


default search action
6th ICAASE 2024: Constantine, Algeria
- International Conference on Advanced Aspects of Software Engineering, ICAASE 2024, Constantine, Algeria, November 9-10, 2024. IEEE 2024, ISBN 979-8-3315-2281-0
- Khababa Abdallah, Ahlem Drif, Ghizlane Khababa, Saad Harous:
Earthquake Resilient Management in Northeast Algeria: A Multivariate Time Series Forecasting based on LSTM-Attention Neural Network. 1-6 - Bounab Rayene, Bouchra Guelib, Benzerogue Sarra, Karim Zarour:
Optimizing Machine Learning for Healthcare Fraud Detection: A Framework Using Hybrid Feature Selection and Hyperparameter Tuning. 1-8 - Aicha Aggoune, Zakaria Mihoubi:
Towards Efficient Dataset Development: A Case Study of M2Q2+ in Movie QA Systems. 1-5 - Yahia Kanoune, Chafika Amina Lammari, Djamel Eddine Zegour:
Implementing IMS-AKA+: A Solution for Securing Signaling and Media Planes. 1-4 - Amina Khacha, Rafika Saadouni, Yasmine Harbi, Zibouda Aliouat, Chirihane Gherbi, Saad Harous:
Privacy-Preserving in Agricultural IoT: Intrusion Detection Using Federated Learning and CNN. 1-7 - Riad Helal, Akram Seghiri, Kamel Boukhelfa, Faiza Belala, Nabil Hameurlain:
FRAME-ArchSoS: A Model-based Framework for the Formal Specification of Reliable Systems of Systems. 1-9 - Salah Eddine Maoudj, Aissam Belghiat:
A Deep Learning-Based Approach with Overlapped Classes Aggregation for Intrusion Detection in Internet of Things Networks. 1-7 - Rihab Lakbichi, Farouq Zitouni, Abdelhadi Limane, Aridj Ferhat, Saad Harous:
Comparative Analysis of Four Metaheuristic Algorithms for Estimating Parameters in Solar Photovoltaic Models. 1-9 - Aya Goudjil, Lylia Djilali, Amira Benabdelmoumene, M'hamed Hamadouche, Mohamed Amine Riahla:
Digital Data Protection Using Feistel Network and DNA Cryptography. 1-6 - Billel Aklouche, Adib Rahmane, Abdelhakim Takaout:
Leveraging Pre-trained Transformer Models and Ensemble Learning for Fake News Detection: A Comparative Analysis. 1-8 - Mohamed Elamine Khoudour, Ismaïl Biskri, Fouad Abdallah Layadi:
Advancing Accurate Recognition of Handwritten Arabic Character: An Innovative Hybrid Approach. 1-7 - Ibtissem Talamali, Razika Lounas, Mohamed Mezghiche:
Formal Specification and Verification of MQTT Protocol Using CoQ Proof Assistant. 1-6 - Sabrina Karboua, Fouzi Harrag, Farid Meziane:
Multi-Head Self-Attention Based Arabic News Recommendation System. 1-8 - Aridj Ferhat, Farouq Zitouni, Abdelhadi Limane, Rihab Lakbichi, Saad Harous:
An Opposition-Based Learning Archerfish Hunting Optimizer for Global Optimization. 1-9 - Salheddine Sadouni, Ouissal Sadouni, Abdelhafid Zitouni, Leila Megouache, Skander Aris, Zakaria Benzadri, Abderraouf Messai, Kamal Hamaz:
Intelligent Network of Anti-Pollution Stations for Real-Time Prediction and Monitoring of Atmospheric Pollution. 1-8 - Bourenane Mohamed Nabil, Mohamed Hachem Kermani, Zizette Boufaïda:
A Comprehensive Review of Experimental and Computational Methods for Protein Structure Prediction and Classification. 1-7 - Abdelkrim Abdelli:
Extending TOPSIS to Ideal References and Value Constraints. 1-6 - Adel Belbekri, Wissem Bouarroudj, Fouzia Benchikha, Zizette Boufaïda:
Impact of Deep Learning-Based Entity Recognition on a Feature-Based Entity Linking System: A Hybrid Approach. 1-6 - Belattar Khadidja, Mohamed Ait Mehdi, Abdellaoui Mohamed, Akkouche Imene, Zobiri Okba:
Enhancing Malware Detection using Deep Learning with SMOTE and Noise-based Augmentation. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.