Publications

Export 1505 results:
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
S. E. Manar El Bouanani et Kassou, I., « An approach using intertextual distance to detect web messages authors », in 2013 3rd International Symposium ISKO-Maghreb, 2013.
S. El Manar E. Bouanani et Kassou, I., « An approach using Intertextual Distance to detect Web Messages Authors », in 2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB, 2013.
L. Sinif et Bounabat, B., « Approaching an optimizing open linked government data portal », in ACM International Conference Proceeding Series, 2018, p. 135-139.
A. Boumehdi et Yousfi, A., « Arabic Speech Recognition Independent of Vocabulary for Isolated Words », Lecture Notes in Networks and Systems, vol. 216, p. 585-595, 2022.
K. Boukhayma et Elmanouar, A., « Assessing decision support systems success: A conceptual analysis », International Journal of Civil Engineering and Technology, vol. 9, p. 882-889, 2018.
A. Idri, Bouchra, E. O., Hosni, M., et Abnane, I., « Assessing the impact of parameters tuning in ensemble based breast Cancer classification », Health and Technology, vol. 10, p. 1239-1255, 2020.
H. Bennouri et Berqia, A. A., « Assessing the performance of different TCP congestion mechanisms in underwater wireless sensor networks », International Journal of Vehicle Information and Communication Systems, vol. 5, p. 119-136, 2020.
H. Bennouri et Berqia, A. A., « Assessing the performance of different TCP congestion mechanisms in underwater wireless sensor networks », International Journal of Vehicle Information and Communication Systems, vol. 5, p. 119-136, 2020.
H. Routaib, Badidi, E., Sabir, E., et Elkoutbi, M., « An asymmetrical nash bargaining for adaptive and automated context negotiation in pervasive environments », in 2017 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, 2017, p. 732-736.
E. A. Afia, Benchakroun, A., Dussault, J. - P., et K. Yassini, E., « Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications », RAIRO - Operations Research, vol. 42, p. 157-198, 2008.
E. A. Afia, Benchakroun, A., Dussault, J. - P., et K. Yassini, E., « Asymptotic analysis of the trajectories of the logarithmic barrier algorithm without constraint qualifications », RAIRO-OPERATIONS RESEARCH, vol. 42, p. 157-198, 2008.
E. Illi, F. Bouanani, E., et Ayoub, F., « Asymptotic analysis of underwater communication system subject to κ-μ Shadowed fading channel », in 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, 2017, p. 855-860.
E. A. Koufi, Bennar, A., N. Koufi, E., et Yousfi, N., « Asymptotic properties of a stochastic SIQR epidemic model with Lévy Jumps and Beddington-DeAngelis incidence rate », Results in Physics, vol. 27, 2021.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol conforming to EPC class-1 Gen-2 standard », in 2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings, 2017.
A. Maarof, Senhadji, M., Labbi, Z., et Belkasmi, M., « Authentication protocol for securing internet of things », in ACM International Conference Proceeding Series, 2018.
E. A. Kandoussi et H. Bakkali, E., « Automated security driven solution for inter-organizational workflows », Advances in Intelligent Systems and Computing, vol. 1179 AISC, p. 350-361, 2021.
H. Benouda, Azizi, M., Moussaoui, M., et Esbai, R., « Automatic code generation within MDA approach for cross-platform mobiles apps », in Proceedings of EDIS 2017 - 1st International Conference on Embedded and Distributed Systems, 2018, vol. 2017-December, p. 1-5.
E. B. Idrissi, Baina, S., et Baina, K., « Automatic generation of ontology from data models: A practical evaluation of existing approaches », in Proceedings - International Conference on Research Challenges in Information Science, 2013.
E. B. Idrissi, Baina, S., et Baina, K., « Automatic generation of ontology from data models: A practical evaluation of existing approaches », in Proceedings - International Conference on Research Challenges in Information Science, 2013.
B. El Idrissi, Baina, S., et Baina, K., « Automatic Generation of Ontology from Data Models: A Practical Evaluation of Existing Approaches », in 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2013.
B. El Idrissi, Baina, S., et Baina, K., « Automatic Generation of Ontology from Data Models: A Practical Evaluation of Existing Approaches », in 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2013.
L. Ajallouda, Fagroud, F. Z., Zellou, A., et Benlahmar, E. H., « Automatic Key-Phrase Extraction: Empirical Study of Graph-Based Methods », Lecture Notes in Networks and Systems, vol. 489 LNNS, p. 440-456, 2022.
E. Bendriss et Regragui, B., « Automatic selection of filtering devices in a distributed intrusion prevension system », Journal of Theoretical and Applied Information Technology, vol. 53, p. 307-311, 2013.
O. Zaazaa et H. Bakkali, E., « Automatic Static Vulnerability Detection Approaches and Tools: State of the Art », Lecture Notes in Networks and Systems, vol. 357 LNNS, p. 449-459, 2022.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

Education - This is a contributing Drupal Theme
Design by WeebPal.