


default search action
SITA 2015: Rabat, Morocco
- 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015, Rabat, Morocco, October 20-21, 2015. IEEE 2015, ISBN 978-1-5090-0220-7
- Abdelbadie Belmouhcine, Mohammed Benkhalifa:
Implicit links based kernel to enrich Support Vector Machine for web page classification. 1-4 - Fadoua Fellir, Khalid Nafil
, Rajaa Touahni:
Analyzing the non-functional requirements to improve accuracy of software effort estimation through case based reasoning. 1-6 - Jihane Lakhrouit, Karim Baïna
:
Evaluating complexity of enterprise architecture components landscapes. 1-5 - Ali Idri, Mohammed Abdou Janati Idrissi
:
Preface. 1 - Hajar El Hammouti, Loubna Echabbi, Yann Ben Maissa:
Maximizing QoS in heterogeneous Wireless Sensor Networks: Memory and time considerations. 1-6 - Jihane Sophia Tahiri, Samir Bennani
, Mohammed Khalidi Idrissi:
Using an analytical formalism to diagnostic and evaluate Massive Open Online Courses. 1-6 - Mohamed Amine Charar, Zouhair Guennoun
, Ghassane Aniba:
Achieving energy efficiency for Device to Device communications using power control: A low complexity algorithm. 1-6 - Loubna El Faquih, Hanae Sbaï
, Mounia Fredj:
Configurable process models: A semantic validation. 1-6 - Sara Bouchana, Mohammed Abdou Janati Idrissi
:
Towards an assessment model of end user satisfaction and data quality in Business Intelligence systems. 1-6 - Hind Zahraoui, Mohammed Abdou Janati Idrissi
:
Adjusting story points calculation in scrum effort & time estimation. 1-8 - Mouâd Mansouri
, Cherkaoui Leghris
, Abdelkrim Bekkhoucha:
Towards a better combination of the MADM algorithms for the Vertical Handover optimization in a mobile network multi-access environment. 1-5 - Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri:
A theoretical e-government portals' benchmarking framework. 1-6 - Yasmina Douiji, Hajar Mousannif:
I-CARE: Intelligent Context Aware system for Recognizing Emotions from text. 1-5 - Adel Echchaachoui
, Abdellatif Kobbane
, Mohammed Elkoutbi:
A new trust model to secure routing protocols against DoS attacks in MANETs. 1-6 - Hiba Chougrad
, Hamid Zouaki, Omar Alheyane:
Soft assignment vs hard assignment coding for bag of visual words. 1-5 - Meryem Elallaoui, Khalid Nafil
, Raja Touahni:
Automatic generation of UML sequence diagrams from user stories in Scrum process. 1-6 - Youness Riouali, Laila Benhlima, Slimane Bah:
A benchmark for spatial and temporal correlation based data prediction in wireless sensor networks. 1-7 - Anass Bakouri
, Hassane Mahmoudi, Ahmed Abbou
, Mohamed Moutchou
:
Optimizing the wind power capture by using DTC technique based on Artificial Neural Network for a DFIG variable speed wind turbine. 1-7 - El Yahyaoui El Idrissi Selma, Ahmed Zellou
, Ali Idri:
Mapping discovery methodology in a pure P2P mediation system for XML schemas. 1-5 - Loubna Mimouni, Ahmed Zellou
, Ali Idri:
Quality of Data in mediation systems. 1-5 - N. Adadi, Mohammed Berrada
, Driss Chenouni, Bouchaib Bounabat:
Modeling and simulation of Web Services composition based on MARDS model. 1-6 - Zoubida Chorfi
, Abdelaziz Berrado
, Loubna Benabbou:
Selection of Key Performance Indicators for Supply Chain monitoring using MCDA. 1-6 - Fadoua Nejjari, Laila Benhlima, Slimane Bah:
Overview of event detection and surveillance approaches in heterogeneous WSNs. 1-6 - A. Darouich, Fadoul Khoukhi, Khadija Douzi:
A dynamic learning content pattern for adaptive learning environment. 1-6 - Salim Alami, Omar El Beqqali
:
Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog posts. 1-5 - Zineb Lanbouri
, Saaid Achchab:
A hybrid Deep belief network approach for Financial distress prediction. 1-6 - Bouchra Sefriti, Ismail Boumhidi
:
Neural network Incremental conductance MPPT algorithm for photovoltaic water pumping system. 1-6 - Hind Lahmidani, Omar El Beqqali
:
Role of supply chain management in improving the organization within Moroccan government. 1-6 - Asmae El Kassiri
, Fatima-Zahra Belouadha
:
Towards a unified semantic model for online social networks analysis and interoperability. 1-6 - Ridouane Oulhiq
, Saad Ibntahir, Marouane Sebgui, Zouhair Guennoun
:
A fingerprint recognition framework using Artificial Neural Network. 1-6 - Fadwa Chaker, Abdellah El Manouar, Mohamed Wail Aaminou, Rajae Aboulaich:
CSR dynamics under peer pressure and green confusion: A multi-agent simulation approach. 1-6 - Ahlam Alami, Laila Benhlima, Slimane Bah:
An overview of privacy preserving techniques in smart home Wireless Sensor Networks. 1-4 - Mifrah Youssef, Abdeslam En-Nouaary, Mohamed Dahchour:
A JADE based testbed for evaluating computational trust models. 1-7 - Houda Hammouch, Hicham Medromi, Adil Sayouti:
Toward an intelligent system for project management based on the multi agents systems. 1-6 - Youssef Berrada
, El-mahjoub Boufounas
, Ismail Boumhidi
:
Optimal neural network sliding mode control without reaching phase using genetic algorithm for a wind turbine. 1-6 - Said Amrane
, Nawfel Azami, Youssef Elboulqe
:
Optimized algorithm of dermis detection for glucose blood monitoring based on optical coherence tomography. 1-5 - Naoual El Aboudi
, Laila Benhlima:
A new wrapper feature selection model using Skewed Variable Neighborhood Search with CE-SVM algorithm. 1-6 - A. Elmokrini, Loubna Benabbou, Abdelaziz Berrado
:
Multi-criteria distribution network selection. 1-6 - Alfalahi Ahmed, Mohamed Ramdani, Mostafa Bellafkih
, Al-Sarem Mohammed:
Authorship attribution in Arabic poetry. 1-6 - Khalil Laghmari, Mohammed Ramdani, Christophe Marsala:
A distributed graph based approach for rough classifications considering dominance relations between overlapping classes. 1-6 - Salah Jadda
, Mohammed Abdou Janati Idrissi
:
Strategic Alignment and Information System project portfolio optimization model. 1-8 - Anouar Annouch, Adil Bellabdaoui
:
Gas-filling stations procurement problem with time windows using a heterogeneous fleet of full tankers. 1-6 - Assia Mezhar, Mohammed Ramdani, Amal El Mzabi:
A novel approach for open domain event schema discovery from twitter. 1-7 - Ababou Mohamed
, Mostafa Bellafkih
, Rachid El Kouch:
Fuzzy ant colony based routing protocol for delay tolerant network. 1-5 - Nabila Hamdaoui, Mohammed Khalidi Idrissi, Samir Bennani
:
AMEG: Adaptive mechanism for educational games based on IMSLD and artificial intelligence. 1-6 - Fatima-Zahra Belouadha
, Ouafa El Oinzioui, Mohamed Issam Kabbaj:
Basics and limitations of approaches for specification of semantic business processes. 1-8 - Chihab Eddine Cherkaoui, Aimad Qazdar
, Amal Battou
, Ali El Mezouary, Aïcha Bakki, Driss Mammass, Brahim Er-Raha:
A model of adaptation in Online Learning Environments (LMSs and MOOCs). 1-6 - Mouna Selmi, Hicham Hage, Esma Aïmeur:
Evaluating LSA sensibility to disclosure in learners' interactions. 1-8 - Samia Naciri, Mohammed Abdou Janati Idrissi
, Noureddine Kerzazi:
A strategic release planning model from TPM point of view. 1-9 - Noureddine Kerzazi:
Conceptual alignment between SPEM-based processes and CMMI. 1-9 - Walid Mestadi, Khalid Nafil
, Raja Touahni:
Knowledge structuring for learning by level. 1-6 - Nawal Ait Aali
, Amine Baïna, Loubna Echabbi:
Trust integration in collaborative access control model for Critical Infrastructures. 1-6 - Mohamed Amine El Majdouli
, Abdelhakim Ameur El Imrani:
Lightning Inspired Search Algorithm introduction & application to the traveling salesman problem. 1-6 - Sofia Ouhbi
, José Luis Fernández-Alemán, Ali Idri, José Rivera Pozo:
Are mobile blood donation applications green? 1-6 - Saad Yasser Chadli, Ali Idri, José Luis Fernández-Alemán, Joaquín Nicolás Ros:
Frameworks for risk management in GSD projects: A survey. 1-6 - Mohamed Yassine Si Allal Zarouk
, Mohamed Khaldi
:
Towards an Intelligent Tutoring System developing Metacognition: Cyclical model. 1-6 - Mouna El Marrakchi, Hicham Bensaid, Mostafa Bellafkih
:
Scoring reputation in online social networks. 1-6 - Nour-Eddine Joudar, Fidae Harchli, Es-Safi Abdelatif, Mohamed Ettaouil:
A genetic algorithm for solving a new image restoration model based on selective filtering. 1-5 - Mariame Nassit
, Hassan Berbia
:
On the fetal heart rate diagnostic technologies. 1-6 - Sara El Ouadaa, Slimane Bah, Abdelaziz Berrado
:
Survey on supply chain ICT requirments. 1-7 - Moulay Hafid El Yazidi, Ahmed Zellou
, Ali Idri:
Mapping in GAV context. 1-5 - Mohamed Azmi
, Abdelaziz Berrado
:
Towards an interpretable Rules Ensemble algorithm for classification in a categorical data space. 1-6 - Sara Ouaftouh, Ahmed Zellou
, Ali Idri:
User profile model: A user dimension based classification. 1-5 - Omar Barki
, Zouhair Guennoun
, Adnane Addaim
:
Formal verification of MPR selection algorithm in the OLSR protocol. 1-5 - Amina Adadi, Mohammed Berrada
, Driss Chenouni, Bouchaib Bounabat:
Ontology based composition of e-Government services using AI Planning. 1-8 - Samia Laghrabli, Loubna Benabbou, Abdelaziz Berrado
:
A new methodology for literature review analysis using association rules mining. 1-6 - Hicham Assoudi, Hakim Lounis:
Schema Matching as complex adaptive system. 1-7 - Ridouane El Mezouary, Mohammed-Amine Koulali, Abdellatif Kobbane
, Mohammed El Koutbi:
Modelling intelligent and reliable ferry routes in Wireless Sensor Networks using polling systems theory. 1-6 - Adil Maarouf, Abderrahim Marzouk, Abdelkrim Haqiq
:
A review of SLA specification languages in the cloud computing. 1-6 - Chaymaa Lamini
, Youssef Fathi, Said Benhlima
:
Collaborative Q-learning path planning for autonomous robots based on holonic multi-agent system. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.