Abstract is missing.
- Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection SystemsAfrah Gueriani, Hamza Kheddar, Ahmed Cherif Mazari. 1-7 [doi]
- The KD-GATS algorithm: A way for Optimizing Data Replication with Kruskal-Dijkstra and Genetic Tabu StrategyHazem Bensalah, Abdelkamel Ben Ali, Abdennacer Khelaifa. 1-8 [doi]
- Benchmarking Deep Learning Optimizers for the classification of Event-Related Potentials based Brain-Computer Interface EEG dataOkba Bekhelifi, Nasr-Eddine Berrached. 1-8 [doi]
- Early prediction of nephropathy chronic with supervised machine learning algorithms and feature selection methodSafa Boughougal, Mohamed Ridda Laouar, Abderrahim Siam. 1-8 [doi]
- Neural Machine Translation for the Arabic-English Language PairAhmed Amine Aliane, Nasreddine Semmar, Hassina Aliane. 1-7 [doi]
- Exploring Multimedia Streaming Protocols in VANET: A Systematic ReviewBenzerogue Sarra, Sahraoui Abdelatif, Salah Merniz, Lazhar Khamer, Saad Harous. 1-8 [doi]
- Advancing Plant Diseases Detection with Pre-trained YOLO ModelsBoudjemaa Boudaa, Kamel Abada, Walid Aymen Aichouche, Ahmed Nabil Belakermi. 1-6 [doi]
- Lightweight Mitigation Against DIO Suppression Attack In RPL-Based IoT NetworksTahar Guerbouz, Akram Zine Eddine Boukhamla, Belkebir Djalila. 1-6 [doi]
- Adaptive Filtering Strategies for ECG Signal Enhancement: A Comparative StudyNadjem Eddine Menaceur, Sofia Kouah, Makhlouf Derdour. 1-6 [doi]
- Comparison of CTR-OFB Modes for AES-256-based InSAR Interferogram Encryption with a GEFFE Key GeneratorKarim Benamara, Riad Saidi, Tarek Bentahar, Hanane Djellab, Nada Cherrid, Yacine Belhocine. 1-7 [doi]
- SE-Half-UNet: Accurate and Low-Cost Retinal Vessel Segmentation from Fundus ImagesAnouar Khaldi, Belal Khaldi, Mohamed Ben Bezziane, Khaled Hebbache, Samir Guediri, Siham Hasan. 1-8 [doi]
- MCDM: an ML-based Multi-Criteria Decision Making solution for UAVs Service SelectionAbdessalam Mohammed Hadjkouider, Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi. 1-6 [doi]
- Efficient Machine Learning Approach for Diabetes Mellitus Disease PredictionOualid Mecili, Barkat Hadj, Farid Nouioua, Abdelouahab Attia, Samir Akhrouf. 1-8 [doi]
- Beyond Traditional Methods: Feature Fusion for Robust Biometric IdentificationYacine Belhocine, Abdallah Meraoumia, Hakim Bendjenna, Ameur Khemane. 1-8 [doi]
- Disparity Distribution Equalization: An Effective Data Enhancement for Stereo MatchingJiaxuan Zheng, Jiayu Wu, Shuwen Xu 0003, Sidan Du, Yang Li. 1-6 [doi]
- Network Slicing solutions for Internet of Vehicles (IoV) Networks: A ReviewAhmed Arbaoui, Sahraoui Abdelatif, Makhlouf Derdour. 1-7 [doi]
- Deep Learning's Ability to Predict Chaos in a Chaotic SystemSourour Maalem, Hakim Bendjenna. 1-4 [doi]
- Improved Skin Lesion Segmentation and Classification using Hierarchical Deep Attention ArchitecturesSakina Kahal, Lila Meddeber, Tarik Zouagui. 1-8 [doi]
- Using Transformers to Classify Arabic Dialects on Social NetworksAdel Berhoum, Meftah Mohammed Charaf Eddine, Abdelkader Laouid, Khaled Chait, Mostefa Kara. 1-7 [doi]
- Authentication scheme based on blockchain and Proof-of-Work for IoTInes Adjeroud, Sarra Cherbal, Chahrazed Benrebbouh, Hamza Baaraoui. 1-8 [doi]
- Attention Mechanisms in Deep Learning : Towards Explainable Artificial IntelligenceNour El Houda Dehimi, Zakaria Tolba. 1-7 [doi]
- Blockchain-Driven Adaptive Streaming for IoT: Redefining Security in Video DeliveryMohamed El Amine Kheraifia, Sahraoui Abdelatif, Makhlouf Derdour. 1-7 [doi]
- REED-Based Scheme to Revoke Access in Electronic Health Records Sharing SystemsAdil Merabet, Ahmed Alioua. 1-6 [doi]
- Introducing Novel Radon Based Transform for Disease Detection From Chest X-Ray ImagesAshhadul Islam, Farida Mohsen, Zubair Shah, Samir Brahim Belhaouari. 1-5 [doi]
- Enhancing Student Learning: Automatic Support in an Educational Social NetworkSirine Bouguettaya, Amina Zedadra, Ouarda Zedadra. 1-8 [doi]
- Enhancing Machine Learning Model Interpretability in Intrusion Detection Systems through SHAP Explanations and LLM-Generated DescriptionsAbderrazak Khediri, Hamda Slimi, Yahiaoui Ayoub, Makhlouf Derdour, Hakim Bendjenna, Charaf Eddine Ghenai. 1-6 [doi]
- Advancements in Sentiment Analysis for the Algerian Dialect: A Comprehensive ReviewOuahiba Remadnia, Faiz Maazouzi. 1-8 [doi]
- Empowering Deaf Community in Healthcare Communication: 1D-CNN-Based Algerian Sign Language Recognition SystemLyna Bellil, Maissoun Ghouzlen Ghiri, Abdennour Boulesnane. 1-7 [doi]
- Federated Learning and Convolutional Neural Networks for Intrusion Detection SystemsMalika Abid, Mohammed Kamel Benkaddour, Mohamed Benouis. 1-8 [doi]
- Deep Learning-Based cloud services recommendationSaida Kichou, Brairi Ismail, Essalhi Mohamed Amine. 1-8 [doi]
- A Novel Machine Learning Approach For handling Imbalanced Data: Leveraging SMOTE-ENN and XGBoostBounab Rayene, Bouchra Guelib, Karim Zarour. 1-7 [doi]
- Navigating Urban Traffic Patterns: Ensemble Stacking for Improved Travel Time PredictionAmira Benlecheb, Ahmed-Chawki Chaouche, Brahim Benabderrahmane. 1-8 [doi]
- Toward Secure Consumer IoT Communications using DNA Encryption and Blockchain TechnologyAnkush Verma, Geetanjali Rathee, Chaker Abdelaziz Kerrache. 1-7 [doi]
- mini-Unet GAN: Optimized GAN for Monocular Depth EstimationNaoual El-Djouher Mebtouche, Nadia Baha, Okba Bekhelifi. 1-7 [doi]
- Improving QoE in IoV: a review of solutions and challenges for MPEG-DASHGuerrad Abdelghani, Sahraoui Abdelatif, Makhlouf Derdour. 1-8 [doi]
- Medical Image Generation Techniques for Data Augmentation: Disc-VAE versus GANKhadija Rais, Mohamed Amroune, Mohamed Yassine Haouam. 1-8 [doi]
- Centralized and Decentralized Federated Learning in Autonomous Swarm Robots: Approaches, Algorithms, Optimization Criteria and Challenges : The Sixth Edition of International Conference on Pattern Analysis and Intelligent Systems (PAIS'24)Aicha Hafid, Riadh Hocine, Lahcene Guezouli, Mohamed Rida Abdessemed. 1-8 [doi]
- Design and optimization of Microstrip Patch Antenna at 28GHz for 5G wireless applicationsAhmed Mohamed Salem, Hanane Djellab, Mohamed Lashab, Allaoua Oumaima. 1-5 [doi]
- Blockchain Sharding based Federated Learning Empowered with NFT-based Privacy-Preserving Model SharingRofaida Khemaissia, Makhlouf Derdour, Ala Djeddai. 1-8 [doi]
- Federated Learning for Multi-institutional on 3D Brain Tumor SegmentationYahiaoui Mohammed Elbachir, Derdour Makhlouf, Mohamed Gasmi, Mohammed Mounir Bouhamed, Kouzou Abdellah. 1-8 [doi]
- On the Performance Evaluation of Mobility Model-Based GPSR Routing Protocol in Flying Ad hoc NetworksMohamed Ben Bezziane, Yesin Sahraoui, Bouziane Brik, Lina Mekkas, Sara Bougeurra, Anouar Khaldi. 1-7 [doi]
- Intrusion Detection with deep learning: A literature reviewBrahim Khalil Sedraoui, Abdelmadjid Benmachiche, Amina Makhlouf, Chaouki Chemam. 1-8 [doi]
- Comparative Analysis of Security-Focused Blockchain Architectures: Optimising Security in IoTBenali Cherif. 1-8 [doi]
- Intelligent optimization of computing task management in an Edge environmentAmira Cheriet, Tahar Mekhaznia 0001. 1-7 [doi]
- Multi-CNN Model for Multi-Classification of Cultural Heritage MonumentsToufik Djelliout, Hassina Aliane. 1-5 [doi]
- Applications of Machine Learning in Corrosion DetectionNessreddin Daoudi, Mohamed Yassine Haouam, Laimeche Lakhdar, Issam Bendib, Mohamed Amroune. 1-8 [doi]
- Machine Learning-Based Detection of Autism Spectrum Disorder Using Attention Mechanisms in Eye-Tracking DataBrahim Benabderrahmane, Mohamed Gharzouli, Amira Benlecheb. 1-8 [doi]
- Harris Hawk Optimized CLAHE and Novel Score Level Fusion of Lightweight CNNs for Multimodal Biometric RecognitionIndu Singh, Tanvi Singh, Sunaina Luthra, Shruti Khatri. 1-8 [doi]
- Cutting-Edge Broad Learning with Flexible Privacy Mechanisms for Detecting Malicious BehaviourFaiza Benmenzer, Rachid Beghdad, Alaa Eddine Khalfoune. 1-8 [doi]
- Basic Emotion Recognition in Facial Expressions using Deep CNNAbdelhakim Gharbi, Abdeljalil Gattal, Issam Bendib. 1-6 [doi]
- Simulation Analysis of Car Aerodynamics within Tunnel Environment using Deep Learning: A Comparative Architectural StudyFouzia Adjailia, Dávid Jopek, Michal Takác, Marek Ruzicka, Seloua Haddaoui. 1-8 [doi]
- Reinforcement Learning Approach for IoT Security using CyberBattleSim: A Simulation-based StudyMohammed Nadhir Abid, Mounir Beggas, Abdelkader Laouid. 1-7 [doi]
- A Transfer Learning Framework for Lung Cancer Classification Using EfficientV2-L: Generalizability AssessmentAmira Bouamrane, Makhlouf Derdour, Ahmed Alksas, Ayman El-Baz. 1-6 [doi]
- Empowering Healthcare: Edge Computing and ML for Early Heart Attack Detection And PreventionLaid Kenioua, Brahim Lejdel, Nedioui Mohamed Abdelhamid. 1-8 [doi]
- Improving Linear Models for Univariate Long-term Time Series ForecastingMohammed Abdelhadi Sellami, Oussama Seyf Elislam Hamzi, Belal Khaldi. 1-8 [doi]
- Fusion of Deep Features for Yellow Rust Severity Estimation in Wheat LeavesMohamed Rayane Lakehal, Hassiba Nemmour, Youcef Chibani. 1-6 [doi]
- A Hybrid Feature Selection Method for Human Activity RecognitionRedouane Saifi, Achour Achroufene, Hocine Attoumi, Lydia Souici. 1-7 [doi]
- Enhancing IoT Security Through Deep learning and Evolutionary Bio-Inspired Intrusion Detection in IoT systemsImed Eddine Bouramoul, Soumia Zertal, Makhlouf Derdour, Imene Zenbout. 1-8 [doi]
- Simulated annealing for resource and power allocation in 5G and B5G D2D communicationsMohamed Kamel Benbraika, Samir Bourekkache, Okba Kraa, Yassine Himeur, Khaled Telli, Abdelmalik Ouamane. 1-6 [doi]
- Enhancing Cardiac Arrest Prediction with Neural NetworksChams Eddine Choucha, Mohamed Ridda Laouar. 1-6 [doi]
- Modeling and optimization of mechanical characteristics of additively manufactured ABS sandwich structure by using response surface methodologyMohamed Farid Benlamnouar, Yazid Laib Dit Laksir, Tahar Saadi, Nabil Bensaid, Riad Badji. 1-8 [doi]
- Ontology population using CNN model: Application to COVID-19 diagnosisNaçima Mellal, Asma Saighi. 1-7 [doi]
- Optimized Deep Features for Colon Histology Image RetrievalRahima Boukerma, Bachir Boucheham, Salah Bougueroua. 1-8 [doi]
- Trust-Based Secure Task Offloading in Digital Twin Empowered Vehicular Edge ComputingSoumaya Bounaira, Ahmed Alioua, Ismahane Souici. 1-8 [doi]
