Abstract is missing.
- A framework for an effective cybersecurity strategy implementation: Fundamental pillars identificationHasna Elkhannoubi, Mustapha Belaïssaoui. 1-6 [doi]
- Make or buy decision making for telcos towards an "Intelligent Transaction Cost Economics (TCE) Support System"Mounir Boukadidi. 7-13 [doi]
- A speech recognition system using fast learning algorithm and beta wavelet networkRidha Ejbali, Olfa Jemai, Mourad Zaied, Chokri Ben Amar. 14-18 [doi]
- Dealing with temporality when inducing association rules from a retail databaseR. S. Joao, M. C. Nicoletti, A. M. Monteiro. 19-24 [doi]
- Possibilistic Network based Information Retrieval ModelKamel Garrouch, Mohamed-Nazih Omri. 25-30 [doi]
- Maximal frequent sub-graph mining for malware detectionAya Hellal, Lotfi Ben Romdhane. 31-39 [doi]
- Biomedical concept extraction based Information Retrieval model: application on the MeSHMondher Sendi, Mohamed-Nazih Omri. 40-45 [doi]
- Speech emotion recognition based on Arabic featuresMohamed Meddeb, Hichem Karray, Adel M. Alimi. 46-51 [doi]
- Practical modeling of the SLA life cycle in Cloud ComputingAdil Maarouf, Abderrahim Marzouk, Abdelkrim Haqiq. 52-58 [doi]
- SAID: A new stemmer algorithm to indexing unstructured DocumentKabil Boukhari, Mohamed-Nazih Omri. 59-63 [doi]
- Word-based Arabic handwritten recognition using SVM classifier with a reject optionBouchra El Qacimy, Mounir Ait Kerroum, Ahmed Hammouch. 64-68 [doi]
- Fuzzy Logic mobile robot velocity Control for autonomous navigationEmna Baklouti, Mohamed Jallouli, Nader Ben Amor. 69-73 [doi]
- Online Arabic writer identification based on Beta-elliptic modelThameur Dhieb, Wael Ouarda, Houcine Boubaker, Mohamed Ben Halima, Adel M. Alimi. 74-79 [doi]
- Arabic handwritten text line extraction using connected component analysis from a multi agent perspectiveYoussef Boulid, Abdelghani Souhar, Mohamed El Youssfi El Kettani. 80-87 [doi]
- Multi-agent 3D reconstruction of human femur from MR imagesAbdelhafid Nachour, Latifa Ouzizi, Youssef Aoura. 88-92 [doi]
- Comparison of e-readiness composite indicatorsLamriq Rabii, Doukkali Abdelaziz. 93-97 [doi]
- A k-Nearest Neighbor approach to improve change detection from remote sensing: Application to optical aerial imagesAzzedine Touazi, Djamel Bouchaffra. 98-103 [doi]
- From data to wisdom: A new multi-layer prototype for Big Data management processImadeddine Mountasser, Brahim Ouhbi, Bouchra Frikh. 104-109 [doi]
- A new Motion Estimation technique for Video CodingMahmoud Ahmadi, Ali Wali, Ahlem Walha, Adel M. Alimi. 110-115 [doi]
- Determination of an optimal feature selection method based on maximum Shapley valueFatiha Mokdad, Djamel Bouchaffra, Nabil Zerrouki, Azzedine Touazi. 116-121 [doi]
- Designing energy efficient Smart Buildings in ubiquitous environmentsImen Abdennadher, Nesrine Khabou, Ismael Bouassida Rodriguez, Mohamed Jmaiel. 122-127 [doi]
- Qualitative AHP models under the belief function frameworkAmel Ennaceur, Zied Elouedi, Eric Lefevre. 128-133 [doi]
- Controlled automatic query expansion based on a new method arisen in machine learning for detection of semantic relationships between termsNesrine Ksentini, Mohamed Tmar, Faïez Gargouri. 134-139 [doi]
- Vigilance measurement system through analysis of visual and emotional driver's signs using wavelet networksInes Teyeb, Olfa Jemai, Mourad Zaied, Chokri Ben Amar. 140-147 [doi]
