Abstract is missing.
- Sentiment Analysis using supervised classification algorithmsYassine Al-Amrani, Mohamed Lazaar, Kamal Eddine Elkadiri. [doi]
- Human Fall Detection Using Von Mises Distribution and Motion Vectors of Interest PointsAbdessamad Youssfi Alaoui, Azeddine El Hassouny, Rachid Oulad Haj Thami, Hamid Tairi. [doi]
- Exploiting Open Data to Improve the Business Intelligence & Business Discovery ExperienceOussama El Bacha, Othmane Jmad, Younes El Bouzekri El Idrissi, Nabil Hmina. [doi]
- From Data to Big Data: Moroccan Public SectorR. Khtira, B. Elasri, M. Rhanoui. [doi]
- Penguins Search Optimization Algorithm to Solve Quadratic Assignment ProblemI. Mzili, Mohammed Essaid Riffi, F. Benzekri. [doi]
- Data Security and risks for IoT in intercommunicating objectsJalal Laassiri. [doi]
- A Smart Approach for Intentional Islanding based on Dynamic Selection Algorithm in Microgrid with distributed generationYoussef Hamdaoui, Abdelilah Maach. [doi]
- Safe and Irrefutable Decentralized Communication: Bringing Non-Repudiation to Mesh NetworksH. Kamdem Fezeu, T. Djotio, Rachid Oulad Haj Thami. [doi]
- Towards Clustering Validation in Big Data ContextSoumeya Zerabi, Souham Meshoul, Amina Merniz, Radia Melal. [doi]
- A Customer Emotion Recognition through Facial Expression using POEM descriptor and SVM classifierMoulay Smail Bouzakraoui, Abdelalim Sadiq, Nourddine Enneya. [doi]
- Social Learning tool for a conceptual changeRajaa Aoulad Moussa, Mourad Madrane, Rachid Janati-Idrissi, Mohammed Laafou. [doi]
- Adaptive Appearance Model in Particle filter based Visual TrackingW. Oulad Abdeslam, Y. Tabii, Kamal Eddine El Kadiri. [doi]
- Secure confidential big data sharing in cloud computing using KP-ABEAmghar Sara, Tabaa Yassine, Medouri Abdellatif. [doi]
- Survey of Plagiarism Detection Approaches and Big data Techniques related to Plagiarism Candidate RetrievalOumaima Hourrane, El Habib Benlahmar. [doi]
- An improved model for restoring and protecting the digital images: mathematical modeling and optimizationN. Joudar, Mohamed Ettaouil. [doi]
- Hand Gesture Recognition Using Kinect's Geometric and HOG FeaturesMarouane Hamda, Abdelhak Mahmoudi. [doi]
- New Image Steganography Method Based on K-means ClusteringIsmail Kich, El Bachir Ameur, Abdelghani Souhar. [doi]
- A multi-objective model for discrete and dynamic Berth Allocation ProblemEl Hammouti Issam, Lajjam Azza, El Merouani Mohamed, Aharmouch kaoutar, Tabaa Yassine. [doi]
- Integration of data mining techniques in e-learning systems: Clustering Profil of Lerners and Recommender Course SystemA. El Moustamid, E. En-Naimi, J. El Bouhdidi. [doi]
- Promoting elementary mathematics learning through digital games: Creation, implementation and evaluation of an edutainment game to promote basic mathematical operationsTariq Bouzid, Hassane Darhmaoui, Fatiha Kaddari. [doi]
- Toward Interoperability Approach between Federated SystemsHasnae L'amrani, Badr Eddine Berroukech, Younès El Bouzekri El Idrissi, Rachida Ajhoun. [doi]
- E-Learning Real Time Analysis Using Large Scale InfrastructureAbdelmajid Chaffai, Larbi Hassouni, Houda Anoun. [doi]
- Graph Based Representation for Arabic Text CategorizationMeryeme Hadni, Mounir Gouiouez. [doi]
- Build a Morphosyntaxically Annotated Amazigh CorpusS. Amri, Lahbib Zenkouar, Mohamed Outahajala. [doi]
- A Modeling Framework for the Moroccan sociolect recognition used on the social mediaFadoua Mansouri, Sadiq Abdelalim, El Azami Ikram. [doi]
- Simulation of electromagnetic waves propagation in free space using Netlogo multi-agent approachHamid Bezzout, Sara Hsaini, Salma Azzouzi, Hanan El Faylali. [doi]
- Revisiting BFR Clustering Algorithm for Large Scale Gene Regulatory Network Reconstruction using MapReduceM. Daoudi, S. Meshoul. [doi]
- Threshold-based load balancing algorithm for Big Data on a Cloud environmentYassir Samadi, Mostapha Zbakh. [doi]
