Abstract is missing.
- Enhanced Risk Minimization Framework for Cloud Computing EnvironmentAbdul Razaque, Yuxin Li, Qianqian Liu, Meer Jaro Khan, Ahmad Doulat, Muder Almiani, Ahmad Alflahat. 1-7 [doi]
- Low-Cost MPI Cluster Based Distributed in-Ward Patients Monitoring SystemSyed Misbahuddin, Abdul Rahman Al-Ahdal, Muhammad Arshad Malik. 1-6 [doi]
- Rapid Design of Real-Time Image Fusion on FPGA using HLS and Other TechniquesFurkan Aydin, H. Fatih Ugurdag, Vecdi Emre Levent, Aydin Emre Guzel, N. Fajar R. Annafianto, M. Akif Ozkan, Toygar Akgün, Cengiz Erbas. 1-6 [doi]
- A Cleaning Algorithm for Noiseless Opinion Mining Corpus ConstructionOtman Manad, Anna Pappa, Gilles Bernard. 1-7 [doi]
- Scalable Video Streaming for Real-Time Multimedia Applications over DDS Middleware for Future Internet ArchitectureMohammad Alhammouri, Basem Madani, Moayad Aloqaily, Ismaeel Al Ridhawi, Yaser Jararweh. 1-6 [doi]
- A Hybrid Evolutionary Algorithm for Smart Freight Delivery with Electric Modular VehiclesDhekra Rezgui, Hend Bouziri, Wassila Aggoune-Mtalaa, Jouhaina Chaouachi Siala. 1-8 [doi]
- Design and Development of Case Studies in Security and Privacy for Health Informatics EducationBelal Amro, Mohanad O. Al-Jabari, Hussein M. Jabareen, Yousef S. Khader, Adel Taweel. 1-6 [doi]
- Emotion Recognition via Facial ExpressionsKahina Amara, Naeem Ramzan, Nouara Achour, Mahmoud Belhocine, Cherif Larbes, Nadia Zenati. 1-6 [doi]
- Efficient Radio Resource Management for D2D-based LTE-V2X communicationsAhlem Masmoudi, Souhir Feki, Kais Mnif, Faouzi Zarai. 1-6 [doi]
- Perception and Acceptance of Health Informatics Learning among Health-Related Students in Jordan and PalestineYousef Khader, Hussein Jabareen, Sukaina Alzyoud, Samah Awad, Niveen Abu Rumeileh, Nemeh Manasrah, Rula Mudallal, Adel Taweel. 1-6 [doi]
- Number of Texture Unit as Feature to Breast's Disease Classification from Thermal ImagesRoger Resmini, Adriel S. Araujo, Aura Conci, Lincoln F. Silva, Maira B. H. Moran. 1-6 [doi]
- Autonomic Author Identification in Internet Relay Chat (IRC)Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri. 1-8 [doi]
- Adaptive Optimization for Hybrid Network Control PlanesSarah Abdallah, Ayman I. Kayssi, Imad H. Elhajj, Ali Chehab. 1-8 [doi]
- Load Sharing Techniques for Server Selection in Network VirtualizationAchref El Amri, Aref Meddeb. 1-8 [doi]
- Performance of Generating Dialogs from Ontology and ContextMohammad Ababneh, Malik Qasaimeh, Duminda Wijesekera, Paulo Cesar G. da Costa. 1-6 [doi]
- Speech Processing for Early Alzheimer Disease Diagnosis: Machine Learning Based ApproachRanda Ben Ammar, Yassine Ben Ayed. 1-8 [doi]
- Distributed Firewall and Controller for Mobile Cloud ComputingFerdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai. 1-9 [doi]
- Performance Benchmarking for Ethereum OpcodesAmjad Aldweesh, Maher Alharby, Aad van Moorsel. 1-2 [doi]
- An Interactive Video Browsing With VINAS SystemMohamed Hamroun 0001, Sonia Lajmi, Henri Nicolas, Ikram Amous. 1-8 [doi]
- Person's Identification with Partial Fingerprint Based on a Redefinition of Minutiae FeaturesSana Boujnah, Sami Jaballah, Anouar Ben Khalifa, Mohamed Lassaad Ammari. 1-5 [doi]
- From Evaluating to Enabling SDN for the Internet of ThingsIntidhar Bedhief, Meriem Kassar, Taoufik Aguili. 1-8 [doi]
- Improved Speaker Recognition over VoIP using Auditory FeaturesZergat Kawthar Yasmine, Selouani Sid Ahmed, Amrouche Abderrahmane, Debyeche Mohamed. 1-4 [doi]
