![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
12th MEDI 2023: Sousse, Tunisia
- Mohamed Mosbah
, M. Tahar Kechadi
, Ladjel Bellatreche
, Faïez Gargouri
:
Model and Data Engineering - 12th International Conference, MEDI 2023, Sousse, Tunisia, November 2-4, 2023, Proceedings. Lecture Notes in Computer Science 14396, Springer 2024, ISBN 978-3-031-49332-4
Modelling
- Sawssen Briki, Nesrine Khabou, Ismael Bouassida Rodriguez:
A Comparative Analysis of Time Series Prediction Techniques a Systematic Literature Review (SLR). 3-14 - James Baak
, Quentin Rouland
, Jason Jaskolka
:
A Formal Metamodel for Software Architectures with Composite Components. 15-29 - Idir Aït-Sadoune
:
A Floating-Point Numbers Theory for Event-B. 30-43 - Mohamed Amin Hammami, Mariam Lahami:
Model-Based Testing Approach for EIP-1559 Ethereum Smart Contracts. 44-57 - Ahmed Rabhi, Rachida Fissoune, Mohamed Tabaa, Hassan Badir:
Execution Planning for Aggregated Search in the Web of Data: A Free-Metadata Approach. 58-68 - Amel Belmaksene, Selma Khouri:
Discovering Relationships Between Heterogeneous Declarative Mappings for RDF Knowledge Graph. 69-83
Machine Learning and Optimization
- Alì Aghazadeh Ardebili
, Antonella Longo
, Antonio Ficarella
, Adem Khalil, Sabri Khalil:
Exploring Synthetic Noise Algorithms for Real-World Similar Data Generation: A Case Study on Digitally Twining Hybrid Turbo-Shaft Engines in UAV/UAS Applications. 87-101 - Yang Yu
, Tai Dinh
, Fangyu Yu
, Van-Nam Huynh
:
Understanding Mobile Game Reviews Through Sentiment Analysis: A Case Study of PUBGm. 102-115 - Oussama Hasidi
, El Hassan Abdelwahed, My Abdellah El Alaoui-Chrifi, Aimad Qazdar, François Bourzeix, Intissar Benzakour, Ahmed Bendaouia, Charifa Dahhassi:
Data-Driven and Model-Driven Approaches in Predictive Modelling for Operational Efficiency: Mining Industry Use Case. 116-127 - Mourad Ellouze
, Lamia Hadrich Belguith
:
Approach Based on Bayesian Network and Ontology for Identifying Factors Impacting the States of People with Psychological Problems from Data on Social Media. 128-141 - Lamia Berkani
, Abdelhakim Ghiles Hamiti, Yasmine Zemmouri:
Social Recommendation Using Deep Auto-encoder and Confidence Aware Sentiment Analysis. 142-155 - Walid Ben Fradj, Mohamed Turki, Faïez Gargouri:
Deep Learning Based on TensorFlow and Keras for Predictive Monitoring of Business Process Execution Delays. 156-169
Ontology and Database Systems
- Fériel Ben Fraj
, Nourhène Nouri:
OntoFD: A Generic Social Media Fake News Ontology. 173-185 - Mikhail Firsov
, Michael Polyntsov
, Kirill Smirnov
, George A. Chernishev
:
Finding a Second Wind: Speeding Up Graph Traversal Queries in RDBMSs Using Column-Oriented Processing. 186-199 - Samira Oulefki, Lamia Berkani
, Nassim Boudjenah, Imad Eddine Kenai, Aïcha Mokhtari:
Ontology Matching Using Multi-head Attention Graph Isomorphism Network. 200-213 - Chaimae Asaad
, Karim Baïna, Mounir Ghogho:
Investigating the Perceived Usability of Entity-Relationship Quality Frameworks for NoSQL Databases. 214-227 - Ahlem Rhayem
, Ishak Riali, Mohamed Ben Ahmed Mhiri, Messaouda Fareh, Raúl García-Castro
, Faïez Gargouri:
Fuzzy HealthIoT Ontology for Comorbidity Treatment. 228-241
Healthcare Applications
- Eyad Gad
, Seif Soliman
, M. Saeed Darweesh
:
Advancing Brain Tumor Segmentation via Attention-Based 3D U-Net Architecture and Digital Image Processing. 245-258 - Tawfik Ezat Mousa, Ramzi Zouari, Mouna Baklouti:
Breast Cancer Detection Based DenseNet with Attention Model in Mammogram Images. 259-271 - Nada Zendaoui, Nardjes Bouchemal, Maya Benabdelhafid:
AI-LMS: AI-Based Long-Term Monitoring System for Patients in Pandemics: COVID-19 Case Study. 272-285 - Wassim Sliti, Seif Eddine Ben Abdelali, Aymen Yahyaoui, Amine Mosbah, Olfa Djebbi:
Cardiovascular Anomaly Detection Using Deep Learning Techniques. 286-299
Applications and Security
- Mariam Masmoudi
, Ikram Amous
, Corinne Amel Zayani
, Florence Sèdes
:
Real-Time Mitigation of Trust-Related Attacks in Social IoT. 303-318 - Fidma Mohamed Abdelillah
, Hamour Nora
, Samir Ouchani
, Sidi Mohamed Benslimane
:
Hybrid Data-Driven and Knowledge-Based Predictive Maintenance Framework in the Context of Industry 4.0. 319-337 - Karim Magdy
, Ghada Khoriba
, Hala Abbas
:
Enhancing Semantic Image Synthesis: A GAN-Based Approach with Multi-Feature Adaptive Denormalization Layer. 338-351 - Adil Achraf Bereksi Reguig
, Houari Mahfoud
, Abdessamad Imine
:
Towards an Effective Attribute-Based Access Control Model for Neo4j. 352-366 - Alaa M. Odeh, Amjad Rattrout
, Rashid Jayousi:
GRU-Based Forecasting Model for Energy Production and Consumption: Leveraging Random Forest Feature Importance. 367-380 - Arwa Ahmed
, Ahmed Tamer Salah
, Ghada Khoriba
, Tamer Arafa
:
Localizing Non-functional Code Bugs in User Interfaces Using Deep Learning Techniques. 381-394
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.