performance on modest computers.
BibTeX:
@article{Munoz-Salinas2009,
  author = {Muñoz-Salinas, R. and Aguirre, E. and García-Silvente, M. and Ayesh, A. and Góngora, M.},
  title = {Multi-Agent System For People Detection And Tracking Using Stereo Vision In Mobile Robots},
  journal = {Robotica},
  year = {2009},
  volume = {27},
  number = {05},
  pages = {715-727},
  url = {http://journals.cambridge.org/action/displayAbstract?fromPage=online&aid=6047864},
  doi = {http://doi.org/10.1017/S0263574708005092}
}
Obaidy, M.A. and Ayesh, A. Energy efficient algorithm for swarmed sensors networks 2015 Sustainable Computing: Informatics and Systems
Vol. 5, pp. 54 - 63 
article DOI URL 
Abstract: Abstract In this work we are presenting the design of an intelligent hybrid optimization algorithm which is based on Evolutionary Computation and Swarm Intelligence to increase the life time of mobile wireless sensor networks (WSNs). It is composed of two phases; Phase-1 is designed to divide the sensor nodes into independent clusters by using Genetic Algorithms (GAs) to minimise the overall communication distance between the sensor-nodes and the sink-point. This will decrease the energy consumption for the entire network. Phase-2 which is based on Particle Swarm Optimization (PSO) is designed to keep the optimum distribution of sensors while the mobile sensor network is directed as a swarm to achieve a given goal. One of the main strengths in the presented algorithm is that the number of clusters within the sensor network is not predefined, this gives more flexibility for the nodesÕ deployment in the sensor network. Another strength is that sensorsÕ density is not necessary to be uniformly distributed among the clusters, since in some applications constraints, the sensors need to be deployed in different densities depending on the nature of the application domain. Although traditionally Wireless Sensor Network have been regarded as static sensor arrays used mainly for environmental monitoring, recently, its applications have undergone a paradigm shift from static to more dynamic environments, where nodes are attached to moving objects, people or animals. Applications that use WSNs\ in motion are broad, ranging from transport and logistics to animal monitoring, health care and military. These application domains have a number of characteristics that challenge the algorithmic design of WSNs.
BibTeX:
@article{Obaidy2015,
  author = {Mohaned Al. Obaidy and Aladdin Ayesh},
  title = {Energy efficient algorithm for swarmed sensors networks },
  journal = {Sustainable Computing: Informatics and Systems },
  year = {2015},
  volume = {5},
  pages = {54 - 63},
  url = {http://www.sciencedirect.com/science/article/pii/S2210537914000778},
  doi = {http://doi.org/10.1016/j.suscom.2014.09.004}
}
Sheta, A., Ayesh, A. and Rine, D. Evaluating Software Cost Estimation Models using Particle Swarm Optimization and Fuzzy Logic for NASA Projects: A Comparative Study 2010 Int. J. Bio-Inspired Computation
Vol. 2(6), pp. 365-373 
article DOI URL 
Abstract: Bidding for contracts depends mainly on estimated costs of a given project, which makes an accurate estimation of effort and time required very important with great impact on budget computation and project success. Inaccurate estimates are likely lead to one or all of the following negative outcomes: failure in making a profit, increased probability of incomplete project and delay of project delivery date. In this paper, we provide a comparison between models developed for software cost estimation using particle swarm optimisation (PSO) algorithm, fuzzy logic (FL), and well-known cost estimation models such as Halstead, Walston-Felix, Bailey-Basili and Doty models. The performance of the developed models is evaluated based on the mean magnitude of relative error (MMRE) for NASA software projects.
BibTeX:
@article{Sheta2010,
  author = {Sheta, A. and Ayesh, Aladdin and Rine, David},
  title = {Evaluating Software Cost Estimation Models using Particle Swarm Optimization and Fuzzy Logic for NASA Projects: A Comparative Study },
  journal = {Int. J. Bio-Inspired Computation},
  year = {2010},
  volume = {2},
  number = {6},
  pages = {365-373},
  url = {http://www.inderscience.com/offer.php?id=37016},
  doi = {http://doi.org/10.1504/IJBIC.2010.037016}
}
Zahary, A. and Ayesh, A. A Comparative Study for Reactive and Proactive Routing Protocols in Mobile Adhoc Networks 2010 Journal of Intelligent Computing
Vol. 1(1), pp. 20-29 
article URL 
BibTeX:
@article{Zahary2010,
  author = {Zahary, Ammar and Ayesh, Aladdin},
  title = {A Comparative Study for Reactive and Proactive Routing Protocols in Mobile Adhoc Networks},
  journal = {Journal of Intelligent Computing},
  year = {2010},
  volume = {1},
  number = {1},
  pages = {20-29},
  url = {http://dline.info/jic/v1n1.php}
}
Zahary, A. and Ayesh, A. An Analytical Review for Multipath Routing in Mobile Ad Hoc Networks 2010 International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)
Vol. 5(2), pp. 69-85 
article DOI URL 
Abstract: Multipath routing is a new extension to many traditional routing protocols in MANETs. Using multipath routing in MANETs can save energy, reduce frequent routing update, enhance data transmission rates, and increase wireless network bandwidth. This paper introduces an analytical review for multipath routing in MANETs covering its applications, classification, and design issues. A simulation-based analytical evaluation is presented in this review using NS2 for AODV and its multipath extensions namely, AOMDV and MRAODV against two traditional multipath routing protocols namely, DSR and TORA. Simulation results show that traditional multipath protocols outperform the single path version of AODV in terms of packet delivery fraction, routing packets overhead, and throughput while AODV has better performance in terms of average end-to-end delay. AODV extensions outperforms traditional protocols in terms of packet delivery fraction and average end-to-end delay.
BibTeX:
@article{Zahary2010a,
  author = {Zahary, Ammar and Ayesh, Aladdin},
  title = {An Analytical Review for Multipath Routing in Mobile Ad Hoc Networks},
  journal = {International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC)},
  year = {2010},
  volume = {5},
  number = {2},
  pages = {69-85},
  url = {http://www.inderscience.com/offer.php?id=31223},
  doi = {http://doi.org/10.1504/IJAHUC.2010.031223}
}
Ayesh, A. Essential Dynamic HTML Fast 2000   book URL 
Abstract: Essential Dynamic HTML fast provides a step-by-step approach to DHTML and its techniques - providing everything needed to get a project up and running fast. In addition, it includes lots of tips on how to manage a dynamic site. Using a progressive approach, it describes how to build a dynamic website, starting from data management, to incorporating multimedia effects, audio, video, and animations. It explores the use of dynamic contents, dynamic positioning, the DOM (Document Object Model), and Scripting.
Topics covered include: Common HTML Tags, Data Management, Frames, Interactive Sites, Multimedia Effects, Cascade Style Sheets (CSS), Dynamic Contents, Dynamic Positioning, Document Object Model (DOM), Layers, Managing Dynamic Sites: from layout to after design, Scripting.
BibTeX:
@book{Ayesh2000b,
  author = {Ayesh, A.},
  title = {Essential Dynamic HTML Fast},
  publisher = {Springer-Verlag},
  year = {2000},
  url = {http://www.amazon.co.uk/Essential-Dynamic-HTML-fast-Interactive/dp/1852336269}
}
Ayesh, A. Essential UML Fast 2002   book URL 
Abstract: Essential UML fast introduces the concepts of object-oriented analysis, design and programming, using the Unified Modeling Language (UML). UML is one of the best known modeling languages in the object-oriented software development world, and is fast becoming a standard amongst OO software developers. The book contains plenty of examples and detailed illustrations, making it easy for readers to get up and running with UML fast. In providing these examples the author relies on one of the well known use case tools, Select Enterprise. Advice is given on how to set up Select Enterprise as well as how to use it to speed up the modeling process of practical software.
BibTeX:
@book{Ayesh2002,
  author = {Ayesh, A.},
  title = {Essential UML Fast},
  publisher = {Springer-Verlag},
  year = {2002},
  url = {http://www.amazon.co.uk/Essential-UMLTm-fast-Applications-Development/dp/1852334134}
}
Rausch, P., Sheta, A.F. and Ayesh, A. Business Intelligence and Performance Management: Theory, Systems and Industrial Applications 2013   book URL 
BibTeX:
@book{Rausch2013,
  author = {Rausch, Peter and Sheta, Alaa F and Ayesh, Aladdin},
  title = {Business Intelligence and Performance Management: Theory, Systems and Industrial Applications},
  publisher = {Springer},
  year = {2013},
  url = {http://link.springer.com/book/10.1007%2F978-1-4471-4866-1}
}
Lim, Y.M., Ayesh, A., Stacey, M. and Tan, L.P. The Effects of Task Demand and External Stimuli on Learner's Stress Perception and Job Performance 2017 Empowering 21st Century Learners Through Holistic and Enterprising Learning: Selected Papers from Tunku Abdul Rahman University College International Conference 2016, pp. 89-101  inbook DOI URL 
BibTeX:
@inbook{Lim2017,
  author = {Lim, Yee Mei and Ayesh, Aladdin and Stacey, Martin and Tan, Li Peng},
  title = {The Effects of Task Demand and External Stimuli on Learner's Stress Perception and Job Performance},
  booktitle = {Empowering 21st Century Learners Through Holistic and Enterprising Learning: Selected Papers from Tunku Abdul Rahman University College International Conference 2016},
  publisher = {Springer Singapore},
  year = {2017},
  pages = {89--101},
  url = {http://dx.doi.org/10.1007/978-981-10-4241-6_10},
  doi = {http://doi.org/10.1007/978-981-10-4241-6_10}
}
Al-Azawi, R., Ayesh, A., Kenny, I. and Al-Masruri, K. Towards An AOSE: Game Development Methodology 2013
Vol. 217Distributed Computing and Artificial Intelligence, pp. 493-501 
incollection URL 
Abstract: Over the last decade, many methodologies for developing agent based systems have been developed, however no complete evaluation frameworks have been provided. Agent Oriented Software Engineering (AOSE) methodologies enhance the ability of software engineering to develop complex applications such as games; whilst it can be difficult for researchers to select an AOSE methodology suitable for a specific application. In this paper a new framework for evaluating different types of AOSE, such as qualitative and quantitative evaluations will be introduced. The framework assists researchers to select a preferable AOSE which could be used in a game development methodology. Furthermore the results from this evaluation framework can be used to determine the existing gaps in each methodology.
BibTeX:
@incollection{Al-Azawi2013c,
  author = {Al-Azawi, Rula and Ayesh, Aladdin and Kenny, Ian and Al-Masruri, KhalfanAbdullah},
  title = {Towards An AOSE: Game Development Methodology},
  booktitle = {Distributed Computing and Artificial Intelligence},
  publisher = {Springer International Publishing},
  year = {2013},
  volume = {217},
  pages = {493-501},
  url = {http://dx.doi.org/10.1007/978-3-319-00551-5_59}
}
Alruily, M., Ayesh, A. and Zedan, H. Automatically constructing dictionaries for extracting meaningful crime information from Arabic text 2010
Vol. 215Frontiers in Artificial Intelligence and Applications, pp. 1139-1140 
incollection DOI URL 
Abstract: Arabic is widely spoken language but very few text mining tools have been developed for Arabic language. This paper presents an algorithm for automatically building dictionaries. The target domain is crime profiling. The corpus is mined for crime type, location and nationality. This work is then validated through three experiments, the results of which show that the algorithm developed here is promising. © 2010 The authors and IOS Press. All rights reserved.
BibTeX:
@incollection{Alruily2010a,
  author = {Alruily, M. and Ayesh, A. and Zedan, H.},
  title = {Automatically constructing dictionaries for extracting meaningful crime information from Arabic text},
  booktitle = {Frontiers in Artificial Intelligence and Applications},
  publisher = {IOS Press},
  year = {2010},
  volume = {215},
  pages = {1139-1140},
  url = {http://ebooks.iospress.nl/publication/6003},
  doi = {http://doi.org/10.3233/978-1-60750-606-5-1139}
}
AlZahrani, S., Ayesh, A. and Zedan, H. Multi-Agent Based Dynamic E-Learning Environment 2011 Web Engineered Applications for Evolving Organizations: Emerging Knowledge, pp. 142-158  incollection URL 
Abstract: Grids are increasingly being used in applications, one of which is e-learning. As most of business and academic institutions (universities) and training centres around the world have adopted this technology in order to create, deliver and manage their learning materials through the Web, the subject has become the focus of investigate. Still, collaboration between these institutions and centres is limited. Existing technologies such as grid, Web services and agents are promising better results. In this article the authors support building our architecture Regionally Distributed Architecture for Dynamic e-Learning Environment (RDADeLE) by combining those technologies via Java Agent DEvelopment Framework (JADE). By describing these agents in details, they prove that agents can be implemented to work well to extend the autonomy and interoperability for learning objects as data grid.
