![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
6th NISS 2023: Larache, Morocco
- Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, Larache, Morocco, May 24-26, 2023. ACM 2023
- Sandeep Joshi
, Amit Kumar Bairwa
, Anton Pavlovich Pljonkin
, Pradumn Garg
, Kshitij Agrawal
:
From Pre-Quantum to Post-Quantum RSA. 1:1-1:8 - Fatima Ezzahra Chadli
, Driss Gretete
, Aniss Moumen
:
Comparison of Free and Open Source WCAG Accessibility Evaluation Tools. 2:1-2:6 - Souhayla Dargaoui
, Mourade Azrour
, Ahmad El Allaoui
, Azidine Guezzaz
, Said Benkirane
:
Authentication in Internet of Things: State of Art. 3:1-3:6 - Mohammed El Khattabi
, Mohammed Khaldoun
, Ahmed Errami
, Jelloul Elmesbahi
:
Wireless In-band Full-Duplex FSK: Performance Optimization Using a Novel Synchronization Loop. 4:1-4:6 - Houda Oubalahcen
, Moulay Driss El Ouadghiri
:
Recommender Systems for Social Networks: A Short Review. 5:1-5:7 - Nadia Oukrich
, Bougary Tamega
, Naziha Laaz
:
Matia Application: An AI Multi-Lingual Assistant For Visually Impaired And Blind People. 6:1-6:7 - Ali Omari Alaoui
, Omaima El Bahi
, Mariame Oumoulylte
, Ahmed El Youssefi
, Yousef Farhaoui
, Ahmad El Allaoui
:
Optimizing Emergency Vehicle Detection for Safer and Smoother Passages. 7:1-7:6 - Fatima Ezzahra El Mayel
, Abdellatif Dahmouni
, Abdelkaher Ait Abdelouahad
:
Female or male observers ? - Gender differences in subjective image quality assessment. 8:1-8:6 - Akram Chhaybi
, Saiida Lazaar
, Mohamed Hassine
:
A recent benchmark study of GANs models for securing mobile applications. 9:1-9:5 - Rida El Abassi
, Mohamed Oubraime
, Jaafar Idrais
, Abderrahim Sabour
:
Exploring crude oil price movements as a complex time series using recurrent neural networks: Complex time series using recurrent neural networks. 10:1-10:6 - Karim Oulad Bessam
, Anass El Mamouni
, Hicham Setti
:
Contribution to the Modeling and Design of Dielectric Resonator Antennas for the Detection of Cracks and Biphasic Heterogeneities. 11:1-11:4 - Aicha Mchbal
, Naima Amar Touhami
, Abdelhafid Marroun
:
Cross Polarization Diversity Employment in a 4×4 MIMO Antenna Design. 12:1-12:3 - Abdelkarim Aboutaib
, Ahmad El Allaoui
, Imad Zeroual
, El Wardani Dadi
:
Punctuation Prediction for the Arabic language. 13:1-13:4 - Khaddor Ranya
, Amrani Mahacine
, Bakkali Yedri Othman
:
Smart laboratory: Building a smart laboratory environment by using AI. 14:1-14:8 - Mohammed Ahnouch
, Lotfi Elaachak
, Abderrahim Ghadi
:
Current Trends in AI-Based Derivatives Pricing: A Review. 15:1-15:7 - Loubna Taidi
, Amal A. M. Maurady
, Rajae Chahboune
:
Dual inhibitors of cyclooxygenase-2 and 5-lipoxygenase with molecular docking study. 16:1-16:6 - Assiya Amri
, Tomader Mazri
:
IoT Antennas for Industry 4.0 Communications. 17:1-17:7 - Remilekun Adeopatoye
, Richard Adeyemi Ikuesan
, Taurai Hungwe
, Victor R. Kebande
, Mehdi Sookhak
:
Towards an Open-Source Based E-Mail Forensic Tool that uses Headers in Digital Investigation. 18:1-18:8 - Abdellatif Dahmouni
