Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
AICCSA
AICCSA 2016
Generate Citations
2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)
Nov. 29 2016 to Dec. 2 2016
Agadir, Morocco
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Foreword — Message from the general chairs
Freely available from IEEE.
pp. 1-2
Organizing committee
Freely available from IEEE.
pp. 1-2
GENUS: An ETL tool treating the Big Data Variety
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Salwa Souissi
,
Mounir BenAyed
Data placement strategy for massive data applications based on FCA approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zaki Brahmi
,
Sahar Mili
,
Rihab Derouiche
A new recommendation algorithm for reducing dimensionality and improving accuracy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Badr Ait Hammou
,
Ayoub Ait Lahcen
,
Driss Aboutajdine
Clustering data stream under a belief function framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Maroua Bahri
,
Zied Elouedi
A new method for ranking association rules with multiple criteria based on dominance relation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Azzeddine Dahbi
,
Siham Jabri
,
Youssef Balouki
,
Taoufiq Gadi
Imperfect top-k skyline query with confidence level
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sayda Elmi
,
Allel Hadjali
,
Mohamed Anis Bach Tobji
,
Boutheina Ben Yaghlane
Abstracts generation as information retrieval results
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mounira Chkiwa
,
Anis Jedidi
,
Faiez Gargouri
Universal metadata repository for document analysis and recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
H. Al-Barhamtoshy
,
M. Khemakhem
,
K. Jambi
,
F. Essa
,
A. Fattouh
,
A. Al-Ghamdi
Investigation on sentiment analysis for Arabic reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ashraf Elnagar
Assessing gene-disease relationship with multifunctional genes using GO
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Hisham Al-Mubaid
,
Mohamed Shenify
,
Sultan Aljahdali
Class-association rules pruning using regularization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohamed Azmi
,
Abdelaziz Berrado
Towards a dynamic and polarity-aware social user profile modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abir Gorrab
,
Ferihane Kboubi
,
Henda Ben Ghezala
,
Bénédicte Le Grand
Data warehouse design from social media for opinion analysis: The case of Facebook and Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Imen Moalla
,
Ahlem Nabli
,
Lotfi Bouzguenda
,
Mohamed Hammami
The geo-social relevance ranking: A method based on geographic information and social media data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Julio Henrique Rocha
,
Claudio E. C. Campelo
,
Claudio de Souza Baptista
,
Gabriel Joseph Ramos Rafael
Semi-supervised outlier detection via bipartite graph clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ayman El-Kilany
,
Neamat El Tazi
,
Ehab Ezzat
Communication-aware VM consolidation based on formal concept analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zaki Brahmi
,
Faten Ben Hassen
A scalable maximum-clique algorithm using Apache Spark
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Amr Elmasry
,
Ayman Khalafallah
,
Moustafa Meshry
Prediction of Amazon spot price based on chaos theory using ANFIS model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zohra Amekraz
,
Moulay Youssef
Data-intensive service composition in Cloud Computing: State-of-the-art
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Takwa Mohsni
,
Zaki Brahmi
,
Mohamed Mohsen Gammoudi
Adaptive Cloud Resource Allocation scheme to minimize SLO response time violation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Fatima AlQayedi
,
Khaled Salah
,
M. Jamal Zemerly
Parallel triangular matrix system solving on CPU-GPU system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ryma Mahfoudhi
,
Sami Achour
,
Zaher Mahjoub
Parallel genetic algorithm for the uncapacited single allocation hub location problem on GPU
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abdelhamid Benaini
,
Achraf Berrajaa
,
Jaouad Boukachour
,
Mustapha Oudani
Auto-tuning TRSM with an asynchronous task assignment model on multicore, multi-GPU and coprocessor systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Clicia Pinto
,
Marcos Barreto
,
Murilo Boratto
High-level synthesis for FPGA design based-SLAM application
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mohamed Abouzahir
,
Abdelhafid Elouardi
,
Samir Bouaziz
,
Omar Hammami
,
Ismail Ali
An efficient hybrid prediction approach for predicting cloud consumer resource needs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abdelkarim Erradi
,
Hisham A. Kholidy
Evaluation of 3D mesh segmentation using a weighted version of the Ochiai index
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohcine Bouksim
,
Fatima Rafii Zakani
,
Khadija Arhid
,
Taoufiq Gadi
,
Mohamed Aboulfatah
Toward a universal learning-based image quality metric with reference for stereoscopic images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Aladine Chetouani
Advanced physical optical model for simulating rainbows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jinsen Zhang
,
Changwen Zheng
,
Yu Liu
A Salient Region Detector for structured images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Elena Ranguelova
Text detection in natural scene images using two masks filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Houssem Turki
,
Mohamed Ben Halima
,
Adel M. Alimi
OFSF-BC: Online feature selection framework for binary classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fatma Ben Said
,
Adel M. Alimi
Efficient image search system with multi-scale database using profile-based pre-selection and coarse matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Kaoru Uchida
Texture classification using relative phase and Gaussian mixture models in the complex wavelet domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hind Oulhaj
,
Mohammed Rziza
,
Aouatif Amine
,
Rachid Jennane
,
Mohammed El Hassouni
A non-Gaussian statistical modeling of SIFT and DT-CWT for radar target recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ayoub Karine
,
Abdelmalek Toumi
,
Ali Khenchaf
,
Mohammed El Hassouni
Age estimation using local matched filter binary pattern
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Imad Mohamed Ouloul
,
Karim Afdel
,
Abdellah Amghar
Machine perception in gender recognition using RGB-D sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Safaa Azzakhnini
,
Lahoucine Ballihi
,
Driss Aboutajdine
Person re-identification based on combined Gaussian weighted Fisher vectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Salma Ksibi
,
Mahmoud Mejdoub
,
Chokri Ben Amar
A new approach of action recognition based on Motion Stable Shape (MSS) features
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Imen Lassoued
,
Ezzeddine Zagrouba
,
Youssef Chahir
Complementary features for traffic sign detection and recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ayoub Ellahyani
,
Mohamed El Ansari
Skyline-based approach for natural scene identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ameni Sassi
,
Chokri Ben Amar
,
Serge Miguet
A survey of secondary studies in software process improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ali Idri
,
Laila Cheikhi
Defining a UML profile for the consistency of design patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hela Marouane
,
Achraf Makni
,
Rafik Bouaziz
,
Claude Duvallet
,
Bruno Sadeg
Quality evaluation of cardiac decision support systems using ISO 25010 standard
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ilham Kadi
,
Ali Idri
,
Sofia Ouhbi
Potential-fault cache-based regression test selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Samia Hafez
,
Mustafa ElNainay
,
Mohammed Abougabal
,
Saleh ElShehaby
An UML class recommender system for software design
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Akil Elkamel
,
Mariem Gzara
,
Hanene Ben-Abdallah
The “Behavior, interaction and priority” framework applied to SystemC-based embedded systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ismail Assayad
,
Lamia Eljadiri
,
Abdelouahed Zakari
,
Tarik Nahhal
A genetic algorithm feature selection based approach for Arabic Sentiment Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
A. A. Aliane
,
H. Aliane
,
M. Ziane
,
N. Bensaou
Ensuring consistent dynamic adaptation: An approach from design to runtime
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ngoc-Tho Huynh
,
Maria-Teresa Segarra
,
Antoine Beugnard
Interval valued intuitionistic fuzzy weight techniques for TOPSIS method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Fatma Dammak
,
Leila Baccour
,
Adel M. Alimi
Identifying risks of software project management in Global Software Development: An integrative framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Saad Yasser Chadli
,
Ali Idri
,
José Luis Fernández-Alemán
,
Joaquín Nicolás Ros
,
Ambrosio Toval
Crosslingual automatic diacritization for Egyptian Colloquial Dialect
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ayman A. Zayyan
,
Mohamed Elmahdy
,
Husniza Binti Husni
,
Shahrul Azmi Yousf
Intelligent Tunisian Arabic morphological analyzer
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nadia B. M. Karmani
,
Hsan Soussou
,
Adel M. Alimi
Interoperable Arabic language resources building and exploitation in SAFAR platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Driss Namly
,
Yasser Regragui
,
Karim Bouzoubaa
Romanized Arabic and Berber detection using prediction by partial matching and dictionary methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Wafia Adouane
,
Nasredine Semmar
,
Richard Johansson
Automatic speech recognition errors detection using supervised learning techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Rahhal Errattahi
,
Asmaa El Hannani
,
Hassan Ouahmane
,
Thomas Hain
Developing Turkish sentiment lexicon for sentiment analysis using online news media
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Fatih Sağlam
,
Hayri Sever
,
Burkay Genç
Mobile app conceptual browser: Online marketplaces information extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Aboubakr Aqle
,
Fahad Islam
,
Eman Rezk
,
Ali Jaoua
FlyAntClass: Intelligent move for ant based clustering algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Amira Hamdi
,
Mohamed Slimane
,
Nicolas Monmarché
,
Adel M. Alimi
A new polynomial cluster deletion subproblem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sabrine Malek
,
Wady Naanaa
An new model for robot navigation based on AprioriAll algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Cabral Lima
,
Renan Lobo
,
Adriano Cruz
,
Bianca Pereira
,
Valk Castellani
Bayesian network for discovering the interests of authors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Emna Hlel
,
Salma Jamoussi
,
Abdelmajid Ben Hamadou
Patterns to distribute mobility simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Matthieu Mastio
,
Mahdi Zargayouna
,
Gérard Scemama
,
Omer Rana
Intelligent multi agent system based solution for data protection in the cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sara Rhazlane
,
Hassan Badir
,
Nouria Harbi
,
Nadia Kabachi
An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Houssem Mansouri
,
Al-Sakib Khan Pathan
QLAR: A Q-learning based adaptive routing for MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abdellatif Serhani
,
Najib Naja
,
Abdellah Jamali
A generic architecture of ADAS sensor fault injection for virtual tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mohamed Elgharbawy
,
Andreas Schwarzhaupt
,
Gerrit Scheike
,
Michael Frey
,
Frank Gauterin
Towards a dynamic QoS management in IMS transport layer via SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sara Khairi
,
Mostafa Bellafkih
,
Brahim Raouyane
Real-time scheduling of sporadic tasks in energy harvesting distributed reconfigurable embedded systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wiem Housseyni
,
Olfa Mosbahi
,
Mohamed Khalgui
,
Maryline Chetto
Geographic interest forwarding in NDN-based wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ahmed Aboud
,
Haïfa Touati
Event-driven wireless sensor networks based on consensus
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Slaheddine Chelbi
,
Claude Duvallet
,
Majed Abdouli
,
Rafik Bouaziz
A novel simultaneous failure recovery technique for large scale wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Samira Chouikhi
,
Inès El Korbi
,
Yacine Ghamri-Doudane
,
Leila Azouz Saidane
A novel IEEE 802.15.6 CSMA/CA service differentiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hend Fourati
,
Hanen Idoudi
,
Leila Azouz Saidane
Performance evaluation of RPL metrics in environments with strained transmission ranges
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Craig Thomson
,
Isam Wadhaj
,
Imed Romdhani
,
Ahmed Al-Dubai
Mobility support over RPL using sensor nodes speed classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fatma Somaa
,
Inès El Korbi
,
Leila Azouz Saidane
A GQVM approach to secure WeBhouse ETL processes development
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Salma Dammak
,
Faiza Ghozzi Jedidi
,
Faiez Gargouri
Intrusion detection based on genetic fuzzy classification system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mariem Belhor
,
Farah Jemili
DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Oumaima Ben Abderrahim
,
Mohamed Houcine Elhedhili
,
Leila Saidane
Anomaly behavior analysis for building automation systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhiwen Pan
,
Jesus Pacheco
,
Salim Hariri
A classification methodology for security patterns to help fix software weaknesses
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Loukmen Regainia
,
Sébastien Salva
,
Cédric Ecuhcurs
Privacy risk assessment and users' awareness for mobile apps permissions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Asma Hamed
,
Hella Kaffel Ben Ayed
Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. Kotel
,
F. Sbiaa
,
M. Zeghid
,
M. Machhout
,
A. Baganne
,
R. Tourki
Exploring the clustering of software vulnerability disclosure notifications across software vendors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jukka Ruohonen
,
Johannes Holvitie
,
Sami Hyrynsalmi
,
Ville Leppänen
Anomaly behavior analysis of website vulnerability and security
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Pratik Satam
,
Douglas Kelly
,
Salim Hariri
DIN: An efficient algorithm for detecting influential nodes in social graphs using network structure and attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Myriam Jaouadi
,
Lotfi Ben Romdhane
Outlier and anomalous behavior detection in social networks using constraint programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
El Mehdi El Graoui
,
Nabila Zrira
,
Soufiana Mekouar
,
Imade Benelallam
,
El Houssine Bouyakhf
Multi-agent framework for social CRM: Extracting and analyzing opinions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fatima Zohra Ennaji
,
Abdelaziz El Fazziki
,
Hasna El Alaouiel Abdallaoui
,
Abderahmane Sadiq
,
Mohamed Sadgal
,
Djamal Benslimane
Hybrid community detection approach in multilayer social network: Scientific collaboration recommendation case study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wala Rebhi
,
Nesrine Ben Yahia
,
Narjès Bellamine Ben Saoud
Metamodeling approach for creating an abstract representation of simulation tools concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Bassim Chabibi
,
Adil Anwar
,
Mahmoud Nassar
Using heading hierarchy for non-taxonomic relation extraction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Rim Zarrad
,
Narjes Doggaz
,
Ezzeddine Zagrouba
A Lexicon approach to multidimensional analysis of tweets opinion
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Afef Walha
,
Faiza Ghozzi
,
Faïez Gargouri
A dynamic anti-windup AQM for congestion control in internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Nabil El Fezazi
,
Sadek Belameedel Alaoui
,
Fatima El Haoussi
,
El Houssaine Tissir
,
Teresa Alvarez
A probabilistic model for web service composition in uncertain mobile contexts
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Cheyma Ben Njima
,
Youssef Gamha
,
Lotfi Ben Romdhane
Promoting active participation of the learners in an authoring based learning movie system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
A.S.M. Mahfujur Rahman
,
Abdulmotaleb El Saddik
Generation of an adaptive e-learning domain model based on a fuzzy logic approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ali Aajli
,
Karim Afdel
iXercise: An immersive platform for exercise intervention for special needs populations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yunho Huh
,
Justan Klaus
,
Magda El Zarki
Mobile application to support dyslexia diagnostic and reading practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Valéria Farinazzo Martins
,
Thiago Lima
,
Paulo N. M. Sampaio
,
Marcelo de Paiva
Showing 100 out of 223
Load More
Load All