


default search action
16th AICCSA 2019: Abu Dhabi, UAE
- 16th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2019, Abu Dhabi, UAE, November 3-7, 2019. IEEE Computer Society 2019, ISBN 978-1-7281-5052-9

- Junfeng Wu, Li Yao, Bin Liu

, Zheyuan Ding:
Automated Anomaly Detection Assisted by Discrimination Model for Time Series. 1-7 - Alaa Saleh Alsaedi, Arwa S. Almobarak, Saad T. Alharbi:

Mining the Global Terrorism Dataset using Machine Learning Algorithms. 1-7 - Flávia Dias Casagrande, Evi Zouganeli:

Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across Homes. 1-8 - Kamalkhan Artykbayev, Askhat Temir, M. Fatih Demirci

:
Selecting the Best Optimal Feature Correspondence with Deep Learning. 1-6 - Saoussen Mathlouthi Bouzid, Chiraz Ben Othmane Zribi

:
Detection of Arabic Non-Referential Pronouns using Self-Training Method and Similarity Measures. 1-8 - Rogério Winter

, Ferrucio de Franco Rosa, Rodrigo Bonacin
, Mário Jino:
Architecture and Conceptual Formalization of Cyber-Mission Operations. 1-8 - Alibek Jakupov, Julien Mercadal, Besma Zeddini:

MacNabbs: Knowledge Extraction from Unstructured Data using Semantic Analysis and User Activity Logging. 1-7 - Hamda Slimi, Ibrahim Bounhas, Yahya Slimani:

URL-Based Tweet Credibility Evaluation. 1-6 - Sara Elmidaoui, Laila Cheikhi, Ali Idri:

The Impact of SMOTE and Grid Search on Maintainability Prediction Models. 1-8 - Dominique Gruyer, Mohamed-Cherif Rahal:

Multi-Layer Laser Scanner Strategy for Obstacle Detection and Tracking. 1-8 - Maroua Masmoudi, Mohamed-Hedi Karray, Sana Ben Abdallah Ben Lamine

, Hajer Baazaoui Zghal
, Bernard Archimède:
DISERTO: Semantics-Based Tool for Automatic and Virtual Data Integration. 1-8 - Muneer O. Bani Yassein

, Farah Shatnawi, Saif Rawashdeh, Wail Mardini:
Blockchain Technology: Characteristics, Security and Privacy; Issues and Solutions. 1-8 - Nida Khan, Mohamed Nassar

:
A Look into Privacy-Preserving Blockchains. 1-6 - Ilhaam Aziz Omar

, Raja Jayaraman, Khaled Salah, Mecit Can Emre Simsekler
:
Exploiting Ethereum Smart Contracts for Clinical Trial Management. 1-6 - Mazin Debe, Khaled Salah, Muhammad Habib Ur Rehman

, Davor Svetinovic:
Towards a Blockchain-Based Decentralized Reputation System for Public Fog Nodes. 1-6 - Roland Kromes, François Verdier:

IoT Devices Hardware Modeling for Executing Blockchain and Smart Contracts Applications. 1-6 - Macià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal:

Blockchain-Based Contract Signing Protocol for Confidential Contracts. 1-6 - Lubna AlHenaki, Manar Hosny:

A Genetic-Frog Leaping Algorithm for Large Dataset Document Clustering. 1-4 - Ahmad Khalil, Nader Mbarek, Olivier Togni:

Fuzzy Logic Based Security Trust Evaluation for IoT Environments. 1-8 - Mona Al-Ghamdi

, Asma Cherif, Abdessamad Imine:
Towards an Edge-Based Architecture for Real-Time Collaborative Editors. 1-8 - Dou El Kefel Mansouri, Seif-Eddine Benkabou, Bachir Kaddar, Josep Lluís Larriba-Pey, Khalid Benabdeslem:

Reducing Traffic Congestion by LSTM-LOF Framework. 1-8 - Mohammad Moussa Madine

, Ammar Battah, Aaminah Khan, Naoufel Werghi:
Detecting Drivers Smartphone: A Learned Features Approach using Aggregated Scalogram Images. 1-5 - Salwa Alem, David Espes

, Eric Martin, Laurent Nana, Florent de Lamotte:
A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard. 1-8 - Ibtihal Alablani

, Mohammed J. F. Alenazi
:
Performance Evaluation of Sensor Deployment Strategies in WSNs Towards IoT. 1-8 - Dina Samak

, Sarah Jad, Nour Nabil, Amr Wassal, Marwan Torki
:
Spectrometer as an Ubiquitous Sensor for IoT Applications Targeting Food Quality. 1-7 - Samir Ouchani

, Abdelaziz Khaled:
A Meta Language for Cyber-Physical Systems and Threats: Application on Autonomous Vehicle. 1-8 - Darren Saguil, Qiao Xue, Qusay H. Mahmoud:

M2MHub: A Blockchain-Based Approach for Tracking M2M Message Provenance. 1-8 - Wael R. Elwasif

, Ane Lasa, Philip C. Roth, Timothy Reed Younkin
, Mark R. Cianciosa
:
Nested Workflows for Loosely Coupled HPC Simulations. 1-8 - Sabah Al-Fedaghi, Yazan Mohamad:

Business Process Mapping: A Case Study. 1-8 - José R. González, Aura Conci, Maira Beatriz Hernandez Moran, Adriel S. Araújo, Aline Paes, Charbel Damião, W. G. Fiirst:

Analysis of Static and Dynamic Infrared Images for Thyroid Nodules Investigation. 1-7 - Manal Abdullah Alohali

, Nathan L. Clarke
, Steven Furnell:
Information Security Risk Communication: A User-Centric Approach. 1-10 - Gürdal Ertek, Gül Tokdemir, Mohamad Mustafa Hammoudi:

Graph-Based Visualization of Stochastic Dominance in Statistical Comparisons. 1-7 - Dorob Wali Ahmad, Waqar Haque:

An Interactive Framework to Develop and Align Business Process Models. 1-8 - Victor Osmov, Atadjan Kurbanniyazov, Rasheed Hussain

, Alma Oracevic
, S. M. Ahsan Kazmi, Fatima Hussain:
On the Blockchain-Based General-Purpose Public Key Infrastructure. 1-8 - Marcio Alexandre Pereira da Silva

, Valéria Cesário Times, André Magno Costa de Araújo, Paulo Caetano da Silva
:
A Microservice-Based Approach for Increasing Software Reusability in Health Applications. 1-8 - Myriam Jaouadi, Lotfi Ben Romdhane

:
Influence Maximization Problem in Social Networks: An Overview. 1-8 - Boumediene Belkhouche, Wadha Al Ketbi, Aysha Al Neyadi, Shaikha Al Nuaimi, Eiman Al Hassani:

Modeling and Virtualization of Cultural Heritage. 1-8 - Negin Alisoltani, Mahdi Zargayouna

, Ludovic Leclercq
:
Data-Oriented Approach for the Dial-A-Ride Problem. 1-6 - Ahmad Alwadi, Abdulrahman Nahhas, Sascha Bosse, Naoum Jamous, Klaus Turowski:

A Modernized Model for Performance Requirements and Their Interdependencies. 1-8 - Faizan Ur Rehman

, Imad Afyouni, Ahmed Lbath, Saleh M. Basalamah
:
Hadath: From Social Media Mapping to Multi-Resolution Event-Enriched Maps. 1-8 - Mohamed Amir Abbas, Nadjia Benblidia, Nour-El-Islam Bachari:

A Multi-Level Fusion Approach for Climate Variation Study using Multi-Source Data - Case Study: Algeria. 1-7 - Lama Alturki, Khawlah Aloraini, Amina Aldughayshim, Saleh Albahli

:
Predictors of Readmissions and Length of Stay for Diabetes Related Patients. 1-8 - Ahmed Shuhaiber, Ibrahim Mashal

, Osama Alsaryrah
:
Smart Homes as an IoT Application: Predicting Attitudes and Behaviours. 1-7 - Souad Sadki, Hanan El Bakkali, Driss Allaki, Anas Chenguiti Ansari:

Predicting Patients' Health Behavior Based on Their Privacy Preferences. 1-8 - Najla Fattouch, Mouna Rekik

, Abderrahim Ait Wakrime
, Khouloud Boukadi
:
A Model-Driven Engineering Approach for Business Process Based SaaS Services Composition. 1-8 - Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, Djedjiga Mouheb

:
A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada. 1-7 - Moez Krichen, Roobaea Alroobaea

:
Towards Optimizing the Placement of Security Testing Components for Internet of Things Architectures. 1-2 - Benjamin Yankson, Adam Davis:

Analysis of the Current State of Cloud Forensics: The Evolving Nature of Digital Forensics. 1-8 - Maryam Yousef, Farkhund Iqbal:

Drone Forensics: A Case Study on a DJI Mavic Air. 1-3 - Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, Áine MacDermott

:
Drone Forensics: A Case Study on DJI Phantom 4. 1-6 - Faizan Ur Rehman

, Emad A. Felemban
:
A Preference-Based Interactive Tool for Safe Rescheduling of Groups for Hajj. 1-2 - Eman Alsagour, Lubna Alhenki, Mohammed Al-Dhelaan:

Different Word Representation for Text Classification: A Comparative Study. 1-2 - Hiba Alsmadi

, Ahmed J. Aljaaf
, Abir Jaafar Hussain
, Jamila Mustafina
, Rawaa Al-Jumeily, Thar Baker
, Conor Mallucci:
An Insight into ICP Monitoring of Patients with Hydrocephalus using Data Science Approach. 1-2 - Mohammad Rasoi Saleem Al Saidat:

A Design of an Enhanced Redundant SIP Model for Securing SIP-Based Networks. 1-6 - Farah Fargo, Shobha Vissapragada, Samantika Sury:

CONCORD: Improving Communication using Consumer-Count Detection. 1-11 - Sicong Shao

, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat. 1-8 - Tian Ma, Shiyou Qian, Jian Cao, Guangtao Xue, Jiadi Yu, Yanmin Zhu, Minglu Li:

An Unsupervised Incremental Virtual Learning Method for Financial Fraud Detection. 1-6 - Mohammad Shojafar

, Rahim Taheri
, Zahra Pooranian
, Reza Javidan, Ali Miri, Yaser Jararweh:
Automatic Clustering of Attacks in Intrusion Detection Systems. 1-8 - Gcinizwe Dlamini

, Rufina Galieva, Muhammad Fahim
:
A Lightweight Deep Autoencoder-Based Approach for Unsupervised Anomaly Detection. 1-5 - Felix Holl

, Louisa Reschke, Stefan Müller-Mielitz, Marina Fotteler, Walter Swoboda:
Secondary Use of Research Data: A Review of Availability and Utilization of Public Use Files and Initial Steps for the Development of a Process to Facilitate Medical Research Data Donation. 1-5 - Lena Otto:

Implementing and Scaling up Telemedicine Initiatives: Beyond User-Centeredness. 1-6 - Ahmad Wassim Al Gendy, Arij Lahmar:

Review on Healthcare Supply Chain. 1-10 - Liwen Zhang

, Elyes Lamine
, Franck Fontanili
, Christophe Bortolaso, Mustapha Derras, Hervé Pingaud:
A Decision-Making Support System for Operational Coordination of Home Health Care Services. 1-6 - Bernhard Breil, Thomas Lux

, Lisanne Kremer, Laura Rühl, Jennifer Apolinário-Hagen
:
Determination, Prioritization and Analysis of User Requirements to Prevention Apps. 1-5 - Yousef S. Khader

, Mohammad S. Alyahya, Anwar Batieha
, Adel Taweel:
JSANDS: A Stillbirth and Neonatal Deaths Surveillance System. 1-5 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala

:
Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection. 1-9 - Ryma Boussaha, Yacine Challal

, Abdelmadjid Bouabdallah:
Single-Path Network Coding Authentication for Software-Defined Named Data Networking. 1-8 - Zouheir Trabelsi, Safaa Zeidan:

Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack. 1-8 - Olfa Abusalem, Asma Cherif, Abdessamad Imine:

Towards Optimistic Access Control for Cloud-Based Collaborative Editors. 1-8 - Faten Khemakhem, Hela Ltifi:

Facial Expression Recognition using Convolution Neural Network Enhancing with Pre-Processing Stages. 1-7 - Noura Aljeri

, Azzedine Boukerche:
A Novel Online Machine Learning Based RSU Prediction Scheme for Intelligent Vehicular Networks. 1-8 - Juan Sebastian Piedrahita Giraldo, Chris O'Connor, Marian Verhelst

:
Efficient Keyword Spotting through Hardware-Aware Conditional Execution of Deep Neural Networks. 1-8 - Diana Alhafi, Anton Deik, Elhadj Benkhelifa, Mustafa Jarrar

:
Usability Evaluation of Lexicographic e-Services. 1-7 - Nidal Drissi, Sofia Ouhbi

