Publications

Export 2330 results:
Journal Article
Y. Lahlou, Fkihi, S. E., et Faizi, R., « Automatic Detection of Fake News on Twitter by Using a New Feature: User Credibility », Lecture Notes in Networks and Systems, vol. 489 LNNS, p. 568-580, 2022.
L. Ajallouda, Fagroud, F. Z., Zellou, A., et Benlahmar, E. H., « Automatic Key-Phrase Extraction: Empirical Study of Graph-Based Methods », Lecture Notes in Networks and Systems, vol. 489 LNNS, p. 440-456, 2022.
E. Bendriss et Regragui, B., « Automatic selection of filtering devices in a distributed intrusion prevension system », Journal of Theoretical and Applied Information Technology, vol. 53, p. 307-311, 2013.
O. Zaazaa et H. Bakkali, E., « Automatic Static Vulnerability Detection Approaches and Tools: State of the Art », Lecture Notes in Networks and Systems, vol. 357 LNNS, p. 449-459, 2022.
I. Rhouas et Nafil, K., « Avionic Software and Agile Development: A Systematic Mapping Study », Lecture Notes in Networks and Systems, vol. 469 LNNS, p. 55-65, 2022.
Ha Routaib, Badidi, Eb, Sabir, Ec, et Elkoutbi, Ma, « A bargaining nash game based adaptive negotiation of context level agreements for pervasive systems », Lecture Notes in Electrical Engineering, vol. 366, p. 91-104, 2016.
A. Sebbar, Zkik, K., Belhadi, A., Benghalia, A., Boulmalf, M., et Kettani, M. D. Ech- Cherif, « BDA-enabler Architecture Based on Cloud Manufacturing: the Case of Chemical Industry », International Journal of Supply and Operations Management, vol. 9, p. 251-263, 2022.
A. Choukri, Habbani, A., et Elkoutbi, M., « Behavior of ad hoc routing protocols in multi service traffic », Journal of Theoretical and Applied Information Technology, vol. 43, p. 208-213, 2012.
S. Bouzbita, A. Afia, E., et Faizi, R., « The behaviour of ACS-TSP algorithm when adapting both pheromone parameters using fuzzy logic controller », International Journal of Electrical and Computer Engineering, vol. 10, p. 5436-5444, 2020.
M. Elmouhtadi, Lafkik, M., et Elfkihi, S., « Biometric protection approach based on fingerprint hierarchical identification », International Journal of Applied Engineering Research, vol. 12, p. 11007-11014, 2017.
M. C. Semmouni, Nitaj, A., et Belkasmi, M., « Bitcoin security with a twisted Edwards curve », Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, p. 353-371, 2022.
Aa Bahri, Zouaki, Ha, et Thami, R. O. Hb, « BLB tree: An efficient index structure for fast search », International Review on Computers and Software, vol. 11, p. 848-858, 2016.
A. Nabil, Nafil, K., et Mounir, F., « Blockchain Security and Privacy in Education: A Systematic Mapping Study », Advances in Intelligent Systems and Computing, vol. 1161 AISC, p. 253-262, 2020.
Y. Sabri, Siham, A., et Maizate, A., « Blocking control and dynamic exchange buffer switching new approach for mobile wireless sensor networks », Journal of Theoretical and Applied Information Technology, vol. 99, p. 4132-4140, 2021.
R. Zennou, Atig, M. F., Biswas, R., Bouajjani, A., Enea, C., et Erradi, M., « Boosting Sequential Consistency Checking Using Saturation », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12302 LNCS, p. 360-376, 2020.
H. Zerouaoui, Idri, A., Nakach, F. Z., et Hadri, R. E., « Breast Fine Needle Cytological Classification Using Deep Hybrid Architectures », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12950 LNCS, p. 186-202, 2021.
F. Z. Fagroud, Ajallouda, L., Lahmar, E. H. B., Toumi, H., Zellou, A., et S. Filali, E., « A Brief Survey on Internet of Things (IoT) », Lecture Notes in Networks and Systems, vol. 211 LNNS, p. 335-344, 2021.
I. Aznabet, Ennasar, M. A., O. Mrabet, E., G. Vera, A., Khalladi, M., et Tedjni, S., « A broadband modified T-shaped planar dipole antenna for UHF RFID tag applications », Progress In Electromagnetics Research C, vol. 73, p. 137-144, 2017.
M. Ouzineb, Mhada, F., et Hallaoui, I. El, « Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach », INFOR, vol. 51, p. 15-22, 2013.
M. Ouzineb, Mhada, F., et Hallaoui, I. El, « Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach. », INFOR, vol. 51, p. 15 - 22, 2013.
E. H. Bakkali, « Bypassing Workflow Satisfiability Problem Due to Access Control Constraints », Communications in Computer and Information Science, vol. 294 PART 2, p. 178-191, 2012.
Ma Lethrech, Kenzi, Ab, Elmagrouni, Ia, Nassar, Ma, et Kriouile, Aa, « CADSSO: A development approach for contextaware service oriented systems », Journal of Theoretical and Applied Information Technology, vol. 78, p. 236-252, 2015.
I. Kadi et Idri, A., « Cardiovascular dysautonomias diagnosis using crisp and fuzzy decision tree: A comparative study », Studies in Health Technology and Informatics, vol. 223, p. 1-8, 2016.
W. Ettazi, Nassar, M., et Hafiddi, H., « CATS-CAE reflective middleware framework for adapting context-aware transactional services: Using a hybrid policy-based approach », International Journal of Web Services Research, vol. 17, p. 40-58, 2020.
F. Mourchid, Kobbane, A., Ben Othman, J., et M. Koutbi, E., « CGAM: A community and geography aware mobility model », International Journal of Communication Systems, vol. 31, 2018.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:567,173
    Education - This is a contributing Drupal Theme
    Design by WeebPal.