Abstract is missing.
- Data Quality Assessment in the Integration Process of Linked Open Data (LOD)Hana Haj Ahmed. 1-6 [doi]
- Orchestration and Adaptation of Learning Scenarios - Application to the Case of Programming Learning / TeachingAli Houssein Souleiman. 7-11 [doi]
- Towards a DSPL for Context Aware BPMBochra Khiari, Lamia Labed Jilani. 12-18 [doi]
- Medical Drones System for Amusement ParksAhmed Bitar, Aliaa Jamal, Hesham Sultan, Nour Alkandari, Mohammed El-Abd. 19-20 [doi]
- RoadEye - The Intelligent Transportation SystemMennatallah Ibrahim, Mark Riad, Mohammed El-Abd. 21-22 [doi]
- Towards Intelligent Autonomous Controllers: Architecture for Industrial Distributed SystemLuiz H. S. Torres, Leizer Schnitman, Jose A. M. Felippe de Souza. 23-24 [doi]
- Distorted Replicas: Intelligent Replication Schemes to Boost I/O Throughput in Document-StoresKhaled Jouini. 25-32 [doi]
- Performance Evaluation for Dense Sparse Matrix Product AlgorithmsOlfa Hamdi, Haouari Imen. 33-40 [doi]
- A Comprehensive View of u-Accessibility in Context-Aware Learning Systems for Disabled LearnersNesrine Ben Salah, Inés Bayoudh Saâdi, Henda Ben Ghézala. 41-48 [doi]
- A Hybrid Knowlegde-Based Approach for Recommending Massive Learning ActivitiesMarwa Harrathi, Narjess Touzani, Rafik Braham. 49-54 [doi]
- Resource Allocation Heuristics for Network VirtualizationAchref El Amri, Aref Meddeb. 55-62 [doi]
- A Hybrid Approach for Image Classification Based on Sparse Coding and Wavelet DecompositionAmel Ben Said, Intidhar Jemel, Ridha Ejbali, Mourad Zaied. 63-68 [doi]
- Blood Flow Modeling in a Healthy Carotid Artery Bifurcation: Simulations Against in Vivo MeasurementsArij Debbich, Asma Ben Abdallah. 69-70 [doi]
- Video Forgery Detection Using a Bayesian RJMCMC-Based ApproachSami Bourouis, Faisal R. Al-Osaimi, Nizar Bouguila, Hassen Sallay, Fahd Aldosari, Mohamed Al Mashrgy. 71-75 [doi]
- A Utility-Based Approach for Self-Adaptive Systems: Application to a Smart BuildingImen Abdennadher, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 76-82 [doi]
- A New Method for the Construction of Evolving Embedded Representations of WordsAmal Bouraoui, Salma Jamoussi, Abdelmajid Ben Hamadou. 83-87 [doi]
- An Adaptive Genetic Algorithm for the Capacitated Vehicle Routing Problem with Time Windows and Two-Dimensional Loading ConstraintsInes Sbai, Olfa Limem, Saoussen Krichen. 88-95 [doi]
- A Low Overhead Efficient Localization Approach for Large Scale Wireless Sensor NetworksBadia Bouhdid, Wafa Akkari, Abdelfettah Belghith. 96-102 [doi]
- Bi-objective GA for Cost-Effective and Delay-Aware Gateway Placement in Wireless Mesh NetworksZeineb Lazrag, Monia Hamdi, Mourad Zaied. 103-108 [doi]
- Floquet Modal Analysis to Study Radiation Pattern for Coupled Almost Periodic Antenna ArrayBen Latifa Nader, Hamdi Bilel, Aguili Taoufik. 109-113 [doi]
- Hop-by-Hop Congestion Control for Named Data NetworksSafa Mejri, Haifa Touati, Naceur Malouch, Farouk Kamoun. 114-119 [doi]
- Intrusion Threats and Security Solutions for Autonomous Vehicle NetworksSafa Boumiza, Rafik Braham. 120-127 [doi]
- A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay NetworksZied Trifa, Maher Khemakhem. 128-134 [doi]
- ANT Corpus: An Arabic News Text Collection for Textual ClassificationAmina Chouigui, Oussama Ben Khiroun, Bilel Elayeb. 135-142 [doi]
- A Fuzzy Based Method for Driver Drowsiness DetectionOmar Rigane, Karim Abbes, Chokri Abdelmoula, Mohamed Masmoudi. 143-147 [doi]
- Toward an Ontology-Based Model of Key Performance Indicators for Business Process ImprovementEmna Ammar El Hadj Amor, Sonia Ayachi Ghannouchi. 148-153 [doi]
- Inter-VM Interference in Cloud Environments: A SurveySabrine Amri, Hédi Hamdi, Zaki Brahmi. 154-159 [doi]
- 3D Object Retrieval Based on Similarity Calculation in 3D Computer Aided Design SystemsAhmed Fradi, Borhen Louhichi, Mohamed-Ali Mahjoub, Benoît Eynard. 160-165 [doi]
- A New Mammogram Preprocessing Method for Computer-Aided Diagnosis SystemsIlhame Ait lbachir, Rachida Es-salhi, Imane Daoudi, Sadia Tallal. 166-171 [doi]
