Kacprzyk, Janusz

International Conference on Information Technology and Communication Systems

Kacprzyk, Janusz - International Conference on Information Technology and Communication Systems, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783319647197
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Decisional Information System for the “NWA” Meteorites
Lahcen Ouknine, Hanane Bais, Fouad Khiri, Mustapha Machkour, Abderrahmane Ibhi, Lahcen Koutti

2. Collecting and Processing Multilingual Streaming Tweets for Sentiment Analysis
Abdeljalil Elouardighi, Hafdalla Hammia, Mohcine Maghfour

3. Synonym Reduction in a Comparative Study of Clustering Algorithms in Text Mining
Abdennour Jalil, Noureddine Aboutabit, Imad Hafidi

4. Using Statistical and Semantic Analysis for Arabic Text Summarization
Nabil Alami, Yassine Adlouni, Noureddine En-nahnahi, Mohammed Meknassi

5. Entity Resolution in NoSQL Data Warehouse
Lamiae Alami, Imad Hafidi, Abdelmotalib Metrane

6. Automation of a Fault Management System for Bahraini Telecommunication Companies
Abdul Fattah Salman, Mahmood Majeed, Ahmed Alsahlawi

7. Towards Classification of Web Ontologies Using the Horizontal and Vertical Segmentation
Redouane Nejjahi, Noreddine Gherabi, Abderrahim Marzouk

8. Model-to-Model Transformation in Approach by Modeling to Generate a RIA Model with GWT
Redouane Esbai, Mohammed Erramdani, Fouad Elotmani, Mohamed Atounti

9. An Enhanced Method to Compute the Similarity Between Concepts of Ontology
Abdelhadi Daoui, Noreddine Gherabi, Abderrahim Marzouk

10. Towards a Completeness Prediction Based on the Complexity and Impact
Jaouad Maqboul, Bouchaib Bounabat

11. Toward the Development of a General Semantic Repository for the Interoperability of Information Systems Based on Ontological Database
Meryem Fakhouri Amr, Khalifa Mansouri, Mohammed Qbadou, Bouchaib Riyami

12. Modeling Aircraft Landing Scheduling in Event B
Abdessamad Jarrar, Youssef Balouki, Taoufiq Gadi, Sallami Chougdali

13. Load Signatures Identification Based on Real Power Fluctuations
El Bouazzaoui Cherraqi, Abdelilah Maach

14. A New Secure SIP Authentication Scheme Based on Elliptic Curve Cryptography
Mourade Azrour, Mohammed Ouanan, Yousef Farhaoui

15. An Adaptation of GRA Method for Network Selection in Vertical Handover Context
Mouad Mansouri, Cherkaoui Leghris

16. Toward Cluster Head Selection Criterions in Mobile Ad Hoc Network
Meriem Ait Rahou, Abderrahim Hasbi

17. A New Method of IPv6 Addressing Based on RFID in Small Objects Networks
Ali El Ksimi, Cherkaoui Leghris, Khoukhi Faddoul

18. A New Alert Message Dissemination Protocol for VANETs and Simulation in a Real Scenario
Hamid Barkouk, El Mokhtar En-Naimi

19. Direction of Arrival in Two Dimensions with Matrix Pencil Method
Mohammed Amine Ihedrane, Seddik Bri

20. A Real-Time Risk Assessment Model for Intrusion Detection Systems Using Pattern Matching
El Mostapha Chakir, Mohamed Moughit, Youness Idrissi Khamlichi

21. Compact Tetraband PIFA Antenna for Mobile Handset Applications
Mohamed Tarbouch, Abdelkebir El Amri, Hanae Terchoune

22. A Hybrid NIPS Based on PcapSockS Sniffer and Neural MLP
Azidine Guezzaz, Ahmed Asimi, Younes Asimi

23. Convolutional Codes BPSK Modulation with Viterbi Decoder
Nejwa El Maammar, Seddik Bri, Jaouad Foshi

24. A New Monitoring Approach with Cloud Computing for Autonomic Middleware-Level Scalability Management Within IoT Systems
Mohamed Nabil Bahiri, Abdellah Zyane, Abdelilah Ghammaz, Christophe Chassot

25. MDA Approach for Application Security Integration with Automatic Code Generation from Communication Diagram
Lasbahani Abdellatif, Mostafa Chhiba, Abdelmoumen Tabyaoui, Oussama Mjihil

26. Context-Aware for Service Composition Optimization in Cloud Computing
Ali Bentaleb, Ahmed Ettalbi

27. A New Architecture of Search Information System in the Bulletin Official of Kingdom of Morocco
Anass Smaili, Mohamed Sbihi, Abdelali Lasfar

28. Automatic Seeded Region Growing Based on Texture Features for Mass Segmentation in Digital Mammography
Moustapha Mohamed Saleck, Abdelmajide Moutaouakkil

29. Robust Video Coding Based on Perceptual Unequal Protection
Ouafae Serrar, Oum Kheir Abra, Mohamed Youssfi, Ahmad Tamtaoui

30. 3D Object-Parts Classification Based on a Multiclass-SVM Approach
Omar Herouane, Hajar Hardi, Lahcen Moumoun

31. Adapting Alkhalil Morpho Sys as Part of a Translation System from Arabic to Arabic Sign Language
Mourad Brour, Abderrahim Benabbou

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)

Publication year
Advances in Intelligent Systems and Computing
Technology, Energy, Traffic
Printed ISBN

Similar titles