default search action
3rd NISS 2020: Marrakech, Morocco
- NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31 - April 2, 2020. ACM 2020, ISBN 978-1-4503-7634-1
- Karam Ahkouk, Mustapha Machkour, Jilali Antari:
Inferring SQL Queries Using Interactivity. 1:1-1:7 - Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui:
Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN. 2:1-2:4 - Isma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Nadia Saadia, Amar Ramdane-Cherif:
Post-Fall Time Accounting for Fall Detection Using a Portable Camera. 3:1-3:7 - El Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, Alami Chentoufi Jihane:
Fireworks Algorithm for Frequency Assignment Problem. 4:1-4:6 - Adnane Ghani, El Hassan Ibn Elhaj, Ahmed Hammouch, Abdelaali Chaoub:
Adaptation of quality for video streaming in a Bittorrent P2P IMS network. 5:1-5:8 - Insaf Bellamine, Hassan Silkan, Amal Tmiri:
Motion Detection Using the Dynamic Color Texture. 6:1-6:6 - Fatima Es-Sabery, Abdellatif Hair:
Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey. 7:1-7:7 - Heddoun Asmae, Benrrezzouq Rhizlane:
Role of Information Technologies in Supply Chain Management. 8:1-8:5 - Rahat Ali Khan, Shahzad Memon:
Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks. 9:1-9:8 - Sara Ftaimi, Tomader Mazri:
A comparative study of Machine learning algorithms for VANET networks. 10:1-10:8 - Boughanja Manale, Tomader Mazri:
A Survey of Intrusion Detection Algorithm in VANET. 11:1-11:7 - Younès Alaoui, Amine Belahbib, Lotfi El Aachak, Mohammed Bouhorma:
Unified Process to Design and Develop Serious Games for Schoolchildren. 12:1-12:8 - Kaoutar Bazi, Bouchaib Nassereddine:
Comparative analysis of TCP congestion control mechanisms. 13:1-13:4 - Mohamed Amine Mamou, Nadia Saadia:
Ankle gait-pattern generators. 14:1-14:5 - Nogaye Lo, Ibrahima Niang:
A Survey on QoS-based communication protocols for IoT systems. 15:1-15:9 - Mohamed Akram Zaytar, Chaker El Amrani:
Machine Learning Methods for Air Quality Monitoring. 16:1-16:5 - Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif, Mohammed-Alamine El Houssaini:
Normality Test to Detect the Congestion in MANET by Using OLSR Protocol. 17:1-17:5 - Sara Belattar, Otman Abdoun, Haimoudi El Khatir:
Study and Analysis of Data Analysis Systems (Reconstruction of a Learning Data from the Initial Data). 18:1-18:6 - Fatima Es-Sabery, Abdellatif Hair:
Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption. 19:1-19:6 - Ben Abdel Ouahab Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, Bouhorma Mohammed:
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide. 20:1-20:6 - Nurilhami Izzatie Khairi, Azlinah Mohamed, Nor Nadiah Yusof:
Feature Selection Methods in Sentiment Analysis: A Review. 21:1-21:7 - Lamia El Haourani, Anas Abou El Kalam, Abdellah Ait Ouahman:
Big Data security and privacy techniques. 22:1-22:9 - Muhammad Hanif Nor Azman, Azlinah Mohamed, Edzreena Edza Odzaly:
A Theoretical Study on Project Delivery and Leadership Style. 23:1-23:8 - Norli Shariffuddin, Azlinah Mohamed:
IT Security and IT Governance Alignment: A Review. 24:1-24:8 - Hajar Ait Addi, Redouane Ezzahir, Abdelhak Mahmoudi:
Three-level binary tree structure for sentiment classification in Arabic text. 25:1-25:8 - Smaili El Miloud, Sraidi Soukaina, Salma Azzouzi, My El Hassan Charaf:
An Adaptive Learning Approach for Better Retention of Learners in MOOCs. 26:1-26:5 - Ilham Dhaiouir, Mostafa Ezziyyani, Mohamed Khaldi:
Towards a new approach to reduce the dropout rate in e-learning. 27:1-27:4 - Abdulla Hussain, Azlinah Mohamed, Suriyati Razali:
A Review on Cybersecurity: Challenges & Emerging Threats. 28:1-28:7 - Amal Azeroual, Youssef Taher, Benayad Nsiri:
Recidivism forecasting: A study on process of feature selection. 29:1-29:6 - Zouhair Elamrani Abou Elassad, Hajar Mousannif, Hassan Al Moatassime:
Towards analyzing crash events for novice drivers under reduced-visibility settings: A simulator study. 30:1-30:7 - Jaouad Maqboul, Bouchaib Bounabat Jaouad:
Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement. 31:1-31:8 - Youssef Tounsi, Houda Anoun, Larbi Hassouni:
CSMAS: Improving Multi-Agent Credit Scoring System by Integrating Big Data and the new generation of Gradient Boosting Algorithms. 32:1-32:7 - Nur Zahrah Farida Binti Ruslan, Azlinah Mohamed, Norjansalika Janom:
Collaborative Consumption Motives: A Review. 33:1-33:7 - Asmae Hmami, Hanae Sbaï, Mounia Fredj:
A new Framework to improve Change Mining in Configurable Process. 34:1-34:6 - Nur Nadira Izlyn Kamaruddin, Azlinah Mohamed, Syaripah Ruzaini Syed Aris:
Online Advertising on Consumer Purchasing Behavior: Effective Elements and its Impact. 35:1-35:7 - Asma Chikh, Mohamed Lehsaini:
AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks. 36:1-36:5 - Mohammed Sabiri, Youssef Bensalih, Aziz Elbour:
Some Properties of Free Cyclic Codes over Finite Chain Rings. 37:1-37:11 - Khalid Ounachad, Mohamed Oualla, Abdelghani Souhar, Abdelalim Sadiq:
Face Sketch Recognition-An Overview. 38:1-38:8 - Stéphane Cédric Koumétio Tékouabou, El Arbi Abdellaoui Alaoui, Imane Chabbar, Walid Cherif, Hassan Silkan:
Machine Learning Aprroach for Early Detection of Glaucoma from Visual Fields. 39:1-39:5 - Samir Ifzarne, Imad Hafidi, Nadia Idrissi:
Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security. 40:1-40:6 - Oumaima Stitini, Soulaimane Kaloun, Omar Bencharef:
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review. 41:1-41:12 - Hayat Khaloufi, Karim Abouelmehdi, Abderrahim Beni Hssane:
Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity. 42:1-42:5 - Ehlem Zigh, Ayoub Elhoucine, Abderrahmane Mallek, Mohammed Kadiri, Kouninef Belkacem, Tolga Ensari:
Smartphone learning for Kids edutainment. 43:1-43:5 - Mourad Zairi, Tarik Boujiha, Ouelli Abdelhaq:
An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection. 44:1-44:4 - Mustapha Bahich, Mohammed Bailich:
Speckled correlation fringes denoising and demodulation using directional total variation and ridgelet transform. 45:1-45:5 - Asmae Berhich, Fatima-Zahra Belouadha, Mohammed Issam Kabbaj:
LSTM-based Models for Earthquake Prediction. 46:1-46:7 - Redouane Lhiadi:
Deep Learning Algorithms and Their Applications in the Perception Problem. 47:1-47:6 - Richard Adeyemi Ikuesan, Shefiu Olusegun Ganiyu, Muhammad Umar Majigi, Yusuf Drisu Opaluwa, Hein S. Venter:
Practical Approach to Urban Crime Prevention in Developing Nations. 48:1-48:8 - Dmitriy Bystrov, Toirov Olimjon, Giyasov Sanjar, Taniev Mirzokhid, Urokov Sardor:
Role of Reengineering in Training of Specialists. 49:1-49:4 - Mohamed Chouai, Mostefa Merah, José-Luis Sancho-Gómez, Malika Mimi:
A machine learning color-based segmentation for object detection within dual X-ray baggage images. 50:1-50:11 - Mohamed Khoali, Abdelhak Tali, Yassin Laaziz:
Advanced Recommendation Systems Through Deep Learning. 51:1-51:8 - Abdelhamid Riadi, Mohamed Boulouird, Moha M'Rabet Hassani:
Massive-MIMO Configuration of Multipolarized ULA and UCA in 5G Wireless Communications. 52:1-52:5 - Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed:
Approach of Constructing an Islamic Pattern Respecting the "HASBA" Method. 53:1-53:9 - Dmitriy Bystrov, Toirov Olimjon, Mustafakulova Gulzoda, Yakubova Dilfuza:
Fuzzy Systems for Computational Linguistics and Natural Language. 54:1-54:3 - Anas El-Ansari, Abderrahim Beni Hssane, Mostafa Saadi:
An improved modeling method for profile-based personalized search. 55:1-55:6 - Nickson M. Karie, Victor R. Kebande, Richard Adeyemi Ikuesan, Mehdi Sookhak, Hein S. Venter:
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. 56:1-56:6 - Meziane Hind, Ouerdi Noura, Kasmi Mohammed Amine, Mazouz Sanae:
Internet of Things: Classification of attacks using CTM method. 57:1-57:5 - Youssef Aassem, Imad Hafidi, Noureddine Aboutabit:
Enhanced Duplicate Count Strategy: Towards New Algorithms to Improve Duplicate Detection. 58:1-58:7 - Asma Khabba, Sanaa Errahili, Saida Ibnyaich, Moha M'Rabet Hassani:
A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones. 59:1-59:5 - Sanaa Errahili, Asma Khabba, Saida Ibnyaich, Moha M'Rabet Hassani:
New Frequency Reconfigurable Patch Antenna for Wireless Communication. 60:1-60:4 - Hadjer Fellah, Chaker Mezioud, Mohamed Chaouki Batouche:
Mobile Cloud Computing: Architecture, Advantages and Security Issues. 61:1-61:9 - Fouad Toufik, Mohamed Bahaj:
Model Transformation From Object Relational Database to NoSQL Column Based Database. 62:1-62:5 - Sonia Benbelgacem, Larbi Guezouli, Rachid Seghir:
A Distributed Information Retrieval Approach for Copyright Protection. 63:1-63:6 - Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt:
Verification of Integrity in Vehicle Architectures. 64:1-64:7 - Ahmed Remaida, Aniss Moumen, Younes El Bouzekri El Idrissi, Zineb Sabri:
Handwriting Recognition with Artificial Neural Networks a Decade Literature Review. 65:1-65:5 - Lahcen El Moutaouakil, Mohammed Boukendil, Zaki Zrikem, Abdelhalim Abdelbaki:
Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders. 66:1-66:4 - Mouad Tantaoui, My Driss Laanaoui, Mustapha Kabil:
Real-time Prediction of Accident using Big Data System. 67:1-67:5 - Othmane Daanouni, Bouchaib Cherradi, Amal Tmiri:
Diabetes Diseases Prediction Using Supervised Machine Learning and Neighbourhood Components Analysis. 68:1-68:5 - Yassine Sadqi, Yousra Belfaik, Said Safi:
Web OAuth-based SSO Systems Security. 69:1-69:7 - Ahmed Mehrez, Lamia Aladel:
Modelling Sustainability, Cloud computing and knowledge transmission in education in developing countries. 70:1-70:9 - Mohammed Zaoudi, Hicham Belhadaoui:
Adaptive E-learning: Adaptation of Content According to the Continuous Evolution of the Learner During his Training. 71:1-71:6 - Oumaima El Kouari, Hafssa Benaboud, Saiida Lazaar:
Using machine learning to deal with Phishing and Spam Detection: An overview. 72:1-72:7 - Mouna Boujrad, Saiida Lazaar, Mohamed Hassine:
Performance Assessment of Open Source IDS for improving IoT Architecture Security implemented on WBANs. 73:1-73:4 - Lahraoui Younes, Amal Youssef, Saiida Lazaar:
Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme. 74:1-74:6 - Bghiel Afrae, Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir:
A Question answering System with a sequence to sequence grammatical correction. 75:1-75:6 - Fatima-Zohra Hibbi, Otman Abdoun, Haimoudi El Khatir:
Knowledge Management in the Expert Model of the Smart Tutoring System. 76:1-76:4 - Dahdouh Yousra, Anouar Abdelhakim Boudhir, Mohamed Ben Ahmed:
An efficient Algorithm for medical image classification using Deep Convolutional Network: Case of Cancer Pathology. 77:1-77:9 - Soufyane Ayanouz, Boudhir Anouar Abdelhakim, Mohammed Benahmed:
A Smart Chatbot Architecture based NLP and Machine Learning for Health Care Assistance. 78:1-78:6 - Azzeddine Dekhane, Adel Djellal, Fouaz Boutebbakh, Rabah Lakel:
Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier. 79:1-79:6 - Hajar Ait Addi, Redouane Ezzahir:
Sampling techniques for Arabic Sentiment Classification: A Comparative Study. 80:1-80:6 - Ghislain Mervyl S. J. Kossingou, Nadege Gladys Ndassimba, Edgard Ndassimba, Kéba Gueye, Samuel Ouya:
Proposal of the Solution of Virtual Basic Schools in Rural Areas of African Countries in Conflict: Case of the Central African Republic. 81:1-81:5 - Okacha Diyer, Naceur Achtaich, Khalid Najib:
Artificial Intelligence in Learning Skills Assessment: A Pedagogical Innovation. 82:1-82:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.