


default search action
IIT 2020: Al Ain, United Arab Emirates
- 14th International Conference on Innovations in Information Technology, IIT 2020, Al Ain, United Arab Emirates, November 17-18, 2020. IEEE 2020, ISBN 978-1-7281-8184-4

- R. K. M. S. K. Karunanayake, W. G. Malaka Dananjaya, M. S. Y. Peiris, B. R. I. S. Gunatileka, Shashika Lokuliyana

, Anuththara Kuruppu:
CURETO: Skin Diseases Detection Using Image Processing And CNN. 1-6 - Sherzod Turaev

, Ali Abd Almisreb
, Mohammed Ahmed Saleh:
Application of Transfer Learning for Fruits and Vegetable Quality Assessment. 7-12 - Feda Qaswal, Imad Afyouni, Zaher Al Aghbari:

Can Dynamic Social Events Impact Our Travel Patterns And Trends? 13-17 - Sumbal Malik

, Umar Shoaib, Hesham El-Sayed, Manzoor Ahmed Khan:
Query Expansion Framework Leveraging Clinical Diagnosis Information Ontology. 18-23 - Nevien Moawad, Abdelrahman Elsayed

:
Smartphone Application for Diagnosing Maize Diseases in Egypt. 24-28 - Tasneem Ali Ghunaim

, Ibrahim Kamel, Zaher Al Aghbari:
Framework for Protecting the Confidentiality of Outsourced Data on Cloud. 29-34 - Muhammad Talha Zia, Manzoor Ahmed Khan, Hesham El-Sayed:

Application of Differential Privacy Approach in Healthcare Data - A Case Study. 35-39 - Mohammed Baziyad, Tamer Rabie, Ibrahim Kamel:

A New High Capacity Video Steganography Scheme Using Differential Directional Pixogram. 40-44 - Nour Mohamed

, Tamer Rabie, Ibrahim Kamel:
A Review of Color Image Steganalysis in the Transform Domain. 45-50 - Hassan Vakani, Ibrahim Kamel, Tamer Rabie, Mohammed Baziyad:

Towards Improving the Imperceptibility of Steganography Schemes: Adaptive Scaling Approach. 51-56 - Marko Jäntti

:
Studying Data Privacy Management in Small and Medium-Sized IT Companies. 57-62 - Rohani Rohan

, Debajyoti Pal, Suree Funilkul:
Mapping Gaming Elements with Gamification Categories: Immersion, Achievement, and Social in a MOOC Setting. 63-68 - Murali Manohar S. Kumar, Himanshu Yadav

, Dawnee Soman, Ashish Kumar, Arun Kumar Reddy N:
Acoustic Localization for Autonomous Unmanned Systems. 69-74 - Aditya Prasanna, Anagha M. Anil Kumar, Rahul Nagpal:

MarvinEye - Autonomy in Constrained Environment. 75-81 - K. Jairam Naik:

Classification and Scheduling of Information-Centric IoT Applications in Cloud- Fog Computing Architecture (CS_IcIoTA). 82-87 - Rawhi Alrae, Manar AbuTalib, Qassim Nasir:

Information Quality Assessment for the Medical Wearable Devices: Validation Study. 88-95 - Thomas Otte

, Hans Aoyang Zhou, Aymen Gannouni
, Jonas Odenthal
, Anas Abdelrazeq, Frank Hees:
A Manufacturer-Independent Digital Process Platform for Future Construction Sites. 96-101 - Varun Ullanat:

Variational autoencoder as a generative tool to produce de-novo lead compounds for biological targets. 102-107 - Sara Ali Ghunaim, Qassim Nasir, Manar AbuTalib:

Deep Learning Techniques for Automatic Modulation Classification: A Systematic Literature Review. 108-113 - Anfal Attai, Ashraf Elnagar

:
A survey on Arabic Image Captioning Systems Using Deep Learning Models. 114-119 - Omnia Kelany, Sherin Aly, Mohamed A. Ismail:

Deep Learning Model for Financial Time Series Prediction. 120-125 - Sudipan Saha, Nasrullah Sheikh, Biplab Banerjee, Sumedh Pendurkar:

