Abstract is missing.
- Mobile Cloud Computing: Architecture, Advantages and Security IssuesHadjer Fellah, Chaker Mezioud, Mohamed Chaouki Batouche. [doi]
- Smartphone learning for Kids edutainmentEhlem Zigh, Ayoub Elhoucine, Abderrahmane Mallek, Mohammed Kadiri, Kouninef Belkacem, Tolga Ensari. [doi]
- Machine Learning Aprroach for Early Detection of Glaucoma from Visual FieldsCédric Stéphane Tékouabou Koumétio, El Arbi Abdellaoui Alaoui, Imane Chabbar, Walid Cherif, Hassan Silkan. [doi]
- Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor NetworksRahat Ali Khan, Shahzad Memon. [doi]
- Artificial Intelligence in Learning Skills Assessment: A Pedagogical InnovationOkacha Diyer, Naceur Achtaich, Khalid Najib. [doi]
- Using machine learning to deal with Phishing and Spam Detection: An overviewOumaima El Kouari, Hafssa Benaboud, Saiida Lazaar. [doi]
- A Smart Chatbot Architecture based NLP and Machine Learning for Health Care AssistanceSoufyane Ayanouz, Boudhir Anouar Abdelhakim, Mohammed Benhmed. [doi]
- Diabetes Diseases Prediction Using Supervised Machine Learning and Neighbourhood Components AnalysisOthmane Daanouni, Bouchaib Cherradi, Amal Tmiri. [doi]
- An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks SelectionMourad Zairi, Tarik Boujiha, Ouelli Abdelhaq. [doi]
- Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular CylindersLahcen El Moutaouakil, Mohammed Boukendil, Zaki Zrikem, Abdelhalim Abdelbaki. [doi]
- Comparative analysis of TCP congestion control mechanismsKaoutar Bazi, Bouchaib Nassereddine. [doi]
- Post-Fall Time Accounting for Fall Detection Using a Portable CameraIsma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Nadia Saadia, Amar Ramdane-Cherif. [doi]
- Online Advertising on Consumer Purchasing Behavior: Effective Elements and its ImpactNur Nadira Izlyn Kamaruddin, Azlinah Mohamed, Syaripah Ruzaini Syed Aris. [doi]
- A machine learning color-based segmentation for object detection within dual X-ray baggage imagesMohamed Chouai, Mostefa Merah, José-Luis Sancho-Gómez, Malika Mimi. [doi]
- IT Security and IT Governance Alignment: A ReviewNorli Shariffuddin, Azlinah Mohamed. [doi]
- Motion Detection Using the Dynamic Color TextureInsaf Bellamine, Hassan Silkan, Amal Tmiri. [doi]
- Latest Trends in Recommender Systems applied in the medical domain: A Systematic ReviewStitini Oumaima, Kaloun Soulaimane, Bencharef Omar. [doi]
- Role of Reengineering in Training of SpecialistsDmitriy Bystrov, Toirov Olimjon, Giyasov Sanjar, Taniev Mirzokhid, Urokov Sardor. [doi]
- Unified Process to Design and Develop Serious Games for SchoolchildrenYounès Alaoui, Amine Belahbib, Lotfi El Achaak, Mohammed Bouhorma. [doi]
- Fog Computing for Smart Healthcare data Analytics: An Urgent NecessityHayat Khaloufi, Karim Abouelmehdi, Abederrahim Beni Hssane. [doi]
- A Survey of Intrusion Detection Algorithm in VANETBoughanja Manale, Tomader Mazri. [doi]
- Face Sketch Recognition-An OverviewKhalid Ounachad, Mohamed Oualla, Abdelghani Souhar, Abdelalim Sadiq. [doi]
- Enhanced Duplicate Count Strategy: Towards New Algorithms to Improve Duplicate DetectionYoussef Aassem, Imad Hafidi, Noureddine Aboutabit. [doi]
- Big Data Solutions Proposed for Cluster Computing Systems Challenges: A surveyFatima Es-Sabery, Abdellatif Hair. [doi]
- A comparative study of Machine learning algorithms for VANET networksSara Ftaimi, Tomader Mazri. [doi]
- New Frequency Reconfigurable Patch Antenna for Wireless CommunicationSanaa Errahili, Asma Khabba, Saida Ibnyaich, Moha M'rabet Hassani. [doi]
- Proposal of the Solution of Virtual Basic Schools in Rural Areas of African Countries in Conflict: Case of the Central African RepublicGhislain Mervyl S. J. Kossingou, Nadege Gladys Ndassimba, Edgard Ndassimba, Kéba Gueye, Samuel Ouya. [doi]
