Abstract is missing.
- Promoting resource discovery in business process variabilityRabab Sikal, Hanae Sbaï, Laila Kjiri. [doi]
- A based cloud computing solution using DiffServ architecture for scalability issue in IoT networks with multiple SLA requirementsZyane Abdellah, Bahiri Mohamed Nabil, Ghammaz Abdelilah. [doi]
- A Smart Card Digital Identity Check Model for University Services AccessMoukhliss Ghizlane, Filali Hilali Reda, Belhadaoui Hicham. [doi]
- A New Image Encryption Scheme Based on Enhanced Elliptic Curve Cryptosystem Using DNA ComputingSalma Bendaoud, Fatima Amounas, El Hassan El Kinani. [doi]
- A Hierarchical Method for Dynamic Job Execution in NREN-based Cloud SystemsCheikh Saliou Mbacke Babou, Bernard Ousmane Sané, Ibrahima Niang. [doi]
- Secret Sharing Scheme with Efficient Cheating DetectionDaniel Becerra, Gerardo Vega. [doi]
- Blind image deblurring by game theoryDriss Meskine, Noureddine Moussaid, Soukaina Berhich. [doi]
- Semi-Automatic Generation of Transformation Rules: From AADL to Timed AutomataKarima Berramla, El Abbassia Deba, Mohamed El Kamel, Abou El Hassen. [doi]
- Calculation and polynomial synthesis of the normalized response of a pseudo-elliptic lossy filterAbdelmounaim K. Belbachir, Mohamed Charif, Otman Oulhaj. [doi]
- Flipped classroom for algorithmic teachingTeimzit Amira, Mahnane Lamia, Mohamed Hafidi. [doi]
- Efficient Multispectral Face Recognition using Random Feature Selection and PSO-SVMNadir Kamel Benamara, Ehlem Zigh, Tarik Boudghene Stambouli, Mokhtar Keche. [doi]
- Deep Learning-Based Intrusion Detection System for Advanced Metering InfrastructureZakaria El Mrabet, Mehdi Ezzari, Hassan El Ghazi, Badr Abou El Majd. [doi]
- A Decade Time-Lapse of Cloud Performance and Dependability Modeling: Performability Evaluation FrameworkPece Mitrevski, Filip Mitrevski, Marjan Gusev. [doi]
- Smart Approach to Build A Deep Neural Network Based IDS for Cloud Environment Using an Optimized Genetic AlgorithmZouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohamed Rida. [doi]
- Digital Media's impact on learning in daily life: a different view on eLearning using means of videographyOtto Petrovic. [doi]
- 3D Shape Classification Using 3D Discrete Moments and Deep Neural NetworksZouhir Lakhili, Abdelmajid El Alami, Abderrahim Mesbah, Aissam Berrahou, Hassan Qjidaa. [doi]
- An application of spectral clustering approach to detect communities in data modeled by graphsZakariyaa Ait El Mouden, Abdeslam Jakimi, Moha Hajar. [doi]
- Impact of Text Pre-processing and Ensemble Learning on Arabic Sentiment AnalysisAhmed Oussous, Ayoub Ait Lahcen, Samir Belfkih. [doi]
- A Methodology to do Model-Based Testing using FMEAAtifi Meriem, Marzak Abdelaziz. [doi]
- Adapted Active Contours for Catadioptric Images using a Non-euclidean MetricsJamal Mirhisse, M'barek Nasri, Ahmad El Allaoui, Djemaa Kachi. [doi]
- DTCWT-DCT watermarking method for multimodal biometric authenticationNaima Bousnina, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul. [doi]
- On the Self-Organization of Mobile Agents to Ensure Dynamic Multi-level Coverage in Sensor NetworksYounes Regragui, Najem Moussa. [doi]
- A Distributed Approach for Mining Moroccan Hashtags using Twitter PlatformAbdeljalil El Abdouli, Larbi Hassouni, Houda Anoun. [doi]
- Using Synonym and Definition WordNet Semantic relations for implicit aspect identification in Sentiment AnalysisEl Hannach Hajar, Benkhalifa Mohammed. [doi]
- Formal verification of cryptographic circuits: A semi-automatic functional approachAbir Bitat, Salah Merniz. [doi]
- Three Parallelization Syndrome Block for Reed Solomon code RS (255, 239) Used in Digital Video Broadcasting DVB-TMohamed Elghayyaty, Abdelkader Hadjoudja, C. ElMahjoub, Omar Mouhib, Anas el Habti el Idrissi. [doi]
- A Comparative study of Open Source IDSs according to their Ability to Detect AttacksOssama Bouziani, Hafssa Benaboud, Achraf Samir Chamkar, Saiida Lazaar. [doi]
- Energy Saved Approaches in Software Defined Networks: State of the ArtFarah Lamharras, Najib Elkamoun, Ouidad Labouidya. [doi]
- A Comparative Study of the Learner Model in Adaptive Mobile Learning SystemsSoukaina Ennouamani, Zouhir Mahani. [doi]
- A comparative Study of Augmented Reality SDKs to Develop an Educational Application in Chemical FieldAnasse Hanafi, Lotfi Elaachak, Mohammed Bouhorma. [doi]
- Research on MOOCs: current trends and taking into account of contentAbdelghani Babori, Hicham Fihri Fassi, Abdelkarim Zaid. [doi]
- Security Testing Approach for IaaS InfrastructureFatima-zahra Moutai, Sara Hsaini, Salma Azzouzi, My El Hassan Charaf. [doi]
- Construction of Somme Quasi-Cyclic Codes Over a Finite RingsMohammed Sabiri. [doi]
- 3D Object Classification using 3D Racah Moments Convolutional Neural NetworksAbderrahim Mesbah, Aissam Berrahou, Abdelmajid El Alami, Nadia Berrahou, Hassan Berbia, Hassan Qjidaa. [doi]
- Big-Data Architecture for Electrical Consumption Forecasting in Educational Institutions BuildingsHouda Daki, Asmaa El Hannani, Hassan Ouahmane. [doi]
- Novel Automatic Bank Check Recognition Based on Deep LearningSiham Lamssaoui, Hafssa Benaboud. [doi]
- Intelligent Framework for Malware Detection with Convolutional Neural NetworkYouness Mourtaji, Mohammed Bouhorma, Daniyal M. Alghazzawi. [doi]
- Ehealth smart application of WSN on WWANHamza Zemrane, Youssef Baddi, Abderrahim Hasbi. [doi]
- The impact of Fuzzy Logic on Knowledge Management in the context of Supply Chain: a state of artFatima Ezzahra Ettahiri, Mina Elmaallam. [doi]
- A new comprehensive solution to handle information security Governance in organizationsZaydi Mounia, Nassereddine Bouchaib. [doi]
- Deep Learning architecture for temperature forecasting in an IoT LoRa based systemBen Abdel Ouahab Ikram, Boudhir Anouar Abdelhakim, Astito Abdelali, Bassam Zafar, Bouhorma Mohammed. [doi]
- A theoretical model to illustrate the possible relations link the IS and the ICT to the organization digital information / DataM. El Hamzaoui, Faycal Bensalah. [doi]
- Resource Allocation in Pre-5G Cellular SystemsSara Riahi, Azzeddine Riahi. [doi]
- Anonymous Secure E-voting over a Network for Multiple ElectionsLeila Zahhafi, Omar Khadir. [doi]
- Amelioration of a proxy signature using RSA encryptionSalma Ezziri, Omar Khadir. [doi]
- Study of the Different Security Threats on the Internet of Things and their ApplicationsImane Sahmi, Tomader Mazri, Nabil Hmina. [doi]
- SCADA security using SSH honeypotAmine Belqruch, Abdelilah Maach. [doi]
- An Overview of Smart Grid Communication Networks Technologies, Protocols and ChallengesElmahdi Khoudry, Abdelaziz Belfqih, Jamal Boukherouaa, Faissal El Mariami, Abdelmajid Berdai. [doi]
- Genetic Algorithm for Optimal Charge Scheduling of Electric Vehicle FleetMabrouk Elmehdi, Maach Abdelilah. [doi]
- Smart School Guidance and Vocational Guidance System Through the Internet of ThingsHicham El Mrabet, Abdelaziz Ait Moussa. [doi]
