default search action
ACIT 2019: Al Ain, United Arab Emirates
- International Arab Conference on Information Technology, ACIT 2019, Al Ain, United Arab Emirates, December 3-5, 2019. IEEE 2019, ISBN 978-1-7281-3010-1
- Adnan Shaout, Brennan Crispin:
Markov Augmented Neural Networks for Streaming Video Classification. 1-7 - Adnan Shaout, Ali Hassani:
An Intelligent Real Time Road Sign System. 8-13 - Gaurav Bhatia, Ismail Hamed Al Sulti:
CASCloud: An Open Source Private Cloud for Higher Education. 14-20 - Mariam Khader, Ghazi Al-Naymat:
Performance Comparison of Two Algorithms for Arbitrary Shapes Clustering. 20-26 - Ismail Hmiedi, Hassan Najadat, Zain A. Halloush, Ibtihal Jalabneh:
Semi Supervised Prediction Model in Educational Data Mining. 27-31 - Khalid Kaabneh, Rakan Alhwaidi:
Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data Storage. 32-37 - Ibtisam Mohammed Albahri:
Opinion Mining: Applications Trends. 38-41 - Mohammad Kamel A. Abuthawabeh, Khaled W. Mahmoud:
Android Malware Detection and Categorization Based on Conversation-level Network Traffic Features. 42-47 - Mohammad Al-Hattab, Nuha Hamada:
Mobility prediction as a time function for mobile networks in 3-D space: A Framework. 48-51 - Adnan Shaout, Nathan Schmidt:
Bee Hive Monitor. 52-57 - Nada Masood Mirza:
Application of Fuzzy Neural Networks in Robotic Path Planning. 58-62 - Suleiman H. Mustafa, Ru'ya Alawneh:
The Impact of Transitive Class Relations on Measuring the Degree of Class Cohesion. 63-69 - Walaa S. Mahmoud, Ajayeb S. Abu Daabes:
Does Social Media Affects Users' Well-Being. 78-80 - Safeyah Tawil, Khalid Mansour, Yaser Al-Lahham:
A Meta-strategy for Multi-issue Negotiation. 81-86 - Hazem Migdady, Hussam Alrabaiah, Mohammad Al-Talib:
Note about Bias in Bayesian Genetic Algorithms for Discrete Missing Values Imputation. 87-90 - Gullelala Jadoon, Muhammad Shafi, Sadaqat Jan:
A Model-Oriented Requirements Traceability Framework for Small and Medium Software Industries. 91-96 - Ayman Odeh, Raghad Abdelhadi, Hussien Odeh:
Medical patient appointments management using smart software system in UAE. 97-101 - Mohammed Mahmod Shuaib:
Modeling Collision Avoidance Field for Overtaking Moving Obstacles. 102-106 - Ghaliya Musallam Alfarsi, Jasiya Jabbar, Ragad M. Tawafak, Abir Alsidiri, Maryam Alsinani:
Techniques For Face Verification: Literature Review. 107-112 - Ahmad Ghandour:
Knowledge Sharing Platform for Multi-site Organisation. 113-117 - Ala'eddin Masadeh, Haythem Bany Salameh, Ahmad I. Abu-El-Haija:
Power Controlled Medium Access Control Design For Cognitive Radio Ad-Hoc Network. 118-123 - Hamzeh Al-Kilani, Mohammed Nasereddin, Ali Hadi, Sara Tedmori:
Data Exfiltration Techniques and Data Loss Prevention System. 124-127 - Ahmad A. Bany Abdelnabi:
An Analytical Hierarchical Process Model to Select Programming Language for Novice Programmers for Data Analytics Applications. 128-132 - Zuhrieh A. Shanaa, Enas Said Abulibdeh:
Integrating the use of iPad in the Teaching-Learning Process: A Pilot Study from UAE. 133-137 - Adnan Shaout, Udit Gami:
Sentiment Analysis of Yelp using Advanced V Model. 138-143 - Nevrus Kaja, Adnan Shaout, Di Ma:
Fuzzy Based Threat Assessment Model (FTAM). 144-149 - Hussein Salem Alsrehan:
Factors Influencing Education and E-learning Technology in UAE Universities as a Predictor of Community Satisfaction. 150-158 - Naeem A. Nawaz, Hamid Raza Malik, Ahmed Jaber Alshaor:
