Publications

Export 2330 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
F. E. Bouanani, Ben-Azza, H., et Belkasmi, M., « New results for Shannon capacity over generalized multipath fading channels with MRC diversity », Eurasip Journal on Wireless Communications and Networking, vol. 2012, 2012.
S. E. M. El Bouanani et Kassou, I., « Using lexicometry and vocabulary analysis techniques to detect a signature for web profile », in Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013, 2013, p. 1494-1498.
N. Boudad, Ezzahid, S., Faizi, R., et Thami, R. O. H., « Exploring the Use of Word Embedding and Deep Learning in Arabic Sentiment Analysis », Advances in Intelligent Systems and Computing, vol. 1105 AISC, p. 243-253, 2020.
N. Boudad, Faizi, R., R. Thami, O. Haj, et Chiheb, R., « Sentiment analysis in Arabic: A review of the literature », Ain Shams Engineering Journal, vol. 9, p. 2479-2490, 2018.
N. Boudad, Faizi, R., R. Thami, O. Haj, et Chiheb, R., « Sentiment analysis in Arabic: A review of the literature », Ain Shams Engineering Journal, 2017.
N. Boudad, Faizi, R., Thami, R. O. H., et Chiheb, R., « Sentiment classification of Arabic tweets: A supervised approach », Journal of Mobile Multimedia, vol. 13, p. 233-243, 2017.
C. Boudagdigue, Benslimane, A., Kobbane, A., et Liu, J., « Trust Management in Industrial Internet of Things », IEEE Transactions on Information Forensics and Security, vol. 15, p. 3667-3682, 2020.
C. Boudagdigue, Benslimane, A., et Kobbane, A., « Cluster-based certificate revocation in industrial IOT networks using Signaling game », in 2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings, 2020.
C. Boudagdigue, Benslimane, A., Kobbane, A., et Elmachkour, M., « A Distributed Advanced Analytical Trust Model for IoT », in IEEE International Conference on Communications, 2018, vol. 2018-May.
A. Boudaoud, Abdelmounim, E., Barazzouk, A., Zbitou, J., et Belkasmi, M., « FPGA Implementation of HIHO and SIHO Decoders for DSC Codes », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 1461-1464.
M. Boughrous et H. Bakkali, E., « A comparative study on access control models and security requirements in workflow systems », Advances in Intelligent Systems and Computing, vol. 735, p. 361-373, 2018.
M. Boughrous et H. Bakkali, E., « A Workflow Criticality-Based Approach to Bypass the Workflow Satisfiability Problem », Security and Communication Networks, vol. 2021, 2021.
M. Boughrous, H. Bakkali, E., et A. Kandoussi, E., « The Pandemic Impact on Organizations Security and Resiliency: The Workflow Satisfiability Problem », Lecture Notes in Networks and Systems, vol. 420 LNNS, p. 321-329, 2022.
Tab Bouhouche, Khaddar, M. AaEl, Boulmalf, Ma, Bouya, Ma, et Elkoutbi, Mb, « A new middleware architecture for the integration of RFID technology into information systems », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 1025-1030.
Tab Bouhouche, Boulmalf, Ma, Bouya, Ma, et Elkoutbi, Mb, « A new middleware architecture for RFID systems », in Mediterranean Microwave Symposium, 2015, vol. 2015-April.
T. Bouhouche, Khaddar, M. A. El, Boulmalf, M., Bouya, M., et Elkoutbi, M., « A new Middleware Architecture for the integration of RFID technology into information systems », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 1025-1030.
H. Bouijij et Berqia, A., « Machine Learning Algorithms Evaluation for Phishing URLs Classification », in 2021 4th International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2021, 2021.
H. Bouijij, Berqia, A., et Saliah-Hassan, H., « Phishing URL classification using Extra-Tree and DNN », in 10th International Symposium on Digital Forensics and Security, ISDFS 2022, 2022.
H. Bouirouga, Lrit, S. E., Jilbab, A., et Aboutajdine, D., « Recognition of adult video by combining skin detection features with motion information », in International Conference on Multimedia Computing and Systems -Proceedings, 2011.
H. Bouirouga, S. Fkihi, E., Jilbab, A., et Bakrim, M., « A comparison of skin detection techniques for objectionable videos », in 2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010, 2010.
Ha Bouirouga, Elfkihi, Sb, Jilbab, Ac, et Aboutajdine, Da, « Neural network adult videos recognition using jointly face shape and skin feature extraction », in VISAPP 2013 - Proceedings of the International Conference on Computer Vision Theory and Applications, 2013, vol. 1, p. 422-425.
F. E. Boujida, Amazal, F. A., et Idri, A., « Neural networks based software development effort estimation: A systematic mapping study », in Proceedings of the 16th International Conference on Software Technologies, ICSOFT 2021, 2021, p. 102-110.
M. Boukadidi, « Make or buy decision making for telcos towards an Intelligent Transaction Cost Economics (TCE) Support System », in International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 7-13.
M. Boukbab et Nafil, K., « Student’s Behaviors Analysis in Classroom Context Using IoT: A Systematic Mapping Study », Lecture Notes in Networks and Systems, vol. 469 LNNS, p. 401-412, 2022.
K. Boukhayma, Idrissi, M. A. J., et Benhiba, L., « Evaluating Ongoing Decision Support System: A Case Study », in ACM International Conference Proceeding Series, 2020, p. 37-42.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:591,283
    Education - This is a contributing Drupal Theme
    Design by WeebPal.