default search action
Abderrahim Beni Hssane
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Mohammed Kasri, Anas El-Ansari, Mohamed El Fissaoui, Badreddine Cherkaoui, Marouane Birjali, Abderrahim Beni Hssane:
Correction: Public sentiment toward renewable energy in Morocco: opinion mining using a rule-based approach. Soc. Netw. Anal. Min. 14(1): 23 (2024) - 2023
- [j21]Mohammed Kasri, Anas El-Ansari, Mohamed El Fissaoui, Badreddine Cherkaoui, Marouane Birjali, Abderrahim Beni Hssane:
Public sentiment toward renewable energy in Morocco: opinion mining using a rule-based approach. Soc. Netw. Anal. Min. 13(1): 124 (2023) - [j20]Anas El-Ansari, Abderrahim Beni Hssane:
Sentiment Analysis for Personalized Chatbots in E-Commerce Applications. Wirel. Pers. Commun. 129(3): 1623-1644 (2023) - 2022
- [j19]Mustapha Hankar, Marouane Birjali, Anas El-Ansari, Abderrahim Beni Hssane:
COVID-19 Impact Sentiment Analysis on a Topic-based Level. J. ICT Stand. 10(2): 219-240 (2022) - [j18]Mohammed Kasri, Marouane Birjali, Mohamed Nabil, Abderrahim Beni Hssane, Anas El-Ansari, Mohamed El Fissaoui:
Refining Word Embeddings with Sentiment Information for Sentiment Analysis. J. ICT Stand. 10(3) (2022) - [c37]Khalid El Makkaoui, Youssef Lamriji, Ibrahim Ouahbi, Omayma Nabil, Anas Bouzahra, Abderrahim Beni Hssane:
Fast Modular Exponentiation Methods for Public-Key Cryptography. CommNet 2022: 1-6 - [c36]Mustapha Hankar, Marouane Birjali, Abderrahim Beni Hssane:
Used Car Price Prediction using Machine Learning: A Case Study. ISIVC 2022: 1-4 - 2021
- [j17]Mohammed Kasri, Marouane Birjali, Abderrahim Beni Hssane:
Word2Sent: A new learning sentiment-embedding model with low dimension for sentence level sentiment classification. Concurr. Comput. Pract. Exp. 33(9) (2021) - [j16]Anas El-Ansari, Abderrahim Beni Hssane, Mostafa Saadi, Mohamed El Fissaoui:
PAPIR: privacy-aware personalized information retrieval. J. Ambient Intell. Humaniz. Comput. 12(10): 9891-9907 (2021) - [j15]Marouane Birjali, Mohammed Kasri, Abderrahim Beni Hssane:
A comprehensive survey on sentiment analysis: Approaches, challenges and trends. Knowl. Based Syst. 226: 107134 (2021) - [j14]Hayat Khaloufi, Karim Abouelmehdi, Abderrahim Beni Hssane, Furqan Rustam, Anca Delia Jurcut, Ernesto Lee, Imran Ashraf:
Deep Learning Based Early Detection Framework for Preliminary Diagnosis of COVID-19 via Onboard Smartphone Sensors. Sensors 21(20): 6853 (2021) - [c35]Anas El-Ansari, Mohamed El Fissaoui, Abderrahim Beni Hssane:
Personalized question-answering over linked data. NISS (ACM) 2021: 13:1-13:7 - [c34]Zakaria Benlalia, Karim Abouelmehdi, Abderrahim Beni Hssane, Abdellah Ezzati:
A study of task scheduling algorithms in cloud computing. NISS (ACM) 2021: 42:1-42:5 - [c33]Anas El-Ansari, Marouane Birjali, Mustapha Hankar, Abderrahim Beni Hssane:
Privacy Threat Modeling in Personalized Search Systems. NISS (Springer) 2021: 311-325 - [c32]Mustapha Hankar, Marouane Birjali, Abderrahim Beni Hssane:
Forecasting COVID-19 Cases in Morocco: A Deep Learning Approach. NISS (Springer) 2021: 845-857 - 2020
- [j13]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad:
Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing. J. Ambient Intell. Humaniz. Comput. 11(6): 2205-2214 (2020) - [j12]Badreddine Cherkaoui, Abderrahim Beni Hssane, Mohammed Erritali:
Variable control chart for detecting black hole attack in vehicular ad-hoc networks. J. Ambient Intell. Humaniz. Comput. 11(11): 5129-5138 (2020) - [c31]Hayat Khaloufi, Karim Abouelmehdi, Abderrahim Beni Hssane:
Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity. NISS 2020: 42:1-42:5 - [c30]Anas El-Ansari, Abderrahim Beni Hssane, Mostafa Saadi:
An improved modeling method for profile-based personalized search. NISS 2020: 55:1-55:6
2010 – 2019
- 2019
- [j11]Slimane Ouhmad, Khalid El Makkaoui, Abderrahim Beni Hssane, Abdelmajid Hajami, Abdellah Ezzati:
An Electronic Nose Natural Neural Learning Model in Real Work Environment. IEEE Access 7: 134871-134880 (2019) - [j10]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing. Int. J. Digit. Crime Forensics 11(3): 90-102 (2019) - [j9]Mohamed El Fissaoui, Abderrahim Beni Hssane, Mostafa Saadi:
Energy efficient and fault tolerant distributed algorithm for data aggregation in wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 10(2): 569-578 (2019) - [j8]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing. J. Ambient Intell. Humaniz. Comput. 10(12): 4629-4640 (2019) - [j7]Badreddine Cherkaoui, Abderrahim Beni Hssane, Mohamed El Fissaoui, Mohammed Erritali:
Road State Novel Detection Approach in VANET Networks Based on Hadoop Ecosystem. Wirel. Pers. Commun. 107(4): 1643-1660 (2019) - [c29]Mouaz Bezoui, Abderrahim Beni Hssane, Abdelmajid Elmoutaouakkil:
Speech Recognition of Moroccan Dialect Using Hidden Markov Models. ANT/EDI40 2019: 985-991 - [c28]Zakaria Benlalia, Abderrahim Beni Hssane, Karim Abouelmehdi, Abdellah Ezzati:
A new service broker algorithm optimizing the cost and response time for cloud computing. ANT/EDI40 2019: 992-997 - [c27]Badreddine Cherkaoui, Abderrahim Beni Hssane, Mohamed El Fissaoui, Mohammed Erritali:
Road traffic congestion detection in VANET networks. ANT/EDI40 2019: 1158-1163 - [c26]Mohammed Kasri, Marouane Birjali, Abderrahim Beni Hssane:
A comparison of features extraction methods for Arabic sentiment analysis. BDIoT 2019 - 2018
- [j6]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
A novel adaptive e-learning model based on Big Data by using competence-based knowledge and social learner activities. Appl. Soft Comput. 69: 14-32 (2018) - [j5]Mohamed El Fissaoui, Abderrahim Beni Hssane, Mostafa Saadi:
Multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018: 92 (2018) - [j4]Karim Abouelmehdi, Abderrahim Beni Hssane, Hayat Khaloufi:
Big healthcare data: preserving security and privacy. J. Big Data 5: 1 (2018) - [j3]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
Evaluation of high-level query languages based on MapReduce in Big Data. J. Big Data 5: 36 (2018) - [c25]Slimane Ouhmad, Abderrahim Beni Hssane, Abdelmajid Hajami, Khalid El Makkaoui, Abdellah Ezzati:
A Practical Sensors Software to Manage Fault Signals' Impact. EUSPN/ICTH 2018: 207-214 - [c24]Hayat Khaloufi, Karim Abouelmehdi, Abderrahim Beni Hssane, Mostafa Saadi:
Security model for Big Healthcare Data Lifecycle. EUSPN/ICTH 2018: 294-301 - [c23]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane, Slimane Ouhmad:
A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing. FNC/MobiSPC 2018: 83-90 - [c22]Slimane Ouhmad, Abderrahim Beni Hssane, Abdelmajid Hajami:
The hybrid neural model to strengthen the e-nose restricted in real complex conditions. FNC/MobiSPC 2018: 107-113 - 2017
- [c21]Mohamed El Fissaoui, Abderrahim Beni Hssane, Mostafa Saadi:
Mobile Agent Protocol based energy aware data Aggregation for wireless sensor networks. EUSPN/ICTH 2017: 25-32 - [c20]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati, Anas El-Ansari:
Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing. EUSPN/ICTH 2017: 33-40 - [c19]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
Machine Learning and Semantic Sentiment Analysis based Algorithms for Suicide Sentiment Prediction in Social Networks. EUSPN/ICTH 2017: 65-72 - [c18]Karim Abouelmehdi, Abderrahim Beni Hssane, Hayat Khaloufi, Mostafa Saadi:
