Abstract is missing.
- A New Hybrid Cipher based on Prime Numbers Generation Complexity: Application in Securing 5G NetworksAdda Boualem, Abdelkader Berrouachedi, Marwane Ayaida, Hisham A. Kholidy, Elhadj Benkhelifa. 1-8 [doi]
- An Anomaly Behavior Analysis Framework for Securing Autonomous Vehicle PerceptionMurad Mehrab Abrar, Salim Hariri. 1-6 [doi]
- DLA-ABIDS:Deep Learning Approach for Anomaly Based Intrusion Detection SystemImen Ben Ahmed, Farah Barika Ktata, Khalil Ben Kalboussi. 1-8 [doi]
- Strategies for Optimizing Time Series Visual Data ExplorationHeba Helal, Mohamed A. Sharaf. 1-4 [doi]
- Detection of Network Intrusions Using Anomaly DetectionAndré Manuel Macedo, João Paulo Magalhães. 1-6 [doi]
- A System Approach to Detect Medical Errors in Operational Data in HospitalsSaad Aldoihi, Khalid Alblalaihid, Fozah Alzemaia, Alia Almoajel, Omar Hammami, Shatha Alwablely. 1-5 [doi]
- Anomaly Behavior Analysis of Smart Water Treatment Facility Service: Design, Analysis, and EvaluationIbrahim Almazyad, Sicong Shao, Salim Hariri, Hisham A. Kholidy. 1-7 [doi]
- 3D Facial Expression Recognition Using Spiral Convolutions and TransformersHamza Bouzid, Lahoucine Ballihi. 1-7 [doi]
- Deep Face Recognition based on an Optimized Deep Neural Network using ZFNetSaid Si Kaddour, Larbi Boubchir, Boubaker Daachi. 1-5 [doi]
- Using Machine Learning for Earthquakes and Quarry Blasts DiscriminationMohamed S. Abdalzaher, Moez Krichen, Sayed S. R. Moustafa, Mohannad A. Alswailim. 1-6 [doi]
- Enhanced Implementation of Intelligent Transportation Systems (ITS) based on Machine Learning ApproachesWafaa Radi, Hesham M. El-Badawy. 1-7 [doi]
- Conceptual modeling of a document-oriented NoSQL databaseFatma Abdelhédi, Hela Rajhi, Gilles Zurfluh. 1-8 [doi]
- Security and Privacy Challenges of Participatory Sensing in Natural Disaster ManagementMohannad A. Alswailim. 1-6 [doi]
- A data analysis and processing approach for a POI recommendation systemMohamed Nadjib Kouahla, Adil Boughida, Akram Boughazi. 1-6 [doi]
- Behavior-driven Indoor Multi-Target UAV-based Detection System: Intelligent RL-based ApproachHaythem Bany Salameh, Ayyoub Hussienat, Ahmad Al Ajlouni, Mohannad Alhafnawi. 1-6 [doi]
- Introduction of Artificial Intelligence in Healthcare Lectures: An EvaluationSimon Hensel, Benjamin Jagusch, Thomas Lux. 1-5 [doi]
- BERTImages for Diabetic Retinopathy ClassificationNada Benabdessalam, Sabra Mabrouk, Faouzi Ghorbel. 1-7 [doi]
- Using a Correlation Equation to ensure Stability between Personalization and Security in Composing Web ServicesSarra Abidi, Samir Toumi, Mehrez Essafi, Chirine Ghedira Guegan, Henda Hajjami Ben Ghézala. 1-6 [doi]
- Graph-based indoor navigation system using BIM data and optimization algorithmsYusra Rachidi, Ilyass Abouelaziz. 1-8 [doi]
- A Hybrid Approach for Spatial Information Extraction from Natural Language TextNesrine Hassini, Khaoula Mahmoudi, Sami Faïz. 1-8 [doi]
- A BigData/Machine Learning system for Monitoring Road Surface ConditionPreet Patel, Tiwaloluwa Ojo, Faraaz Mohsin, Janajan Jeyabalan, Waleed El Alawi, George Daoud, Mohamed El-Darieby. 1-8 [doi]
- Seismic Fault Segmentation Using Unsupervised Domain AdaptationMaykol J. Campos Trinidad, Smith W. Arauco Canchumuni, Marco Aurélio Cavalcanti Pacheco. 1-8 [doi]
- Iterated Greedy Algorithms for Combinatorial Optimization: A Systematic Literature ReviewAhmed Missaoui, Cemalettin Ozturk, Barry O'Sullivan. 1-7 [doi]
- New Polar code for 5G New Radio NetworkIbtissem Brahmi, Emna Hajlaoui, Souhir Elleuch, Monia Hamdi, Faouzi Zarai. 1-5 [doi]
- Zero-trust management using AI: Untrusting the trusted accounts in social mediaNihad Fottouh, Sherin M. Moussa. 1-7 [doi]
- Vision Transformer based Intelligent Parking System for Smart CitiesRowayda A. Sadek, Alaa A. Khalifa. 1-6 [doi]
- Automated Network Programmability Using OpenConfig YANG Models and NETCONF ProtocolAbderrahim Amlou, Amar Abane, Mheni Merzouki, Lydia Ait-Oucheggou, Zineb Maasaoui, Abdella Battou. 1-5 [doi]
- Analogical Text Mining: Application to Arabic Text Summarization and ClassificationBilel Elayeb, Amina Chouigui, Myriam Bounhas. 1-8 [doi]
- Medical data lake query assistanceFatma Abdelhédi, Rym Jemmali, Gilles Zurfluh. 1-8 [doi]
- A Novel Rule-Based Skin Detection Method using Principal Component Analysis-Based Dimensionality Reduction and Individual Contribution on Principal ComponentsAbdelkrim Sahnoune, Djamila Dahmani, Saliha Aouat. 1-6 [doi]
- Adapting the Software Development Life Cycle for Digital Twin Development in HealthcareMariam Jaber, Abdallah Karakra, Ruba Awadallah, Hafez Barghouthi, Adel Taweel. 1-6 [doi]
- Towards a novel Data Mining System for Medication Error ManagementHanae Touati, Rafika Thabet, Franck Fontanili, Marie-Hélène Cleostrate, Marie-Noëlle Cufi, Elyes Lamine. 1-6 [doi]
- A Medical Chatbot for Tunisian Dialect using a Rule-Based and Machine Learning ApproachSonda Rekik, Maryam Elamine, Lamia Hadrich Belguith. 1-7 [doi]
- Resilient Machine Learning (rML) Against Adversarial Attacks on Industrial Control SystemsLikai Yao, Sicong Shao, Salim Hariri. 1-8 [doi]
- Zero Trust Engine for IoT EnvironmentsAmal Alshehri, Cihan Tunc. 1-3 [doi]
- Multiple Emotional Profile Representation for Personalized Information Retrieval SystemsIslam Sadat, Samir Kechid. 1-4 [doi]
- Quality Evaluation of Tone Mapping HDR Omnidirectional Image with Multi-regions and Multi-levelsXuelei Zheng, Mei Yu 0001, Gangyi Jiang. 1-7 [doi]
- Sentiment based hybrid deep learning for recommender modelsLamia Berkani, Ilyes Djerfaf, Mouaadh Hamed Abdelouahab. 1-8 [doi]
- Formal Methods for Enhanced Natural Disaster ManagementMoez Krichen, Mohammed Yahya Alzahrani. 1-6 [doi]
- Search Approach for External Data Sources for Data Warehouse Enrichment in Business Intelligence ContextRahma Djiroun, Lilia Yasmine Lachachi, Noufel Fares Eddine Azzouni, Meriem Amel Guessoum, Kamel Boukhalfa, Elhadj Benkhelifa. 1-8 [doi]
- A computer vision approach to calculate diameter, volume, velocity and flow rate of bubble leaks in offshore wellsJoão Victor Souza das Chagas, Gleber T. Texeira, Adriel S. Araújo, André Gonçalves, Fernanda G. O. Passos, Aura Conci. 1-8 [doi]