- Automatic Extraction of Equations in Medieval Arabic AlgebraHadj Mohammed Djamel, Nacéra Bensaou. 1-6 [doi]
- SAT-Based BMC Approach to Verifying Real-Time Properties of Multi-Agent SystemsAgnieszka M. Zbrzezny, Andrzej Zbrzezny. 1-8 [doi]
- Towards Measuring Real-World Performance of Android DevicesPascal Bissig, Gino Brunner, Florian Gubler, Roger Wattenhofer, Andreas Zingg. 1-8 [doi]
- A Model-Based Concept for RTOS PortabilityRenata Martins Gomes, Marcel Baunach. 1-6 [doi]
- Serendipity in Recommender System: A Holistic OverviewFakhri Abbas. 1-2 [doi]
- Likelihood-Based Random Search Technique for Solving Unconstrained Optimization ProblemsMuhammed J. Al-Muhammed. 1-8 [doi]
- Pervasive Computing Integrated Discrete Event Simulation for a Hospital Digital TwinAbdallah Karakra, Franck Fontanili, Elyes Lamine, Jacques Lamothe, Adel Taweel. 1-6 [doi]
- Neural Approach for the Magnification of Low-Resolution Document ImagesZakia Kezzoula, Soumia Faouci, Djamel Gaceb. 1-8 [doi]
- Social Networks Analysis in a Business Intelligence ContextRaja Ayed. 1-8 [doi]
- Surprise and Curiosity in A Recommender SystemAhmad Al-Doulat. 1-2 [doi]
- Using Machine Learning Techniques to Classify and Predict Static Code Analysis Tool WarningsEnas A. Alikhashashneh, Rajeev R. Raje, James H. Hill. 1-8 [doi]
- Automatic Classification of Reciters of Quranic Audio ClipsAshraf Elnagar, Rotana Ismail, Bahja Alattas, Alia Alfalasi. 1-6 [doi]
- Autonomic Secure HPC Architecture Against Power AttacksOlivier Franza, Farah Fargo. 1-4 [doi]
- An Optimal Approach for Minimizing Aperiodic Response Times in Real-Time Energy Harvesting SystemsRola El Osta, Maryline Chetto, Hussein El Ghor. 1-6 [doi]
- A gaze/SSVEP based Wheelchair CommandMohamed Moncef Ben Khelifa, Hachem A. Lamti, Joel Grillasca. 1-2 [doi]
- An Ontology-Based Approach Towards Coupling Task and Path Planning for the Simulation of Manipulation TasksYingshen Zhao, Philippe Fillatreau, Mohamed-Hedi Karray, Bernard Archimède. 1-8 [doi]
- Autonomic Secure HPC Fabric ArchitectureFarah Fargo, Samantika Sury. 1-4 [doi]
- New Histogram-based Descriptor for Off-Line Handwritten Signature VerificationYasmine Serdouk, Hassiba Nemmour, Youcef Chibani. 1-5 [doi]
- The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy using Different Distance MeasuresYousef Shatnawi, Mohammad A. Alsmirat, Mahmoud Al-Ayyoub, Monther Aldwairi. 1-5 [doi]
- An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based CryptographyAhmad Sharaieh, Afaf Edinat, Shakir AlFarraji. 1-6 [doi]
- Sentiment Analysis for Arabic Text using Ensemble LearningSamar Al-Saqqa, Nadim Obeid, Arafat Awajan. 1-7 [doi]
- A Neural Network based Digital Forensics ClassificationRami M. Mohammad. 1-7 [doi]
- A Scheme for Three-way Secure and Verifiable E-VotingMohamed Nassar, Qutaibah M. Malluhi, Tanveer Khan. 1-6 [doi]
- Color Based HDR Image Retrieval using HSV Histogram and Color MomentsRaoua Khwildi, Azza Ouled Zaid. 1-5 [doi]
- Structures Simulation of Curved Sensor based on PVDF for Fetal Heart Rate MonitoringMariame Nassit, Hassan Berbia. 1-6 [doi]
- Computer Aided System for Users with Visual ImpairmentsSevgi Kirboyun. 1-2 [doi]
- Evaluating Cache Power Dissipation Across Different Process TechnologiesShereen S. Ismail, Amal Ahmad, Mohammed Awad, Mohammad Abdul Jawad. 1-5 [doi]
