Abstract is missing.
- Enterprise architecture implementation model: Measurement from experts and practitioner perspectivesNur Azaliah A. Bakar, S. Harihodin, Nazri Kama. 1-6 [doi]
- A combined e-learning and finance management system based on ontology: A case study of SMEs in MoroccoHicham Rachidi, Mohammed El Mohajir. 7-12 [doi]
- Comparative analysis of drug supply and inventory management methods literature reviewSara Jebbor, Abdellatif El Afia, Raddouane Chiheb, Fatima Ouzayd. 13-18 [doi]
- Improvement of the lean-maintenance by hospital logisticsDriss Serrou, Khaoula Khlie, Abdellah Abouabdellah. 19-24 [doi]
- f directors and managers in developing countries using UTAUT2, SEM and RAbdellah Zaouia, AmineArrahmane Achargui, Fatima Jalil. 25-30 [doi]
- Overview on technology of vertical handover and MIH architectureImane Chattate, Jamila Bakkoury, Azeddine Khiat, Mohamed El Khaili. 31-34 [doi]
- The implementation trends of intelligence E-CRM in business processBashar Shahir Ahmed, Fadi Amroush, Mohammed Larbi Ben Maati. 35-39 [doi]
- Toward a new multi-agents architecture for the adoption of ITIL framework by small and medium-sized enterprisesAbir El Yamami, Khalifa Mansouri, Mohammed Qbadou, El Hossein Illousamen. 40-45 [doi]
- A measurement model for factors influencing data quality in data warehouseNouha Zellal, Abdellah Zaouia. 46-51 [doi]
- A data warehouse for local good governance monitoring and assessement - Case study of local registry office in MoroccoHouda Chakiri, Mohammed El Mohajir. 52-58 [doi]
- Dynamic management of data warehouse security levels based on user profilesAmina El Ouazzani, Sara Rhazlane, Nouria Harbi, Hassan Badir. 59-64 [doi]
- Automatic generation of TestNG tests cases from UML sequence diagrams in Scrum processMeryem Elallaoui, Khalid Nafil, Rajaa Touahni. 65-70 [doi]
- Designing a health data management system based hadoop-agentFadoua Khennou, Youness Idrissi Khamlichi, Nour El Houda Chaoui. 71-76 [doi]
- Study and analysis of data mining for healthcareZoubida Alaoui Mdaghri, Mourad El Yadari, Abdelillah Benyoussef, Abdellah El Kenz. 77-82 [doi]
- A model-driven approach for generating RIA interfaces using IFML and ontologiesNaziha Laaz, Samir Mbarki. 83-88 [doi]
- Using XML technology in the development process of web applicationsMarouane Sayih, Anne Brüggemann-Klein. 89-93 [doi]
- Towards XML schema extraction from deep webYasser Saissi, Ahmed Zellou, Ali Idri. 94-99 [doi]
- Robustness study in closed social networks using spanning tree approachHajar Sahbani, Mohamed El Marraki. 100-103 [doi]
- A new parallel approach for the exploitation of the search space based on PSO algorithmMaria Zemzami, Norelislam El Hami, Mhamed Itmi, Nabil Hmina. 104-110 [doi]
- Influentials identification for community detection in complex networksSara Ahajjam, Mohamed El Haddad, Hassan Badir. 111-115 [doi]
- A model transformation in MDA from CIM to PIM represented by web models through SoaML and IFMLYassine Rhazali, Youssef Hadi, Abdelaziz Mouloudi. 116-121 [doi]
- Coordination by sharing demand forecasts in a supply chain using game theoretic approachIlhame El Farissi, Ilham Slimani, Saïd Achchab. 122-127 [doi]
- A probabilistic method for business process verification: Reachability, Liveness and deadlock detectionMohamed Naoum, Outman El Hichami, Mohammed Al Achhab, Badr Eddine El Mohajir. 128-132 [doi]
- New model of intrusion detection based on multi agent systems and CBR paradigmMohssine El Ajjouri, Siham Benhadou, Hicham Medromi. 133-138 [doi]
