


default search action
13th AICCSA 2016: Agadir, Morocco
- 13th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2016, Agadir, Morocco, November 29 - December 2, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4320-0
- Salwa Souissi, Mounir Ben Ayed:
GENUS: An ETL tool treating the Big Data Variety. 1-8 - Zaki Brahmi, Sahar Mili, Rihab Derouiche:
Data placement strategy for massive data applications based on FCA approach. 1-8 - Badr Ait Hammou, Ayoub Ait Lahcen
, Driss Aboutajdine:
A new recommendation algorithm for reducing dimensionality and improving accuracy. 1-6 - Maroua Bahri, Zied Elouedi:
Clustering data stream under a belief function framework. 1-8 - Azzeddine Dahbi
, Siham Jabri, Youssef Balouki
, Taoufiq Gadi
:
A new method for ranking association rules with multiple criteria based on dominance relation. 1-7 - Sayda Elmi
, Allel Hadjali, Mohamed Anis Bach Tobji
, Boutheina Ben Yaghlane:
Imperfect top-k skyline query with confidence level. 1-8 - Mounira Chkiwa, Anis Jedidi
, Faïez Gargouri
:
Abstracts generation as information retrieval results. 1-7 - Hassanin M. Al-Barhamtoshy, Maher Khemakhem
, Kamal Mansur Jambi, F. Essa
, Anas M. Fattouh, A. Al-Ghamdi:
Universal metadata repository for document analysis and recognition. 1-6 - Ashraf Elnagar
:
Investigation on sentiment analysis for Arabic reviews. 1-7 - Hisham Al-Mubaid
, Mohamed Shenify, Sultan Aljahdali:
Assessing gene-disease relationship with multifunctional genes using GO. 1-6 - Mohamed Azmi
, Abdelaziz Berrado
:
Class-association rules pruning using regularization. 1-7 - Abir Gorrab, Ferihane Kboubi
, Henda Ben Ghézala
, Bénédicte Le Grand:
Towards a dynamic and polarity-aware social user profile modeling. 1-7 - Imen Moalla, Ahlem Nabli, Lotfi Bouzguenda, Mohamed Hammami
:
Data warehouse design from social media for opinion analysis: The case of Facebook and Twitter. 1-8 - Júlio Henrique Rocha, Cláudio E. C. Campelo, Cláudio de Souza Baptista, Gabriel Joseph Ramos Rafael:
The geo-social relevance ranking: A method based on geographic information and social media data. 1-8 - Ayman El-Kilany, Neamat El Tazi
, Ehab Ezzat:
Semi-supervised outlier detection via bipartite graph clustering. 1-6 - Zaki Brahmi, Faten Ben Hassen:
Communication-aware VM consolidation based on formal concept analysis. 1-8 - Amr Elmasry, Ayman Khalafallah, Moustafa Meshry:
A scalable maximum-clique algorithm using Apache Spark. 1-8 - Zohra Amekraz, Moulay Youssef:
Prediction of Amazon spot price based on chaos theory using ANFIS model. 1-6 - Takwa Mohsni, Zaki Brahmi, Mohamed Mohsen Gammoudi:
Data-intensive service composition in Cloud Computing: State-of-the-art. 1-7 - Fatima AlQayedi, Khaled Salah, M. Jamal Zemerly
:
Adaptive Cloud Resource Allocation scheme to minimize SLO response time violation. 1-5 - Ryma Mahfoudhi, Sami Achour, Zaher Mahjoub:
Parallel triangular matrix system solving on CPU-GPU system. 1-6 - Abdelhamid Benaini, Achraf Berrajaa
, Jaouad Boukachour
, Mustapha Oudani
:
Parallel genetic algorithm for the uncapacited single allocation hub location problem on GPU. 1-8 - Clícia Pinto, Marcos Barreto
, Murilo Boratto
:
Auto-tuning TRSM with an asynchronous task assignment model on multicore, multi-GPU and coprocessor systems. 1-8 - Mohamed Abouzahir
, Abdelhafid Elouardi, Samir Bouaziz, Omar Hammami, Ismail Ali:
High-level synthesis for FPGA design based-SLAM application. 1-8 - Abdelkarim Erradi, Hisham A. Kholidy:
An efficient hybrid prediction approach for predicting cloud consumer resource needs. 1-8 - Mohcine Bouksim
, Fatima Rafii Zakani
, Khadija Arhid
, Taoufiq Gadi
, Mohamed Aboulfatah
:
Evaluation of 3D mesh segmentation using a weighted version of the Ochiai index. 1-7 - Aladine Chetouani:
Toward a universal learning-based image quality metric with reference for stereoscopic images. 1-5 - Jinsen Zhang, Changwen Zheng, Yu Liu:
