Default Cover Image

2022 IEEE/ACS 19th International Conference on Computer Systems and Applications (AICCSA)

Dec. 5 2022 to Dec. 8 2022

Abu Dhabi, United Arab Emirates

ISBN: 979-8-3503-1008-5

Table of Contents

Copyright PageFreely available from IEEE.pp. 1-1
AICCSA'2022 Organizational CommitteeFreely available from IEEE.pp. 1-2
AICCSA'2022 Program CommitteeFreely available from IEEE.pp. 1-4
The cost of reliable uplink communication in large scale LoRaWANFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Early Detection of Diabetes Mellitus Using Differentially Private SGD in Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Vehicular Cloud Computing for Population Evacuation OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
BELONG: Blockchain basEd pLatform fOr donation & social project fuNdinGFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Modeling User-Centric Threats in Smart City: A Hybrid Threat Modeling MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Clustering techniques for software product line feature identificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Towards a human-in-the-loop curation: A qualitative perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Strategic Attacks on Recommender Systems: An Obfuscation ScenarioFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Optimal Beacon Placement for Indoor Positioning Using Constraint ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Time Series Fault Detection for Power Line Condition Monitoring: A Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
FFM-SVD: A Novel Approach for Personality-aware Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Convolutional, Extra-Trees and Multi layer PerceptronFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
AI-based Arabic Language and Speech TutorFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards An Accurate Stacked Ensemble Learning Model For Thyroid Earlier DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Socio-Semantic Information Retrieval of Structured Arabic TextsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
AsPOS: Assamese Part of Speech Tagger using Deep Learning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Natural Language Inference for Arabic using Recurrent Neural Network and Word EmbeddingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Predicting COVID-19 Related Tweets Using Ensemble of Transformers ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
3D Deformable Protein Shapes Classification based on Triangles-Stars and Composite Deep Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Book Cover Synthesis from the SummaryFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A New Algorithm for Energy Efficient Task Scheduling Towards Optimal Green Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Neuro-fuzzy ensembles: A systematic mapping studyFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Histological breast cancer classification using CNN and MLP based ensemblesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Novel Deep Multi-Task Learning to Sensing Student Engagement in E-Learning EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
DRIVES: Android App for Automotive Customized ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Guided classification for Arabic Characters handwritten RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An adaptive and extensible framework to enhance end to end trustworthiness of traceability dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Bottom-up approach to translate Tunisian dialect texts in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Study on the Application of Blockchain in Carbon Trading SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Comparative Study of QoS-aware Network Coding Protocols in WSNsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Digital Twin in Healthcare: Security Threat Meta-ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Automated Learning Approach for Genetic DiseasesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Financial Sentiment Analysis based on transformers and Majority VotingFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Smart Residential Water Leak and Overuse Detection System Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
There Is More to AI than Meets the Eye: Aligning Man-made Algorithms with Nature-inspired MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Trust Evolution Game in BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Network Security Traffic Analysis Platform - Design and ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Towards a context-aware personalized formative assessment in a collaborative online environmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Hybrid approach for containerized Microservices auto-scalingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Machine Learning-based Water Potability PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Extending 5G services with Zero Trust security pillars: a modular approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
AI Classifiers Comparison for Network Anomaly Behavior AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Blind Two Party ECDSA Signing Based Homomorphic Encryption over Message PassingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Blockchain Based Methodology for Zero Trust Modeling and Quantification for 5G NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Toward An Experimental Federated 6G Testbed: A Federated Leaning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Using Self-labeling and Co-Training to Enhance Bots Labeling in TwitterFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Property Graph Access Control Using View-Based and Query-Rewriting ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A Fast Hybrid Deep Neural Network Model for pushing behavior detection in human crowdsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Towards understanding the impact of mental states on software development using EEGFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Showing 72 out of 72