- Handling alerts for intrusion detection system using stateful pattern matchingEl Mostapha Chakir, Youness Idrissi Khamlichi, Mohamed Moughit. 139-144 [doi]
- The analysis performance of an Intrusion Detection Systems based on Neural NetworkIlhame El Farissi, Mohammed Saber, Sara Chadli, Mohamed Emharraf, Mohammed Ghaouth Belkasmi. 145-151 [doi]
- Big incremental dynamic case-based reasoning-multi-agents system (BIDCBR-MAS) based on cloud computingAbdelhamid Zouhair, El Mokhtar En-Naimi. 152-157 [doi]
- Towards designing an EA readiness instrument: A systematic reviewSurya Sumarni Hussein, Zuraini Ismail, Mohd Naz'ri Mahrin, Mohd Shahidan Abdullah, Nor Zairah Ab. Rahim, Ganthan Narayana Samy, Mohamad Zainuddi Mat Taib. 158-163 [doi]
- Towards new hybrid approach of the reverse engineering of UML sequence diagramChafik Baidada, Abdeslam Jakimi. 164-168 [doi]
- Converting strangers to clients using web mining techniquesMeryem Boufim, Hafid Barka. 169-174 [doi]
- Meta-analysis of lean case studies for the business process improvementYounes Tiamaz, Nissrine Souissi. 175-181 [doi]
- Improvement of information system security risk managementWissam Abbass, Amine Baïna, Mostafa Bellafkih. 182-187 [doi]
- Conformity testing by optimal constraints for object oriented programsKhadija Louzaoui, Khalid Benlhachmi, Jihane Alami Chentoufi. 188-193 [doi]
- Detection and elimination of class noise in large datasets using partitioning filter techniqueBtissam Zerhari, Ayoub Ait Lahcen, Salma Mouline. 194-199 [doi]
- Automation in code generation: Tertiary and systematic mapping reviewZouhair Ibn Batouta, Rachid Dehbi, Mohamed Talea, Omar Hajoui. 200-205 [doi]
- A memetic hunting search algorithm for the traveling salesman problemAmine Agharghor, Mohammed Essaid Riffi, Faycal Chebihi. 206-209 [doi]
- Towards a generic framework for requirements traceability management for SysML languageSaida Haidrar, Adil Anwar, Ounsa Roudiès. 210-215 [doi]
- An approach based on ontology for discovering data impacting the execution of a business processPierre-Aymeric Masse, Nassim Laga, Mohammed Oussama Kherbourche, Jacques Simonin. 216-221 [doi]
- Modeling and creating KPIs in MDA approachKhadija Letrache, Omar El Beggar, Mohamed Ramdani. 222-227 [doi]
- Project portfolio management information systems (PPMIS) information entropy based approch to prioritize PPMISDriss El Hannach, Rabia Marghoubi, Mohamed Dahchour. 228-234 [doi]
- Evolution of inter-organizational workflows: The case-transfer patternSaïda Boukhedouma, Zaia Alimazighi, Mourad Chabane Oussalah. 235-242 [doi]
- State of the art and trends of the research on XBRL bibliometric analysis from 2000-2014Mohssen El Ansary, Mourad Oubrich. 243-250 [doi]
- GUI structure and behavior from Java source code analysisZineb Gotti, Samir Mbarki. 251-256 [doi]
- A comparative study of some algorithms for detecting communities in social networksAkachar Elyazid, Ouhbi Brahim, Frikh Bouchra. 257-262 [doi]
- A web based crowdsourcing framework: Lost child caseHasna El Alaoui El Abdallaoui, Abdelaziz El Fazziki, Abderrahmane Sadiq, Fatima Zohra Ennaji, Mohammed Sadgal. 263-268 [doi]
- Towards the conception of a new approach for modeling interdependencies in Critical InfrastructuresLamiae Chtioui, Amine Baïna, Mostafa Bellafkih. 269-274 [doi]
- CCSD and TOPSIS methodology for selecting supplier in a paper companyAssellaou Hanane, Ouhbi Brahim, Frikh Bouchra. 275-280 [doi]
- Interactive approach of enrichment of queries based on ontologiesMohamed Rachdi, El Houssine Labriji, El Habib Benlahmar. 281-285 [doi]
