Publications

Export 2330 results:
Journal Article
K. H. Idrissi, Kartit, Z., Kartit, A., et M. Marraki, E., « CKMSA: An anomaly detection process based on K-means and simulated annealing algorithms », International Review on Computers and Software, vol. 11, p. 42-48, 2016.
H. Rahimi et Bakkali, H. E., « CIOSOS: Combined idiomatic-ontology based sentiment orientation system for trust reputation in E-commerce », Advances in Intelligent Systems and Computing, vol. 369, p. 189-200, 2015.
La Cheikhi, Al-Qutaish, R. Eb, Idri, Aa, et Sellami, Ac, « Chidamber and kemerer object-oriented measures: Analysis of their design from the metrology perspective », International Journal of Software Engineering and its Applications, vol. 8, p. 359-374, 2014.
R. Zennou, Biswas, R., Bouajjani, A., Enea, C., et Erradi, M., « Checking causal consistency of distributed databases », Computing, vol. 104, p. 2181-2201, 2022.
F. Mourchid, Kobbane, A., Ben Othman, J., et M. Koutbi, E., « CGAM: A community and geography aware mobility model », International Journal of Communication Systems, vol. 31, 2018.
F. Mourchid, Kobbane, A., Ben Othman, J., et M. Koutbi, E., « CGAM: A community and geography aware mobility model », International Journal of Communication Systems, vol. 31, 2018.
W. Ettazi, Nassar, M., et Hafiddi, H., « CATS-CAE reflective middleware framework for adapting context-aware transactional services: Using a hybrid policy-based approach », International Journal of Web Services Research, vol. 17, p. 40-58, 2020.
I. Kadi et Idri, A., « Cardiovascular dysautonomias diagnosis using crisp and fuzzy decision tree: A comparative study », Studies in Health Technology and Informatics, vol. 223, p. 1-8, 2016.
Ma Lethrech, Kenzi, Ab, Elmagrouni, Ia, Nassar, Ma, et Kriouile, Aa, « CADSSO: A development approach for contextaware service oriented systems », Journal of Theoretical and Applied Information Technology, vol. 78, p. 236-252, 2015.
E. H. Bakkali, « Bypassing Workflow Satisfiability Problem Due to Access Control Constraints », Communications in Computer and Information Science, vol. 294 PART 2, p. 178-191, 2012.
M. Ouzineb, Mhada, F., et Hallaoui, I. El, « Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach », INFOR, vol. 51, p. 15-22, 2013.
M. Ouzineb, Mhada, F., et Hallaoui, I. El, « Buffer dimensioning and control stations positioning with a space partitioning-tabu search approach. », INFOR, vol. 51, p. 15 - 22, 2013.
I. Aznabet, Ennasar, M. A., O. Mrabet, E., G. Vera, A., Khalladi, M., et Tedjni, S., « A broadband modified T-shaped planar dipole antenna for UHF RFID tag applications », Progress In Electromagnetics Research C, vol. 73, p. 137-144, 2017.
F. Z. Fagroud, Ajallouda, L., Lahmar, E. H. B., Toumi, H., Zellou, A., et S. Filali, E., « A Brief Survey on Internet of Things (IoT) », Lecture Notes in Networks and Systems, vol. 211 LNNS, p. 335-344, 2021.
H. Zerouaoui, Idri, A., Nakach, F. Z., et Hadri, R. E., « Breast Fine Needle Cytological Classification Using Deep Hybrid Architectures », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12950 LNCS, p. 186-202, 2021.
R. Zennou, Atig, M. F., Biswas, R., Bouajjani, A., Enea, C., et Erradi, M., « Boosting Sequential Consistency Checking Using Saturation », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12302 LNCS, p. 360-376, 2020.
Y. Sabri, Siham, A., et Maizate, A., « Blocking control and dynamic exchange buffer switching new approach for mobile wireless sensor networks », Journal of Theoretical and Applied Information Technology, vol. 99, p. 4132-4140, 2021.
A. Nabil, Nafil, K., et Mounir, F., « Blockchain Security and Privacy in Education: A Systematic Mapping Study », Advances in Intelligent Systems and Computing, vol. 1161 AISC, p. 253-262, 2020.
Aa Bahri, Zouaki, Ha, et Thami, R. O. Hb, « BLB tree: An efficient index structure for fast search », International Review on Computers and Software, vol. 11, p. 848-858, 2016.
M. C. Semmouni, Nitaj, A., et Belkasmi, M., « Bitcoin security with a twisted Edwards curve », Journal of Discrete Mathematical Sciences and Cryptography, vol. 25, p. 353-371, 2022.
M. Elmouhtadi, Lafkik, M., et Elfkihi, S., « Biometric protection approach based on fingerprint hierarchical identification », International Journal of Applied Engineering Research, vol. 12, p. 11007-11014, 2017.
S. Bouzbita, A. Afia, E., et Faizi, R., « The behaviour of ACS-TSP algorithm when adapting both pheromone parameters using fuzzy logic controller », International Journal of Electrical and Computer Engineering, vol. 10, p. 5436-5444, 2020.
A. Choukri, Habbani, A., et Elkoutbi, M., « Behavior of ad hoc routing protocols in multi service traffic », Journal of Theoretical and Applied Information Technology, vol. 43, p. 208-213, 2012.
A. Sebbar, Zkik, K., Belhadi, A., Benghalia, A., Boulmalf, M., et Kettani, M. D. Ech- Cherif, « BDA-enabler Architecture Based on Cloud Manufacturing: the Case of Chemical Industry », International Journal of Supply and Operations Management, vol. 9, p. 251-263, 2022.
Ha Routaib, Badidi, Eb, Sabir, Ec, et Elkoutbi, Ma, « A bargaining nash game based adaptive negotiation of context level agreements for pervasive systems », Lecture Notes in Electrical Engineering, vol. 366, p. 91-104, 2016.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:567,226
    Education - This is a contributing Drupal Theme
    Design by WeebPal.