default search action
19th AICCSA 2022: Abu Dhabi, United Arab Emirates
- 19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022. IEEE 2022, ISBN 979-8-3503-1008-5
- Eman T. Alharbi, Asma Cherif, Farrukh Nadeem, Tariq Mirza:
Machine Learning Models for Early Prediction of Asthma Attacks Based on Bio-signals and Environmental Triggers. 1-7 - Rima Grati, Cihan Tunc:
Message from AICCSA'2022 Program Chairs. 1 - Bilel Elayeb, Raja Ayed:
Socio-Semantic Information Retrieval of Structured Arabic Texts. 1-8 - Serhan Gener, Parker Dattilo, Dhruv Gajaria, Alexander Fusco, Ali Akoglu:
GPGPU-based High Throughput Image Pre-processing Towards Large-Scale Optical Character Recognition. 1-7 - Loay Alajramy, Adel Taweel, Radi Jarrar, Elyes Lamine, Imen Megdiche:
Automated Learning Approach for Genetic Diseases. 1-6 - Simanta Deb Turja, Mohammad Imrul Jubair, Md. Shafiur Rahman, Md. Hasib Al Zadid, Mohtasim Hossain Shovon, Md. Faraz Kabir Khan:
Shapes2Toon: Generating Cartoon Characters from Simple Geometric Shapes. 1-8 - Mohammad Wali Ur Rahman, Sicong Shao, Pratik Satam, Salim Hariri, Chris Padilla, Zoe Taylor, Carlos Nevarez:
A BERT-based Deep Learning Approach for Reputation Analysis in Social Media. 1-8 - Raoudha Nouisser, Salma Kammoun Jarraya, Mohamed Hammami:
Deep Learning and Kinect Skeleton-based Approach for Fall Prediction of Elderly Physically Disabled. 1-7 - Lucas Francisco, Rodrigo Bonacin, Ferrucio de Franco Rosa:
A Study on the Application of Blockchain in Carbon Trading Systems. 1-6 - Hisham A. Kholidy, Salim Hariri:
Toward An Experimental Federated 6G Testbed: A Federated Leaning Approach. 1-6 - Heba M. Ismail, Rawan Elabyad, Arwa Dyab:
Smart Residential Water Leak and Overuse Detection System Using Machine Learning. 1-6 - Qusai Ismail, Mariam Massadeh, Qanita Bani Baker:
Predicting COVID-19 Related Tweets Using Ensemble of Transformers Models. 1-7 - Hajar Hakkoum, Ibtissam Abnane, Ali Idri:
Evaluating Interpretability of Multilayer Perceptron and Support Vector Machines for Breast Cancer Classification. 1-6 - Oussama H. Hamid:
There Is More to AI than Meets the Eye: Aligning Man-made Algorithms with Nature-inspired Mechanisms. 1-4 - Emdadul Haque, Md. Faraz Kabir Khan, Mohammad Imrul Jubair, Jarin Anjum, Abrar Zahir Niloy:
Book Cover Synthesis from the Summary. 1-6 - Kamel Madi, Eric Paquet:
3D Deformable Protein Shapes Classification based on Triangles-Stars and Composite Deep Neural Networks. 1-8 - Sven Löffler, Franz Kroll, Ilja Becker, Petra Hofstedt:
Optimal Beacon Placement for Indoor Positioning Using Constraint Programming. 1-8 - Alejandro Adorjan, Genoveva Vargas-Solar, Regina Motz:
Towards a human-in-the-loop curation: A qualitative perspective. 1-8 - Reem Alnaqeb, Fatema Alrashdi, Khuloud Alketbi, Heba M. Ismail:
Machine Learning-based Water Potability Prediction. 1-6 - Oratile Leteane, Yirsaw Ayalew:
An adaptive and extensible framework to enhance end to end trustworthiness of traceability data. 1-8 - Eiman Alothali, Kadhim Hayawi, Hany Alashwal:
Using Self-labeling and Co-Training to Enhance Bots Labeling in Twitter. 1-2 - Abdelkader Berrouachedi, Rakia Jaziri, Gilles Bernard:
Convolutional, Extra-Trees and Multi layer Perceptron. 1-8 - Gcinizwe Dlamini, Karina Singatullina, Giancarlo Succi:
