List of Accepted Papers

# Authors Title
1 Ahmed Saidi Trust evaluation method for Wireless Sensor Networks based on behavioral similarity and similarity coefficient
5 Zakaria Tolba and Makhlouf Derdour Deep learning for cryptanalysis attack on IoMT wireless communications via smart eavesdropping
7 Ibtissem Kemouguette, Kouahla Zineddine, Benrazek Ala-Eddine, Farou Brahim and Seridi Hamid A Cost-Effective Space Partitioning Approach for IOT Data Indexing and Retrieval
8 Manel Bouhali, Amira Bendjeddou and Nacira Ghoualmi-Zine Classification of Coverage Algorithms in Multimedia Wireless Sensor Networks
10 Sarra Samet, Mohamed Ridda Laouar and Issam Bendib Diabetes mellitus early stage risk prediction using machine learning algorithmes.
11 Ali Boukehila Fuzzy logic for emergence verification
15 Selma Mammeri, Mohamed Amroune, Mohamed Yassine Haouam and Issam Bendib How to have a structured database for lung cancer segmentation using deep learning technologies
16 Meriem Abid, Sarah Nait Bahloul and Sara Hamlili Trust-based Approach to Secure Low-Power and Lossy Networks Routing Protocol
18 Chahrazed Benrebbouh and Lemia Louail Dynamic TDMA for Wireless Sensor Networks
19 Mohamed Lamine Benseddik, Khalil Zebbiche, Azzaz Mohamed Salah and Said Sadoudi Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images
21 Imad Eddine Miloudi, Belabbas Yagoubi and Fatima Zohra Bellounar A Survey of Dynamic Replication Strategies in Cloud Computing Systems
24 Narimane Hadjadji and Hamdi Rachid Single channel Nonlinearity Mitigation in PDM-16QAM Coherent Optical System
26 Yamina Khenfouci, Yacine Challal and Leila Hamdad ClusterChain: Decentralized and Trustworthy Clustering Over Blockchain
29 Redouane Kaibou and Mohamed Salah Azzaz FPGA Implementation of Mixed Robust Chaos-based Digital Color Image Watermarking
30 Ilhem Tarchoune, Akila Djebbar and Hayet Farida Merouani A hybrid CBR classification model by integrating Decision Tree and Random Forest into case Retrieva
31 Gattal Elhachemil and Benrazek Ala-Eddine A study of Lagrangian Relaxation and Dantzig-Wolfe Decompositions for the Generalized Assignment Problem
34 Tarek Amine Haddad An Agent Deep Reinforcement Learning based Adaptive Traffic Light Control for Isolated Intersection
37 Yakoub Mordjana, Badis Djamaa and Mustapha Reda Senouci A Q-learning based Forwarding Strategy for Named Data Networking
38 Abdennour Boulesnane, Adel Beggag and Mustapha Zedadik A New Steganography Technique Based on Dotted Arabic Letters Features
39 Abdenacer Nafir, Smaine Mazouzi and Salim Chikhi Collective DDoS Detection by an Entropy-based Method
40 Abderrahim Bouchair, Belabbas Yagoubi and Sid Ahmed Makhlouf Dual Load Balancing Strategy for Virtual Network Embedding in SDNEnabled Distributed Cloud
44 Mohamed Sedik Chebout AOM4JADE: An Aspect-Oriented Monitoring approach for JADE-based Multi-Agent Applications
45 Sara Gasmi, Tahar Bouhadada and Kamilya Laib Recommendation of learning resources in social learning environment using data mining
46 Zakaria Bairi, Kada Beghdad Bey, Abdenour Amamra and Badis Djamaa A Parallel and Optimized Image Compressed Sensing Solution
47 Nadhir Boukhechem and Nadjib Badache An optimized time synchronization protocol for WSANs
48 Nassima Aissani, Ibtissem Mechrour and Assia Filali Systemic review of data-driven Maintenance 4.0: rotary machine experimetation
49 Sarra Samet, Mohamed Ridda Laouar and Issam Bendib Use of Machine Learning Techniques to Predict Diabetes at an Early Stage
50 Anfal Ayad and Youcef Hammal An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments
51 Elmoundher Hadjaidji, Mohamed Cherif Amara Korba and Khaled Khelil Detection of precancerous laryngeal leukoplakia using sub-band based cepstral
53 Yacine Hakimi, Riyad Baghdadi and Yacine Challa Deep Learning and Classical Machine Learning for code mapping in Heterogeneous Platforms
54 Houssem Eddine Hafidi, Hmidi Zohra, Kahloul Laïd and Saber Benharzallah Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2
55 Redouane Benabdallah Benarmas and Kadda Beghdad Bey Improving Road Traffic Prediction By using Dependencies Study: CrossCorrelation based Approach
56 Tarek Cherifi, Walid Cherifi, Kenza Challal, Leila Abbad, Malika Bouterfas and Abdelghani Gramez MUbus: A new secure industrial communication protocol based on ModBus and Ubus protocols
57 Farah Abdmeziem, Saida Boukhedouma and Mourad Chabane Oussalah On the security of business processes: classification of approaches, comparison and research directions
61 Abderrezek Samira and Bourouis Abdelhabib Convolutional Auto Encoder and Bidirectional LongShort Term Memory to Estimate Remaining UsefulLife for Condition Based Maintenance
62 Tabouche Abdeldjalil, Djamaa Badis and Senouci Mustapha Reda Performance Evaluation of Recent Traffic-Aware Scheduling Functions for 6TiSCH Networks