Search Results - "2017 Sudan Conference on Computer Science and Information Technology (SCCSIT)"
-
1
Deep learning framework based on Word2Vec and CNNfor users interests classification
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Social media has given internet users a venue for sharing and expressing their interests and opinions on different life sides. Daily, millions of users…”
Get full text
Conference Proceeding -
2
Particle swarm optimization for deep learning of convolution neural network
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…A Deep-learning architecture is a representation learning method with multiple levels of abstraction. It finds out complex structure of nonlinear processing…”
Get full text
Conference Proceeding -
3
Liver segmentation: A survey of the state-of-the-art
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…With tremendous technological development in all ways of life, it has become necessary to develop the medical fields, including the diagnosis on which…”
Get full text
Conference Proceeding -
4
Factors that influence software project cost and schedule estimation
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Software Project Management is a core topic in software engineering courses because it teaches how software projects planned, implemented, controlled,…”
Get full text
Conference Proceeding -
5
Human gait identity recognition system based on gait pal and pal entropy (GPPE) and distances features fusion
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Gait recognition is one of the most promising modality for human identification in motion and without subject cooperation. This modality of recognition has the…”
Get full text
Conference Proceeding -
6
Travel user interest discovery from visual shared data in social networks
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Social networks are virtual environments where users express their opinions, preferences and interests. All shared information in Social Networks like…”
Get full text
Conference Proceeding -
7
A fuzzy ontology driven context classification system using large-scale image recognition based on deep CNN
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Through the success of deep convolutional neural networks (CNN) for image classification and semantic concepts detection, the multimedia retrieval community…”
Get full text
Conference Proceeding -
8
A review of data mining techniques for diagnosing hepatitis
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Recently, data mining techniques are widely used in the field of bioinformatics to analyze biomedical data. These techniques have given efficient results in…”
Get full text
Conference Proceeding -
9
A survey on techniques of detecting identity documents forgery
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Identity Document (ID) forgery is a process by which authorized identity document is modified and\or copied by unauthorized party or parties to be used…”
Get full text
Conference Proceeding -
10
Human identity recognition using sparse auto encoder for texture information representation in palmprint images based on voting technique
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Nowadays, biometric systems are used for the security and personal recognition. The palmprint trait is one among the most confident physiological modalities…”
Get full text
Conference Proceeding -
11
Human identity recognition based on facial images: Via supervised autoencoder features representation
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Face recognition is still a challenging field due to the wide range of its applications like security, surveillance, criminal justice systems, witness face…”
Get full text
Conference Proceeding -
12
The impact of knowledge management practices on business strategies and organizational performance
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Business organizations formulate business strategies to identify the strategic objectives they aim to accomplish, and business managers develop business plans…”
Get full text
Conference Proceeding -
13
Distributed medical image retrieval techniques: A review
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Medical image retrieval is a core process of illness diagnosis and treatment procedure in healthcare area today. The new medical image scanner produces a large…”
Get full text
Conference Proceeding -
14
Age estimation using facial images: A survey of the state-of-the-art
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Age Estimation plays a significant role in many applications such as security control, multimedia communication, human computer interaction, and surveillance…”
Get full text
Conference Proceeding -
15
Gender identification from facial images: Survey of the state-of-the-art
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Face recognition is one of the most flourishing applications of image analysis and understanding, which has gained significant attention, especially in the…”
Get full text
Conference Proceeding -
16
Securing password in static password-based authentication: A review
Published in 2017 Sudan Conference on Computer Science and Information Technology (SCCSIT) (01-11-2017)“…Authentication is the process of verifying credentials provided by a user against stored ones to ensure that the claimer is who s/he says they are [1]…”
Get full text
Conference Proceeding