


default search action
8th IBICA 2017: Marrakech, Morocco
- Ajith Abraham, Abdelkrim Haqiq, Azah Kamilah Muda, Niketa Gandhi:

Innovations in Bio-Inspired Computing and Applications - Proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2017) Held in Marrakech, Morocco, December 11-13, 2017. Advances in Intelligent Systems and Computing 735, Springer 2018, ISBN 978-3-319-76353-8 - Oscar Castillo

, Frumen Olivas, Fevrier Valdez
:
Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy Logic in Bio-Inspired Optimization Methods. 1-12 - Sana Akourmis, Youssef Fakhri

, Moulay Driss Rahmani
:
Reducing Blackhole Effect in WSN. 13-24 - Said Broumi

, Assia Bakali
, Mohamed Talea
, Florentin Smarandache
, Vakkas Uluçay
:
Minimum Spanning Tree in Trapezoidal Fuzzy Neutrosophic Environment. 25-35 - Atta-ur-Rahman

, Kiran Sultan, Nahier Aldhafferi
, Abdullah Alqahtani
:
Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-orthogonal Spreading Codes. 36-48 - Qëndresë Hyseni, Sule Yildirim Yayilgan

, Bujar Krasniqi
, Kadri Sylejmani
:
Solving the Problem of Distribution of Fiscal Coupons by Using a Steady State Genetic Algorithm. 49-59 - Afaf Mosaif

, Said Rakrak
:
A Survey of Cross-Layer Design for Wireless Visual Sensor Networks. 60-68 - Mohamed Matoui, Noureddine Moumkine, Abdellah Adib

:
An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service. 69-80 - Ladislav Zjavka, Stanislav Misák

, Lukás Prokop
:
NWP Model Revisions Using Polynomial Similarity Solutions of the General Partial Differential Equation. 81-91 - Abdellah Ouammou

, Mohamed Hanini
, Said El Kafhali
, Abdelghani Ben Tahar:
Energy Consumption and Cost Analysis for Data Centers with Workload Control. 92-101 - Ahmed Boujnoui

, Abdellah Zaaloul, Abdelkrim Haqiq
:
A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost. 102-112 - Adnane El Hanjri, Abdellah Zaaloul, Abdelkrim Haqiq

:
Analytic Approach Using Continuous Markov Chain to Improve the QoS of a Wireless Network. 113-124 - Mohamed Nabil

, Abdelmajid Hajami, Abdelkrim Haqiq
:
Determining and Evaluating the Most Route Lifetime as the Most Stable Route Between Two Vehicles in VANET. 125-132 - Mengfan Zhi, Ziqiang Yu, Bo Yang, Lin Wang, Liangliang Zhang, Jifeng Guo

, Xuehui Zhu:
Reverse Extraction of Early-Age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming with Similarity Weight Tournament Selection. 133-142 - Lairenjam Obiroy Singh

, Rajagopalan Devanathan
:
Performance Improvement of Bio-Inspired Strategies Through Feedback Laws. 143-156 - Asmae El Kassiri

, Fatima-Zahra Belouadha
:
A Semantic Approach Towards Online Social Networks Multi-aspects Analysis. 157-168 - Mohamed Moncef Ben Khelifa, Hachem A. Lamti, Adel M. Alimi

:
Towards a New Generation of Wheelchairs Sensitive to Emotional Behavior of Disabled People. 169-177 - Abdulfattah Mohammad Obeid, Manel Elleuchi, Mohamed Wassim Jmal

, Manel Boujelben, Mohamed Abid, Mohammed S. BenSaleh:
A Comprehensive Technical Review on Security Techniques and Low Power Target Architectures for Wireless Sensor Networks. 178-199 - Souad Labghough

, Fouad Ayoub
, Mostafa Belkasmi:
A Closed Form Expression for the Bit Error Probability for Majority Logic Decoding of CSOC Codes over \varGamma \varGamma Γ Γ Channels. 200-210 - Majda Elhozmari, Ahmed Ettalbi:

Straightforward MAAS to Ensure Interoperability in Heterogeneous Environment. 211-220 - Yassine Maleh

, Abdelkebir Sahid
, Abdellah Ezzati
, Mustapha Belaïssaoui
:
A Capability Maturity Framework for IT Security Governance in Organizations. 221-233 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih

:
System Multi Agents for Automatic Negotiation of SLA in Cloud Computing. 234-244 - Ridha Jarray, Nawel Jmail, Abir Hadriche, Tarek Frikha

:
A Comparison Between Modeling a Normal and an Epileptic State Using the FHN and the Epileptor Model. 245-254 - Marie Ndaw, Gervais Mendy

, Samuel Ouya
:
Modeling the Effect of Security Measures on Electronic Payment Risks. 255-265 - Kandoussi el Mehdi, Iman El Mir, Mohamed Hanini

, Abdelkrim Haqiq
:
Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory. 266-276 - Oussama Mjihil, Hamid Taramit

, Abdelkrim Haqiq
, Dijiang Huang
:
Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming. 277-287 - Anass Misbah

, Ahmed Ettalbi:
Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure. 288-297 - Maryem Ait El Hadj

, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies. 298-308 - Sana Ibjaoun, Anas Abou El Kalam

, Vincent Poirriez, Abdellah Ait Ouahman:
Biometric Template Privacy Using Visual Cryptography. 309-317 - Safaa Mahrach, Oussama Mjihil, Abdelkrim Haqiq

:
Scalable and Dynamic Network Intrusion Detection and Prevention System. 318-328 - Ahmed Kharrat, Mahmoud Neji:

A Hybrid Feature Selection for MRI Brain Tumor Classification. 329-338 - Youssef Harmouch, Rachid El Kouch:

A Statistical Analysis for High-Speed Stream Ciphers. 339-349 - Asmaa El Kandoussi

, Hanan El Bakkali:
Weighted Access Control Policies Cohabitation in Distributed Systems. 350-360 - Monsef Boughrous, Hanan El Bakkali:

A Comparative Study on Access Control Models and Security Requirements in Workflow Systems. 361-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














