Sabah S. Al-Fedaghi

According to our database1, Sabah S. Al-Fedaghi authored at least 152 papers between 1979 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


Online presence:



Conceptual Modeling with Constraints.
CoRR, 2022

State-Based Behavior Modeling in Software and Systems Engineering.
CoRR, 2022

Change in Conceptual Modeling and Systems Reconfiguration.
CoRR, 2022

Conceptual Modeling of Events Based on One-Category Ontology.
CoRR, 2022

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging.
CoRR, 2022

Conceptual Modeling of an IP Phone Communication System: A Case Study.
Int. J. Interdiscip. Telecommun. Netw., 2021

Software Engineering Meets Systems Engineering: Conceptual Modeling Applied to Engineering Operations.
CoRR, 2021

Conceptual Data Modeling: Entity-Relationship Models as Thinging Machines.
CoRR, 2021

Beyond SDLC: Process Modeling and Documentation Using Thinging Machines.
CoRR, 2021

TMUML: A Singular TM Model with UML Use Cases and Classes.
CoRR, 2021

Validation: Conceptual versus Activity Diagram Approaches.
CoRR, 2021

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction.
CoRR, 2021

UML Sequence Diagram: An Alternative Model.
CoRR, 2021

Model Multiplicity (UML) Versus Model Singularity in System Requirements and Design.
CoRR, 2021

Modeling in Systems Engineering: Conceptual Time Representation.
CoRR, 2021

Conceptual Model with Built-in Process Mining.
CoRR, 2021

Diagrammatic Formalism for Complex Systems: More than One Way to Eventize a Railcar System.
CoRR, 2021

Conceptual Modeling for Computer Organization and Architecture.
CoRR, 2021

UML Modeling to TM Modeling and Back.
CoRR, 2021

Conceptual Temporal Modeling Applied to Databases.
CoRR, 2021

Advancing Behavior Engineering: Toward Integrated Events Modeling.
CoRR, 2021

Conceptual Software Engineering Applied to Movie Scripts and Stories.
CoRR, 2020

Exploration in Algorithm Engineering: Modeling Algorithms.
CoRR, 2020

High-Level Description of Robot Architecture.
CoRR, 2020

Towards Conceptual Modeling Semantics: Eventizing Tarski's Truth Schema.
CoRR, 2020

Underpinning Theories of Software Engineering: Dynamism in Physical Sources of the Shannon Weaver Communication Model.
CoRR, 2020

Computer Program Decomposition and Dynamic/Behavioral Modeling.
CoRR, 2020

Changes, States, and Events: The Thread from Staticity to Dynamism in the Conceptual Modeling of Systems.
CoRR, 2020

Dissipating with Relations: Implication for the Entity-Relationship Model.
CoRR, 2020

Conceptual Modeling of Time for Computational Ontologies.
CoRR, 2020

Modeling the Semantics of States and State Machines.
CoRR, 2020

Thinging-Based Conceptual Modeling: Case Study of a Tendering System.
CoRR, 2020

How to Document Computer Networks.
CoRR, 2020

Thinging-Oriented Modeling of Unmanned Aerial Vehicles.
CoRR, 2020

Modeling Physical/Digital Systems: Formal Event-B vs. Diagrammatic Thinging Machine.
CoRR, 2020

Causality in Static Models as an Initial Constraint on the Chronology of Events in System Behavior.
CoRR, 2020

Three Levels of Modeling: Static (Structure/Trajectories of Flow), Dynamic (Events) and Behavioral (Chronology of Events).
CoRR, 2020

Modeling Network Architecture: A Cloud Case Study.
CoRR, 2020

Modeling the Realization and Execution of Functions and Functional Requirements.
CoRR, 2020

Modeling Network Security: Case Study of Email System.
CoRR, 2020

Modeling Events and Events of Events in Software Engineering.
CoRR, 2020

Modeling Business Process and Events.
Proceedings of the Intelligent Algorithms in Software Engineering, 2020

Programming Is Diagramming Is Programming.
J. Softw., 2019

Thinging as a Way of Modeling in Poiesis: Applications in Software Engineering.
CoRR, 2019

Thinging the Use Case Model.
CoRR, 2019

Authentication Modeling with Five Generic Processes.
CoRR, 2019

Thing/Machine-s (Thimacs) Applied to Structural Description in Software Engineering.
CoRR, 2019

