Accepted Papers

Accepted Papers
   

Paper Number:   15
Paper Title:   Genetic Algorithm for Compressing Sound Data
Author(s):     Dr. Mohammed Abbas Fadhel Al-Husainy

 


Paper Number:   16
Paper Title:   Hiding a 256 Color Image in True Type Image
Author(s):    Lala Zareh Krikor, Mahmoud Yousef Al-Kurdi, and Sami E. I. Baba


Paper Number:   25
Paper Title:    A Suggestion for Protecting E-Mail in e-Government Applications
Author(s):   Alaa Hussain Al-hamami and Saad A. Al-Anni


Paper Number:   30
Paper Title:   A Segmentation Technique to Handwritten Word Recognition
Author(s):   Mohamed Senouci, Abdelkarim Liazid, and Hadj Ali Beghdadi


Paper Number:   34
Paper Title:   Data Security Based on Neural Networks
Author(s):   Hamid Abdullah Jalab, Hamid A.Jalab, and Khaled M.G.Noaman


Paper Number:   35
Paper Title:   An Edge-Based Method for Printed Arabic Character Recognition
Author(s):   Abbas H. Hassin


Paper Number:   36
Paper Title:   Moving Object Tracking with an Active Camera Using Improved One at a Time Algorithm (OTA)
Author(s):   Faisel Ghazee Mohamed, Nabeel Jameel Tawfiq, and Wijdan Abdul Ameer


Paper Number:   39
Paper Title:   Arabic Writer Identification from Handwriting Images
Author(s):   laheeb Mohammad Al-zoubaidy and Hanaa Fathee Al_najar


Paper Number:   40
Paper Title:   Designing Digital Electronic Circuits by Genetic Algorithm
Author(s):   Safa Amir Najim Al-salahi


Paper Number:   46
Paper Title:   Package Development for Wireless Communication Systems
Author(s):   Manar Younis Ahmed Kashmola and Bayez K. Al-Sulaiyfanie


Paper Number:   48
Paper Title:   Fuzzy Based Approach to Intelligent Game Design
Author(s):   Adnan Shaout, Brady King, and Luke Reisner


Paper Number:   49
Paper Title:   Face Recognition System Using SVD and Neural Network
Author(s):   Othman O. Khalifa, Yuslina Binti Kamarudin, and Thaaherah Shireen


Paper Number:   52
Paper Title:   An Efficient Algorithm for Checking Path Existence Between Graph Vertices
Author(s):   Nabil Arman


Paper Number:   57
Paper Title:   Object Oreinted Framework for Distributed File System
Author(s):   Radwan F. Qasrawi and Badie Sartawi


Paper Number:   58
Paper Title:   On Ant Colony Optimization and Its New Directions
Author(s):   Yasser El-Sonbaty and Amgad Neematallah


Paper Number:   64
Paper Title:   On Ant Colony Optimization and Its New Directions
Author(s):   Alaa E Aljanaby, Ku Ruhana Ku Mahamud, and NoritaMd. Norwawi


Paper Number:   65
Paper Title:   A Fuzzy-based Routes Lifetime Estimation for Ad-hoc Networks
Author(s):   Essam Natsheh, Sabira Khatun, and Adznan Jantan


Paper Number:   68
Paper Title:   Voice Transformation for Very Low Bit Rate Speech Coders
Author(s):   Dalia Ribhi Kalouti, Omimah Radwan Silmi, and Hanna Abdel Nour


Paper Number:   70
Paper Title:   Mobile Learning Applications in Wieless Classrooms
Author(s):   Radwan F. Qasrawi and Badie Sartawi


Paper Number:   71
Paper Title:   English Language Content Management System
Author(s):   Samuel R. J., and Zaitun A. B.


Paper Number:   72
Paper Title:   The Development of an Online SVG Based Point Map Animation Server
Author(s):   Phua Yeong Sann, and Zaitun A. B.


Paper Number:   75
Paper Title:   Networks Security: Risk Management and Economics in Information Technology
Author(s):   Nicolas Sklavos, Panagiwtis Souras, and Abdoul Rjoub


Paper Number:   76
Paper Title:   SIG for the Management and the Follow-up of the Landslides of the Constantine City
Author(s):   Mohamed-Khireddine Kholladi


Paper Number:   79
Paper Title:   The Adaptive and Predictive Diagnosis for the Industrial Process
Author(s):   Salhi Fairouz, Medjeldi Tayeb, Atoui Sakina, Sebbagh Abdennour, and Hamdaoui khayra


Paper Number:   80
Paper Title:   A Cross-language Information Retrieval Based on an Arabic Ontology in the Legal Domain
Author(s):   Soraya Zaidi and Mohamed Tayeb Laskri


Paper Number:   81
Paper Title:   Assessment of Diabetic Retinopathy by Automatic Detecting of Pathological Patterns
Author(s):   Benblidia Nadjia, Reguieg Fatma Zohra, and Guessoum Abderrezak


Paper Number:   83
Paper Title:   A Coalition Formation-based Negotiation Model for the Cooperative Information Systems
Author(s):   Bouzidi Sabrina and Zarour Nacereddine


Paper Number:   84
Paper Title:   A Heuristic Method for Malaria Detection
Author(s):   Ali Al-Hamdi, Sami Alboukhaiti, and Basim Alfaquih


Paper Number:   86
Paper Title:   Fast Pursuit of Mobile Nodes in Road Networks
Author(s):   Sahar Idwan and Dinesh Mehta


Paper Number:   88
Paper Title:   Arabic Part-of-Speech Tagger Based Neural Networks
Author(s):   Jabar Hassan Yousif and Tengku M. Tengku


Paper Number:   89
Paper Title:   Mobility and Wireless MAC Protocols in MANETs
Author(s):   Djemel Djenouri, Mohamed Bouznada, and Faten Khiat


Paper Number:   93
Paper Title:   Using the Brill Part of Speech Tagger for Modern Standard Arabic
Author(s):   Massaoud Abuzed and Mohamed Arteimi


Paper Number:   95
Paper Title:   Ant Colony System for Real-Time Scheduling with Timing, Precedence and Exclusion Constraints
Author(s):   Yacine Laalaoui, Emmanuel Grolleau, and Habiba Drias


Paper Number:   96
Paper Title:   Boolean Query Optimization Using Genetic Algorithms And Fuzzy Theorm
Author(s):   Suhail Sami Jebour Owais, Pavel Kromer, and Vaclav Snasel


Paper Number:   99
Paper Title:   Design of a Voice Command System for an Electric Wheelchair
Author(s):   Mohamed Fezari, Mounir Bousbia-Salah, and Mouldi Bedda


Paper Number:   100
Paper Title:   Non-atomicity in Timed Models
Author(s):   Nabil Belala and Djamel-Eddine Saïdouni


Paper Number:   101
Paper Title:   Autonomous Agents-based Approach for Color Image Segmentation
Author(s):   Ouadfel Salima and Batouche Mohamed


Paper Number:   103
Paper Title:   Guiding Design Pattern Reuse
Author(s):   Nadia Bouassida and Hanene Ben Abdallah


Paper Number:    106
Paper Title:   The Development of a Web Based Assignment Management and Monitoring
Author(s):   Mee Chin Wee and Zaitun A. B


Paper Number:    110
Paper Title:   Retro Design and UML Modeling by Machine Learning
Author(s):   Chérifa Boudia, Baghdad Atmani, and Bouziane Beldjilali


Paper Number:    111
Paper Title:   Identification of Biological Data Issues and Challenges Through Real World Examples
Author(s):   Syed Muhammad Ahsan and Abad Ali Shah


Paper Number:    113
Paper Title:   Need for Cooperation Between Academia and Industry in Developing Countries
Author(s):   Syed Muhammad Ahsan and Abad Ali Shah


Paper Number:    114
Paper Title:   Algorithms for the Recognition of the Connected Arab Digits Based on Continuous Hidden Markov Models
Author(s):   S. Atoui and M.Bedda


Paper Number:    120
Paper Title:   معالجة وتحليل قاعدة البيانات في نظم المعلومات الجغرافي
Author(s):   Ali Abd Al-azawy


Paper Number:    122
Paper Title:   Simulation and Comparison of Denoising Techniques in Speech Processing
Author(s):   Talbi Mourad and Bouafif Lamia


Paper Number:    127
Paper Title:   DSP Implementation of Enhanced Multistage Detector with Parallel Interference Cancellation for DS-CDMA System
Author(s):   Sedki bakir Al-Abdally and Bayez K. Al-Sulaifanie


Paper Number:    135
Paper Title:   Flame Recognition and Finding its Center in Digital Color Images
Author(s):   Khalil I. Alsaif and Luma Akram


Paper Number:    137
Paper Title:   PDE-based Image Sharpening in the Presence of Noise
Author(s):   Salim Bettahar and Amine Boudghene Stambouli


Paper Number:    139
Paper Title:   Modulaire Implimentation of Aspectual Requirements
Author(s):   Amirat Abdelkrim and Laskri Mohamed Tayeb


Paper Number:    140
Paper Title:   Grid Computing Services Implementation
Author(s):   Sultan Salim AL-Yahyai and Abderezak Touzene


Paper Number:    141
Paper Title:   Recognizing Isolated Handwritten Arabic Characters Using Hybrid of Modified Directional Element Feature and General Aut associative Memory
Author(s):   Amer AL-Nassiri


Paper Number:    142
Paper Title:   Morphometric Appreciation of Mammary Breast Calcifications Around Multiresolution Analysis by Inertia and Frequentiel Factors
Author(s):   Reguieg F. Zohra, Benblidia Nadjia, Guerti Mhania, and Guessoum Abderrezak


Paper Number:    143
Paper Title:   The Role of Using Internet In Medical Researches
Author(s):   Zainab Tahir Al-Bayati


Paper Number:    144
Paper Title:   Design of a Multi-Digital Signature Protocol
Author(s):   Kamel Hussein Rahouma


Paper Number:    145
Paper Title:   Criterion For Target Confirmation of Vep In Single Trial Through Channel Corralation Method
Author(s):   S.Andrews, Nidal Kamel, and David Ngo


Paper Number:    146
Paper Title:   Separation of Concurrency Models Using Languages Embeddings
Author(s):   Youcef Hammal


Paper Number:    148
Paper Title:   Graphical Notations for Standard QoS Modeling Elements
Author(s):   Sameera Abughalyoon and Rashid Jayousi


Paper Number:    149
Paper Title:   A New Architecture Model for Groupware
Author(s):   Maddeh and Chafia Mankai


Paper Number:    153
Paper Title:   Real Time Tasks in MANETs
Author(s):   Adnan Shaout and Sarah Sikandar


Paper Number:    155
Paper Title:   Fault Tolerance of Mobile Agent
Author(s):   Imane Aly Saroit Ismail and Amal Moh. Barakat Al-Dweik


Paper Number:    158
Paper Title:   PAW: Process for Web Applications
Author(s):   Soltani Asma and Mankai Chafia


Paper Number:    159
Paper Title:   Composition of Semantic Web Services : A user's query Reformulation-based Approach
Author(s):   Temglit, Aliane, and Ahmed Nacer


Paper Number:    162
Paper Title:   Requirements Management Measures
Author(s):   Mahmoud Ali Khraiwesh and Asim El Sheikh


Paper Number:    163
Paper Title:   A Quantum Evolutionary Framework for Multiple Sequence Alignment
Author(s):   Souham Meshoul, Abdesselam Layeb, and Mohamed Batouche


Paper Number:    164
Paper Title:   Prediction of Retention Parameters Using Artificial Neural Network and Topological Indices
Author(s):   Soumaya Batouche, Abdelhak Gheid, and Nacer Rebbani


Paper Number:    166
Paper Title:   Efficient Transaction Management in Mobile Database
Author(s):   Ziyad T. Abdul-Mehdi, Ali Bin Mamat, Hamidah Ibrahim, and Mustafa Mat Dirs


Paper Number:    167
Paper Title:   Verification and Analysis of Security Protocols Using Colored Petri Nets
Author(s):   Salah A. Aly and Hani Abu-Salem


Paper Number:    169
Paper Title:   Designing Data Mart Schema from Real World Entities
Author(s):   Jamel Feki and Hanêne Ben-Abdallah


Paper Number:    170
Paper Title:   Wavelet Transform and Fuzzy Approach in The Recognition of Arabic Characters
Author(s):   Nadia Ben Amor and Najoua Essoukri Ben Amara


Paper Number:    173
Paper Title:    GKIN: A Graphical User Interface for KINSOLVER
Author(s):   Leonidas Deligiannidis, Thiab R.Taha, Boanerges Aleman-Meza, Yihai Yu, and H.-B. Schüttler


Paper Number:    175
Paper Title:   On The Self-Similar Nature of Atm Network Traffic
Author(s):   Humam Elagha


Paper Number:    176
Paper Title:   An Adaptive Proxy Pre-fetch Scheme for a Consistent SMIL Presentation
Author(s):   A. Abdelli and N.Badache


Paper Number:    178
Paper Title:   The Design of A Complex Software System By Assembling Component With Archjava
Author(s):   Bennouar, Khammaci, and Henni


Paper Number:    180
Paper Title:   The Effect of Value Chain Management on E-Commerce
Author(s):   Basel Ibrahim Abu-Khiran and Ahmad Mashhour


Paper Number:    184
Paper Title:   Reorganizing Dynamic Information Resources in Complex Web
Author(s):    Amjad Rattrout, Maya Rupert, and Salima Hassas


Paper Number:    185
Paper Title:   VoIP Data Rate Reduction Using Linear Prediction Coefficients
Author(s):   Islam Y. Amro and Hanna Abdel Nour


Paper Number:    186
Paper Title:   Arabic Speech Synthesis by Concatenation of Speech Units Using MAP
Author(s):   Barakeh Jaber, Fatina Abu Gharbieh, and Hanna Abdel Nour


Paper Number:    187
Paper Title:   Global Early Flash Worms Detection and Containment System (GEDC)
Author(s):   Manal Tamimi and Badie Sartawi


Paper Number:    188
Paper Title:   Towards Mining Association Rules from Complex Structured XML
Author(s):   Fatma Helmy Ismail, Hoda Kourashi, Monaismail, and Islam El-Maddah


Paper Number:    189
Paper Title:   Automatic Term Extraction Using Statistical Techniques- A Comparative In-Depth Study & Application
Author(s):   Yousef W. Sabbah and Yousef Abuzir


Paper Number:    190
Paper Title:   Dynamic Load Balancing for Beowulf Clusters
Author(s):   Yagoubi


Paper Number:    191
Paper Title:   Nothing is Fool Proof in Biometric Security
Author(s):   Sivakumar


Paper Number:    192
Paper Title:   Development Tool and Framework for Sales Force Automation Domain
Author(s):   Lily Suryani Safie and Lee Sai Peck


Paper Number:    195
Paper Title:   Planar Hidden Markov /Neural Networks Modelling for Off-Line Signature Verification
Author(s):   Imen Abroug Ben Abdelghani, Amina Ghardallou Lasmar, and Najoua Essoukri Ben Amara


Paper Number:    198
Paper Title:   Predator Prey Optimizer for Unsupervised Clustering in Image Segmentation
Author(s):   Salima Nabti, Souham Meshoul, and Mohamed Batouche


Paper Number:    199
Paper Title:   Writer Identification Using SVM Classifier and Genetic Algorithm for Optimal Futures Selection
Author(s):   Sami Gazzah and Najoua Essoukri Ben Amara


Paper Number:    201
Paper Title:   SQLFlow: PL/SQL Multi-Diagrammatic Source Code Visualization
Author(s):   Samir Tartir and Ayman Issa


Paper Number:    202
Paper Title:   Radar Target Detections by Hidden Markov Model and Neural Network Approach
Author(s):   RAIS, Benyettou Aek, and Mesbahi larbi


Paper Number:    204
Paper Title:   Hybrid Technique to Enhance Voice Command for a Wheelchair
Author(s):   Mohamed Fezari, Mounir Bousbia-Salah, and Mouldi Bedda


Paper Number:    206
Paper Title:   Visual Transformation of Image into Another Based on Morphing Method
Author(s):   Huda Abdul Al-Alee AL-Amawee


Paper Number:    208
Paper Title:   Multi-Agent Workflow "An Approach Based on the Ontology of Service"
Author(s):   Zakaria Elberrichi, Maamar Khater, and Mimoun Malki


Paper Number:    209
Paper Title:   Arabic Voice Recognition Prototype Using Neural
Author(s):   Al-Adhaileh Mosleh H. and Natshah Tasneem


Read 8147 times Last modified on Wednesday, 14 October 2015 08:14
Share
More in this category: « Keynote Speaker Conference Program »
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…