, Mohammed Abdou Janati Idrissi
, Mounir Ghogho:
Gamification-Based Apps for PTSD: An Analysis of Functionality and Characteristics. 1-6 - Elyes Lamine

, Katarzyna Borgiel, Hervé Pingaud, Marie-Noëlle Cufi, Christophe Bortolaso, Mustapha Derras:
BL.Frailty: Towards an ICT-Based Platform for Frailty Assessment at Home. 1-6 - Feras Odeh, Adel Taweel:

A Deep Learning Approach to Extracting Adverse Drug Reactions. 1-6 - Ziad El-Khatib

, Soha El-Halabi, Mohamad Abu Khdeir, Yousef S. Khader
:
Children Immunization App (CImA), Low-Cost Digital Solution for Supporting Syrian Refugees in Zaatari Camp in Jordan - General Description. 1-5 - Yacine Hebbal:

Bypassing Full Disk Encryption with Virtual Machine Introspection. 1-8 - Shadan Ghaffaripour, Ali Miri:

Cryptographically Enforced Access Control in Blockchain-Based Platforms. 1-7 - Ahmed Ibrahim, Mohammad El-Ramly, Amr Badr:

Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications? 1-7 - Sicong Shao

, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics. 1-8 - Mahnaz Mohammadi, Sardar F. Jaf

, Andrew Stephen McGough, Toby P. Breckon
, Peter Matthews, Georgios Theodoropoulos
, Boguslaw Obara:
On the Use of Neural Text Generation for the Task of Optical Character Recognition. 1-8 - Goutam Mylavarapu, Kannan Ashwin Viswanathan, Johnson P. Thomas:

Assessing Context-Aware Data Consistency. 1-6 - Reem Al Junaibi, Mohammed A. Omar, Zeyar Aung, Armin Alibasic, George Westerman, Wei Lee Woon:

Evaluating Skills Dimensions: Case Study on Occupational Changes in the UAE. 1-8 - Fadi Yilmaz

, Meera Sridhar:
A Survey of In-Lined Reference Monitors: Policies, Applications and Challenges. 1-8 - Oussama Mounnan, Anas Abou El Kalam, Lamia El Haourani:

Decentralized Access Control Infrastructure using Blockchain for Big Data. 1-8 - Jesus Pacheco

, Victor H. Benitez, Cihan Tunc
, Clarisa Grijalva:
Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications. 1-6 - Farah Fargo, Olivier Franza, Cihan Tunc

, Salim Hariri:
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment. 1-4 - Charif Mahmoudi

, Fabrice Mourlin:
A Language for Controller-Less Internet of Things Orchestration Based on Label Forwarding. 1-7 - Amel Boufrioua, Elhachmi Ksouri, Meriem Harbadji:

Study by the FDTD Method of Multiband Microstrip Patch Antenna Loaded with L-Shaped Slot. 1-4 - Xavier Boulet, Mahdi Zargayouna

, Gérard Scémama, Fabien Leurent:
Service-Oriented Architecture for Multiscale Traffic Simulations. 1-8 - Rihab Derouiche, Zaki Brahmi, Mohamed Mohsen Gammoudi

:
Cooperative Agents Based Data Placement Approach for Data Intensive Workflows. 1-8 - Mohammed Al-Khafajiy

, Thar Baker
, Atif Waraich, Omar Alfandi, Aseel Hussien
:
Enabling High Performance Fog Computing through Fog-2-Fog Coordination Model. 1-6 - Eman Omar, Paola Flocchini, Nicola Santoro:

Perpetual Energy Restoration by Multiple Mobile Robots in Circular Sensor Networks. 1-8 - Ibrahim Bounhas, Souheila Ben Guirat:

KUNUZ: A Multi-Purpose Reusable Test Collection for Classical Arabic Document Engineering. 1-8 - Fatimah Alsayoud

, Ali Miri:
SSD: Cache or Tier an Evaluation of SSD Cost and Efficiency using MapReduce. 1-8 - Hamid Mcheick

, Youness Dendane, Fábio Petrillo, Souhail Ben Ali:
Quality Model for Evaluating and Choosing a Stream Processing Framework Architecture. 1-7 - Mohamed Samir, Mohammad El-Ramly, Amr Kamel:

Investigating the Use of Deep Neural Networks for Software Defect Prediction. 1-6 - Khalid Alsubhi, Fawaz Alsolami, Abdullah M. Algarni

