Search Results - "2021 International Conference on Information Systems and Advanced Technologies (ICISAT)"

Refine Results
  1. 1

    Ubiquitous learning a new challenge of ubiquitous computing: state of the art by Guettala, Manel, Bourekkache, Samir, Kazar, Okba

    “…New technological developments made interaction possible with computer systems and applications anywhere and anytime. These applications must be capable to be…”
    Get full text
    Conference Proceeding
  2. 2

    Design of a Novel Nanometric Graphene Pentagone Patch Antenna Array for Terahertz Transmission by Moulfi, Bouchra, Ferouani, Souheyla, Djalal, Ziani Kerarti, Wassila, Moulessehoul

    “…This paper presents an original design of nanometric pentagon patch array in the terahertz band. The materiel used for the patch is the graphene, it has a very…”
    Get full text
    Conference Proceeding
  3. 3

    Convolution Neural network based Marine Predator Algorithm for COVID-19 detection by Akram, Khelili Mohamed, Sihem, Slatnia, Okba, Kazar

    “…COVID-19 is among the dangerous illness in the world due to its quickly spreading, posing a new challenge for researchers to discover it early. In last few…”
    Get full text
    Conference Proceeding
  4. 4

    Image forgery detection review by Benhamza, Hiba, Djeffal, Abdelhamid, Cheddad, Abbas

    “…With the wide spread of digital document use in administrations, fabrication and use of forged documents have become a serious problem. This paper presents a…”
    Get full text
    Conference Proceeding
  5. 5

    Analysis of Student's Achievement through Educational Data Mining by Rahman, Mizanur, Ahmed, Md Imtiaz, Hossain, Mohammed Shakhawat

    “…Data mining is referred to the process of retrieving data and discovering the knowledge from a specific dataset. Nowadays data mining plays an important role…”
    Get full text
    Conference Proceeding
  6. 6

    An Effective Model for Detecting Severeness of Disease in Paddy Leaf by Shukla, Kumar A., Bhatt, Aryan Animesh, Lodha, Nitin

    “…The capacity to recognize and classify diseases based on leaf images acquired from plants is necessary. Using image processing algorithms to detect diseases in…”
    Get full text
    Conference Proceeding
  7. 7

    A survey on data quality: principles, taxonomies and comparison of approaches by Yalaoui, Mehdi, Boukhedouma, Saida

    “…Nowadays, data generation keeps increasing exponentially due to the emergence of the Internet of Things (IoT) and Big data technologies. The manipulation of…”
    Get full text
    Conference Proceeding
  8. 8

    Mobile Application Based on Augmented Reality to Encourage Tourism at the Wari Willka Museum by Jacobe, Jonathan, Jacobo, Luis, Salinas, Karen, Castaneda, Pedro, Moggiano, Nabilt

    “…In this research, we have implemented a mobile application that allows to know through an inter-dimensional portal the history of the Wari culture in Junín…”
    Get full text
    Conference Proceeding
  9. 9

    Better Decision Making with Sentiment Analysis of Amazon reviews by Wedjdane, Nahili, Khaled, Rezeg, Okba, Kazar

    “…The way we purchase products online has been revolutionized due to disruptive digital technologies making all the information available at our fingertips. This…”
    Get full text
    Conference Proceeding
  10. 10

    Comparing Remote Learning Between Live Lectures and Self-paced Interactive Tutorials for Learning an Introduction to Blockchain by Sangpratoom, Jintawat, Tharatipyakul, Atima, Ua-Arak, Natnaree, Thanasuan, Kejkaew, Pongnumkul, Suporn

    “…Online learning in universities in Thailand is still a problem in terms of adaptation and finding a suitable way to learn. During the Covid-19 pandemic, most…”
    Get full text
    Conference Proceeding
  11. 11

    Arabic Handwritten Text to Line Segmentation by Meziani, Fariza, Bouchakour, Lallouani, Ghribi, Khadidja, Yahiaoui, Mustapha, Latrache, Houda, Abbas, Mourad

    “…Text to line segmentation is a crucial phase in character recognition system since segmentation errors affects the recognition accuracy. In this work we…”
    Get full text
    Conference Proceeding
  12. 12

    Classifying of Intrusion Detection System Configurations Using Machine Learning Techniques by Daoud, Mohamed Amine, Dahmani, Youcef, Ammar, Sabrina, Ouared, Abdelkader

    “…The design capability of enhanced IDSs is being sought by the detection community because intrusion detection requirements are different from one environment…”
    Get full text
    Conference Proceeding
  13. 13

    A Swarm Reinforcement Learning Method for dynamic reconfiguration with end-to-end constraints in composite web services by Messiaid, Abdessalam, Benaboud, Rohallah, Mokhati, Farid, Salem, Hajer

    “…Service composition is an efficient way to fulfill user requirements in service-oriented architecture by combining several web services to perform a specific…”
    Get full text
    Conference Proceeding
  14. 14

    The Contribution of the Neural Network to the Improvement of Speech Recognition by Benkerzaz, Saliha, Youssef, Elmir, Abdeslem, Dennai

    “…Neural Network are one of the artificial intelligence techniques. Work of the neural network inspired by biological neural networks and have applied in many…”
    Get full text
    Conference Proceeding
  15. 15

    A Smart System to Detect Cheating in the Online Exam by Soltane, Merzoug, Laouar, Mohamed Ridda

    “…The COVID-19 pandemic, caused the whole globe some serious downfall in terms of economy, even the day-to-day activities are being restricted due to…”
    Get full text
    Conference Proceeding
  16. 16

    Mother Care Precision Nutrition Service Based on Nutrigenetics and Nutrition Blood Test by Yang, Jitao

    “…The health of women and children is the cornerstone of health of the whole people, and the foundation and premise of sustainable development of mankind…”
    Get full text
    Conference Proceeding
  17. 17

    Intrusion Detection Systems using Data Mining Techniques: A comparative study by Haddadi, Mohamed, Khiat, Abdelhamid, Bahnes, Nacera

    “…Data mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The…”
    Get full text
    Conference Proceeding
  18. 18

    Hardware/Software Development of a Machine Learning based Forest Fires Prediction System by Abid, Faroudja, Izeboudjen, Nouma, Louiz, Fatiha

    “…This paper deals with the Hardware/Software development of a forest fires prediction system. To automate the forest fires prediction process, we propose a…”
    Get full text
    Conference Proceeding
  19. 19

    Personalized Nutrition Service for Anti-fatigue Based on Genomics by Yang, Jitao

    “…The fatigue symptoms such as persistent sense of tiredness, low mood, difficult to concentrate, headache, and sleep disorder affects people's normal working…”
    Get full text
    Conference Proceeding
  20. 20

    In-Depth Métan- Search Engine by Mourad, Belabed, Abdeslam, Dennai

    “…The use of search engines is one of the most popular online activities. In addition, users generally receive good results and relatively high confidence in the…”
    Get full text
    Conference Proceeding