


default search action
2nd DATA 2019: Dubai, UAE
- Imad Hoballah:

Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, DATA 2019, Dubai, UAE, December 2-5, 2019. ACM 2019, ISBN 978-1-4503-7284-8 - Horacio Paggi, Javier Soriano, Juan Alfonso Lara

:
A model of architecture for peer-to-peer systems based on information quality. 1:1-1:4 - Omar Meqdadi, Shadi A. Aljawarneh:

Bug types fixed by API-migration: a case study. 2:1-2:7 - Wilson Chango, Rebeca Cerezo, Cristóbal Romero

:
Predicting academic performance of university students from multi-sources data in blended learning. 3:1-3:5 - Povilas Gudzius, Olga Kurasova

, Ernestas Filatovas
:
Convolutional neural network hyperparameters designed for highest object recognition accuracy in satellite imagery. 4:1-4:2 - Sandhya Narayanan, Philip Samuel, Mariamma Chacko:

Back propagation network based prediction on map-reduce platforms. 5:1-5:5 - M. U. Sreeja, Binsu C. Kovoor:

Object driven semantic multi-video summarisation based on ontology. 6:1-6:6 - Jaseena K. U

, Binsu C. Kovoor:
Deep learning based multi-step short term wind speed forecasts with LSTM. 7:1-7:6 - Sreelakshmy I. J., Binsu C. Kovoor:

Enhanced adaptive patch based exemplar image inpainting. 8:1-8:6 - Jeevamol Joy, Nisha S. Raj, Renumol V. G:

An ontology model for content recommendation in personalized learning environment. 9:1-9:6 - Ahmed Ghareeb

, Weimin Wang, Kevin Hallinan:
Data-driven modelling for building energy prediction using regression-based analysis. 10:1-10:5 - Lana Issa, Shaidah S. Jusoh

:
Usability evaluation on gamified e-learning platforms. 11:1-11:6 - Bassam Al-Shargabi

, Fida'a Al-Shami:
An experimental study for breast cancer prediction algorithms. 12:1-12:6 - Abdallah Albataineh, Raad S. Al-Qassas

, Malik Qasaimeh:
A new architecture for voice interconnection using packet switched network. 13:1-13:7 - Rand Abu Hammour, Yousef Al Gharaibeh, Malik Qasaimeh, Raad S. Al-Qassas

:
The status of information security systems in banking sector from social engineering perspective. 14:1-14:7 - Abdallah Qusef

, Lana Issa, Eyad Ayoubi, Sharefa Murad:
Challenges and opportunities in cloud testing. 15:1-15:7 - J. Arjona, Mari Paz Linares

, Josep Casanovas:
A deep learning approach to real-time parking availability prediction for smart cities. 16:1-16:7 - Marwah Alian

, Arafat Awajan, Ahmad Al-Hasan
, Raeda Akuzhia
:
Towards building arabic paraphrasing benchmark. 17:1-17:5 - Mohmood Alsaadi, Alexei Lisitsa, Malik Qasaimeh:

Minimizing the ambiguities in medical devices regulations based on software requirement engineering techniques. 18:1-18:5 - Faraj M. Abdullah, Ali A. Mohammed, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi

:
Application of electronic management system in governmental institutions: an empirical study on the libyan civil registration. 19:1-19:5 - Monserrate Intriago-Pazmiño

, Julio Ibarra-Fiallo, Raúl Alonso-Calvo, José Crespo:
Segmenting retinal vascular net from retinopathy of prematurity images using convolutional neural network. 20:1-20:5 - Rabiah Al-qudah

, Ching Y. Suen:
Enhancing YOLO deep networks for the detection of license plates in complex scenes. 21:1-21:6 - Mama Nsangou Mouchili, John William Atwood, Shadi A. Aljawarneh:

Call data record based big data analytics for smart cities. 22:1-22:7 - Hassan Zeineddine

, Udo Braendle
, Assaad Farah:
Auto-generated ensemble model for predicting student success. 23:1-23:4 - Ammar Abdallah, Alain Abran, Bashar Mohammad Abdallah Qasaimeh:

Towards the adoption of international standards in enterprise architecture measurement. 24:1-24:7 - Hussein Al-bayaty

, Tareq Abed Mohammed, Ahmed Ghareeb
, Weimin Wang:
City scale energy demand forecasting using machine learning based models: a comparative study. 25:1-25:9 - Tareq Abed Mohammed, Ahmed Ghareeb

, Hussein Al-bayaty
, Shadi A. Aljawarneh:
Big data challenges and achievements: applications on smart cities and energy sector. 26:1-26:5 - Amnah Al-Abdi, Wail Mardini, Shadi A. Aljawarneh, Tareq Abed Mohammed:

Using of multiple RPL instances for enhancing the performance of IoT-based systems. 27:1-27:5 - Ahmed Sameh, Ibrahim Abunadi:

Piecewise multi-regression: superior predictor for housing index/prices at the districts of Riyadh-KSA. 28:1-28:7 - Hadeel Alazzam

