Publications

Export 625 results:
Filters: First Letter Of Last Name is K  [Clear All Filters]
Conference Paper
M. O. M. Khelifa, Belkasmi, M., Abdellah, Y., et Elhadj, Y. O. M., « An accurate HSMM-based system for Arabic phonemes recognition », in 9th International Conference on Advanced Computational Intelligence, ICACI 2017, 2017, p. 211-216.
B. Assila, Kobbane, A., Walid, A., et M. Koutbi, E., « Achieving low-energy consumption in fog computing environment: A matching game approach », in 19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings, 2018, p. 213-218.
B. Assila, Kobbane, A., Walid, A., et M. Koutbi, E., « Achieving low-energy consumption in fog computing environment: A matching game approach », in 19th IEEE Mediterranean Eletrotechnical Conference, MELECON 2018 - Proceedings, 2018, p. 213-218.
M. Salim Benqatla, Dikra, C., et Bounabat, B., « ACTOR NETWORK THEORY AS A COLLABORATIVE MODE: THE CONTRIBUTION OF GAME THEORY IN THE INTERESSEMENT PHASE », in PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, p. 67-72.
Ia Elmagrouni, Kenzi, Ab, Lethrech, Ma, et Kriouile, Aa, « Adaptation services-oriented systems lifecycle », in ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems, 2016, vol. 1, p. 223-231.
Ia Elmagrouni, Kenzi, Ab, Lethrech, Ma, et Kriouile, Aa, « Adaptation services-oriented systems lifecycle », in ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems, 2016, vol. 1, p. 223-231.
O. Cherqi, Mezzour, G., Ghogho, M., et M. Koutbi, E., « Analysis of hacking related trade in the darkweb », in 2018 IEEE International Conference on Intelligence and Security Informatics, ISI 2018, 2018, p. 79-84.
G. Ha Merabet, Essaaidi, Ma, Talei, Hb, Abid, M. Rb, Khalil, Nc, Madkour, Mc, et Benhaddou, Dc, « Applications of multi-Agent systems in smart grids: A survey », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 1088-1094.
G. Halhoul Merabet, Essaaidi, M., Talei, H., Abid, M. Riduan, Khalil, N., Madkour, M., et Benhaddou, D., « Applications of Multi-Agent Systems in Smart Grids: A Survey », in 2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2014, p. 1088-1094.
Z. Kartit, Azougaghe, A., H. Idrissi, K., M. Marraki, E., Hedabou, M., Belkasmi, M., et Kartit, A., « Applying Encryption Algorithm for Data Security in Cloud Storage », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 141-154.
Z. Kartit, Azougaghe, A., H. Idrissi, K., M. Marraki, E., Hedabou, M., Belkasmi, M., et Kartit, A., « Applying Encryption Algorithm for Data Security in Cloud Storage », in ADVANCES IN UBIQUITOUS NETWORKING, 2016, vol. 366, p. 141-154.
I. Elmagrouni, Lethrech, M., Kenzi, A., et Kriouile, A., « Approach for building Services-Oriented systems adaptable », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 183-188.
I. Elmagrouni, Lethrech, M., Kenzi, A., et Kriouile, A., « Approach for building Services-Oriented systems adaptable », in International Conference on Multimedia Computing and Systems -Proceedings, 2017, p. 183-188.
S. Boulmrharj, NaitMalek, Y., Elmouatamid, A., Bakhouya, M., Ouladsine, R., Zine-Dine, K., Khaidar, M., et Abid, R., « Approach for dimensioning stand-alone photovoltaic systems », in Energy Procedia, 2018, vol. 153, p. 56-61.
A. Khoumsi, Erradi, M., Ayache, M., et Krombi, W., « An Approach to Resolve NP-Hard Problems of Firewalls », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 229-243.
A. Khoumsi, Erradi, M., Ayache, M., et Krombi, W., « An Approach to Resolve NP-Hard Problems of Firewalls », in Networked Systems, NETYS 2016, 2016, vol. 9944, p. 229-243.
S. E. Manar El Bouanani et Kassou, I., « An approach using intertextual distance to detect web messages authors », in 2013 3rd International Symposium ISKO-Maghreb, 2013.
S. El Manar E. Bouanani et Kassou, I., « An approach using Intertextual Distance to detect Web Messages Authors », in 2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB, 2013.
M. A. P. De Barros et M. Koutbi, E., « AQM applications in MAODV ad hoc network », in 16th International Conference on Telecommunications, ICT 2009, 2009, p. 37-40.
M. A. P. de Barros et Koutbi, M. El, « AQM applications in MAODV ad hoc network », in 2009 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2009, p. 37-40.
R. Khaldi, A. Afia, E., Chiheb, R., et Faizi, R., « Artificial neural network based approach for blood demand forecasting: Fez transfusion blood center case study », in ACM International Conference Proceeding Series, 2017, vol. Part F129474.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.
Wa Krombi, Erradi, Ma, et Khoumsi, Ab, « Automata-based approach to design and analyze security policies », in 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014, 2014, p. 306-313.
W. Krombi, Erradi, M., et Khoumsi, A., « Automata-Based Approach to Design and Analyze Security Policies », in 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, p. 306-313.

Pages

Partenaires

Localisation

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

 Télécopie : (+212) 5 37 77 72 30

  Secrétariat de direction : 06 61 48 10 97

        Secrétariat général : 06 61 70 77 02

        Service des affaires estudiantines : 06 62 44 87 47

        Résidences : 06 61 82 89 77

    

    Compteur de visiteurs:392,614
    Education - This is a contributing Drupal Theme
    Design by WeebPal.