, Reda Rossamy
, Marwane Hamdani
, Ibrahim Guelzim
, Abdelkaher Ait Abdelouahad
:
Bimodal Emotional Recognition based on Long Term Recurrent Convolutional Network. 19:1-19:5 - Azeddine Wahbi
, Abderrahmane Ouchatti
, Mohamed Elghayyaty
, Anas el Habti el Idrissi
, Ahmed Roukhe
, Bahloul Bensassi
, Laamari Hlou
:
Embedded Acoustic Noise Cancellation (ANC) Performances Analysis for Voice Communications using Linear Adaptive Approaches. 20:1-20:5 - Imane El Mourabit
, Said Jai-Andaloussi
, Ouail Ouchetto
, Mounia Miyara
:
Exploring Collaborative Filtering Algorithms in MOOCs Recommender Systems: A Comprehensive Overview. 21:1-21:5 - Abdellah Berkaoui
, Youssef Gahi
:
A private cloud-based Datalab for scalable DSML pipelines. 22:1-22:7 - Oussama Ndama
, El Mokhtar En-Naimi
:
Optimisation and Resampling methods for Handling Imbalanced Datasets in Credit Card Fraud Detection using Artificial Neural Networks. 23:1-23:10 - Eloutouate Lamiae
, Gibet Tani Hicham
, Elouaai Fatiha
, Bouhorma Mohammed
, Mohamed Walid Hajoub
:
Patient smart home monitoring using vision neural network transformers. 24:1-24:7 - Adil Marouan
:
Elliptic Curve Cryptography signing algorithms behind blockchain 2.0. 25:1-25:6 - Badrani Morad
, Adil Marouan
, Nabil Kannouf
, Abdelaziz Chetouani
:
Pathways to Success: A Study of Classification Algorithms for Guiding Middle School Students in Morocco. 26:1-26:5 - Abdelhakim Hadji
, Brahim Raouyane
, Mohamed Rachdi
:
SQL Injection Detection in Cloud Computing with Machine Learning Algorithms. 27:1-27:6 - Hicham Rrghout
, Mourad Kattass
, Younes Qobbi
, Naima Benazzi
, Abdellatif Jarjar
, Abdelhamid Benazzi
:
Robust Image Encryption Algorithm Using a New Variant of Hill Cipher. 28:1-28:6 - Abdellatif Bakar
, Abdelhamid Zouhair
, El Mokhtar En-Naimi
:
Review of Vulnerabilities and Countermeasures Against Sybil Attacks on Decentralized Systems Based on Machine Learning Algorithms. 29:1-29:5 - Zineb Laftouty
, Khalid Bouraada
, Ahmed Bakrim
, Anouar Abdelhakim Boudhir
, Mariam Essafi
:
Weed Detection and Treatment by RGB System - Case of the FPL Smart Farm. 30:1-30:10 - Anoual El Kah
, Imad Zeroual
:
Sentiment analysis of Facebook users towards COVID-19 vaccination. 31:1-31:4 - Mourad Kattass
, Hicham Rrghout
, Abdellatif Jarjar
, Abdellah Abid
, Mariem Jarjar
, Abdelhamid Benazzi
:
An Efficient Image Encryption Algorithm using Chaotic S-boxes of Pseudo-random Size. 32:1-32:6 - Mohammed Bellaj
, Najib Naja
, Abdellah Jamali
:
On-demand Geographic Forwarding for producer mobility support in Named Data Networking. 33:1-33:7 - Khadija Tlemçani
, Said Jai-Andaloussi
, Kebira Azbeg
, Ouail Ouchetto
, Leila Fetjah
:
An Advanced IoT-Based Architecture for Healthcare Systems: A Focus on Blockchain-based Edge Computing for Diabetes Management. 34:1-34:7 - Btissam Zerhari
, Kebira Azbeg
, Said Jai-Andaloussi
, Ouail Ouchetto
:
Leveraging Blockchain for Enhanced Security in IOB Data Management. 35:1-35:5 - Sohaib Chengaou