- Morphological extraction of cancerous nucleus in the diagnostics of breast cancerTiia Ikonen, Irene Pollanen, Billy Braithwaite, Keijo Haataja, Pekka Toivanen, Teemu Tolonen, Jorma Isola. 148-153 [doi]
- A new Hybrid Discrete Bat Algorithm for Traveling Salesman Problem using ordered crossover and 3-Opt operators for Bat's local searchJihen Amara, Tarek M. Hamdani, Adel M. Alimi. 154-159 [doi]
- Overview of bio-inspired control mechanisms for hexapod robotMarek Zak, Jaroslav Rozman, Frantisek Zboril. 160-165 [doi]
- Power aware scheme for water pipeline monitoring based on Wireless Sensor NetworksManel Elleuchi, Manel Boujelben, Mohamed Abid, Abdulfattah Mohammad Obeid, Mohammed S. BenSaleh. 166-172 [doi]
- Methods for detection of cyberbullying: A surveyRekha Sugandhi, Anurag Pande, Siddhant Chawla, Abhishek Agrawal, Husen Bhagat. 173-177 [doi]
- Improved recurrent neural network architecture for SVM learningRahma Fourati, Chaouki Aouiti, Adel M. Alimi. 178-182 [doi]
- Real-time parallel implementation of road traffic radar video processing algorithms on a parallel architecture based on DSP and ARM processorsAbdessamad Klilou, François Bourzeix, Omar Bourja, Yahya Zennayi, Lhoussein Mabrouk, Said Belkouch. 183-188 [doi]
- Hand verification system based on multi-features fusionNesrine Charfi, Hanêne Trichili, Adel M. Alimi, Basel Solaiman. 189-194 [doi]
- A static hand gesture recognition system for real time mobile device monitoringHanene Elleuch, Ali Wali, Anis Samet, Adel M. Alimi. 195-200 [doi]
- Bag of face recognition systems based on holistic approachesWael Ouarda, Hanêne Trichili, Adel M. Alimi, Basel Solaiman. 201-206 [doi]
- A deep convolutional neural wavelet network to supervised Arabic letter image classificationSalima Hassairi, Ridha Ejbali, Mourad Zaied. 207-212 [doi]
- Audiovisual video characterization using audio watermarking schemeEya Mezghani, Maha Charfeddine, Chokri Ben Amar, Henri Nicolas. 213-218 [doi]
- Inference in junction trees using the belief function theoryOumaima Boussarsar, Imen Boukhris, Zied Elouedi. 219-224 [doi]
- ANOFS: Automated negotiation based online feature selection methodFatma Ben Said, Adel M. Alimi. 225-230 [doi]
- Heuristic approaches to Double Vehicle Routing Problem with Multiple StacksUlisses Eduardo Ferreira da Silveira, Marcelo Pinheiro Leite Benedito, André Gustavo dos Santos. 231-236 [doi]
- Quality of Services based routing using evolutionary algorithms for Wireless Sensor NetworkFaten Hajjej, Ridha Ejbali, Mourad Zaied. 237-242 [doi]
- Towards type-2 fuzzy rule base system for road choiceMariam Zouari, Sahar Cherif, Habib M. Kammoun, Hela Lajmi, Adel M. Alimi. 243-248 [doi]
- Facial emotions recognition based on wavelet networkMounira Hmayda, Ridha Ejbali, Mourad Zaied. 249-253 [doi]
- Spider's behavior for ant based clustering algorithmAmira Hamdi, Nicolas Monmarché, Mohamed Slimane, Adel M. Alimi. 254-259 [doi]
- ONDAR: An ontology for home automationAchraf Lyazidi, Salma Mouline. 260-265 [doi]
- Artificial neural networks for demand forecasting: Application using Moroccan supermarket dataIlham Slimani, Ilhame El Farissi, Saïd Achchab. 266-271 [doi]
- A model driven approach to generate graphical user interfaces for Rich Internet Applications using Interaction Flow Modeling LanguageSarra Roubi, Mohammed Erramdani, Samir Mbarki. 272-276 [doi]
- Data fusion architectures: A survey and comparisonSiwar Ben Ayed, Hanêne Trichili, Adel M. Alimi. 277-282 [doi]