- English-Arabic Text Translation and Abstractive Summarization Using TransformersHeidi Ahmed Holiel, Nancy Mohamed, Arwa Ahmed, Walaa Medhat 0001. 1-8 [doi]
- Diversified Top-k Answering of Cypher Queries over Large Data GraphsHouari Mahfoud. 1-8 [doi]
- At-Risk Students Identification based on Machine Learning Approach: A Case Study of Computer Science Bachelor Student in TunisiaAmani Khalifa, Fatma BenSaid, Yessine Hadj Kacem, Zouhaier Jridi. 1-8 [doi]
- PyTorch and CEDR: Enabling Deployment of Machine Learning Models on Heterogeneous Computing SystemsH. Umut Suluhan, Serhan Gener, Alexander Fusco, H. Fatih Ugurdag, Ali Akoglu. 1-8 [doi]
- EcoSnow: Advancing Green Energy Monitoring with distributed three dimensional Mobile Wireless Sensors NetworksNadia Boufares, Yosra Ben Saied, Leïla Azouz Saïdane. 1-7 [doi]
- Wake-Up Receiver Based Routing Protocols in Internet of Things: A SurveyGhofrane Fersi, Robert Fromm, Maximilian Weber, Faouzi Derbel. 1-8 [doi]
- Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native ArchitecturesHisham A. Kholidy, Keven Disen, Andrew Karam, Elhadj Benkhelifa, Mohammad Ashiqur Rahman, Atta-ur-Rahman, Ibrahim Almazyad, Ahmed F. Sayed, Rakia Jaziri. 1-8 [doi]
- Traffic Accident Management System for Intelligent and Sustainable Vehicle NetworkingWafaa Radi, Hesham M. El-Badawy, Ahmed Mudassir, Hesham Kamel. 1-7 [doi]
- Developing a Recommender System for Frailty Prevention: Addressing Challenges of Data Collection and User Interface DesignGhassen Frikha, Xavier Lorca, Hervé Pingaud, Christophe Bortolaso, Katarzyna Borgiel, Elyes Lamine. 1-6 [doi]
- Fair-Share Methods for Scheduling Scientific Workflows in CloudBalqees Aldabaybah, Tawfiq Alrawashdeh, Talal Ashraf Bull, Khaled Almiani. 1-8 [doi]
- ConvMixer-UNet: A Lightweight Network for Breast Lesion Segmentation in Ultrasound ImagesSara AbdElhakem, Sohier Basiony, Marwan Torki. 1-5 [doi]
- Streamlining River Flood Prevention with an Integrated AIoT FrameworkZakaria Boulouard, Mariya Ouaissa, Mariyam Ouaissa, Moez Krichen, Mutiq Almutiq, Mohammad Algarni. 1-6 [doi]
- AraPunc: Arabic Punctuation Restoration Using TransformersAbdelrahman Sakr, Marwan Torki. 1-6 [doi]
- Effective Tool for Reporting and Analyzing Medication ErrorsLinda Bouallegue, Rafika Thabet, Chabane Mazri, Adrien Défossez, Marie-Hélène Cleostrate, Elyes Lamine. 1-6 [doi]
- Arabic Dialect Identification: Experimenting Pre-trained Models and Tools on Country-level DatasetsKhloud Khaled, Tasneem Wael, Salma Khaled, Walaa Medhat 0001. 1-7 [doi]
- Enhancing Security in 5G Networks: A Hybrid Machine Learning Approach for Attack ClassificationHisham A. Kholidy, Abdelkader Berrouachedi, Elhadj Benkhelifa, Rakia Jaziri. 1-8 [doi]
- Assessing fuel tax revenues - Study on impact of reducing fuel taxes using artificial intelligenceFelipe Borges Coelho, Smith W. Arauco Canchumuni, Marco Aurélio Cavalcanti Pacheco. 1-8 [doi]
- Lightweight Feature-based Priority Sampling for Industrial IoT Multivariate Time SeriesMohammad Ali Nemer, Joseph Azar, Abdallah Makhoul, Julien Bourgeois. 1-8 [doi]