Five Generic Processes for Behavior Description in Software Engineering.
CoRR, 2019

Toward Maximum Grip Process Modeling in Software Engineering.
CoRR, 2019

Existential Ontology and Thinging Modeling in Software Engineering.
CoRR, 2019

Thinging for Computational Thinking.
CoRR, 2019

User Interface as a Thinging Machine.
CoRR, 2019

Modeling with Thinging for Intelligent Monitoring System.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Modeling Computer Security Service Desk.
Proceedings of the 6th International Conference on Control, 2019

Business Process Mapping: A Case Study.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Conceptual Modeling of a Procurement Process: Case study of RFP for Public Key Infrastructure.
CoRR, 2018

Conceptual Modeling of Inventory Management Processes as a Thinging Machine.
CoRR, 2018

Thinging Machine applied to Information Leakage.
CoRR, 2018

Tracking Systems as Thinging Machine: A Case Study of a Service Company.
CoRR, 2018

Thinging vs Objectfying in Software Engineering.
CoRR, 2018

Thinging Ethics for Software Engineers.
CoRR, 2018

Thinging for Software Engineers.
CoRR, 2018

Privacy Things: Systematic Approach to Privacy and Personal Identifiable Information.
CoRR, 2018

Petri Nets and Machines of Things that Flow.
Proceedings of the Intelligent Systems and Applications, 2018

Integrated Modeling Methodologies and Languages.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018

Privacy Thinging Applied to the Processing Cycle of Bank Cheques.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

Control of Waste Water Treatment as a Flow Machine: A Case Study.
Proceedings of the 24th International Conference on Automation and Computing, 2018

Modeling of an enterprise and information system: process specification based on the flow of things.
Proceedings of the International Conference on Geoinformatics and Data Analysis, 2018

Flow-Based Provenance.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2017

Toward Understanding Dynamic Behavior in Abstract Machines.
Int. J. Knowl. Syst. Sci., 2017

Software Engineering Modeling Applied to English Verb Classification (and Poetry).
CoRR, 2017

Diagramming the Class Diagram: Toward a Unified Modeling Methodology.
CoRR, 2017

Conceptual Modeling for Control of a Physical Engineering Plant: A Case Study.
CoRR, 2017

Process Description, Behavior, and Control.
CoRR, 2017

Modeling Events as Machines.
CoRR, 2017

Business Process Modeling: Blueprinting.
CoRR, 2017

Flow machine diagrams for VHDL code.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Sets with members as machines with things that flow.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Orientation in Conceptual Modeling Frameworks.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Enterprise Architecture: An Alternative to ArchiMate Conceptualization.
Proceedings of the Software Engineering Trends and Techniques in Intelligent Systems, 2017

Design functional decomposition based on flow.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Toward Computing Oriented Representation of Sets.
Proceedings of the Artificial Intelligence Perspectives in Intelligent Systems, 2016

Thing-Oriented Learning: Application to Mathematical Objects.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

On Collaboration in Software: Annotation vs. Flow-Based Diagrams.
J. Softw., 2015

Social Networks in which Users are not Small Circles.
Informing Sci. Int. J. an Emerg. Transdiscipl., 2015

Security as a flow machine.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

Toward conceptual representation of patterns.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

High-Level Representation of Time in Diagrammatic Specification.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

System states rediagrammed.
Proceedings of the International Symposium on Innovations in Intelligent SysTems and Applications, 2015

Conceptual maps for physical security.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Integrating Constraints in Schematics of Systems.
Proceedings of the Software Engineering in Intelligent Systems, 2015

Design Principles in Health Information Technology: An Alternative to UML Use Case Methodology.
Int. J. Heal. Inf. Syst. Informatics, 2014

Information system requirements: a flow-based diagram versus supplementation of use case narratives with activity diagrams.
Int. J. Bus. Inf. Syst., 2014

Communication-oriented business model based on flows.
Int. J. Bus. Inf. Syst., 2014

Visualization of Execution of Programming Statements.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Multilevel semantic foundation for digital logic diagrams.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Characterizing social networks based on interior processes of nodes.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

A Semiotics Approach to Semantic Mismatches.
Proceedings of the Service Science and Knowledge Innovation, 2014