Towards understanding the impact of mental states on software development using EEG. 1-2 - Rahul Khullar, Gahangir Hossain:
A New Algorithm for Energy Efficient Task Scheduling Towards Optimal Green Cloud Computing. 1-6 - Mejdi Karmeni, Emna Ben Abdallah, Khouloud Boukadi, Mourad Abed:
Towards An Accurate Stacked Ensemble Learning Model For Thyroid Earlier Detection. 1-8 - Hamda Al Breiki:
Trust Evolution Game in Blockchain. 1-4 - Akshit Aggarwal, Srinibas Swain:
Blind Two Party ECDSA Signing Based Homomorphic Encryption over Message Passing. 1-5 - Hasnae Zerouaoui, Ali Idri, Omar El Alaoui:
Histological breast cancer classification using CNN and MLP based ensembles. 1-6 - Walid Fakhet, Salim El Khediri, Salah Zidi:
Guided classification for Arabic Characters handwritten Recognition. 1-6 - Souheir Merkouche, Chafia Bouanaka:
A Hybrid approach for containerized Microservices auto-scaling. 1-6 - Asma Hadyaoui, Lilia Cheniti-Belcadhi:
Towards a context-aware personalized formative assessment in a collaborative online environment. 1-6 - Saméh Kchaou, Rahma Boujelbane, Lamia Hadrich Belguith:
Bottom-up approach to translate Tunisian dialect texts in Social Networks. 1-6 - Jihen Maâzoun, Hanêne Ben-Abdallah, Nadia Bouassida:
Clustering techniques for software product line feature identification. 1-10 - Rafika Thabet, Elyes Lamine, Marie-Hélène Cleostrate, Marie-Noëlle Cufi, Hervé Pingaud:
Towards a novel spontaneous medication error reporting tool for enhancing patient safety. 1-6 - Amra Sghaier, Aref Meddeb:
Comparative Study of QoS-aware Network Coding Protocols in WSNs. 1-5 - Basmah Al-Zahrani, Suhair Alshehri, Asma Cherif, Abdessamad Imine:
Property Graph Access Control Using View-Based and Query-Rewriting Approaches. 1-2 - Mabrouka Bensghaier, Wided Bakari, Mahmoud Neji:
Natural Language Inference for Arabic using Recurrent Neural Network and Word Embedding. 1-8 - Abdallah Karakra, Franck Fontanili, Adel Taweel, Elyes Lamine, Jacques Lamothe, Hafez Barghouthi:
Digital Twin in Healthcare: Security Threat Meta-Model. 1-6 - Genoveva Vargas-Solar, Zakaria Maamar:
Message from AICCSA'2022 General Chairs. 1-2 - Faten Khemakhem, Hamdi Ellouzi, Hela Ltifi:
A Novel Deep Multi-Task Learning to Sensing Student Engagement in E-Learning Environments. 1-7 - Marco De Vincenzi:
DRIVES: Android App for Automotive Customized Services. 1-8 - Chékra El Fehri, Nouha Baccour, Inès Kammoun:
The cost of reliable uplink communication in large scale LoRaWAN. 1-8 - Abdul Manan, Ziran Min, Charif Mahmoudi, Valerio Formicola:
Extending 5G services with Zero Trust security pillars: a modular approach. 1-6 - Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. 1-8 - Hafsaa Ouifak, Ali Idri:
Neuro-fuzzy ensembles: A systematic mapping study. 1-6 - Asma Cherif, Suhair Alshehri, Manal Kalkatawi, Abdessamad Imine:
Towards an intelligent adaptive security framework for preventing and detecting credit card fraud. 1-8 - Ismehene Chahbi, Nourhène Ben Rabah, Ines Ben Tekaya:
Towards an efficient and interpretable Machine Learning approach for Energy Prediction in Industrial Buildings: A case study in the Steel Industry. 1-8 - Nadia Dahmani, Suja A. Alex, S. Gayathri Sadhana, S. Geethanjali Jayasree, T. P. Akhil Jinu:
Welcome Wagons: A Block Chain based Web Application for Car Booking. 1-6 - Emna Feki, Khouloud Boukadi, Faiza Loukil, Mourad Abed:
BELONG: Blockchain basEd pLatform fOr donation & social project fuNdinG. 1-8 - Hadjer Ykhlef, Sarah Rouizi:
Time Series Fault Detection for Power Line Condition Monitoring: A Comparative Study. 1-8 - Zineb Maasaoui, Anfal Hathah, Hasnae Bilil, Van Sy Mai, Abdella Battou, Ahmed Lbath:
Network Security Traffic Analysis Platform - Design and Validation. 1-5 - Kai Widdeson, Suncica Hadzidedic:
FFM-SVD: A Novel Approach for Personality-aware Recommender Systems. 1-8 - Stefan Nesic, Andrian Putina, Maroua Bahri, Alexis Huet, José Manuel Navarro, Dario Rossi, Mauro Sozio:
STREamRHF: Tree-Based Unsupervised Anomaly Detection for Data Streams. 1-8 - Ahmed Alia, Mohammed Maree, Mohcine Chraibi:
A Fast Hybrid Deep Neural Network Model for pushing behavior detection in human crowds. 1-2 - Coco Koban, Maryia Falaleyeva, Maria Spravtseva, Roman Moiseev, Sajjad Khan:
Modeling User-Centric Threats in Smart City: A Hybrid Threat Modeling Method. 1-7 - Sakib Shahriar, Rozita Dara, Kadhim Hayawi:
On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification. 1-8 - Afef Mdhaffar, Bechir Zalila, Racem Moalla, Ayoub Kharrat, Omar Rebai, Mohamed Melek Hsairi, Ahmed Sallemi, Hsouna Kobbi, Amel Kolsi, Dorsaf Chatti, Mohamed Jmaiel, Bernd Freisleben:
A Smart Trap for Counting Olive Moths Based on the Internet of Things and Deep Learning. 1-8 - Bakary Dolo, Faiza Loukil, Khouloud Boukadi:
Early Detection of Diabetes Mellitus Using Differentially Private SGD in Federated Learning. 1-8 - Reem Alnaqeb, Khuloud Alketbi, Fatema Alrashdi, Heba M. Ismail:
Water Quality Classification Using Machine Learning Algorithms. 1-6 - Safwan Elmadani, Salim Hariri, Sicong Shao:
Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks. 1-9 - Sicong Shao, Saleem Alharir, Salim Hariri, Pratik Satam, Sonia Shiri, Abdessamad Mbarki:
AI-based Arabic Language and Speech Tutor. 1-8 - Georgios L. Stavrinides, Helen D. Karatza:
Resource Allocation and Scheduling of Linear Workflow Applications with Ageing Priorities and Transient Failures. 1-8 - Jesus Pacheco, Marco Lopez, Victor H. Benitez:
AI Classifiers Comparison for Network Anomaly Behavior Analysis. 1-5 - Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:
AsPOS: Assamese Part of Speech Tagger using Deep Learning Approach. 1-8 - Kefah Alissa, Omar Alzoubi:
Financial Sentiment Analysis based on transformers and Majority Voting. 1-4 - Muhammad Rizwan, Enoch Jung, Yoosang Park, Jaeyoung Choi, Yoonhee Kim:
Optimization of Matrix-Matrix Multiplication Algorithm for Matrix-Panel Multiplication on Intel KNL. 1-7 - Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
Strategic Attacks on Recommender Systems: An Obfuscation Scenario. 1-8 - Lisanne Kremer, Robert Gutu, Lea Leeser, Bernhard Breil, Thomas Lux:
Process optimization of a pre-medication process in inpatient hospital care with 2D- and 3D-modeling software - an as-is process to-be process comparison. 1-6 - Hassan Idoudi, Mostafa Ameli, Cyril Nguyen Van Phu, Mahdi Zargayouna, Abderrezak Rachedi:
Vehicular Cloud Computing for Population Evacuation Optimization. 1-8 - Fatima Al-Rammah, Marwa Masmoudi, Salma Kammoun Jarraya:
CNN-LSTM Based Approach for Analyzing and Detecting Stereotypical Motor Movements of Autistic Children in Pre-Meltdown Crisis. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.