


default search action
6th Cloudtech 2023: Marrakech, Morocco
- 6th IEEE International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2023, Marrakech, Morocco, November 21-23, 2023. IEEE 2023, ISBN 979-8-3503-0306-3
- Abderrahim Lachguer, Abderrahmane Sadiq, Youssef Es-saady
, Mohamed El Hajji:
Towards an IoT Architecture Based on Machine Learning for Missing Data Prediction on the Edge. 1-7 - Saad Belcaid, Siham Aouad, Mostapha Zbakh:
A Survey on Recent Intrusion Detection Systems in Cloud Environment. 1-6 - Abd Allah Aouragh, Mohamed Bahaj:
Advancing Breast Cancer Diagnosis with Machine Learning: Exploring Data Balancing, Feature Selection, and Bayesian Optimization. 1-6 - Mohammed Wazir Adain, Adil Tanveer:
Using Serverless FaaS for Invoking Long-Running Jobs. 1-6 - Ilyass Mokhtari, Ayyoub El Outmani, El Miloud Jaâra:
Security Governance in IOT Environment: A State of Art. 1-4 - Khadija Bouyakhsaine
, Abderrahim Brakez
, Mohcine Draou:
Data-Driven Approach for Residential Occupancy Modeling Using PIR Sensors: A Moroccan Case Study. 1-6 - Ayoub Berdai
, Dalila Chiadmi:
Attempts in Worst-Case Optimal Joins on Relational Data Systems: A Literature Survey. 1-8 - Sara Halim, Bouchaib Bounabat:
Assessing Digital Government Maturity Model for Developed Countries. Application to Singapore. 1-7 - Karmaoui Idrissi Hamza, Jihad Kilani, Faycal Bensalah, Youssef Baddi
:
Evaluation and Analysis of Network Safety Mechanisms in SDN Infrastructure. 1-6 - Jens Kohler:
Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment. 1-7 - Mohammed Benali, Abdeljalil Elouardighi:
Sentiment Analysis Applied to Arabic Tweets Using Machine Learning and Deep Learning. 1-8 - Zainab Ouardirhi, Sidi Ahmed Mahmoudi, Mostapha Zbakh:
A Novel Approach for Recognizing Occluded Objects Using Feature Pyramid Network Based on Occlusion Rate Analysis. 1-7 - Zakaria Sawadogo
, Babacar Thioye, Ibrahima Gaye
, Jean Marie Dembele
, Gervais Mendy
, Samuel Ouya
:
Mid@ndro: a Middleware Architecture for Malware Detection on Android. 1-5 - Majid Almaraashi:
Comparing Different Simulated Annealing Cooling Variants for Fuzzy Logic Systems Modeling. 1-6 - Jean-Sébastien Lerat
, Sidi Ahmed Mahmoudi:
Architecture to Distribute Deep Learning Models on Containers and Virtual Machines for Industry 4.0. 1-8 - Ismail El Yamani
, Souad Sadki, Hanan El Bakkali, Driss Allaki:
CL2S4P: A Privacy Policy Translator for Comprehensive Interpretation in Smart Healthcare Systems. 1-7 - Sara El Ouahabi, Safâa El Ouahabi, El Wardani Dadi
:
Multi-Domain Dataset for Moroccan Arabic Dialect Sentiment Analysis in Social Networks. 1-7 - Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:
Dealing with Anti-Patterns When Migrating from Monoliths to Microservices: Challenges and Research Directions. 1-8 - Basma Iraqi, Lamia Benhiba
, Mohammed Abdou Janati Idrissi:
Data-Driven Transformation in Investment Banks. 1-9 - Widad El Moutaouakal, Karim Baïna:
Comparative Experimentation of MLOps Power on Microsoft Azure, Amazon Web Services, and Google Cloud Platform. 1-8 - Hanane Dihmani, Abdelmajid Bousselham
, Omar Bouattane:
A Review of Feature Selection and HyperparameterOptimization Techniques for Breast Cancer Detection on thermograms Images. 1-8 - Soufiane Aatab, Felix Freitag:
Integrating a Neural Network Library in Embedded Federated Learning. 1-7 - Chaymae Majdoubi
, Saida El Mendili, Youssef Gahi:
Data Security Patterns for Critical Big Data Systems. 1-8 - Mustapha Hammouti
, Omar Moussaoui, Mohammed Haissaine, Abdelkader Bétari:
Comparative Evaluation of IoT Mesh Network Protocols: NeoMesh Versus LoRa Pymesh. 1-6 - Laila Bouhouch, Mostapha Zbakh, Claude Tadonki:
A New Classification for Data Placement Techniques in Cloud Computing. 1-9 - Manu Agarwal, Enkhzol Dovdon
, Luis Roma Barge, Yanja Dajsuren, Jakob de Vlieg:
A HPC-Based Data Analytics Platform Architecture for Data-Driven Animal Phenotype Detection. 1-6 - Mahbubur Rahman, Liang Chen
, Jonathan Loo, Wei Jie:
Towards Deep Learning Based Access Control using Hyperledger-Fabric Blockchain for the Internet of Things. 1-8 - Hasnae Lamrani Alaoui, Mostapha Zbakh, An Braeken, Abdellah Touhafi, Abdellatif El Ghazi:
Authentication Protocol for RFID Systems: A Survey. 1-11 - Hind Mikram, Said El Kafhali
, Youssef Saadi:
A Hybrid Algorithm Based on PSO Algorithm and Chi-Squared Distribution for Tasks Consolidation in Cloud Computing Environment. 1-6 - Nadia Qoudhadh, Mostapha Zbakh:
Algorithms Scheduling Applied to Microservics Architectures: A Survey Study. 1-12 - Zakaria Sawadogo
, Muhammad Taimoor Khan, Jean Marie Dembele, Gervais Mendy, Samuel Ouya:
Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis Methods. 1-5 - Hicham Boudlal
, Mohammed Serrhini, Ahmed Tahiri
:
Leveraging WiFi Channel State Information for Efficient and Reliable Device-Free Human Activity Recognition. 1-8 - Mohammed Hajhouj, Mounia Abik, Randa Zarnoufi:
Enhancing Syntactic Resolution in Biomedical Data Processing with OpenCL: A Use Case Study. 1-8 - Hind Berrami
, Zineb Serhier, Manar Jallal
, Mohammed Bennani Othmani:
Artificial Intelligence: Perception, Attitudes and Use Among Students at the Casablanca Faculty of Medicine. 1-4 - Khalid Maidine, Ahmed El-Yahyaoui
:
Cloud Identity Management Mechanisms and Issues. 1-9 - Takayuki Kushida, Yuka Kato:
Logical IoT Cloud - Integrated Systems Management for Cloud and IoT. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.