default search action
4th NISS 2021: Kenitra, Morocco
- Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir, Tomader Mazri:
NISS2021: The 4th International Conference on Networking, Information Systems & Security, KENITRA, Morocco, April 1 - 2, 2021. ACM 2021, ISBN 978-1-4503-8871-9 - Khalid Qbouche, Khadija Rhoulami:
Simulation Daily Mobility in Rabat region. 1:1-1:4 - Rabiaa Elkori, Meryem Baha, Abdelilah Hachim, Khalid Elhad, Amal Lamarti:
Comparison of the mechanical behavior of two thermo-plastic polymers by static tests (numerically and experimentally): High-Density Polyethylene (HDPE) and High Impact Polystyrene (HIPS). 2:1-2:5 - Dmitriy Bystrov:
Approach of Digital Devices Diagnostic on the Basis of fuzzy Logic. 3:1-3:3 - Imad El Hanouti, Hakim el Fadili, Mohamed Boussif:
An Improved Lossy-Encryption System for Still-Image Data Based on the Quaternion Multiplication and Robust Chaos. 4:1-4:7 - Sara Ftaimi, Tomader Mazri:
Data Stream clustering for detecting misbehavior in an intelligent transportation system. 5:1-5:8 - Boughanja Manale, Tomader Mazri:
Attacks and defenses on autonomous vehicles: a comprehensive Study. 6:1-6:6 - Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, Abdelmajid El Moutaouakkil:
A Review of Intrusion Detection Systems: Datasets and machine learning methods. 7:1-7:6 - Taki Eddine Chaib Ainou, Soheyb Ayad, Labib Sadek Terrissa:
A Survey on SDN based energy-efficiency approaches in IoT: Systematic survey on energy conservation methods in IoT. 8:1-8:7 - Rachid Mama, Mustapha Machkour, Karam Ahkouk, Khadija Majhadi:
Towards a Flexible Relational Database Query System. 9:1-9:5 - Rania Zaimi, Mohamed Hafidi, Mahnane Lamia:
A literature survey on anti-phishing in websites. 10:1-10:7 - Hanane Aznaoui, Arif Ullah, Said Raghay, Layla Aziz:
Advanced GAF routing protocol using the goal attainment method in WSN. 11:1-11:7 - Asma Khabba, Sanaa Errahili, Saida Ibnyaich, Abdelouhab Zeroual:
A New 2x2MIMO Trapezoidal Shaped Antenna with High Gain and Wide Bandwidth for 37-40GHz Millimeter Wave Applications. 12:1-12:7 - Anas El-Ansari, Mohamed El Fissaoui, Abderrahim Beni Hssane:
Personalized question-answering over linked data. 13:1-13:7 - Ghislain Mervyl Saint-Juste Kossingou, Edgard Ndassimba, Nadege Gladys Ndassimba, Samuel Ouya:
Contribution of the Internet of Things to agricultural education and breeding in rural areas of African countries in conflict: case of the Central African Republic. 14:1-14:5 - Ouail El Imrani:
Prediction of international trade evolution through the Support Vector Machine: The case of a port complex. 15:1-15:5 - Sara Rochdi, Nadia El Ouesdadi:
E learning and the new pedagogical practices of Moroccan teachers. 16:1-16:7 - Ezzoubair Zecri, Mohammed Ouzzif, Ismail El Haddioui:
Study of the use of gamification elements in e-learning applications. 17:1-17:5 - Moumita Sen Sarma, Avishek Das:
BMGC: A Deep Learning Approach to Classify Bengali Music Genres. 18:1-18:6 - Alyaziya Almheiri, Zakaria Maamar:
IoT Protocols - MQTT versus CoAP. 19:1-19:5 - Abla Chaouni Benabdellah, Asmaa Benghabrit, Imane Bouhaddou, Kamar Zekhnini:
An agent organizational method for modeling the complexity of the design process. 20:1-20:7 - Siham Aouad, Abderrahim Maizate, Abdelouahed Zakari, Yassine Sabri:
