


default search action
5th CSA 2022: Algiers, Algeria
- Mustapha Réda Senouci

, Said Yacine Boulahia
, Mohamed Akrem Benatia
:
Advances in Computing Systems and Applications - Proceedings of the 5th Conference on Computing Systems and Applications, CSA 2022, Algiers, Algeria, 17-18 May, 2022. Lecture Notes in Networks and Systems 513, Springer 2022, ISBN 978-3-031-12096-1
Artificial Intelligence and Data Science
- Mohamed Akrem Benatia, Said Yacine Boulahia, Mustapha Amine Mahi:

AttR2U-Net: Deep Attention Based Approach for Melanoma Skin Cancer Image Segmentation. 3-13 - Meriem Amel Guessoum, Rahma Djiroun, Kamel Boukhalfa:

Causality Analysis Method and Model Related to Why-Question Answering in Business Intelligence Context. 15-26 - Ahmed Habbouchi

, Mohamed El Yazid Boudaren
, Mustapha Réda Senouci
, Amar Aïssani
:
Markovian Segmentation of Non-stationary Data Corrupted by Non-stationary Noise. 27-37 - Fatma Kachi

, Chafia Bouanaka
:
Aster: A DSL for Engineering Self-Adaptive Systems. 39-49 - Khadidja Belmessous, Faouzi Sebbak

, M'hamed Mataoui, Amine Batouche:
Co-rating Aware Evidential User-Based Collaborative Filtering Recommender System. 51-60 - Aicha Boutorh

, Kaouter Marref, Naamat Ellah Dehiri:
Graph Representation Learning for Covid-19 Drug Repurposing. 61-72 - Kheyreddine Djouzi, Kadda Beghdad Bey, Abdenour Amamra:

A Scalable Adaptive Sampling Based Approach for Big Data Classification. 73-83 - Mohamed Hassen Kerkache

, Lamia Sadeg-Belkacem
, Fatima Benbouzid-Si Tayeb
, Amri Ali:
Supervised Learning Using Community Detection for Link Prediction. 85-94 - Amel Oubara, Falin Wu, Abdenour Amamra, Gongliu Yang:

Survey on Remote Sensing Data Augmentation: Advances, Challenges, and Future Perspectives. 95-104
Emerging Technologies for Future Internet
- Wassim Boudieb, Abdelhamid Malki

, Mimoun Malki
:
Microservice Instances Provisioning for IoT Applications in Fog Computing. 107-117 - Rezki Zibani

, Faouzi Sebbak
, Mohamed El Yazid Boudaren, M'hamed Mataoui, Massinissa Touabi, Houssam Hfaifia:
A New Fusion-Based Approach for License Plate Recognition: An Application to the Algerian Context. 119-131 - Djabir Abdeldjalil Chekired, Lyes Khoukhi:

5G-Slicing of EVs Services: A Latency Analysis Model Based on Decentralized SDN-Fog Architecture. 133-142 - Rabah Louali

, Abdelhafid Elouardi
, Samir Bouaziz
:
COTS-Based Embedded Systems Design Using an Iterative and Incremental Approach: A Case Study of an UAV Embedded System Development. 143-152 - Ahmed Abdelli

, Abdenour Amamra, Ali Yachir:
Swarm Robotics: A Survey. 153-164
Computer Networks
- Adel Djama, Badis Djamaa

, Mustapha Réda Senouci:
An Analysis of the Name Length Impact on NDN-Enabled IEEE 802.15.4 Networks. 167-176 - Nourredine Oukas

, Menouar Boulif
, Lyes Badis
:
A New GSPNs-Model for Sensors in Solar EHWSNs, Considering Seasonal Sunshine Levels and Sleeping Mechanism Based on Channel Polling Schedule. 177-186 - Elhadja Benalia, Salim Bitam:

QoS-SDIoV: An Efficient QoS Routing Scheme for Software Defined Internet of Vehicles. 187-198 - Mohamed Remli, Oualid Demigha, Ali Yachir:

Study on Parameters Affecting 6TiSCH Network Formation. 199-209 - Mustapha Réda Senouci, Ahmed Habbouchi, Yakoub Mordjana:

Bandit Algorithms for Robust Forwarding in Named Data Networking. 211-221
Optimization and Operational Research
- Dallel Nasri, Diab Mokeddem:

An Efficient Grasshopper Optimization Algorithm Using Arithmetic Crossover for Global Optimization. 225-235 - Abdessamed Mogtit, Redouane Boudjemaa, Mohand Lagha

:
Augmented Lagrangian Genetic Algorithm Approach Towards Solving Constrained Numerical and Coverage Optimization. 237-248 - Dallel Nasri

, Diab Mokeddem
:
Improved Salp Swarm Optimization Algorithm for Engineering Problems. 249-259 - Safia Gunadiz

, Ali Berrichi
:
Grey Wolf Optimizer with Multi Step Crossover for Bi-objective Job Shop Scheduling Problem. 261-272
Cyber Security and Privacy
- Adil Imad Eddine Hosni

, Khaled Aimen Hafiani, Abderrahim Chenoui, Kadda Beghdad Bey:
Hybrid Approach for Rumor Influence Minimization in Dynamic Multilayer Online Social Networks. 275-285 - Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:

Security Analysis and Evaluation of Optimized Authentication in Named Data Networking. 287-297 - Hamza Bouchendouka, Djamel Teguig, Said Sadoudi:

SDR Implementation of WIFI Attacks Using GNURadio. 299-309 - Zakaria Sahraoui

, Ahmed Chekirine:
On the Risk Analysis and Countermeasure for Bit-Flipping Attack in LoRaWAN. 311-321 - Ayoub Si-Ahmed, Al-Garadi Mohammed Ali, Boustia Narhimene:

Enhanced Intrusion Detection System for Remote Healthcare. 323-333
Computer Vision and Graphics
- Ahcen Aliouat

, Nasreddine Kouadria
, Saliha Harize
, Moufida Maimour
:
Multi-Threshold-Based Frame Segmentation for Content-Aware Video Coding in WMSN. 337-347 - Wissam Bouzi

, Samia Bentaieb
, Abdelaziz Ouamri
, Ahmed Yassine Boumedine
:
Multi-Column Convolutional Neural Network for Vehicle-Type Classification. 349-359 - Mohamed Lamine Rouali, Abdenour Amamra, Said Yacine Boulahia, Mohamed Akram Benatia:

Heterogenous Action Ensembling for Visual Recognition of Large-Scale Actions. 361-371 - Achouak Zerari, Oussama Djedidi

, Laid Kahloul
, Carlo Romeo
, Ikram Remadna:
Paediatric Bone Age Assessment from Hand X-ray Using Deep Learning Approach. 373-383 - Khadidja Delloul

, Slimane Larabi
:
Image Captioning State-of-the-Art: Is It Enough for the Guidance of Visually Impaired in an Environment? 385-394 - Rouini Abdelghani, Larbi Messaouda, Samira Larbi:

A New Robust Level Set Segmentation Method Based of New Saliency Driven Region (LSNSDR): Application to Medical Images. 395-404

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














