Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
AICCSA
AICCSA 2018
Generate Citations
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)
Oct. 28 2018 to Nov. 1 2018
Aqaba, Jordan
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Welcome Message
Freely available from IEEE.
pp. 1-1
Message from the AICCSA 2018 Program Chairs
Freely available from IEEE.
pp. 1-1
Committees
Freely available from IEEE.
pp. 1-2
Track List
Freely available from IEEE.
pp. 1-1
Venue
Freely available from IEEE.
pp. 1-1
Social Event
Freely available from IEEE.
pp. 1-1
Keynote Speakers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
Program
Freely available from IEEE.
pp. 1-11
Posters
Freely available from IEEE.
pp. 1-2
Program At a Glance
Freely available from IEEE.
pp. 1-1
Word Sense Disambiguation using Skip Gram Model to Create a Historical Dictionary for Arabic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Rim Laatar
,
Chafik Aloulou
,
Lamia Hadrich Belguith
Data Interpretation Support in Rescue Operations: Application for French Firefighters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Samer Chehade
,
Nada Matta
,
Jean-Baptiste Pothin
,
Remi Cogranne
Autonomic Author Identification in Internet Relay Chat (IRC)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sicong Shao
,
Cihan Tunc
,
Amany Al-Shawi
,
Salim Hariri
MeSH-Based Semantic Query Expansion
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wided Selmi
,
Hager Kammoun
,
Ikram Amous
Implementation of an Embedded Testbed for Indoor SLAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Muhammad Shehzad Hanif
,
Muhammad Bilal
,
Khalid Munawar
,
Abdullah Saeed Balamash
A Deep Learning Approach for Amazon EC2 Spot Price Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hana Al-Theiabat
,
Mahmoud Al-Ayyoub
,
Mohammad Alsmirat
,
Monther Aldwair
An Interactive Video Browsing With VINAS System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mohamed Hamroun
,
Sonia Lajmi
,
Henri Nicolas
,
Ikram Amous
Enhanced Risk Minimization Framework for Cloud Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abdul Razaque
,
Yuxin Li
,
Qianqian Liu
,
Meer Jaro Khan
,
Ahmad Doulat
,
Muder Almiani
,
Ahmad Alflahat
A Trust-based Access Control Scheme for e-Health Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Wided Ben Daoud
,
Amel Meddeb-Makhlouf
,
Faouzi Zarai
Distributed Firewall and Controller for Mobile Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
Efficient Radio Resource Management for D2D-based LTE-V2X communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ahlem Masmoudi
,
Souhir Feki
,
Kais Mnif
,
Faouzi Zarai
Literature Review of WSN MAC Protocols in Smart Parking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Bassma Jioudi
,
Wafaa Dachry
,
Fouad Moutaouakkil
,
Hicham Medromi
Experiencing Low Power Wireless Links in Distribution Smart Grid Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sana Rekik
,
Nouha Baccour
,
Mohamed Jmaiel
,
Khalil Drira
Multiprocessor Real-Time Scheduling for Wireless Sensors Powered by Renewable Energy Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hussein El Ghor
,
Maryline Chetto
,
Rola El Osta
Power Control Method Based on Users and Applications QoS Priorities(UAQP) in Femtocell Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ibtissem Brahmi
,
Fadoua Mhiri
,
Faouzi Zarai
New Histogram-based Descriptor for Off-Line Handwritten Signature Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yasmine Serdouk
,
Hassiba Nemmour
,
Youcef Chibani
Comparative Performance Analysis of Cooperative Outdoor PLC
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Nouha Khyari
,
Sofiane Khalfallah
,
Yosra Barouni
,
Jaleleddine Ben HAdj Slama
Perception and Acceptance of Health Informatics Learning among Health-Related Students in Jordan and Palestine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yousef Khader
,
Hussein Jabareen
,
Sukaina Alzyoud
,
Samah Awad
,
Niveen Abu Rumeileh
,
Nemeh Manasrah
,
Rula Mudallal
,
Adel Taweel
Pervasive Computing Integrated Discrete Event Simulation for a Hospital Digital Twin
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abdallah Karakra
,
Franck Fontanili
,
Elyes Lamine
,
Jacques Lamothe
,
Adel Taweel
Real-Time Healthcare Monitoring System using Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Abdulrahman Abu Elkhail
,
Uthman Baroudi
A New Morphological Annotation Tool for Arabic Texts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Raja Ayed
,
Amina Chouigui
,
Bilel Elayeb
Automated Detection of Benign and Malignant in Breast Histopathology Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Qanita Bani Baker
,
Toqa' Abu Zaitoun
,
Sajda Banat
,
Eman Eaydat
,
Mohammad Alsmirat
Structures Simulation of Curved Sensor based on PVDF for Fetal Heart Rate Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mariame Nassit
,
Hassan Berbia
Intelligent Model for Suitable University Specialization Selection in Palestine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lubaba Tamiza
,
Ghassan Shahin
,
Radwan Tahboub
Attributes Regrouping in Fuzzy Rule Based Classification Systems: An Intra-Classes Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Amel Borgi
,
Rim Kalai
,
Hayfa Zgaya
SAT-Based BMC Approach to Verifying Real-Time Properties of Multi-Agent Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Agnieszka M. Zbrzezny
,
Andrzej Zbrzezny
Sentiment Analysis for Arabic Text using Ensemble Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Samar Al-Saqqa
,
Nadim Obeid
,
Arafat Awajan
An Ontology-Based Approach Towards Coupling Task and Path Planning for the Simulation of Manipulation Tasks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yingshen Zhao
,
Philippe Fillatreau
,
Mohamed Hedi Karray
,
Bernard Archimede
Regression-Based Dynamic Provisioning and Monitoring for Responsive Resources in Cloud Infrastructure Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mustafa Daraghmeh
,
Suhib Bani Melhem
,
Anjali Agarwal
,
Nishith Goel
,
Marzia Zaman
Autonomic Secure HPC Architecture Against Power Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Olivier Franza
,
Farah Fargo
Security Framework for IoT Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jesus Pacheco
,
Cihan Tunc
,
Salim Hariri
Bluetooth Intrusion Detection System (BIDS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Pratik Satam
,
Shalaka Satam
,
Salim Hariri
A Scheme for Three-way Secure and Verifiable E-Voting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamed Nassar
,
Qutaibah Malluhi
,
Tanveer Khan
Towards an Approach for the Evaluation of the Quality of Business Process Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jamila Oukharijane
,
Fadwa Yahya
,
Khouloud Boukadi
,
Hanêne Ben Abdallah
A New Intelligent Hybrid Feature Selection Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Majed A. Alenizi
,
Hussein Y. Abu Mansour
Applying Genetic Algorithms on Multi-level Micro-Aggregation Techniques for Secure Statistical Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ebaa Fayyoumi
,
Omar Nofal
Axes-Based Encryption Key
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Imane Haidar
,
Ali Massoud Haidar
,
Ramzi A. Haraty
Towards a Hierarchical Multitask Classification Framework for Cultural Heritage
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abdelhak Belhi
,
Abdelaziz Bouras
,
Sebti Foufou
A Novel Tweets Clustering Method using Word Embeddings
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Maha Fraj
,
Mohamed Aymen Ben Hajkacem
,
Nadia Essoussi
Generation of Context-Based Usage Scenario Test from UML Sequence Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hussein Mhanna
,
Patrick Leserf
,
Sébastien Saudrais
Towards Measuring Real-World Performance of Android Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Pascal Bissig
,
Gino Brunner
,
Florian Gubler
,
Roger Wattenhofer
,
Andreas Zingg
Using Machine Learning Techniques to Classify and Predict Static Code Analysis Tool Warnings
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Enas A. Alikhashashneh
,
Rajeev R. Raje
,
James H. Hill
A Security Testing Process Supported by an Ontology Environment: A Conceptual Proposal
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Paulo Marcos Siqueira Bueno
