Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Kamel Boukhalfa"'
Publikováno v:
Applied Artificial Intelligence, Vol 32, Iss 9-10, Pp 907-923 (2018)
In this work, we relied on a particular exact method to solve NP-Hard problem of determining a horizontal fragmentation scheme in relational data warehouses. The method used is that of linear programming which is distinguished by other methods by the
Externí odkaz:
https://doaj.org/article/388474f4de2a4a3cb9ef31e7bf8215d2
Publikováno v:
Applied Artificial Intelligence, Vol 31, Iss 4, Pp 299-315 (2017)
Several studies have invested in machine learning classifiers to protect plants from diseases by processing leaf images. Most of the proposed classifiers are trained and evaluated with small datasets, focusing on the extraction of hand-crafted featur
Externí odkaz:
https://doaj.org/article/ff86270397734f14ad2e5e83ec4bba69
Autor:
kamel Ahsene Djaballah, Kamel Boukhalfa, Mohamed Amine Guelmaoui, Amir Saidani, Yassine Ramdane
Publikováno v:
International Journal of Information Security and Privacy. 16:1-27
The security of personal data is crucial for a company or any individual. Phishing is one of the most common and dangerous cybercrime attacks. These attacks aim to steal information used by individuals and organizations using social engineering, whic
Publikováno v:
Cluster Computing. 25:3875-3898
In NW Tunisia, the lateral equivalents of the Mid-Eocene “Reineche Limestone” member of the Souar Formation (Bartonian) are still poorly known. Sedimentological investigations in the “Reineche Limestone” type locality in NE Tunisia; and three
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3c43a805f2d41b744d43157b118044b
https://doi.org/10.21203/rs.3.rs-2698146/v1
https://doi.org/10.21203/rs.3.rs-2698146/v1
Publikováno v:
International Journal of Information Technology and Web Engineering. 16:52-73
Social networks are used by terrorist groups and people who support them to propagate their ideas, ideologies, or doctrines and share their views on terrorism. To analyze tweets related to terrorism, several studies have been proposed in the literatu
Autor:
Mohammed Redha Bouzidi, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Kamel Boukhalfa, Benameur Ziani, Mourad Daoudi
Publikováno v:
Computer Communications. 171:16-27
Workflows and workflow scheduling are increasingly used in many applications with many tasks and dependency constraints between these tasks. On the other hand, cloud computing offers huge opportunities to process large-scale workflows and data-intens
Autor:
Sami Belkacem, Kamel Boukhalfa
Publikováno v:
International Journal of Data Warehousing and Mining. 17:15-38
Social media are used by hundreds of millions of users worldwide. On these platforms, any user can post and share updates with individuals from his social network. Due to the large amount of data, users are overwhelmed by updates displayed chronologi
Autor:
Islam Sadat, Kamel Boukhalfa
Publikováno v:
Artificial Intelligence and Its Applications ISBN: 9783030963101
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dddec808309aaaa6de524d92d0dbab08
https://doi.org/10.1007/978-3-030-96311-8_20
https://doi.org/10.1007/978-3-030-96311-8_20
Publikováno v:
Advances in Science, Technology & Innovation ISBN: 9783030725464
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1249bbd135bacd1463e92144108e6272
https://doi.org/10.1007/978-3-030-72547-1_31
https://doi.org/10.1007/978-3-030-72547-1_31