


default search action
6th Cloudtech 2023: Marrakech, Morocco
- 6th IEEE International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2023, Marrakech, Morocco, November 21-23, 2023. IEEE 2023, ISBN 979-8-3503-0306-3

- Abderrahim Lachguer, Abderrahmane Sadiq, Youssef Es-saady

, Mohamed El Hajji:
Towards an IoT Architecture Based on Machine Learning for Missing Data Prediction on the Edge. 1-7 - Saad Belcaid, Siham Aouad, Mostapha Zbakh:

A Survey on Recent Intrusion Detection Systems in Cloud Environment. 1-6 - Abd Allah Aouragh, Mohamed Bahaj:

Advancing Breast Cancer Diagnosis with Machine Learning: Exploring Data Balancing, Feature Selection, and Bayesian Optimization. 1-6 - Mohammed Wazir Adain, Adil Tanveer:

Using Serverless FaaS for Invoking Long-Running Jobs. 1-6 - Ilyass Mokhtari, Ayyoub El Outmani, El Miloud Jaâra:

Security Governance in IOT Environment: A State of Art. 1-4 - Khadija Bouyakhsaine

, Abderrahim Brakez
, Mohcine Draou:
Data-Driven Approach for Residential Occupancy Modeling Using PIR Sensors: A Moroccan Case Study. 1-6 - Ayoub Berdai

, Dalila Chiadmi:
Attempts in Worst-Case Optimal Joins on Relational Data Systems: A Literature Survey. 1-8 - Sara Halim, Bouchaib Bounabat:

Assessing Digital Government Maturity Model for Developed Countries. Application to Singapore. 1-7 - Karmaoui Idrissi Hamza, Jihad Kilani, Faycal Bensalah, Youssef Baddi

:
Evaluation and Analysis of Network Safety Mechanisms in SDN Infrastructure. 1-6 - Jens Kohler:

Comparison of a FaaS- and SaaS-Based ETL Process in a Cloud Environment. 1-7 - Mohammed Benali, Abdeljalil Elouardighi:

Sentiment Analysis Applied to Arabic Tweets Using Machine Learning and Deep Learning. 1-8 - Zainab Ouardirhi, Sidi Ahmed Mahmoudi, Mostapha Zbakh:

A Novel Approach for Recognizing Occluded Objects Using Feature Pyramid Network Based on Occlusion Rate Analysis. 1-7 - Zakaria Sawadogo

, Babacar Thioye, Ibrahima Gaye
, Jean Marie Dembele
, Gervais Mendy
, Samuel Ouya
:
Mid@ndro: a Middleware Architecture for Malware Detection on Android. 1-5 - Majid Almaraashi:

Comparing Different Simulated Annealing Cooling Variants for Fuzzy Logic Systems Modeling. 1-6 - Jean-Sébastien Lerat

, Sidi Ahmed Mahmoudi:
Architecture to Distribute Deep Learning Models on Containers and Virtual Machines for Industry 4.0. 1-8 - Ismail El Yamani

, Souad Sadki, Hanan El Bakkali, Driss Allaki:
CL2S4P: A Privacy Policy Translator for Comprehensive Interpretation in Smart Healthcare Systems. 1-7 - Sara El Ouahabi, Safâa El Ouahabi, El Wardani Dadi

:
Multi-Domain Dataset for Moroccan Arabic Dialect Sentiment Analysis in Social Networks. 1-7 - Hassan Farsi, Driss Allaki, Abdeslam En-Nouaary, Mohamed Dahchour:

Dealing with Anti-Patterns When Migrating from Monoliths to Microservices: Challenges and Research Directions. 1-8 - Basma Iraqi, Lamia Benhiba

, Mohammed Abdou Janati Idrissi:
Data-Driven Transformation in Investment Banks. 1-9 - Widad El Moutaouakal, Karim Baïna:

Comparative Experimentation of MLOps Power on Microsoft Azure, Amazon Web Services, and Google Cloud Platform. 1-8 - Hanane Dihmani, Abdelmajid Bousselham

, Omar Bouattane:
A Review of Feature Selection and HyperparameterOptimization Techniques for Breast Cancer Detection on thermograms Images. 1-8 - Soufiane Aatab, Felix Freitag:

Integrating a Neural Network Library in Embedded Federated Learning. 1-7 - Chaymae Majdoubi

, Saida El Mendili
, Youssef Gahi:
Data Security Patterns for Critical Big Data Systems. 1-8 - Mustapha Hammouti

, Omar Moussaoui, Mohammed Haissaine, Abdelkader Bétari:
Comparative Evaluation of IoT Mesh Network Protocols: NeoMesh Versus LoRa Pymesh. 1-6 - Laila Bouhouch, Mostapha Zbakh, Claude Tadonki:

A New Classification for Data Placement Techniques in Cloud Computing. 1-9 - Manu Agarwal, Enkhzol Dovdon

, Luis Roma Barge, Yanja Dajsuren, Jakob de Vlieg:
A HPC-Based Data Analytics Platform Architecture for Data-Driven Animal Phenotype Detection. 1-6 - Mahbubur Rahman, Liang Chen

, Jonathan Loo, Wei Jie:
Towards Deep Learning Based Access Control using Hyperledger-Fabric Blockchain for the Internet of Things. 1-8 - Hasnae Lamrani Alaoui, Mostapha Zbakh, An Braeken, Abdellah Touhafi, Abdellatif El Ghazi:

Authentication Protocol for RFID Systems: A Survey. 1-11 - Hind Mikram, Said El Kafhali

, Youssef Saadi:
A Hybrid Algorithm Based on PSO Algorithm and Chi-Squared Distribution for Tasks Consolidation in Cloud Computing Environment. 1-6 - Nadia Qoudhadh, Mostapha Zbakh:

Algorithms Scheduling Applied to Microservics Architectures: A Survey Study. 1-12 - Zakaria Sawadogo

, Muhammad Taimoor Khan
, Jean Marie Dembele, Gervais Mendy, Samuel Ouya:
Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis Methods. 1-5 - Hicham Boudlal

, Mohammed Serrhini, Ahmed Tahiri
:
Leveraging WiFi Channel State Information for Efficient and Reliable Device-Free Human Activity Recognition. 1-8 - Mohammed Hajhouj, Mounia Abik, Randa Zarnoufi:

Enhancing Syntactic Resolution in Biomedical Data Processing with OpenCL: A Use Case Study. 1-8 - Hind Berrami

, Zineb Serhier, Manar Jallal
, Mohammed Bennani Othmani:
Artificial Intelligence: Perception, Attitudes and Use Among Students at the Casablanca Faculty of Medicine. 1-4 - Khalid Maidine

, Ahmed El-Yahyaoui
:
Cloud Identity Management Mechanisms and Issues. 1-9 - Takayuki Kushida, Yuka Kato:

Logical IoT Cloud - Integrated Systems Management for Cloud and IoT. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