, E. Albassam, Maher Khemakhem
, Fathy Alburaei Eassa, Kamal Mansur Jambi, Muhammad Usman Ashraf:
A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC. 1-8 - Adel Ben Mnaouer

, Marina M. Wanis, Moayad Aloqaily
:
Hierarchical Timed Colored Petri-Net Based Modeling and Evaluation of a Bank Credit Monitoring System. 1-7 - Majdi Rawashdeh, Awny Alnusair, Muder Almiani

, Lina Sawalha:
JMentor: An Ontology-Based Framework for Software Understanding and Reuse. 1-8 - Amro Abuabdo, Ziad A. Al-Sharif:

Virtualization vs. Containerization: Towards a Multithreaded Performance Evaluation Approach. 1-6 - Soukeina Zouaidi, Abdelfettah Belghith

, Ilhem Lengliz:
Vehicular Cloud Architectures: Taxonomy, Security and Challenges. 1-8 - Sarika Choudhary, Nishtha Kesswani:

Cluster-Based Intrusion Detection Method for Internet of Things. 1-8 - Ala Din Trabelsi, Hend Marouane

, Emna Bouhamed, Faouzi Zarai:
NOMA Based on Dynamic Scheduling Algorithm with Priority Assignment for V2X Communications. 1-8 - Hossain Kordestani, Roghayeh Mojarad, Abdelghani Chibani, Aomar Osmani

, Yacine Amirat, Kamel Barkaoui, Wagdy Zahran:
Hapicare: A Healthcare Monitoring System with Self-Adaptive Coaching using Probabilistic Reasoning. 1-8 - Nada M. Obaid, Ibrahim A. Hamad, Ali M. Madkhane, Yousif A. Hamad, Fadi T. El-Hassan:

Design and Testing of a Practical Smart Walking Cane for the Visually Impaired. 1-5 - M. Saifeddine Hadj Sassi, Ines Beltaief, Manel Zekri, Sadok Ben Yahia

:
Multi-Oriented Real-Time Arabic Scene Text Detection with Deep Fully Convolutional Networks. 1-6 - Omar Einea

, Ashraf Elnagar
:
Predicting Semantic Textual Similarity of Arabic Question Pairs using Deep Learning. 1-5 - Bashar Talafha, Mohammad Al-Smadi

, Mahmoud Al-Ayyoub, Yaser Jararweh, Patrick Juola:
Using a Hierarchical Softmax Based on the Huffman Coding Tree for Authenticating Arabic Tweets. 1-5 - Djedjiga Mouheb

, Raghad Albarghash, Mohamad Fouzi Mowakeh, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Arabic Cyberbullying on Social Networks using Machine Learning. 1-5 - Amândio Balcão Filho, Ferrucio de Franco Rosa, Rodrigo Ruiz

, Rodrigo Bonacin
, Mário Jino:
A Study on Trust Models in Cloud Computing. 1-8 - Bashar Talafha, Mahmoud Al-Ayyoub, Analle Abuammar, Yaser Jararweh:

Outperforming State-of-the-Art Systems for Aspect-Based Sentiment Analysis. 1-5 - Imane Guellil, Faiçal Azouaou, Alessandro Valitutti:

English vs Arabic Sentiment Analysis: A Survey Presenting 100 Work Studies, Resources and Tools. 1-8 - Kamel Madi

, Eric Paquet, Hamamache Kheddouci:
New Graph Distance Based on Stable Marriage Formulation for Deformable 3D Objects Recognition. 1-8 - Mohamed Hamroun, Sonia Lajmi

, Henri Nicolas, Ikram Amous
:
Arabic Text-Based Video Indexing and Retrieval System Enhanced by Semantic Content and Relevance Feedback. 1-8 - Tasleem Kausar, Mingjiang Wang, M. S. S. Malik:

Cancer Detection in Breast Histopathology with Convolution Neural Network Based Approach. 1-5 - Mohammad Mahmudul Alam

, S. M. Mahbubur Rahman:
Detection and Tracking of Fingertips for Geometric Transformation of Objects in Virtual Environment. 1-8 - Maryam Elamine

, Seifeddine Mechti, Lamia Hadrich Belguith
:
An Unsupervised Method for Detecting Style Breaches in a Document. 1-6 - Mohamed Nassar

, Abdallah Itani, Mahmoud Karout, Mohamad El Baba, Omar Al Samman Kaakaji:
Shoplifting Smart Stores using Adversarial Machine Learning. 1-6 - Otman Manad, Tarek Menouer

