Accepted Papers
7707
ACIT'2024 will be held in Zarqa University, December 10-12, 2024 -Zarqa, Jordan
7707
Paper ID |
Title |
Author(s) |
526 |
Laplacian face recognition in the electronic banking system |
Altalbe ,Ali |
1331 |
FPGA Based Neural Wireless Sensor Network |
Jamel ,Thamer |
1264 |
Proposal Design: Fingerprint Random Number Generators |
Salman ,Hana'a |
524 |
Ontology Based Business Rules Extraction Model and Algorithm (OBBREMA) |
Osrof ,Maha |
13054 |
Context-Aware Reconfiguration of Software Systems |
Boudida ,Rima |
4210 |
Application of a Fuzzy Neural Network Combined With an Expert Petri Net System to Intrusion Detection System |
ALI ,KHATTAB |
239 |
Application of spatial statistical analysis using Geographic Information Systems Gis |
Abbas ,Ali |
379 |
Building e-management depend on waterfall model |
aljasim ,omar |
1277 |
A New Adjusted Step Size Affine Projection Algorithm Designed for Adaptive Filtering System |
Jamel ,Thamer |
13271 |
Image Segmentation Using Edge Detection and Thresholding |
Saif ,Jamil |
335 |
IMPROVED ROI ALGORITHM FOR COMPRESSING MEDICAL IMAGES |
Nagy Saad Mohamed ,Mohamed |
649 |
Toward Pervasive Healthcare Application using Aspect-Oriented implementation |
Benamar ,Abdelkrim |
133 |
Evaluation of Different Cryptographic Algorithms for Wireless Sensor and Actor Networks (WSANs). |
Khattak ,Muazzam |
127 |
Combining Different Distance Measurements Methods with Dempster-Shafer-Theory for Recognition of Urdu Character Script |
Khan ,Yunus |
4267 |
Recursive algorithm for the reliability of connected-(1,2)-or-(2,1)-out-of-(m,n): linear and circular lattice system |
Nashwan ,Imad |
12673 |
Mobile Robot Navigation in Unknown Environment Using Improved APF Method |
Hamani ,Miloud |
12668 |
Planning of a trajectory along with avoiding the obstacle based on fuzzy logic method For a unicycle mobile Robot |
Hassam ,Abdelouahab |
13269 |
Treatments and Mergers in the Spatial Data Framework for Semantic Interoperability of Geographic Information Systems |
Kholladi ,Sirine |
13265 |
A secure protocol to protect ambient agents group |
BOUCHEMAL ,Nardjes |
13064 |
Design a Text-Prompt Speaker Recognition System using LPC-derived Features |
Al-Hassani ,Dr Mustafa Dhiaa |
3271 |
Cloud Based Module Configuration |
shaout ,adnan |
13255 |
Cloud-Based Market-Oriented Infrastructure for Medical Informatics Applications (MedCloud) |
Hassan ,Mahamat Issa |
1085 |
Incremental Inductive Learning Algorithm (I-ILA) |
Taradeh ,Saher |
2196 |
The impact of the culture on the e-readiness for e-government in developing countries (Yemen) |
Al-eryani ,Arwa |
4226 |
A proposal for a training program in the preparation of educational electronic portfolios for teachers of literacy in Hadhramaout |
Al-Saggaf ,Ahmed |
13212 |
FORMAL SECURITY ANALYSIS FOR WEB APPLICATIONS BY USING Pi CALCULUS |
Razzaq ,Abdul |
13211 |
Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table |
al-najjar ,hazem |
13209 |
Detecting Spammer in Email Social Networks using lazy learning methods |
Elnageeb ,Salma |
12861 |
Bounded Liveness in Semantic Web Services |
Boumaza ,Amel |
12865 |
Mobile agent approach for web services discovery in mobile environments |
Hamida ,Souraya |
3882 |
Parallel Computing for Detecting Processes for distorted signal |
Alattar ,Arwa |
12698 |
Silhouettes Retrieval based on the Quad-tree Structure following an XML Description |
AOUAT ,Saliha |
13515 |
An Expert System for the Detection and Early Detection of Breast Cancer Using Mammography Images and Techniques of Artificial Intelligence |
Shosharah ,Aliaa |
13225 |
A New Edge Detector Using Log-Normal Distribution |
El-Zaart ,Ali |
13078 |
Bridging the Gap between Design and Implementation for Multi-agent Systems |
Elammari ,Mohamed |
13233 |
BREAST CANCER CLASSIFICATION USING NEURAL NETWORK APPROACH: MLP AND RBF |
Raad ,Ali |
13226 |
Usability Evaluation of Some Lebanese Universities Web Portals |
Abu Daher ,Layal |
12867 |
ECOMMERCE SMARTPHONE APPLICATION |
ALQAHTANI ,ABDULLAH |
12869 |
IMPACTS OF DATA WAREHOUSE EVOLUTION ON DATA MARTS |
FEKI ,Jamel |
7576 |
Compression and Encryption Algorithms for Image Satellite Communication |
OTHMAN ,EMAD S. |
