Skip to main content
In today's business environment where the security of accepting checks can sometimes be a burden, many businesses are turning to verification services to provide security for funds accepted as checks. In this paper we propose a new... more
    • by 
    •   7  
      Signal ProcessingFuzzy LogicPattern RecognitionSafety
Arabic text recognition offers unique technical challenges and has been addressed more recently in the document analysis research field than other languages. Automatic Arabic/Indian numeral Optical Character Recognition (OCR) system for... more
    • by 
    •   7  
      Image ClassificationDocument AnalysisComputer technologyFeature Extraction
    • by 
    •   2  
      EvacuationCrowd Simulation Software
The use of e-learning management systems is considered a modern technology in teaching and learning, which helps students gain access to educational resources anywhere and anytime with ease and comfort. E-Learning systems have a... more
    • by 
Communications Technologry (ICT) students and their coping strategies in dealing with English as the medium of instruction during their university studies. A semi-structured administered survey was conducted using a sample of 267 male... more
    • by 
With the Internet penetration in the Middle East exceeding the world's average penetration and the growth of Internet users exceeding the 2000% in the last decade, the number of Arabic documents online has seen an exponential growth.... more
    • by 
The advantages of fast and simple digital information exchange over the Internet has attracted problems and threats in the form of digital attacks that could compromise information integrity, protection and authentication. Such issues are... more
    • by 
An IoT data system is a time constraint in which some data needs to be serviced on or before its deadline. Distributed processing is one of the most latent sources in such systems and is considered a vital design concern. Many sources of... more
    • by 
    • Electronics
To date, cancer of uterine cervix is still a leading cause of cancer-related deaths in women worldwide. The current methods (i.e., Pap smear and liquid-based cytology (LBC)) to screen for cervical cancer are time-consuming and dependent... more
    • by  and +1
    •   16  
      Applied MathematicsAlgorithmsArtificial IntelligenceBiomedical Engineering
    • by  and +1
    •   5  
      Software TestingTest Data GenerationEmpirical evidenceSampling strategy
Software testing is one of the most important phases of the software development life cycle. However, software testing is traditionally seen as a difficult and time consuming activity that is hard to embed in the software development... more
    • by 
    • Technology
Trust management is one of the most challenging issues in the emerging cloud computing area. Over the past few years, many studies have proposed different techniques to address trust management issues. However, despite these past efforts,... more
    • by 
    •   2  
      PrivacyReputation
Trust management of cloud services is emerging as an important research issue in recent years, which poses significant challenges because of the highly dynamic, distributed, and non-transparent nature of cloud services. This paper... more
    • by 
    •   2  
      Computer ScienceReputation
Stream Reasoning is the combination of reasoning techniques with data streams. In this paper, we present our approach to enable rule-based reasoning on semantic data streams in a distributed manner
    • by 
    • Computer Science
Arabic has recently received significant attention from corpus compilers. This situation has led to the creation of many Arabic corpora that cover various genres, most notably the newswire genre. Yet, Arabic novels, and specifically those... more
    • by 
    •   3  
      Corpus LinguisticsCorpus StylisticsApplied Sciences
SystemVerilog assertion (SVA) is widely used for verifying properties of hardware designs. This paper presents a new method of generating SVAs from natural language assertion descriptions. For capturing the temporal semantics in natural... more
    • by 
    • Computer Science
Part of Speech (POS) tagging is one of the most common techniques used in natural language processing (NLP) applications and corpus linguistics. Various POS tagging tools have been developed for Arabic. These taggers differ in several... more
    • by 
    •   10  
      Computer ScienceArtificial IntelligenceNatural Language ProcessingArabic
With today’s digital revolution, many people communicate and collaborate in cyberspace. Users rely on social media platforms, such as Facebook, YouTube and Twitter, all of which exert a considerable impact on human lives. In particular,... more
    • by 
    •   8  
      Computer ScienceArtificial IntelligenceMachine LearningCategorization
The primary purpose of sequence modeling is to record long-term interdependence across interaction sequences, and since the number of items purchased by users gradually increases over time, this brings challenges to sequence modeling to a... more
    • by 
Al Madinah, in Saudi Arabia, is the second most holy city for Muslims throughout the world and has a long and rich heritage. However, most of the historical and traditional buildings, city walls and holy places have been replaced with... more
    • by 
    • Engineering