- Approach to use ontology based on electronic payment system and machine learning to prevent FraudAhmed El Orche, Mohamed Bahaj. [doi]
- A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud ComputingBernard Ousmane Sané, Cheikh Saliou Mbacke Babou, Ibrahima Niang. [doi]
- Effect of Single and Cooperative Black Hole Attack in MANET using OLSR protocolAbdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif. [doi]
- Driver Fatigue Detection using Recurrent Neural NetworksYounes Ed-Doughmi, Najlae Idrissi. [doi]
- Quality adaptation by using scalable video coding (SVC) over P2P IP Multimedia Subsystem (P2P IMS)Adnane Ghani, El Hassan Ibn Elhaj, Ahmed Hammouch. [doi]
- A simulation analyse of MANET's RREQ Flooding and HELLO Flooding attacks with ns-3Oussama Sbai, Mohamed Elboukhari. [doi]
- Performance Analysis of Load Balancing Mechanisms in SDN NetworksFarah Chahlaoui, Mohammed Raiss El-Fenni, Hamza Dahmouni. [doi]
- Deep Learning Approach as New Tool for Type 2 Diabetes DetectionGhafki Oumaima, Elachaak Lotfi, Elouaai Fatiha, Bouhorma Mohammed. [doi]
- An energy efficient clustering protocol for homogeneous and heterogeneous wireless sensor networkMohamed Saad Azizi, Moulay Lahcen Hasnaoui. [doi]
- Control and Command Of Several Greenhouses Via Telegram MessengerYoussef Ben Akka, Abderrafii Rahali, Hassane Alami, El Arbi Abdellaoui Alaoui. [doi]
- A Comparative Analysis of OSN and SIoT Trust Models for a trust model adapted to MOOCs platformsKhadija Elghomary, Driss Bouzidi, Najima Daoudi. [doi]
- A Novel Traffic Prediction System based on Floating Car Data and Machine LearningM. Mzibri, A. Maach, A. Elhadri. [doi]
- New Solutions to Reduce the Environmental Impact of Road Traffic Emissions, Using SumoAli Gounni, Noureddine Rais, Mostafa Idrissi Azzouzi. [doi]
- Intelligent Decision Making for Depression Prevention and Detection based on AHPChaymae Benfares, Younès El Bouzekri El Idrissi, Karim Hamid. [doi]
- Model Transformation From Object Relational Database to NoSQL Document DatabaseToufik Fouad, Bahaj Mohamed. [doi]
- Game Theoretical model for Resource Allocation in 5G Hybrid HetNetsMaroua Gharam, Noureddine Boudriga. [doi]
- Security Extension for Routing Protocols in Ad hoc Mobile Networks: A comparative StudyZaid Kartit, Ouafaa Diouri. [doi]
- Trade-off between Performance and Energy Management in Autonomic and Green Data CentersSara Diouani, Hicham Medromi. [doi]
- A PSO Approach In The 3D Object Reconstruction Using SupershapesRemmach Hassnae, Sadgal Mohamed, Elfazziki Aziz. [doi]
- Prediction Demand for Classified Ads Using Machine Learning: an Experiment StudyMarouane Adnane, Mohammed El Haj Tirari, Sanaa El Fkihi, Rachid Oulad Haj Thami. [doi]
- Home Edge Computing Architecture for Smart and Sustainable Agriculture and BreedingCheikh Saliou Mbacke Babou, Bernard Ousmane Sané, Ibrahima Diane, Ibrahima Niang. [doi]
- A data modeling approach for classification problems: application to bank telemarketing predictionCédric Stéphane Tékouabou Koumétio, Walid Cherif, Hassan Silkan. [doi]
- Towards a sustainable world through a SMART digital transformationWail El Hilali, Abdellah El Manouar. [doi]
- Introduction to Steganography in RRNS based CommunicationsBelhamra Mohamed Amine, Souidi El Mamoun. [doi]
- Overview of Opinion Detection Approaches in ArabicManal Nejjari, Abdelouafi Meziane. [doi]
- A Comparative Study on the Efficiency of POS Tagging Techniques on Amazigh CorpusSamir Amri, Lahbib Zenkouar, Reda Benkhouya. [doi]