default search action
ACIT 2020: Giza, Egypt
- 21st International Arab Conference on Information Technology, ACIT 2020, Giza, Egypt, November 28-30, 2020. IEEE 2020, ISBN 978-1-7281-8855-3
- Idir Aoudia, Laïd Kahloul, Saber Benharzallah, Okba Kazar:
QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm. 1-9 - Nada Masood Mirza:
Machine Learning and Soft Robotics. 1-5 - Ghassan Samara:
Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey. 1-5 - Maryam Al-Janabi, Ahmad Mousa Altamimi:
A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware. 1-9 - Younes-aziz Bachiri, Hicham Mouncif:
Applicable strategy to choose and deploy a MOOC platform with multilingual AQG feature. 1-6 - Zina Houhamdi, Belkacem Athamena:
Collaborative Team Construction in Open Multi-Agents System. 1-7 - Noha El Menbawy, Hesham Arafat, Mohamed S. Saraya, Amr M. T. Ali-Eldin:
Studying and Analyzing the Fog-based Internet of Robotic Things. 1-8 - Mohamed Galal Hafez Rady, Mohamed Shaheen Elgamel, Osama Mohamed Badawy:
A multi agent broker framework and decision support for enhanced cloud computing discovery. 1-7 - Issam Salman:
Learning the Structure of the Tree and Tree Augmented Naive Bayesian from Incomplete and Imbalanced Data. 1-7 - Shynar Mussiraliyeva, Milana Bolatbek, Batyrkhan Omarov, Zhanar Medetbek, Gulshat Baispay, Ruslan Ospanov:
On Detecting Online Radicalization and Extremism Using Natural Language Processing. 1-5 - Bilal Sowan, Nasim Matar, Firas Omar, Mohammad Alauthman, Mohammed Eshtay:
Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm. 1-6 - Sultan Badran, Nabil Arman, Mousa Farajallah:
Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing. 1-9 - Shorouq Eletter, Tahira Yasmin, Ghaleb A. Elrefae, Hashem Aliter, Abdullah Elrefae:
Building an Intelligent Telemonitoring System for Heart Failure: The Use of the Internet of Things, Big Data, and Machine Learning. 1-5 - P. Maya, C. Tharini:
Performance Analysis of Lane Detection Algorithm using Partial Hough Transform. 1-4 - Deivanai Gurusamy, Sadik Abas:
Modified Clustering Algorithms for Energy Harvesting Wireless Sensor Networks- A Survey. 1-11 - Meriem Zaiter, Salima Hacini:
A Distributed Fault Tolerance Mechanism for an IoT Healthcare system. 1-6 - Mohamed Eltahan, Karim I. Moharm, Nour Daoud:
Sensitivity of different optimization solvers in LSTM algorithm for temperature forecast over Mars at Jezero Crater landing site. 1-5 - Ahmed Mahmoud Nazif, Ahmed Ahmed Hesham Sedky, Osama Mohamed Badawy:
MOOC's Student Results Classification by Comparing PNN and other Classifiers with Features Selection. 1-9 - Kayal Padmanandam, Lakshmi Lingutla:
Practice of Applied Edge Analytics in Intelligent Learning Framework. 1-8 - Lara Saleh, Anas Abu Taleb, Walid A. Salameh:
Trust and reputation in Wireless Sensors networks. 1-6 - Ghaliya Musallam Alfarsi, Azmi Bin Mohd Yusof:
Virtual Reality Applications in Education Domain. 1-7 - Mourad Talbi, Riadh Baazaoui, Med Salim Bouhlel:
A New Technique of ECG Denoising based on LWT and Total Variation Minimization ECG Denoising. 1-6 - Safaa Hraiz, Ghazi Al-Naymat, Arafat Awajan:
A Novel Method to Verify the Search Results of Database Queries on Cloud Computing. 1-7 - Nouf Aljuhani, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy:
Investigating the Lack of Utilization of Information and Communication Technologies in Saudi Schools. 1-7 - Fadia Shoura, Ammar Gharaibeh, Sahel Alouneh:
Optimization of Migration Cost for Network Function Virtualization Replacement. 1-7 - Maria Khan, Ghulam Rasool:
Recovery of Mobile Game Design Patterns. 1-7 - Ahmad Sedky Adly, M. S. Abdelwahab, Islam Hegazy, Taha ElArif:
Issues and Challenges for Content-Based Video Search Engines A Survey. 1-18 - Hare Ram Sah, Hemang Shrivastava, Manoj Ramaiya:
Visual Steganography and Encryption Tachniques with Hardware Implementation. 1-7 - Jennifer Batamuliza, Damien Hanyurwimfura:
A secure and efficient anonymous certificateless signcryption for Key Distribution Scheme for Smart Grid. 1-7 - Adnan Shaout, Nathan Schmidt:
Keystroke Identifier Using Fuzzy Logic to Increase Password Security. 1-8 - Shaymaa M. Hamandi, Abdul Monem S. Rahma, Rehab F. Hassan:
A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible Visions. 1-9 - Sayed Ahmed, Ahmed Kotb, Ehab Samir, Marwa Moustafa, Eslam Farg, Ahmed Abd Elhay, Sayed M. Arafat:
A WebGIS Decision Support System for Wadi El Natrun Rural Land Management. 1-7 - Dilip Singh Sisodia, Inakollu NehaPriyanka, Prodduturi Amulya:
Longest Common Subsequence based Multistage Collaborative Filtering for Recommender Systems. 1-5 - Nor Azrini Jaafar, Nor Azman Ismail, Yusman Azimi Yusoff:
A New Approach in Islamic Learning: Performance Evaluation of Motion Recognition System for Salat Movement. 1-6 - Kanwal Zahoor, Narmeen Zakaria Bawany, Soomaiya Hamid:
Sentiment Analysis and Classification of Restaurant Reviews using Machine Learning. 1-6 - Hassanin M. Al-Barhamtoshy, Rania Ahmed Younis:
DNA Sequence Error Corrections based on TensorFlow. 1-5 - Rami Hodrob, Mahmoud Obaid, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha Sail AbuShanab:
An IoT Based Healthcare using ECG. 1-4 - Mariam M. Biltawi, Arafat Awajan, Sara Tedmori:
Arabic Reading Comprehension Benchmarks Created Semiautomatically. 1-6 - Lara Saleh, Waleed Al-Sitt:
Cloud Computing Failures, Recovery Approaches and Management Tools. 1-10 - Salima Brachemi-Meftah, Fatiha Barigou:
Algerian Dialect Sentiment Analysis: Sate of Art. 1-7 - Muntather Ayad, Hussein Kanaan, Mohammad Ayache:
Diabetes Disease Prediction Using Artificial Intelligence. 1-6 - Nour Eldin Mohamed Elshaiekh, Khalfan Zahran Al Hiji:
The Role of E-diagnosis Knowledge Based System on Omani Society: Skin Disease as Case. 1-4 - Fatma Marzougui, Mohamed Elleuch, Monji Kherallah:
A Deep CNN Approach for Plant Disease Detection. 1-6 - Abdelsalam M. Maatuk, Tawfig M. Abdelaziz, Muhammad Akhtar Ali:
Migrating Relational Databases into XML Documents. 1-11 - Samson Otieno Ooko, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma:
Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Review. 1-5 - Rana Riad K. Al-Taie, Hiba A. Abu-Alsaad:
Application of Encryption Algorithms with RMI Protocol. 1-6 - B. Sarada, Madhavi Dandu, Saikonda Krishna Tarun:
Comparison of Tree Based Classifications and Neural Network Based Classification. 1-3 - Danijela Protic, Miomir Stankovic:
A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks. 1-8 - Alá F. Khalifeh, Khaled Aldahdouh, Sahel Alouneh:
Optimizing the Energy Consumption Level in LoRaWan Networks. 1-6 - Walid Elhedda, Maroua Mehri, Mohamed Ali Mahjoub:
A Cluster Center Initialization Method using Hyperspace-based Multi-level Thresholding (HMLT): Application to Color Ancient Document Image Denoising. 1-6 - Mohamed A. Wahby Shalaby, Ayman R. Mohammed, Sally S. Kassem:
Modified Fuzzy C-Means Clustering Approach to Solve the Capacitated Vehicle Routing Problem. 1-7 - Fatma-Zohra Bessai-Mechmache, Karima Hammouche, Zaia Alimazighi:
A Genetic Algorithm-Based XML Information Retrieval Model. 1-5 - Marwa Meissa, Saber Benharzallah, Laïd Kahloul, Okba Kazar:
