Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_45
Zoulikha Mehalli, E. Zigh, A. Loukil, A. Ali-Pacha
{"title":"Hyperspectral Data Preprocessing of the Northwestern Algeria Region","authors":"Zoulikha Mehalli, E. Zigh, A. Loukil, A. Ali-Pacha","doi":"10.1007/978-981-16-3637-0_45","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_45","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_31
G. Cherradi, A. Boulmakoul, L. Karim, M. Mandar
{"title":"Toward a Safe Pedestrian Walkability: A Real-Time Reactive Microservice Oriented Ecosystem","authors":"G. Cherradi, A. Boulmakoul, L. Karim, M. Mandar","doi":"10.1007/978-981-16-3637-0_31","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_31","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116829718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Discovery for Sustainability Enhancement Through Design for Relevance","authors":"Abla Chaouni Benabdellah, Asmaa Benghabrit, Imane Bouhaddou, Kamar Zekhnini","doi":"10.1007/978-981-16-3637-0_50","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_50","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_48
Mohamed Cherradi, Anass El Haddadi, Hayat Routaib
{"title":"Data Lake Management Based on DLDS Approach","authors":"Mohamed Cherradi, Anass El Haddadi, Hayat Routaib","doi":"10.1007/978-981-16-3637-0_48","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_48","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_7
Nouhaila Bensalah, H. Ayad, A. Adib, Abdelhamid Ibn El Farouk
{"title":"CRAN: An Hybrid CNN-RNN Attention-Based Model for Arabic Machine Translation","authors":"Nouhaila Bensalah, H. Ayad, A. Adib, Abdelhamid Ibn El Farouk","doi":"10.1007/978-981-16-3637-0_7","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_7","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_20
Sanaa Errahili, Asma Khabba, S. Ibnyaich, A. Zeroual
{"title":"A Novel Design of Frequency Reconfigurable Antenna for 5G Mobile Phones","authors":"Sanaa Errahili, Asma Khabba, S. Ibnyaich, A. Zeroual","doi":"10.1007/978-981-16-3637-0_20","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_20","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_34
Noureddine Gouasmi, Mahnane Lamia, Yassine Lafifi
{"title":"Extracting Learner's Model Variables for Dynamic Grouping System","authors":"Noureddine Gouasmi, Mahnane Lamia, Yassine Lafifi","doi":"10.1007/978-981-16-3637-0_34","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_34","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128045106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_32
Ikram Ben Abdel Ouahab, Lotfi Elaachak, M. Bouhorma
{"title":"Image-Based Malware Classification Using Multi-layer Perceptron","authors":"Ikram Ben Abdel Ouahab, Lotfi Elaachak, M. Bouhorma","doi":"10.1007/978-981-16-3637-0_32","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_32","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_49
Mourad Fariss, Naoufal El Allali, H. Asaidi, Mohamed Bellouki
{"title":"Evaluation of Similarity Measures in Semantic Web Service Discovery","authors":"Mourad Fariss, Naoufal El Allali, H. Asaidi, Mohamed Bellouki","doi":"10.1007/978-981-16-3637-0_49","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_49","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132403252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-981-16-3637-0_19
A. Chehri, H. Chaibi, Rachid Saadane, El Mehdi Ouafiq, A. Slalmi
{"title":"On the Performance of 5G Narrow-Band Internet of Things for Industrial Applications","authors":"A. Chehri, H. Chaibi, Rachid Saadane, El Mehdi Ouafiq, A. Slalmi","doi":"10.1007/978-981-16-3637-0_19","DOIUrl":"https://doi.org/10.1007/978-981-16-3637-0_19","url":null,"abstract":"","PeriodicalId":339898,"journal":{"name":"International Conferences on Networking, Information Systems & Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116256185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}