


default search action
ICIST 2019: Cairo, Egypt
- Proceedings of the 9th International Conference on Information Systems and Technologies, ICIST 2019, Cairo, Egypt, March 24-26, 2019. ACM 2019, ISBN 978-1-4503-6292-4

- Mohamed ElSherif, Nahed Azab:

A Framework to Measure E-Participation Level of Government Social Media Accounts. 1:1-1:6 - Antonio Capodieci, Luca Mainetti:

Business process awareness to support GDPR compliance. 2:1-2:6 - Rao Casturi, Rajshekhar Sunderraman:

Enterprise Framework for Business Intelligence Tools on Cloud Computing Environment for Investment Platforms. 3:1-3:7 - Youssou Dieng, Ibrahima Diop, Youssou Faye, Camir A. Malack:

A sub-regional information system for monitoring and managing PLHIV in cross-border areas between Gambia, Senegal and Guinea Bissau: Information System for Managing PLHIV in Cross-Border Areas. 4:1-4:7 - Joni Salminen, Mridul Nagpal, Haewoon Kwak, Jisun An, Soon-Gyo Jung, Bernard J. Jansen:

Confusion Prediction from Eye-Tracking Data: Experiments with Machine Learning. 5:1-5:9 - Joni Salminen, Juan Corporan, Roope Marttila, Tommi Salenius, Bernard J. Jansen:

Using Machine Learning to Predict Ranking of Webpages in the Gift Industry: Factors for Search-Engine Optimization. 6:1-6:8 - Octavio González:

Investigating Information Systems with the Extended Case Method. 7:1-7:8 - Octavio González:

Organising Low-budget Information Systems to Create and Sustain Collective Action for Blood Donation. 8:1-8:8 - Bachir Kaddar, Hadria Fizazi

, Dou El Kefel Mansouri:
Saliency Assessment Using Selective Features Based on Entropy and Wavelet Transform. 9:1-9:6 - Ridha Ilyas Bendjillali

, Mohammed Beladgham, Khaled Merit:
Face Recognition Based on DWT Feature for CNN. 10:1-10:5 - Ridha Ilyas Bendjillali

, Mohammed Beladgham, Khaled Merit, Imane Haouam:
Fingerprint Authentication by wavelets. 11:1-11:7 - Khaled Merit, Mohammed Beladgham, Ridha Ilyas Bendjillali

:
Improving QoS of VoIP over 4G LTE. 12:1-12:4 - Rokia Bouzidi, Arezki Bendou, Fahima Nader, Rachid Chalal:

An architectural framework for gamified information systems. 13:1-13:5 - Mostefa Hamdani, Youcef Aklouf, Hadj Ahmed Bouarara:

Improved fuzzy Load-Balancing Algorithm for Cloud Computing System. 14:1-14:4 - Samira Aouidi, Mahnane Lamia, Mohamed Hafidi:

Towards a Semantic Social Approach to enrich the Learner's Profile in Human Learning Environments. 15:1-15:5 - Abdelmadjid Benmachiche, Amina Makhlouf, Tahar Bouhadada:

Evolutionary learning of HMM with Gaussian mixture densities for Automatic speech recognition. 16:1-16:6 - Etchiali Abdelhak

, Hadjila Fethallah, Merzoug Mohammed:
QoS Uncertainty Handling for an Efficient Web Service Selection. 17:1-17:7 - Boulkamh Chouaib, Lakhdar Derdouri, Zendaoui Lokmane:

Smart Home Energy Management System Architecture Using IoT. 18:1-18:5 - Lotfi Baidar

, Abdellatif Rahmoun
, Pascal Lorenz
, Miloud Mihoubi
:
Whale Optimization Approach for Optimization Problem In Distributed Wireless Sensor Network. 19:1-19:7 - Ibrahima Diop, Youssou Dieng, Youssou Faye, Camir A. Malack, Ousseynou Cisse, Boubacar Diouf:

Decrease the number of patients lost to follow-up in the monitoring of PLHIV in cross-border areas between The Gambia, Senegal and Guinea Bissau. 20:1-20:6 - Abdelweheb Gueddes

, Mohamed Ali Mahjoub
:
e-SAAD system: Ontologies based approach for home Care Services platform. 21:1-21:6 - Yousif Hamad

, Omer K. Jasim Mohammad
, Konstantin Simonov:
Evaluating of Tissue Germination and Growth Rate of ROI on Implants of Electron Scanning Microscopy Images. 22:1-22:7 - Mohammed Aidoud, Moussa Sedraoui, Chams-Eddine Feraga, Abdennour Sebbagh

:
Robustification of the generalized predictive law (GPC) by the implicit application of the H∞ method. 23:1-23:7 - Ines Sbai, Saoussen Krichen

:
A Hybrid PSO-LS approach for solving the Two-Dimensional Bin Packing Problem with weight capacities constraint: A case study. 24:1-24:8 - Soufiane Khedairia, Imene Houari, Manel Ababsia, Mohamed Tarek Khadir:

Clustering Ensemble Approach Based on Incremental Learning. 25:1-25:7 - Youssou Faye, Ibrahima Niang, Hervé Guyennet:

New Node Distributed Access Control Scheme for Wireless Sensor Network. 26:1-26:4 - Francisco C. Eugenio Jr., Josephine S. Dela Cruz:

Assessing E-Learning Applications as an Effective Tool in Engaging Auditory Processing Disorder learners for Educators. 27:1-27:4 - Joy G. Bea, Josephine S. Dela Cruz:

Chicken Farm Monitoring System Using Sensors and Arduino Microcontroller. 28:1-28:4 - Ahmed Hadi Ali

, Omer K. Jasim Mohammad
:
Impacting of the E- Platforms on the 4.0th Industrial Educational Revolution. 29:1-29:7 - Firdews Alsalman

, Aseel Ali:
Estimation Effort using Developed Cat Swarm Optimization. 30:1-30:7 - Moustapha Cissé, Marie Ndiaye, Khalifa Gaye, Ousmane Sall

, Mouhamadou Saliou Diallo:
Comparative study of the mechanisms for personalization of information. 31:1-31:7 - Makerem Zemni, Malika Jallouli, Anouar Ben Mabrouk

, Mohamed Ali Mahjoub
:
ECG Signal Processing with Haar-Schauder Multiwavelet. 32:1-32:6 - Hana Rasheid Esmaeel, Noor khaleel Abbood, Aumama MohammedFarhan:

Mobile Quiz on Android Platform (MQAP). 33:1-33:7 - Kahina Semar-Bitah, Chahrazed Tarabet, Meriem Mouzai, Abderrahim Chetibi:

Scalable Proposed Decision Support System: Algerian economic investment support. 34:1-34:4 - Yasser Hajjar, Mazen El-Sayed, Abd El Salam Al Hajjar, Bassam Daya:

Correlation analysis between EEG parameters to enhance the performance of intelligent predictive models for the neonatal newborn sick effects. 35:1-35:5 - Khalid W. Al-Ani, Ahmed Subhi Abdalkafor

, Aiman Majid Nassar
:
Smart City Applications: A Survey. 36:1-36:4 - Tigran Badalyan, Yao Zhong:

Problems of effective development in conditions of corruption. 37:1-37:7 - The H. Vu, Ogbodo Mark Ikechukwu, Abderazek Ben Abdallah

:
A Low-latency Tree-based Multicast Spike Routing for Scalable Multicore Neuromorphic Chips. 38:1-38:7 - Mohamed Ridda Laouar, Zaineb Touati Hamad, Sean Eom

:
Towards blockchain-based urban planning: Application for Waste Collection Management. 39:1-39:6 - Chaira Mahmoud, Sofiane Aouag:

Security for Internet of Things: A State of the Art on existing Protocols and Open Research issues. 40:1-40:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














