Abstract is missing.
- Medical Image Captioning in Radiology Reporting Using Artificial IntelligenceEnas Abbas Abed, Taoufik Aguili. 1-6 [doi]
- Design of a Dual U-Slot Patch Antenna for CubeSat PlatformsNajet Bougdima, Mondher Dhaouadi, Fethi Choubani. 1-6 [doi]
- Agriculture 5.0: Enhancing Decision-Making with AI and Satellite Remote SensingCherni Aya, Bousselmi Anis, Gabsi Karim, Neji Youssef. 1-7 [doi]
- A wavelet-based deep neural network for content-based image retrieval with an adapted loss functionArsène Amoya, Mounir Kaaniche, Amel Benazza-Benyahia. 1-8 [doi]
- Performance Evaluation of SLMs on Edge DevicesMasato Oguchi. 1-7 [doi]
- Blockchain-Enabled AI Framework for Peer-to-Peer Energy Markets: Simulation and Case Studies in KSAMounir Bouzguenda, Adel Benhamed, Noura Karray, Mohamed Amine Ksiksi. 1-8 [doi]
- A Novel Dataset for DDoS Attack Analysis in SDN EnvironmentsWadii Jlassi, Nader Karmous, Mohamed Ould-Elhassen Aoueileyine, Ridha Bouallègue. 1-5 [doi]
- Towards Secure Medical Data Management: A Self-Sovereign Identity-Enabled DApp with Decentralized and Hybrid Deployment ModelsHela Makina, Idadaha Anderson Ojen, Asma Ben Letaifa, Rim Farhat. 1-8 [doi]
- AI-Driven Hybrid NOMA-RSMA Access for next generation NetworksMohamed Amine Hechmi, Sonia Ben Rejeb, Sami Tabbane. 1-9 [doi]
- Improving User Privacy Through Deep Learning: JavaScript Tracking DetectionAminah Alqahtani, Mounir Frikha, Ahmad Aljughaiman. 1-9 [doi]
- Optimized Lightweight CNN Architecture for Real-Time IDS Deployment on Raspberry Pi with TensorFlow LiteRahma Jablaoui, Noureddine Liouane. 1-7 [doi]
- A Two-Stage Generative Framework for URLLC-Constrained Packet Routing in 6G NetworksIacovos Ioannou, Prabagarane Nagaradjane, Vasos Vassiliou. 1-9 [doi]
- A new proposal architecture for fish feed waste detection in an aquaculture cageMahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine, Ridha Bouallegue. 1-6 [doi]
- Zero Trust Meets AI: A Survey Across Multi-Cloud and Hybrid EnvironmentsAbdullah Abdulrahman Albuali. 1-10 [doi]
- How to Detect FTP-Brute Force Attack by IDS Using Machine LearningMohammed AlOlaqi, Ahmed Algailani, Mounir Frikha. 1-12 [doi]
- Opportunistic routing protocols in wireless sensor networks: a low-energy consumption approachHager Ben Fradj, Monia Hamdi, Ridha Ejbali. 1-10 [doi]