Conference Program
4488
ACIT'2024 will be held in Zarqa University, December 10-12, 2024 -Zarqa, Jordan
4488
Day1: Monday - 10/12/2012 |
Registration : 8:30 AM Finger Vein Visualization |
Sulaiman R. and Fardkakaie Z. |
|
65 |
Mathematical relationship between external events in real-time systems and errors generated in these systems |
Al-Raimi H. and Saif J. |
68 |
A novel Mecannism for Securing Cloud Computing |
Mohamed Y. |
69 |
Contribution of Neural Networks and Fuzzy Logic in Modeling of XLPE Properties Used in HV Insulation Cables Subjected to Thermal Aging |
Bessissa L., Boukezzi L., Mahi D., and Boubakeur A. |
71 |
Intelligent Strategy of Task Scheduling in Cloud Computing |
Tawfeek M., El-Sisi A., Keshk A., and Torkey F. |
74 |
A New Development of Academic Performance Evaluation Using Soft Computing Techniques |
SINGH YADAV R. |
75 |
Graph-Based Centrality Algorithm for Arabic Text Summarization |
Al-Gaphari G., Ba-Alwi F., Moharram A. |
76 |
Applying Model Driven Architecture Approach to Develop Software Systems - Case Study |
Mukhtar M. |
87 |
Towards a Framework for the Curricula of Information Systems in the Arab Universities |
Mustafa S. |
92 |
Hash Algorithm for Data Integrity based on Matrix Combination |
Hamamreh R. and Jamoos M. |
94 |
Analysis of Software Development Processes in Open Source Environment |
Kaur P. and Singh H. |
96 |
Secured Steganography Technique Based Random Function |
Mousa H. |
97 |
From UML 2.0 Interaction Fragments to PROMELA Code Using A Graph Transformation Using AToM3 |
Amirat A. |
98 |
Speech compression based on psychoacoustic model and a general approach for Filter Bank Design using Optimization |
Mourad T., and Adnane C. |
99 |
Social Networks, another Hotbed for Security and Privacy Breaches |
Zineddine M. and Kindi H. |
100 |
Segmentation of MR Images Using Fusion Approach Based Fuzzy Logic Theory |
Chaabane L. and Abdelouahab M. |
104 |
Hybrid Method for Tagging Non-Vocalized Arabic Text Using Quran Corpus |
Hadni M., Ouatik S., Lachkar A. |
105 |
An Arabic Person Named Entity Recognition System |
Al-Taani A. and Al-Abweeny W. |
107 |
Cloud Intellect: Towards Formation of Sustainable Architecture for Cloud Computing |
Shafqat S. and Khan M.N.A. |
108 |
CENTROID-BASED ARABIC CLASSIFIER |
Goweder A., Elboashi M., and Elbekai A. |
109 |
Designing the content of M-Government Framework |
Ameen A. and Mohmad I. |
114 |
Contrast Improvement of Chest Organs in Computed Tomography Images using Image Processing Technique |
Abdallah Y. and Siddig M. |
116 |
PV Panels Fault Detection using WSN Solution |
FEZARI M., BELHOUCHET F., and NOURI H. |
118 |
Mathematical Modeling and Technical Decision by using Fuzzy Method |
Al-waely W. |
120 |
A FRAMEWORK FOR COMPONENT AND ASPECT ORIENTED PROGRAMMING In JAVA |
Hocine B. and Bennouar D. |
121 |
Explanations in Recommender Systems: Overview and Research Approaches |
Al-Taie M. |
122 |
Scaled Bayes Image Denoising Algorithm Using Modified Soft Thresholding Function |
Alqaisi S. |
130 |
Leakage Current and Dynamic Power Analysis of FinFET based 7T SRAM at 45 nm Technology |
Khandelwal S., Raj B., Gupta R. D. |
132 |
Extreme Programming: Strengths and Weaknesses |
Dalalah A. |
133 |
Multimedia Education System for Deaf and Hear Impairment Children |
Elshaiekh N., Mursi B., and Hussein M. |
134 |
FORMAL DEVELOPMENT OF RECONFIGURABLE MANUFACTURING SYSTEMS |
Kahloul L., Chaoui A., and Djouani K. |
136 |
Social Web Services Development Based on MDA: Extending WSDL to Inject Social-QoS |
Errahmani H. and Benslimane S. |
138 |
Geometric Transformation of User Queries in Information Retrieval on the Web |
