Abstract is missing.
- A novel approach for open domain event schema discovery from twitterAssia Mezhar, Mohammed Ramdani, Amal El Mzabi. 1-7 [doi]
- Towards a better combination of the MADM algorithms for the Vertical Handover optimization in a mobile network multi-access environmentMouad Mansouri, Cherkaoui Leghris, Abdelkrim Bekkhoucha. 1-5 [doi]
- Optimal neural network sliding mode control without reaching phase using genetic algorithm for a wind turbineYoussef Berrada, El-mahjoub Boufounas, Ismail Boumhidi. 1-6 [doi]
- Basics and limitations of approaches for specification of semantic business processesFatima-Zahra Belouadha, Ouafa El Oinzioui, Mohamed Issam Kabbaj. 1-8 [doi]
- Quality of Data in mediation systemsLoubna Mimouni, Ahmed Zellou, Ali Idri. 1-5 [doi]
- CSR dynamics under peer pressure and green confusion: A multi-agent simulation approachFadwa Chaker, Abdellah El Manouar, Mohamed Wail Aaminou, Rajae Aboulaich. 1-6 [doi]
- Gas-filling stations procurement problem with time windows using a heterogeneous fleet of full tankersAnouar Annouch, Adil Bellabdaoui. 1-6 [doi]
- A genetic algorithm for solving a new image restoration model based on selective filteringJoudar Nour-eddine, Fidae Harchli, Es-Safi Abdelatif, Mohamed Ettaouil. 1-5 [doi]
- Fuzzy ant colony based routing protocol for delay tolerant networkAbabou Mohamed, M. Bellafkih, Rachid El Kouch. 1-5 [doi]
- Towards an assessment model of end user satisfaction and data quality in Business Intelligence systemsSara Bouchana, Mohammed Abdou Janati Idrissi. 1-6 [doi]
- Soft assignment vs hard assignment coding for bag of visual wordsHiba Chougrad, Hamid Zouaki, Omar Alheyane. 1-5 [doi]
- Optimizing the wind power capture by using DTC technique based on Artificial Neural Network for a DFIG variable speed wind turbineAnass Bakouri, Hassane Mahmoudi, Ahmed Abbou, Mohamed Moutchou. 1-7 [doi]
- Using an analytical formalism to diagnostic and evaluate Massive Open Online CoursesJihane Sophia Tahiri, Samir Bennani, Mohammed Khalidi Idrissi. 1-6 [doi]
- Modelling intelligent and reliable ferry routes in Wireless Sensor Networks using polling systems theoryRidouane El Mezouary, Mohammed-Amine Koulali, Abdellatif Kobbane, Mohammed El Koutbi. 1-6 [doi]
- A JADE based testbed for evaluating computational trust modelsMifrah Youssef, En-Nouaary Abdeslam, Dahchour Mohamed. 1-7 [doi]
- Schema Matching as complex adaptive systemHicham Assoudi, Hakim Lounis. 1-7 [doi]
- AMEG: Adaptive mechanism for educational games based on IMSLD and artificial intelligenceNabila Hamdaoui, Mohammed Khalidi Idrissi, Samir Bennani. 1-6 [doi]
- Overview of event detection and surveillance approaches in heterogeneous WSNsFadoua Nejjari, Laila Benhlima, Slimane Bah. 1-6 [doi]
- Authorship attribution in Arabic poetryAlfalahi Ahmed, Ramdani Mohamed, Bellafkih Mostafa, Al-Sarem Mohammed. 1-6 [doi]
- I-CARE: Intelligent Context Aware system for Recognizing Emotions from textYasmina Douiji, Hajar Mousannif. 1-5 [doi]
- A model of adaptation in Online Learning Environments (LMSs and MOOCs)Chihab Eddine Cherkaoui, Aimad Qazdar, Amal Battou, A. Mezouary, A. Bakki, Driss Mamass, Aimad Qazdar, Brahim Er-Raha. 1-6 [doi]
- Scoring reputation in online social networksMouna El Marrakchi, Hicham Bensaid, Mostafa Bellafkih. 1-6 [doi]
- A distributed graph based approach for rough classifications considering dominance relations between overlapping classesKhalil Laghmari, Mohammed Ramdani, Christophe Marsala. 1-6 [doi]
- Are mobile blood donation applications green?Sofia Ouhbi, José Luis Fernández Alemán, Ali Idri, José Rivera Pozo. 1-6 [doi]
- Configurable process models: A semantic validationLoubna El Faquih, Hanae Sbaï, Mounia Fredj. 1-6 [doi]
- Mapping in GAV contextMoulay Hafid El Yazidi, Ahmed Zellou, Ali Idri. 1-5 [doi]
- Role of supply chain management in improving the organization within Moroccan governmentHind Lahmidani, Omar El Beqqali. 1-6 [doi]
- Automatic generation of UML sequence diagrams from user stories in Scrum processMeryem Elallaoui, Khalid Nafil, Raja Touahni. 1-6 [doi]
- Maximizing QoS in heterogeneous Wireless Sensor Networks: Memory and time considerationsHajar El Hammouti, Loubna Echabbi, Yann Ben Maissa. 1-6 [doi]
- A new wrapper feature selection model using Skewed Variable Neighborhood Search with CE-SVM algorithmNaoual El Aboudi, Laila Benhlima. 1-6 [doi]
- PrefaceA. Idri, M. A. Janati Idrissi. 1 [doi]
- Modeling and simulation of Web Services composition based on MARDS modelN. Adadi, Mohammed Berrada, Driss Chenouni, Bouchaib Bounabat. 1-6 [doi]
- Knowledge structuring for learning by levelWalid Mestadi, Khalid Nafil, Raja Touahni. 1-6 [doi]
- A strategic release planning model from TPM point of viewSamia Naciri, Mohammed Abdou Janati Idrissi, Noureddine Kerzazi. 1-9 [doi]
