default search action
20th AICCSA 2023: Giza, Egypt
- 20th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2023, Giza, Egypt, December 4-7, 2023. IEEE 2023, ISBN 979-8-3503-1943-9
- Michael Lescisin, Qusay H. Mahmoud:
Design and Development of Policy Enforcement for the Privacy by Design Framework. 1-6 - Sarra Abidi, Samir Toumi, Mehrez Essafi, Chirine Ghedira Guégan, Henda Hajjami Ben Ghézala:
Using a Correlation Equation to ensure Stability between Personalization and Security in Composing Web Services. 1-6 - Kadhim Hayawi, Sakib Shahriar, Hany Alashwal:
Leveraging Nucleotide Dependencies for Improved mRNA Vaccine Degradation Prediction. 1-6 - Mohamed S. Abdalzaher, Moez Krichen, Sayed S. R. Moustafa, Mohannad A. Alswailim:
Using Machine Learning for Earthquakes and Quarry Blasts Discrimination. 1-6 - Nada Farhani, Naim Terbeh, Mounir Zrigui:
An overview of the Image Description Systems in Arabic Language. 1-8 - Amar Abane, Abdella Battou, Abderrahim Amlou, Tao Zhang:
A Data Collection Platform for Network Management. 1-7 - Heba Helal, Mohamed A. Sharaf:
Strategies for Optimizing Time Series Visual Data Exploration. 1-4 - Imen Ben Ahmed, Farah Barika Ktata, Khalil Ben Kalboussi:
DLA-ABIDS:Deep Learning Approach for Anomaly Based Intrusion Detection System. 1-8 - Yusra Rachidi, Ilyass Abouelaziz:
Graph-based indoor navigation system using BIM data and optimization algorithms. 1-8 - Wafaa Radi, Hesham M. El-Badawy, Ahmed Mudassir, Hesham Kamel:
Traffic Accident Management System for Intelligent and Sustainable Vehicle Networking. 1-7 - Fatma Abdelhédi, Hela Rajhi, Gilles Zurfluh:
Conceptual modeling of a document-oriented NoSQL database. 1-8 - Amani Khalifa, Fatma BenSaid, Yessine Hadj Kacem, Zouhaier Jridi:
At-Risk Students Identification based on Machine Learning Approach: A Case Study of Computer Science Bachelor Student in Tunisia. 1-8 - Abderrahim Amlou, Amar Abane, Mheni Merzouki, Lydia Ait-Oucheggou, Zineb Maasaoui, Abdella Battou:
Automated Network Programmability Using OpenConfig YANG Models and NETCONF Protocol. 1-5 - Hamza Bouzid, Lahoucine Ballihi:
3D Facial Expression Recognition Using Spiral Convolutions and Transformers. 1-7 - Ahmed Missaoui, Cemalettin Ozturk, Barry O'Sullivan:
Iterated Greedy Algorithms for Combinatorial Optimization: A Systematic Literature Review. 1-7 - Theodore Ha, Sicong Shao, Salim Hariri:
An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion Detection. 1-8 - Felipe Borges Coelho, Smith W. Arauco Canchumuni, Marco Aurélio Cavalcanti Pacheco:
Assessing fuel tax revenues - Study on impact of reducing fuel taxes using artificial intelligence. 1-8 - Sonda Rekik, Maryam Elamine, Lamia Hadrich Belguith:
A Medical Chatbot for Tunisian Dialect using a Rule-Based and Machine Learning Approach. 1-7 - Mustafa Jarrar, Fadi A. Zaraket, Tymaa Hammouda, Daanish Masood Alavi, Martin Wählisch:
Lisan: Yemeni, Iraqi, Libyan, and Sudanese Arabic Dialect Corpora with Morphological Annotations. 1-7 - Islam Sadat, Samir Kechid:
Multiple Emotional Profile Representation for Personalized Information Retrieval Systems. 1-4 - Heba Helal, Mohamed A. Sharaf, Mohammad M. Masud, Panos K. Chrysanthis:
TiVEx: Optimized Processing for Time Series Visual Exploration. 1-8 - Maamar Hamadouche, Khalil Zebbiche, Youcef Zafoune:
Securing Biometric Systems by using Perceptual Hashing Techniques. 1-4 - Nihad Fottouh, Sherin M. Moussa:
Zero-trust management using AI: Untrusting the trusted accounts in social media. 1-7 - Jesús Bobadilla, Abraham Gutiérrez:
Generating and Testing Synthetic Datasets for Recommender Systems to Improve Fairness in Collaborative Filtering Research. 1-6 - Mohannad A. Alswailim:
Security and Privacy Challenges of Participatory Sensing in Natural Disaster Management. 1-6 - Heidi Ahmed Holiel, Nancy Mohamed, Arwa Ahmed, Walaa Medhat:
English-Arabic Text Translation and Abstractive Summarization Using Transformers. 1-8 - Nagham Hamad, Mustafa Jarrar, Mohammad Khalilia, Nadim Nashif:
Offensive Hebrew Corpus and Detection using BERT. 1-8 - João Victor Souza das Chagas, Gleber T. Texeira, Adriel S. Araújo, André Gonçalves, Fernanda G. O. Passos, Aura Conci:
A computer vision approach to calculate diameter, volume, velocity and flow rate of bubble leaks in offshore wells. 1-8 - Abdelhamid Gaddari, Haytham Elghazel, Rakia Jaziri, Mohand-Said Hacid, Pierre-Henri Comble:
A New Time-Aware LSTM based Framework for Multi-label Classification on Healthcare Data. 1-8 - Serine Guellab, Imane Benkhelifa:
Enhancing Parking Online Reservation with a Recommendation System based on User Preferences: A hybrid Approach. 1-6 - Balqees Aldabaybah, Tawfiq Alrawashdeh, Talal Ashraf Bull, Khaled Almiani:
Fair-Share Methods for Scheduling Scientific Workflows in Cloud. 1-8 - Saad Aldoihi, Khalid Alblalaihid, Fozah Alzemaia, Alia Almoajel, Omar Hammami, Shatha Alwablely:
A System Approach to Detect Medical Errors in Operational Data in Hospitals. 1-5 - Zakaria Boulouard, Mariya Ouaissa, Mariyam Ouaissa, Moez Krichen, Mutiq Almutiq, Mohammad Algarni:
Streamlining River Flood Prevention with an Integrated AIoT Framework. 1-6 - Maira B. H. Moran, Larissa Aparecida Vaz Oliveira, Marcelo Daniel Brito Faria, Luciana Freitas Bastos, Gilson A. Giraldi, Clarissa Canella, Aura Conci:
Segmentation of skin layers in ultrasound images using a crowdsourcing and deep learning-based system. 1-8 - Mariam Jaber, Abdallah Karakra, Ruba Awadallah, Hafez Barghouthi, Adel Taweel:
Adapting the Software Development Life Cycle for Digital Twin Development in Healthcare. 1-6 - Nesrine Hassini, Khaoula Mahmoudi, Sami Faïz:
A Hybrid Approach for Spatial Information Extraction from Natural Language Text. 1-8 - Ghofrane Fersi, Robert Fromm, Maximilian Weber, Faouzi Derbel:
Wake-Up Receiver Based Routing Protocols in Internet of Things: A Survey. 1-8 - Mohamed Nadjib Kouahla, Adil Boughida, Akram Boughazi:
A data analysis and processing approach for a POI recommendation system. 1-6 - Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed:
Ensemble Learning Approach for Intrusion Detection Systems in Industrial Internet of Things. 1-7 - Mohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois:
Lightweight Feature-based Priority Sampling for Industrial IoT Multivariate Time Series. 1-8 - Dinesh Goyal, Aditya Sharma, Kamal Deep Garg, Bhisham Sharma, Imed Ben Dhaou:
The Internet of Things (IoT) Contribution to Natural Disaster Management: Review. 1-7 - Ibrahim Traoré, Imen Megdiche, Jérôme Marquet-Doléac, Lotfi Chaâri:
A machine learning technique for device non-wear detection in children with ADHD. 1-6 - Nada Benabdessalam, Sabra Mabrouk, Faouzi Ghorbel:
BERTImages for Diabetic Retinopathy Classification. 1-7 - Nadia Boufares, Yosra Ben Saied, Leïla Azouz Saïdane:
EcoSnow: Advancing Green Energy Monitoring with distributed three dimensional Mobile Wireless Sensors Networks. 1-7 - Abdulbast A. Abushgra, Hisham A. Kholidy, Abdelkader Berrouachedi, Rakia Jaziri:
Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G Networks. 1-7 - Said Si Kaddour, Larbi Boubchir, Boubaker Daachi:
Deep Face Recognition based on an Optimized Deep Neural Network using ZFNet. 1-5 - Likai Yao, Sicong Shao, Salim Hariri:
Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control Systems. 1-8 - Moez Krichen:
Efficient Approaches for Safeguarding Sensitive Data during Natural Disasters. 1-6 - Preet Patel, Tiwaloluwa Ojo, Faraaz Mohsin, Janajan Jeyabalan, Waleed El Alawi, George Daoud, Mohamed El-Darieby:
A BigData/Machine Learning system for Monitoring Road Surface Condition. 1-8 - Abdellah Tahenni, Fatiha Merazka, Fatma Zahra Hab:
Quantum Computing for DNA Analysis and AI in Genomics. 1-6 - Houari Mahfoud:
Diversified Top-k Answering of Cypher Queries over Large Data Graphs. 1-8 - Saurabh Singhal, Ashish Sharma, Mahendra Kumar Gourisaria, Bhisham Sharma, Imed Ben Dhaou:
A Disaster Management System Using Cloud Computing. 1-6 - Amira Mouakher, Sylvain Chatry, Samira El Yacoubi:
A Multi-criteria Evaluation Framework For Facial Expression Recognition Models. 1-8 - Amal Alshehri, Cihan Tunc:
Zero Trust Engine for IoT Environments. 1-3 - Nada Matta, Marie-Hélène Abel, Hedi Karray:
Why Ethics is important to consider in AI ? 1-5 - Gnana Shilpa Nuthalapati, Arunita Jaekel:
Improving Channel Utilization in VANETs Using Q-Learning-Based Data Rate Congestion Control. 1-7 - Islam Tharwat Abdel-Halim, Hossam M. A. Fahmy:
Research Trends, Challenges, and Future Directions in Vehicular Networks. 1-7 - Amal Talbi, Mehrez Abdellaoui:
Video saliency detection based on color-contrast, motion and texture distinctiveness model. 1-8 - Abdelkrim Sahnoune, Djamila Dahmani, Saliha Aouat:
A Novel Rule-Based Skin Detection Method using Principal Component Analysis-Based Dimensionality Reduction and Individual Contribution on Principal Components. 1-6 - Rowayda A. Sadek, Alaa A. Khalifa:
Vision Transformer based Intelligent Parking System for Smart Cities. 1-6 - Hisham A. Kholidy, Abdelkader Berrouachedi, Elhadj Benkhelifa, Rakia Jaziri:
Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack Classification. 1-8 - Omar Wasfy, Sohier Basiony, Marwan Torki:
Enhancing LiDAR Semantic Segmentation Using Model Soups. 1-7 - Emna Ayari, Sonia Nasri, Wassila Aggoune-Mtalaa, Hend Bouziri:
Learning routes within an intelligent on demand transport service. 1-7 - Lamia Berkani, Ilyes Djerfaf, Mouaadh Hamed Abdelouahab:
Sentiment based hybrid deep learning for recommender models. 1-8 - Alibek Jakupov, Besma Zeddini, Julien Longhi, Julien Mercadal:
Combining Stylometric and Sentiment Mining Approaches for Deceptive Opinion Spam Detection. 1-8 - Evrosina A. Amir, Shahinaz M. Al-Tabbakh, Samiha T. Beshay, Ibrahim Gomaa:
Performance Evaluation of VANET Statistical Broadcast Protocols for Smart Cities. 1-8 - Sylia Amarouche, Said Talbi, Mehammed Daoui, Jean-François Couchot:
2D-ZasHen Chaotic Map-Based Medical Image Cryptographic Approach in IoT-Based Healthcare Monitoring. 1-8 - Bamory Ahmed Toru Koné, Rima Grati, Bassem Bouaziz, Khouloud Boukadi:
Computerized Irrigation Scheduling. 1-8 - Yang Fu, Marisol García-Valls:
Security aspects of full-duplex web interactions and WebSockets. 1-8 - Olfa Ferchichi, Raoudha Beltaifa, Lamia Labed Jilani:
Artificial Intelligence Based SysML Block Diagram Extension and Evolution for Product Lines. 1-8 - Bilel Elayeb, Amina Chouigui, Myriam Bounhas:
Analogical Text Mining: Application to Arabic Text Summarization and Classification. 1-8 - Haythem Bany Salameh, Ayyoub Hussienat, Ahmad Al Ajlouni, Mohannad Alhafnawi:
Behavior-driven Indoor Multi-Target UAV-based Detection System: Intelligent RL-based Approach. 1-6 - Ghassen Frikha, Xavier Lorca, Hervé Pingaud, Christophe Bortolaso, Katarzyna Borgiel, Elyes Lamine:
Developing a Recommender System for Frailty Prevention: Addressing Challenges of Data Collection and User Interface Design. 1-6 - Fabien Poirier, Rakia Jaziri, Camille Srour, Gilles Bernard:
Enhancing Anomaly Detection in Videos using a Combined YOLO and a VGG GRU Approach. 1-6 - Hisham A. Kholidy, Keven Disen, Andrew Karam, Elhadj Benkhelifa, Mohammad Ashiqur Rahman, Atta-ur-Rahman, Ibrahim Almazyad, Ahmed F. Sayed, Rakia Jaziri:
Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures. 1-8 - Hanae Touati, Rafika Thabet, Franck Fontanili, Marie-Hélène Cleostrate, Marie-Noëlle Cufi, Elyes Lamine:
Towards a novel Data Mining System for Medication Error Management. 1-6 - Mariem Ben Hassine, Imen Tounsi, Mohamed Hadj Kacem:
Developing IoT-based Smart Health Monitoring Systems using Design Patterns. 1-8 - Moez Krichen, Mohammed Yahya Alzahrani:
Formal Methods for Enhanced Natural Disaster Management. 1-6 - Ibrahim Almazyad, Sicong Shao, Salim Hariri, Hisham A. Kholidy:
Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and Evaluation. 1-7 - Sara AbdElhakem, Sohier Basiony, Marwan Torki:
ConvMixer-UNet: A Lightweight Network for Breast Lesion Segmentation in Ultrasound Images. 1-5 - Sumayya Al-Fadhli, Hajar Al-Harbi, Asma Cherif:
Towards an End-to-End Speech Recognition Model for Accurate Quranic Recitation. 1-4 - H. Umut Suluhan, Serhan Gener, Alexander Fusco, H. Fatih Ugurdag, Ali Akoglu:
PyTorch and CEDR: Enabling Deployment of Machine Learning Models on Heterogeneous Computing Systems. 1-8 - Adda Boualem, Abdelkader Berrouachedi, Marwane Ayaida, Hisham A. Kholidy, Elhadj Benkhelifa:
A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G Networks. 1-8 - Ibrahim Traoré, Imen Megdiche, Jérôme Marquet-Doléac, Lotfi Chaâri:
A Cross-Validation Approach for Classifying Physical Activity Intensity : A Case Study in Children with Attention Deficit/Hyperactivity Disorder. 1-8 - Wafaa Radi, Hesham M. El-Badawy:
Enhanced Implementation of Intelligent Transportation Systems (ITS) based on Machine Learning Approaches. 1-7 - Samia Oukemeni, Muslim Elkotob:
Adaptative Access Management in 5G IoE using Device Fingerprinting: Discourse, Mechanisms, Challenges, and Opportunities. 1-7 - Khloud Khaled, Tasneem Wael, Salma Khaled, Walaa Medhat:
Arabic Dialect Identification: Experimenting Pre-trained Models and Tools on Country-level Datasets. 1-7 - Juba Agoun, Juba Terras, Mohand-Saïd Hacid, Salim Hariri:
Empowering Data Federation Security in Polystore Systems. 1-8 - Murad Mehrab Abrar, Salim Hariri:
An Anomaly Behavior Analysis Framework for Securing Autonomous Vehicle Perception. 1-6 - Munir Majdalawieh, Haleama Al-Sabbah, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Elhadj Benkhelifa:
Semantic Knowledge Graphs for Scalable Knowledge Discovery and Acquisition in Public Health. 1-6 - Simon Hensel, Benjamin Jagusch, Thomas Lux:
Introduction of Artificial Intelligence in Healthcare Lectures: An Evaluation. 1-5 - Maykol J. Campos Trinidad, Smith W. Arauco Canchumuni, Marco Aurélio Cavalcanti Pacheco:
Seismic Fault Segmentation Using Unsupervised Domain Adaptation. 1-8 - Abdelrahman Sakr, Marwan Torki:
AraPunc: Arabic Punctuation Restoration Using Transformers. 1-6 - Seemaparvez Shaik, Cihan Tunc, Kirill Morozov:
Intrusion Detection for Additive Manufacturing Systems and Networks. 1-3 - Ibrahima Barry, Meriem Hafsi:
Towards Hybrid Predictive Maintenance for Aircraft Engine: Embracing an Ontological-Data Approach. 1-6 - Manel Chnini, Nissaf Fredj, Fatma BenSaid, Yessine Hadj Kacem:
Violent Speech Detection in Educational Environments. 1-8 - Munir Majdalawieh:
Building Trust in Supply Chains: The Blockchain-QR Code Advantage. 1-7 - Vartika Bhadana, Pooja Pathak, Anand Singh Jalal, Ashish Sharma, Bhisham Sharma, Imed Ben Dhaou:
An Ensemble-based Neural Network Model for Natural Disaster in 2019. 1-7 - Guilhem Piat, Nasredine Semmar, Julien Tourille, Alexandre Allauzen, Hassane Essafi:
What does KnowBert-UMLS forget? 1-8 - Abdelmalek Berkani, Adrian Holzer:
Clustering analysis of metered Arabic poetry compositions. 1-8 - Ibtissem Brahmi, Emna Hajlaoui, Souhir Elleuch, Monia Hamdi, Faouzi Zarai:
New Polar code for 5G New Radio Network. 1-5 - Fatma Abdelhédi, Rym Jemmali, Gilles Zurfluh:
Medical data lake query assistance. 1-8 - Mohammad Algarni:
Deploying Artificial Intelligence for Optimized Flood Forecasting and Mitigation. 1-6 - Linda Bouallegue, Rafika Thabet, Chabane Mazri, Adrien Défossez, Marie-Hélène Cleostrate, Elyes Lamine:
Effective Tool for Reporting and Analyzing Medication Errors. 1-6 - Adriel S. Araújo, Milena H. S. Issa, João Victor Souza das Chagas, Ángel Sánchez, Débora C. Muchaluat-Saade, Aura Conci:
A Thermographic Time Series Approach for Evaluating the Breast Cancer Treatment. 1-8 - Soura Boulaares, Salma Sassi, Richard Chbeir, Djamal Bensilmane, Sami Faïz:
Uncertainty-Aware Web of Things Composition: A Probabilistic Approach. 1-8 - Xuelei Zheng, Mei Yu, Gangyi Jiang:
Quality Evaluation of Tone Mapping HDR Omnidirectional Image with Multi-regions and Multi-levels. 1-7 - Achir Oukelmoun, Nasredine Semmar, Gaël de Chalendar, Enguerrand Habran, Eric Vibert, Emma Goblet, Mariame Oukelmoun, Marc-Antoine Allard:
A Study on the Relevance of Generic Word Embeddings for Sentence Classification in Hepatic Surgery. 1-8 - Mourad A. Kenk, Mona Elsaidy, M. Hassaballah, Mahmoud B. A. Mansour:
Driving Perception in Challenging Road Scenarios: An Empirical Study. 1-6 - M. Sangeetha, R. Manjula Devi, Bhisham Sharma, Subrata Chowdhury, Imed Ben Dhaou:
MAM: Multimodel Attention Mechanism for Social Media Natural Disaster Management Tweet Classification. 1-6 - Moez Krichen, Mohamed S. Abdalzaher:
Advances in AI and Drone-based Natural Disaster Management: A Survey. 1-6 - Ahmed Tamer, Al-Amir Hassan, Asmaa Ali, Nada Salah, Walaa Medhat:
Fine Tuning of large language Models for Arabic Language. 1-4 - Zineb Maasaoui, Mheni Merzouki, Anis Bekri, Amar Abane, Abdella Battou, Ahmed Lbath:
Design and Implementation of an Automated Network Traffic Analysis System using Elastic Stack. 1-6 - Dimitrios P. Panagoulias, Filippos A. Palamidas, Maria Virvou, George A. Tsihrintzis:
Evaluation of ChatGPT-supported diagnosis, staging and treatment planning for the case of lung cancer. 1-8 - André Manuel Macedo, João Paulo Magalhães:
Detection of Network Intrusions Using Anomaly Detection. 1-6 - Rahma Djiroun, Lilia Yasmine Lachachi, Noufel Fares Eddine Azzouni, Meriem Amel Guessoum, Kamel Boukhalfa, Elhadj Benkhelifa:
Search Approach for External Data Sources for Data Warehouse Enrichment in Business Intelligence Context. 1-8 - Souheir Merkouche, Chafia Bouanaka, Elhadj Benkhelifa:
A Petri Net-based Formal Modeling for Microservices Auto-scaling. 1-8 - Genoveva Vargas-Solar, Chirine Ghedira Guégan, Javier A. Espinosa-Oviedo, José-Luis Zechinelli-Martini:
Embracing Diversity and Inclusion: A Decolonial Approach to Urban Computing. 1-6 - Marco De Vincenzi, Chiara Bodei, Ilaria Matteucci:
Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions. 1-9 - Helen D. Karatza:
A Hybrid Epoch Scheduling Scheme of Mixed Workloads with Different Types of Jobs on Distributed Processors. 1-7 - Nourelhouda Hammouda, Mariem Mahfoudh, Khouloud Boukadi:
MoonCAB : a Modular Ontology for Computational analysis of Animal Behavior. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.