, Khalid El Yassini
, Kenza Oufaska
:
Simulation of an intelligent traffic management model. 36:1-36:4 - Rabab Cherkaoui
, El Mokhtar En-Naimi
:
A comparison of machine learning algorithms for credit card fraud detection. 37:1-37:6 - Mohamed Daouad
, El Wardani Dadi
:
Amazigh Speech Recognition Using 1D CNN. 38:1-38:6 - Ghalia Mdaghri-Alaoui
, Abdelhamid Zouhair
, Nihad El Ghouch
:
Employing multi-agent systems to enhance virtual reality platforms. 39:1-39:5 - Ilhame Khabbachi
, Abdelhamid Zouhair
, Aziz Mahboub
:
An Intelligent Solution based on a Multi-agent System for the Detection of Cheating in Online Exams. 40:1-40:5 - Fadoua El Kebraoui
, El Mokhtar En-Naimi
, Nihad El Ghouch
:
A Comparative Study of Different Supervised Machine Learning in Predicting of Type 2 Diabetes. 41:1-41:7 - Mohsine Elkhayati
, Amine Ouba
, Youssfi El Kettani
, Fatima El Khoukhi
:
An Innovative Ground Truth Dataset for Automated Validation of Arabic Handwritten Character Segmentation Algorithms. 42:1-42:5 - Mourtada Oubassghir
, Mohamed Boulouird
:
Capacity Analysis of NOMA with mmWave for 5G wireless Communications and Beyond. 43:1-43:5 - Idelhakkar Brahim
, Nada El moussaoui
:
Analysis of the impact of energy consumption on economic growth and environmental sustainability: the case of Morocco. 44:1-44:6 - Tarik Chanyour
, Abdelhak Kaddari
:
Blockchain-Based Distributed Caching with replication for Efficient Service Provision in Edge-cloud Environments. 45:1-45:7 - Achraf Haibi
, Kenza Oufaska
, Khalid El Yassini
, Mohammed Boulmalf
, Mohsine Bouya
:
On the use of RFID Middleware for real-time data stream processing. 46:1-46:5 - Abdellatif Kichna
, Abderrazak Farchane
:
Comparative Analysis of Iterative Decoding Algorithms for QC-MDPC McEliece Cryptosystems. 47:1-47:6 - Abdellah Maatallaoui
, Hicham Touil
, Larbi Setti
:
The Impact of Radio Frequency (RF) Attacks on Security and Privacy: A Comprehensive Review. 48:1-48:23 - Abdelati Bourzik
, Belaid Bouikhalene
, Jaouad EL-Mekkaoui
, Amal Hjouji
:
A comparative study and performance evaluation of discrete Tchebichef moments for image analysis. 49:1-49:7 - Hamza Nouib
, Nabil Lamii
, Younes El Bouzekri El Idrissi
, Aniss Moumen
:
Using a Machine Learning Model for Employability Prediction: A Moroccan Case Study. 50:1-50:5 - Wassima Moutaouakil
, Soufiane Hamida
, Bouchaib Cherradi
, Mohammed Jebbari
, Shawki Saleh
, Abdelhadi Raihani
:
Integrating GIS Data with Machine Learning Approaches for Improved Flood Hazard Prediction. 51:1-51:7 - Mohamed Amine Mahjoubi
, Soufiane Hamida
, Bouchaib Cherradi
, Oussama El Gannour
, Ahmed El Abbassi
, Abdelhadi Raihani
:
Classifying Brain Tumors using Convolutional Neural Networks on MRI Scans. 52:1-52:7 - Driss Lamrani
, Soufiane Hamida
, Mohammed Amine Bouqentar
, Mohamed Amine Mahjoubi
, Bouchaib Cherradi
, Lhoussain Bahatti
:
U-Net-based Artificial Intelligence for Accurate and Robust Brain Tumor Diagnosis using Magnetic Resonance Imaging. 53:1-53:9 - Rachid El Ansari