- Prediction of Supplier Performance: A Novel Dea-Anfis Based ApproachRohaifa Khaldi, Raddouane Chiheb, Abdellatif El Afia, Adil Akaaboune, Rdouan Faizi. [doi]
- A New Responsive SCORM Design (RSCOD) Approach Based Semantic Learning Object (SLO) Using SharePoint Learning Kit (SLK)Zouhair Rimale, El Habib Benlahmar, Abderrahim Tragha. [doi]
- Car Make and Model Recognition using Sparse Coding and Bag of FeaturesIlias Kamal, Khalid Housni, Moulay Youssef Hadi. [doi]
- A Semi-Blind Information Hiding Technique Using DWT-SVD and QAM-16 for Medical ImagesHabib Ayad, Mohammed Khalil. [doi]
- Detecting Malicious Users in Social Network via Collaborative FilteringFatna Elmendili, Younes El Bouzekri El Idrissi, Habiba Chaoui. [doi]
- Recommendation Semantic of Services In Smart CityChaymae Benfares, Younès El Bouzekri El Idrissi, Abdellah Abouabdellah. [doi]
- Towards the semantic annotation of Web of Things: A collective disambiguation approachI. Nadim, Y. El Ghayam, A. Sadiq. [doi]
- Multilayer Perceptron: Architecture Optimization and training with mixed activation functionsHassan Ramchoun, M. A. Janati Idrissi, Youssef Ghanou, Mohamed Ettaouil. [doi]
- Mining Moocs Videos Metadata Using Classification TechniquesEl Harrak Othman, Ghadi Abderrahim, El Bouhdidi Jaber. [doi]
- Face Detection Using Rotated Asymmetric Haar FeaturesM. Oualla, A. Sadiq. [doi]
- Detection and Recognition of Road SignsHassan Bousnguar, Ilias Kamal, Khalid Housni, Moulay Youssef Hadi. [doi]
- Classification of Breast Cancer with Improved Self-Organizing MapsHicham Omara, Mohamed Lazaar, Youness Tabii. [doi]
- Implementation and Performance Evaluation of Intrusion Detection Systems under high-speed networksMohammed Saber, Mohammed Ghaouth Belkasmi, Sara Chadli, Mohamed Emharraf, Ilhame El Farissi. [doi]
- Securing Data in Cloud Computing by ClassificationIbtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour. [doi]
- Syntactic entropy for main content extraction from web pagesIsmail Jellouli, Badr Eddine El Mohajir, Mohammed Al Achhab. [doi]
- Toward Efficient Ranked-key Algorithm for the Web notification of Big Data SystemsMohamedou Cheikh Tourad, Abdelmounaim Abdali. [doi]
- Mobile Cloud Learning: A New Responsive SCORM Design Approach Based Semantic Learning Object on the Microsoft SharePoint Online and Office 365Zouhair Rimale, El Habib Benlahmar, Abderrahim Tragha. [doi]
- Security of communications in connected cars Modeling and safety assessmentS. Tbatou, A. Ramrami, Youness Tabii. [doi]
- Semantico-automatic Evaluation of Scientific Papers: State of the ArtSara Mifrah, El Habib Ben Lahmar. [doi]
- Particle Filter Object Tracking Based on Color Histogram and Gabor Filter MagnitudeMohammed Lahraichi, Khalid Housni, Samir Mbarki. [doi]
- Data Collect Requirements ModelI. Tikito, N. Souissi. [doi]
- Comparative Study: Dependability of Big Data in the CloudFatima Ezzahra Mdarbi, Nadia Afifi, Imane Hilal. [doi]
- Directional Data Classification Using a Hierarchical Model of Von Mises DistributionS. Benlakhdar, Mohammed Rziza, Rachid Oulad Haj Thami. [doi]
- Methodological Sketch of Observer-Based Access ControlMohammed Walid Krakallah, Safia Nait Bahloul. [doi]
- Cloud Computing Performance Evaluation under Dynamic Resource Utilization and Traffic ControlMohamed Hanini, Said El Kafhali. [doi]
- Serious Games ModelingChaimae Meftah, Asmaâ Retbi, Samir Bennani, Mohammed Khalidi Idrissi. [doi]
- Artificial Neural Network Based Approach for Blood Demand Forecasting: Fez Transfusion Blood Center Case StudyRohaifa Khaldi, Abdellatif El Afia, Raddouane Chiheb, Rdouan Faizi. [doi]
- Adaptive Educational Hypermedia Systems: Current Developments and ChallengesKenza Sakout Andaloussi, Laurence Capus, Ismail Berrada. [doi]