- Computer Aided Diagnosis for Breast Diseases Based on Infrared ImagesAdriel Dos Santos Araujo, Aura Conci, Roger Resmini, Anselmo Antunes Montenegro, Claudineia Araujo, Frédéric Lebon. 172-177 [doi]
- Fusion Strategies for Recognition of Violence ActionsWafa Lejmi, Anouar Ben Khalifa, Mohamed-Ali Mahjoub. 178-183 [doi]
- Optical-Flow-Based Approach for the Detection of Shoreline Changes Using Remote Sensing DataMajed Bouchahma, Walid Barhoumi, Wanglin Yan, Hamood Al Wardi. 184-189 [doi]
- Quality Management Services and Image Registration: Case of Images Technology in Health Services Using a Management Outliers ApproachHouda Hakim Guermazi, Ahlem Riahi. 190-195 [doi]
- Unsupervised Features Extraction Using a Multi-view Self Organizing Map for Image ClassificationFatma Ben Aissa, Mohamed Sakkari, Ridha Ejbali, Mourad Zaied. 196-201 [doi]
- A SYSML-Based Approach to Manage Stakeholder Requirements TraceabilitySaida Haidrar, Adil Anwar, Ounsa Roudiès. 202-207 [doi]
- Emerging Applications for Future Internet Approach Based-on SDN and ICNRihab Jmal, Lamia Chaari Fourati. 208-213 [doi]
- Emulation of Content-Centric Routing and Forwarding Strategies in Smart GridsNour El Houda Ben Youssef, Yosra Barouni, Sofiane Khalfallah, Jaleleddine Ben Hadj Slama, Khaled Ben Driss. 214-219 [doi]
- An Open Tool Architecture for Security Testing of NoSQL-Based ApplicationsAbdullah Algarni, Fawaz Alsolami, Fathy E. Eassa, Khalid Alsubhi, Kamal M. Jambi, Maher Khemakhem. 220-225 [doi]
- Conditions to Have a Well-Disordered Dynamics in the CBC Mode of OperationAbdessalem Abidi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout. 226-231 [doi]
- Statistical Study of SHVC Depth Partitioning and Mode Selection for Intra Only ConfigurationIbtissem Wali, Taheni Dammak, Amina Kessentini, Mohamed Ali Ben Ayed, Nouri Masmoudi. 232-237 [doi]
- Deriving Use Case Models from BPMN ModelsAljia Bouzidi, Nahla Haddar, Mounira Ben-Abdallah, Kais Haddar. 238-243 [doi]
- A Personalized Hybrid Tourism Recommender SystemMohamed Elyes Ben Haj Kbaier, Hela Masri, Saoussen Krichen. 244-250 [doi]
- Customer Relationship Management and Small Data - Application of Bayesian Network Elicitation Techniques for Building a Lead Scoring ModelYoussef Benhaddou, Philippe Leray. 251-255 [doi]
- Learning Probabilistic Relational Models with (Partially Structured) Graph DatabasesMarwa El Abri, Philippe Leray, Nadia Essoussi. 256-263 [doi]
- Real-Time Event Localization and Detection Over Social Networks Using Apache IntelligenceSarra Hasni, Sami Faïz. 264-271 [doi]
- UMLtoNoSQL: Automatic Transformation of Conceptual Schema to NoSQL DatabasesFatma Abdelhédi, Amal Ait Brahim, Faten Atigui, Gilles Zurfluh. 272-279 [doi]
- An Overview on Loop Tiling Techniques for Code GenerationEmna Hammami, Yosr Slama. 280-287 [doi]
- Design and Implementation of a Simulink DDS Blockset and Its Integration to an Active Frame Steering Blockset Conformed to SAE ElectricVehicleManel Takrouni, Marwa Gdhaifi, Azer Hasnaoui, Ikbel Mejri, Salem Hasnaoui. 288-294 [doi]
- DISQUEV: Looking for Distribution Quality Evolution as a New Metric for Evaluating Replication StrategiesChamseddine Hamdeni, Tarek Hamrouni, Faouzi Ben Charrada. 295-302 [doi]
- End to End Cloud Computing Architecture Based on A Novel Classification of Security IssuesMariem Bouchaala, Cherif Ghazel, Leïla Azouz Saïdane, Farouk Kamoun. 303-310 [doi]
- Maximizing the Parallelism Degree for Optimal Computing of Matrix Chain ProductsKhaoula Bezzina, Zaher Mahjoub. 311-318 [doi]
- 3D Handwriting Characters Recognition with Symbolic-Based Similarity Measure of Gyroscope Signals Embedded in Smart PhoneMariam Taktak, Slim Triki, Anas Kamoun. 319-326 [doi]
- Approach for CAD model Reconstruction from a deformed meshAicha Ben Makhlouf, Borhen Louhichi, Mohamed-Ali Mahjoub, Gérard Subsol. 327-333 [doi]
- Effect of Surface Re-Meshing on Hemodynamic Simulations Quality in Carotid ArteriesAsma Ben Abdallah, Arij Debbich. 334-341 [doi]
- Facial Emotion Recognition for Adaptive Interfaces Using Wrinkles and Wavelet NetworkSoumaya Zaghbani, Noureddine Boujnah, Med Salim Bouhlel. 342-349 [doi]
- Fusing Multi-techniques Based on LDA-CCA and Their Application in Palmprint Identification SystemRaouia Mokni, Hassen Drira, Monji Kherallah. 350-357 [doi]
- Pedestrian Detection in Poor Weather Conditions Using Moving CameraImen Jegham, Anouar Ben Khalifa. 358-362 [doi]
- Hybrid Method for Multilingual Automatic Grouping of Writing StylesSeifeddine Mechti, Maryam Elamine, Lamia Hadrich Belguith, Rim Faiz. 363-368 [doi]
- Comparison of IoT Constrained Devices Operating Systems: A SurveyChallouf Sabri, Lobna Kriaa, Saidane Leila Azzouz. 369-375 [doi]
- On the Collaborative Inference of DDoS: A Multi-scale Distributed ApproachFatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari. 376-383 [doi]
- Privacy Preserving Solution for Internet of Things with Application to eHealthRihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane. 384-391 [doi]
- Performance and Scalability Appraisal of Four Directed Weighted Graph Matching Algorithms: A SurveyJalel Eddine Hajlaoui, Mohamed-Nazih Omri, Djamal Benslimane. 392-398 [doi]
- A Formal Specification and Verification of Normative Multi-agent Systems by DisCSPAida Boudhaouia, Belhassen Mazigh, Ezzine Missaoui. 399-406 [doi]
- Co-scheduling Data and Task for a Data-Driven Distribution of Data-Intensive ApplicationsMohamed Labidi, Mohamed Jemni, Maher Khemakhem. 407-414 [doi]
- A Unified Multidimensional Data Model from Social Networks for Unstructured Data AnalysisHichem Dabbèchi, Nahla Zaaboub Haddar, Mounira Ben-Abdallah, Kais Haddar. 415-422 [doi]
- Decision Making about Products Development through Consumer Preferences Modeling Based on Descriptive Characteristics of ProductsIbtihel Rebhi, Dhafer Malouche. 423-430 [doi]
- Arud, the Metrical System of Arabic Poetry, as a Feature Set for Authorship AttributionAhmed Ibrahim Ahmed Omer, Michael Philip Oakes. 431-436 [doi]
- Using WikiData as a Multi-lingual Multi-dialectal Dictionary for Arabic DialectsHoucemeddine Turki, Denny Vrandecic, Helmi Hamdi, Imed Adel. 437-442 [doi]
- Comparative Study of Sentiment Classification for Automated Translated Latin Reviews Into ArabicAshraf Elnagar, Omar Einea, Leena Lulu. 443-448 [doi]
- Clustering Arabic Tweets for Sentiment AnalysisDiab Abuaiadah, Dileep Rajendran, Mustafa Jarrar. 449-456 [doi]
- Building an Image Database for Studying Image RetargetingMohammad A. Alsmirat, Ethar El-Qawasmeh, Mahmoud Al-Ayyoub, Nour Alhuda Damer, Yaser Jararweh. 457-462 [doi]
- Leveraging Social Analytics Data for Identifying Customer Segments for Online News MediaBernard J. Jansen, Soon-Gyo Jung, Joni Salminen, Jisun An, Haewoon Kwak. 463-468 [doi]
- Multiple Pattern Graph Correlations for Efficient Graph Pattern MatchingJing Yu, Xiaomei Liu, Yanbing Liu, Yue Hu. 469-474 [doi]
- A Novel Family of Strong S-Box Based on Ikeda Map and T-FunctionR. Becheikh, O. Mannai, Rhouma Rhouma, Safya Belghith. 475-481 [doi]
- All Friends are not Equal: Weight-Aware Egocentric Network-Based User ProfilingAsma Chader, Hamid Haddadou, Walid-Khaled Hidouci. 482-488 [doi]
- Proposed Bio-authentication System for Question Bank in Learning Management SystemsHussein Y. AbuMansour. 489-494 [doi]
- Intelligent Assisted Living Framework for Monitoring EldersBenhur Bakhtiari Bastaki, Tomasz Bosakowski, Elhadj Benkhelifa. 495-500 [doi]
- Autonomous WSN for Lawns Monitoring in Smart CitiesJose Marin, Javier Rocher, Lorena Parra, Sandra Sendra, Jaime Lloret, Pedro V. Mauri. 501-508 [doi]
- Facebook as a Learning Tool in Classrooms: A Case StudyManal Abdo Farhan Saif, Ahmed Tlili, Fathi Essalmi, Mohamed Jemni. 509-514 [doi]
- Identifying i-bridge Across Online Social NetworksAmina Amara, Mohamed Ali Hadj Taieb, Mohamed Ben Aouicha. 515-520 [doi]
- Using Social Networks to Improve Processes in Business Education: A Study CaseSamiha El Hamali, Latifa Mahdaoui, Srikanth Yadav Podatharapu. 521-526 [doi]
