ACIT'2012 Proceedings
9986
ACIT'2025 will be held in Arab Academy for Science, Technology & Maritime Transport, December 16-18, 2025 - Alexandria, Egypt
9986
(A1): Neural Networks and Information Systems
Paper
ID |
Paper |
7016 |
Comparing Neural
Network Algorithm Performance Using SPSS and NeuroSolutions
Harb
,Amjad, Jayousi ,Rashid |
1331 |
FPGA Based Neural
Wireless Sensor Network
Jamel
,Thamer Khamas ,Ban |
13233 |
BREAST CANCER CLASSIFICATION
USING NEURAL NETWORK APPROACH: MLP AND RBF
Raad ,Ali, Kalakech ,Ali, Ayache ,Mohammad |
12895 |
Performance Evaluation
of Face Recognition Algorithms
Dandashi
,Amal, Karam ,Walid |
11971 |
Challenge Facing
Sudanese higher education institutions for implementing the Knowledge Based
Systems
Elshaiekh
,Nour Eldin, Farah ,Nadir, Khalifa ,Khalid |
239 |
Application of spatial
statistical analysis using Geographic Information Systems Gis
Abbas
,Ali aubaid ,saad |
13269 |
Kholladi
,Sirine, Kholladi ,Mohamed-Khireddine |
12894 |
Critical Factors of GIS
Projects Failure in Yemeni Governmental Agencies
Al-Waraqi
,Ghamdan,Zahary ,Ammar |
(A2): Software Engineering
Paper
ID |
Paper |
524 |
Ontology Based Business
Rules Extraction Model and Algorithm (OBBREMA)
Osrof
,Maha |
5524 |
Khalfaoui
,Khaled, Chaoui ,Allaoua, Foudil ,Cherif, Kerkouche ,Elhillali |
11065 |
A Metamodeling Approach
for Software Architecture Evolution
Amirat
,Abdelkrim, Oussalah ,Mourad |
12210 |
FORMALIZING THE MENTAL
MODEL OF A SOFTWARE ARCHITECTURE
GUESSOUM
,Dalila, BENNOUAR ,Djamal |
13054 |
Context-Aware
Reconfiguration of Software Systems
Boudida ,Rima, Belala ,Faiza, Bouanaka ,Chafia |
13078 |
Bridging the Gap
between Design and Implementation for Multi-agent Systems
Elammari
,Mohamed, Aljabour ,Bilal |
13291 |
web data extraction and
establishment of a meta social network
CHARA
,AZIZ, BENLAHMAR ,EL HABIBTRAGHA ,ABDERRAHIM, RACHDI ,MOHAMED, ELGUEMMAT
,KAMAL |
13382 |
Distributed State Space
Generation based Distributed Hash Tables
MATMAT
,Riadh,BENSETIRA ,Imene, SAIDOUNI ,Djamel Eddine |
6369 |
kchaou
,dhikra, Bouassida ,nadia, Ben-Abdallah ,Hanêne |
12438 |
An architecture for
semi-automatic ontology merging system.
