


default search action
4th CIST 2016: Tangier, Morocco
- Mohammed El Mohajir, Mohamed Chahhou, Mohammed Al Achhab, Badr Eddine El Mohajir:

4th IEEE International Colloquium on Information Science and Technology, CiSt 2016, Tangier, Morocco, October 24-26, 2016. IEEE 2016, ISBN 978-1-5090-0751-6 - Nur Azaliah Abu Bakar

, S. Harihodin, Nazri Kama:
Enterprise architecture implementation model: Measurement from experts and practitioner perspectives. 1-6 - Hicham Rachidi, Mohammed El Mohajir

:
A combined e-learning and finance management system based on ontology: A case study of SMEs in Morocco. 7-12 - Sara Jebbor, Abdellatif El Afia

, Raddouane Chiheb, Fatima Ouzayd
:
Comparative analysis of drug supply and inventory management methods literature review. 13-18 - Driss Serrou, Khaoula Khlie, Abdellah Abouabdellah:

Improvement of the lean-maintenance by hospital logistics. 19-24 - Abdellah Zaouia, AmineArrahmane Achargui, Fatima Jalil:

Factors affecting adoption of FLOSS ERP system by SMEsf directors and managers in developing countries using UTAUT2, SEM and R. 25-30 - Imane Chattate

, Jamila Bakkoury, Azeddine Khiat
, Mohamed El Khaili
:
Overview on technology of vertical handover and MIH architecture. 31-34 - Bashar Shahir Ahmed, Fadi Amroush, Mohammed Larbi Ben Maati:

The implementation trends of intelligence E-CRM in business process. 35-39 - Abir El Yamami, Khalifa Mansouri

, Mohammed Qbadou
, El Hossein Illoussamen:
Toward a new multi-agents architecture for the adoption of ITIL framework by small and medium-sized enterprises. 40-45 - Nouha Zellal, Abdellah Zaouia:

A measurement model for factors influencing data quality in data warehouse. 46-51 - Houda Chakiri, Mohammed El Mohajir

:
A data warehouse for local good governance monitoring and assessement - Case study of local registry office in Morocco. 52-58 - Amina El Ouazzani, Sara Rhazlane, Nouria Harbi, Hassan Badir

:
Dynamic management of data warehouse security levels based on user profiles. 59-64 - Meryem Elallaoui, Khalid Nafil

, Rajaa Touahni:
Automatic generation of TestNG tests cases from UML sequence diagrams in Scrum process. 65-70 - Fadoua Khennou

, Youness Idrissi Khamlichi
, Nour El Houda Chaoui
:
Designing a health data management system based hadoop-agent. 71-76 - Zoubida Alaoui Mdaghri, Mourad El Yadari, Abdelillah Benyoussef, Abdellah El Kenz:

Study and analysis of data mining for healthcare. 77-82 - Naziha Laaz

, Samir Mbarki:
A model-driven approach for generating RIA interfaces using IFML and ontologies. 83-88 - Marouane Sayih, Anne Brüggemann-Klein:

Using XML technology in the development process of web applications. 89-93 - Yasser Saissi, Ahmed Zellou

, Ali Idri:
Towards XML schema extraction from deep web. 94-99 - Hajar Sahbani, Mohamed El Marraki:

Robustness study in closed social networks using spanning tree approach. 100-103 - Maria Zemzami, Norelislam El Hami, Mhamed Itmi, Nabil Hmina

:
A new parallel approach for the exploitation of the search space based on PSO algorithm. 104-110 - Sara Ahajjam, Mohamed El Haddad, Hassan Badir

:
Influentials identification for community detection in complex networks. 111-115 - Yassine Rhazali

, Youssef Hadi
, Abdelaziz Mouloudi:
A model transformation in MDA from CIM to PIM represented by web models through SoaML and IFML. 116-121 - Ilhame El Farissi

, Ilham Slimani
, Saïd Achchab:
Coordination by sharing demand forecasts in a supply chain using game theoretic approach. 122-127 - Mohamed Naoum

, Outman El Hichami
, Mohammed Al Achhab, Badr Eddine El Mohajir:
A probabilistic method for business process verification: Reachability, Liveness and deadlock detection. 128-132 - Mohssine El Ajjouri, Siham Benhadou, Hicham Medromi:

New model of intrusion detection based on multi agent systems and CBR paradigm. 133-138 - El Mostapha Chakir

, Youness Idrissi Khamlichi
, Mohamed Moughit
:
Handling alerts for intrusion detection system using stateful pattern matching. 139-144 - Ilhame El Farissi

, Mohammed Saber
, Sara Chadli
, Mohamed Emharraf
, Mohammed Ghaouth Belkasmi
:
The analysis performance of an Intrusion Detection Systems based on Neural Network. 145-151 - Abdelhamid Zouhair

, El Mokhtar En-Naimi
:
Big incremental dynamic case-based reasoning-multi-agents system (BIDCBR-MAS) based on cloud computing. 152-157 - Surya Sumarni Hussein

, Zuraini Ismail, Mohd Naz'ri Mahrin, Mohd Shahidan Abdullah, Nor Zairah Ab Rahim
, Ganthan Narayana Samy, Mohamad Zainuddi Mat Taib:
Towards designing an EA readiness instrument: A systematic review. 158-163 - Chafik Baidada, Abdeslam Jakimi

:
Towards new hybrid approach of the reverse engineering of UML sequence diagram. 164-168 - Meryem Boufim, Hafid Barka:

Converting strangers to clients using web mining techniques. 169-174 - Younes Tiamaz

, Nissrine Souissi
:
Meta-analysis of lean case studies for the business process improvement. 175-181 - Wissam Abbass, Amine Baïna, Mostafa Bellafkih

:
Improvement of information system security risk management. 182-187 - Khadija Louzaoui

, Khalid Benlhachmi
, Jihane Alami Chentoufi:
Conformity testing by optimal constraints for object oriented programs. 188-193 - Btissam Zerhari, Ayoub Ait Lahcen

, Salma Mouline:
Detection and elimination of class noise in large datasets using partitioning filter technique. 194-199 - Zouhair Ibn Batouta

, Rachid Dehbi
, Mohamed Talea
, Omar Hajoui:
Automation in code generation: Tertiary and systematic mapping review. 200-205 - Amine Agharghor, Mohammed Essaid Riffi

, Faycal Chebihi:
A memetic hunting search algorithm for the traveling salesman problem. 206-209 - Saida Haidrar

, Adil Anwar, Ounsa Roudiès
:
Towards a generic framework for requirements traceability management for SysML language. 210-215 - Pierre-Aymeric Masse, Nassim Laga, Oussama Mohammed Kherbouche, Jacques Simonin:

An approach based on ontology for discovering data impacting the execution of a business process. 216-221 - Khadija Letrache, Omar El Beggar

, Mohammed Ramdani:
Modeling and creating KPIs in MDA approach. 222-227 - Driss El Hannach, Rabia Marghoubi

, Mohamed Dahchour:
Project portfolio management information systems (PPMIS) information entropy based approch to prioritize PPMIS. 228-234 - Saïda Boukhedouma, Zaia Alimazighi, Mourad Chabane Oussalah:

Evolution of inter-organizational workflows: The case-transfer pattern. 235-242 - Mohssen El Ansary, Mourad Oubrich:

State of the art and trends of the research on XBRL bibliometric analysis from 2000-2014. 243-250 - Zineb Gotti, Samir Mbarki:

GUI structure and behavior from Java source code analysis. 251-256 - Akachar Elyazid

, Brahim Ouhbi, Bouchra Frikh:
A comparative study of some algorithms for detecting communities in social networks. 257-262 - Hasna El Alaoui El Abdallaoui

, Abdelaziz El Fazziki
, Abderrahmane Sadiq, Fatima Zohra Ennaji
, Mohammed Sadgal
:
A web based crowdsourcing framework: Lost child case. 263-268 - Lamiae Chtioui, Amine Baïna, Mostafa Bellafkih

:
Towards the conception of a new approach for modeling interdependencies in Critical Infrastructures. 269-274 - Hanane Assellaou, Brahim Ouhbi, Bouchra Frikh:

CCSD and TOPSIS methodology for selecting supplier in a paper company. 275-280 - Mohamed Rachdi