- Search Engine Optimization to detect user's intentSalma Gaou, Aissam Bekkari, Marouane El Mabrouk, Abdelhamid Zouhair. [doi]
- Big Data Technologies to Improve Medical Data WarehousingAbderrazak Sebaa, Amina Nouicer, Fatima Chikh, Abdelkamel Tari. [doi]
- A new cloud computing approach based SVM for relevant data extractionHamza Saouli, Abderaouf Ghamri, Abdelhak Merizig, Okba Kazar. [doi]
- Apport de la théorie de l'activité et des outils collaboratifs à la gestion des connaissancesEl. Megder, Chihab Eddine Cherkaoui, Driss Mammass. [doi]
- El-Security: E-learning Systems Security Checker Plug-inKarima Aissaoui, Mostafa Azizi. [doi]
- Evaluation of PCL's Descriptors for 3D Object Recognition in Cluttered SceneNabila Zrira, Fatima Zahra Ouadiay, Mohamed Hannat, El-Houssine Bouyakhf, Mohamed Majid Himmi. [doi]
- Towards an ontology of dependability Automatic search approach with Systematic MappingNadia Zahir, Nadia Afifi, Imane Hilal. [doi]
- Solving the location-routing problems Using Clustering MethodFadoua Oudouar, Abdellah El Fellahi. [doi]
- Neural Network Approach for Fault Detection in SubstationsElmahdi Khoudry, Abdelaziz Belfqih, Mohamed Nouh Dazahra. [doi]
- Multi-label Categorization of French Death Certificates using NLP and Machine LearningAllaouzi Imane, Ben Ahmed Mohamed. [doi]
- Ant Colony system approach for dynamic vehicles routing problem multi toursKhaoula Ouaddi, Youssef Benadada, Fatima Zahra Mhada. [doi]
- Big Data Analytics Techniques in Virtual Screening for Drug DiscoveryKarima Sid, Mohamed Chawki Batouche. [doi]
- Overview on 3D models searching and indexingSouhaib Douass, M'hamed Aït Kbir. [doi]
- Application of Arabic language processing in language learningAnoual El Kah, Imad Zeroual, Abdelhak Lakhouaja. [doi]
- Watershed transform for text lines extraction on binary Arabic handwriten documentsAbdelghani Souhar, Youssef Boulid, Elb. Ameur, Mly. M. Ouagague. [doi]
- Particle Swarm Optimization for Model Selection of Aircraft Maintenance Predictive ModelsAbdellatif El Afia, Malek Sarhani. [doi]
- Supervised learning in Branch-and-cut strategiesAbdellatif El Afia, Mohamed Mustapha Kabbaj. [doi]
- Towards an automatic generator of mathematical exercises based on semanticImane Lmati, Habib Benlahmar, Naceur Achtaich. [doi]
- Towards a Stochastic Model for Integrated detection and filtering of DoS attacks in Cloud environmentsIman El Mir, Dong Seong Kim, Abdelkrim Haqiq. [doi]
- New Approach for Microarray Data Decision Making with Respect to Multiple SourcesFadoua Rafii, Badr Dine Rossi Hassani, M'hamed Aït Kbir. [doi]
- A Cloud Face Recognition System using A New Optimal Local Binary PatternA. Dahmouni, K. El Moutaouakil, Kh. Satori. [doi]
- State of the art in MapReduce: issues and approachesLabdaoui Imane, Tabii Youness. [doi]
- New checker for constraint network solutionsK. Haddouch, K. El Moutaouakil. [doi]
- Impact of Selecting Virtual Machine with Least Load on Tasks Scheduling Algorithms in Cloud ComputingTahani Aladwani. [doi]
- Face Tracking based on Hierarchical Motion and Motion ModelsAsmae Rabhi, Yassine El Ghayam, Abdelalim Sadiq, Abdelaziz Mouloudi. [doi]
- Security in Cloud-Based Medical Image Processing: Requirements and ApproachesM. Marwan, Ali Kartit, Hassan Ouahmane. [doi]
- New access control policies for private network and protocol securityJalal Laassiri, Yousra Hafid. [doi]
- Revision of the learning resources modeling concept by Recursive Entity Modeling Method (REMM)Amal Rifai, Tahri Joutey Majda, M'hamed Bakrim, Abdelalim Sadiq. [doi]
- A Legacy Application Meta-model for ModernizationK. Sabiri, F. Benabbou. [doi]
- Performance Evaluation of Cluster Validity Methods an Energy Optimization in Wireless Sensor Networks Using Hybrid K-Medoids AlgorithmAziz Mahboub, El Mokhtar En-Naimi, Mounir Arioua, Hatim Anas. [doi]