AMROUCH
,Siham |
(B1): Algorithms
Paper
ID |
Paper |
5831 |
A modified Tabu Search
algorithm for Solving The Channel Assignment problem
Tounsi
,Abdelkader, Babes ,Malika |
1277 |
A New Adjusted Step
Size Affine Projection Algorithm Designed for Adaptive Filtering System
Jamel
,Thamer |
11154 |
NUMERICAL SIMULTIONS
for 1+2 DIMENSIONAL COUPLED NONLINEAR SCHRÖDINGER EQUATION
Taha
,Thiab, Medikonduru ,Harini |
13238 |
An exact arborescent
method for solving 0-1 knapsack problem
Bouakkaz
,Feriel, Babes ,Malika |
13517 |
Hybrid Scatter Search
Algorithm for 4-Color Mapping Problem
Al-Obaidi
,Mohammed, Sadiq ,Ahmed, Sagheer ,Ali |
7010 |
Stochastic Refusal
Graph for Testing Non-Deterministic Systems
Bouaroudj
,Kenza, Kitouni ,Ilham,Hachichi ,Hiba, Saidouni ,Djamel-Eddine |
(B2): AI & Expert Systems
Paper
ID |
Paper |
1085 |
Incremental Inductive
Learning Algorithm (I-ILA)
Taradeh
,Saher |
4210 |
ALI
,KHATTAB, Hamed ,Raed |
6825 |
Finding an Optimal Path
Planning for Multiple Robots Using Genetic Algorithms
Huwedi
,Ashraf, Budabbus ,Salem |
5464 |
Distributed
optimization methods in the emergency management context
Ibri
,Sarah |
12923 |
Al-Qubati
,Wadee, Zahary ,Ammar, Al-Hegami ,Ahmed |
13265 |
A secure protocol to
protect ambient agents group
BOUCHEMAL
,Nardjes, MAAMRI ,Ramdane |
(B3): Parallel & Distributed Systems
Paper
ID |
Paper |
13246 |
Services Composition checking
approach based on Graph Transformation
Nouara
,Redouane, Chaoui ,Allaoua |
13023 |
Distributed Algorithm
to design telecommunication Capacitated Survivable Network
KHELIFI
,MERIEM, BABES ,MALIKA |
6829 |
Fault-Tolerant Storage
System for Cloud Datacenters
shaout
,adnan, Sreedharan ,Sreekant |
4267 |
Nashwan
,Imad, Nashwan ,Shadi |
6696 |
Nashwan
,Imad |
(C1): Arabic Language Processing
(C2): E-Learning, E-Government and E-Management
Paper
ID |
Paper |
379 |
Building e-management
depend on waterfall model
aljasim
,omar |
2196 |
The impact of the
culture on the e-readiness for e-government in developing countries (Yemen)
Al-eryani
,Arwa Rashed ,Abdullah |
4781 |
E-learning at school
level : challenges and benefits
Dargham
,Joumana, Mcheick ,Hamid,Saeed ,Dana |
12337 |
Automatic
classification of learners e-mails
Neji
,mahmoud, mellouli ,manel, aloui ,awatef |
13278 |
Semantic indexing of
algorithms courses based on a new ontology
EL
Guemmat ,Kamal,Benlahmer ,Elhabib, Talea ,Mohamed,Chara ,Aziz, Rachdi
,Mohamed |
13226 |
Usability Evaluation of
Some Lebanese Universities Web Portals
Abu
Daher ,Layal, Elkabani ,Islam |
12869 |
IMPACTS OF DATA
WAREHOUSE EVOLUTION ON DATA MARTS
FEKI
,Jamel,TAKTAK ,Said |
13300 |
Said
,FARAH, Abdelhalim ,BENACHENHOU |
(C3): Computer Networks and Digital Telecommunications
Paper
ID |
Paper |
13035 |
Biologically Inspired
Protocol for Securing A class of Networks: A Case Study
Mohamed
,Yasir |
13285 |
Analysis of QoS
parameters of VOIP calls over Wireless Local Area Networks
Wazwaz
,Ayman, Sweity ,Duaa, Nimer ,Dana, Nassar ,Wafaa |
11509 |
Fault Tolerance Mobile
Agent Execution System (FTMAS) Modeling
Al
Dweik, Wazwaz ,Amal |
5771 |
Development of GSM
Mobile Towers Distributing
Al-Rawi
,Salah, Ali ,Muhannad, George ,Loay |
6199 |
Enhancing Throughput of
Space Time System Using Variable Code Rate and Modulation
Mosleh
,Mahmood F., Majeed ,Aseel H., Shareef ,Oras A. |
8996 |
Secure Mobile Clients
using Elliptic Curve for WMN
Hamamreh
,Rushdi, Melhem ,Anas |
12668 |
Hassam
,Abdelouahab, Kasmi ,Boucetta, Boubezoula ,Mabrouk |
12673 |
Mobile Robot Navigation
in Unknown Environment Using Improved APF Method
Hamani
,Miloud, Hassam ,Abdelouahab |
(D1): Image Processing
Paper
ID |
Paper |
6515 |
An Iterative
Mammographic Image Thresholding Algorithm For Breast Cancer Detection
Alayli
,Roula, El Zaart ,Ali |
13225 |
A New Edge Detector
Using Log-Normal Distribution
El-Zaart ,Ali, Al-jibory ,Wafaa, Almaslukh , Bandar |
13271 |
Image Segmentation
Using Edge Detection and Thresholding
Saif
,Jamil, Al-Kubati ,Ali ,Hazaa ,Abdultawab, Almoraish ,Mohammed |
7103 |
Mammogram Enhancement
and Segmentation Methods: Classification, Analysis, and Evaluation
Biltawi ,Mariam,Al-Najdawi ,Nijad, Tedmori ,Sara |
10108 |
REAL-TIME DISPARITY MAP
COMPUTATION BASED ON DISPARITY SPACE IMAGE
BAHA
,Nadia, LARABI ,Slimane |
6572 |
Parametric Watermarking
Based Ownership Judgment
Rasheed
,Waleed A.J, Ali ,Hamza Abbass |
4786 |
Skin Cancer Image
Segmentation & Detection by using Unsupervised Neural Networks (UNN)
Azmi
Shawkat Abdulbaki |
12698 |
Silhouettes Retrieval
based on the Quad-tree Structure following an XML Description
AOUAT
,Saliha, LARABI ,Slimane |
(D2): Information Security
Paper
ID |
Paper |
1264 |
Proposal Design:
Fingerprint Random Number Generators
Salman
,Hana'a |
12195 |
Combating of email SPAM
by different businesses in Saudi Arabia
Alkahtani
,Hasan Shojaa, Goodwin ,Dr. Robert, Gardner-Stephen ,Dr. Paul |
12434 |
Electronic Prescribing
Systems in Lebanon: A Readiness Assessment
Melki
,Antoine, Bitar ,Amine Bitar ,Amine |
12512 |
Fuzzy Bio-Cryptography
Key Generation
Salman
,Hanaa, Hadi ,Hilal |
13219 |
Strong Key Machanism
Generated by LFSR based Vigenère Cipher
Razzaq
,Abdul, Abdul Razzaq ,Abdul Razzaq |
13301 |
Abdella
,mohammed, Maatuk ,Abdelsalam, Mohammed ,Abdelhamid |
13064 |
Design a Text-Prompt
Speaker Recognition System using LPC-derived Features
Al-Hassani
,Dr Mustafa Dhiaa, Kadhim ,Dr Abdul-Karim A-R. |
(D3): Internet & the Web
Paper
ID |
Paper |
3271 |
Cloud Based Module
Configuration
shaout ,adnan,
Vangelov ,John |
7106 |
A Review of Web Search
Engine Applications: InfoSpider, WACO, WebComb and ContentUsageAnts Models
ISSA
,TAROUB |
13286 |
Enrichment of Queries
for Education Domain
Rachdi
,Mohamed, Benlahmar ,El Habib, Labriji ,El Hassan, Chara ,Aziz, El Guemmat
,Kamal |
12524 |
A New Cloud computing
framework based on mobile agents for web services discovery and selection.
Saouli
,Hamza, Kazar ,Okba, Benharkat ,Aïcha-Nabila |
13302 |
Formal Semantics of web
Services Composition based on Colored Petri Nets and Graph Grammars
Chemaa
,Sofiane, Elmansouri ,Raida, Chaoui ,Allaoua |
12861 |
Bounded Liveness in
Semantic Web Services
Boumaza
,Amel, Maamri ,ramdane |
13292 |
BPMN’s meta-model extension
with deployment and security information
Rekik
,Mouna, Boukadi ,Khouloud, Ben-Abdallah ,Hanene |