- A Hybrid Ant Colony Algorithm with a Local Search for the Strongly Correlated Knapsack ProblemWiem Zouari, Inès Alaya, Moncef Tagina. 527-533 [doi]
- A Speculative Concurrency Control in Real-Time Spatial Big Data Using Real-Time Nested Spatial Transactions and Imprecise ComputationSana Hamdi 0002, Emna Bouazizi, Sami Faïz. 534-540 [doi]
- Behavior-Based Approach for User Interests PredictionChayma Amri, Mariem Bambia, Rim Faiz. 541-548 [doi]
- Fuzzy Rule-Based Situational Music Retrieval and RecommendationRim Dridi, Saloua Zammali, Khedija Arour. 549-556 [doi]
- KP-S: A Spark-Based Design of the K-Prototypes Clustering for Big DataMohamed Aymen Ben HajKacem, Chiheb-Eddine Ben N'cir, Nadia Essoussi. 557-563 [doi]
- New Hashtags' Weighting Schemes for Hashtag and User Recommendation on TwitterAbir Gorrab, Ferihane Kboubi, Bénédicte Le Grand, Henda Ben Ghézala. 564-570 [doi]
- ParallelCharMax: An Effective Maximal Frequent Itemset Mining Algorithm Based on MapReduce FrameworkRania Mkhinini Gahar, Olfa Arfaoui, Minyar Sassi Hidri, Nejib Ben Hadj-Alouane. 571-578 [doi]
- Semi Supervised Relevance Learning for Feature Selection on High Dimensional DataAfef Ben Brahim, Alexandros Kalousis. 579-584 [doi]
- Time Sensitivity for Personalized SearchAmeni Kacem Sahraoui, Rim Faiz. 585-592 [doi]
- Using Transliteration with Entity Resolution for Arabic DatasetsMarwah Alian, Ghazi Al-Naymat, Banda Ramadan. 593-597 [doi]
- A Novel Cloud Services Recommendation System Based on Automatic Learning TechniquesRahma Djiroun, Meriem Amel Guesssoum, Kamel Boukhalfa, Elhadj Benkhelifa. 598-605 [doi]
- A Model Driven Approach for Modelling and Running Flexible Cloud Service WorkflowsImen Ben Fradj, Yousra Bendaly Hlaoui, Leila Jemni BenAyed. 606-613 [doi]
- A Trust Reputation Architecture for Cloud Computing EnvironmentLuís Felipe Bilecki, Adriano Fiorese. 614-621 [doi]
- A Validation Approach for Quasi-Synchronous Checkpointing Algorithms in HPC SystemsHouda Khlif, Hatem Hadj Kacem, Saúl E. Pomares Hernández, Ahmed Hadj Kacem. 622-629 [doi]
- Adaptive Task Mapping and Scheduling for Reconfigurable Distributed Embedded Energy Harvesting SystemsWiem Housseyni, Olfa Mosbahi, Mohamed Khalgui. 630-636 [doi]
- An Optimized Software Radio Application Using a Dynamic Slack Reclamation Technique on a Real Platform OMAP 3530Yomna Ben Jmaa, Rabie Ben Atitallah, Maher Ben Jemaa. 637-644 [doi]
- Business Adaptation for BPaaS Using Fuzzy Logic SystemsRima Grati, Khouloud Boukadi, Hanêne Ben-Abdallah. 645-651 [doi]
- Enterprise Preparation for Cloud Migration: Assessment PhaseHela Malouche, Youssef Ben Halima, Henda Ben Ghézala. 652-659 [doi]
- Formal Distributed Model for the Verification of Job-Scheduling in Cloud EnvironmentsImene Ben Hafaiedh, Maroua Ben Slimane, Sourour Haouala, Riadh Robbana. 660-667 [doi]
- High Performance Recursive LU Factorization for Multicore SystemsRyma Mahfoudhi. 668-674 [doi]
- Performance Evaluation of a Parallel Algorithm for Determining All Optimal Solutions of the 1D Array Partitioning ProblemHajer Salhi, Bchira Ben Mabrouk, Zaher Mahjoub. 675-681 [doi]
- Pseudo-LRU Replacement Policy in Named Data Networking Using Fat Tree DataCenter Network ArchitectureImen Dhiab, Yosra Barouni, Sofiane Khalfallah, Jaleleddine Ben Hadj Slama. 682-687 [doi]
- Using Decomposition and Local Search to Solve Large-Scale Virtual Machine Placement Problems with Disk Anti-Colocation ConstraintsAmeni Hbaieb, Mahdi Khemakhem, Maher Ben Jemaa. 688-695 [doi]
- Perspectives on Resilience in Cloud Computing: Review and TrendsThomas Welsh, Elhadj Benkhelifa. 696-703 [doi]
- A Comparison Between Different Gaussian-Based Mixture ModelsFatma Najar, Sami Bourouis, Nizar Bouguila, Safiya Belghith. 704-708 [doi]
- A Hybrid Collaborative Clustering Using Self-Organizing MapAmeni Filali, Chiraz Jlassi, Najet Arous. 709-716 [doi]
- Adaptive Region Based Active Contour Model for Image SegmentationAmira Soudani, Ezzeddine Zagrouba. 717-724 [doi]