, Patrice Darmon:
Towards a Performant Multilingual Model Based on Ensemble Learning to Enhance Sentiment Analysis. 1-8 - Yousef Shatnawi, Mohammad A. Alsmirat

, Mahmoud Al-Ayyoub:
Face Recognition using Eigen-Faces and Extension Neural Network. 1-7 - Ghina Saad, Hassan Harb, Chady Abou Jaoude, Ali Jaber:

Correlation-Based Sensor Activity Scheduling Mechanisms for Wireless Sensor Networks. 1-8 - Farhan Ahmad, Asma Adnane, Chaker Abdelaziz Kerrache, Fatih Kurugollu, Iain W. Phillips

:
On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks. 1-7 - Hamid Mcheick

, Monah Shouki Bou Hatoum
, Alia Ghaddar
:
CMHWN: Coverage Maximization of Heterogeneous Wireless Network. 1-7 - Youssef Inedjaren, Besma Zeddini, Mohamed Maachaoui

, Jean-Pierre Barbot:
Securing Intelligent Communications on the Vehicular AdHoc Networks using Fuzzy Logic Based Trust OLSR. 1-6 - Saad Aldoihi

, Omar Hammami:
Effect of Invisible Exertions on Computed Tomography Radiologists in Saudi Hospitals. 1-4 - Mohammad Asif Towheed, Wasif Kiyani, Mumtaz Ummar, Tamer Shanableh

, Salam Dhou
:
Motion-Based Gait Recognition for Recognizing People in Traditional Gulf Clothing. 1-6 - Edward Richter, Ryan Raettig, Joshua Mack

, Spencer Valancius, Burak Unal
, Ali Akoglu
:
Accelerated Shadow Detection and Removal Method. 1-8 - Faten F. Kharbat, Tarik Elamsy, Ahmed Mahmoud, Rami Abdullah

:
Image Feature Detectors for Deepfake Video Detection. 1-4 - Humaira Nisar

, Goh Jinn Herng, Teh Peh Chiong:
Image Segmentation of Bright Field Activated Sludge Microscopic Images using Gaussian Mixture Model. 1-7 - Adriel S. Araújo, Thiago Alves Elias da Silva, Maira Beatriz Hernandez Moran, Aura Conci:

Using Series of Infrared Data and SVM for Breast Normality Evaluation. 1-8 - Imen Ben Rejeb, Sonia Ouni, Ezzeddine Zagrouba

:
Intra and Inter Spatial Color Descriptor for Content Based Image Retrieval. 1-8 - Ahmad Obeid

, Abdulrahman Takiddeen, Andrzej Stefan Sluzek
:
ICSAC: Towards Outliers Rejection and Multi-Model Identification in Keypoint-Based Matching of Partial Near-Duplicates. 1-5 - Majed Bouchahma, Sana Ben Hammouda, Samia Kouki

, Mouza Alshemaili, Khalid Samara:
An Automatic Dental Decay Treatment Prediction using a Deep Convolutional Neural Network on X-Ray Images. 1-4 - Muntaha Al-Asa'd, Nour Al-Khdour, Mutaz Bni Younes, Enas Khwaileh, Mahmoud Hammad

, Mohammad Al-Smadi
:
Question to Question Similarity Analysis using Morphological, Syntactic, Semantic, and Lexical Features. 1-6 - Nour El Houda Boulkrinat, Nadjia Benblidia, Abdelkrim Meziane:

Queries-Based Profile Evolution using Genetic Algorithm. 1-6 - Amina Benkessirat, Nadjia Benblidia:

Fundamentals of Feature Selection: An Overview and Comparison. 1-6 - Ahlam Alrehili

:
Automatic Hate Speech Detection on Social Media: A Brief Survey. 1-6 - Povilas Gudzius, Olga Kurasova

, Ernestas Filatovas
:
Optimal U-Net Architecture for Object Recognition Problems in Multispectral Satellite Imagery. 1-2 - Ahmad Al-Doulat, Islam Obaidat

, Minwoo Lee:
Unstructured Medical Text Classification using Linguistic Analysis: A Supervised Deep Learning Approach. 1-7 - Fakhri Abbas, Xi Niu:

Computational Serendipitous Recommender System Frameworks: A Literature Survey. 1-8 - Siham Boulaknadel, Yassine Tazouti

, Youssef Fakhri
:
Towards a Serious Game for Amazigh Language Learning. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














