Projets internationaux financés

ID
Intitulé
Responsable
Année
376e-PTC : une plateforme pour optimiser et favoriser l’usage des transports collectifsRoni Drazi, Amir Hajjami, Abderrahim Sekkaki2017-01-01

Publications indexées

ID
Intitulé
Année
Journal
Auteurs
2829Ontology-oriented e-gov services retrieval2012International Journal of Computer Science Hassania Ouchetto, Ouail Ouchetto and Ounsa Roudiès
2831Knoweldge management For e-gov projets in Africa countries2012International Journal of Research management Hassania Ouchetto, Ismailia Hassoumi, Ouail Ouchetto, Ounsa Roudiès
2834Relavance Banking for services Retrieval2012Journal of computer sciences Ouail Ouchetto, Hassania Ouchetto and Ounsa Roudiès
2839Semantic integration process of business components through ontology alignment2012Journal of SoftwareHicham Elasri, Abderrahim Sekkaki
2841Background Ontology Used in Ontologies Alignment to Support Integration Process of Business Components2013International journal of Applied Mathematical SciencesH Elasri, A Sekkaki
2843Homogenization of Maxwell’s Equations in Lossy Biperiodic Metamaterials2013Antennas and Propagation, IEEE Transactions Ouchetto, O. ; Ouchetto, H.; Zouhdi, S.; Sekkaki, A.
2844A Model-Driven Methodology Approach for E-learning Platform Development2013International Journal of Information and Education TechnologyRachid DEHBI, Mohamed TALEA and Abderahim TRAGHA
2845IP MULTIMEDIA SUBSYSTEM: SECURITY EVALUATION 2013Journal of Theoretical and Applied Information TechnologyBelmekki E.; Bellafkih M.; Bouaouda N.; Rouayane B.
2847A One Round-Trip Ultralightweight Security Protocol for Low-Cost RFID Tags2013Journal of Green EngineeringW. Razouk and A. Sekkaki
2849Survey : Risk Assessment for Cloud Computing2013International Journal of Advanced Computer Science and ApplicationsSaadia Drissi, Hanane Houmani and Hicham Medromi.
2852End-to-End Architecture for E-commerce Security. 2013Journal of Communication and ComputerHoussam El Ismaili, Hanane Houmani and Adil Lebbat.
2855Secure End to End Architecture for E-Commerce Security-Oriented Transaction2013Journal of Communication ComputerHoussam El Ismaili, Hanane Houmani and Hicham Medromi
2857Updating RM-ODP by integration of SOA and cloud computing2013Journal of Theoretical and Applied Information Technology Jebbar, M. Benammar, O. Sekkaki, A.
2858Semantic integration process of business components to support information system designers2013International Journal of Web & Semantic Technology Hicham Elastri and Abderrahim Sekkaki
2859Providing Anonymity for RFID Systems2013Journal of Information and Communication Technologies Wissam Razouk, Ferucio Laurentiu Tipla, Abderrahim Sekkaki and Cosmin Varlan
2860Hybrid Method for Automatic Ontology Building from Relational Database2013International Review on Computers and Software M. R. Chbihi Louhdi, H. Behja & S. Ouatik El Alaoui,
2861A Case Study of using RM-ODP in mobile cloud computing applications2013International Review on Computers and Software Jebbar, M. Sekkaki, A. Benammar, O
2862A Novel Method for Generating an e-Learning Ontology2013International Journal of Data Mining & Knowledge Management Process M. R. Chbihi Louhdi, H. Behja, S. Ouatik El Alaoui,
2864The generation approach of Multi-target learning management system. 2013Journal of Advanced Science LettersRachid Dehbi, Mohamed Talea and Abderahim Tragha
2865MDA-based transformation of LMS Business Components: The contribution of XML technologies and model transformations2013International Journal of Enterprise Information SystemsRachid Dehbi, Mohamed Talea and Abderahim Tragha
2867Detection of Regions of Interest in Mammograms by Using Local Binary Pattern and Dynamic K-Means Algorithm2014 International Journal of Image and Video Processing: Theory and Application Abdelali Elmoufidi, Khalid El-Fahssi, Said Jai-Andaloussi, Abderrahim Sekkaki
2868A Secure Electronic Tran- saction Payment Protocol Design and Implementation2014International Journal of Advanced Computer Science and ApplicationsHoussam El Ismaili, Hanane Houmani and Hicham Madromi.
2870Feature extraction of the lesion in mammogram images using segmentation by minimizing the energy and orthogonal transformation adaptive2014WSEAS Transactions on Biology and BiomedicineEl Fahssi, K.,Elmoufidi, A.,Abenaou, A.,Jai-Andaloussi, S.,Sekkaki, A
2871Securing the Payment Card Data on Cloud environment: Issues & perspectives 2014International Journal of Computer Science and Network SecurityH. EL ALLOUSSI, L. FETJAH, A. CHAICHAA,
2872Evaluate dynamic Kmeans algorithm for automatically segmented different breast regions in mammogram based on density by using seed region growing technique 2015Journal of Theoretical and Applied Information TechnologyElmoufidi, A.,El Fahssi, K.,Andaloussi, S.J.,Sekkaki, A.
2873Security policies matching through ontologies alignment to support security experts2015Journal of Theoretical and Applied Information TechnologyBenammar, O.,Elasri, H.,Jebbar, M.,Sekkaki, A.
2875An advanced comparative study of the most promising NoSQL and NewSQL databases with a multi-criteria analysis method. 2015Journal of Theoretical and Applied Information TechnologyOmar Hajoui, Rachid Dehbi, Mohammed Talea, Zouhair Ibn Batouta
2876Multi-criteria analysis and advanced comparative study between automatic generation approaches in software engineering2015Journal of Theoretical and Applied Information TechnologyZOUHAIR IBN BATOUTA, RACHID DEHBI, MOHAMMED TALEA, OMAR HAJOUI,
2879Ensuring Confi- dentiality in Cryptographic Protocols with the Witness-Functions2015International Journal of Computer and Communication EngineeringJaouhar Fattahi, Mohamed Mejri, Moeiz Miraoui and Hanane Houmani.
2880Strengthen Cloud Computing Access Control with Attribute Based Encryption using anonymous Re-encryption proxy2015International Journal of Engineering Research & Technology (N. Meddah, A.Toumanari, L.Fetjah
2882Introduction to the Witness Functions for Secrecy in Cryptographic Protocols2015International Journal of Modeling and OptimizationJaouhar Fattahi, Mohamed Mejri and Hanane Houmani.
2883Autonomous system for network monitoring and service correction in IMS Architecture2015International Journal of Computer Science & ApplicationsMohammed Errais, Mostafa Bellafkih, Daniel Ranc,
2884Fréquence domaine Homogénéisation des équations de Maxwell en milieux complexes2015Journal international d'Ingénierie et de la modélisation mathématique,Ouail Ouchetto et Brahim Essakhi
14985Technical and Semantic Interoperability in the Cloud Broker2016International Journal of Computers• ABDESSELAM OUARDI, ABDERRAHIM SEKKAKI, DRISS MAMMASS
15938Students' Perception About Mobile Learning in Morocco: Survey Analysis2016International Journal of Interactive Mobile Technologies (iJIM)Youness Zidoun, Fatima-Zohra El arroum, Mohamed Talea, Rachid Dehbi
15941Model-based architecting and model driven approaches in e-learning system development process: Review of lmsgenerator2016Journal of Theoretical and Applied Information TechnologyRachid Dehbi
15942Selection of commercial and open source LMS: Multi-criteria analysis and advanced comparative study2016International Journal of Applied Engineering ResearchBakhouyi, A., Dehbi, R., Talea, M., Batouta, Z.I.
16335TOWARDS AN INTER-CLOUD ARCHITECTURE ADAPTED TO THE HEALTH FIELD2016Journal Of Theoretical And Applied Information Technology ABDESSELAM OUARDI, ABDERRAHIM SEKKAKI, DRISS MAMMAS
17907Homogenization of Periodic Structured Materials With Chiral Properties2016IEEE Transactions on Antennas and PropagationOuail Ouchetto; Badr Abou El Majd; Hassania Ouchetto; Brahim Essakhi; Saïd Zouhdi
21213Model Driven Engineering Applied in E-Learning Development Process: Advanced Comparative Study with ROC Multi-Criteria Analysis2017International Journal of Online Pedagogy and Course DesignRachid Dehbi
21217Enhanced QoS Management SDN-Based in IMS with QoE Evaluation2017Journal of Mobile MultimediaSara Khairi, Brahim Raouyane, Mostafa Bellfakih
21272 Homogenization of Bi-Isotropic Multilayered Metamaterial Structures2017IEEE Transactions on Nanotechnology, Ouail Ouchetto; Brahim Essakhi; Saïd Jai-Andaloussi; Saad Zaamoun
29370Generative matching between heterogeneous meta-model systems based on hybrid heuristic2018Journal of Information Technology ResearchIbn Batouta, Z., Dehbi, R., Talea
29371A logical approach for real time big data analytics on heterogeneous NoSQL databases2018International journal of engineering & technologyHajoui.O, Dehbi, R., Talea,M
29372An Approach for Big Data Analytics on Heterogeneous NoSQL DBaaS 2018International Journal of Software Innovation (IJSI), IGI Global, Omar Hajoui , Dehbi, R., M Talea, Ibn Batouta, Z ."
29373An Approach to Data Interoperability for NoSQL Databases2018Journal of Engineering and Applied Sciences Omar Hajoui , Dehbi, R., M Talea , Z Ibn Batouta, A. Bakhouyi
29374Multi-Criteria Analysis and Advanced Comparative Study between M-learning Development Approaches2018International Journal of Interactive Mobile Technologies , iJIM 12(3): 38-51 (2018)Zidoun, Y., Talea, M., & Dehbi, R.
29375Anomaly classification in digital mammography based on multiple-instance 2018learning IET Image Processing JournalAbdelali Elmoufidi, Khalid El Fahssi, Said Jai-andaloussi, Abderrahim Sekkaki, Quellec Gwenole, Mathieu Lamard
29376Semantic integration of UML class diagram with semantic validation on segments of mappings 2018Software Engineering• Hicham Elasri, Elmustapha Elabbassi, Abderrahim Sekkaki, Muhammad Fahad
29387Homogenization of periodic bi-isotropic composite materials2018Waves in Random and Complex MediaOUCHETTO, Ouail et ESSAKHI, Brahim
29388Handling periodic boundary conditions on arbitrary mesh2018IET Microwaves, Antennas & PropagationOUCHETTO, Ouail, ESSAKHI, Brahim, JAI-ANDALOUSSI, Said
29973Impact of Security in QoS Signaling in NGN: Registration Study2018International Journal of Advanced Computer Science and Applications(ijacsaRAOUYANE Brahim, BELMEKKI Elmostafa, KHAIRI sara and BELAFKIH mostafa,

Communications internationales

ID
Intitulé
Auteurs
Conférence
Ville
Pays
Date
3027Integration of SOA and Cloud computing in RM-ODP Mostafa JEBBAR , Othman BENAMMAR and Abderrahim SEKKAKIIEEE SETIT 2012, Science of Electronics, Technologies of Information and TelecommunicationsSousseTunisie2012-03-21
3028QoS in the MPLS-DiffServ networkSaika, A.; Kouch, R.E.; Rayouane, B.; Bellafkih, M.IEEE SETIT 2012, Science of Electronics, Technologies of Information and TelecommunicationsSousseTunisie2012-03-21
3031Semantic Matching of Security Policies to Support Security ExpertsOthman Benammar, Hicham Elasri, Abderrahim SekkakiThe Sixth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE RomeItalie2012-08-19
3032Towards an Intelligent System for Self-Correction of QoS in IMS Network ERRAIS M., RANC D., BELLAFKIH M. 6 th International Conference on Next Generation Mobile Applications, Services and technologiesParisFrance2012-09-12
3033Inter-VM packet inspection in Cloud ComputingS. Khoudali, K. Benzidane and A. Sekkaki5th International Conference on Communications, Computers and ApplicationsIstanbulTurquie2012-10-12
3034An Improved Ultralightweight Security Protocol for Low-cost RFID TagsWissam Razzouk and Abderrahim SekkakiThe 7th IEEE International Conference on Broadband and Biomedical CommunicationsSydneyAustralie2012-11-05
3035Autonomous Agent-based Inspection for inter-VM traffic in Cloud environmentK. Benzidane, S. Khoudali and A. SekkakiThe 7th IEEE International Conference for Internet Technology and Secure TransactionLondonAngleterre2012-12-10
3036A Model-Driven Methodology Approach for E-learning Platform DevelopmentRachid Dehbi, Mohamed Talea and Abderahim Tragha . International Conference on Information and Education Technology BruxellesBelgique2013-01-12
3037End-to-End Architecture for E-commerce SecurityHoussam El Ismaili, Hanane Houmani and Adil Lebbat. Proceeding of the Second International Conference on e-Technologies and Networks for DevelopmentKuala LumpurMalaisie2013-03-04
3038Toward a secure virtual traffic in a cloud environmentBenzidane, Karim ; Khoudali, Saad ; Leila, Fetjah ; Sekkaki, AbderrahimIEEE Security Days (JNS3)RabatMaroc2013-05-04
3039Lightweight real-time decoding of video on J2ME devicesMadrane, Nabil ; Sekkaki, Abderrahim ; Jai-Andaloussi, Said20th IEEE International Conference on Telecommunications CasablancaMaroc2013-05-06
3040Medical content based image retrieval by using the Hadoop frameworkJai-Andaloussi, Said ; Elabdouli, Abdeljalil ;Chaffai, Abdelmajid ; Madrane, Nabil ; Sekkaki, Abderrahim20th IEEE International Conference on Telecommunications CasablancaMaroc2013-05-06
3041Toward inter-VM visibility in a Cloud environment using packet inspectionBenzidane, Karim ; Khoudali, Saad ; Leila, Fetjah ; Sekkaki, Abderrahim20th IEEE International Conference on TelecommunicationsCasablancaMaroc2013-05-06
3042Mass segmentation in mammograms by using Bidimensional Emperical Mode Decomposition BEMDJai-Andaloussi, Said ; Sekkaki, Abderrahim ; Quellec, Gwenole ; Lamard, Mathieu ; Cazuguel, Guy ; Roux, Christian35th IEEE Annual International Conference Engineering in Medicine and Biology Society (EMBC)OsakaJapon2013-07-02
3043Architecting Mobile cloud computing application by RM-ODPJebbar, M. Sekkaki, A. Benammar, O.IEEE Proceeding of Science and Information ConferenceLondonAngleterre2013-09-10
3044Toward agent based inter-VM traffic authentication in a Cloud environmentBenzidane, Karim ; Khoudali, Saad ; Sekkaki Abderrahim10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services TokyoJapon2013-12-02
3045Mass segmentation in mammograms using energy minimization and proposed a method for classification and detection the lesionKhalid El Fahssi, Abdenbi Abenaou, Said Jai-Andaloussi Abderrahim SekkakiThe International Conference on Systems, Control, Signal Processing and InformaticsPraqueTchekoslovaquie2014-04-02
3046Towards a new approach for securing IMS networks Belmekki E.; Raouyane B.; Bellafkih M.; Bouaouda N.Conference on Intelligent Systems and Control VancouverCanada2013-04-17
3047Transformation Rules for Building OWL Ontologies from Relational DatabasesM. R. Chbihi Louhdi, H. Behja & S. Ouatik El Alaouithe Second Conference of Data Mining & Knowledge Management ProcessParisFrance2013-11-01
3048Detection of Regions of Interest in Mammograms by Using K-Means Clustering Algorithm and Co-occurrence Matrix Technique Abdelali Elmoufidi, Said Jai-andaloussi, Nabil Madrane, Abderrahim Sekkaki and Khalid El FahssiThe Fifth International Conference on Next. Generation Networks & services CasablancaMaroc2014-05-28
3049Toward an Elastic, Scalable and Distributed Monitoring Architecture for Cloud InfrastructuresKhoudali Saad, Karim Benzidane, Abderrahim Sekkaki and Mohamed BouchoumThe Fifth International Conference on Next. Generation Networks & services CasablancaMaroc2014-05-28
3050Mass segmentation in mammograms besed on the minimisation of energy and active contour modelKhalid El fahssi, Abdelali Elmoufidi, Abdenbi Abenaou, Said-Jai Andaloussi, Abderrahim SekkakiThe IEEE International Symposium on Medical Measurements and ApplicationsLisbonPortugal2014-06-11
3051NSIS-based quality of service management in IMS networkTAAM, A. ; OUMSIS, M. ; RAOUYANE, B. ; BELLAFKIH, M. IEEE International Conference on Multimedia Computing and Systems MarrakechMaroc2014-04-14
3052Secure SIP signalling service in IMS networkBelmekki, E. ; Raouyane, B. ; Belmekki, A. ; Bellafkih, M. 9th International Conference on Intelligent Systems: Theories and Applications RabatMaroc2014-05-07
3053Fuzzy video streaming control in IP Multimedia Subsystem architectureMohammed, E. ; Mostafa, B. ; Brahim, RAOUYANE.9th International Conference on Intelligent Systems: Theories and Applications RabatMaroc2014-05-07
3073Sufficient Conditions for Secrecy in Cryptographic Protocols. Jaouhar Fattahi, Mohamed Mejri and Hanane Houmani. Proceeding of the World Symposium On Computer Networks and Information SecurityHammametTunisie2014-06-13
3075Secrecy by Witness-FunctionsJaouhar Fattahi, Mohamed Mejri and Hanane Houmani. Proceeding of the 5th Workshop on Formal Methods for Security TunisTunisie2014-06-25
3077New Functions for Secrecy on Real ProtocolsJaouhar Fattahi, Mohamed Mejri and Hanane Houmani. Proceeding of the 7th International Conference on Network Security & Applications ChennaiInde2014-07-26
3079Introduction to the Witness- Functions for Secrecy in Cryptographic ProtocolsJaouhar Fattahi, Mohamed Mejri and Hanane Houmani. . Proceeding of the International Conference on Networks and InformationNanjingChine2014-06-27
3081A New security approach for ZigBee Weaknesses W. Razouk, G. Crosby and A. SekkakiThe six International Symposium on Applications of Ad hoc and Sensor Networks Nova ScotiaCanada2014-09-22
3082Secrecy by Witness-Functions on Increasing ProtocolsJaouhar Fattahi, Mohamed Mejri and Hanane Houmani. Proceeding of the 2nd International Workshop on Systems Safety & Security BucarestRoumanie2014-10-23
3084Ensuring Confi- dentiality in Cryptographic Protocols with the Witness-FunctionsJaouhar Fattahi, Mohamed Mejri, Moeiz Miraoui, and Hanane Houmani. Proceeding of the 5th International Conference on Networking and Information Technology xxxxxSingapore2014-11-21
3088Secured architecture for inter-VM traffic in a Cloud environmentBenzidane, Karim ; Khoudali, Saad ; Sekkaki, Abderrahim IEEE Latin America Conference on Cloud Computing and Communications Maceió-AlagoasBrésil2013-12-09
3089Case Based Reasoning for QoS Management in IMS networks. Mohammed Errais, Mostafa Bellafkih and Abderrahim Sekkaki10ème Conférence internationale GRES, Gestion de Réseaux Et de ServicesParisFrance2014-12-01
3090Cloud Computing Interoperability : an approach to increase the technical level and the semantic level of interoperability. Abdesselam Ouardi, Abderrahim Sekkaki and Driss MammassConférence internationale GRES, Gestion de Réseaux Et de ServicesParisFrance2014-12-01
3091Soccer Video Summarization using Video Content Analysis and Social Media StreamsSaid Jai-Andaloussi, Abderrahim Sekkaki, Nabil Madrane.International Symposium on big data Computing (BDC 2014) In conjunction with 7th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2014), IEEE Computer SocietyLondonAngleterre2014-12-08
3092Automatically density based breast segmentation for mammograms by using dynamic K-means algorithm and Seed Based Region Growing Elmoufidi, A.,El Fahssi, K.,Jai-Andaloussi, S.,Sekkaki, A.- IEEE Instrumentation and Measurement Technology ConferencePisaItalie2015-05-03
3093Security Challenges in Intrusion Detection. Sara Diouani, Mohammed Jouad, Hanane Houmani and Ali Zaki. Proceeding of the International Conference on Cloud Computing Technologies and ApplicationsMarrakechMaroc2015-06-02
3094Survey and comparison of MADM methods for network selection access in heterogeneous networksMohamed Lahby, Silki Baghla, Abderrahim SekkakiSeventh IFIP/IEEE International Conference on New Technologies, Mobility and SecurityParisFrance2015-07-01
3095Ontological approach for Data WareHouse design. Bouchra Aadil, Abderrahim Ait Wakrime, Larbi Kzaz, Abderrahim Sekkaki3ème CFIP/ IEEE conférence francophone sur les nouvelles technologies de la répartitionParisFrance2015-07-07
3096Cloud Card Compliance Checklist : An efficient tool for securing deployment Card Solutions on the CloudH. EL Alloussi, L. Fetjah, A. Chaichaa,The Ninth International Conference on Emerging Security Information, Systems and Technologies SECURWARE VeniceItalie2015-07-13
3097Benign or Malignant Lesion Classification in Mammography Images Using the Adaptive Orthogonal Transformation and the Coefficients of the Correlation MatrixKhalid El Fahssi, Abdelali Elmoufidi, Abdenbi Abenaou, Said Jai-Andaloussi, Abderrahim SekkakiThe IEEE International Conference on Circuits, Systems and Signal ProcessingCreteGreece2015-10-17
3098Automatically Diagnosis of Suspicious Lesions in Mammograms A. Elmoufidi, K. El Fahssi, S. Jai-Andaloussi, A. Sekkaki, G. Quellec, M. Lamard, G. CazuguelThe International Conference on Mathematical Models and Methods in Applied SciencesCreteGreece2015-10-17
3099A Rules-based system for model compositionSamia Benabdellah Chaouni; Mounia Fredj; Salma MoulineACS_IEEE International Conference on Computer Systems and Applications, MarrakechMaroc2015-11-17
3100Soccer Events Summarization by Using Sentiment AnalysisSaid Jai-Andaloussi, Imane EL Mourabit, Nabil Madrane, Samia Benabdellah Chaouni, Abderrahim Sekkakithe IEEE/ACM International Conference on Computational Science and Computational Intelligence Las VegasEtats Unis2015-12-07
3102Efficaces constitutifs Paramètres de Chiral multicouches StructureOuail Ouchetto, Badr El Majd Abou Saad Zaamoun. The IEEE International RF and Microwave Conference,KuchingMalaisie2015-12-14
14986Towards a Proactive approach to monitoring and correcting services in IP Multimedia Subsystem networks, • ERRAIS M., BELLAFKIH M., SEKKAKI 18th International Conference on Computer, Communication and Information Sciences, and EngineeringJeddahKSA2016-01-26
14987Toward a Cloud-based security intelligence with Big Data processing• Karim Benzidane, Othmane El Warrak, Hassan El Alloussi, Laila Fetjah, Said Jai Andaloussi, Abderrahim SekkakiIEEE/IFIP NOMS Network Operations and Management SymposiumIstanbulTurkey2016-04-25
14988Automating Data Warehouse Design Using Ontology• Aadil bouchra, Abderrahim Ait Wakrime, Abderrahim Sekkaki & kzaz larbi, 2nd International Conference on Electrical and Information Technologies (ICEIT) TangierMorocco2016-05-04
14989An optimized vertical handover approach based on M-ANP and TOPSIS In Heterogeneous Wireless Networks• Mohamed Lahby, Abdelbaki Attioui and Abderrahim SekkakiThe Second International Symposium on Ubiquitous Networking UNet16 Lecture Notes in Electrical Engineering, SpringerCasablancaMaroc2016-05-30
14990Automatic Detection of Suspicious Lesions in Digital X-ray Mammograms• A. Elmoufid, K. El Fahssi, S. Jai-andaloussi, A. Sekkaki, G. Quellec, M. Lamard and G. CazuguelThe Second International Symposium on Ubiquitous Networking UNet16 Lecture Notes in Electrical Engineering, SpringerCasablancaMaroc2016-05-30
14991Application of APSIS on a card payment solution• Hassan El Alloussi, Karim Benzidane, Othman El Warrak, Leila Fetjah, Said Jai-Andaloussi and Abderrahim SekkakiThe Second International Symposium on Ubiquitous Networking UNet16 Lecture Notes in Electrical Engineering, SpringerCasablancaMaroc2016-05-30
14992Toward a Big Data security analytics in a Cloud Environment • Laila Fetjah, Karim Benzidane, Othmane El Warrak, Hassan El Alloussi, Said Jai Andaloussi, Abderrahim SekkakiThe 3rd IEEE International Conference on Cyber Security and Cloud Computing BeijingChina2016-06-25
14993Performance analysis of minutia-based fingerprint matching algorithmsMohamed Lahby; Yassine Ismaili; Abdelbaki Attioui; Abderrahim Sekkaki 11th International Conference on Intelligent Systems: Theories and Applications (SITA)MohammadiaMaroc2016-10-19
15925A Reverse Engineering approach to extract ontology taxonomies from relational databasesS. SBAI, H. BEHJA, M.R. CHBIHI LOUHDI, E. ZEMMOURI6th international Conference on Next Generation Networks and ServicesRabatMaroc2016-12-16
15928Towards a Dynamic QoS Management in IMS Transport Layer via SDN S.Khairi, B. Raouyane and M. Bellafkih13th ACS/IEEE International Conference on Computer Systems and ApplicationsAgadirMaroc2016-11-29
15930Enhaced QoS Management SDN-Based in IMS with QoE EvaluationS.Khairi, B. Raouyane and M. Bellafkih6th International Conference on Next Generation Networks and Services.RabatMaroc2016-12-16
15932Toward a Service Broker for telecom service integration in IMS networkImane Haddar; Brahim Raouyane; Mostafa Bellafkih International Conference on Electrical and Information Technologies (ICEITTangerMorocco2016-05-04
15933A High-Performance and Scalable Distributed Storage and Computing System for IMS ServicesYoussef Seraoui, Mostafa Bellafkih, Brahim Raouyane The 2nd International Conference on Cloud Computing Technologies and Applications MarrakechMaroc2016-05-24
15935Towards a Service Broker for Telecom Service Provision and Negociation in IMS NetworkImane Haddar, Brahim Raouyane, Mostafa BellafkihThe Second International Symposium on Ubiquitous Networking, 2016 CasablancaMaroc2016-05-30
15939Automation in code generation: Tertiary and systematic mapping reviewZouhair Ibn Batouta, Rachid Dehbi, Mohamed Talea, Omar Hajoui:4th IEEE International Colloquium on Information Science and Technology (CIST 16)TangierMorocco2016-10-24
16331owards Multi-Criteria Decision Aid method for SLA-Based Service Broker in IMS environment Imane Haddar; Brahim Raouyane; Mostafa Bellafkih 6th International Conference on Next Generation Networks and ServicesRabatMaroc2016-12-16
17908Effective constitutive parameters of anisotropic chiral multilayered mediaOuail Ouchetto; Badr Abou El Majd; Saad Zaamoun21st IEEE International Conference on Microwave, Radar and Wireless Communications (MIKON), KrakowPoland2016-05-09
17909Periodic boundary conditions in the FEM using arbitrary meshesOuail Ouchetto; Saad Zaamoun 21st IEEE International Conference on Microwave, Radar and Wireless Communications (MIKON), KrakowPoland2016-05-09
17910Multiple criteria comparative evaluation on the interoperability of LMS by applying COPRAS methodAbdellah Bakhouyi; Rachid Dehbi; Mohamed TaleaFuture Technologies Conference (FTC) 2016San FranciscoUSA2016-12-06
17911A comparative analysis of different approaches for big data interoperabilityOmar Hajoui; Mohamed Talea; Abdellah Bakhouyi; Zouhair Ibn Batouta; Rachid DehbiThe third International Conference on Systems of Collaboration – SysCo'2016CasablancaMaroc2016-11-28
21210Evolution of standardization and interoperability on E-learning systems: An overviewAbdellah Bakhouyi, Rachid Dehbi, Mohamed Talea, Omar Hajoui16th International Conference on Information Technology Based Higher Education and Training, ITHET 2017OhridMacedonia2017-07-10
21218An extended IMS framework with a high-performance and scalable distributed storage and computing system Youssef Seraoui, Brahim Raouyane, Mostafa BellafkihIEEE International Symposium on Networks, Computers and Communications, ISNCC 2017MarrakechMaroc2017-05-16
21219QoS management SDN-based for LTE/EPC with QoE evaluation: IMS use case. SDS 2017: 125-130 Sara Khairi, Mostafa Bellafkih, Brahim RaouyaneIEEE Fourth International Conference on Software Defined Systems, SDS 2017, Valencia, ValenciaSpain2017-05-08
21220NGN Management with NGOSS Framework-Based IMS Use Case.Brahim Raouyane, Sara Khairi, Imane Haddar, Mostafa Bellafkihbiquitous Networking - Third International Symposium, UNet 2017, CasablancaMaroc2017-05-09
21221Opening into a virtualized IMS based telecom architectural framework: Telecom cloud managerYoussef Seraoui, Brahim Raouyane, Mostafa Belmekki, Mostafa BellafkihInternational Conference on Wireless Networks and Mobile Communications, WINCOM 2017RabatMaroc2017-11-01
21222Towards MCDA method based service broker for SLA selection in IMS environmentImane Haddar; Brahim Raouyane; Mostafa BellafkihThe 8th IEEE International Conference on Information Technology (ICIT)Bhudaneswarindia2017-12-21
21223Generating a service broker framework for service selection and SLA-based provisioning within network environmentsImane Haddar; Brahim Raouyane; Mostafa BellafkihIEEE Ninth International Conference on Ubiquitous and Future Networks (ICUFN)MilanItaly2017-07-04
21260Implementation of new broker based on the eTOM framework for dynamic supply of resources during the composition of virtual networksErrais Mohammed; Sekkaki AbderrahimIEEE International Symposium on Networks, Computers and Communications, ISNCC 2017MarrakechMaroc2017-05-16
21261Optimal vertical handover based on TOPSIS algorithm and utility function in heterogeneous wireless networksMohamed Lahby, Abderrahim Sekkaki2017 International Symposium on Networks, Computers and Communications, ISNCC 2017, Marrakech, Morocco, May 16-18, 2017MarrakechMaroc2017-05-16
21264Towards an inter-Cloud architecture in healthcare systemAbdesselam Ouardi, Abderrahim Sekkaki, Driss Mammass2017 International Symposium on Networks, Computers and Communications, ISNCC 2017,MarrakechMaroc2017-05-16
21266An improved policy for network selection decision based on enhanced-topsis and utility functionMohamed Lahby, Abdelbaki Attioui, Abderrahim Sekkaki13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, ValenciaSpain2017-06-26
21269Content based video retrieval based on bounded coordinate of motion histogram Abderrahmane Adoui El Ouadrhiri, El Mehdi Saoudi, Said Jai-Andaloussi, Ouail Ouchetto, Abderrahim Sekkaki:IEEE International Conference on Control, Decision and Information Technologies, CoDIT 2017BarcelonaSpain2017-04-05
21274Homogenization of bi-isotropic multilayered metamaterialsOuail Ouchetto; Brahim Essakhi; Said Jai-Andaloussi; Saad ZaamounIEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization for RF, Microwave, and Terahertz Applications (NEMO)sevillaSpain2017-05-17
21275Homogenization of structures with symmetric cellsOuail Ouchetto; Brahim Essakhi; Saad Zaamoun IEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization for RF, Microwave, and Terahertz Applications (NEMO)sevillaSpain2017-05-17
21282Performance analysis of the vertical handover across Wifi/3G networks based on IEEE 802.21• Mohamed Lahby, Abderrahim SekkakiSecond International Conference on Real Time Intelligent SystemsCasablancaMorocco2017-10-18
21283Towards an operational alignment approach for organizationsMaryam Habba, Mounia Fredj, Samia Benabdellah Chaouni9th International Conference on Information Management and Engineering, BarcelonaSpain2017-10-09
29359A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless NetworksMohamed Lahby, Abderrahim Sekkaki9th IEEE/IFIP International Conference on New Technologies, Mobility and Security (NTMS 2018)ParisFrance2018-02-26
29360Automatic Classification of Air Pollution and Human Health. • Rachida El Morabet, Abderrahmane Adoui El Ouadrhiri, Jaroslav Burian, Said Jai-Andaloussi, Said El Mouak, Abderrahim Sekkaki:The 3rd International Conference On Big Data, Cloud And Applications BDCA’18KenitraMaroc2018-04-04
29361Similarity Performance of Keyframes Extraction on Bounded Content of Motion Histogram.• Abderrahmane Adoui El Ouadrhiri, Said Jai-Andaloussi, El Mehdi Saoudi, Ouail Ouchetto, Abderrahim Sekkaki:The 3rd International Conference On Big Data, Cloud And Applications BDCA’18KenitraMaroc2018-04-04
29362Analytical Effective Parameters of Artificial Structures• Ouail Ouchetto ; Said Jai-Andaloussi ; Abderrahim Sekkaki ; Saad Zaamoun19th IEEE International Radar Symposium (IRS)BonnGermany2018-06-22
29363Fast-Tracking Application for Traffic Signs Recognition. • Abderrahmane Adoui El Ouadrhiri, Jaroslav Burian, Said Jai-Andaloussi, Rachida El Morabet, Ouail Ouchetto, Abderrahim SekkakiInternational Conference on Computer Vision and Graphics, ICCVG 2018: 385-396 Lecture Notes in Electrical Engineering, Springer, Warsaw,Poland2018-09-17
29366A New Web Service Architecture for Enhancing the Interoperability of LMS and Mobile applications Using the Next Generation of SCORMBakhouyi, A., Dehbi, R., & Talea, MThe International Conference on Advanced Intelligent Systems for Sustainable Development (AI2SD'2018), TangierMorroco2018-07-12
29377Improving Content Based Video Retrieval Performance by Using Hadoop-MapReduce Model Saoudi, E.M., Ouadrhiri, A.A.E., Warrak, O.E., Andaloussi, S.J., Sekkaki, A.IEEE FRUCT 2018 : 23nd Conference of Open Innovations Association FRUCTBolognaItaly2018-11-13
29977Blockchain and IoT for Security and Privacy: A Platform for Diabetes Self-management Kebira AZBEG, Ouail OUCHETTO, Said JAI ANDALOUSSI, Leila FETJAH, Abderrahim SEKKAKI et al The 4th IEEE International Conference on Cloud Computing Technologies and Applications BrrusselsBelgique2018-11-26

Communications nationales

ID
Intitulé
Auteurs
Conférence
Ville
Date
3103« Mapping of Quality Indicator based on Fuzzy Logic, in IMS ContextERRAIS, M.; BELLAFKIH, M.; RAOUYANE, B.; RAMDANI, MInternational Conference on Multimedia Computing and Systems (ICMCS), Tanger2012-05-10
3105Similarity methods in IMS network management M. ERRAIS, M. BELLAFKIH, M. RAMDANIInternational Conference on Software Engineering, Databases and Expert Systems (SEDEXS'12Settat2012-06-14
3106Approche Algorithmique pour la Retro-conception de l’héritage avec GénéralisationM. R. Chbihi Louhdi, H. Behja & S. Ouatik El Alaoui, the proceeding of the Fifth Workshop on Information Technologies and CommunicationFes2013-12-06
3107on intrusions detection in cloud computingSara Diouani, Mohammed Jouad, Hanane Houmani. The 2nd International Workshop on Software Engineering and Systems ArchitectureTetouan2013-12-15
3110Cloud-based IDS architectures applying the ids approches into the cloud environmentH. EL Alloussi, L. Fetjah, A. Chaichaa3rd Edition On Innovation and News Trends in Information Systems Tanger2015-06-03

Ouvrages

ID
Intitulé
Auteurs
Editeur
Date
29358Advances in Data Communications and Networking for Digital Business TransformationMohamed Lahby, Abderrahim SekkakiPublisher IGI Global2018-01-01

Chapitres d'ouvrage

ID
Intitulé
Auteurs
Intitulé chapitre
Editeur
Date

Brevets

ID
Intitulé
Auteurs
Contexte
Champs d'application
Date
3177Network distribution and management of interactive video and multi-media containersNabil MadraneINetwork distribution and management of interactive video and multi-media containers2015-06-30

Thèses en cours

ID
Nom Prénom
Sujet
Directeur de thèse
Année de première inscription
4805 Fatima Zahra ElayachiA case Based Reasoning Decision Support Model for Smart CitiesJai Andaloussi Said2017
4806 Ayoub EssouiriModélisation et optimisation du handover vertical à base de la thèorie des graphes flous dans un environnement réseaux hétérogènesSEKKAKI ABDERRAHIM2017
4807 Hamid KhaddouDéveloppements et mise en place d'architecture basés sur IoT pour l'ingénierie des villes intelligentes: Application dans les domaines de l'agriculture et la santé.Dehbi Rachid2017
4808 Mohamed KhomalliModélisation des réseaux sociaux dans l'évaluation de l'activité touristiqueSEKKAKI ABDERRAHIM2017
4813 Aboullaite MohamedSécurité cognitive dans le blockchainSEKKAKI ABDERRAHIM2017
3220 Kebira AzbegInteractive Signature for Transactions Confirmation in Bitcoin BlockchainOuchetto Ouail2016
4814 Noureddine AmriLa dockerisation dans SDNSEKKAKI ABDERRAHIM2017
3221 Hamza BentekoukSécurité de l'Infrastructure Cloud ComputingSEKKAKI ABDERRAHIM2016
4913 Mohamed JouadNouvelle approche de détection d’intrusion dans un environnement hétèrogène distribuéSEKKAKI ABDERRAHIM2015
3222 Jabran DaaifReal Time Sentiment Analysis of Single Human FaceOuchetto Ouail2016
3223 Lahcen El MansouriReal Time Content-based Video RetrievalJai Andaloussi Said2016
3224 Mohamed JouadUn nouvel Modèle de La sécurité et la vie privée des smart citiesHoumani Hanane2016
3225 Soukaina NaimySimulation distribuée des marchés financiers à l’aide des SMASEKKAKI ABDERRAHIM2016
5815 Bousselham YoussefDeep Learning for Image Classification and RecognitionJai Andaloussi Said2018
3226 Khalid El FahsiDétection du cancer du sein sur des images mammographiques SEKKAKI ABDERRAHIM2012
5818 Elhaydouni OumaimaProfiling cloudSEKKAKI ABDERRAHIM2018
3227 Abdelali El MoufidiClassification des masses mammaires pour le diagnostic du cancer du sein SEKKAKI ABDERRAHIM2012
5819 Erroutbi AmineSécurité des technologies Fog computing et de l'IoTSEKKAKI ABDERRAHIM2018
3228 Bouchra AadilVers une ontologie de gestion de dechetsSEKKAKI ABDERRAHIM2013
5820 Jihad TariqAnalyse et gestion de risques dans le cloud computingSEKKAKI ABDERRAHIM2018
3229 Yassine SerhaneApprentissage semi-supérvisé des accidents cardio-vasculairesSEKKAKI ABDERRAHIM2013
5821 Mansouri MeriemeDeep Learning for Facial Sentiment AnalysisJai Andaloussi Said2018
3230 Karim BenzidaneDétection des intrusions dans le cloud computing SEKKAKI ABDERRAHIM2011
5822 Mimi SafaaEvaluation et optimisation de qualité de service (QoS) et de qualité d'expérience (QoE) dans les réseaux de communications 5G à base du machine learning.SEKKAKI ABDERRAHIM2018
3231 Abdelhaq SakhiLa thèorie de jeux pour l'optimisation du handover vertical dans un environnement réseau hétérogène et multi fournisseursSEKKAKI ABDERRAHIM2015
5824 Skouta AyoubDeep learning for Food Image RecognitionOuchetto Ouail2018
3232 Amine FennaneDéploiement d'un Datacenter dans le cloudSEKKAKI ABDERRAHIM2016
5826 Tahri MoadCreating an artistic and marketing planning model for the movie industry based on Artificial intelligenceSEKKAKI ABDERRAHIM2018
4803 Othman ElwarrakSécurité cognitive d'une infrastructure IoT, Big Data orientée CloudSEKKAKI ABDERRAHIM2017
4804 Abdessadek BourraMobile health Platform for Diabetes Management Based on the IoT and Case Based ReasoningSEKKAKI ABDERRAHIM2017

Thèses soutenues

ID
Nom Prénom
Sujet
Directeur de thèse
Année de première inscription
Date de soutenance
354 Hicham ElasriUne approche d’intégration sémantique des Composants Métier pour supporter les concepteurs des systèmes d’informationSEKKAKI ABDERRAHIM20092013-09-28
356 Mostafa JebbarIntégration de l'architecture orientée services et du cloud computing dans le modèle de référence des systèmes répartis ouverts (RM-ODP)SEKKAKI ABDERRAHIM20102015-10-31
3191 Othman Benammar • Intégration sémantique des politiques de sécurité basée sur les ontologies dans des environnements hétérogènesSEKKAKI ABDERRAHIM20092016-07-23
3192 Wissam Razouk• Analysis and Design of Security Protocols for Internet of Things Constrained DevicesSEKKAKI ABDERRAHIM20112016-12-02
5551 Abdesselam OuardiMise en place d'un modèle de brokerage d'interopérabilité inter-Cloud pour une sélection efficace de servicesSEKKAKI ABDERRAHIM20132018-09-22
5553 Abdelali ElmoufidiSegmentation et classification des images de mammographies pour l'aide au diagnostic du cancer du seinSEKKAKI ABDERRAHIM20142018-10-06
5554 Khalid El FahssiAide au diagnostique du cancer de sein par la segmentation des masses mammaires et l'identification des microcalcificationsSEKKAKI ABDERRAHIM20132018-12-01
4021 Larbi KzazContribution Aux Systèmes d’Information Décisionnels : Proposition d’une nouvelle architecture intégrant une Base et un Entrepôt de DécisionsSEKKAKI ABDERRAHIM20142017-07-14
4022 Hassan AlloussiSécurité des données de paiement par carte dans le Cloud. Vers un référentiel de sécurité des transactions de paiement dans le Cloud SEKKAKI ABDERRAHIM20122017-07-19

© 2016 Université Hassan II de Casablanca