- Arabic Video Text Recognition Based on Multi-dimensional Recurrent Neural NetworksOussama Zayene, Soumaya Essefi Amamou, Najoua Essoukri Ben Amara. 725-729 [doi]
- Content Video Browsing Based on Text Regions Extraction and Classification Using Convolutional Neural NetworkBassem Bouaziz, Jihen Amara, Walid Mahdi. 730-737 [doi]
- Detecting Video Saliency via Local Motion EstimationRahma Kalboussi, Aymen Azaza, Mehrez Abdellaoui, Ali Douik. 738-744 [doi]
- Facial Expression Recognition via Deep LearningAbir Fathallah, Lotfi Abdi, Ali Douik. 745-750 [doi]
- Fast and Accurate Fingerprint Matching Using Expanded Delaunay TriangulationMohamed Hedi Ghaddab, Khaled Jouini, Ouajdi Korbaa. 751-758 [doi]
- Fuzzy C-Mean for Unsupervised Spectral-Spatial SVM Classification of Hyperspectral ImagesRafika Ben Salem, Karim Saheb Ettabaâ, Mohamed Ali Hamdi. 759-765 [doi]
- Generic Descriptions for Movie Document: An Experimental StudyManel Fourati, Anis Jedidi, Faïez Gargouri. 766-773 [doi]
- Hand and Wrist Localization Approach for Features Extraction in Arabic Sign Language RecognitionSana Fakhfakh, Yousra Ben Jemaa. 774-780 [doi]
- Identity Verification Through Dorsal Hand Vein Texture Based on NSCT CoefficientsAmira Oueslati, Nadia Feddaoui, Kamel Hamrouni. 781-787 [doi]
- Image Retrieval Using Spatial Dominant Color DescriptorImen Ben Rejeb, Sonia Ouni, Ezzeddine Zagrouba. 788-795 [doi]
- Improving of Open-Set Language Identification by Using Deep SVM and Thresholding FunctionsIlyes Rebai, Yassine Ben Ayed, Walid Mahdi. 796-802 [doi]
- Large-Scale Supervised Hashing for Cross-Modal RetreivalLoubna Karbil, Imane Daoudi. 803-808 [doi]
- Modified Schroedinger Eigenmap Projections Algorithm for Hyperspectral Imagery ClassificationAsma Fejjari, Karim Saheb Ettabaâ, Ouajdi Korbaa. 809-814 [doi]
- Robust Front-End Based on MVA and HEQ Post-processing for Arabic Speech Recognition Using Hidden Markov Model Toolkit (HTK)Elhem Techini, Zied Sakka, Medsalim Bouhlel. 815-820 [doi]
- SAX-Based Representation with Longest Common Subsequence Dissimilarity Measure for Time Series Data ClassificationMariem Taktak, Slim Triki, Anas Kamoun. 821-828 [doi]
- The Generalized Multi Scaled Radon Transform and Application on Objects ClassificationDhekra El Hamdi, Ines Elouedi, Mai K. Nguyen, Atef Hamouda. 829-834 [doi]
- Why Stop There?: A Novel Hill Climbing Based Approach Towards Multimodal ClassificationDeepanwita Datta, Prasad Suresh Nakhate, Sanjay Kumar Singh, C. Ravindranath Chowdary. 835-839 [doi]
- Illegal Parking Detection Using Gaussian Mixture Model and Kalman FilterRami Alkhawaji, Mohamed Sedky, Abdel-Hamid Soliman. 840-847 [doi]
- Content-Based Retrieval of 3D Non Rigid Object with Sparse Representations and Local Feature Descriptors: A Comparative StudyHela Haj Mohamed, Samir Belaid, Wady Naanaa, Lotfi Ben Romdhane. 848-855 [doi]
- Context-Aware ServUI: A Conceptual Method for User Interfaces and Associated Services GenerationHajer Taktak, Faouzi Moussa. 856-862 [doi]
- Cost-Efficient Composition of System of Systems on a Federated Cloud EnvironmentWided Mathlouthi, Narjès Bellamine-Ben Saoud. 863-870 [doi]
- Leveraging Real-Time Network Analyses by Extending a Model-Based FrameworkAnh-Toan Bui Long, Yassine Ouhammou, Emmanuel Grolleau. 871-878 [doi]
- Mining Approach for Software Architectures' Description DiscoveryMariam Chaabane, Ismael Bouassida Rodriguez, Khalil Drira, Mohamed Jmaiel. 879-886 [doi]
- Software Process Patterns: A RoadmapAsma Hachemi, Mohamed Ahmed-Nacer. 887-894 [doi]
- Towards Usability Evaluation of Hybrid Mobile User InterfacesNarjess Bessghaier, Makram Souii. 895-900 [doi]
- Cloud Based Collaborative Software Development: A Review, Gap Analysis and Future DirectionsStanley Ewenike, Elhadj Benkhelifa, Claude Chibelushi. 901-909 [doi]
- A Micro-Word Based Approach for Arabic Sentiment AnalysisFawaz S. Al-Anzi, Dia AbuZeina. 910-914 [doi]
