ACIT'2012 Proceedings
9388
ACIT'2024 will be held in Zarqa University, December 10-12, 2024 -Zarqa, Jordan
ACIT
The International Arab Conference on Information Technology (ACIT) is a technical-scientific specialized conference. It is held periodically in the Arab homeland. All its bodies emerge from the Colleges of Computing and Information Society (CCIS), stemming from the Association of Arab Universities. This conference is considered the official scientific conference for CCIS. Zarqa University in Jordan has been selected to be the permanent residence for its General Secretariat.
9388
(A1): Neural Networks and Information Systems
Paper
ID |
Paper |
7016 |
Comparing Neural
Network Algorithm Performance Using SPSS and NeuroSolutions
Harb
,Amjad, Jayousi ,Rashid |
1331 |
FPGA Based Neural
Wireless Sensor Network
Jamel
,Thamer Khamas ,Ban |
13233 |
BREAST CANCER CLASSIFICATION
USING NEURAL NETWORK APPROACH: MLP AND RBF
Raad ,Ali, Kalakech ,Ali, Ayache ,Mohammad |
12895 |
Performance Evaluation
of Face Recognition Algorithms
Dandashi
,Amal, Karam ,Walid |
11971 |
Challenge Facing
Sudanese higher education institutions for implementing the Knowledge Based
Systems
Elshaiekh
,Nour Eldin, Farah ,Nadir, Khalifa ,Khalid |
239 |
Application of spatial
statistical analysis using Geographic Information Systems Gis
Abbas
,Ali aubaid ,saad |
13269 |
Kholladi
,Sirine, Kholladi ,Mohamed-Khireddine |
12894 |
Critical Factors of GIS
Projects Failure in Yemeni Governmental Agencies
Al-Waraqi
,Ghamdan,Zahary ,Ammar |
(A2): Software Engineering
Paper
ID |
Paper |
524 |
Ontology Based Business
Rules Extraction Model and Algorithm (OBBREMA)
Osrof
,Maha |
5524 |
Khalfaoui
,Khaled, Chaoui ,Allaoua, Foudil ,Cherif, Kerkouche ,Elhillali |
11065 |
A Metamodeling Approach
for Software Architecture Evolution
Amirat
,Abdelkrim, Oussalah ,Mourad |
12210 |
FORMALIZING THE MENTAL
MODEL OF A SOFTWARE ARCHITECTURE
GUESSOUM
,Dalila, BENNOUAR ,Djamal |
13054 |
Context-Aware
Reconfiguration of Software Systems
Boudida ,Rima, Belala ,Faiza, Bouanaka ,Chafia |
13078 |
Bridging the Gap
between Design and Implementation for Multi-agent Systems
Elammari
,Mohamed, Aljabour ,Bilal |
13291 |
web data extraction and
establishment of a meta social network
CHARA
,AZIZ, BENLAHMAR ,EL HABIBTRAGHA ,ABDERRAHIM, RACHDI ,MOHAMED, ELGUEMMAT
,KAMAL |
13382 |
Distributed State Space
Generation based Distributed Hash Tables
MATMAT
,Riadh,BENSETIRA ,Imene, SAIDOUNI ,Djamel Eddine |
6369 |
kchaou
,dhikra, Bouassida ,nadia, Ben-Abdallah ,Hanêne |
12438 |
An architecture for
semi-automatic ontology merging system.