BibTeX:
@incollection{AlZahrani2011,
  author = {AlZahrani, Saleh and Ayesh, Aladdin and Zedan, Hussein},
  title = {Multi-Agent Based Dynamic E-Learning Environment},
  booktitle = {Web Engineered Applications for Evolving Organizations: Emerging Knowledge},
  publisher = {IGI Global},
  year = {2011},
  pages = {142-158},
  url = {http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-523-0.ch009}
}
Arevalillo-Herráez, M., Arnau, D., González-Calero, J. and Ayesh, A. Domain Specific Knowledge Representation for an Intelligent Tutoring System to Teach Algebraic Reasoning 2012 Intelligent Tutoring Systems, pp. 630-631  incollection DOI URL 
BibTeX:
@incollection{Arevalillo-Herraez2012,
  author = {Arevalillo-Herráez, M. and Arnau, D. and González-Calero, J. and Ayesh, A.},
  title = {Domain Specific Knowledge Representation for an Intelligent Tutoring System to Teach Algebraic Reasoning},
  booktitle = {Intelligent Tutoring Systems},
  publisher = {Springer Berlin/Heidelberg},
  year = {2012},
  pages = {630-631},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-642-30950-2_95},
  doi = {http://doi.org/10.1007/978-3-642-30950-2_95}
}
Ayesh, A. and Kelleher, G. Reasoning About Conditional Effects in Control Systems via Directed Domain Constraints 1998 Advances in Manufacturing Technology - XII, pp. 721-726  incollection  
BibTeX:
@incollection{Ayesh1998,
  author = {Ayesh, A. and Kelleher, G.},
  title = {Reasoning About Conditional Effects in Control Systems via Directed Domain Constraints},
  booktitle = {Advances in Manufacturing Technology - XII},
  publisher = {Professional Engineering Publishing},
  year = {1998},
  pages = {721-726}
}
Ayesh, A. Thinking-Learning by Argument 2001 Intelligent Agent Technology: Research and Development, pp. 230-234  incollection DOI URL 
Abstract: Humans argue all the time. We may argue with one's self, with a partner or even with some one we have just met. The argument can take a decision-making form, discussion form, thinking form or in some cases it could be for the argument sake. In this paper we describe a system that uses three object-oriented components referred to as cells to utilize the argument concept to enable thinking-learning process to take place.


Read More: http://www.worldscientific.com/doi/abs/10.1142/9789812811042_0031
BibTeX:
@incollection{Ayesh2001b,
  author = {Ayesh, A.},
  title = {Thinking-Learning by Argument},
  booktitle = {Intelligent Agent Technology: Research and Development},
  publisher = {World Scientific},
  year = {2001},
  pages = {230-234},
  url = {http://www.worldscientific.com/doi/abs/10.1142/9789812811042_0031},
  doi = {http://doi.org/10.1142/9789812811042_0031}
}
Ayesh, A. Emotion-Based Machine Learning 2012 Encyclopedia of the Sciences of Learning, pp. 1137-1139  incollection DOI URL 
BibTeX:
@incollection{Ayesh2012,
  author = {Ayesh, A.},
  title = {Emotion-Based Machine Learning},
  booktitle = {Encyclopedia of the Sciences of Learning},
  publisher = {Springer Sciemce + Busines Media, LLC},
  year = {2012},
  pages = {1137-1139},
  note = {Print ISBN 978-1-4419-1427-9 Online ISBN 978-1-4419-1428-6},
  url = {http://link.springer.com/referenceworkentry/10.1007%2F978-1-4419-1428-6_18},
  doi = {http://doi.org/10.1007/978-1-4419-1428-6_18}
}
Lim, Y., Ayesh, A. and Stacey, M. The Effects of Typing Demand on Emotional Stress, Mouse and Keystroke Behaviours 2015
Vol. 591Intelligent Systems in Science and Information 2014, pp. 209-225 
incollection DOI URL 
Abstract: Past research found that cognitive effort is related to emotion, which negative emotion may influence task performance. To enhance learning experience, it is important to have an effective technique to measure userÕs emotional and motivational affects for designing an adaptive e-learning system, rather than using a subjective method that is less reliable and accurate. Keystroke and mouse dynamics analyses shed light on a better automated emotion recognition method as compared to physiological methods, as they are cheaper, non-invasive and can be easily set up. This research shows that unification of mouse and keyboard dynamics analyses could be useful in detecting emotional stress, particularly stress induced by time pressure, text length and language familiarity. The changes of mouse and keystroke behaviours of the students are found cohere with their task performance and stress perception. However anomalies in mouse and keystroke behaviours present when the students are pushed beyond their capabilities.
BibTeX:
@incollection{Lim2015,
  author = {Lim, YeeMei and Ayesh, Aladdin and Stacey, Martin},
  title = {The Effects of Typing Demand on Emotional Stress, Mouse and Keystroke Behaviours},
  booktitle = {Intelligent Systems in Science and Information 2014},
  publisher = {Springer International Publishing},
  year = {2015},
  volume = {591},
  pages = {209-225},
  url = {http://dx.doi.org/10.1007/978-3-319-14654-6_13},
  doi = {http://doi.org/10.1007/978-3-319-14654-6_13}
}
Lim, Y., Ayesh, A. and Stacey, M. Using Mouse and Keyboard Dynamics to Detect Cognitive Stress During Mental Arithmetic 2015
Vol. 591Intelligent Systems in Science and Information 2014, pp. 335-350 
incollection DOI URL 
Abstract: To build a personalized e-learning system that can deliver adaptive learning content based on studentÕs cognitive effort and efficiency, it is important to develop a construct that can help measuring perceived mental state, such as stress and cognitive load. The construct must be able to be quantified, computerized and automated. Our research investigates how mouse and keyboard dynamics analyses could be used to detect cognitive stress, which is induced by high mental arithmetic demand with time pressure, without using intrusive and expensive equipment. The research findings suggest that when task demand increased, task error, task duration, passive attempt, stress perception and mouse idle duration may increase, while mouse speed, left mouse click and keystroke speed decreased. The significant effects of task demand and time pressure on mouse and keystroke behaviours suggest that stress evaluation from these input devices is potentially useful for designing an adaptive e-learning system.
BibTeX:
@incollection{Lim2015a,
  author = {Lim, YeeMei and Ayesh, Aladdin and Stacey, Martin},
  title = {Using Mouse and Keyboard Dynamics to Detect Cognitive Stress During Mental Arithmetic},
  booktitle = {Intelligent Systems in Science and Information 2014},
  publisher = {Springer International Publishing},
  year = {2015},
  volume = {591},
  pages = {335-350},
  url = {http://dx.doi.org/10.1007/978-3-319-14654-6_21},
  doi = {http://doi.org/10.1007/978-3-319-14654-6_21}
}
Nikolaev, P. and Ayesh, A. Combined Course Programmes Generation in Multi-agent e-Learning System using Policy-based HTN planning 2011 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 504-514  incollection DOI URL 
Abstract: As integration processes have been intensified in the area of higher education, they should be supported by information technologies. A Combined Course Programmes (CCP) generation mechanism based on HTN planning was developed for a multi-agent system, managing the distributed e-Learning environment. The limitations of HTN planning were overcome by XACML policy language, that was used for specification of preconditions. This improves the expressiveness and facilitates planning in a multi-domain environment supported by different experts. In order to improve the effectiveness of HTN planning in the multi-domain hierarchical environment, a domain refinement technique was designed. Its efficiency gains were confirmed by experiments.
BibTeX:
@incollection{Nikolaev2011a,
  author = {Nikolaev, P. and Ayesh, A.},
  title = {Combined Course Programmes Generation in Multi-agent e-Learning System using Policy-based HTN planning},
  booktitle = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},
  publisher = {Springer (LNAI Series)},
  year = {2011},
  pages = {504-514},
  url = {http://link.springer.com/chapter/10.1007%2F978-3-642-22000-5_52},
  doi = {http://doi.org/10.1007/978-3-642-22000-5_52}
}
Sheta, A.F., Braik, M., Ŏznergiz, E., Ayesh, A. and Masud, M. Design and Automation for Manufacturing Processes: An Intelligent Business Modeling Using Adaptive Neuro-Fuzzy Inference Systems 2013 Business Intelligence and Performance Management: Theory, Systems and Industrial Applications, pp. 191 - 208  incollection DOI URL 
Abstract: The design and automation of a steel making process is getting more complex as a result of the advances in manufacturing and becoming more demanding in quality requirements. It is essential to have an intelligent business process model which brings consistent and outstanding product quality thus keeping the trust with the business stakeholders. Hence, schemes are highly needed for improving the nonlinear process automation. The empirical mathematical model for steel making process is usually time consuming and may require high processing power. Fuzzy neural approach has recently proved to be very beneficial in the identification of such complex nonlinear systems. In this chapter, we discuss the applicability of an Adaptive Neuro-Fuzzy Inference System (ANFIS) to model the dynamics of the hot rolling industrial process including: roll force, roll torque and slab temperature. The proposed system was developed, tested as well as compared with other existing systems. We have conducted several simulation experiments on real data and the results confirm the effectiveness of the ANFIS based algorithms.
BibTeX:
@incollection{Sheta2013,
  author = {Sheta, Alaa F. and Braik, Malik and Ŏznergiz, Ertan and Ayesh, Aladdin and Masud, Mehedi},
  title = {Design and Automation for Manufacturing Processes: An Intelligent Business Modeling Using Adaptive Neuro-Fuzzy Inference Systems},
  booktitle = {Business Intelligence and Performance Management: Theory, Systems and Industrial Applications},
  publisher = {Springer},
  year = {2013},
  pages = {191 - 208},
  note = {Print ISBN 978-1-4471-4865-4 Online ISBN 978-1-4471-4866-1},
  url = {http://link.springer.com/chapter/10.1007%2F978-1-4471-4866-1_13},
  doi = {http://doi.org/10.1007/978-1-4471-4866-1_13}
}
Abdelhamid, N., Ayesh, A. and Thabtah, F. An experimental study of three different rule ranking formulas in associative classification 2012 The 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, pp. 795-800  inproceedings URL 
Abstract: Associative classification (AC) is a combination of classification and association rule in data mining that has attracted several scholars due to its models simplicity and its effectiveness in predicting test cases. This paper investigates the impact of rule ranking before constructing the classifier in AC mining. We would like to experimentally compare three different rule ranking formulas during building the classifier in order to determine the most appropriate one than can positively impact the classification accuracy of the derived classifiers. We believe that rule ranking may play a significant role in determining accuracy of the classifiers and also can be considered a prepruning step for the rules. Sixteen different data sets from UCI data repository have been used in the experiments, and the bases of the comparisons are the error rate, and the number of rules. The results reveal that rule ranking plays a major role in determining the subset of rules to be utilised in the prediction step and it indeed affects the predictive power of such subset. © 2012 Infonomics Society.
BibTeX:
@inproceedings{Abdelhamid2012a,
  author = {Abdelhamid, N. and Ayesh, A. and Thabtah, F.},
  title = {An experimental study of three different rule ranking formulas in associative classification},
  booktitle = {The 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012},
  year = {2012},
  pages = {795-800},
  url = {http://www.scopus.com/inward/record.url?eid=2-s2.0-84876191181&partnerID=40&md5=a57a6a7c646701f72c17bec582d2c99e}
}
Alammari, A., Zahary, A. and Ayesh, A. Multipath contribution of intermediate nodes in AODV extensions 2009 Computer Engineering Systems, 2009. ICCES 2009. International Conference on, pp. 347-352  inproceedings DOI URL 
Abstract: There are many multipath extensions to AODV (Ad Hoc on-demand Distance Vector) routing protocol in MANETs. These extensions can be categorized into two types based on the concept of utilizing multiple paths in intermediate nodes. The first type utilizes Multiple paths in Intermediate nodes in AODV protocol(MIAODV), and the other utilizes multiple paths only at source and destination nodes (in this paper, this type is called Non-MIAODV or NMIAODV). A comparison study is conducted in this paper for both types of multipath extensions to AODV. The traditional protocol AODV and the mechanism of Route Discovery Process (RDP) in both types MIAODV and NMIAODV is implemented using NS2. The performance is evaluated in terms of three performance metrics; routing packet overhead, packet delivery fraction, and average end-to-end delay.
BibTeX:
@inproceedings{Alammari2009,
  author = {Alammari, A. and Zahary, A. and Ayesh, A.},
  title = {Multipath contribution of intermediate nodes in AODV extensions},
  booktitle = {Computer Engineering Systems, 2009. ICCES 2009. International Conference on},
  year = {2009},
  pages = {347-352},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5383243},
  doi = {http://doi.org/10.1109/ICCES.2009.5383243}
}
Al-Azawi, R., Ayesh, A., Kenny, I. and AL-Masruria, K. Analysis of Using Intelligent Technique in Games 2012 The 3rd GAMEON-ARABIA Conference, pp. 83 - 87  inproceedings  
BibTeX:
@inproceedings{Al-Azawi2012,
  author = {Al-Azawi, R. and Ayesh, A. and Kenny, I. and AL-Masruria, K.},
  title = {Analysis of Using Intelligent Technique in Games},
  booktitle = {The 3rd GAMEON-ARABIA Conference},
  publisher = {EUROSIS},
  year = {2012},
  pages = {83 -- 87}
}
Al-Azawi, R. and Ayesh, A. Comparing Agent-Oriented Programming versus Object-Oriented Programming 2013 ICIT 2013 The 6th International Conference on Information Technology  inproceedings URL 
Abstract: The main goal of this paper is to overview the rapidly evolving area of agent oriented programming by comparing it with object oriented programming. As a first step, we will explain the meaning of agent and MAS. Next we present a typology of agents and the demonstrators of the various agent types in the typology. We have provided an overview on general issues such as the description of object oriented programming in general, and the agent oriented programming in details. Furthermore, it also provides an overview on the comparison between agent and objects and the agent oriented programming with object oriented programming.

Keywords - Agent Ðoriented programming, object Ðoriented programming ,multi-agent system.
BibTeX:
@inproceedings{Al-Azawi2013,
  author = {Al-Azawi, Rula and Ayesh, A.},
  title = {Comparing Agent-Oriented Programming versus Object-Oriented Programming},
  booktitle = {ICIT 2013 The 6th International Conference on Information Technology},
  year = {2013},
  url = {http://sce.zuj.edu.jo/icit13/images/Camera%20Ready/Artificial%20Intelligence/692.pdf}
}
Al-Azawi, R., Ayesh, A. and Al. Obaidy, M. Generic Evaluation Framework for Games Development methodology 2013 The 3rd International Conference on Communications and Information Technology (ICCIT-2013): Digital Information Management & Security,, pp. 55 - 60  inproceedings DOI URL 
Abstract: In general the evaluation phase serves as a catalyst in software development and particularly within games development. Hence, it plays a vital role in the formulation of an effective a game development methodology. This paper has investigated the evaluation phase and has focused on the provision of general heuristics sets to facilitate the evaluation process. A generic evaluation framework has been defined as an output of this paper which could be used in the majority of game genres, and therefore it can be an important part of generic game development methodology. Furthermore, this evaluation process has been repeated in each iteration of the game development methodology. The results from each iteration should be compared with previous iteration to enhance and improve games before the final game release.
