


default search action
19th AICCSA 2022: Abu Dhabi, United Arab Emirates
- 19th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022. IEEE 2022, ISBN 979-8-3503-1008-5

- Eman T. Alharbi, Asma Cherif, Farrukh Nadeem, Tariq Mirza:

Machine Learning Models for Early Prediction of Asthma Attacks Based on Bio-signals and Environmental Triggers. 1-7 - Rima Grati, Cihan Tunc:

Message from AICCSA'2022 Program Chairs. 1 - Bilel Elayeb, Raja Ayed:

Socio-Semantic Information Retrieval of Structured Arabic Texts. 1-8 - Serhan Gener

, Parker Dattilo, Dhruv Gajaria
, Alexander Fusco, Ali Akoglu
:
GPGPU-based High Throughput Image Pre-processing Towards Large-Scale Optical Character Recognition. 1-7 - Loay Alajramy

, Adel Taweel, Radi Jarrar, Elyes Lamine
, Imen Megdiche:
Automated Learning Approach for Genetic Diseases. 1-6 - Simanta Deb Turja, Mohammad Imrul Jubair

, Md. Shafiur Rahman, Md. Hasib Al Zadid, Mohtasim Hossain Shovon, Md. Faraz Kabir Khan:
Shapes2Toon: Generating Cartoon Characters from Simple Geometric Shapes. 1-8 - Mohammad Wali Ur Rahman

, Sicong Shao
, Pratik Satam, Salim Hariri, Chris Padilla, Zoe Taylor, Carlos Nevarez:
A BERT-based Deep Learning Approach for Reputation Analysis in Social Media. 1-8 - Raoudha Nouisser, Salma Kammoun Jarraya, Mohamed Hammami:

Deep Learning and Kinect Skeleton-based Approach for Fall Prediction of Elderly Physically Disabled. 1-7 - Lucas Francisco, Rodrigo Bonacin

, Ferrucio de Franco Rosa:
A Study on the Application of Blockchain in Carbon Trading Systems. 1-6 - Hisham A. Kholidy, Salim Hariri:

Toward An Experimental Federated 6G Testbed: A Federated Leaning Approach. 1-6 - Heba M. Ismail

, Rawan Elabyad
, Arwa Dyab
:
Smart Residential Water Leak and Overuse Detection System Using Machine Learning. 1-6 - Qusai Ismail, Mariam Massadeh, Qanita Bani Baker:

Predicting COVID-19 Related Tweets Using Ensemble of Transformers Models. 1-7 - Hajar Hakkoum, Ibtissam Abnane, Ali Idri:

Evaluating Interpretability of Multilayer Perceptron and Support Vector Machines for Breast Cancer Classification. 1-6 - Oussama H. Hamid

:
There Is More to AI than Meets the Eye: Aligning Man-made Algorithms with Nature-inspired Mechanisms. 1-4 - Emdadul Haque, Md. Faraz Kabir Khan, Mohammad Imrul Jubair

, Jarin Anjum, Abrar Zahir Niloy:
Book Cover Synthesis from the Summary. 1-6 - Kamel Madi, Eric Paquet:

3D Deformable Protein Shapes Classification based on Triangles-Stars and Composite Deep Neural Networks. 1-8 - Sven Löffler, Franz Kroll, Ilja Becker, Petra Hofstedt:

Optimal Beacon Placement for Indoor Positioning Using Constraint Programming. 1-8 - Alejandro Adorjan

, Genoveva Vargas-Solar, Regina Motz:
Towards a human-in-the-loop curation: A qualitative perspective. 1-8 - Reem Alnaqeb, Fatema Alrashdi, Khuloud Alketbi, Heba M. Ismail

:
Machine Learning-based Water Potability Prediction. 1-6 - Oratile Leteane, Yirsaw Ayalew

:
An adaptive and extensible framework to enhance end to end trustworthiness of traceability data. 1-8 - Eiman Alothali, Kadhim Hayawi, Hany Alashwal:

Using Self-labeling and Co-Training to Enhance Bots Labeling in Twitter. 1-2 - Abdelkader Berrouachedi

, Rakia Jaziri, Gilles Bernard:
Convolutional, Extra-Trees and Multi layer Perceptron. 1-8 - Gcinizwe Dlamini, Karina Singatullina, Giancarlo Succi:

Towards understanding the impact of mental states on software development using EEG. 1-2 - Rahul Khullar, Gahangir Hossain

:
A New Algorithm for Energy Efficient Task Scheduling Towards Optimal Green Cloud Computing. 1-6 - Mejdi Karmeni, Emna Ben Abdallah, Khouloud Boukadi, Mourad Abed:

Towards An Accurate Stacked Ensemble Learning Model For Thyroid Earlier Detection. 1-8 - Hamda Al Breiki:

Trust Evolution Game in Blockchain. 1-4 - Akshit Aggarwal, Srinibas Swain:

Blind Two Party ECDSA Signing Based Homomorphic Encryption over Message Passing. 1-5 - Hasnae Zerouaoui, Ali Idri, Omar El Alaoui

:
Histological breast cancer classification using CNN and MLP based ensembles. 1-6 - Walid Fakhet

, Salim El Khediri, Salah Zidi:
Guided classification for Arabic Characters handwritten Recognition. 1-6 - Souheir Merkouche

, Chafia Bouanaka
:
A Hybrid approach for containerized Microservices auto-scaling. 1-6 - Asma Hadyaoui

, Lilia Cheniti-Belcadhi:
Towards a context-aware personalized formative assessment in a collaborative online environment. 1-6 - Saméh Kchaou, Rahma Boujelbane

, Lamia Hadrich Belguith:
Bottom-up approach to translate Tunisian dialect texts in Social Networks. 1-6 - Jihen Maâzoun, Hanêne Ben-Abdallah, Nadia Bouassida:

Clustering techniques for software product line feature identification. 1-10 - Rafika Thabet

, Elyes Lamine
, Marie-Hélène Cleostrate, Marie-Noëlle Cufi, Hervé Pingaud:
Towards a novel spontaneous medication error reporting tool for enhancing patient safety. 1-6 - Amra Sghaier

, Aref Meddeb
:
Comparative Study of QoS-aware Network Coding Protocols in WSNs. 1-5 - Basmah Al-Zahrani, Suhair Alshehri, Asma Cherif, Abdessamad Imine:

Property Graph Access Control Using View-Based and Query-Rewriting Approaches. 1-2 - Mabrouka Bensghaier, Wided Bakari, Mahmoud Neji:

Natural Language Inference for Arabic using Recurrent Neural Network and Word Embedding. 1-8 - Abdallah Karakra

, Franck Fontanili, Adel Taweel, Elyes Lamine
, Jacques Lamothe, Hafez Barghouthi:
Digital Twin in Healthcare: Security Threat Meta-Model. 1-6 - Genoveva Vargas-Solar, Zakaria Maamar:

Message from AICCSA'2022 General Chairs. 1-2 - Faten Khemakhem, Hamdi Ellouzi, Hela Ltifi:

A Novel Deep Multi-Task Learning to Sensing Student Engagement in E-Learning Environments. 1-7 - Marco De Vincenzi

:
DRIVES: Android App for Automotive Customized Services. 1-8 - Chékra El Fehri, Nouha Baccour, Inès Kammoun:

The cost of reliable uplink communication in large scale LoRaWAN. 1-8 - Abdul Manan, Ziran Min

, Charif Mahmoudi
, Valerio Formicola
:
Extending 5G services with Zero Trust security pillars: a modular approach. 1-6 - Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger:

CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model. 1-8 - Hafsaa Ouifak

, Ali Idri:
Neuro-fuzzy ensembles: A systematic mapping study. 1-6 - Asma Cherif, Suhair Alshehri, Manal Kalkatawi

, Abdessamad Imine:
Towards an intelligent adaptive security framework for preventing and detecting credit card fraud. 1-8 - Ismehene Chahbi, Nourhène Ben Rabah, Ines Ben Tekaya:

Towards an efficient and interpretable Machine Learning approach for Energy Prediction in Industrial Buildings: A case study in the Steel Industry. 1-8 - Nadia Dahmani, Suja A. Alex

, S. Gayathri Sadhana, S. Geethanjali Jayasree, T. P. Akhil Jinu:
Welcome Wagons: A Block Chain based Web Application for Car Booking. 1-6 - Emna Feki, Khouloud Boukadi, Faiza Loukil

, Mourad Abed:
BELONG: Blockchain basEd pLatform fOr donation & social project fuNdinG. 1-8 - Hadjer Ykhlef, Sarah Rouizi:

Time Series Fault Detection for Power Line Condition Monitoring: A Comparative Study. 1-8 - Zineb Maasaoui

, Anfal Hathah, Hasnae Bilil, Van Sy Mai, Abdella Battou, Ahmed Lbath:
Network Security Traffic Analysis Platform - Design and Validation. 1-5 - Kai Widdeson, Suncica Hadzidedic:

FFM-SVD: A Novel Approach for Personality-aware Recommender Systems. 1-8 - Stefan Nesic, Andrian Putina, Maroua Bahri, Alexis Huet, José Manuel Navarro, Dario Rossi, Mauro Sozio:

STREamRHF: Tree-Based Unsupervised Anomaly Detection for Data Streams. 1-8 - Ahmed Alia

, Mohammed Maree
, Mohcine Chraibi:
A Fast Hybrid Deep Neural Network Model for pushing behavior detection in human crowds. 1-2 - Coco Koban, Maryia Falaleyeva, Maria Spravtseva, Roman Moiseev, Sajjad Khan

:
Modeling User-Centric Threats in Smart City: A Hybrid Threat Modeling Method. 1-7 - Sakib Shahriar, Rozita Dara, Kadhim Hayawi:

On the Impact of Deep Learning and Feature Extraction for Arabic Audio Classification and Speaker Identification. 1-8 - Afef Mdhaffar

, Bechir Zalila
, Racem Moalla, Ayoub Kharrat, Omar Rebai, Mohamed Melek Hsairi, Ahmed Sallemi, Hsouna Kobbi, Amel Kolsi, Dorsaf Chatti, Mohamed Jmaiel, Bernd Freisleben:
A Smart Trap for Counting Olive Moths Based on the Internet of Things and Deep Learning. 1-8 - Bakary Dolo

, Faiza Loukil
, Khouloud Boukadi:
Early Detection of Diabetes Mellitus Using Differentially Private SGD in Federated Learning. 1-8 - Reem Alnaqeb, Khuloud Alketbi, Fatema Alrashdi, Heba M. Ismail

:
Water Quality Classification Using Machine Learning Algorithms. 1-6 - Safwan Elmadani, Salim Hariri, Sicong Shao

:
Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G Networks. 1-9 - Sicong Shao

, Saleem Alharir
, Salim Hariri, Pratik Satam, Sonia Shiri, Abdessamad Mbarki:
AI-based Arabic Language and Speech Tutor. 1-8 - Georgios L. Stavrinides, Helen D. Karatza

:
Resource Allocation and Scheduling of Linear Workflow Applications with Ageing Priorities and Transient Failures. 1-8 - Jesus Pacheco

, Marco Lopez, Victor H. Benitez:
AI Classifiers Comparison for Network Anomaly Behavior Analysis. 1-5 - Dhrubajyoti Pathak, Sukumar Nandi, Priyankoo Sarmah:

AsPOS: Assamese Part of Speech Tagger using Deep Learning Approach. 1-8 - Kefah Alissa, Omar Alzoubi:

Financial Sentiment Analysis based on transformers and Majority Voting. 1-4 - Muhammad Rizwan

, Enoch Jung, Yoosang Park, Jaeyoung Choi, Yoonhee Kim:
Optimization of Matrix-Matrix Multiplication Algorithm for Matrix-Panel Multiplication on Intel KNL. 1-7 - Wissam Al Jurdi

, Jacques Bou Abdo
, Jacques Demerjian
, Abdallah Makhoul
:
Strategic Attacks on Recommender Systems: An Obfuscation Scenario. 1-8 - Lisanne Kremer, Robert Gutu

, Lea Leeser, Bernhard Breil, Thomas Lux
:
Process optimization of a pre-medication process in inpatient hospital care with 2D- and 3D-modeling software - an as-is process to-be process comparison. 1-6 - Hassan Idoudi, Mostafa Ameli

, Cyril Nguyen Van Phu, Mahdi Zargayouna, Abderrezak Rachedi:
Vehicular Cloud Computing for Population Evacuation Optimization. 1-8 - Fatima Al-Rammah, Marwa Masmoudi, Salma Kammoun Jarraya:

CNN-LSTM Based Approach for Analyzing and Detecting Stereotypical Motor Movements of Autistic Children in Pre-Meltdown Crisis. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














