


default search action
3rd NISS 2020: Marrakech, Morocco
- NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31 - April 2, 2020. ACM 2020, ISBN 978-1-4503-7634-1

- Karam Ahkouk, Mustapha Machkour, Jilali Antari

:
Inferring SQL Queries Using Interactivity. 1:1-1:7 - Abdelhak El Mouaffak, Abdelbaki El Belrhiti El Alaoui

:
Considering the environment's characteristics in wireless networks simulations and emulations: case of popular Simulators and WSN. 2:1-2:4 - Isma Boudouane, Amina Makhlouf, Mohamed Aures Harkat, Nadia Saadia, Amar Ramdane-Cherif:

Post-Fall Time Accounting for Fall Detection Using a Portable Camera. 3:1-3:7 - El Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, Alami Chentoufi Jihane:

Fireworks Algorithm for Frequency Assignment Problem. 4:1-4:6 - Adnane Ghani, El Hassan Ibn Elhaj, Ahmed Hammouch, Abdelaali Chaoub

:
Adaptation of quality for video streaming in a Bittorrent P2P IMS network. 5:1-5:8 - Insaf Bellamine, Hassan Silkan

, Amal Tmiri:
Motion Detection Using the Dynamic Color Texture. 6:1-6:6 - Fatima Es-Sabery

, Abdellatif Hair
:
Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey. 7:1-7:7 - Heddoun Asmae, Benrrezzouq Rhizlane

:
Role of Information Technologies in Supply Chain Management. 8:1-8:5 - Rahat Ali Khan, Shahzad Memon

:
Sensors Transposing Technique for Minimizing the Path Loss Effect and Enhancement of Battery Lifetime in Wireless Body Area Sensor Networks. 9:1-9:8 - Sara Ftaimi, Tomader Mazri:

A comparative study of Machine learning algorithms for VANET networks. 10:1-10:8 - Boughanja Manale

, Tomader Mazri:
A Survey of Intrusion Detection Algorithm in VANET. 11:1-11:7 - Younès Alaoui, Amine Belahbib, Lotfi El Aachak

, Mohammed Bouhorma
:
Unified Process to Design and Develop Serious Games for Schoolchildren. 12:1-12:8 - Kaoutar Bazi, Bouchaib Nassereddine

:
Comparative analysis of TCP congestion control mechanisms. 13:1-13:4 - Mohamed Amine Mamou, Nadia Saadia:

Ankle gait-pattern generators. 14:1-14:5 - Nogaye Lo, Ibrahima Niang:

A Survey on QoS-based communication protocols for IoT systems. 15:1-15:9 - Mohamed Akram Zaytar, Chaker El Amrani:

Machine Learning Methods for Air Quality Monitoring. 16:1-16:5 - Abdellah Nabou

, My Driss Laanaoui, Mohammed Ouzzif, Mohammed-Alamine El Houssaini:
Normality Test to Detect the Congestion in MANET by Using OLSR Protocol. 17:1-17:5 - Sara Belattar

, Otman Abdoun
, Haimoudi El Khatir
:
Study and Analysis of Data Analysis Systems (Reconstruction of a Learning Data from the Initial Data). 18:1-18:6 - Fatima Es-Sabery

, Abdellatif Hair
:
Evaluation and Comparative Study of the Both Algorithm LEACH and PEGASIS Based on Energy Consumption. 19:1-19:6 - Ben Abdel Ouahab Ikram

, Lotfi El Aachak
, Boudhir Anouar Abdelhakim, Bouhorma Mohammed
:
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide. 20:1-20:6 - Nurilhami Izzatie Khairi, Azlinah Mohamed

, Nor Nadiah Yusof
:
Feature Selection Methods in Sentiment Analysis: A Review. 21:1-21:7 - Lamia El Haourani, Anas Abou El Kalam

, Abdellah Ait Ouahman:
Big Data security and privacy techniques. 22:1-22:9 - Muhammad Hanif Nor Azman, Azlinah Mohamed

, Edzreena Edza Odzaly:
A Theoretical Study on Project Delivery and Leadership Style. 23:1-23:8 - Norli Shariffuddin, Azlinah Mohamed

:
IT Security and IT Governance Alignment: A Review. 24:1-24:8 - Hajar Ait Addi, Redouane Ezzahir, Abdelhak Mahmoudi:

Three-level binary tree structure for sentiment classification in Arabic text. 25:1-25:8 - Smaili El Miloud

, Sraidi Soukaina, Salma Azzouzi
, My El Hassan Charaf
:
An Adaptive Learning Approach for Better Retention of Learners in MOOCs. 26:1-26:5 - Ilham Dhaiouir

, Mostafa Ezziyyani
, Mohamed Khaldi
:
Towards a new approach to reduce the dropout rate in e-learning. 27:1-27:4 - Abdulla Hussain, Azlinah Mohamed

, Suriyati Razali:
A Review on Cybersecurity: Challenges & Emerging Threats. 28:1-28:7 - Amal Azeroual

, Youssef Taher, Benayad Nsiri
:
Recidivism forecasting: A study on process of feature selection. 29:1-29:6 - Zouhair Elamrani Abou Elassad

, Hajar Mousannif
, Hassan Al Moatassime:
Towards analyzing crash events for novice drivers under reduced-visibility settings: A simulator study. 30:1-30:7 - Jaouad Maqboul

, Bouchaib Bounabat Jaouad:
Contribution of Artificial Neural Network in Predicting Completeness Through the Impact and Complexity of its Improvement. 31:1-31:8 - Youssef Tounsi, Houda Anoun

, Larbi Hassouni:
CSMAS: Improving Multi-Agent Credit Scoring System by Integrating Big Data and the new generation of Gradient Boosting Algorithms. 32:1-32:7 - Nur Zahrah Farida Binti Ruslan, Azlinah Mohamed

, Norjansalika Janom:
Collaborative Consumption Motives: A Review. 33:1-33:7 - Asmae Hmami, Hanae Sbaï

, Mounia Fredj:
A new Framework to improve Change Mining in Configurable Process. 34:1-34:6 - Nur Nadira Izlyn Kamaruddin, Azlinah Mohamed

, Syaripah Ruzaini Syed Aris:
Online Advertising on Consumer Purchasing Behavior: Effective Elements and its Impact. 35:1-35:7 - Asma Chikh

, Mohamed Lehsaini:
AGEM-based Multipath Routing Protocol using Triangle Link Quality for Wireless Multimedia Sensor networks. 36:1-36:5 - Mohammed Sabiri

, Youssef Bensalih, Aziz Elbour
:
Some Properties of Free Cyclic Codes over Finite Chain Rings. 37:1-37:11 - Khalid Ounachad, Mohamed Oualla

, Abdelghani Souhar, Abdelalim Sadiq:
Face Sketch Recognition-An Overview. 38:1-38:8 - Stéphane Cédric Koumétio Tékouabou, El Arbi Abdellaoui Alaoui, Imane Chabbar, Walid Cherif, Hassan Silkan

:
Machine Learning Aprroach for Early Detection of Glaucoma from Visual Fields. 39:1-39:5 - Samir Ifzarne, Imad Hafidi

, Nadia Idrissi:
Compressive Sensing Based on Homomorphic Encryption and Attack Classification using Machine Learning Algorithm in WSN Security. 40:1-40:6 - Oumaima Stitini

, Soulaimane Kaloun
, Omar Bencharef:
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review. 41:1-41:12 - Hayat Khaloufi, Karim Abouelmehdi

, Abderrahim Beni Hssane:
Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity. 42:1-42:5 - Ehlem Zigh

, Ayoub Elhoucine, Abderrahmane Mallek, Mohammed Kadiri
, Kouninef Belkacem, Tolga Ensari:
Smartphone learning for Kids edutainment. 43:1-43:5 - Mourad Zairi

, Tarik Boujiha
, Ouelli Abdelhaq
:
An Algorithm for Digital Image Watermarking using 2-Level DWT, DCT and QR Decomposition based on Optimal Blocks Selection. 44:1-44:4 - Mustapha Bahich

, Mohammed Bailich:
Speckled correlation fringes denoising and demodulation using directional total variation and ridgelet transform. 45:1-45:5 - Asmae Berhich

, Fatima-Zahra Belouadha
, Mohammed Issam Kabbaj:
LSTM-based Models for Earthquake Prediction. 46:1-46:7 - Redouane Lhiadi

:
Deep Learning Algorithms and Their Applications in the Perception Problem. 47:1-47:6 - Richard Adeyemi Ikuesan

, Shefiu Olusegun Ganiyu, Muhammad Umar Majigi, Yusuf Drisu Opaluwa
, Hein S. Venter:
Practical Approach to Urban Crime Prevention in Developing Nations. 48:1-48:8 - Dmitriy Bystrov

, Toirov Olimjon
, Giyasov Sanjar, Taniev Mirzokhid, Urokov Sardor:
Role of Reengineering in Training of Specialists. 49:1-49:4 - Mohamed Chouai, Mostefa Merah, José-Luis Sancho-Gómez

, Malika Mimi:
A machine learning color-based segmentation for object detection within dual X-ray baggage images. 50:1-50:11 - Mohamed Khoali, Abdelhak Tali, Yassin Laaziz

:
Advanced Recommendation Systems Through Deep Learning. 51:1-51:8 - Abdelhamid Riadi, Mohamed Boulouird

, Moha M'Rabet Hassani:
Massive-MIMO Configuration of Multipolarized ULA and UCA in 5G Wireless Communications. 52:1-52:5 - Ait Lahcen Yassine

, Jali Abdelaziz, El Oirrak Ahmed:
Approach of Constructing an Islamic Pattern Respecting the "HASBA" Method. 53:1-53:9 - Dmitriy Bystrov

, Toirov Olimjon
, Mustafakulova Gulzoda, Yakubova Dilfuza:
Fuzzy Systems for Computational Linguistics and Natural Language. 54:1-54:3 - Anas El-Ansari

, Abderrahim Beni Hssane, Mostafa Saadi
:
An improved modeling method for profile-based personalized search. 55:1-55:6 - Nickson M. Karie

, Victor R. Kebande
, Richard Adeyemi Ikuesan
, Mehdi Sookhak
, Hein S. Venter:
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud. 56:1-56:6 - Meziane Hind

, Noura Ouerdi
, Kasmi Mohammed Amine, Mazouz Sanae:
Internet of Things: Classification of attacks using CTM method. 57:1-57:5 - Youssef Aassem, Imad Hafidi

, Noureddine Aboutabit
:
Enhanced Duplicate Count Strategy: Towards New Algorithms to Improve Duplicate Detection. 58:1-58:7 - Asma Khabba, Sanaa Errahili, Saida Ibnyaich, Moha M'Rabet Hassani:

A Novel Design of Miniaturized Leaf Shaped Antenna For 5G Mobile phones. 59:1-59:5 - Sanaa Errahili, Asma Khabba, Saida Ibnyaich, Moha M'Rabet Hassani:

New Frequency Reconfigurable Patch Antenna for Wireless Communication. 60:1-60:4 - Hadjer Fellah, Chaker Mezioud, Mohamed Chaouki Batouche

:
Mobile Cloud Computing: Architecture, Advantages and Security Issues. 61:1-61:9 - Fouad Toufik, Mohamed Bahaj

:
Model Transformation From Object Relational Database to NoSQL Column Based Database. 62:1-62:5 - Sonia Benbelgacem, Larbi Guezouli

, Rachid Seghir:
A Distributed Information Retrieval Approach for Copyright Protection. 63:1-63:6 - Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt:

Verification of Integrity in Vehicle Architectures. 64:1-64:7 - Ahmed Remaida

, Aniss Moumen
, Younes El Bouzekri El Idrissi
, Zineb Sabri
:
Handwriting Recognition with Artificial Neural Networks a Decade Literature Review. 65:1-65:5 - Lahcen El Moutaouakil, Mohammed Boukendil

, Zaki Zrikem, Abdelhalim Abdelbaki:
Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders. 66:1-66:4 - Mouad Tantaoui

, My Driss Laanaoui, Mustapha Kabil
:
Real-time Prediction of Accident using Big Data System. 67:1-67:5 - Othmane Daanouni

, Bouchaib Cherradi
, Amal Tmiri:
Diabetes Diseases Prediction Using Supervised Machine Learning and Neighbourhood Components Analysis. 68:1-68:5 - Yassine Sadqi

, Yousra Belfaik
, Said Safi:
Web OAuth-based SSO Systems Security. 69:1-69:7 - Ahmed Mehrez

, Lamia Aladel:
Modelling Sustainability, Cloud computing and knowledge transmission in education in developing countries. 70:1-70:9 - Mohammed Zaoudi, Hicham Belhadaoui

:
Adaptive E-learning: Adaptation of Content According to the Continuous Evolution of the Learner During his Training. 71:1-71:6 - Oumaima El Kouari, Hafssa Benaboud

, Saiida Lazaar
:
Using machine learning to deal with Phishing and Spam Detection: An overview. 72:1-72:7 - Mouna Boujrad, Saiida Lazaar

, Mohamed Hassine:
Performance Assessment of Open Source IDS for improving IoT Architecture Security implemented on WBANs. 73:1-73:4 - Lahraoui Younes

, Amal Youssef
, Saiida Lazaar
:
Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme. 74:1-74:6 - Bghiel Afrae, Mohamed Ben Ahmed

, Anouar Abdelhakim Boudhir:
A Question answering System with a sequence to sequence grammatical correction. 75:1-75:6 - Fatima-Zohra Hibbi

, Otman Abdoun
, Haimoudi El Khatir
:
Knowledge Management in the Expert Model of the Smart Tutoring System. 76:1-76:4 - Dahdouh Yousra, Anouar Abdelhakim Boudhir

, Mohamed Ben Ahmed
:
An efficient Algorithm for medical image classification using Deep Convolutional Network: Case of Cancer Pathology. 77:1-77:9 - Soufyane Ayanouz

, Boudhir Anouar Abdelhakim, Mohammed Benahmed
:
A Smart Chatbot Architecture based NLP and Machine Learning for Health Care Assistance. 78:1-78:6 - Azzeddine Dekhane

, Adel Djellal, Fouaz Boutebbakh, Rabah Lakel:
Cooling Fan Combined Fault Vibration Analysis Using Convolutional Neural Network Classifier. 79:1-79:6 - Hajar Ait Addi, Redouane Ezzahir:

Sampling techniques for Arabic Sentiment Classification: A Comparative Study. 80:1-80:6 - Ghislain Mervyl S. J. Kossingou, Nadege Gladys Ndassimba, Edgard Ndassimba

, Kéba Gueye, Samuel Ouya
:
Proposal of the Solution of Virtual Basic Schools in Rural Areas of African Countries in Conflict: Case of the Central African Republic. 81:1-81:5 - Okacha Diyer, Naceur Achtaich, Khalid Najib:

Artificial Intelligence in Learning Skills Assessment: A Pedagogical Innovation. 82:1-82:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