, El Houssine Labriji, El Habib Benlahmar
:
Interactive approach of enrichment of queries based on ontologies. 281-285 - Houda Essalmi, Mohamed El Far, Mohammed El Mohajir, Mohamed Chahhou:

A novel approach for mining frequent itemsets: AprioriMin. 286-289 - Meryem Ouahilal, Mohammed El Mohajir

, Mohamed Chahhou, Badr Eddine El Mohajir:
Optimizing stock market price prediction using a hybrid approach based on HP filter and support vector regression. 290-294 - Driss Allaki, Mohamed Dahchour, Abdeslam En-Nouaary:

Detecting and fixing UML model inconsistencies using constraints. 295-299 - Azzeddine Dahbi

, Mohammed Mouhir, Youssef Balouki
, Taoufiq Gadi
:
Classification of association rules based on K-means algorithm. 300-305 - Zakariae Alami Merrouni

, Bouchra Frikh
, Brahim Ouhbi:
Automatic keyphrase extraction: An overview of the state of the art. 306-313 - Moulay El Hassan Charaf

, Salma Azzouzi
:
Timed distributed testing rules for the distributed test architecture. 314-319 - Sara Ibn El Ahrache, Hassan Badir

, Parisa Ghodous
, Abderrahmane Sbihi:
Permanent participatory data security in a cloud computing environment. 320-324 - Mustapha Khalfi

, Ouafae Nahli
, Arsalane Zarghili
:
Classical dictionary Al-Qamus in lemon. 325-330 - Ridouane Tachicart

, Karim Bouzoubaa, Hamid Jaafar:
Lexical differences and similarities between Moroccan dialect and Arabic. 331-337 - Nabil Alami

, Mohammed Meknassi, Saïd El Alaoui Ouatik
, Noureddine Ennahnahi
:
Impact of stemming on Arabic text summarization. 338-343 - Jaouad Outifa, Si Lhoussain Aouragh

, Saïd El Alaoui Ouatik
:
Integration of data sources in an automatic corrector of Arabic texts. 344-348 - Zakaria El Maazouzi, Badr Eddine El Mohajir, Mohammed Al Achhab, Adnan Souri

:
Development of a bilingual corpus of Arabic and Arabic Sign Language based on a signed content. 349-354 - Giuliano Lancioni, Raoul Villano, Francesca Romana Romani:

The self-similar Qur'an project: Automatic detection of internal similarity in classical Arabic texts. 355-360 - Waleed Alabbas, Haider M. Al-Khateeb

, Ali Mansour:
Arabic text classification methods: Systematic literature review of primary studies. 361-367 - Yassine El Adlouni

, Imane Lahbari
, Horacio Rodríguez, Mohammed Meknassi, Said Ouatik El Alaoui
, Noureddine Ennahnahi
:
Using domain knowledge and bilingual resources for addressing community question answering for Arabic. 368-373 - Giulia Benotto

, Emiliano Giovannetti
, Ouafae Nahli
:
An application of distributional semantics for the analysis of the Holy Quran. 374-379 - Fahd Alqasemi

, Amira Abdelwahab
, Hatem M. Abdelkader:
An enhanced feature extraction technique for improving sentiment analysis in Arabic language. 380-384 - Abdelkader El Mahdaouy

, Said Ouatik El Alaoui
, Éric Gaussier:
Semantically enhanced term frequency based on word embeddings for Arabic information retrieval. 385-389 - Simona Olivieri

, Ivana Pepe, Ilaria Cicola:
Encoding Arabic rhetorical structure: A methodology for the extraction of Arabic lexical information from TEI-encoded classical sources. 390-394 - Giuliano Lancioni, Elisa Gugliotta

, Valeria Pettinari:
Lahajat: A rule-based converter of standard Arabic lexical databases into spoken Arabic forms. 395-399 - Khalid A. Al-Afandy

, Osama S. Faragallah
, Ahmed Elmhalawy
, El-Sayed M. El-Rabaie
, Ghada M. El Banby:
High security data hiding using image cropping and LSB least significant bit steganography. 400-404 - Hiba Chougrad

, Hamid Zouaki, Omar Alheyane:
An improved breast tissue density classification framework using bag of features model. 405-409 - Khadija Arhid

, Mohcine Bouksim
, Fatima Rafii Zakani
, Mohamed Aboulfatah
, Taoufiq Gadi
:
New evaluation method using sampling theory to evaluate 3D segmentation algorithms. 410-415 - Fatima Rafii Zakani

, Khadija Arhid
, Mohcine Bouksim
, Mohamed Aboulfatah
, Taoufiq Gadi
:
New measure for objective evaluation of mesh segmentation algorithms. 416-421 - Abdelhamid El Hassani, Aicha Majda:

Efficient image denoising method based on mathematical morphology reconstruction and the Non-Local Means filter for the MRI of the head. 422-427 - Salah Eddine Lahlali, Abdelalim Sadiq, Samir Mbarki:

Face sketch recognition system: A content based image retrieval approach. 428-433 - Meryam El Mouhtadi

, Sanaa El Fkihi, Driss Aboutajdine:
Fingerprints indexing algorithms based on multiple characteristics. 434-437 - Mohcine Bouksim

, Fatima Rafii Zakani
, Khadija Arhid
, Mohamed Aboulfatah
, Taoufiq Gadi
:
New evaluation method for 3D mesh segmentation. 438-443 - Khalid A. Al-Afandy

, Osama S. Faragallah
, El-Sayed M. El-Rabaie
, Fathi E. Abd El-Samie, Ahmed Elmhalawy
:
A hybrid scheme for robust color image watermarking using DSWT in DCT domain. 444-449 - My Abdelouahed Sabri

, Assia Ennouni, Abdellah Aarab:
Automatic estimation of clusters number for K-means. 450-454 - Ghannam Tarik, Abbad Khalid

, Jamal Kharroubi, Dafr Allah Benajah:
Polyps's region of interest detection in colonoscopy images by using clustering segmentation and region growing. 455-459 - N. Aitali, Bouchaib Cherradi

, Ahmed El Abbassi
, Omar Bouattane
, Mohamed Youssfi
:
GPU based implementation of spatial fuzzy c-means algorithm for image segmentation. 460-464 - Assia Ennouni, My Abdelouahed Sabri

, Saloua Senhaji
, Abdellah Aarab:
Robust approach for textured image clustering. 465-470 - Mohamed Oualla

, Abdelalim Sadiq:
Rotated asymetrique haar features for face detection. 471-475 - Elhoussaine Ouabida

, Abdelaziz Essadike
, Abdenbi Bouzid:
Optical approach for iris segmentation and tracking. 476-480 - Omar Herouane, Lahcen Moumoun

, Taoufiq Gadi
, Mohamed Chahhou:
An automatic framework for 3D objects-parts learning. 481-486 - Hamid Ouanan

, Mohammed Ouanan, Brahim Aksasse
:
Facial landmark localization: Past, present and future. 487-493 - Nihad Elghouch, El Mokhtar En-Naimi

, Yassine Zaoui Seghroucheni
, Badr Eddine El Mohajir, Mohammed Al Achhab:
ALS_CORR[LP]: An adaptive learning system based on the learning styles of Felder-Silverman and a Bayesian network. 494-499 - Naoual Boukil, Abdelali Ibriz:

A MAS model for virtual labs based on cloud computing. 500-505 - Aymane Qodad, Yassine Zaoui Seghroucheni

, Mohammed Al Achhab, M. El Yadari, Abdellah El Kenz, A. Benyoussef:
An adaptive learning system based on a Job model, the differentiated instruction and Felder and Silverman's learning styles model. 506-510 - Abderrahim El Mhouti

, Azeddine Nasseh, Mohamed Erradi:
Towards a collaborative e-learning platform based on a multi-agents system. 511-516 - Amin Zammouri

, Sanae Zrigui, Abdelaziz Aït Moussa
:
Evaluating usability of brain signals for content adaptation in intelligent tutoring systems. 517-520 - Amal Rifai, M'hamed Bakrim, Rochdi Messoussi, Abdelalim Sadiq:

Modeling of learning scenario adopting case study strategy by recursive entity modeling method. 521-526 - Hind Hayati

, Jihane Sophia Tahiri, Mohammed Khalidi Idrissi, Samir Bennani
:
Classification system of learners engagement within Massive Open Online Courses. 527-530 - Othman El Harrak

, Slimani Abdelali, Jaber El Bouhdidi
:
Education data mining: Mining MOOCs videos using metadata based approach. 531-534 - Inssaf El Guabassi

, Mohammed Al Achhab, Ismail Jellouli, Badr Eddine El Mohajir:
Recommender system for ubiquitous learning based on decision tree. 535-540 - Hamid Slimani, N. El Faddouli

, Rachid Benslimane
, Samir Bennani
:
Personalized search and recommendation in a digital educational resources repository: The case of ORI-OAI. 541-546 - Meriem Hnida, Mohammed Khalidi Idrissi, Samir Bennani

:
A novel approach for smart curriculum sequencing based on HSA evolutionary computation. 547-552 - Oumayma Chergui, Ahlame Begdouri

, Dominique Groux:
CBR approach for knowledge reuse in a community of practice for university students. 553-558 - Zakaria Itahriouan

, Noura Aknin, Anouar Abtoy
, Kamal Eddine El Kadiri:
An experimental study of software engineering learning using IDE 2.0. 559-563 - Soundous Zougari, Mariam Tanana

, Abdelouahid Lyhyaoui:
Hybrid assessment method for programming assignments. 564-569 - Sanae Chehbi

, Rachid Elouahbi, Fatima El Khoukhi:
Collection and transformation of Moodle traces. 570-574 - Lotfi Najdi, Brahim Er-Raha:

Implementing cluster analysis tool for the identification of students typologies. 575-580 - Mohammed Ouadoud

, Mohamed Yassin Chkouri
, Amel Nejjari
, Kamal Eddine El Kadiri:
Studying and comparing the free e-learning platforms. 581-586 - Sara Mernissi Arifi, Ismail Nait Abdellah Ouali, Rachid Benabbou

, Azeddine Zahi
:
Automated fault localizing and correction in dynamically analyzed programs. 587-592 - Abdul Rahman Ahmad Dahlan, Sarifah Abdullah, Mohamed Ridza Wahiddin:

Intellectual assets and knowledge audit as a fundamental step for the "University of the Future" transformation. 593-599 - Jamaludin Ibrahim, Abdul Rahman Ahmad Dahlan:

Designing business models options for "University of the Future". 600-603 - Biao Yin

, Mahjoub Dridi, Abdellah El Moudni:
Comparing dynamic programming based algorithms in traffic signal control system. 604-609 - Labib Sadek Terrissa

, Safa Meraghni
, Zahra Bouzidi, Noureddine Zerhouni:
A new approach of PHM as a service in cloud computing. 610-614 - Abderrahim Abdellaoui

, Anas Laksantini, Habiba Chaoui
:
A security scheme for mobile cloud using multi-agents system. 615-620 - M. C. Sekkal, Nasreddine Berrached

, Kamal Medjaher, Christophe Varnier
:
Skeleton of a generic approach for the generation of health indicators of physical systems. 621-626 - Jinjian Li, Mahjoub Dridi, Abdellah El Moudni:

A cooperative traffic control for the vehicles in the intersection based on the Genetic Algorithm. 627-632 - Ouadi Belmokhtar, Dalila Chiadmi:

A cloud services composition approach based on customer's models and cloud services vendor's rules and specifications. 633-637 - Younès El Bouzekri El Idrissi

, Fatna Elmendili
, Nisrine Maqrane:
A security approach for social networks based on honeypots. 638-643 - Omar Bendaou, Otmane Bendaou, Abdelkhalak El Hami

, Mohamed Agouzoul:
Thermal characterization of a QFN electronic Package accompanied by a reliability study based on a response surface approach. 644-647 - Meryem Fakhouri Amr, Khalifa Mansouri

, Abdelwahab Naji
:
Toward the development of a hybrid model of ontological database for the interoperability of several information systems. 648-653 - Hanane El Manssouri, Soufiane Farrah, El Houssaine Ziyati

, Mohammed Ouzzif:
Proposition of improvement areas in most heavy an light stemmer algorithms novel stemmer: EST.Stemmer. 654-657 - Mbarek Marwan