BibTeX:
@inproceedings{Al-Azawi2013a,
  author = {Al-Azawi, Rula and Ayesh, Aladdin and Al. Obaidy, Mohaned },
  title = {Generic Evaluation Framework for Games Development methodology},
  booktitle = {The 3rd International Conference on Communications and Information Technology (ICCIT-2013): Digital Information Management & Security,},
  year = {2013},
  pages = {55 - 60},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6579522},
  doi = {http://doi.org/10.1109/ICCITechnology.2013.6579522}
}
Al-Azawi, R., Ayesh, A., Al-Masruri, K.A. and Kenny, I. A Generic Framework for Evaluation Phase in Games Development Methodologies 2013 SAI Conference 2013, pp. 237-243  inproceedings URL 
Abstract: Evaluation phase plays an important role in software development in general and in game development in particular, thus it is an important part in designing a game development methodology. In the research presented here, evaluation phase has been investigated the user and expert evaluation in details. This paper focuses on providing general heuristics to aid in the evaluation process. The result is a generic evaluation framework that would work for most game genres, thus it can be included in a generic game development methodology.
BibTeX:
@inproceedings{Al-Azawi2013b,
  author = {Al-Azawi, Rula and Aladdin Ayesh and Al-Masruri, Khalfan Abdullah and Kenny, Ian},
  title = {A Generic Framework for Evaluation Phase in Games Development Methodologies},
  booktitle = {SAI Conference 2013},
  year = {2013},
  pages = {237-243},
  url = {http://ieeexplore.ieee.org/xpl/abstractAuthors.jsp?tp=&arnumber=6661745&queryText%3DA+Generic+Framework+for+Evaluation+Phase+in+Games+Development+Methodologies}
}
Al-Azawi, R., Ayesh, A., Al-Masruri, K. and Kenny, I. Multi Agent Software Engineering (MaSE) and agile methodology for game development 2014 14th Middle Eastern Simulation and Modelling Multiconference, MESM 2014 - 4th GAMEON-ARABIA Conference, GAMEON-ARABIA 2014The 14th Middle Eastern Simulation and Modelling Multiconference (MESM) - The 4th GAMEON-ARABIA Conference, pp. 116-122  inproceedings URL 
Abstract: Agile software development methodologies has become very common in game development methodologies. However, such methodologies must be adapted to different game genres. The purpose of this paper is to investigate the existing game development methodologies and provide a new game development methodology suitable for different game genres. Furthermore, the methodology is based on both predictive and adaptive development models. A critical analysis of Agile game development methodology is presented and we identify the weakness of the current Agile game development. The Agile Agent Game Development Methodology (AAGDM) is introduced as a new hybrid methodology linking the Agent and Agile approach to create a generic game development methodology. © 2014 EUROSIS-ETI.
BibTeX:
@inproceedings{Al-Azawi2014,
  author = {Al-Azawi, R.a and Ayesh, A.b and Al-Masruri, K.A.c and Kenny, I.b},
  title = {Multi Agent Software Engineering (MaSE) and agile methodology for game development},
  booktitle = {The 14th Middle Eastern Simulation and Modelling Multiconference (MESM) - The 4th GAMEON-ARABIA Conference},
  journal = {14th Middle Eastern Simulation and Modelling Multiconference, MESM 2014 - 4th GAMEON-ARABIA Conference, GAMEON-ARABIA 2014},
  year = {2014},
  pages = {116-122},
  url = {http://www.scopus.com/inward/record.url?eid=2-s2.0-84899018045&partnerID=40&md5=fb8648ee8cceabcfb4e189f731d604e5}
}
Al-Azawi, R. and Ayesh, A. A Simulation Based Game Approach for Test Drive Exam 2015 Eurosis ESM 2015, pp. 346 - 353  inproceedings  
BibTeX:
@inproceedings{Al-Azawi2015,
  author = {Al-Azawi, R. and Ayesh, A.},
  title = {A Simulation Based Game Approach for Test Drive Exam},
  booktitle = {Eurosis ESM 2015},
  year = {2015},
  pages = {346 - 353}
}
Al-Azawi, R. and Ayesh, A. Experience with AOAB methodology in mobile computing module 2015 Open Source Software Computing (OSSCOM), 2015 International Conference on, pp. 1-6  inproceedings DOI  
Abstract: This paper describes a case study of how Agent Oriented Agile Based (AOAB) development methodology was implemented in mobile computing module to create game as a part of the module assessment requirements. Games can be used in higher education in many ways to increase students participation, enable variation in how lectures are taught and to increase students interest when they create their own game. We provide a new game development methodology and integrated with mobile computing module. The experience described in this paper is based on the feedback from the module staff member, students feedback, final student report and finally module evaluation report by students. The evaluation shows that the students who used AOAB methodology provide a better result rather than groups who used Agile game development methodology in game creation. Finally, we describe the benefit of using game in higher education and how we could enhance students progress in their study.
BibTeX:
@inproceedings{Al-Azawi2015a,
  author = {Al-Azawi, R. and Ayesh, A.},
  title = {Experience with AOAB methodology in mobile computing module},
  booktitle = {Open Source Software Computing (OSSCOM), 2015 International Conference on},
  year = {2015},
  pages = {1-6},
  doi = {http://doi.org/10.1109/OSSCOM.2015.7372683}
}
Al-Hiary, H., Braik, M., Sheta, A. and Ayesh, A. Identification Of A Chemical Process Reactor Using Soft Computing Techniques 2008 IEEE World Congress on Computational Intelligence  inproceedings DOI URL 
Abstract: This paper discusses the application of artificial neural networks (ANNs) in the area of identification and control of nonlinear dynamical systems. Since chemical processes are getting more complex and complicated, the need of schemes that can improve process operations is highly demanded. ANNs are capable of learning from examples, perform non-linear mappings, and have a special capacity to approximate the dynamics of nonlinear systems in many applications. This paper describe the application of neural network for modeling reactor level, reactor pressure, reactor cooling water temperature, and reactor temperature problems in the Tennessee Eastman (TE) chemical process reactor. The potential of neural network technology in the process industries is great. Its ability to model process dynamics makes it powerful tool for modeling and control processes. A comparison between the applications of ANNs to model the TE plant is compared with other soft computing techniques like fuzzy logic (FL) and adaptive neuro-fuzzy inference systems (ANFIS).
BibTeX:
@inproceedings{Al-Hiary2008,
  author = {Al-Hiary, Heba and Braik, Malik and Sheta, Alaa and Ayesh, Aladdin},
  title = {Identification Of A Chemical Process Reactor Using Soft Computing Techniques },
  booktitle = {IEEE World Congress on Computational Intelligence},
  year = {2008},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4630469},
  doi = {http://doi.org/10.1109/FUZZY.2008.4630469}
}
Al-Hudhud, G., Ayesh, A., Istance, H. and Turner, M. Agents negotiation and communication within a real time cooperative multiagent system 2004 Proceedings of the 5th International Conference on Recent Advances in Soft Computing, pp. 611-617  inproceedings  
BibTeX:
@inproceedings{Al-Hudhud2004,
  author = {Ghada Al-Hudhud and Aladdin Ayesh and Howell Istance and Turner, Martin},
  title = {Agents negotiation and communication within a real time cooperative multiagent system},
  booktitle = {Proceedings of the 5th International Conference on Recent Advances in Soft Computing},
  year = {2004},
  pages = {611-617}
}
Al-Hudhud, G., Turner, M.J. and Ayesh, A. Speech Act and BlackBoard Negotiation Based Communication Protocol for real time Multi-agent Systems 2004 UK Workshop on Computational Intelligence UKCI-2004, pp. 105-111  inproceedings  
BibTeX:
@inproceedings{Al-Hudhud2004a,
  author = {Al-Hudhud, Ghada and Turner, Martin J. and Ayesh, Aladdin},
  title = {Speech Act and BlackBoard Negotiation Based Communication Protocol for real time Multi-agent Systems},
  booktitle = {UK Workshop on Computational Intelligence UKCI-2004},
  year = {2004},
  pages = {105-111}
}
Al-Hudhud, G., Ayesh, A., Turner, M. and Istance, H. Simulation and Visualisation of a Scalable Real Time Multiple Robot System 2005 Theory and Practice of Computer Graphics, UKCG05  inproceedings URL 
Abstract: his paper describes the software implementation and the visualization aspects of an interaction-communication protocol within a large scalable multi-robot system. It investigates the current communication protocols within multi-agent systems and the feasibility to transfer them into a virtual environment system that performs a speci- fied task intelligently, embedding human capability into the control system software. The proposed system allows dynamic changes, i.e. the user may be able to continuously issue commands, or modify tasks. The work presented exploits the Virtual Environment Centre VEC. The semi-immersive full scale environment within the VEC allows the user to better understand the robots? behaviour and in turn test whether they simulate the expected behaviour. The use of a semi-immersive full-scale environment also gives an increased level of presence enabling the user to believe they are within their own simulation. It also presents a prototype for a robot automatic fire extinguishing system as a test application area.
BibTeX:
@inproceedings{Al-Hudhud2005,
  author = {Al-Hudhud, G. and Ayesh, A. and Turner, Martin and Istance, H.},
  title = {Simulation and Visualisation of a Scalable Real Time Multiple Robot System},
  booktitle = {Theory and Practice of Computer Graphics, UKCG05},
  year = {2005},
  url = {http://www.eg.org/EG/DL/LocalChapterEvents/TPCG/TPCGUK05/147-154.pdf}
}
Al-Hudhud, G. and Ayesh, A. Real Time Movement Coordination Technique Based on Flocking Behaviour for Multiple Mobile Robots System 2008
Vol. 11Swarm Intelligence Algorithms and Applications Symposium (SIAAS'08) - AISB 2008 Convention, pp. 31-37 
inproceedings URL 
Abstract: The emergent behaviour of a multiagent system depends
on the component agents and how they interact. A critical part of
interaction between agents is communication. This paper presents
a multi-agent communication model for physical moving agents,
robots. The scope of the paper emphasises the interaction relationships
between individual components in multi-agents system that results
in economical and social emergent behaviour. The proposed
theory of communication integrates animal intelligence technique
together with a cognitive intelligence one. This results in a local coordination
of movements, and global task coordination. Accordingly,
agents are designed to locally communicate with other agents in order
to coordinate their movements via a set of flocking rules. A flocking
algorithm is used because it satisfies a major objective, i.e. it has a
real time response to local environmental changes and minimises the
cost of path planning. A higher level communication mechanism is
implemented for task distribution that is carried out via a blackboardlike
conversation with a ground based controller.
BibTeX:
@inproceedings{Al-Hudhud2008,
  author = {Al-Hudhud, Ghada and Ayesh, Aladdin},
  title = {Real Time Movement Coordination Technique Based on Flocking Behaviour for Multiple Mobile Robots System},
  booktitle = {Swarm Intelligence Algorithms and Applications Symposium (SIAAS'08) - AISB 2008 Convention},
  year = {2008},
  volume = {11},
  pages = {31-37},
  url = {http://www.aisb.org.uk/convention/aisb08/proc/proceedings/11%20Swarm%20Intelligence/06.pdf}
}
Alkhwlani, M.M. and Ayesh, A. Access network selection using combined fuzzy control and MCDM in heterogeneous networks 2007 Computer Engineering & Systems, 2007. ICCES '07. International Conference on, pp. 108-113  inproceedings DOI URL 
Abstract: In the next generation of heterogeneous wireless networks, selecting the most optimal and promising access network is an important consideration for overall networks stability, resource utilization, user satisfaction, and quality of service (QoS) provisioning. This paper proposes a new and generic algorithm for access network selection in the heterogeneous wireless environments. The proposed algorithm uses a combined fuzzy logic control and multi-criteria decision making (MCDM) system to achieve scalable, flexible, simple, general, and adaptable solution. The first layer of the algorithm uses small fuzzy logic based subsystems, where each subsystem represents one input criteria. The fuzzy logic is used to overcome the complexity and fuzziness associated with the heterogeneous wireless environments and their services and to make the proposed algorithm simpler and more adaptable. In the second layer, the algorithm uses a MCDM technique that takes the first layer output as its input. The MCDM ensures that all of the different characteristics and view points are taken into account when making the radio access network selection.