- Routing the Pi-Containers in the Physical Internet using the PI-BGP ProtocolSalah Gontara, Amine Boufaied, Ouajdi Korbaa. 1-8 [doi]
- Towards a Hierarchical Multitask Classification Framework for Cultural HeritageAbdelhak Belhi, Abdelaziz Bouras, Sebti Foufou. 1-7 [doi]
- SAC-Tool: A Tool for Scheduling Analysis and Correction of Multiprocessor Real Time SystemsMrabet Faten, Karamti Walid, Mahfoudhi Adel. 1-7 [doi]
- A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog NodesRanda Almadhoun, Maha Kadadha, Maya Alhemeiri, Maryam Alshehhi, Khaled Salah. 1-8 [doi]
- Visual Data Mining by Virtual Reality for Protein-Protein Interaction NetworksNoureddine Aouaa, Rachid Gherbi, Abdelkrim Meziane, Hayat Hadjar, Insaf Setitra. 1-8 [doi]
- A Comparative Literature Analysis of the Health Informatics CurriculaBernhard Breil, Lisanne Kremer, Adel Taweel, Thomas Lux. 1-4 [doi]
- An Inductive Sensor for Water Level Monitoring in Tubes for Water GridsJavier Rocher, Lorena Parra, Jaime Lloret, Jesus Mengual. 1-7 [doi]
- Survey: Deep Learning Concepts and Techniques for Electronic Health RecordAhmad Al-Aiad, Rehab Duwairi, Manar Fraihat. 1-5 [doi]
- A Security Testing Process Supported by an Ontology Environment: A Conceptual ProposalPaulo Marcos Siqueira Bueno, Ferrucio de Franco Rosa, Mario Jino, Rodrigo Bonacin. 1-8 [doi]
- Max-Double Adaptive EWMA for Fault Detection of Wastewater Treatment PlantsImen Baklouti, Majdi Mansouri, Ahmed Ben Hamida, Hazem N. Nounou, Mohamed N. Nounou. 1-6 [doi]
- A Deep Learning Approach for Amazon EC2 Spot Price PredictionHana' Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad A. Alsmirat, Monther Aldwairi. 1-5 [doi]
- A Physical Testbed for Smart City ResearchAdam Morrissett, Sherif Abdelwahed. 1-2 [doi]
- Language Interface-Oriented Design: A Promising Approach to Coordinate between Heterogeneous DSMLsNaima Essadi, Adil Anwar. 1-6 [doi]
- Two-Tier Power Allocation for Non-Orthogonal Multiple Access Based Cognitive Radio NetworksSafaa Gamal, Mohamed Rihan, Adel Zaghloul, Abdelhamid Shaalan. 1-5 [doi]
- Modeling Personal Identifiable Information using First-Order LogicAmani Shatnawi, Stephen Clyde. 1-10 [doi]
- Security Framework for IoT Cloud ServicesJesus Pacheco, Cihan Tunc, Salim Hariri. 1-6 [doi]
- On Efficient Computation of Texture Descriptors from Sum and Difference Histograms Considering the Scales of PatternsAdriel S. Araujo, Aura Conci, Maira B. H. Moran, R. Melo, Roger Resmini. 1-8 [doi]
- Power Control Method Based on Users and Applications QoS Priorities(UAQP) in Femtocell NetworkIbtissem Brahmi, Fadoua Mhiri, Faouzi Zarai. 1-5 [doi]
- Energy Restoration in a Linear Sensor NetworkEman Omar, Paola Flocchini, Nicola Santoro. 1-8 [doi]
- A Parallel Approach for Managing XML-based Electronic Medical RecordsRafat Hammad, Mustafa Banikhalaf. 1-5 [doi]
- Semantic Intelligence in a Seaport ContextAna Ximena Halabi Echeverry, Juan Carlos Vergara-Silva, Mohamed-Hedi Karray. 1-2 [doi]
- Literature Review of WSN MAC Protocols in Smart ParkingBassma Jioudi, Wafaa Dachry, Fouad Moutaouakkil, Hicham Medromi. 1-6 [doi]
- Management of Low Powered Personal Area Networks Using Compression in SNMPv3Yekta Turk, Ali Akman. 1-5 [doi]
- Attributes Regrouping in Fuzzy Rule Based Classification Systems: An Intra-Classes ApproachAmel Borgi, Rim Kalaï, Hayfa Zgaya. 1-7 [doi]
- Axes-Based Encryption KeyImane Haidar, Ali Massoud Haidar, Ramzi A. Haraty. 1-8 [doi]
