Search Results - "2017 Sudan Conference on Computer Science and Information Technology (SCCSIT)"

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Deep learning framework based on Word2Vec and CNNfor users interests classification by Ombabi, Abubakr H., Lazzez, Onsa, Ouarda, Wael, Alimi, Adel M.

    “…Social media has given internet users a venue for sharing and expressing their interests and opinions on different life sides. Daily, millions of users…”
    Get full text
    Conference Proceeding
  2. 2

    Particle swarm optimization for deep learning of convolution neural network by Khalifa, Mujahid H., Ammar, Marwa, Ouarda, Wael, Alimi, Adel M.

    “…A Deep-learning architecture is a representation learning method with multiple levels of abstraction. It finds out complex structure of nonlinear processing…”
    Get full text
    Conference Proceeding
  3. 3

    Liver segmentation: A survey of the state-of-the-art by Mohammed, Fatima Abdelbagi, Viriri, Serestina

    “…With tremendous technological development in all ways of life, it has become necessary to develop the medical fields, including the diagnosis on which…”
    Get full text
    Conference Proceeding
  4. 4

    Factors that influence software project cost and schedule estimation by Suliman, Safa Mohammed Ahmed, Kadoda, Gada

    “…Software Project Management is a core topic in software engineering courses because it teaches how software projects planned, implemented, controlled,…”
    Get full text
    Conference Proceeding
  5. 5

    Human gait identity recognition system based on gait pal and pal entropy (GPPE) and distances features fusion by Ehaimir, Marwa E., Jarraya, Islem, Ouarda, Wael, Alimi, Adel M.

    “…Gait recognition is one of the most promising modality for human identification in motion and without subject cooperation. This modality of recognition has the…”
    Get full text
    Conference Proceeding
  6. 6

    Travel user interest discovery from visual shared data in social networks by Yassin, Fatima Mohamed, Lazzez, Onsa, Ouarda, Wael, Alimi, Adel M.

    “…Social networks are virtual environments where users express their opinions, preferences and interests. All shared information in Social Networks like…”
    Get full text
    Conference Proceeding
  7. 7

    A fuzzy ontology driven context classification system using large-scale image recognition based on deep CNN by Edris, Saba S., Zarka, Mohamed, Ouarda, Wael, Alimi, Adel M.

    “…Through the success of deep convolutional neural networks (CNN) for image classification and semantic concepts detection, the multimedia retrieval community…”
    Get full text
    Conference Proceeding
  8. 8

    A review of data mining techniques for diagnosing hepatitis by Hussien, Sara Omer, Elkhatem, Sara Sir, Osman, Nisreen, Ibrahim, Ashraf Osman

    “…Recently, data mining techniques are widely used in the field of bioinformatics to analyze biomedical data. These techniques have given efficient results in…”
    Get full text
    Conference Proceeding
  9. 9

    A survey on techniques of detecting identity documents forgery by Hassan, Alsadig Bashir, Fadlalla, Yahia A.

    “…Identity Document (ID) forgery is a process by which authorized identity document is modified and\or copied by unauthorized party or parties to be used…”
    Get full text
    Conference Proceeding
  10. 10

    Human identity recognition using sparse auto encoder for texture information representation in palmprint images based on voting technique by Elgallad, Elaraby A., Charfi, Nesrine, Alimi, Adel M., Ouarda, Wael

    “…Nowadays, biometric systems are used for the security and personal recognition. The palmprint trait is one among the most confident physiological modalities…”
    Get full text
    Conference Proceeding
  11. 11

    Human identity recognition based on facial images: Via supervised autoencoder features representation by Eragi, Saddam M., Ouarda, Wael, Alimi, Adel M.

    “…Face recognition is still a challenging field due to the wide range of its applications like security, surveillance, criminal justice systems, witness face…”
    Get full text
    Conference Proceeding
  12. 12

    The impact of knowledge management practices on business strategies and organizational performance by Eltayeb, Suhaila, Kadoda, Gada

    “…Business organizations formulate business strategies to identify the strategic objectives they aim to accomplish, and business managers develop business plans…”
    Get full text
    Conference Proceeding
  13. 13

    Distributed medical image retrieval techniques: A review by Elkariem, Abdel Fattah Awad, Bashir, Mohammed Bakri, Ahmed, Tawheed Hassan, Yousif, Adil

    “…Medical image retrieval is a core process of illness diagnosis and treatment procedure in healthcare area today. The new medical image scanner produces a large…”
    Get full text
    Conference Proceeding
  14. 14

    Age estimation using facial images: A survey of the state-of-the-art by Ahmed, Marwa, Viriri, Serestina

    “…Age Estimation plays a significant role in many applications such as security control, multimedia communication, human computer interaction, and surveillance…”
    Get full text
    Conference Proceeding
  15. 15

    Gender identification from facial images: Survey of the state-of-the-art by Mohammed, Salma M. Osman, Viriri, Serestina

    “…Face recognition is one of the most flourishing applications of image analysis and understanding, which has gained significant attention, especially in the…”
    Get full text
    Conference Proceeding
  16. 16

    Securing password in static password-based authentication: A review by Mohamedali, Intisar A., Fadlalla, Yahia

    “…Authentication is the process of verifying credentials provided by a user against stored ones to ensure that the claimer is who s/he says they are [1]…”
    Get full text
    Conference Proceeding