- Deep Learning Algorithms and Their Applications in the Perception ProblemRedouane Lhiadi. [doi]
- Fuzzy Systems for Computational Linguistics and Natural LanguageDmitriy Bystrov, Toirov Olimjon, Mustafakulova Gulzoda, Yakubova Dilfuza. [doi]
- Adaptive E-learning: Adaptation of Content According to the Continuous Evolution of the Learner During his TrainingMohammed Zaoudi, Hicham Belhadaoui. [doi]
- Ankle gait-pattern generatorsMohamed Amine Mamou, Nadia Saadia. [doi]
- Towards analyzing crash events for novice drivers under reduced-visibility settings: A simulator studyZouhair Elamrani Abou Elassad, Hajar Mousannif, Hassan Al Moatassime. [doi]
- Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy ConsumptionFatima Es-Sabery, Abdellatif Hair. [doi]
- Feature Selection Methods in Sentiment Analysis: A ReviewNurilhami Izzatie Khairi, Azlinah Mohamed, Nor Nadiah Yusof. [doi]
- Speckled correlation fringes denoising and demodulation using directional total variation and ridgelet transformMustapha Bahich, Mohammed Bailich. [doi]
- Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network ClassifierAzzeddine Dekhane, Adel Djellal, Fouaz Boutebbakh, Rabah Lakel. [doi]
- Recidivism forecasting: A study on process of feature selectionAmal Azeroual, Youssef Taher, Benayad Nsiri. [doi]
- Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSNAbdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui. [doi]
- A Survey on QoS-based communication protocols for IoT systemsNogaye Lo, Ibrahima Niang. [doi]
- Real-time Prediction of Accident using Big Data SystemMouad Tantaoui, My Driss Laanaoui, Mustapha Kabil. [doi]
- Inferring SQL Queries Using InteractivityKaram Ahkouk, Mustapha Machkour, Jilali Antari. [doi]
- A new Framework to improve Change Mining in Configurable ProcessAsmae Hmami, Hanae Sbaï, Mounia Fredj. [doi]
- Speedy and efficient malwares images classifier using reduced GIST features for a new defense guideBen Abdel Ouahab Ikram, El Aachak Lotfi, Boudhir Anouar Abdelhakim, Bouhorma Mohammed. [doi]
- An improved modeling method for profile-based personalized searchAnas El-Ansari, Abderrahim Beni Hssane, Mostafa Saadi. [doi]
- Verification of Integrity in Vehicle ArchitecturesChristine Jakobs, Billy Naumann, Matthias Werner 0001, Karsten Schmidt 0003. [doi]
- Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping SchemeLahraoui Younes, Amal Youssef, Saiida Lazaar. [doi]
- Collaborative Consumption Motives: A ReviewNur Zahrah Farida Binti Ruslan, Azlinah Mohamed, Norjansalika Janom. [doi]
- A Review on Cybersecurity: Challenges & Emerging ThreatsAbdulla Hussain, Azlinah Mohamed, Suriyati Razali. [doi]
- Role of Information Technologies in Supply Chain ManagementHeddoun Asmae, Benrrezzouq Rhizlane. [doi]
- Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN SecuritySamir Ifzarne, Imad Hafidi, Nadia Idrissi. [doi]
- Sampling techniques for Arabic Sentiment Classification: A Comparative StudyHajar Ait Addi, Redouane Ezzahir. [doi]
- An efficient Algorithm for medical image classification using Deep Convolutional Network: Case of Cancer PathologyDahdouh Yousra, Anouar Abdelhakim Boudhir, Mohamed Ben Ahmed. [doi]
- Big Data security and privacy techniquesLamia El Haourani, Anas Abou El Kalam, Abdellah Ait Ouahman. [doi]
- Modelling Sustainability, Cloud computing and knowledge transmission in education in developing countriesAhmed Mehrez, Lamia Aladel. [doi]
- Advanced Recommendation Systems Through Deep LearningMohamed Khoali, Abdelhak Tali, Yassin Laaziz. [doi]