- An Overview on Real-Time Constraints for Ambient Intelligence (AmI)Patricia Della Mea Plentz, Edson Roberto de Pieri. 1-7 [doi]
- Applying Genetic Algorithms on Multi-level Micro-Aggregation Techniques for Secure Statistical DatabasesEbaa Fayyoumi, Omar Nofal. 1-6 [doi]
- Algorithms and Performance Evaluation for Sparse Matrix Product on Grid'5000 Intel Xeon ProcessorHatem Moumni, Olfa Hamdi, Sana Ezouaoui. 1-7 [doi]
- A Supervised Learning Approach using the Combination of Semantic and Lexical Features for Arabic Community Question AnsweringMahmoud Abdel-Latif, Mohamed Samir, Shady Abdel-Aziz, Mohamed Heeba, Ahmed Elmasry, Marwan Torki. 1-7 [doi]
- Parallel Implementation on GPU for EEG Artifact Rejection by Combining FastICA and TQWTAfef Abidi, Ibtihel Nouira, Mohamed Hedi Bedoui. 1-8 [doi]
- Trends in Linked Data-Based Educational Studies: A Review of Contributions in SSCI JournalsChaouki Chemam, Hafed Zarzour, Toufik Sari, Mohammad Al-Smadi, Yaser Jararweh. 1-5 [doi]
- Real-Time GPU Based Video Segmentation with Depth InformationNilangshu Bidyanta, Ali Akoglu. 1-8 [doi]
- Smart Infant Incubator Based on LoRa NetworksSandra Sendra, Pablo Romero-Diaz, Jorge Navarro-Ortiz, Jaime Lloret. 1-6 [doi]
- Deep Learning Experiments with Skewed Data for Defect Prediction in Plastic Injection MoldingSeongwoo Kim, Seyoung Kim, Kwang Ryel Ryu. 1-2 [doi]
- Data Interpretation Support in Rescue Operations: Application for French FirefightersSamer Chehade, Nada Matta, Jean-Baptiste Pothin, Rémi Cogranne. 1-6 [doi]
- Alignment of Business Processes and Requirements Through Model IntegrationAljia Bouzidi, Nahla Haddar, Mounira Ben-Abdallah, Kais Haddar. 1-8 [doi]
- Cifar-10 Image Classification with Convolutional Neural Networks for Embedded SystemsRasim Caner Çalik, M. Fatih Demirci. 1-2 [doi]
- Automated Detection of Benign and Malignant in Breast Histopathology ImagesQanita Bani Baker, Toqa' Abu Zaitoun, Sajda Banat, Eman Eaydat, Mohammad Alsmirat. 1-5 [doi]
- A New Intelligent Hybrid Feature Selection MethodMajed A. Alenizi, Hussein Y. Abu Mansour. 1-6 [doi]
- Improving Human Face Recognition using Deep Learning based Image Registration and Multi-Classifier ApproachesMohannad Abuzneid, Ausif Mahmood. 1-2 [doi]
- Utilizing Hopfield Neural Network for Pseudo-Random Number GeneratorSarab M. Hameed, Layla M. Mohammed Ali. 1-5 [doi]
- Generation of Context-Based Usage Scenario Test from UML Sequence DiagramsHussein Mhanna, Patrick Leserf, Sébastien Saudrais. 1-7 [doi]
- Face Recognition Framework Based on Correlated Images and Back-Propagation Neural NetworkMohannad Abuzneid, Ausif Mahmood. 1-7 [doi]
- Social Networking Sites and Deaf and Hard of Hearing People in Jordan: Characteristics and PreferencesWalaa Al-Sarayrah, Ahmad Al-Aiad, Yaser Jararweh. 1-5 [doi]
- Influence of Loop Bandwidth Parameter on Integer PLL Frequency Synthesizer Performances in 80 GHz mm-Wave 5G Frequency BandZakia Berber, Samir Kameche. 1-2 [doi]
- MeSH-Based Semantic Query ExpansionWided Selmi, Hager Kammoun, Ikram Amous. 1-8 [doi]
- Towards an Approach for the Evaluation of the Quality of Business Process ModelsJamila Oukharijane, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben-Abdallah. 1-8 [doi]
- Regression-Based Dynamic Provisioning and Monitoring for Responsive Resources in Cloud Infrastructure NetworksMustafa Daraghmeh, Suhib Bani Melhem, Anjali Agarwal, Nishith Goel, Marzia Zaman. 1-7 [doi]