Aggoune A., Bouramoul A., Kholladi M. |
141 |
A SOFTWARE PRODUCT LINE FOR E-LEARNING APPLICATIONS |
Guendouz A. and Bennouar D. |
142 |
Challenges Facing Small and Medium Enterprises for Implementing Software Process Improvement |
Abd Elsalam M., Viju G K., Ibrahim K., and Jassim M. |
143 |
Using Combinatorial Particle Swarm Optimization to Automatic Service Identification |
Chergui M. and Benslimane S. |
146 |
Improved Eye Detection and Iris Center Tracking with the Outer Corner Eyelashes Occlusion Correction |
Rana S., Islam Z., and Lee C. |
149 |
A dynamic programming approach to document clustering based on term sequence alignment |
Muhammad R., Shaikh S. |
151 |
Design a distributed assistance based Web Service |
Beggari N. and Bouhadada T. |
153 |
Real Time Finger Binary Recognition using Relative Finger-Tip Position |
Zaman A., Islam M., and Lee C. |
155 |
Integrating AHP Application for Project Management |
Alzober W. and Yaakub A. |
156 |
A New Multidimensional Model for the OLAP of Documents Based on Facets |
Khrouf O. and Khrouf K. |
157 |
Algorithms for Contention and Congestion Control (CCC) in Heavily Loaded Networks |
Nithya B and Mala C |
158 |
Comparison of The Workflow Management Systems Bizagi, ProcessMaker and Joget |
Abdelgader M., Dawood A. and Musa M. |
159 |
Using Nested Tables and Multi-pitch Adjusting in Harmony Search (NTMHS) to Solve Timetabling Problem in Object-Relational Model |
Al-Qubati W., Zahary A., and Al-Abbadi A. |
162 |
Integrated Model for Selection the Prequalification Criteria of Contractor |
Alzober W. and Yaakub A. |
163 |
PREDICTING STOCK PRICES USING DATA MINING TECHNIQUES |
Al-Radaideh Q. and Abu Assaf A. |
164 |
UsualSpace; Evolutive-Agents modelling and analysis |
Dbouk M. |
165 |
Simplified Online Signature Verification through Uncompromised Electrode Reduction in Data Gloves. |
Samraj A., Rajendran K. and Sayeed S. |
166 |
Investigation and Optimization of high performance Schmitt trigger at Nanoscale CMOS Technology |
Saxena A., Shrivastava A., and Akashe S. |
167 |
Using supervised learning model for parsing Arabic language |
Khoufi N., louati S., and Aloulou C. |
170 |
New Distributed Research-Oriented Version Control System: Towards Total Traceability of Research Collaboration |
Taieb S., Sliman L., charroux B., Stroppa Y., and Ali F. |
171 |
Automatic speech processing for disabled peoples |
Naim T., Mohamed A., Mounir Z. |
173 |
GA-SVM and MLP-BBO to estimate Robot Manipulator Joint Angles |
Serrat A. and Benyettou M. |
174 |
A Novel Generation of Integrated Development Environment -Around-Trip Visual Software Engineering- |
Bentrad S. |
176 |
Implementing The Classical Poker Method For Testing Randomness In Parallel With MATLAB |
Abdel-Rehim W. |
181 |
Signature Verification System Based on Support Vector Machine Classifier |
Abdelrahman A. and Abdallah A. |
183 |
Management of QoS and Data Freshness in Real-Time Data Warehouses using Feedback Control Scheduling |
Hamdi I., Bouazizi E., and Feki J. |
184 |
Preparing Mathematics teachers to integrate ICT in teaching using TPACK framework / TPACK |
Omer N., Osman I., and Cronjé J. |
186 |
Security in Virtual Private Networks: A review |
Osman E. and Mohamed Y. |
187 |
Self-Healing Network for Web Server Reflected Attacks |
Akilandeswari V. and Mohana Priya P |
191 |
Extending the Technology Acceptance Model for Mobile Government Systems |
Osman N. |
192 |
Biometry: Face Recognition Applying Logistic Model Trees |
Kremic E. and Subasi A. |
194 |
Challenges of Computer Crime Investigation In North Africa's Countries |
Sarrab M., Aldabbas H., and Elbasir M. |