default search action
IIT 2020: Al Ain, United Arab Emirates
- 14th International Conference on Innovations in Information Technology, IIT 2020, Al Ain, United Arab Emirates, November 17-18, 2020. IEEE 2020, ISBN 978-1-7281-8184-4
- R. K. M. S. K. Karunanayake, W. G. Malaka Dananjaya, M. S. Y. Peiris, B. R. I. S. Gunatileka, Shashika Lokuliyana, Anuththara Kuruppu:
CURETO: Skin Diseases Detection Using Image Processing And CNN. 1-6 - Sherzod Turaev, Ali Abd Almisreb, Mohammed Ahmed Saleh:
Application of Transfer Learning for Fruits and Vegetable Quality Assessment. 7-12 - Feda Qaswal, Imad Afyouni, Zaher Al Aghbari:
Can Dynamic Social Events Impact Our Travel Patterns And Trends? 13-17 - Sumbal Malik, Umar Shoaib, Hesham El-Sayed, Manzoor Ahmed Khan:
Query Expansion Framework Leveraging Clinical Diagnosis Information Ontology. 18-23 - Nevien Moawad, Abdelrahman Elsayed:
Smartphone Application for Diagnosing Maize Diseases in Egypt. 24-28 - Tasneem Ali Ghunaim, Ibrahim Kamel, Zaher Al Aghbari:
Framework for Protecting the Confidentiality of Outsourced Data on Cloud. 29-34 - Muhammad Talha Zia, Manzoor Ahmed Khan, Hesham El-Sayed:
Application of Differential Privacy Approach in Healthcare Data - A Case Study. 35-39 - Mohammed Baziyad, Tamer Rabie, Ibrahim Kamel:
A New High Capacity Video Steganography Scheme Using Differential Directional Pixogram. 40-44 - Nour Mohamed, Tamer Rabie, Ibrahim Kamel:
A Review of Color Image Steganalysis in the Transform Domain. 45-50 - Hassan Vakani, Ibrahim Kamel, Tamer Rabie, Mohammed Baziyad:
Towards Improving the Imperceptibility of Steganography Schemes: Adaptive Scaling Approach. 51-56 - Marko Jäntti:
Studying Data Privacy Management in Small and Medium-Sized IT Companies. 57-62 - Rohani Rohan, Debajyoti Pal, Suree Funilkul:
Mapping Gaming Elements with Gamification Categories: Immersion, Achievement, and Social in a MOOC Setting. 63-68 - Murali Manohar S. Kumar, Himanshu Yadav, Dawnee Soman, Ashish Kumar, Arun Kumar Reddy N:
Acoustic Localization for Autonomous Unmanned Systems. 69-74 - Aditya Prasanna, Anagha M. Anil Kumar, Rahul Nagpal:
MarvinEye - Autonomy in Constrained Environment. 75-81 - K. Jairam Naik:
Classification and Scheduling of Information-Centric IoT Applications in Cloud- Fog Computing Architecture (CS_IcIoTA). 82-87 - Rawhi Alrae, Manar AbuTalib, Qassim Nasir:
Information Quality Assessment for the Medical Wearable Devices: Validation Study. 88-95 - Thomas Otte, Hans Aoyang Zhou, Aymen Gannouni, Jonas Odenthal, Anas Abdelrazeq, Frank Hees:
A Manufacturer-Independent Digital Process Platform for Future Construction Sites. 96-101 - Varun Ullanat:
Variational autoencoder as a generative tool to produce de-novo lead compounds for biological targets. 102-107 - Sara Ali Ghunaim, Qassim Nasir, Manar AbuTalib:
Deep Learning Techniques for Automatic Modulation Classification: A Systematic Literature Review. 108-113 - Anfal Attai, Ashraf Elnagar:
A survey on Arabic Image Captioning Systems Using Deep Learning Models. 114-119 - Omnia Kelany, Sherin Aly, Mohamed A. Ismail:
Deep Learning Model for Financial Time Series Prediction. 120-125 - Sudipan Saha, Nasrullah Sheikh, Biplab Banerjee, Sumedh Pendurkar:
Self-supervised Deep Learning for Flower Image Segmentation. 126-130 - Shahriar Shirvani Moghaddam, Kiaksar Shirvani Moghaddam:
Efficient Base-Centric/User-Centric Clustering Algorithms Based on Thresholding and Sorting. 131-136 - Mohammed Imad Aal-Nouman, Noor Qusay A. AlShaikhli, Sarmad M. Hadi:
Enhanced Coordinated Multi Point Scheduling in LTE-Advanced Systems. 137-141 - Nadia Zerguine, Zibouda Aliouat, Mohammed Mostefai, Saad Harous:
M-BEB: Enhanced and Fair Binary Exponential Backoff. 142-147 - Morteza Alijani, Anas Osman:
Performance Improvement of Energy Detection in Cognitive Radio Under Noise Uncertainty. 148-153 - Angela Consoli, Andrew Walters:
Dynamic Reference Information: Formalising Contextual Actionable Information for Contested Environments. 154-159 - Aysha M. Al Sawafi, Mamoun A. Awad:
Citizen Engagement in Smart Government: Content Analysis of Mohammed Bin Rashid Tweets. 160-164 - Mariam Hassan AlThabahi, Manar AbuTalib, Sohail Abbas, Essa Basaeed:
A Survey of Emergency Service Facilities Site Selection (ESFSS) Algorithms. 165-171 - Rana F. Bin Ikrish, Yousef Ajami Alotaibi, Soha B. Sandouka:
Extended Speech Rhythm-Based Analysis of Saudi Dialects Using SAAVB Corpus. 172-177 - Manar Alassaf, Ali Mustafa Qamar:
Aspect-Based Sentiment Analysis of Arabic Tweets in the Education Sector Using a Hybrid Feature Selection Method. 178-185 - Rajneesh Tiwari, Aritra Sen, Arindam Banerjee, Kaushik Dey:
Empirical analysis of generalization through augmentation for classifying images of vernacular handwritten texts. 186-191 - Neha Jain, R. R. Sedamkar:
A Blockchain Technology Approach for the Security and Trust in Trade Finance. 192-197 - Shahtaj Shaukat, Arshid Ali, Amreen Batool, Fehaid Alqahtani, Jan Sher Khan, Arshad Ali, Jawad Ahmad:
Intrusion Detection and Attack Classification Leveraging Machine Learning Technique. 198-202 - Mustafa Alshamkhany, Wisam Alshamkhany, Mohamed Mansour, Mueez Khan, Salam Dhou, Fadi A. Aloul:
Botnet Attack Detection using Machine Learning. 203-208 - Wajid Khan, Sara Ali, Muhammad Usman Shahid Khan, Muhammad Jawad, Mazhar Ali, Raheel Nawaz:
AdaDiffGrad: An Adaptive Batch Size Implementation Technique for DiffGrad Optimization Method. 209-214 - Sumbal Malik, Hesham El-Sayed, Manzoor Ahmed Khan, Henry Alexander Ignatious:
Application of Containerized Microservice Approach to Airline Sentiment Analysis. 215-220 - Tetiana Habuza, Khaled Khalil, Nazar Zaki, Fady Alnajjar, Munkhjargal Gochoo:
Web-based multi-user concurrent job scheduling system on the shared computing resource objects. 221-226 - Solomon Negussie Tesema, El-Bay Bourennane:
Towards General Purpose Object Detection: Deep Dense Grid Based Object Detection. 227-232 - Shadi Eltanani, Ibrahim Ghafir:
Coverage Optimisation for Aerial Wireless Networks. 233-238 - Roberto Lima Junior:
IoT applications for monitoring companion animals: A systematic literature review. 239-246 - Bojan Nokovic, Nebojsa Djosic, Weiyue Owen Li:
API Security Risk Assessment Based on Dynamic ML Models. 247-252 - Ali Abdullah S. AlQahtani, Hosam Alamleh, Jean Gourd, Hatwib Mugasa:
0EI2FA: Zero Effort Indoor Two Factor Authentication. 253-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.