Abstract is missing.
- Data Security Patterns for Critical Big Data SystemsChaymae Majdoubi, Saida El Mendili, Youssef Gahi. 1-8 [doi]
- A Review of Feature Selection and HyperparameterOptimization Techniques for Breast Cancer Detection on thermograms ImagesHanane Dihmani, Abdelmajid Bousselham, Omar Bouattane. 1-8 [doi]
- Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud EnvironmentJens Kohler. 1-7 [doi]
- Leveraging WiFi Channel State Information for Efficient and Reliable Device-Free Human Activity RecognitionHicham Boudlal, Mohammed Serrhini, Ahmed Tahiri. 1-8 [doi]
- Attempts in Worst-Case Optimal Joins on Relational Data Systems: A Literature SurveyAyoub Berdai, Dalila Chiadmi. 1-8 [doi]
- Artificial Intelligence: Perception, Attitudes and Use Among Students at the Casablanca Faculty of MedicineBerrami Hind, Zineb Serhier, Manar Jallal, Mohammed Bennani Othmani. 1-4 [doi]
- Using Serverless FaaS for Invoking Long-Running JobsMohammed Wazir Adain, Adil Tanveer. 1-6 [doi]
- A New Classification for Data Placement Techniques in Cloud ComputingLaila Bouhouch, Mostapha Zbakh, Claude Tadonki. 1-9 [doi]
- A HPC-Based Data Analytics Platform Architecture for Data-Driven Animal Phenotype DetectionManu Agarwal, Enkhzol Dovdon, Luis Roma Barge, Yanja Dajsuren, Jakob de Vlieg. 1-6 [doi]
- Advancing Breast Cancer Diagnosis with Machine Learning: Exploring Data Balancing, Feature Selection, and Bayesian OptimizationAbd Allah Aouragh, Mohamed Bahaj. 1-6 [doi]
- Cloud Identity Management Mechanisms and IssuesKhalid Maidine, Ahmed El-Yahyaoui. 1-9 [doi]
- Sentiment Analysis Applied to Arabic Tweets Using Machine Learning and Deep LearningMohammed Benali, Abdeljalil Elouardighi. 1-8 [doi]
- Data-Driven Transformation in Investment BanksBasma Iraqi, Lamia Benhiba, Mohammed Abdou Janati Idrissi. 1-9 [doi]
- Mid@ndro: a Middleware Architecture for Malware Detection on AndroidZakaria Sawadogo, Babacar Thioye, Ibrahima Gaye, Jean Marie Dembele, Gervais Mendy, Samuel Ouya. 1-5 [doi]
- Towards an IoT Architecture Based on Machine Learning for Missing Data Prediction on the EdgeAbderrahim Lachguer, Abderrahmane Sadiq, Youssef Es-saady, Mohamed El hajji. 1-7 [doi]
- Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis MethodsZakaria Sawadogo, Muhammad Taimoor Khan 0001, Jean Marie Dembele, Gervais Mendy, Samuel Ouya. 1-5 [doi]
- CL2S4P: A Privacy Policy Translator for Comprehensive Interpretation in Smart Healthcare SystemsIsmail El Yamani, Souad Sadki, Hanan El Bakkali, Driss Allaki. 1-7 [doi]
- A Survey on Recent Intrusion Detection Systems in Cloud EnvironmentSaad Belcaid, Siham Aouad, Mostapha Zbakh. 1-6 [doi]
- A Hybrid Algorithm Based on PSO Algorithm and Chi-Squared Distribution for Tasks Consolidation in Cloud Computing EnvironmentHind Mikram, Said El Kafhali, Youssef Saadi. 1-6 [doi]
- Algorithms Scheduling Applied to Microservics Architectures: A Survey StudyNadia Qoudhadh, Mostapha Zbakh. 1-12 [doi]
- Dealing with Anti-Patterns When Migrating from Monoliths to Microservices: Challenges and Research DirectionsHassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour. 1-8 [doi]
- Multi-Domain Dataset for Moroccan Arabic Dialect Sentiment Analysis in Social NetworksSara El Ouahabi, Safâa El Ouahabi, El Wardani Dadi. 1-7 [doi]
- Logical IoT Cloud - Integrated Systems Management for Cloud and IoTTakayuki Kushida, Yuka Kato. 1-8 [doi]
- Authentication Protocol for RFID Systems: A SurveyHasnae Lamrani Alaoui, Mostapha Zbakh, An Breaken, Abdellah Touhafi, Abdellatif El Ghazi. 1-11 [doi]
- Assessing Digital Government Maturity Model for Developed Countries. Application to SingaporeSara Halim, Bouchaib Bounabat. 1-7 [doi]
- Comparing Different Simulated Annealing Cooling Variants for Fuzzy Logic Systems ModelingMajid Almaraashi. 1-6 [doi]
- Security Governance in IOT Environment: A State of ArtIlyass Mokhtari, Ayyoub El Outmani, El Miloud Jaâra. 1-4 [doi]
- Towards Deep Learning Based Access Control using Hyperledger-Fabric Blockchain for the Internet of ThingsMahbubur Rahman, Liang Chen, Jonathan Loo, Wei Jie. 1-8 [doi]
- A Novel Approach for Recognizing Occluded Objects Using Feature Pyramid Network Based on Occlusion Rate AnalysisZainab Ouardirhi, Sidi Ahmed Mahmoudi, Mostapha Zbakh. 1-7 [doi]
- Architecture to Distribute Deep Learning Models on Containers and Virtual Machines for Industry 4.0Jean-Sébastien Lerat, Sidi Ahmed Mahmoudi. 1-8 [doi]
- Evaluation and Analysis of Network Safety Mechanisms in SDN InfrastructureKarmaoui Idrissi Hamza, Jihad Kilani, Faycal Bensalah, Youssef Baddi. 1-6 [doi]
- Comparative Experimentation of MLOps Power on Microsoft Azure, Amazon Web Services, and Google Cloud PlatformWidad El Moutaouakal, Karim Baïna. 1-8 [doi]
- Comparative Evaluation of IoT Mesh Network Protocols: NeoMesh Versus LoRa PymeshMustapha Hammouti, Omar Moussaoui, Mohammed Haissaine, Abdelkader Bétari. 1-6 [doi]
- Integrating a Neural Network Library in Embedded Federated LearningSoufiane Aatab, Felix Freitag. 1-7 [doi]
- Enhancing Syntactic Resolution in Biomedical Data Processing with OpenCL: A Use Case StudyMohammed Hajhouj, Mounia Abik, Randa Zarnoufi. 1-8 [doi]
- Data-Driven Approach for Residential Occupancy Modeling Using PIR Sensors: A Moroccan Case StudyKhadija Bouyakhsaine, Abderrahim Brakez, Mohcine Draou. 1-6 [doi]