


default search action
ACIT 2020: Giza, Egypt
- 21st International Arab Conference on Information Technology, ACIT 2020, Giza, Egypt, November 28-30, 2020. IEEE 2020, ISBN 978-1-7281-8855-3

- Idir Aoudia

, Laid Kahloul, Saber Benharzallah
, Okba Kazar
:
QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm. 1-9 - Nada Masood Mirza:

Machine Learning and Soft Robotics. 1-5 - Ghassan Samara

:
Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey. 1-5 - Maryam Al-Janabi, Ahmad Mousa Altamimi:

A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware. 1-9 - Younes-aziz Bachiri

, Hicham Mouncif
:
Applicable strategy to choose and deploy a MOOC platform with multilingual AQG feature. 1-6 - Zina Houhamdi

, Belkacem Athamena
:
Collaborative Team Construction in Open Multi-Agents System. 1-7 - Noha El Menbawy, Hesham Arafat, Mohamed S. Saraya, Amr M. T. Ali-Eldin

:
Studying and Analyzing the Fog-based Internet of Robotic Things. 1-8 - Mohamed Galal Hafez Rady, Mohamed Shaheen Elgamel, Osama Mohamed Badawy

:
A multi agent broker framework and decision support for enhanced cloud computing discovery. 1-7 - Issam Salman

:
Learning the Structure of the Tree and Tree Augmented Naive Bayesian from Incomplete and Imbalanced Data. 1-7 - Shynar Mussiraliyeva

, Milana Bolatbek
, Batyrkhan Omarov
, Zhanar Medetbek, Gulshat Baispay
, Ruslan Ospanov
:
On Detecting Online Radicalization and Extremism Using Natural Language Processing. 1-5 - Bilal Sowan

, Nasim Matar
, Firas Omar, Mohammad Alauthman
, Mohammed Eshtay
:
Evaluation of Class Decomposition based on Clustering Validity and K-means Algorithm. 1-6 - Sultan Badran, Nabil Arman

, Mousa Farajallah:
Towards a Hybrid Data Partitioning Technique for Secure Data Outsourcing. 1-9 - Shorouq Eletter

, Tahira Yasmin, Ghaleb A. Elrefae
, Hashem Aliter, Abdullah Elrefae
:
Building an Intelligent Telemonitoring System for Heart Failure: The Use of the Internet of Things, Big Data, and Machine Learning. 1-5 - P. Maya, C. Tharini:

Performance Analysis of Lane Detection Algorithm using Partial Hough Transform. 1-4 - Deivanai Gurusamy

, Sadik Abas:
Modified Clustering Algorithms for Energy Harvesting Wireless Sensor Networks- A Survey. 1-11 - Meriem Zaiter, Salima Hacini:

A Distributed Fault Tolerance Mechanism for an IoT Healthcare system. 1-6 - Mohamed Eltahan, Karim I. Moharm, Nour Daoud:

Sensitivity of different optimization solvers in LSTM algorithm for temperature forecast over Mars at Jezero Crater landing site. 1-5 - Ahmed Mahmoud Nazif, Ahmed Ahmed Hesham Sedky, Osama Mohamed Badawy

:
MOOC's Student Results Classification by Comparing PNN and other Classifiers with Features Selection. 1-9 - Kayal Padmanandam

, Lakshmi Lingutla
:
Practice of Applied Edge Analytics in Intelligent Learning Framework. 1-8 - Lara Saleh, Anas Abu Taleb

, Walid A. Salameh:
Trust and reputation in Wireless Sensors networks. 1-6 - Ghaliya Musallam Alfarsi, Azmi Bin Mohd Yusof:

Virtual Reality Applications in Education Domain. 1-7 - Mourad Talbi, Riadh Baazaoui, Med Salim Bouhlel:

A New Technique of ECG Denoising based on LWT and Total Variation Minimization ECG Denoising. 1-6 - Safaa Hraiz

, Ghazi Al-Naymat
, Arafat Awajan:
A Novel Method to Verify the Search Results of Database Queries on Cloud Computing. 1-7 - Nouf Aljuhani

, Elaaf Aljohani, Raghad Alharbi, Rasha Almutairi, Maram Meccawy
:
Investigating the Lack of Utilization of Information and Communication Technologies in Saudi Schools. 1-7 - Fadia Shoura, Ammar Gharaibeh, Sahel Alouneh

:
Optimization of Migration Cost for Network Function Virtualization Replacement. 1-7 - Maria Khan, Ghulam Rasool:

Recovery of Mobile Game Design Patterns. 1-7 - Ahmad Sedky Adly, M. S. Abdelwahab, Islam Hegazy

, Taha ElArif
:
Issues and Challenges for Content-Based Video Search Engines A Survey. 1-18 - Hare Ram Sah, Hemang Shrivastava

, Manoj Ramaiya:
Visual Steganography and Encryption Tachniques with Hardware Implementation. 1-7 - Jennifer Batamuliza

, Damien Hanyurwimfura
:
A secure and efficient anonymous certificateless signcryption for Key Distribution Scheme for Smart Grid. 1-7 - Adnan Shaout

, Nathan Schmidt:
Keystroke Identifier Using Fuzzy Logic to Increase Password Security. 1-8 - Shaymaa M. Hamandi, Abdul Monem S. Rahma, Rehab F. Hassan:

A New Hybrid Shape Moment Invariant Techniques for Face Identification in Thermal and Visible Visions. 1-9 - Sayed Ahmed

, Ahmed Kotb, Ehab Samir, Marwa Moustafa
, Eslam Farg, Ahmed Abd Elhay, Sayed M. Arafat:
A WebGIS Decision Support System for Wadi El Natrun Rural Land Management. 1-7 - Dilip Singh Sisodia

, Inakollu NehaPriyanka, Prodduturi Amulya:
Longest Common Subsequence based Multistage Collaborative Filtering for Recommender Systems. 1-5 - Nor Azrini Jaafar, Nor Azman Ismail

, Yusman Azimi Yusoff:
A New Approach in Islamic Learning: Performance Evaluation of Motion Recognition System for Salat Movement. 1-6 - Kanwal Zahoor

, Narmeen Zakaria Bawany, Soomaiya Hamid:
Sentiment Analysis and Classification of Restaurant Reviews using Machine Learning. 1-6 - Hassanin M. Al-Barhamtoshy, Rania Ahmed Younis:

DNA Sequence Error Corrections based on TensorFlow. 1-5 - Rami Hodrob, Mahmoud Obaid

, Abdulsalam Mansour Abdulsalam Mansour, Ali Sawahreh, Mokhles Naghnagheah, Shatha Sail AbuShanab
:
An IoT Based Healthcare using ECG. 1-4 - Mariam M. Biltawi

, Arafat Awajan, Sara Tedmori:
Arabic Reading Comprehension Benchmarks Created Semiautomatically. 1-6 - Lara Saleh, Waleed Al-Sitt:

Cloud Computing Failures, Recovery Approaches and Management Tools. 1-10 - Salima Brachemi-Meftah, Fatiha Barigou

:
Algerian Dialect Sentiment Analysis: Sate of Art. 1-7 - Muntather Ayad, Hussein Kanaan, Mohammad Ayache:

Diabetes Disease Prediction Using Artificial Intelligence. 1-6 - Nour Eldin Mohamed Elshaiekh, Khalfan Zahran Al Hiji:

The Role of E-diagnosis Knowledge Based System on Omani Society: Skin Disease as Case. 1-4 - Fatma Marzougui, Mohamed Elleuch

, Monji Kherallah
:
A Deep CNN Approach for Plant Disease Detection. 1-6 - Abdelsalam M. Maatuk, Tawfig M. Abdelaziz, Muhammad Akhtar Ali:

Migrating Relational Databases into XML Documents. 1-11 - Samson Otieno Ooko

, Jamila Kadam'manja, Marie Grace Uwizeye, Dagmawi Lemma
:
Security Issues in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Review. 1-5 - Rana Riad K. Al-Taie, Hiba A. Abu-Alsaad

:
Application of Encryption Algorithms with RMI Protocol. 1-6 - B. Sarada

, Madhavi Dandu, Saikonda Krishna Tarun:
Comparison of Tree Based Classifications and Neural Network Based Classification. 1-3 - Danijela Protic, Miomir Stankovic

:
A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks. 1-8 - Alá F. Khalifeh, Khaled Aldahdouh, Sahel Alouneh

:
Optimizing the Energy Consumption Level in LoRaWan Networks. 1-6 - Walid Elhedda, Maroua Mehri

, Mohamed Ali Mahjoub:
A Cluster Center Initialization Method using Hyperspace-based Multi-level Thresholding (HMLT): Application to Color Ancient Document Image Denoising. 1-6 - Mohamed A. Wahby Shalaby

, Ayman R. Mohammed
, Sally S. Kassem
:
Modified Fuzzy C-Means Clustering Approach to Solve the Capacitated Vehicle Routing Problem. 1-7 - Fatma-Zohra Bessai-Mechmache, Karima Hammouche, Zaia Alimazighi:

A Genetic Algorithm-Based XML Information Retrieval Model. 1-5 - Marwa Meissa, Saber Benharzallah

, Laid Kahloul, Okba Kazar
:
Social-aware Web API Recommendation in IoT. 1-5 - Marwah Alian

, Arafat Awajan:
Sense Inventories for Arabic Texts. 1-4 - Chintakindi Balaram Murthy

, Mohammad Farukh Hashmi
:
Real Time Pedestrian Detection Using Robust Enhanced YOLOv3+. 1-5 - Elham T. Hussain, Sumya Daoud, Hussam Alrabaiah, Amjad Kamal Owais:

Students' Perception of Online Assessment During the COVID-19 Pandemic: The Case of Undergraduate Students in the UAE. 1-6 - Hind Baaqeel, Rachid Zagrouba:

Hybrid SMS Spam Filtering System Using Machine Learning Techniques. 1-8 - Shweta Sharma

, C. Rama Krishna, Rakesh Kumar:
Android Ransomware Detection using Machine Learning Techniques: A Comparative Analysis on GPU and CPU. 1-6 - Dana Halabi

, Arafat Awajan, Ebaa Fayyoumi
:
Improving Arabic dependency parsers by using dependency relations. 1-7 - Maida Ahtesham, Narmeen Zakaria Bawany, Kiran Fatima:

House Price Prediction using Machine Learning Algorithm - The Case of Karachi City, Pakistan. 1-5 - Maha Rahrouh

, Mamdouh Ghanem:
An analytical study of student satisfaction with the Statistics courses in e-learning as a new experience after Covid-19 at Al Ain University. 1-6 - Belkacem Athamena

, Zina Houhamdi
, Ghaleb A. El Refae
:
Managing Moral Hazard Impact in Decision Making Process. 1-5 - Layla Hashem, Roaa Al-Harakeh, Ali Cherry

:
Human Gait Identification System Based on Transfer Learning. 1-6 - Rami Mustafa A. Mohammad, Mamoun Masoud Abdulqader:

Exploring Cyber Security Measures in Smart Cities. 1-7 - Salam Hamdan

, Sufyan Almajali
, Moussa Ayyash:
Comparison study between conventional machine learning and distributed multi-task learning models. 1-5 - Anwar Ali Yahya, Yousef Asiri

, Ibrahim Alyami:
Mining Patients' Reviews in Online Health Communities for Adverse Drug Reaction Detection of Antiepileptic Drugs. 1-6 - Aya Mourad, Ahmed Afifi, Arabi E. Keshk:

Automated Brain Tumor Segmentation in MRI using Superpixel Over-segmentation and Classification. 1-8 - Batyrkhan Omarov, Aidar Batyrbekov, Azizah Suliman, Bakhytzhan Omarov, Yerlan Sabdenbekov, Serik Aknazarov:

Electronic stethoscope for detecting heart abnormalities in athletes. 1-5 - Jean Claude Tuyisenge, Nirere Gaudence, Didacienne Mukanyiligira

, Jean Pierre Nyakuri:
Fuzzy logic Applied to Smart Baby's Health and Feeding Sequence Monitoring System. 1-7 - Md. Farukh Hashmi, B. Kiran Kumar Ashish

, Satyarth Katiyar, Avinash G. Keskar
:
AccessNet: A Three Layered Visual Based Access Authentication System for Restricted Zones. 1-7 - Zouhaira Noubigh, Anis Mezghani, Monji Kherallah

:
Transfer Learning to improve Arabic handwriting text Recognition. 1-6 - Deepti Deshwal

, Pardeep Sangwan, Divya Kumar:
A Structured Approach towards Robust Database Collection for Language Identification. 1-6 - Muhammad Asad, Muhammad Shahzaib, Yusra Abbasi, Muhammad Rafi:

A Long-Short-Term-Memory Based Model for Predicting ATM Replenishment Amount. 1-6 - Mai Saleh

, Osama El-Sharkawy:
An embedded system for identifying memory systems and mental image schemas after the Intellectual Style Inventory. 1-4 - Aicha Korichi, Sihem Slatnia, Oussama Aiadi, Najiba Tagougui, Monji Kherallah

:
Arabic handwriting recognition: Between handcrafted methods and deep learning techniques. 1-6 - Ahmad Ghandour

, Brendon J. Woodford:
COVID-19 Impact on E-Commerce in UAE. 1-8 - Jawaher Abdulwahab Fadhil

, Qusay Idrees Sarhan
:
Internet of Vehicles (IoV): A Survey of Challenges and Solutions. 1-10 - Taghrid Z. Ali, Tawfig M. Abdelaziz, Abdelsalam M. Maatuk, Salwa M. Elakeili:

A Framework for Improving Data Quality in Data Warehouse: A Case Study. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