BibTeX:
@inproceedings{Alkhwlani2007,
  author = {Alkhwlani, M. M. and Ayesh, A.},
  title = {Access network selection using combined fuzzy control and MCDM in heterogeneous networks},
  booktitle = {Computer Engineering & Systems, 2007. ICCES '07. International Conference on},
  year = {2007},
  pages = {108-113},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4447034},
  doi = {http://doi.org/10.1109/ICCES.2007.4447034}
}
Al-Marghilani, A., Zedan, H. and Ayesh, A. A General Framework For Multilingual Text Mining Using Self-Organizing Maps 2007 The 25th IASTED International Multi-Conference: Artificial Intelligence and Applications (AIA'07), pp. pp. 520-525  inproceedings  
BibTeX:
@inproceedings{Al-Marghilani2007,
  author = {Al-Marghilani, Abdulsamad and Zedan, Husien and Ayesh, Aladdin},
  title = {A General Framework For Multilingual Text Mining Using Self-Organizing Maps},
  booktitle = {The 25th IASTED International Multi-Conference: Artificial Intelligence and Applications (AIA'07)},
  publisher = {IASTED},
  year = {2007},
  pages = {pp. 520-525}
}
Al-Marghilani, A., Zedan, H. and Ayesh, A. Practical Approach Using Self-Organizing Maps For Multilingual Text Mining 2007 Proc. of the Saudi Innovation Conference, pp. 676-685  inproceedings  
BibTeX:
@inproceedings{Al-Marghilani2007a,
  author = {A. Al-Marghilani and H. Zedan and Ayesh, A.},
  title = {Practical Approach Using Self-Organizing Maps For Multilingual Text Mining},
  booktitle = {Proc. of the Saudi Innovation Conference},
  year = {2007},
  pages = {676-685}
}
Al-Marghilani, A., Zedan, H. and Ayesh, A. Text Mining Based on the Self-Organizing Map Method for Arabic-English Documents 2008 Proceedings of the Nineteenth Midwest Artificial Intelligence and Cognitive Science Conference (MAICS 2008), pp. 174-181  inproceedings  
BibTeX:
@inproceedings{Al-Marghilani2008,
  author = {Al-Marghilani, Abdulsamad and Zedan, Hussein and Ayesh, Aladdin},
  title = {Text Mining Based on the Self-Organizing Map Method for Arabic-English Documents},
  booktitle = {Proceedings of the Nineteenth Midwest Artificial Intelligence and Cognitive Science Conference (MAICS 2008)},
  year = {2008},
  pages = {174-181}
}
Al-Obaidy, M., Ayesh, A. and Sheta, A. Optimizing The Communication Distance Of An Ad Hoc Wireless Sensor Networks By Genetic Algorithms 2008 The Fourth International Workshop on Advanced Computation for Engineering Applications (ACEA08) , pp. 17-23  inproceedings  
BibTeX:
@inproceedings{Al-Obaidy2008,
  author = {Al-Obaidy, Mohaned and Ayesh, Aladdin and Sheta, Alaa},
  title = {Optimizing The Communication Distance Of An Ad Hoc Wireless Sensor Networks By Genetic Algorithms},
  booktitle = {The Fourth International Workshop on Advanced Computation for Engineering Applications (ACEA08) },
  publisher = {Al- Balqa Applied University},
  year = {2008},
  pages = {17-23}
}
Al-Obaidy, M. and Ayesh, A. Optimizing Autonomous Mobile Sensors Network using PSO Algorithms 2008 International Conference on Computer Engineering and Systems (ICCES'08)  inproceedings DOI URL 
Abstract: Wireless Sensor Networks (WSNs) must be able to operate under very dynamic conditions and, in most cases, in an unattended mode leading to an autonomous network. This scenario becomes more complex when we consider that there will be probably sensor networks that comprise tens to hundreds of thousands sensor nodes. The design of algorithms for WSNs must consider the hardware limitations of sensor nodes, the physical environment where the nodes will operate, and the application requirements. In this paper we propose to design an algorithm which provides a robust and energy-efficient communication mechanism for large scale mobile wireless sensors network.
BibTeX:
@inproceedings{Al-Obaidy2008a,
  author = {Al-Obaidy, Mohaned and Ayesh, Aladdin},
  title = {Optimizing Autonomous Mobile Sensors Network using PSO Algorithms},
  booktitle = {International Conference on Computer Engineering and Systems (ICCES'08)},
  publisher = {IEEE},
  year = {2008},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4772996},
  doi = {http://doi.org/10.1109/ICCES.2008.4772996}
}
Al-Obaidy, M. and Ayesh, A. Energy Efficient PSO-based Algorithm for Optimizing Autonomous Wireless Sensor Network 2008 European Simulation and Modelling (ESM'2008) Conference, pp. 201-206  inproceedings  
BibTeX:
@inproceedings{Al-Obaidy2008b,
  author = {Al-Obaidy, Mohaned and Ayesh, Aladdin},
  title = {Energy Efficient PSO-based Algorithm for Optimizing Autonomous Wireless Sensor Network },
  booktitle = {European Simulation and Modelling (ESM'2008) Conference},
  publisher = {EUROSIS},
  year = {2008},
  pages = {201-206}
}
Al-Obaidy, M. and Ayesh, A. The Implementation of Optimization Algorithm for Energy Efficient Dynamic Ad Hoc Wireless Sensor Networks 2009 AISB Convention: The 2nd Swarm Intelligence Algorithms and Applications Symposium (SIAAS-09)  inproceedings URL 
Abstract: In this work we are presenting the implementation part of our research which explores two of the main Evolutionary Computation techniques which are; Genetic Algorithms (GAs) and Particle Swarm Optimization (PSO) to optimize the energy dissipation in a dynamic Wireless Sensor Network (WSN). We are evolving a hybrid algorithm by applying the GAs in the first phase to divide the sensor network into K-clusters (K-unknown). The output of the first phase will be used as an initial population for the particles in the Swarm which represents the dynamic Sensor Network. GAs proved to be used effectively in the optimization of static Sensor Networks, but for dynamic networks, PSO algorithms are more suitable since the swarms are moving objects by nature. Hence, in this work PSO algorithms are proposed to keep the optimum distances between the sensor nodes during the sensors movement.
BibTeX:
@inproceedings{Al-Obaidy2009a,
  author = {Al-Obaidy, M. and Ayesh, A.},
  title = {The Implementation of Optimization Algorithm for Energy Efficient Dynamic Ad Hoc Wireless Sensor Networks},
  booktitle = {AISB Convention: The 2nd Swarm Intelligence Algorithms and Applications Symposium (SIAAS-09)},
  publisher = {AISB},
  year = {2009},
  url = {http://www.aisb.org.uk/convention/aisb09/Proceedings/SIAAS09/FILES/AlObaidyM.pdf}
}
Alotaibi, A., Ayesh, A. and Hall, R. Managing Admission in Saudi Universities: a System Approach 2015 The 6th International Conference on E-Education, E-Business, E-Management and E-Learning- IC4E  inproceedings  
Abstract: This research aims at the development of a framework for designing a proposed admission system in the Saudi universities. This study is based on results of another paper that revealed that the current admission system in the Saudi universities needs to develop. This due to the current system for admission in Saudi universities is not comprehensive, and not relevant. The study recommends applying modern approaches related to DSS (such as; the proposed system) in order to improve the efficiency of the admission system in the Saudi universities.
BibTeX:
@inproceedings{Alotaibi2015,
  author = {Awad Alotaibi and Aladdin Ayesh and Richard Hall},
  title = {Managing Admission in Saudi Universities: a System Approach},
  booktitle = {The 6th International Conference on E-Education, E-Business, E-Management and E-Learning- IC4E},
  year = {2015},
  note = {Proceedings published in Journals.}
}
Alqrainy, S. and Ayesh, A. Word-Class Tagger and Tagset Design for Vocalized Arabic Text 2006 The 2nd Jordanian International Conference on Computer Science and Engineering (JICCSE2006), pp. 278-283  inproceedings  
BibTeX:
@inproceedings{ALQRAINY2006a,
  author = {Alqrainy, Shihadeh And Ayesh, Aladdin},
  title = {Word-Class Tagger and Tagset Design for Vocalized Arabic Text },
  booktitle = {The 2nd Jordanian International Conference on Computer Science and Engineering (JICCSE2006)},
  year = {2006},
  pages = {278-283}
}
Alqrainy, S., AlSerhan, H. and Ayesh, A. Pattern-based Algorithm for Part-of-Speech Tagging Arabic Text 2008 International Conference on Computer Engineering and Systems (ICCES'08), pp. 119 - 124  inproceedings DOI URL 
Abstract: Building a generic Part-of-Speech (POS) tagger system without a lexicon (dictionary) depends on the language and the characteristics of its grammar, both the morphological and the syntactical systems of that language. Arabic language has a valuable and important feature, called diacritics, which are marks placed over and below the letters of Arabic word. This paper presents a novel algorithm to assign the correct POS tag to those words belonging to a verb or a noun class in an Arabic text. The algorithm is based on the pattern (wazn) of the word instead of using a huge manually tagged lexicon from which large amounts of training data can be extracted. An experiment was ran on a data set that contains 5,000 words belonging to a noun and a verb class to evaluate the accuracy of the algorithm. The algorithm is achieved an accuracy of 91%.
BibTeX:
@inproceedings{ALQRAINY2008,
  author = {Alqrainy, Shihadeh and AlSerhan, Hasan and Ayesh, Aladdin},
  title = {Pattern-based Algorithm for Part-of-Speech Tagging Arabic Text },
  booktitle = {International Conference on Computer Engineering and Systems (ICCES'08)},
  publisher = {IEEE},
  year = {2008},
  pages = {119 - 124},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4772979},
  doi = {http://doi.org/10.1109/ICCES.2008.4772979}
}
Alruily, M., Ayesh, A. and Zedan, H. Crime Type Document Classification from Arabic Corpus 2009 Developments in eSystems Engineering Conference (DeSE'09)  inproceedings DOI URL 
Abstract: This paper describes an initial prototype for identifying types of crime in a text within the crime domain. Two approaches are explored to perform recognition tasks. The first approach completely relies on direct recognition using gazetteers. In this case, lists of crime verbs and crime names are used. The second approach is a rule-based system. Rules are built based on the predefined crime indicator list that contains some important keywords. Even though the system is still under development, the initial results are promising.
BibTeX:
@inproceedings{Alruily2009,
  author = {Alruily, Meshrif and Ayesh, Aladdin and Zedan, Hussein},
  title = {Crime Type Document Classification from Arabic Corpus},
  booktitle = {Developments in eSystems Engineering Conference (DeSE'09)},
  year = {2009},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5395104},
  doi = {http://doi.org/10.1109/DeSE.2009.50}
}
Alruily, M., Ayesh, A. and Zedan, H. Automated dictionary construction from arabic corpus for meaningful crime information extraction and document classification 2010 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010, pp. 137-142  inproceedings DOI URL 
Abstract: Arabic is a very widely spoken language but very few mining tools have been developed to exploit the data that lies within bodies of Arabic text. Thus, this paper presents and then uses three automatic algorithm techniques specifically designed for Arabic. The target domain is crime profiling and the methods involve adaptive dictionary building. The bodies of text are mined for crime type, location and nationality. This work is then validated through three experiments, the results of which show that the techniques developed here are promising.
BibTeX:
@inproceedings{Alruily2010,
  author = {Alruily, M. and Ayesh, A. and Zedan, H.},
  title = {Automated dictionary construction from arabic corpus for meaningful crime information extraction and document classification},
  booktitle = {2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2010},
  year = {2010},
  pages = {137-142},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5643676},
  doi = {http://doi.org/10.1109/CISIM.2010.5643676}
}
Alruily, M., Ayesh, A. and Zedan, H. Automatically Constructing Dictionaries for Extracting Meaningful Crime Information from Arabic Text 2010 The 19th European Conference on Artificial Intelligence (ECAI 2010)  inproceedings  
BibTeX:
@inproceedings{Alruily2010b,
  author = {Alruily, Meshrif and Ayesh, Aladdin and Zedan, Hussein},
  title = {Automatically Constructing Dictionaries for Extracting Meaningful Crime Information from Arabic Text},
  booktitle = {The 19th European Conference on Artificial Intelligence (ECAI 2010)},
  year = {2010}
}
Alruily, M., Ayesh, A. and Al-Marghilani, A. Using self organizing map to cluster Arabic crime documents 2010
Vol. 5Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010, pp. 357-363 
inproceedings URL 
Abstract: This paper presents a system that combines two text mining techniques; information extraction and clustering. A rulebased approach is used to perform the information extraction task, based on the dependency relation between some intransitive verbs and prepositions. This relationship helps in extracting types of crime from documents within the crime domain. With regard to the clustering task, the Self Organizing Map (SOM) is used to cluster Arabic crime documents based on crime types. This work is then validated through experiments, the results of which show that the techniques developed here are promising. © 2010 IEEE.
BibTeX:
@inproceedings{Alruily2010c,
  author = {Alruily, M. and Ayesh, A. and Al-Marghilani, A.},
  title = {Using self organizing map to cluster Arabic crime documents},
  booktitle = {Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2010},
  year = {2010},
  volume = {5},
  pages = {357-363},
  url = {http://www.proceedings2010.imcsit.org/pliks/154.pdf}
}
AlSerhan, H.M. and Ayesh, A.S. A Triliteral Word Roots Extraction Using Neural Network for Arabic 2006 IEEE International Conference on Computer Engineering and Systems (ICCES06), pp. 436 - 440   inproceedings DOI URL 
Abstract: Many of existing Arabic stemming algorithms use a large set of rules. In many cases, they refer to a lookup table of patterns and roots. This requires a large storage space, and time to access the information. A novel neural network based approach for stemming Arabic words is proposed in this paper. This approach attempts to exploit numerical relations between characters by using backpropagation neural network (BPNN). No such system in literature can be found that uses neural network to extract the stemming of Arabic words
BibTeX:
@inproceedings{AlSerhan2006,
  author = {AlSerhan, Hasan M. and Ayesh, Aladdin S.},
  title = {A Triliteral Word Roots Extraction Using Neural Network for Arabic},
  booktitle = {IEEE International Conference on Computer Engineering and Systems (ICCES06)},
  publisher = {IEEE},
  year = {2006},
  pages = {436 - 440 },
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4115547},
  doi = {http://doi.org/10.1109/ICCES.2006.320487}
}
AlSerhan, H. and Ayesh, A. Extraction Arabic Word Roots Using Neural Network 2006 The 2nd Jordanian International Conference on Computer Science and Engineering (JICCSE2006)  inproceedings  
BibTeX:
@inproceedings{AlSerhan2006b,
  author = {AlSerhan, Hasan and Ayesh, Aladdin},
  title = {Extraction Arabic Word Roots Using Neural Network},
  booktitle = {The 2nd Jordanian International Conference on Computer Science and Engineering (JICCSE2006)},
  year = {2006}
}
AlSerhan, H., Alqrainy, S. and Ayesh, A. Is Paice Method Suitable for EvaluatingArabic Stemming Algorithms? 2008 International Conference on Computer Engineering and Systems (ICCES'08), pp. 131 - 135  inproceedings DOI URL 
Abstract: There are many measurement methodologies used to measure the quality of stemming algorithms and to evaluate their effectiveness. All of these measurement are designed for English language. In this study we trying to check the viability of the Paice evaluation method as a stemmer measurement approach for Arabic language. Eight experiments are designed for this aim. Conclusions about the experiments and the viability of the Paice evaluation for Arabic are reported.