- A novel approach for mining frequent itemsets: AprioriMinHouda Essalmi, Mohamed El Far, Mohammed El Mohajir, Mohamed Chahhou. 286-289 [doi]
- Optimizing stock market price prediction using a hybrid approach based on HP filter and support vector regressionMeryem Ouahilal, Mohammed El Mohajir, Mohamed Chahhou, Badr Eddine El Mohajir. 290-294 [doi]
- Detecting and fixing UML model inconsistencies using constraintsDriss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary. 295-299 [doi]
- Classification of association rules based on K-means algorithmAzzeddine Dahbi, Mohammed Mouhir, Youssef Balouki, Taoufiq Gadi. 300-305 [doi]
- Automatic keyphrase extraction: An overview of the state of the artZakariae Alami Merrouni, Bouchra Frikh, Brahim Ouhbi. 306-313 [doi]
- Timed distributed testing rules for the distributed test architectureMoulay El Hassan Charaf, Salma Azzouzi. 314-319 [doi]
- Permanent participatory data security in a cloud computing environmentSara Ibn El Ahrache, Hassan Badir, Parisa Ghodous, Abderrahmane Sbihi. 320-324 [doi]
- Classical dictionary Al-Qamus in lemonMustapha Khalfi, Ouafae Nahli, Arsalane Zarghili. 325-330 [doi]
- Lexical differences and similarities between Moroccan dialect and ArabicRidouane Tachicart, Karim Bouzoubaa, Hamid Jaafar. 331-337 [doi]
- Impact of stemming on Arabic text summarizationNabil Alami, Mohammed Meknassi, Saïd El Alaoui Ouatik, Noureddine Ennahnahi. 338-343 [doi]
- Integration of data sources in an automatic corrector of Arabic textsJaouad Outifa, Si Lhoussain Aouragh, Saïd El Alaoui Ouatik. 344-348 [doi]
- Development of a bilingual corpus of Arabic and Arabic Sign Language based on a signed contentZakaria El Maazouzi, Badr Eddine El Mohajir, Mohammed Al Achhab, Adnan Souri. 349-354 [doi]
- The self-similar Qur'an project: Automatic detection of internal similarity in classical Arabic textsGiuliano Lancioni, Raoul Villano, Francesca Romana Romani. 355-360 [doi]
- Arabic text classification methods: Systematic literature review of primary studiesWaleed Alabbas, Haider M. Al-Khateeb, Ali Mansour. 361-367 [doi]
- Using domain knowledge and bilingual resources for addressing community question answering for ArabicYassine El Adlouni, Imane Lahbari, Horacio Rodríguez, Mohammed Meknassi, Said Ouatik El Alaoui, Noureddine Ennahnahi. 368-373 [doi]
- An application of distributional semantics for the analysis of the Holy QuranGiulia Benotto, Emiliano Giovannetti, Ouafae Nahli. 374-379 [doi]
- An enhanced feature extraction technique for improving sentiment analysis in Arabic languageFahd Alqasemi, Amira Abdelwahab, Hatem M. Abdelkader. 380-384 [doi]
- Semantically enhanced term frequency based on word embeddings for Arabic information retrievalAbdelkader El Mahdaouy, Said Ouatik El Alaoui, Éric Gaussier. 385-389 [doi]
- Encoding Arabic rhetorical structure: A methodology for the extraction of Arabic lexical information from TEI-encoded classical sourcesSimona Olivieri, Ivana Pepe, Ilaria Cicola. 390-394 [doi]
- Lahajat: A rule-based converter of standard Arabic lexical databases into spoken Arabic formsGiuliano Lancioni, Elisa Gugliotta, Valeria Pettinari. 395-399 [doi]
- High security data hiding using image cropping and LSB least significant bit steganographyKhalid A. Al-Afandy, Osama S. Faragallah, Ahmed Elmhalawy, El-Sayed M. El-Rabaie, Gh. M. El-Banby. 400-404 [doi]
- An improved breast tissue density classification framework using bag of features modelChougrad Hiba, Zouaki Hamid, Alheyane Omar. 405-409 [doi]
- New evaluation method using sampling theory to evaluate 3D segmentation algorithmsKhadija Arhid, Mohcine Bouksim, Fatima Rafii Zakani, Mohamed Aboulfatah, Taoufiq Gadi. 410-415 [doi]
- New measure for objective evaluation of mesh segmentation algorithmsFatima Rafii Zakani, Khadija Arhid, Mohcine Bouksim, Mohamed Aboulfatah, Taoufiq Gadi. 416-421 [doi]
- Efficient image denoising method based on mathematical morphology reconstruction and the Non-Local Means filter for the MRI of the headAbdelhamid El Hassani, Aicha Majda. 422-427 [doi]
- Face sketch recognition system: A content based image retrieval approachSalah Eddine Lahlali, Abdelalim Sadiq, Samir Mbarki. 428-433 [doi]
- Fingerprints indexing algorithms based on multiple characteristicsMeryam Elmouhtadi, Sanaa El Fkihi, Driss Aboutajdine. 434-437 [doi]
- New evaluation method for 3D mesh segmentationMohcine Bouksim, Fatima Rafii Zakani, Khadija Arhid, Mohamed Aboulfatah, Taoufiq Gadi. 438-443 [doi]
- A hybrid scheme for robust color image watermarking using DSWT in DCT domainKhalid A. Al-Afandy, Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed Elmhalawy. 444-449 [doi]
- Automatic estimation of clusters number for K-meansMy Abdelouahed Sabri, Assia Ennouni, Abdellah Aarab. 450-454 [doi]
- Polyps's region of interest detection in colonoscopy images by using clustering segmentation and region growingGhannam Tarik, Abbad Khalid, Kharroubi Jamal, Dafr Allah Benajah. 455-459 [doi]
- GPU based implementation of spatial fuzzy c-means algorithm for image segmentationN. Aitali, Bouchaib Cherradi, A. El Abbassi, Omar Bouattane, Mohamed Youssfi. 460-464 [doi]
- Robust approach for textured image clusteringAssia Ennouni, My Abdelouahed Sabri, Saloua Senhaji, Abdellah Aarab. 465-470 [doi]
- Rotated asymetrique haar features for face detectionMohamed Oualla, Abdelalim Sadiq. 471-475 [doi]
- Optical approach for iris segmentation and trackingElhoussaine Ouabida, Abdelaziz Essadike, Abdenbi Bouzid. 476-480 [doi]
- An automatic framework for 3D objects-parts learningOmar Herouane, Lahcen Moumoun, Taoufiq Gadi, Mohamed Chahhou. 481-486 [doi]
- Facial landmark localization: Past, present and futureHamid Ouanan, Mohammed Ouanan, Brahim Aksasse. 487-493 [doi]
- ALS_CORR[LP]: An adaptive learning system based on the learning styles of Felder-Silverman and a Bayesian networkNihad Elghouch, El Mokhtar En-Naimi, Yassine Zaoui Seghroucheni, Badr Eddine El Mohajir, Mohammed Al Achhab. 494-499 [doi]
- A MAS model for virtual labs based on cloud computingNaoual Boukil, Abdelali Ibriz. 500-505 [doi]
- An adaptive learning system based on a Job model, the differentiated instruction and Felder and Silverman's learning styles modelAymane Qodad, Yassine Zaoui Seghroucheni, Mohammed Al Achhab, M. El Yadari, A. El Kenz, A. Benyoussef. 506-510 [doi]
- Towards a collaborative e-learning platform based on a multi-agents systemAbderrahim El Mhouti, Azeddine Nasseh, Mohamed Erradi. 511-516 [doi]
- Evaluating usability of brain signals for content adaptation in intelligent tutoring systemsAmin Zammouri, Sanae Zrigui, Abdelaziz Ait Moussa. 517-520 [doi]
- Modeling of learning scenario adopting case study strategy by recursive entity modeling methodRifai Amal, Bakrim M'hamed, Messoussi Rochdi, Abdelalim Sadiq. 521-526 [doi]
- Classification system of learners engagement within Massive Open Online CoursesHind Hayati, Jihane Sophia Tahiri, Mohammed Khalidi Idrissi, Samir Bennani. 527-530 [doi]
- Education data mining: Mining MOOCs videos using metadata based approachEl Harrak Othman, Slimani Abdelali, El Bouhdidi Jaber. 531-534 [doi]
- Recommender system for ubiquitous learning based on decision treeInssaf El Guabassi, Mohammed Al Achhab, Ismail Jellouli, Badr Eddine El Mohajir. 535-540 [doi]
- Personalized search and recommendation in a digital educational resources repository: The case of ORI-OAIHamid Slimani, N. El Faddouli, R. Benslimane, Samir Bennani. 541-546 [doi]
- A novel approach for smart curriculum sequencing based on HSA evolutionary computationMeriem Hnida, Mohammed Khalidi Idrissi, Samir Bennani. 547-552 [doi]
- CBR approach for knowledge reuse in a community of practice for university studentsOumayma Chergui, Ahlame Begdouri, Dominique Groux. 553-558 [doi]
- An experimental study of software engineering learning using IDE 2.0Zakaria Itahriouan, Noura Aknin, Anouar Abtoy, Kamal Eddine El Kadiri. 559-563 [doi]
- Hybrid assessment method for programming assignmentsSoundous Zougari, Mariam Tanana, Abdelouahid Lyhyaoui. 564-569 [doi]
- Collection and transformation of Moodle tracesSanae Chehbi, Rachid Elouahbi, Fatima El Khoukhi. 570-574 [doi]
- Implementing cluster analysis tool for the identification of students typologiesLotfi Najdi, Brahim Er-Raha. 575-580 [doi]
- Studying and comparing the free e-learning platformsMohammed Ouadoud, Mohamed Yassin Chkouri, Amel Nejjari, Kamal Eddine El Kadiri. 581-586 [doi]
- Automated fault localizing and correction in dynamically analyzed programsSara Mernissi Arifi, Ismail Nait Abdellah Ouali, Rachid Benabbou, Azeddine Zahi. 587-592 [doi]
- Intellectual assets and knowledge audit as a fundamental step for the "University of the Future" transformationAbdul Rahman Ahmad Dahlan, Sarifah Abdullah, Mohamed Ridza Wahiddin. 593-599 [doi]
- Designing business models options for "University of the Future"Jamaludin Ibrahim, Abdul Rahman Ahmad Dahlan. 600-603 [doi]
- Comparing dynamic programming based algorithms in traffic signal control systemBiao Yin, Mahjoub Dridi, Abdellah El Moudni. 604-609 [doi]
- A new approach of PHM as a service in cloud computingLabib Sadek Terrissa, Safa Meraghni, Zahra Bouzidi, Noureddine Zerhouni. 610-614 [doi]
- A security scheme for mobile cloud using multi-agents systemAbderrahim Abdellaoui, Anas Laksantini, Habiba Chaoui. 615-620 [doi]
- Skeleton of a generic approach for the generation of health indicators of physical systemsM. C. Sekkal, Nasreddine Berrached, Kamal Medjaher, Christophe Varnier. 621-626 [doi]
- A cooperative traffic control for the vehicles in the intersection based on the Genetic AlgorithmJinjian Li, Mahjoub Dridi, Abdellah El Moudni. 627-632 [doi]
- A cloud services composition approach based on customer's models and cloud services vendor's rules and specificationsOuadi Belmokhtar, Dalila Chiadmi. 633-637 [doi]
- A security approach for social networks based on honeypotsEl Bouzekri El Idrissi Younes, El Mendili Fatna, Maqrane Nisrine. 638-643 [doi]
- Thermal characterization of a QFN electronic Package accompanied by a reliability study based on a response surface approachOm Bendaou, Ot. Bendaou, A. El Hami, M. Agouzoul. 644-647 [doi]
- Toward the development of a hybrid model of ontological database for the interoperability of several information systemsMeryem Fakhouri Amr, Khalifa Mansouri, Abdelwahab Naji. 648-653 [doi]
- Proposition of improvement areas in most heavy an light stemmer algorithms novel stemmer: EST.StemmerHanane El Manssouri, Soufiane Farrah, El Houssaine Ziyati, Mohammed Ouzzif. 654-657 [doi]
- Applying homomorphic encryption for securing cloud databaseMbarek Marwan, Ali Kartit, Hassan Ouahmane. 658-664 [doi]
- A novel approach IMA of interoperability measurementAicha Koulou, Norelislam El Hami, Nabil Hmina, Abir Elmir, Bouchaib Bounabat. 665-669 [doi]
- Uncertainty analysis of one stage gear system using interval analysis methodAhmed Guerine, Abdelkhalak El Hami. 670-674 [doi]
- Microfinance risk analysis using the business intelligenceTarik Hajji, Sidi Yasser El Jasouli, Jamal Mbarki, El Miloud Jaâra. 675-680 [doi]
- Intrusion detection system based interaction on mobile agents and clust-density algorithm "IDS-AM-Clust"Chaimae Saadi, Habiba Chaoui. 681-684 [doi]
- A MAS model for O&M cost simulation and optimization: Case of a wind power operatorMiguel Kpakpo, Mhamed Itmi. 685-689 [doi]
- Backtracking search optimization algorithm for fluid-structure interaction problemsRabii El Maani, Ahmed Tchvagha Zeine, Bouchaib Radi, Abdelkhalak El Hami, Rachid Ellaia. 690-695 [doi]
- Sequencing optimization of products with high diversityAkhrif Asmae, Lyhyaoui Abdelouahid, Abdelfettah Sedqui. 696-701 [doi]
- Evolutionary algorithm for dynamic spectrum allocation in cognitive radio systemJamal Elhachimi, Zouhair Guennoun. 702-706 [doi]
- An improved swarm optimization algorithm for vehicle path planning problemMouhcine Elgarej, Khalifa Mansouri, Mohamed Youssfi. 707-712 [doi]
- Study of optimizing a tube hydroformingMohammed Nassraoui, Bouchaib Radi. 713-718 [doi]
- Design and deployment of the model 'TSI' for modeling the processes of the IRFT chain between Morocco and SpainKawtar Akoudad, Fouad Jawab. 719-724 [doi]
- Optimising liquidity with modified particle swarm optimization application: Case of Casablanca stock exchangeNorelislam El Hami, Mustapha Bouchekourte. 725-729 [doi]
- Modal and probabilistic analysis of wind turbine blade under air-flowIsmail Sossey-Alaoui, Bouchaib Radi. 730-735 [doi]
- 7 evaluationHasnae L'amrani, Badr Eddine Berroukech, Younès El Bouzekri El Idrissi, Rachida Ajhoun. 736-740 [doi]
- State of art of optimisation and meta heuristic a comparative study of the Harmony Search AlgorithmMounia Aarich, Hanaa Hachimi, Nabil Hmina. 741-745 [doi]
- From modeling to logistic KPI Use of SCOR model and ARIS to build a dashbord to manage medicines supply chain in moroccan public hospitalIbn El Farouk Imane, Foaud Jawab, Abdennebi Talbi. 746-750 [doi]
- A new approximate proximal-extragradient type method for system of monotone variational inequalitiesAli Ou-yassine, Ibn Zohr, Abdellah Bnouhachem, Ibn Zohr, Fatimazahra Benssi, Ibn Zohr. 751-755 [doi]
- Probabilistic study an embedded systemN. Saadoune, Bouchaib Radi. 756-761 [doi]
- Toward an efficient brain tumor extraction using level set method and pennes bioheat equationAbdelmajid Bousselham, Omar Bouattane, Mohamed Youssfi, Abdelhadi Raihani. 762-767 [doi]
- Solving the max-cut problem using semidefinite optimizationDerkaoui Orkia, Lehireche Ahmed. 768-772 [doi]
- Scheduling meeting solved by neural network and Min-conflict heuristicAdil Bouhouch, Loqman Chakir, Abderrahim El Qadi. 773-778 [doi]
- Collaboration decision making based on AHP method in Tr-OrBAC model: Case studyNawal Ait Aali, Younes El Bouzekri El Idrissi, Amine Baïna, Loubna Echabbi. 779-784 [doi]
- A new approach based a genetic algorithm for the selective travelling salesman problemBouchaib Radi, Bochar Laarabi. 785-788 [doi]
- An overview of traceability: Definitions and techniquesKamal Souali, Othmane Rahmaoui, Mohammed Ouzzif. 789-793 [doi]
- Q-learning based intelligent multi-objective particle swarm optimization of light control for traffic urban congestion managementChaimae El Hatri, Jaouad Boumhidi. 794-799 [doi]
- Visual sentiment prediction with transfer learning and big data analytics for smart citiesKaoutar Ben Ahmed, Mohammed Bouhorma, Mohamed Ben Ahmed, Atanas Radenski. 800-805 [doi]
- A robust low cost approach for real time car positioning in a smart city using Extended Kalman Filter and evolutionary machine learningIkram Belhajem, Yann Ben Maissa, Ahmed Tamtaoui. 806-811 [doi]
- Indoor localization by particle map matchingKarim El Mokhtari, Serge Reboul, Jean-Bernard Choquel, Benaissa Amami, Mohammed Benjelloun. 812-817 [doi]
- Activity recognition using back-propagation algorithm and minimum redundancy feature selection methodNadia Oukrich, Abdelilah Maach, ElMehdi Sabri, ElMahdi Mabrouk, Kevin Bouchard. 818-823 [doi]
- th generation heterogeneous wireless networkImad El Fachtali, Rachid Saadane, Mohammed El Koutbi, Hasna Chaibi. 824-829 [doi]
- The influence of the opportunistic vehicular networks on smart cities management study case on Agdal district in Rabat cityAyoub Bouroumine, Mustapha Zekraoui, Maach Abdelilah. 830-834 [doi]
- Smart city: Recommendation of personalized services in patrimony tourismChaymae Benfares, Younes El Bouzekri El Idrissi, Aouatif Amine. 835-840 [doi]
- Benchmarking study on smart city data analyticsSaida El Mendili, Younes El Bouzekri El Idrissi, Nabil Hmina. 841-846 [doi]
- Vehicular navigation spoofing detection based on V2I calibrationBoudhir Anouar, Benahmed Mohammed, Ghadi Abderrahim, Bouhorma Mohammed. 847-849 [doi]
- 2-D DOA estimation using MUSIC algorithm with uniform circular arrayIhedrane Mohammed Amine, Bri Seddik. 850-853 [doi]
- Smart grid architecture and impact analysis of a residential microgridImane Worighi, Abdelilah Maach, Abdelhakim Hafid. 854-859 [doi]
- Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectivesRaja Ettiane, Rachid Elkouch, Abdelaali Chaoub. 860-866 [doi]
- Influence of failure modes and effects analysis on the average probability of failure on demand for a safety instremented systemFatima Ezzahra Nadir, Ibrahim Hadj Baraka, Mohammed Bsiss, Benaissa Amami. 867-871 [doi]
- Ranking models of smart citiesBadr Benamrou, Benahmed Mohamed, Abdes Samed Bernoussi, Ouardouz Mustapha. 872-879 [doi]
- New routing process in VANETMy Driss Laanaoui, Said Raghay. 880-885 [doi]
- An approaches' based on intelligent transportation systems to dissect driver behavior and smart mobility in smart cityYassine Hernafi, Mohamed Ben Ahmed, Mohammed Bouhorma. 886-895 [doi]
- Round time adaptation for image transfering over wireless sensor networks leach protocolM. Ait Kbir, M. Bennani. 896-900 [doi]
- High speed efficient FPGA implementation of pipelined AES S-BoxSoufiane Oukili, Seddik Bri, A. V. Senthil Kumar. 901-905 [doi]
- Modelling of context Information for disaster emergency system application: FloodSoumaya El Mamoune, Mostafa Ezziyyani, Achraf Taitai. 906-911 [doi]
- Multi-zonal approach clustering based on stable election protocol in heterogeneous wireless sensor networksAziz Mahboub, El Mokhtar En-Naimi, Mounir Arioua, Imad Ez-zazi, Ahmed El Oualkadi. 912-917 [doi]
- Approach to the garbage collection in the "Smart Clean City" projectAndrei Borozdukhin, Olga Dolinina, Vitaly Pechenkin. 918-922 [doi]
- Development of an alert message dissemination protocol based on LEACH protocol to improve VANET road safetyHamid Barkouk, El Mokhtar En-Naimi. 923-928 [doi]
- Metacognitive learning management system supporting self-regulated learningMohamed Yassine Zarouk, Mohamed Khaldi. 929-934 [doi]