← Back to papers

Paper deep dive

Scalable Human Oversight for Aligned Large Language Models: A Hybrid Framework for Intent Fidelity

Folasade Y. Ayankoya, Shade O. Kuyoro, Olubukola D. Adekola, Oluwasefunmi B. Famodimu

Year: 2025Venue: Ingenierie des Systemes d'Information (ISI), Vol. 30, No. 8Area: Scalable OversightType: EmpiricalEmbeddings: 418

Models: RoBERTa-large

Abstract

Proposes a scalable hybrid oversight (SHO) framework combining selective human feedback, proxy reward modeling, and behavioral auditing, achieving an Intent Fidelity Score of 89.3 vs 82.6 for RLHF.

Tags

ai-safety (imported, 100%)empirical (suggested, 88%)scalable-oversight (suggested, 92%)

Links

Intelligence

Status: succeeded | Model: google/gemini-3.1-flash-lite-preview | Prompt: intel-v1 | Confidence: 95%

Last extracted: 3/11/2026, 1:14:33 AM

Summary

This document provides a bibliographic list of 44 research articles published in the journal 'Ingénierie des Systèmes d’Information' (Vol. 29, Nos. 3-4, 2024). The articles cover a wide range of topics in computer science and engineering, including machine learning, deep learning, intrusion detection, medical image analysis, IoT, and information systems.

Entities (4)

Ingénierie des Systèmes d’Information · journal · 100%Deep Learning · technology · 98%Machine Learning · technology · 98%Internet of Things · technology · 95%

Relation Signals (2)

Ingénierie des Systèmes d’Information published Article

confidence 100% · The document lists 44 articles published in this journal.

Machine Learning appliedin Non-commercial ports

confidence 90% · The identification of typologies and levels utilization of non-commercial ports in Indonesia using the machine learning method

Cypher Suggestions (2)

Find all articles published in a specific journal volume. · confidence 90% · unvalidated

MATCH (a:Article)-[:PUBLISHED_IN]->(j:Journal {name: 'Ingénierie des Systèmes d’Information'}) WHERE a.volume = '29' RETURN a

Find technologies associated with specific research domains. · confidence 85% · unvalidated

MATCH (t:Technology)-[:APPLIED_IN]->(d:Domain) RETURN t.name, d.name

Full Text

417,277 characters extracted from source content.