- A Trust-based Access Control Scheme for e-Health CloudWided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai. 1-7 [doi]
- Machine Learning Approaches to Automatic Stress Detection: A ReviewSami Elzeiny, Marwa Qaraqe. 1-6 [doi]
- Improved Distributed Virtual Forces Algorithm for 3D Terrains Coverage in Mobile Wireless Sensor NetworksNadia Boufares, Yosra Ben Saied, Leïla Azouz Saïdane. 1-8 [doi]
- A Novel Tweets Clustering Method using Word EmbeddingsMaha Fraj, Mohamed Aymen Ben HajKacem, Nadia Essoussi. 1-7 [doi]
- Implementation of an Embedded Testbed for Indoor SLAMMuhammad Shehzad Hanif, Muhammad Bilal 0001, Khalid Munawar, Abdullah Saeed Balamash. 1-8 [doi]
- Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy DataSamuel Hess, Pratik Satam, Gregory Ditzler, Salim Hariri. 1-7 [doi]
- Real-Time Healthcare Monitoring System using SmartphonesAbdulrahman Abu Elkhail, Uthman Baroudi. 1-6 [doi]
- A Wearable Preventive Insole for Diabetic PatientsMohamed Anouar Bencheikh, Samir Boukhenous. 1-2 [doi]
- A Conceptual Framework to Support Discovering of Patients' Pathways as Operational Process ChartsSina Namaki Araghi, Franck Fontanili, Elyes Lamine, Nicolas Salatgé, Julien Lesbegueries, Sebastien Rebiere Pouyade, Ludovic Tancerel, Frédérick Bénaben. 1-6 [doi]
- User Experience of CT Scan: A Reflection of Usability and ExertionsSaad Aldoihi, Omar Hammami. 1-6 [doi]
- High Availability Management for Applications Services in the Cloud Container-Based PlatformYanal Alahmad, Anjali Agarwal, Tariq Daradkeh. 1-8 [doi]
- Investigating a Method for Automatic Construction and Population of Ontologies for Services: Performances and LimitationsThierry Louge, Mohamed-Hedi Karray, Bernard Archimède. 1-6 [doi]
- Comparative Performance Analysis of Cooperative Outdoor PLCNouha Khyari, Sofiane Khalfallah, Yosra Barouni, Jaleleddine Ben Hadj Slama. 1-5 [doi]
- Experiencing Low Power Wireless Links in Distribution Smart Grid EnvironmentsSana Rekik, Nouha Baccour, Mohamed Jmaiel, Khalil Drira. 1-8 [doi]
- Conceptual Interactive Search Engine Interface for Visually Impaired Web UsersAboubakr Aqle, Dena Al-Thani, Ali Jaoua. 1-6 [doi]
- Bluetooth Intrusion Detection System (BIDS)Pratik Satam, Shalaka Satam, Salim Hariri. 1-7 [doi]
- A New Morphological Annotation Tool for Arabic TextsRaja Ayed, Amina Chouigui, Bilel Elayeb. 1-6 [doi]
- Word Sense Disambiguation using Skip Gram Model to Create a Historical Dictionary for ArabicRim Laatar, Chafik Aloulou, Lamia Hadrich Belguith. 1-5 [doi]
- Intelligent Model for Suitable University Specialization Selection in PalestineLubaba Tamiza, Ghassan Shahin, Radwan Tahboub. 1-8 [doi]
- Monomodal Image Registration by Tensor Analysis: Going Beyond the Brightness Constancy AssumptionM. B. H. Moran, A. Conci, José R. González, Débora Christina Muchaluat-Saade, W. G. Fiirst, Adriel S. Araujo, Charbel Damião, Giovanna A. B. Lima, Rubens A. da Cruz Filho, Roger Resmini. 1-8 [doi]
- Multiprocessor Real-Time Scheduling for Wireless Sensors Powered by Renewable Energy SourcesHussein El Ghor, Maryline Chetto, Rola El Osta. 1-6 [doi]
- Development of a Case Study-Based Approach for Effective Understanding and use of EHRs in Undergraduate Multidisciplinary EducationMohanad O. Al-Jabari, Belal M. Amro, Hussein M. Jabareen, Yousef S. Khader, Adel Taweel. 1-6 [doi]