Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
FaEl Bouanani, Ben-Azza, Hb, et Belkasmi, Ma, « Novel results for the spectral efficiency and symbol error rate of GSC receiver over identical and uncorrelated weibull fading channels », in 2014 World Congress on Computer Applications and Information Systems, WCCAIS 2014, 2014.
F. El Bouanani, « A New Closed-Form Approximations For MRC Receiver Over Non-Identical Weibull Fading Channels », in 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, p. 600-605.
N. Boudad, Ezzahid, S., Faizi, R., et Thami, R. O. H., « Exploring the Use of Word Embedding and Deep Learning in Arabic Sentiment Analysis », Advances in Intelligent Systems and Computing, vol. 1105 AISC, p. 243-253, 2020.
N. Boudad, Faizi, R., R. Thami, O. Haj, et Chiheb, R., « Sentiment analysis in Arabic: A review of the literature », Ain Shams Engineering Journal, vol. 9, p. 2479-2490, 2018.
N. Boudad, Faizi, R., R. Thami, O. Haj, et Chiheb, R., « Sentiment analysis in Arabic: A review of the literature », Ain Shams Engineering Journal, 2017.
N. Boudad, Faizi, R., Thami, R. O. H., et Chiheb, R., « Sentiment classification of Arabic tweets: A supervised approach », Journal of Mobile Multimedia, vol. 13, p. 233-243, 2017.
C. Boudagdigue, Benslimane, A., Kobbane, A., et Liu, J., « Trust Management in Industrial Internet of Things », IEEE Transactions on Information Forensics and Security, vol. 15, p. 3667-3682, 2020.
C. Boudagdigue, Benslimane, A., et Kobbane, A., « Cluster-based certificate revocation in industrial IOT networks using Signaling game », in 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, 2020.
C. Boudagdigue, Benslimane, A., Kobbane, A., et Elmachkour, M., « A Distributed Advanced Analytical Trust Model for IoT », in IEEE International Conference on Communications, 2018, vol. 2018-May.
A. Boudaoud, Abdelmounim, E., Barazzouk, A., Zbitou, J., et Belkasmi, M., « FPGA Implementation of HIHO and SIHO Decoders for DSC Codes », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 1461-1464.
M. Boughrous et H. Bakkali, E., « A comparative study on access control models and security requirements in workflow systems », Advances in Intelligent Systems and Computing, vol. 735, p. 361-373, 2018.
M. Boughrous et H. Bakkali, E., « A Workflow Criticality-Based Approach to Bypass the Workflow Satisfiability Problem », Security and Communication Networks, vol. 2021, 2021.
M. Boughrous, H. Bakkali, E., et A. Kandoussi, E., « The Pandemic Impact on Organizations Security and Resiliency: The Workflow Satisfiability Problem », Lecture Notes in Networks and Systems, vol. 420 LNNS, p. 321-329, 2022.
T. Bouhouche, Khaddar, M. A. El, Boulmalf, M., Bouya, M., et Elkoutbi, M., « A new Middleware Architecture for the integration of RFID technology into information systems », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 1025-1030.
Tab Bouhouche, Khaddar, M. AaEl, Boulmalf, Ma, Bouya, Ma, et Elkoutbi, Mb, « A new middleware architecture for the integration of RFID technology into information systems », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 1025-1030.
Tab Bouhouche, Boulmalf, Ma, Bouya, Ma, et Elkoutbi, Mb, « A new middleware architecture for RFID systems », in Mediterranean Microwave Symposium, 2015, vol. 2015-April.
H. Bouijij et Berqia, A., « Machine Learning Algorithms Evaluation for Phishing URLs Classification », in 2021 4th International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2021, 2021.
H. Bouijij, Berqia, A., et Saliah-Hassan, H., « Phishing URL classification using Extra-Tree and DNN », in 10th International Symposium on Digital Forensics and Security, ISDFS 2022, 2022.
Ha Bouirouga, Elfkihi, Sb, Jilbab, Ac, et Aboutajdine, Da, « Neural network adult videos recognition using jointly face shape and skin feature extraction », in VISAPP 2013 - Proceedings of the International Conference on Computer Vision Theory and Applications, 2013, vol. 1, p. 422-425.
H. Bouirouga, Lrit, S. E., Jilbab, A., et Aboutajdine, D., « Recognition of adult video by combining skin detection features with motion information », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
H. Bouirouga, S. Fkihi, E., Jilbab, A., et Bakrim, M., « A comparison of skin detection techniques for objectionable videos », in 2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010, 2010.
F. E. Boujida, Amazal, F. A., et Idri, A., « Neural networks based software development effort estimation: A systematic mapping study », in Proceedings of the 16th International Conference on Software Technologies, ICSOFT 2021, 2021, p. 102-110.
M. Boukadidi, « Make or buy decision making for telcos towards an Intelligent Transaction Cost Economics (TCE) Support System », in International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 7-13.
M. Boukbab et Nafil, K., « Student’s Behaviors Analysis in Classroom Context Using IoT: A Systematic Mapping Study », Lecture Notes in Networks and Systems, vol. 469 LNNS, p. 401-412, 2022.
K. Boukhayma et Elmanouar, A., « Evaluating decision support systems », in International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 404-408.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:567,131
    Education - This is a contributing Drupal Theme
    Design by WeebPal.