- Practical Approach to Urban Crime Prevention in Developing NationsRichard Adeyemi Ikuesan, Shefiu Olusegun Ganiyu, Muhammad Umar Majigi, Yusuf Drisu Opaluwa, Hein S. Venter. [doi]
- Web OAuth-based SSO Systems SecurityYassine Sadqi, Yousra Belfaik, Said Safi. [doi]
- Internet of Things: Classification of attacks using CTM methodMeziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae. [doi]
- Normality Test to Detect the Congestion in MANET by Using OLSR ProtocolAbdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif, Mohammed-Alamine El Houssaini. [doi]
- LSTM-based Models for Earthquake PredictionAsmae Berhich, Fatima-Zahra Belouadha, Mohammed Issam Kabbaj. [doi]
- Knowledge Management in the Expert Model of the Smart Tutoring SystemFatima-Zohra Hibbi, Otman Abdoun, Haimoudi El Khatir. [doi]
- A Question answering System with a sequence to sequence grammatical correctionBghiel Afrae, Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir. [doi]
- Massive-MIMO Configuration of Multipolarized ULA and UCA in 5G Wireless CommunicationsAbdelhamid Riadi, Mohamed Boulouird, Moha M'rabet Hassani. [doi]
- Towards a new approach to reduce the dropout rate in e-learningDhaiouir Ilham, Ezziyyani Mostafa, Khaldi Mohamed. [doi]
- Fireworks Algorithm for Frequency Assignment ProblemEl Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, Alami Chentoufi Jihane. [doi]
- A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phonesAsma Khabba, Sanaa Errahili, Saida Ibnyaich, Moha M'rabet Hassani. [doi]
- CSMAS: Improving Multi-Agent Credit Scoring System by Integrating Big Data and the new generation of Gradient Boosting AlgorithmsYoussef Tounsi, Houda Anoun, Larbi Hassouni. [doi]
- Handwriting Recognition with Artificial Neural Networks a Decade Literature ReviewAhmed Remaida, Aniss Moumen, Younes El Bouzekri El Idrissi, Zineb Sabri. [doi]
- Performance Assessment of Open Source IDS for improving IoT Architecture Security implemented on WBANsMouna Boujrad, Saiida Lazaar, Mohammed Hassine. [doi]
- AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networksAsma Chikh, Mohamed Lehsaini. [doi]
- Adaptation of quality for video streaming in a Bittorrent P2P IMS networkAdnane Ghani, El Hassan Ibn Elhaj, Ahmed Hammouch, Abdelaali Chaoub. [doi]
- Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the CloudNickson M. Karie, Victor R. Kebande, Richard Adeyemi Ikuesan, Mehdi Sookhak, Hein S. Venter. [doi]
- A Distributed Information Retrieval Approach for Copyright ProtectionSonia Benbelgacem, Larbi Guezouli, Rachid Seghir. [doi]
- An Adaptive Learning Approach for Better Retention of Learners in MOOCsSmaili El Miloud, Sraidi Soukaina, Azzouzi Salma, My El Hassan Charaf. [doi]
- A Theoretical Study on Project Delivery and Leadership StyleMuhammad Hanif Nor Azman, Azlinah Mohamed, Edzreena Edza Odzaly. [doi]
- Some Properties of Free Cyclic Codes over Finite Chain RingsMohammed Sabiri, Youssef Bensalih, Aziz Elbour. [doi]
- Approach of Constructing an Islamic Pattern Respecting the "HASBA" MethodAit Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed. [doi]
- Model Transformation From Object Relational Database to NoSQL Column Based DatabaseToufik Fouad, Bahaj Mohamed. [doi]
- Three-level binary tree structure for sentiment classification in Arabic textHajar Ait Addi, Redouane Ezzahir, Abdelhak Mahmoudi. [doi]
- Study and Analysis of Data Analysis Systems (Reconstruction of a Learning Data from the Initial Data)Sara Belattar, Otman Abdoun, Haimoudi El Khatir. [doi]
- Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its ImprovementJaouad Maqboul, Bouchaib Bounabat Jaouad. [doi]
- Machine Learning Methods for Air Quality MonitoringMohamed Akram Zaytar, Chaker El Amrani. [doi]