default search action
18th AICCSA 2021: Tangier, Morocco
- 18th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2021, Tangier, Morocco, November 30 - Dec. 3, 2021. IEEE 2021, ISBN 978-1-6654-0969-8
- Najmeddine Abdennour, Tarek Ouni, Nader Ben Amor:
The importance of signal pre-processing for machine learning: The influence of Data scaling in a driver identity classification. 1-6 - Daniah Hasan, Maha Driss:
SUBLμME: Secure Blockchain as a Service and Microservices-based Framework for IoT Environments. 1-9 - Loïc Etienne, Francis Faux, Olivier Roecker:
Membership, syndromic and causality graphs to represent the emergency physician's reasoning. 1-6 - Mahmudul Huq:
Enhancement of Alaryngeal Speech using Generative Adversarial Network (GAN). 1-2 - Asha S, P. Vinod, Varun G. Menon, Akka Zemmari:
Downsampling Attack on Automatic Speaker Authentication System. 1-7 - Siham Khoussi, Alan Heckert, Abdella Battou, Saddek Bensalem:
A neural networks-based methodology for fitting data to probability distributions. 1-7 - Adel Taweel, Elyes Lamine, Richard Bache:
A Model for Computing Temporal Eligibility Criteria on Large and Diverse Data Repositories. 1-6 - Sicong Shao, Pratik Satam, Shalaka Satam, Khalid Al-Awady, Gregory Ditzler, Salim Hariri, Cihan Tunc:
Multi-Layer Mapping of Cyberspace for Intrusion Detection. 1-8 - Rahma Amri, Achraf Gazdar, Walid Barhoumi:
A comparative study on the importance of each face part in facial gender recognition via convolutional neural networks. 1-8 - Burak Tufekci, Cihan Tunc:
Vulnerability and Threat Analysis of UAVs. 1-2 - Nesrine Khabou, Ismael Bouassida Rodriguez, Oumayma Jameleddine, Amal Mateur:
Gumbel Distribution Adjustment Improvement for Accurate Extreme Values Prediction. 1-7 - Meriem Hafidi, Sara Qassimi, El Hassan Abdelwahed, Aimad Qazdar:
Semantic user profile enrichment in collective intelligence context: a Healthcare case study. 1-7 - Anastasia Natsiou, Seán O'Leary:
Audio representations for deep learning in sound synthesis: A review. 1-8 - Asma Ammari, Ramzi Mahmoudi, Badii Hmida, Rachida Saouli, Mohamed Hedi Bedoui:
Slice-Level-Guided Convolutional Neural Networks to study the Right Ventricular Segmentation using MRI Short-Axis sequences. 1-6 - Khouloud Ferchichi, Haythem Ghazouani, Walid Barhoumi:
Efficient Face Verification Under Makeup Changes Using Few Salient Regions. 1-8 - Thomas Lux, Yannik Kempf:
Success Factors for Market Entry of Mobile Health Startups. 1-4 - Suleiman Y. Yerima, Abul Bashar:
Bot-IMG: A framework for image-based detection of Android botnets using machine learning. 1-7 - Ahmed Rabhi, Rachida Fissoune, Mohamed Tabaa, Hassan Badir:
Intermediate results processing for aggregated SPARQL queries. 1-8 - Yassine Attaoui, Mohamed Chentouf, Zine El Abidine Alaoui Ismaili, Aimad El Mourabit:
A new MBFF merging strategy for post-placement power optimization of IoT devices. 1-6 - Himan Namdari, Cihan Tunc:
Toward Resilience Methods in Cloud Computing. 1-2 - Marina Luiza Lardizabal Vieira, Patricia Vilain:
Representation of Smart Contracts as State Diagrams. 1-8 - Souhila Boucham, Hassina Aliane:
A language independent approach to multilingual document representation including Arabic. 1-8 - Ahammed Waseem Palliyali, Maaz Abdulaziz Al-Khalifa, Saad Farooq, Julien Abinahed, Abdulla Al-Ansari, Ali Jaoua:
Comparative Study of Extractive Text Summarization Techniques. 1-6 - Muhammad Mohsin, Arslan Shaukat, Usman Akram, Muhammad Kaab Zarrar:
Automatic Prostate Cancer Grading Using Deep Architectures. 1-8 - Lisanne Kremer, Robert Gutu, Lea Leeser, Bernhard Breil, Michael Spitzhirn, Thomas Lux:
Virtual Process Simulation in Health Care: Potentials and Challenges. 1-8 - Dingchao Chen, Chase Q. Wu, Wei Shen, Yu Zhang:
On a Small File Merger for Fast Access and Modifiability of Small Files in HDFS. 1-8 - Bilel Elayeb:
Arabic Text Classification: A Literature Review. 1-8 - Hadeel T. El Kassabi, Mohamed Adel Serhani, Alramzana Nujum Navaz, Sofia Ouhbi:
Federated Patient Similarity Network for Data-Driven Diagnosis of COVID-19 Patients. 1-6 - Damiao Ribeiro de Almeida, Samuel P. Vasconcelos, Fabio Gomes de Andrade, Cláudio de Souza Baptista:
Towards a Hybrid and Semantically Enriched Trajectory Data Warehouse. 1-8 - Thomas Lavigne, Bacem Mbarek, Tomás Pitner:
A Real time Healthcare Tracking System based on Blockchain Application. 1-8 - Mohamed Chentouf, Zine El Abidine Alaoui Ismaili:
A New Leakage Optimization Approach for IoTs Physical Design. 1-8 - Azzah Allahim, Asma Cherif, Abdessamad Imine:
A Hybrid Approach for Optimizing Arabic Semantic Query Expansion. 1-8 - Diana Haidar, Nora Hérault, Abdel-Rahman H. Tawil, Nigel Sharratt, Konstantinos Vlachos, Edlira Vakaj:
Health and Well-being Impact of Coronavirus: A Case study of West Midlands vs England. 1-6 - Amine Boulemtafes, Abdelouahid Derhab, Nassim Ait Ali Braham, Yacine Challal:
PReDIHERO - Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring. 1-8 - Safa Mathlouthi, Ahmed Ghazi Blaiech, Mourad Said, Asma Ben Abdallah, Mohamed Hédi Bedoui:
A Novel Deep Learning Model for Knee Cartilage 3D Segmentation. 1-7 - Fatma Zahra Besdouri, Asma Mekki, Inès Zribi, Mariem Ellouze:
Improvement of the COTA-Orthography system through language modeling. 1-7 - Karim Fathallah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane:
A Combined IoT-Enabled SensorDB and Spatial Query Framework for Smart Farming. 1-8 - Seyda Alperen Pehlivan, Canan Pehlivan, Cléa Martinez, Nicolas Cellier, Franck Fontanili, Elyes Lamine:
Performance Evaluation and Statistical Data Analysis of a Call Center for the Deaf Community. 1-6 - Mohamed Salim Amri Sakhri, Mounira Tlili, Ouajdi Korbaa:
An Exact Algorithm for A Multi-Period Inventory Routing Problem with Lateral Transshipment. 1-8 - Reem Nassar, Imad H. Elhajj, Ayman I. Kayssi, Samer Salam:
Identifying NAT Devices to Detect Shadow IT: A Machine Learning Approach. 1-7 - Rafika Thabet, Elyes Lamine, Hervé Pingaud:
Development of a Risk-aware Business Process Modeling Tool for Healthcare processes. 1-6 - Radia Bendimerad, Kamel Smiri, Abderrazek Jemai:
A Monitoring System and Faults Prediction for Internet of Things System. 1-7 - Arno Appenzeller, Sebastian Bartholomäus, Rüdiger Breitschwerdt, Carsten Claussen, Sandra Geisler, Tobias Hartz, Philipp Kachel, Erik Krempel, Sebastian Robert, Sylke Ruth Zeissig:
Towards Distributed Healthcare Systems - Virtual Data Pooling Between Cancer Registries as Backbone of Care and Research. 1-8 - Zakaria Rguibi, Abdelmajid Hajami, Zitouni Dya:
Explaining Deep Neural Networks in medical imaging context. 1-2 - Lamia Karim, Azedine Boulmakoul:
Trajectory-based Modeling for Fraud Detection and Analytics: Foundation and Design. 1-7 - Fedia Ghedass, Faouzi Ben Charrada:
Modeling Big Data-centric Services using Knowledge Graphs. 1-8 - Emna Brahim, Sonia Bouzidi, Walid Barhoumi:
Change detection in optical remote sensing images using shearlet transform and convolutional neural networks. 1-7 - Hadjer Boughanem, Haythem Ghazouani, Walid Barhoumi:
Towards a deep neural method based on freezing layers for in-the-wild facial emotion recognition. 1-8 - Samah Rahamneh, Alvis Cheuk M. Fong, Lina Sawalha:
A Comparison of Different Optimization Algorithms for HW/SW Partitioning Using a High-Performance Cluster. 1-8 - Sadek Mansouri, Salah Zrigui, Mounir Zrigui, Dhaou Berchech:
Text detection in Arabic news video based on MSER and RetinaNet. 1-7 - Djamel Douha, Aïcha Mokhtari, Zahia Guessoum, René Mandiau:
Towards a non monotonic agent testing. 1-8 - Roberto Paulo Moreira Nunes, Mário Jino, Rodrigo Bonacin, Ferrucio de Franco Rosa:
A Conceptual Proposal of a Hybrid Method for Detecting Fraud in Civil and Military Service Entrance Examinations. 1-8 - Alba Fernández-Izquierdo, Andrea Cimmino, Raúl García-Castro:
Supporting Demand-Response strategies with the DELTA ontology. 1-8 - Souha Bennani, Ahmed Maalel, Henda Ben Ghézala:
Towards an adaptive gamification Model Based on Ontologies. 1-8 - Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:
Following Domain Driven Design principles for Microservices decomposition: is it enough? 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.