- A parallel heuristic for the travel planning problemBreno Alves Beirigo, André Gustavo dos Santos. 283-288 [doi]
- A framework for supporting the choice of usability evaluation methods for interactive adaptive systemsAmira Dhouib, Mahmoud Neji, Abdelwaheb Trabelsi, Christophe Kolski. 289-294 [doi]
- Wavelet networks for facial emotion recognitionSalwa Said, Olfa Jemai, Mourad Zaied, Chokri Ben Amar. 295-300 [doi]
- Scene text detection images with pyramid image and MSER enhancedHoussem Turki, Mohamed Ben Halima, Adel M. Alimi. 301-306 [doi]
- Towards a secure access control model for E-learning platform based on multi agent systemsKassid Asmaa, Elkamoun Najib. 307-312 [doi]
- Drowsy driver detection by EEG analysis using Fast Fourier TransformMejdi Ben Dkhil, Ali Wali, Adel M. Alimi. 313-318 [doi]
- Towards an Intelligent Decision Support System for Renewable Energy managementHamza Sellak, Brahim Ouhbi, Bouchra Frikh. 319-324 [doi]
- Rhythm metrics in MSA spoken language of six algerian regionsGhania Droua-Hamdani, Malika Boudraa. 325-328 [doi]
- An extended approach for the behavioral and temporal constraints specification of reactive agentAbdelhay Haqiq, Bouchaib Bounabat. 329-334 [doi]
- Exponential synchronization of high-order recurrent neural networks with mixed delaysHajer Brahmi, Boudour Ammar, Farouk Chérif, Adel M. Alimi. 335-340 [doi]
- Implementation of skin color selection prior to Gabor filter and neural network to reduce execution time of face detectionMejda Chihaoui, Akram Elkefi, Wajdi Bellil, Chokri Ben Amar. 341-346 [doi]
- Consolidating Product Spectrum and Gammatone filterbank for robust speaker verification under noisy conditionsMeriem Fedila, Messaoud Bengherabi, Abderrahmane Amrouche. 347-352 [doi]
- Multi-agent systems and their application to control vehicle underwaterEttibari Miftah, Adil Sayouti. 353-357 [doi]
- Performance evaluation of RED approach for traffic lights managementSaid Alabdallaoui, Abdelghafour Berraissoul, Noureddine Idboufker. 358-362 [doi]
- Object detection and identification for blind people in video sceneHanen Jabnoun, Faouzi Benzarti, Hamid Amiri. 363-367 [doi]
- A simulation-based Genetic Algorithm approach for refilling process with Clip Type Passive ManipulatorHongLei Che, Zongzhi Wu, RongXue Kang, Chao Yun, Hui Jin. 368-373 [doi]
- Improving the stability of Sequential Forward variables selectionSilvia Cateni, Valentina Colla. 374-379 [doi]
- Pre-processing and extraction of the ROIs steps for palmprints recognition systemRaouia Mokni, Ramzi Zouari, Monji Kherallah. 380-385 [doi]
- Implementation of a Maximum Power Point Tracking fuzzy controller on FPGA circuit for a photovoltaic systemHanen Abbes, Kais Loukil, Hafedh Abid, Mohamed Abid, Ahmad Toumi. 386-391 [doi]
- Model driven reverse engineering: Graph modeling for mobiles platformsKhalid Lamhaddab, Khalid Elbaamrani. 392-397 [doi]
- Optimization techniques of static 3D triangular mesh compression: A surveySoumaya Hachicha, Akram Elkefi, Chokri Ben Amar. 398-403 [doi]
- Evaluating decision support systemsKhaoula Boukhayma, Abdellah ElManouar. 404-408 [doi]
- RUDA - Robot for search for human beings in debrits and avalanchesRadim Luza, Martin Drahanský, Frantisek Zboril. 409-414 [doi]
- A distributed guided genetic algorithm to solve the disturbance in the multimodal transportNajet Medssia, Khaled Ghédira. 415-420 [doi]