13291 |
web data extraction and establishment of a meta social network |
CHARA ,AZIZ |
11065 |
A Metamodeling Approach for Software Architecture Evolution |
Amirat ,Abdelkrim |
13292 |
BPMN’s meta-model extension with deployment and security information |
Rekik ,Mouna |
8996 |
Secure Mobile Clients using Elliptic Curve for WMN |
Hamamreh ,Rushdi |
4781 |
E-Learning at school level: Challenges and Benefits |
Dargham ,Joumana |
4786 |
Skin Cancer Image Segmentation & Detection by using Unsupervised Neural Networks (UNN) |
shawkat abdulbaki almashhadani ,azmi |
13106 |
A Survey of Arabic Question Answering Challenges, Tasks, Approaches, Tools, and Future Trends |
Magdy ,Ahmed |
10108 |
REAL-TIME DISPARITY MAP COMPUTATION BASED ON DISPARITY SPACE IMAGE |
BAHA ,Nadia |
6199 |
Enhancing Throughput of Space Time System Using Variable Code Rate and Modulation |
Mosleh ,Mahmood F. |
6919 |
Multi-source spatial data management: a comparison of IDRISI GIS and Arc GIS approaches |
Lemenkova ,Polina |
6825 |
Finding an Optimal Path Planning for Multiple Robots Using Genetic Algorithms |
Huwedi ,Ashraf |
6829 |
Fault-Tolerant Storage System for Cloud Datacenters |
shaout ,adnan |
6831 |
The architecture and implementation of M-business based on mobile agents using Aglets |
Aloui ,Ahmed |
13262 |
Particle Swarm Optimization for University Course Timetable Scheduling: Avoiding Course Contradictions in Levels |
Osman ,Addin |
13035 |
Biologically Inspired Protocol for Securing A class of Networks: A Case Study |
Mohamed ,Yasir |
6628 |
A Computerized System to Build Interactive and Dynamic Educational Tutorials for Children with Intellectual Challenges Based on Search Engines and Ontology |
Mwinyi ,Masoud Udi |
7106 |
A Review of Web Search Engine Applications: InfoSpider, WACO, WebComb and ContentUsageAnts Models |
ISSA ,TAROUB |
7103 |
Mammogram Enhancement and Segmentation Methods: Classification, Analysis, and Evaluation |
Biltawi ,Mariam |
12524 |
A New Cloud computing framework based on mobile agents for web services discovery and selection. |
Saouli ,Hamza |
13219 |
Strong Key Machanism Generated by LFSR based Vigenère Cipher |
Razzaq ,Abdul |
13220 |
Hybrid Image Representation Methods for Automatic Image Annotation: A Survey |
Bouyerbou ,Hafidha |
6369 |
A MOF-based change meta-model |
kchaou ,dhikra |
5771 |
Development of GSM Mobile Towers Distributing |
Al-Rawi ,Salah |
13516 |
Parse Trees of Arabic Sentences Using the Natural Language Toolkit |
Shatnawi ,Maad |
13517 |
Hybrid Scatter Search Algorithm for 4-Color Mapping Problem |
Al-Obaidi ,Mohammed |
12895 |
Performance Evaluation of Face Recognition Algorithms |
Dandashi ,Amal |
12897 |
Songs Clustering Using Swarm Inelligence |
LACHTAR ,nadia |
6982 |
Dealing with Emphatic Consonants to Improve the Performance of Arabic |
Alsabaan ,Majid |
5831 |
A modified Tabu Search algorithm for Solving The Channel Assignment problem |
Tounsi ,Abdelkader |
6283 |
HPSG Analysis of Type-Based Arabic Nominal Declension |
Masum ,Mahmudul Hasan |
13092 |
Text-Independent Speaker Identification using Hidden Markov Model |
Abdallah ,Sayed |
5464 |
Distributed optimization methods in the emergency management context |
Ibri ,Sarah |
9460 |
An Approach For: Improving Voice Command processor Based On Better Features and Classifiers Selection |
FEZARI ,Mohamed |
7014 |
A Webometric Analysis of Some Universities in Lebanon |
Houri ,Wafaa |
7016 |
Comparing Neural Network Algorithm Performance Using SPSS and NeuroSolutions |
Harb ,Amjad |
6025 |
Opinion Mining From Arabic Comparative Sentences |
El-Halees ,Alaa |
7010 |
Stochastic Refusal Graph for Testing Non-Deterministic Systems |
Bouaroudj ,Kenza |
12512 |
Fuzzy Bio-Cryptography Key Generation |
Salman ,Hanaa |
6515 |
An Iterative Mammographic Image Thresholding Algorithm For Breast Cancer Detection |
Alayli ,Roula |
6521 |
Use of Computer and Internet in Agricultural Extension As perceived by Extension Workers |
Haji Hashemi ,Zahra |
11154 |
NUMERICAL SIMULTIONS for 1+2 DIMENSIONAL COUPLED NONLINEAR SCHRĂ–DINGER EQUATION |
Taha ,Thiab |
12923 |
Using Nested Tables and Mutation in Genetic Algorithms (NTMGA) to Solve Timetabling Problem in Object-Relational Model |
