Skip to main content
    • by 
njdwefioqwehfuAPKDCJQWUOGHQ3RUENFVJDFSABVIYERQHYFFW
    • by  and +1
A major problem facing researchers today in the field of ad hoc networks is safety and preservation of the integrity of such networks. Among the many attacks recorded in the literature, wormhole attack remains a severe attack and not... more
    • by 
— A major problem facing researchers today in the field of ad hoc networks is safety and preservation of the integrity of such networks. Among the many attacks recorded in the literature, wormhole attack remains a severe attack and not... more
    • by 
    •   2  
      Routing protocolsWormhole Attack
This paper presents a study that attempts to explore a new method to improve information retrieval on the web, and the filtering of the obtained results. It is well known that a user takes an indeterminate time to find his needs and his... more
    • by 
    •   3  
      Information TechnologyWeb TechnologiesICT in Education
The evolution of Web technologies has been a popularity of online learning systems. The adaptation of content in an e-Learning platform presents today a domain making the appearance of many recent projects. This paper presents a study... more
    • by 
The evolution of new communication and information technologies led to a very high rate of innovation in online education. This opens doors for several major research projects at universities, institutes and research centers, all over the... more
    • by 
    •   9  
      Semantic Web TechnologiesE-learningData Fusion (Engineering)Semantic Web technology - Ontologies
    • by  and +1
Abstract: This paper describes the development of air pollutants concentration prediction models of five different pollutants (O3, PM10, SO2, NOx, COx), using Radial Basis Function, and Elman Networks, two neurocomputing paradigms. Each... more
    • by 
This paper presents a Multi-Agent System (MAS) approach for designing an air pollution simulator. The aim is to simulate the concentration of air pollutants emitted from sources (e.g. factories) and to investigate the emergence of... more
    • by 
    •   2  
      Environmental ScienceComputer Science
In the last few years, the evolution of information technology has resulted in the development of several interesting and sensitive fields such as the dark Web and cyber-criminality, especially using ransomware attacks. This paper aims to... more
    • by 
    •   3  
      Machine LearningMalware DetectionRansomware attack
Introduction: This paper focuses on the prediction of weekly peak levels of Particulate Matter with an aerodynamic diameter of less than 2.5 µm (PM 2.5), using various Machine Learning (ML) models. The study compares ML models to deep... more
    • by 
    • Concentration of PM2.5 in air
With the recent upsurge in music consumption, music recommendation systems have gained substantial prominence. Platforms like Spotify are increasingly relied upon by users for curated music, underscoring the need for improved... more
    • by  and +1
    •   2  
      Music Recommender Systemsconvolutional neural networks (CNNs)
In this paper a new classification of range image segmentation method is proposed according to the criterion of homogeneity which obeys the segmentation, then, a deformable modeltype active contour "Snake" is applied to segment range... more
    • by 
    • Range Image
In this paper a new classification of range image segmentation method is proposed according to the criterion of homogeneity which obeys the segmentation.
    • by 
    • Range Image
When a radial basis function network (RBFN) is used for identification of a nonlinear multiinput multi-output (MIMO) system, the number of hidden layer nodes, the initial parameters of the kernel, and the initial weights of the network... more
    • by 
    • Machine Learning
Abstract: Learners often find themselves in situations where they want to achieve a goal but do not have the sufficient knowledge to enable them to achieve it spontaneously. These situations are referred to problems. Indeed, guiding a... more
    • by 
To design an adaptive intelligent tutoring system which can manage both different disciplinary domains and a guide for the learner is difficult. The specialization of the analysis treatments is responsible for the loss of reusability in... more
    • by 
Keyword spotting is the task of identifying the occurrences of certain desired keywords in an arbitrary speech signal. Keyword spotting has many applications one of them is telephone routing. In particular, we consider a big company which... more
    • by  and +1
The Artificial Neural Networks (ANN) were widely and successfully used in the automatic speech recognition (ASR) field, but many limitations inherent to their learning style remain. In an attempt to overcome these limitations, we combine... more
    • by 
    • Expert Systems