- Securing Automotive Ethernet: Design and Implementation of Security Data Link SolutionsMarco De Vincenzi 0001, Chiara Bodei, Ilaria Matteucci. 1-9 [doi]
- A New Time-Aware LSTM based Framework for Multi-label Classification on Healthcare DataAbdelhamid Gaddari, Haytham Elghazel, Rakia Jaziri, Mohand-Said Hacid, Pierre-Henri Comble. 1-8 [doi]
- Securing Biometric Systems by using Perceptual Hashing TechniquesMaamar Hamadouche, Khalil Zebbiche, Youcef Zafoune. 1-4 [doi]
- An Ensemble-based Neural Network Model for Natural Disaster in 2019Vartika Bhadana, Pooja Pathak, Anand Singh Jalal, Ashish Sharma 0003, Bhisham Sharma, Imed Ben Dhaou. 1-7 [doi]
- Violent Speech Detection in Educational EnvironmentsManel Chnini, Nissaf Fredj, Fatma BenSaid, Yessine Hadj Kacem. 1-8 [doi]
- Towards an End-to-End Speech Recognition Model for Accurate Quranic RecitationSumayya Al-Fadhli, Hajar Al-Harbi, Asma Cherif 0001. 1-4 [doi]
- Performance Evaluation of VANET Statistical Broadcast Protocols for Smart CitiesEvrosina A. Amir, Shahinaz M. Al-tabbakh, Samiha T. Beshay, Ibrahim Gomaa. 1-8 [doi]
- Adaptative Access Management in 5G IoE using Device Fingerprinting: Discourse, Mechanisms, Challenges, and OpportunitiesSamia Oukemeni, Muslim Elkotob. 1-7 [doi]
- Building Trust in Supply Chains: The Blockchain-QR Code AdvantageMunir Majdalawieh. 1-7 [doi]
- A Data Collection Platform for Network ManagementAmar Abane, Abdella Battou, Abderrahim Amlou, Tao Zhang. 1-7 [doi]
- Improving Channel Utilization in VANETs Using Q-Learning-Based Data Rate Congestion ControlGnana Shilpa Nuthalapati, Arunita Jaekel. 1-7 [doi]
- An overview of the Image Description Systems in Arabic LanguageNada Farhani, Naim Terbeh, Mounir Zrigui. 1-8 [doi]
- Innovative Routing Solutions: Centralized Hypercube Routing Among Multiple Clusters in 5G NetworksAbdulbast A. Abushgra, Hisham A. Kholidy, Abdelkader Berrouachedi, Rakia Jaziri. 1-7 [doi]
- Generating and Testing Synthetic Datasets for Recommender Systems to Improve Fairness in Collaborative Filtering ResearchJesús Bobadilla, Abraham Gutiérrez. 1-6 [doi]
- Fine Tuning of large language Models for Arabic LanguageAhmed Tamer, Al-Amir Hassan, Asmaa Ali, Nada Salah, Walaa Medhat 0001. 1-4 [doi]
- A Cross-Validation Approach for Classifying Physical Activity Intensity : A Case Study in Children with Attention Deficit/Hyperactivity DisorderIbrahim Traoré, Imen Megdiche, Jérôme Marquet-Doléac, Lotfi Chaâri. 1-8 [doi]
- Combining Stylometric and Sentiment Mining Approaches for Deceptive Opinion Spam DetectionAlibek Jakupov, Besma Zeddini, Julien Longhi, Julien Mercadal. 1-8 [doi]
- Clustering analysis of metered Arabic poetry compositionsAbdelmalek Berkani, Adrian Holzer. 1-8 [doi]
- A Petri Net-based Formal Modeling for Microservices Auto-scalingSouheir Merkouche, Chafia Bouanaka, Elhadj Benkhelifa. 1-8 [doi]
- The Internet of Things (IoT) Contribution to Natural Disaster Management: ReviewDinesh Goyal, Aditya Sharma, Kamal Deep Garg, Bhisham Sharma, Imed Ben Dhaou. 1-7 [doi]
- Deploying Artificial Intelligence for Optimized Flood Forecasting and MitigationMohammad Algarni. 1-6 [doi]
- MoonCAB : a Modular Ontology for Computational analysis of Animal BehaviorNourelhouda Hammouda, Mariem Mahfoudh, Khouloud Boukadi. 1-8 [doi]
- Enhancing Anomaly Detection in Videos using a Combined YOLO and a VGG GRU ApproachFabien Poirier, Rakia Jaziri, Camille Srour, Gilles Bernard. 1-6 [doi]
- Research Trends, Challenges, and Future Directions in Vehicular NetworksIslam Tharwat Abdel-Halim, Hossam M. A. Fahmy. 1-7 [doi]
- What does KnowBert-UMLS forget?Guilhem Piat, Nasredine Semmar, Julien Tourille, Alexandre Allauzen, Hassane Essafi. 1-8 [doi]
- Artificial Intelligence Based SysML Block Diagram Extension and Evolution for Product LinesOlfa Ferchichi, Raoudha Beltaifa, Lamia Labed Jilani. 1-8 [doi]
- Evaluation of ChatGPT-supported diagnosis, staging and treatment planning for the case of lung cancerDimitrios P. Panagoulias, Filippos A. Palamidas, Maria Virvou, George A. Tsihrintzis. 1-8 [doi]
- Offensive Hebrew Corpus and Detection using BERTNagham Hamad, Mustafa Jarrar, Mohammad Khalilia, Nadim Nashif. 1-8 [doi]
- A Study on the Relevance of Generic Word Embeddings for Sentence Classification in Hepatic SurgeryAchir Oukelmoun, Nasredine Semmar, Gaël de Chalendar, Enguerrand Habran, Eric Vibert, Emma Goblet, Mariame Oukelmoun, Marc-Antoine Allard. 1-8 [doi]
- Semantic Knowledge Graphs for Scalable Knowledge Discovery and Acquisition in Public HealthMunir Majdalawieh, Haleama Al-Sabbah, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Elhadj Benkhelifa. 1-6 [doi]
- An Explainable Outlier Detection-based Data Cleaning Approach for Intrusion DetectionTheodore Ha, Sicong Shao, Salim Hariri. 1-8 [doi]
- TiVEx: Optimized Processing for Time Series Visual ExplorationHeba Helal, Mohamed A. Sharaf, Mohammad M. Masud 0001, Panos K. Chrysanthis. 1-8 [doi]
- A Hybrid Epoch Scheduling Scheme of Mixed Workloads with Different Types of Jobs on Distributed ProcessorsHelen D. Karatza. 1-7 [doi]
- Lisan: Yemeni, Iraqi, Libyan, and Sudanese Arabic Dialect Corpora with Morphological AnnotationsMustafa Jarrar, Fadi A. Zaraket, Tymaa Hammouda, Daanish Masood Alavi, Martin Wählisch. 1-7 [doi]
- Security aspects of full-duplex web interactions and WebSocketsYang Fu, Marisol García-Valls. 1-8 [doi]
- Segmentation of skin layers in ultrasound images using a crowdsourcing and deep learning-based systemMaira B. H. Moran, Larissa Aparecida Vaz Oliveira, Marcelo Daniel Brito Faria, Luciana Freitas Bastos, Gilson A. Giraldi, Clarissa Canella, Aura Conci. 1-8 [doi]
- Enhancing Parking Online Reservation with a Recommendation System based on User Preferences: A hybrid ApproachSerine Guellab, Imane Benkhelifa. 1-6 [doi]
- Design and Development of Policy Enforcement for the Privacy by Design FrameworkMichael Lescisin, Qusay H. Mahmoud. 1-6 [doi]
- Intrusion Detection for Additive Manufacturing Systems and NetworksSeemaparvez Shaik, Cihan Tunc, Kirill Morozov. 1-3 [doi]
- A Disaster Management System Using Cloud ComputingSaurabh Singhal, Ashish Sharma 0003, Mahendra Kumar Gourisaria, Bhisham Sharma, Imed Ben Dhaou. 1-6 [doi]
- A Multi-criteria Evaluation Framework For Facial Expression Recognition ModelsAmira Mouakher, Sylvain Chatry, Samira El Yacoubi. 1-8 [doi]
- Enhancing LiDAR Semantic Segmentation Using Model SoupsOmar Wasfy, Sohier Basiony, Marwan Torki. 1-7 [doi]
- Empowering Data Federation Security in Polystore SystemsJuba Agoun, Juba Terras, Mohand-Saïd Hacid, Salim Hariri. 1-8 [doi]
- Quantum Computing for DNA Analysis and AI in GenomicsAbdellah Tahenni, Fatiha Merazka, Fatma Zahra Hab. 1-6 [doi]
- Towards Hybrid Predictive Maintenance for Aircraft Engine: Embracing an Ontological-Data ApproachIbrahima Barry, Meriem Hafsi. 1-6 [doi]
- Why Ethics is important to consider in AI ?Nada Matta, Marie-Hélène Abel, Hedi Karray. 1-5 [doi]
- Developing IoT-based Smart Health Monitoring Systems using Design PatternsMariem Ben Hassine, Imen Tounsi, Mohamed Hadj Kacem. 1-8 [doi]
- Ensemble Learning Approach for Intrusion Detection Systems in Industrial Internet of ThingsMudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed. 1-7 [doi]
- 2D-ZasHen Chaotic Map-Based Medical Image Cryptographic Approach in IoT-Based Healthcare MonitoringSylia Amarouche, Said Talbi, Mehammed Daoui, Jean-François Couchot. 1-8 [doi]
- A Thermographic Time Series Approach for Evaluating the Breast Cancer TreatmentAdriel S. Araújo, Milena H. S. Issa, João Victor Souza das Chagas, Ángel Sánchez, Débora C. Muchaluat-Saade, Aura Conci. 1-8 [doi]
- Uncertainty-Aware Web of Things Composition: A Probabilistic ApproachSoura Boulaares, Salma Sassi, Richard Chbeir, Djamal Bensilmane, Sami Faïz. 1-8 [doi]
- Design and Implementation of an Automated Network Traffic Analysis System using Elastic StackZineb Maasaoui, Mheni Merzouki, Anis Bekri, Amar Abane, Abdella Battou, Ahmed Lbath. 1-6 [doi]
- Video saliency detection based on color-contrast, motion and texture distinctiveness modelAmal Talbi, Mehrez Abdellaoui. 1-8 [doi]
- MAM: Multimodel Attention Mechanism for Social Media Natural Disaster Management Tweet ClassificationM. Sangeetha, R. Manjula Devi, Bhisham Sharma, Subrata Chowdhury, Imed Ben Dhaou. 1-6 [doi]
- Advances in AI and Drone-based Natural Disaster Management: A SurveyMoez Krichen, Mohamed S. Abdalzaher. 1-6 [doi]
- Embracing Diversity and Inclusion: A Decolonial Approach to Urban ComputingGenoveva Vargas-Solar, Chirine Ghedira Guegan, Javier A. Espinosa-Oviedo, José-Luis Zechinelli-Martini. 1-6 [doi]
- Learning routes within an intelligent on demand transport serviceEmna Ayari, Sonia Nasri, Wassila Aggoune-Mtalaa, Hend Bouziri. 1-7 [doi]
- Leveraging Nucleotide Dependencies for Improved mRNA Vaccine Degradation PredictionKadhim Hayawi, Sakib Shahriar, Hany Alashwal. 1-6 [doi]
- A machine learning technique for device non-wear detection in children with ADHDIbrahim Traoré, Imen Megdiche, Jérôme Marquet-Doléac, Lotfi Chaâri. 1-6 [doi]
- Driving Perception in Challenging Road Scenarios: An Empirical StudyMourad A. Kenk, Mona Elsaidy, M. Hassaballah 0001, Mahmoud B. A. Mansour. 1-6 [doi]
- Efficient Approaches for Safeguarding Sensitive Data during Natural DisastersMoez Krichen. 1-6 [doi]
- Computerized Irrigation SchedulingBamory Ahmed Toru Koné, Rima Grati, Bassem Bouaziz, Khouloud Boukadi. 1-8 [doi]