- A fingerprint recognition framework using Artificial Neural NetworkRidouane Oulhiq, Saad Ibntahir, Marouane Sebgui, Zouhair Guennoun. 1-6 [doi]
- Towards an Intelligent Tutoring System developing Metacognition: Cyclical modelMohamed Yassine Si Allal Zarouk, Mohamed Khaldi. 1-6 [doi]
- A hybrid Deep belief network approach for Financial distress predictionZineb Lanbouri, Saaid Achchab. 1-6 [doi]
- A review of SLA specification languages in the cloud computingAdil Maarouf, Abderrahim Marzouk, Abdelkrim Haqiq. 1-6 [doi]
- Achieving energy efficiency for Device to Device communications using power control: A low complexity algorithmMohamed Amine Charar, Zouhair Guennoun, Ghassane Aniba. 1-6 [doi]
- Collaborative Q-learning path planning for autonomous robots based on holonic multi-agent systemChaymaa Lamini, Youssef Fathi, Said Benhlima. 1-6 [doi]
- A new methodology for literature review analysis using association rules miningSamia Laghrabli, Loubna Benabbou, Abdelaziz Berrado. 1-6 [doi]
- Conceptual alignment between SPEM-based processes and CMMINoureddine Kerzazi. 1-9 [doi]
- Optimized algorithm of dermis detection for glucose blood monitoring based on optical coherence tomographySaid Amrane, Nawfel Azami, Youssef Elboulqe. 1-5 [doi]
- Ontology based composition of e-Government services using AI PlanningAmina Adadi, Mohammed Berrada, Driss Chenouni, Bouchaib Bounabat. 1-8 [doi]
- Analyzing the non-functional requirements to improve accuracy of software effort estimation through case based reasoningFadoua Fellir, Khalid Nafil, Rajaa Touahni. 1-6 [doi]
- Implicit links based kernel to enrich Support Vector Machine for web page classificationAbdelbadie Belmouhcine, Mohammed Benkhalifa. 1-4 [doi]
- Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog postsSalim Alami, Omar Elbeqqali. 1-5 [doi]
- Towards an interpretable Rules Ensemble algorithm for classification in a categorical data spaceMohamed Azmi, Abdelaziz Berrado. 1-6 [doi]
- Multi-criteria distribution network selectionA. Elmokrini, Loubna Benabbou, Abdelaziz Berrado. 1-6 [doi]
- Neural network Incremental conductance MPPT algorithm for photovoltaic water pumping systemBouchra Sefriti, Ismail Boumhidi. 1-6 [doi]
- Strategic Alignment and Information System project portfolio optimization modelSalah Jadda, Mohammed Abdou Janati Idrissi. 1-8 [doi]
- A dynamic learning content pattern for adaptive learning environmentA. Darouich, Fadoul Khoukhi, Khadija Douzi. 1-6 [doi]
- Toward an intelligent system for project management based on the multi agents systemsHouda Hammouch, Hicham Medromi, Adil Sayouti. 1-6 [doi]
- Selection of Key Performance Indicators for Supply Chain monitoring using MCDAZoubida Chorfi, Abdelaziz Berrado, Loubna Benabbou. 1-6 [doi]
- Mapping discovery methodology in a pure P2P mediation system for XML schemasEl Yahyaoui El Idrissi Selma, Ahmed Zellou, Ali Idri. 1-5 [doi]
- Evaluating LSA sensibility to disclosure in learners' interactionsMouna Selmi, Hicham Hage, Esma Aïmeur. 1-8 [doi]
- Adjusting story points calculation in scrum effort & time estimationHind Zahraoui, Mohammed Abdou Janati Idrissi. 1-8 [doi]
- A theoretical e-government portals' benchmarking frameworkAbdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri. 1-6 [doi]
- A benchmark for spatial and temporal correlation based data prediction in wireless sensor networksYouness Riouali, Laila Benhlima, Slimane Bah. 1-7 [doi]
- Lightning Inspired Search Algorithm introduction & application to the traveling salesman problemMohamed Amine El Majdouli, Abdelhakim Ameur El Imrani. 1-6 [doi]
- Towards a unified semantic model for online social networks analysis and interoperabilityAsmae El Kassiri, Fatima-Zahra Belouadha. 1-6 [doi]
- An overview of privacy preserving techniques in smart home Wireless Sensor NetworksAhlam Alami, Laila Benhlima, Slimane Bah. 1-4 [doi]
- User profile model: A user dimension based classificationSara Ouaftouh, Ahmed Zellou, Ali Idri. 1-5 [doi]
- On the fetal heart rate diagnostic technologiesMariame Nassit, Hassan Berbia. 1-6 [doi]
- Survey on supply chain ICT requirmentsSara El Ouadaa, Slimane Bah, Abdelaziz Berrado. 1-7 [doi]
- Frameworks for risk management in GSD projects: A surveySaad Yasser Chadli, Ali Idri, José Luis Fernández Alemán, Joaquín Nicolás Ros. 1-6 [doi]
- Trust integration in collaborative access control model for Critical InfrastructuresNawal Ait Aali, Amine Baïna, Loubna Echabbi. 1-6 [doi]
- Evaluating complexity of enterprise architecture components landscapesJihane Lakhrouit, Karim Baïna. 1-5 [doi]
- A new trust model to secure routing protocols against DoS attacks in MANETsAdel Echchaachoui, Abdellatif Kobbane, Mohammed Elkoutbi. 1-6 [doi]
- Formal verification of MPR selection algorithm in the OLSR protocolOmar Barki, Zouhair Guennoun, Adnane Addaim. 1-5 [doi]