default search action
BDCA 2017: Tetuan, Morocco
- Mohamed Lazaar, Youness Tabii, Mohamed Chrayah, Mohammed Al Achhab:
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, BDCA 2017, Tetouan, Morocco, March 29-30, 2017. ACM 2017, ISBN 978-1-4503-4852-2 - Hamza Saouli, Abderaouf Ghamri, Abdelhak Merizig, Okba Kazar:
A new cloud computing approach based SVM for relevant data extraction. 1:1-1:8 - Imane Lmati, Habib Benlahmar, Naceur Achtaich:
Towards an automatic generator of mathematical exercises based on semantic. 2:1-2:6 - Jalal Laassiri:
Data Security and risks for IoT in intercommunicating objects. 3:1-3:4 - Iman Tikito, Nissrine Souissi:
Data Collect Requirements Model. 4:1-4:7 - Mohamed Hanini, Said El Kafhali:
Cloud Computing Performance Evaluation under Dynamic Resource Utilization and Traffic Control. 5:1-5:6 - Mbarek Marwan, Ali Kartit, Hassan Ouahmane:
Security in Cloud-Based Medical Image Processing: Requirements and Approaches. 6:1-6:6 - Mbarek Marwan, Ali Kartit, Hassan Ouahmane:
Design a Secure Framework for Cloud-Based Medical Image Storage. 7:1-7:6 - Samir Amri, Lahbib Zenkouar, Mohamed Outahajala:
Build a Morphosyntaxically Annotated Amazigh Corpus. 8:1-8:7 - Karima Sid, Mohamed Chawki Batouche:
Big Data Analytics Techniques in Virtual Screening for Drug Discovery. 9:1-9:7 - Ahmed El-Yahyaoui, Mohamed Dafir Ech-Cherif El Kettani:
Fully homomorphic encryption: Searching over encrypted cloud data. 10:1-10:5 - Elmahdi Khoudry, Abdelaziz Belfqih, Mohamed Nouh Dazahra:
Neural Network Approach for Fault Detection in Substations. 11:1-11:6 - Soumia Zertal, Mohamed Chawki Batouche:
A Hybrid Approach for Optimized Composition of Cloud Services. 12:1-12:7 - Tahani Aladwani:
Impact of Selecting Virtual Machine with Least Load on Tasks Scheduling Algorithms in Cloud Computing. 13:1-13:7 - Meroua Daoudi, Souham Meshoul:
Revisiting BFR Clustering Algorithm for Large Scale Gene Regulatory Network Reconstruction using MapReduce. 14:1-14:5 - Oumaima Hourrane, El Habib Benlahmar:
Survey of Plagiarism Detection Approaches and Big data Techniques related to Plagiarism Candidate Retrieval. 15:1-15:6 - Soumeya Zerabi, Souham Meshoul, Amina Merniz, Radia Melal:
Towards Clustering Validation in Big Data Context. 16:1-16:6 - Imad Zeroual, Mohamed Boudchiche, Azzeddine Mazroui, Abdelhak Lakhouaja:
Developing and performance evaluation of a new Arabic heavy/light stemmer. 17:1-17:6 - Yassir Samadi, Mostapha Zbakh:
Threshold-based load balancing algorithm for Big Data on a Cloud environment. 18:1-18:6 - Fatima Ezzahra Mdarbi, Nadia Afifi, Imane Hilal:
Comparative Study: Dependability of Big Data in the Cloud. 19:1-19:6 - I. Mzili, Mohammed Essaid Riffi, F. Benzekri:
Penguins Search Optimization Algorithm to Solve Quadratic Assignment Problem. 20:1-20:6 - Abderrazak Sebaa, Amina Nouicer, Fatima Chikh, Abdelkamel Tari:
Big Data Technologies to Improve Medical Data Warehousing. 21:1-21:5 - Amine Amarir, Mustapha ES-Sadqi, Abdellah Idrissi:
An Effective Genetic Algorithm for Solving Series-Parallel Power System Problem. 22:1-22:6 - Abdelmajid Chaffai, Larbi Hassouni, Houda Anoun:
E-Learning Real Time Analysis Using Large Scale Infrastructure. 23:1-23:6 - Nadia Zahir, Nadia Afifi, Imane Hilal:
Towards an ontology of dependability Automatic search approach with Systematic Mapping. 24:1-24:5 - Sara Mifrah, El Habib Ben Lahmar:
Semantico-automatic Evaluation of Scientific Papers: State of the Art. 25:1-25:6 - Mohamed El Alaoui, Hussain Ben-Azza:
New initialization for clustering algorithms combining distance and density. 26:1-26:5 - Oussama El Bacha, Othmane Jmad, Younes El Bouzekri El Idrissi, Nabil Hmina:
Exploiting Open Data to Improve the Business Intelligence & Business Discovery Experience. 27:1-27:6 - Iman El Mir, Dong Seong Kim, Abdelkrim Haqiq:
Towards a Stochastic Model for Integrated detection and filtering of DoS attacks in Cloud environments. 28:1-28:6 - Imane Allaouzi, Mohamed Ben Ahmed:
Multi-label Categorization of French Death Certificates using NLP and Machine Learning. 29:1-29:4 - Khadija Sabiri, Faouzia Benabbou:
A Legacy Application Meta-model for Modernization. 30:1-30:6 - Mohamedou Cheikh Tourad, Abdelmounaïm Abdali:
Toward Efficient Ranked-key Algorithm for the Web notification of Big Data Systems. 31:1-31:4 - Zouhair Rimale, El Habib Benlahmar, Abderrahim Tragha:
Mobile Cloud Learning: A New Responsive SCORM Design Approach Based Semantic Learning Object on the Microsoft SharePoint Online and Office 365. 32:1-32:6 - Amghar Sara, Tabaa Yassine, Abdellatif Medouri:
Secure confidential big data sharing in cloud computing using KP-ABE. 33:1-33:4 - Fadoua Mansouri, Abdelalim Sadiq, Ikram El Azami:
A Modeling Framework for the Moroccan sociolect recognition used on the social media. 34:1-34:5 - Anoual El Kah, Imad Zeroual, Abdelhak Lakhouaja:
Application of Arabic language processing in language learning. 35:1-35:6 - Hasnae L'Amrani, Badr Eddine Berroukech, Younès El Bouzekri El Idrissi, Rachida Ajhoun:
Toward Interoperability Approach between Federated Systems. 36:1-36:6 - H. Kamdem Fezeu, Thomas Ndié Djotio, Rachid Oulad Haj Thami:
Safe and Irrefutable Decentralized Communication: Bringing Non-Repudiation to Mesh Networks. 37:1-37:6 - Mohammed Saber, Mohammed Ghaouth Belkasmi, Sara Chadli, Mohamed Emharraf, Ilhame El Farissi:
Implementation and Performance Evaluation of Intrusion Detection Systems under high-speed networks. 38:1-38:6 - Abdellatif Dahmouni, Karim El Moutaouakil, Khalid Satori:
A Cloud Face Recognition System using A New Optimal Local Binary Pattern. 39:1-39:5 - Ismail Nadim, Yassine El Ghayam, Abdelalim Sadiq:
Towards the semantic annotation of Web of Things: A collective disambiguation approach. 40:1-40:6 - Salma Gaou, Aissam Bekkari, Marouane El Mabrouk, Abdelhamid Zouhair:
Search Engine Optimization to detect user's intent. 41:1-41:6 - Labdaoui Imane, Youness Tabii:
State of the art in MapReduce: issues and approaches. 42:1-42:5 - Mariem Bounabi, Karim El Moutaouakil, Khalid Satori:
A comparison of Text Classification methods Method of weighted terms selected by different Stemming Techniques. 43:1-43:9 - Fatna Elmendili, Younes El Bouzekri El Idrissi, Habiba Chaoui:
Detecting Malicious Users in Social Network via Collaborative Filtering. 44:1-44:7 - Y. Bentahar, Mohamed Afifi, H. Dalimi, S. Amar, Mustapha Bahich:
Restoration Image Degraded by PSF Non-Stationary. 45:1-45:5 - R. Khtira, Bouchra El Asri, Maryem Rhanoui:
From Data to Big Data: Moroccan Public Sector. 46:1-46:6 - Abdellatif El Afia, Malek Sarhani:
Particle Swarm Optimization for Model Selection of Aircraft Maintenance Predictive Models. 47:1-47:12 - Marouane Hamda, Abdelhak Mahmoudi:
Hand Gesture Recognition Using Kinect's Geometric and HOG Features. 48:1-48:5 - Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour:
Securing Data in Cloud Computing by Classification. 49:1-49:5 - Hicham Toumi, Bouchra Marzak, Yassine Khazri, Amal Talea, Ahmed Eddaoui, Mohamed Talea:
Mobiles Agents and Virtual Firewall to Secure the Shared Network for Virtual Machines in IaaS cloud. 50:1-50:6 - Soufiana Mekouar, Nabila Zrira, El-Houssine Bouyakhf:
Popularity Prediction of Videos in YouTube as Case Study: A Regression Analysis Study. 51:1-51:6 - Chaymae Benfares, Younès El Bouzekri El Idrissi, Abdellah Abouabdellah:
Recommendation Semantic of Services In Smart City. 52:1-52:6 - Khalid Haddouch, Karim El Moutaouakil:
New checker for constraint network solutions. 53:1-53:6 - Chouaib Moussaddaq, Abdellah Ezzati, Rachid Elharti:
A new reformulation of the load balancing problem in cloud computing based on TSP and ACO. 54:1-54:4 - Youssef Hamdaoui, Abdelilah Maach:
A Smart Approach for Intentional Islanding based on Dynamic Selection Algorithm in Microgrid with distributed generation. 55:1-55:7 - Sanae Tbatou, A. Ramrami, Youness Tabii:
Security of communications in connected cars Modeling and safety assessment. 56:1-56:7 - Oumayma Banouar, Said Raghay:
Machine learning for personalized access to multiple data sources through ontologies. 57:1-57:6 - Saida El Mendili, Younes El Bouzekri El Idrissi, Nabil Hmina:
Association rules mining on MapReduce. 58:1-58:6 - Rohaifa Khaldi, Abdellatif El Afia, Raddouane Chiheb, Rdouan Faizi:
Artificial Neural Network Based Approach for Blood Demand Forecasting: Fez Transfusion Blood Center Case Study. 59:1-59:6 - Rohaifa Khaldi, Raddouane Chiheb, Abdellatif El Afia, Adil Akaaboune, Rdouan Faizi:
Prediction of Supplier Performance: A Novel Dea-Anfis Based Approach. 60:1-60:6 - Yassine Al-Amrani, Mohamed Lazaar, Kamal Eddine Elkadiri:
Sentiment Analysis using supervised classification algorithms. 61:1-61:8 - Mohammed Walid Krakallah, Safia Nait Bahloul:
Methodological Sketch of Observer-Based Access Control. 62:1-62:6 - Ismail Jellouli, Badr Eddine El Mohajir, Mohammed Al Achhab:
Syntactic entropy for main content extraction from web pages. 63:1-63:4 - Abdellatif El Afia, Mohamed Lalaoui, Raddouane Chiheb:
Fuzzy logic controller for an adaptive Huang cooling of simulated annealing. 64:1-64:6 - Jalal Laassiri, Yousra Hafid:
New access control policies for private network and protocol security. 65:1-65:5 - Mohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq:
A Stable Route Prediction and the Decision Taking at Sending a Data Packet in a Highway Environment. 66:1-66:6 - Asmae Ait Mansour, Nourddine Enneya, Mohamed Ouadou:
A Seamless Handover Based MIH-Assisted PMIPV6 in Heterogeneous Network(LTE-WIFI). 67:1-67:5 - Aziz Mahboub, El Mokhtar En-Naimi, Mounir Arioua, Anas Hatim:
Performance Evaluation of Cluster Validity Methods an Energy Optimization in Wireless Sensor Networks Using Hybrid K-Medoids Algorithm. 68:1-68:7 - Said Benlakhdar, Mohammed Rziza, Rachid Oulad Haj Thami:
Directional Data Classification Using a Hierarchical Model of Von Mises Distribution. 69:1-69:6 - Youssef Hanyf, Hassan Silkan:
Fast Similarity Search in High Dimensional Image Data Sets. 70:1-70:5 - Hassan Ramchoun, Mohammed Amine Janati Idrissi, Youssef Ghanou, Mohamed Ettaouil:
Multilayer Perceptron: Architecture Optimization and training with mixed activation functions. 71:1-71:6 - Nour-Eddine Joudar, Mohamed Ettaouil:
An improved model for restoring and protecting the digital images: mathematical modeling and optimization. 72:1-72:4 - Hicham Omara, Mohamed Lazaar, Youness Tabii:
Classification of Breast Cancer with Improved Self-Organizing Maps. 73:1-73:6 - Abdellatif El Afia, Oussama Aoun:
Data-driven based aircraft maintenance routing by markov decision process model. 74:1-74:6 - Meryeme Hadni, Mounir Gouiouez:
Graph Based Representation for Arabic Text Categorization. 75:1-75:7 - Ismail Kich, El Bachir Ameur, Abdelghani Souhar:
New Image Steganography Method Based on K-means Clustering. 76:1-76:6 - Habib Ayad, Mohammed Khalil:
A Semi-Blind Information Hiding Technique Using DWT-SVD and QAM-16 for Medical Images. 77:1-77:7 - Mohammed Lahraichi, Khalid Housni, Samir Mbarki:
Particle Filter Object Tracking Based on Color Histogram and Gabor Filter Magnitude. 78:1-78:5 - Ilias Kamal, Khalid Housni, Moulay Youssef Hadi:
Car Make and Model Recognition using Sparse Coding and Bag of Features. 79:1-79:5 - Moulay Smail Bouzakraoui, Abdelalim Sadiq, Nourddine Enneya:
A Customer Emotion Recognition through Facial Expression using POEM descriptor and SVM classifier. 80:1-80:6 - Nabila Zrira, Fatima Zahra Ouadiay, Mohamed Hannat, El-Houssine Bouyakhf, Mohamed Majid Himmi:
Evaluation of PCL's Descriptors for 3D Object Recognition in Cluttered Scene. 81:1-81:6 - Abdessamad Youssfi Alaoui, Azeddine Elhassouny, Rachid Oulad Haj Thami, Hamid Tairi:
Human Fall Detection Using Von Mises Distribution and Motion Vectors of Interest Points. 82:1-82:5 - Mohamed Oualla, Abdelalim Sadiq:
Face Detection Using Rotated Asymmetric Haar Features. 83:1-83:6 - Souhaib Douass, M'hamed Aït Kbir:
Overview on 3D models searching and indexing. 84:1-84:7 - W. Oulad Abdeslam, Youness Tabii, Kamal Eddine El Kadiri:
Adaptive Appearance Model in Particle filter based Visual Tracking. 85:1-85:5 - Asmae Rabhi, Yassine El Ghayam, Abdelalim Sadiq, Abdelaziz Mouloudi:
Face Tracking based on Hierarchical Motion and Motion Models. 86:1-86:6 - Hassan Bousnguar, Ilias Kamal, Khalid Housni, Moulay Youssef Hadi:
Detection and Recognition of Road Signs. 87:1-87:6 - Abdelghani Souhar, Youssef Boulid, El Bachir Ameur, Mly. M. Ouagague:
Watershed transform for text lines extraction on binary Arabic handwriten documents. 88:1-88:6 - Mohamed Najoui, Anas Hatim, Said Belkouch:
Novel parallel Givens QR decomposition implementation on VLIW architecture with Efficient memory access for real time image processing applications. 89:1-89:6 - Amal Rifai, Tahri Joutey Majda, M'hamed Bakrim, Abdelalim Sadiq:
Revision of the learning resources modeling concept by Recursive Entity Modeling Method (REMM). 90:1-90:6 - Zouhair Rimale, El Habib Benlahmar, Abderrahim Tragha:
A New Responsive SCORM Design (RSCOD) Approach Based Semantic Learning Object (SLO) Using SharePoint Learning Kit (SLK). 91:1-91:6 - Kenza Sakout Andaloussi, Laurence Capus, Ismail Berrada:
Adaptive Educational Hypermedia Systems: Current Developments and Challenges. 92:1-92:8 - M. Berehil, Karim Arrhioui, Samir Mbarki:
Gamified Stress Management Calendar for Higher Education Students. 93:1-93:6 - Othman El Harrak, Abderrahim Ghadi, Jaber El Bouhdidi:
Mining Moocs Videos Metadata Using Classification Techniques. 94:1-94:6 - Tariq Bouzid, Hassane Darhmaoui, Fatiha Kaddari:
Promoting elementary mathematics learning through digital games: Creation, implementation and evaluation of an edutainment game to promote basic mathematical operations. 95:1-95:4 - Karima Aissaoui, Mostafa Azizi:
El-Security: E-learning Systems Security Checker Plug-in. 96:1-96:6 - A. El Moustamid, El Mokhtar En-Naimi, Jaber El Bouhdidi:
Integration of data mining techniques in e-learning systems: Clustering Profil of Lerners and Recommender Course System. 97:1-97:4 - Amal Rifai, Tahri Joutey Majda, M'hamed Bakrim, Abdelalim Sadiq:
Modeling of Problem Based Learning Strategy by Recursive Entity Modeling Method. 98:1-98:7 - El. Megder, Chihab Eddine Cherkaoui, Driss Mammass:
Apport de la théorie de l'activité et des outils collaboratifs à la gestion des connaissances. 99:1-99:6 - Abdelmoula Abouhilal, Amine Moulay Taj, M. Mejdal, Abdessamad Malaoui:
Design of a Remote Experience for Electrical Engineering Using Embedded Systems. 100:1-100:5 - Mohamed Kamal Rtili, Mohamed Khaldi, Marouane El Mabrouk, Ali Dahmani:
A new LOM application profile to describe complementary pedagogical resources in an CRHL. 101:1-101:5 - Chaimae Meftah, Asmaâ Retbi, Samir Bennani, Mohammed Khalidi Idrissi:
Serious Games Modeling. 102:1-102:6 - Yassine Khazri, Ahmed Al Sabri, Brahim Sabir, Hicham Toumi, Mohammed Moussetad, Ahmed Fahli:
Development and Management of a Remote Laboratory in Physics for Engineering Education (E-LAB FSBM). 103:1-103:6 - Rajaa Aoulad Moussa, Mourad Madrane, Rachid Janati-Idrissi, Mohammed Laafou:
Social Learning tool for a conceptual change. 104:1-104:5 - Hanane Rachih, Fatima Zahra Mhada, Raddouane Chiheb:
Metaheuristics Applied in Remanufacturing and Reverse logistics: A review. 105:1-105:7 - Fadoua Rafii, Badr Dine Rossi Hassani, M'hamed Aït Kbir:
New Approach for Microarray Data Decision Making with Respect to Multiple Sources. 106:1-106:5 - Issam El Hammouti, Azza Lajjam, Mohamed El Merouani, Aharmouch kaoutar, Tabaa Yassine:
A multi-objective model for discrete and dynamic Berth Allocation Problem. 107:1-107:5 - Abdellatif El Afia, Houda Mezouar:
A global mapping of the Moroccan supply chain of hospital drugs, and a simulation of the dispensation process. 108:1-108:8 - Khaoula Ouaddi, Youssef Benadada, Fatima Zahra Mhada:
Ant Colony system approach for dynamic vehicles routing problem multi tours. 109:1-109:6 - Bouchra Marzak, Hicham Toumi, Elhabib Benlahmar, Mohamed Talea:
Analysing Clustering Routing Protocols Performance for Vehicular Networks. 110:1-110:7 - El Hachloufi Mostafa, Faris Hamza, El Haddad Mohammed:
Estimate of Stochastic Model Parameter of Exchange Rate Using Artificial Intelligence. 111:1-111:7 - Hamid Bezzout, Sara Hsaini, Salma Azzouzi, Hanan El Faylali:
Simulation of electromagnetic waves propagation in free space using Netlogo multi-agent approach. 112:1-112:4 - Fadoua Oudouar, Abdellah El-Fallahi:
Solving the location-routing problems Using Clustering Method. 113:1-113:5 - Abdellatif El Afia, Mohamed Mustapha Kabbaj:
Supervised learning in Branch-and-cut strategies. 114:1-114:6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.