- An efficient algorithm for data security in Cloud storageAli Azougaghe, Zaid Kartit, Mustapha Hedabou, Mostafa Belkasmi, Mohamed El Marraki. 421-427 [doi]
- Toward an optimal medical image compression based on ISOMImen Chaabouni, Med Salim Bouhlel. 428-433 [doi]
- A cooperative learning strategy with multiple search mechanisms for improved artificial bee colony optimizationFatima Harfouchi, Hacene Habbi. 434-439 [doi]
- Clustering impact on group-based traitor tracing schemesFaten Chaabane, Maha Charfeddine, Chokri Ben Amar. 440-445 [doi]
- MRI brain tumor classification using Support Vector Machines and meta-heuristic methodAhmed Kharrat, Mohamed Ben Halima, Mounir Ben Ayed. 446-451 [doi]
- Cloud discrimination using K Nearest Neighbors classifier: Application to dataset generated by Sétif RADAR (Algeria) and MSG-SEVIRI satellite imagesFatiha Mokdad, Boualem Haddad, Zineb Bala, Ilhem Tiblali. 452-457 [doi]
- A new comparative study of ad hoc routing protocol AODV and DSR in VANET environment using simulation toolsSaid Benkirane, Mostafa Saadi, Moulay Lahcen Hasnaoui, Abderrahim Beni Hssane. 458-461 [doi]
- Interlinking video programs with Linked Open DataOlfa Ben Said, Ali Wali, Adel M. Alimi. 462-467 [doi]
- Deep neural network with RBF and sparse auto-encoders for numeral recognitionDorra Mellouli, Tarek M. Hamdani, Adel M. Alimi. 468-472 [doi]
- TOPSIS using a mixed subjective-objective criteria weights for ABC inventory classificationHadhami Kaabi, Khaled Jabeur. 473-478 [doi]
- Semantic-aware framework for Mobile Image SearchNoura Bouhlel, Amel Ksibi, Anis Ben Ammar, Chokri Ben Amar. 479-484 [doi]
- Literature review: Home health careBrahim Issaoui, Issam Zidi, Eric Marcon, Frédérique Laforest, Khaled Ghédira. 485-492 [doi]
- Agent-based system simulation of electronic commerce: Effect of cut-link on prisoner's dilemma with Small World topologyJalal Eddine Bahbouhi, Najem Moussa. 493-498 [doi]
- Knowledge structures: Which one to use for the query disambiguation?Ghada Feki, Rim Fakhfakh, Anis Ben Ammar, Chokri Ben Amar. 499-504 [doi]
- GPU-based segmentation of dental X-ray images using active contours without edgesRamzi Ben Ali, Ridha Ejbali, Mourad Zaied. 505-510 [doi]
- A dynamic threshold-based probabilistic scheme for broadcasting in ad hoc networksMohammed Chekhar, Khalid Zine-Dine, Mohamed Bakhouya, Abdessadek Aaroud. 511-516 [doi]
- Requirement-based lexical web service generationMehdi Ben Abderrahmen, Bilel Gargouri, Mohamed Jmaiel. 517-522 [doi]
- An architecture of Distributed Beta Wavelet Networks for large image classification in MapReduceMohamed Sakkari, Mourad Zaied. 523-527 [doi]
- Towards a parallelization and performance optimization of Viola and Jones algorithm in heterogeneous CPU-GPU mobile systemAgnes Ghorbel, Nader Ben Amor, Mohamed Jallouli. 528-532 [doi]
- A semiotic semi-automatic annotation for movie audiovisual documentManel Fourati, Abir Chaari, Anis Jedidi, Faïez Gargouri. 533-539 [doi]
- Minimum Unsatisfiability based QoS Web Service Composition over the Cloud ComputingAbderrahim Ait Wakrime, Saïd Jabbour. 540-545 [doi]
- Encryption as a service for securing data in mobile cloud computingIbtihal Mouhib, Driss El Ouadghiri, Khalid Zine-Dine. 546-550 [doi]
- Recognizing Arabic Handwritten Script using Support Vector Machine classifierMohamed Elleuch, Houssem Lahiani, Monji Kherallah. 551-556 [doi]
