nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Blast implementation in Hadoop MapReduce using low cost commodity hardware
|
Khawla, Tadist |
|
2018 |
127 |
C |
p. 69-75 |
artikel |
2 |
A Context-Aware Authentication System for Mobile Cloud Computing
|
Benzekki, Kamal |
|
2018 |
127 |
C |
p. 379-387 |
artikel |
3 |
A dynamic mosaicking method based on histogram equalization for an improved seamline
|
Laaroussi, Saadeddine |
|
2018 |
127 |
C |
p. 344-352 |
artikel |
4 |
A low complexity soft decision decoder for linear block codes
|
Alaoui, M.S. El Kasmi |
|
2018 |
127 |
C |
p. 284-292 |
artikel |
5 |
A method of data mining using Hidden Markov Models (HMMs) for protein secondary structure prediction
|
Lasfar, Mourad |
|
2018 |
127 |
C |
p. 42-51 |
artikel |
6 |
An Effective Oriented Genetic Algorithm for solving redundancy allocation problem in multi-state power systems
|
Essadqi, Mustapha |
|
2018 |
127 |
C |
p. 170-179 |
artikel |
7 |
A New Image Encryption Scheme Based on Confusion-Diffusion Using an Enhanced Skew Tent Map
|
Essaid, M. |
|
2018 |
127 |
C |
p. 539-548 |
artikel |
8 |
A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k
|
El Ouazzani, Zakariae |
|
2018 |
127 |
C |
p. 52-59 |
artikel |
9 |
Brain tumor temperature effect extraction from MRI imaging using bioheat equation
|
Bousselham, Abdelmajid |
|
2018 |
127 |
C |
p. 336-343 |
artikel |
10 |
Building A Fast Intrusion Detection System For High-Speed-Networks: Probe and DoS Attacks Detection
|
AIT TCHAKOUCHT, Taha |
|
2018 |
127 |
C |
p. 521-530 |
artikel |
11 |
CADS: A Connected Assistant for Driving Safe
|
Karkouch, Aimad |
|
2018 |
127 |
C |
p. 353-359 |
artikel |
12 |
Classification and Recognition of 3D Image of Charlier moments using a Multilayer Perceptron Architecture
|
Amakdouf, Hicham |
|
2018 |
127 |
C |
p. 226-235 |
artikel |
13 |
Clustering and Jarque-Bera Normality Test to Face Recognition
|
Abdellatif, Dahmouni |
|
2018 |
127 |
C |
p. 246-255 |
artikel |
14 |
Comparative study of skyline algorithms for selecting Web Services based on QoS
|
Fariss, Mourad |
|
2018 |
127 |
C |
p. 408-415 |
artikel |
15 |
ConvNets for Fraud Detection analysis
|
Chouiekh, Alae |
|
2018 |
127 |
C |
p. 133-138 |
artikel |
16 |
Data science in light of natural language processing: An overview
|
Zeroual, Imad |
|
2018 |
127 |
C |
p. 82-91 |
artikel |
17 |
Determining the Number of Clusters using Neural Network and Max Stable Set Problem
|
Karim, Awatif |
|
2018 |
127 |
C |
p. 16-25 |
artikel |
18 |
Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques
|
Idhammad, Mohamed |
|
2018 |
127 |
C |
p. 35-41 |
artikel |
19 |
DropWeak: A novel regularization method of neural networks
|
El Korchi, Anas |
|
2018 |
127 |
C |
p. 102-108 |
artikel |
20 |
Efficient dissemination based on passive approach and dynamic clustering for VANET
|
Touil, Abdelali |
|
2018 |
127 |
C |
p. 369-378 |
artikel |
21 |
EMV Cards Vulnerabilities Detection Using Deterministic Finite Automaton
|
Hajji, Tarik |
|
2018 |
127 |
C |
p. 531-538 |
artikel |
22 |
Enriching User Queries Using DBpedia Features and Relevance Feedback
|
Dahir, Sarah |
|
2018 |
127 |
C |
p. 499-504 |
artikel |
23 |
Estimation of the Optimal HMM Parameters for Amazigh Speech Recognition System Using CMU-Sphinx
|
Telmem, M. |
|
2018 |
127 |
C |
p. 92-101 |
artikel |
24 |
E-Transitive: an enhanced version of the Transitive heuristic for clustering categorical data
|
Slaoui, Said Chah |
|
2018 |
127 |
C |
p. 26-34 |
artikel |
25 |
Exploiting Semantic Web Services in the Development of Context-Aware Systems
|
Guermah, Hatim |
|
2018 |
127 |
C |
p. 398-407 |
artikel |
26 |
Fuzzy logic approach applied to credit scoring for microfinance in Morocco
|
Bennouna, Ghita |
|
2018 |
127 |
C |
p. 274-283 |
artikel |
27 |
Fuzzy model-based faults diagnosis of the wind turbine benchmark
|
EL Bakri, Ayoub |
|
2018 |
127 |
C |
p. 464-470 |
artikel |
28 |
Genetic Algorithm Based Approach for Autonomous Mobile Robot Path Planning
|
Lamini, Chaymaa |
|
2018 |
127 |
C |
p. 180-189 |
artikel |
29 |
Geographical Query reformulation using a Geographical Taxonomy and WordNet
|
El Midaoui, Omar |
|
2018 |
127 |
C |
p. 489-498 |
artikel |
30 |
GPU Neural Mutli Objective Solver for Optical Burst Grooming
|
Larhlimi, Abderrahim |
|
2018 |
127 |
C |
p. 200-208 |
artikel |
31 |
Image classification using separable invariants moments based on Racah polynomials
|
Batioua, Imad |
|
2018 |
127 |
C |
p. 320-327 |
artikel |
32 |
Improving integrated product design using SWRL rules expression and ontology-based reasoning
|
Abadi, Asmae |
|
2018 |
127 |
C |
p. 416-425 |
artikel |
33 |
Improving the Use of Big Data Analytics within Electronic Health Records: A Case Study based OpenEHR
|
Khennou, Fadoua |
|
2018 |
127 |
C |
p. 60-68 |
artikel |
34 |
Intelligent control of a DFIG wind turbine using a PSO evolutionary algorithm
|
Laina, Rajae |
|
2018 |
127 |
C |
p. 471-480 |
artikel |
35 |
Lung CT Image Segmentation Using Deep Neural Networks
|
Ait Skourt, Brahim |
|
2018 |
127 |
C |
p. 109-113 |
artikel |
36 |
Machine Learning and Graph Theory to Optimize Drinking Water
|
Amali, Said |
|
2018 |
127 |
C |
p. 310-319 |
artikel |
37 |
Mining Negatives Association Rules Using Constraints
|
Jabbour, Said |
|
2018 |
127 |
C |
p. 481-488 |
artikel |
38 |
Neural Networks for Stable Control of Nonlinear DFIG in Wind Power Systems
|
Douiri, Moulay Rachid |
|
2018 |
127 |
C |
p. 454-463 |
artikel |
39 |
Non-linear dictionary representation of deep features for face recognition from a single sample per person
|
Ouanan, Hamid |
|
2018 |
127 |
C |
p. 114-122 |
artikel |
40 |
Optimization of K-NN algorithm by clustering and reliability coefficients: application to breast-cancer diagnosis
|
Cherif, Walid |
|
2018 |
127 |
C |
p. 293-299 |
artikel |
41 |
Partially observable Markov methods in an agent-based simulation: a tax evasion case study
|
Yahyaoui, Fayçal |
|
2018 |
127 |
C |
p. 256-263 |
artikel |
42 |
Performance evaluation of feature extraction techniques in MR-Brain image classification system
|
Khalil, Mohammed |
|
2018 |
127 |
C |
p. 218-225 |
artikel |
43 |
Performance evaluation of intrusion detection based on machine learning using Apache Spark
|
Belouch, Mustapha |
|
2018 |
127 |
C |
p. 1-6 |
artikel |
44 |
Performance of DSRC and WIFI for Intelligent Transport Systems in VANET
|
Fitah, A. |
|
2018 |
127 |
C |
p. 360-368 |
artikel |
45 |
Personalized adaptive content system for context-aware ubiquitous learning
|
El Guabassi, Inssaf |
|
2018 |
127 |
C |
p. 444-453 |
artikel |
46 |
Random Forest and Support Vector Machine based Hybrid Approach to Sentiment Analysis
|
Al Amrani, Yassine |
|
2018 |
127 |
C |
p. 511-520 |
artikel |
47 |
Rolling element bearing remaining useful life estimation based on a convolutional long-short-term memory network
|
Hinchi, Ahmed Zakariae |
|
2018 |
127 |
C |
p. 123-132 |
artikel |
48 |
Security Enhancement in Healthcare Cloud using Machine Learning
|
Marwan, Mbarek |
|
2018 |
127 |
C |
p. 388-397 |
artikel |
49 |
Selecting significant marker genes from microarray data by filter approach for cancer diagnosis
|
Bouazza, Sara Haddou |
|
2018 |
127 |
C |
p. 300-309 |
artikel |
50 |
Semantic-based Followee Recommendations on Twitter Network
|
Dib, Brahim |
|
2018 |
127 |
C |
p. 505-510 |
artikel |
51 |
Short-term stock price forecasting using kernel principal component analysis and support vector machines: the case of Casablanca stock exchange
|
Nahil, Anass |
|
2018 |
127 |
C |
p. 161-169 |
artikel |
52 |
SMART Education Framework for Adaptation Content Presentation
|
El Janati, Salma |
|
2018 |
127 |
C |
p. 436-443 |
artikel |
53 |
Spanning Tree Problem with Neutrosophic Edge Weights
|
Broumi, Said |
|
2018 |
127 |
C |
p. 190-199 |
artikel |
54 |
Speed estimation using simple line
|
Bourja, Omar |
|
2018 |
127 |
C |
p. 209-217 |
artikel |
55 |
Support Vector Machines for a new Hybrid Information Retrieval System
|
Khalifi, Hamid |
|
2018 |
127 |
C |
p. 139-145 |
artikel |
56 |
Table of Contents
|
|
|
2018 |
127 |
C |
p. viii-xi |
artikel |
57 |
The vocabulary and the morphology in spell checker
|
Mohammed, Nejja |
|
2018 |
127 |
C |
p. 76-81 |
artikel |
58 |
Towards a Novel and Generic Approach for OWL Ontology Weighting
|
Abioui, Hasna |
|
2018 |
127 |
C |
p. 426-435 |
artikel |
59 |
Towards Integration of Fault Tolerance in Agent-based Systems
|
Haqiq, Abdelhay |
|
2018 |
127 |
C |
p. 264-273 |
artikel |
60 |
Traffic Sign Recognition Based On Multi-feature Fusion and ELM Classifier
|
Aziz, Saouli |
|
2018 |
127 |
C |
p. 146-153 |
artikel |
61 |
Using Tweets Embeddings For Hashtag Recommendation in Twitter
|
Ben-Lhachemi, Nada |
|
2018 |
127 |
C |
p. 7-15 |
artikel |
62 |
Visualizations memorability through visual attention and image features
|
Lahrache, Souad |
|
2018 |
127 |
C |
p. 328-335 |
artikel |
63 |
Vital Prognosis of Intoxicated Patients, Modeling by SVM, Evidence from Souss-Massa Daraa- Morocco
|
Kaicer, Mohammed |
|
2018 |
127 |
C |
p. 154-160 |
artikel |
64 |
X-Rays Tomographic Reconstruction Images using Proximal Methods based on L1 Norm and TV Regularization
|
Allag, Aicha |
|
2018 |
127 |
C |
p. 236-245 |
artikel |