- Data-driven based aircraft maintenance routing by markov decision process modelAbdellatif El Afia, Oussama Aoun. [doi]
- Fuzzy logic controller for an adaptive Huang cooling of simulated annealingAbdellatif El Afia, Mohamed Lalaoui, Raddouane Chiheb. [doi]
- Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloudHicham Toumi, Bouchra Marzak, Yassine Khazri, Amal Talea, Ahmed Eddaoui, Mohamed Talea. [doi]
- Gamified Stress Management Calendar for Higher Education StudentsM. Berehil, K. Arrhioui, S. Mbarki. [doi]
- Metaheuristics Applied in Remanufacturing and Reverse logistics: A reviewHanane Rachih, Fatima Zahra Mhada, Raddouane Chiheb. [doi]
- Popularity Prediction of Videos in YouTube as Case Study: A Regression Analysis StudySoufiana Mekouar, Nabila Zrira, El-Houssine Bouyakhf. [doi]
- Analysing Clustering Routing Protocols Performance for Vehicular NetworksBouchra Marzak, Hicham Toumi, Elhabib Benlahmar, Mohamed Talea. [doi]
- An Effective Genetic Algorithm for Solving Series-Parallel Power System ProblemAmine Amarir, Mustapha ES-Sadqi, Abdellah Idrissi. [doi]
- Design of a Remote Experience for Electrical Engineering Using Embedded SystemsA. Abouhilal, A. Moulay Taj, M. Mejdal, A. Malaoui. [doi]
- A comparison of Text Classification methods Method of weighted terms selected by different Stemming TechniquesM. Bounabi, K. El Moutaouakil, Kh. Satori. [doi]
- A global mapping of the Moroccan supply chain of hospital drugs, and a simulation of the dispensation processAbdellatif El Afia, Houda Mezouar. [doi]
- New initialization for clustering algorithms combining distance and densityM. El Alaoui, H. Ben-Azza. [doi]
- Developing and performance evaluation of a new Arabic heavy/light stemmerImad Zeroual, Mohamed Boudchiche, Azzeddine Mazroui, Abdelhak Lakhouaja. [doi]
- Modeling of Problem Based Learning Strategy by Recursive Entity Modeling MethodAmal Rifai, Tahri Joutey Majda, M'hamed Bakrim, Abdelalim Sadiq. [doi]
- Machine learning for personalized access to multiple data sources through ontologiesOumayma Banouar, Said Raghay. [doi]
- Fully homomorphic encryption: Searching over encrypted cloud dataAhmed El-Yahyaoui, Mohamed Dafir EC-Chrif El Kettani. [doi]
- A new reformulation of the load balancing problem in cloud computing based on TSP and ACOChouaib Moussaddaq, Abdellah Ezzati, Rachid Elharti. [doi]
- A Hybrid Approach for Optimized Composition of Cloud ServicesSoumia Zertal, Mohamed Chawki Batouche. [doi]
- Restoration Image Degraded by PSF Non-StationaryY. Bentahar, Mohamed Afifi, H. Dalimi, S. Amar, Mustapha Bahich. [doi]
- Novel parallel Givens QR decomposition implementation on VLIW architecture with Efficient memory access for real time image processing applicationsMohamed Najoui, Anas Hatim, Said Belkouch. [doi]
- A new LOM application profile to describe complementary pedagogical resources in an CRHLMohamed Kamal Rtili, Mohamed Khaldi, Marouane El Mabrouk, Ali Dahmani. [doi]
- Association rules mining on MapReduceSaida El Mendili, Younes El Bouzekri El Idrissi, Nabil Hmina. [doi]
- Development and Management of a Remote Laboratory in Physics for Engineering Education (E-LAB FSBM)Yassine Khazri, A. Al Sabri, B. Sabir, H. Toumi, Mohammed Moussetad, Ahmed Fahli. [doi]
- Estimate of Stochastic Model Parameter of Exchange Rate Using Artificial IntelligenceEl Hachloufi Mostafa, Faris Hamza, El Haddad Mohammed. [doi]
- Fast Similarity Search in High Dimensional Image Data SetsYoussef Hanyf, Hassan Silkan. [doi]
- A Seamless Handover Based MIH-Assisted PMIPV6 in Heterogeneous Network(LTE-WIFI)Asmae Ait Mansour, Nourddine Enneya, Mohamed Ouadou. [doi]
- Design a Secure Framework for Cloud-Based Medical Image StorageM. Marwan, Ali Kartit, Hassan Ouahmane. [doi]
- A Stable Route Prediction and the Decision Taking at Sending a Data Packet in a Highway EnvironmentMohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq. [doi]