, Ali Kartit, Hassan Ouahmane:
Applying homomorphic encryption for securing cloud database. 658-664 - Aicha Koulou, Norelislam El Hami, Nabil Hmina

, Abir Elmir, Bouchaib Bounabat:
A novel approach IMA of interoperability measurement. 665-669 - Ahmed Guerine, Abdelkhalak El Hami

:
Uncertainty analysis of one stage gear system using interval analysis method. 670-674 - Tarik Hajji

, Sidi Yasser El Jasouli, Jamal Mbarki, El Miloud Jaâra:
Microfinance risk analysis using the business intelligence. 675-680 - Chaimae Saadi

, Habiba Chaoui
:
Intrusion detection system based interaction on mobile agents and clust-density algorithm "IDS-AM-Clust". 681-684 - Miguel Kpakpo, Mhamed Itmi:

A MAS model for O&M cost simulation and optimization: Case of a wind power operator. 685-689 - Rabii El Maani, Ahmed Tchvagha Zeine

, Bouchaib Radi, Abdelkhalak El Hami
, Rachid Ellaia:
Backtracking search optimization algorithm for fluid-structure interaction problems. 690-695 - Akhrif Asmae, Abdelouahid Lyhyaoui, Abdelfettah Sedqui:

Sequencing optimization of products with high diversity. 696-701 - Jamal Elhachimi

, Zouhair Guennoun
:
Evolutionary algorithm for dynamic spectrum allocation in cognitive radio system. 702-706 - Mouhcine Elgarej, Khalifa Mansouri

, Mohamed Youssfi
:
An improved swarm optimization algorithm for vehicle path planning problem. 707-712 - Mohammed Nassraoui

, Bouchaib Radi:
Study of optimizing a tube hydroforming. 713-718 - Kawtar Akoudad, Fouad Jawab

:
Design and deployment of the model 'TSI' for modeling the processes of the IRFT chain between Morocco and Spain. 719-724 - Norelislam El Hami, Mustapha Bouchekourte:

Optimising liquidity with modified particle swarm optimization application: Case of Casablanca stock exchange. 725-729 - Ismail Sossey-Alaoui, Bouchaib Radi:

Modal and probabilistic analysis of wind turbine blade under air-flow. 730-735 - Hasnae L'Amrani, Badr Eddine Berroukech, Younès El Bouzekri El Idrissi

, Rachida Ajhoun:
Identity management systems: Laws of identity for models7 evaluation. 736-740 - Mounia Aarich, Hanaa Hachimi

, Nabil Hmina
:
State of art of optimisation and meta heuristic a comparative study of the Harmony Search Algorithm. 741-745 - Ibn El Farouk Imane, Foaud Jawab

, Abdennebi Talbi:
From modeling to logistic KPI Use of SCOR model and ARIS to build a dashbord to manage medicines supply chain in moroccan public hospital. 746-750 - Ali Ou-yassine

, Abdellah Bnouhachem, Ibn Zohr, Fatimazahra Benssi:
A new approximate proximal-extragradient type method for system of monotone variational inequalities. 751-755 - N. Saadoune, Bouchaib Radi:

Probabilistic study an embedded system. 756-761 - Abdelmajid Bousselham

, Omar Bouattane
, Mohamed Youssfi
, Abdelhadi Raihani
:
Toward an efficient brain tumor extraction using level set method and pennes bioheat equation. 762-767 - Derkaoui Orkia, Ahmed Lehireche:

Solving the max-cut problem using semidefinite optimization. 768-772 - Adil Bouhouch

, Loqman Chakir
, Abderrahim El Qadi:
Scheduling meeting solved by neural network and Min-conflict heuristic. 773-778 - Nawal Ait Aali

, Younes El Bouzekri El Idrissi
, Amine Baïna, Loubna Echabbi:
Collaboration decision making based on AHP method in Tr-OrBAC model: Case study. 779-784 - Bouchaib Radi, Bochar Laarabi:

A new approach based a genetic algorithm for the selective travelling salesman problem. 785-788 - Kamal Souali

, Othmane Rahmaoui
, Mohammed Ouzzif:
An overview of traceability: Definitions and techniques. 789-793 - Chaimae El Hatri, Jaouad Boumhidi

