default search action
ACIT 2018: Werdanye, Lebanon
- International Arab Conference on Information Technology, ACIT 2018, Werdanye, Lebanon, November 28-30, 2018. IEEE 2018, ISBN 978-1-7281-0385-3
- Kassem Ahmad, Omar Mohammad, Mirna Atieh, Hussein Ramadan:
IoT: Architecture, Challenges, and Solutions Using Fog Network and Application Classification. 1-7 - Abdallah Qusef, Majid Hassan:
Power of Using Regular Expression Patterns in Software Coding Standards Quality Control. 1-7 - Nour Eldin Mohamed Elshaiekh, Yasir Ali Ahmed Hassan, Amna Abdelrouf Alhassan Abdallah:
The Impacts of Remote Working on Workers Performance. 1-5 - Anas Al-Far, Abdallah Qusef, Sufyan Almajali:
Measuring Impact Score on Confidentiality, Integrity, and Availability Using Code Metrics. 1-9 - Mohamad Mourad, Ahmad Diab, Mohamad Khalil, Catherine Marque:
Pregnancy/Labor Discrimination and Monitoring: An Investigation Using Nonlinear Methods. 1-4 - Osama M. Dorgham, Mohammad Abu Nasser, Mohammad Hashem Ryalat, Ammar Almomani:
Proposed Method for Automatic Segmentation of Medical Images. 1-5 - Yassine Dabachine, Belaid Bouikhalene, Abdessamad Balouki:
Bidirectional Search Algorithm for Airport Ground Movement. 1-9 - Ali Abdallah:
Real-Time Heterogeneous Volume Modelling and Rendering Environment. 1-7 - Ahmad Koubeissi:
A Multi-Level Data-Centric Model of System of Systems Engineering. 1-8 - Nevrus Kaja, Adnan Shaout:
CCTM - Cloud Computing Trust Model. 1-6 - Kamel Allaw, Layla Al-Shami:
Geographic Information System-Based Map for Agricultural Management in South-Lebanon. 1-11 - Mariam Khader, Arafat Awajan, Ghazi Al-Naymat:
The Effects of Natural Language Processing on Big Data Analysis: Sentiment Analysis Case Study. 1-7 - Sara Chelbi, Nora Taleb:
Performance Measurement Systems-Related Ontologies. 1-5 - Ramzi A. Jaber, Ahmad Elhajj, Lina A. Nimri, Ali Haidar:
A Novel Implementation of Ternary Decoder Using CMOS DPL Binary Gates. 1-3 - Maram Assi, Ramzi A. Haraty:
A Survey of the Knapsack Problem. 1-6 - Suhair AlHajHassan, Mohammed Odeh, Stewart Green, Asem Mansour:
A Semantically Enriched Goal-Oriented Referential Integrity Model in Systems of Systems Context. 1-10 - Zeinab Abbas, Chadi Fakih, Ali Saad, Mohammad Ayache:
Vaginal Power Doppler Parameters as New Predictors of Intra-Cytoplasmic Sperm Injection Outcome. 1-7 - Fadlallah Chbib, Ayman Khalil, Walid Fahs, Reda Chbib, Ali Raad:
Improvement of OLSR Protocol by Using Bacis Up MPR and Routing Table Mechanisms. 1-6 - Alain Aoun, Abdallah Kassem, Mustapha Hamad:
Sun Stimulator for Daylight System. 1-4 - Ruba Mohammad Haj Hamad, Mustafa Al-Fayoumi:
Modernization of a Classical Data Center (CDC) vs. Adoption in Cloud Computing Calculate Total Cost of Ownership for Both Cloud and CDC - Jordanian Case Study. 1-8 - Dima Suleiman, Arafat Awajan:
Comparative Study of Word Embeddings Models and Their Usage in Arabic Language Applications. 1-7 - Nadia Minkara, Nafez Haddad, Walid Kamali:
Study of Myocardial Infarction Versus ECG ST Segment and Cardiac Marker Enzyme, High Sensitive Troponin Testing. 1-5 - Samar Sindian, Abed Ellatif Samhat, Matthieu Crussière, Jean-François Hélard, Ayman Khalil:
Optimization Framework for Resource Allocation in IEEE 802.15.5 Hop-1. 1-6 - Eman Qaddoumi, Mohammed Odeh, Zaheer Abbas Khan, Mario Kossmann:
OntoSoS.QR: Semantic Representation of Quality Requirements Metamodel for Systems of Systems. 1-7 - Mahmood Ahmad, Mohammed Odeh, Stewart Green:
Metrics for Assessing the Basic Alignment Between Business Process and Enterprise Information Architectures with Reference to the BPAOntoEIA Framework. 1-5 - Marwah Alian, Arafat Awajan:
Arabic Semantic Similarity Approaches - Review. 1-6 - Khaled Saleh Maabreh:
Optimizing Database Query Performance Using Table Partitioning Techniques. 1-4 - Adnan Shaout, Brennan Crispin:
Cloud Based System for Detecting Children in Automobiles. 1-6 - Alaa Abd-Raheem, Farah AlDeiri, Musa Alyaman:
Design of an Automated 3D Scanner. 1-5 - Wael Al Etaiwi, Arafat Awajan:
Learning Graph Representation: A Comparative Study. 1-6 - Zaylaa Amer, Ahmad Diab, Mohamad Khalil, Catherine Marque:
Automatic Segmentation of Contractions and Other Events in Monopolar EHGs-Monodimensional Study. 1-4 - Souha El Katat, Ali Kalakech, Mariam Kalakech, Denis Hamad:
A Comparative Study Between Lebanon and Middle East Countries Based on Data Mining Techniques. 1-5 - Redouane Tlemsani, Khadidja Belbachir:
An Improved Arabic On-Line Characters Recognition System. 1-10 - Hassan Zahr, Hussein Al Haj Hassan, Jamal Haydar:
Web-Based Framework for Assisting Users Using Speech Recognition. 1-6 - Alaa Mustafa El-Halees, Doaa Salah:
Feature-Based Opinion Summarization for Arabic Reviews. 1-5 - Ali Haroun, Ahmed R. Rashid, Jamal Haydar:
Implementation of a Belief Propagation Detector for an Iterative MIMO Receiver. 1-6 - Raffi Al-Qurran, Mahmoud Al-Ayyoub, Ali M. Shatnawi:
Plant Classification in the Wild: A Transfer Learning Approach. 1-5 - Deena Al-Ashwal, Eman Zaid Al-Sewari, Asma Abdulghani Al-Shargabi:
A CASE Tool for JAVA Programs Logical Errors Detection: Static and Dynamic Testing. 1-6 - Ali J. Ghandour, Houssam A. Krayem, Abedelkarim A. Jezzini:
Autonomous Vehicle Detection and Classification in High Resolution Satellite Imagery. 1-5 - Manel Kolli:
A Kripke Structure for the Ontology Alignment. 1-6 - Jamal Haydar, Ahmad NourAldeen, Hadi Fayad, Walid Fahs, Hussein Al Haj Hassan:
A Low Cost Automated Cleaning System for Photovoltaic Panels. 1-3 - Mohammad Omar Sabri, Mohammed Odeh, Mohammed Saad:
Linking Knowledge Management Enablers to Business Process Architecture: A Semantic-Driven Approach. 1-6 - Dima El Zein, Ali Kalakech:
Feature Selection for Android Keystroke Dynamics. 1-6 - Oussama Zahwe, Ola Majed, Hassan Harb, Mohamad Hamze, Abbass Nasser:
A Fast Clustering Algorithm for Analyzing Big Data Generated in Ubiquitous Sensor Networks. 1-6 - Ruba Mohammad Haj Hamad, Mustafa Al-Fayoumi:
Scalable Agile Transformation Process (SATP) to Convert Waterfall Project Management Office into Agile Project Management Office. 1-8 - Kamal Alieyan, Mohammed Anbar, Ammar Almomani, Rosni Abdullah, Mohammad Alauthman:
Botnets Detecting Attack Based on DNS Features. 1-4 - Jafar Abo Nada, Mohammad Rasmi Al-Mosa:
A Proposed Wireless Intrusion Detection Prevention and Attack System. 1-5 - Ahmad Drak, Alexander Asteroth:
Towards Finding an Optimal Flight Zone for a Side-by-Side Tracking UAV w.r.t Extraction of Dynamic Vector Fields. 1-7 - Oussama Zahwe, Walaa Nasser, Hassan Harb:
Analytical, Numerical and Experimental Study of an Original Design for a Coplanar Circulator/Isolator Based on Thick and Thin Ferrite Film. 1-8 - Leila Ouahrani, Djamel Bennouar:
A Vector Space Based Approach for Short Answer Grading System. 1-9 - Rania Maalej, Monji Kherallah:
Convolutional Neural Network and BLSTM for Offline Arabic Handwriting Recognition. 1-6 - Ali Haroun, Rawad Nasr, Ali Chamas Al Ghouwayel:
On the Implementation of Vertical Shuffle Scheduling Decoder for Joint MIMO Detection and Channel Decoding System. 1-4 - Miriana Itani, Ali Haroun, Walid Fahs:
Obstacle Avoidance for Ultrasonic Unmanned Aerial Vehicle Monitoring Using Android Application. 1-4 - Adnan Shaout, Dhanush Mysuru, Karthik Raghupathy:
CAN Sniffing for Vehicle Condition, Driver Behavior Analysis and Data Logging. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.