default search action
8th IBICA 2017: Marrakech, Morocco
- Ajith Abraham, Abdelkrim Haqiq, Azah Kamilah Muda, Niketa Gandhi:
Innovations in Bio-Inspired Computing and Applications - Proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2017) Held in Marrakech, Morocco, December 11-13, 2017. Advances in Intelligent Systems and Computing 735, Springer 2018, ISBN 978-3-319-76353-8 - Oscar Castillo, Frumen Olivas, Fevrier Valdez:
Dynamic Parameter Adaptation Using Interval Type-2 Fuzzy Logic in Bio-Inspired Optimization Methods. 1-12 - Sana Akourmis, Youssef Fakhri, Moulay Driss Rahmani:
Reducing Blackhole Effect in WSN. 13-24 - Said Broumi, Assia Bakali, Mohamed Talea, Florentin Smarandache, Vakkas Uluçay:
Minimum Spanning Tree in Trapezoidal Fuzzy Neutrosophic Environment. 25-35 - Atta-ur-Rahman, Kiran Sultan, Nahier Aldhafferi, Abdullah Alqahtani:
Differential Evolution Assisted MUD for MC-CDMA Systems Using Non-orthogonal Spreading Codes. 36-48 - Qëndresë Hyseni, Sule Yildirim Yayilgan, Bujar Krasniqi, Kadri Sylejmani:
Solving the Problem of Distribution of Fiscal Coupons by Using a Steady State Genetic Algorithm. 49-59 - Afaf Mosaif, Said Rakrak:
A Survey of Cross-Layer Design for Wireless Visual Sensor Networks. 60-68 - Mohamed Matoui, Noureddine Moumkine, Abdellah Adib:
An IPv6 Flow Label Based Approach for Mobile IPTV Quality of Service. 69-80 - Ladislav Zjavka, Stanislav Misák, Lukás Prokop:
NWP Model Revisions Using Polynomial Similarity Solutions of the General Partial Differential Equation. 81-91 - Abdellah Ouammou, Mohamed Hanini, Said El Kafhali, Abdelghani Ben Tahar:
Energy Consumption and Cost Analysis for Data Centers with Workload Control. 92-101 - Ahmed Boujnoui, Abdellah Zaaloul, Abdelkrim Haqiq:
A Stochastic Game Analysis of the Slotted ALOHA Mechanism Combined with ZigZag Decoding and Transmission Cost. 102-112 - Adnane El Hanjri, Abdellah Zaaloul, Abdelkrim Haqiq:
Analytic Approach Using Continuous Markov Chain to Improve the QoS of a Wireless Network. 113-124 - Mohamed Nabil, Abdelmajid Hajami, Abdelkrim Haqiq:
Determining and Evaluating the Most Route Lifetime as the Most Stable Route Between Two Vehicles in VANET. 125-132 - Mengfan Zhi, Ziqiang Yu, Bo Yang, Lin Wang, Liangliang Zhang, Jifeng Guo, Xuehui Zhu:
Reverse Extraction of Early-Age Hydration Kinetic Equation of Portland Cement Using Gene Expression Programming with Similarity Weight Tournament Selection. 133-142 - Lairenjam Obiroy Singh, Rajagopalan Devanathan:
Performance Improvement of Bio-Inspired Strategies Through Feedback Laws. 143-156 - Asmae El Kassiri, Fatima-Zahra Belouadha:
A Semantic Approach Towards Online Social Networks Multi-aspects Analysis. 157-168 - Mohamed Moncef Ben Khelifa, Hachem A. Lamti, Adel M. Alimi:
Towards a New Generation of Wheelchairs Sensitive to Emotional Behavior of Disabled People. 169-177 - Abdulfattah Mohammad Obeid, Manel Elleuchi, Mohamed Wassim Jmal, Manel Boujelben, Mohamed Abid, Mohammed S. BenSaleh:
A Comprehensive Technical Review on Security Techniques and Low Power Target Architectures for Wireless Sensor Networks. 178-199 - Souad Labghough, Fouad Ayoub, Mostafa Belkasmi:
A Closed Form Expression for the Bit Error Probability for Majority Logic Decoding of CSOC Codes over \varGamma \varGamma Γ Γ Channels. 200-210 - Majda Elhozmari, Ahmed Ettalbi:
Straightforward MAAS to Ensure Interoperability in Heterogeneous Environment. 211-220 - Yassine Maleh, Abdelkebir Sahid, Abdellah Ezzati, Mustapha Belaïssaoui:
A Capability Maturity Framework for IT Security Governance in Organizations. 221-233 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
System Multi Agents for Automatic Negotiation of SLA in Cloud Computing. 234-244 - R. Jarray, Nawel Jmail, Abir Hadriche, Tarek Frikha:
A Comparison Between Modeling a Normal and an Epileptic State Using the FHN and the Epileptor Model. 245-254 - Marie Ndaw, Gervais Mendy, Samuel Ouya:
Modeling the Effect of Security Measures on Electronic Payment Risks. 255-265 - Kandoussi el Mehdi, Iman El Mir, Mohamed Hanini, Abdelkrim Haqiq:
Modeling an Anomaly-Based Intrusion Prevention System Using Game Theory. 266-276 - Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, Dijiang Huang:
Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming. 277-287 - Anass Misbah, Ahmed Ettalbi:
Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure. 288-297 - Maryem Ait El Hadj, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies. 298-308 - Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman:
Biometric Template Privacy Using Visual Cryptography. 309-317 - Safaa Mahrach, Oussama Mjihil, Abdelkrim Haqiq:
Scalable and Dynamic Network Intrusion Detection and Prevention System. 318-328 - Ahmed Kharrat, Mahmoud Neji:
A Hybrid Feature Selection for MRI Brain Tumor Classification. 329-338 - Youssef Harmouch, Rachid El Kouch:
A Statistical Analysis for High-Speed Stream Ciphers. 339-349 - Asmaa El Kandoussi, Hanan El Bakkali:
Weighted Access Control Policies Cohabitation in Distributed Systems. 350-360 - Monsef Boughrous, Hanan El Bakkali:
A Comparative Study on Access Control Models and Security Requirements in Workflow Systems. 361-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.