default search action
Souad El Bernoussi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Ahmed Bir-Jmel, Sidi Mohamed Douiri, Souad El Bernoussi, Ayyad Maafiri, Yassine Himeur, Shadi Atalla, Wathiq Mansoor, Hussain Al-Ahmad:
GFLASSO-LR: Logistic Regression with Generalized Fused LASSO for Gene Selection in High-Dimensional Cancer Classification. Comput. 13(4): 93 (2024) - [j6]Ahmed Bir-Jmel, Sidi Mohamed Douiri, Souad El Bernoussi:
Minimum redundancy maximum relevance and VNS based gene selection for cancer classification in high-dimensional data. Int. J. Comput. Sci. Eng. 27(1): 78-89 (2024)
2010 – 2019
- 2019
- [j5]Ahmed Bir-Jmel, Sidi Mohamed Douiri, Souad El Bernoussi:
Gene Selection via a New Hybrid Ant Colony Optimization Algorithm for Cancer Classification in High-Dimensional Data. Comput. Math. Methods Medicine 2019: 7828590:1-7828590:20 (2019) - [j4]Ahmed Bir-Jmel, Sidi Mohamed Douiri, Souad El Bernoussi:
Gene selection via BPSO and Backward generation for cancer classification. RAIRO Oper. Res. 53(1): 269-288 (2019) - 2018
- [j3]Charifa Hanin, Fouzia Omary, Souad El Bernoussi, Khadija Achkoun, Bouchra Echandouri:
A New Block Cipher System Using Cellular Automata and Ant Colony Optimization (BC-CaACO). Int. J. Inf. Secur. Priv. 12(4): 54-67 (2018) - 2017
- [c11]Hanna Zini, Souad El Bernoussi:
Minimizing makespan in hybrid flow shop scheduling with multiprocessor task problems using a discrete harmony search. CIVEMSA 2017: 177-180 - [c10]Ismail El Moudden, Mounir Ouzir, Souad El Bernoussi:
Automatic Speech Analysis in Patients with Parkinson's Disease using Feature Dimension Reduction. ICMRE 2017: 167-171 - [c9]Sidi Mohamed Douiri, Souad El Bernoussi:
A Steganographic Method Using Tabu Search Approach. MICAI (Special Session) 2017: 30-33 - [c8]Charifa Hanin, Bouchra Echandouri, Fouzia Omary, Souad El Bernoussi:
L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFID. UNet 2017: 287-298 - [c7]Bouchra Echandouri, Charifa Hanin, Fouzia Omary, Souad El Bernoussi:
LCAHASH-MAC: A new lightweight message authentication code using cellular automata for RFID. WINCOM 2017: 1-6 - 2016
- [c6]Ismail El Moudden, Badreddine Benyacoub, Souad El Bernoussi, Mounir Ouzir:
Modeling Human Behavior Using Feature Extraction and Class Prediction. CSE/EUC/DCABES 2016: 476-479 - [c5]Hanna Zini, Souad El Bernoussi:
A modified harmony search for flow shop scheduling problem. GOL 2016: 1-5 - 2015
- [c4]Badreddine Benyacoub, Ismail El Moudden, Souad El Bernoussi, Abdelhak Zoglat, Mohamed Ouzineb:
Initial Model Selection for the Baum-Welch Algorithm Applied to Credit Scoring. MCO (2) 2015: 359-368 - 2014
- [c3]Badreddine Benyacoub, Souad El Bernoussi, Abdelhak Zoglat:
Building classification models for customer credit scoring. GOL 2014: 107-111 - 2013
- [c2]Badreddine Benyacoub, Souad El Bernoussi, Abdelhak Zoglat:
Credit scoring model based on Baum-Welch method. AICCSA 2013: 1-5 - [c1]Sidi Mohamed Douiri, Souad El Bernoussi:
An Effective Ant Colony Optimization Algorithm for the Minimum Sum Coloring Problem. ICCCI 2013: 346-355 - 2012
- [j2]Sidi Mohamed Douiri, Souad El Bernoussi:
A New Ant Colony Optimization Algorithm for the Lower Bound of Sum Coloring Problem. J. Math. Model. Algorithms 11(2): 181-192 (2012)
1980 – 1989
- 1988
- [j1]Pham Dinh Tao, Souad El Bernoussi:
Iterative behaviour, fixed point of a class of monotone operators. Application to non-symmetric threshold function. Discret. Math. 70(1): 85-101 (1988) - 1982
- [b1]Souad El Bernoussi:
Analyse et comparaison d'itérations discrètes : la méthode de Newton dans (Z/pZ)n. Joseph Fourier University, Grenoble, France, 1982
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint