Abstract is missing.
- Content-Based Recommender System using Word Embeddings for Pedagogical ResourcesChahrazed Mediani, Saad Harous, Mahieddine Djoudi. 1-8 [doi]
- A Hybrid Artificial Intelligence Approach for Early Stroke PredictionLacene Belinda, Irnatene Dahbia, Chouiref Latreche Zahira. 1-8 [doi]
- Enhancing Spam Email Classification using Multilayer Perceptron: Performance Analysis and Comparative EvaluationGhizlane Khababa, Nor Hazlyna Harun, Sadik Bessou, Chu Sin Ning, Ooi Poa Ning. 1-8 [doi]
- Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBANRachida Hireche, Houssem Mansouri, Yasmine Harbi, Al-Sakib Khan Pathan. 1-8 [doi]
- Investigating Security and Privacy Concerns in Deep-Learning-based Pervasive Health Monitoring ArchitecturesAmine Boulemtafes, Abdelouahab Amira, Mohamed Saddek Derki, Samir Hadjar. 1-8 [doi]
- Comparative intelligent Navigation of Pioneer Mobile Robot using laser and camera sensorsSalim Refoufi, Sid Mohammed Amine, Heraoua Yanis, Kara Redouane Abderrahamene, Guezzout Farouk, Laghmara Youcef. 1-8 [doi]
- Overall Delay analysis of Active Reliable Multicast Protocols in Wireless Mesh NetworksAsma Benmohammed, Salah Merniz. 1-6 [doi]
- Int-BEB: Enhanced Binary Exponential Backoff using Q-learningNadia Zerguine. 1-5 [doi]
- Dhati: a Fine-tuned Large Language Model for evaluating Subjectivity in Arabic Textual DataAttia Nehar, Slimane Bellaouar, Soumia Souffi, Mounia Bouameur. 1-7 [doi]
- Uncovering Linguistic Patterns: Exploring Ensemble Learning and Low-Level Features for Identifying Spoken Arabic, English, Spanish, and GermanSkander Hamdi, Abdelouahab Moussaoui, Mafaza Chabane, Ayoub Laouarem, Mohamed Berrimi, Mourad Oussalah. 1-8 [doi]
- A Pareto-Optimal Privacy-Accuracy Settlement For Differentially Private Image ClassificationBenladgham Rafika, Hadjila Fethallah, Belloum Adam. 1-7 [doi]
- Heuristic approaches for hiding sensitive frequent itemsets in uncertain databasesMira Lefkir, Farid Nouioua, Philippe Fournier-Viger. 1-8 [doi]
- CNN-based Community Detection: A Comparison StudyAbdelfateh Bekkaira, Slimane Oulad-Naoui, Slimane Bellaouar, Rababe Roumaissa Krimat, Alla Haddaoui. 1-6 [doi]
- Quantum Computing for Image Processing and Artificial Vision: Innovations in Advanced Quantum PhysicsTarek Nouioua, Nour El-Houda Yahiaoui. 1-7 [doi]
- A Fast Blind Scheme for Color Image AuthenticationAbdallah Soualmi, Adel Alti, Lamri Laouamer. 1-4 [doi]
- A Decentralized Negotiation-based Protocol for Cooperative Smart EnvironmentsMohammed-Lamine Daikha, Radja Boukharrou, Ahmed-Chawki Chaouche. 1-8 [doi]
- Enhancing Security and Authentication in IoT-based Energy Internet using Post-Quantum BlockchainChahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Lemia Louail. 1-8 [doi]
- Model Based System Engineering for trust SCADA and ICS Systems in Oil & Gas IndustryZina Oudina, Makhlouf Derdour, Ahmed Dib, Amal Miloud Aouidate Tachouche. 1-8 [doi]
- Fragile watermarking for medical image authentication based on DCT techniqueRiadh Bouarroudj, Feryel Souami, Fatma Zohra Bellala. 1-6 [doi]
- Genetic Convolutional Neural Networks Approach for Disease Detection From Chest X-Ray ImagesAmina Djoudi, Ahmed Amine Zaid, Younes Guellouma, Hadda Cherroun. 1-8 [doi]
- Semantic Interoperability in Electronic Health Record System Based on Blockchain Technology: a SurveyNawal Chemini, Ouassila Hioual, Sofiane Mounine Hemam. 1-8 [doi]
- Stream Reasoning approach on Human Behavior for Medication Risks Detection using LARS FrameworkAgti Nadia, Sabri Lyazid, Okba Kazar, Abdelghani Chibani. 1-7 [doi]
- Security Issues in Cloud-based IoT SystemsRahma Berchi, Lemia Louail, Sarra Cherbal. 1-8 [doi]
- Enhanced three-dimensional reconstruction by photometric stereoLyes Abada, Islam Hannachi, Mohamed Wail Laallam, Saliha Aouat. 1-5 [doi]
- Extracting Gradual Periodic Patterns from Transactional Databases: Application to Felonies and Misdemeanors DataHamimid Ilyes, Nouioua Farid, Sara Boutouhami, Houamed Mouna, Mebarka Yahlali. 1-8 [doi]
- A QoE aware Clustering MAC protocol for Internet of Vehicles (QoEC-MAC)Hayet Zerrouki, Samira Moussaoui, Noureddine Haouari. 1-6 [doi]
- Towards Deep Supervised Features Learning: Item-to-Knowledge Mapping in Educational Data Using Convolutional Neural NetworksKhadidja Harbouche, Chabane Khentout, Imene Zenbout, Nassima Smaani, Kawthar Sinacer. 1-8 [doi]
- Metaheuristic-based automated design of Convolutional Neural Network architecture for plant seedlings classificationWahiba Aliouat, Lamis Badis, Kenza Bouchiba. 1-8 [doi]
- Transformer-Based Question Answering Model for the Biomedical DomainAhcene Haddouche, Ikram Rabia, Aicha Aid. 1-6 [doi]
- Machine learning solutions for securing IoT-based healthcare: A ReviewKharoubi Kamir, Sarra Cherbal. 1-8 [doi]
- Web APIs composition based on Knowledge Graph Word Embedding and Entity LinkingAmel Boustil, Youcef Tabet. 1-8 [doi]
- Toward an Efficient in-Network Caching Using Federated LearningMalak Safa Djekidel, Habib Manel, Chaker Abdelaziz Kerrache, Carlos T. Calafate. 1-8 [doi]
- Task Scheduling Optimization in Cloud Computing: A Comparative Study Between Flower Pollination and Butterfly Optimization AlgorithmsArslan Nedhir Malti, Badr Benmammar, Mourad Hakem. 1-7 [doi]
- Generating Cancelable Multispectral Palmprint templates based on Cartesian TransformationZineb Maaref, Abdelouahab Attia, Foudil Belhadj. 1-7 [doi]