AMROUCH
,Siham |
(B1): Algorithms
Paper
ID |
Paper |
5831 |
A modified Tabu Search
algorithm for Solving The Channel Assignment problem
Tounsi
,Abdelkader, Babes ,Malika |
1277 |
A New Adjusted Step
Size Affine Projection Algorithm Designed for Adaptive Filtering System
Jamel
,Thamer |
11154 |
NUMERICAL SIMULTIONS
for 1+2 DIMENSIONAL COUPLED NONLINEAR SCHRÖDINGER EQUATION
Taha
,Thiab, Medikonduru ,Harini |
13238 |
An exact arborescent
method for solving 0-1 knapsack problem
Bouakkaz
,Feriel, Babes ,Malika |
13517 |
Hybrid Scatter Search
Algorithm for 4-Color Mapping Problem
Al-Obaidi
,Mohammed, Sadiq ,Ahmed, Sagheer ,Ali |
7010 |
Stochastic Refusal
Graph for Testing Non-Deterministic Systems
Bouaroudj
,Kenza, Kitouni ,Ilham,Hachichi ,Hiba, Saidouni ,Djamel-Eddine |
(B2): AI & Expert Systems
Paper
ID |
Paper |
1085 |
Incremental Inductive
Learning Algorithm (I-ILA)
Taradeh
,Saher |
4210 |
ALI
,KHATTAB, Hamed ,Raed |
6825 |
Finding an Optimal Path
Planning for Multiple Robots Using Genetic Algorithms
Huwedi
,Ashraf, Budabbus ,Salem |
5464 |
Distributed
optimization methods in the emergency management context
Ibri
,Sarah |
12923 |
Al-Qubati
,Wadee, Zahary ,Ammar, Al-Hegami ,Ahmed |
13265 |
A secure protocol to
protect ambient agents group
BOUCHEMAL
,Nardjes, MAAMRI ,Ramdane |
(B3): Parallel & Distributed Systems
Paper
ID |
Paper |
13246 |
Services Composition checking
approach based on Graph Transformation
Nouara
,Redouane, Chaoui ,Allaoua |
13023 |
Distributed Algorithm
to design telecommunication Capacitated Survivable Network
KHELIFI
,MERIEM, BABES ,MALIKA |
6829 |
Fault-Tolerant Storage
System for Cloud Datacenters
shaout
,adnan, Sreedharan ,Sreekant |
4267 |
Nashwan
,Imad, Nashwan ,Shadi |
6696 |
Nashwan
,Imad |
(C1): Arabic Language Processing
(C2): E-Learning, E-Government and E-Management
Paper
ID |
Paper |
379 |
Building e-management
depend on waterfall model
aljasim
,omar |
2196 |
The impact of the
culture on the e-readiness for e-government in developing countries (Yemen)
Al-eryani
,Arwa Rashed ,Abdullah |
4781 |
E-learning at school
level : challenges and benefits
Dargham
,Joumana, Mcheick ,Hamid,Saeed ,Dana |
12337 |
Automatic
classification of learners e-mails
Neji
,mahmoud, mellouli ,manel, aloui ,awatef |
13278 |
Semantic indexing of
algorithms courses based on a new ontology
EL
Guemmat ,Kamal,Benlahmer ,Elhabib, Talea ,Mohamed,Chara ,Aziz, Rachdi
,Mohamed |
13226 |
Usability Evaluation of
Some Lebanese Universities Web Portals
Abu
Daher ,Layal, Elkabani ,Islam |
12869 |
IMPACTS OF DATA
WAREHOUSE EVOLUTION ON DATA MARTS
FEKI
,Jamel,TAKTAK ,Said |
13300 |
Said
,FARAH, Abdelhalim ,BENACHENHOU |
(C3): Computer Networks and Digital Telecommunications
Paper
ID |
Paper |
13035 |
Biologically Inspired
Protocol for Securing A class of Networks: A Case Study
Mohamed
,Yasir |
13285 |
Analysis of QoS
parameters of VOIP calls over Wireless Local Area Networks
Wazwaz
,Ayman, Sweity ,Duaa, Nimer ,Dana, Nassar ,Wafaa |
11509 |
Fault Tolerance Mobile
Agent Execution System (FTMAS) Modeling
Al
Dweik, Wazwaz ,Amal |
5771 |
Development of GSM
Mobile Towers Distributing
Al-Rawi
,Salah, Ali ,Muhannad, George ,Loay |
6199 |
Enhancing Throughput of