BibTeX:
@inproceedings{AlSerhan2008,
  author = {AlSerhan, Hasan and Alqrainy, Shihadeh and Ayesh, Aladdin},
  title = {Is Paice Method Suitable for EvaluatingArabic Stemming Algorithms? },
  booktitle = {International Conference on Computer Engineering and Systems (ICCES'08)},
  publisher = {IEEE},
  year = {2008},
  pages = {131 - 135},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4772981},
  doi = {http://doi.org/10.1109/ICCES.2008.4772981}
}
AlZahrani, S., Ayesh, A. and Zedan, H. Multi-Agent System Based Regional Data Grid 2008 International Conference on Computer Engineering and Systems (ICCES'08)  inproceedings DOI URL 
Abstract: Grids are increasingly being used in applications, one of which is e-learning. As most of business and academic institutions (universities) and training centres around the world have adopted this technology in order to create, deliver and manage their learning materials through the Web, the subject has become the focus of investigate. Still, collaboration between these institutions and centres is limited. Existing technologies such as grid, Web services and agents are promising better results. In this paper we support building our architecture Regionally Distributed Architecture for Dynamic e-Learning Environment (RDADeLE) by using agent technology (Multi-Agent System) using Java Agent DEvelopment Framework (JADE). By describing these agents in details, we prove that agents can be implemented to work well to extend the autonomy and interoperability for regional data grid.
BibTeX:
@inproceedings{AlZahrani2008,
  author = {AlZahrani, Saleh and Ayesh, Aladdin and Zedan, Husien},
  title = {Multi-Agent System Based Regional Data Grid},
  booktitle = {International Conference on Computer Engineering and Systems (ICCES'08)},
  publisher = {IEEE},
  year = {2008},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4773025},
  doi = {http://doi.org/10.1109/ICCES.2008.4773025}
}
AlZahrani, S., Ayesh, A. and Zedan, H. Regionally Distributed Architecture for Dynamic e-Learning Environment (RDADeLE) 2008 Human System Interactions, 2008 Conference on, pp. 579-584  inproceedings DOI URL 
Abstract: Grids are increasingly being used in applications, one of which is e-learning. As most of academic and business institutions and training centres around the world have adopted this technology in order to create, deliver and manage their learning materials through the web, the subject has become the focus of investigate. Still, collaboration between these institutions and centres is limited. Existing technologies such as grid, web services and agents are promising better results. In this paper we propose to make the e-learning environment more dynamic by dividing it into regional data grids. Multi-agent technology has been applied to integrate each regional data grid with the others in order to produce an architecture which is more scalable, stronger and efficient. The result is what we call it Regionally Distributed Architecture for Dynamic e-Learning Environment (RDADeLE).
BibTeX:
@inproceedings{AlZahrani2008a,
  author = {AlZahrani, Saleh and Ayesh, Aladdin and Zedan, Hussein},
  title = {Regionally Distributed Architecture for Dynamic e-Learning Environment (RDADeLE)},
  booktitle = {Human System Interactions, 2008 Conference on},
  year = {2008},
  pages = {579-584},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4581505},
  doi = {http://doi.org/10.1109/HSI.2008.4581505}
}
Arevalillo-Herráez, M., Ayesh, A., Santos, O.C. and Arnau-González, P. Combining Supervised and Unsupervised Learning to Discover Emotional Classes 2017 Proceedings of the 25th ACM Conference on User Modeling, Adaptation and Personalisation (UMAP 2017)  inproceedings  
BibTeX:
@inproceedings{Arevalillo-Herraez2017,
  author = {Miguel Arevalillo-Herráez and Aladdin Ayesh and Santos, O. C. and Arnau-González, P.},
  title = {Combining Supervised and Unsupervised Learning to Discover Emotional Classes},
  booktitle = {Proceedings of the 25th ACM Conference on User Modeling, Adaptation and Personalisation (UMAP 2017)},
  year = {2017}
}
Ayesh, A. and Kelleher, G. An Investigation Into Formal Models Of Change In Artificial Intelligence 1996 AISB96 Postgraduate Workshop  inproceedings  
BibTeX:
@inproceedings{Ayesh1996,
  author = {Ayesh, A. and Kelleher, G.},
  title = {An Investigation Into Formal Models Of Change In Artificial Intelligence},
  booktitle = {AISB96 Postgraduate Workshop},
  publisher = {AISB},
  year = {1996}
}
Ayesh, A. and Kelleher, G. An Introduction To The Generation Of Directed Domain Constraints (Ddc) From More Expressive Strips-Like Models I: Disjunctive Sentences 1996 The 15th Workshop Of The Uk Planning & Scheduling Special Interest Group  inproceedings  
BibTeX:
@inproceedings{Ayesh1996a,
  author = {Ayesh, A. and Kelleher, G.},
  title = {An Introduction To The Generation Of Directed Domain Constraints (Ddc) From More Expressive Strips-Like Models I: Disjunctive Sentences},
  booktitle = {The 15th Workshop Of The Uk Planning & Scheduling Special Interest Group},
  year = {1996}
}
Ayesh, A. and Kelleher, G. Reasoning About Conditional Effects in Control Systems via Directed Domain Constraints 1998 14TH NCMR Conference, pp. 721-726  inproceedings  
BibTeX:
@inproceedings{Ayesh1998a,
  author = {Ayesh, A. and Kelleher, G.},
  title = {Reasoning About Conditional Effects in Control Systems via Directed Domain Constraints},
  booktitle = {14TH NCMR Conference},
  publisher = {Professional Engineering Publishing},
  year = {1998},
  pages = {721-726}
}
Ayesh, A. and Kelleher, G. Aspects of Temporal Usability via Constraint-Based Reasoning: The Use of Constraints as a Debugging Mechanism Within General Descriptions of The User’s Possible Actions 1998 The IASTED International Conference on Artificial Intelligence and Soft Computing., pp. pp. 7-10  inproceedings  
BibTeX:
@inproceedings{Ayesh1998b,
  author = {Ayesh, Aladdin and Kelleher, Gerry},
  title = {Aspects of Temporal Usability via Constraint-Based Reasoning: The Use of Constraints as a Debugging Mechanism Within General Descriptions of The User’s Possible Actions},
  booktitle = {The IASTED International Conference on Artificial Intelligence and Soft Computing.},
  publisher = {IASTED/ACTA Press},
  year = {1998},
  pages = {pp. 7-10}
}
Ayesh, A., Kelleher, G. and Yu, H. Mapping Petri Nets to STRIPS 2000 Applied Informatics 2000 (AI2000)  inproceedings  
BibTeX:
@inproceedings{Ayesh2000,
  author = {Ayesh, Aladdin and Kelleher, Gerry and Yu, H.},
  title = {Mapping Petri Nets to STRIPS},
  booktitle = {Applied Informatics 2000 (AI2000)},
  year = {2000}
}
Ayesh, A. and Bechkoum, K. Framework of Multi-agents Internet Security System 2000 Applied Informatics (AI'2000)  inproceedings  
BibTeX:
@inproceedings{Ayesh2000a,
  author = {Ayesh, Aladdin and Bechkoum, K.},
  title = {Framework of Multi-agents Internet Security System},
  booktitle = {Applied Informatics (AI'2000)},
  year = {2000}
}
Ayesh, A. Architectural Framework for Standardizing Internet Security Using Re-usable Agents 2001 IASTED International Conference Artificial Intelligence and Applications (AIA 2001)  inproceedings  
BibTeX:
@inproceedings{Ayesh2001,
  author = {Ayesh, A.},
  title = {Architectural Framework for Standardizing Internet Security Using Re-usable Agents},
  booktitle = {IASTED International Conference Artificial Intelligence and Applications (AIA 2001)},
  publisher = {IASTED},
  year = {2001}
}
Ayesh, A. Towards Memorizing by Adjectives 2001 AAAI Fall Symposium on Anchoring Symbols to Sensor Data in Single and Multiple Robot Systems, pp. 117-118  inproceedings  
BibTeX:
@inproceedings{Ayesh2001a,
  author = {Ayesh, A.},
  title = {Towards Memorizing by Adjectives},
  booktitle = {AAAI Fall Symposium on Anchoring Symbols to Sensor Data in Single and Multiple Robot Systems},
  year = {2001},
  pages = {117-118}
}
Ayesh, A. Thinking-Learning by Argument 2001 The Second Asia-Pacific Conference on Intelligent Agent Technology (IAT-2001)  inproceedings  
BibTeX:
@inproceedings{Ayesh2001c,
  author = {Ayesh, A.},
  title = {Thinking-Learning by Argument},
  booktitle = {The Second Asia-Pacific Conference on Intelligent Agent Technology (IAT-2001)},
  year = {2001}
}
Ayesh, A. Argumentative Agents-based Structure for Thinking-Learning 2001 IASTED International Conference Artificial Intelligence and Applications (AIA 2001)  inproceedings  
BibTeX:
@inproceedings{Ayesh2001d,
  author = {Ayesh, A.},
  title = {Argumentative Agents-based Structure for Thinking-Learning},
  booktitle = {IASTED International Conference Artificial Intelligence and Applications (AIA 2001)},
  publisher = {IASTED},
  year = {2001}
}
Ayesh, A. Perception and Emotion Based Reasoning: A Connectionist Approach 2002 RASC2002, pp. 236-241  inproceedings  
BibTeX:
@inproceedings{Ayesh2002a,
  author = {Ayesh, A.},
  title = {Perception and Emotion Based Reasoning: A Connectionist Approach},
  booktitle = {RASC2002},
  year = {2002},
  pages = {236-241}
}
Ayesh, A. A Connectionist Approach to Perception and Emotion Based Reasoning 2002 IASTED International Conference Artificial Intelligence Applications (AIA 2002), pp. 1-6  inproceedings  
Abstract: Many of our actions, reactions and reasoning is based on our perceptions and emotions. These perceptions and emotions are associated with each other and to objects and stimuli within our environment in a tangled web of relations. In this paper we try to model this complicated relationship between emotions, perceptions and our behaviour to produce a model that can be used in software agents and humanized robots. The question we attempt to answer is Inferencing under a set of perceptions and associated emotions to trigger eventually a reaction in response to environmentÕs objects or stimuli.
BibTeX:
@inproceedings{Ayesh2002b,
  author = {Ayesh, Aladdin},
  title = {A Connectionist Approach to Perception and Emotion Based Reasoning},
  booktitle = {IASTED International Conference Artificial Intelligence Applications (AIA 2002)},
  publisher = {ACTA Press},
  year = {2002},
  pages = {1-6}
}
Ayesh, A. Memory Architecture for Argumentation-based Adaptive System 2002 IASTED International Conference Applied Informatics (AI 2002)  inproceedings  
Abstract: Thinking, decision making and hence adapting are all influenced often by mentally recognizing objects or situations. As a result the associated features of the given object or situation are recalled. This could be a lengthy process if traditional computation retrieval processes are used. In humans, however, the process of memorizing is often based on emphasized associated features rather than all the features of the given object. This feature-selective memorization becomes of a tremendous importance in developing argumentative-based adaptation process that simulates the human thinking process. In this paper we represent a preliminary research on using the factor of selected features in enabling the anchoring of information to objects and concepts.
