List of Accepted Papers
| # | Authors | Title |
|---|---|---|
| 1 | Ahmed Saidi | Trust evaluation method for Wireless Sensor Networks based on behavioral similarity and similarity coefficient |
| 5 | Zakaria Tolba and Makhlouf Derdour | Deep learning for cryptanalysis attack on IoMT wireless communications via smart eavesdropping |
| 7 | Ibtissem Kemouguette, Kouahla Zineddine, Benrazek Ala-Eddine, Farou Brahim and Seridi Hamid | A Cost-Effective Space Partitioning Approach for IOT Data Indexing and Retrieval |
| 8 | Manel Bouhali, Amira Bendjeddou and Nacira Ghoualmi-Zine | Classification of Coverage Algorithms in Multimedia Wireless Sensor Networks |
| 10 | Sarra Samet, Mohamed Ridda Laouar and Issam Bendib | Diabetes mellitus early stage risk prediction using machine learning algorithmes. |
| 11 | Ali Boukehila | Fuzzy logic for emergence verification |
| 15 | Selma Mammeri, Mohamed Amroune, Mohamed Yassine Haouam and Issam Bendib | How to have a structured database for lung cancer segmentation using deep learning technologies |
| 16 | Meriem Abid, Sarah Nait Bahloul and Sara Hamlili | Trust-based Approach to Secure Low-Power and Lossy Networks Routing Protocol |
| 18 | Chahrazed Benrebbouh and Lemia Louail | Dynamic TDMA for Wireless Sensor Networks |
| 19 | Mohamed Lamine Benseddik, Khalil Zebbiche, Azzaz Mohamed Salah and Said Sadoudi | Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images |
| 21 | Imad Eddine Miloudi, Belabbas Yagoubi and Fatima Zohra Bellounar | A Survey of Dynamic Replication Strategies in Cloud Computing Systems |
| 24 | Narimane Hadjadji and Hamdi Rachid | Single channel Nonlinearity Mitigation in PDM-16QAM Coherent Optical System |
| 26 | Yamina Khenfouci, Yacine Challal and Leila Hamdad | ClusterChain: Decentralized and Trustworthy Clustering Over Blockchain |
| 29 | Redouane Kaibou and Mohamed Salah Azzaz | FPGA Implementation of Mixed Robust Chaos-based Digital Color Image Watermarking |
| 30 | Ilhem Tarchoune, Akila Djebbar and Hayet Farida Merouani | A hybrid CBR classification model by integrating Decision Tree and Random Forest into case Retrieva |
| 31 | Gattal Elhachemil and Benrazek Ala-Eddine | A study of Lagrangian Relaxation and Dantzig-Wolfe Decompositions for the Generalized Assignment Problem |
| 34 | Tarek Amine Haddad | An Agent Deep Reinforcement Learning based Adaptive Traffic Light Control for Isolated Intersection |
| 37 | Yakoub Mordjana, Badis Djamaa and Mustapha Reda Senouci | A Q-learning based Forwarding Strategy for Named Data Networking |
| 38 | Abdennour Boulesnane, Adel Beggag and Mustapha Zedadik | A New Steganography Technique Based on Dotted Arabic Letters Features |
| 39 | Abdenacer Nafir, Smaine Mazouzi and Salim Chikhi | Collective DDoS Detection by an Entropy-based Method |
| 40 | Abderrahim Bouchair, Belabbas Yagoubi and Sid Ahmed Makhlouf | Dual Load Balancing Strategy for Virtual Network Embedding in SDNEnabled Distributed Cloud |
| 44 | Mohamed Sedik Chebout | AOM4JADE: An Aspect-Oriented Monitoring approach for JADE-based Multi-Agent Applications |
| 45 | Sara Gasmi, Tahar Bouhadada and Kamilya Laib | Recommendation of learning resources in social learning environment using data mining |
| 46 | Zakaria Bairi, Kada Beghdad Bey, Abdenour Amamra and Badis Djamaa | A Parallel and Optimized Image Compressed Sensing Solution |
| 47 | Nadhir Boukhechem and Nadjib Badache | An optimized time synchronization protocol for WSANs |
| 48 | Nassima Aissani, Ibtissem Mechrour and Assia Filali | Systemic review of data-driven Maintenance 4.0: rotary machine experimetation |
| 49 | Sarra Samet, Mohamed Ridda Laouar and Issam Bendib | Use of Machine Learning Techniques to Predict Diabetes at an Early Stage |
| 50 | Anfal Ayad and Youcef Hammal | An Efficient Authenticated Group Key Agreement Protocol for Dynamic UAV Fleets in Untrusted Environments |
| 51 | Elmoundher Hadjaidji, Mohamed Cherif Amara Korba and Khaled Khelil | Detection of precancerous laryngeal leukoplakia using sub-band based cepstral |
| 53 | Yacine Hakimi, Riyad Baghdadi and Yacine Challa | Deep Learning and Classical Machine Learning for code mapping in Heterogeneous Platforms |
| 54 | Houssem Eddine Hafidi, Hmidi Zohra, Kahloul Laïd and Saber Benharzallah | Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2 |
| 55 | Redouane Benabdallah Benarmas and Kadda Beghdad Bey | Improving Road Traffic Prediction By using Dependencies Study: CrossCorrelation based Approach |
| 56 | Tarek Cherifi, Walid Cherifi, Kenza Challal, Leila Abbad, Malika Bouterfas and Abdelghani Gramez | MUbus: A new secure industrial communication protocol based on ModBus and Ubus protocols |
| 57 | Farah Abdmeziem, Saida Boukhedouma and Mourad Chabane Oussalah | On the security of business processes: classification of approaches, comparison and research directions |
| 61 | Abderrezek Samira and Bourouis Abdelhabib | Convolutional Auto Encoder and Bidirectional LongShort Term Memory to Estimate Remaining UsefulLife for Condition Based Maintenance |
| 62 | Tabouche Abdeldjalil, Djamaa Badis and Senouci Mustapha Reda | Performance Evaluation of Recent Traffic-Aware Scheduling Functions for 6TiSCH Networks |