Publications

Export 1819 results:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Za Kartit, Azougaghe, Ab, Idrissi, H. Ka, Marraki, M. Ea, Hedabou, Mc, Belkasmi, Mb, et Kartit, Ad, « Applying encryption algorithm for data security in cloud storage », Lecture Notes in Electrical Engineering, vol. 366, p. 141-154, 2016.
Z. Kartit, Azougaghe, A., H. Idrissi, K., M. Marraki, E., Hedabou, M., Belkasmi, M., et Kartit, A., « Applying Encryption Algorithm for Data Security in Cloud Storage », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 141-154.
Sa Ouhbi, Idri, Aa, Fernández-Alemán, J. Lb, Toval, Ab, et Benjelloun, Hc, « Applying ISO/IEC 25010 on mobile personal health records », in HEALTHINF 2015 - 8th International Conference on Health Informatics, Proceedings; Part of 8th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2015, 2015, p. 405-412.
A. Zakrani et Idri, A., « Applying radial basis function neural networks based on fuzzy clustering to estimate web applications effort », International Review on Computers and Software, vol. 5, p. 516-524, 2010.
I. Elmagrouni, Lethrech, M., Kenzi, A., et Kriouile, A., « Approach for building Services-Oriented systems adaptable », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 183-188.
S. Boulmrharj, NaitMalek, Y., Elmouatamid, A., Bakhouya, M., Ouladsine, R., Zine-Dine, K., Khaidar, M., et Abid, R., « Approach for dimensioning stand-alone photovoltaic systems », in Energy Procedia, 2018, vol. 153, p. 56-61.
Z. E. Uahhabi et Bakkali, H. E., « An approach for evaluating trust in X.509 certificates », in 2016 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, 2017, p. 196-203.
S. Sadki et H. Bakkali, E., « An approach for privacy policies negotiation in mobile health-Cloud environments », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
S. Sadki et Bakkali, H. El, « An approach for privacy policies negotiation in mobile health-Cloud environments », in 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, p. 179-184.
J. Maqboul et Bounabat, B., « An approach of data-driven framework alignment to knowledge base », in ACM International Conference Proceeding Series, 2018.
Aa Khoumsi, Erradi, Mb, Ayache, Mb, et Krombi, Wb, « An approach to resolve NP-hard problems of firewalls », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9944 LNCS, p. 229-243, 2016.
A. Khoumsi, Erradi, M., Ayache, M., et Krombi, W., « An Approach to Resolve NP-Hard Problems of Firewalls », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 229-243.
S. E. Manar El Bouanani et Kassou, I., « An approach using intertextual distance to detect web messages authors », in 2013 3rd International Symposium ISKO-Maghreb, 2013.
S. El Manar E. Bouanani et Kassou, I., « An approach using Intertextual Distance to detect Web Messages Authors », in 2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB, 2013.
L. Sinif et Bounabat, B., « Approaching an optimizing open linked government data portal », in ACM International Conference Proceeding Series, 2018, p. 135-139.
F. Mhada et Malhame, R., « Approximate performance analysis of CONWIP disciplines in unreliable non homogeneous transfer lines. », Annals of Operations Research, vol. 182, p. 213 - 233, 2011.
M. A. P. De Barros et M. Koutbi, E., « AQM applications in MAODV ad hoc network », in 16th International Conference on Telecommunications, ICT 2009, 2009, p. 37-40.
M. A. P. de Barros et Koutbi, M. El, « AQM applications in MAODV ad hoc network », in 2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2009, p. 37-40.
R. Moumen, Chiheb, R., Afia, A. E., et Faizi, R., « Arabic diacritization with gated recurrent unit », in ACM International Conference Proceeding Series, 2018.
Sa Ouhbi, Fernández-Alemán, J. La, Idri, Ab, et Pozo, J. Rc, « Are mobile blood donation applications green? », in 2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015, 2015.
S. Ouhbi, Fernandez-Aleman, J. Luis, Idri, A., et Pozo, J. Rivera, « Are Mobile Blood Donation Applications Green? », in 2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA), 2015.
J. MaCarrillo de Gea, Nicolás, Ja, Fernández-Alemán, J. La, Toval, Aa, et Idri, Ab, « Are the expected benefits of requirements reuse hampered by distance? An experiment », SpringerPlus, vol. 5, 2016.
J. M. Carrill de Gea, Nicolas, J., Fernandez-Aleman, J. L., Toval, A., et Idri, A., « Are the expected benefits of requirements reuse hampered by distance? An experiment », SPRINGERPLUS, vol. 5, 2016.
R. Khaldi, A. Afia, E., Chiheb, R., et Faizi, R., « Artificial neural network based approach for blood demand forecasting: Fez transfusion blood center case study », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
Ia Slimani, Farissi, IbEl, et Achchab, Sa, « Artificial neural networks for demand forecasting: Application using Moroccan supermarket data », in International Conference on Intelligent Systems Design and Applications, ISDA, 2016, vol. 2016-June, p. 266-271.

Pages

Partenaires

Localisation

Suivez-nous sur

         

    

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

  Télécopie : (+212) 5 37 68 60 78

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 34 09 27

        Service des affaires financières : 06 61 44 76 79

        Service des affaires estudiantines : 06 62 77 10 17 / n.mhirich@um5s.net.ma

        Résidences : 06 61 82 89 77

Contacts

    

    Compteur de visiteurs:469,721
    Education - This is a contributing Drupal Theme
    Design by WeebPal.