default search action
5th CSA 2022: Algiers, Algeria
- Mustapha Réda Senouci, Said Yacine Boulahia, Mohamed Akrem Benatia:
Advances in Computing Systems and Applications - Proceedings of the 5th Conference on Computing Systems and Applications, CSA 2022, Algiers, Algeria, 17-18 May, 2022. Lecture Notes in Networks and Systems 513, Springer 2022, ISBN 978-3-031-12096-1
Artificial Intelligence and Data Science
- Mohamed Akrem Benatia, Said Yacine Boulahia, Mustapha Amine Mahi:
AttR2U-Net: Deep Attention Based Approach for Melanoma Skin Cancer Image Segmentation. 3-13 - Meriem Amel Guessoum, Rahma Djiroun, Kamel Boukhalfa:
Causality Analysis Method and Model Related to Why-Question Answering in Business Intelligence Context. 15-26 - Ahmed Habbouchi, Mohamed El Yazid Boudaren, Mustapha Réda Senouci, Amar Aïssani:
Markovian Segmentation of Non-stationary Data Corrupted by Non-stationary Noise. 27-37 - Fatma Kachi, Chafia Bouanaka:
Aster: A DSL for Engineering Self-Adaptive Systems. 39-49 - Khadidja Belmessous, Faouzi Sebbak, M'hamed Mataoui, Amine Batouche:
Co-rating Aware Evidential User-Based Collaborative Filtering Recommender System. 51-60 - Aicha Boutorh, Kaouter Marref, Naamat Ellah Dehiri:
Graph Representation Learning for Covid-19 Drug Repurposing. 61-72 - Kheyreddine Djouzi, Kadda Beghdad Bey, Abdenour Amamra:
A Scalable Adaptive Sampling Based Approach for Big Data Classification. 73-83 - Mohamed Hassen Kerkache, Lamia Sadeg-Belkacem, Fatima Benbouzid-Si Tayeb, Amri Ali:
Supervised Learning Using Community Detection for Link Prediction. 85-94 - Amel Oubara, Falin Wu, Abdenour Amamra, Gongliu Yang:
Survey on Remote Sensing Data Augmentation: Advances, Challenges, and Future Perspectives. 95-104
Emerging Technologies for Future Internet
- Wassim Boudieb, Abdelhamid Malki, Mimoun Malki:
Microservice Instances Provisioning for IoT Applications in Fog Computing. 107-117 - Rezki Zibani, Faouzi Sebbak, Mohamed El Yazid Boudaren, M'hamed Mataoui, Massinissa Touabi, Houssam Hfaifia:
A New Fusion-Based Approach for License Plate Recognition: An Application to the Algerian Context. 119-131 - Djabir Abdeldjalil Chekired, Lyes Khoukhi:
5G-Slicing of EVs Services: A Latency Analysis Model Based on Decentralized SDN-Fog Architecture. 133-142 - Rabah Louali, Abdelhafid Elouardi, Samir Bouaziz:
COTS-Based Embedded Systems Design Using an Iterative and Incremental Approach: A Case Study of an UAV Embedded System Development. 143-152 - Ahmed Abdelli, Abdenour Amamra, Ali Yachir:
Swarm Robotics: A Survey. 153-164
Computer Networks
- Adel Djama, Badis Djamaa, Mustapha Réda Senouci:
An Analysis of the Name Length Impact on NDN-Enabled IEEE 802.15.4 Networks. 167-176 - Nourredine Oukas, Menouar Boulif, Lyes Badis:
A New GSPNs-Model for Sensors in Solar EHWSNs, Considering Seasonal Sunshine Levels and Sleeping Mechanism Based on Channel Polling Schedule. 177-186 - Elhadja Benalia, Salim Bitam:
QoS-SDIoV: An Efficient QoS Routing Scheme for Software Defined Internet of Vehicles. 187-198 - Mohamed Remli, Oualid Demigha, Ali Yachir:
Study on Parameters Affecting 6TiSCH Network Formation. 199-209 - Mustapha Réda Senouci, Ahmed Habbouchi, Yakoub Mordjana:
Bandit Algorithms for Robust Forwarding in Named Data Networking. 211-221
Optimization and Operational Research
- Dallel Nasri, Diab Mokeddem:
An Efficient Grasshopper Optimization Algorithm Using Arithmetic Crossover for Global Optimization. 225-235 - Abdessamed Mogtit, Redouane Boudjemaa, Mohand Lagha:
Augmented Lagrangian Genetic Algorithm Approach Towards Solving Constrained Numerical and Coverage Optimization. 237-248 - Dallel Nasri, Diab Mokeddem:
Improved Salp Swarm Optimization Algorithm for Engineering Problems. 249-259 - Safia Gunadiz, Ali Berrichi:
Grey Wolf Optimizer with Multi Step Crossover for Bi-objective Job Shop Scheduling Problem. 261-272
Cyber Security and Privacy
- Adil Imad Eddine Hosni, Khaled Aimen Hafiani, Abderrahim Chenoui, Kadda Beghdad Bey:
Hybrid Approach for Rumor Influence Minimization in Dynamic Multilayer Online Social Networks. 275-285 - Ryma Boussaha, Yacine Challal, Abdelmadjid Bouabdallah:
Security Analysis and Evaluation of Optimized Authentication in Named Data Networking. 287-297 - Hamza Bouchendouka, Djamel Teguig, Said Sadoudi:
SDR Implementation of WIFI Attacks Using GNURadio. 299-309 - Zakaria Sahraoui, Ahmed Chekirine:
On the Risk Analysis and Countermeasure for Bit-Flipping Attack in LoRaWAN. 311-321 - Ayoub Si-Ahmed, Al-Garadi Mohammed Ali, Boustia Narhimene:
Enhanced Intrusion Detection System for Remote Healthcare. 323-333
Computer Vision and Graphics
- Ahcen Aliouat, Nasreddine Kouadria, Saliha Harize, Moufida Maimour:
Multi-Threshold-Based Frame Segmentation for Content-Aware Video Coding in WMSN. 337-347 - Wissam Bouzi, Samia Bentaieb, Abdelaziz Ouamri, Ahmed Yassine Boumedine:
Multi-Column Convolutional Neural Network for Vehicle-Type Classification. 349-359 - Mohamed Lamine Rouali, Abdenour Amamra, Said Yacine Boulahia, Mohamed Akram Benatia:
Heterogenous Action Ensembling for Visual Recognition of Large-Scale Actions. 361-371 - Achouak Zerari, Oussama Djedidi, Laïd Kahloul, Carlo Romeo, Ikram Remadna:
Paediatric Bone Age Assessment from Hand X-ray Using Deep Learning Approach. 373-383 - Khadidja Delloul, Slimane Larabi:
Image Captioning State-of-the-Art: Is It Enough for the Guidance of Visually Impaired in an Environment? 385-394 - Rouini Abdelghani, Larbi Messaouda, Samira Larbi:
A New Robust Level Set Segmentation Method Based of New Saliency Driven Region (LSNSDR): Application to Medical Images. 395-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.