Advanced physical optical model for simulating rainbows. 1-8 - Elena Ranguelova:
A Salient Region Detector for structured images. 1-8 - Houssem Turki
, Mohamed Ben Halima
, Adel M. Alimi
:
Text detection in natural scene images using two masks filtering. 1-6 - Fatma Ben Said, Adel M. Alimi
:
OFSF-BC: Online feature selection framework for binary classification. 1-8 - Kaoru Uchida:
Efficient image search system with multi-scale database using profile-based pre-selection and coarse matching. 1-8 - Hind Oulhaj, Mohammed Rziza
, Aouatif Amine
, Rachid Jennane
, Mohammed El Hassouni:
Texture classification using relative phase and Gaussian mixture models in the complex wavelet domain. 1-7 - Ayoub Karine, Abdelmalek Toumi, Ali Khenchaf
, Mohammed El Hassouni:
A non-Gaussian statistical modeling of SIFT and DT-CWT for radar target recognition. 1-5 - Imad Mohamed Ouloul
, Karim Afdel, Abdallah Amghar:
Age estimation using local matched filter binary pattern. 1-5 - Safaa Azzakhnini, Lahoucine Ballihi
, Driss Aboutajdine:
Machine perception in gender recognition using RGB-D sensors. 1-5 - Salma Ksibi
, Mahmoud Mejdoub
, Chokri Ben Amar:
Person re-identification based on combined Gaussian weighted Fisher vectors. 1-8 - Imen Lassoued, Ezzeddine Zagrouba
, Youssef Chahir:
A new approach of action recognition based on Motion Stable Shape (MSS) features. 1-8 - Ayoub Ellahyani, Mohamed El Ansari
:
Complementary features for traffic sign detection and recognition. 1-6 - Ameni Sassi, Chokri Ben Amar, Serge Miguet:
Skyline-based approach for natural scene identification. 1-8 - Ali Idri, Laila Cheikhi:
A survey of secondary studies in software process improvement. 1-8 - Hela Marouane, Achraf Makni, Rafik Bouaziz
, Claude Duvallet, Bruno Sadeg:
Defining a UML profile for the consistency of design patterns. 1-8 - Ilham Kadi, Ali Idri, Sofia Ouhbi
:
Quality evaluation of cardiac decision support systems using ISO 25010 standard. 1-8 - Samia Hafez, Mustafa ElNainay
, Mohammed Abougabal, Saleh ElShehaby:
Potential-fault cache-based regression test selection. 1-8 - Akil Elkamel
, Mariem Gzara, Hanêne Ben-Abdallah
:
An UML class recommender system for software design. 1-8 - Ismail Assayad, Lamia Eljadiri
, Abdelouahed Zakari, Tarik Nahhal:
The "Behavior, interaction and priority" framework applied to SystemC-based embedded systems. 1-6 - Ahmed Amine Aliane, Hassina Aliane
, M. Ziane, Nacéra Bensaou:
A genetic algorithm feature selection based approach for Arabic Sentiment Classification. 1-6 - Ngoc-Tho Huynh
, Maria-Teresa Segarra, Antoine Beugnard:
Ensuring consistent dynamic adaptation: An approach from design to runtime. 1-8 - Fatma Dammak
, Leila Baccour, Adel M. Alimi
:
Interval valued intuitionistic fuzzy weight techniques for TOPSIS method. 1-7 - Saad Yasser Chadli
, Ali Idri, José Luis Fernández-Alemán, Joaquín Nicolás Ros, Ambrosio Toval:
Identifying risks of software project management in Global Software Development: An integrative framework. 1-7 - Ayman A. Zayyan, Mohamed Elmahdy, Husniza Binti Husni
, Shahrul Azmi Yousf
:
Crosslingual automatic diacritization for Egyptian Colloquial Dialect. 1-6 - Nadia B. M. Karmani, Hsan Soussou, Adel M. Alimi
:
Intelligent Tunisian Arabic morphological analyzer. 1-8 - Driss Namly
, Yasser Regragui, Karim Bouzoubaa:
Interoperable Arabic language resources building and exploitation in SAFAR platform. 1-7 - Wafia Adouane, Nasredine Semmar, Richard Johansson:
Romanized Arabic and Berber detection using prediction by partial matching and dictionary methods. 1-7 - Rahhal Errattahi
, Asmaa El Hannani
, Hassan Ouahmane, Thomas Hain
:
Automatic speech recognition errors detection using supervised learning techniques. 1-6 - Fatih Saglam, Hayri Sever, Burkay Genç
:
Developing Turkish sentiment lexicon for sentiment analysis using online news media. 1-5 - Aboubakr Aqle
, Fahad Islam, Eman Rezk, Ali Jaoua
:
Mobile app conceptual browser: Online marketplaces information extraction. 1-8 - Amira Hamdi, Mohamed Slimane, Nicolas Monmarché, Adel M. Alimi
:
FlyAntClass: Intelligent move for ant based clustering algorithm. 1-8 - Sabrine Malek, Wady Naanaa:
A new polynomial cluster deletion subproblem. 1-8 - Cabral Lima, Renan Lobo, Adriano Joaquim de Oliveira Cruz, Bianca Pereira
, Valk Castellani:
An new model for robot navigation based on AprioriAll algorithm. 1-7 - Emna Hlel, Salma Jamoussi
, Abdelmajid Ben Hamadou:
Bayesian network for discovering the interests of authors. 1-6 - Matthieu Mastio, Mahdi Zargayouna
, Gérard Scémama, Omer F. Rana
:
Patterns to distribute mobility simulations. 1-6 - Sara Rhazlane, Hassan Badir
, Nouria Harbi, Nadia Kabachi:
Intelligent multi agent system based solution for data protection in the cloud. 1-7 - Houssem Mansouri, Al-Sakib Khan Pathan
:
An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks. 1-6 - Abdellatif Serhani, Najib Naja, Abdellah Jamali:
QLAR: A Q-learning based adaptive routing for MANETs. 1-7 - Mohamed Elgharbawy, Andreas Schwarzhaupt, Gerrit Scheike, Michael Frey
, Frank Gauterin:
A generic architecture of ADAS sensor fault injection for virtual tests. 1-7 - Sara Khairi, Mostafa Bellafkih
, Brahim Raouyane
:
Towards a dynamic QoS management in IMS transport layer via SDN. 1-8 - Wiem Housseyni, Olfa Mosbahi, Mohamed Khalgui
, Maryline Chetto:
Real-time scheduling of sporadic tasks in energy harvesting distributed reconfigurable embedded systems. 1-8 - Ahmed Aboud
, Haifa Touati
:
Geographic interest forwarding in NDN-based wireless sensor networks. 1-8 - Slaheddine Chelbi, Claude Duvallet, Majed Abdouli
, Rafik Bouaziz
:
Event-driven wireless sensor networks based on consensus. 1-6 - Samira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane:
A novel simultaneous failure recovery technique for large scale wireless sensor networks. 1-6 - Hend Fourati, Hanen Idoudi
, Leïla Azouz Saïdane:
A novel IEEE 802.15.6 CSMA/CA service differentiation. 1-7 - Craig Thomson
, Isam Wadhaj, Imed Romdhani, Ahmed Yassin Al-Dubai
:
Performance evaluation of RPL metrics in environments with strained transmission ranges. 1-8 - Fatma Somaa, Inès El Korbi, Leïla Azouz Saïdane:
Mobility support over RPL using sensor nodes speed classification. 1-6 - Salma Dammak, Faiza Ghozzi Jedidi
, Faïez Gargouri
:
A GQVM approach to secure WeBhouse ETL processes development. 1-8 - Mariem Belhor
, Farah Jemili
:
Intrusion detection based on genetic fuzzy classification system. 1-8 - Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leïla Saïdane:
DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things. 1-8 - Zhiwen Pan, Jesus Pacheco
, Salim Hariri:
Anomaly behavior analysis for building automation systems. 1-8 - Loukmen Regainia, Sébastien Salva, Cedric Ecuhcurs:
A classification methodology for security patterns to help fix software weaknesses. 1-8 - Asma Hamed, Hella Kaffel Ben Ayed:
Privacy risk assessment and users' awareness for mobile apps permissions. 1-8 - Sonia Kotel
, Fatma Sbiaa
, Zeghid Medien
, Mohsen Machhout
, Adel Baganne, Rached Tourki:
Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices. 1-7 - Jukka Ruohonen
, Johannes Holvitie, Sami Hyrynsalmi
, Ville Leppänen
:
Exploring the clustering of software vulnerability disclosure notifications across software vendors. 1-8 - Pratik Satam
, Douglas Kelly, Salim Hariri:
Anomaly behavior analysis of website vulnerability and security. 1-7 - Myriam Jaouadi, Lotfi Ben Romdhane
:
DIN: An efficient algorithm for detecting influential nodes in social graphs using network structure and attributes. 1-8 - El Mehdi El Graoui, Nabila Zrira, Soufiana Mekouar
, Imade Benelallam, El-Houssine Bouyakhf:
Outlier and anomalous behavior detection in social networks using constraint programming. 1-8 - Fatima Zohra Ennaji
, Abdelaziz El Fazziki
, Hasna El Alaouiel El Abdallaoui, Abderrahmane Sadiq, Mohammed Sadgal
, Djamal Benslimane:
Multi-agent framework for social CRM: Extracting and analyzing opinions. 1-8 - Wala Rebhi, Nesrine Ben Yahia
, Narjès Bellamine Ben Saoud
:
Hybrid community detection approach in multilayer social network: Scientific collaboration recommendation case study. 1-8 - Bassim Chabibi, Adil Anwar, Mahmoud Nassar
:
Metamodeling approach for creating an abstract representation of simulation tools concepts. 1-7 - Rim Zarrad, Narjes Doggaz, Ezzeddine Zagrouba
:
Using heading hierarchy for non-taxonomic relation extraction. 1-7 - Afef Walha, Faiza Ghozzi
, Faïez Gargouri
:
A Lexicon approach to multidimensional analysis of tweets opinion. 1-8 - Nabil El Fezazi
, Sadek Belamfedel Alaoui, Fatima El Haoussi, El Houssaine Tissir
, Teresa Alvarez
:
A dynamic anti-windup AQM for congestion control in internet. 1-6 - Cheyma Ben Njima, Youssef Gamha, Lotfi Ben Romdhane
:
A probabilistic model for web service composition in uncertain mobile contexts. 1-7 - Abu Saleh Md. Mahfujur Rahman
, Abdulmotaleb El-Saddik
:
Promoting active participation of the learners in an authoring based learning movie system. 1-6 - Ali Aajli, Karim Afdel:
Generation of an adaptive e-learning domain model based on a fuzzy logic approach. 1-8 - Yunho Huh, Justan Klaus, Magda El Zarki:
iXercise: An immersive platform for exercise intervention for special needs populations. 1-7 - Valeria Farinazzo Martins, Thiago Lima, Paulo N. M. Sampaio, Marcelo de Paiva Guimarães:
Mobile application to support dyslexia diagnostic and reading practice. 1-6 - Marcelo de Paiva Guimarães, Vagner Scamati
, Mário Popolin Neto
, Valeria Farinazzo Martins, Diego Roberto Colombo Dias
, José Remo Ferreira Brega:
A process-scheduling simulator based on virtual reality technology. 1-6 - Hamza Abed, Philippe Pernelle, Chokri Ben Amar, Thibault Carron:
Serious games for vocational training: A compared approach. 1-8 - Konrad Walser, Roman Hosang, Marco Meyer:
Development of a thematic and structural elements grid for e-government strategies: Case study of Swiss cantons. 1-7 - Abdulellah Alaboudi
, Anthony S. Atkins, Bernadette Sharp, Mohammed Alzahrani, Ahmed Balkhair, Tamara Sunbul:
Perceptions and attitudes of clinical staff towards telemedicine acceptance in Saudi Arabia. 1-8 - Hui Li, Weihao Xie, Xingang Wang, Shousheng Liu, Yingying Gai, Lei Yang:
GPU implementation of multi-scale Retinex image enhancement algorithm. 1-5 - Fatima Zahra Salmam
, Abdellah Madani, Mohamed Kissi
:
New distances combination for facial expression recognition from image sequences. 1-6 - Houssem Lahiani
, Monji Kherallah
, Mahmoud Neji:
Hand pose estimation system based on Viola-Jones algorithm for Android devices. 1-6 - Redouan Lahmyed, Mohamed El Ansari
:
Multisensors-based pedestrian detection system. 1-4 - Mohamed Elgharbawy, Bénédicte Bernier, Michael Frey
, Frank Gauterin:
An agile verification framework for traffic sign classification algorithms in heavy vehicles. 1-8 - Ibrahim Guelzim, Amina Amkoui, Lahcen Koutti
:
Matching of omnidirectional images based on the geodesic distance. 1-5 - Soumaya Argoubi, Karima Maâlaoui, Mohamed Houcine Elhdhili, Leïla Azouz Saïdane:
Priority-MAC: A priority based medium access control solution with QoS for WSN. 1-6 - William Agosto-Padilla, Alae Loukili, Anthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne:
802.11n wireless LAN performance for mobile devices. 1-6 - Mohamed Saleh
, M. A. Abdou, Mohamed A. Aboul Hassan
:
Assessing the use of IP network management protocols in smart grids. 1-6 - Kaoutar Ourouss
, Najib Naja, Abdellah Jamali:
Efficiency analysis of MANETs routing based on a new double metric with mobility and density models. 1-8 - Salma Bradai, Sofien Khemakhem
, Mohamed Jmaiel:
Energy/coverage quality trade-off based tasks allocation for opportunistic real time mobile crowdsensing. 1-8 - Hiba Ramadan
, Hamid Tairi
:
Moving object segmentation in video using spatiotemporal saliency and laplacian coordinates. 1-7 - Yosr Ben Youssef, Mériem Afif, Sami Tabbane:
Novel AHP-based QoE factors' selection approach. 1-6 - Eya Mezghani, Maha Charfeddine
, Chokri Ben Amar, Henri Nicolas:
Multifeature speech/music discrimination based on mid-term level statistics and supervised classifiers. 1-8 - Rawia Frikha, Ridha Ejbali
, Mourad Zaied:
Handling occlusion in Augmented Reality surgical training based instrument tracking. 1-5 - Saleh Alshomrani, Jamel Feki, Tarek Lefi, Omar Khrouf, Kaïs Khrouf
:
CobWeb multidimensional model: From OLAP to tag cloud. 1-8 - Daniel Farias Batista Leite, Cláudio de Souza Baptista, Maxwell Guimarães de Oliveira, José Amilton Moura Acioli Filho, Tiago Eduardo da Silva:
ExpOLAP: Towards exploratory OLAP. 1-8 - Soumaya Cherichi, Rim Faiz:
Using big data values to enhance social event detection pattern. 1-8 - Abir Amami, Zied Elouedi, Allel Hadjali:
A clustering based approach for query relaxation in evidential databases. 1-8 - Anwar Kalghoum, Sonia Mettali Gammar
, Leïla Azouz Saïdane:
Performance evaluation of interest traffic generation and forwarding strategy impact in ICN. 1-5 - Hanen Ahmadi
, Federico Viani, Alessandro Polo, Ridha Bouallegue
:
Improved target tracking using regression tree in wireless sensor networks. 1-6 - Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian
, Christophe Guyeux
, Abdallah Makhoul
:
Investigating low level protocols for Wireless Body Sensor Networks. 1-6 - Majid Al-Ruithe, Siyakha Mthunzi, Elhadj Benkhelifa
:
Data governance for security in IoT & cloud converged environments. 1-8 - Rania Boujelbene, Yousra Ben Jemaa
, Mourad Zribi:
Toward an optimal B-spline wavelet transform for image compression. 1-8 - Abdelilah El Amraoui, Lhoussaine Masmoudi
, Hamid Ez-Zahraouy
, Youssef El Amraoui:
Quantum edge detection based on SHANNON entropy for medical images. 1-6 - Abdelhak Saouli, Mohamed Chaouki Babahenini:
High performance volumetric modelling from silhouette: GPU-image-based visual hull. 1-7 - Bruno Miguel Nogueira de Souza, Jacques Facon
:
A fire color mapping-based segmentation: Fire pixel segmentation approach. 1-8 - Lacheheb Hadjer
, Saliha Aouat
:
A density clustering approach for CBIR system. 1-8 - El Moatez Billah Nagoudi, Ahmed Khorsi, Hadda Cherroun:
Efficient inverted index with n-gram sampling for string matching in Arabic documents. 1-7 - Olfa Dridi Mekni, Mohamed Ben Ahmed:
Construction of navigation map to retrieve semantically information from medical resources. 1-7 - Mohamed Amine El Majdouli
, Saad Bougrine, Ismail Rbouh, Abdelhakim Ameur El Imrani:
A fireworks algorithm for single objective big optimization of signals. 1-7 - François-Xavier Talgorn, Farès Belhadj, Vincent Boyer:
Toward a generic approach to stylization. 1-8 - Abdessamad El Ansari, Anass Mansouri, Ali Ahaitouf
:
An efficient VLSI architecture design for integer DCT in HEVC standard. 1-5 - Abdessamad El Ansari, Anass Mansouri, Ali Ahaitouf
:
Comparative analysis of the HEVC decoder on two embedded processors using NEON technology. 1-4 - Yosr Ghozzi, Nesrine Baklouti
, Adel M. Alimi
:
A novel method for resemblance images using near fuzzy set. 1-8 - Mohamed Mahmoud El Benany
, Omar El Beqqali
:
Cross-organizational orchestrator for e-government interoperability. 1-6 - Wiam Zamrani, Esmail Ahouzi, Angel Lizana
, Juan Campus, María Josefa Yzuel:
Towards the growth of optical security systems for image encryption by polarized light. 1-6 - Molka Dhieb, Mondher Frikha:
A multilevel thresholding algorithm for image segmentation based on particle swarm optimization. 1-7 - Hanan Anzid, Gaëtan Le Goïc
, Aissam Bekkari, Alamin Mansouri, Driss Mammass:
Improving point matching on multimodal images using distance and orientation automatic filtering. 1-8 - Sanae Achsas
, El Habib Nfaoui
:
Intelligent layer for relational aggregated search based on deep neural networks. 1-2 - Mikhail I. Gofman, Sinjini Mitra, Nicholas Smith:
Hidden Markov Models for feature-level fusion of biometrics on mobile devices. 1-2 - Mohamedou Cheikh Tourad
, Abdelmounaïm Abdali, Ahmad Outfarouin:
On a new index of Publish/Subscribe system in the context of Big Data. 1-2 - Ahmad Outfarouin, Abdelmounaïm Abdali, Mohamedou Cheikh Tourad
:
Towards a new decisional needs formalization. 1-2 - Riad Bourbia
, Lynda Dib, Ala-Eddine Benrazek
:
An agent-based architecture for a distributed MIS. 1-2 - Gaëlle Laetitia Mouafo Mapikou, Atsa Etoundi Roger:
A process mining oriented approach to improve process models analysis in developing countries. 1-8 - Maha Azabou, Kaïs Khrouf
, Jamel Feki, Chantal Soulé-Dupuy, Nathalie Vallès:
Analyzing textual documents with new OLAP operators. 1-8 - Hela Malouche, Youssef Ben Halima
, Henda Ben Ghézala
:
Enterprise information system migration to the cloud: Assessment phase. 1-6 - Sara Handouf, Sara Arabi, Essaid Sabir
, Mohamed Sadik
:
Telecommunication market share game: Inducing boundedly rational consumers via price misperception. 1-7 - Alae El Alami
, Mohamed Bahaj
:
Framework for a complete migration of relational databases to other types of databases(object oriented OO, object-relational OR, XML). 1-7 - Abdelaali Hassaïne, Zeineb Safi, Ali Jaoua:
Authenticity detection as a binary text categorization problem: Application to Hadith authentication. 1-7 - Marwa Massaâbi, Jalel Akaichi
:
A fuzzy similarity measure for search results evaluation. 1-6 - Fernando de Lucca Siqueira, Patricia Della Méa Plentz, Edson Roberto de Pieri
:
Semantic trajectory applied to the navigation of autonomous mobile robots. 1-8 - Hanen Abbes
, Faïez Gargouri
:
Structure based modular ontologies composition. 1-8 - Mohamed Frikha
, Mohamed Mhiri, Mounir Zarai, Faïez Gargouri
:
Using TMT ontology in trust based medical tourism recommender system. 1-8 - Cristóvão Lima Frinhani, Sérgio Antônio Andrade de Freitas
, Mauricio Vidotti Fernandes, Edna Dias Canedo
:
An automatic essay correction for an active learning environment. 1-6 - Fedia Hlioui, Nadia Aloui, Faïez Gargouri
:
A survey on learner models in adaptive E-learning systems. 1-7 - Wiem Maalej, Philippe Pernelle, Chokri Ben Amar, Thibault Carron, Elodie Kredens:
Identification and modeling of the skills within MOOCs. 1-8 - Sahar Msaed, Philippe Pernelle, Chokri Ben Amar, Thibault Carron:
Service oriented approach for modeling and generic integration of complex resources in MOOCs. 1-8 - Mustapha Amrouch
, Mouhcine Rabi, Driss Mammass:
An improved Arabic handwritten recognition system using embedded training based on HMMs. 1-5 - Nada Aouadi, Philippe Pernelle, Chokri Ben Amar, Thibault Carron, Stephane Talbot:
Models and mechanisms for implementing playful scenarios. 1-8 - Sahar Abdelhedi, Mouna Baklouti, Riad Bourguiba, Jaouhar Mouine
:
Design and implementation of a fall detection system on a Zynq board. 1-7 - Faiza Loukil
, Molka Rekik
, Khouloud Boukadi
:
AntiPattren-based cloud ontology evaluation. 1-8 - Taycir Bouasker, Mahjoub Langar, Riadh Robbana:
Novel time related quality of service criteria. 1-8 - Nirmal Kumbhare, Cihan Tunc
, Salim Hariri, Ivan B. Djordjevic, Ali Akoglu
, Howard Jay Siegel:
Just In Time Architecture (JITA) for dynamically composable data centers. 1-8 - Fabrício Quintanilha Baptista, Mário Popolin Neto
, Diego Roberto Colombo Dias