Space Time System Using Variable Code Rate and Modulation
Mosleh
,Mahmood F., Majeed ,Aseel H., Shareef ,Oras A. |
8996 |
Secure Mobile Clients
using Elliptic Curve for WMN
Hamamreh
,Rushdi, Melhem ,Anas |
12668 |
Hassam
,Abdelouahab, Kasmi ,Boucetta, Boubezoula ,Mabrouk |
12673 |
Mobile Robot Navigation
in Unknown Environment Using Improved APF Method
Hamani
,Miloud, Hassam ,Abdelouahab |
(D1): Image Processing
Paper
ID |
Paper |
6515 |
An Iterative
Mammographic Image Thresholding Algorithm For Breast Cancer Detection
Alayli
,Roula, El Zaart ,Ali |
13225 |
A New Edge Detector
Using Log-Normal Distribution
El-Zaart ,Ali, Al-jibory ,Wafaa, Almaslukh , Bandar |
13271 |
Image Segmentation
Using Edge Detection and Thresholding
Saif
,Jamil, Al-Kubati ,Ali ,Hazaa ,Abdultawab, Almoraish ,Mohammed |
7103 |
Mammogram Enhancement
and Segmentation Methods: Classification, Analysis, and Evaluation
Biltawi ,Mariam,Al-Najdawi ,Nijad, Tedmori ,Sara |
10108 |
REAL-TIME DISPARITY MAP
COMPUTATION BASED ON DISPARITY SPACE IMAGE
BAHA
,Nadia, LARABI ,Slimane |
6572 |
Parametric Watermarking
Based Ownership Judgment
Rasheed
,Waleed A.J, Ali ,Hamza Abbass |
4786 |
Skin Cancer Image
Segmentation & Detection by using Unsupervised Neural Networks (UNN)
Azmi
Shawkat Abdulbaki |
12698 |
Silhouettes Retrieval
based on the Quad-tree Structure following an XML Description
AOUAT
,Saliha, LARABI ,Slimane |
(D2): Information Security
Paper
ID |
Paper |
1264 |
Proposal Design:
Fingerprint Random Number Generators
Salman
,Hana'a |
12195 |
Combating of email SPAM
by different businesses in Saudi Arabia
Alkahtani
,Hasan Shojaa, Goodwin ,Dr. Robert, Gardner-Stephen ,Dr. Paul |
12434 |
Electronic Prescribing
Systems in Lebanon: A Readiness Assessment
Melki
,Antoine, Bitar ,Amine Bitar ,Amine |
12512 |
Fuzzy Bio-Cryptography
Key Generation
Salman
,Hanaa, Hadi ,Hilal |
13219 |
Strong Key Machanism
Generated by LFSR based Vigenère Cipher
Razzaq
,Abdul, Abdul Razzaq ,Abdul Razzaq |
13301 |
Abdella
,mohammed, Maatuk ,Abdelsalam, Mohammed ,Abdelhamid |
13064 |
Design a Text-Prompt
Speaker Recognition System using LPC-derived Features
Al-Hassani
,Dr Mustafa Dhiaa, Kadhim ,Dr Abdul-Karim A-R. |
(D3): Internet & the Web
Paper
ID |
Paper |
3271 |
Cloud Based Module
Configuration
shaout ,adnan,
Vangelov ,John |
7106 |
A Review of Web Search
Engine Applications: InfoSpider, WACO, WebComb and ContentUsageAnts Models
ISSA
,TAROUB |
13286 |
Enrichment of Queries
for Education Domain
Rachdi
,Mohamed, Benlahmar ,El Habib, Labriji ,El Hassan, Chara ,Aziz, El Guemmat
,Kamal |
12524 |
A New Cloud computing
framework based on mobile agents for web services discovery and selection.
Saouli
,Hamza, Kazar ,Okba, Benharkat ,Aïcha-Nabila |
13302 |
Formal Semantics of web
Services Composition based on Colored Petri Nets and Graph Grammars
Chemaa
,Sofiane, Elmansouri ,Raida, Chaoui ,Allaoua |
12861 |
Bounded Liveness in
Semantic Web Services
Boumaza
,Amel, Maamri ,ramdane |
13292 |
BPMN’s meta-model extension
with deployment and security information
Rekik
,Mouna, Boukadi ,Khouloud, Ben-Abdallah ,Hanene |
Zarqa University P.O. Box 132010
+962-5-3821100 / ext 1451
This email address is being protected from spambots. You need JavaScript enabled to view it.