default search action
6th Cloudtech 2023: Marrakech, Morocco
- 6th IEEE International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2023, Marrakech, Morocco, November 21-23, 2023. IEEE 2023, ISBN 979-8-3503-0306-3
- Abderrahim Lachguer, Abderrahmane Sadiq, Youssef Es-saady, Mohamed El Hajji:
Towards an IoT Architecture Based on Machine Learning for Missing Data Prediction on the Edge. 1-7 - Saad Belcaid, Siham Aouad, Mostapha Zbakh:
A Survey on Recent Intrusion Detection Systems in Cloud Environment. 1-6 - Abd Allah Aouragh, Mohamed Bahaj:
Advancing Breast Cancer Diagnosis with Machine Learning: Exploring Data Balancing, Feature Selection, and Bayesian Optimization. 1-6 - Mohammed Wazir Adain, Adil Tanveer:
Using Serverless FaaS for Invoking Long-Running Jobs. 1-6 - Ilyass Mokhtari, Ayyoub El Outmani, El Miloud Jaâra:
Security Governance in IOT Environment: A State of Art. 1-4 - Khadija Bouyakhsaine, Abderrahim Brakez, Mohcine Draou:
Data-Driven Approach for Residential Occupancy Modeling Using PIR Sensors: A Moroccan Case Study. 1-6 - Ayoub Berdai, Dalila Chiadmi:
Attempts in Worst-Case Optimal Joins on Relational Data Systems: A Literature Survey. 1-8 - Sara Halim, Bouchaib Bounabat:
Assessing Digital Government Maturity Model for Developed Countries. Application to Singapore. 1-7 - Karmaoui Idrissi Hamza, Jihad Kilani, Faycal Bensalah, Youssef Baddi:
Evaluation and Analysis of Network Safety Mechanisms in SDN Infrastructure. 1-6 - Jens Kohler:
Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment. 1-7 - Mohammed Benali, Abdeljalil Elouardighi:
Sentiment Analysis Applied to Arabic Tweets Using Machine Learning and Deep Learning. 1-8 - Zainab Ouardirhi, Sidi Ahmed Mahmoudi, Mostapha Zbakh:
A Novel Approach for Recognizing Occluded Objects Using Feature Pyramid Network Based on Occlusion Rate Analysis. 1-7 - Zakaria Sawadogo, Babacar Thioye, Ibrahima Gaye, Jean Marie Dembele, Gervais Mendy, Samuel Ouya:
Mid@ndro: a Middleware Architecture for Malware Detection on Android. 1-5 - Majid Almaraashi:
Comparing Different Simulated Annealing Cooling Variants for Fuzzy Logic Systems Modeling. 1-6 - Jean-Sébastien Lerat, Sidi Ahmed Mahmoudi:
Architecture to Distribute Deep Learning Models on Containers and Virtual Machines for Industry 4.0. 1-8 - Ismail El Yamani, Souad Sadki, Hanan El Bakkali, Driss Allaki:
CL2S4P: A Privacy Policy Translator for Comprehensive Interpretation in Smart Healthcare Systems. 1-7 - Sara El Ouahabi, Safâa El Ouahabi, El Wardani Dadi:
Multi-Domain Dataset for Moroccan Arabic Dialect Sentiment Analysis in Social Networks. 1-7 - Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:
Dealing with Anti-Patterns When Migrating from Monoliths to Microservices: Challenges and Research Directions. 1-8 - Basma Iraqi, Lamia Benhiba, Mohammed Abdou Janati Idrissi:
Data-Driven Transformation in Investment Banks. 1-9 - Widad El Moutaouakal, Karim Baïna:
Comparative Experimentation of MLOps Power on Microsoft Azure, Amazon Web Services, and Google Cloud Platform. 1-8 - Hanane Dihmani, Abdelmajid Bousselham, Omar Bouattane:
A Review of Feature Selection and HyperparameterOptimization Techniques for Breast Cancer Detection on thermograms Images. 1-8 - Soufiane Aatab, Felix Freitag:
Integrating a Neural Network Library in Embedded Federated Learning. 1-7 - Chaymae Majdoubi, Saida El Mendili, Youssef Gahi:
Data Security Patterns for Critical Big Data Systems. 1-8 - Mustapha Hammouti, Omar Moussaoui, Mohammed Haissaine, Abdelkader Bétari:
Comparative Evaluation of IoT Mesh Network Protocols: NeoMesh Versus LoRa Pymesh. 1-6 - Laila Bouhouch, Mostapha Zbakh, Claude Tadonki:
A New Classification for Data Placement Techniques in Cloud Computing. 1-9 - Manu Agarwal, Enkhzol Dovdon, Luis Roma Barge, Yanja Dajsuren, Jakob de Vlieg:
A HPC-Based Data Analytics Platform Architecture for Data-Driven Animal Phenotype Detection. 1-6 - Mahbubur Rahman, Liang Chen, Jonathan Loo, Wei Jie:
Towards Deep Learning Based Access Control using Hyperledger-Fabric Blockchain for the Internet of Things. 1-8 - Hasnae Lamrani Alaoui, Mostapha Zbakh, An Braeken, Abdellah Touhafi, Abdellatif El Ghazi:
Authentication Protocol for RFID Systems: A Survey. 1-11 - Hind Mikram, Said El Kafhali, Youssef Saadi:
A Hybrid Algorithm Based on PSO Algorithm and Chi-Squared Distribution for Tasks Consolidation in Cloud Computing Environment. 1-6 - Nadia Qoudhadh, Mostapha Zbakh:
Algorithms Scheduling Applied to Microservics Architectures: A Survey Study. 1-12 - Zakaria Sawadogo, Muhammad Taimoor Khan, Jean Marie Dembele, Gervais Mendy, Samuel Ouya:
Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis Methods. 1-5 - Hicham Boudlal, Mohammed Serrhini, Ahmed Tahiri:
Leveraging WiFi Channel State Information for Efficient and Reliable Device-Free Human Activity Recognition. 1-8 - Mohammed Hajhouj, Mounia Abik, Randa Zarnoufi:
Enhancing Syntactic Resolution in Biomedical Data Processing with OpenCL: A Use Case Study. 1-8 - Hind Berrami, Zineb Serhier, Manar Jallal, Mohammed Bennani Othmani:
Artificial Intelligence: Perception, Attitudes and Use Among Students at the Casablanca Faculty of Medicine. 1-4 - Khalid Maidine, Ahmed El-Yahyaoui:
Cloud Identity Management Mechanisms and Issues. 1-9 - Takayuki Kushida, Yuka Kato:
Logical IoT Cloud - Integrated Systems Management for Cloud and IoT. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.