:
Q-learning based intelligent multi-objective particle swarm optimization of light control for traffic urban congestion management. 794-799 - Kaoutar Ben Ahmed, Mohammed Bouhorma

, Mohamed Ben Ahmed, Atanas Radenski:
Visual sentiment prediction with transfer learning and big data analytics for smart cities. 800-805 - Ikram Belhajem, Yann Ben Maissa

, Ahmed Tamtaoui:
A robust low cost approach for real time car positioning in a smart city using Extended Kalman Filter and evolutionary machine learning. 806-811 - Karim El Mokhtari

, Serge Reboul, Jean-Bernard Choquel, Benaissa Amami
, Mohammed Benjelloun
:
Indoor localization by particle map matching. 812-817 - Nadia Oukrich, Abdelilah Maach, ElMehdi Sabri, ElMahdi Mabrouk, Kevin Bouchard:

Activity recognition using back-propagation algorithm and minimum redundancy feature selection method. 818-823 - Imad El Fachtali, Rachid Saadane

, Mohammed El Koutbi, Hasna Chaibi:
Power-optimized vertical handover scheme for 4th generation heterogeneous wireless network. 824-829 - Ayoub Bouroumine, Mustapha Zekraoui, Abdelilah Maach:

The influence of the opportunistic vehicular networks on smart cities management study case on Agdal district in Rabat city. 830-834 - Chaymae Benfares

, Younes El Bouzekri El Idrissi
, Aouatif Amine
:
Smart city: Recommendation of personalized services in patrimony tourism. 835-840 - Saida El Mendili

, Younes El Bouzekri El Idrissi
, Nabil Hmina
:
Benchmarking study on smart city data analytics. 841-846 - Anouar Boudhir, Mohammed Benahmed, Abderrahim Ghadi, Mohammed Bouhorma

:
Vehicular navigation spoofing detection based on V2I calibration. 847-849 - Ihedrane Mohammed Amine, Seddik Bri:

2-D DOA estimation using MUSIC algorithm with uniform circular array. 850-853 - Imane Worighi

, Abdelilah Maach, Abdelhakim Hafid:
Smart grid architecture and impact analysis of a residential microgrid. 854-859 - Raja Ettiane, Rachid Elkouch, Abdelaali Chaoub

:
Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives. 860-866 - Fatima Ezzahra Nadir

, Ibrahim Hadj Baraka
, Mohammed Bsiss
, Benaissa Amami
:
Influence of failure modes and effects analysis on the average probability of failure on demand for a safety instremented system. 867-871 - Badr Benamrou

, Benahmed Mohamed, Abdes-Samed Bernoussi, Mustapha Ouardouz:
Ranking models of smart cities. 872-879 - My Driss Laanaoui, Said Raghay:

New routing process in VANET. 880-885 - Yassine Hernafi, Mohamed Ben Ahmed

, Mohammed Bouhorma
:
An approaches' based on intelligent transportation systems to dissect driver behavior and smart mobility in smart city. 886-895 - M. Ait Kbir, M. Bennani:

Round time adaptation for image transfering over wireless sensor networks leach protocol. 896-900 - Soufiane Oukili, Seddik Bri, A. V. Senthil Kumar:

High speed efficient FPGA implementation of pipelined AES S-Box. 901-905 - Soumaya El Mamoune, Mostafa Ezziyyani

, Achraf Taitai:
Modelling of context Information for disaster emergency system application: Flood. 906-911 - Aziz Mahboub

, El Mokhtar En-Naimi
, Mounir Arioua
, Imad Ez-Zazi
, Ahmed El Oualkadi
:
Multi-zonal approach clustering based on stable election protocol in heterogeneous wireless sensor networks. 912-917 - Andrei Borozdukhin, Olga N. Dolinina, Vitaly V. Pechenkin

:
Approach to the garbage collection in the "Smart Clean City" project. 918-922 - Hamid Barkouk, El Mokhtar En-Naimi

:
Development of an alert message dissemination protocol based on LEACH protocol to improve VANET road safety. 923-928 - Mohamed Yassine Zarouk

, Mohamed Khaldi
:
Metacognitive learning management system supporting self-regulated learning. 929-934

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