A Framework for Smart Capacity Estimation at Crowded Area using WSN. 159-164 - Enas Said Abulibdeh, Abdalla Abu Libdeh, Fuad A. Trayek, Ghadah Al Murshidi:
Diversifying The Teaching Methods : Student's Perceptions of Smart Learning. 165-170 - Hassan Najadat, Qutaibah Althebyan, Yasmin Al-Omary:
Higher Education Units Assessment Based on Data Envelopment Analysis and Clustering Techniques. 171-177 - Sumaya Daoud, Hussam Alrabaiah, Eman Ali Zaitoun:
Technology for Promoting Academic Integrity: The Impact of Using Turnitin on Reducing Plagiarism. 178-181 - Hassan Najadat, Amer Badarneh, Sawsan Alodibat:
A Hybrid Model of Ensemble Method and Data Envelopment Analysis (DEA) for E-government Websites Efficiency Evaluation. 182-187 - Qutaibah Althebyan:
A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach. 188-192 - Abdallah Qusef, Mohammad Daradkah, George Sammour, Aalaa Albadarneh:
A New e-Tendering Model For Fully Automated Tendering Process. 193-201 - Alaa Jaradat, Abdallah Qusef:
Automatic Recovery of Unit Tests after Code Refactoring. 202-208 - Mohammed Ali Taleb, Jamal Haydar, Walid Fahs, Ali Mokdad:
RBF Neural Network Model to Increase the Performance of Solar Panels. 209-213 - Mohammad Shurman, Wafaa Alkahla, Haya Hasan:
Priority-Based Channel Access for SAN Protocol in M2M Communication. 214-217 - Hani Mahmouad AlMimi, Samar A. Shahin, Mohammad Sh. Daoud, Mustafa A. Al-Fayoumi, Yazeed Ghadi:
Enhanced E-Voting Protocol Based on Public Key Cryptography. 218-221 - Shahab Ud Din, Bilal Ahmad, Ayman Ahmed, Mohammed Amin, Samer Aoudi:
Inter-destination Synchronization : A Comparison between Master-Slave and Synchronization-Manager Techniques. 222-229 - Ahmad Al-Qerem, Eman Al Nagi:
Privacy Preserving of Shared Data in Deep Learning. 230-234 - Ahmad Al-Qerem, Ghazi Al-Naymat, Mays Alhasan:
Loan Default Prediction Model Improvement through Comprehensive Preprocessing and Features Selection. 235-240 - Ahmad Al-Qerem, Yasmeen Shaher Alsalman, Khalid Mansour:
Image Generation Using Different Models Of Generative Adversarial Network. 241-245 - Ansar Hani, Najiba Tagougui, Monji Kherallah:
Image Caption Generation Using A Deep Architecture. 246-251 - Mohammad M. Shurman, Rami M. Khrais, Abdulrahman A. Yateem:
IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS. 252-254 - Mohammed Ajam, Hussein Kanaan, Lina El Khansa, Mohammad Ayache:
Ischemic Stroke Identification by Using Watershed Segmentation and Textural and Statistical Features. 255-258 - Mostafa Abdallah, Ali Saad, Mohammad Ayache:
Freezing of Gait Detection: Deep Learning Approach. 259-261 - Ahmad Ghandour, Brendon J. Woodford:
Ethical Issues in Artificial Intelligence in UAE. 262-266 - Zina Houhamdi, Belkacem Athamena:
User Identification Algorithm based-on Devices Recognition. 267-274 - Huthifh Al-Rushdan, Mohammad Shurman, Sharhabeel H. Alnabelsi, Qutaibah Althebyan:
Zero-Day Attack Detection and Prevention in Software-Defined Networks. 278-282 - Tasneem AlSalem, Lina Nazzal, Marah Samara, Mawahib Hussein Sulieman:
Design and Simulation of 90 nm Threshold Logic Carry-Look-Ahead Adder. 283-286 - Faten F. Kharbat, Ajayeb S. Abu Daabes:
Privacy Paradoxes in the Middle East: A Content Analysis from Instagram. 287-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.