, Abdulsalam Alsmady, Wail Mardini, Amira Enizat:
Load balancing in cloud computing using water flow-like algorithm. 29:1-29:6 - Muneer O. Bani Yassein

, Ismail Hmeidi, Marwa Al-Harbi, Lina Mrayan, Wail Mardini, Yaser M. Khamayseh
:
IoT-based healthcare systems: a survey. 30:1-30:9 - Handrin A. Ibrahim, Abdulhadi M. Ghaleb, Abdulhakim Sh. Mohammed:

Effects of central metal on spectroscopic properties of hexadeca fluorinated phthalocyanine. 31:1-31:13 - Rawan A. Al-Rashid Agha

, Wrya Monnet:
A virtual & an augmented reality application of the Rashid Agha's diwakhana in the citadel of erbil using 360° 3D Lidar. 32:1-32:9 - Mariam Khader, Ghazi Al-Naymat

:
An overview of various enhancements of DENCLUE algorithm. 33:1-33:7 - Safaa Hriez

, Nadim Obeid, Arafat Awajan:
User authentication on smartphones using keystroke dynamics. 34:1-34:4 - Abdullah Melhem

, Omar AlZoubi, Wail Mardini, Muneer O. Bani Yassein
:
Applications of blockchain in smart cities. 35:1-35:7 - Muneer O. Bani Yassein

, Omar Alzoubi, Mohammed Q. Shatnawi
, Ahmad Al Rawashdeh:
Performance analysis of RPL objective functions. 36:1-36:6 - Xue Tan, Rasha Kashef:

Predicting the closing price of cryptocurrencies: a comparative study. 37:1-37:5 - Layanah AlWreikat, Ali AlShawa, Dalia Al-Rimawi, Salam Fraihat

:
Business intelligence and data analytics system for mobile money. 38:1-38:6 - Bushra Abutahoun, Maisa Alasasfeh, Salam Fraihat

:
A framework of business intelligence solution for real estates analysis. 39:1-39:9 - Jin Soung Yoo:

Crime data warehousing and crime pattern discovery. 40:1-40:6 - Abdulsalam Alsmady, Hadeel Alazzam

, Areej Al Shorman:
Black hole attack prevention in MANET using enhanced AODV protocol. 41:1-41:5 - Hadeel Alazzam

, Abdulsalam Alsmady, Amaal R. Al Shorman
:
Supervised detection of IoT botnet attacks. 42:1-42:6 - Rabia Malkawe, Malik Qasaimeh, Firas Ghanim

, Mohammad Ababneh:
Toward an early assessment for Ransomware attack vulnerabilities. 43:1-43:7 - Nadera Aljawabrah

, Abdallah Qusef
:
TCTracVis: test-to-code traceability links visualization tool. 44:1-44:4 - Firas AlBalas, Majd Al-Soud, Wail Mardini:

A scalable and battery: aware tuning approach for constrained devices in internet of things. 45:1-45:3 - Diego Acuña-Escobar, Julio Ibarra-Fiallo, Monserrate Intriago-Pazmiño

:
Real-time face identification from video surveillance cameras. 46:1-46:4 - Rabah Magraoui, Mohammed Ouali:

Technology solutions and changes for an Axial Burner. 47:1-47:4 - Mohammed Ouali, Rabah Magraoui:

Analysis of mechanical defects and solution for an industrial machine. 48:1-48:6 - Shivani Jaswal

, Manisha Malhotra
:
A detailed analysis of trust models in cloud environment. 49:1-49:5 - Mohammed Q. Shatnawi

, Muneer O. Bani Yassein
, Qusai Q. Abuein
, Lujain Nsuir:
Big data analytics tools and applications: survey. 50:1-50:4 - Qusai Q. Abuein

, Mohammed Q. Shatnawi
:
Facebook effect on customers' purchasing behaviors in Jordan. 51:1-51:5 - Nesrine Melzi, Mustapha Temmar, Mohammed Ouali:

3D parametric design of a milling operation to obtain the temperature distribution. 52:1-52:4 - Zain A. Halloush

, Qussai M. Yaseen
:
A blockchain model for preserving intellectual property. 53:1-53:5 - Altynbek Sharipbay

, Bibigul Razakhova
, Assel S. Mukanova
, Banu Zh. Yergesh
, Gaziza Yelibayeva
:
Syntax parsing model of Kazakh simple sentences. 54:1-54:5 - Elissar Toufaily, Tatiana Zalan

, Soumaya I. Ben Dhaou:
From start-ups to governments: challenges and opportunities of blockchain adoption in the MENA ecosystem. 55:1-55:2 - Wael M. Bazzi

, Milad Latifi, Azam Khalili, Amir Rastegarnia:
An autonomous demand-side management based on adaptive diffusion strategy. 56:1-56:8 - Loui Jawarneh, Sameh Mhafazah:

The level of awareness of the academic administrations of the private universities regarding e-learning and the degree of its practice from the faculty point of view. 57:1-57:5 - Zulfiya Kaderkeyeva, Gulmira Bekmanova, Altynbek Sharipbay

, Assel Omarbekova:
A model and a method for assessing students' competencies in e-learning system. 58:1-58:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