A comprehensive survey of smart city technologies for monitoring and controlling the epidemic spread of COVID-19. 21:1-21:6 - El Hadrami Cheikh Tourad, Mohsine Eleuldj:
DNN2FPGA: Generic Design Flow to Implement DNNs on FPGAs. 22:1-22:5 - Nihal Gaouar, Mohamed Lehsaini:
A cloud computing based intelligent traffic control system for vehicular networks. 23:1-23:5 - Md. Kowsher, Avishek Das, Md. Murad Hossain Sarker, Anik Tahabilder, Md. Zahidul Islam Sanjid:
SeqVectorizer: Sequence Representation in Vector Space. 24:1-24:6 - Ghislain Mervyl Saint-Juste Kossingou, Bessan Melckior Dégboé, Nadege Gladys Ndassimba, Samuel Ouya, Gervais Mendy:
Proposal for a platform for the continuity of distance learning in African schools and universities at the end of the politico-military crisis in the face of covid-19: case of the Central African Republic. 25:1-25:6 - Asmae Bengag, Amina Bengag, Omar Moussaoui:
Classification of security attacks in WBAN for medical healthcare. 26:1-26:5 - Glori Stephani Saragih, Zuherman Rustam:
Comparison Support Vector Machines and K-Nearest Neighbors in Classifying Ischemic Stroke by Using Convolutional Neural Networks as a Feature Extraction. 27:1-27:6 - Oumayma Ouedrhiri, Oumayma Banouar, Said Raghay, Salah el Hadaj:
Comparative study of data preparation methods in quantum clustering algorithms. 28:1-28:5 - Wafa Aouadj, Mohamed Rida Abdessemed, Rachid Seghir:
Discrete Large-scale Multi-Objective Teaching-Learning-Based Optimization Algorithm. 29:1-29:6 - Tariq Lasloum, Haikel Alhichri, Yakoub Bazi:
Classification of Remote Sensing scenes using Semi-Supervised Domain Adaptation based on Entropy Adversarial Optimization. 30:1-30:8 - Samia Hakkou, Tomader Mazri, Nabil Hmina:
Study and comparison of the different elements of handover execution: a case of the LTE network. 31:1-31:6 - Kiran Fatima, Kanwal Zahoor, Narmeen Zakaria Bawany:
SDN Control Plane Security: Attacks and Mitigation Techniques. 32:1-32:6 - Khadidja Belkadi, Mohamed Lehsaini:
EE-FTR: An Energy-Efficient Fault-Tolerant Routing Protocol for Wireless Sensor Networks. 33:1-33:5 - Yasmina Al Marouni, Youssef Bentaleb:
State of art of PLS Regression for non quantitative data and in Big Data context. 34:1-34:5 - Jellid Kawtar, Tomader Mazri:
Comparative Study on the protocols used by autonomous car, DSRC, C-V2X, 5G. 35:1-35:8 - Nour-Eddine Bakni, Ismail Assayad:
Survey on improving the performance of MapReduce in Hadoop. 36:1-36:5 - Oumaima El Rhazal, Tomader Mazri:
Already 6G? Why? 37:1-37:5 - Bolaji Bamiro, Ismail Assayad:
Data-based automatic Covid-19 rumors detection in social networks. 38:1-38:6 - Rajae Tamri, Said Rakrak:
DTN gateway For an Interoperable IoT architecture. 39:1-39:4 - Amina Guettas, Soheyb Ayad, Okba Kazar:
Real time driver's eye state recognition based on deep mobile learning. 40:1-40:7 - Insaf Bellamine, Hakim Nasaoui, Hassan Silkan:
Detection of COVID-19 from Chest X-ray images using Deep learning. 41:1-41:6 - Zakaria Benlalia, Karim Abouelmehdi, Abderrahim Beni Hssane, Abdellah Ezzati:
A study of task scheduling algorithms in cloud computing. 42:1-42:5 - Latyr Ndiaye, Kéba Gueye, Samuel Ouya:
Proposal for an alert and monitoring solution based on the SIP and IoT protocol: the case of agriculture. 43:1-43:6 - Asmae Bouchareb, Abdelhak Boulaalam, Insaf Bellamine:
IoT and AI based intelligent system to fight against COVID-19. 44:1-44:8 - Karam Ahkouk, Mustapha Machkour, Khadija Majhadi, Rachid Mama:
A review of the Text to SQL Frameworks. 45:1-45:6 - Yapo Jesus Ekie, Bassirou Gueye, Ibrahima Niang:
A comparative analysis of SOAP and REST Web service composition based on performance in local and remote Cloud environments. 46:1-46:8 - Layla Aziz, Samira Achki:
Optimal User Selection using BWM Tool. 47:1-47:4 - Yapo Jesus Ekie, Bassirou Gueye, Ibrahima Niang, Atse Marcellin Tresor Ekie:
Web Based Composition using Machine Learning Approaches: A Literature Review. 48:1-48:7 - Fatima Rougaii, Tomader Mazri:
Secure user authentication scheme for the Virtual Doctor System enabled H-IoT through 5G Network: A comparison study. 49:1-49:6 - Khaoula Taji, Rachida Ait Abdelouahid, Ibtissame Ezzahoui, Abdelaziz Marzak:
Review on architectures of aquaponic systems based on the Internet of Things and artificial intelligence: Comparative study. 50:1-50:9 - Fatih Rabia, Sara Arezki, Taoufiq Gadi:
A survey on e-voting based on blockchain. 51:1-51:8 - Soukaina Merzouk, Abdessamad Cherkaoui, Abdelaziz Marzak, Nawal Sael, Fatima Zahra Guerss:
The proposition of Process flow model for Scrum and eXtreme Programming. 52:1-52:6 - Youssef Toulni, Taoufiq Belhoussine Drissi, Benayad Nsiri:
ECG signal diagnosis using Discrete Wavelet Transform and K-Nearest Neighbor classifier. 53:1-53:6 - Abdel Ali Harchaoui, Ali Younes, Abdelaaziz El Hibaoui, Ahmed Bendahmane:
Survey and a New Taxonomy of Proofs of Retrievability on the Cloud Storage. 54:1-54:8 - Djerassembe Laouhingamaye Frederic, Awatif Rouijel, Hassan El Ghazi:
Insomnia EEG signal Preprocessing using ICA Algorithms. 55:1-55:7 - Prima Bouchaib, Mohammed Bouhorma:
Transfer Learning and SMOTE Algorithm for Image-based Malware Classification. 56:1-56:6 - Tajeddine Benbarrad, Marouane Salhaoui, Mounir Arioua:
On the Performance of Deep Learning in the Full Edge and the Full Cloud Architectures. 57:1-57:7 - Hayat Sahlaoui, El Arbi Abdellaoui Alaoui, Said Agoujil:
A framework towards more accurate and explanatory student performance model. 58:1-58:8 - Houda Fakhkhari, Bouchaib Bounabat, Zineb Gaizi, Soumaya Fatemi, Maria Bennani, Rachid Bekkali:
A holistic nonlinear framework for developing a national eHealth vision based on Moroccan experience. 59:1-59:8 - Abdessamad Cherkaoui, Soukaina Merzouk, Abdelaziz Marzak, Mustapha Hain:
Review on Embedded Systems and the Internet of Things: Comparative Study. 60:1-60:7 - Amine Mohammed Taberkit, Ahmed Kechida, Abdelmalek Bouguettaya:
Algerian Perspectives for UAV-based Remote Sensing Technologies and Artificial Intelligence in Precision Agriculture. 61:1-61:9 - Jaouad Benhamou, Mohammed Jami, Ahmed Mezrhab:
Direct modeling method of acoustic streaming using lattice Boltzmann approach. 62:1-62:6 - Assiya Amri, Tomader Mazri:
Frequency Reconfigurable Antenna Design for RFID Tag: A Study. 63:1-63:5 - Somaya Haiba, Tomader Mazri:
Build a malware detection software for IOT network Using Machine learning. 64:1-64:8 - Fatima Zohra Lhafra, Otman Abdoun:
The impact of COVID-19 on education: Performance Analysis of Tracks and Tools for Distance Education in Schools during the Coronavirus Pandemic in Morocco. 65:1-65:8 - Samira Achki, Abdelali El Gourari, Layla Aziz:
X-ray image classification using Deep Learning method for Covid-19 diagnostic. 66:1-66:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.