Default Cover Image

2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)

Oct. 28 2018 to Nov. 1 2018

Aqaba, Jordan

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
[Copyright notice]Freely available from IEEE.pp. 1-1
Welcome MessageFreely available from IEEE.pp. 1-1
Message from the AICCSA 2018 Program ChairsFreely available from IEEE.pp. 1-1
CommitteesFreely available from IEEE.pp. 1-2
Track ListFreely available from IEEE.pp. 1-1
VenueFreely available from IEEE.pp. 1-1
Social EventFreely available from IEEE.pp. 1-1
Keynote SpeakersFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
ProgramFreely available from IEEE.pp. 1-11
PostersFreely available from IEEE.pp. 1-2
Program At a GlanceFreely available from IEEE.pp. 1-1
Word Sense Disambiguation using Skip Gram Model to Create a Historical Dictionary for ArabicFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Data Interpretation Support in Rescue Operations: Application for French FirefightersFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Autonomic Author Identification in Internet Relay Chat (IRC)Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
MeSH-Based Semantic Query ExpansionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Implementation of an Embedded Testbed for Indoor SLAMFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Deep Learning Approach for Amazon EC2 Spot Price PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An Interactive Video Browsing With VINAS SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Trust-based Access Control Scheme for e-Health CloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Distributed Firewall and Controller for Mobile Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Efficient Radio Resource Management for D2D-based LTE-V2X communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Literature Review of WSN MAC Protocols in Smart ParkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Experiencing Low Power Wireless Links in Distribution Smart Grid EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Multiprocessor Real-Time Scheduling for Wireless Sensors Powered by Renewable Energy SourcesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Power Control Method Based on Users and Applications QoS Priorities(UAQP) in Femtocell NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
New Histogram-based Descriptor for Off-Line Handwritten Signature VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Comparative Performance Analysis of Cooperative Outdoor PLCFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Real-Time Healthcare Monitoring System using SmartphonesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A New Morphological Annotation Tool for Arabic TextsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Structures Simulation of Curved Sensor based on PVDF for Fetal Heart Rate MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Intelligent Model for Suitable University Specialization Selection in PalestineFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Attributes Regrouping in Fuzzy Rule Based Classification Systems: An Intra-Classes ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
SAT-Based BMC Approach to Verifying Real-Time Properties of Multi-Agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Sentiment Analysis for Arabic Text using Ensemble LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Autonomic Secure HPC Architecture Against Power AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Security Framework for IoT Cloud ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Bluetooth Intrusion Detection System (BIDS)Full-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Scheme for Three-way Secure and Verifiable E-VotingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A New Intelligent Hybrid Feature Selection MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Applying Genetic Algorithms on Multi-level Micro-Aggregation Techniques for Secure Statistical DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Axes-Based Encryption KeyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards a Hierarchical Multitask Classification Framework for Cultural HeritageFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Novel Tweets Clustering Method using Word EmbeddingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Generation of Context-Based Usage Scenario Test from UML Sequence DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Towards Measuring Real-World Performance of Android DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Comparative Literature Analysis of the Health Informatics CurriculaFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Low-Cost MPI Cluster Based Distributed in-Ward Patients Monitoring SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Machine Learning Approaches to Automatic Stress Detection: A ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Number of Texture Unit as Feature to Breast's Disease Classification from Thermal ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Survey: Deep Learning Concepts and Techniques for Electronic Health RecordFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Automatic Classification of Reciters of Quranic Audio ClipsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Automatic Extraction of Equations in Medieval Arabic AlgebraFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Speech Processing for Early Alzheimer Disease Diagnosis: Machine Learning Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Social Networks Analysis in a Business Intelligence ContextFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Energy Restoration in a Linear Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Face Recognition Framework Based on Correlated Images and Back-Propagation Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Improved Speaker Recognition over VoIP using Auditory FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Parallel Implementation on GPU for EEG Artifact Rejection by Combining FastICA and TQWTFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Algorithms and Performance Evaluation for Sparse Matrix Product on Grid'5000 Intel Xeon ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
From Evaluating to Enabling SDN for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An Inductive Sensor for Water Level Monitoring in Tubes for Water GridsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Neural Approach for the Magnification of Low-Resolution Document ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A gaze/SSVEP based Wheelchair CommandFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Color Based HDR Image Retrieval using HSV Histogram and Color MomentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Emotion Recognition via Facial ExpressionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Real-Time GPU Based Video Segmentation with Depth InformationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Modeling Personal Identifiable Information using First-Order LogicFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
High Availability Management for Applications Services in the Cloud Container-Based PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Load Sharing Techniques for Server Selection in Network VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based CryptographyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Model-Based Concept for RTOS PortabilityFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Smart Infant Incubator Based on LoRa NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Language Interface-Oriented Design: A Promising Approach to Coordinate between Heterogeneous DSMLsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Parallel Approach for Managing XML-based Electronic Medical RecordsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Cleaning Algorithm for Noiseless Opinion Mining Corpus ConstructionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Neural Network based Digital Forensics ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Showing 100 out of 131