- Enabling Self-Service OLAP on NoSQL Data LakesDoulkifli Boukraa, Hamza Sellamna, Yacine Chidekh. 1-8 [doi]
- Towards exploiting custom equipped drones for enhanced slice service delivery in 6GTarek Bouzid, Noureddine Chaib, Mohamed Lahcen Bensaad. 1-6 [doi]
- Empirical Analysis of the Security Threats and Risks that Drones Face, Represent, and MitigationZina Oudina, Makhlouf Derdour, Ahmed Dib, Mohammed Mounir Bouhamed. 1-8 [doi]
- Enhancing Colon Cancer Prediction in Histopathology with Integrated Deep Learning Models: A Comparative Study on the LC25000 DatasetAsma Merabet, Asma Saighi, Mohamed Abderraouf Ferradji, Zakaria Laboudi. 1-7 [doi]
- Seasonal ARIMA and LSTM Models for Wind Speed Prediction at El-Oued Region, AlgeriaBrahim Taoussi, Mohamed Abderaouf Damani, Sidi Mohammed Boudia. 1-8 [doi]
- Enhancing Session-Based Recommendation with Lossless Gated Graph Neural NetworksBoudjemaa Boudaa, Ilias Sid Ahmed Makboul, Mohamed Ali Gafour, Sara Melissa Ait Arab. 1-7 [doi]
- Real-Time Aquaculture Monitoring System Using IoT TechnologyTariq Benahmed, Amina Bourouis, Khelifa Benahmed. 1-8 [doi]
- A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map TransformationsBrahim Ferik, Laimeche Lakhdar, Abdallah Meraoumia, Abdelkader Laouid, Khaled Chait, Muath AlShaikh. 1-8 [doi]
- The development of a neural network surrogate model for estimating energy and travel time for a collaborative robotKhoumeri Bouchra, Abedou Abdelhadi, Gaham Mehdi, Ammar Afaf, Rached Isra, Mezaache Taqwa. 1-6 [doi]
- Enhancing IoT Security: A Deep Learning Approach with Autoencoder-DNN Intrusion Detection ModelSarra Cherfi, Ammar Boulaiche, Ali Lemouari. 1-7 [doi]
- Deep Corrosion: Semantic Segmentation Unveiled Through Advanced LearningYala Nawal, Nafaa Nacereddine. 1-6 [doi]
- Formal Modelling and Implementation of Clark-Wilson Security Policy with FoCaLiZeFatima Haloua, Messaoud Abbas, Rachid Djerbi, Mohammed Mounir Bouhamed. 1-5 [doi]
- An Extensive Examination of Varied Approaches in E-Learning and MOOC Research: A Thorough OverviewSoundes Oumaima Boufaida, Abdelmadjid Benmachiche, Majda Maâtallah, Chaouki Chemam. 1-8 [doi]
- Binary Electric Eel Foraging Optimization Algorithm for Solving 0-1 Knapsack ProblemsAbdelhadi Limane, Farouq Zitouni, Aridj Ferhat, Rihab Lakbichi. 1-7 [doi]
- Transfer Learning-based Approach for 3D Reconstruction from a Single 2D ImageNour El Houda Kaiber, Tahar Mekhaznia 0001, Zakaria Lakhdara. 1-6 [doi]
- Quantitative Scalability of Nodes and Geographical Coverage in LEACH ProtocolFoudil Mir, Farid Meziane, Ahcène Bounceur, Abdelkader Laouid. 1-8 [doi]
- Real-time Reckless Driving Detection System on a low-level computing platform: Insight from a Developing NationMd. Asifuzzaman Khan, Golam Sarowar, Md. Arean Ashfaq, Kazi Sazzad Ahamed. 1-7 [doi]
- A Queuing Model for Software-Defined Networking in Cloud and Multi-Controller EnvironmentsIslem Teboub, Amar Aissani, Fatiha Merazka. 1-7 [doi]
- Osteosarcoma Pathological Classification using Statistical FeaturesCharaf Eddine Ghenai, Mohamed Gasmi, Hakim Bendjenna, Boulechfar Meriem. 1-5 [doi]
- Blockchain-Enabled Authentication and Key Exchange for Enhancing User Privacy and Data Confidentiality in Smart HomesSarra Cherbal. 1-7 [doi]
- A Survey in the Use of Deep Learning Techniques in The Open Classroom ApproachInes Boutabia, Abdelmadjid Benmachiche, Ali Abdelatif Betouil, Chaouki Chemam. 1-7 [doi]