, Mohamed El Bouhadioui
, Moulay Othman Aboutafail
, Nezha Mejjad
, Hicham Jamil
, Elhassan Jamal
, Youssef Rissouni
, Mohammed Zouiten
, Hicham Boutracheh
, Aniss Moumen
:
A review of Machine learning models and parameters for groundwater issues. 54:1-54:7 - Hicham Boutracheh
, Rachid El Ansari
, Nezha Mejjad
, Aniss Moumen
:
Application of bibliometrics as a data mining technique for research prioritization: A case study of desalination research. 55:1-55:9 - Houda Fakhkhari
, Bouchaib Bounabat
, Ismail Kassou
:
Digital Health Taxonomy. 56:1-56:9 - Ikram Ben Abdel Ouahab
, Lotfi Elaachak
, Mohammed Bouhorma
:
Enhancing Malware Classification with Vision Transformers: A Comparative Study with Traditional CNN Models. 57:1-57:5 - Younès Alaoui
, Lotfi Elaachak
:
Yet Another Serious Game in Arabic. 58:1-58:4 - Abdellah Chehri
, Hasna Chaibi
, Abderrahmane El Mettiti
, Rachid Saadane
, Gwanggil Jeon
:
Fed-Haul: A Federated Learning Dual Band Point Multi-Point Backhaul Requirements in 5G Evolution and Beyond. 59:1-59:5 - Hicham Sadok
, Hasna Chaibi
, Rachid Saadane
:
An exploratory study on the contribution of Artificial Intelligence in improving the bank credit analysis process. 60:1-60:4 - Omar Hniche
, Rachid Saadane
:
Challenges and Opportunities of Integrating AI with IFRS in Accounting Systems Insights from Morocco. 61:1-61:9 - Hala Khankhour
, Jaafar Abouchabaka
, Hicham Gibet Tani
:
Evaluation and critical comparison of two methods: AG and ACO in ad hoc network. 62:1-62:5 - Soufyane Ayanouz
, Anouar Abdelhakim Boudhir
, Mohamed Ben Ahmed
:
Unleashing the Power of NLP and Transformers: A Game-Changer in Medical Research and Clinical Practice and a revolution of Medical Text Analysis.: Case Study: Cancer report classification by priority. 63:1-63:6 - Yassine El-Ouardi
, Oussama Hasidi
, Jakob Khamis
, El Hassan Abdelwahed
, Aimad Qazdar
, Stephan Sauter
, Jens Timmermann
, Ahmed Bendaouia
:
Digital Twin Technology for Enhanced Health Monitoring, Maintenance, and Energy Efficiency of Electric Vehicles: E-mule Project. 64:1-64:7 - Samia Haman
, Yasser Tajmout
, Younès El Bouzekri El Idrissi
, Brahim El Bhiri
, Aniss Moumen
:
Adoption of advanced technologies in industrial companies: A bibliometric analysis. 65:1-65:5 - Moustapha Ouali
, Issam Seddik
, Youssef Lagmich
:
Predicting Discharge Mode in Dielectric Barrier Discharge (DBD) Systems using Machine Learning: Importance, Algorithms, and Perspectives. 66:1-66:7 - Mohamed Kouissi
, El Mokhtar En-Naimi
, Abdelhamid Zouhair
:
Tweets similarity classification based on Machine Learning Algorithms, TF-IDF and the Dynamic Case Based Reasoning. 67:1-67:6 - Iman El Kodssi
, Hanae Sbaï
:
A study of extending BPMN for IoT-aware process modeling. 68:1-68:4 - Loukili Soumaya
, Abdelhadi Fennan
, Lotfi Elaachak
:
Applications of Text Generation in Digital Marketing: a review. 69:1-69:8
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.