Abstract is missing.
- LEVERAGING THE POWER OF INTEGRATED SOLUTIONS OF IoT and GISLyna Miloudi, Khaled Rezeg. 1-7 [doi]
- A New Multi Varied Arabic CorpusKhouloud Meskaldji, Salim Chikhi, Imene Bensalem. 1-5 [doi]
- 3D Robots Formation cooperative Control Using EFDsAhmed Allam, Mohamed Tadjine, Elhaouari Kobzili, Abdelghani Boucheloukh, Abdelkrim Nemra. 1-6 [doi]
- IoT Securing System using Fuzzy Commitment for DCT-based Fingerprint RecognitionAtef Bentahar, Abdallah Meraoumia, Hakim Bendjenna, Abdelhakim Zeroual. 1-5 [doi]
- Higher-Order Spatial Statistics: A Strong Alternative In Image ProcessingAmel Boulemnadjel, Ferhat Kaabache, Soumeya Kharfouchi, Fella Hachouf. 1-6 [doi]
- Deep Learning for Ligand-Based Virtual Screening in Drug DiscoveryMeriem Bahi, Mohamed Batouche. 1-5 [doi]
- Bayesian exploration of dependencies of laboratory tests and evaluation of test redundancyZeyneb Guenfoud, Peter Antal. 1-6 [doi]
- Bio-inspired Approach for Inverse Kinematics of 6-DOF Robot Manipulator with Obstacle AvoidanceKheireddine Abainia, Yamina Mohamed Ben Ali. 1-8 [doi]
- Resolving Multiple Sequence Alignment Problem Using an Intelligent Cooperative AlgorithmLamiche Chaabane. 1-3 [doi]
- Intrusion Detection using Data Mining: A contemporary comparative studyImad Bouteraa, Makhlouf Derdour, Ahmed Ahmim. 1-8 [doi]
- Vanet routing protocols: discussion of various Ad-hoc On-demand Distance Vector (AODV) improvementsHanene Brahmia, Cherif Tolba. 1-6 [doi]
- Improved Multicriteria Ranking based web service Discovery approachDjallel Eddine Abdelli, Fayçal M'hamed Bouyakoub. 1-6 [doi]
- Decision process for safety based on Bayesian approachNassima Aissani, Islam Hadj Mohamed Guitarni, Zoubida Lounis. 1-6 [doi]
- Using A Real-coded Genetic Algorithm to Predict Characterization Parameters for Petroleum FractionChafik Belghit, Yasmina Lahiouel, Tareq A. Albahri. 1-7 [doi]
- Task scheduling optimization in cloud based on electromagnetism metaheuristic algorithmAli Belgacem, Kadda Beghdad Bey, Hassina Nacer. 1-7 [doi]
- Local Binary Pattern and Tchebychev Moments as a Single Image DiscriptorBenrais Lamine, Baha Nadia. 1-6 [doi]
- Taxonomy of Biometric-based Authentication Schemes for Mobile Computing DevicesMohamed Amine Ferrag, Leandros A. Maglaras, Abdelouahid Derhab, Abdelaziz Amara Korba. 1-8 [doi]
- Optimizing Energy in Wireless Sensor Networks using a Quantum Artificial Bee ColonyMohamed Sandeli, Souham Meshoul, Riad Lekhchine. 1-5 [doi]
- Fault Tolerance in Distributed Systems: A SurveyAbdeldjalil Ledmi, Hakim Bendjenna, Sofiane Mounine Hemam. 1-5 [doi]
- Semi-supervised Super-pixels classification for White Blood Cells segmentationMohammed El Amine Bechar, Nesma Settouti, Mostafa El Habib Daho, Mohammed Amine Chikh. 1-8 [doi]
- Extended multi-agent system based service composition in the Internet of thingsSamir Berrani, Ali Yachir, Badis Djemaa, Mohamed Aissani. 1-8 [doi]
- A system for the automatic detection of glaucoma using retinal imagesElaouaber Zineb Aziza, Lazouni Mohamed El Amine, Messadi Mohamed. 1-6 [doi]
- Towards formal verification of cryptographic circuits: A functional approachAbir Bitat, Salah Merniz. 1-6 [doi]
- 2D and 3D Palmprint Recognition using Deep Learning MethodDjamel Samai, Khaled Bensid, Abdallah Meraoumia, Abdelmalik Taleb-Ahmed, Mouldi Bedda. 1-6 [doi]
- Enhanced Cuckoo Search-based Clustering Protocol for Wireless Sensor NetworksMohammed Demri, Mohamed Elsadiq Barmati, Hanane Youcefi. 1-6 [doi]
- Voice-based Augmented Reality Interactive System for Car's Components AssemblyDjamel Aouam, Samir Benbelkacem, Nadia Zenati, Sardi Zakaria, Zaoui Meftah. 1-5 [doi]
- Digital Marketing with Social Media: What Twitter Says!Wedjdane Nahili, Khaled Rezeg. 1-5 [doi]
- Multi-Agent Systems and Ontology for Supporting Management System in Smart SchoolZouaoui Samia, Rezeg Khaled, Zouaoui Warda. 1-8 [doi]