- Degeneration simulated annealing algorithm for combinatorial optimization problemsBouchaib Aylaj, Mostafa Belkasmi, Hamid Zouaki, Ahlam Berkani. 557-562 [doi]
- Video event detection using auto-associative neural network and incremental SVM modelsMohamed Chakroun, Ali Wali, Yassine Aribi, Adel M. Alimi. 563-568 [doi]
- Algorithm for time-constrained paths to deliver servicesRaija Halonen, Olli Martikainen, Valeriy Naumov, Ye Zhang. 569-574 [doi]
- Adaptive architecture for medical application case study: Evoked Potential detection using matching poursuit consensusTarek Frikha, Abir Hadriche, Rafik Khemakhem, Nawel Jmail, Mohamed Abid. 575-579 [doi]
- Despikifying SEEG signals using a temporal basis setNawel Jmail, Martine Gavaret, Fabrice Bartolomei, Christian G. Bénar. 580-584 [doi]
- Quality evaluation of web sites: A comparative study of some Multiple Criteria Decision Making methodsRim Rekik, Ilhem Kallel, Adel M. Alimi. 585-590 [doi]
- Real time hand gesture recognition system for android devicesHoussem Lahiani, Mohamed Elleuch, Monji Kherallah. 591-596 [doi]
- Optimization algorithms, benchmarks and performance measures: From static to dynamic environmentRaja Fdhila, Tarek M. Hamdani, Adel M. Alimi. 597-603 [doi]
- Ontology-based approach to provide personalized search results for handicraft womanEmna Rekik, Maha Maalej, Achraf Mtibaa, Faïez Gargouri. 604-609 [doi]
- Noise adaptive FCM algorithm for segmentation of MRI brain images using local and non-local spatial informationNitesh Arora, Rajoo Pandey. 610-617 [doi]
- A spatio-temporal covariance descriptor for person re-identificationBassem Hadjkacem, Walid Ayedi, Mohamed Abid, Hichem Snoussi. 618-622 [doi]
- Compact Genetic Algorithms with larger tournament size for soft-decision decodingAhlam Berkani, Ahmed Azouaoui, Mostafa Belkasmi, Bouchaib Aylaj. 623-628 [doi]
- Embedded EEG localization error using separately lobe for electrodes configurationRafik Khemakhem, Tarek Frikha, Abir Hadriche, Ahmed Ben Hamida. 629-634 [doi]
- RFID and XBee based automated verification of put-away operation for Warehouse Management SystemsBurcu Bektas, Hayriye Korkmaz. 635-641 [doi]
- Structured Fisher vector encoding method for human action recognitionManel Sekma, Mahmoud Mejdoub, Chokri Ben Amar. 642-647 [doi]
- A new image segmentation approach using community detection algorithmsYoussef Mourchid, Mohammed El Hassouni, Hocine Cherifi. 648-653 [doi]
- A hybrid system based on GMM-SVM for speaker identificationRania Chakroun, Leila Beltaifa Zouari, Mondher Frikha, Ahmed Ben Hamida. 654-658 [doi]
- Energy benefits of opportunistic device-centric wireless networksBaldomero Coll-Perales, Javier Gozálvez. 659-664 [doi]
- Performance evaluation of classification algorithms by excluding the most relevant attributes for dipper/non-dipper pattern estimation in Type-2 DM patientsZehra Aysun Altikardes, Hasan Erdal, Ahmet Fevzi Baba, Ali Serdar Fak, Hayriye Korkmaz. 665-672 [doi]
- Towards an intelligent evaluation method of medical data visualizationsSaber Amri, Hela Ltifi, Mounir Ben Ayed. 673-678 [doi]
- A measurement-based technique for incipient anomaly detectionFouzi Harrou, Ying Sun. 679-684 [doi]
- High SNR outage analysis for power efficient multi-relay cooperative networks with ARQ assistanceAli Kamouch, Abdelaali Chaoub, Zouhair Guennoun. 685-691 [doi]
- Enhanced monitoring of abnormal emergency department demandsFouzi Harrou, Ying Sun, Farid Kadri. 692-696 [doi]