Publications

Export 2330 results:
Journal Article
M. Bouras et Berbia, H., « A review of the most adopted fault tolerance approaches for sram based fpga real time critical embedded system », Journal of Advanced Research in Dynamical and Control Systems, vol. 12, p. 237-241, 2020.
M. EZZAT et Idri, A., « Reviewing Data Analytics Techniques in Breast Cancer Treatment », Advances in Intelligent Systems and Computing, vol. 1161 AISC, p. 65-75, 2020.
H. Zerouaoui et Idri, A., « Reviewing Machine Learning and Image Processing Based Decision-Making Systems for Breast Cancer Imaging », Journal of Medical Systems, vol. 45, 2021.
M. Kharbouch, Idri, A., Fernandez-Aleman, J. L., Redman, L., Toval, A., et Stelate, Y., « Reviewing the features and functionalities of contraception mPHRs », Health Policy and Technology, vol. 11, 2022.
B. Bousarhane, Bensiali, S., et Bouzidi, D., « Road signs recognition: State-of-the-art and perspectives », International Journal of Data Analysis Techniques and Strategies, vol. 13, p. 128-150, 2021.
M. Chakib, Essadki, A., et Nasser, T., « Robust ADRC control of a doubly fed induction generator based wind energy conversion system », Lecture Notes in Electrical Engineering, vol. 519, p. 359-368, 2019.
S. Benlakhdar, Rziza, M., et Thami, R. O. H., « A robust model using SIFT and gamma mixture model for texture images classification: Perspectives for medical applications », Biomedical and Pharmacology Journal, vol. 13, p. 1659-1669, 2020.
A. Katkout, Nasser, T., et Essadki, A., « Robust Multiobjective Model Predictive Control with Computation Delay Compensation for Electric Vehicle Applications Using PMSM with Multilevel Inverter », Mathematical Problems in Engineering, vol. 2020, 2020.
A. Boualouch, Nasser, T., Essadki, A., Boukhriss, A., et Frigui, A., « A robust power control of a DFIG used in wind turbine conversion system », International Energy Journal, vol. 17, p. 1-10, 2017.
M. Radouane, Zouggari, N. I., Amraoui, A., et Amraoui, M., « A ROBUST WATERMARKING SCHEME BASED ON DCT, IWT and SVD WITH OPTIMAL BLOCK », Journal of Theoretical and Applied Information Technology, vol. 100, p. 3507-3521, 2022.
E. A. Afia et Sarhani, M., « Runtime prediction of optimizers using improved support vector machine », Lecture Notes in Networks and Systems, vol. 49, p. 337-350, 2019.
A. Yousfi, Yazidi, M. H. El, et Zellou, A., « SBP: Preparation of Schema Elements to Schema Matching », Lecture Notes in Electrical Engineering, vol. 733 LNEE, p. 129-144, 2021.
E. O. Mouaatamid, Lahmer, M., et Belkasmi, M., « A Scalable Group Authentication Scheme Based on Combinatorial Designs with Fault Tolerance for the Internet of Things », SN Computer Science, vol. 1, 2020.
F. E. Bouanani, Lahmar, I., Ismaili, Z. E. A. A., et Qaraqe, K. A., « On the Secrecy Analysis of Dual-Hop SWIPT-based Multi-Source Underlay Cognitive Radio Networks », IEEE Transactions on Cognitive Communications and Networking, p. 1-1, 2022.
E. S. Haddouti et Kettani, M. D. E. - C. El, « A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments », International Journal of Advanced Computer Science and Applications, vol. 13, p. 575-584, 2022.
Ya Bensitel et Romadi, Rb, « Secure data in cloud computing using homomorphic encryption », Journal of Theoretical and Applied Information Technology, vol. 82, p. 206-211, 2015.
A. Sebbar, Zkik, K., Baddi, Y., Boulmalf, M., et Kettani, M. D. Ech- Cherif, « Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks », Studies in Computational Intelligence, vol. 919, p. 355-371, 2021.
N. Mouchfiq, Benjbara, C., et Habbani, A., « Security in MANETs: The Blockchain Issue », Communications in Computer and Information Science, vol. 1264, p. 219-232, 2020.
N. Mouchfiq, Habbani, A., et Benjbara, C., « Security issues in manets: A survey », Advances in Intelligent Systems and Computing, vol. 1184, p. 288-295, 2021.
Ha Amraoui, Habbani, Aab, Hajami, Ac, et Bilal, Ed, « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », Mobile Information Systems, vol. 2016, 2016.
H. Amraoui, Habbani, A., Hajami, A., et Bilal, E., « Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model », MOBILE INFORMATION SYSTEMS, 2016.
M. Lalaoui, A. Afia, E., et Chiheb, R., « A self-tuned simulated annealing algorithm using hidden markov model », International Journal of Electrical and Computer Engineering, vol. 8, p. 291-298, 2018.
M. Lalaoui, A. Afia, E., et Chiheb, R., « A self-tuned simulated annealing algorithm using hidden markov model », International Journal of Electrical and Computer Engineering, vol. 8, p. 291-298, 2018.
Aab Adadi, Berrada, Mab, Chenouni, Dab, et Bounabat, Bab, « A semantic web service composition for E-Government services », Journal of Theoretical and Applied Information Technology, vol. 71, p. 460-467, 2015.
F. Ezzahra Naamane, Et-tolba, M., et Belkasmi, M., « A semi-analytical performance prediction of a digital communication system using Fourier transform inversion », EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        CEDOC ST2I : 06 66 39 75 16

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:634,789
    Education - This is a contributing Drupal Theme
    Design by WeebPal.