


Остановите войну!
for scientists:


default search action
15th AICCSA 2018: Aqaba, Jordan
- 15th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2018, Aqaba, Jordan, October 28 - Nov. 1, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9120-5
- Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai:
Distributed Firewall and Controller for Mobile Cloud Computing. 1-9 - Rim Laatar, Chafik Aloulou, Lamia Hadrich Belguith
:
Word Sense Disambiguation using Skip Gram Model to Create a Historical Dictionary for Arabic. 1-5 - Samer Chehade, Nada Matta, Jean-Baptiste Pothin, Rémi Cogranne
:
Data Interpretation Support in Rescue Operations: Application for French Firefighters. 1-6 - Sicong Shao
, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
Autonomic Author Identification in Internet Relay Chat (IRC). 1-8 - Wided Selmi, Hager Kammoun, Ikram Amous
:
MeSH-Based Semantic Query Expansion. 1-8 - Shehzad Muhammad Hanif
, Muhammad Bilal, Khalid Munawar
, Abdullah Saeed Balamash
:
Implementation of an Embedded Testbed for Indoor SLAM. 1-8 - Hana' Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad A. Alsmirat, Monther Aldwairi:
A Deep Learning Approach for Amazon EC2 Spot Price Prediction. 1-5 - Mohamed Hamroun
, Sonia Lajmi
, Henri Nicolas, Ikram Amous
:
An Interactive Video Browsing With VINAS System. 1-8 - Abdul Razaque
, Yuxin Li, Qianqian Liu, Meer Jaro Khan, Ahmad Doulat, Muder Almiani
, Ahmad Alflahat:
Enhanced Risk Minimization Framework for Cloud Computing Environment. 1-7 - Wided Ben Daoud, Amel Meddeb-Makhlouf
, Faouzi Zarai:
A Trust-based Access Control Scheme for e-Health Cloud. 1-7 - Ahlem Masmoudi, Souhir Feki, Kais Mnif
, Faouzi Zarai:
Efficient Radio Resource Management for D2D-based LTE-V2X communications. 1-6 - Bassma Jioudi
, Wafaa Dachry, Fouad Moutaouakkil
, Hicham Medromi:
Literature Review of WSN MAC Protocols in Smart Parking. 1-6 - Sana Rekik, Nouha Baccour
, Mohamed Jmaiel, Khalil Drira:
Experiencing Low Power Wireless Links in Distribution Smart Grid Environments. 1-8 - Hussein El Ghor, Maryline Chetto
, Rola El Osta:
Multiprocessor Real-Time Scheduling for Wireless Sensors Powered by Renewable Energy Sources. 1-6 - Ibtissem Brahmi, Fadoua Mhiri, Faouzi Zarai:
Power Control Method Based on Users and Applications QoS Priorities(UAQP) in Femtocell Network. 1-5 - Yasmine Serdouk, Hassiba Nemmour
, Youcef Chibani
:
New Histogram-based Descriptor for Off-Line Handwritten Signature Verification. 1-5 - Nouha Khyari, Sofiane Khalfallah, Yosra Barouni, Jaleleddine Ben Hadj Slama
:
Comparative Performance Analysis of Cooperative Outdoor PLC. 1-5 - Yousef S. Khader
, Hussein M. Jabareen, Sukaina A. Alzyoud, Samah Awad, Niveen Abu Rumeileh, Nemeh Manasrah, Rula Mudallal, Adel Taweel:
Perception and Acceptance of Health Informatics Learning among Health-Related Students in Jordan and Palestine. 1-6 - Abdallah Karakra
, Franck Fontanili
, Elyes Lamine
, Jacques Lamothe, Adel Taweel:
Pervasive Computing Integrated Discrete Event Simulation for a Hospital Digital Twin. 1-6 - Abdulrahman Abu Elkhail, Uthman Baroudi
:
Real-Time Healthcare Monitoring System using Smartphones. 1-6 - Raja Ayed, Amina Chouigui, Bilel Elayeb
:
A New Morphological Annotation Tool for Arabic Texts. 1-6 - Qanita Bani Baker