, Marcelo de Paiva Guimarães, José Remo Ferreira Brega:
3D content generation to moodle platform to support anatomy teaching and learning. 1-6 - Lahcen Koutti
, Ilyas El Jaafari, Mohamed El Ansari
:
Temporal consistent stereo matching approach for road applications. 1-6 - Soumoud Fkaier
, Mohamed Romdhani, Mohamed Khalgui
, Georg Frey
:
Enabling reconfiguration of adaptive control systems using real-time context-aware framework. 1-8 - Lamia Ben Amor, Imene Lahyani, Mohamed Jmaiel:
Towards ODRAH: An ontology-based data reliability assessment in mobile health. 1-8 - Mariem Haoues, Asma Sellami, Hanêne Ben-Abdallah
:
Predicting the functional change status in UML activity diagram from the use case diagram. 1-8 - Safa Guellouz, Adel Benzina
, Mohamed Khalgui
, Georg Frey
:
Reconfigurable function blocks: Extension to the standard IEC 61499. 1-8 - Zineb Aarab, Rajaa Saidi
, Moulay Driss Rahmani
:
Event-driven modeling for context-aware information systems. 1-8 - Hanane Bais, Mustapha Machkour
, Lahcen Koutti
:
An independent-domain natural language interface for relational database: Case Arabic language. 1-7 - Seifeddine Mechti
, Ayoub Abbassi, Lamia Hadrich Belguith
, Rim Faiz:
An empirical method using features combination for Arabic native language identification. 1-5 - Faiza Walha, Abdelghani Bekrar, Sondès Chaabane, Taïcir Loukil:
A road rail PI hub allocation problem: Heuristic in static and dynamic case. 1-8 - Hanen Nasri, Wael Ouarda
, Adel M. Alimi
:
ReLiDSS: Novel lie detection system from speech signal. 1-8 - Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman, Mina De Montfort:
Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards. 1-8 - Khalil Omar, Jorge Marx Gómez:
A selection model of ERP system in mobile ERP design science research: Case study: Mobile ERP usability. 1-8 - Firas Ben Kharrat, Aymen Elkhelifi, Rim Faiz:
Recommendation system based contextual analysis of Facebook comment. 1-6 - Hasna El Alaoui El Abdallaoui
, Abdelaziz El Fazziki
, Abderrahmane Sadiq, Fatima Zohra Ennaji
, Mohammed Sadgal
:
How can crowdsourcing help in crisis situations? Missing kids case study. 1-7 - Emna Ben Ayed, Christophe Kolski, Houcine Ezzedine
:
Context-based evaluation of mobile knowledge management systems. 1-8 - Rahma Djiroun, Kamel Boukhalfa
, Zaia Alimazighi, Faten Atigui, Sandro Bimonte:
A data cube design and construction methodology based on OLAP queries. 1-8 - Mahmoud Al-Ayyoub, Qussai Yaseen
, Mohammed A. Shehab
, Yaser Jararweh, Firas AlBalas
, Elhadj Benkhelifa
:
Exploiting GPUs to accelerate clustering algorithms. 1-6 - Faten Khalfallah, Chafik Aloulou, Lamia Hadrich Belguith
:
HAD, a platform to create a historical dictionary. 1-6 - Olfa Layouni, Jalel Akaichi
:
A conceptual UML profile for modeling fuzzy trajectory data: An ambulance use case. 1-6 - Markus Zeindl, Markus Seitz, Christian Facchi
:
Correlation of change size to fault-proneness: A real life case study. 1-6 - Ashraf Elnagar
, Omar Einea
:
BRAD 1.0: Book reviews in Arabic dataset. 1-8 - Duaa Ekhtoom
, Mahmoud Al-Ayyoub, Mohammed I. Al-Saleh
, Mohammad A. Alsmirat
, Ismail Hmeidi:
A compression-based technique to classify metamorphic malware. 1-6 - Abderrahim Ait Wakrime
, Saïd Jabbour:
On repairing queries in cloud computing. 1-6 - Elhadj Benkhelifa
, Dayan Abishek Fernando, Abdulaziz Alangari:
Customised performance benchmarking for novel multi-tenancy architecture. 1-6 - Rihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
A survey on privacy: Terminology, mechanisms and attacks. 1-7 - Marco Conoscenti, Antonio Vetrò
, Juan Carlos De Martin:
Blockchain for the Internet of Things: A systematic literature review. 1-6 - Sarra Naoui, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane:
Security analysis of existing IoT key management protocols. 1-7 - Bacem Mbarek
