default search action
Aziz Qaroush
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c16]Ahmad Abumihsan, Abdalkarim Awad, Mohammad K. Jubran, Aziz Qaroush, Iyad Tumar, Abdullah Soliman Alshra'a:
Multipath TCP for Short Flows Supported by SDN in Heterogeneous Networks. ICCCS 2023: 532-538 - [c15]Noor-Aldin Titi, Miral Rimawi, Deema Hamed, Abdalkarim Awad, Yazan Abu Farha, Aziz Qaroush:
Collecting, Distributing and Extracting Information from Wearable Devices. IDAACS 2023: 499-503 - 2022
- [j11]Aziz Qaroush, Bassam Jaber, Khader Mohammad, Mahdi Washaha, Eman Maali, Nibal Nayef:
An efficient, font independent word and character segmentation algorithm for printed Arabic text. J. King Saud Univ. Comput. Inf. Sci. 34(1): 1330-1344 (2022) - [j10]Aziz Qaroush, Abdalkarim Awad, Mohammad Modallal, Malik Ziq:
Segmentation-based, omnifont printed Arabic character recognition without font identification. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 3025-3039 (2022) - [j9]Aziz Qaroush, Abdalkarim Awad, Abualsoud Hanani, Khader Mohammad, Basam Jaber, Ala Hasheesh:
Learning-free, divide and conquer text-line extraction algorithm for printed Arabic text with diacritics. J. King Saud Univ. Comput. Inf. Sci. 34(9): 7699-7709 (2022) - 2021
- [j8]Aziz Qaroush, Sara Yassin, Ali Al-Nubani, Ameer Alqam:
Smart, comfortable wearable system for recognizing Arabic Sign Language in real-time using IMUs and features-based fusion. Expert Syst. Appl. 184: 115448 (2021) - [j7]Aziz Qaroush, Ibrahim Abu Farha, Wasel Ghanem, Mahdi Washaha, Eman Maali:
An efficient single document Arabic text summarization using a combination of statistical and semantic features. J. King Saud Univ. Comput. Inf. Sci. 33(6): 677-692 (2021) - [j6]Khader Mohammad, Aziz Qaroush, Mahdi Washha, Sos S. Agaian, Iyad Tumar:
An adaptive text-line extraction algorithm for printed Arabic documents with diacritics. Multim. Tools Appl. 80(2): 2177-2204 (2021) - 2020
- [j5]Rana Alqaisi, Wasel Ghanem, Aziz Qaroush:
Extractive Multi-Document Arabic Text Summarization Using Evolutionary Multi-Objective Optimization With K-Medoid Clustering. IEEE Access 8: 228206-228224 (2020)
2010 – 2019
- 2019
- [j4]Mahdi Washha, Aziz Qaroush, Manel Mezghani, Florence Sèdes:
Unsupervised collective-based framework for dynamic retraining of supervised real-time spam tweets detection model. Expert Syst. Appl. 135: 129-152 (2019) - [j3]Khader Mohammad, Aziz Qaroush, Muna Ayyesh, Mahdi Washha, Ahmad S. Alsadeh, Sos S. Agaian:
Contour-based character segmentation for printed Arabic text with diacritics. J. Electronic Imaging 28(4): 043030 (2019) - 2018
- [c14]Mohammad A. Ateeq, Abualsoud Hanani, Aziz Qaroush:
An Optimization Based Approach for Solving Spoken CALL Shared Task. INTERSPEECH 2018: 2369-2373 - 2017
- [j2]Khader Mohammad, Aziz Qaroush, Mahdi Washha, Baker Mohammad:
Low-power content addressable memory (CAM) array for mobile devices. Microelectron. J. 67: 10-18 (2017) - [c13]Mahdi Washha, Aziz Qaroush, Manel Mezghani, Florence Sèdes:
Towards Generating Spam Queries for Retrieving Spam Accounts in Large-Scale Twitter Data. ICEIS (Revised Selected Papers) 2017: 387-412 - [c12]Mahdi Washha, Aziz Qaroush, Manel Mezghani, Florence Sèdes:
Information Quality in Social Networks: Predicting Spammy Naming Patterns for Retrieving Twitter Spam Accounts. ICEIS (2) 2017: 610-622 - [c11]Mahdi Washha, Aziz Qaroush, Manel Mezghani, Florence Sèdes:
Information Quality in Social Networks: A Collaborative Method for Detecting Spam Tweets in Trending Topics. IEA/AIE (2) 2017: 211-223 - [c10]Muna Ayesh, Khader Mohammad, Aziz Qaroush, Sos S. Agaian, Mahdi Washha:
A Robust Line Segmentation Algorithm for Arabic Printed Text with Diacritics. Image Processing: Algorithms and Systems 2017: 42-47 - [c9]Mahdi Washha, Aziz Qaroush, Manel Mezghani, Florence Sèdes:
A Topic-Based Hidden Markov Model for Real-Time Spam Tweets Filtering. KES 2017: 833-843 - [c8]Abualsoud Hanani, Aziz Qaroush, Stephen Taylor:
Identifying dialects with textual and acoustic cues. VarDial 2017: 93-101 - 2016
- [c7]Aziz Qaroush, Abualsoud Hanani, Bassam Jaber, Mohammed Karmi, Bashar Qamhiyeh:
Automatic Spoken Customer Query Identification for Arabic Language. ICIME 2016: 41-46 - [c6]Mahdi Washha, Aziz Qaroush, Florence Sèdes:
Leveraging time for spammers detection on Twitter. MEDES 2016: 109-116 - [c5]Abualsoud Hanani, Aziz Qaroush, Stephen Taylor:
Classifying ASR Transcriptions According to Arabic Dialect. VarDial@COLING 2016: 126-134 - 2015
- [c4]Khader Mohammad, Muna Ayyesh, Aziz Qaroush, Iyad Tumar:
Printed Arabic optical character segmentation. Image Processing: Algorithms and Systems 2015: 939911 - 2014
- [j1]Aziz Qaroush, Mahdi Washaha, Ismail M. Khater:
Efficient spam filtering based on informative features extracted from the header fields and the URLs in the message. Comput. Syst. Sci. Eng. 29(1) (2014) - [c3]Yazan Abu Farha, Mohammad Abu Hijleh, Aziz Qaroush, Abdellatif Abu-Issa:
Adaptive spectrum searching in cognitive radio networks. ICMCS 2014: 814-818 - 2012
- [c2]Aziz Qaroush, Ismail M. Khater, Mahdi Washaha:
Identifying spam e-mail based-on statistical header features and sender behavior. CUBE 2012: 771-778 - 2010
- [c1]Omar M. Al-Jarrah, Ayad Salhieh, Aziz Qaroush:
Real-Time Power-Aware Routing Protocol for Wireless Sensor Network. ICISTM 2010: 156-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-18 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint