


default search action
ICSENT 2018: Hammamet, Tunisia
- Proceedings of the 7th International Conference on Software Engineering and New Technologies, ICSENT 2018, Hammamet, Tunisia, December 26-28, 2018. ACM 2018, ISBN 978-1-4503-6101-9

- Hayat Yedjour

, Boudjelal Meftah
, Dounia Yedjour
, Abdelkader Benyettou:
The leaky integrate-and-fire neuron model for a rigid and a non-rigid object tracking. 1:1-1:4 - Zouhaier Brahmia

, Fabio Grandi, Rafik Bouaziz
:
Normalization of XML Schema Definitions. 2:1-2:5 - Basma Hamrouni, Ahmed Korichi

, Abdelhabib Bourouis
:
IDSS-BM: Intelligent Decision Support System for Business Models. 3:1-3:5 - Boubakeur Achichi, Fouzi Semchedine

, Lakhdar Derdouri:
Hybrid Approach for Congestion Control in VANETs. 4:1-4:4 - Djamel Saba, Rachid Maouedj

, Brahim Berbaoui:
Contribution to the development of an energy management solution in a green smart home (EMSGSH). 5:1-5:7 - Faiz Maazouzi

, Hafed Zarzour
, Halima Bahi
:
A New System For Audio Mining: Using of MDT+ for automatic prediction of new singers success. 6:1-6:6 - Safae Misry, Abdellah Echaoui, Yahia El Ouazzani:

Energy consumption and economic growth: the case of Morocco. 7:1-7:5 - Soltane Merzoug, Souraya Hamida, Okba Kazar

:
Formal approach to validated allocation process based on MAS and CP system. 8:1-8:7 - Ayman Naim, Abdessadek Aaroud

, Said Saadani:
Automatic approach for the extraction of indexes of electric meters and water. 9:1-9:5 - Mouhamadou Saliou Diallo, Moustapha Cissé, Marie N'diaye, Ousmane Sall

:
State of the art on mechanisms for personalization of information. 10:1-10:4 - Ghassan Fadlallah, Hamid Mcheick

, Djamal Rebaine, Mehdi Adda
:
Towards Mobile Collaborative Autonomous Networks Using Peer-to-Peer Communication. 11:1-11:8 - Hamid Mcheick

, Steve Godmaire:
Designing and implementing different use cases of aspect-oriented programming with AspectJ for developing mobile applications. 12:1-12:8 - Abdelhafid Chadli

, Erwan Tranvouez, Abir Hamrouni, Fatima Bendella
:
An agent-based simulation tool for participatory training environment: Application to rodent control campaign. 13:1-13:7 - Brahim Berbaoui, Djamel Saba, Rachid Dehini

, Abdeldjalil Dahbi
, Rachid Maouedj
:
Optimal control of shunt active filter based on Permanent Magnet Synchronous Generator (PMSG) using ant colony optimization algorithm. 14:1-14:8 - Imane Taghbalout, Fadoua Ataa-Allah

:
A Hybrid Approach for Amazigh-English Machine Translation. 15:1-15:6 - Hanen Faiez, Jalel Akaichi

:
Best Road Based Immersive Visualization Framework for patient in emergency: The ISRM application. 16:1-16:5 - Abderrazak Khediri

, Mohamed Ridda Laouar:
Intelligent Decision Support System for Electric Power Restoration. 17:1-17:5 - Benrais Lamine, Nadia Baha:

Spatial envelope and background knowledge for scene classification problem. 18:1-18:7 - Souad Faid, Mohamed Moughit

:
SDN based Managed WiFi Application. 19:1-19:4 - Ahmed Mateen

, Qingsheng Zhu, Salman Afsar Awan, Warda Rashid:
Optimization of Fog Computing Based Radio Access Networks. 20:1-20:8 - Ahmed Mateen

, Qingsheng Zhu, Salman Afsar Awan:
Comparitive Analysis of Manual vs Automotive Testing for Software Quality. 21:1-21:7 - Larbi Abdelmadjid

, Malki Mimoun
:
Requirements customized recommendation in a decision-making system. 22:1-22:5 - Faycel Abbas, Abdeljalil Gattal

, Mohamed Ridda Laouar, Kamel Saoudi, Ismail Hadjadj:
Local Binary Patterns for Gender Classification. 23:1-23:5 - Abdeljalil Gattal

, Faycel Abbas, Mohamed Ridda Laouar:
Automatic Parameter Tuning of K-Means Algorithm for Document Binarization. 24:1-24:4 - Wafa Difallah, Khelifa Benahmed, Fateh Bounaama, Belkacem Draoui, Assia Maamar:

Smart irrigation technology for efficient water use. 25:1-25:4 - Nadia Lachtar:

Using Domain Ontology to Classify a Song. 26:1-26:5 - Abdelaziz Amara Korba:

Energy Fraud Detection in Advanced Metering Infrastructure AMI. 27:1-27:6 - Djamila Benhaddouche, Mohamed Tekkouk, Abdelghani Chernnouf Youcef:

Extracting Geographic Knowledge from Wikipedia. 28:1-28:6 - Akram Bennour

:
Automatic handwriting analysis for writer identification and verification. 29:1-29:7 - Yamina Mohamed Ben Ali:

Improved-PSO Approach for a Steganographic Embedding Scheme. 30:1-30:4 - Abdessadek Aaroud

:
Cloud technology based Information System for testing and certification centers. 31:1-31:3 - Tarek Abid, Mohamed Ridda Laouar:

Using Semantic Web and Linked Data for Integrating and Publishing Data in Smart Cities. 32:1-32:4 - Boudjemaa Khelifa

, Mohamed Ridda Laouar:
Multi-agent Reinforcement Learning for Urban Projects Planning. 33:1-33:5 - Said Saadani, Abdessadek Aaroud

, Ayman Naim:
Simulation of the Urban Expansion of the El Jadida City. 34:1-34:3 - Badreddine Zerroumda, Fayçal Djeffal, Toufik Bentrcia, Hichem Ferhati:

Numerical Analysis of 4H-SiC MOSFET Design Including High-k Gate Dielectrics for Power electronic Applications. 35:1-35:5 - Elasaad Chebaki, Fayçal Djeffal, Toufik Bentrcia, Hichem Ferhati:

Device and Circuit Level Performance Analysis of a New Nanoscale DGJL MOSFET Design Using an Accurate Numerical Computation. 36:1-36:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