BibTeX:
@inproceedings{Ayesh2002c,
  author = {Ayesh, Aladdin},
  title = {Memory Architecture for Argumentation-based Adaptive System},
  booktitle = {IASTED International Conference Applied Informatics (AI 2002)},
  publisher = {IASTED},
  year = {2002}
}
Ayesh, A. and Hugill, A. Evolutionary Form in a Network Composition: Preliminary Report 2003 MAXIS2003  inproceedings  
BibTeX:
@inproceedings{Ayesh2003b,
  author = {Ayesh, A. and Hugill, A.},
  title = {Evolutionary Form in a Network Composition: Preliminary Report},
  booktitle = {MAXIS2003},
  year = {2003}
}
Ayesh, A. and Cowell, J. Emotional analysis of Facial Expressions 2004
Vol. 1IEEE SMC 2004, pp. 672-676 vol.1 
inproceedings DOI URL 
Abstract: The purpose of this work is to develop an emotional analyzer that enables a cognitive agent to determine the emotional state of another cognitive agent through facial expressions. These expressions are presented to the analyzer using a facial expressions language. The analyzer fuses these formulas to determine the basic emotions associated with these formulas and eventually derive the emotional state. The main characteristic of this analyzer is that it takes the current emotional state and internal state into consideration during the emotional state calculation. In this paper, we present the concepts and algorithms used to develop facial expressions emotions analyzer (FEEA)
BibTeX:
@inproceedings{Ayesh2004,
  author = {Ayesh, A. and Cowell, J.},
  title = {Emotional analysis of Facial Expressions},
  booktitle = {IEEE SMC 2004},
  year = {2004},
  volume = {1},
  pages = {672-676 vol.1},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1398377},
  doi = {http://doi.org/10.1109/ICSMC.2004.1398377}
}
Ayesh, A. Talking to one's self: a little architecture for thinking 2004 UK Grand Challenges (GC'04) - GC5: the Architecture of Brain and Mind  inproceedings URL 
BibTeX:
@inproceedings{Ayesh2004a,
  author = {Ayesh, A.},
  title = {Talking to one's self: a little architecture for thinking },
  booktitle = {UK Grand Challenges (GC'04) - GC5: the Architecture of Brain and Mind},
  publisher = {UKCRC},
  year = {2004},
  url = {http://www.nesc.ac.uk/esi/events/Grand_Challenges/gcconf04/submissions/3.pdf}
}
Ayesh, A. Emotionally Motivated Reinforcement Learning Based Controller 2004
Vol. 1IEEE SMC 2004, pp. 874-878 vol. 1 
inproceedings DOI URL 
Abstract: There have been several attempts to model emotions in autonomous agents and robotics. The use of emotions in conjunction with reinforcement learning in particular has attracted attention since both notions are borrowed analogies from psychology. The work presented here is an approach to robot control based on modeling emotions within reinforcement learning algorithm. The main contribution of this paper is the use of fuzzy cognitive maps (FCM) to facilitate the modeling of emotions and inferencing for action selection. This approach does not use feeling estimation; instead a direct link between sensory data and emotions is used for emotional estimation. An emotion based reinforcement learning algorithm is proposed for action selection in robotic control
BibTeX:
@inproceedings{Ayesh2004b,
  author = {Ayesh, A.},
  title = {Emotionally Motivated Reinforcement Learning Based Controller},
  booktitle = {IEEE SMC 2004},
  year = {2004},
  volume = {1},
  pages = {874-878 vol. 1},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1398413},
  doi = {http://doi.org/10.1109/ICSMC.2004.1398413}
}
Ayesh, A. and Hugill, A. Genetic Approaches for Evolving Form in Musical Composition 2005 IASTED International Conference on Artificial Intelligence and Applications (AIA2005), pp. 318-321  inproceedings  
BibTeX:
@inproceedings{Ayesh2005,
  author = {Ayesh, A. and Hugill, Andrew},
  title = {Genetic Approaches for Evolving Form in Musical Composition},
  booktitle = {IASTED International Conference on Artificial Intelligence and Applications (AIA2005)},
  publisher = {IASTED},
  year = {2005},
  pages = {318-321}
}
Ayesh, A. Structured Sound Based Language for Emotional Robotic Communicative Interaction 2006 The 15th IEEE International Symposium on Robot and Human Interactive Communication, (ROMAN 2006)., pp. 135-140  inproceedings DOI URL 
Abstract: Sound is perhaps the most elementary and yet common communication vehicle used by humans and animals alike. Similarly, reactive robots that are based on animal intelligence require real-time simple communication mechanisms to imitate their animal examples. However, emotions are not often considered in developing reactive robots interaction rules and communication. Therefore, these robots, unlike their natural examples, are not capable of expressing basic emotions such as happiness and excitement, fear and stress, anger or contentment as the case with many animals
BibTeX:
@inproceedings{Ayesh2006,
  author = {Ayesh, Aladdin},
  title = {Structured Sound Based Language for Emotional Robotic Communicative Interaction},
  booktitle = {The 15th IEEE International Symposium on Robot and Human Interactive Communication, (ROMAN 2006).},
  publisher = {IEEE},
  year = {2006},
  pages = {135-140},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4107798},
  doi = {http://doi.org/10.1109/ROMAN.2006.314407}
}
Ayesh, A., Stokes, J. and Edwards, R. Fuzzy Individual Model (FIM) for Realistic Crowd Simulation: Preliminary Results 2007 Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007. IEEE International, pp. 1-5  inproceedings DOI URL 
Abstract: This paper provides preliminary results of fuzzy individual model (FIM) being developed for realistic modelling of crowd behaviour under normal and abnormal conditions. It explores the impact of personality, perception and emotions on the behaviour. Fuzzy logic is used to deal with the vagueness aspects of perceptions and the uncertainty of emotions. The fuzzy rules link these parts together feeding into behavioural rules. The implied behaviours are observed in simulation and evaluated.
BibTeX:
@inproceedings{Ayesh2007,
  author = {Ayesh, Aladdin and Stokes, Jonathan and Edwards, Ron},
  title = {Fuzzy Individual Model (FIM) for Realistic Crowd Simulation: Preliminary Results},
  booktitle = {Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007. IEEE International},
  publisher = {IEEE},
  year = {2007},
  pages = {1-5},
  url = {http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4295585},
  doi = {http://doi.org/10.1109/FUZZY.2007.4295585}
}
Ayesh, A. Beaver Algorithm for Network Security and Optimization: Preliminary Report 2009 The IEEE International Conference on Systems, Man, and Cybernetics (SMC2009), pp. 3757 - 3762  inproceedings DOI URL 
Abstract: This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart mobile phone). An algorithmic approach to design the beaver agent and swarm is followed here. The set of algorithms presented is complemented by critical review outlining the further work needed.
BibTeX:
@inproceedings{Ayesh2009a,
  author = {Ayesh, Aladdin},
  title = {Beaver Algorithm for Network Security and Optimization: Preliminary Report},
  booktitle = {The IEEE International Conference on Systems, Man, and Cybernetics (SMC2009)},
  publisher = {IEEE},
  year = {2009},
  pages = {3757 - 3762},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5346866},
  doi = {http://doi.org/10.1109/ICSMC.2009.5346866}
}
Ayesh, A., Arevalillo-Herráez, M. and Ferri, F.J. Cognitive Reasoning and Inferences through Psychologically based Personalised Modelling of Emotions Using Associative Classifiers 2014 ICCI*CC 2014 Proceedings, pp. 67-72  inproceedings  
BibTeX:
@inproceedings{Ayesh2014d,
  author = {Ayesh, Aaladdin and Arevalillo-Herráez, Miguel and Ferri, Francesc J.},
  title = {Cognitive Reasoning and Inferences through Psychologically based Personalised Modelling of Emotions Using Associative Classifiers},
  booktitle = {ICCI*CC 2014 Proceedings},
  publisher = {IEEE},
  year = {2014},
  pages = {67-72},
  note = {Presentation avaliable from: http://www.slideshare.net/AladdinAyesh/v1-cognitive-informaticspresentation2014}
}
Ayesh, A. Mobile cognitive systems: the business of connecting data to user-centred services with a smile 2014 Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on, pp. 1-7  inproceedings DOI  
Abstract: Recent technological advances made several of futuristic visions and science fiction a possible reality. For example, the advances in smartphones and tablet hardware that enables very powerful computers being packed into a palm size devices with multiple sensors and communication ports make visions of living machines and augmented human presence a realistic possibility. Communication ports and protocols expand the social dimension of such a possibility. Similarly, the powerful processors on the mobile devices provide computational environment sufficient to run some of the most computationally demanding artificial intelligence algorithms and to host some of the most complex of architectures. This enables the intelligent mobile agents to roam the ever expanding world of connected clouds exploring both data storages and mobile devices with ever shrinking boundaries between storage, processing and user devices. However, integrative technologies are still needed to realise the potential of such amazing advances. This talk aims to explore such technologies and current research in the light of big data initiatives and on the lines of mobility, cognition and connected systems.
BibTeX:
@inproceedings{Ayesh2014e,
  author = {Ayesh, A.},
  title = {Mobile cognitive systems: the business of connecting data to user-centred services with a smile},
  booktitle = {Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on},
  publisher = {IEEE},
  year = {2014},
  pages = {1-7},
  doi = {http://doi.org/10.1109/ICRITO.2014.7014659}
}
Ayesh, A., Arevalillo-Herráez, M. and Marco-Giménez, L. Class Discovery from Semi-Structured EGG Data for Affective Computing and Personalisation 2017 The 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC 2017)  inproceedings  
BibTeX:
@inproceedings{Ayesh2017,
  author = {Aladdin Ayesh and Miguel Arevalillo-Herráez and Luis Marco-Giménez},
  title = {Class Discovery from Semi-Structured EGG Data for Affective Computing and Personalisation},
  booktitle = {The 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC 2017)},
  year = {2017}
}
Al-Azawi, R., Al-Obaidy, M., Ayesh, A. and Rosenburg, D. The impact of using educational gamification in mobile computing course: A case study 2016 Communication, Management and Information Technology: Proceedings of the International Conference on Communication, Management and Information Technology (ICCMIT 2016), pp. 235-240  inproceedings  
BibTeX:
@inproceedings{Azawi2016,
  author = {Rula Al-Azawi and Mohaned Al-Obaidy and Aladdin Ayesh and Duska Rosenburg},
  title = {The impact of using educational gamification in mobile computing course: A case study},
  booktitle = {Communication, Management and Information Technology: Proceedings of the International Conference on Communication, Management and Information Technology (ICCMIT 2016)},
  publisher = {CRC Press},
  year = {2016},
  pages = {235-240}
}
Bertelle, C., Al-Obaidy, M., Ayesh, A. and Ghnemat, R. Intelligent Land-Use Management and Sustainable Development: From Interacting Wireless Sensors Networks to Spatial Emergence for Decision Making 2010 The 7th IEEE Conference and Workshops on Engineering of Autonomic and Autonomous Systems (EASe 2010)  inproceedings DOI URL 
Abstract: This paper addresses the modelling of land-use development described by users-services systems. On one hand, the increasing economical, technological, social and environmental changes in our world make the management of urban services to be a great challenge. On the other hand, new technologies provide efficient tools in order to obtain accurate information from various sensors or captors leading to targeted service delivery based on localized factors. Within this paper, we propose a descriptive model to deal with land-use development, based on a three level system in which the environment is an active level interacting with users and services. The three levels are represented in a form of a network of networks consisting of active nodes in dynamic system context. This descriptive model helps in isolating the decision making in a distributed autonomous fashion. Bio-inspired Swarm Intelligence techniques are utilized to realise this objective. The integration between environment sensing, services information handling and planning is a key and difficult part within this research.
BibTeX:
@inproceedings{Bertelle2010,
  author = {Bertelle, Cyrille and Al-Obaidy, Mohaned and Ayesh, Aladdin and Ghnemat, Rawan},
  title = {Intelligent Land-Use Management and Sustainable Development: From Interacting Wireless Sensors Networks to Spatial Emergence for Decision Making},
  booktitle = {The 7th IEEE Conference and Workshops on Engineering of Autonomic and Autonomous Systems (EASe 2010)},
  publisher = {IEEE},
  year = {2010},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5457819},
  doi = {http://doi.org/10.1109/EASe.2010.17}
}
Blewitt, W.F. and Ayesh, A. Modeling the Emotional State of an Agent through Fuzzy Logic With Reference to the Geneva Emotion Wheel 2008 European Simulation and Modelling (ESM'2008) Conference, pp. 279-283  inproceedings  
BibTeX:
@inproceedings{Blewitt2008,
  author = {Blewitt , William F. and Ayesh, Aladdin},
  title = {Modeling the Emotional State of an Agent through Fuzzy Logic With Reference to the Geneva Emotion Wheel },
  booktitle = {European Simulation and Modelling (ESM'2008) Conference},
  publisher = {EUROSIS},
  year = {2008},
  pages = {279-283}
}
Blewitt, W., Ayesh, A., John, R.I. and Coupland, S. A Millenson-based approach to emotion modelling 2008 Human System Interactions, 2008 Conference on, pp. 491-496  inproceedings DOI URL 
Abstract: The issue of accurately modelling human emotions in agents has been the subject of extensive debate for some decades. This debate, complicated as it is by constant psy chological arguments about the nature of emotions and their affects on behaviour, has given rise to many different schools of thought within the greater, overarching subject of affective computing. Our work centres around a fuzzy logic system, its goal being to more accurately model the emotional state, and changes of the emotional state, through usage of a three dimensional emotion model. Within this paper we intend to outline our system for modelling emotional state and changes to emotional state. We shall include an outline of the psychological basis for our work, and discussion of basic implementation of the proposed system.
BibTeX:
@inproceedings{Blewitt2008a,
  author = {Blewitt, William and Ayesh, Aladdin and John, Robert I. and Coupland, Simon},
  title = {A Millenson-based approach to emotion modelling},
  booktitle = {Human System Interactions, 2008 Conference on},
  year = {2008},
  pages = {491-496},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4581488},
  doi = {http://doi.org/10.1109/HSI.2008.4581488}
}
Blewitt, W. and Ayesh, A. Implementation of Millenson's Model of Emotions in a Game Environment 2009 AISB Convention: AI and Games Symposium  inproceedings URL 
Abstract: Emotions, arguably, impact our perception and decision-making. Modelling emotions and emotional responses in non-player characters is an active field of investigation. Our work centres on the implementation of psychological models through fuzzy logic, as a way of informing agent decisionmaking in video games. This paper presents an emotion model proposed by Millenson, and the demonstration of this model in a game environment. We shall include an outline of the psychological background to our work, the specifics of the implementation, and some discussion of our conclusions.
BibTeX:
@inproceedings{Blewitt2009,
  author = {Blewitt, W. and Ayesh, A. },
  title = {Implementation of Millenson's Model of Emotions in a Game Environment },
  booktitle = {AISB Convention: AI and Games Symposium},
  publisher = {AISB},
  year = {2009},
  url = {http://www.aisb.org.uk/convention/aisb09/Proceedings/AIGAMES/FILES/BlewittW.pdf}
}
Braik, M., Sheta, A. and Ayesh, A. Image Enhancement Using Particle Swarm Optimization 2007 The 2007 International Conference of Signal and Image Engineering  inproceedings URL 
Abstract: Applications of the Particle Swarm Optimization
(PSO) to solve image processing problem
with a reference to a new automatic enhancement
technique based on real-coded particle swarms is proposed
in this paper. The enhancement process is
a non-linear optimization problem with several constraints.
The objective of the proposed PSO is to
maximize an objective fitness criterion in order to enhance
the contrast and detail in an image by adapting
the parameters of a novel extension to a local
enhancement technique. The feasibility of the proposed
method is demonstrated and compared with
Genetic Algorithms (GAs) based image enhancement
technique. The obtained results indicate that the proposed
PSO yields better results in terms of both the
maximization of the number of pixels in the edges
and the adopted objective evaluation. Computational
time is also relatively small in the PSO case compared
to the GA case.
Keywords: particle swarm optimization, genetic algorithms,
image enhancement
BibTeX:
@inproceedings{Braik2007a,
  author = {Braik, Malik and Sheta, Alaa and Ayesh, Aladdin},
  title = {Image Enhancement Using Particle Swarm Optimization},
  booktitle = {The 2007 International Conference of Signal and Image Engineering},
  publisher = {International Assocition of Engineers (IAENG)},
  year = {2007},
  url = {http://www.iaeng.org/publication/WCE2007/WCE2007_pp696-701.pdf}
}
Cowell, J. and Ayesh, A. Automatic analysis of facial expressions: problems and solutions to data collection 2003 CHI2003 Workshop on SUBTLE EXPRESSIVITY FOR CHARACTERS AND ROBOTS in cooperation with the CHI2003 Conference  inproceedings URL 
BibTeX:
@inproceedings{Cowell2003,
  author = {Cowell, John and Ayesh, Aladdin},
  title = {Automatic analysis of facial expressions: problems and solutions to data collection},
  booktitle = {CHI2003 Workshop on SUBTLE EXPRESSIVITY FOR CHARACTERS AND ROBOTS in cooperation with the CHI2003 Conference},
  publisher = {http://www.bartneck.de/workshop/chi2003/},
  year = {2003},
  url = {http://www.bartneck.de/workshop/chi2003/}
}
Cowell, J. and Ayesh, A. Extracting Subtle Facial Expression for Emotional Analysis 2004 IEEE SMC 2004, pp. 672-676  inproceedings DOI URL 
Abstract: Humans convey emotions with subtle facial expressions. The interpretation of these expressions not only depends on that expression, but on how it developed. Exposing this development enables a better analysis of the ambiguity experienced when analyzing the underlying emotion. Subtle facial expressions can be objectively measured in terms of action units as defined in the facial action coding system. This paper presents a facial expression language based on FACS which provides a continues stream of expressions for measuring the growth of expression. The development of the emotion surprise which requires two action units is used as a test case
BibTeX:
@inproceedings{Cowell2004,
  author = {Cowell, John and Ayesh, Aladdin},
  title = {Extracting Subtle Facial Expression for Emotional Analysis},
  booktitle = {IEEE SMC 2004},
  year = {2004},
  pages = {672-676},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1398378},
  doi = {http://doi.org/10.1109/ICSMC.2004.1398378}
}
Daglioz, M.O. and Ayesh, A. Aqua Swarms: Design and Implementation of Water Surface AUV 2008
Vol. 11Swarm Intelligence Algorithms and Applications Symposium (SIAAS'08) - AISB 2008 Convention, pp. 38-43 
inproceedings URL 
Abstract: Autonomous marine vehicles are remarkably useful for
tasks such as shallow water surveying, environmental data collecting
and military operations such as surveillance and weapon delivery.
Because of the necessity for autonomous marine vehicles and
the challenges they impose, they have gained a widespread interest
among the research groups around the world. This paper presents
a water surface autonomous unmanned vehicle which moves from
a starting point to any desired destination while avoiding obstacles.
Unlike many water surface unmanned vehicles this robots relies on
oars for its mobility. This gives a greater control and precision in manoeuvrability
while keeping the size of the robot as small as possible.
This paper presents the hardware and software design and implementation
of a dual-oar water surface autonomous vehicle. Comprehensive
experimentation was conducted and results of the experiments
are presented.
BibTeX:
@inproceedings{Daglioz2008,
  author = {Daglioz, Mustafa Ozkan and Ayesh, Aladdin},
  title = {Aqua Swarms: Design and Implementation of Water Surface AUV},
  booktitle = {Swarm Intelligence Algorithms and Applications Symposium (SIAAS'08) - AISB 2008 Convention},
  year = {2008},
  volume = {11},
  pages = {38-43},
  url = {http://www.aisb.org.uk/convention/aisb08/proc/proceedings/11%20Swarm%20Intelligence/07.pdf}
}
Daoud, M.S., Ayesh, A., Hopgood, A.A. and Al-Fayoumi, M. A new Splitting-based Displacement Prediction Approach for Location-Based Services 2011 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 392-397  inproceedings DOI URL 
Abstract: In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship between accuracy rate of prediction and the performance of the model in terms of consuming resources and constraints of mobile devices. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shape cells. These models are not suitable for certain LBSs where the objectives are to compute and present on-road services. One such technique is the Prediction Location Model (PLM), which deals with inner cell structure. The PLM technique suffers from memory usage and poor accuracy. The main goal of this paper is to propose a new path prediction technique for Location-Based Services. The new approach is competitive and more efficient compared to PLM regarding measurements such as accuracy rate of location prediction and memory usage.
BibTeX:
@inproceedings{Daoud2011,
  author = {Daoud, M. S. and Ayesh, A. and Hopgood, A. A. and Al-Fayoumi, M.},
  title = {A new Splitting-based Displacement Prediction Approach for Location-Based Services},
  booktitle = {2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC)},
  year = {2011},
  pages = {392-397},
  note = {Byg71 Times Cited:0 Cited References Count:19 IEEE International Conference on Systems Man and Cybernetics Conference Proceedings},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6083697},
  doi = {http://doi.org/10.1109/ICSMC.2011.6083697}
}
Daoud, M.S., Ayesh, A., Al-Fayoumi, M. and Hopgood, A.A. An Enhanced Ant Colony Optimization for Routing Area Mobility Prediction over Cellular Communications Network 2013 ICAART 2013 - 5th International Conference on Agents and Artificial Intelligence, pp. 419-424  inproceedings  
BibTeX:
@inproceedings{Daoud2013a,
  author = {Daoud, Mohammad Sh. and Ayesh, Aladdin and Al-Fayoumi, Mustafa and Hopgood , Adrian A.},
  title = {An Enhanced Ant Colony Optimization for Routing Area Mobility Prediction over Cellular Communications Network},
  booktitle = {ICAART 2013 - 5th International Conference on Agents and Artificial Intelligence},
  year = {2013},
  pages = {419-424}
}
Herraez, M.A., Herraez, R.A., Ayesh, A., Clegg, D.B. and Ng, E.H. A Computer Vision System For Planning In Manufacturing 1997 The Chinese Automation Conference In The Uk (Cacuk'97) Proceedings, pp. pp. 75-80  inproceedings  
BibTeX:
@inproceedings{Herraez1997,
  author = {Herraez, M. A. and Herraez, R. A. and Ayesh, A. and Clegg, D. B. and Ng, Eng Huat},
  title = {A Computer Vision System For Planning In Manufacturing},
  booktitle = {The Chinese Automation Conference In The Uk (Cacuk'97) Proceedings},
  publisher = {The Chinese Automation Society in the UK},
  year = {1997},
  pages = {pp. 75-80}
}
Lim, Y.M., Chee, K.N., Ayesh, A. and Stacey, M. Designing Learning Management System to Encourage E- Learning Sustainability 2013 , pp. 76-83TARC   inproceedings  
BibTeX:
@inproceedings{Lim2013,
  author = {Lim, Yee Mei and Chee, Keh Niang and Ayesh, Aladdin and Stacey, Martin},
  title = {Designing Learning Management System to Encourage E- Learning Sustainability},
  year = {2013},
  pages = {76-83}
}
Lim, Y.M., Ayesh, A. and Stacey, M. The Effects of Menu Design on Users Emotions, Search Performance and Mouse Behaviour 2014 ICCI*CC 2014 Proceedings, pp. 541-549  inproceedings  
BibTeX:
@inproceedings{Lim2014,
  author = {Lim, Yee Mei and Ayesh, Aladdin and Martin Stacey},
  title = {The Effects of Menu Design on Users Emotions, Search Performance and Mouse Behaviour},
  booktitle = {ICCI*CC 2014 Proceedings},
  publisher = {IEEE},
  year = {2014},
  pages = {541-549}
}
Lim, Y.M., Ayesh, A. and Stacey, M. Detecting Cognitive Stress from Keyboard and Mouse Dynamics during Mental Arithmetic 2014 Science and Information Conference 2014, pp. 146-152  inproceedings  
BibTeX:
@inproceedings{Lim2014a,
  author = {Lim, Yee Mei and Ayesh, Aladdin and Stacey, Martin},
  title = {Detecting Cognitive Stress from Keyboard and Mouse Dynamics during Mental Arithmetic},
  booktitle = {Science and Information Conference 2014},
  year = {2014},
  pages = {146--152}
}
Lim, Y.M., Ayesh, A. and Stacey, M. Detecting Emotional Stress during Typing Task with Time Pressure 2014 Science and Information Conference 2014, pp. 329-338  inproceedings  
BibTeX:
@inproceedings{Lim2014b,
  author = {Lim, Yee Mei and Ayesh, Aladdin and Stacey, Martin},
  title = {Detecting Emotional Stress during Typing Task with Time Pressure},
  booktitle = {Science and Information Conference 2014},
  year = {2014},
  pages = {329--338}
}
Lim, Y., Ayesh, A. and Stacey, M. Exploring Direct Learning Instruction and External Stimuli Effects on Learner's States and Mouse/Keystroke Behaviours 2016 User Science and Engineering (i-USEr), 2016 4th International Conference on, pp. 161-166  inproceedings  
Review: journal = http://www.insightsociety.org/ojaseit/index.php/ijaseit,
BibTeX:
@inproceedings{Lim2016a,
  author = {Lim, YeeMei and Ayesh, Aladdin and Stacey, Martin},
  title = {Exploring Direct Learning Instruction and External Stimuli Effects on Learner's States and Mouse/Keystroke Behaviours},
  booktitle = {User Science and Engineering (i-USEr), 2016 4th International Conference on},
  publisher = {IEEE},
  year = {2016},
  pages = {161-166}
}
Lim, Y.M., Ayesh, A. and Stacey, M. The Effects of Typing Demand on Learner's Motivation/Attitude-Driven Behaviour (MADB) Model with Mouse and Keystroke Behaviours 2017 The 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC 2017)  inproceedings  
BibTeX:
@inproceedings{Lim2017a,
  author = {Yee Mei Lim and Aladdin Ayesh and Martin Stacey},
  title = {The Effects of Typing Demand on Learner's Motivation/Attitude-Driven Behaviour (MADB) Model with Mouse and Keystroke Behaviours},
  booktitle = {The 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC 2017)},
  year = {2017}
}
Marco-Giménez, L., Arevalillo-Herráez, M., Ayesh, A. and Szwoch, M. An extension to the FEEDB Multimodal Database of Facial Expressions and Emotions 2015 Eurosis ESM 2015, pp. 455 - 460  inproceedings  
BibTeX:
@inproceedings{Marco-Gimenez2015,
  author = {Marco-Giménez, Luis and Arevalillo-Herráez, Miguel and Ayesh, Aladdin and Szwoch, Mariusz},
  title = {An extension to the FEEDB Multimodal Database of Facial Expressions and Emotions},
  booktitle = {Eurosis ESM 2015},
  year = {2015},
  pages = {455 - 460}
}
Marco-Gimenez, L., Arevalillo-Herráez, M., Ferri, F., Boticario, S.M.-P.J., Santos, O., Salmeron-Majadas, S., Saneiro, M., Uria-Rivas, R., Arnau, D., González-Calero, J.A., Ayesh, A., Arnau-González, P. and Ramzan, N. Affective and Behavioral Assessment for Adaptive Intelligent Tutoring Systems 2016 Proceedings of the 24th ACM Conference on User Modeling, Adaptation and Personalisation (UMAP 2016), Halifax, Canada,  inproceedings  
BibTeX:
@inproceedings{Marco-Gimenez2016,
  author = {L. Marco-Gimenez and M. Arevalillo-Herráez and F.J. Ferri and S. Moreno-Picot J.G. Boticario and O.C. Santos and S. Salmeron-Majadas and M. Saneiro and R. Uria-Rivas and David Arnau and JosŽ A. González-Calero and Aladdin Ayesh and P. Arnau-González and N. Ramzan},
  title = {Affective and Behavioral Assessment for Adaptive Intelligent Tutoring Systems},
  booktitle = {Proceedings of the 24th ACM Conference on User Modeling, Adaptation and Personalisation (UMAP 2016), Halifax, Canada,},
  year = {2016}
}
Muhammad, M.A., Ayesh, A. and Zadeh, P.B. Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access 2017 International Conference on Future Networks and Distributed Systems (ICFNDS 2017)  inproceedings  
BibTeX:
@inproceedings{Muhammad2017,
  author = {Musa Abubakar Muhammad and Aladdin Ayesh and Pooneh Bagheri Zadeh},
  title = {Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access},
  booktitle = {International Conference on Future Networks and Distributed Systems (ICFNDS 2017)},
  year = {2017}
}
Nikolaev, P., Zedan, H. and Ayesh, A. Combined Course Programmes Support System (CProgS) 2009 2nd International Conference Creativity and Innovation in Software Engineering (CISE'09)  inproceedings  
BibTeX:
@inproceedings{Nikolaev2009,
  author = {Nikolaev, Pavel and Zedan, Hussein and Ayesh, Aladdin},
  title = {Combined Course Programmes Support System (CProgS)},
  booktitle = {2nd International Conference Creativity and Innovation in Software Engineering (CISE'09)},
  year = {2009}
}
Nikolaev, P., Ayesh, A. and Chernikova, Y. Policy-based HTN planning techniques for Combined Course Programmes Generation 2011 The Fourth Int. Conference on Internet Technologies and Applications (ITA 2011) Proceedings  inproceedings URL 
Abstract: A growth of Internet technologies usage in e-Learning leads to the educational content interoperability, to the content sharing and exchange among learning content providers. On the other hand, integration processes in the area of higher education are also intensified. But in the higher education a learning track of a student should be specified for a long period of time, it should satisfy normative requirements and lead to an official qualification. Combined Course Programmes (CCP) are developed by several universities using different student mobility schemes. In order to support the CCP development process a CCP generation mechanism using Hierarchical Task Network (HTN) planning was introduced. Two novel techniques were implemented to extend HTN planning in order to meet the requirements of the CCP generation task. First technique is policy-based HTN planning that improves the flexibility and expressivity of HTN planning. It gives a possibility for planning in complex, heterogeneous and dynamic environments. Hypergraph-based transformation was introduced to generate policy request from a planner's world state. Second technique is a domain refinement operation that improves the effectiveness of HTN planning in the large multi-domain hierarchical environment.