, Toqa' Abu Zaitoun, Sajda Banat, Eman Eaydat, Mohammad A. Alsmirat:
Automated Detection of Benign and Malignant in Breast Histopathology Images. 1-5 - Mariame Nassit
, Hassan Berbia
:
Structures Simulation of Curved Sensor based on PVDF for Fetal Heart Rate Monitoring. 1-6 - Lubaba Tamiza, Ghassan Shahin, Radwan Tahboub:
Intelligent Model for Suitable University Specialization Selection in Palestine. 1-8 - Amel Borgi, Rim Kalaï, Hayfa Zgaya:
Attributes Regrouping in Fuzzy Rule Based Classification Systems: An Intra-Classes Approach. 1-7 - Agnieszka M. Zbrzezny
, Andrzej Zbrzezny
:
SAT-Based BMC Approach to Verifying Real-Time Properties of Multi-Agent Systems. 1-8 - Samar Al-Saqqa
, Nadim Obeid
, Arafat Awajan:
Sentiment Analysis for Arabic Text using Ensemble Learning. 1-7 - Yingshen Zhao, Philippe Fillatreau, Mohamed-Hedi Karray, Bernard Archimède:
An Ontology-Based Approach Towards Coupling Task and Path Planning for the Simulation of Manipulation Tasks. 1-8 - Mustafa Daraghmeh
, Suhib Bani Melhem
, Anjali Agarwal, Nishith Goel, Marzia Zaman:
Regression-Based Dynamic Provisioning and Monitoring for Responsive Resources in Cloud Infrastructure Networks. 1-7 - Olivier Franza, Farah Fargo:
Autonomic Secure HPC Architecture Against Power Attacks. 1-4 - Jesus Pacheco
, Cihan Tunc
, Salim Hariri:
Security Framework for IoT Cloud Services. 1-6 - Pratik Satam
, Shalaka Satam, Salim Hariri:
Bluetooth Intrusion Detection System (BIDS). 1-7 - Mohamed Nassar
, Qutaibah M. Malluhi, Tanveer Khan:
A Scheme for Three-way Secure and Verifiable E-Voting. 1-6 - Jamila Oukharijane
, Fadwa Yahya
, Khouloud Boukadi
, Hanêne Ben-Abdallah
:
Towards an Approach for the Evaluation of the Quality of Business Process Models. 1-8 - Majed A. Alenizi, Hussein Y. Abu Mansour:
A New Intelligent Hybrid Feature Selection Method. 1-6 - Ebaa Fayyoumi
, Omar Nofal:
Applying Genetic Algorithms on Multi-level Micro-Aggregation Techniques for Secure Statistical Databases. 1-6 - Imane Haidar, Ali Massoud Haidar, Ramzi A. Haraty
:
Axes-Based Encryption Key. 1-8 - Abdelhak Belhi
, Abdelaziz Bouras, Sebti Foufou:
Towards a Hierarchical Multitask Classification Framework for Cultural Heritage. 1-7 - Maha Fraj
, Mohamed Aymen Ben HajKacem
, Nadia Essoussi:
A Novel Tweets Clustering Method using Word Embeddings. 1-7 - Hussein Mhanna, Patrick Leserf, Sébastien Saudrais:
Generation of Context-Based Usage Scenario Test from UML Sequence Diagrams. 1-7 - Pascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg:
Towards Measuring Real-World Performance of Android Devices. 1-8 - Enas A. Alikhashashneh, Rajeev R. Raje, James H. Hill:
Using Machine Learning Techniques to Classify and Predict Static Code Analysis Tool Warnings. 1-8 - Paulo Marcos Siqueira Bueno, Ferrucio de Franco Rosa
, Mario Jino, Rodrigo Bonacin
:
A Security Testing Process Supported by an Ontology Environment: A Conceptual Proposal. 1-8 - Bernhard Breil, Lisanne Kremer, Adel Taweel, Thomas Lux:
A Comparative Literature Analysis of the Health Informatics Curricula. 1-4 - Sina Namaki Araghi, Franck Fontanili
, Elyes Lamine
, Nicolas Salatgé, Julien Lesbegueries, Sebastien Rebiere Pouyade, Ludovic Tancerel, Frédérick Bénaben:
A Conceptual Framework to Support Discovering of Patients' Pathways as Operational Process Charts. 1-6 - Mohanad O. Al-Jabari