- Natural Image Character Recognition Using One Class-Principal Component Analysis ClassifierFatima Zouaoui, Youcef Chibani. 1-5 [doi]
- Onto-SB: Human Profile Ontology for Energy Efficiency in Smart BuildingHoussem Eddine Degha, Fatima Zohra Laallam, Bachir Said, Djamel Saba. 1-8 [doi]
- Dual Direct Torque Control of Doubly Fed Induction Machine using Artificial Neural NetworkSaad Khadar, Abdellah Kouzou. 1-7 [doi]
- Towards a Secure Online E-voting Protocol Based on Palmprint FeaturesAbdallah Meraoumia, Hakim Bendjenna, Mohamed Amroune, Yahia Dris. 1-6 [doi]
- Solving the graph b-coloring problem with hybrid genetic algorithmSaid Labed, Akram Kout, Salim Chikhi. 1-7 [doi]
- Stereo Visual Odometry for Mobile RobotAbdelghani Boucheloukh, Farès Boudjema, Abdelkrim Nemra, Fethi Demim, Rabah Louali. 1-7 [doi]
- Multiobjective Optimization for Many Wind Based DG Position and Sizes in Practical Distribution Network Using Modified Differential Evolution TechniqueMustafa Mosbah, S. Arif, R. D. Mohammedi, Samir Hamid Oudjana, Rabie Zine. 1-6 [doi]
- Use of Multi-criteria decision analysis to make collection management decisionsMohamed Hemili, Mohamed Ridda Laouar. 1-5 [doi]
- Deep authentication model in Mobile Cloud ComputingAbdelhakim Zeroual, Mohamed Amroune, Makhlouf Derdour, Abdallah Meraoumia, Atef Bentahar. 1-4 [doi]
- A Component-Based MAPE-K Control Loop Model for Self-adaptationSelma Ouareth, Soufiane Boulehouache, Smaine Mazouzi. 1-7 [doi]
- WSQEP: Web Service Quality Evaluation ProcessMebarka Yahlali. 1-5 [doi]
- An approach for Semantic Enrichment of Sensor DataMeriem Djezzar, Mounir Hemam, Moufida Maimour, Fatima Zahra Amara, Khaoula Falek, Zianou Ahmed Seghir. 1-7 [doi]
- Detecting Algerian Sub-Dialects of On-Line Commentators in Social Media NetworksKheireddine Abainia. 1-8 [doi]
- Encrypted Traffic Classification: Combining Over-and Under-Sampling through a PCA-SVMAbid Saber, Belkacem Fergani, Moncef Abbas. 1-5 [doi]
- Toward Accurate Social Media Language Identification: Combining Language Features with a Graphical ApproachKheireddine Abainia. 1-7 [doi]
- Semi-automatic segmentation method of left for ventricle in cardiac cine MRI analysis of myocardial viabilityDali Youcef Sarra, Messadi Mohamed. 1-6 [doi]
- Deep learning for online harassment detection in tweetsTolba Marwa, Ouadfel Salima, Meshoul Souham. 1-5 [doi]
- Implementation of a Preventive Maintenance System Based on Augmented RealityRabie Hamidane, Leila Hayet Mouss, Abdelkader Bellarbi, Rafik Mahdaoui. 1-6 [doi]
- Frequent Itemsets Mining with Chemical Reaction Optimization MetaheuristicAbir Derouiche, Abdesslem Layeb, Zineb Habbas. 1-6 [doi]
- Set Theory-based FSM for Managing Home Emergencies Concept, Properties and Process AlgebraAllal Tiberkak, Abdelfetah Hentout, Abdelkader Belkhir, Tayeb Lemlouma, Ahmed Bouabdallah. 1-8 [doi]
- Optimal Algerian Distribution Network Reconfiguration Using Antlion Algorithm for Active Power LossesMustafa Mosbah, Salem Arif, Ridha Djamel Mohammedi, Rabie Zine. 1-6 [doi]
- LMDS-SEA: Upgrading the Shape Exchange Algorithm (SEA) to handle general time series classification by local matching and distance selectionAbdelmadjid Lahreche, Bachir Boucheham. 1-6 [doi]
- Improving high-resolution satellite images retrieval using Linear SVM classifier and data augmentationHouria Sebai, Assia Kourgli. 1-7 [doi]
- Relative scientometric analysis of knowledge management journals in SCOPUSSamia Aitouche, Samira Brahmi, Hanane Zermane, Naima Zerari, Khaled Latreche, Abdelghafour Kaanit. 1-7 [doi]
- A Self-adaptive Agent-based System for Cloud PlatformsMerzoug Soltane, Yudith Cardinale, Rafael Angarita, Philippe Rosse, Marta Rukoz, Derdour Makhlouf, Okba Kazar. 1-8 [doi]
- Geometric Binary Descriptor Based Monocular SLAMElhaouari Kobzili, Cherif Larbes, Ahmed Allam, Fethi Demim, Abdelghani Boucheloukh. 1-6 [doi]