default search action
16th AICCSA 2019: Abu Dhabi, UAE
- 16th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2019, Abu Dhabi, UAE, November 3-7, 2019. IEEE Computer Society 2019, ISBN 978-1-7281-5052-9
- Junfeng Wu, Li Yao, Bin Liu, Zheyuan Ding:
Automated Anomaly Detection Assisted by Discrimination Model for Time Series. 1-7 - Alaa Saleh Alsaedi, Arwa S. Almobarak, Saad T. Alharbi:
Mining the Global Terrorism Dataset using Machine Learning Algorithms. 1-7 - Flávia Dias Casagrande, Evi Zouganeli:
Prediction of Next Sensor Event and its Time of Occurrence using Transfer Learning across Homes. 1-8 - Kamalkhan Artykbayev, Askhat Temir, M. Fatih Demirci:
Selecting the Best Optimal Feature Correspondence with Deep Learning. 1-6 - Saoussen Mathlouthi Bouzid, Chiraz Ben Othmane Zribi:
Detection of Arabic Non-Referential Pronouns using Self-Training Method and Similarity Measures. 1-8 - Rogério Winter, Ferrucio de Franco Rosa, Rodrigo Bonacin, Mário Jino:
Architecture and Conceptual Formalization of Cyber-Mission Operations. 1-8 - Alibek Jakupov, Julien Mercadal, Besma Zeddini:
MacNabbs: Knowledge Extraction from Unstructured Data using Semantic Analysis and User Activity Logging. 1-7 - Hamda Slimi, Ibrahim Bounhas, Yahya Slimani:
URL-Based Tweet Credibility Evaluation. 1-6 - Sara Elmidaoui, Laila Cheikhi, Ali Idri:
The Impact of SMOTE and Grid Search on Maintainability Prediction Models. 1-8 - Dominique Gruyer, Mohamed-Cherif Rahal:
Multi-Layer Laser Scanner Strategy for Obstacle Detection and Tracking. 1-8 - Maroua Masmoudi, Mohamed-Hedi Karray, Sana Ben Abdallah Ben Lamine, Hajer Baazaoui Zghal, Bernard Archimède:
DISERTO: Semantics-Based Tool for Automatic and Virtual Data Integration. 1-8 - Muneer O. Bani Yassein, Farah Shatnawi, Saif Rawashdeh, Wail Mardini:
Blockchain Technology: Characteristics, Security and Privacy; Issues and Solutions. 1-8 - Nida Khan, Mohamed Nassar:
A Look into Privacy-Preserving Blockchains. 1-6 - Ilhaam A. Omar, Raja Jayaraman, Khaled Salah, Mecit Can Emre Simsekler:
Exploiting Ethereum Smart Contracts for Clinical Trial Management. 1-6 - Mazin Debe, Khaled Salah, Muhammad Habib Ur Rehman, Davor Svetinovic:
Towards a Blockchain-Based Decentralized Reputation System for Public Fog Nodes. 1-6 - Roland Kromes, François Verdier:
IoT Devices Hardware Modeling for Executing Blockchain and Smart Contracts Applications. 1-6 - Macià Mut Puigserver, María Magdalena Payeras Capellà, Miquel A. Cabot-Nadal:
Blockchain-Based Contract Signing Protocol for Confidential Contracts. 1-6 - Lubna AlHenaki, Manar Hosny:
A Genetic-Frog Leaping Algorithm for Large Dataset Document Clustering. 1-4 - Ahmad Khalil, Nader Mbarek, Olivier Togni:
Fuzzy Logic Based Security Trust Evaluation for IoT Environments. 1-8 - Mona Al-Ghamdi, Asma Cherif, Abdessamad Imine:
Towards an Edge-Based Architecture for Real-Time Collaborative Editors. 1-8 - Dou El Kefel Mansouri, Seif-Eddine Benkabou, Bachir Kaddar, Josep Lluís Larriba-Pey, Khalid Benabdeslem:
Reducing Traffic Congestion by LSTM-LOF Framework. 1-8 - Mohammad Moussa Madine, Ammar Battah, Aaminah Khan, Naoufel Werghi:
Detecting Drivers Smartphone: A Learned Features Approach using Aggregated Scalogram Images. 1-5 - Salwa Alem, David Espes, Eric Martin, Laurent Nana, Florent de Lamotte:
A Hybrid Intrusion Detection System in Industry 4.0 Based on ISA95 Standard. 1-8 - Ibtihal Alablani, Mohammed J. F. Alenazi:
Performance Evaluation of Sensor Deployment Strategies in WSNs Towards IoT. 1-8 - Dina Samak, Sarah Jad, Nour Nabil, Amr Wassal, Marwan Torki:
Spectrometer as an Ubiquitous Sensor for IoT Applications Targeting Food Quality. 1-7 - Samir Ouchani, Abdelaziz Khaled:
A Meta Language for Cyber-Physical Systems and Threats: Application on Autonomous Vehicle. 1-8 - Darren Saguil, Qiao Xue, Qusay H. Mahmoud:
M2MHub: A Blockchain-Based Approach for Tracking M2M Message Provenance. 1-8 - Wael R. Elwasif, Ane Lasa, Philip C. Roth, Timothy Reed Younkin, Mark R. Cianciosa:
Nested Workflows for Loosely Coupled HPC Simulations. 1-8 - Sabah Al-Fedaghi, Yazan Mohamad:
Business Process Mapping: A Case Study. 1-8 - José R. González, Aura Conci, Maira Beatriz Hernandez Moran, Adriel S. Araújo, Aline Paes, Charbel Damião, W. G. Fiirst:
Analysis of Static and Dynamic Infrared Images for Thyroid Nodules Investigation. 1-7 - Manal Alohali, Nathan L. Clarke, Steven Furnell:
Information Security Risk Communication: A User-Centric Approach. 1-10 - Gürdal Ertek, Gül Tokdemir, Mohamad Mustafa Hammoudi:
Graph-Based Visualization of Stochastic Dominance in Statistical Comparisons. 1-7 - Dorob Wali Ahmad, Waqar Haque:
An Interactive Framework to Develop and Align Business Process Models. 1-8 - Victor Osmov, Atadjan Kurbanniyazov, Rasheed Hussain, Alma Oracevic, S. M. Ahsan Kazmi, Fatima Hussain:
On the Blockchain-Based General-Purpose Public Key Infrastructure. 1-8 - Marcio Alexandre Pereira da Silva, Valéria Cesário Times, André Magno Costa de Araújo, Paulo Caetano da Silva:
A Microservice-Based Approach for Increasing Software Reusability in Health Applications. 1-8 - Myriam Jaouadi, Lotfi Ben Romdhane:
Influence Maximization Problem in Social Networks: An Overview. 1-8 - Boumediene Belkhouche, Wadha Al Ketbi, Aysha Al Neyadi, Shaikha Al Nuaimi, Eiman Al Hassani:
Modeling and Virtualization of Cultural Heritage. 1-8 - Negin Alisoltani, Mahdi Zargayouna, Ludovic Leclercq:
Data-Oriented Approach for the Dial-A-Ride Problem. 1-6 - Ahmad Alwadi, Abdulrahman Nahhas, Sascha Bosse, Naoum Jamous, Klaus Turowski:
A Modernized Model for Performance Requirements and Their Interdependencies. 1-8 - Faizan Ur Rehman, Imad Afyouni, Ahmed Lbath, Saleh M. Basalamah:
Hadath: From Social Media Mapping to Multi-Resolution Event-Enriched Maps. 1-8 - Mohamed Amir Abbas, Nadjia Benblidia, Nour-El-Islam Bachari:
A Multi-Level Fusion Approach for Climate Variation Study using Multi-Source Data - Case Study: Algeria. 1-7 - Lama Alturki, Khawlah Aloraini, Amina Aldughayshim, Saleh Albahli:
Predictors of Readmissions and Length of Stay for Diabetes Related Patients. 1-8 - Ahmed Shuhaiber, Ibrahim Mashal, Osama Alsaryrah:
Smart Homes as an IoT Application: Predicting Attitudes and Behaviours. 1-7 - Souad Sadki, Hanan El Bakkali, Driss Allaki, Anas Chenguiti Ansari:
Predicting Patients' Health Behavior Based on Their Privacy Preferences. 1-8 - Najla Fattouch, Mouna Rekik, Abderrahim Ait Wakrime, Khouloud Boukadi:
A Model-Driven Engineering Approach for Business Process Based SaaS Services Composition. 1-8 - Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, Djedjiga Mouheb:
A Comparative Analysis of Cyberbullying and Cyberstalking Laws in the UAE, US, UK and Canada. 1-7 - Moez Krichen, Roobaea Alroobaea:
Towards Optimizing the Placement of Security Testing Components for Internet of Things Architectures. 1-2 - Benjamin Yankson, Adam Davis:
Analysis of the Current State of Cloud Forensics: The Evolving Nature of Digital Forensics. 1-8 - Maryam Yousef, Farkhund Iqbal:
Drone Forensics: A Case Study on a DJI Mavic Air. 1-3 - Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, Áine MacDermott:
Drone Forensics: A Case Study on DJI Phantom 4. 1-6 - Faizan Ur Rehman, Emad A. Felemban:
A Preference-Based Interactive Tool for Safe Rescheduling of Groups for Hajj. 1-2 - Eman Alsagour, Lubna Alhenki, Mohammed Al-Dhelaan:
Different Word Representation for Text Classification: A Comparative Study. 1-2 - Hiba Alsmadi, Ahmed J. Aljaaf, Abir Jaafar Hussain, Jamila Mustafina, Rawaa Al-Jumeily, Thar Baker, Conor Mallucci:
An Insight into ICP Monitoring of Patients with Hydrocephalus using Data Science Approach. 1-2 - Mohammad Rasoi Saleem Al Saidat:
A Design of an Enhanced Redundant SIP Model for Securing SIP-Based Networks. 1-6 - Farah Fargo, Shobha Vissapragada, Samantika Sury:
CONCORD: Improving Communication using Consumer-Count Detection. 1-11 - Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri:
One-Class Classification with Deep Autoencoder Neural Networks for Author Verification in Internet Relay Chat. 1-8 - Tian Ma, Shiyou Qian, Jian Cao, Guangtao Xue, Jiadi Yu, Yanmin Zhu, Minglu Li:
An Unsupervised Incremental Virtual Learning Method for Financial Fraud Detection. 1-6 - Mohammad Shojafar, Rahim Taheri, Zahra Pooranian, Reza Javidan, Ali Miri, Yaser Jararweh:
Automatic Clustering of Attacks in Intrusion Detection Systems. 1-8 - Gcinizwe Dlamini, Rufina Galieva, Muhammad Fahim:
A Lightweight Deep Autoencoder-Based Approach for Unsupervised Anomaly Detection. 1-5 - Felix Holl, Louisa Reschke, Stefan Müller-Mielitz, Marina Fotteler, Walter Swoboda:
Secondary Use of Research Data: A Review of Availability and Utilization of Public Use Files and Initial Steps for the Development of a Process to Facilitate Medical Research Data Donation. 1-5 - Lena Otto:
Implementing and Scaling up Telemedicine Initiatives: Beyond User-Centeredness. 1-6 - Ahmad Wassim Al Gendy, Arij Lahmar:
Review on Healthcare Supply Chain. 1-10 - Liwen Zhang, Elyes Lamine, Franck Fontanili, Christophe Bortolaso, Mustapha Derras, Hervé Pingaud:
A Decision-Making Support System for Operational Coordination of Home Health Care Services. 1-6 - Bernhard Breil, Thomas Lux, Lisanne Kremer, Laura Rühl, Jennifer Apolinário-Hagen:
Determination, Prioritization and Analysis of User Requirements to Prevention Apps. 1-5 - Yousef S. Khader, Mohammad S. Alyahya, Anwar Batieha, Adel Taweel:
JSANDS: A Stillbirth and Neonatal Deaths Surveillance System. 1-5 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection. 1-9 - Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Single-Path Network Coding Authentication for Software-Defined Named Data Networking. 1-8 - Zouheir Trabelsi, Safaa Zeidan:
Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack. 1-8 - Olfa Abusalem, Asma Cherif, Abdessamad Imine:
Towards Optimistic Access Control for Cloud-Based Collaborative Editors. 1-8 - Faten Khemakhem, Hela Ltifi:
Facial Expression Recognition using Convolution Neural Network Enhancing with Pre-Processing Stages. 1-7 - Noura Aljeri, Azzedine Boukerche:
A Novel Online Machine Learning Based RSU Prediction Scheme for Intelligent Vehicular Networks. 1-8 - Juan Sebastian Piedrahita Giraldo, Chris O'Connor, Marian Verhelst:
Efficient Keyword Spotting through Hardware-Aware Conditional Execution of Deep Neural Networks. 1-8 - Diana Alhafi, Anton Deik, Elhadj Benkhelifa, Mustafa Jarrar:
Usability Evaluation of Lexicographic e-Services. 1-7 - Nidal Drissi, Sofia Ouhbi, Mohammed Abdou Janati Idrissi, Mounir Ghogho:
Gamification-Based Apps for PTSD: An Analysis of Functionality and Characteristics. 1-6 - Elyes Lamine, Katarzyna Borgiel, Hervé Pingaud, Marie-Noëlle Cufi, Christophe Bortolaso, Mustapha Derras:
BL.Frailty: Towards an ICT-Based Platform for Frailty Assessment at Home. 1-6 - Feras Odeh, Adel Taweel:
A Deep Learning Approach to Extracting Adverse Drug Reactions. 1-6 - Ziad El-Khatib, Soha El-Halabi, Mohamad Abu Khdeir, Yousef S. Khader:
Children Immunization App (CImA), Low-Cost Digital Solution for Supporting Syrian Refugees in Zaatari Camp in Jordan - General Description. 1-5 - Yacine Hebbal:
Bypassing Full Disk Encryption with Virtual Machine Introspection. 1-8 - Shadan Ghaffaripour, Ali Miri:
Cryptographically Enforced Access Control in Blockchain-Based Platforms. 1-7 - Ahmed Ibrahim, Mohammad El-Ramly, Amr Badr:
Beware of the Vulnerability! How Vulnerable are GitHub's Most Popular PHP Applications? 1-7 - Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri:
Automated Twitter Author Clustering with Unsupervised Learning for Social Media Forensics. 1-8 - Mahnaz Mohammadi, Sardar F. Jaf, Andrew Stephen McGough, Toby P. Breckon, Peter Matthews, Georgios Theodoropoulos, Boguslaw Obara:
On the Use of Neural Text Generation for the Task of Optical Character Recognition. 1-8 - Goutam Mylavarapu, Kannan Ashwin Viswanathan, Johnson P. Thomas:
Assessing Context-Aware Data Consistency. 1-6 - Reem Al Junaibi, Mohammed A. Omar, Zeyar Aung, Armin Alibasic, George Westerman, Wei Lee Woon:
Evaluating Skills Dimensions: Case Study on Occupational Changes in the UAE. 1-8 - Fadi Yilmaz, Meera Sridhar:
A Survey of In-Lined Reference Monitors: Policies, Applications and Challenges. 1-8 - Oussama Mounnan, Anas Abou El Kalam, Lamia El Haourani:
Decentralized Access Control Infrastructure using Blockchain for Big Data. 1-8 - Jesus Pacheco, Victor H. Benitez, Cihan Tunc, Clarisa Grijalva:
Anomaly Behavior Analysis for Fog Nodes Availability Assurance in IoT Applications. 1-6 - Farah Fargo, Olivier Franza, Cihan Tunc, Salim Hariri:
Autonomic Resource Management for Power, Performance, and Security in Cloud Environment. 1-4 - Charif Mahmoudi, Fabrice Mourlin:
A Language for Controller-Less Internet of Things Orchestration Based on Label Forwarding. 1-7 - Amel Boufrioua, Elhachmi Ksouri, Meriem Harbadji:
Study by the FDTD Method of Multiband Microstrip Patch Antenna Loaded with L-Shaped Slot. 1-4 - Xavier Boulet, Mahdi Zargayouna, Gérard Scémama, Fabien Leurent:
Service-Oriented Architecture for Multiscale Traffic Simulations. 1-8 - Rihab Derouiche, Zaki Brahmi, Mohamed Mohsen Gammoudi:
Cooperative Agents Based Data Placement Approach for Data Intensive Workflows. 1-8 - Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, Aseel Hussien:
Enabling High Performance Fog Computing through Fog-2-Fog Coordination Model. 1-6 - Eman Omar, Paola Flocchini, Nicola Santoro:
Perpetual Energy Restoration by Multiple Mobile Robots in Circular Sensor Networks. 1-8 - Ibrahim Bounhas, Souheila Ben Guirat:
KUNUZ: A Multi-Purpose Reusable Test Collection for Classical Arabic Document Engineering. 1-8 - Fatimah Alsayoud, Ali Miri:
SSD: Cache or Tier an Evaluation of SSD Cost and Efficiency using MapReduce. 1-8 - Hamid Mcheick, Youness Dendane, Fábio Petrillo, Souhail Ben Ali:
Quality Model for Evaluating and Choosing a Stream Processing Framework Architecture. 1-7 - Mohamed Samir, Mohammad El-Ramly, Amr Kamel:
Investigating the Use of Deep Neural Networks for Software Defect Prediction. 1-6 - Khalid Alsubhi, Fawaz Alsolami, Abdullah M. Algarni, E. Albassam, Maher Khemakhem, Fathy Alburaei Eassa, Kamal Mansur Jambi, Muhammad Usman Ashraf:
A Tool for Translating Sequential Source Code to Parallel Code Written in C++ and OpenACC. 1-8 - Adel Ben Mnaouer, Marina M. Wanis, Moayad Aloqaily:
Hierarchical Timed Colored Petri-Net Based Modeling and Evaluation of a Bank Credit Monitoring System. 1-7 - Majdi Rawashdeh, Awny Alnusair, Muder Almiani, Lina Sawalha:
JMentor: An Ontology-Based Framework for Software Understanding and Reuse. 1-8 - Amro Abuabdo, Ziad A. Al-Sharif:
Virtualization vs. Containerization: Towards a Multithreaded Performance Evaluation Approach. 1-6 - Soukeina Zouaidi, Abdelfettah Belghith, Ilhem Lengliz:
Vehicular Cloud Architectures: Taxonomy, Security and Challenges. 1-8 - Sarika Choudhary, Nishtha Kesswani:
Cluster-Based Intrusion Detection Method for Internet of Things. 1-8 - Ala Din Trabelsi, Hend Marouane, Emna Bouhamed, Faouzi Zarai:
NOMA Based on Dynamic Scheduling Algorithm with Priority Assignment for V2X Communications. 1-8 - Hossain Kordestani, Roghayeh Mojarad, Abdelghani Chibani, Aomar Osmani, Yacine Amirat, Kamel Barkaoui, Wagdy Zahran:
Hapicare: A Healthcare Monitoring System with Self-Adaptive Coaching using Probabilistic Reasoning. 1-8 - Nada M. Obaid, Ibrahim A. Hamad, Ali M. Madkhane, Yousif A. Hamad, Fadi T. El-Hassan:
Design and Testing of a Practical Smart Walking Cane for the Visually Impaired. 1-5 - M. Saifeddine Hadj Sassi, Ines Beltaief, Manel Zekri, Sadok Ben Yahia:
Multi-Oriented Real-Time Arabic Scene Text Detection with Deep Fully Convolutional Networks. 1-6 - Omar Einea, Ashraf Elnagar:
Predicting Semantic Textual Similarity of Arabic Question Pairs using Deep Learning. 1-5 - Bashar Talafha, Mohammad Al-Smadi, Mahmoud Al-Ayyoub, Yaser Jararweh, Patrick Juola:
Using a Hierarchical Softmax Based on the Huffman Coding Tree for Authenticating Arabic Tweets. 1-5 - Djedjiga Mouheb, Raghad Albarghash, Mohamad Fouzi Mowakeh, Zaher Al Aghbari, Ibrahim Kamel:
Detection of Arabic Cyberbullying on Social Networks using Machine Learning. 1-5 - Amândio Balcão Filho, Ferrucio de Franco Rosa, Rodrigo Ruiz, Rodrigo Bonacin, Mário Jino:
A Study on Trust Models in Cloud Computing. 1-8 - Bashar Talafha, Mahmoud Al-Ayyoub, Analle Abuammar, Yaser Jararweh:
Outperforming State-of-the-Art Systems for Aspect-Based Sentiment Analysis. 1-5 - Imane Guellil, Faiçal Azouaou, Alessandro Valitutti:
English vs Arabic Sentiment Analysis: A Survey Presenting 100 Work Studies, Resources and Tools. 1-8 - Kamel Madi, Eric Paquet, Hamamache Kheddouci:
New Graph Distance Based on Stable Marriage Formulation for Deformable 3D Objects Recognition. 1-8 - Mohamed Hamroun, Sonia Lajmi, Henri Nicolas, Ikram Amous:
Arabic Text-Based Video Indexing and Retrieval System Enhanced by Semantic Content and Relevance Feedback. 1-8 - Tasleem Kausar, Mingjiang Wang, M. S. S. Malik:
Cancer Detection in Breast Histopathology with Convolution Neural Network Based Approach. 1-5 - Mohammad Mahmudul Alam, S. M. Mahbubur Rahman:
Detection and Tracking of Fingertips for Geometric Transformation of Objects in Virtual Environment. 1-8 - Maryam Elamine, Seifeddine Mechti, Lamia Hadrich Belguith:
An Unsupervised Method for Detecting Style Breaches in a Document. 1-6 - Mohamed Nassar, Abdallah Itani, Mahmoud Karout, Mohamad El Baba, Omar Al Samman Kaakaji:
Shoplifting Smart Stores using Adversarial Machine Learning. 1-6 - Otman Manad, Tarek Menouer, Patrice Darmon:
Towards a Performant Multilingual Model Based on Ensemble Learning to Enhance Sentiment Analysis. 1-8 - Yousef Shatnawi, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub:
Face Recognition using Eigen-Faces and Extension Neural Network. 1-7 - Ghina Saad, Hassan Harb, Chady Abou Jaoude, Ali Jaber:
Correlation-Based Sensor Activity Scheduling Mechanisms for Wireless Sensor Networks. 1-8 - Farhan Ahmad, Asma Adnane, Chaker Abdelaziz Kerrache, Fatih Kurugollu, Iain Phillips:
On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks. 1-7 - Hamid Mcheick, Monah Shouki Bou Hatoum, Alia Ghaddar:
CMHWN: Coverage Maximization of Heterogeneous Wireless Network. 1-7 - Youssef Inedjaren, Besma Zeddini, Mohamed Maachaoui, Jean-Pierre Barbot:
Securing Intelligent Communications on the Vehicular AdHoc Networks using Fuzzy Logic Based Trust OLSR. 1-6 - Saad Aldoihi, Omar Hammami:
Effect of Invisible Exertions on Computed Tomography Radiologists in Saudi Hospitals. 1-4 - Mohammad Asif Towheed, Wasif Kiyani, Mumtaz Ummar, Tamer Shanableh, Salam Dhou:
Motion-Based Gait Recognition for Recognizing People in Traditional Gulf Clothing. 1-6 - Edward Richter, Ryan Raettig, Joshua Mack, Spencer Valancius, Burak Unal, Ali Akoglu:
Accelerated Shadow Detection and Removal Method. 1-8 - Faten F. Kharbat, Tarik Elamsy, Ahmed Mahmoud, Rami Abdullah:
Image Feature Detectors for Deepfake Video Detection. 1-4 - Humaira Nisar, Goh Jinn Herng, Teh Peh Chiong:
Image Segmentation of Bright Field Activated Sludge Microscopic Images using Gaussian Mixture Model. 1-7 - Adriel S. Araújo, Thiago Alves Elias da Silva, Maira Beatriz Hernandez Moran, Aura Conci:
Using Series of Infrared Data and SVM for Breast Normality Evaluation. 1-8 - Imen Ben Rejeb, Sonia Ouni, Ezzeddine Zagrouba:
Intra and Inter Spatial Color Descriptor for Content Based Image Retrieval. 1-8 - Ahmad Obeid, Abdulrahman Takiddeen, Andrzej Stefan Sluzek:
ICSAC: Towards Outliers Rejection and Multi-Model Identification in Keypoint-Based Matching of Partial Near-Duplicates. 1-5 - Majed Bouchahma, Sana Ben Hammouda, Samia Kouki, Mouza Alshemaili, Khalid Samara:
An Automatic Dental Decay Treatment Prediction using a Deep Convolutional Neural Network on X-Ray Images. 1-4 - Muntaha Al-Asa'd, Nour Al-Khdour, Mutaz Bni Younes, Enas Khwaileh, Mahmoud Hammad, Mohammad Al-Smadi:
Question to Question Similarity Analysis using Morphological, Syntactic, Semantic, and Lexical Features. 1-6 - Nour El Houda Boulkrinat, Nadjia Benblidia, Abdelkrim Meziane:
Queries-Based Profile Evolution using Genetic Algorithm. 1-6 - Amina Benkessirat, Nadjia Benblidia:
Fundamentals of Feature Selection: An Overview and Comparison. 1-6 - Ahlam Alrehili:
Automatic Hate Speech Detection on Social Media: A Brief Survey. 1-6 - Povilas Gudzius, Olga Kurasova, Ernestas Filatovas:
Optimal U-Net Architecture for Object Recognition Problems in Multispectral Satellite Imagery. 1-2 - Ahmad Al-Doulat, Islam Obaidat, Minwoo Lee:
Unstructured Medical Text Classification using Linguistic Analysis: A Supervised Deep Learning Approach. 1-7 - Fakhri Abbas, Xi Niu:
Computational Serendipitous Recommender System Frameworks: A Literature Survey. 1-8 - Siham Boulaknadel, Yassine Tazouti, Youssef Fakhri:
Towards a Serious Game for Amazigh Language Learning. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.