, Aref Meddeb
, Wafa Ben Jaballah, Mohamed Mosbah
:
A broadcast authentication scheme in IoT environments. 1-6 - Manel Mrabet
, Yosra Ben Saied, Leïla Azouz Saïdane:
A hybrid trust management system for cloud environments. 1-6 - Majid H. Alsulami
, Anthony S. Atkins, Russell J. Campion:
The use of smart watches to monitor heart rates in elderly people: A complementary approach. 1-6 - Fatima Abdalla Al-Alem, Mohammad A. Alsmirat
, Mahmoud Al-Ayyoub:
On the road to the Internet of Biometric Things: A survey of fingerprint acquisition technologies and fingerprint databases. 1-6 - Shadi AlZu'bi
, Mohammed A. Shehab
, Mahmoud Al-Ayyoub, Elhadj Benkhelifa
, Yaser Jararweh:
Parallel implementation of FCM-based volume segmentation of 3D images. 1-6 - Majed AlOtaibi, Lo'ai Ali Tawalbeh
, Yaser Jararweh:
Integrated sensors system based on IoT and mobile cloud computing. 1-5 - Lo'ai Ali Tawalbeh
, Turki F. Al-Somani:
More secure Internet of Things using robust encryption algorithms against side channel attacks. 1-6 - Marwa Masmoudi, Faiza Ghozzi
:
Analyses of social WeBhouse integrating SNA metrics. 1-7 - Nicolás Emilio Díaz Ferreyra
, Johanna Schäwel, Maritta Heisel, Christian Meske:
Addressing self-disclosure in social media: An instructional awareness approach. 1-6 - Jisun An, Haewoon Kwak, Bernard J. Jansen
:
Validating social media data for automatic persona generation. 1-6 - Amina Amara, Rihem Ben Romdhane, Mohamed Ali Hadj Taieb
, Mohamed Ben Aouicha
:
Simulating the merge between user-centered graphs of social networks. 1-6 - Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Yaser Jararweh, Monther Aldwairi
:
Authorship attribution of Arabic tweets. 1-6 - Ali Salem, Hanêne Ben-Abdallah
:
Data warehousing design: Automatic verification of conformity and summarizability constraints. 1-6 - F. Essa
, Kamal Mansur Jambi, Anas M. Fattouh, Hassanin M. Al-Barhamtoshy, Maher Khemakhem
, A. Al-Ghamdi:
A fedearted E-learning cloud system based on mixed reality. 1-5 - Allie Whitman, Bernard J. Jansen
:
Some commericial concerns of Amazon's community forums: The case of the Kindle. 1-6 - Mohammed Naji Al-Kabi
, Areej A. Al-Qwaqenah
, Amal H. Gigieh, Kholoud Alsmearat, Mahmoud Al-Ayyoub, Izzat Mahmoud Alsmadi:
Building a standard dataset for Arabie sentiment analysis: Identifying potential annotation pitfalls. 1-6 - Tarek Abid, Hafed Zarzour
, Mohamed Ridda Laouar
, Mohamed Tarek Khadir:
Towards a smart city ontology. 1-6 - Manel Elleuchi, Manel Boujelben, Mohamed Wassim Jmal
, Mohamed Abid, Abdulfattah Mohammad Obeid, Mohammed S. BenSaleh:
Energy aware linear sensor placement scheme for water pipeline monitoring. 1-8 - Fadoua Nejjari, Laila Benhlima, Slimane Bah:
Event traffic detection using heterogenous wireless sensors network. 1-6 - Youness Riouali, Laila Benhlima, Slimane Bah:
Petri net extension for traffic road modelling. 1-6 - Adil Enaanai, Aziz Sdigui Doukkali, Ichrak Saif, Hicham Moutachaouik, Mustapha Hain
:
The collaborative relevance in the distributed information retrieval. 1-6 - Abla Chaouni Benabdellah
, Asmaa Benghabrit
, Imane Bouhaddou, El Moukhtar Zemmouri
:
Big data for supply chain management: Opportunities and challenges. 1-6 - Ichrak Mehrez, Olfa Hamdi-Larbi, Thomas Dufaud, Nahid Emad:
Towards an auto-tuning system design for optimal sparse compression format selection with user expertise. 1-6 - Moulay Smail Bouzakraoui, Abdelalim Sadiq, Nourddine Enneya:
Towards a framework for customer emotion detection. 1-6 - Ibtissam Slimani
, Abdelmoghit Zaarane
, Abdellatif Hamdoun:
Convolution algorithm for implementing 2D discrete wavelet transform on the FPGA. 1-3 - Abderrahmane Elyousfi
, Hamza Hamout, Asma El Hachimi:
An efficient intra block size decision for H.264/AVC encoding optimization.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.