,
Ferrucio de Franco Rosa
,
Mario Jino
,
Rodrigo Bonacin
A Comparative Literature Analysis of the Health Informatics Curricula
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Bernhard Breil
,
Lisanne Kremer
,
Adel Taweel
,
Thomas Lux
A Conceptual Framework to Support Discovering of Patients' Pathways as Operational Process Charts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sina Namaki Araghi
,
Franck Fontaili
,
Elyes Lamine
,
Nicolas Salatge
,
Julien Lesbegueries
,
Sebastien Rebiere Pouyade
,
Ludovic Tancerel
,
Frederick Benaben
Development of a Case Study-Based Approach for Effective Understanding and use of EHRs in Undergraduate Multidisciplinary Education
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohanad O. Al-Jabari
,
Belal M. Amro
,
Hussein M. Jabareen
,
Yousef S. Khader
,
Adel Taweel
Low-Cost MPI Cluster Based Distributed in-Ward Patients Monitoring System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Syed Misbahuddin
,
Abdul Rahman Al-Ahdal
,
Muhammad Arshad Malik
Machine Learning Approaches to Automatic Stress Detection: A Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sami Elzeiny
,
Marwa Qaraqe
Number of Texture Unit as Feature to Breast's Disease Classification from Thermal Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
R. Resmini
,
A. Araujo
,
A. Conci
,
L. Silva
,
M. Moran
Survey: Deep Learning Concepts and Techniques for Electronic Health Record
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ahmad al-Aiad
,
Rehab Duwairi
,
Manar Fraihat
A Supervised Learning Approach using the Combination of Semantic and Lexical Features for Arabic Community Question Answering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mahmoud Abdel-Latif
,
Mohamed Samir
,
Shady Abdel-Aziz
,
Mohamed Heeba
,
Ahmed Elmasry
,
Marwan Torki
Automatic Classification of Reciters of Quranic Audio Clips
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ashraf Elnagar
,
Rotana Ismail
,
Bahja Alattas
,
Alia Alfalasi
Automatic Extraction of Equations in Medieval Arabic Algebra
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hadj Mohammed Djamel
,
Nacéra Bensaou
Speech Processing for Early Alzheimer Disease Diagnosis: Machine Learning Based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Randa Ben Ammar
,
Yassine Ben Ayed
Social Networks Analysis in a Business Intelligence Context
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Raja Ayed
Energy Restoration in a Linear Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Eman Omar
,
Paola Flocchini
,
Nicola Santoro
Face Recognition Framework Based on Correlated Images and Back-Propagation Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohannad Abuzneid
,
Ausif Mahmood
Improved Speaker Recognition over VoIP using Auditory Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Zergat Kawthar Yasmine
,
Selouani Sid Ahmed
,
Amrouche Abderrahmane
,
Debyeche Mohamed
Rapid Design of Real-Time Image Fusion on FPGA using HLS and Other Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Furkan Aydin
,
H. Fatih Ugurdag
,
Vecdi Emre Levent
,
Aydin Emre Guzel
,
N. Fajar R. Annafianto
,
M. Akif Ozkan
,
Toygar AkgUn
,
Cengiz Erbas
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy using Different Distance Measures
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yousef Shatnawi
,
Mohammad Alsmirat
,
Mahmoud Al-Ayyoub
,
Monther Aldwairi
Parallel Implementation on GPU for EEG Artifact Rejection by Combining FastICA and TQWT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Afef Abidi
,
Ibtihel Nouira
,
Mohamed Hédi Bedoui
Algorithms and Performance Evaluation for Sparse Matrix Product on Grid'5000 Intel Xeon Processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hatem Moumni
,
Olfa Hamdi
,
Sana Ezouaoui
From Evaluating to Enabling SDN for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Intidhar Bedhief
,
Meriem Kassar
,
Taoufik Aguili
Trends in Linked Data-Based Educational Studies: A Review of Contributions in SSCI Journals
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chaouki Chemam
,
Hafed Zarzour
,
Toufik Sari
,
Mohammad Al-Smadi
,
Yaser Jararweh