BibTeX:
@inproceedings{Nikolaev2011,
  author = {Nikolaev, P. and Ayesh, A. and Chernikova, Y.},
  title = {Policy-based HTN planning techniques for Combined Course Programmes Generation},
  booktitle = {The Fourth Int. Conference on Internet Technologies and Applications (ITA 2011) Proceedings},
  year = {2011},
  url = {http://www.scopus.com/record/display.url?eid=2-s2.0-84857706819&origin=inward&txGid=A584A50C68AE72A3B5A07C012FE89AE9.mw4ft95QGjz1tIFG9A1uw%3a7}
}
Nikolaev, P. and Ayesh, A. Combined Course Programmes Generation in Multi-agent e-Learning System using Policy-based HTN planning 2011 KES-AMSTA 2011 Proceedings, pp. 504-514  inproceedings  
BibTeX:
@inproceedings{Nikolaev2011b,
  author = {Nikolaev, P. and Ayesh, A.},
  title = {Combined Course Programmes Generation in Multi-agent e-Learning System using Policy-based HTN planning},
  booktitle = {KES-AMSTA 2011 Proceedings},
  publisher = {Springer},
  year = {2011},
  pages = {504-514}
}
P.Nikolaev and Ayesh, A. Development of a System for Combined Course Programmes Support 2008 book of abstracts presented on Russian "Manufactoring Enginering Technologies" conference., pp. 283 - 284.  inproceedings  
BibTeX:
@inproceedings{P.Nikolaev2008,
  author = {P.Nikolaev and Ayesh, A.},
  title = {Development of a System for Combined Course Programmes Support},
  booktitle = {book of abstracts presented on Russian "Manufactoring Enginering Technologies" conference.},
  publisher = {BMSTU Publishing House},
  year = {2008},
  pages = {283 - 284.}
}
Shamanna, B. and Ayesh, A. AquaRobots Phase II: Oil Spillage Detection Using Swarm AquaBots 2009 AISB Convention: The 2nd Swarm Intelligence Algorithms and Applications Symposium (SIAAS-09)  inproceedings URL 
Abstract: Applications of underwater and space exploration robots and those operating in hazardous environments can benefit from the use of multi-robot system. In challenging applications like these, multi-robot systems can deal with wide range of tasks, cope with environmental changes including the loss of robots, faster, and often relatively cheaper. The main aim of the project reported in this paper is to build autonomous marine robots (AquaBots), to deploy these AquaBots in group to form a swarm and assign them the task of searching the surrounding area for any oil spillage. In the prototypes, that spillage is simulated using target material. Finally optimize the number of robots in a swarm based on the time estimates to achieve this goal.
BibTeX:
@inproceedings{Shamanna2009,
  author = {Shamanna, B. and Ayesh, A.},
  title = {AquaRobots Phase II: Oil Spillage Detection Using Swarm AquaBots },
  booktitle = {AISB Convention: The 2nd Swarm Intelligence Algorithms and Applications Symposium (SIAAS-09)},
  publisher = {AISB},
  year = {2009},
  url = {http://www.aisb.org.uk/convention/aisb09/Proceedings/SIAAS09/FILES/AyeshA.pdf}
}
Sheta, A., Rine, D. and Ayesh, A. Development of Software Effort and Schedule Estimation Models Using Soft Computing Techniques 2008 IEEE World Congress on Computational Intelligence  inproceedings DOI URL 
Abstract: Accurate estimation of the software effort and schedule affects the budget computation. Bidding for contracts depends mainly on the estimated cost. Inaccurate estimates will lead to failure of making a profit, increased probability of project incompletion and delay of the project delivery date. In this paper, we explore the use of Soft Computing Techniques to build a suitable model structure to utilize improved estimations of software effort for NASA software projects. In doing so, we plan to use Particle Swarm Optimization (PSO) to tune the parameters of the famous COnstructive COst MOdel (COCOMO). We plan also to explore the advantages of Fuzzy Logic to build a set of linear models over the domain of possible software Line Of Code (LOC). The performance of the developed model was evaluated using NASA software projects data set [1]. A comparison between COCOMO tuned-PSO, Fuzzy Logic (FL), Halstead, Walston-Felix, Bailey-Basili and Doty models were provided.
BibTeX:
@inproceedings{Sheta2008,
  author = {Sheta, Alaa and Rine, David and Ayesh, Aladdin},
  title = {Development of Software Effort and Schedule Estimation Models Using Soft Computing Techniques},
  booktitle = {IEEE World Congress on Computational Intelligence},
  year = {2008},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4630961},
  doi = {http://doi.org/10.1109/CEC.2008.4630961}
}
Wang, R., Chen, L., Solheim, I., Schulz, T. and Ayesh, A. Conceptual Motivation Modeling for Students with Dyslexia for Enhanced Assistive Learning 2017 Proceedings of the 2017 ACM Workshop on Intelligent Interfaces for Ubiquitous and Smart Learning, pp. 11-18  inproceedings DOI URL 
Abstract: Students with dyslexia often suffer from the lack of academic self-worth and frustration that can even lead to learned helplessness. However, few studies have investigated the impact of incorporating users' motivational factors into user modeling to enhance the learning experience for students with dyslexia. In this paper we attempt to develop a conceptual motivation model for people with dyslexia in their use of assistive learning tools. To this end, we carry out a small-scale empirical study in real-world learning scenarios. Then we conduct individual interviews to gain first-hand data about the key factors and features affecting learning experience. Using coding and thematic analysis methods we discuss main themes regarding motivational factors and their interrelationships identified. Based on these findings, we create a conceptual motivation model tailored towards students with dyslexia, which will help enhance learning experience and improve learning efficiency.
BibTeX:
@inproceedings{Wang2017,
  author = {Wang, Ruijie and Chen, Liming and Solheim, Ivar and Schulz, Trenton and Ayesh, Aladdin},
  title = {Conceptual Motivation Modeling for Students with Dyslexia for Enhanced Assistive Learning},
  booktitle = {Proceedings of the 2017 ACM Workshop on Intelligent Interfaces for Ubiquitous and Smart Learning},
  publisher = {ACM},
  year = {2017},
  pages = {11--18},
  url = {http://doi.acm.org/10.1145/3038535.3038542},
  doi = {http://doi.org/10.1145/3038535.3038542}
}
Yu, H., Kelleher, G. and Ayesh, A. Planning through Petri Nets 1997 The 16th Workshop Of The Uk Planning & Scheduling Special Interest Group, pp. 83-90  inproceedings URL 
BibTeX:
@inproceedings{Yu1997,
  author = {Yu, Hongnian and Kelleher, Gerry and Ayesh, Aladdin},
  title = {Planning through Petri Nets},
  booktitle = {The 16th Workshop Of The Uk Planning & Scheduling Special Interest Group},
  year = {1997},
  pages = {83-90},
  url = {citeseer.ifi.unizh.ch/528613.html}
}
Zahary, A. and Ayesh, A. Analytical study to detect threshold number of efficient routes in multipath AODV extensions 2007 Computer Engineering & Systems, 2007. ICCES '07. International Conference on, pp. 95-100  inproceedings DOI URL 
Abstract: AODV is one of the most common reactive routing protocols used in Mobile Ad hoc Networks (MANETs). It has many advantages over proactive protocols and its drawbacks could be overcome by applying some modifications on the protocol mechanism. One drawback of AODV is the single route abstraction which requires a source node to establish a new route discovery process when a link failure is encountered in the primary current route. Many approaches have been conducted to solve this problem either partial-route re-establishment or Multipath establishment approaches. In this paper, we present an analytical study aims to reduce routing delay time overhead by detecting the waiting time needed to receive a threshold number of efficient routes that are actually needed by a source node to communicate a destination. A new Multipath establishment approach named Threshold Routes AODV (TRAODV) has been implemented and evaluated against Multiple-Route AODV (MRAODV) in terms of routing delay time overhead and Route Availability which has been defined in this paper as a new performance indicator for Multipath AODV extensions. A framework of Multipath AODV implementation has been applied on a self-developed simulator based on Unified Modeling Language (UML) and Java open source.
BibTeX:
@inproceedings{Zahary2007,
  author = {Zahary, A. and Ayesh, A.},
  title = {Analytical study to detect threshold number of efficient routes in multipath AODV extensions},
  booktitle = {Computer Engineering & Systems, 2007. ICCES '07. International Conference on},
  year = {2007},
  pages = {95-100},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4447032},
  doi = {http://doi.org/10.1109/ICCES.2007.4447032}
}
Zahary, A. and Ayesh, A. On-demand Multiple Route Maintenance in AODV Extensions (ORMAD) 2008 International Conference on Computer Engineering and Systems (ICCES'08)  inproceedings DOI URL 
Abstract: This paper aims to improve routing fault tolerance in mobile ad hoc networks by optimizing multipath routing in traditional AODV routing protocol. It tries to prove the effect of varying waiting time of Route Reply (RREP) procedure and utilizing the concepts of threshold waiting time and efficient routes on the performance of multipath extensions to AODV. A novel approach called ORMAD (On-demand Route maintenance in Multipath AoDv) is conducted in this paper as a link-disjoint extension to our existing approach called TRAODV. ORMAD tries to optimize routing overhead of both Route Discovery Process (RDP) and Route Maintenance Process (RMP) of multipath extensions to AODV. When detecting a link failure in the primary route, ORMAD invokes a local repair procedure between the upstream and the downstream nodes of the broken link. Unlike ORMAD, TRAODV invokes a local repair procedure at the upstream node of the broken link to reach the destination node, which causes more routing overhead. In addition, ORMAD applies RMP only to the efficient routes, which leads to enhance route efficiency and consequently minimizes routing overhead. ORMAD is implemented using NS2 and evaluated against three multipath extensions to AODV protocol; TRAODV, MRAODV, and AOMDV. Results show that the performance is affected by varying the RREP waiting times of both phases RDP and RMP in different scenarios. ORMAD enhances routing packets overhead and average end-to-end delay compared to TRAODV and the other protocols, especially in high mobility scenarios.
BibTeX:
@inproceedings{Zahary2008,
  author = {Zahary, Ammar and Ayesh, Aladdin},
  title = {On-demand Multiple Route Maintenance in AODV Extensions (ORMAD)},
  booktitle = {International Conference on Computer Engineering and Systems (ICCES'08)},
  publisher = {IEEE},
  year = {2008},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4773001},
  doi = {http://doi.org/10.1109/ICCES.2008.4773001}
}
Zahary, A. and Ayesh, A. Threshold efficient multiple routes in AODV extensions 2009 Computer Engineering Systems, 2009. ICCES 2009. International Conference on, pp. 561-566  inproceedings DOI URL 
Abstract: The aim of this paper is to present a novel multipath routing approach in MANETs as new extensions to AODV, a well-known traditional reactive routing protocol. The approach is called Threshold efficient Routes in multipath AODV (TRAODV) which is a link-disjoint multipath extension that tries to optimise routing delay overhead in the route discovery process of traditional AODV. The optimisation in TRAODV is accomplished by detecting the waiting time required for route reply procedure until receiving a threshold number of efficient routes. TRAODV is implemented and evaluated against two existing multipath extensions to AODV protocol; AOMDV and MRAODV, and two traditional multipath protocols; DSR and TORA. All protocols are implemented using NS2 and evaluated under the same simulation environment in terms of three performance metrics; packet delivery fraction, average end-to-end delay, and routing packets overhead. Simulation results show that TRAODV reduces the overall routing packets overhead compared to both extensions AOMDV and MRAODV, especially for large network size and high mobility.
BibTeX:
@inproceedings{Zahary2009,
  author = {Zahary, A. and Ayesh, A.},
  title = {Threshold efficient multiple routes in AODV extensions},
  booktitle = {Computer Engineering Systems, 2009. ICCES 2009. International Conference on},
  year = {2009},
  pages = {561-566},
  url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5383068},
  doi = {http://doi.org/10.1109/ICCES.2009.5383068}
}
Ayesh, A. Self Reference in AI 1995 School: University of Essex  mastersthesis  
BibTeX:
@mastersthesis{Ayesh1995,
  author = {Ayesh, A.},
  title = {Self Reference in AI},
  school = {University of Essex},
  year = {1995}
}
Ayesh, A. An Investigation Into Formal Models Of Change In Artificial Intelligence 1999 School: Liverpool John Moores University  phdthesis  
BibTeX:
@phdthesis{Ayesh1999,
  author = {Ayesh, Aladdin},
  title = {An Investigation Into Formal Models Of Change In Artificial Intelligence},
  school = {Liverpool John Moores University},
  year = {1999}
}
The 11th International Conference on Intelligent Games and Simulation (GameOn 2010) 2010   proceedings  
BibTeX:
@proceedings{Ayesh2010a,,
  title = {The 11th International Conference on Intelligent Games and Simulation (GameOn 2010)},
  publisher = {EUROSIS -The European Multidisciplinary Society for Modelling and Simulation Technology},
  year = {2010}
}
The 22nd annual European Simulation and Modelling Conference (ESM 2008) 2008   proceedings  
BibTeX:
@proceedings{Bertelle2008,,
  title = {The 22nd annual European Simulation and Modelling Conference (ESM 2008)},
  publisher = {EUROSIS -The European Multidisciplinary Society for Modelling and Simulation Technology},
  year = {2008}
}
Created by JabRef on 08/08/2017.