Conceptual Understanding of Computer Program Execution: Application to C++
CoRR, 2013

Schematizing Proofs Based on Flow of Truth Values in Logic.
Proceedings of the IEEE International Conference on Systems, 2013

Alternative Representation of Aspects.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

How to Diagram a Dramatic Story.
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013

Diagrammatization of the Transmission Control Protocol
CoRR, 2012

Perceived Privacy.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Modeling in Ethics Engineering.
Int. J. Web Appl., 2010

System-based Approach to Software Vulnerability.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Diagrammatical framework for information system attacks.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Alternative Model for Information Ethics.
Proceedings of the Second International Conference on Information, 2010

Information Privacy and its Value.
Proceedings of the Intelligent Information Privacy Management, 2010

Interpretation of Information Processing Regulations.
J. Softw. Eng. Appl., 2009

Conceptual Model for Communication
CoRR, 2009

Personal Information Databases
CoRR, 2009

Conceptualization in State Machines, Statecharts, and Flow Model.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Unblocking Data Flow Diagrams.
Proceedings of the 2009 International Conference on Software Engineering Research & Practice, 2009

Conceptualizing Software Life Cycle.
Proceedings of the Information Systems: Modeling, 2009

Integrating Services: Control vs. Flow.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

Privacy Sensitivity: Application in Arabic.
Proceedings of the 2009 International Conference on Asian Language Processing, 2009

Flow-Based Supply Chains.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Modelling of personal identifiable information in a resource description framework.
Int. J. Metadata Semant. Ontologies, 2008

Scrutinizing the Rule: Privacy Realization in HIPAA.
Int. J. Heal. Inf. Syst. Informatics, 2008

Informational human-machine interaction.
Proceedings of the IEEE International Conference on Systems, 2008

Databases of Personal Identifiable Information.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Modeling communication: one more piece falling into place.
Proceedings of the 26th Annual International Conference on Design of Communication, 2008

Knowledge Maturity Based on Processing and Creation of Information.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Scrutinizing UML Activity Diagrams.
Proceedings of the Information Systems Development, 2008

Integration of information needs and seeking.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2008

From Information Processing to Information Flow: Application to Consumer Mind.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Software Engineering Interpretation of Information Processing Regulations.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

On Information Lifecycle Management.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Information Stream Based Model for Organizing Security.
Proceedings of the The Third International Conference on Availability, 2008

Taxonomy of Computer and Information Ethics.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Personal Information Ethics.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Conferences under scrutiny.
Commun. ACM, 2007

How sensitive is your personal information?
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Dismantling the Twelve Privacy Purposes.
Proceedings of the Trust Management, 2007

MYHEALTH: Personal Management of Health Information.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

CARPI: Capture, Archival and Retrieval of Personal Information.
Proceedings of the Datenbanksysteme in Business, 2007

Beyond Purpose-Based Privacy Access Control.
Proceedings of the Database Technologies 2007. Proceedings of the Eighteenth Australasian Database Conference, 2007

Security Model for Informational Privacy.
Proceedings of the Intelligence and Security Informatics, International Workshop, 2006

Personal Information eWallet.
Proceedings of the IEEE International Conference on Systems, 2006

Personal Information Modeling in Semantic Web.
Proceedings of the Semantic Web, 2006

Privacy as a Base for Confidentiality.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

A Systematic Approach to Anonymity.
Proceedings of the Security in Information Systems, 2005

How to Calculate the Information Privacy.
Proceedings of the Third Annual Conference on Privacy, 2005

The "Right to be Let Alone" and Private Information.
Proceedings of the ICEIS 2005, 2005

Privacy Enhanced Information Systems.
Proceedings of the Information Modelling and Knowledge Bases XVII, 2005

Machine Recognition of Printed Arabic Text Utilizing Natural Language Morphology.
Int. J. Man Mach. Stud., 1991

Morphological compression of Arabic text.
Inf. Process. Manag., 1990

An Entity-Relationship Approach to Modelling Petroleum Engineering Database.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

Mapping Considerations in the Design of Schemas for the Relational Model.
IEEE Trans. Software Eng., 1981

Some Characteristics of Matrices of Files with Multi-Valued Attributes.
Proceedings of the Data Base File Organization, 1981

Algorithmic approach to the consecutive retrieval property.
Int. J. Parallel Program., 1979