Investigating a Method for Automatic Construction and Population of Ontologies for Services: Performances and Limitations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thierry Louge
,
Mohamed Hedi Karray
,
Bernard Archimède
An Inductive Sensor for Water Level Monitoring in Tubes for Water Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Javier Rocher
,
Lorena Parra
,
Jaime Lloret
,
Jesus Mengual
Neural Approach for the Magnification of Low-Resolution Document Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zakia Kezzoula
,
Soumia Faouci
,
Djamel Gaceb
On Efficient Computation of Texture Descriptors from Sum and Difference Histograms Considering the Scales of Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
A. Araújo
,
A. Conci
,
M. Moran
,
R. Melo
,
R. Resmini
Scalable Video Streaming for Real-Time Multimedia Applications over DDS Middleware for Future Internet Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohammad Al-hammouri
,
Basem Madani
,
Moayad Aloqaily
,
Ismaeel Al Ridhawi
,
Yaser Jararweh
Visual Data Mining by Virtual Reality for Protein-Protein Interaction Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Noureddine Aouaa
,
Rachid Gherbi
,
Abdelkrim Meziane
,
Hayat Hadjar
,
Insaf Setitra
A gaze/SSVEP based Wheelchair Command
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Mohamed Moncef Ben Khelifa
,
Hachem A. Lamti
,
Joel Grillasca
Color Based HDR Image Retrieval using HSV Histogram and Color Moments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Raoua Khwildi
,
Azza Ouled Zaid
Emotion Recognition via Facial Expressions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kahina Amara
,
Naeem Ramzan
,
Nouara Achour
,
Mahmoud Belhocine
,
Cherif Larbas
,
Nadia Zenati
Monomodal Image Registration by Tensor Analysis: Going Beyond the Brightness Constancy Assumption
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
M. B. H. Moran
,
A. Conci
,
J. R. Gonzalez
,
D. C. M. Saade
,
W. Fiirst
,
A. S. Araújo
,
Charbel Damião
,
Giovanna Lima
,
Rubens Cruz Filho
,
Roger Resmini
Real-Time GPU Based Video Segmentation with Depth Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nilangshu Bidyanta
,
Ali Akoglu
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Samuel Hess
,
Pratik Satam
,
Gregory Ditzler
,
Salim Hariri
A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Randa Almadhoun
,
Maha Kadadha
,
Maya Alhemeiri
,
Maryam Alshehhi
,
Khaled Salah
Modeling Personal Identifiable Information using First-Order Logic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Amani Shatnawi
,
Stephen Clyde
High Availability Management for Applications Services in the Cloud Container-Based Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yanal Alahmad
,
Anjali Agarwal
,
Tariq Daradkeh
Load Sharing Techniques for Server Selection in Network Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Achref El Amri
,
Aref Meddeb
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ahmad Sharaieh
,
Afaf Edinat
,
Shakir AlFarraji
A Hybrid Evolutionary Algorithm for Smart Freight Delivery with Electric Modular Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Dhekra Rezgui
,
Hend Bouziri
,
Wassila Aggoune-Mtalaa
,
Jouhaina Chaouachi Siala
A Model-Based Concept for RTOS Portability
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Renata Martins Gomes
,
Marcel Baunach
Smart Infant Incubator Based on LoRa Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sandra Sendra
,
Pablo Romero-Díaz
,
Jorge Navarro-Ortiz
,
Jaime Lloret
Language Interface-Oriented Design: A Promising Approach to Coordinate between Heterogeneous DSMLs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Naima Essadi
,
Adil Anwar
A Parallel Approach for Managing XML-based Electronic Medical Records
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Rafat Hammad
,
Mustafa Banikhalaf
A Cleaning Algorithm for Noiseless Opinion Mining Corpus Construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Otman Manad
,
Anna Pappa
,
Gilles Bernard
A Neural Network based Digital Forensics Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Rami M. Mohammad
Showing 100 out of 131
Load More
Load All