default search action
8th IBICA 2017: Marrakech, Morocco
- Ajith Abraham, Abdelkrim Haqiq, Azah Kamilah Muda, Niketa Gandhi:
Innovations in Bio-Inspired Computing and Applications - Proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2017) Held in Marrakech, Morocco, December 11-13, 2017. Advances in Intelligent Systems and Computing 735, Springer 2018, ISBN 978-3-319-76353-8 - Oscar Castillo
, Frumen Olivas, Fevrier Valdez
:
Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy Logic in Bio-Inspired Optimization Methods. 1-12 - Sana Akourmis, Youssef Fakhri
, Moulay Driss Rahmani
:
Reducing Blackhole Effect in WSN. 13-24 - Said Broumi
, Assia Bakali
, Mohamed Talea
, Florentin Smarandache
, Vakkas Uluçay
:
Minimum Spanning Tree in Trapezoidal Fuzzy Neutrosophic Environment. 25-35 - Atta-ur-Rahman
, Kiran Sultan, Nahier Aldhafferi
, Abdullah Alqahtani
:
Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-orthogonal Spreading Codes. 36-48 - Qëndresë Hyseni, Sule Yildirim Yayilgan
, Bujar Krasniqi
, Kadri Sylejmani
:
Solving the Problem of Distribution of Fiscal Coupons by Using a Steady State Genetic Algorithm. 49-59 - Afaf Mosaif
, Said Rakrak
:
A Survey of Cross-Layer Design for Wireless Visual Sensor Networks. 60-68 - Mohamed Matoui, Noureddine Moumkine, Abdellah Adib
:
An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service. 69-80 - Ladislav Zjavka, Stanislav Misák
, Lukás Prokop
:
NWP Model Revisions Using Polynomial Similarity Solutions of the General Partial Differential Equation. 81-91 - Abdellah Ouammou
, Mohamed Hanini
, Said El Kafhali
, Abdelghani Ben Tahar:
Energy Consumption and Cost Analysis for Data Centers with Workload Control. 92-101 - Ahmed Boujnoui
, Abdellah Zaaloul, Abdelkrim Haqiq
:
A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost. 102-112 - Adnane El Hanjri, Abdellah Zaaloul, Abdelkrim Haqiq
:
Analytic Approach Using Continuous Markov Chain to Improve the QoS of a Wireless Network. 113-124 - Mohamed Nabil
, Abdelmajid Hajami, Abdelkrim Haqiq
:
Determining and Evaluating the Most Route Lifetime as the Most Stable Route Between Two Vehicles in VANET. 125-132 - Mengfan Zhi, Ziqiang Yu, Bo Yang, Lin Wang, Liangliang Zhang, Jifeng Guo
, Xuehui Zhu:
Reverse Extraction of Early-Age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming with Similarity Weight Tournament Selection. 133-142 - Lairenjam Obiroy Singh
, Rajagopalan Devanathan
:
Performance Improvement of Bio-Inspired Strategies Through Feedback Laws. 143-156 - Asmae El Kassiri, Fatima-Zahra Belouadha
:
A Semantic Approach Towards Online Social Networks Multi-aspects Analysis. 157-168 - Mohamed Moncef Ben Khelifa, Hachem A. Lamti, Adel M. Alimi
:
Towards a New Generation of Wheelchairs Sensitive to Emotional Behavior of Disabled People. 169-177 - Abdulfattah Mohammad Obeid, Manel Elleuchi, Mohamed Wassim Jmal
, Manel Boujelben, Mohamed Abid, Mohammed S. BenSaleh:
A Comprehensive Technical Review on Security Techniques and Low Power Target Architectures for Wireless Sensor Networks. 178-199 - Souad Labghough, Fouad Ayoub
, Mostafa Belkasmi:
A Closed Form Expression for the Bit Error Probability for Majority Logic Decoding of CSOC Codes over \varGamma \varGamma Γ Γ Channels. 200-210 - Majda Elhozmari, Ahmed Ettalbi:
Straightforward MAAS to Ensure Interoperability in Heterogeneous Environment. 211-220 - Yassine Maleh
, Abdelkebir Sahid
, Abdellah Ezzati
, Mustapha Belaïssaoui:
A Capability Maturity Framework for IT Security Governance in Organizations. 221-233 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih
:
System Multi Agents for Automatic Negotiation of SLA in Cloud Computing. 234-244 - R. Jarray, Nawel Jmail, Abir Hadriche, Tarek Frikha
:
A Comparison Between Modeling a Normal and an Epileptic State Using the FHN and the Epileptor Model. 245-254 - Marie Ndaw, Gervais Mendy
, Samuel Ouya
:
Modeling the Effect of Security Measures on Electronic Payment Risks. 255-265 - Kandoussi el Mehdi, Iman El Mir, Mohamed Hanini
, Abdelkrim Haqiq
:
Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory. 266-276 - Oussama Mjihil, Hamid Taramit
, Abdelkrim Haqiq
, Dijiang Huang
:
Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming. 277-287 - Anass Misbah, Ahmed Ettalbi:
Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure. 288-297 - Maryem Ait El Hadj
, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies. 298-308 - Sana Ibjaoun, Anas Abou El Kalam
, Vincent Poirriez, Abdellah Ait Ouahman:
Biometric Template Privacy Using Visual Cryptography. 309-317 - Safaa Mahrach, Oussama Mjihil, Abdelkrim Haqiq
:
Scalable and Dynamic Network Intrusion Detection and Prevention System. 318-328 - Ahmed Kharrat, Mahmoud Neji:
A Hybrid Feature Selection for MRI Brain Tumor Classification. 329-338 - Youssef Harmouch, Rachid El Kouch:
A Statistical Analysis for High-Speed Stream Ciphers. 339-349 - Asmaa El Kandoussi
, Hanan El Bakkali:
Weighted Access Control Policies Cohabitation in Distributed Systems. 350-360 - Monsef Boughrous, Hanan El Bakkali:
A Comparative Study on Access Control Models and Security Requirements in Workflow Systems. 361-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.