, Belal M. Amro
, Hussein M. Jabareen, Yousef S. Khader
, Adel Taweel:
Development of a Case Study-Based Approach for Effective Understanding and use of EHRs in Undergraduate Multidisciplinary Education. 1-6 - Syed Misbahuddin, Abdul Rahman Al-Ahdal, Muhammad Arshad Malik:
Low-Cost MPI Cluster Based Distributed in-Ward Patients Monitoring System. 1-6 - Sami Elzeiny, Marwa K. Qaraqe
:
Machine Learning Approaches to Automatic Stress Detection: A Review. 1-6 - Roger Resmini, Adriel S. Araujo, Aura Conci, Lincoln F. Silva
, Maira B. H. Moran:
Number of Texture Unit as Feature to Breast's Disease Classification from Thermal Images. 1-6 - Ahmad Al-Aiad, Rehab Duwairi, Manar Fraihat:
Survey: Deep Learning Concepts and Techniques for Electronic Health Record. 1-5 - Mahmoud Abdel-Latif, Mohamed Samir, Shady Abdel-Aziz, Mohamed Heeba, Ahmed Elmasry, Marwan Torki
:
A Supervised Learning Approach using the Combination of Semantic and Lexical Features for Arabic Community Question Answering. 1-7 - Ashraf Elnagar, Rotana Ismail, Bahja Alattas, Alia Alfalasi:
Automatic Classification of Reciters of Quranic Audio Clips. 1-6 - Hadj Mohammed Djamel, Nacéra Bensaou:
Automatic Extraction of Equations in Medieval Arabic Algebra. 1-6 - Randa Ben Ammar, Yassine Ben Ayed:
Speech Processing for Early Alzheimer Disease Diagnosis: Machine Learning Based Approach. 1-8 - Raja Ayed:
Social Networks Analysis in a Business Intelligence Context. 1-8 - Eman Omar, Paola Flocchini, Nicola Santoro:
Energy Restoration in a Linear Sensor Network. 1-8 - Mohannad Abuzneid, Ausif Mahmood:
Face Recognition Framework Based on Correlated Images and Back-Propagation Neural Network. 1-7 - Zergat Kawthar Yasmine, Sid-Ahmed Selouani, Abderrahmane Amrouche, Mohamed Debyeche:
Improved Speaker Recognition over VoIP using Auditory Features. 1-4 - Furkan Aydin
, H. Fatih Ugurdag, Vecdi Emre Levent
, Aydin Emre Guzel, N. Fajar R. Annafianto, M. Akif Ozkan
, Toygar Akgün
, Cengiz Erbas:
Rapid Design of Real-Time Image Fusion on FPGA using HLS and Other Techniques. 1-6 - Yousef Shatnawi, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub, Monther Aldwairi:
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy using Different Distance Measures. 1-5 - Afef Abidi, Ibtihel Nouira, Mohamed Hedi Bedoui:
Parallel Implementation on GPU for EEG Artifact Rejection by Combining FastICA and TQWT. 1-8 - Hatem Moumni, Olfa Hamdi, Sana Ezouaoui:
Algorithms and Performance Evaluation for Sparse Matrix Product on Grid'5000 Intel Xeon Processor. 1-7 - Intidhar Bedhief, Meriem Kassar, Taoufik Aguili:
From Evaluating to Enabling SDN for the Internet of Things. 1-8 - Chaouki Chemam, Hafed Zarzour
, Toufik Sari
, Mohammad Al-Smadi
, Yaser Jararweh:
Trends in Linked Data-Based Educational Studies: A Review of Contributions in SSCI Journals. 1-5 - Thierry Louge
, Mohamed-Hedi Karray, Bernard Archimède:
Investigating a Method for Automatic Construction and Population of Ontologies for Services: Performances and Limitations. 1-6 - Javier Rocher
, Lorena Parra
, Jaime Lloret, Jesus Mengual
:
An Inductive Sensor for Water Level Monitoring in Tubes for Water Grids. 1-7 - Zakia Kezzoula, Soumia Faouci, Djamel Gaceb:
Neural Approach for the Magnification of Low-Resolution Document Images. 1-8 - Adriel S. Araujo, Aura Conci, Maira B. H. Moran, R. Melo, Roger Resmini:
On Efficient Computation of Texture Descriptors from Sum and Difference Histograms Considering the Scales of Patterns. 1-8 - Mohammad Alhammouri, Basem Madani, Moayad Aloqaily
, Ismaeel Al Ridhawi, Yaser Jararweh:
Scalable Video Streaming for Real-Time Multimedia Applications over DDS Middleware for Future Internet Architecture. 1-6 - Noureddine Aouaa, Rachid Gherbi, Abdelkrim Meziane, Hayat Hadjar, Insaf Setitra:
Visual Data Mining by Virtual Reality for Protein-Protein Interaction Networks. 1-8 - Mohamed Moncef Ben Khelifa, Hachem A. Lamti, Joel Grillasca:
A gaze/SSVEP based Wheelchair Command. 1-2 - Raoua Khwildi, Azza Ouled Zaid
:
Color Based HDR Image Retrieval using HSV Histogram and Color Moments. 1-5 - Kahina Amara, Naeem Ramzan
, Nouara Achour, Mahmoud Belhocine
, Cherif Larbes, Nadia Zenati:
Emotion Recognition via Facial Expressions. 1-6 - Maira B. H. Moran, Aura Conci, José R. González, Débora Christina Muchaluat-Saade, W. G. Fiirst, Adriel S. Araujo, Charbel Damião, Giovanna A. B. Lima, Rubens A. da Cruz Filho, Roger Resmini:
Monomodal Image Registration by Tensor Analysis: Going Beyond the Brightness Constancy Assumption. 1-8 - Nilangshu Bidyanta, Ali Akoglu:
Real-Time GPU Based Video Segmentation with Depth Information. 1-8 - Samuel Hess, Pratik Satam
, Gregory Ditzler, Salim Hariri:
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data. 1-7 - Randa Almadhoun
, Maha Kadadha, Maya Alhemeiri, Maryam AlShehhi, Khaled Salah:
A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes. 1-8 - Amani Shatnawi, Stephen Clyde:
Modeling Personal Identifiable Information using First-Order Logic. 1-10 - Yanal Alahmad, Anjali Agarwal, Tariq Daradkeh:
High Availability Management for Applications Services in the Cloud Container-Based Platform. 1-8 - Achref El Amri, Aref Meddeb:
Load Sharing Techniques for Server Selection in Network Virtualization. 1-8 - Ahmad Sharaieh, Afaf Edinat, Shakir AlFarraji:
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography. 1-6 - Dhekra Rezgui, Hend Bouziri, Wassila Aggoune-Mtalaa
, Jouhaina Chaouachi Siala:
A Hybrid Evolutionary Algorithm for Smart Freight Delivery with Electric Modular Vehicles. 1-8 - Renata Martins Gomes, Marcel Baunach:
A Model-Based Concept for RTOS Portability. 1-6 - Sandra Sendra, Pablo Romero-Díaz, Jorge Navarro-Ortiz
, Jaime Lloret:
Smart Infant Incubator Based on LoRa Networks. 1-6 - Naima Essadi, Adil Anwar:
Language Interface-Oriented Design: A Promising Approach to Coordinate between Heterogeneous DSMLs. 1-6 - Rafat Hammad
, Mustafa Banikhalaf:
A Parallel Approach for Managing XML-based Electronic Medical Records. 1-5 - Otman Manad, Anna Pappa
, Gilles Bernard:
A Cleaning Algorithm for Noiseless Opinion Mining Corpus Construction. 1-7 - Rami Mustafa A. Mohammad:
A Neural Network based Digital Forensics Classification. 1-7 - Sarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj
, Ali Chehab
:
Adaptive Optimization for Hybrid Network Control Planes. 1-8 - Aljia Bouzidi, Nahla Haddar, Mounira Ben-Abdallah, Kais Haddar:
Alignment of Business Processes and Requirements Through Model Integration. 1-8 - Patricia Della Méa Plentz, Edson Roberto de Pieri:
An Overview on Real-Time Constraints for Ambient Intelligence (AmI). 1-7 - Farah Fargo, Samantika Sury:
Autonomic Secure HPC Fabric Architecture. 1-4 - Rasim Caner Çalik, M. Fatih Demirci:
Cifar-10 Image Classification with Convolutional Neural Networks for Embedded Systems. 1-2 - Aboubakr Aqle
, Dena Al-Thani
, Ali Jaoua:
Conceptual Interactive Search Engine Interface for Visually Impaired Web Users. 1-6 - Seongwoo Kim, Seyoung Kim, Kwang Ryel Ryu:
Deep Learning Experiments with Skewed Data for Defect Prediction in Plastic Injection Molding. 1-2 - Belal Amro
, Mohanad O. Al-Jabari
, Hussein M. Jabareen, Yousef S. Khader
, Adel Taweel:
Design and Development of Case Studies in Security and Privacy for Health Informatics Education. 1-6 - Shereen S. Ismail, Amal Ahmad, Mohammed Awad
, Mohammad Abdul Jawad
:
Evaluating Cache Power Dissipation Across Different Process Technologies. 1-5 - Nadia Boufares, Yosra Ben Saied, Leïla Azouz Saïdane:
Improved Distributed Virtual Forces Algorithm for 3D Terrains Coverage in Mobile Wireless Sensor Networks. 1-8 - Zakia Berber, Samir Kameche:
Influence of Loop Bandwidth Parameter on Integer PLL Frequency Synthesizer Performances in 80 GHz mm-Wave 5G Frequency Band. 1-2 - Muhammed Jassem Al-Muhammed:
Likelihood-Based Random Search Technique for Solving Unconstrained Optimization Problems. 1-8 - Yekta Turk, Ali Akman:
Management of Low Powered Personal Area Networks Using Compression in SNMPv3. 1-5 - Amjad Aldweesh, Maher Alharby, Aad van Moorsel:
Performance Benchmarking for Ethereum Opcodes. 1-2 - Mohammad Ababneh, Malik Qasaimeh, Duminda Wijesekera, Paulo C. G. Costa
:
Performance of Generating Dialogs from Ontology and Context. 1-6 - Sana Boujnah, Sami Jaballah, Anouar Ben Khalifa
, Mohamed Lassaad Ammari:
Person's Identification with Partial Fingerprint Based on a Redefinition of Minutiae Features. 1-5 - Salah Gontara
, Amine Boufaied, Ouajdi Korbaa
:
Routing the Pi-Containers in the Physical Internet using the PI-BGP Protocol. 1-8 - Faten Mrabet, Walid Karamti
, Adel Mahfoudhi:
SAC-Tool: A Tool for Scheduling Analysis and Correction of Multiprocessor Real Time Systems. 1-7 - Ana Ximena Halabi Echeverry
, Juan Carlos Vergara-Silva, Mohamed-Hedi Karray:
Semantic Intelligence in a Seaport Context. 1-2 - Safaa Gamal, Mohamed Rihan
, Adel Zaghloul, Abdelhamid A. Shaalan:
Two-Tier Power Allocation for Non-Orthogonal Multiple Access Based Cognitive Radio Networks. 1-5 - Saad Aldoihi
, Omar Hammami:
User Experience of CT Scan: A Reflection of Usability and Exertions. 1-6 - Sarab M. Hameed, Layla M. Mohammed Ali:
Utilizing Hopfield Neural Network for Pseudo-Random Number Generator. 1-5 - Imen Baklouti, Majdi Mansouri
, Ahmed Ben Hamida, Hazem N. Nounou, Mohamed N. Nounou:
Max-Double Adaptive EWMA for Fault Detection of Wastewater Treatment Plants. 1-6 - Rola El Osta, Maryline Chetto, Hussein El Ghor:
An Optimal Approach for Minimizing Aperiodic Response Times in Real-Time Energy Harvesting Systems. 1-6 - Walaa Al-Sarayrah, Ahmad Al-Aiad, Yaser Jararweh:
Social Networking Sites and Deaf and Hard of Hearing People in Jordan: Characteristics and Preferences. 1-5 - Mohamed Anouar Bencheikh, Samir Boukhenous:
A Wearable Preventive Insole for Diabetic Patients. 1-2 - Fakhri Abbas:
Serendipity in Recommender System: A Holistic Overview. 1-2