Self-supervised Deep Learning for Flower Image Segmentation. 126-130 - Shahriar Shirvani Moghaddam, Kiaksar Shirvani Moghaddam:

Efficient Base-Centric/User-Centric Clustering Algorithms Based on Thresholding and Sorting. 131-136 - Mohammed Imad Aal-Nouman

, Noor Qusay A. AlShaikhli, Sarmad M. Hadi:
Enhanced Coordinated Multi Point Scheduling in LTE-Advanced Systems. 137-141 - Nadia Zerguine, Zibouda Aliouat

, Mohammed Mostefai, Saad Harous
:
M-BEB: Enhanced and Fair Binary Exponential Backoff. 142-147 - Morteza Alijani

, Anas Osman:
Performance Improvement of Energy Detection in Cognitive Radio Under Noise Uncertainty. 148-153 - Angela Consoli, Andrew Walters:

Dynamic Reference Information: Formalising Contextual Actionable Information for Contested Environments. 154-159 - Aysha M. Al Sawafi, Mamoun A. Awad:

Citizen Engagement in Smart Government: Content Analysis of Mohammed Bin Rashid Tweets. 160-164 - Mariam Hassan AlThabahi, Manar AbuTalib, Sohail Abbas, Essa Basaeed:

A Survey of Emergency Service Facilities Site Selection (ESFSS) Algorithms. 165-171 - Rana F. Bin Ikrish, Yousef Ajami Alotaibi

, Soha B. Sandouka
:
Extended Speech Rhythm-Based Analysis of Saudi Dialects Using SAAVB Corpus. 172-177 - Manar Alassaf, Ali Mustafa Qamar

:
Aspect-Based Sentiment Analysis of Arabic Tweets in the Education Sector Using a Hybrid Feature Selection Method. 178-185 - Rajneesh Tiwari, Aritra Sen, Arindam Banerjee, Kaushik Dey:

Empirical analysis of generalization through augmentation for classifying images of vernacular handwritten texts. 186-191 - Neha Jain, R. R. Sedamkar:

A Blockchain Technology Approach for the Security and Trust in Trade Finance. 192-197 - Shahtaj Shaukat, Arshid Ali, Amreen Batool

, Fehaid Alqahtani, Jan Sher Khan
, Arshad Ali
, Jawad Ahmad:
Intrusion Detection and Attack Classification Leveraging Machine Learning Technique. 198-202 - Mustafa Alshamkhany, Wisam Alshamkhany, Mohamed Mansour, Mueez Khan, Salam Dhou, Fadi A. Aloul:

Botnet Attack Detection using Machine Learning. 203-208 - Wajid Khan, Sara Ali

, Muhammad Usman Shahid Khan, Muhammad Jawad
, Mazhar Ali, Raheel Nawaz
:
AdaDiffGrad: An Adaptive Batch Size Implementation Technique for DiffGrad Optimization Method. 209-214 - Sumbal Malik

, Hesham El-Sayed, Manzoor Ahmed Khan, Henry Alexander Ignatious:
Application of Containerized Microservice Approach to Airline Sentiment Analysis. 215-220 - Tetiana Habuza

, Khaled Khalil, Nazar Zaki, Fady Alnajjar, Munkhjargal Gochoo
:
Web-based multi-user concurrent job scheduling system on the shared computing resource objects. 221-226 - Solomon Negussie Tesema, El-Bay Bourennane

:
Towards General Purpose Object Detection: Deep Dense Grid Based Object Detection. 227-232 - Shadi Eltanani

, Ibrahim Ghafir:
Coverage Optimisation for Aerial Wireless Networks. 233-238 - Roberto Lima Junior:

IoT applications for monitoring companion animals: A systematic literature review. 239-246 - Bojan Nokovic, Nebojsa Djosic, Weiyue Owen Li:

API Security Risk Assessment Based on Dynamic ML Models. 247-252 - Ali Abdullah S. AlQahtani, Hosam Alamleh

, Jean Gourd, Hatwib Mugasa:
0EI2FA: Zero Effort Indoor Two Factor Authentication. 253-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