Big data security and privacy in healthcare: A Review. EUSPN/ICTH 2017: 73-80 - [c17]Badreddine Cherkaoui, Abderrahim Beni Hssane, Mohammed Erritali:
Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks. EUSPN/ICTH 2017: 170-177 - [c16]Mohamed El Fissaoui, Abderrahim Beni Hssane, Mostafa Saadi:
Boycott based enhanced correction scheme for mac layer misbehavior in wireless networks. EUSPN/ICTH 2017: 248-252 - [c15]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
Analyzing Social Media through Big Data using InfoSphere BigInsights and Apache Flume. EUSPN/ICTH 2017: 280-285 - [c14]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment. SCA 2017: 445-452 - 2016
- [j2]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane:
Homomorphic encryption applied to secure storage and treatments of data in cloud. Int. J. Cloud Comput. 5(3): 207-217 (2016) - [c13]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
Learning with Big Data Technology: The Future of Education. AECIA 2016: 209-217 - [c12]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane:
Securely Adapt a Paillier Encryption Scheme to Protect the Data Confidentiality in the Cloud Environment. BDAW 2016: 57:1-57:3 - [c11]Mohamed El Fissaoui, Abderrahim Beni Hssane, Mostafa Saadi:
Energy Aware Hybrid Scheme of Client-Server and Mobile Agent Models for Data Aggregation in Wireless Sensor Networks. HIS 2016: 227-232 - [c10]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
A Method Proposed for Estimating Depressed Feeling Tendencies of Social Media Users Utilizing Their Data. HIS 2016: 413-420 - [c9]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali:
Measuring documents similarity in large corpus using MapReduce algorithm. ICMCS 2016: 24-28 - [c8]Mouaz Bezoui, Abdelmajid Elmoutaouakkil, Abderrahim Beni Hssane:
Feature extraction of some Quranic recitation using Mel-Frequency Cepstral Coeficients (MFCC). ICMCS 2016: 127-131 - [c7]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Can hybrid Homomorphic Encryption schemes be practical? ICMCS 2016: 294-298 - [c6]Karim Abouelmehdi, Abderrahim Beni Hssane, Hayat Khaloufi, Mostafa Saadi:
Big data emerging issues: Hadoop security and privacy. ICMCS 2016: 731-736 - [c5]Khalid El Makkaoui, Abderrahim Beni Hssane, Abdellah Ezzati:
Cloud-ElGamal: An efficient homomorphic encryption scheme. WINCOM 2016: 63-66 - [c4]Marouane Birjali, Abderrahim Beni Hssane, Mohammed Erritali, Youness Madani:
Information content measures of semantic similarity between documents based on Hadoop system. WINCOM 2016: 187-192 - 2015
- [c3]Khalid El Makkaoui, Abdellah Ezzati, Abderrahim Beni Hssane:
Homomorphic Encryption as a Solution of Trust Issues in Cloud. BDCA 2015: 40-45 - [c2]Said Benkirane, Mostafa Saadi, Moulay Lahcen Hasnaoui, Abderrahim Beni Hssane:
A new comparative study of ad hoc routing protocol AODV and DSR in VANET environment using simulation tools. ISDA 2015: 458-461 - 2013
- [i1]Mostafa Saadi, Moulay Lahcen Hasnaoui, Abderrahim Beni Hssane, Said Benkirane, Mohamed Laghdir:
Energy-Aware Scheme used in Multi-level Heterogeneous Wireless Sensor Networks. CoRR abs/1306.4409 (2013) - 2012
- [j1]Abderrahim Beni Hssane, Moulay Lahcen Hasnaoui, Said Benkirane, Driss El Ouadghiri, Mohamed Laghdir:
Householder Algorithm Applied to Localization for Wireless Sensor Networks. Int. J. Mob. Comput. Multim. Commun. 4(1): 18-30 (2012) - 2010
- [c1]Abderrahim Beni Hssane, Moulay Lahcen Hasnaoui, Mostafa Saadi, Said Benkirane, Mohamed Laghdir:
Equitable Leach-E Protocol for Heterogeneous Wireless Sensor Networks. IDC 2010: 171-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint