


default search action
ICIST 2020: Lecce, Italy
- Mohamed Ridda Laouar, Antonio Capodieci:

ICIST '20: 10th International Conference on Information Systems and Technologies, Lecce, Italy, 4-5June, 2020. ACM 2020, ISBN 978-1-4503-7655-6 - Abdeljalil Gattal

, Faycel Abbas:
Isolated Handwritten Digit Recognition Using LPQ and LBP Features. 1:1-1:5 - Mostefa Hamdani, Youcef Aklouf, Hichem Chaalal:

A Comparative Study on Load Balancing Algorithms in Cloud Environment. 2:1-2:4 - Djamila Hammouche, Karim Atif, Mourad Loukam:

An Expert System for Fuzzy Server Failure Data Warehouse Analysis. 3:1-3:6 - Hanane Azzaoui, Akram Zine Eddine Boukhamla

:
Two-Stages Intrusion Detection System Based On Hybrid Methods. 4:1-4:7 - Wedjdane Nahili, Khaled Rezeg, Okba Kazar

:
Sentiment analysis on product reviews data using supervised learning: A comprehensive review of recent techniques. 5:1-5:6 - Abdelkader Khobzaoui

, Mohamed Benhamouda, Mahmoud Fahsi
:
Data mining Contribution to Intrusion Detection Systems Improvement. 6:1-6:8 - Mohammed Tayebi

, Riadh Baba-Ali:
BEPSO: Bees Elitist Particle Swarm Optimization for Solving Constrained Engineering Optimization Problems. 7:1-7:4 - Babahadj Abdeljabar, Lakhdar Rahmani, Bellaoui Mebrouk, Kada Bouchouicha

:
Estimating daily diffuse solar radiation using neuro-fuzzy, fuzzy C-means and subtractive clustering: Case study: Adrar, Algeria. 8:1-8:6 - Bellaoui Mebrouk, Kada Bouchouicha

, Aoun Nouar, Oulimar Brahim, Babahadj Abdeljabar:
Auto regression Integrated moving average (ARIMA) to estimate temporal series of global solar radiation from measured data: Adrar region study. 9:1-9:4 - Sara Gasmi, Tahar Bouhadada, Abdelmadjid Benmachiche:

Survey on Recommendation Systems. 10:1-10:7 - Brahim Berbaoui, Djamel Saba, Rachid Dehini, Tahar Touahri, Youcef Hammaoui, Abdeldjalil Dahbi, Mouedj Rachid, Abdel adjaber Babahadj:

Optimization of shunt active filter connected to electrical network system using fuzzy logic controller based on ant colony algorithm. 11:1-11:7 - Bektache Djamel

, Mohamed Amine Yakoubi, Ghoualmi Nacera Zine:
Forecasting approach for Blind Spot Collision Alert. 12:1-12:5 - Chahreddine Medjahed

, Freha Mezzoudj, Abdellatif Rahmoun
, Christophe Charrier:
On an Empirical Study: Face Recognition using Machine Learning and Deep Learning Techniques. 13:1-13:9 - Nizar Zaghden

, Sirine Ammar, Mahmoud Neji:
Segmentation and detection of Human Face. 14:1-14:5 - Mahdia Azzouz, Saïda Boukhedouma, Zaia Alimazighi:

A Method and a Tool for Commercial Performance Evaluation of a Company: The case of a "Mobile Telephony Operator". 15:1-15:11 - Sean Eom, Mohamed Ridda Laouar:

THE EMERGENCE OF DIGITAL DISTANCE LEARNING. 16:1-16:5 - Wiem Ben Khalifa

, Najet Medssia, Dalila Souilem Boumiza, Mahmoud Neji:
Online evaluation method based on open and short answers. 17:1-17:5 - Asma Hadj-Mbarek, Ahmed Maalel:

Towards a Collection Data Approach to Crisis Situation Based on Ontologies. 18:1-18:6 - Ahlem Mellouk, Abdelmadjid Benmachiche:

A survey on Navigation Systems in Dynamic Environments. 19:1-19:7 - Rachid Dabou

, Abderrezzaq Ziane
, Ahmed Bouraiou
, Nordine Sahouane
, Ammar Neçaibia, Seyfallah Khelifi, Abdelkarim Rouabhia:
A PV-UPS Developed For The Monitoring Of PV Systems. 20:1-20:4 - Tahar Touahri, Rachid Maouedj, Brahim Berbaoui, Miloud Benmedjahed

:
Study and Sizing of Stand-Alone Photovoltaic System Using PVsyst Software. 21:1-21:4 - Soufiene Ben Othman, Abdullah Ali Bahattab, Abdelbasset Trad

, Habib Youssef:
LSDA: Lightweight Secure Data Aggregation Scheme in Healthcare using IoT. 22:1-22:4 - Sakina Rim Bennabi, Zakaria Elberrichi:

Feature Selection based Arabic Text Classification using Different Machine Learning Algorithms: Comparative Study. 23:1-23:5 - Dalel Kanzari

, Wejden Abdallah, Rania Garrouch Ouardani:
A combined Ratio-Emotional Architecture to Model Agent Behavior in Emergency Situation. 24:1-24:5 - Amany Alnahdi

:
Mobile Application Development Ontology. 25:1-25:6 - Zineb Biallaten, Raddouane Chiheb, Abdellatif El Afia

:
Truss Optimization using the Simulated Annealing Algorithm. 26:1-26:5 - Miloud Benmedjahed

, Rachid Maouedj
, Samir Mouhadjer, Abdeldjalil Dahbi, Djamel Saba, Tahar Touahri:
Wind Energy Source Assessment for Four Locations in the Adrar Region: Southern Algeria. 27:1-27:6 - Oyepeju Oyekola, Lai Xu

:
Selecting SaaS CRM Solution for SMEs. 28:1-28:9 - Go Muan Sang

, Lai Xu
, Paul de Vrieze
, Yuewei Bai, Fangyu Pan:
Predictive Maintenance in Industry 4.0. 29:1-29:11 - Adriana Caione, Alessandro Fiore, Luca Mainetti, Luigi Manco, Roberto Vergallo:

Refactoring the UX of a popular voice application. 30:1-30:4 - Wissal Daoudi, Karim Doumi

, Laila Kjiri:
Adaptive Enterprise Architecture: Towards a model. 31:1-31:7 - Angelo Corallo, Mariangela Lazoi, Roberto Paiano

, Fabrizio Striani:
Application of Process Mining in Teleconsultation Healthcare: Case study of Puglia Hospital. 32:1-32:13 - Antonio Capodieci, Luca Mainetti, Flavio Dipietrangelo:

Model-Driven approach to Cyber Risk Analysis in Industry 4.0. 33:1-33:7 - Antonio Caforio, Tobia Calogiuri, Mariangela Lazoi, Gianvito Mitrano, Roberto Paiano

:
HINT project: a BPM teleconsultation and telemonitoring platform. 34:1-34:8 - Amina Zerdani, Fateh Boutekkouk, Lakhdar Derdouri:

Formal Specification of On-Chip Communications State Of The Art. 35:1-35:5 - Aliou Badji, Youssou Dieng, Ibrahima Diop, Papa Alioune Cisse, Boubacar Diouf:

Automatic Speaker Recognition (ASR): Application in the monitoring of PLHIV in the cross-border area between the Gambia, Guinea-Bissau and Senegal. 36:1-36:9 - Hichem Ferhati, Fayçal Djeffal, Toufik Bentrcia:

Novel Infrared phototransistor based on Junctionless TFET design: Numerical Analysis and Performance Assessment. 37:1-37:5 - Toufik Bentrcia, Fayçal Djeffal, Hichem Ferhati:

An ANFIS-based Computation to Study the Degradation-related Ageing effects in Nanoscale GAA-TFETs. 38:1-38:5 - Gian Piero Zarri:

Using a High-Level Conceptual Model as a Support for the Generalized World Entities (GWEs) Paradigm. 39:1-39:8 - Hichem Chaalal, Mostefa Hamdani, Hafida Belbachir:

Finding the best between the column store and row store Databases. 40:1-40:4 - Abdelhafid Chadli

, Erwan Tranvouez, Abdelkader Ouared:
A Goal Oriented Approach for Solving Mathematical Multi-step Word Problems. 41:1-41:7 - Imad Eddine Rezzoug, Brahim Nini, Taki Eddine Berrahil:

A Vision Based Optical Measurement Technique With Augmented Reality Concepts. 42:1-42:5 - Walid Bouamra

, Moisés Díaz
, Miguel A. Ferrer
, Brahim Nini:
Off-line Signature Verification Using Multidirectional Run-Length Features. 43:1-43:8 - Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib

:
Quran content representation in NLP. 44:1-44:6 - Djamila Djebouri, Nabil Keskes:

Exploitation of ontological approaches in Big Data: A State of the Art. 45:1-45:6 - Farouk Meguellati

, Fateh Ferroudji, Bellaoui Mebrouk:
Numerical Study of the Aerodynamic Performance of a Stationary H-Darrieus-Type Vertical-Axis Wind Turbine. 46:1-46:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














