Abstract is missing.
- Detection of Human Activities in Wildlands to Prevent the Occurrence of Wildfires Using Deep Learning and Remote SensingAyoub Jadouli, Chaker El Amrani. 3-17 [doi]
- The Evolution of the Traffic Congestion Prediction and AI ApplicationBadr-Eddine Soussi Niaimi, Mohammed Bouhorma, Hassan Zili. 19-31 [doi]
- Tomato Plant Disease Detection and Classification Using Convolutional Neural Network Architectures TechnologiesHammou Djalal Rafik, Mechab Boubaker. 33-44 [doi]
- Generative and Autoencoder Models for Large-Scale Mutivariate Unsupervised Anomaly DetectionNabila Ounasser, Maryem Rhanoui, Mounia Mikram, Bouchra El Asri. 45-58 [doi]
- Automatic Spatio-Temporal Deep Learning-Based Approach for Cardiac Cine MRI SegmentationAbderazzak Ammar, Omar Bouattane, Mohamed Youssfi. 59-73 [doi]
- Skin Detection Based on Convolutional Neural NetworkYamina Bordjiba, Chemesse ennehar Bencheriet, Zahia Mabrek. 75-85 [doi]
- CRAN: An Hybrid CNN-RNN Attention-Based Model for Arabic Machine TranslationNouhaila Bensalah, Habib Ayad, Abdellah Adib, Abdelhamid Ibn El Farouk. 87-102 [doi]
- Impact of the CNN Patch Size in the Writer IdentificationAbdelillah Semma, Yaâcoub Hannad, Mohamed El Youssfi El Kettani. 103-114 [doi]
- Optimization of a Multi-criteria Cognitive Radio User Through Autonomous LearningNaouel Seghiri, Mohammed Zakarya Baba-Ahmed, Badr Benmammar, Nadhir Houari. 117-132 [doi]
- MmRPL: QoS Aware Routing for Internet of Multimedia ThingsHadjer Bouzebiba, Oussama Hadj Abdelkader. 133-145 [doi]
- Channel Estimation in Massive MIMO Systems for Spatially Correlated Channels with Pilot ContaminationMohamed Boulouird, Jamal Amadid, Abdelhamid Riadi, Moha M'rabet Hassani. 147-160 [doi]
- On Channel Estimation of Uplink TDD Massive MIMO Systems Through Different Pilot StructuresJamal Amadid, Mohamed Boulouird, Abdelhamid Riadi, Moha M'rabet Hassani. 161-176 [doi]
- NarrowBand-IoT and eMTC Towards Massive MTC: Performance Evaluation and Comparison for 5G mMTCAdil Abou El Hassan, Abdelmalek El Mehdi, Mohammed Saber. 177-195 [doi]
- Integrating Business Intelligence with Cloud Computing: State of the Art and Fundamental ConceptsHind El Ghalbzouri, Jaber El Bouhdidi. 197-213 [doi]
- Distributed Architecture for Interoperable Signaling InterlockingIkram Abourahim, Mustapha Amghar, Mohsine Eleuldj. 215-230 [doi]
- A New Design of an Ant Colony Optimization (ACO) Algorithm for Optimization of Ad Hoc NetworkHala Khankhour, Otman Abdoun, Jaafar Abouchabaka. 231-241 [doi]
- Real-Time Distributed Pipeline Architecture for Pedestrians' TrajectoriesKaoutar Bella, Azedine Boulmakoul. 243-255 [doi]
- Reconfiguration of the Radial Distribution for Multiple DGs by Using an Improved PSOMeriem M'dioud, Rachid Bannari, Ismail Elkafazi. 257-273 [doi]
- On the Performance of 5G Narrow-Band Internet of Things for Industrial ApplicationsAbdellah Chehri, Hasna Chaibi, Rachid Saadane, El Mehdi Ouafiq, Ahmed Slalmi. 275-286 [doi]
- A Novel Design of Frequency Reconfigurable Antenna for 5G Mobile PhonesSanaa Errahili, Asma Khabba, Saida Ibnyaich, Abdelouhab Zeroual. 287-298 [doi]
- A Real-Time Smart Agent for Network Traffic Profiling and Intrusion Detection Based on Combined Machine Learning AlgorithmsNadiya El Kamel, Mohamed Eddabbah, Youssef Lmoumen, Raja Touahni. 301-309 [doi]
- Privacy Threat Modeling in Personalized Search SystemsAnas El-Ansari, Marouane Birjali, Mustapha Hankar, Abderrahim Beni Hssane. 311-325 [doi]
- Enhanced Intrusion Detection System Based on AutoEncoder Network and Support Vector MachineSihem Dadi, Mohamed Abid. 327-341 [doi]
- Comparative Study of Keccak and Blake2 Hash FunctionsHind E. L. Makhtoum, Youssef Bentaleb. 343-350 [doi]
- a, dAbdelâli Grini, Abdelhakim Chillali, Hakima Mouanis. 351-363 [doi]
- Method for Designing Countermeasures for Crypto-Ransomware Based on the NIST CSFHector Torres-Calderon, Marco Velasquez, David Mauricio. 365-380 [doi]
- Comparative Study Between Network Layer Attacks in Mobile Ad Hoc NetworksOussama Sbai, Mohamed Elboukhari. 381-392 [doi]
- Security of Deep Learning Models in 5G Networks: Proposition of Security Assessment ProcessAsmaa Ftaimi, Tomader Mazri. 393-407 [doi]
- Effects of Jamming Attack on the Internet of ThingsImane Kerrakchou, Sara Chadli, Mohammed Saber, Mohammed Ghaouth Belkasmi. 409-422 [doi]
- H-RCBAC: Hadoop Access Control Based on Roles and ContentSarah Nait Bahloul, Karim Bessaoud, Meriem Abid. 423-437 [doi]