- A Syntactico-Semantic Method for Arabic Collocations ExtractionChiraz Ben Othmane Zribi, Bechir Baghouli. 915-921 [doi]
- Billingual Formal Concept Analysis for Cross-Language Information RetrievalChedi Bechikh Ali, Hatem Haddad, Yahia Slimani. 922-928 [doi]
- How to Combine Salience Factors for Arabic Pronoun Anaphora ResolutionSaoussen Mathlouthi Bouzid, Fériel Ben Fraj Trabelsi, Chiraz Ben Othmane Zribi. 929-936 [doi]
- Image to Text Conversion: State of the Art and Extended WorkNada Farhani, Naim Terbeh, Mounir Zrigui. 937-943 [doi]
- LKB Generation of HPSG Extensional LexiconSamia Ben Ismail, Sirine Boukedi, Kais Haddar. 944-950 [doi]
- Sentiment Lexicon Enrichment Using Emotional Vector RepresentationHanen Ameur, Salma Jamoussi, Abdelmajid Ben Hamadou. 951-958 [doi]
- Text Categorization Using Weighted Hyper Rectangular Keyword ExtractionAbdelaali Hassaïne, Zeineb Safi, Jameela Al Otaibi, Ali Jaoua. 959-965 [doi]
- Towards Using Public Conversations to Mine Product Features in TwitterRania Othman, Rami Belkaroui, Rim Faiz. 966-972 [doi]
- Tunisian Dialect-Modern Standard Arabic Bilingual LexiconMohamed Ali Sghaier, Mounir Zrigui. 973-979 [doi]
- A Comparative Study in Emotional Speaker Recognition in Noisy EnvironmentAsma Mansour, Zied Lachiri. 980-986 [doi]
- A Hybrid Genetic Algorithm for the Inventory Routing ProblemAmri Sakhri Mohamed Salim, Mounira Tlili, Korbaa Ouajdi. 987-994 [doi]
- A Multi-agent Model Based on Hybrid Genetic Algorithm for Job Shop Scheduling Problem with Generic Time LagsMadiha Harrabi, Olfa Belkahla Driss, Khaled Ghédira. 995-1002 [doi]
- A Novel Analysis Procedure for Context-Aware Applications in Ubiquitous Environments: Application to a Smart Building Case StudyNesrine Khabou, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 1003-1010 [doi]
- Chemical Reaction Optimization Metaheuristic for Solving Association Rule Mining ProblemAbir Derouiche, Abdesslem Layeb, Zineb Habbas. 1011-1018 [doi]
- Decentralized Tabu Searches in Multi Agent System for Distributed and Flexible Job Shop Scheduling ProblemBilel Marzouki, Olfa Belkahla Driss, Khaled Ghédira. 1019-1026 [doi]
- Echo State Network and Particle Swarm Optimization for Prognostics of a Complex SystemSafa Ben Salah, Imtiez Fliss, Moncef Tagina. 1027-1034 [doi]
- Intelligent Indoor Evacuation Guidance System Based on Ant Colony AlgorithmManel Hajjem, Hend Bouziri, El-Ghazali Talbi, Khaled Mellouli. 1035-1042 [doi]
- On Solving Exactly and Approximately the Sum Coloring of GraphsOlfa Harrabi, Jouhaina Chaouachi Siala, Hend Bouziri. 1043-1048 [doi]
- Parallelism Hardware Computation for Artificial Neural NetworkMarwa Gam, Mohamed Boubaker, Najoua Chalbi, Mohamed Hedi Bedoui. 1049-1055 [doi]
- Survivability Analogy for Cloud ComputingSiyakha N. Mthunzi, Elhadj Benkhelifa. 1056-1062 [doi]
- A Seamless Mobility Mechanism for V2V CommunicationsAmina Gharsallah, Nouri Omheni, Khouloud Ghanmi, Faouzi Zarai, Mahmoud Neji. 1063-1069 [doi]
- A Security Analysis of LOADng Routing ProtocolGhada Glissa, Aref Meddeb. 1070-1074 [doi]
- Cell Performance-Optimization Scheduling Algorithm Using Reinforcement Learning for LTE-Advanced NetworkSouhir Feki, Faouzi Zarai. 1075-1081 [doi]
- Cooperative Intersection Collision Avoidance Persistent System Based on V2V Communication and Real-Time DatabasesIslam Elleuch, Achraf Makni, Rafik Bouaziz. 1082-1089 [doi]
- Efficient Data Monitoring of Rice-Fields Based on WMSNChaima Bejaoui, Alexandre Guitton, Abdennaceur Kachouri. 1090-1094 [doi]
- Efficient QoT-Aware Rerouting Algorithm for Differentiated Services in WDM Transparent Networks Provisioned with Set-Up Delay ToleranceNaama Amdouni, Taoufik Aguili. 1095-1100 [doi]
- Equal Cost Multiple Path Energy-Aware Routing in Carrier-Ethernet Networks with Bundled LinksRihab Maaloul, Raouia Taktak, Lamia Chaari, Bernard Cousin. 1101-1108 [doi]
- FPMIPv6-S: A New Mobility Management Protocol for Wireless Sensor NetworksAbdelwahed Berguiga, Habib Youssef. 1109-1116 [doi]