Social-aware Web API Recommendation in IoT. 1-5 - Marwah Alian, Arafat Awajan:
Sense Inventories for Arabic Texts. 1-4 - Chintakindi Balaram Murthy, Mohammad Farukh Hashmi:
Real Time Pedestrian Detection Using Robust Enhanced YOLOv3+. 1-5 - Elham T. Hussain, Sumya Daoud, Hussam Alrabaiah, Amjad Kamal Owais:
Students' Perception of Online Assessment During the COVID-19 Pandemic: The Case of Undergraduate Students in the UAE. 1-6 - Hind Baaqeel, Rachid Zagrouba:
Hybrid SMS Spam Filtering System Using Machine Learning Techniques. 1-8 - Shweta Sharma, C. Rama Krishna, Rakesh Kumar:
Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU. 1-6 - Dana Halabi, Arafat Awajan, Ebaa Fayyoumi:
Improving Arabic dependency parsers by using dependency relations. 1-7 - Maida Ahtesham, Narmeen Zakaria Bawany, Kiran Fatima:
House Price Prediction using Machine Learning Algorithm - The Case of Karachi City, Pakistan. 1-5 - Maha Rahrouh, Mamdouh Ghanem:
An analytical study of student satisfaction with the Statistics courses in e-learning as a new experience after Covid-19 at Al Ain University. 1-6 - Belkacem Athamena, Zina Houhamdi, Ghaleb A. El Refae:
Managing Moral Hazard Impact in Decision Making Process. 1-5 - Layla Hashem, Roaa Al-Harakeh, Ali Cherry:
Human Gait Identification System Based on Transfer Learning. 1-6 - Rami Mustafa A. Mohammad, Mamoun Masoud Abdulqader:
Exploring Cyber Security Measures in Smart Cities. 1-7 - Salam Hamdan, Sufyan Almajali, Moussa Ayyash:
Comparison study between conventional machine learning and distributed multi-task learning models. 1-5 - Anwar Ali Yahya, Yousef Asiri, Ibrahim Alyami:
Mining Patients' Reviews in Online Health Communities for Adverse Drug Reaction Detection of Antiepileptic Drugs. 1-6 - Aya Mourad, Ahmed Afifi, Arabi E. Keshk:
Automated Brain Tumor Segmentation in MRI using Superpixel Over-segmentation and Classification. 1-8 - Batyrkhan Omarov, Aidar Batyrbekov, Azizah Suliman, Bakhytzhan Omarov, Yerlan Sabdenbekov, Serik Aknazarov:
Electronic stethoscope for detecting heart abnormalities in athletes. 1-5 - Jean Claude Tuyisenge, Nirere Gaudence, Didacienne Mukanyiligira, Jean Pierre Nyakuri:
Fuzzy logic Applied to Smart Baby's Health and Feeding Sequence Monitoring System. 1-7 - Md. Farukh Hashmi, B. Kiran Kumar Ashish, Satyarth Katiyar, Avinash G. Keskar:
AccessNet: A Three Layered Visual Based Access Authentication System for Restricted Zones. 1-7 - Zouhaira Noubigh, Anis Mezghani, Monji Kherallah:
Transfer Learning to improve Arabic handwriting text Recognition. 1-6 - Deepti Deshwal, Pardeep Sangwan, Divya Kumar:
A Structured Approach towards Robust Database Collection for Language Identification. 1-6 - Muhammad Asad, Muhammad Shahzaib, Yusra Abbasi, Muhammad Rafi:
A Long-Short-Term-Memory Based Model for Predicting ATM Replenishment Amount. 1-6 - Mai Saleh, Osama El-Sharkawy:
An embedded system for identifying memory systems and mental image schemas after the Intellectual Style Inventory. 1-4 - Aicha Korichi, Sihem Slatnia, Oussama Aiadi, Najiba Tagougui, Monji Kherallah:
Arabic handwriting recognition: Between handcrafted methods and deep learning techniques. 1-6 - Ahmad Ghandour, Brendon J. Woodford:
COVID-19 Impact on E-Commerce in UAE. 1-8 - Jawaher Abdulwahab Fadhil, Qusay Idrees Sarhan:
Internet of Vehicles (IoV): A Survey of Challenges and Solutions. 1-10 - Taghrid Z. Ali, Tawfig M. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili:
A Framework for Improving Data Quality in Data Warehouse: A Case Study. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.