- Toward a Safe Pedestrian Walkability: A Real-Time Reactive Microservice Oriented EcosystemGhyzlane Cherradi, Azedine Boulmakoul, Lamia Karim, Meriem Mandar. 439-451 [doi]
- Image-Based Malware Classification Using Multi-layer PerceptronIkram Ben Abdel Ouahab, Lotfi Elaachak, Mohammed Bouhorma. 453-464 [doi]
- Preserving Privacy in a Smart Healthcare System Based on IoTRabie Barhoun, Maryam Ed-Daibouni. 465-476 [doi]
- Extracting Learner's Model Variables for Dynamic Grouping SystemNoureddine Gouasmi, Mahnane Lamia, Yassine Lafifi. 479-493 [doi]
- E-learning and the New Pedagogical Practices of Moroccan TeachersNadia El Ouesdadi, Sara Rochdi. 495-508 [doi]
- A Sentiment Analysis Based Approach to Fight MOOCs' Drop OutSraidi Soukaina, Smaili El Miloud, Salma Azzouzi, My El Hassan Charaf. 509-520 [doi]
- The Personalization of Learners' Educational Paths E-learningIlham Dhaiouir, Mostafa Ezziyyani, Mohamed Khaldi. 521-534 [doi]
- Formulating Quizzes Questions Using Artificial Intelligent TechniquesAbdelali El Gourari, Mustapha Raoufi, Mohammed Skouri. 535-547 [doi]
- Smart Campus Ibn Tofail Approaches and ImplementationSrhir Ahmed, Tomader Mazri. 549-560 [doi]
- Boosting Students Motivation Through Gamified Hybrid Learning Environments Bleurabbit Case StudyMohammed Berehil. 561-576 [doi]
- An Analysis of ResNet50 Model and RMSprop Optimizer for Education Platform Using an Intelligent Chatbot SystemYouness Saadna, Anouar Abdelhakim Boudhir, Mohamed Ben Ahmed. 577-590 [doi]
- BPMN to UML Class Diagram Using QVTMohamed Achraf Habri, Redouane Esbai, Yasser Lamlili El Mazoui Nadori. 593-602 [doi]
- Endorsing Energy Efficiency Through Accurate Appliance-Level Power Monitoring, Automation and Data VisualizationAya Sayed, Abdullah Alsalemi, Yassine Himeur, Faycal Bensaali, Abbes Amira. 603-617 [doi]
- Towards a Smart City Approach: A Comparative StudyZineb Korachi, Bouchaib Bounabat. 619-633 [doi]
- Hyperspectral Data Preprocessing of the Northwestern Algeria RegionZoulikha Mehalli, Ehlem Zigh, Abdelhamid Loukil, Adda Ali-Pacha. 635-652 [doi]
- Smart Agriculture Solution Based on IoT and TVWS for Arid Regions of the Central African RepublicEdgard Ndassimba, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya. 653-666 [doi]
- Model-Driven Engineering: From SQL Relational Database to Column - Oriented Database in Big Data ContextFatima Zahra Belkadi, Redouane Esbai. 667-678 [doi]
- Data Lake Management Based on DLDS ApproachMohamed Cherradi, Anass El Haddadi, Hayat Routaib. 679-690 [doi]
- Evaluation of Similarity Measures in Semantic Web Service DiscoveryMourad Fariss, Naoufal El Allali, Hakima Asaidi, Mohamed Bellouki. 691-704 [doi]
- Knowledge Discovery for Sustainability Enhancement Through Design for RelevanceAbla Chaouni Benabdellah, Asmaa Benghabrit, Imane Bouhaddou, Kamar Zekhnini. 705-722 [doi]
- Location Finder Mobile Application Using Android and Google SpreadSheetsAdeosun Nehemiah Olufemi, Melike Sah. 723-736 [doi]
- Sign Language Recognition with Quaternion Moment Invariants: A Comparative StudyIlham Elouariachi, Rachid Benouini, Khalid Zenkouar, Arsalane Zarghili, Hakim el Fadili. 737-748 [doi]
- Virtual Spider for Real-Time Finding Things Close to PedestriansSouhail Elkaissi, Azedine Boulmakoul. 749-761 [doi]
- Evaluating the Impact of Oversampling on Arabic L1 and L2 Readability Prediction PerformancesNaoual Nassiri, Abdelhak Lakhouaja, Violetta Cavalli-Sforza. 763-774 [doi]
- An Enhanced Social Spider Colony Optimization for Global OptimizationFarouq Zitouni, Saad Harous, Ramdane Maamri. 775-793 [doi]
- Data Processing on Distributed Systems Storage ChallengesMohamed Eddoujaji, Hassan Samadi, Mohamed Bohorma. 795-811 [doi]
- Data-Based Automatic Covid-19 Rumors Detection in Social NetworksBolaji Bamiro, Ismail Assayad. 815-827 [doi]
- Security and Privacy Protection in the e-Health System: Remote Monitoring of COVID-19 Patients as a Use CaseMounira Sassi, Mohamed Abid. 829-843 [doi]
- Forecasting COVID-19 Cases in Morocco: A Deep Learning ApproachMustapha Hankar, Marouane Birjali, Abderrahim Beni Hssane. 845-857 [doi]
- The Impact of COVID-19 on Parkinson's Disease Patients from Social NetworksHanane Grissette, El Habib Nfaoui. 859-871 [doi]
- Missing Data Analysis in the Healthcare Field: COVID-19 Case StudyHayat Bihri, Sara Hsaini, Rachid Nejjari, Salma Azzouzi, My El Hassan Charaf. 873-884 [doi]
- An Analysis of the Content in Social Networks During COVID-19 PandemicMironela Pirnau. 885-897 [doi]