Al-Qubati ,Wadee |
12894 |
Critical Factors of GIS Projects Failure in Yemeni Governmental Agencies |
Al-Waraqi ,Ghamdan |
6572 |
Parametric Watermarking Based Ownership Judgment |
Rasheed ,Waleed A.J |
7030 |
Towards a Service Oriented Entreprise - A Methodological Approach |
BOUSSIS ,AMEL |
6696 |
New two algorithms to find the reliability and the failure functions of the consecutive k-out-of-n: F circular systems |
Nashwan ,Imad |
5524 |
On the use of Algebraic Petri Nets for Software Product Lines Specification: a Graph Transformation Based Approach |
Khalfaoui ,Khaled |
12434 |
Electronic Prescribing Systems in Lebanon: A Readiness Assessment |
Melki ,Antoine |
12438 |
An architecture for semi-automatic ontology merging system. |
AMROUCH ,Siham |
13120 |
IMAGE CONTOUR COMPRESSION USING SPATIAL DOMAIN METHODS AND WAVELET TRANSFORM |
Ukasha ,Ali |
12337 |
Automatic classification of learners e-mails |
Neji ,mahmoud |
13246 |
Services Composition checking approach based on Graph Transformation |
Nouara ,Redouane |
13260 |
Learning System of Mammographic Abnormalities |
Rais ,Hadjer |
13382 |
Distributed State Space Generation based Distributed Hash Tables |
MATMAT ,Riadh |
11509 |
Fault Tolerance Mobile Agent Execution System (FTMAS) Modeling |
Al Dweik, Wazwaz ,Amal |
13300 |
Description of a flexible software architecture for remote control of instruments with RS232, USB and GPIB interfaces |
Said ,FARAH |
13301 |
Security Organizations and the Technology of E-Government A Preliminary Study Applied to the Justice and Interior Ministries in Libya |
Abdella ,mohammed |
13302 |
Formal Semantics of web Services Composition based on Colored Petri Nets and Graph Grammars |
Chemaa ,Sofiane |
13305 |
Proposed Development of Clock Control Generator in Stream Cipher |
Sadkhan ,Sattar B |
13314 |
Hybrid Technique to Enhance Teaching and Learning Introductory Programming Concepts of AOP under Eclipse |
Bentrad ,Sassi |
13316 |
Embedded System Based on VR-STAMP with DSP-TMS320C6711 for Voice-Driven Monitoring Robots Navigation |
FEZARI ,Mohamed |
13235 |
A system of parallel combination of classifiers for face detection |
Youkana ,Imane |
13238 |
An exact arborescent method for solving 0-1 knapsack problem |
Bouakkaz ,Feriel |
11773 |
Matching algorithm for Geographic Web Service discovery based Ontology |
Khaled ,Rezeg |
13148 |
Batched fingerprint enhancement performance on GPU |
Lehtihet ,Raja |
11781 |
PERFORMANCE EVALUATION OF DECISION TREE CLASSIFIERS FOR THE PREDICTION OF RESPONSE TO TREATMENT OF HEPATITIS C PATIENTS |
Awad ,AbuBakr |
11788 |
Perceptions and Attitudes of Arab Information Technology researchers Toward Open Access Publishing |
Seliaman ,Mohamed Elhassan |
12195 |
Combating of email SPAM by different businesses in Saudi Arabia |
Alkahtani ,Hasan Shojaa |
12210 |
FORMALIZING THE MENTAL MODEL OF A SOFTWARE ARCHITECTURE |
GUESSOUM ,Dalila |
13127 |
Association Rule Mining in a Parallel Genetic Algorithm Model |
Taleb ,Ahmad |
13356 |
An Arabic Mispronunciation Detection System by means of Automatic Speech Recognition Technology |
Necibi ,Khaled |
13288 |
Arabic Signature Verification Datasets |
Al-Maadeed ,Somaya |
13023 |
Distributed Algorithm to design telecommunication Capacitated Survivable Network |
KHELIFI ,MERIEM |
11971 |
Challenge Facing Sudanese higher education institutions for implementing the Knowledge Based Systems |
Elshaiekh ,Nour Eldin |
13278 |
Semantic indexing of algorithms courses based on a new ontology |
EL Guemmat ,Kamal |
13281 |
Combining Image Local Features and Textual Indices Using Latent Semantic Analysis for Web Image Indexing and Retrieval |
Boulemden ,Ahmed |
13285 |
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks |
Wazwaz ,Ayman |
13286 |
Enrichment of Queries for Education Domain |
Rachdi ,Mohamed |
11976 |
What People Think of ICT Centers in Rural Areas: evidence from Iran |
Pouya ,Mehrdad |
9780 |
Runtime Monitoring Using Policy Based Approach To Control Information Flow for Mobile Applications |
Sarrab ,Mohamed |
13013 |
Using Deterministic Cellular Automata for the Design of a Learning Agent |
Merabet ,Rebiyia |