- How to Cache in ICN-Based IoT Environments?Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil 0001, Khalil Drira. 1117-1124 [doi]
- Impact of Sink Mobility on Quality of Service Performance and Energy Consumption in Wireless Sensor Network with Cluster Based Routing ProtocolsAbdelbari Ben Yagouta, Maher Jabberi, Bechir Ben Gouissem. 1125-1132 [doi]
- Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc NetworksMalek Rekik, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohammad S. Obaidat. 1133-1140 [doi]
- Improving Total Transit Time in Dial-A-Ride Problem with Customers-Dependent CriteriaSonia Nasri, Hend Bouziri. 1141-1148 [doi]
- Managing Wireless Fog Networks using Software-Defined NetworkingAkram Hakiri, Bassem Sellami, Prithviraj Patil, Pascal Berthou, Aniruddha S. Gokhale. 1149-1156 [doi]
- Moment-Based SNR Estimation of Linearly-Modulated Transmissions Over Correlated SIMO ChannelsMohamed Bassem Ben Salah, Nessrine Ben Rejeb, Abdelaziz Samet. 1157-1162 [doi]
- Performance Exploration of AMBA AXI4 Bus Protocols for Wireless Sensor NetworksMariem Makni, Mouna Baklouti, Smaïl Niar, Mohamed Abid. 1163-1169 [doi]
- Predictive Handoff Mechanism for Video Streaming in a Cloud-Based Urban VanetEmna Bouzid Smida, Sonia Gaied Fantar, Habib Youssef. 1170-1177 [doi]
- Recovery of Software Defined Network from Multiple Failures: Openstate Vs OpenflowMohd Soperi Mohd Zahid, Babangida Isyaku, Faizal Ahmad Fadzil. 1178-1183 [doi]
- Remote Water Pipeline Monitoring System IoT-Based Architecture for New Industrial Era 4.0Maroua Abdelhafidh, Mohamed Fourati, Lamia Chaari Fourati, Amor Abidi. 1184-1191 [doi]
- Survivable Inter-Datacenter Network Design Based on Network CodingNihed Bahria El Asghar, Imen Jouili, Mounir Frikha. 1192-1197 [doi]
- Towards a Novel Forwarding Strategy for Named Data Networking Based on SDN and Bloom FilterAnwar Kalghoum, Sonia Mettali Gammar, Leïla Azouz Saïdane. 1198-1204 [doi]
- An Efficient MPLS-Based Source Routing Scheme in Software-Defined Wide Area Networks (SD-WAN)Ali El Kamel, Manel Majdoub, Habib Youssef. 1205-1211 [doi]
- Data Classification in Water Pipeline Based on Wireless Sensors NetworksAya Ayadi, Oussama Ghorbel, Mohammed S. BenSaleh, Abdelfateh Obeid, Mohamed Abid. 1212-1217 [doi]
- "Private and Secure ICMP Message" Solution for IP Traceback in Wireless Mesh NetworkMouna Gassara, Imen El Bouabidi, Faouzi Zarai. 1218-1224 [doi]
- A Privacy-Preserving Authentication Scheme in an Edge-Fog EnvironmentArij Ben Amor, Mohamed Abid, Aref Meddeb. 1225-1231 [doi]
- An Enhanced Multilevel Authentication Protocol for VANETsAmel Meddeb-Makhlouf, Nesrine Meddeb, Mohamed Ali Ben Ayed. 1232-1238 [doi]
- Design of a 3D Virtual World to Implement a Logical Access Control Mechanism Based on FingerprintsSamira Bader, Najoua Essoukri Ben Amara. 1239-1246 [doi]
- Detection of Covert Channels Over ICMP ProtocolSirine Sayadi, Tarek Abbes, Adel Bouhoula. 1247-1252 [doi]
- Elliptic Curve Cryptography on E-Passport Authentication ProtocolSafa Saoudi, Souheib Yousfi, Riadh Robbana. 1253-1260 [doi]
- Identifying Intrusions in Computer Networks Using Robust Fuzzy PCAAmal Hadri, Khalid Chougdali, Raja Touahni. 1261-1268 [doi]
- Improving OpenID Connect Federation's Interoperability with Web SemanticsRafael Weingärtner, Pedro Henrique Pereira Martins, Ivan Luiz Salvadori, Carla Merkle Westphall, Frank Siqueira. 1269-1276 [doi]
- Investigation of Possibilities to Detect Malware Using Existing ToolsOmer Aslan, Refik Samet. 1277-1284 [doi]
- IoT Security Framework for Smart Water SystemJesus Pacheco, Daniela Ibarra, Ashamsa Vijay, Salim Hariri. 1285-1292 [doi]
- LTKA-AC: Lightweight and Trusted Key Agreement Based on IBE with Anonymous CommunicationSarra Jebri, Mohamed Abid, Ammar Bouallegue. 1293-1298 [doi]
- Towards a Collaborative Architecture of HoneypotsAbdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman. 1299-1305 [doi]
- Trusted Third Party Based Key Management for Enhancing LoRaWAN SecuritySarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane. 1306-1313 [doi]
- Visiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork MObilitySirine Ben Ameur, Salima Smaoui, Faouzi Zarai. 1314-1321 [doi]
- Matching Procedure for NVD Vulnerabilities to Secure ETL Processes StepsSalma Dammak, Faïza Ghozzi, Faïez Gargouri. 1322-1329 [doi]
- FID: Fuzzy Based Intrusion Detection for Distributed Smart DevicesFatma Hendaoui, Hamdi Eltaief, Habib Youssef. 1330-1337 [doi]
- A New Structural and Semantic Approach for Identifying Influential Nodes in Social NetworksNesrine Hafiene, Wafa Karoui. 1338-1345 [doi]
- Community Detection in Social Network with Node Attributes Based on Formal Concept AnalysisNourhene Khediri, Wafa Karoui. 1346-1353 [doi]
- A Systematic Literature Review on Mobile Learning in Saudi ArabiaR. A. Abdulrahman, Elhadj Benkhelifa. 1354-1361 [doi]
- A Personalized On-the-Fly Approach for Secure Semantic Web Services CompositionSarra Abidi, Myriam Fakhri, Mehrez Essafi, Henda Hajjami Ben Ghézala. 1362-1369 [doi]
- Energy Consumption Adaptation Approach for Smart BuildingsEmna Taktak, Ismael Bouassida Rodriguez. 1370-1377 [doi]
- Towards Cloud Driven Semantic AnnotationOluwasegun A. Adedugbe, Elhadj Benkhelifa, Russell Campion. 1378-1384 [doi]
- An Evaluation System of Students (Applied in Primary School in Tunisia)Wiem Ben Khalifa, Dalila Souilem, Mahmoud Neji. 1385-1390 [doi]
- An Ontology-Based Multi-level Semantic Representation Model for Learning Objects AnnotationKalthoum Rezgui, Hédia Mhiri, Khaled Ghédira. 1391-1398 [doi]
- Educational Gamification Based on PersonalityMouna Denden, Ahmed Tlili, Fathi Essalmi, Mohamed Jemni. 1399-1405 [doi]
- MobiSWAP: Personalized Mobile Assessment Tool Based on Semantic Web and Web ServicesAhlem Harchay, Lilia Cheniti-Belcadhi, Rafik Braham. 1406-1413 [doi]
- Tools of Epidemiologic Research Protocol Creation: A SurveyMayara Khadhraoui, Hatem Bellaaj, Jihene Maatoug, Mohamed Jmaiel. 1414-1420 [doi]
- Towards a Semantic Medical Internet of ThingsAhmed Dridi, Salma Sassi, Sami Faïz. 1421-1428 [doi]
- Transparency Meets Management: A Monitoring and Evaluating Tool for Governmental ProjectsCelio Trois, Daniel Weingaertner, Diego Pasqualin, Edemir Maciel, Eduardo Cunha de Almeida, Fabiano Silva, Hegler Tissot, Luis C. E. Bona, Marcos A. Castilho, Marcos Didonet Del Fabro, Marcos Sfair Sunye. 1429-1435 [doi]
- Cloud Data Governance In-Light of the Saudi Vision 2030 for Digital TransformationMajid Al-Ruithe, Elhadj Benkhelifa. 1436-1442 [doi]
- An Enhanced Conceptual Model for Using Ambient Assisted Living to Provide a Home Proactive Monitoring System for Elderly Saudi ArabiansMajid H. Alsulami, Anthony S. Atkins, Russell J. Campion, Abdulellah A. Alaboudi. 1443-1449 [doi]
- A New Approximate Reasoning for Multi-bases Symbolic DataSaoussen Bel Hadj Kacem. 1450-1453 [doi]
- Using Social Interaction Between Friends in Knowledge-Based Personalized RecommendationMohamed Frikha, Mohamed Mhiri, Faïez Gargouri. 1454-1461 [doi]
- ECTD: Evidential Clustering and Case Types Detection for Case Base MaintenanceSafa Ben Ayed, Zied Elouedi, Eric Lefevre. 1462-1469 [doi]
- HealthIoT Ontology for Data Semantic Representation and Interpretation Obtained from Medical Connected ObjectsAhlem Rhayem, Mohamed Ben Ahmed Mhiri, Faïez Gargouri. 1470-1477 [doi]
- Knowledge Extraction from Source Code Based on Hidden Markov Model: Application to EPICAMFidèl Jiomekong Azanzi, Gaoussou Camara. 1478-1485 [doi]
- Ontological Reasoning for Understanding the Behaviour of Complex Biomolecular NetworksAli Ayadi, Cecilia Zanni-Merk, François de Bertrand de Beuvron, Saoussen Krichen. 1486-1493 [doi]
- Symbolic Approximate Reasoning Within Unbalanced Multi-sets: Application to Autism DiagnosisNouha Chaoued, Amel Borgi, Anne Laurent. 1494-1501 [doi]
- Towards a Decision Support Model for the Resolution of Episodic Problems Based on Ontology and Case Bases Reasoning: Application to Terrorism AttacksSouha Bennani, Ahmed Maalel, Henda Ben Ghézala, Mourad Abed. 1502-1509 [doi]