Expand or collapse full text

No.Co-authors Article title KeywordsVol., No., p.DOICitation 1Berbiche, N., El Alami, J. For Robust DDoS Attack Detection by IDS: Smart Feature Selection and Data Imbalance Management Strategies anomaly based intrusion detection systems, features selection, correlation matrix, mutual information, oversampling techniques, SMOTE, BorderlineSMOTE, ADASYN 29, 4, 1227-1259 https://doi.org/10.18280/isi.290401 Berbiche, N., El Alami, J. (2024). For robust DDoS attack detection by IDS: Smart feature selection and data imbalance management strategies. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1227-1259. https://doi.org/10.18280/isi.290401 2 Hadji, A., Kholladi, M.K., Borisova, N. Enhancing Spatial Information Extraction from Arabic Text: A Hybrid Approach with Ontology and Rule- Based automatic information extraction, spatial ontology, jape rules, spatial information, Arabic NLP 29, 4, 1261-1273https://doi.org/10.18280/isi.290402 Hadji, A., Kholladi, M.K., Borisova, N. (2024). Enhancing spatial information extraction from Arabic text: A hybrid approach with ontology and rule-based. Ingénierie des Systè mes d’Information, Vol. 29, No. 4, p. 1261-1273. https://doi.org/10.18280/isi.290402 3 Puspitasari, D., Aprian, A.J., Sikumbang, E.D., Ramanda, K., Sukmana, S.H., Azizah, Q.N. Heart Disease: Application of the K- Nearest Neighbor (KNN) Method clustering, heart disease, blood sugar, K- Nearest Neighbor 29, 4, 1275-1281https://doi.org/10.18280/isi.290403 Puspitasari, D., Aprian, A.J., Sikumbang, E.D., Ramanda, K., Sukmana, S.H., Azizah, Q.N. (2024). Heart disease: Application of the K-Nearest Neighbor (KNN) method. Ingé nierie des Systèmes d’Information, Vol. 29, No. 4, p. 1275- 1281. https://doi.org/10.18280/isi.290403 4 Maulana, A., Subyantoro, S., Yuniawan, T., Pristiwati, R. Development of Electronic Media Assisted Language Learning Modules with Cultural Literacy electronic module, kvisoft flipbook maker, hikayat, cultural literacy 29, 4, 1283-1295https://doi.org/10.18280/isi.290404 Maulana, A., Subyantoro, S., Yuniawan, T., Pristiwati, R. (2004). Development of electronic media assisted language learning modules with cultural literacy. Ingénierie des Systè mes d’Information, Vol. 29, No. 4, p. 1283-1295. https://doi.org/10.18280/isi.290404 5 Guellil, Z., Mahammed, N., Keskes, N. Distributed K-means Clustering Using Topological Relationships data mining, clustering, distributed k- means algorithm, number of groups, topological relations 29, 4, 1297-1304 https://doi.org/10.18280/isi.290405 Guellil, Z., Mahammed, N., Keskes, N. (2024). Distributed k- means clustering using topological relationships. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1297-1304. https://doi.org/10.18280/isi.290405 6 Mohammed, L.A.K., Hasan, A.M., Hamza, E.K. Pruning and Validation Techniques Enhanced Genetic Algorithm for Energy Efficiency in Wireless Sensor Networks internet of things, wireless sensor networks, genetic algorithm variable chromosome length energy consumption 29, 4, 1305-1314https://doi.org/10.18280/isi.290406 Mohammed, L.A.K., Hasan, A.M., Hamza, E.K. (2024). Pruning and validation techniques enhanced genetic algorithm for energy efficiency in wireless sensor networks. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1305-1314. https://doi.org/10.18280/isi.290406 7 Rather, K.U.I., Tarray, T.A., Adesina, O.S., Adedotun, A.F., Akingbade, T.J., Odekina, O.G. An Efficient Poisson-Distributed Adaptive Cluster Sampling Model Using Randomized Response Strategy randomized response technique, cluster sampling, dichotomous population, sensitive attribute, estimation of proportion, poisson distribution 29, 4, 1315-1321https://doi.org/10.18280/isi.290407 Rather, K.U.I., Tarray, T.A., Adesina, O.S., Adedotun, A.F., Akingbade, T.J., Odekina, O.G. (2024). An efficient poisson- distributed adaptive cluster sampling model using randomized response strategy. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1315-1321. https://doi.org/10.18280/isi.290407 8 Subhiyakto, E.R., Rakasiwi, S., Zeniarja, J., Paramita, C., Shidik, G.F., Hasibuan, Z.A., Kesić, M.G. Evaluation of Resampling Techniques in CNN-Based Heartbeat Classification electrocardiogram (ECG), classification, PTB dataset, CNN, transformer, LSTM, SMOTE 29, 4, 1323-1332 https://doi.org/10.18280/isi.290408 Subhiyakto, E.R., Rakasiwi, S., Zeniarja, J., Paramita, C., Shidik, G.F., Hasibuan, Z.A., Kesić, M.G. (2024). Evaluation of resampling techniques in CNN-based heartbeat classification. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1323-1332. https://doi.org/10.18280/isi.290408 9 Tripathi, A., Choudhury, T., Sharma, H.K. EEG Based Emotion Detection by Using Modified Tunicate Swarm Optimization Algorithm emotion recognition, empirical mode decomposition, long short-term memory network, rat swarm optimization algorithm, variational mode decomposition 29, 4, 1333-1342 https://doi.org/10.18280/isi.290409 Tripathi, A., Choudhury, T., Sharma, H.K. (2024). EEG based emotion detection by using modified tunicate swarm optimization algorithm. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1333-1342. https://doi.org/10.18280/isi.290409 10 Mustar, M.Y., Hartanto, R., Santosa, P.I. Exploring Attentive User Interface Input via Raspberry Pi, Based on Face Landmark Detection, Eye Open-Closed Detection and Head Movements Detection AUI, Raspberry Pi, face landmark detection, eye open-closed detection, head movements detection 29, 4, 1343-1355https://doi.org/10.18280/isi.290410 Mustar, M.Y., Hartanto, R., Santosa, P.I. (2024). Exploring attentive user interface input via Raspberry Pi, based on face landmark detection, eye open-closed detection and head movements detection. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1343-1355. https://doi.org/10.18280/isi.290410 11 Omar, H.K., Frikha, M., Jumaa, A.K. PyTorch and TensorFlow Performance Evaluation in Big Data Recommendation System big data, deep learning, NLP, PyTorch, recommendation system, TensorFlow, text mining 29, 4, 1357-1364https://doi.org/10.18280/isi.290411 Omar, H.K., Frikha, M., Jumaa, A.K. (2024). PyTorch and TensorFlow performance evaluation in big data recommendation system. Ingénierie des Systèmes d’ Information, Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1357-1364. https://doi.org/10.18280/isi.290411 12 Setiadi, H., Sanjaya, K., Wijayanto, A., Wardhani, D.W., Cahyono, H.D. Comparative Analysis of Classification Algorithms Using Feature Selection Techniques to Predict On-Time Student Graduation educational data mining, classification, feature selection, on-time graduation prediction 29, 4, 1365-1379https://doi.org/10.18280/isi.290412 Setiadi, H., Sanjaya, K., Wijayanto, A., Wardhani, D.W., Cahyono, H.D. (2024). Comparative analysis of classification algorithms using feature selection techniques to predict on-time student graduation. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1365-1379. https://doi.org/10.18280/isi.290412 13 Hardianto, A., Marimin, Adrianto, L., Fahmi, I. The Identification of Typologies and Levels Utilization of Non-Commercial Ports in Indonesia Using the Machine Learning Method machine learning, non-commercial port, typology, utilization 29, 4, 1381-1395https://doi.org/10.18280/isi.290413 Hardianto, A., Marimin, Adrianto, L., Fahmi, I. (2024). The identification of typologies and levels utilization of non- commercial ports in Indonesia using the machine learning method. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1381-1395. https://doi.org/10.18280/isi.290413 14 Sihabuddin, A., Rokhman, N., Wahyudi, E.E. A Machine Learning Approach on Outlier Removal for Decision Tree Regression Method outlier removal, Isolation Forest, decision tree regression, supervised learning, machine learning 29, 4, 1397-1403https://doi.org/10.18280/isi.290414 Sihabuddin, A., Rokhman, N., Wahyudi, E.E. (2024). A machine learning approach on outlier removal for decision tree regression method. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1397-1403. https://doi.org/10.18280/isi.290414 15Bindal, M., Kamat, V. Diverse Bases for Functional Spaces for Non-Rigid Shape Correspondence non-rigid deformations, functional maps, basis functions, point-to-point correspondences 29, 4, 1405-1422https://doi.org/10.18280/isi.290415 Bindal, M., Kamat, V. (2024). Diverse bases for functional spaces for non-rigid shape correspondence. Ingénierie des Syst èmes d’Information, Vol. 29, No. 4, p. 1405-1422. https://doi.org/10.18280/isi.290415 16Saeed, Z., Abbas, A.S. Evaluating Software Quality Metrics for Enhanced Software Management and Engineering software quality metrics, standard metrics, quality metrics 29, 4, 1423-1440https://doi.org/10.18280/isi.290416 Saeed, Z., Abbas, A.S. (2024). Evaluating software quality metrics for enhanced software management and engineering. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1423-1440. https://doi.org/10.18280/isi.290416 17 Maitanmi, O.S., Ogunyolu, O.A., Kuyoro, A.O. Evaluation of Financial Credit Risk Management Models Based on Gradient Descent and Meta-Heuristic Algorithms credit risk, deep learning, feature selection, gradient descent, multilayer perceptron, loan prediction, random forest 29, 4, 1441-1452https://doi.org/10.18280/isi.290417 Maitanmi, O.S., Ogunyolu, O.A., Kuyoro, A.O. (2024). Evaluation of financial credit risk management models based on gradient descent and meta-heuristic algorithms. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1441-1452. https://doi.org/10.18280/isi.290417 18 Setiadi, D., Sumitra, T., Karim, A., Ritzkal. Software Quality Measurement Analysis on Academic Information Systems software measurement, software quality, software metrics, software indicators, academic information system, quality management 29, 4, 1453-1460https://doi.org/10.18280/isi.290418 Setiadi, D., Sumitra, T., Karim, A., Ritzkal. (2024). Software quality measurement analysis on academic information systems. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1453-1460. https://doi.org/10.18280/isi.290418 19 Meqdad, M.N., Al-Qudsy, Z.N., Kadry, S., Haleem, A.S. Using Neural Networks to Forecast the Configuration of Proteins protein configuration, detection of the second type of protein, neural networks, pattern recognition 29, 4, 1461-1468 https://doi.org/10.18280/isi.290419 Meqdad, M.N., Al-Qudsy, Z.N., Kadry, S., Haleem, A.S. (2024). Using neural networks to forecast the configuration of proteins. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1461-1468. https://doi.org/10.18280/isi.290419 20 Iskandar, A., Retnawati, H., Haryanto, Sahariani. Design of a Web-Based Information System for New Student Registration in Vocational High Schools information system design, new student admissions, academic information systems 29, 4, 1469-1481https://doi.org/10.18280/isi.290420 Iskandar, A., Retnawati, H., Haryanto, Sahariani. (2024). Design of a web-based information system for new student registration in vocational high schools. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1469-1481. https://doi.org/10.18280/isi.290420 21 Kusnandar, T., Santoso, J., Surendro, K. Enhancing Color Selection in HSV Color Space color constancy, color selection, heavy sidestep function, HSV color space 29, 4, 1483-1491 https://doi.org/10.18280/isi.290421 Kusnandar, T., Santoso, J., Surendro, K. (2024). Enhancing color selection in HSV color space. Ingénierie des Systèmes d’ Information, Vol. 29, No. 4, p. 1483-1491. https://doi.org/10.18280/isi.290421 22Ghindawi, E.W. Advanced Computer Vision Alignment Technique Using Preprocessing Filters and Deep Learning CNN, image alignment, supervised learning, deep learning (DL), image denoising 29, 4, 1493-1499 https://doi.org/10.18280/isi.290422 Ghindawi, E.W. (2024). Advanced computer vision alignment technique using preprocessing filters and deep learning. Ingé nierie des Systèmes d’Information, Vol. 29, No. 4, p. 1493- 1499. https://doi.org/10.18280/isi.290422 23 Mohammad, M.T., Alhafidh, B.M.H., Hagem, R.M. Low-Cost Smart Insulin Box: A Portable and Interactive System for Enhanced Diabetes Management diabetes management, embedded system, healthcare monitoring, IoT, low-cost insulin system, reminder, real time system, smart insulin box, wireless communication 29, 4, 1501-1508https://doi.org/10.18280/isi.290423 Mohammad, M.T., Alhafidh, B.M.H., Hagem, R.M. (2024). Low-cost smart insulin box: A portable and interactive system for enhanced diabetes management. Ingénierie des Systèmes d’ Information, Vol. 29, No. 4, p. 1501-1508. https://doi.org/10.18280/isi.290423 24 Baaziz, M.L., Aliouat, Z., Aliouat, M. Efficient Energy-Aware Clustering Approach Area Splitting-Based for Wireless Sensor Networks WSN, energy conservation leach, Mod- leach, vleach 29, 4, 1509-1518 https://doi.org/10.18280/isi.290424 Baaziz, M.L., Aliouat, Z., Aliouat, M. (2024). Efficient energy- aware clustering approach area splitting-based for wireless sensor networks. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1509-1518. https://doi.org/10.18280/isi.290424 25 Abdullahi, M.O., Mohamud, I.H., Mohamud, F.A.S., Ali, A.F. Analyzing Bibliometric Trends in the Social Internet of Things: A Review and Future Perspectives internet of things, social internet of things, bibliometric analysis, research trends 29, 4, 1519-1527https://doi.org/10.18280/isi.290425 Abdullahi, M.O., Mohamud, I.H., Mohamud, F.A.S., Ali, A.F. (2024). Analyzing bibliometric trends in the social internet of things: A review and future perspectives. Ingénierie des Systè mes d’Information, Vol. 29, No. 4, p. 1519-1527. https://doi.org/10.18280/isi.290425 26Hasan, S.N. Accurate Deep Learning Algorithms for Skin Lesion Classification skin lesion, dermoscopy images, deep learning, convolutional neural network, transfer learning, DenseNet201, ResNet52V2, HAM10000 dataset 29, 4, 1529-1539https://doi.org/10.18280/isi.290426 Hasan, S.N. (2024). Accurate deep learning algorithms for skin lesion classification. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1529-1539. https://doi.org/10.18280/isi.290426 27 Swathi Mirthika, G.L., Sivakumar, B. Bridging Data Complexity with GATNet for Learning in Interconnected Electronic Medical Records Graphs electronic medical record, graph database, heterogeneous graph, knowledge graph, link prediction 29, 4, 1541-1548https://doi.org/10.18280/isi.290427 Swathi Mirthika, G.L., Sivakumar, B. (2024). Bridging data complexity with GATNet for learning in interconnected electronic medical records graphs. Ingénierie des Systèmes d’ Information, Vol. 29, No. 4, p. 1541-1548. https://doi.org/10.18280/isi.290427 28Nagle, M., Kumar, P. M-GWO Algorithm to Predict Risk of Silent Heart Attack of Diabetes Patients - Cardidiabetes Model cardiodibet framework, grey wolf optimization, GEETN, diabetes, cardiac arrest, stack model, continued-value based attributes, cholesterol 29, 4, 1549-1559https://doi.org/10.18280/isi.290428 Nagle, M., Kumar, P. (2024). M-GWO algorithm to predict risk of silent heart attack of diabetes patients - Cardidiabetes model. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1549-1559. https://doi.org/10.18280/isi.290428 29 Prakosa, B.A., Afrianto, Y., Agustiyan, S., Setiadi, I.H. Evaluating Bandwidth Management Techniques on Mikrotik Routers: A Multiple Linear Regression Approach bandwidth management, Per Connection Queue (PCQ), Random Early Detection (RED), First In First Out (FIFO), prediction, linear regression, Simple Network Management Protocol (SNMP), cacti, Mikrotik 29, 4, 1561-1572https://doi.org/10.18280/isi.290429 Prakosa, B.A., Afrianto, Y., Agustiyan, S., Setiadi, I.H. (2024). Evaluating bandwidth management techniques on Mikrotik routers: A multiple linear regression approach. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1561-1572. https://doi.org/10.18280/isi.290429 30 Hrich, N., Azekri, M., Khaldi, M. Application of LSTM for Redundancy Detection in MCTS: Enhancing Test Precision deep learning, Long Short-Term Memory (LSTM), Natural Language Processing (NLP), Multiple Choice Tests (MCTs), redundancy, items, distractors 29, 4, 1573-1579https://doi.org/10.18280/isi.290430 Hrich, N., Azekri, M., Khaldi, M. (2024). Application of LSTM for redundancy detection in MCTS: Enhancing test precision. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1573-1579. https://doi.org/10.18280/isi.290430 31 Riyadi, S., Abidin, F.A., Damarjati, C. Optimizing Coronary Artery Disease Detection Using a New Triple Concatenated Convolution Neural Network coronary artery disease, transfer learning, Convolution Neural Network (CNN), Concatenation Model, image classification 29, 4, 1581-1589https://doi.org/10.18280/isi.290431 Riyadi, S., Abidin, F.A., Damarjati, C. (2024). Optimizing coronary artery disease detection using a new triple concatenated Convolution Neural Network. Ingénierie des Syst èmes d’Information, Vol. 29, No. 4, p. 1581-1589. https://doi.org/10.18280/isi.290431 32Mokkapati, R., Dasari, V.L. Dynamic Malware Pattern Analysis with Rapid Node Behaviour Analysis Using Self Replication Model for Network Intrusion Detection intrusion detection, dynamic malware analysis, node behaviour, normal patterns, unusual patterns, network security 29, 4, 1591-1601https://doi.org/10.18280/isi.290432 Mokkapati, R., Dasari, V.L. (2024). Dynamic malware pattern analysis with rapid node behaviour analysis using self replication model for network intrusion detection. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1591-1601. https://doi.org/10.18280/isi.290432 33 Aniq, E., Chakraoui, M., Mouhni, N. Innovative: A Novel Deep Learning- Based Semantic Segmentation Architecture for Medical Applications medical applications, deep learning, semantic segmentation, encoder-decoder, atrous convolutions 29, 4, 1603-1609https://doi.org/10.18280/isi.290433 Aniq, E., Chakraoui, M., Mouhni, N. (2024). Innovative: A novel deep learning-based semantic segmentation architecture for medical applications. Ingénierie des Systèmes d’ Information, Vol. 29, No. 4, p. 1603-1609. https://doi.org/10.18280/isi.290433 34 Alwan, E.H., Al-Qurabat, A.K.M. Candidate Best Optimizations Sequences for Code Size Reduction code size reduction, optimization sequence, LLVM 29, 4, 1611-1617 https://doi.org/10.18280/isi.290434 Alwan, E.H., Al-Qurabat, A.K.M. (2024). Candidate best optimizations sequences for code size reduction. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1611-1617. https://doi.org/10.18280/isi.290434 35 Stephan, J.J., Mohammed, M.Q. Using Hybrid Deep Learning Approach to Enhanced Network Intrusion Detection with Spatial-Temporal Feature Integration Intrusion Detection Systems (IDS), Difficult-Set-Sampling-Technique (DSST), Deep-Convolutional-Generative- Adversarial-Networks (DCGAN), EESNN, Telecommunications Network Internet of Things (ToN-IoT), CICIDS2019, SAT-Net 29, 4, 1619-1628https://doi.org/10.18280/isi.290435 Stephan, J.J., Mohammed, M.Q. (2024). Using hybrid deep learning approach to enhanced network intrusion detection with spatial-temporal feature integration. Ingénierie des Systèmes d’ Information, Vol. 29, No. 4, p. 1619-1628. https://doi.org/10.18280/isi.290435 36Ige, O.P., Gan, K.H. Enhanced Artificial Bee Colony Algorithm with Pretrained Model Functional Weight and Modified Selection Strategy for Text Classification metaheuristic algorithm, functional weight, selection strategy, pretrained model, text classification 29, 4, 1629-1638 https://doi.org/10.18280/isi.290436 Ige, O.P., Gan, K.H. (2024). Enhanced artificial bee colony algorithm with pretrained model functional weight and modified selection strategy for text classification. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1629-1638. https://doi.org/10.18280/isi.290436 37Alfraheed, M. 3D Synthetic View for X-Ray Breast Cancer Mammogram Images x-ray mammography images, digital breast tomosynthesis, synthetization view, supervised learning technique, breast cancer 29, 4, 1639-1652 https://doi.org/10.18280/isi.290437 Alfraheed, M. (2024). 3D synthetic view for x-ray breast cancer mammogram images. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1639-1652. https://doi.org/10.18280/isi.290437 38 Putra, Y.H., Triwibowo, B.A., Delenia, E., Croix, N.J.D.L., Ahmad, T. Sensitivity of a Convolutional Neural Network for Different Pooling Layers in Spatial Domain Steganalysis CNN, information security, national security, pooling layer, spatial domain images, steganalysis 29, 4, 1653-1665https://doi.org/10.18280/isi.290438 Putra, Y.H., Triwibowo, B.A., Delenia, E., Croix, N.J.D.L., Ahmad, T. (2024). Sensitivity of a Convolutional Neural Network for different pooling layers in spatial domain steganalysis. Ingénierie des Systèmes d’Information, Vol. 29, No. 4, p. 1653-1665. https://doi.org/10.18280/isi.290438 39 Al-Najjar, A.N., Rasid, M.F.A., Hashim, F., Ahmad, F.A., Jamalipour, A. A Systematic Literature Review in Distributed Resource Allocation for C- V2X distributed resource allocation, long-term evolution-V2X, new radio-V2X, cellular vehicle to everything, machine learning, congestion control 29, 3, 771-808 https://doi.org/10.18280/isi.290301 Al-Najjar, A.N., Rasid, M.F.A., Hashim, F., Ahmad, F.A., Jamalipour, A. (2024). A systematic literature review in distributed resource allocation for C-V2X. Ingénierie des Systè mes d’Information, Vol. 29, No. 3, p. 771-808. https://doi.org/10.18280/isi.290301 40 Okokpujie, K., Okokpujie, I.P., Abioye, F.A., Subair, R.E., Vincent, A.A. Facial Anthropometry-Based Masked Face Recognition System masked face recognition, unmasked face recognition, facial Anthropometry, COVID- 19, facemask, facial landmarks, Local Binary Pattern Histogram, biometric, craniofacial plexus, face size, facial index, intercanthal index, orbital width index, nasal index 29, 3, 809-820https://doi.org/10.18280/isi.290302 Okokpujie, K., Okokpujie, I.P., Abioye, F.A., Subair, R.E., Vincent, A.A. (2024). Facial anthropometry-based masked face recognition system. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 809-820. https://doi.org/10.18280/isi.290302 41 Bousmaha, K.Z., Hamadouche, K., Cheurfaoui, N., Hadrich- Belguith, L. Subject Detection of Algerian Posts for Opinion Analysis subject detection, opinion analysis, marketing, multi-class, Algerian dialect, TF-IDF, deep learning, keyword extraction 29, 3, 821-829https://doi.org/10.18280/isi.290303 Bousmaha, K.Z., Hamadouche, K., Cheurfaoui, N., Hadrich- Belguith, L. (2024). Subject detection of Algerian posts for opinion analysis. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 821-829. https://doi.org/10.18280/isi.290303 42Kozhirbayev, Z. Enhancing Neural Machine Translation with Fine-Tuned mBART50 Pre- Trained Model: An Examination with Low-Resource Translation Pairs neural machine translation, pre-trained models, fine-tuning, denoising auto- encoder, low-resource languages, Kazakh- Russian, Russian-Tatar 29, 3, 831-838https://doi.org/10.18280/isi.290304 Kozhirbayev, Z. (2024). Enhancing neural machine translation with fine-tuned mBART50 Pre-Trained model: An examination with low-resource translation pairs. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 831-838. https://doi.org/10.18280/isi.290304 43 Durga, P., Deepthi Godavarthi, D. ERS – GARNET: An Ensemble Recommendation System for Sentiment Analysis Using Gated Attention-Based Recurrent Networks Ensemble Recommendation System (ERS), sentiment analysis, DistilBERT, deep learning 29, 3, 839-852https://doi.org/10.18280/isi.290305 Durga, P., Deepthi Godavarthi, D. (2024). ERS – GARNET: An ensemble recommendation system for sentiment analysis using gated attention-based recurrent networks. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 839-852. https://doi.org/10.18280/isi.290305 44 Hamiane, S., Ghanou, Y., Khalifi, H., Telmem, M. Comparative Analysis of LSTM, ARIMA, and Hybrid Models for Forecasting Future GDP Long Short-Term Memory (LSTM), economic and financial time series data, gross domestique product, GDP, Autoregressive Integrated Moving Average (ARIMA), hybrid models, He initialization 29, 3, 853-861https://doi.org/10.18280/isi.290306 Hamiane, S., Ghanou, Y., Khalifi, H., Telmem, M. (2024). Comparative analysis of LSTM, ARIMA, and hybrid models for forecasting future GDP. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 853-861. https://doi.org/10.18280/isi.290306 45 Ibraheem, M.K.I., Dvorkovich, A.V., Al-khafaji, I.M.A. A Comprehensive Literature Review on Image and Video Compression: Trends, Algorithms, and Techniques image compression, video compression, transform coding, predictive coding, entropy coding, machine learning, deep learning 29, 3, 863-876https://doi.org/10.18280/isi.290307 Ibraheem, M.K.I., Dvorkovich, A.V., Al-khafaji, I.M.A. (2024). A comprehensive literature review on image and video compression: Trends, algorithms, and techniques. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 863-876. https://doi.org/10.18280/isi.290307 46 Patrcia, A.C.M., Bernard, S.K., Lagasane, K. Correlation Between Big Data and Cloud in the Transactions Environment big data, cloud computing, security, machine learning (ML), Parameterized Correlation Approach (PCA), transactions environment 29, 3, 877-883https://doi.org/10.18280/isi.290308 Patrcia, A.C.M., Bernard, S.K., Lagasane, K. (2024). Correlation between big data and cloud in the transactions environment. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 877-883. https://doi.org/10.18280/isi.290308 47 Izang, A.A., Ajayi, O.F., Junaid, O., Nwigwe, B., Onyeka, P.O. Design and Evaluation of a Peer-to-Peer Student Lending Platform to Mitigate Information Asymmetry and Credit Risk peer-to-peer lending, student loan, information asymmetry, credit risk, loan performance, P2P framework, software development, educational finance 29, 3, 885-894https://doi.org/10.18280/isi.290309 Izang, A.A., Ajayi, O.F., Junaid, O., Nwigwe, B., Onyeka, P.O. (2024). Design and evaluation of a peer-to-peer student lending platform to mitigate information asymmetry and credit risk. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 885-894. https://doi.org/10.18280/isi.290309 48 Muslih, M., Maulana, M.R., Arianti, N.D. Development of a Web-Based Job and Career Compatibility System Using the Federal Enterprise Architecture Framework Method: A Case Study in Nusa Putra University Federal Enterprise Architecture Framework (FEAF), employment, profession, university, students 29, 3, 895-908https://doi.org/10.18280/isi.290310 Muslih, M., Maulana, M.R., Arianti, N.D. (2024). Development of a web-based job and career compatibility system using the federal enterprise architecture framework method: A case study in Nusa Putra University. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 895-908. https://doi.org/10.18280/isi.290310 49 Kundaikar, T., Fadte, S., Karmali, R., Wagh, R., Pawar, J.D. Modi Document Transcription to Devanagari Modi, Devanagari, Long Short-Term Memory (LSTM), Optical Character Recognition (OCR), transcription, dataset, script 29, 3, 909-915 https://doi.org/10.18280/isi.290311 Kundaikar, T., Fadte, S., Karmali, R., Wagh, R., Pawar, J.D. (2024). Modi document transcription to Devanagari. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 909-915. https://doi.org/10.18280/isi.290311 50 Obeidat, M.A., Abdallah, J., Hamadneh, T., Qawaqneh, H., Mansour, A.M. Enhancing Agricultural Operations Through AI-Driven Agent Communication in Smart Farming Systems Multi-Agent System, Internet of Things (IoT), farming systems, JADE 29, 3, 917-928https://doi.org/10.18280/isi.290312 Obeidat, M.A., Abdallah, J., Hamadneh, T., Qawaqneh, H., Mansour, A.M. (2024). Enhancing agricultural operations through AI-driven agent communication in smart farming systems. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 917-928. https://doi.org/10.18280/isi.290312 51 Safe’i, R., Andrian, R., Sriatna, D.A., Tarigan, F.R. Classification of Density and Transparency of Needle Leaves Types Using AlexNet and VGG16 Architecture AlexNet, CNN, deep learning, needle leaves, forest, VGG16 29, 3, 929-939 https://doi.org/10.18280/isi.290313 Safe’i, R., Andrian, R., Sriatna, D.A., Tarigan, F.R. (2024). Classification of density and transparency of needle leaves types using AlexNet and VGG16 architecture. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 929-939. https://doi.org/10.18280/isi.290313 52Gandhi, A., Gani, P.H. Would Lecturers Use AI-Based Software to Write Scientific Article? A Quantitative Approach in Indonesia software adoption, artificial intelligence, AI-based software, lecturer, factors identification 29, 3, 941-950 https://doi.org/10.18280/isi.290314 Gandhi, A., Gani, P.H. (2024). Would lecturers use AI-based software to write scientific article? A quantitative approach in Indonesia. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 941-950. https://doi.org/10.18280/isi.290314 53Mande, S., Ramachandran, N. A Comprehensive Survey on Challenges and Issues in V2X and V2V Communication in 6G Future Generation Communication Models vehicular ad hoc networks, vehicle to vehicle, vehicle to everything, collective perception, information and communication technologies, road side units, data transmission 29, 3, 951-960https://doi.org/10.18280/isi.290315 Mande, S., Ramachandran, N. (2024). A comprehensive survey on challenges and issues in V2X and V2V communication in 6G future generation communication models. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 951-960. https://doi.org/10.18280/isi.290315 54 Nizamuddin, M.K., Mohammad, A.A.K., Hashmi, S.S., HariKrishna, D., Anusha, M. Efficient Routing in MANETs by Optimizing Packet Loss MANET, routing, buffer overflow, packet loss mitigation, intermediary node selection, network reliability, and congestion control 29, 3, 961-968 https://doi.org/10.18280/isi.290316 Nizamuddin, M.K., Mohammad, A.A.K., Hashmi, S.S., HariKrishna, D., Anusha, M. (2024). Efficient routing in MANETs by optimizing packet loss. Ingénierie des Systèmes d ’Information, Vol. 29, No. 3, p. 961-968. https://doi.org/10.18280/isi.290316 55 Farchi, C., Farchi, F., Touzi, B., Mousrij, A. Sustainable Multidimensional Performance Prediction by ANN-Based Supervised Machine Learning machine learning, ANN, logistics, performance measurement system, road freight transport, supply chain sustainability 29, 3, 969-985https://doi.org/10.18280/isi.290317 Farchi, C., Farchi, F., Touzi, B., Mousrij, A. (2024). Sustainable multidimensional performance prediction by ANN- based supervised machine learning. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 969-985. https://doi.org/10.18280/isi.290317 56 Thakur, P., Kumar, A., Nandan, D., Singh, G. Spectrum Monitoring Techniques for Spectrum Mobility in Connected Environments: A Technical Review cognitive radio, connected environments, dynamic spectrum access, spectrum sensing, spectrum monitoring, spectrum prediction, spectrum mobility 29, 3, 987-1003https://doi.org/10.18280/isi.290318 Thakur, P., Kumar, A., Nandan, D., Singh, G. (2024). Spectrum monitoring techniques for spectrum mobility in connected environments: A technical review. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 987-1003. https://doi.org/10.18280/isi.290318 57 Ritzkal, Prakosa, B.A., Aprian, A.J., Al Ikhsan, S.H., Muljono, Zaky, U. Development and Implementation of an RFID-Enabled Automatic Rice Vending System Using Arduino Mega 2560 RFID, technology, Arduino Mega 2560, rice, prototype, autometed vending, point of sale 29, 3, 1005-1014https://doi.org/10.18280/isi.290319 Ritzkal, Prakosa, B.A., Aprian, A.J., Al Ikhsan, S.H., Muljono, Zaky, U. (2024). Development and implementation of an RFID-enabled automatic rice vending system using Arduino Mega 2560. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1005-1014. https://doi.org/10.18280/isi.290319 58 Subbarayudu, Y., Sureshbabu, A. Cluster Visualized Topic Modeling Paradigms for Recognition of Health- Related Topics Through a Machine Learning blockchain technology, machine learning, ledger, consensus, topic modeling, healthcare, decentralized platform, and sentiment analysis 29, 3, 1015-1030https://doi.org/10.18280/isi.290320 Subbarayudu, Y., Sureshbabu, A. (2024). Cluster visualized topic modeling paradigms for recognition of health-related topics through a machine learning. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 1015-1030. https://doi.org/10.18280/isi.290320 59 Dasari, K., Mekala, S., Kaka, J.R. Evaluation of UDP-Based DDoS Attack Detection by Neural Network Classifier with Convex Optimization and Activation Functions Distributed Denial of Service (DDoS) attacks, machine learning, neural network classifier, multilayer perceptron, correlation methods, convex optimization methods, activation functions 29, 3, 1031-1042https://doi.org/10.18280/isi.290321 Dasari, K., Mekala, S., Kaka, J.R. (2024). Evaluation of UDP- based DDoS attack detection by neural network classifier with convex optimization and activation functions. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1031-1042. https://doi.org/10.18280/isi.290321 60Abdullah, A.A., Hussein, S.A. Detection and Mitigation Distribution Denial of Service Attack Based on Blockchain Concept Distributed Denial of Service (DDoS) attacks, TCP-based attacks, attack detection, blockchain technology, smart contracts 29, 3, 1043-1049https://doi.org/10.18280/isi.290322 Abdullah, A.A., Hussein, S.A. (2024). Detection and mitigation distribution denial of service attack based on blockchain concept. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1043-1049. https://doi.org/10.18280/isi.290322 61 Prasetyaningrum, P.T., Purwanto, P., Rochim, A.F. Analyzing Customer Engagement with Gamification Approach in the Banking Sector Using the Rasch Model customer engagement, gamification, mobile banking applications, Rasch models, analysis instruments 29, 3, 1051-1064https://doi.org/10.18280/isi.290323 Prasetyaningrum, P.T., Purwanto, P., Rochim, A.F. (2024). Analyzing customer engagement with gamification approach in the banking sector using the Rasch model. Ingénierie des Systè mes d’Information, Vol. 29, No. 3, p. 1051-1064. https://doi.org/10.18280/isi.290323 62 Salman, E.A., Abdoon, R.S., George, L.E. Hybrid Clustering-Based Technique to Isolate Tumors in PET/CT Images clustering, hybrid, tumors, PET/CT, K- means, FCM 29, 3, 1065-1073https://doi.org/10.18280/isi.290324 Salman, E.A., Abdoon, R.S., George, L.E. (2024). Hybrid clustering-based technique to isolate tumors in PET/CT images. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1065-1073. https://doi.org/10.18280/isi.290324 63 Abdulkadhim, A.A.A., Mahmood, A.S., Ghanim, M.R. Block of Data Encryption Using the Modified XTEA Algorithm data encryption, XTEA algorithm, rossler system 29, 3, 1075-1083https://doi.org/10.18280/isi.290325 Abdulkadhim, A.A.A., Mahmood, A.S., Ghanim, M.R. (2024). Block of data encryption using the modified XTEA algorithm. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1075-1083. https://doi.org/10.18280/isi.290325 64 Mohammed, Y., Manoharan, A., Kappagantula, S., Manoharan, H. Optimizing Electric Vehicle Charging Costs Using Machine Learning Electric Vehicles, charging strategies, always charge model, dynamic programming, threshold-based rule, Q learning 29, 3, 1085-1095 https://doi.org/10.18280/isi.290326 Mohammed, Y., Manoharan, A., Kappagantula, S., Manoharan, H. (2024). Optimizing electric vehicle charging costs using machine learning. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 1085-1095. https://doi.org/10.18280/isi.290326 65 Nakka, R., Lakshmi, T.S., Priyanka, D., Sai, N.R., Praveen, S.P., Sirisha, U. LAMBDA: Lexicon and Aspect-Based Multimodal Data Analysis of Tweet aspect based sentiment analysis, multimodal sentiment analysis, lexicon approach, twitter data, natural language models, fusion methods 29, 3, 1097-1106https://doi.org/10.18280/isi.290327 Nakka, R., Lakshmi, T.S., Priyanka, D., Sai, N.R., Praveen, S.P., Sirisha, U. (2024). LAMBDA: Lexicon and aspect-based multimodal data analysis of tweet. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 1097-1106. https://doi.org/10.18280/isi.290327 66 Fitriansyah, A., Alfirman, Nugroho, R.A., Meitarice, S., Sukamto. Water Quality Monitoring and Control System for Fish Farmers Based on Internet of Things cultivation, RAD method, sensors, water quality 29, 3, 1107-1113 https://doi.org/10.18280/isi.290328 Fitriansyah, A., Alfirman, Nugroho, R.A., Meitarice, S., Sukamto. (2024). Water quality monitoring and control system for fish farmers base on Internet of Things. Ingénierie des Systè mes d’Information, Vol. 29, No. 3, p. 1107-1113. https://doi.org/10.18280/isi.290328 67 Kadhim, Q.K., Altameemi, A.I., Abdulkader, R.M., Ahmed, S.T. Enhancement of Data Center Transmission Control Protocol Performance in Network Cloud Environments cloud computing, DCTCP, data center, TCP, Random Early Detection (RED), explicit congestion notification (ECN) 29, 3, 1115-1123 https://doi.org/10.18280/isi.290329 Kadhim, Q.K., Altameemi, A.I., Abdulkader, R.M., Ahmed, S.T. (2024). Enhancement of data center Transmission Control Protocol performance in network cloud environments. Ingé nierie des Systèmes d’Information, Vol. 29, No. 3, p. 1115- 1123. https://doi.org/10.18280/isi.290329 68Kadhim, K.J., Hadi, A.S. A Review of Semantic Annotation in the Context of the Linked Open Data Cloud semantic annotation, Linked Open Data (LOD), Semantic Web, metadata, Resource Description Framework (RDF), SPARQL Protocol and RDF Query Language (SPARQL), literature review 29, 3, 1125-1139https://doi.org/10.18280/isi.290330 Kadhim, K.J., Hadi, A.S. (2024). A review of semantic annotation in the context of the Linked Open Data cloud. Ingé nierie des Systèmes d’Information, Vol. 29, No. 3, p. 1125- 1139. https://doi.org/10.18280/isi.290330 69 Risnanto, S., Mohd, O., Hassan, N.H., Sikki, N., Gunawan, Hersusetiyati. E-Voting: A Novel of Generic Conceptual Framework e-Voting, framework, success, factor, general elections 29, 3, 1141-1149 https://doi.org/10.18280/isi.290331 Risnanto, S., Mohd, O., Hassan, N.H., Sikki, N., Gunawan, Hersusetiyati. (2024). E-Voting: A novel of generic conceptual framework. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1141-1149. https://doi.org/10.18280/isi.290331 70 Singh, H., Sharma, P., Prabha, C., Meenakshi, Singh, S. Ensemble Learning with an Adversarial Hypergraph Model and a Convolutional Neural Network to Forecast Stock Price Variations adversarial hypergraph model, artificial intelligence, ensemble learning, machine learning, neural network, recurrent unit stock price forecast, time series 29, 3, 1151-1160https://doi.org/10.18280/isi.290332 Singh, H., Sharma, P., Prabha, C., Meenakshi, Singh, S. (2024). Ensemble learning with an adversarial hypergraph model and a convolutional neural network to forecast stock price variations. Ingénierie des Systèmes d’Information, Vol. 29, No. 3, p. 1151-1160. https://doi.org/10.18280/isi.290332 71Alkhafagee, K., Alsharifi, A.A. Node Clone Detection Protocols for Protect the WSNs: A Survey node clone, cloning attack detection, security attacks, Wireless Sensor Network s(WSNs), static and mobile nodes, centralized and distributed detection protocols 29, 3, 1161-1174https://doi.org/10.18280/isi.290333 Alkhafagee, K., Alsharifi, A.A. (2024). Node clone detection protocols for protect the WSNs: A survey. Ingénierie des Systè mes d’Information, Vol. 29, No. 3, p. 1161-1174. https://doi.org/10.18280/isi.290333 72Benati, N., Bahi, H. Self-Supervised Spoken Term Detection for Query by Example attention mechanism, Fully Connected Convolutional Neural Network (FC-CNN), query by example, self-supervised learning, speech search, spoken term detection 29, 3, 1175-1181https://doi.org/10.18280/isi.290334 Benati, N., Bahi, H. (2024). Self-supervised spoken term detection for query by example. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 1175-1181. https://doi.org/10.18280/isi.290334 73 H, M.R., Warni, E., Angriawan, R., Hariadi, M., Arif, Y.M., Maulina, D. Design of Flood Early Detection Based on the Internet of Things and Decision Support System flood, early warning system, Internet of Things (IoT), decision support system, TOPSIS 29, 3, 1183-1193https://doi.org/10.18280/isi.290335 H, M.R., Warni, E., Angriawan, R., Hariadi, M., Arif, Y.M., Maulina, D. (2024). Design of flood early detection based on the Internet of Things and decision support system. Ingénierie des Systèmes d’Information, Vol. 19, No. 3, p. 1183-1193. https://doi.org/10.18280/isi.290335 74 Mohammed, S.M., Al-Barrak, A., Mahmood, N.T. Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks 6G networks, ultra-low latency, high- reliability communication, MEC integration, self-driving cars, edge computing technology 29, 3, 1195-1208https://doi.org/10.18280/isi.290336 Mohammed, S.M., Al-Barrak, A., Mahmood, N.T. (2024). Enabling technologies for ultra-low latency and high-reliability communication in 6G networks. Ingénierie des Systèmes d’ Information, Vol. 29, No. 3, p. 1195-1208. https://doi.org/10.18280/isi.290336 75 Mahsup, Febriani, P.A., Syaharuddin, Mandailina, V., Abdillah, Ibrahim. Accuracy Rate of Least Square Support Vector Machine Method and Its Various Modifications: A Forecasting Evaluation on Multi-Type Data accuracy level, algorithm modifications, forecasting, the least squares method 29, 3, 1209-1218https://doi.org/10.18280/isi.290337 Mahsup, Febriani, P.A., Syaharuddin, Mandailina, V., Abdillah, Ibrahim. (2024). Accuracy rate of least square support vector machine method and its various modifications: A forecasting evaluation on multi-type data. Ingénierie des Syst èmes d’Information, Vol. 29, No. 3, p. 1209-1208. https://doi.org/10.18280/isi.290337 76 Al Hak, L.A., Ali, W.A., Saba, S.J. Facial Expression Recognition Using Data Augmentation and Transfer Learning VGG-16, FER2013, facial emotion recognition, deep leaning, FER, data augmentation 29, 3, 1219-1225https://doi.org/10.18280/isi.290338 Al Hak, L.A., Ali, W.A., Saba, S.J. (2024). Facial expression recognition using data augmentation and transfer learning. Ingé nierie des Systèmes d’Information, Vol. 29, No. 3, p. 1219- 1225. https://doi.org/10.18280/isi.290338 77Setiaji, P., Adi, K., Surarso, B. Development of Classification Method for Determining Chicken Egg Quality Using GLCM-CNN Method egg crack, classification, GLCM-CNN 29, 2, 397-407https://doi.org/10.18280/isi.290201 Setiaji, P., Adi, K., Surarso, B. (2024). Development of classification method for determining chicken egg quality using GLCM-CNN method. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 397-407. https://doi.org/10.18280/isi.290201 78Li, F., Rosli, M.M., Wang, Y.J. A Review of Image and Text Feature Extraction Methods in Fake News Detection Tasks deep learning, fake news detection, feature extraction, multi-modal, textual feature, visual feature 29, 2, 409-420https://doi.org/10.18280/isi.290202 Li, F., Rosli, M.M., Wang, Y.J. (2024). A review of image and text feature extraction methods in fake news detection tasks. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 409-420. https://doi.org/10.18280/isi.290202 79 Salama, G.M., Metwly, S.S., Shehata, E.G., Abd El-haleem, A.M. Maximizing IoT Throughput with Optimized IRS-Assisted Symbiotic Radio Internet of Things (IoT), Proximal Policy Optimization (PPO), Wi-Fi, Intelligent Reflecting Surfaces (IRS), Symbiotic Radio (SR), None Orthogonal Multiple Access (NOMA), optimization 29, 2, 421-427 https://doi.org/10.18280/isi.290203 Salama, G.M., Metwly, S.S., Shehata, E.G., Abd El-haleem, A.M. (2024). Maximizing IoT throughput with optimized IRS- assisted symbiotic radio. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 421-427. https://doi.org/10.18280/isi.290203 80 Selmi, A.T.E., Zerarka, M.F., Cheriet, A. Enhancing K-Means Clustering with Post-Redistribution K-means, enhanced K-means, post- clustering redistribution, Davies-Bouldin Index, Gini coefficient 29, 2, 429-436https://doi.org/10.18280/isi.290204 Selmi, A.T.E., Zerarka, M.F., Cheriet, A. (2024). Enhancing K-means clustering with post-redistribution. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 429-436. https://doi.org/10.18280/isi.290204 81 Jamil, M., Hadiyanto, H., Sanjaya, R. Sentiment Analysis: Classifying Public Comments on YouTube in Disaster Management Simulation in Indonesia Using Naïve Bayes and Support Vector Machine disaster, simulation, sentiment analysis, naï ve bayes, Support Vector Machine, classification, YouTube 29, 2, 437-446 https://doi.org/10.18280/isi.290205 Jamil, M., Hadiyanto, H., Sanjaya, R. (2024). Sentiment analysis: Classifying public comments on YouTube in disaster management simulation in Indonesia using Naïve Bayes and support vector machine. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 437-446. https://doi.org/10.18280/isi.290205 82 Ali, A.F., Abdullah, R.H., Hassan, A.A., Abdullahi, H.O., Mohamed, M.M. COVID-19 Pandemic Impact on E- Learning Adoption and Its Utilization at Higher Education: A Comparative Analysis of Institutions and Students' Perspectives information system, success factors, DeLone and McLean’s model, E-learning platform 29, 2, 447-457 https://doi.org/10.18280/isi.290206 Ali, A.F., Abdullah, R.H., Hassan, A.A., Abdullahi, H.O., Mohamed, M.M. (2024). COVID-19 pandemic impact on E- learning adoption and its utilization at higher education: A comparative analysis of institutions and students' perspectives. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 447-457. https://doi.org/10.18280/isi.290206 83Ma, T. Quantitative Analysis of the Impact of Cloud Computing Service Models on the Employment Structure of College Graduates cloud computing, employment structure, Spark-Improved Random Forest (Spark- IRF) algorithm, college graduates, employment predictive analysis 29, 2, 459-467https://doi.org/10.18280/isi.290207 Ma, T. (2024). Quantitative analysis of the impact of cloud computing service models on the employment structure of college graduates. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 459-467. https://doi.org/10.18280/isi.290207 84 Oudina, Z., Derdour, M., Dib, A., Yaakoubi, M.A. Identifying and Addressing Trust Concerns in Cyber-Physical Systems for the Oil and Gas Industry Cyber-physical systems (CPSs), trust CPS, trust concerns, oil and gas(O&G), risk mitigation 29, 2, 469-478 https://doi.org/10.18280/isi.290208 Oudina, Z., Derdour, M., Dib, A., Yaakoubi, M.A. (2024). Identifying and addressing trust concerns in cyber-physical systems for the oil and gas industry. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 469-478. https://doi.org/10.18280/isi.290208 85 Wagle, S.A., Harikrishnan, R., Kotecha, K. Bilinear LSTM with Bayesian Gaussian Optimization for Predicting Tomato Plant Disease Using Meteorological Parameters Bayesian optimization, long short-term memory, prediction, relative humidity, temperature, tomato plant disease 29, 2, 479-492https://doi.org/10.18280/isi.290209 Wagle, S.A., Harikrishnan, R., Kotecha, K. (2024). Bilinear LSTM with Bayesian Gaussian optimization for predicting tomato plant disease using meteorological parameters. Ingé nierie des Systèmes d’Information, Vol. 29, No. 2, p. 479- 492. https://doi.org/10.18280/isi.290209 86Qbouche, K., Rhoulami, K. Predicting Transport Mode in the Rabat Region: A Machine Learning Approach machine learning, k-nearest neighbors, multi-layer perceptron neural net-RBF, Bayesian belief network, support vector machine, multi-agent system, daily mobility 29, 2, 493-500https://doi.org/10.18280/isi.290210 Qbouche, K., Rhoulami, K. (2024). Predicting transport mode in the Rabat region: A machine learning approach. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 493-500. https://doi.org/10.18280/isi.290210 87Reda, N.H., Abbas, H.H. 3D Human Facial Traits’ Analysis for Ethnicity Recognition Using Deep Learning 3D face classification, deep learning, face morphology, geometric features, race classification 29, 2, 501-514https://doi.org/10.18280/isi.290211 Reda, N.H., Abbas, H.H. (2024). 3D human facial traits’ analysis for ethnicity recognition using deep learning. Ingé nierie des Systèmes d’Information, Vol. 29, No. 2, p. 501- 514. https://doi.org/10.18280/isi.290211 88 Ali, Z.L., Hayale, W.S.A., Al_Barazanchi, I.I., Sekhar, R., Shah, P., Parihar, S. Efficient Cybersecurity Assessment Using SVM and Fuzzy Evidential Reasoning for Resilient Infrastructure histogram equalization, discrete cosine transform, cybersecurity, process innovation, resilient infrastructure, virtual learning background, human reactions, and recognition fuzzy-based convolutional neural network 29, 2, 515-521https://doi.org/10.18280/isi.290212 Ali, Z.L., Hayale, W.S.A., Al_Barazanchi, I.I., Sekhar, R., Shah, P., Parihar, S. (2024). Efficient cybersecurity assessment using SVM and fuzzy evidential reasoning for resilient infrastructure. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 515-521. https://doi.org/10.18280/isi.290212 89Azanbay, K. Innovative Technologies as a Factor of Information Security of the Republic of Kazakhstan data protection, information security, automated processes, technological innovation, digital economy, advanced systems, Kazakhstan 29, 2, 523-532https://doi.org/10.18280/isi.290213 Azanbay, K. (2024). Innovative technologies as a factor of information security of the Republic of Kazakhstan. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 523-532. https://doi.org/10.18280/isi.290213 90Abukhait, J. Dust Detection on Solar Panels: A Computer Vision Approach dust detection, gray level co-occurrence matrix, local binary pattern, photovoltaic panels, support vector machine 29, 2, 533-541https://doi.org/10.18280/isi.290214 Abukhait, J. (2024). Dust detection on solar panels: A computer vision approach. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 533-541. https://doi.org/10.18280/isi.290214 91Maganti, M.R., Rao, K.R. Optimising the Epmipv6 Protocol for the Analysis of Advanced Sensor Networks wireless advanced sensor networks, ASMAG, ASLMA, IEEE 802.11ax 29, 2, 543-549https://doi.org/10.18280/isi.290215 Maganti, M.R., Rao, K.R. (2024). Optimising the Epmipv6 protocol for the analysis of advanced sensor networks. Ingé nierie des Systèmes d’Information, Vol. 29, No. 2, p. 543- 549. https://doi.org/10.18280/isi.290215 92Mediani, Y., Gharzouli, M. Hybrid Recommender System for Personalized Pedagogical Resource Recommendations in E-Learning Platforms collaborative filtering, deep neural network, E-learning, popularity-based, recommender system, Singular Value Decomposition 29, 2, 551-559https://doi.org/10.18280/isi.290216 Mediani, Y., Gharzouli, M. (2024). Hybrid recommender system for personalized pedagogical resource recommendations in e-learning platforms. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 551-559. https://doi.org/10.18280/isi.290216 93 Setiawan, W., Setiawan, M.M., Pramudita, Y.D., Mulaab. Inception-v3 with Reduce Learning Rate for Optimization of Lung Cancer Histopathology Classification image classification, lung cancer, Inception- v3, reduced learning rate, transfer learning, histopathology, hyperparameter optimization 29, 2, 561-570https://doi.org/10.18280/isi.290217 Setiawan, W., Setiawan, M.M., Pramudita, Y.D., Mulaab. (2024). Inception-v3 with reduce learning rate for optimization of lung cancer histopathology classification. Ingénierie des Syst èmes d’Information, Vol. 29, No. 2, p. 561-570. https://doi.org/10.18280/isi.290217 94Kadhum, O.I., Hamad, A.H. Evaluating the Performance of a Multi- Organizational E-Government Platform on Hyperledger Fabric with Fuzzy Logic-Enhanced Multi-Channel Connectivity Hyperledger Fabric, blockchain, fuzzy logic e-government, multi-organization, multi- channel connectivity 29, 2, 571-580 https://doi.org/10.18280/isi.290218 Kadhum, O.I., Hamad, A.H. (2024). Evaluating the performance of a multi-organizational e-government platform on hyperledger fabric with fuzzy logic-enhanced multi-channel connectivity. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 571-580. https://doi.org/10.18280/isi.290218 95 Bouhata, D., Bouam, S., Moumen, H., Benreguia, B., Arar, C. Self-Stabilizing Algorithms for Computing Maximal Distance-2 Independent Sets and Minimal Dominating Sets in Networks self-stabilizing algorithm, expression model, maximal independent set, minimal dominating set, distributed system, network 29, 2, 581-590https://doi.org/10.18280/isi.290219 Bouhata, D., Bouam, S., Moumen, H., Benreguia, B., Arar, C. (2024). Self-stabilizing algorithms for computing maximal distance-2 independent sets and minimal dominating sets in networks. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 581-590. https://doi.org/10.18280/isi.290219 96 Maksutova, K., Niyazova, R., Talgat, A., Anetova, A., Yergesh, M. Synthesis of Concepts and Applications of Information Intelligent Systems and Knowledge Bases in Computer Science: A Systematic Literature Review artificial intelligence, knowledge bases, intelligent systems, digital technologies in education, information systems, IT sphere, learning process, system analysis 29, 2, 591-598 https://doi.org/10.18280/isi.290220 Maksutova, K., Niyazova, R., Talgat, A., Anetova, A., Yergesh, M. (2024). Synthesis of concepts and applications of information intelligent systems and knowledge bases in computer science: A systematic literature review. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 591-598. https://doi.org/10.18280/isi.290220 97 Hadi, F., Slimani, Y., Douar, A., Alti, A., Saoud, F., Harkati, M. Improved Vigenere Cipher-RSA-Based Medical Image Security Through Multiple Encryption Keys cryptography, encryption and decryption, medical images, DICOM, RSA, security, transmission, Vigenere cipher 29, 2, 599-608 https://doi.org/10.18280/isi.290221 Hadi, F., Slimani, Y., Douar, A., Alti, A., Saoud, F., Harkati, M. (2024). Improved Vigenere cipher-rsa-based medical image security through multiple encryption keys. Ingénierie des Systè mes d’Information, Vol. 29, No. 2, p. 599-608. https://doi.org/10.18280/isi.290221 98 Awad, A.S., Khalaf, M., Alsaadi, M. Deep Learning-Enhanced Cluster Head Optimization for Intrusion Detection in Wireless Sensor Networks cluster head selection, optimization, deep neural network, anomaly detection, classification 29, 2, 609-618https://doi.org/10.18280/isi.290222 Awad, A.S., Khalaf, M., Alsaadi, M. (2024). Deep learning- enhanced cluster head optimization for intrusion detection in wireless sensor networks. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 609-618. https://doi.org/10.18280/isi.290222 99 Kundaikar, T., Fadte, S., Karmali, R., Pawar, J.D. Automatic Hindi OCR Error Correction Using MLM-BERT Hindi, devanagari, MLM BERT, OCR, error correction, natural language processing, deep learning, post-processing 29, 2, 619-626 https://doi.org/10.18280/isi.290223 Kundaikar, T., Fadte, S., Karmali, R., Pawar, J.D. (2024). Automatic Hindi OCR error correction using MLM-BERT. Ing énierie des Systèmes d’Information, Vol. 29, No. 2, p. 619- 626. https://doi.org/10.18280/isi.290223 100 Devi, S. Review of Android Apps for Monitoring Pregnancy Symptoms and Care monitoring 1, pregnancy symptom 2, self- care 3, mHealth 4, pregnancy care 5, Androd mobile application 29, 2, 627-636https://doi.org/10.18280/isi.290224 Devi, S. (2024). Review of Android apps for monitoring pregnancy symptoms and care. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 627-636. https://doi.org/10.18280/isi.290224 101 Christanto, H.J., Lukas, Sutresno, S.A., Karolen, J. Unifying Variable Importance Scores from Different Machine Learning Models Using Simulated Annealing service quality, Servqual, user satisfaction, IT service 29, 2, 637-648https://doi.org/10.18280/isi.290225 Christanto, H.J., Lukas, Sutresno, S.A., Karolen, J. (2024). Evaluating user satisfaction of IT services through service quality approach. Ingénierie des Systèmes d’Information, Vol 29, No. 2, p. 637-648. https://doi.org/10.18280/isi.290225 102 Rusyana, A., Wigena, A.H., Sumertajaya, I.M., Sartono, B. Unifying Variable Importance Scores from Different Machine Learning Models Using Simulated Annealing machine learning, permutation variable importance, simulated annealing, simulation data, variable importance 29, 2, 649-657https://doi.org/10.18280/isi.290226 Rusyana, A., Wigena, A.H., Sumertajaya, I.M., Sartono, B. (2024). Unifying variable importance scores from different machine learning models using simulated annealing. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 649-657. https://doi.org/10.18280/isi.290226 103 Zhukova, O., Mandragelia, V., Chepurna, V., Ivanenko, L., Noskova, M. A Model of Using Digital Information Systems to Create Video Game Contexts: The Case of GPT Models and Its Effect artificial intelligence, information technology, information systems, video games, digital sphere, chat model, management strategies 29, 2, 659-667https://doi.org/10.18280/isi.290227 Zhukova, O., Mandragelia, V., Chepurna, V., Ivanenko, L., Noskova, M. (2024). A model of using digital information systems to create video game contexts: The case of GPT models and its effect. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 659-667. https://doi.org/10.18280/isi.290227 104 Mohammed, H.A.A., Jizany, A.A.K., Mahmood, I.M., Kadhim, Q.K. Predicting Alzheimer's Disease Using a Modified Grey Wolf Optimizer and Support Vector Machine predictive modelling, grey wolf optimizer, Alzheimer’s disease, support vector machine, gene selection, bioinformatics 29, 2, 669-676https://doi.org/10.18280/isi.290228 Mohammed, H.A.A., Jizany, A.A.K., Mahmood, I.M., Kadhim, Q.K. (2024). Predicting Alzheimer's disease using a modified grey wolf optimizer and support vector machine. Ingé nierie des Systèmes d’Information, Vol. 29, No. 2, p. 669- 676. https://doi.org/10.18280/isi.290228 105 Honnegowda, J., Mallikarjunaiah, K., Srikantaswamy, M. An Efficient Abnormal Event Detection System in Video Surveillance Using Deep Learning-Based Reconfigurable Autoencoder deep learning, reconfigurable autoencoder (RAE), frame-level AUC, University of California, San Diego (UCSD) data sets, avenue dataset, video surveillance 29, 2, 677-686https://doi.org/10.18280/isi.290229 Honnegowda, J., Mallikarjunaiah, K., Srikantaswamy, M. (2024). An efficient abnormal event detection system in video surveillance using deep learning-based reconfigurable autoencoder. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 677-686. https://doi.org/10.18280/isi.290229 106 Thatha, V.N., Kumari, P.M.K., Sirisha, U., Manoj, V.V.R., Praveen, S.P. GLAD: Advanced Attention Mechanism-Based Model for Grape Leaf Disease Detection Yolov5-You only look once version5, convolutional neural network, shuffle attention, convolutional block attention module, efficient channel attention, multi- channel attention, agricultural disease detection 29, 2, 687-695https://doi.org/10.18280/isi.290230 Thatha, V.N., Kumari, P.M.K., Sirisha, U., Manoj, V.V.R., Praveen, S.P. (2024). GLAD: Advanced attention mechanism- based model for grape leaf disease detection. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 687-695. https://doi.org/10.18280/isi.290230 107 Hussein, S.A., Kareem, M.R., George, D.N. Minimizing the Cache Memory Miss Ratio Using Modified Replacement Algorithm (M-CAR) cache memory, replacements algorithms, cache miss, hit ratio, M-CAR 29, 2, 697-703https://doi.org/10.18280/isi.290231 Hussein, S.A., Kareem, M.R., George, D.N. (2024). Minimizing the cache memory miss ratio using modified replacement algorithm (M-CAR). Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 697-703. https://doi.org/10.18280/isi.290231 108 Shwaysh, M.M., Alani, S., Saad, M.A., Abdulhussein, T.A. Image Encryption and Steganography Method Based on AES Algorithm and Secret Sharing Algorithm Advanced Encryption Standards (AES) algorithm, Shamir secret sharing (S), hiding of encryption key with secret sharing, PSNR and MSE 29, 2, 705-714https://doi.org/10.18280/isi.290232 Shwaysh, M.M., Alani, S., Saad, M.A., Abdulhussein, T.A. (2024). Image encryption and steganography method based on AES algorithm and secret sharing algorithm. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 705-714. https://doi.org/10.18280/isi.290232 109 Marmoah, S., Supianto, Sukmawati, F., Poerwanti, J.I.S., Yantoro. The Elementary School Teachers Adoption of Learning Management System: A UTAUT Model Analysis Learning Management Systems (LMS), Unified Theory of Acceptance and Use of Technology (UTAUT), elementary school teachers 29, 2, 715-722 https://doi.org/10.18280/isi.290233 Marmoah, S., Supianto, Sukmawati, F., Poerwanti, J.I.S., Yantoro. (2024). The elementary school teachers adoption of learning management system: A UTAUT model analysis. Ingé nierie des Systèmes d’Information, Vol. 29, No. 2, p. 715- 722. https://doi.org/10.18280/isi.290233 110 Kryshtanovych, M., Snihur, L., Buzhyna, I., Tiurina, D., Imeridze, M. Development of New Information Systems with the Involvement of Artificial Intelligence for the Men and Women’s Work: A Methodical Approach to Assessment and Selection of the Optimal information, information Systems, artificial intelligence, modeling, men and women's work 29, 2, 723-730https://doi.org/10.18280/isi.290234 Kryshtanovych, M., Snihur, L., Buzhyna, I., Tiurina, D., Imeridze, M. (2024). Development of new information systems with the involvement of artificial intelligence for the men and women’s work: A methodical approach to assessment and selection of the optimal. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 723-730. https://doi.org/10.18280/isi.290234 111 Deo, A., Khan, S.S., Doohan, N.V., Jain, A., Nighoskar, M., Dandawate, A. Analysis for Predicting Respiratory Diseases from Air Quality Attributes Using Recurrent Neural Networks and Other Deep Learning Techniques air pollution, air quality index, deep learning, recurrent neural network, respiratory diseases, predictive modeling 29, 2, 731-739 https://doi.org/10.18280/isi.290235 Deo, A., Khan, S.S., Doohan, N.V., Jain, A., Nighoskar, M., Dandawate, A. (2024). Analysis for predicting respiratory diseases from air quality attributes using recurrent neural networks and other deep learning techniques. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 731-739. https://doi.org/10.18280/isi.290235 112 Khalifi, H., Riahi, S., Cherif, W. Smart Cities and Sustainable Urban Development in Morocco information and communications technology, smart cities, territorial transformation, urban planning, sustainable governance, territorial development, Moroccan cities 29, 2, 741-751 https://doi.org/10.18280/isi.290236 Khalifi, H., Riahi, S., Cherif, W. (2024). Smart cities and sustainable urban development in Morocco. Ingénierie des Syst èmes d’Information, Vol. 29, No. 2, p. 741-751. https://doi.org/10.18280/isi.290236 113 Vissapragada, S., Meena Abarna, K.T., Satya Sree, K.P.N.V. Optimizing Energy Efficiency in Wireless Sensor Networks via Cluster- Based Routing and a Hybrid Optimization Approach cluster based routing, cuckoo search algorithm, energy based multiobjective hybrid optimization algorithm, energy efficiency, whale optimization algorithm, wireless sensor networks 29, 2, 753-760https://doi.org/10.18280/isi.290237 Vissapragada, S., Meena Abarna, K.T., Satya Sree, K.P.N.V. (2024). Optimizing energy efficiency in wireless sensor networks via cluster-based routing and a hybrid optimization approach. Ingénierie des Systèmes d’Information, Vol. 29, No. 2, p. 753-760. https://doi.org/10.18280/isi.290237 114 Mishra, P., Dash, R.K., Choudhury, T., Kotecha, K. Optimizing Residual Energy and Delay in WSN Routing Using Particle Swarm Optimization residual energy, particle swarm optimization, WSN lifetime, energy model, shortest path 29, 2, 761-770 https://doi.org/10.18280/isi.290238 Mishra, P., Dash, R.K., Choudhury, T., Kotecha, K. (2024). Optimizing residual energy and delay in WSN routing using particle swarm optimization. Ingénierie des Systèmes d’ Information, Vol. 29, No. 2, p. 761-770. https://doi.org/10.18280/isi.290238 115 Babu, B.V.S., Babu, K.S., Kare, D.P. BAB-SDMM: Blockchain Attribute Based Secure Data Management Model block chain, attribute, revocation, auxiliary tree, smart contract, encryption, decryption, policies 29, 1, 1-8https://doi.org/10.18280/isi.290101 Babu, B.V.S., Babu, K.S., Kare, D.P. (2024). BAB-SDMM: Blockchain attribute based secure data management model. Ing énierie des Systèmes d’Information, Vol. 29, No. 1, p. 1-8. https://doi.org/10.18280/isi.290101 116 Fakhet, W., El Khediri, S., Zidi, S. An Arabic OCR Approach Using Levenshtein Distance and CNNs AHCR, Convolutional Neural Network, Levenshtein distance, Jaccard distance, OCR 29, 1, 9-17https://doi.org/10.18280/isi.290102 Fakhet, W., El Khediri, S., Zidi, S. (2024). An Arabic OCR approach using Levenshtein distance and CNNs. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 9-17. https://doi.org/10.18280/isi.290102 117 Mohammed, S., Al-Aaraji, N., Al-Saleh, A. Comparative Analysis of Blockchain Platforms for Security Enhancement in Online Social Networks online social networks, security attacks, blockchain, centralized social networks, decentralized social networks, blockchain platforms, Steem, Ethereum 29, 1, 19-25https://doi.org/10.18280/isi.290103 Mohammed, S., Al-Aaraji, N., Al-Saleh, A. (2024). Comparative analysis of blockchain platforms for security enhancement in online social networks. Ingénierie des Systè mes d’Information, Vol. 29, No. 1, p. 19-25. https://doi.org/10.18280/isi.290103 118 Ahmed, M., Ambudkar, B., Yadav, A. Efficient Power Estimation Using DSENT for 3D-Mesh on Chip Optic Communication Network DSENT, power consumption, 3D-mesh, optical communication, deterministic routing, adaptive routing, oblivious routing 29, 1, 27-35https://doi.org/10.18280/isi.290104 Ahmed, M., Ambudkar, B., Yadav, A. (2024). Efficient power estimation using DSENT for 3D-mesh on chip optic communication network. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 27-35. https://doi.org/10.18280/isi.290104 119 Suryawati, C.T., Kholili, M.I., Susilo, A.T., Asrowi, Surur, N. Enhancing Effectiveness of Guidance and Counseling Services Through Web- Based Interactive Media web-based counseling, Interactive Media in Education, Content Validity Index (CVI), student engagement, educational technology 29, 1, 37-48https://doi.org/10.18280/isi.290105 Suryawati, C.T., Kholili, M.I., Susilo, A.T., Asrowi, Surur, N. (2024). Enhancing effectiveness of guidance and counseling services through web-based interactive media. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 37-48. https://doi.org/10.18280/isi.290105 120 Rachmad, A., Syarief, M., Hutagalung, J., Hernawati, S., Rochman, E.M.S., Asmara, Y.P. Comparison of CNN Architectures for Mycobacterium Tuberculosis Classification in Sputum Images tuberculosis, sputum images, convolutional neural network (CNN), classification, AlexNet 29, 1, 49-56https://doi.org/10.18280/isi.290106 Rachmad, A., Syarief, M., Hutagalung, J., Hernawati, S., Rochman, E.M.S., Asmara, Y.P. (2024). Comparison of CNN architectures for Mycobacterium tuberculosis classification in sputum images. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 49-56. https://doi.org/10.18280/isi.290106 121 Warda, L., Ahmed, S.S., Hayatou, O., Kaladzavi, G., Samdalle, A., Kolyang. A Hidden Markov Model-Based Approach for Lightweight Ontology Modularization Using K-Means Clustering semantic web, ontology, modularization, hidden Markov model, RDF triple, ontology module, K-means clustering 29, 1, 57-64https://doi.org/10.18280/isi.290107 Warda, L., Ahmed, S.S., Hayatou, O., Kaladzavi, G., Samdalle, A., Kolyang. (2024). A hidden Markov model-based approach for lightweight ontology modularization using K-Means clustering. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 57-64. https://doi.org/10.18280/isi.290107 122 Ibrahim, A., Al Sayed, I.A.M., Jabbar, M.S., Almutairi, H., Sekhar, R., Shah, P., Al_Barazanchi, I.I. Evaluating the Impact of Emotions and Awareness on User Experience in Virtual Learning Environments for Sustainable Development Education computer science, network, virtual learning environment, human emotions, and awareness, Fuzzy-based Convolutional Neural Network, histogram equalization, sustainable development education, environmental education 29, 1, 65-73https://doi.org/10.18280/isi.290108 Ibrahim, A., Al Sayed, I.A.M., Jabbar, M.S., Almutairi, H., Sekhar, R., Shah, P., Al_Barazanchi, I.I. (2024). Evaluating the impact of emotions and awareness on user experience in virtual learning environments for sustainable development education. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 65-73. https://doi.org/10.18280/isi.290108 123 Beyyala, A., Priya, R., Choudari, S.R., Bhavani, R. Swin Transformer and Attention Guided Thyroid Nodule Segmentation on Ultrasound Images attention guided network, DDTI, deep learning, Swin Transformer, thyroid nodule, ultrasound image segmentation 29, 1, 75-81https://doi.org/10.18280/isi.290109 Beyyala, A., Priya, R., Choudari, S.R., Bhavani, R. (2024). Swin Transformer and attention guided thyroid nodule segmentation on ultrasound images. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 75-81. https://doi.org/10.18280/isi.290109 124Chatra, M., Bourahla, M. Agent-Based Simulation of Crowd Evacuation Through Complex Spaces crowd evacuation behavior, agent-based model simulation, artificial intelligence, behavior animation, effectiveness, efficiency evaluation 29, 1, 83-93 https://doi.org/10.18280/isi.290110 Chatra, M., Bourahla, M. (2024). Agent-based simulation of crowd evacuation through complex spaces. Ingénierie des Systè mes d’Information, Vol. 29, No. 1, p. 83-93. https://doi.org/10.18280/isi.290110 125 Masykur, F., Adi, K., Nurhayati, O.D. Measuring Agricultural Area Using YOLO Object Detection and ArUco Markers Yolo v4, ArUco marker, reference image, object detection, drone image 29, 1, 95-106https://doi.org/10.18280/isi.290111 Masykur, F., Adi, K., Nurhayati, O.D. (2024). Measuring agricultural area using Yolo object detection and ArUco markers. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 95-106. https://doi.org/10.18280/isi.290111 126 Christanto, H.J., Sutresno, S.A., Singgalen, Y.A., Dewi, C. Analyzing Benefits of Online Train Ticket Reservation App Using Technology Acceptance Model KAI access, satisfaction, structural equation model, technology acceptance model, train reservation ticket 29, 1, 107-115 https://doi.org/10.18280/isi.290112 Christanto, H.J., Sutresno, S.A., Singgalen, Y.A., Dewi, C. (2024). Analyzing benefits of online train ticket reservation app using technology acceptance model. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 107-115. https://doi.org/10.18280/isi.290112 127Loucif, H. A Hybrid Deep Learning Approach for Spam Detection in Twitter spam, deep neural networks, CNN, PCA, Twitter, Anomaly detection, text classification, social networks, cybersecurity 29, 1, 117-123 https://doi.org/10.18280/isi.290113 Loucif, H. (2024). A hybrid deep learning approach for spam detection in Twitter. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 117-123. https://doi.org/10.18280/isi.290113 128 Chasipanta, G.R.V., Sánchez- Pozo, N.N. Long-Term Forecasting of Euro-Dollar Exchange Rates Using the ARIMA Model and Multilayer Perceptron exchange rates, time series forecasting, ARIMA, neural network, MLP multilayer perceptron, accuracy, scaled mean absolute error (MASE), long-term prediction 29, 1, 125-139https://doi.org/10.18280/isi.290114 Chasipanta, G.R.V., Sánchez-Pozo, N.N. (2024). Long-term forecasting of euro-dollar exchange rates using the ARIMA model and multilayer perceptron. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 125-139. https://doi.org/10.18280/isi.290114 129 Jawad, W.K., Kaittan, N.M., Sabri, B.T. Neuronal Network-Founded Machine Knowledge with Pythons in Data Mining for Vast Information Classifications distributions on the big data, transform of the analytics, basic process of data mining, sectorize, the identification of review 29, 1, 141-146 https://doi.org/10.18280/isi.290115 Jawad, W.K., Kaittan, N.M., Sabri, B.T. (2024). Neuronal network-founded machine knowledge with pythons in data mining for vast information classifications. Ingénierie des Systè mes d’Information, Vol. 29, No. 1, p. 141-146. https://doi.org/10.18280/isi.290115 130 Jawad, W., Al-Bakry, A. Comparative Efficiency Evaluation of Hadoop and Spark Frameworks Using Random Forest Algorithm for Intrusion Detection big data, distributed frameworks, Hadoop, intrusion detection system, machine learning, performance, Random Forest, spark 29, 1, 147-152https://doi.org/10.18280/isi.290116 Jawad, W., Al-Bakry, A. (2024). Comparative efficiency evaluation of Hadoop and spark frameworks using random forest algorithm for intrusion detection. Ingénierie des Systè mes d’Information, Vol. 29, No. 1, p. 147-152. https://doi.org/10.18280/isi.290116 131Bobrova, Y., Bobrov, Y., Vavreniuk, S., Bondarenko, O. Algorithmic Framework for an Information System Ensuring Sustainable Development and National Security sustainable development, information, security, system, information system, graphical modeling language 29, 1, 153-159https://doi.org/10.18280/isi.290117 Bobrova, Y., Bobrov, Y., Vavreniuk, S., Bondarenko, O. (2024). Algorithmic framework for an information system ensuring sustainable development and national security. Ingé nierie des Systèmes d’Information, Vol. 29, No. 1, p. 153- 159. https://doi.org/10.18280/isi.290117 132 Chamid, A.A., Widowati, Kusumaningrum, R. Labeling Consistency Test of Multi- Label Data for Aspect and Sentiment Classification Using the Cohen Kappa Method labeling multi-label data, aspect-based sentiment analysis, consistency test, Cohen Kappa, classification 29, 1, 161-167https://doi.org/10.18280/isi.290118 Chamid, A.A., Widowati, Kusumaningrum, R. (2024). Labeling consistency test of multi-label data for aspect and sentiment classification using the Cohen Kappa method. Ingé nierie des Systèmes d’Information, Vol. 29, No. 1, p. 161- 167. https://doi.org/10.18280/isi.290118 133Almiman, A., Othman, M.T.B. Predictive Analysis of Computer Science Student Performance: An ACM2013 Knowledge Area Approach Educational Data Mining (EDM), Association for Computing Machinery (ACM), Knowledge Area (KA), data mining, machine learning, prediction model 29, 1, 169-189https://doi.org/10.18280/isi.290119 Almiman, A., Othman, M.T.B. (2024). Predictive analysis of computer science student performance: An ACM2013 knowledge area approach. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 169-189. https://doi.org/10.18280/isi.290119 134 Berbiche, N., Hlyal, M., El Alami, J. Enhancing Supply Chain Resilience and Efficiency through Fuzzy Logic- based Decision-Making Automation in Volatile Environments decision-making automation, fuzzy logic, Mamdani approach, MATLAB, predictive models, supply chain planning, uncertainty mitigation 29, 1, 191-203https://doi.org/10.18280/isi.290120 Berbiche, N., Hlyal, M., El Alami, J. (2024). Enhancing supply chain resilience and efficiency through fuzzy logic-based decision-making automation in volatile environments. Ingé nierie des Systèmes d’Information, Vol. 29, No. 1, p. 191- 203. https://doi.org/10.18280/isi.290120 135 Sahibu, S., Sakti, A., Iskandar, A. Risk Management Analysis of SMK Telkom Makassar's Integrated Academic Information System in Compliance with ISO 31000 Standards Integrated Academic Information System (iGracias), SMK Telkom Makassar and information technology security 29, 1, 205-218https://doi.org/10.18280/isi.290121 Sahibu, S., Sakti, A., Iskandar, A. (2024). Risk management analysis of SMK Telkom Makassar's Integrated Academic Information System in compliance with ISO 31000 standards. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 205-218. https://doi.org/10.18280/isi.290121 136 Yasa, A.D., Rahayu, S., Handayanto, S.K., Ekawati, R. Evaluating the Impact of Smart Learning-Based Inquiry on Enhancing Digital Literacy and Critical Thinking Skills 21st-century skills, critical thinking, digital literacy, educational technology, inquiry- based learning, smart learning-based inquiry (SLBI) 29, 1, 219-233https://doi.org/10.18280/isi.290122 Yasa, A.D., Rahayu, S., Handayanto, S.K., Ekawati, R. (2024). Evaluating the impact of smart learning-based inquiry on enhancing digital literacy and critical thinking skills. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 219-233. https://doi.org/10.18280/isi.290122 137 Paladugu, R.K., Kancherla, G.R. Augmenting Document Classification Accuracy Through the Integration of Deep Contextual Embeddings Deep Contextual Embedding Models, text clustering algorithms, document classification, natuaral language processing and machine learning 29, 1, 235-246https://doi.org/10.18280/isi.290123 Paladugu, R.K., Kancherla, G.R. (2024). Augmenting document classification accuracy through the integration of deep contextual embeddings. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 235-246. https://doi.org/10.18280/isi.290123 138 Khan, S.S., Sudan, J.S., Pathak, A., Pandit, R., Rane, P., Kumawat, A.K. A Review of EEG Artifact Removal Methods for Brain-Computer Interface Applications electroencephalogram (EEG), brain- computer interface (BCI), artifact removal, Principal Component Analysis (PCA), wavelet convolution 29, 1, 247-252https://doi.org/10.18280/isi.290124 Khan, S.S., Sudan, J.S., Pathak, A., Pandit, R., Rane, P., Kumawat, A.K. (2024). A review of EEG artifact removal methods for brain-computer interface applications. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 247-252. https://doi.org/10.18280/isi.290124 139Sangwan, P., Banita. Role of Blockchain Technology in Data Security for Healthcare healthcare, blockchain, encryption, security, performance, hashing, deep learning 29, 1, 253-260 https://doi.org/10.18280/isi.290125 Sangwan, P., Banita. (2024). Role of blockchain technology in data security for healthcare. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 253-260. https://doi.org/10.18280/isi.290125 140 Hadi, T.H., Kadum, J., Kadhim, Q.K., Ahmed, S.T. An Enhanced Cloud Storage Auditing Approach Using Boneh-Lynn-Shacham ’s Signature and Automatic Blocker Protocol public auditing, cloud computing, automatic blocker protocol, third-party auditors, cloud storage, Boneh-Lynn- Shacham’s 29, 1, 261-268https://doi.org/10.18280/isi.290126 Hadi, T.H., Kadum, J., Kadhim, Q.K., Ahmed, S.T. (2024). An enhanced cloud storage auditing approach using Boneh-Lynn- Shacham’s signature and automatic blocker protocol. Ingé nierie des Systèmes d’Information, Vol. 29, No. 1, p. 261- 268. https://doi.org/10.18280/isi.290126 141 Kirla, J.U.N., Oruganti, B.V., Duggempudi, B.R., Kakarlapudi, V.R.R., Yalla, P. Optimizing Fertilizer Recommendations for Banana Plant Using Feature Extraction Method and Machine Learning Classification banana plant, feature extraction, fertilizers, machine learning techniques, plants, soil 29, 1, 269-277 https://doi.org/10.18280/isi.290127 Kirla, J.U.N., Oruganti, B.V., Duggempudi, B.R., Kakarlapudi, V.R.R., Yalla, P. (2024). Optimizing fertilizer recommendations for banana plant using feature extraction method and machine learning classification. Ingénierie des Syst èmes d’Information, Vol. 29, No. 1, p. 269-277. https://doi.org/10.18280/isi.290127 142 Merzougui, G., Boulelouah, N., Mokhtari, A., Hebira, A. Improving the Approval Process for Durum Wheat Grain Quality in Algeria Using Computer Vision and Machine Learning durum wheat, quality control, variety/impurity classification, image segmentation, machine learning, hyperparameter tuning 29, 1, 279-291 https://doi.org/10.18280/isi.290128 Merzougui, G., Boulelouah, N., Mokhtari, A., Hebira, A. (2024). Improving the approval process for durum wheat grain quality in Algeria using computer vision and machine learning. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 279-291. https://doi.org/10.18280/isi.290128 143 Alzami, F., Salam, A., Rizqa, I., Irawan, C., Andono, P.N., Aqmala, D., Sartika, M. Demand Prediction for Food and Beverage SMEs Using SARIMAX and Weather Data demand prediction, SME, SARIMAX, VAR, food, weather data, temperature, humidity 29, 1, 293-300https://doi.org/10.18280/isi.290129 Alzami, F., Salam, A., Rizqa, I., Irawan, C., Andono, P.N., Aqmala, D., Sartika, M. (2024). Demand prediction for food and beverage SMEs using SARIMAX and weather data. Ingé nierie des Systèmes d’Information, Vol. 29, No. 1, p. 293- 300. https://doi.org/10.18280/isi.290129 144Khorseed, W.S., Hamad, A.H. Inter and Intra Domain DDoS Attack Mitigation for Software Defined Network Based on Hyperledger Fabric Blockchain Technology DDoS, attack mitigation, SDN, Hyperledger Fabric, smart contract, inter domain, intra domain 29, 1, 301-311 https://doi.org/10.18280/isi.290130 Khorseed, W.S., Hamad, A.H. (2024). Inter and intra domain DDoS attack mitigation for software defined network based on Hyperledger Fabric blockchain technology. Ingénierie des Systè mes d’Information, Vol. 29, No. 1, p. 301-311. https://doi.org/10.18280/isi.290130 145 Khotimah, B.K., Anamisa, D.R., Kustiyahningsih, Y., Fauziah, A.N., Setiawan, E. Enhancing Small and Medium Enterprises: A Hybrid Clustering and AHP-TOPSIS Decision Support Framework decision support system, recommendation, SME, clustering method, AHP-TOPSIS 29, 1, 313-321https://doi.org/10.18280/isi.290131 Khotimah, B.K., Anamisa, D.R., Kustiyahningsih, Y., Fauziah, A.N., Setiawan, E. (2024). Enhancing small and medium enterprises: A hybrid clustering and AHP-TOPSIS decision support framework. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 313-321. https://doi.org/10.18280/isi.290131 146 Ledmi, A., Ledmi, M., Souidi, M.E.H., Haouassi, H., Bardou, D. Optimizing Task Scheduling in Cloud Computing Using Discrete Tuna Swarm Optimization cloud computing, task scheduling, Discrete Tuna Swarm Optimization (DTSO), load balancing, performance evaluation, makespan, throughput time, average waiting time 29, 1, 323-335https://doi.org/10.18280/isi.290132 Ledmi, A., Ledmi, M., Souidi, M.E.H., Haouassi, H., Bardou, D. (2024). Optimizing task scheduling in cloud computing using Discrete Tuna Swarm Optimization. Ingénierie des Systè mes d’Information, Vol. 29, No. 1, p. 323-335. https://doi.org/10.18280/isi.290132 147 Ghibeche, Y., Sellam, A., Nouri, N., Khaldi, A., Harrane, A., Ghibeche, I. Machine Learning for Forest Fire Prediction: A Case Study in North Algeria forest fire, fire prediction system, machine learning, decision tree, random forest 29, 1, 337-346https://doi.org/10.18280/isi.290133 Ghibeche, Y., Sellam, A., Nouri, N., Khaldi, A., Harrane, A., Ghibeche, I. (2024). Machine learning for forest fire prediction: A case study in North Algeria. Ingénierie des Systèmes d’ Information, Vol. 29, No. 1, p. 337-346. https://doi.org/10.18280/isi.290133 148Hanon, W., Salman, M.A. Integration of ML Techniques for Early Detection of Breast Cancer: Dimensionality Reduction Approach Principal Component Analysis PCA, K- nearest neighbor KNN, integrate PCA and KNN DPBC, dimensionality reduction, diagnosis breast cancer DBC, Breast Cancer Wisconsin medical dataset BCW 29, 1, 347-353https://doi.org/10.18280/isi.290134 Hanon, W., Salman, M.A. (2024). Integration of ML techniques for early detection of breast cancer: Dimensionality reduction approach. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 347-353. https://doi.org/10.18280/isi.290134 149Sreedharan, S., Nadarajan, R. Nesterov Accelerated Gradient Descent for Optimizing Fast Harmonic Mean Linear Discriminant Analysis dimensionality reduction, FHLDA, Stiefel manifold, accelerated optimization, gradient descent scheme, convex function, Nesterov accelerated gradient descent 29, 1, 355-367https://doi.org/10.18280/isi.290135 Sreedharan, S., Nadarajan, R. (2024). Nesterov accelerated gradient descent for optimizing Fast Harmonic mean linear discriminant analysis. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 355-367. https://doi.org/10.18280/isi.290135 150 Ouakasse, F., Mosaif, A., Rakrak, S. A QoS-Gateway-Based Framework for Prioritizing Emergency Data in IoMT Applications Internet of Medical Things (IoMT), Quality of Service (QoS), data prioritization, emergency healthcare, gateway 29, 1, 369-375https://doi.org/10.18280/isi.290136 Ouakasse, F., Mosaif, A., Rakrak, S. (2024). A QoS-gateway- based framework for prioritizing emergency data in IoMT applications. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 369-375. https://doi.org/10.18280/isi.290136 151 Ouchra, H., Belangour, A., Erraissi, A. Supervised Machine Learning Algorithms for Land Cover Classification in Casablanca, Morocco supervised learning, remote sensing, satellite image classification, machine learning, google earth engine 29, 1, 377-387https://doi.org/10.18280/isi.290137 Ouchra, H., Belangour, A., Erraissi, A. (2024). Supervised machine learning algorithms for land cover classification in Casablanca, Morocco. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 377-387. https://doi.org/10.18280/isi.290137 152AlMotairi, R.K., Hadwan, M. Sentiment Analysis Methods for Arabic Content on Social Media: A Systematic Review Arabic sentiment analysis, systematic review, social media, opinion analysis, deep learning and machine learning 29, 1, 389-396https://doi.org/10.18280/isi.290138 AlMotairi, R.K., Hadwan, M. (2024). Sentiment analysis methods for arabic content on social media: A systematic review. Ingénierie des Systèmes d’Information, Vol. 29, No. 1, p. 389-396. https://doi.org/10.18280/isi.290138 153Alqaan, S.E., Qamar, A.M. Sentiment Analysis of Arabic Tweets on Online Learning During the COVID-19 Pandemic: A Machine Learning and LSTM Approach ARABIC tweets, COVID-19, deep learning (DL), long short-term memory (LSTM), machine learning (ML), online learning, opinion mining, sentiment analysis 28, 6, 1435-1443https://doi.org/10.18280/isi.280601 Alqaan, S.E., Qamar, A.M. (2023). Sentiment analysis of Arabic tweets on online learning during the COVID-19 pandemic: A machine learning and LSTM approach. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1435-1443. https://doi.org/10.18280/isi.280601 154 Meharunnisa, Saqlain, M., Abid, M., Awais, M., Stević, Ž. Analysis of Software Effort Estimation by Machine Learning Techniques estimation, machine learning, software, data-driven, linear regression, gradient boosting, random forest, root mean squared error (RMSE) 28, 6, 1445-1457 https://doi.org/10.18280/isi.280602 Meharunnisa, Saqlain, M., Abid, M., Awais, M., Stević, Ž. (2023). Analysis of software effort estimation by machine learning techniques. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1445-1457. https://doi.org/10.18280/isi.280602 155 Mahajan, A., Kumar, S., Kale, S. Sentiment Analysis of User Reviews for "Digi Tour" and "Audio Odigos" Smart Tour Guide Applications Smart Tour Guide app, app technology, sentiment analysis, Digi Tour app, user reviews, azure machine learning, Audio Odigos app, Indian cultural heritage 28, 6, 1459-1466https://doi.org/10.18280/isi.280603 Mahajan, A., Kumar, S., Kale, S. (2023). Sentiment analysis of user reviews for 'Digi Tour' and 'Audio Odigos' Smart Tour Guide applications. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1459-1466. https://doi.org/10.18280/isi.280603 156 Gadde, S., Rao, G.S., Veesam, V.S., Yarlagadda, M., Patibandla, R.S.M.L. Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions cloud computing, data sharing, two factor authentication, cryptography, cloud storage, security challenges, data privacy, access control, cloud security 28, 6, 1467-1477 https://doi.org/10.18280/isi.280604 Gadde, S., Rao, G.S., Veesam, V.S., Yarlagadda, M., Patibandla, R.S.M.L. (2023). Secure data sharing in cloud computing: A comprehensive survey of two-factor authentication and cryptographic solutions. Ingénierie des Syst èmes d’Information, Vol. 28, No. 6, p. 1467-1477. https://doi.org/10.18280/isi.280604 157 Malla, S., Sahu, P.K., Patnaik, S., Biswal, A.K., Nayak, M. IoT-Enabled Smart Anti-Smog Towers: A Novel Approach to Urban Air Pollution Control green house effect, smog, Anti-Smog tower, cloud storage, pollution control, Internet of Things (IoT), environmental sensing, air quality monitoring 28, 6, 1479-1493 https://doi.org/10.18280/isi.280605 Malla, S., Sahu, P.K., Patnaik, S., Biswal, A.K., Nayak, M. (2023). IoT-enabled smart anti-smog towers: A novel approach to urban air pollution control. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1479-1493. https://doi.org/10.18280/isi.280605 158 Abdullahi, H.O., Mahmud, M., Hassan, A.A., Ali, A.F. A Bibliometric Analysis of the Evolution of IoT Applications in Smart Agriculture bibliometric analysis, Internet of Things (IoT), smart agriculture, smarting farming, science mapping 28, 6, 1495-1504https://doi.org/10.18280/isi.280606 Abdullahi, H.O., Mahmud, M., Hassan, A.A., Ali, A.F. (2023). A bibliometric analysis of the evolution of IoT applications in smart agriculture. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1495-1504. https://doi.org/10.18280/isi.280606 159 Hashmi, A., Nafis, M.T., Naaz, S., Nandan, D., Hussain, I. Predictive Modelling of Glycated Hemoglobin Levels Using Machine Learning Regressors diabetes, glycated hemoglobin, HbA1c, machine learning 28, 6, 1505-1513 https://doi.org/10.18280/isi.280607 Hashmi, A., Nafis, M.T., Naaz, S., Nandan, D., Hussain, I. (2023) Predictive modelling of glycated hemoglobin levels using machine learning regressors. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1505-1513. https://doi.org/10.18280/isi.280607 160 Rozikin, C., Buono, A., Wahjuni, S., Arif, C., Widodo. ANOVA-Artificial Bee Colony Algorithm-Driven Feature Selection for Classifying Downy Mildew Severity in Melon Leaves analysis of variance (ANOVA), artificial bee colony (ABC), ANOVA-ABC (AVABC) algorithm, downy mildew classification, feature selection, melon leaf disease, precision agriculture optimization 28, 6, 1515-1523https://doi.org/10.18280/isi.280608 Rozikin, C., Buono, A., Wahjuni, S., Arif, C., Widodo (2023) ANOVA-artificial bee colony algorithm-driven feature selection for classifying downy mildew severity in melon leaves. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1515-1523. https://doi.org/10.18280/isi.280608 161 Mohammad, M.T., Mahmood, H.A., Ali, Q.I. A Self-Powered IoT Platform with Security Mechanisms for Smart Agriculture Internet of Things (IoT), smart irrigation system, sustainability, secured system, self- powered system 28, 6, 1515-1523https://doi.org/10.18280/isi.280609 Mohammad, M.T., Mahmood, H.A., Ali, Q.I. (2023). A self- powered IoT platform with security mechanisms for smart agriculture. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1525-1532. https://doi.org/10.18280/isi.280609 162 Messaoudi, N., Hicham, H., Messaoud, M.T., Elkamel, H.M. Multi-Layer Consistency Validation of IoT Systems with UML Inheritance Dynamic Diagrams via SPIN Model Checking Büchi automata, IoT healthcare, IoT, inheritances, SPIN Model Checker, UML dynamic diagram, multi-layer UML consistency checking, model transformations 28, 6, 1533-1547https://doi.org/10.18280/isi.280610 Messaoudi, N., Hicham, H., Messaoud, M.T., Elkamel, H.M. (2023). Multi-layer consistency validation of IoT systems with UML inheritance dynamic diagrams via SPIN model checking. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1533-1547. https://doi.org/10.18280/isi.280610 163 Kolisnychenko, T., Sefikhanova, K., Kapral, O., Karpenko, V., Sylkin, O. Development of an Algorithm for Internet Marketing Strategy Implementation: A Case Study in the EU Hotel and Restaurant Sector Internet marketing, information technology, innovative methods, marketing information systems, Internet of Things, hotel and restaurant business, innovative method 28, 6, 1549-1556https://doi.org/10.18280/isi.280611 Kolisnychenko, T., Sefikhanova, K., Kapral, O., Karpenko, V., Sylkin, O. (2023). Development of an algorithm for Internet marketing strategy implementation: A case study in the EU hotel and restaurant sector. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1549-1556. https://doi.org/10.18280/isi.280611 164 Bhardwaj, V., Thakur, D., Gera, T., Sharma, V. Enhanced Dialectal Speech Recognition in Punjabi Using Pitch-Based Acoustic Modeling Automatic Speech Recognition (ASR), pitch, Punjabi language, speech signal processing, dialectal variations 28, 6, 1557-1563https://doi.org/10.18280/isi.280612 Bhardwaj, V., Thakur, D., Gera, T., Sharma, V. (2023). Enhanced dialectal speech recognition in Punjabi using pitch- based acoustic modeling. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1557-1563. https://doi.org/10.18280/isi.280612 165Kanungo, S., Jain, S. Hybrid Deep Neural Network G-LSTM for Sentiment Analysis on Twitter: A Novel Approach to Disaster Management disaster management, social media, deep learning, hybrid neural network 28, 6, 1565-1575https://doi.org/10.18280/isi.280613 Kanungo, S., Jain, S. (2023). Hybrid deep neural network G- LSTM for sentiment analysis on twitter: A novel approach to disaster management. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1565-1575. https://doi.org/10.18280/isi.280613 166 Sutoyo, Marsal, A., Hamzah, M.L., Anderjovi, S., Nazaruddin, Sarbaini. Enhancing Tourism in Riau Province through Augmented Reality and Near Field Communication-Enabled Smart Posters Internet of Things (IoT), smart poster, Augmented Reality (AR), Near Field Communication (NFC) 28, 6, 1577-1585https://doi.org/10.18280/isi.280614 Sutoyo, Marsal, A., Hamzah, M.L., Anderjovi, S., Nazaruddin, Sarbaini. (2023). Enhancing tourism in Riau Province through augmented reality and near field communication-enabled smart posters. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1577-1585. https://doi.org/10.18280/isi.280614 167 Prakosa, B.A., Hendrawan, A.H., Setiadi, I.H., Ritzkal, Riawan, I., Riana, F. Implementation of a Real-Time Wi-Fi Voucher Notification System Utilizing Telegram API Bot notification system, Wi-Fi voucher, effectiveness, telegram bot notification, wireless access network 28, 6, 1587-1596https://doi.org/10.18280/isi.280615 Prakosa, B.A., Hendrawan, A.H., Setiadi, I.H., Ritzkal, Riawan, I., Riana, F. (2023). Implementation of a real-time Wi-Fi voucher notification system utilizing telegram API bot. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1587-1596. https://doi.org/10.18280/isi.280615 168 Kryshtanovych, S., Ivanytska, O., Markova, M., Hliudzyk, Y., Ivanova, A. A Graphical Language-Based Approach for Database Modeling in Higher Education Information Systems language, database, information, model, process, education 28, 6, 1597-1603https://doi.org/10.18280/isi.280616 Kryshtanovych, S., Ivanytska, O., Markova, M., Hliudzyk, Y., Ivanova, A. (2023). A graphical language-based approach for database modeling in higher education information systems. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1597-1603. https://doi.org/10.18280/isi.280616 169Neha, K., Kumar, R. Enhancing Graduate Academic Performance Prediction and Classification: An Analysis Using the Enhanced Correlated Feature Set Model graduate performance, interlinked precedent academic performance, feature set, deep learning, feature correlation 28, 6, 1605-1612 https://doi.org/10.18280/isi.280617 Neha, K., Kumar, R. (2023). Enhancing graduate academic performance prediction and classification: An analysis using the enhanced correlated feature set model. Ingénierie des Systè mes d’Information, Vol. 28, No. 6, p. 1605-1612. https://doi.org/10.18280/isi.280617 170 Baqer, N.H., Sadiq, A.T., Ali, Z.H. Enhancement of Sentiment Analysis in Hotel Reviews Through Latent Semantic Indexing and Convolutional Neural Networks trip advisor, LSI, CNN, SVD, classification, standard evaluation metrics 28, 6, 1613-1618https://doi.org/10.18280/isi.280618 Baqer, N.H., Sadiq, A.T., Ali, Z.H. (2023). Enhancement of sentiment analysis in hotel reviews through latent semantic indexing and convolutional neural networks. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1613-1618. https://doi.org/10.18280/isi.280618 171 Saraswathi Devi, K.V.B., Srivenkatesh, M. Convolutional Neural Networks for Fault Detection in Grid-Connected Photovoltaic Panels fault detection, photovoltaic panel, deep neural networks, binary classification, multiclass classification, resilience 28, 6, 1619-1625 https://doi.org/10.18280/isi.280619 Saraswathi Devi, K.V.B., Srivenkatesh, M. (2023). Convolutional neural networks for fault detection in Grid- connected photovoltaic panels. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1619-1625. https://doi.org/10.18280/isi.280619 172 Shanmugam, G., Rajendran, D., Thanarajan, T., Murugaraj, S.S., Rajendran, S. Artificial Intelligence as a Catalyst in Digital Marketing: Enhancing Profitability and Market Potential artificial intelligence, digital marketing, income, sales transactions, customer information, informational media 28, 6, 1627-1636 https://doi.org/10.18280/isi.280620 Shanmugam, G., Rajendran, D., Thanarajan, T., Murugaraj, S.S., Rajendran, S. (2023). Artificial intelligence as a catalyst in digital marketing: Enhancing profitability and market potential. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1627-1636. https://doi.org/10.18280/isi.280620 173Alaqeeli, O. An Innovative Approach to Syntax-Free Interpretation in Functional Programming Languages functional programming, lexical analysis, syntax analysis, parse tree, compiler, interpreter, lucid 28, 6, 1637-1642https://doi.org/10.18280/isi.280621 Alaqeeli, O. (2023). An innovative approach to syntax-free interpretation in functional programming languages. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1637-1642. https://doi.org/10.18280/isi.280621 174 Dear, V., Dedi, N., Mardiani, A.S., Nugroho, H. Trends in IT Strategy Implementation: A Systematic Review Across Education and Industry (2000–2022) IT strategy, implementation, education, industry, bibliometric 28, 6, 1643-1651 https://doi.org/10.18280/isi.280622 Dear, V., Dedi, N., Mardiani, A.S., Nugroho, H. (2023). Trends in IT strategy implementation: A systematic review across education and industry (2000–2022). Ingénierie des Syst èmes d’Information, Vol. 28, No. 6, p. 1643-1651. https://doi.org/10.18280/isi.280622 175 Rahmatulloh, A., Supriatna, G.T., Widiyasono, N., Darmawan, I. IoT-Enabled Water Distribution Monitoring: A Sensor-Based Analytical Model device integration, distribution, monitoring, Thinger.io, water pressure 28, 6, 1653-1661https://doi.org/10.18280/isi.280623 Rahmatulloh, A., Supriatna, G.T., Widiyasono, N., Darmawan, I. (2023). IoT-enabled water distribution monitoring: A sensor- based analytical model. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1653-1661. https://doi.org/10.18280/isi.280623 176 Sanamdikar, S.T., Patil, S.A., Patil, D.O., Borawake, M.P. Enhanced Detection of Diabetic Retinopathy Using Ensemble Machine Learning: A Comparative Study machine learning, ensemble learning, deep learning and retinopathy in diabetics, deep convolutional neural networks (DCNNs), Messidor dataset 28, 6, 1663-1668https://doi.org/10.18280/isi.280624 Sanamdikar, S.T., Patil, S.A., Patil, D.O., Borawake, M.P. (2023). Enhanced detection of Diabetic Retinopathy using ensemble machine learning: A comparative study. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1663-1668. https://doi.org/10.18280/isi.280624 177 Hashmi, S.S., Abdul, A.M., Mohammad, A.A.K., Atheeq, C., Chinapaga, R. Advancing Secure Mobile Cloud Computing: A Chaotic Maps-Based Password Key Agreement Protocol security, authentication, key agreement, Mobile Cloud Computing (MCC), AVISPA, Chaotic Maps, mutual authentication 28, 6, 1669-1678https://doi.org/10.18280/isi.280625 Hashmi, S.S., Abdul, A.M., Mohammad, A.A.K., Atheeq, C., Chinapaga, R. (2023). Advancing secure mobile cloud computing: A Chaotic Maps-based password key agreement protocol. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1669-1678. https://doi.org/10.18280/isi.280625 178Lee, C., Kartowisastro, I.H. Enhancing Identity Document Classification in KYC Processes: An Evaluation of the Bag-of-Visual-Words Model and Segmentation Impact Lee, C., Kartowisastro, I.H.28, 6, 1679-1687https://doi.org/10.18280/isi.280626 Lee, C., Kartowisastro, I.H. (2023). Enhancing identity document classification in KYC processes: An evaluation of the Bag-of-Visual-Words model and segmentation impact. Ing énierie des Systèmes d’Information, Vol. 28, No. 6, p. 1679- 1687. https://doi.org/10.18280/isi.280626 179 Krupa, O., Dydiv, I., Borutska, Y., Yatsko, M., Bazyka, S. Evaluating E-Business Performance in Tourism Within the Digital Era: A Novel Information System Model information, E-commerce, digitalization, cash flows, E-business, tourism, system 28, 6, 1689-1694https://doi.org/10.18280/isi.280627 Krupa, O., Dydiv, I., Borutska, Y., Yatsko, M., Bazyka, S. (2023). Evaluating E-business performance in tourism within the digital era: A novel information system model. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1689-1694. https://doi.org/10.18280/isi.280627 180 Premkumar, M., Rajakumar, S., Subraja, R. Signal Processing Algorithms for Mean Square Error Analysis in MIMO Wireless Transceivers mean square error, least squares, minimum mean square error, maximum likelihood, multiple input multiple output, transceiver 28, 6, 1695-1700https://doi.org/10.18280/isi.280628 Premkumar, M., Rajakumar, S., Subraja, R. (2023). Signal processing algorithms for mean square error analysis in MIMO wireless transceivers. Ingénierie des Systèmes d’ Information, Vol. 28, No. 6, p. 1695-1700. https://doi.org/10.18280/isi.280628 181 Makkulawu, A.R., Soemarno, Santoso, I., Mustaniroh, S.A. Exploring the Potential and Benefits of AHP and GIS Integration for Informed Decision-Making: A Literature Review Analytic Hierarchy Process (AHP), Geographic Information Systems (GIS), location, spatial decision-making 28, 6, 1701-1708https://doi.org/10.18280/isi.280629 Makkulawu, A.R., Soemarno, Santoso, I., Mustaniroh, S.A. (2023). Exploring the potential and benefits of AHP and GIS integration for informed decision-making: A literature review. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1701-1708. https://doi.org/10.18280/isi.280629 182 Khaleel, A.H., Abbas, T.H., Ibrahim, A.W.S. Enhancing Human-Computer Interaction: A Comprehensive Analysis of Assistive Virtual Keyboard Technologies computer vision, eye-gazing, eye-tracking, human-computer interaction, virtual keyboard layout 28, 6, 1709-1717https://doi.org/10.18280/isi.280630 Khaleel, A.H., Abbas, T.H., Ibrahim, A.W.S. (2023). Enhancing human-computer interaction: A comprehensive analysis of assistive virtual keyboard technologies. Ingénierie des Systèmes d’Information, Vol. 28, No. 6, p. 1709-1717. https://doi.org/10.18280/isi.280630 183 Subhi, M.I., Al-Doori, Q., Alani, O. Enhancing Data Communication Performance: A Comprehensive Review and Evaluation of LDPC Decoder Architectures Error Correction Codes (ECC), Field Programmable Gate Array (FPGA), Low- Density Parity-Check codes decoding algorithms, Low-Density Parity-Check codes (encoder/decoder), Parity Check Matrix (PCM) 28, 5, 1113-1125https://doi.org/10.18280/isi.280501 Subhi, M.I., Al-Doori, Q., Alani, O. (2023). Enhancing data communication performance: A comprehensive review and evaluation of LDPC decoder architectures. Ingénierie des Systè mes d’Information, Vol. 28, No. 5, p. 1113-1125. https://doi.org/10.18280/isi.280501 184 Bruschetti, F.S., Guevara, J., Abeledo, M.C., Priano, D.A. An Empirical Evaluation of Automated Configuration Tools for Software- Defined Networking: A Usability and Performance Perspective SDN, computer networks, software-defined networking, network management, software tools, network configuration scripting, configuration management 28, 5, 1127-1134 https://doi.org/10.18280/isi.280502 Bruschetti, F.S., Guevara, J., Abeledo, M.C., Priano, D.A. (2023). An empirical evaluation of automated configuration tools for software-defined networking: A usability and performance perspective. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1127-1134. https://doi.org/10.18280/isi.280502 185 Boumaza, F., Benyamina, A.E.H., Zouache, D., Abualigah, L., Alsayat, A. An Improved Harris Hawks Optimization Algorithm Based on Bi- Goal Evolution and Multi-Leader Selection Strategy for Multi-Objective Optimization Harris Hawks Optimization, multi-objective optimization, Bi-Goal Evolution, pareto front, swarm intelligence, diversity, convergence 28, 5, 1135-1150https://doi.org/10.18280/isi.280503 Boumaza, F., Benyamina, A.E.H., Zouache, D., Abualigah, L., Alsayat, A. (2023). An improved Harris Hawks Optimization algorithm based on Bi-Goal Evolution and multi-leader selection strategy for multi-objective optimization. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1135-1150. https://doi.org/10.18280/isi.280503 186 Alhuseen, Z.A.A., Joda, F.A., Naser, M.A. Abnormal Behavior Detection in Gait Analysis Using Convolutional Neural Networks abnormal behavior detection, gait analysis, deep learning, feature extraction, local spatial features, Center Symmetric Local Binary Pattern (CS-LBP), Convolutional Neural Network (CNN) 28, 5, 1151-1159 https://doi.org/10.18280/isi.280504 Alhuseen, Z.A.A., Joda, F.A., Naser, M.A. (2023). Abnormal behavior detection in gait analysis using convolutional neural networks. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1151-1159. https://doi.org/10.18280/isi.280504 187 Anji Reddy, K., Regula, T., Sharmila, K., Srinivas, P.V.V.S., Ziaur Rahman, S. Performance Enhancement in Facial Emotion Classification Through Noise- Injected FERCNN Model: A Comparative Analysis Facial Emotion Recognition (FER), Convolutional Neural Network (CNN), ANN, image injected with noise, computational costs, image classification 28, 5, 1161-1175 https://doi.org/10.18280/isi.280505 Anji Reddy, K., Regula, T., Sharmila, K., Srinivas, P.V.V.S., Ziaur Rahman, S. (2023). Performance enhancement in facial emotion classification through noise-injected FERCNN model: A comparative analysis. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1161-1175. https://doi.org/10.18280/isi.280505 188Berbiche, N., El Alami, J. Enhancing Anomaly-Based Intrusion Detection Systems: A Hybrid Approach Integrating Feature Selection and Bayesian Hyperparameter Optimization Anomaly-Based Intrusion Detection System (IDS), feature selection, feature importance, Hyperparameter Optimization (HPO), Bayesian Optimization (BO), Machine Learning (ML), Extreme Gradient Boosting (XGBoost), Stochastic Gradient Descent (SGD) 28, 5, 1177-1195https://doi.org/10.18280/isi.280506 Berbiche, N., El Alami, J. (2023). Enhancing anomaly-based Intrusion Detection Systems: A hybrid approach integrating feature selection and Bayesian Hyperparameter Optimization. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1177-1195. https://doi.org/10.18280/isi.280506 189 Herwin, H., Prasojo, L.D., Saptono, B., Dahalan, S.C. Analyzing the Impact of Augmented Reality on Student Motivation: A Time Series Study in Elementary Education Augmented Reality, elementary education, student motivation, quantitative analysis, trend analysis 28, 5, 1197-1203 https://doi.org/10.18280/isi.280507 Herwin, H., Prasojo, L.D., Saptono, B., Dahalan, S.C. (2023). Analyzing the impact of augmented reality on student motivation: A time series study in elementary education. Ingé nierie des Systèmes d’Information, Vol. 28, No. 5, p. 1197- 1203. https://doi.org/10.18280/isi.280507 190 Widaningsih, S., Muhamad, W., Hendriyanto, R., Nugroho, H. An ID3 Decision Tree Algorithm- Based Model for Predicting Student Performance Using Comprehensive Student Selection Data at Telkom University student performance, decision tree, classification, Iterative Dichotomiser 3 (ID3), higher education 28, 5, 1205-1212https://doi.org/10.18280/isi.280508 Widaningsih, S., Muhamad, W., Hendriyanto, R., Nugroho, H. (2023). An ID3 decision tree algorithm-based model for predicting student performance using comprehensive student selection data at Telkom University. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1205-1212. https://doi.org/10.18280/isi.280508 191 Abd Al-Ameer, A.A., Bhaya, W.S. Enhanced Intrusion Detection in Software-Defined Networks Through Federated Learning and Deep Learning artificial intelligence, federated learning, software-defined networks, deep learning, network security, privacy 28, 5, 1213-1220https://doi.org/10.18280/isi.280509 Abd Al-Ameer, A.A., Bhaya, W.S. (2023). Enhanced intrusion detection in software-defined networks through federated learning and deep learning. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1213-1220. https://doi.org/10.18280/isi.280509 192 Ritzkal, R., Prakosa, B.A., Munandar, I.P.A., Amalia, P.P., Hendrawan, A.H., Kamilah, N. Remote-Controlled Bluetooth-Enabled Smart Shopping Cart: Prototype and Evaluation Internet of Things, automation, remote control, prototyping, shopping cart, Bluetooth 28, 5, 1221-1228https://doi.org/10.18280/isi.280510 Ritzkal, R., Prakosa, B.A., Munandar, I.P.A., Amalia, P.P., Hendrawan, A.H., Kamilah, N. (2023). Remote-controlled bluetooth-enabled smart shopping cart: Prototype and evaluation. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1221-1228. https://doi.org/10.18280/isi.280510 193 Kudithipudi, S., Narisetty, N., Kancherla, G.R., Bobba, B. Evaluating the Efficacy of Resampling Techniques in Addressing Class Imbalance for Network Intrusion Detection Systems Using Support Vector Machines class imbalance, Network Intrusion Detection Systems, resampling methods, cloud computing, Canadian Institute for Cyber Security Intrusion Detection dataset- 2017, Support Vector Machine (SVM) classifier 28, 5, 1229-1236https://doi.org/10.18280/isi.280511 Kudithipudi, S., Narisetty, N., Kancherla, G.R., Bobba, B. (2023). Evaluating the efficacy of resampling techniques in addressing class imbalance for Network Intrusion Detection Systems using support vector machines. Ingénierie des Systè mes d’Information, Vol. 28, No. 5, p. 1229-1236. https://doi.org/10.18280/isi.280511 194 Barlybayev, A., Sankibayev, A., Kadyr, Y., Amangeldy, N., Sabyrov, T. Predicting Used-Vehicle Resale Value in Developing Markets: Application of Machine Learning Models to the Kazakhstan Car Market Kazakhstan car market, used car price prediction, linear regression, decision tree regression, SVM, neural network, bagged trees 28, 5, 1237-1246https://doi.org/10.18280/isi.280512 Barlybayev, A., Sankibayev, A., Kadyr, Y., Amangeldy, N., Sabyrov, T. (2023). Predicting used-vehicle resale value in developing markets: Application of machine learning models to the Kazakhstan car market. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1237-1246. https://doi.org/10.18280/isi.280512 195 Yadav, S., Bhardwaj, V., Thakur, D., Sharma, V. Enhancing Robotic Process Automation Task Selection: An Integrated Approach Leveraging Process Mining and Feature Extraction Robotic Process Automation (RPA), process mining, task selection, robotics, process discovery, task prioritization 28, 5, 1247-1254https://doi.org/10.18280/isi.280513 Yadav, S., Bhardwaj, V., Thakur, D., Sharma, V. (2023). Enhancing robotic process automation task selection: An integrated approach leveraging process mining and feature extraction. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1247-1254. https://doi.org/10.18280/isi.280513 196 Gupta, T., Verma, G., Akhter, S. Performance Analysis of a Generic Modular Adder via RTL Programming and IP Modeling Techniques on FPGA IP modeling, RTL, area, power, FPGA, modular adder 28, 5, 1255-1263https://doi.org/10.18280/isi.280514 Gupta, T., Verma, G., Akhter, S. (2023). Performance analysis of a generic modular adder via RTL programming and IP modeling techniques on FPGA. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1255-1263. https://doi.org/10.18280/isi.280514 197 Llanos, A.A.H., Huatangari, L.Q., Meza, J.R.Y., Monteza, A.H. Leveraging Text Mining for Analyzing Students' Preferences in Computer Science and Language Courses decision making, educational policy, R language, students' preferences, text mining WEKA, word cloud 28, 5, 1265-1273https://doi.org/10.18280/isi.280515 Llanos, A.A.H., Huatangari, L.Q., Meza, J.R.Y., Monteza, A.H. (2023). Leveraging text mining for analyzing students' preferences in computer science and language courses. Ingé nierie des Systèmes d’Information, Vol. 28, No. 5, p. 1265- 1273. https://doi.org/10.18280/isi.280515 198 Parvez, M.T., Alsuhibani, A.M., Alamri, A.H. Educational and Cybersecurity Applications of an Arabic CAPTCHA Gamification System Arabic language learning, CAPTCHA solving, gamification, challenge-response system, cyber awareness, question answering 28, 5, 1275-1285https://doi.org/10.18280/isi.280516 Parvez, M.T., Alsuhibani, A.M., Alamri, A.H. (2023). Educational and cybersecurity applications of an Arabic CAPTCHA gamification system. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1275-1285. https://doi.org/10.18280/isi.280516 199 Fariz, A.A., Abouchabaka, J., Rafalia, N. Harnessing the Power of Cloud-Based Big Data Analytics for E-Government Advancement in Morocco: A Catalyst for Development E-government, big data egov, Morocco egov, big data analytics, cloud computing, digital government 28, 5, 1287-1298 https://doi.org/10.18280/isi.280517 Fariz, A.A., Abouchabaka, J., Rafalia, N. (2023). Harnessing the power of cloud-based big data analytics for e-government advancement in Morocco: A catalyst for development. Ingé nierie des Systèmes d’Information, Vol. 28, No. 5, p. 1287- 1298. https://doi.org/10.18280/isi.280517 200 Abd Al Hussen, S.A., Alsaadi, E.M.T.A. Automated Identification and Classification of Brain Tumors Using Hybrid Machine Learning Models and MRI Imaging brain tumor, machine learning, magnetic resonance imaging (MRI), segmentation, classification, VGG16 28, 5, 1299-1308https://doi.org/10.18280/isi.280518 Abd Al Hussen, S.A., Alsaadi, E.M.T.A. (2023). Automated identification and classification of brain tumors using hybrid machine learning models and MRI imaging. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1299-1308. https://doi.org/10.18280/isi.280518 201 Andry, J.F., Hadiyanto, Gunawan, V. Refining the ISO 9126 Model for Enhanced Decision Support System Evaluation in the Manufacturing Industry ISO 9126, decision support system, user acceptance testing 28, 5, 1309-1315 https://doi.org/10.18280/isi.280519 Andry, J.F., Hadiyanto, Gunawan, V. (2023). Refining the ISO 9126 model for enhanced decision support system evaluation in the manufacturing industry. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1309-1315. https://doi.org/10.18280/isi.280519 202 Dennison, R., Dennison, R., Dasebenezer, G.K., Chinnathurai, E.S. Enhancing Lifespan and Energy Efficiency in Mobile Smart Dust Networks Mobile Smart Dust Networks (MSDNs), network lifespan enhancement, Low-Energy Adaptive Clustering Hierarchy (LEACH), energy efficiency, clustering 28, 5, 1317-1323 https://doi.org/10.18280/isi.280520 Dennison, R., Dennison, R., Dasebenezer, G.K., Chinnathurai, E.S. (2023). Enhancing lifespan and energy efficiency in mobile smart dust networks. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1317-1323. https://doi.org/10.18280/isi.280520 203Lopes, A., Prakash, K.B. Artificial Intelligence and Machine Learning Approaches to Document Digitization in the Banking Industry: An Analysis digitization, OCR, automation, extraction, CNN, artificial intelligence, machine learning, banking industry 28, 5, 1325-1334https://doi.org/10.18280/isi.280521 Lopes, A., Prakash, K.B. (2023). Artificial intelligence and machine learning approaches to document digitization in the banking industry: An analysis. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1325-1334. https://doi.org/10.18280/isi.280521 204 Lubis, A.R., Lase, Y.Y., Rahman, D.A., Witarsyah, D. Improving Spell Checker Performance for Bahasa Indonesia Using Text Preprocessing Techniques with Deep Learning Models text preprocessing, Convolutional Neural Network (CNN), deep learning, performance, Bahasa Indonesia 28, 5, 1335-1342 https://doi.org/10.18280/isi.280522 Lubis, A.R., Lase, Y.Y., Rahman, D.A., Witarsyah, D. (2023). Improving spell checker performance for Bahasa Indonesia using text preprocessing techniques with deep learning models. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1335-1342. https://doi.org/10.18280/isi.280522 205 Al-Soufi, R.A., Mohammed, N.Y. Exploring the Impact of Electronic Management on Mitigating Organizational Conflict: An Examination at the Northern Technical University electronic management, e-management, administrative management, organizational conflict, Northern Technical University (NTU), administrative leaders, technology in management 28, 5, 1343-1352https://doi.org/10.18280/isi.280523 Al-Soufi, R.A., Mohammed, N.Y. (2023). Exploring the impact of electronic management on mitigating organizational conflict: An examination at the Northern Technical University. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1343-1352. https://doi.org/10.18280/isi.280523 206Tawfeeq, M.A. Optimizing Cluster Head Selection in Mobile Ad Hoc Networks: A Connectivity Probability Approach Using Poisson Distribution and Residual Energy cluster head, connectivity probability, mobile ah hoc network, network performance, network stability, poisson distribution, residual energy. 28, 5, 1353-1359https://doi.org/10.18280/isi.280524 Tawfeeq, M.A. (2023). Optimizing cluster head selection in mobile Ad Hoc Networks: A connectivity probability approach using poisson distribution and residual energy. Ingénierie des Systèmes d’Information, Vol. 28, No. 5, p. 1353-1359. https://doi.org/10.18280/isi.280524 207 Mbilong, P.M., Aarab, Z., Belouadha, F.Z., Kabbaj, M.I. Enhancing Fault Detection in CNC Machinery: A Deep Learning and Genetic Algorithm Approach industrial maintenance, long short-term memory, convolutional neural network, residual network, variational autoencoder, genetic algorithm, predictive maintenance, fault detection 28, 5, 1361-1375https://doi.org/10.18280/isi.280525 Mbilong, P.M., Aarab, Z., Belouadha, F.Z., Kabbaj, M.I. (2023). Enhancing fault detection in CNC machinery: A deep learning and genetic algorithm approach. Ingénierie des Systè mes d’Information, Vol. 28, No. 5, p. 1361-1375. https://doi.org/10.18280/isi.280525 208 Sanamdikar, S.T., Shelke, M.V., Rothe, J.P. Enhanced Classification of Diabetic Retinopathy via Vessel Segmentation: A Deep Ensemble Learning Approach diabetic retinopathy, vessel segmentation, deep ensemble learning, computer vision, DRIVE dataset, Canny operator, blood vessel segmentation 28, 5, 1377-1386https://doi.org/10.18280/isi.280526 Sanamdikar, S.T., Shelke, M.V., Rothe, J.P. (2023). Enhanced classification of diabetic retinopathy via vessel segmentation: A deep ensemble learning approach. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1377-1386. https://doi.org/10.18280/isi.280526 209 Khrushch, N., Grytsyshen, D., Baranovska, T., Hrabchuk, I., Shevchuk, O. An Information Algorithm: Advancing Financial Intelligence Management for Economic Security information modeling, algorithm, system, security, intelligence, financial intelligence management 28, 5, 1387-1394https://doi.org/10.18280/isi.280527 Khrushch, N., Grytsyshen, D., Baranovska, T., Hrabchuk, I., Shevchuk, O. (2023). An information algorithm: Advancing financial intelligence management for Eeconomic security. Ingé nierie des Systèmes d’Information, Vol. 28, No. 5, p. 1387- 1394. https://doi.org/10.18280/isi.280527 210 Sanamdikar, S.T., Shelke, M.V., Rothe, J.P. An Advanced Hybrid Meta-Heuristic Model for Solar Power Generation Forecasting via Ensemble Deep Learning diabetic retinopathy, vessel segmentation, deep ensemble learning, computer vision, DRIVE dataset, Canny operator, blood vessel segmentation 28, 5, 1395-1407https://doi.org/10.18280/isi.280528 Sanamdikar, S.T., Shelke, M.V., Rothe, J.P. (2023). Enhanced classification of diabetic retinopathy via vessel segmentation: A deep ensemble learning approach. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1377-1386. https://doi.org/10.18280/isi.280526 211 Trabelsi, F.Z., Khtira, A., El Asri, B. Employing Data and Process Mining Techniques for Redundancy Detection and Analystics in Business Processes business process, modeling, process mining, similarity detection, data mining, process redundancy, business process optimization, cost reduction 28, 5, 1409-1421https://doi.org/10.18280/isi.280529 Trabelsi, F.Z., Khtira, A., El Asri, B. (2023). Employing data and process mining techniques for redundancy detection and analystics in business processes. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1409-1421. https://doi.org/10.18280/isi.280529 212 Widiantoro, A.D., Mustafid, M., Sanjaya, R. Leveraging Latent Dirichlet Allocation for Feature Extraction in User Comments: Enhancements to User- Centered Design in Indonesian Financial Technology Latent Dirichlet Allocation (LDA), feature extraction, Financial Technology (FinTech), User-Centered Design (UCeD), topic modelling 28, 5, 1423-1433https://doi.org/10.18280/isi.280530 Widiantoro, A.D., Mustafid, M., Sanjaya, R. (2023). Leveraging Latent Dirichlet Allocation for feature extraction in user comments: Enhancements to User-Centered Design in Indonesian Financial Technology. Ingénierie des Systèmes d’ Information, Vol. 28, No. 5, p. 1423-1433. https://doi.org/10.18280/isi.280530 213 Herrouz, A., Djoudi, M., Degha, H.E., Boukanoun, B. An Autonomous Multi-Agent System for Customized Scientific Literature Recommendation: A Tool for Researchers and Students multi-agent system, ontology, personalized information filtering, recommendation system, scientific paper, search engine, usability, user interface 28, 4, 799-814 https://doi.org/10.18280/isi.280401 Herrouz, A., Djoudi, M., Degha, H.E., Boukanoun, B. (2023). An autonomous multi-agent system for customized scientific literature recommendation: A tool for researchers and students. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 799-814. https://doi.org/10.18280/isi.280401 214 Okokpujie, K., Okokpujie, I.P., Subair, R.E., Simonyan, E.O., Akingunsoye, A.V. Designing an Adaptive Age-Invariant Face Recognition System for Enhanced Security in Smart Urban Environments biometric, smart city, FG-NET ad, Age Invariant Face Recognition (AIFR), surveillance cameras, convolutional neutral network, data augmentation 28, 4, 815-822 https://doi.org/10.18280/isi.280402 Okokpujie, K., Okokpujie, I.P., Subair, R.E., Simonyan, E.O., Akingunsoye, A.V. (2023). Designing an adaptive Age- Invariant Face recognition system for enhanced security in smart urban environments. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 815-822. https://doi.org/10.18280/isi.280402 215 Sugiharto, W.H., Susanto, H., Prasetijo, A.B. Real-Time Water Quality Assessment via IoT: Monitoring pH, TDS, Temperature, and Turbidity water quality assessment, Internet of Things (IoT), wireless sensor networks, integrated sensor systems 28, 4, 823-831 https://doi.org/10.18280/isi.280403 Sugiharto, W.H., Susanto, H., Prasetijo, A.B. (2023). Real- time water quality assessment via IoT: Monitoring pH, TDS, temperature, and turbidity. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 823-831. https://doi.org/10.18280/isi.280403 216 Bouhaddour, S., Saadi, C., Bouabdallaoui, I., Sbihi, M., Guerouate, F. A Novel Hybrid Approach for Daily Tourism Arrival Forecasting: The PROPHET-Bayesian Gaussian Process- Forward Neural Network Model Bayesian Gaussian process, COVID-19, Forward Neural Network, forecasting, Hawaii, PROPHET, tourism arrivals 28, 4, 833-842 https://doi.org/10.18280/isi.280404 Bouhaddour, S., Saadi, C., Bouabdallaoui, I., Sbihi, M., Guerouate, F. (2023). A novel hybrid approach for daily tourism arrival forecasting: The PROPHET-Bayesian Gaussian Process-Forward Neural Network model. Ingénierie des Systè mes d’Information, Vol. 28, No. 4, p. 833-842. https://doi.org/10.18280/isi.280404 217Supase, S.S., Pansare, J.R. A Robust, Preference-Based Coordinator Election Algorithm for Distributed Systems distributed system, peer-to-peer system, Fault-Tolerant Coordinator Election Algorithm (FTCEA), preference-based voting algorithm 28, 4, 843-851 https://doi.org/10.18280/isi.280405 Supase, S.S., Pansare, J.R. (2023). A robust, preference-based coordinator election algorithm for distributed systems. Ingé nierie des Systèmes d’Information, Vol. 28, No. 4, p. 843- 851. https://doi.org/10.18280/isi.280405 218 Aradea, A., Rianto, R., Mubarok, H., Darmawan, I. Deep Learning-based Regional Plant Type Recommendation System for Enhancing Agricultural Productivity agricultural, deep learning, Convolutional Neural Network (CNN), recommender system, plant type, Adagrad optimizer 28, 4, 853-859 https://doi.org/10.18280/isi.280406 Aradea, A., Rianto, R., Mubarok, H., Darmawan, I. (2023). Deep learning-based regional plant type recommendation system for enhancing agricultural productivity. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 853-859. https://doi.org/10.18280/isi.280406 219Rao, B.M., Hussain, M.A. Feature Importance Analysis for Glucose Level Detection in Type 2 Diabetes Using Machine Learning type 2 diabetes, glucose levels detection, machine learning, physiological parameters, random forest classifier, performance metrics 28, 4, 861-867 https://doi.org/10.18280/isi.280407 Rao, B.M., Hussain, M.A. (2023). Feature importance analysis for glucose level detection in type 2 diabetes using machine learning. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 861-867. https://doi.org/10.18280/isi.280407 220 Rayavarapu, S.M., Prasanthi, T.S., Kumar, G.S., Rao, G.S., Singham, A. Employing Generative Networks for Synthetic Phonocardiogram and Electrocardiogram Signal Creation: A Privacy-Ensured Approach to Data Augmentation in Heart Diagnostics auscultation, data augmentation, electrocardiogram, generative networks, phonocardiogram, synthetic data generation 28, 4, 869-875https://doi.org/10.18280/isi.280408 Rayavarapu, S.M., Prasanthi, T.S., Kumar, G.S., Rao, G.S., Singham, A. (2023). Employing generative networks for synthetic phonocardiogram and electrocardiogram signal creation: A privacy-ensured approach to data augmentation in heart diagnostics. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 869-875. https://doi.org/10.18280/isi.280408 221 Kanawade, B., Surve, J., Khonde, S.R., Khedkar, S.P., Pansare, J.R., Patil, B., Pisal, S., Deshpande, A. Automated Human Recognition in Surveillance Systems: An Ensemble Learning Approach for Enhanced Face Recognition face recognition surveillance system, face recognition & verification, ensemble learning, FaceNet, FaceNet-512, VGGFace, Dlib, ArcFace 28, 4, 877-885 https://doi.org/10.18280/isi.280409 Kanawade, B., Surve, J., Khonde, S.R., Khedkar, S.P., Pansare, J.R., Patil, B., Pisal, S., Deshpande, A. (2023). Automated human recognition in surveillance systems: An ensemble learning approach for enhanced face recognition. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 877-885. https://doi.org/10.18280/isi.280409 222 Asqolani, I.A., Setiawan, E.B. Hybrid Deep Learning Approach and Word2Vec Feature Expansion for Cyberbullying Detection on Indonesian Twitter cyberbullying detection, hybrid deep learning, feature expansion, Word2Vec 28, 4, 887-895 https://doi.org/10.18280/isi.280410 Asqolani, I.A., Setiawan, E.B. (2023). Hybrid deep learning approach and Word2Vec feature expansion for cyberbullying detection on Indonesian twitter. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 887-895. https://doi.org/10.18280/isi.280410 223 Aza-Espinosa, M.J., Herrera- Granda, E.P., Ibarra-Rosero, M. DeepBrucel: A Deep Learning Approach for Automated Risk Detection of Brucellosis in Cattle Farms in Ecuador automatic brucellosis diagnosis, Neural Networks Brucellosis Diagnosis, multivariate diagnostic techniques 28, 4, 897-920 https://doi.org/10.18280/isi.280411 Aza-Espinosa, M.J., Herrera-Granda, E.P., Ibarra-Rosero, M. (2023). DeepBrucel: A deep learning approach for automated risk detection of Brucellosis in cattle farms in Ecuador. Ingé nierie des Systèmes d’Information, Vol. 28, No. 4, p. 897- 920. https://doi.org/10.18280/isi.280411 224Abdulateef, A.T., Makki, S.A. Enhancing Indoor Navigation Accuracy with a Smartphone-Based Pedometer System Indoor Navigation Systems (INS), pedometer accelerometer orientation, Direction Cosine Matrix, step detection, Pedestrian Dead Reckoning (PDR), Root Mean Square Error, smartphone sensors, indoor positioning 28, 4, 921-930 https://doi.org/10.18280/isi.280412 Abdulateef, A.T., Makki, S.A. (2023). Enhancing indoor navigation accuracy with a smartphone-based pedometer system. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 921-930. https://doi.org/10.18280/isi.280412 225Almamoori, A.A., Bhaya, W.S. Hybrid Deep Learning Approach Utilizing RNN and LSTM for the Detection of DDoS Attacks Within the Bitcoin Ecosystem blockchain, cryptocurrency exchange, deep learning, Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), Conditional Table Generative Adversarial Network (CTGAN) 28, 4, 931-937 https://doi.org/10.18280/isi.280413 Almamoori, A.A., Bhaya, W.S. (2023). Hybrid deep learning approach utilizing RNN and LSTM for the detection of DDoS attacks within the Bitcoin ecosystem. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 931-937. https://doi.org/10.18280/isi.280413 226 Muhariya, A., Riadi, I., Prayudi, Y., Saputro, I.A. Utilizing K-Means Clustering for the Detection of Cyberbullying Within Instagram Comments social media, Instagram, cyberbullying, tf- idf, K-means, threshold, comments analysis 28, 4, 939-949 https://doi.org/10.18280/isi.280414 Muhariya, A., Riadi, I., Prayudi, Y., Saputro, I.A. (2023). Utilizing K-means clustering for the detection of cyberbullying within instagram comments. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 939-949. https://doi.org/10.18280/isi.280414 227Karyonov, M. Accelerating Code Assembly: Exploiting Heterogeneous Computing Architectures for Optimization computer technology, software development, informatics, digital technologies, typical block diagram, programming 28, 4, 951-958 https://doi.org/10.18280/isi.280415 Karyonov, M. (2023). Accelerating code assembly: Exploiting heterogeneous computing architectures for optimization. Ingé nierie des Systèmes d’Information, Vol. 28, No. 4, p. 951- 958. https://doi.org/10.18280/isi.280415 228Khan, M.A.A., Kaidi, H.M. A Comprehensive Survey of Machine Learning Techniques in Next- Generation Wireless Networks and the Internet of Things Internet of Things (IoT), Machine Learning (ML), quality of service, deep learning, reinforcement learning, 5G and beyond, next-generation wireless networks 28, 4, 959-967 https://doi.org/10.18280/isi.280416 Khan, M.A.A., Kaidi, H.M. (2023). A comprehensive survey of machine learning techniques in next-generation wireless networks and the Internet of Things. Ingénierie des Systèmes d ’Information, Vol. 28, No. 4, p. 959-967. https://doi.org/10.18280/isi.280416 229 Alazzam, F.A.F., Shakhatreh, H.J.M., Gharaibeh, Z.I.Y., Didiuk, I., Sylkin, O. Developing an Information Model for E-Commerce Platforms: A Study on Modern Socio-Economic Systems in the Context of Global Digitalization and Legal Compliance information, E-Commerce, platform, model, modern systems, digitalization, data analysis, user experience 28, 4, 969-974 https://doi.org/10.18280/isi.280417 Alazzam, F.A.F., Shakhatreh, H.J.M., Gharaibeh, Z.I.Y., Didiuk, I., Sylkin, O. (2023). Developing an information model for E-Commerce platforms: A study on modern socio-economic systems in the context of global digitalization and legal compliance. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 969-974. https://doi.org/10.18280/isi.280417 230 AlTuraif, R.K., AlSanad, D.S., AlSharifi, N.F., Almuaili, A.A. Exploring the Catalysts and Components of Gamification in Enterprise: A Systematic Literature Review literature review, gamification, employee engagement, customer experience, gamification drivers, gamification elements 28, 4, 975-992 https://doi.org/10.18280/isi.280418 AlTuraif, R.K., AlSanad, D.S., AlSharifi, N.F., Almuaili, A.A. (2023). Exploring the catalysts and components of gamification in enterprise: A systematic literature review. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 975-992. https://doi.org/10.18280/isi.280418 231 Alimi, S., Kuyoro, A.O., Eze, M.O., Akande, O. Utilizing Deep Learning and SVM Models for Schizophrenia Detection and Symptom Severity Estimation Through Structural MRI schizophrenia, detection, severity, support vector, deep learning, Magnetic Resonance Imaging (MRI), regression 28, 4, 993-1002 https://doi.org/10.18280/isi.280419 Alimi, S., Kuyoro, A.O., Eze, M.O., Akande, O. (2023). Utilizing deep learning and SVM models for schizophrenia detection and symptom severity estimation through structural MRI, Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 993-1002. https://doi.org/10.18280/isi.280419 232 Yassen, M.S., Abdulrazzq, R.A., Mohammed, A.B. Employing Hybrid ANOVA-RFE with Machine and Deep Learning Models for Enhanced IoT and IIoT Attack Detection and Classification attack detection, Internet of Things (IoT) security, feature selection, machine learning, deep learning 28, 4, 1003-1012 https://doi.org/10.18280/isi.280420 Yassen, M.S., Abdulrazzq, R.A., Mohammed, A.B. (2023). Employing hybrid ANOVA-RFE with machine and deep learning models for enhanced IoT and IIoT attack detection and classification. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 1003-1012. https://doi.org/10.18280/isi.280420 233 Veesam, V.S., Ravichandran, S., Gatram, R.M.B. Deep Learning-Based Prediction of Age and Gender from Facial Images automatic gender classification, computer vision, artificial intelligence, Deep Convolutional Neural Network (DCNN), face recognition, deep learning 28, 4, 1013-1018https://doi.org/10.18280/isi.280421 Veesam, V.S., Ravichandran, S., Gatram, R.M.B. (2023). Deep learning-based prediction of age and gender from facial images. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 1013-1018. https://doi.org/10.18280/isi.280421 234Shyam, D.N.M., Hussain, M.A. A Naive Bayes-Driven Mechanism for Mitigating Packet-Dropping Attacks in Autonomous Wireless Networks packet-dropping, malicious attacks, system faults, Intrusion Detection Systems (IDS), MANETs, and naive bayes 28, 4, 1019-1027 https://doi.org/10.18280/isi.280422 Shyam, D.N.M., Hussain, M.A. (2023). A naive bayes-driven mechanism for mitigating packet-dropping attacks in autonomous wireless networks. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 1019-1027. https://doi.org/10.18280/isi.280422 235 Gandikota, H.P., Abirami, S., Kumar, M.S. An Enhanced Approach to Liver Disease Classification: Implementing Convolutional Neural Network with Attention Layer Gated Recurrent Unit Attention Layer Gated Recurrent Unit (AGRU), context vector, Convolutional Neural Network (CNN), energy vector normalization, and liver disease classification 28, 4, 1029-1037 https://doi.org/10.18280/isi.280423 Gandikota, H.P., Abirami, S., Kumar, M.S. (2023). An enhanced approach to liver disease classification: implementing convolutional neural network with attention layer gated recurrent unit. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 1029-1037. https://doi.org/10.18280/isi.280423 236 Mansour, A.M.O., Obeidat, M.A.A., Abdallah, J.M.Y. A Multi-Agent Systems Approach for Optimized Biomedical Literature Search Multi-Agent Systems (MAS), literature search, recommender system 28, 4, 1039-1053 https://doi.org/10.18280/isi.280424 Mansour, A.M.O., Obeidat, M.A.A., Abdallah, J.M.Y. (2023). A multi-agent systems approach for optimized biomedical literature search. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 1039-1053. https://doi.org/10.18280/isi.280424 237 Haseeb, E.H., Kadhim, S.A., Mahmood, A.S. A Six-Dimensional Hyperchaotic Pseudorandom Sequence for Enhanced Voice Encryption voice encryption, hyperchaotic system, pseudo-random number sequence, Libri- Speech dataset, performance evaluation, speech security 28, 4, 1055-1062 https://doi.org/10.18280/isi.280425 Haseeb, E.H., Kadhim, S.A., Mahmood, A.S. (2023). A six- dimensional hyperchaotic pseudorandom sequence for enhanced voice encryption. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 1055-1062. https://doi.org/10.18280/isi.280425 238 Reddy, N.V.R.S., Chitteti, C., Yesupadam, S., Desanamukula, V.S., Vellela, S.S., Bommagani, N.J. Enhanced Speckle Noise Reduction in Breast Cancer Ultrasound Imagery Using a Hybrid Deep Learning Model breast cancer, fundamental convolutional neural network ultrasound images, improved noise removal, speckle noise, Fundamental Convolutional Neural Network (FCNN) 28, 4, 1063-1071 https://doi.org/10.18280/isi.280426 Reddy, N.V.R.S., Chitteti, C., Yesupadam, S., Desanamukula, V.S., Vellela, S.S., Bommagani, N.J. (2023). Enhanced speckle noise reduction in breast cancer ultrasound imagery using a hybrid deep learning model. Ingénierie des Systèmes d’ Information, Vol. 28, No. 4, p. 1063-1071. https://doi.org/10.18280/isi.280426 239 Sacharisa, S., Kartowisastro, I.H. Enhanced Spine Segmentation in Scoliosis X-ray Images via U-Net image segmentation, Region of Interest (ROI), scoliosis, U-Net 28, 4, 1073-1079 https://doi.org/10.18280/isi.280427 Sacharisa, S., Kartowisastro, I.H. (2023). Enhanced spine segmentation in scoliosis X-ray images via U-Net. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 1073-1079. https://doi.org/10.18280/isi.280427 240Atig, Y., Zahaf, A., Khiati, N. Temporal Dimensions of Quality in Knowledge Graph Evolution: A Comprehensive Review knowledge graph, data quality, Knowledge Graphs (KGs) evolution, temporal challenges, time representation 28, 4, 1081-1090 https://doi.org/10.18280/isi.280428 Atig, Y., Zahaf, A., Khiati, N. (2023). Temporal dimensions of quality in knowledge graph evolution: A comprehensive review. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 1081-1090. https://doi.org/10.18280/isi.280428 241Kangala, V.K., Ramisetty, R.R. A Fractional Ebola Optimization Search Algorithm Approach for Enhanced Speaker Diarization speech signal, speaker diarization, Fractional Calculus (FC), deep learning, Ebola Optimization Search Algorithm (EOSA) 28, 4, 1091-1106 https://doi.org/10.18280/isi.280429 Kangala, V.K., Ramisetty, R.R. (2023). A fractional Ebola optimization search algorithm approach for enhanced speaker diarization. Ingénierie des Systèmes d’Information, Vol. 28, No. 4, p. 1091-1106. https://doi.org/10.18280/isi.280429 242 Imaduddin, H., Kusumaningtias, L.A., A'la, F.Y. Application of LSTM and GloVe Word Embedding for Hate Speech Detection in Indonesian Twitter Data deep learning, GloVe, hate speech, Long Short-Term Memory (LSTM), Natural Language Processing (NLP), twitter 28, 4, 1107-1112 https://doi.org/10.18280/isi.280430 Imaduddin, H., Kusumaningtias, L.A., A'la, F.Y. (2023). Application of LSTM and GloVe word embedding for hate speech detection in Indonesian twitter data. Ingénierie des Syst èmes d’Information, Vol. 28, No. 4, p. 1107-1112. https://doi.org/10.18280/isi.280430 243 Esoso, A.A., Ikumapayi, O.M., Jen, T.C., Akinlabi, E.T. Exploring Machine Learning Tools for Enhancing Additive Manufacturing: A Comparative Study additive manufacturing, machine learning, artificial intelligence, algorithms, computer vision, 3D modeling 28, 3, 535-544https://doi.org/10.18280/isi.280301 Esoso, A.A., Ikumapayi, O.M., Jen, T.C., Akinlabi, E.T. (2023). Exploring machine learning tools for enhancing additive manufacturing: A comparative study. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 535-544. https://doi.org/10.18280/isi.280301 244 Muzakir, A., Adi, K., Kusumaningrum, R. Advancements in Semantic Expansion Techniques for Short Text Classification and Hate Speech Detection Indonesia hate speech detection, semantic expansion, semantic similarity, short text expansion, text classification 28, 3, 545-556 https://doi.org/10.18280/isi.280302 Muzakir, A., Adi, K., Kusumaningrum, R. (2023). Advancements in semantic expansion techniques for short text classification and hate speech detection. Ingénierie des Systè mes d’Information, Vol. 28, No. 3, p. 545-556. https://doi.org/10.18280/isi.280302 245 Gueddoudj, E.Y., Chikh, A., Attia, A. Os-ETL: A High-Efficiency, Open- Scala Solution for Integrating Heterogeneous Data in Large-Scale Data Warehousing ETL, spark, big data, RDF, partitioning, data warehouse, polystore, scalability 28, 3, 557-565https://doi.org/10.18280/isi.280303 Gueddoudj, E.Y., Chikh, A., Attia, A. (2023). Os-ETL: A high-efficiency, Open-Scala solution for integrating heterogeneous data in large-scale data warehousing. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 557-565. https://doi.org/10.18280/isi.280303 246 Rashmi, V., Mohan, C.C., Bhavani, V., Anuradha, Y., Kumar, L.K., Sowjanya, B., Kumar, K.S., Rao, K.K., Pallikonda, A.K. Experimental Investigations to Fault Reduction System for Software Applications fault, AGA, test case, metrics, dependence model 28, 3, 567-573 https://doi.org/10.18280/isi.280304 Rashmi, V., Mohan, C.C., Bhavani, V., Anuradha, Y., Kumar, L.K., Sowjanya, B., Kumar, K.S., Rao, K.K., Pallikonda, A.K. (2023). Experimental investigations to fault reduction system for software applications. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 567-573. https://doi.org/10.18280/isi.280304 247 Arifin, M., Widowati, W., Farikhin, F. Optimization of Hyperparameters in Machine Learning for Enhancing Predictions of Student Academic Performance gradient boosting regression trees, grid search, hyperparameter, regression, student performance 28, 3, 575-582 https://doi.org/10.18280/isi.280305 Arifin, M., Widowati, W., Farikhin, F. (2023). Optimization of hyperparameters in machine learning for enhancing predictions of student academic performance. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 575-582. https://doi.org/10.18280/isi.280305 248 Mhmood, Z.S., Nasret, A.N., Noori, A.B., Mohammed, A.B. Neural Network-Directed Detection and Localization of Faults in Railway Track Circuits: An Application of Dempster- Shafer Theory Dempster-Shafer theory, pattern recognition tasks, evidence theory, railway traffic security 28, 3, 583-593https://doi.org/10.18280/isi.280306 Mhmood, Z.S., Nasret, A.N., Noori, A.B., Mohammed, A.B. (2023). Neural network-directed detection and localization of faults in railway track circuits: An application of Dempster- Shafer theory. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 583-593. https://doi.org/10.18280/isi.280306 249 Todoshchuk, A., Motorniuk, U., Skliaruk, T., Oliinyk, I., Kornieieva, T. Modelling Information Systems for Personnel Management: Navigating Economic Security in the Transition to Industry 5.0 engineering, information systems, security, modeling, management, Industry 5.0 28, 3, 595-601 https://doi.org/10.18280/isi.280307 Todoshchuk, A., Motorniuk, U., Skliaruk, T., Oliinyk, I., Kornieieva, T. (2023). Modelling information systems for personnel management: Navigating economic security in the transition to Industry 5.0. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 595-601. https://doi.org/10.18280/isi.280307 250 Shkvyr, O., Dudchak, H., Kazakova, N., Polianovska, O., Sivak, N. Mathematical Modeling of Information Technology Integration in Digital Education: A Regional Perspective mathematical modelling, information technologies, educational process, digitalization, mathematical science 28, 3, 603-610https://doi.org/10.18280/isi.280308 Shkvyr, O., Dudchak, H., Kazakova, N., Polianovska, O., Sivak, N. (2023). Mathematical modeling of information technology integration in digital education: A regional perspective. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 603-610. https://doi.org/10.18280/isi.280308 251 Yahiaoui, Y., Bourouis, A., Al- Dujaili, A.Q., Abdulkareem, A.I., Agboola, O.O., Okagbue, H.I., Adedotun, A.F., Humaidi, A.J., Imaga, O.F., Odekina, O.G. A Comprehensive Context-Free Grammar for the Arabic Language: Including Non-Fundamentalist Phrases Arabic language processing, formal grammar, Subsumption Hierarchical Attribute, syntactic roles, CGF 28, 3, 611-619https://doi.org/10.18280/isi.280309 Yahiaoui, Y., Bourouis, A., Al-Dujaili, A.Q., Abdulkareem, A.I., Agboola, O.O., Okagbue, H.I., Adedotun, A.F., Humaidi, A.J., Imaga, O.F., Odekina, O.G. (2023). A comprehensive context-free grammar for the Arabic language: Including non- fundamentalist phrases. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 611-619. https://doi.org/10.18280/isi.280309 252 Kasmi, M., Aman, A., Asriany, A., Angriawan, R., Karma, K., Radi, A., Ilham, I., Yuliastuti, H., Sulkifli, S. Predictive Analysis of the Ornamental Angelfish Export Market Demand: An Application of the Least Square Method accuracy assessment, demand prediction, Least Square Method, ornamental angelfish 28, 3, 621-631https://doi.org/10.18280/isi.280310 Kasmi, M., Aman, A., Asriany, A., Angriawan, R., Karma, K., Radi, A., Ilham, I., Yuliastuti, H., Sulkifli, S. (2023). Predictive analysis of the ornamental angelfish export market demand: An application of the least square method. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 621-631. https://doi.org/10.18280/isi.280310 253Jo, B.J., Kim, S.K., Kim, S. Enhancing Virtual and Augmented Reality Interactions with a MediaPipe- Based Hand Gesture Recognition User Interface virtual reality, augmented reality, gesture classification, MediaPipe, user interface 28, 3, 633-638https://doi.org/10.18280/isi.280311 Jo, B.J., Kim, S.K., Kim, S. (2023). Enhancing virtual and augmented reality interactions with a MediaPipe-based hand gesture recognition user interface. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 633-638. https://doi.org/10.18280/isi.280311 254Babu, P.R., Krishna, A.S. Deep Learning-Assisted SVMs for Efficacious Diagnosis of Tomato Leaf Diseases: A Comparative Study of GoogleNet, AlexNet, and ResNet-50 pre-trained CNN, GoogleNet, AlexNet, ResNet-50, support vector machine, combined deep features, deep learning model, tomato leaf diseases 28, 3, 639-645https://doi.org/10.18280/isi.280312 Babu, P.R., Krishna, A.S. (2023). Deep learning-assisted SVMs for efficacious diagnosis of tomato leaf diseases: A comparative study of GoogleNet, AlexNet, and ResNet-50. Ing énierie des Systèmes d’Information, Vol. 28, No. 3, p. 639- 645. https://doi.org/10.18280/isi.280312 255 Farchi, C., Farchi, F., Touzi, B., Mousrij, A. A Sustainable Performance Assessment System for Road Freight Transport Based on Artificial Neural Networks ANN, machine learning, sustainable performance, performance assessment 28, 3, 647-653https://doi.org/10.18280/isi.280313 Farchi, C., Farchi, F., Touzi, B., Mousrij, A. (2023). A sustainable performance assessment system for road freight transport based on artificial neural networks. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 647-653. https://doi.org/10.18280/isi.280313 256 Tokpayev, K., Bedelbayev, A., Iskendirova, A. Handling HTTP Flood Attacks in High- Load Applications Using Akka Actors Model DDoS attacks, microservice systems, Scala functional language, computing hardware, service-oriented asynchronous programming 28, 3, 655-662https://doi.org/10.18280/isi.280314 Tokpayev, K., Bedelbayev, A., Iskendirova, A. (2023). Handling HTTP flood attacks in high-load applications using Akka Actors model. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 655-662. https://doi.org/10.18280/isi.280314 257 Naik, N.K., Sethy, P.K., Devi, A.G., Behera, S.K. Hybrid Enhanced Featured AlexNet for Milled Rice Grain Identification AlexNet, deep learning, feature fusion, identification, milled rice 28, 3, 663-668https://doi.org/10.18280/isi.280315 Naik, N.K., Sethy, P.K., Devi, A.G., Behera, S.K. (2023). Hybrid enhanced featured AlexNet for milled rice grain identification. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 663-668. https://doi.org/10.18280/isi.280315 258 Muhamad, W., Nugroho, H., Widaningsih, S., Hendriyanto, R. Designing a Public API-Based Order Delivery Service System for the Food and Beverage Industry public API, delivery service, F&B industry, service system 28, 3, 669-675https://doi.org/10.18280/isi.280316 Muhamad, W., Nugroho, H., Widaningsih, S., Hendriyanto, R. (2023). Designing a public API-based order delivery service system for the food and beverage industry. Ingénierie des Systè mes d’Information, Vol. 28, No. 3, p. 669-675. https://doi.org/10.18280/isi.280316 259 Subbarayudu, Y., Sureshbabu, A. A Distributed Densely Connected Convolutional Network Approach for Enhanced Recognition of Health- Related Topics: A Societal Analysis Case Study NLTK, early detection, melanoma, skin cancer 28, 3, 677-684 https://doi.org/10.18280/isi.280317 Subbarayudu, Y., Sureshbabu, A. (2023). A distributed densely connected convolutional network approach for enhanced recognition of health-related topics: A societal analysis case study. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 677-684. https://doi.org/10.18280/isi.280317 260 Hussien, S.A.A., Abed, A.A. Real-Time Person Re-Identification Using Omni-Scale Feature Learning Network and Yolov5: A Comparative Study Person Re-Id, OSNet, Yolov5, MARS, custom-created dataset 28, 3, 685-691https://doi.org/10.18280/isi.280318 Hussien, S.A.A., Abed, A.A. (2023). Real-time person re- identification using omni-scale feature learning network and Yolov5: A comparative study. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 685-691. https://doi.org/10.18280/isi.280318 261 Meshram, V., Patil, K., Meshram, V. Evaluation of Top Pretrained Models Using Transfer Learning on Banknote Dataset with Quality Parameter banknote classification, CNN, computer vision, deep learning, efficiency, machine learning classification, pretrained models 28, 3, 693-701 https://doi.org/10.18280/isi.280319 Meshram, V., Patil, K., Meshram, V. (2023). Evaluation of top pretrained models using transfer learning on banknote dataset with quality parameter. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 693-701. https://doi.org/10.18280/isi.280319 262Jafar, Z., Hamad, A.H. Performance Evaluation of a Multi Organizations Secure Internet of Vehicles Based on Hyperledger Fabric Blockchain Platform IoV, blockchain technology, Hyperledger fabric platform, Hyperledger caliper, multi organizations 28, 3, 703-709 https://doi.org/10.18280/isi.280320 Jafar, Z., Hamad, A.H. (2023). Performance evaluation of a multi organizations secure internet of vehicles based on hyperledger fabric blockchain platform. Ingénierie des Systè mes d’Information, Vol. 28, No. 3, p. 703-709. https://doi.org/10.18280/isi.280320 263 Ritzkal, R., Kodarsyah, Amalia, P.P., Mahmud, W., Hendrawan, A.H., Prakoso, B.A., Riawan, I. Security Vulnerability Analysis and Recommendations for Open Media Vault Cloud Server on Raspberry Pi network security, vulnerability, port, Nmap, Nessus 28, 3, 711-716https://doi.org/10.18280/isi.280321 Ritzkal, R., Kodarsyah, Amalia, P.P., Mahmud, W., Hendrawan, A.H., Prakoso, B.A., Riawan, I. (2023). Security vulnerability analysis and recommendations for Open Media Vault cloud server on Raspberry Pi. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 711-716. https://doi.org/10.18280/isi.280321 264 Senaï, B., Rahal, S.A.H., Khiat, S. Evaluative Study of Machine Learning Classifiers in Predicting Heart Failure: A Focus on Imbalanced Datasets CVD, classification techniques, heart failure prediction, relevant features, SMOTE 28, 3, 717-724 https://doi.org/10.18280/isi.280322 Ravulapalli, L.T., Paladugu, R.K., Likki, V.K.R., Mothukuri, R., Mukkapati, N., Kilaru, S. (2023). Evaluative study of machine learning classifiers in predicting heart failure: A focus on imbalanced datasets. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 717-724. https://doi.org/10.18280/isi.280322 265 Senaï, B., Rahal, S.A.H., Khiat, S. An Optimized Hybrid Model of Convolutional Neural Networks and eXtreme Gradient Boosting for Enhanced Mammographic Tumor Classification image mining, medical image classification, machine learning, Xgboost, Convolutional Neural Networks, Softmax, mammographic 28, 3, 725-736https://doi.org/10.18280/isi.280323 Senaï, B., Rahal, S.A.H., Khiat, S. (2023). An optimized hybrid model of Convolutional Neural Networks and eXtreme gradient boosting for enhanced mammographic tumor classification. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 725-736. https://doi.org/10.18280/isi.280323 266 Begum, R., Kumar, T.P., Rao, M.R.N. Deep Convolutional Neural Networks for Diagnosis of Parkinson’s Disease Using MRI Data Parkinson’s Disease, magnetic resonance imaging, deep convolutional neural network, classification, ensemble classifier, image acquisition, feature extraction 28, 3, 737-743https://doi.org/10.18280/isi.280324 Begum, R., Kumar, T.P., Rao, M.R.N. (2023). Deep Convolutional Neural Networks for diagnosis of Parkinson’s Disease using MRI data. Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 737-743. https://doi.org/10.18280/isi.280324 267 Sahraoui, M., Mahmoudi, L., Salem, M. An Innovative Arabic Word Embedding Representation for Enhanced Sentiment Analysis sentiment analysis, roots, BOR, glove, word vector representation, machine learning, Arabic social media 28, 3, 745-750.https://doi.org/10.18280/isi.280325 Sahraoui, M., Mahmoudi, L., Salem, M. (2023). An innovative Arabic word embedding representation for enhanced sentiment analysis. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 745-750. https://doi.org/10.18280/isi.280325 268 Venkatesh, R.T., Chandrashekar, D.K., Rao, P.B.S., Sridhar, R., Rajanna, S. Systematic Approaches to Data Placement, Replication and Migration in Heterogeneous Edge-Cloud Computing Systems: A Comprehensive Literature Review data placement, data migration data replica, edge computing replication workload balancing 28, 3, 751-759https://doi.org/10.18280/isi.280326 Venkatesh, R.T., Chandrashekar, D.K., Rao, P.B.S., Sridhar, R., Rajanna, S. (2023). Systematic approaches to data placement, replication and migration in heterogeneous edge- cloud computing systems: A comprehensive literature review. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 751-759. https://doi.org/10.18280/isi.280326 269Al-Tahar, I.A., Al-Shueli, A. An Enhanced Frequency Estimation Algorithm Using a Three-Point Spectral Interpolation Method interpolation methods, frequency estimation, frequency-domain analysis, FFT, FPGA, Jacobsen algorithm 28, 3, 761-766https://doi.org/10.18280/isi.280327 Al-Tahar, I.A., Al-Shueli, A. (2023). An enhanced frequency estimation algorithm using a three-point spectral interpolation method. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 761-766. https://doi.org/10.18280/isi.280327 270 Govindaraj, M., Kaliappan, S., Swaminathan, G. An Enhanced Outlier Detection Approach for Multidimensional Datasets Using a Synergistic Firefly and Grey Wolf Optimization-Based Method outlier detection, multivariate datasets, improved neural network, sun flower-based grey wolf optimization 28, 3,767-775https://doi.org/10.18280/isi.280328 Govindaraj, M., Kaliappan, S., Swaminathan, G. (2023). An enhanced outlier detection approach for multidimensional datasets using a synergistic firefly and grey wolf optimization- based method. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 767-775. https://doi.org/10.18280/isi.280328 271 Ohwo, O.B., Ayankoya, F.Y., Ajayi, O.F., Alao, D.O. Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM) domain name system, adaptive security, quality of service, DNS security, security architecture, cybersecurity, performance issue 28, 3, 777-790https://doi.org/10.18280/isi.280329 Ohwo, O.B., Ayankoya, F.Y., Ajayi, O.F., Alao, D.O. (2023). Advancing DNS performance through an Adaptive Transport Layer Security Model (ad-TLSM). Ingénierie des Systèmes d’ Information, Vol. 28, No. 3, p. 777-790. https://doi.org/10.18280/isi.280329 272Khare, V. Optic Disc Localization in Normal and Pathological Retinal Images Using Dictionary-Based Approach fundus images, morphological operation, least angle regression (LARS), optic disc (OD), diabetic retinopathy (DR) 28, 3, 791-797https://doi.org/10.18280/isi.280330 Khare, V. (2023). Optic disc localization in normal and pathological retinal images using dictionary-based approach. Ingénierie des Systèmes d’Information, Vol. 28, No. 3, p. 791-797. https://doi.org/10.18280/isi.280330 273Abdelkader, B. A Novel Method for Refactoring UML Metamodel UML metamodel, refactoring, MDA, software artifacts, adaptation 28, 2, 263-274https://doi.org/10.18280/isi.280201 Abdelkader, B. (2023). A novel method for refactoring UML metamodel. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 263-274. https://doi.org/10.18280/isi.280201 274 Boutazart, Y., Zealouk, O., Satori, H., Affane Moundounga, A.R., Satori, K. Clustering for Moroccan Prefecture- Provinces and World Countries Based COVID-19 Dataset clustering technique, COVID-19, K-means algorithm, elbow and silhouette methods, dataset analysis 28, 2, 275-282 https://doi.org/10.18280/isi.280202 Boutazart, Y., Zealouk, O., Satori, H., Affane Moundounga, A.R., Satori, K. (2023). Clustering for Moroccan prefecture- provinces and world countries based COVID-19 dataset. Ingé nierie des Systèmes d’Information, Vol. 28, No. 2, p. 275- 282. https://doi.org/10.18280/isi.280202 275 Saidi, I., Mahammed, N., Klouche, B., Bencherif, K. An Overview on Related Searches Recommendation recommender systems, entities recommendation, web search engines, knowledge graphs, users’ context 28, 2, 283-289https://doi.org/10.18280/isi.280203 Saidi, I., Mahammed, N., Klouche, B., Bencherif, K. (2023). An overview on related searches recommendation. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 283-289. https://doi.org/10.18280/isi.280203 276 Siaho, D., Ghislain, P.K., Lambert, K.T., Ernest, K.K., Souleymane, O., Emmanuel, A.N. Modeling Artificial Neural Network of Insect’s Proliferation During Cocoa Beans Storage cocoa bean, grain, artificial neural network, insects, Akaike information criterion 28, 2, 291-298 https://doi.org/10.18280/isi.280204 Siaho, D., Ghislain, P.K., Lambert, K.T., Ernest, K.K., Souleymane, O., Emmanuel, A.N. (2023). Modeling artificial neural network of insect’s proliferation during cocoa beans storage. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 291-298. https://doi.org/10.18280/isi.280204 277 Kumar, J.P., Muppagowni, G.K., Kumar, J.P., Malla, S.J., Chandanapalli, S.B., Sandhya, E. Selection of Features Using Adaptive Tunicate Swarm Algorithm with Optimized Deep Learning Model for Thyroid Disease Classification thyroid disease, adaptive tunicate swarm optimization, Grey Wolf Optimizer, convolutional neural network, hyperthyroid, hypothyroid 28, 2, 299-308 https://doi.org/10.18280/isi.280205 Kumar, J.P., Muppagowni, G.K., Kumar, J.P., Malla, S.J., Chandanapalli, S.B., Sandhya, E. (2023). Selection of features using adaptive tunicate swarm algorithm with optimized deep learning model for thyroid disease classification. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 299-308. https://doi.org/10.18280/isi.280205 278 Roy, S., Jeyabalan, J., Gochhait, S., Sugumaran, P., Gromiha, M.M. Metadata Analysis to Get Insight into Drug Resistant Ovarian Cancer ovarian cancer, drug resistance, gene set enrichment analysis, network, cell-cell adhesion, ERBB2 28, 2, 309-314https://doi.org/10.18280/isi.280206 Roy, S., Jeyabalan, J., Gochhait, S., Sugumaran, P., Gromiha, M.M. (2023). Metadata analysis to get insight into drug resistant ovarian cancer. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 309-314. https://doi.org/10.18280/isi.280206 279 Amghar, S., Cherdal, S., Mouline, S. A Schema Integration Approach for Big Data Analysis data integration, NoSQL systems, schema integration, schema matching 28, 2, 315-325 https://doi.org/10.18280/isi.280207 Amghar, S., Cherdal, S., Mouline, S. (2023). A schema integration approach for big data analysis. Ingénierie des Systè mes d’Information, Vol. 28, No. 2, p. 315-325. https://doi.org/10.18280/isi.280207 280 Talai, Z., Kherici, N., Bahi, H. Comparative Study of CNN Structures for Arabic Speech Recognition convolutional neural network, Arabic speech recognition, AlexNet, GoogLeNet, ResNet 28, 2, 327-333https://doi.org/10.18280/isi.280208 Talai, Z., Kherici, N., Bahi, H. (2023). Comparative study of CNN structures for Arabic speech recognition. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 327-333. https://doi.org/10.18280/isi.280208 281 Alsabbagh, D.M.Z., Azeez, N.D. The Effect of Motivating and Inhibitory Factors on Using the Electronic Commerce by Adopting UTAUT2 and SQB Models electronic commerce, AUTAUT2, SQB, motivating factors, inhibitory factors, structure equation modeling (SEM) 28, 2, 335-350https://doi.org/10.18280/isi.280209 Alsabbagh, D.M.Z., Azeez, N.D. (2023). The effect of motivating and inhibitory factors on using the electronic commerce by adopting UTAUT2 and SQB models. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 335-350. https://doi.org/10.18280/isi.280209 282 Ritzkal, Sutriawan, Prakoso, B.A., Fanani, A.Z., Riawan, I., Fajri, H., Basuki, R.S., Alzami, F. Word Search with Trending Reviews on Twitter normalization, preprocessing, text mining Twitter 28, 2, 351-356https://doi.org/10.18280/isi.280210 Ritzkal, Sutriawan, Prakoso, B.A., Fanani, A.Z., Riawan, I., Fajri, H., Basuki, R.S., Alzami, F. (2023). Word search with trending reviews on Twitter. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 351-356. https://doi.org/10.18280/isi.280210 283 Khurana, R., Bhatia, M., Battan, M., Das, N.N., Memoria, M. A Proposed Framework for Identity Verification in Passport Management Using Model Scaling and Semantic Similarity efficient net, face detection, image similarity, neural networks, passport management 28, 2, 357-365https://doi.org/10.18280/isi.280211 Khurana, R., Bhatia, M., Battan, M., Das, N.N., Memoria, M. (2023). A proposed framework for identity verification in passport management using model scaling and semantic similarity. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 357-365. https://doi.org/10.18280/isi.280211 284 Shaimerdenov, D., Zakirova, A., Akhayeva, Z., Karymsakova, A., Niyazova, R. Remote Sensing Technique to Recognise Physical Characteristics of Water Bodies of the Republic of Kazakhstan water resources, satellite bathymetry, earth remote sensing technology, monitoring of the state of water bodies 28, 2, 367-373https://doi.org/10.18280/isi.280212 Shaimerdenov, D., Zakirova, A., Akhayeva, Z., Karymsakova, A., Niyazova, R. (2023). Remote sensing technique to recognise physical characteristics of water bodies of the Republic of Kazakhstan. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 367-373. https://doi.org/10.18280/isi.280212 285 Elvira, M., Kartowagiran, B., Retnawati, H., Sainuddin, S., Rohaeti, E. Bias Geographic Location of Math National Examination in Junior High School: Analysis of Differential Item Functioning (DIF) Differential item function, national examinations, bias geographic 28, 2, 375-387https://doi.org/10.18280/isi.280213 Elvira, M., Kartowagiran, B., Retnawati, H., Sainuddin, S., Rohaeti, E. (2023). Bias geographic location of math national examination in junior high school: Analysis of Differential Item Functioning (DIF). Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 375-387. https://doi.org/10.18280/isi.280213 286Liu, H.X., Lee, K.T., Bai, S. Exploring Motivations for TikTok Usage and Impact Factors of TikTokers ’ Continuance Intention TikTok, uses and gratifications theory, technology acceptance model, motivations, continuance intention 28, 2, 389-400https://doi.org/10.18280/isi.280214 Liu, H.X., Lee, K.T., Bai, S. (2023). Exploring motivations for TikTok usage and impact factors of TikTokers’ continuance intention. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 389-400. https://doi.org/10.18280/isi.280214 287 Wahul, R.M., Sonawane, S., Kale, A.P., Lambture, B.D., Dudhedia, M.A. Smart Farm: Agriculture System for Farmers Using IoT CNN algorithm, IoT in agriculture, Smart Farm, THR (Temperature, Humidity, Rainfall) 28, 2, 401-407https://doi.org/10.18280/isi.280215 Wahul, R.M., Sonawane, S., Kale, A.P., Lambture, B.D., Dudhedia, M.A. (2023). Smart Farm: Agriculture system for farmers using IoT. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 401-407. https://doi.org/10.18280/isi.280215 288 Zulaeha, I., Subyantoro, Hasanudin, C., Pristiwati, R. Developing Teaching Materials of Academic Writing Using Mobile Learning development, teaching material, academic writing skill, mobile learning 28, 2, 409-418https://doi.org/10.18280/isi.280216 Zulaeha, I., Subyantoro, Hasanudin, C., Pristiwati, R. (2023). Developing teaching materials of academic writing using mobile learning. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 409-418. https://doi.org/10.18280/isi.280216 289Bangare, P.S., Patil, K.P. Internet of Things Based Secured Data Transmission Protocol for Agriculture Application communication system, IOT, security, MQTT, agriculture, SMO, AES 28, 2, 419-424 https://doi.org/10.18280/isi.280217 Bangare, P.S., Patil, K.P. (2023). Internet of things based secured data transmission protocol for agriculture application. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 419-424. https://doi.org/10.18280/isi.280217 290 Aman, A., Kasmi, M., Ratnawati, Iskandar, A., Zam, W., Mustika, N., Laswi, A.S., Hidayati, W., Akbar Pandaka, A.U. The Virtual Tour Panorama as a Guide and Education Media of the Historic Objects at Datu Luwu Palace historical objects, Datu Luwu Palace, tour guide, virtual tour 28, 2, 425-432https://doi.org/10.18280/isi.280218 Aman, A., Kasmi, M., Ratnawati, Iskandar, A., Zam, W., Mustika, N., Laswi, A.S., Hidayati, W., Akbar Pandaka, A.U. (2023). The virtual tour panorama as a guide and education media of the historic objects at Datu Luwu Palace. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 425-432. https://doi.org/10.18280/isi.280218 291 Macherla, H., Kotapati, G., Sunitha, M.T., Chittipireddy, K.R., Attuluri, B., Vatambeti, R. Deep Learning Framework-Based Chaotic Hunger Games Search Optimization Algorithm for Prediction of Air Quality Index national air monitoring program, air quality index, long short-term memory, chaotic hunger games search, Chennai 28, 2, 433-441 https://doi.org/10.18280/isi.280219 Macherla, H., Kotapati, G., Sunitha, M.T., Chittipireddy, K.R., Attuluri, B., Vatambeti, R. (2023). Deep learning framework- based chaotic hunger games search optimization algorithm for prediction of air quality index. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 433-441. https://doi.org/10.18280/isi.280219 292 Yergaliyev, A., Sharipbay, A., Baibulekova, L. Spontaneous Speech and Its Features Are Taken into Account When Creating Recognition Programs alternative transcription, multilingual corpus, linguistic support of information systems, automatic recognition systems, speech identification, corpus linguistics 28, 2, 443-450 https://doi.org/10.18280/isi.280220 Yergaliyev, A., Sharipbay, A., Baibulekova, L. (2023). Spontaneous speech and its features are taken into account when creating recognition programs. Ingénierie des Systèmes d ’Information, Vol. 28, No. 2, p. 443-450. https://doi.org/10.18280/isi.280220 293 Fadlil, A., Herman, Praseptian M, D. Single Imputation Using Statistics- Based and K Nearest Neighbor Methods for Numerical Datasets imputation, kNNI, missing value, numerical dataset, statistic-based 28, 2, 451-459https://doi.org/10.18280/isi.280221 Fadlil, A., Herman, Praseptian M, D. (2023). Single imputation using statistics-based and k nearest neighbor methods for numerical datasets. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 451-459. https://doi.org/10.18280/isi.280221 294 Mummigatti, K.V.K., Chandramouli, S.M., Ramachandra, D.H. Deep Neural Network System Using Ontology to Recommend Organic Fertilizers for a Sustainable Agriculture ontology, deep learning, knowledge base, recommender system 28, 2, 461-467 https://doi.org/10.18280/isi.280222 Mummigatti, K.V.K., Chandramouli, S.M., Ramachandra, D.H. (2023). Deep neural network system using ontology to recommend organic fertilizers for a sustainable agriculture. Ing énierie des Systèmes d’Information, Vol. 28, No. 2, p. 461- 467. https://doi.org/10.18280/isi.280222 295 Istiqomah, Rizal, A., Atmaja, R.D. Individual Recognition Based on Gait Using Multi-Distance Signal Level Difference Sample Entropy individual recognition, gait, inertia sensor, MSLD entropy 28, 2, 469-474https://doi.org/10.18280/isi.280223 Istiqomah, Rizal, A., Atmaja, R.D. (2023). Individual recognition based on gait using multi-distance signal level difference sample entropy. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 469-474. https://doi.org/10.18280/isi.280223 296Khare, V., Kumari, S. Detection of Brain Tumor Based on Multimodality Brain Image Fusion Using Dual Branch Convolution Neural Network computed tomography scan (CT-scan), magnetic resonance imaging (MRI), brain tumor, convolutional neural network (CNN), fusion 28, 2, 475-482https://doi.org/10.18280/isi.280224 Khare, V., Kumari, S. (2023). Detection of brain tumor based on multimodality brain image fusion using dual branch convolution neural network. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 475-482. https://doi.org/10.18280/isi.280224 297 Sukamto, Hadiyanto, Kurnianingsih. A Hybrid Resampling Method with K- Nearest Neighbour (FHR-KNN) for Imbalanced Preeclampsia Dataset FHR-KNN, hybrid, imbalance, preeclampsia, resampling 28, 2, 483-490https://doi.org/10.18280/isi.280225 Sukamto, Hadiyanto, Kurnianingsih. (2023). A hybrid resampling method with K-Nearest Neighbour (FHR-KNN) for imbalanced preeclampsia dataset. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 483-490. https://doi.org/10.18280/isi.280225 298 Vatsavai, L.S.K., Mantena, K.S.V. Camshift Algorithm with GOA-Neural Network for Drone Object Tracking object detection, tracking system, Camshift algorithm, neural network, AU-AIR Drones 28, 2, 491-498https://doi.org/10.18280/isi.280226 Vatsavai, L.S.K., Mantena, K.S.V. (2023). Camshift algorithm with GOA-neural network for drone object tracking. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 491-498. https://doi.org/10.18280/isi.280226 299Kadhum, O.I., Hamad, A.H. Performance Evaluation of Multi- Organization E-Government Based on Hyperledger Fabric Blockchain Platform blockchain, hyperledger fabric, hyperledger caliper, performance evaluation, e- government, multi-organization 28, 2, 499-507https://doi.org/10.18280/isi.280227 Kadhum, O.I., Hamad, A.H. (2023). Performance evaluation of multi-organization e-government based on hyperledger fabric blockchain platform. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 499-507. https://doi.org/10.18280/isi.280227 300 Killi, C.B.R., Balakrishnan, N., Rao, C.S. Deep Fake Image Classification Using VGG-19 Model fake images, CNN, VGG19, deep learning28, 2, 509-515https://doi.org/10.18280/isi.280228 Killi, C.B.R., Balakrishnan, N., Rao, C.S. (2023). Deep fake image classification using VGG-19 model. Ingénierie des Systè mes d’Information, Vol. 28, No. 2, p. 509-515. https://doi.org/10.18280/isi.280228 301 Jain, A., Nandan, D., Meduri, P. Data Export and Optimization Technique in Connected Vehicle connected car, data compression, MQTT cloud, CAN DBC format file, Graphical User Interface (GUI) 28, 2, 517-525https://doi.org/10.18280/isi.280229 Jain, A., Nandan, D., Meduri, P. (2023). Data export and optimization technique in connected vehicle. Ingénierie des Systèmes d’Information, Vol. 28, No. 2, p. 517-525. https://doi.org/10.18280/isi.280229 302Ravulaplli, L.T. A Novel Bi-LSTM Based Automatic Image Description Generation Bi-LSTM, image captioning, inception-v3, NMFO optimization 28, 2, 527-534https://doi.org/10.18280/isi.280230 Ravulaplli, L.T. (2023). A novel Bi-LSTM based automatic image description generation. Ingénierie des Systèmes d’ Information, Vol. 28, No. 2, p. 527-534. https://doi.org/10.18280/isi.280230 303 Harbouche, K., Khentout, C., Djoudi, M., Alti, A. Measuring Similarity of Educational Items Using Data on Learners’ Performance and Behavioral Parameters: Application of New Models SCNN-Cosine and Fuzzy- Kappa Convolutional Neural Networks, cosine similarity, educational items, fuzzy logic, item-to-item similarity, kappa inter raters agreement, Siamese Neural Networks, latent trait 28, 1, 1-11https://doi.org/10.18280/isi.280101 Harbouche, K., Khentout, C., Djoudi, M., Alti, A. (2023). Measuring similarity of educational items using data on learners’ performance and behavioral parameters: Application of new models SCNN-Cosine and Fuzzy-Kappa. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 1-11. https://doi.org/10.18280/isi.280101 304 Chellakh, H., Moussaoui, A., Attia, A., Akhtar, Z. MRI Brain Tumor Identification and Classification Using Deep Learning Techniques brain tumor detection, classification, deep learning, feature extraction 28, 1, 13-22 https://doi.org/10.18280/isi.280102 Chellakh, H., Moussaoui, A., Attia, A., Akhtar, Z. (2023). MRI brain tumor identification and classification using deep learning techniques. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 13-22. https://doi.org/10.18280/isi.280102 305 Lakshmi, D.S., Divya, A., Sreedevi, E., Kolagani, R., Gottumukkala, P., Muddana, A. A Study and Analysis on Pedestrian Detection and Tracking Through Rear- View Images TRIPP, rear-view, pedestrian detection and tracking, false alarm rate 28, 1, 23-30https://doi.org/10.18280/isi.280103 Lakshmi, D.S., Divya, A., Sreedevi, E., Kolagani, R., Gottumukkala, P., Muddana, A. (2023). A study and analysis on pedestrian detection and tracking through rear-view images. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 23- 30. https://doi.org/10.18280/isi.280103 306 Gbame, S.G., Brou, M.K., Saha, B.K. Efficient Criteria Based Method for Selection of Relevant Ontologies in Transport Domain criteria, relevant ontology, ontological layer, smart city, transport 28, 1, 31-40 https://doi.org/10.18280/isi.280104 Gbame, S.G., Brou, M.K., Saha, B.K. (2023). Efficient criteria based method for selection of relevant ontologies in transport domain. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 31-40. https://doi.org/10.18280/isi.280104 307 Kryshtanovych, M., Lyubomudrova, N., Bondar, H., Motornyy, V., Kuchmenko, V. An Intelligent Multi-Stage Model for Countering the Impact of Disinformation on the Cybersecurity System disinformation, cybersecurity, model, information, digitalization 28, 1, 41-47 https://doi.org/10.18280/isi.280105 Kryshtanovych, M., Lyubomudrova, N., Bondar, H., Motornyy, V., Kuchmenko, V. (2023). An intelligent multi-stage model for countering the impact of disinformation on the cybersecurity system. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 41-47. https://doi.org/10.18280/isi.280105 308Beghriche, A. An Adaptive Secure and Efficient Bio- Inspired Routing Protocol for Effective Cooperation in FANETs Artificial Immune System, dendritic cells, flying ad hoc networks, penguin search optimization algorithm, routing protocol, security threats, unmanned aerial vehicle 28, 1, 49-66https://doi.org/10.18280/isi.280106 Beghriche, A. (2023). An adaptive secure and efficient bio- inspired routing protocol for effective cooperation in FANETs. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 49- 66. https://doi.org/10.18280/isi.280106 309 Al-Harbi, O., Hamed, A., Alzoubi, M. A Deep Neural Network Optimized by a Genetic Algorithm to Improve Arabic Sentiment Classification sentiment classification, Arabic sentiment analysis, deep learning, genetic algorithm 28, 1, 67-75 https://doi.org/10.18280/isi.280107 Al-Harbi, O., Hamed, A., Alzoubi, M. (2023). A deep neural network optimized by a genetic algorithm to improve Arabic sentiment classification. Ingénierie des Systèmes d’ Information, Vol. 28, No.1, p. 67-75. https://doi.org/10.18280/isi.280107 310 Yemanov, V., Pasichnyk, V., Yevtushenko, I., Larin, S., Mykhailenko, O. Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment information, cybersecurity, threats, security, ranking 28, 1, 77-84https://doi.org/10.18280/isi.280108 Yemanov, V., Pasichnyk, V., Yevtushenko, I., Larin, S., Mykhailenko, O. (2023). Ranking threats to determine the cost of protecting information in a cybersecurity environment. Ingé nierie des Systèmes d’Information, Vol. 28, No. 1, p. 77-84. https://doi.org/10.18280/isi.280108 311 Liu, H.X., Lee, K.T., Feng, H., Bai, S. Exploring Impact Factors of Mobile Instant Messenger Users’ Continuance Intention mobile instant messenger, continuance intention, theory of uses and gratifications, attitude, WeChat 28, 1, 85-96https://doi.org/10.18280/isi.280109 Liu, H.X., Lee, K.T., Feng, H., Bai, S. (2023). Exploring impact factors of mobile instant messenger users’ continuance intention. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 85-96. https://doi.org/10.18280/isi.280109 312 Behaz, A., Moumen, H., Nouari, W. Trace Analysis of Educational Videos to Identify the Groups of Learners with Similar Profiles learning analytics, learner profile, educational data mining, clustering trace analysis 28, 1, 97-104https://doi.org/10.18280/isi.280110 Behaz, A., Moumen, H., Nouari, W. (2023). Trace analysis of educational videos to identify the groups of learners with similar profiles. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 97-104. https://doi.org/10.18280/isi.280110 313 Varadharajan, A.A., Vaddi, S.R., Ramasubramanian, K.G. Improved Diverse Gaussian HMM and SVM ML Technique for Sensor Fault Detection and Classification in Air Quality Monitoring System air quality, fault classification, fault detection, gaussian hidden markov model, internet of things, out of bounds, spike fault, support vector machine 28, 1, 105-111https://doi.org/10.18280/isi.280111 Varadharajan, A.A., Vaddi, S.R., Ramasubramanian, K.G. (2023). Improved diverse gaussian HMM and SVM ML technique for sensor fault detection and classification in air quality monitoring system. Ingénierie des Systèmes d’ Information, Vol. 28, No. 1, p. 105-111. https://doi.org/10.18280/isi.280111 314Soufi, O., Belouadha, F.Z. FSRSI: New Deep Learning-Based Approach for Super-Resolution of Multispectral Satellite Images remote sensing, multispectral satellite images, super-resolution, deep-learning, Network in Network, SISR, sentinel-2, multi-scale fusion 28, 1, 113-132https://doi.org/10.18280/isi.280112 Soufi, O., Belouadha, F.Z. (2023). FSRSI: New deep learning- based approach for super-resolution of multispectral satellite images. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 113-132. https://doi.org/10.18280/isi.280112 315 Saleem, J.B.M., Shanmugam, K. Pesticide Recommendation for Different Leaf Diseases and Related Pests Using Multi-Dimensional Feature Learning Deep Classifier leaf diseases, PDATFEGAN, MFL-DCNN, pesticide, fuzzy rule, rough set, intuitionistic fuzzy approximation space, recommendation system 28, 1, 133-140https://doi.org/10.18280/isi.280113 Saleem, J.B.M., Shanmugam, K. (2023). Pesticide recommendation for different leaf diseases and related pests using multi-dimensional feature learning deep classifier. Ingé nierie des Systèmes d’Information, Vol. 28, No. 1, p. 133- 140. https://doi.org/10.18280/isi.280113 316 Zhukova, O., Mandragelia, V., Alieksieienko, T., Semenenko, A., Skibina, E. Digital Technologies for Introducing Gamification into the Education System in the Context of the Development of Industry 4.0 digital technologies, gamification, education system, Industry 4.0 28, 1, 141-147https://doi.org/10.18280/isi.280114 Zhukova, O., Mandragelia, V., Alieksieienko, T., Semenenko, A., Skibina, E. (2023). Digital technologies for introducing gamification into the education system in the context of the development of industry 4.0. Ingénierie des Systèmes d’ Information, Vol. 28, No. 1, p. 141-147. https://doi.org/10.18280/isi.280114 317 Rakesh, U., Ramya, V., Murugan, V.S. Classification, Collection, and Notification of Medical Waste Using IoT Based Smart Dust Bins biomedical waste, sensing unit and classifier, IR sensor, GOM, smart waste bin 28, 1, 149-154https://doi.org/10.18280/isi.280115 Rakesh, U., Ramya, V., Murugan, V.S. (2023). Classification, collection, and notification of medical waste using IoT based smart dust bins. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 149-154. https://doi.org/10.18280/isi.280115 318 Sudrajat, D., Purnamasari, A.I., Dikananda, A.R., Kurnia, D.A., Efendi, D.M. Hybrid Learning Predictions on Learning Quality Using Multiple Linear Regression hybrid learning, multiple linear regression, RMSE, COVID-19 28, 1, 155-160https://doi.org/10.18280/isi.280116 Sudrajat, D., Purnamasari, A.I., Dikananda, A.R., Kurnia, D.A., Efendi, D.M. (2023). Hybrid learning predictions on learning quality using multiple linear regression. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 155-160. https://doi.org/10.18280/isi.280116 319Khandekar, V.S., Shrinath, P. Ensemble Model for Multiclass Imbalanced Data Using Cluster Computing of Spark imbalance, Particle Swarm Optimization, SMOTE, spark, cluster computing, RDD, ensemble model, sampling 28, 1, 161-167 https://doi.org/10.18280/isi.280117 Khandekar, V.S., Shrinath, P. (2023). Ensemble model for multiclass imbalanced data using cluster computing of spark. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 161-167. https://doi.org/10.18280/isi.280117 320 Abd, R.G., Ibrahim, A.W.S., Noor, A.A. Facial Emotion Recognition Using HOG and Convolution Neural Network HOG, CNN, median filter, facial emotion recognition, face detection 28, 1, 169-174https://doi.org/10.18280/isi.280118 Abd, R.G., Ibrahim, A.W.S., Noor, A.A. (2023). Facial emotion recognition using HOG and convolution neural network. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 169-174. https://doi.org/10.18280/isi.280118 321 Ratha, A.K., Barpanda, N.K., Sethy, P.K., Behera, S.K. Papaya Fruit Maturity Estimation Using Wavelet and ConvNET Papaya grading, deep feature, parallel feature fusion, VGG16, SVM, Wavelet 28, 1, 175-181 https://doi.org/10.18280/isi.280119 Ratha, A.K., Barpanda, N.K., Sethy, P.K., Behera, S.K. (2023). Papaya fruit maturity estimation using Wavelet and ConvNET. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 175-181. https://doi.org/10.18280/isi.280119 322 Awad, H., Aboalganam, K., Hijazeen, O., Alhanatleh, H., Bakir, S.M.A., Altahrawi, M., Kilani, Y.M., Malahmeh, H.M. Investigation Study of the Cloud Supply Chain Management System contemporary organizations, supply chain management, cloud computing, cloud supply chain, eastern countries 28, 1, 183-188 https://doi.org/10.18280/isi.280120 Awad, H., Aboalganam, K., Hijazeen, O., Alhanatleh, H., Bakir, S.M.A., Altahrawi, M., Kilani, Y.M., Malahmeh, H.M. (2023). Investigation study of the cloud supply chain management system. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 183-188. https://doi.org/10.18280/isi.280120 323 Deo, A., Jaisinghani, R., Gupta, S., Khan, S.S., Soni, A., Gehlot, K. Stratified Advance Personalized Recommendation System Based on Deep Learning E-Commerce recommendation system, deep learning, transfer learning, cross domain analysis, user behavior analysis, user feedback analysis, re-ranking 28, 1, 189-196https://doi.org/10.18280/isi.280121 Deo, A., Jaisinghani, R., Gupta, S., Khan, S.S., Soni, A., Gehlot, K. (2023). Stratified advance personalized recommendation system based on deep learning. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 189-196. https://doi.org/10.18280/isi.280121 324 Mawardi, D.N., Budiningsih, C.A., Sugiman. Blended Learning Effect on Mathematical Skills: A Meta-Analysis Study mathematical skills, blended learning, meta-analysis 28, 1, 197-204 https://doi.org/10.18280/isi.280122 Mawardi, D.N., Budiningsih, C.A., Sugiman. (2023). Blended learning effect on mathematical skills: A meta-analysis study. Ingénierie des Systèmes d’Information, Vol. 28, No.1, p. 197- 204. https://doi.org/10.18280/isi.280122 325 Murugesan, S., Kaliyamurthie, K.P. A Machine Learning Framework for Automatic Fake News Detection in Indian Tamil News Channels Indian news, fake news, Naïve Bayes, Logistic Regression, LSTM, classifications 28, 1, 205-209https://doi.org/10.18280/isi.280123 Murugesan, S., Kaliyamurthie, K.P. (2023). A machine learning framework for automatic fake news detection in Indian Tamil news channels. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 205-209. https://doi.org/10.18280/isi.280123 326Sabri, B.T., Jawad, W.K. Discretion-Preserving with Data Mining Drive Distribution Scheme with a Universal Social Grid Web for Vans Using Vast Data ridesharing, global social network, auto pooling, direction, criminal file 28, 1, 211-216https://doi.org/10.18280/isi.280124 Sabri, B.T., Jawad, W.K. (2023). Discretion-preserving with data mining drive distribution scheme with a universal social grid web for vans using vast data. Ingénierie des Systèmes d’ Information, Vol. 28, No. 1, p. 211-216. https://doi.org/10.18280/isi.280124 327 Pachala, P.K., Bojja, P. Prediction of Lungs Cancer in Medical Images Using Deep Learning Approach lungs cancer, deep learning, classification, machine learning, CT image, cancer detection, segmentation 28, 1, 217-223https://doi.org/10.18280/isi.280125 Pachala, P.K., Bojja, P. (2023). Prediction of lungs cancer in medical images using deep learning approach. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 217-223. https://doi.org/10.18280/isi.280125 328Deore, S.P. Enriching Song Recommendation Through Facial Expression Using Deep Learning convolutional neural network, expression, mood, decision making, mood identification, song recommendation 28, 1, 225-229https://doi.org/10.18280/isi.280126 Deore, S.P. (2023). Enriching song recommendation through facial expression using deep learning. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 225-229. https://doi.org/10.18280/isi.280126 329 Raghava Deepthi, J.V.N., Khan, A.K., Acharjee, T. Energy Efficient Routing Algorithm for WSN-IoT Network Internet of Things (IoT), Wireless Sensor Networks (WSN), data transmission, flooding, game theory, spanning tree, routing 28, 1, 231-238https://doi.org/10.18280/isi.280127 Raghava Deepthi, J.V.N., Khan, A.K., Acharjee, T. (2023). Energy efficient routing algorithm for WSN-IoT network. Ingé nierie des Systèmes d’Information, Vol. 28, No.1, p. 231-238. https://doi.org/10.18280/isi.280127 330 Ebrahem, A.T., Mahmmood, B.S. Design of Dynamic Network for Parallel Processing on a Distributed System parallel processing, network topologies, threads, dynamic selection 28, 1, 239-245https://doi.org/10.18280/isi.280128 Ebrahem, A.T., Mahmmood, B.S. (2023). Design of dynamic network for parallel processing on a distributed system. Ingé nierie des Systèmes d’Information, Vol. 28, No. 1, p. 239- 245. https://doi.org/10.18280/isi.280128 331 Narayanrao, P.V., Surya Kumari, P.L. Regularized CNN Based Model for Analyzing, Predicting Depression and Handling Overfitting CNN, depression, dropout, NHANES, overfitting, PHQ-9 28, 1, 247-254https://doi.org/10.18280/isi.280129 Narayanrao, P.V., Surya Kumari, P.L. (2023). Regularized CNN based model for analyzing, predicting depression and handling overfitting. Ingénierie des Systèmes d’Information, Vol. 28, No. 1, p. 247-254. https://doi.org/10.18280/isi.280129 332Khare, V. Automatic Detection of Exudates in Retinal Image Using Statistical Techniques diabetic retinopathy, optic disc, GLCM, GLPCM, GLRLM features extraction, and BPNN classifier 28, 1, 255-261https://doi.org/10.18280/isi.280130 Khare, V. (2023). Automatic detection of exudates in retinal image using statistical techniques. Ingénierie des Systèmes d’ Information, Vol. 28, No. 1, p. 255-261. https://doi.org/10.18280/isi.280130 333 Belayadi, Y., Khababa, A., Attia, A., Maza, S. An Effective Method Based on Bi- Clustering and Association Rules for User Activity Analysis in Location- Based Social Network bi-clustering, location-based social network, association rules, Apriori algorithm, Gowalla dataset 27, 6, 855-864https://doi.org/10.18280/isi.270601 Belayadi, Y., Khababa, A., Attia, A., Maza, S. (2022). An effective method based on bi-clustering and association rules for user activity analysis in location-based social network. Ingé nierie des Systèmes d’Information, Vol. 27, No. 6, p. 855- 864. https://doi.org/10.18280/isi.270601 334 Mohammed, N.Y., Omar, H.A., Aziz, A.A. Contributions of Leadership Styles to Digital Transformation-An Exploratory Study of the Opinions of a Sample of Administrative Leaders at the Northern Technical University reciprocal leader, transformational leader, democratic leader, digital transformation, digital strategies, governance, digital technology 27, 6, 865-873 https://doi.org/10.18280/isi.270602 Mohammed, N.Y., Omar, H.A., Aziz, A.A. (2022). Contributions of leadership styles to digital transformation-an exploratory study of the opinions of a sample of administrative leaders at the Northern Technical University. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 865-873. https://doi.org/10.18280/isi.270602 335 Riad, M.A., El-Ghandour, O.M., El-Haleem, A.M.A. Fairness Oriented H-NOMA Devices Association and Pairing in HCN Slicing Using Cooperation Games 5G, RAN slicing, HCN, eMBB, uRLLC, H- NOMA, NBS, matching game 27, 6, 875-885https://doi.org/10.18280/isi.270603 Riad, M.A., El-Ghandour, O.M., El-Haleem, A.M.A. (2022). Fairness oriented H-NOMA devices association and pairing in HCN slicing using cooperation games. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 875-885. https://doi.org/10.18280/isi.270603 336 Yudhana, A., Umar, R., Fawait, A.B. Decision Making Using the MABAC Method to Determine the Leading Small and Medium Industry Centers in Yogyakarta SMIs, MABAC, decision making, criteria, confusion matrix 27, 6, 887-893 https://doi.org/10.18280/isi.270604 Yudhana, A., Umar, R., Fawait, A.B. (2022). Decision making using the MABAC method to determine the leading small and medium industry centers in Yogyakarta. Ingénierie des Systè mes d’Information, Vol. 27, No. 6, p. 887-893. https://doi.org/10.18280/isi.270604 337 Najmani, K., Benlahmar, E.H., Sael, N., Zellou, A. A Systematic Literature Review on Recommender Systems for MOOCs recommender system (RS), MOOCs, massive open online course, systematic literature review, course recommendation 27, 6, 895-902 https://doi.org/10.18280/isi.270605 Najmani, K., Benlahmar, E.H., Sael, N., Zellou, A. (2022). A systematic literature review on recommender systems for MOOCs. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 895-902. https://doi.org/10.18280/isi.270605 338Riadi, I., Herman, Siregar, N.H. Mobile Forensic Analysis of Signal Messenger Application on Android using Digital Forensic Research Workshop (DFRWS) Framework android, COVID-19 vaccine, cybercrime, DFRWS framework, hoax, mobile forensic, signal messenger 27, 6, 903-913https://doi.org/10.18280/isi.270606 Riadi, I., Herman, Siregar, N.H. (2022). Mobile forensic analysis of signal messenger application on android using Digital Forensic Research Workshop (DFRWS) framework. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 903-913. https://doi.org/10.18280/isi.270606 339 Abdul, A.M., Mohammad, A.A.K., Sastry, M.K., Bankapalli, J. Brute Force Attack on Distributed data Hiding in the Multi-Cloud Storage Environment More Diminutive than the Exponential Computations security, steganography, brute force attack, multi-cloud storage environment, cover media, encoding 27, 6, 915-921 https://doi.org/10.18280/isi.270607 Abdul, A.M., Mohammad, A.A.K., Sastry, M.K., Bankapalli, J. (2022). Brute force attack on distributed data hiding in the multi-cloud storage environment more diminutive than the exponential computations. Ingénierie des Systèmes d’ Information, Vol. 27, No. 6, p. 915-921. https://doi.org/10.18280/isi.270607 340 Al-Obaidy, N.A.I., Mahmood, B.S., Alkababji, A.M.F. Finger Veins Verification by Exploiting the Deep Learning Technique recognition, finger vein, fusion, deep learning 27, 6, 923-931https://doi.org/10.18280/isi.270608 Al-Obaidy, N.A.I., Mahmood, B.S., Alkababji, A.M.F. (2022). Finger veins verification by exploiting the deep learning technique. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 923-931. https://doi.org/10.18280/isi.270608 341 Hasanudin, C., Fitrianingsih, A., Utomo, D.N.P., Fitriyana, N. Android Based Material to Teach Early Reading for Primary Students using Construct 2 Apps teaching material, early reading, android, primary students, construct 2 apps 27, 6, 933-940https://doi.org/10.18280/isi.270609 Hasanudin, C., Fitrianingsih, A., Utomo, D.N.P., Fitriyana, N. (2022). Android based material to teach early reading for primary students using construct 2 apps. Ingénierie des Systè mes d’Information, Vol. 27, No. 6, p. 933-940. https://doi.org/10.18280/isi.270609 342 Mallampati, D., Hegde, N.P. Feature Extraction and Classification of Email Spam Detection Using IMTF- IDF+Skip-Thought Vectors machine learning algorithms, support vector machine, convolutional neural network, TF- IDF, Skip-thoughts 27, 6, 941-948https://doi.org/10.18280/isi.270610 Mallampati, D., Hegde, N.P. (2022). Feature extraction and classification of email spam detection using IMTF-IDF+Skip- thought vectors. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 941-948. https://doi.org/10.18280/isi.270610 343 El Aissi, M.E.M., Benjelloun, S., Lakhrissi, Y., El Haj Ben Ali, S. Big Data Enabling Fish Farming Data- Driven Strategy big data, data lake, data driven strategy, digital transformation, fish farming, data value chain 27, 6, 949-956https://doi.org/10.18280/isi.270611 El Aissi, M.E.M., Benjelloun, S., Lakhrissi, Y., El Haj Ben Ali, S. (2022). Big data enabling fish farming data-driven strategy. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 949-956. https://doi.org/10.18280/isi.270611 344Fadel, N., Kareem, E.I.A. Detecting Hand Gestures Using Machine Learning Techniques image segmentation, HSV color space, human-computer interaction, American sign language, hand gesture detection, clustering, KNN, K mean clustering, canny filter, Otsu’S segmentation, thresholds segmentation, FCM 27, 6, 957-965https://doi.org/10.18280/isi.270612 Fadel, N., Kareem, E.I.A. (2022). Detecting hand gestures using machine learning techniques. Ingénierie des Systèmes d’ Information, Vol. 27, No. 6, p. 957-965. https://doi.org/10.18280/isi.270612 345Raju, M.S.N., Rao, B.S. Classification of Colon and Lung Cancer Through Analysis of Histopathology Images Using Deep Learning Models histopathology images, visualization techniques, deep learning models, image processing techniques 27, 6, 967-971https://doi.org/10.18280/isi.270613 Raju, M.S.N., Rao, B.S. (2022). Classification of colon and lung cancer through analysis of histopathology images using deep learning models. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 967-971. https://doi.org/10.18280/isi.270613 346Arisaputra, P., Zahra, A. Indonesian Automatic Speech Recognition with XLSR-53 Indonesian, automatic speech recognition, wav2vec 2.0, XLSR-53 27, 6, 973-982https://doi.org/10.18280/isi.270614 Arisaputra, P., Zahra, A. (2022). Indonesian automatic speech recognition with XLSR-53. Ingénierie des Systèmes d’ Information, Vol. 27, No. 6, p. 973-982. https://doi.org/10.18280/isi.270614 347Pang, X.R., Pang, Y. Evaluation Model and Influencing Factors of Consumer Satisfaction with E-Commerce Platform e-commerce platform, consumer satisfaction, evaluation model, artificial neural network 27, 6, 983-990https://doi.org/10.18280/isi.270615 Pang, X.R., Pang, Y. (2022). Evaluation model and influencing factors of consumer satisfaction with e-commerce platform. Ing énierie des Systèmes d’Information, Vol. 27, No. 6, p. 983- 990. https://doi.org/10.18280/isi.270615 348Singh, M., Khare, V. Detection of Parkinson’s Disease Using the Spiral Diagram and Convolutional Neural Network spiral drawing, Parkinson’s disease convolution neural network 27, 6, 991-997https://doi.org/10.18280/isi.270616 Singh, M., Khare, V. (2022). Detection of Parkinson’s disease using the spiral diagram and convolutional neural network. Ing énierie des Systèmes d’Information, Vol. 27, No. 6, p. 991- 997. https://doi.org/10.18280/isi.270616 349P. G., V.K.R., M. M. Automatic Modulation Classification Using a Support Vector Machine-Based Pattern Recognition Algorithm modulation recognition, support vectors, kernel function, linear and non-linear kernels, cumulants 27, 6, 999-1007 https://doi.org/10.18280/isi.270617 P. G., V.K.R., M. M. (2022). Automatic modulation classification using a support vector machine-based pattern recognition algorithm. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 999-1007. https://doi.org/10.18280/isi.270617 350 Abood, A.M., Nasser, A.R., Al-Khazraji, H. Predictive Maintenance of Electromechanical Systems Using Deep Learning Algorithms: Review deep learning, electromechanical system, motor, predictive maintenance, deep learning 27, 6, 1009-1017https://doi.org/10.18280/isi.270618 Abood, A.M., Nasser, A.R., Al-Khazraji, H. (2022). Predictive maintenance of electromechanical systems using deep learning algorithms: Review. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 1009-1017. https://doi.org/10.18280/isi.270618 351Chenoori, R.K., Kavuri, R. GrFrauder: A Novel Unsupervised Clustering Algorithm for Identification Group Spam Reviewers opinion spamming, spammer groups, spam identification, spam indicators, group spam indicators 27, 6, 1019-1027 https://doi.org/10.18280/isi.270619 Chenoori, R.K., Kavuri, R. (2022). GrFrauder: A novel unsupervised clustering algorithm for identification group spam reviewers. Ingénierie des systèmes d information, Vol. 27, No. 6, p. 1019-1027. https://doi.org/10.18280/isi.270619 352 Siddamsetti, S., Srivenkatesh, M. Implementation of Blockchain with Machine Learning Intrusion Detection System for Defending IoT Botnet and Cloud Networks blockchain, cloud systems, machine learning, IoT botnets, intrusion detection system 27, 6, 1029-1038 https://doi.org/10.18280/isi.270620 Siddamsetti, S., Srivenkatesh, M. (2022). Implementation of blockchain with machine learning intrusion detection system for defending IoT botnet and cloud networks. Ingénierie des Systèmes d’Information, Vol. 27, No. 6, p. 1029-1038. https://doi.org/10.18280/isi.270620 353 Obaid, M.A., Awad, A.S., Khaleel, I.S. An Optimal Cluster Head Selection with Trusted Path Routing and Classification of Intrusion in WSN Employing CHLNNet intrusion detection, neural network, classification, cluster head, trust management, optimal route 27, 5, 685-693https://doi.org/10.18280/isi.270501 Obaid, M.A., Awad, A.S., Khaleel, I.S. (2022). An optimal cluster head selection with trusted path routing and classification of intrusion in WSN employing CHLNNet. Ingé nierie des Systèmes d’Information, Vol. 27, No. 5, p. 685- 693. https://doi.org/10.18280/isi.270501 354Mediani, C. Interactive Hybrid Recommendation of Pedagogical Resources collaborative filtering, content-based, recommender system, pedagogical resource, SVM, TF-IDF 27, 5, 695-704 https://doi.org/10.18280/isi.270502 Mediani, C. (2022). Interactive hybrid recommendation of pedagogical resources. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 695-704. https://doi.org/10.18280/isi.270502 355 Mokhtar, R., Othman, S.H., Ramlan, R. Modelling Quality Assurance System Process Using UML Notation UML, metamodelling, quality assurance, programme accreditation, higher education 27, 5, 705-716https://doi.org/10.18280/isi.270503 Mokhtar, R., Othman, S.H., Ramlan, R. (2022). Modelling quality assurance system process using UML notation. Ingé nierie des Systèmes d’Information, Vol. 27, No. 5, p. 705- 716. https://doi.org/10.18280/isi.270503 356 Setiawan, A., Hadiyanto, H., Widodo, C.E. Distance Estimation Between Camera and Shrimp Underwater Using Euclidian Distance and Triangles Similarity Algorithm shrimp, underwater, distance estimation, Euclidian distance, triangle similarity 27, 5, 717-724https://doi.org/10.18280/isi.270504 Setiawan, A., Hadiyanto, H., Widodo, C.E. (2022). Distance estimation between camera and shrimp underwater using Euclidian distance and triangles similarity algorithm. Ingé nierie des Systèmes d’Information, Vol. 27, No. 5, p. 717- 724. https://doi.org/10.18280/isi.270504 357 Prasad, B., Ramachandram, S. Prevention and Detection Mechanisms for Re-Entrancy Attack and King of Ether Throne Attack for Ethereum Smart Contracts blockchain technology, smart contracts, re- entrancy vulnerability, king of ether throne vulnerability 27, 5, 725-735https://doi.org/10.18280/isi.270505 Prasad, B., Ramachandram, S. (2022). Prevention and detection mechanisms for re-entrancy attack and king of ether throne attack for ethereum smart contracts. Ingénierie des Systè mes d’Information, Vol. 27, No. 5, p. 725-735. https://doi.org/10.18280/isi.270505 358 Saeed, S.H., Hadi, S.M., Hamad, A.H. Iraqi Paradigm E-Voting System Based on Hyperledger Fabric Blockchain Platform E-voting, blockchain, hyperledger fabric, hyperledger caliper, performance evaluation 27, 5, 737-745https://doi.org/10.18280/isi.270506 Saeed, S.H., Hadi, S.M., Hamad, A.H. (2022). Iraqi paradigm E-voting system based on hyperledger fabric blockchain platform. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 737-745. https://doi.org/10.18280/isi.270506 359 Hioual, O., Hemam, S.M., Hioual, O., Maif, L. A Hybrid Approach for Web Pages Classification keyword extraction, machine learning, supervised machine learning approach, TF- IDF, web page classification 27, 5, 747-755https://doi.org/10.18280/isi.270507 Hioual, O., Hemam, S.M., Hioual, O., Maif, L. (2022). A hybrid approach for web pages classification. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 747-755. https://doi.org/10.18280/isi.270507 360Yamparala, R., Pandian, S.N.S. A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS routing information, multi key generation, identity with trust level cryptography, key generation, key distribution, network security, trusted node, network performance 27, 5, 757-765https://doi.org/10.18280/isi.270508 Yamparala, R., Pandian, S.N.S. (2022). A neighbor trust weight based cryptography for multi key distribution for improving quality of service in MANETS. Ingénierie des Systè mes d’Information, Vol. 27, No. 5, p. 757-765. https://doi.org/10.18280/isi.270508 361 Antonio, A.M.M., Humberto, D.B., Ángel, M.C.M., de Jesús, D.B.F. Percolation Analysis in a Fractal Network with Stable Opinion Dynamics stable non-consensus opinion model, infinitely ramified network fractal, Sierpinski carpets 27, 5, 767-774https://doi.org/10.18280/isi.270509 Antonio, A.M.M., Humberto, D.B., Ángel, M.C.M., de Jesús, D.B.F. (2022). Percolation analysis in a fractal network with stable opinion dynamics. Ingénierie des Systèmes d’ Information, Vol. 27, No. 5, p. 767-774. https://doi.org/10.18280/isi.270509 362 Fadhil, R., Misliani, E., Sofyan, H. Preferences of Acceptance for Gayo Arabica Coffee Based on Sensory Test Using Adaptive Neuro-Fuzzy Inference System (ANFIS) ANFIS, Gayo Arabica coffee, membership function, sensory test, taste 27, 5, 775-782https://doi.org/10.18280/isi.270510 Fadhil, R., Misliani, E., Sofyan, H. (2022). Preferences of acceptance for Gayo Arabica coffee based on sensory test using Adaptive Neuro-Fuzzy Inference System (ANFIS). Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 775-782. https://doi.org/10.18280/isi.270510 363 Shawly, T., Alsheikhy, A.A., Said, Y.F., Lahza, H. An Effective Approach for Smart Parking Management smart management system, smart cities, efficient method, image segmentation, digital services, automatic services 27, 5, 783-789https://doi.org/10.18280/isi.270511 Shawly, T., Alsheikhy, A.A., Said, Y.F., Lahza, H. (2022). An effective approach for smart parking management. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 783-789. https://doi.org/10.18280/isi.270511 364Balne, S., Manike, C. An Exploration: Alzheimer’s Disease Classification Based on Spectral Matching of Shape Features Alzheimer’s disease, generative model, VAE, GAN, classification, spectral matching 27, 5, 791-797 https://doi.org/10.18280/isi.270512 Balne, S., Manike, C. (2022). An exploration: Alzheimer’s disease classification based on spectral matching of shape features. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 791-797. https://doi.org/10.18280/isi.270512 365 Yemelyanov, V., Nikonenko, U., Sytnyk, Y., Okhrimenko, I., Shulga, A. A Model for Countering the Information and Technical Threats of Intellectual Capital Management of Innovation-Oriented Systems in the Engineering Sector intellectual capital, engineering, innovation, systems, model 27, 5, 799-806https://doi.org/10.18280/isi.270513 Yemelyanov, V., Nikonenko, U., Sytnyk, Y., Okhrimenko, I., Shulga, A. (2022). A model for countering the information and technical threats of intellectual capital management of innovation-oriented systems in the engineering sector. Ingé nierie des Systèmes d’Information, Vol. 27, No. 5, p. 799- 806. https://doi.org/10.18280/isi.270513 366Lasmika, A., Kumaresan, M. A Smart Car Parking System Based on IoT with Gray Wolf Optimization- Probability Correlated Neural Network Recognition Methods smart car parking system, Internet of Things (IoT), recognition and classification, Anisotropic Diffusion Gaussian Filtering, Grey Level-Co-Occurrence Matrix, Probability Correlated Neural Network (PCNN) 27, 5, 807-814 https://doi.org/10.18280/isi.270514 Lasmika, A., Kumaresan, M. (2022). A smart car parking system based on IoT with Gray Wolf Optimization-probability correlated neural network recognition methods. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 807-814. https://doi.org/10.18280/isi.270514 367 Kuyoro, A.O., Ogunyolu, O.A., Ayanwola, T.G., Ayankoya, F.Y. Dynamic Effectiveness of Random Forest Algorithm in Financial Credit Risk Management for Improving Output Accuracy and Loan Classification Prediction credit scoring, decision tree, default, feature selection, forecasting, random forest, loan 27, 5, 815-821 https://doi.org/10.18280/isi.270515 Kuyoro, A.O., Ogunyolu, O.A., Ayanwola, T.G., Ayankoya, F.Y. (2022). Dynamic effectiveness of random forest algorithm in financial credit risk management for improving output accuracy and loan classification prediction. Ingénierie des Syst èmes d’Information, Vol. 27, No. 5, p. 815-821. https://doi.org/10.18280/isi.270515 368 Chennouk, H., Ziyati, E.H., El Bhiri, B. Business Value Creation Through Project Management Based on Big Data Approach big data, business value, project management, big data analytics 27, 5, 823-828https://doi.org/10.18280/isi.270516 Chennouk, H., Ziyati, E.H., El Bhiri, B. (2022). Business value creation through project management based on big data approach. Ingénierie des systèmes d information, Vol. 27, No. 5, p. 823-828. https://doi.org/10.18280/isi.270516 369 Kumar, M., Khatri, S.K., Mohammadian, M. Predicting Cancer Survival Using Multilayer Perceptron and High- Dimensional SVM Kernel Space multilayer perceptron, support vector machine, breast cancer, Haberman’s, survival, prediction, machine learning 27, 5, 829-834 https://doi.org/10.18280/isi.270517 Kumar, M., Khatri, S.K., Mohammadian, M. (2022). Predicting cancer survival using multilayer perceptron and high-dimensional SVM kernel space. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 829-834. https://doi.org/10.18280/isi.270517 370 Habelko, O., Bozhko, N., Gavrysh, I., Khltobina, O., Necheporuk, Y. Characteristics of the Influence of Digital Technologies on the System of Learning a Foreign Language digital technologies, language, engineering, system, model 27, 5, 835-841https://doi.org/10.18280/isi.270518 Habelko, O., Bozhko, N., Gavrysh, I., Khltobina, O., Necheporuk, Y. (2022). Characteristics of the influence of digital technologies on the system of learning a foreign language. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 835-841. https://doi.org/10.18280/isi.270518 371 Kale, A.P., Sonawane, S., Wahul, R.M., Dudhedia, M.A. Improved Genetic Optimized Feature Selection for Online Sequential Extreme Learning Machine genetic algorithm, online sequential extreme learning machine, pattern classification problem, feature selection problem, random search strategy 27, 5, 843-848https://doi.org/10.18280/isi.270519 Kale, A.P., Sonawane, S., Wahul, R.M., Dudhedia, M.A. (2022). Improved genetic optimized feature selection for online sequential extreme learning machine. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 843-848. https://doi.org/10.18280/isi.270519 372 Vanjire, S.K., Patil, S.B. A Novel Method for Breakdown Prediction of Vehicle Clutch Using Multiple Linear Regression vehicle clutch status, multiple linear regression, vehicle prognostic 27, 5, 849-854https://doi.org/10.18280/isi.270520 Vanjire, S.K., Patil, S.B. (2022). A novel method for breakdown prediction of vehicle clutch using multiple linear regression. Ingénierie des Systèmes d’Information, Vol. 27, No. 5, p. 849-854. https://doi.org/10.18280/isi.270520 373Danladi, M.S., Baykara, M. Design and Implementation of Temperature and Humidity Monitoring System Using LPWAN Technology data transmission, internet of things, long- range, LoRaWAN, LPWAN, temperature and humidity monitoring 27, 4, 521-529https://doi.org/10.18280/isi.270401 Danladi, M.S., Baykara, M. (2022). Design and implementation of temperature and humidity monitoring system using LPWAN technology. Ingénierie des Systèmes d’ Information, Vol. 27, No. 4, p. 521-529. https://doi.org/10.18280/isi.270401 374 Liouane, O., Femmam, S., Bakir, T., Abdelali, A.B. Cascade Machines Learning Process for Node Localization in Large-Scale Wireless Sensor Networks wireless sensors network, localization, machine learning, deep extreme learning machine 27, 4, 531-537https://doi.org/10.18280/isi.270402 Liouane, O., Femmam, S., Bakir, T., Abdelali, A.B. (2022). Cascade machines learning process for node localization in large-scale wireless sensor networks. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 531-537. https://doi.org/10.18280/isi.270402 375 Singh, N., Verma, G., Khare, V. Accurate Power Estimation Identity for DSP Blocks Targeted to FPGAs FIR, IP, DSP, power, FPGA, RTL27, 4, 539-548https://doi.org/10.18280/isi.270403 Singh, N., Verma, G., Khare, V. (2022). Accurate power estimation identity for DSP blocks targeted to FPGAs. Ingé nierie des Systèmes d’Information, Vol. 27, No. 4, p. 539- 548. https://doi.org/10.18280/isi.270403 376Zaitar, Y. Analyzing the Contribution of ERP Systems to Improving the Performance of Organizations ERP, IT impacts, value chain, competitive structure, performance 27, 4, 549-556https://doi.org/10.18280/isi.270404 Zaitar, Y. (2022). Analyzing the contribution of ERP systems to improving the performance of organizations. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 549-556. https://doi.org/10.18280/isi.270404 377Rahate, G., Chopade, N. Realistic Vertical Handoff Predictive Trigger Thresholding in Heterogeneous Networks vertical handover, heterogeneous networks, MIH, IEEE 802.21, NS-2 27, 4, 557-563https://doi.org/10.18280/isi.270405 Rahate, G., Chopade, N. (2022). Realistic vertical handoff predictive trigger thresholding in heterogeneous networks. Ingé nierie des Systèmes d’Information, Vol. 27, No. 4, p. 557- 563. https://doi.org/10.18280/isi.270405 378Saitong, P. Designing, Developing, and Efficiency Evaluation of a Smartphone Application for Blood Donation application for blood donation, smartphone, prototype, efficiency evaluation 27, 4, 565-576https://doi.org/10.18280/isi.270406 Saitong, P. (2022). Designing, developing, and efficiency evaluation of a smartphone application for blood donation. Ingé nierie des Systèmes d’Information, Vol. 27, No. 4, p. 565- 576. https://doi.org/10.18280/isi.270406 379 Alao, O.D., Priscilla, E.A., Amanze, R.C., Kuyoro, S.O., Adebayo, A.O. User-Centered/User Experience Uc/Ux Design Thinking Approach for Designing a University Information Management System user experience, user-centered design, design thinking, usability testing and user interface design 27, 4, 577-590 https://doi.org/10.18280/isi.270407 Alao, O.D., Priscilla, E.A., Amanze, R.C., Kuyoro, S.O., Adebayo, A.O. (2022). User-centered/user experience Uc/Ux design thinking approach for designing a university information management system. Ingénierie des Systèmes d’ Information, Vol. 27, No. 4, p. 577-590. https://doi.org/10.18280/isi.270407 380 Patra, A., Behera, S.K., Barpanda, N.K., Sethy, P.K. Effect of Microscopy Magnification Towards Grading of Breast Invasive Carcinoma: An Experimental Analysis on Deep Learning and Traditional Machine Learning Methods breast invasive carcinoma, microscopy magnification, breast cancer, deep learning 27, 4, 591-596https://doi.org/10.18280/isi.270408 Patra, A., Behera, S.K., Barpanda, N.K., Sethy, P.K. (2022). Effect of microscopy magnification towards grading of breast invasive carcinoma: An experimental analysis on deep learning and traditional machine learning methods. Ingénierie des Systè mes d’Information, Vol. 27, No. 4, p. 591-596. https://doi.org/10.18280/isi.270408 381 Basysyar, F.M., Dikananda, A.R., Kurnia, D.A. Prediction of Bank Customer Potential Using Creative Marketing Based on Exploratory Data Analysis and Decision Tree Algorithm decision tree, best trashold determination, classification, creative marketing, Python 3 27, 4, 597-604 https://doi.org/10.18280/isi.270409 Basysyar, F.M., Dikananda, A.R., Kurnia, D.A. (2022). Prediction of bank customer potential using creative marketing based on exploratory data analysis and decision tree algorithm. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 597-604. https://doi.org/10.18280/isi.270409 382Kakulla, S., Malladi, S. Sybil Attack Detection in VANET Using Machine Learning Approach sybil attack, Vehicular Ad-hoc Network (VANET), network security, network simulator 27, 4, 605-611 https://doi.org/10.18280/isi.270410 Kakulla, S., Malladi, S. (2022). Sybil attack detection in VANET using machine learning approach. Ingénierie des Systè mes d’Information, Vol. 27, No. 4, p. 605-611. https://doi.org/10.18280/isi.270410 383 Zhavoronok, A. Popelo, O., Shchur, R., Ostrovska, N., Kordzaia, N. The Role of Digital Technologies in the Transformation of Regional Models of Households’ Financial Behavior in the Conditions of the National Innovative Economy Development innovative economy, national economy, financial behavior of households, digitalization, digital technologies, regional model of financial behavior 27, 4, 613-620https://doi.org/10.18280/isi.270411 Zhavoronok, A. Popelo, O., Shchur, R., Ostrovska, N., Kordzaia, N. (2022). The role of digital technologies in the transformation of regional models of households’ financial behavior in the conditions of the national innovative economy development. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 613-620. https://doi.org/10.18280/isi.270411 384 Gaykar, R.S., Khanaa, V., Joshi, S.D. A Hybrid Supervised Learning Approach for Detection and Mitigation of Job Failure with Virtual Machines in Distributed Environments hybrid machine learning, virtual machine, job failure, detection and mitigation, load balancing 27, 4, 621-627 https://doi.org/10.18280/isi.270412 Gaykar, R.S., Khanaa, V., Joshi, S.D. (2022). A hybrid supervised learning approach for detection and mitigation of job failure with virtual machines in distributed environments. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 621-627. https://doi.org/10.18280/isi.270412 385 Minor, K.A., Kartowisastro, I.H. Automatic Music Transcription Using Fourier Transform for Monophonic and Polyphonic Audio File musical notation, music transcription, note value detection, Fourier transform 27, 4, 629-635https://doi.org/10.18280/isi.270413 Minor, K.A., Kartowisastro, I.H. (2022). Automatic music transcription using Fourier Transform for monophonic and polyphonic audio file. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 629-635. https://doi.org/10.18280/isi.270413 386 Salankar, P., Avasthi, V., Pasricha, A. Analysis and Validation of Lightweight Authentication Algorithm IoT, CoAP, DTLS, lightweight mutual authentication, ROT 18, validation, simulation 27, 4, 637-643https://doi.org/10.18280/isi.270414 Salankar, P., Avasthi, V., Pasricha, A. (2022). Analysis and validation of lightweight authentication algorithm. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 637-643. https://doi.org/10.18280/isi.270414 387 Hidayat, M.T., Rahim, S.S., Parumo, S., A’bas, N.N., Sani, M.A.M, Aziz, H.A. Designing a Two - Dimensional Animation for Verbal Apraxia Therapy for Children with Verbal Apraxia of Speech childhood apraxia of speech, verbal dyspraxia, speech and language disorder, 2D animation, visual animation treatment 27, 4, 645-651https://doi.org/10.18280/isi.270415 Hidayat, M.T., Rahim, S.S., Parumo, S., A’bas, N.N., Sani, M.A.M, Aziz, H.A. (2022). Designing a two - dimensional animation for verbal apraxia therapy for children with verbal apraxia of speech. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 645-651. https://doi.org/10.18280/isi.270415 388 Prakash, S.J., Chetty, M.S.R., Aravapalli, J. Swarm Based Optimization for Image Dehazing from Noise Filtering Perspective de-hazing, HRNFP, bat algorithm, noise filtering 27, 4, 653-658https://doi.org/10.18280/isi.270416 Prakash, S.J., Chetty, M.S.R., Aravapalli, J. (2022). Swarm based optimization for image dehazing from noise filtering perspective. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 653-658. https://doi.org/10.18280/isi.270416 389 Budiarti, M., Ritonga, M., Rahmawati, Yasmadi, Julhadi, Zulmuqim. Padlet as a LMS Platform in Arabic Learning in Higher Education e-learning, Padlet, LMS, Arabic language teaching 27, 4, 659-664https://doi.org/10.18280/isi.270417 Budiarti, M., Ritonga, M., Rahmawati, Yasmadi, Julhadi, Zulmuqim. (2022). Padlet as a LMS platform in Arabic learning in higher education. Ingénierie des Systèmes d’ Information, Vol. 27, No. 4, p. 659-664. https://doi.org/10.18280/isi.270417 390Velicheti, S., Prudhivi, M.R. Design of Log Periodic Dipole Array with FEM and FDTD Based Analysis for GSM, PCS, Industry Standard Medical and Wi-Fi Communication Applications LPDA, HFSS, medical application27, 4, 665-671https://doi.org/10.18280/isi.270418 Velicheti, S., Prudhivi, M.R. (2022). Design of log periodic dipole array with FEM and FDTD based analysis for GSM, PCS, industry standard medical and Wi-Fi communication applications. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 665-671. https://doi.org/10.18280/isi.270418 391Jamal, M., Hassan, T.A. Speech Coding Using Discrete Cosine Transform and Chaotic Map speech coding, data compression, transform coding, neural speech coding, speech signal 27, 4, 673-677https://doi.org/10.18280/isi.270419 Jamal, M., Hassan, T.A. (2022). Speech coding using discrete cosine transform and chaotic map. Ingénierie des Systèmes d’ Information, Vol. 27, No. 4, p. 673-677. https://doi.org/10.18280/isi.270419 392Shelke, R., Vanjale, S. Recursive LSTM for the Classification of Named Entity Recognition for Hindi Language NER, Hindi language, BiLSTM, ML 27, 4, 679-684https://doi.org/10.18280/isi.270420 Shelke, R., Vanjale, S. (2022). Recursive LSTM for the classification of named entity recognition for Hindi language. Ingénierie des Systèmes d’Information, Vol. 27, No. 4, p. 679-684. https://doi.org/10.18280/isi.270420 393 Johnson, G.Y.E., Adepo, J., Kamagate, B.H., Oumtanaga, S. Inference Control in Aggregation Query Processing Based on Supervised Learning Models data security, inference control, supervised learning, aggregation queries, data warehouses 27, 3, 357-368https://doi.org/10.18280/isi.270301 Johnson, G.Y.E., Adepo, J., Kamagate, B.H., Oumtanaga, S. (2022). Inference control in aggregation query processing based on supervised learning models. Ingénierie des Systèmes d’ Information, Vol. 27, No. 3, p. 357-368. https://doi.org/10.18280/isi.270301 394 Rizal, A., Handzah, V.A.P., Kusuma, P.D. Heart Sounds Classification Using Short-Time Fourier Transform and Gray Level Difference Method grey-level difference matrix, short-time Fourier transform, auscultation, classification 27, 3, 369-376 https://doi.org/10.18280/isi.270302 Rizal, A., Handzah, V.A.P., Kusuma, P.D. (2022). Heart sounds classification using short-time Fourier transform and gray level difference method. Ingénierie des Systèmes d’ Information, Vol. 27, No. 3, p. 369-376. https://doi.org/10.18280/isi.270302 395 Foughali, A., Kitouni, I., Benmerzoug, D. ODMR-IoT: Outliers Detection Based Multipath Routing Protocol for Internet of Things (IoT) IoT, contextual outlier detection, clustering, NS3 27, 3, 377-385https://doi.org/10.18280/isi.270303 Foughali, A., Kitouni, I., Benmerzoug, D. (2022). ODMR-IoT: Outliers detection based multipath routing protocol for Internet of Things (IoT). Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 377-385. https://doi.org/10.18280/isi.270303 396 Afifi, S., Santoso, H.B., Hasani, L.M. Investigating Students’ Online Self- Regulated Learning Skills and Their E- Learning Experience in a Prophetic Communication Course learning experiences, learning strategies, online learning, prophetic communication, self-regulated learning 27, 3, 387-397 https://doi.org/10.18280/isi.270304 Afifi, S., Santoso, H.B., Hasani, L.M. (2022). Investigating students’ online self-regulated learning skills and their e- learning experience in a prophetic communication course. Ingé nierie des Systèmes d’Information, Vol. 27, No. 3, p. 387- 397. https://doi.org/10.18280/isi.270304 397Saeed, R.S., Oleiwi, B.K. A Survey of Deep Learning Applications for COVID-19 Detection Techniques Based on Medical Images Chest X-Ray, CT-Scan, convolutional neural networks, COVID-19, deep learning, disease detection, medical applications, medical images 27, 3, 399-408 https://doi.org/10.18280/isi.270305 Saeed, R.S., Oleiwi, B.K. (2022). A survey of deep learning applications for COVID-19 detection techniques based on medical images. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 399-408. https://doi.org/10.18280/isi.270305 398 Pongsatitpat, B., Prathepha, K., Obma, J., Sa-Ngiamvibool, W. The Automatic Brain Tumor Segmentation Based on MRI Using Optimal Morphology Thresholding Methods brain tumors, threshold, morphology, segmentation, MRI images 27, 3, 409-414https://doi.org/10.18280/isi.270306 Pongsatitpat, B., Prathepha, K., Obma, J., Sa-Ngiamvibool, W. (2022). The automatic brain tumor segmentation based on MRI using optimal morphology thresholding methods. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 409-414. https://doi.org/10.18280/isi.270306 399 Ahmed, B.S., Benbouzid, S., Nibouche, F. Design and Implementation of Smart Glasses with ISMS and Risk Management Functionalities for a Technical Operator smart glasses, information security system (ISMS), maintenance, risk analysis, functional analysis, design 27, 3, 415-423 https://doi.org/10.18280/isi.270307 Ahmed, B.S., Benbouzid, S., Nibouche, F. (2022). Design and implementation of smart glasses with ISMS and risk management functionalities for a technical operator. Ingénierie des Systèmes d’Informatio, Vol. 27, No. 3, p. 415-423. https://doi.org/10.18280/isi.270307 400 Roy, R., Rao, G.A. A Framework for an Efficient Recommendation System Using Time and Fairness Constraint Based Web Usage Mining Technique web usage mining, clustering, constraints, fairness, cost, recommendation system 27, 3, 425-431https://doi.org/10.18280/isi.270308 Roy, R., Rao, G.A. (2022). A framework for an efficient recommendation system using time and fairness constraint based web usage mining technique. Ingénierie des Systèmes d’ Informatio, Vol. 27, No. 3, p. 425-431. https://doi.org/10.18280/isi.270308 401 Chaiwachiragompol, A., Suwannata, N. The Study of Learning System for Infant Cry Classification Using Discrete Wavelet Transform and Extreme Machine Learning discrete wavelet transform, learning machine, infant cry, classification, feature extraction 27, 3, 433-440https://doi.org/10.18280/isi.270309 Chaiwachiragompol, A., Suwannata, N. (2022). The study of learning system for infant cry classification using discrete wavelet transform and extreme machine learning. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 433-440. https://doi.org/10.18280/isi.270309 402 Mohamed, S.A., Alsaif, O.I., Saleh, I.A. Intrusion Detection Network Attacks Based on Whale Optimization Algorithm anomaly, intrusion detection, network attack, whale optimization algorithm 27, 3, 441-446https://doi.org/10.18280/isi.270310 Mohamed, S.A., Alsaif, O.I., Saleh, I.A. (2022). Intrusion detection network attacks based on whale optimization algorithm. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 441-446. https://doi.org/10.18280/isi.270310 403 Ajaegbu, O., Ajaegbu, C., Quilling, R. Nigeria EndSARS Protest: False Information Mitigation Hybrid Model fake news, false information, media, protest, social media 27, 3, 447-455https://doi.org/10.18280/isi.270311 Ajaegbu, O., Ajaegbu, C., Quilling, R. (2022). Nigeria EndSARS protest: False information mitigation hybrid model. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 447-455. https://doi.org/10.18280/isi.270311 404Zaitar, Y. Design of a Balanced Model for Evaluating the Outcomes of ERP Projects ERP, IT impacts, evaluation model, balanced scorecard, performance 27, 3, 457-462https://doi.org/10.18280/isi.270312 Zaitar, Y. (2022). Design of a balanced model for evaluating the outcomes of ERP projects. Ingénierie des Systèmes d’ Information, Vol. 27, No. 3, p. 457-462. https://doi.org/10.18280/isi.270312 405 Rukayah, Daryanto, J., Atmojo, I.R.W., Ardiansyah, R., Saputri, D.Y., Salimi, M. Augmented Reality Media Development in STEAM Learning in Elementary Schools learning media, augmented reality, STEAM elementary school 27, 3, 463-471https://doi.org/10.18280/isi.270313 Rukayah, Daryanto, J., Atmojo, I.R.W., Ardiansyah, R., Saputri, D.Y., Salimi, M. (2022). Augmented reality media development in STEAM learning in elementary schools. Ingé nierie des Systèmes d’Information, Vol. 27, No. 3, p. 463- 471. https://doi.org/10.18280/isi.270313 406Dudhedia, M.A., Ravinder, Y. Impact of Strategy Optimization on Game-Based CR-MAC Protocol Performance game theory, self-configuring, wireless networks, contention window, cognitive radio based wireless network 27, 3, 473-478https://doi.org/10.18280/isi.270314 Dudhedia, M.A., Ravinder, Y. (2022). Impact of strategy optimization on game-based CR-MAC protocol performance. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 473-478. https://doi.org/10.18280/isi.270314 407El Mettiti, A., Oumsis, M. A Stacked Autoencoder and Multilayer Perceptrons for mmWave Beamforming Prediction 6G networks, beamforming, artificial intelligence, deep learning, autoencoders, millimeter-wave 27, 3, 479-485https://doi.org/10.18280/isi.270315 El Mettiti, A., Oumsis, M. (2022). A stacked autoencoder and multilayer perceptrons for mmWave beamforming prediction. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 479-485. https://doi.org/10.18280/isi.270315 408Thottathyl, H., Pavan, K.K. Differential Evolution Model for Identification of Most Influenced Gene in Brest Cancer Data microarray data, clustering, unsupervised learning, unlabeled data, gene expression 27, 3, 487-493https://doi.org/10.18280/isi.270316 Thottathyl, H., Pavan, K.K. (2022). Differential evolution model for identification of most influenced gene in Brest cancer data. Ingénierie des Systèmes d’Information, Vol. 27, No. 3, p. 487-493. https://doi.org/10.18280/isi.270316 409 Gusnina, M., Wiharto, Salamah, U. Student Performance Prediction in Sebelas Maret University Based on the Random Forest Algorithm random forest, classification, information gain, student academic performance, support vector machine 27, 3, 495-501 https://doi.org/10.18280/isi.270317 Gusnina, M., Wiharto, Salamah, U. (2022). Student performance prediction in Sebelas Maret University based on the random forest algorithm. Ingénierie des Systèmes d’ Information, Vol. 27, No. 3, p. 495-501. https://doi.org/10.18280/isi.270317 410 Alharbi, L.M., Qamar, A.M. Arabic Sentiment Analysis of Eateries’ Reviews Using Deep Learning sentiment analysis, machine learning, deep learning 27, 3, 503-508https://doi.org/10.18280/isi.270318 Alharbi, L.M., Qamar, A.M. (2022). Arabic sentiment analysis of eateries’ reviews using deep learning. Ingénierie des Systè mes d’Information, Vol. 27, No. 3, p. 503-508. https://doi.org/10.18280/isi.270318 411 Daggubati, S.P., Kasukurthi, V.R., PVGD, P.R. Cryptography and Reference Sequence Based DNA/RNA Sequence Compression Algorithms CryptoCompress, RefCompress, DNA compression, reference DNA, cryptographic hash function 27, 3, 509-514 https://doi.org/10.18280/isi.270319 Daggubati, S.P., Kasukurthi, V.R., PVGD, P.R. (2022). Cryptography and reference sequence based DNA/RNA sequence compression algorithms. Ingénierie des Systèmes d’ Information, Vol. 27, No. 3, p. 509-514. https://doi.org/10.18280/isi.270319 412Wen, J., Zhao, Y.L. An Urban and Rural Educational Resource Sharing and Exchange Platform Based on Cloud Platform Access Technology educational resources, cloud platform, operation convenience, resource quality, sharing, reliability 27, 3, 515-520 https://doi.org/10.18280/isi.270320 Wen, J., Zhao, Y.L. (2022). An urban and rural educational resource sharing and exchange platform based on cloud platform access technology. Ingénierie des Systèmes d’ Information, Vol. 27, No. 3, p. 515-520. https://doi.org/10.18280/isi.270320 413 Sainuddin, S., Subali, B., Jailani, Elvira, M. The Development and Validation Prospective Mathematics Teachers Holistic Assessment Tools holistic assessment, prospective mathematics teacher, construct validity, EFA, CFA 27, 2, 171-184https://doi.org/10.18280/isi.270201 Sainuddin, S., Subali, B., Jailani, Elvira, M. (2022). The development and validation prospective mathematics teachers holistic assessment tools. Ingénierie des Systèmes d’ Informatio, Vol. 27, No. 2, p. 171-184. https://doi.org/10.18280/isi.270201 414 Chakraoui, M., Mouhni, N., Elkalay, A., Nemiche, M. Deep Negative Effects of Misleading Information about COVID-19 on Populations Through Twitter COVID-19, sentiment analysis, misinformation, social networks, rumors about COVID-19 27, 2, 185-192 https://doi.org/10.18280/isi.270202 Chakraoui, M., Mouhni, N., Elkalay, A., Nemiche, M. (2022). Deep negative effects of misleading information about COVID- 19 on populations through twitter. Ingénierie des Systèmes d’ Information, Vol. 27, No. 2,. p. 185-192. https://doi.org/10.18280/isi.270202 415 Madhurima, V., Padmapriya, K. ASIC Implementation of Hardware Efficient DTCWT Architecture for Intra Prediction HEVC Coding in Complex Wavelet intra prediction, dual tree complex wavelet, ASIC, low power, HEVC, systolic array, parallel processing 27, 2, 193-204https://doi.org/10.18280/isi.270203 Madhurima, V., Padmapriya, K. (2022). ASIC implementation of hardware efficient DTCWT architecture for intra prediction HEVC coding in complex wavelet. Ingénierie des Systèmes d’ Information, Vol. 27, No. 2, p. 193-204. https://doi.org/10.18280/isi.270203 416 Urba, S., Chervona, O., Panchenko, V., Artemenko, L., Guk, O. Features of the Application of Digital Technologies for Human Resources Management of an Engineering Enterprise digital technologies, management, engineering, HR-Management, engineering enterprises 27, 2, 205-211https://doi.org/10.18280/isi.270204 Urba, S., Chervona, O., Panchenko, V., Artemenko, L., Guk, O. (2022). Features of the application of digital technologies for human resources management of an engineering enterprise. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 205-211. https://doi.org/10.18280/isi.270204 417 Satish Babu, J., Krishna Mohan, G. An Intelligent Multi-Objective Evolutionary Model for Establishing Security in Cyber-Physical Systems cyber-physical system, element-driven problem, multi-objective evolutionary algorithm, optimization, uncertain, feasibility 27, 2, 213-221https://doi.org/10.18280/isi.270205 Satish Babu, J., Krishna Mohan, G. (2022). An intelligent multi-objective evolutionary model for establishing security in cyber-physical systems. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 213-221. https://doi.org/10.18280/isi.270205 418Azeez, N.D., Mohammed, N.Y. Factors Influencing Adoption of Mobile Health Monitoring System: Extending UTAUT2 with Trust mobile health monitoring services, AUTAUT2, trust, structure equation modeling (SEM) 27, 2, 223-232https://doi.org/10.18280/isi.270206 Azeez, N.D., Mohammed, N.Y. (2022). Factors influencing adoption of mobile health monitoring system: Extending UTAUT2 with trust. Ingénierie des Systèmes d’Informatio, Vol. 27, No. 2, p. 223-232. https://doi.org/10.18280/isi.270206 419Gayal, B.S., Patil, S.R. Detection and Localization of Abnormal Events for Smart Surveillance vision only system, multi-model system, deep convolutional neural network (DCNN), bi-directional prediction model, GWO based deep CNN, SMO based deep CNN 27, 2, 233-241https://doi.org/10.18280/isi.270207 Gayal, B.S., Patil, S.R. (2022). Detection and localization of abnormal events for smart surveillance. Ingénierie des Systè mes d’Information, Vol. 27, No. 2, p. 233-241. https://doi.org/10.18280/isi.270207 420 Septinaningrum, Hakam, K.A., Setiawan, W., Agustin, M. Developing of Augmented Reality Media Containing Grebeg Pancasila for Character Learning in Elementary School Grebeg Pancasila, augmented reality, character learning, elementary school 27, 2, 243-253https://doi.org/10.18280/isi.270208 Septinaningrum, Hakam, K.A., Setiawan, W., Agustin, M. (2022). Developing of augmented reality media containing Grebeg Pancasila for character learning in elementary school. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 243-253. https://doi.org/10.18280/isi.270208 421 Ramo, R.M., Alshaher, A.A., Al-Fakhry, N.A. The Effect of Using Artificial Intelligence on Learning Performance in Iraq: The Dual Factor Theory Perspective artificial intelligence, learning performance, constructivism theory, TAM3, UTAUT, BM, dual factor theory, status quo bias theory 27, 2, 255-265https://doi.org/10.18280/isi.270209 Ramo, R.M., Alshaher, A.A., Al-Fakhry, N.A. (2022). The effect of using artificial intelligence on learning performance in Iraq: The dual factor theory perspective. Ingénierie des Systè mes d’Information, Vol. 27, No. 2, p. 255-265. https://doi.org/10.18280/isi.270209 422 Rao, K.K., Shanti, C., Rao, A.J., Babu, S.B., Kumari, G.L., Surekha, Y. Personalized Smart Diet Assistance System in Health Care Prosperity with AI and AR augmented reality, WHO, AI, smart diet, transmissible diseases 27, 2, 267-274https://doi.org/10.18280/isi.270210 Rao, K.K., Shanti, C., Rao, A.J., Babu, S.B., Kumari, G.L., Surekha, Y. (2022). Personalized smart diet assistance system in health care prosperity with AI and AR. Ingénierie des Systè mes d’Information, Vol. 27, No. 2, p. 267-274. https://doi.org/10.18280/isi.270210 423 Jamal, M.A., El-Khodary, I.A., Ali, D.S. A Two-Stage Rough Data Envelopment Analysis and Its Application in Three- Level Supply Chain Performance Evaluation data envelopment analysis, decision- making units, rough set theory, two-stage RDEA 27, 2, 275-283https://doi.org/10.18280/isi.270211 Jamal, M.A., El-Khodary, I.A., Ali, D.S. (2022). A two-stage rough data envelopment analysis and its application in three- level supply chain performance evaluation. Ingénierie des Systè mes d’Information, Vol. 27, No. 2, p. 275-283. https://doi.org/10.18280/isi.270211 424 Rajyalakshmi, C., Rao, K.R.M., Rao, R.R. A Novel Architecture Implementation Using Multi Scale Shared Residual Network from Remote Sensing Images for Extracting Water Bodies multi-scale shared residual network (MSSResNet), convolutional block attention module (CBAM), satellite imagery 27, 2, 285-291 https://doi.org/10.18280/isi.270212 Rajyalakshmi, C., Rao, K.R.M., Rao, R.R. (2022). A novel architecture implementation using multi scale shared residual network from remote sensing images for extracting water bodies. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 285-291. https://doi.org/10.18280/isi.270212 425 Mekahlia, F.Z., Bouzama, M.Z., Nechar, S. Impact of Vaccination on COVID-19 Spread in Real Time: Visualization and Analysis Tool data scientist, data analyst, visualization, vaccine, COVID-19, business intelligence, dashboards 27, 2, 293-301https://doi.org/10.18280/isi.270213 Mekahlia, F.Z., Bouzama, M.Z., Nechar, S. (2022). Impact of vaccination on COVID-19 spread in real time: Visualization and analysis tool. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 293-301. https://doi.org/10.18280/isi.270213 426 Sharma, A., Sharma, S., Gulati, S., Choudhury, T. CAPTCHA Robustness- AI Approach Using to Web Security human verification, CAPTCHA, neural engine, gesture recognition 27, 2, 303-311 https://doi.org/10.18280/isi.270214 Sharma, A., Sharma, S., Gulati, S., Choudhury, T. (2022). CAPTCHA robustness- AI approach using to web security. Ing énierie des Systèmes d’Information, Vol. 27, No. 2, p. 303- 311. https://doi.org/10.18280/isi.270214 427 Hadad, A.A., Khalid, H.N., Naser, Z.S., Taha, M.S. A Robust Color Image Watermarking Scheme Based on Discrete Wavelet Transform Domain and Discrete Slantlet Transform Technique information security, digital watermarking, copyright, discrete wavelet transform, discrete Slantlet transform 27, 2, 313-319 https://doi.org/10.18280/isi.270215 Hadad, A.A., Khalid, H.N., Naser, Z.S., Taha, M.S. (2022). A robust color image watermarking scheme based on Discrete Wavelet Transform domain and Discrete Slantlet Transform technique. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 313-319. https://doi.org/10.18280/isi.270215 428 Mou, S.X., Zhang, S., Chen, J.W., Zhai, H.Y., Zhang, Y.D. A Deep Learning-Based Grouped Teaching Strategy for Experimental Training deep learning, student grouping, experimental training 27, 2, 321-326https://doi.org/10.18280/isi.270216 Mou, S.X., Zhang, S., Chen, J.W., Zhai, H.Y., Zhang, Y.D. (2022). A deep learning-based grouped teaching strategy for experimental training. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 321-326. https://doi.org/10.18280/isi.270216 429 Patil, S.A., Komati, T.R. Designing of a Novel Neural Network Model for Classification of Music Genre neural network, feature extraction, music genres 27, 2, 327-333 https://doi.org/10.18280/isi.270217 Patil, S.A., Komati, T.R. (2022). Designing of a novel neural network model for classification of music genre. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 327-333. https://doi.org/10.18280/isi.270217 430 Andriyani, Y., Daqiqil Id, I., Mahdiyah, E., Aminuddin, A. Use Case Realization in Software Reverse Engineering reverse engineering, use case diagram, event table, requirement specification 27, 2, 335-341https://doi.org/10.18280/isi.270218 Andriyani, Y., Daqiqil Id, I., Mahdiyah, E., Aminuddin, A. (2022). Use case realization in software reverse engineering. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 335-341. https://doi.org/10.18280/isi.270218 431 Sheetal, A.P., Bhima, R.T., Karampudi, R., Prasad, S.D.V. Load Balancing and Parallel Computation Model for Performance and Accuracy over the Cluster of Nodes cloud computing, load balancing, parallel computing, service oriented architectures 27, 2, 343-348https://doi.org/10.18280/isi.270219 Sheetal, A.P., Bhima, R.T., Karampudi, R., Prasad, S.D.V. (2022). Load balancing and parallel computation model for performance and accuracy over the cluster of nodes. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 343-348. https://doi.org/10.18280/isi.270219 432 Gao, J., Ismail, N., Gao, Y.J. Computer Big Data Analysis and Predictive Maintenance Based on Deep Learning deep learning, computer big data, predictive maintenance, self-adaptively adjusted sampling, parallel processing, Convolutional Neural Network (CNN) 27, 2, 349-355https://doi.org/10.18280/isi.270220 Gao, J., Ismail, N., Gao, Y.J. (2022). Computer big data analysis and predictive maintenance based on deep learning. Ingénierie des Systèmes d’Information, Vol. 27, No. 2, p. 349-355. https://doi.org/10.18280/isi.270220 433El Mettiti, A., Oumsis, M. A Survey on 6G Networks: Vision, Requirements, Architecture, Technologies and Challenges 6G networks, terahertz communication, artificial intelligence, internet of things, 6G requirements 27, 1, 1-10https://doi.org/10.18280/isi.270101 El Mettiti, A., Oumsis, M. (2022). A survey on 6G networks: Vision, requirements, architecture, technologies and challenges. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 1-10. https://doi.org/10.18280/isi.270101 434 Venkatesh, D.Y., Mallikarjunaiah, K., Srikantaswamy, M. A Comprehensive Review of Low Density Parity Check Encoder Techniques low density parity check (LDPC), Bose Chaudhuri Hocquenghem (BCH), field programmable gate array, quasi-cyclic low density parity check (QC-LDPC), consultative committee for space data systems (CCSDS) 27, 1, 11-20https://doi.org/10.18280/isi.270102 Venkatesh, D.Y., Mallikarjunaiah, K., Srikantaswamy, M. (2022). A comprehensive review of low density parity check encoder techniques. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 11-20. https://doi.org/10.18280/isi.270102 435 Herrera-Granda, E.P., Lorente- Leyva, L.L., Yambay, J., Aranguren, J., Ibarra, M., Peña, J. Controller Modeling of a Quadrotor space states, controller modeling, quadrotor, trajectory tracking 27, 1, 21-28https://doi.org/10.18280/isi.270103 Herrera-Granda, E.P., Lorente-Leyva, L.L., Yambay, J., Aranguren, J., Ibarra, M., Peña, J. (2022). Controller modeling of a quadrotor. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 21-28. https://doi.org/10.18280/isi.270103 436 Kumar, C.K., Ramachandran, N. A Comprehensive Review on Intrusion Detection and Prevention Schemes for Network Coding Enabled Mobile Small Cells intrusion detection, intrusion prevention, network coding, mobile small cells, DDoS attacks, pollution attacks, entropy attacks, jamming attacks, network security 27, 1, 29-39https://doi.org/10.18280/isi.270104 Kumar, C.K., Ramachandran, N. (2022). A comprehensive review on intrusion detection and prevention schemes for network coding enabled mobile small cells. Ingénierie des Syst èmes d’Information, Vol. 27, No. 1, p. 29-39. https://doi.org/10.18280/isi.270104 437Chabbi, S., Chefrour, D. Vulnerability of the Dynamic Array PIN Protocol PIN authentication, automated teller machine, NFC smartphone, dynamic array PIN protocol, vulnerability 27, 1, 41-47https://doi.org/10.18280/isi.270105 Chabbi, S., Chefrour, D. (2022). Vulnerability of the dynamic array PIN protocol. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 41-47. https://doi.org/10.18280/isi.270105 438Tatale, S., Prakash, V.C. Automatic Generation and Optimization of Combinatorial Test Cases from UML Activity Diagram Using Particle Swarm Optimization covering arrays, combinatorial test case generation, behavioral UML diagrams, activity diagram, railway reservation system, concession management system, particle swarm optimization 27, 1, 49-59https://doi.org/10.18280/isi.270106 Tatale, S., Prakash, V.C. (2022). Automatic generation and optimization of combinatorial test cases from UML activity diagram using particle swarm optimization. Ingénierie des Syst èmes d’Information, Vol. 27, No. 1, p. 49-59. https://doi.org/10.18280/isi.270106 439 El-Tayeb, M., Taha, A., Fayed, Z.T. Live-Streamed Video Reconstruction for Web Browser Forensics digital forensics, browser cache, live- streams, Nimo TV, YouTube live, google chrome, Firefox, chromium 27, 1, 61-66 https://doi.org/10.18280/isi.270107 El-Tayeb, M., Taha, A., Fayed, Z.T. (2022). Live-streamed video reconstruction for web browser forensics. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 61-66. https://doi.org/10.18280/isi.270107 440 Pujari, J.J., Kanadam, K.P. Semi Global Pairwise Sequence Alignment Using New Chromosome Structure Genetic Algorithm sequence alignment, genetic algorithm, optimal gaps, chromosome structure 27, 1, 67-74https://doi.org/10.18280/isi.270108 Pujari, J.J., Kanadam, K.P. (2022). Semi global pairwise sequence alignment using new chromosome structure genetic algorithm. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 67-74. https://doi.org/10.18280/isi.270108 441 Thao, L.Q., Cuong, D.D., Anh, N.T., Anh, P.M., Duc, H.M., Minh, N. Automatic Traffic Red-Light Violation Detection Using AI traffic, red light violation, machine learning, convolutional neural network 27, 1, 75-80 https://doi.org/10.18280/isi.270109 Thao, L.Q., Cuong, D.D., Anh, N.T., Anh, P.M., Duc, H.M., Minh, N. (2022). Automatic traffic red-light violation detection using AI. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 75-80. https://doi.org/10.18280/isi.270109 442 Tridalestari, F.A., Mustafid, Warsito, B., Wibowo, A., Prasetyo, H.N. Analysis of E-Commerce Process in the Downstream Section of Supply Chain Management Based on Process and Data Mining downstream supply chain management, E- commerce, process mining, data mining 27, 1, 81-91 https://doi.org/10.18280/isi.270110 Tridalestari, F.A., Mustafid, Warsito, B., Wibowo, A., Prasetyo, H.N. (2022). Analysis of e-commerce process in the downstream section of supply chain management based on process and data mining. Ingénierie des Systèmes d’ Information, Vol. 27, No. 1, p. 81-91. https://doi.org/10.18280/isi.270110 443Kannan, E., Kothamasu, L.A. Fine-Tuning BERT Based Approach for Multi-Class Sentiment Analysis on Twitter Emotion Data classification algorithms, machine learning, sentiment analysis, twitter, emotion 27, 1, 93-100https://doi.org/10.18280/isi.270111 Kannan, E., Kothamasu, L.A. (2022). Fine-tuning BERT based approach for multi-class sentiment analysis on Twitter emotion data. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 93-100. https://doi.org/10.18280/isi.270111 444 Maamra, O.E., Kholladi, M.K., Kazar, O., Harous, S. Smart-Approach Based Internet of Things and Skyline Query for Multicriteria Decisions for Travel Services Internet of Things, business intelligence and analytics, skyline query, cloud computing, data mining, multicriteria decision 27, 1, 101-109 https://doi.org/10.18280/isi.270112 Maamra, O.E., Kholladi, M.K., Kazar, O., Harous, S. (2022). Smart-approach based Internet of Things and skyline query for multicriteria decisions for travel services. Ingénierie des Systè mes d’Information, Vol. 27, No. 1, p. 101-109. https://doi.org/10.18280/isi.270112 445 Izang, A.A., Ajaegbu, C., Ajayi, W., Omotunde, A.A., Enike, V.O., Ifidon, B.O. Radio Frequency Identification Based Student Attendance System Radio Frequency Identification (RFID), reader, Near Field Communication (NFC), attendance, RFID tags 27, 1, 111-117https://doi.org/10.18280/isi.270113 Izang, A.A., Ajaegbu, C., Ajayi, W., Omotunde, A.A., Enike, V.O., Ifidon, B.O. (2022). Radio frequency identification based student attendance system. Ingénierie des Systèmes d’ Information, Vol. 27, No. 1, p. 111-117. https://doi.org/10.18280/isi.270113 446 Mandhala, V.N., Bhattacharyya, D., Midhunchakkaravarthy, D., Kim, H.J. Detecting and Mitigating Bias in Data Using Machine Learning with Pre- Training Metrics bias mitigation, class imbalance, KL divergence, sample disparity, KS, ROC curve, FPR, FNR 27, 1, 119-125https://doi.org/10.18280/isi.270114 Mandhala, V.N., Bhattacharyya, D., Midhunchakkaravarthy, D., Kim, H.J. (2022). Detecting and mitigating bias in data using machine learning with pre-training metrics. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 119-125. https://doi.org/10.18280/isi.270114 447 Laxminarayanamma, K., Krishnaiah, R.V., Sammulal, P. Enhanced CNN Model for Pancreatic Ductal Adenocarcinoma Classification Based on Proteomic Data pancreatic ductal adenocarcinoma (PDAC), CNN, artificial neural network (ANN), genomic data 27, 1, 127-133https://doi.org/10.18280/isi.270115 Laxminarayanamma, K., Krishnaiah, R.V., Sammulal, P. (2022). Enhanced CNN model for pancreatic ductal adenocarcinoma classification based on proteomic data. Ingé nierie des Systèmes d’Information, Vol. 27, No. 1, p. 127- 133. https://doi.org/10.18280/isi.270115 448Abdulkareem, A.B. Transmission Control Protocol Analysis Using NS3 TCP, active queue management, network simulator, NS-3, NS-2, end to end delays 27, 1, 135-141https://doi.org/10.18280/isi.270116 Abdulkareem, A.B. (2022). Transmission control protocol analysis using NS3. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 135-141. https://doi.org/10.18280/isi.270116 449 Mouhni, N., Elkalay, A., Chakraoui, M., Abdali, A., Ammoumou, A., Amalou, I. Federated Learning for Medical Imaging: An Updated State of the Art federated learning, deep learning, medical imaging, transfer learning, blockchain 27, 1, 143-150https://doi.org/10.18280/isi.270117 Mouhni, N., Elkalay, A., Chakraoui, M., Abdali, A., Ammoumou, A., Amalou, I. (2022). Federated learning for medical imaging: An updated state of the art. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 143-150. https://doi.org/10.18280/isi.270117 450Govindarajan, M. Effective Intrusion Detection System Using Classifier Ensembles accuracy, arcing, bagging, ensemble, heterogeneous, homogeneous, support vector machine, radial basis function 27, 1, 151-156https://doi.org/10.18280/isi.270118 Govindarajan, M. (2022). Effective intrusion detection system using classifier ensembles. Ingénierie des Systèmes d’ Information, Vol. 27, No. 1, p. 151-156. https://doi.org/10.18280/isi.270118 451 Anupriya, K., Harini, K., Balaji, K., Sudha, K.G. Spam Mail Detection Using Optimization Techniques bio-inspired algorithms, classification, machine learning, optimization, Tkinter 27, 1, 157-163https://doi.org/10.18280/isi.270119 Anupriya, K., Harini, K., Balaji, K., Sudha, K.G. (2022). Spam mail detection using optimization techniques. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 157-163. https://doi.org/10.18280/isi.270119 452Challa, R.K., Rao, K.S. Resource Based Attacks Security Using RPL Protocol in Internet of Things RPL, IoT, resource-based attacks, security, allied parent 27, 1, 165-170https://doi.org/10.18280/isi.270120 Challa, R.K., Rao, K.S. (2022). Resource based attacks security using RPL protocol in Internet of things. Ingénierie des Systèmes d’Information, Vol. 27, No. 1, p. 165-170. https://doi.org/10.18280/isi.270120 453 Sharma, V., Bhushan, S., Boahar, B.S., Kumar, P., Kumar, A. An Intelligent Approach for Protecting Privacy in Distributed Information Mining Using Secured Computation of Multiple Participating Sites privacy-preserving information mining, distributed data, multiparty computation, secret sharing 26, 6, 515-522https://doi.org/10.18280/isi.260601 Sharma, V., Bhushan, S., Boahar, B.S., Kumar, P., Kumar, A. (2021). An intelligent approach for protecting privacy in distributed information mining using secured computation of multiple participating sites. Ingénierie des Systèmes d’ Information, Vol. 26, No. 6, p. 515-522. https://doi.org/10.18280/isi.260601 454 Anandarao, S., Chellasamy, S.H. Detection of Hot Topic in Tweets Using Modified Density Peak Clustering NLTK, TF-IDF vector model, density peak clustering, cosine similarity 26, 6, 523-531 https://doi.org/10.18280/isi.260602 Anandarao, S., Chellasamy, S.H. (2021). Detection of hot topic in tweets using modified density peak clustering. Ingénierie des Systèmes d’Information, Vol. 26, No. 6, p. 523-531. https://doi.org/10.18280/isi.260602 455 Boonsivanon, K., Sa- Ngiamvibool, W. A SIFT Description Approach for Non- Uniform Illumination and Other Invariants keypoint description, matching, image moment, SIFT, invariants 26, 6, 533-539https://doi.org/10.18280/isi.260603 Boonsivanon, K., Sa-Ngiamvibool, W. (2021). A SIFT description approach for non-uniform illumination and other invariants. Ingénierie des Systèmes d’Information, Vol. 26, No. 6, p. 533-539. https://doi.org/10.18280/isi.260603 456 Wiharto, Suryani, E., Setyawan, S. Framework Two-Tier Feature Selection on the Intelligence System Model for Detecting Coronary Heart Disease coronary artery disease, two-tier feature selection, information gain, fast correlation- based filter 26, 6, 541-547 https://doi.org/10.18280/isi.260604 Wiharto, Suryani, E., Setyawan, S. (2021). Framework two-tier feature selection on the intelligence system model for detecting coronary heart disease. Ingénierie des Systèmes d’Information, Vol. 26, No. 6, p. 541-547. https://doi.org/10.18280/isi.260604 457Srinivasan, V Detection of Black Hole Attack Using Honeypot Agent-Based Scheme with Deep Learning Technique on MANET blackhole attack, deep learning, honeypots agents, internet of things, intrusion detection systems 26, 6, 549-557 https://doi.org/10.18280/isi.260605 Srinivasan, V. (2021). Detection of black hole attack using honeypot agent-based scheme with deep learning technique on MANET. Ingénierie des Systèmes d’Information, Vol. 26, No. 6, p. 549-557. https://doi.org/10.18280/isi.260605 458Phijik, B., Rao, C.V.G. Pragmatic Security-Aware Cross-Layer Design for Wireless Networks from Vampire Attacks cross layer design, wireless networks, vampire attack, carousal and stretch attacks 26, 6, 559-567https://doi.org/10.18280/isi.260606 Phijik, B., Rao, C.V.G. (2021). Pragmatic security-aware cross-layer design for wireless networks from vampire attacks. Ingénierie des Systèmes d’Information, Vol. 26, No. 6, p. 559-567. https://doi.org/10.18280/isi.260606 459 Badawi, B., Nurudin, A., Muafi, M. Consumer Conformity, Social Ties and EWOM in Digital Marketing digital marketing, consumer conformity, social ties, EWOM, purchase intention 26, 6, 569-576 https://doi.org/10.18280/isi.260607 Badawi, B., Nurudin, A., Muafi, M. (2021). Consumer conformity, social ties and EWOM in digital marketing. Ingé nierie des Systèmes d’Information, Vol. 26, No. 6, p. 569- 576. https://doi.org/10.18280/isi.260607 460 Rajpurohit, J. A Modified Jellyfish Search Optimizer with Opposition Based Learning and Biased Passive Swarm Motion swarm intelligence, nature inspired optimization, metaheuristic algorithms 26, 6, 577-584https://doi.org/10.18280/isi.260608 Rajpurohit, J. (2021). A modified jellyfish search optimizer with opposition based learning and biased passive swarm motion. Ingénierie des Systèmes d’Information, Vol. 26, No. 6, p. 577-584. https://doi.org/10.18280/isi.260608 461Challa, R., Gunta, V. Towards the Construction of Reed- Muller Code Based Symmetric Key FHE reed-muller code, coding theory, erroneous codewords, permutation, majority logic decoding 26, 6, 585-590https://doi.org/10.18280/isi.260609 Challa, R., Gunta, V. (2021). Towards the construction of reed- muller code based symmetric key FHE. Ingénierie des Systè mes d’Information, Vol. 26, No. 6, p. 585-590. https://doi.org/10.18280/isi.260609 462 Sheetal, A.P., Ravindranath, K. High Efficient Virtual Machine Migration Using Glow Worm Swarm Optimization Method for Cloud Computing cloud computing, VM migration, VM placement, Glowworm Swarm Optimization (GSO), power consumption, resource utilization 26, 6, 591-597https://doi.org/10.18280/isi.260610 Sheetal, A.P., Ravindranath, K. (2021). High efficient virtual machine migration using glow worm swarm optimization method for cloud computing. Ingénierie des Systèmes d’ Information, Vol. 26, No. 6, p. 591-597. https://doi.org/10.18280/isi.260610 463 Berhich, A., Jebli, I., Mbilong, P.M., El Kassiri, A., Belouadha, F.Z. Multiple Output and Multi-Steps Prediction of COVID-19 Spread Using Weather and Vaccination Data COVID-19 prediction, deep learning, neural networks, statistical analysis 26, 5, 425-436https://doi.org/10.18280/isi.260501 Berhich, A., Jebli, I., Mbilong, P.M., El Kassiri, A., Belouadha, F.Z. (2021). Multiple output and multi-steps prediction of COVID-19 spread using weather and vaccination data. Ingénierie des Systèmes d’Information, Vol. 26, No. 5, p. 425-436. https://doi.org/10.18280/isi.260501 464 Shrivas, A.K., Dewangan, A.K., Ghosh, S.M. Robust Text Classifier for Classification of Spam E-Mail Documents with Feature Selection Technique spam e-mail, classification, preprocessing, random forest (RF), feature selection technique (FST) 26, 5, 437-444https://doi.org/10.18280/isi.260502 Shrivas, A.K., Dewangan, A.K., Ghosh, S.M. (2021). Robust text classifier for classification of spam e-mail documents with feature selection technique. Ingénierie des Systèmes d’ Information, Vol. 26, No. 5, p. 437-444. https://doi.org/10.18280/isi.260502 465 Aziz, A., Setyawan, B.W., Saddhono, K. Using Expert System Application to Diagnose Online Game Addiction in Junior High School Students: Case Study in Five Big City in Indonesia expert system application, diagnosis, online game addiction, junior high school students, big city in Indonesia 26, 5, 445-452https://doi.org/10.18280/isi.260503 Aziz, A., Setyawan, B.W., Saddhono, K. (2021). Using expert system application to diagnose online game addiction in junior high school students: Case study in five big city in Indonesia. Ingénierie des Systèmes d’Information, Vol. 26, No. 5, p. 445-452. https://doi.org/10.18280/isi.260503 466Nagaraju, K.C., Reddy, C.R.K. Reusable Component Retrieval from a Large Repository Using Word2Vec with Continuous Bag of Words repository, Word2Vec, search, code component, neural network 26, 5, 453-460https://doi.org/10.18280/isi.260504 Nagaraju, K.C., Reddy, C.R.K. (2021). Reusable component retrieval from a large repository using Word2Vec with continuous bag of words. Ingénierie des Systèmes d’ Information, Vol. 26, No. 5, p. 453-460. https://doi.org/10.18280/isi.260504 467Dasari, K.B., Devarakonda, N. Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms CICDDoS2019, classification algorithms, DDoS attacks 26, 5, 461-468https://doi.org/10.18280/isi.260505 Dasari, K.B., Devarakonda, N. (2021). Detection of different DDoS attacks using machine learning classification algorithms. Ingénierie des Systèmes d’Information, Vol. 26, No. 5, p. 461-468. https://https://doi.org/10.18280/isi.260505 468 Joukhadar, A., Ghneim, N., Rebdawi, G. Impact of Using Bidirectional Encoder Representations from Transformers (BERT) Models for Arabic Dialogue Acts Identification AraBERT models, Arabic language, dialogue acts identifications, user intents identification 26, 5, 469-475https://doi.org/10.18280/isi.260506 Joukhadar, A., Ghneim, N., Rebdawi, G. (2021). Impact of using bidirectional encoder representations from transformers (BERT) models for Arabic dialogue acts identification. Ingé nierie des Systèmes d’Information, Vol. 26, No. 5, p. 469- 475. https://doi.org/10.18280/isi.260506 469 Chandrasekaran, K.S., Mahalakshmi, V., Anathapadmanabhan, M.R. Forecasting Parameter Strategy Using Data Analytics in Supply Chain Management supply chain, data analytics, feature selection, demand supply, regression analysis 26, 5, 477-482 https://doi.org/10.18280/isi.260507 Chandrasekaran, K.S., Mahalakshmi, V., Anathapadmanabhan, M.R. (2021). Forecasting parameter strategy using data analytics in supply chain management. Ingé nierie des Systèmes d’Information, Vol. 26, No. 5, p. 477-482. https://doi.org/10.18280/isi.260507 470 Challa, R., Rao, K.S. Hybrid Approach for Detection of Objects from Images Using Fisher Vector and PSO Based CNN cnvolutional neural networks (CNN), fisher vectors (FV), PSO, object detection, deep learning, image processing 26, 5, 483-489https://doi.org/10.18280/isi.260508 Challa, R., Rao, K.S. (2021). Hybrid approach for detection of objects from images using fisher vector and PSO based CNN. Ingénierie des Systèmes d’Information, Vol. 26, No. 5, p. 483-489. https://doi.org/10.18280/isi.260508 471 Fitriati, A., Anggoro, S., Harmianto, S., Tubastuvi. N. Kindfull-Digital Character Book Effectiveness: A User Satisfaction Approach end-user computing satisfaction, kindfull- digital character book, system quality, user competence, user satisfaction 26, 5, 491-500 https://doi.org/10.18280/isi.260509 Fitriati, A., Anggoro, S., Harmianto, S., Tubastuvi. N. (2021). Kindfull-digital character book effectiveness: A user satisfaction approach. Ingénierie des Systèmes d’Information, Vol. 26, No. 5, p. 491-500. https://doi.org/10.18280/isi.260509 472 Singh, A.K., Kumar, S., Bhushan, S., Kumar, P., Vashishtha, A. A Proportional Sentiment Analysis of MOOCs Course Reviews Using Supervised Learning Algorithms sentiment analysis, MOOC, Naive Bayes, SVM, logistic regression, multilayer perceptron 26, 5, 501-506 https://doi.org/10.18280/isi.260510 Singh, A.K., Kumar, S., Bhushan, S., Kumar, P., Vashishtha, A. (2021). A proportional sentiment analysis of MOOCs course reviews using supervised learning algorithms. Ingé nierie des Systèmes d’Information, Vol. 26, No. 5, p. 501- 506. https://doi.org/10.18280/isi.260510 473 Tridalestari, F.A., Prasetyo, H.N., Wikusna, W. How to Use Design Thinking on Trash Bank Process Modeling? nformation system, design thinking, trash bank, requirements analysis, qualitative method 26, 5, 507-513https://doi.org/10.18280/isi.260511 Tridalestari, F.A., Prasetyo, H.N., Wikusna, W. (2021). How to use design thinking on trash bank process modeling? Ingé nierie des Systèmes d’Information, Vol. 26, No. 5, p. 507- 513. https://doi.org/10.18280/isi.260511 474 El-Tayeb, M., Taha, A., Taha, Z. Streamed Video Reconstruction for Firefox Browser Forensics digital forensics, browser cache, social media (SM), video stream, data fragments, YouTube, twitter, Firefox 26, 4, 337-344 https://doi.org/10.18280/isi.260401 El-Tayeb, M., Taha, A., Taha, Z. (2021). Streamed video reconstruction for Firefox browser forensics. Ingénierie des Systèmes d’Information, Vol. 26, No. 4, p. 337-344. https://doi.org/10.18280/isi.260401 475 Ambildhuke, G.M., Banik, B.G. Transfer Learning Approach - An Efficient Method to Predict Rainfall Based on Ground-Based Cloud Images rainfall prediction, ground-based cloud images, image classification, deep neural network, convolution neural network, transfer learning 26, 4, 345-356https://doi.org/10.18280/isi.260402 Ambildhuke, G.M., Banik, B.G. (2021). Transfer learning approach - An efficient method to predict rainfall based on ground-based cloud images. Ingénierie des Systèmes d’ Information, Vol. 26, No. 4, p. 345-356. https://doi.org/10.18280/isi.260402 476 Sama, H.R., Vemuri, V.K., Boppana, V.S.N.H.P. Optimal Control Policy for a Two- Phase M/M/1 Unreliable Gated Queue under N-Policy with a Fuzzy Environment N-policy, two-phase, unreliable server, Zadeh’s extension principle, trapezoidal fuzzy number, nonlinear programming problem 26, 4, 357-364https://doi.org/10.18280/isi.260403 Sama, H.R., Vemuri, V.K., Boppana, V.S.N.H.P. (2021). Optimal control policy for a two-phase M/M/1 unreliable gated queue under N-policy with a fuzzy environment. Ingénierie des Systèmes d’Information, Vol. 26, No. 4, p. 357-364. https://doi.org/10.18280/isi.260403 477 Hisham, A., Ahmed, A., Khaled, M., Abdullatif, N., Kassem, S. Modelling of Crime Record Management System Using Unified Modeling Language UML, crime record management system26, 4, 365-373https://doi.org/10.18280/isi.260404 Hisham, A., Ahmed, A., Khaled, M., Abdullatif, N., Kassem, S. (2021). Modelling of crime record management system using unified modeling language. Ingénierie des Systèmes d’ Information, Vol. 26, No. 4, p. 365-373. https://doi.org/10.18280/isi.260404 478 Khentout, C., Harbouche, K., Djoudi, M. Learner to Learner Fuzzy Profiles Similarity Using a Hybrid Interaction Analysis Grid BALES’ IPA, clustering, fuzzy logic, hybrid grid, multi variate time series, PLETY grid, principal component analysis, similarity measure 26, 4, 375-386https://doi.org/10.18280/isi.260405 Khentout, C., Harbouche, K., Djoudi, M. (2021). Learner to learner fuzzy profiles similarity using a hybrid interaction analysis grid. Ingénierie des Systèmes d’Information, Vol. 26, No. 4, p. 375-386. https://doi.org/10.18280/isi.260405 479 Angel, M.C.M., Humberto, D.B., Alfredo, T.M. Optimization of Vehicle Flow Times in a Single Crossing System Through the Development of a Multi-Agent Platform mobility issues, intelligent traffic control, NetLogo, multi-agent systems, monte Carlo method 26, 4, 387-392https://doi.org/10.18280/isi.260406 Angel, M.C.M., Humberto, D.B., Alfredo, T.M. (2021). Optimization of vehicle flow times in a single crossing system through the development of a multi-agent platform. Ingénierie des Systèmes d’Information, Vol. 26, No. 4, p. 387-392. https://doi.org/10.18280/isi.260406 480Rao, K.R., Naganjaneyulu, S. Permissioned Healthcare Blockchain System for Securing the EHRs with Privacy Preservation EHRs, blockchain network, data privacy and security 26, 4, 393-402https://doi.org/10.18280/isi.260407 Rao, K.R., Naganjaneyulu, S. (2021). Permissioned healthcare blockchain system for securing the EHRs with privacy preservation. Ingénierie des Systèmes d’Information, Vol. 26, No. 4, p. 393-402. https://doi.org/10.18280/isi.260407 481Gherbi, C. Internet of Things and Heterogeneous Networks Technologies: Concepts, Challenges and Perspectives IoT, HSN, RFID, NFC, BLE, wireless communications 26, 4, 403-408https://doi.org/10.18280/isi.260408 Gherbi, C. (2021). Internet of things and heterogeneous networks technologies: Concepts, challenges and perspectives. Ingénierie des Systèmes d’Information, Vol. 26, No. 4, p. 403-408. https://doi.org/10.18280/isi.260408 482 Arlinwibowo, J., Retnawati, H., Kartowagiran, B. Item Response Theory Utilization for Developing the Student Collaboration Ability Assessment Scale in STEM Classes collaboration ability, assessment scale, student, item response theory, STEM classes 26, 4, 409-415https://doi.org/10.18280/isi.260409 Arlinwibowo, J., Retnawati, H., Kartowagiran, B. (2021). Item response theory utilization for developing the student collaboration ability assessment scale in STEM classes. Ingé nierie des Systèmes d’Information, Vol. 26, No. 4, p. 409- 415. https://doi.org/10.18280/isi.260409 483 Kumar, I., Mishra, M.K., Mishra, R.K. Performance Analysis of NOMA Downlink for Next- Generation 5G Network with Statistical Channel State Information non-orthogonal multiple access (NOMA), channel state information (CSI), outage probability, Rayleigh fading channel 26, 4, 417-423https://doi.org/10.18280/isi.260410 Kumar, I., Mishra, M.K., Mishra, R.K. (2021). Performance analysis of NOMA downlink for next- generation 5G network with statistical channel state information. Ingénierie des Systè mes d’Information, Vol. 26, No. 4, p. 417-423. https://doi.org/10.18280/isi.260410 484 Sille, R., Choudhury, T., Chauhan, P., Sharma, D. A Systematic Approach for Deep Learning Based Brain Tumor Segmentation deep neural networks, segmentation algorithm, transfer learning algorithm, brain tumor, deep capsule network 26, 3, 245-254 https://doi.org/10.18280/isi.260301 Sille, R., Choudhury, T., Chauhan, P., Sharma, D. (2021). A systematic approach for deep learning based brain tumor segmentation. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 245-254. https://doi.org/10.18280/isi.260301 485 A’bas, N.N., Rahim, S.S., Dolhalit, M.L., Saifudin, W.S.N., Abdullasim, N., Parumo, S., Omar, R.N.R., Khair, S.Z.M., Kalaichelvam, K., Izhar, S.I.N. Web Usability Testing on Diabetic Retinopathy Consultation System consultation, diabetic retinopathy, eye screening, web development, image editing, image processing, usability 26, 3, 255-264https://doi.org/10.18280/isi.260302 A’bas, N.N., Rahim, S.S., Dolhalit, M.L., Saifudin, W.S.N., Abdullasim, N., Parumo, S., Omar, R.N.R., Khair, S.Z.M., Kalaichelvam, K., Izhar, S.I.N. (2021). Web usability testing on diabetic retinopathy consultation system. Ingénierie des Syst èmes d’Information, Vol. 26, No. 3, p. 255-264. https://doi.org/10.18280/isi.260302 486 Anam, K., Asyhar, B., Saddhono, K., Setyawan, B.W. E-SIP: Website-Based Scheduling Information System to Increase the Effectivity of Lecturer's Performance and Learning Process scheduling information system, elektronik sistem informasi penjadwalan (E-SIP), website-based scheduling, effectivity of lecturers’ performance, effectivity of learning process 26, 3, 265-273 https://doi.org/10.18280/isi.260303 Anam, K., Asyhar, B., Saddhono, K., Setyawan, B.W. (2021). E-SIP: Website-based scheduling information system to increase the effectivity of lecturer's performance and learning process. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 265-273. https://doi.org/10.18280/isi.260303 487 Shivaprasad, S., Sadanandam, M. Optimized Features Extraction from Spectral and Temporal Features for Identifying the Telugu Dialects by Using GMM and HMM MFCC, ZCR, PCA, telugu language, Telangana, Costa Andhra, Rayalaseema, optimal features 26, 3, 275-283 https://doi.org/10.18280/isi.260304 Shivaprasad, S., Sadanandam, M. (2021). Optimized features extraction from spectral and temporal features for identifying the Telugu dialects by using GMM and HMM. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 275-283. https://doi.org/10.18280/isi.260304 488 Devarakonda, N., Kavitha, D., Kamarajugadda, R. Escape the Traffic Congestion Using Brainstorming Optimization Algorithm and Density Peak Clustering brainstorming optimization algorithm (BSO), density peak clustering (DPC), TF- IDF, Twitter API, density peaks 26, 3, 285-293https://doi.org/10.18280/isi.260305 Devarakonda, N., Kavitha, D., Kamarajugadda, R. (2021). Escape the traffic congestion using brainstorming optimization algorithm and density peak clustering. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 285-293. https://doi.org/10.18280/isi.260305 489Touahria, I.E., Khababa, A. A Component Based Framework to Enable Medical Devices Communication medical device, integrated clinical environment, software, component based system, safety, heterogeneity 26, 3, 295-302 https://doi.org/10.18280/isi.260306 Touahria, I.E., Khababa, A. (2021). A component based framework to enable medical devices communication. Ingé nierie des Systèmes d’Information, Vol. 26, No. 3, p. 295- 302. https://doi.org/10.18280/isi.260306 490 Khedkar, S.P., Ramalingam, A.C. Classification and Analysis of Malicious Traffic with Multi-layer Perceptron Model traffic classification, machine learning, deep learning, multilayer perceptron 26, 3, 303-310https://doi.org/10.18280/isi.260307 Khedkar, S.P., Ramalingam, A.C. (2021). Classification and analysis of malicious traffic with multi-layer perceptron model. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 303-310. https://doi.org/10.18280/isi.260307 491Yechuri, P.K., Ramadass, S. Semantic Web Mining for Analyzing Retail Environment Using Word2Vec and CNN-FK big data, semantic web, data management, sustainable retail environment, information systems, artificial neural network 26, 3, 311-318https://doi.org/10.18280/isi.260308 Yechuri, P.K., Ramadass, S. (2021). Semantic web mining for analyzing retail environment using Word2Vec and CNN-FK. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 311-318. https://doi.org/10.18280/isi.260308 492 Raman, J.A., Varadharajan, V. HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics network forensics, honeypots, IoT attacks, preventive model, forensics process model, HoneyNetCloud 26, 3, 319-327https://doi.org/10.18280/isi.260309 Raman, J.A., Varadharajan, V. (2021). HoneyNetCloud investigation model, a preventive process model for IoT forensics. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 319-327. https://doi.org/10.18280/isi.260309 493Rao, K.S., Sridhar, M. A Tabu Search Algorithm for General Threshold Visual Cryptography Schemes visual cryptography schemes (VCSs), visual secret sharing (VSS), pixels, images; shadows, contrast, probabilistic VSS (ProbVSS), tabu search (TS) 26, 3, 329-335https://doi.org/10.18280/isi.260310 Rao, K.S., Sridhar, M. (2021). A tabu search algorithm for general threshold visual cryptography schemes. Ingénierie des Systèmes d’Information, Vol. 26, No. 3, p. 329-335. https://doi.org/10.18280/isi.260310 494 Bouziane, A., Bouchiha, D., Rebhi, R., Lorenzini, G., Doumi, N., Menni, Y., Ahmad, H. ARALD: Arabic Annotation Using Linked Data semantic web, linked data, linked open data, Arabic language, NLP techniques, machine learning, SPARQL, RDF, text annotation 26, 2, 143-149https://doi.org/10.18280/isi.260201 Bouziane, A., Bouchiha, D., Rebhi, R., Lorenzini, G., Doumi, N., Menni, Y., Ahmad, H. (2021). ARALD: Arabic annotation using linked data. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 143-149. https://doi.org/10.18280/isi.260201 495 Najafabadi, M.K., Mohamed, A., Nair, M.A.B., Tabibian, S.M. An Effective Collaborative User Model Using Hybrid Clustering Recommendation Methods recommendation system, fuzzy clustering, collaborative filtering, sparsity 26, 2, 151-158https://doi.org/10.18280/isi.260202 Najafabadi, M.K., Mohamed, A., Nair, M.A.B., Tabibian, S.M. (2021). An effective collaborative user model using hybrid clustering recommendation methods. Ingénierie des Syst èmes d’Information, Vol. 26, No. 2, p. 151-158. https://doi.org/10.18280/isi.260202 496 Meshram, V.A., Patil, K., Ramteke, S.D. MNet: A Framework to Reduce Fruit Image Misclassification CNN, computer vision, deep learning, fruit classification, machine learning 26, 2, 159-170https://doi.org/10.18280/isi.260203 Meshram, V.A., Patil, K., Ramteke, S.D. (2021). MNet: A framework to reduce fruit image misclassification. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 159-170. https://doi.org/10.18280/isi.260203 497 Hosseiny, S.M., Rahmani, A.I., Derakhshan, M., Fatahizadeh, R. An Intrusion Detection System: Using a Grasshopper Algorithm denial of service attacks, grasshopper optimization algorithm, Nearest Neighbor Classifier 26, 2, 171-177https://doi.org/10.18280/isi.260204 Hosseiny, S.M., Rahmani, A.I., Derakhshan, M., Fatahizadeh, R. (2021). An intrusion detection system: Using a grasshopper algorithm. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 171-177. https://doi.org/10.18280/isi.260204 498 Kumar, D.G., Ganesh, A., Bhoopal, N., Saravanan, S., Prameela, M., Dsnmrao, Kasireddy, I. Evolutionary Algorithms for Real Time Engineering Problems: A Comprehensive Review optimization techniques, meta-heuristic algorithms, hybrid optimization techniques, Evolutionary Computation (EVC) 26, 2, 179-190https://doi.org/10.18280/isi.260205 Kumar, D.G., Ganesh, A., Bhoopal, N., Saravanan, S., Prameela, M., Dsnmrao, Kasireddy, I. (2021). Evolutionary algorithms for real time engineering problems: A comprehensive review. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 179-190. https://doi.org/10.18280/isi.260205 499 Das, P., Yadav, J.K.P.S., Yadav, A.K. An Automated Tomato Maturity Grading System Using Transfer Learning Based AlexNet tomato maturity grading, manual grading, low-cost solution, AlexNet, deep learning, transfer learning 26, 2, 191-200 https://doi.org/10.18280/isi.260206 Das, P., Yadav, J.K.P.S., Yadav, A.K. (2021). An automated tomato maturity grading system using transfer learning based AlexNet. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 191-200. https://doi.org/10.18280/isi.260206 500 Kathi, M.G., Shaik, J.H. An Optimised Allotment and Tracking Using Django and Opencv computer vision, Opencv, tracking, face detection, face recognition 26, 2, 201-209https://doi.org/10.18280/isi.260207 Kathi, M.G., Shaik, J.H. (2021). An optimised allotment and tracking using Django and Opencv. Ingénierie des Systèmes d’ Information, Vol. 26, No. 2, p. 201-209. https://doi.org/10.18280/isi.260207 501 Belmahdi, R., Mechta, D., Harous, S. A Survey on Various Methods and Algorithms of Scheduling in Fog Computing cloud computing, Fog Computing, internet of things, scheduling algorithms, optimization methods, heuristic, meta- heuristic 26, 2, 211-224 https://doi.org/10.18280/isi.260208 Belmahdi, R., Mechta, D., Harous, S. (2021). A survey on various methods and algorithms of scheduling in Fog Computing. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 211-224. https://doi.org/10.18280/isi.260208 502 Sheetal, A.P., Lalitha, G., Gopi, A.P., Narayana, V.L. Secured Data Transmission with Integrated Fault Reduction Scheduling in Cloud Computing cloud computing, failures, fault tolerant, critical tasks, scheduling, fault recovery, overhead 26, 2, 225-230 https://doi.org/10.18280/isi.260209 Sheetal, A.P., Lalitha, G., Gopi, A.P., Narayana, V.L. (2021). Secured data transmission with integrated fault reduction scheduling in cloud computing. Ingénierie des Systèmes d’ Information, Vol. 26, No. 2, p. 225-230. https://doi.org/10.18280/isi.260209 503 Teki, S.M., Sriharsha, K.V., Nandimandalam, M.K.V. A Diabetic Prediction System Based on Mean Shift Clustering diabetes, mean-shift clustering, naive bayes, clustering 26, 2, 231-235https://doi.org/10.18280/isi.260210 Teki, S.M., Sriharsha, K.V., Nandimandalam, M.K.V. (2021). A diabetic prediction system based on mean shift clustering. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 231-235. https://doi.org/10.18280/isi.260210 504Rao, M.V.V., Chaparala, A. An Efficient Data Mining Technique for Structural Strength Monitoring System classification, classifiers, clustering, structure strength, integrators 26, 2, 237-243 https://doi.org/10.18280/isi.260211 Rao, M.V.V., Chaparala, A. (2021). An efficient data mining technique for structural strength monitoring system. Ingénierie des Systèmes d’Information, Vol. 26, No. 2, p. 237-243. https://doi.org/10.18280/isi.260211 505 Wijaya, M.C., Maksom, Z., Abdullah, M.H.L. A Brief of Review: Multimedia Authoring Tool Attributes multimedia authoring tool, authoring attributes, SMIL, NCL, formal verification, XML 26, 1, 1-11https://doi.org/10.18280/isi.260101 Wijaya, M.C., Maksom, Z., Abdullah, M.H.L. (2021). A brief of review: Multimedia authoring tool attributes. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 1-11. https://doi.org/10.18280/isi.260101 506Yadav, A.S., Kushwaha, D.S. Query Optimization in a Blockchain- Based Land Registry Management System peer-to-peer, blockchain, property transaction system, query optimization, consensus algorithm 26, 1, 13-21https://doi.org/10.18280/isi.260102 Yadav, A.S., Kushwaha, D.S. (2021). Query optimization in a blockchain-based land registry management system. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 13-21. https://doi.org/10.18280/isi.260102 507 Cherbal, S., Barouchi, I. ZRR-P2P: Zone-Based Mechanism for Data Replication and Research Optimization in Unstructured P2P Systems P2P, peer to peer, search mechanism, zone, area, resource popularity, replication 26, 1, 23-32https://doi.org/10.18280/isi.260103 Cherbal, S., Barouchi, I. (2021). ZRR-P2P: Zone-based mechanism for data replication and research optimization in unstructured P2P systems. Ingénierie des Systèmes d’ Information, Vol. 26, No. 1, p. 23-32. https://doi.org/10.18280/isi.260103 508Babu, B.V.S., Babu K.S. The Purview of Blockchain Appositeness in Computing Paradigms: A Survey blockchain, access control, computing paradigms, cloud, security 26, 1, 33-46https://doi.org/10.18280/isi.260104 Babu, B.V.S., Babu K.S. (2021). The purview of blockchain appositeness in computing paradigms: A survey. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 33-46. https://doi.org/10.18280/isi.260104 509 Mbilong, P.M., Berhich, A., Jebli, I., El Kassiri, A., Belouadha, F.Z. Artificial Intelligence-Enabled and Period-Aware Forecasting COVID-19 Spread deep learning, machine learning, COVID spread prediction 26, 1, 47-57https://doi.org/10.18280/isi.260105 Mbilong, P.M., Berhich, A., Jebli, I., El Kassiri, A., Belouadha, F.Z. (2021). Artificial intelligence-enabled and period-aware forecasting COVID-19 spread. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 47-57. https://doi.org/10.18280/isi.260105 510 Daoudi, S., Zouaoui, C.M.A., El-Mezouar, M.C., Taleb, N. Parallelization of the K-Means++ Clustering Algorithm clustering, K-means clustering, K- means++, GPGPU, OpenCL, parallel K- means++, streaming SIMD extension (SSE) 26, 1, 59-66https://doi.org/10.18280/isi.260106 Daoudi, S., Zouaoui, C.M.A., El-Mezouar, M.C., Taleb, N. (2021). Parallelization of the K-means++ clustering algorithm. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 59- 66. https://doi.org/10.18280/isi.260106 511Subbiah, S.S., Chinnappan, J. Opportunities and Challenges of Feature Selection Methods for High Dimensional Data: A Review big data analysis, data mining, feature selection, machine learning, Hadoop, Spark, centralized processing, distributed parallel processing 26, 1, 67-77https://doi.org/10.18280/isi.260107 Subbiah, S.S., Chinnappan, J. (2021). Opportunities and challenges of feature selection methods for high dimensional data: A review. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 67-77. https://doi.org/10.18280/isi.260107 512 Metwaly, S.S., El-Haleem, A.M.A., El-Ghandour, O. No-Regret Matching Game Algorithm for NOMA Based UAV-Assisted NB- IoT Systems NB-IoT, UAV, regret matching, NOMA, matching game, LTE, URLLC, mMTC 26, 1, 79-85https://doi.org/10.18280/isi.260108 Metwaly, S.S., El-Haleem, A.M.A., El-Ghandour, O. (2021). No-regret matching game algorithm for NOMA based UAV- Assisted NB-IoT systems. Ingénierie des Systèmes d’ Information, Vol. 26, No. 1, p. 79-85. https://doi.org/10.18280/isi.260108 513Patalay, S., Bandlamudi, M.R. Decision Support System for Stock Portfolio Selection Using Artificial Intelligence and Machine Learning decision support system (DSS), machine learning, stock portfolio, artificial intelligence (AI), intrinsic stock value 26, 1, 87-93https://doi.org/10.18280/isi.260109 Patalay, S., Bandlamudi, M.R. (2021). Decision support system for stock portfolio selection using artificial intelligence and machine learning. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 87-93. https://doi.org/10.18280/isi.260109 514Rao, G.S., Srikrishna, A. Image Pixel Contrast Enhancement Using Enhanced Multi Histogram Equalization Method mage contrast enhancement, histogram equalization, poor lightening images, Multi- HE method 26, 1, 95-101 https://doi.org/10.18280/isi.260110 Rao, G.S., Srikrishna, A. (2021). Image pixel contrast enhancement using enhanced multi histogram equalization method. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 95-101. https://doi.org/10.18280/isi.260110 515 Alti, A., Almuhirat, A. An Advanced IoT-Based Tool for Effective Employee Performance Evaluation in the Banking Sector IoT, human resource, smart technology, decision-making, intelligence, performance metric 26, 1, 103-108https://doi.org/10.18280/isi.260111 Alti, A., Almuhirat, A. (2021). An advanced IoT-based tool for effective employee performance evaluation in the banking sector. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 103-108. https://doi.org/10.18280/isi.260111 516 Yadav, A.K., Maurya, A.K., Ranvijay, Ranvijay, R.S. Extractive Text Summarization Using Recent Approaches: A Survey text summarization, extractive text summarization, abstractive text summarization, supervised and unsupervised learning techniques 26, 1, 109-121 https://doi.org/10.18280/isi.260112 Yadav, A.K., Maurya, A.K., Ranvijay, Ranvijay, R.S. (2021). Extractive text summarization using recent approaches: A survey. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 109-121. https://doi.org/10.18280/isi.260112 517 Nagaraj, P.K., Ravikumar, K.S., Kasyap, M.S., Murthy, M.H.S., Paul, J. Kannada to English Machine Translation Using Deep Neural Network encoder-decoder mechanism, long short term memory, natural language processing, sequence to sequence model 26, 1, 123-127 https://doi.org/10.18280/isi.260113 Nagaraj, P.K., Ravikumar, K.S., Kasyap, M.S., Murthy, M.H.S., Paul, J. (2021). Kannada to English machine translation using deep neural network. Ingénierie des Systèmes d’Information, Vol. 26, No. 1, p. 123-127. https://doi.org/10.18280/isi.260113 518Nasr, I.B., Jbeli, K., Smiti, A. E-Service Application: Online Donation to Help Fight COVID-19 donation, KNN, Artificial Intelligence, COVID-19, E-service 26, 1, 129-134https://doi.org/10.18280/isi.260114 Nasr, I.B., Jbeli, K., Smiti, A. (2021). E-service application: Online donation to help fight COVID-19. Ingénierie des Systè mes d’Information, Vol. 26, No. 1, p. 129-134. https://doi.org/10.18280/isi.260114 519Rao, K.S., Sridhar, M. A Novel Image Encryption Using Parity Based Visual Cryptography ixel expansion, parity, bit slicing, XOR operation 26, 1, 135-142 https://doi.org/10.18280/isi.260115 Rao, K.S., Sridhar, M. (2021). A novel image encryption using parity based visual cryptography. Ingénierie des Systèmes d’ Information, Vol. 26, No. 1, p. 135-142. https://doi.org/10.18280/isi.260115 520 Yadav, M.P., Raj, G., Akarte, H.A., Yadav, D.K. Horizontal scaling for containerized application using hybrid approach cloud computing, elasticity, auto-scaling, machine learning, ARIMA, support vector machine 25, 6, 709-718https://doi.org/10.18280/isi.250601 Yadav, M.P., Raj, G., Akarte, H.A., Yadav, D.K. (2020). Horizontal scaling for containerized application using hybrid approach. Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 709-718. https://doi.org/10.18280/isi.250601 521 Bouddou, R., Benhamida, F., Haba, M., Belgacem, M., Meziane, M.A. Simulated annealing algorithm for dynamic economic dispatch problem in the electricity market incorporating wind energy electricity market, dynamic economic dispatch, bidding strategies, wind energy, simulated annealing algorithm 25, 6, 719-727https://doi.org/10.18280/isi.250602 Bouddou, R., Benhamida, F., Haba, M., Belgacem, M., Meziane, M.A. (2020). Simulated annealing algorithm for dynamic economic dispatch problem in the electricity market incorporating wind energy. Ingénierie des Systèmes d’ Information, Vol. 25, No. 6, p. 719-727. https://doi.org/10.18280/isi.250602 522 Maddumala, V.R., R, A. A weight based feature extraction model on multifaceted multimedia bigdata using convolutional neural network multifaceted multimedia data, feature extraction, feature selection, classification, video object detection, convolutional neural network 25, 6, 729-735https://doi.org/10.18280/isi.250603 Maddumala, V.R., R, A. (2020). A weight based feature extraction model on multifaceted multimedia bigdata using convolutional neural network. Ingénierie des Systèmes d’ Information, Vol. 25, No. 6, p. 729-735. https://doi.org/10.18280/isi.250603 523Peram, S.R., Bulla, P. Blockchains: Improve the scalability and efficiency of conventional blockchain by providing a lightweight block mining and communication algorithm blockchain, proof of work, lightweight scalable blockchain, distributed ledger technology, proof of elapsed time, proof-of- stake, and searchable encryption 25, 6, 737-745https://doi.org/10.18280/isi.250604 Peram, S.R., Bulla, P. (2020). Blockchains: Improve the scalability and efficiency of conventional blockchain by providing a lightweight block mining and communication algorithm. Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 737-745. https://doi.org/10.18280/isi.250604 524 Metlapalli, A.C., Muthusamy, T., Battula, B.P. Classification of social media text spam using VAE-CNN and LSTM model spam data, convolution neural network (CNN), (long short term memory networks) LSTM, deep learning, variational auto- encoder (VAE) 25, 6, 747-753https://doi.org/10.18280/isi.250605 Metlapalli, A.C., Muthusamy, T., Battula, B.P. (2020). Classification of social media text spam using VAE-CNN and LSTM model. Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 747-753. https://doi.org/10.18280/isi.250605 525 Mohammed, N.R., Mohammed, M. Assessment of twitter data clusters with cosine-based validation metrics using hybrid topic models cluster tendency, cosine based similarity measure, cosine based validity indices, hybrid topic models, twitter data clustering 25, 6, 755-769https://doi.org/10.18280/isi.250606 Mohammed, N.R., Mohammed, M. (2020). Assessment of twitter data clusters with cosine-based validation metrics using hybrid topic models. Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 755-769. https://doi.org/10.18280/isi.250606 526 Sridevi, G., Midhunchakkravarthy. A hybrid multi-level statistical load balancer-based parameters estimation model in realtime cloud computing environment statistical load balancer, cloud computing, virtual machines 25, 6, 771-782https://doi.org/10.18280/isi.250607 Sridevi, G., Midhunchakkravarthy. (2020). A hybrid multi- level statistical load balancer-based parameters estimation model in realtime cloud computing environment. Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 771-782. https://doi.org/10.18280/isi.250607 527Deepika, N., Nirupamabhat, M. An optimized machine learning model for stock trend anticipation stock market, security market, economical- volatile, external factors, secure prediction, feature selection, trend prediction, artificial bee colony 25, 6, 783-792https://doi.org/10.18280/isi.250608 Deepika, N., Nirupamabhat, M. (2020). An optimized machine learning model for stock trend anticipation. Ingénierie des Syst èmes d’Information, Vol. 25, No. 6, p. 783-792. https://doi.org/10.18280/isi.250608 528Murty, M.S., Rao, N.N. Stalking the resources for security in linked data applications using resource description framework provenance, semantic web, linked data, LOD 25, 6, 793-801https://doi.org/10.18280/isi.250609 Murty, M.S., Rao, N.N. (2020). Stalking the resources for security in linked data applications using resource description framework. Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 793-801. https://doi.org/10.18280/isi.250609 529 Zerguine, N., Mostefai, M., Aliouat, Z., Slimani, Y. Intelligent CW selection mechanism based on Q-learning (MISQ) DCF, deep reinforcement learning, CW, IEEE 802.11, MAC protocol, MANET, Q- learning 25, 6, 803-811 https://doi.org/10.18280/isi.250610 Zerguine, N., Mostefai, M., Aliouat, Z., Slimani, Y. (2020). Intelligent CW selection mechanism based on Q-learning (MISQ). Ingénierie des Systèmes d’Information, Vol. 25, No. 6, p. 803-811. https://doi.org/10.18280/isi.250610 530 Lakehal, A., Alti, A., Roose, P. Context-aware multi-layered ontology for composite situation model in pervasive computing ontology, heterogeneous connected objects, smart domains, situations, multi-OCSM 25, 5, 543-558https://doi.org/10.18280/isi.250501 Lakehal, A., Alti, A., Roose, P. (2020). Context-aware multi- layered ontology for composite situation model in pervasive computing. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 543-558. https://doi.org/10.18280/isi.250501 531Dhar, J., Jodder, A.K. An effective recommendation system to forecast the best educational program using machine learning classification algorithms automated recommendation system, students' academic performance, machine learning techniques, machine learning classification algorithms, educational data mining 25, 5, 559-568 https://doi.org/10.18280/isi.250502 Dhar, J., Jodder, A.K. (2020). An effective recommendation system to forecast the best educational program using machine learning classification algorithms. Ingénierie des Systèmes d’ Information, Vol. 25, No. 5, p. 559-568. https://doi.org/10.18280/isi.250502 532 Fenanir, S., Semchedine, F., Harous, S., Baadache, A. A semi-supervised deep auto-encoder based intrusion detection for IoT access control, anomaly detection, autoencoder, intrusion detection system, machine learning 25, 5, 569-577 https://doi.org/10.18280/isi.250503 Fenanir, S., Semchedine, F., Harous, S., Baadache, A. (2020). A semi-supervised deep auto-encoder based intrusion detection for IoT. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 569-577. https://doi.org/10.18280/isi.250503 533Wang, H.P. An effect analysis model for corporate marketing mix based on artificial neural network artificial neural network (ANN), marketing, marketing mix, effect analysis 25, 5, 579-587https://doi.org/10.18280/isi.250504 Wang, H.P. (2020). An effect analysis model for corporate marketing mix based on artificial neural network. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 579-587. https://doi.org/10.18280/isi.250504 534 Afify, H.M., Darwish, A., Mohammed, K.K., Hassanien, A.E. An automated CAD system of CT chest images for COVID-19 based on genetic algorithm and K-nearest neighbor classifier COVID-19, CT scans, computer-aided detection (CAD), Genetic algorithm, K- Nearest Neighbor (KNN), decision tree 25, 5, 589-594 https://doi.org/10.18280/isi.250505 Afify, H.M., Darwish, A., Mohammed, K.K., Hassanien, A.E. (2020). An automated CAD system of CT chest images for COVID-19 based on genetic algorithm and K-nearest neighbor classifier. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 589-594. https://doi.org/10.18280/isi.250505 535 Wen, J., Wei, X.C., He, T., Zhang, S.S. Regression analysis on the influencing factors of the acceptance of online education platform among college students online education platform, regression analysis, acceptance, college students 25, 5, 595-600https://doi.org/10.18280/isi.250506 Wen, J., Wei, X.C., He, T., Zhang, S.S. (2020). Regression analysis on the influencing factors of the acceptance of online education platform among college students. Ingénierie des Syst èmes d’Information, Vol. 25, No. 5, p. 595-600. https://doi.org/10.18280/isi.250506 536 Saidi, R., Cherrid, N., Bentahar, T., Mayache, H., Bentahar, A. Number of pixel change rate and unified average changing intensity for sensitivity analysis of encrypted inSAR interferogram AES-256, inSAR crypt interferogram, RSA, UACI, NPCR, SSIM, GSSIM, encryption mode CTR, encryption mode OFB 25, 5, 601-607https://doi.org/10.18280/isi.250507 Saidi, R., Cherrid, N., Bentahar, T., Mayache, H., Bentahar, A. (2020). Number of pixel change rate and unified average changing intensity for sensitivity analysis of encrypted inSAR interferogram. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 601-607. https://doi.org/10.18280/isi.250507 537 Zhou, N., Zhang, Z.F., Li, J. Analysis on course scores of learners of online teaching platforms based on data mining course score analysis, online teaching platform (OLP), expectation maximization (EM) clustering, support vector machine (SVM) classifier 25, 5, 609-617https://doi.org/10.18280/isi.250508 Zhou, N., Zhang, Z.F., Li, J. (2020). Analysis on course scores of learners of online teaching platforms based on data mining. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 609-617. https://doi.org/10.18280/isi.250508 538 Subramanian, B., Yesudhas, H.R., Eanoch, G.J. A unique data identification system for wireless sensor networks based on enhanced arithmetic coding chosen-cipher text attack, arithmetic coding, wireless sensor networks, data communication 25, 5, 617-627https://doi.org/10.18280/isi.250509 Subramanian, B., Yesudhas, H.R., Eanoch, G.J. (2020). A unique data identification system for wireless sensor networks based on enhanced arithmetic coding. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 619-627. https://doi.org/10.18280/isi.250509 539Hu, Y.D., Li, X.Y. An evaluation model of comprehensive human resources quality of financial enterprises based on deep neural network human resources (HR), quality evaluation, deep neural network (DNN), N-evaluation model 25, 5, 629-636https://doi.org/10.18280/isi.250510 Hu, Y.D., Li, X.Y. (2020). An evaluation model of comprehensive human resources quality of financial enterprises based on deep neural network. Ingénierie des Systèmes d’ Information, Vol. 25, No. 5, p. 629-636. https://doi.org/10.18280/isi.250510 540 Satla, S.P., Sadanandam, M., Suvarna, B. Dangerous prediction in roads by using machine learning models dangerous roads, support vector machine, accidents, fatalities, logistic regression, decision tree, random forest, gaussian naive bayes, K- nearest neighbor 25, 5, 637-644https://doi.org/10.18280/isi.250511 Satla, S.P., Sadanandam, M., Suvarna, B. (2020). Dangerous prediction in roads by using machine learning models. Ingé nierie des Systèmes d’Information, Vol. 25, No. 5, p. 637- 644. https://doi.org/10.18280/isi.250511 541Xiao, Q. Resource classification and knowledge aggregation of library and information based on data mining knowledge aggregation, resource classification, library and information (L&I), data mining, support vector machine (SVM) 25, 5, 645-653https://doi.org/10.18280/isi.250512 Xiao, Q. (2020). Resource classification and knowledge aggregation of library and information based on data mining. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 645-653. https://doi.org/10.18280/isi.250512 542 Kumar, P., Gangal, A., Kumari, S., Tiwari, S. Recombinant sort: N-dimensional cartesian spaced algorithm designed from synergetic combination of hashing, bucket, counting and radix sort recombinant sort, bucket sort, counting sort, radix sort, hashing, sorting algorithm 25, 5, 655-668https://doi.org/10.18280/isi.250513 Kumar, P., Gangal, A., Kumari, S., Tiwari, S. (2020). Recombinant sort: N-dimensional cartesian spaced algorithm designed from synergetic combination of hashing, bucket, counting and radix sort. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 655-668. https://doi.org/10.18280/isi.250513 543 Singh, R.K., Singh, P., Bathla, G. User-review oriented social recommender system for event planning sentiment analysis, recommender systems, social network, social contextual information, wedding planner 25, 5, 669-675https://doi.org/10.18280/isi.250514 Singh, R.K., Singh, P., Bathla, G. (2020). User-review oriented social recommender system for event planning. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 669-675. https://doi.org/10.18280/isi.250514 544Pan, T. Tracking and extracting action trajectory of athlete based on hierarchical features feature extraction, action trajectory, hierarchical features, badminton 25, 5, 677-682 https://doi.org/10.18280/isi.250515 Pan, T. (2020). Tracking and extracting action trajectory of athlete based on hierarchical features. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 677-682. https://doi.org/10.18280/isi.250515 545 Bulla, S., Reddy, C.V.R., Padmavathi, P., Padmasri, T. Analytical evaluation of resource estimation in web application services cloud computing, web application, queuing model, AWS 25, 5, 683-690https://doi.org/10.18280/isi.250516 Bulla, S., Reddy, C.V.R., Padmavathi, P., Padmasri, T. (2020). Analytical evaluation of resource estimation in web application services. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 683-690. https://doi.org/10.18280/isi.250516 546 Padmanabula, S.S., Puvvada, R.C., Sistla, V., Kolli, V.K.K. Object detection using stacked YOLOv3 object detection, YOLOv3, deep neural network, Non-maxima Suppression, class probabilities, unified architecture, transfer learning 25, 5, 691-697 https://doi.org/10.18280/isi.250517 Padmanabula, S.S., Puvvada, R.C., Sistla, V., Kolli, V.K.K. (2020). Object detection using stacked YOLOv3. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 691-697. https://doi.org/10.18280/isi.250517 547Shen, X.G. Design and application of a virtual simulation teaching system based on cloud service virtual simulation (VS), cloud service (CS), VS teaching system, simulation system design 25, 5, 699-707 https://doi.org/10.18280/isi.250518 Shen, X.G. (2020). Design and application of a virtual simulation teaching system based on cloud service. Ingénierie des Systèmes d’Information, Vol. 25, No. 5, p. 699-707. https://doi.org/10.18280/isi.250518 548 Restrepo, A.O., Parra, O.J.S., Cañón, N.D.M. AR support system for therapy in 3 to 8-year-old children with altered fine motor skills augmented reality, fine motor skills, motion controller, neurodevelopment, unity engine 25, 4, 405-411https://doi.org/10.18280/isi.250401 Restrepo, A.O., Parra, O.J.S., Cañón, N.D.M. (2020). AR support system for therapy in 3 to 8-year-old children with altered fine motor skills. Ingénierie des Systèmes d’ Information, Vol. 25, No. 4, p. 405-411. https://doi.org/10.18280/isi.250401 549Yildirim, M., Cinar, A. Classification of Alzheimer's disease MRI images with CNN based hybrid method Alzheimer, deep learning, image processing, machine learning, CNN architectures 25, 4, 413-418 https://doi.org/10.18280/isi.250402 Yildirim, M., Cinar, A. (2020). Classification of Alzheimer's disease MRI images with CNN based hybrid method. Ingé nierie des Systèmes d’Information, Vol. 25, No. 4, p. 413- 418. https://doi.org/10.18280/isi.250402 550 Xu, Z.H. Construction and optimization of talent training quality based on data mining random forest (RF), data mining, talent training quality (TTQ), data reconstruction 25, 4, 419-425https://doi.org/10.18280/isi.250403 Xu, Z.H. (2020). Construction and optimization of talent training quality based on data mining. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 419-425. https://doi.org/10.18280/isi.250403 551Pirmard, S.S., Forghani, Y. Improving the speed of support vector regression using regularized least square regression ε-insensitive support vector regression (ε- SVR), regularized least square (RLS), runtime, function estimation 25, 4, 427-435https://doi.org/10.18280/isi.250404 Pirmard, S.S., Forghani, Y. (2020). Improving the speed of support vector regression using regularized least square regression. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 427-435. https://doi.org/10.18280/isi.250404 552 Rehman, H.U., Anwar, S., Tufail, M. Machine vision based plant disease classification through leaf imagining machine learning, multi-class SVM, machine vision 25, 4, 437-444https://doi.org/10.18280/isi.250405 Rehman, H.U., Anwar, S., Tufail, M. (2020). Machine vision based plant disease classification through leaf imagining. Ingé nierie des Systèmes d’Information, Vol. 25, No. 4, p. 437- 444. https://doi.org/10.18280/isi.250405 553Zhu, Y.B. Color management of digital media art images based on image processing digital media art (DMA) images, color correction, color reconstruction, image quality evaluation 25, 4, 445-452https://doi.org/10.18280/isi.250406 Zhu, Y.B. (2020). Color management of digital media art images based on image processing. Ingénierie des Systèmes d’ Information, Vol. 25, No. 4, p. 445-452. https://doi.org/10.18280/isi.250406 554Yadav, M., Ranvijay. Cheating prevention and detection technique in visual secret sharing collusion attack, cheating prevention, hamming code, visual secret sharing 25, 4, 453-460https://doi.org/10.18280/isi.250407 Yadav, M., Ranvijay. (2020). Cheating prevention and detection technique in visual secret sharing. Ingénierie des Syst èmes d’Information, Vol. 25, No. 4, p. 453-460. https://doi.org/10.18280/isi.250407 555Peng, Z.M. An operation and maintenance strategy of intelligent building information model data based on cloud computing intelligent building information model (IBIM), cloud computing, the industry foundation classes (IFC), MapReduce environment 25, 4, 461-467https://doi.org/10.18280/isi.250408 Peng, Z.M. (2020). An operation and maintenance strategy of intelligent building information model data based on cloud computing. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 461-467. https://doi.org/10.18280/isi.250408 556Smiti, A., Nssibi, M. Case based reasoning framework for COVID-19 diagnosis machine learning, case based reasoning, clustering, classification, COVID-19 pandemic, diagnosis, prediction 25, 4, 469-474https://doi.org/10.18280/isi.250409 Smiti, A., Nssibi, M. (2020). Case based reasoning framework for COVID-19 diagnosis. Ingénierie des Systèmes d’ Information, Vol. 25, No. 4, p. 469-474. https://doi.org/10.18280/isi.250409 557 Ibnugraha, P.D., Nugroho, L.E., Santosa, P.I. Reliability analysis of risk model metrics based on business approach in information security reliability analysis, Cronbach’s alpha, risk model, information security, business approach 25, 4, 475-480https://doi.org/10.18280/isi.250410 Ibnugraha, P.D., Nugroho, L.E., Santosa, P.I. (2020). Reliability analysis of risk model metrics based on business approach in information security. Ingénierie des Systèmes d’ Information, Vol. 25, No. 4, p. 475-480. https://doi.org/10.18280/isi.250410 558Ou, L.Y., Chen, L. Predicting risk propagation of corporate Internet reporting based on fuzzy neural network corporate internet reporting (CIR), risk propagation, fuzzy neural network (FNN), evaluation index system (EIS) 25, 4, 481-488https://doi.org/10.18280/isi.250411 Ou, L.Y., Chen, L. (2020). Predicting risk propagation of corporate Internet reporting based on fuzzy neural network. Ing énierie des Systèmes d’Information, Vol. 25, No. 4, p. 481- 488. https://doi.org/10.18280/isi.250411 559Sajja, V.R., Kalluri, H.K. Classification of brain tumors using convolutional neural network over various SVM methods magnetic resonance imaging (MRI), brain tumor, convolutional neural network (CNN), convolution layer, max pooling 25, 4, 489-495 https://doi.org/10.18280/isi.250412 Sajja, V.R., Kalluri, H.K. (2020). Classification of brain tumors using convolutional neural network over various SVM methods. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 489-495. https://doi.org/10.18280/isi.250412 560 Liang, Y., Chen, N. A novel tourist attraction recommendation system based on improved visual bayesian personalized ranking recommendation system, Bayesian personalized ranking (BPR), stratified sampling, tourist attractions 25, 4, 497-503https://doi.org/10.18280/isi.250413 Liang, Y., Chen, N. (2020). A novel tourist attraction recommendation system based on improved visual bayesian personalized ranking. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 497-503. https://doi.org/10.18280/isi.250413 561Somisetti, V.S.S., Palla, S.H. Efficient clustering of water distribution network using affinity propagation water distribution network, affinity- propagation, exemplars, node properties, edge properties 25, 4, 505-513 https://doi.org/10.18280/isi.250414 Somisetti, V.S.S., Palla, S.H. (2020). Efficient clustering of water distribution network using affinity propagation. Ingé nierie des Systèmes d’Information, Vol. 25, No. 4, p. 505- 513. https://doi.org/10.18280/isi.250414 562 Narayana, V.L., Gopi, A.P., Radhika, P., Sandeep, K.S. Secure data uploading and accessing sensitive data using time level locked encryption to provide an efficient cloud framework cloud computing, data security, data uploading, data accessing, data encryption, cloud user, cloud service provider 25, 4, 515-519 https://doi.org/10.18280/isi.250415 Narayana, V.L., Gopi, A.P., Radhika, P., Sandeep, K.S. (2020). Secure data uploading and accessing sensitive data using time level locked encryption to provide an efficient cloud framework. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 515-519. https://doi.org/10.18280/isi.250415 563Cao, Z.Q. Classification of digital teaching resources based on data mining data mining, k-nearest neighbor (KNN) algorithm, term frequency-inverse document frequency (TF-IDF) algorithm, digital teaching resources, density cutting 25, 4, 521-526https://doi.org/10.18280/isi.250416 Cao, Z.Q. (2020). Classification of digital teaching resources based on data mining. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 521-526. https://doi.org/10.18280/isi.250416 564Battula, B.P., Balaganesh, D. Prediction of hospital re-admission using firefly based multi-layer perceptron firefly optimization, multi-layer perceptron, hospital readmission, mimic-3 data, quality care of patient, machine learning, prediction, electronic medical data 25, 4, 527-533 https://doi.org/10.18280/isi.250417 Battula, B.P., Balaganesh, D. (2020). Prediction of hospital re- admission using firefly based multi-layer perceptron. Ingénierie des Systèmes d’Information, Vol. 25, No. 4, p. 527-533. https://doi.org/10.18280/isi.250417 565 Sun, Y., Chai, R.Q. An early-warning model for online learners based on user portrait user portrait, data mining, online learning, association rules, early-warning of learning situation 25, 4, 535-541https://doi.org/10.18280/isi.250418 Sun, Y., Chai, R.Q. (2020). An early-warning model for online learners based on user portrait. Ingénierie des Systèmes d’ Information, Vol. 25, No. 4, p. 535-541. https://doi.org/10.18280/isi.250418 566Yang, S.Y., Tan, C. Detection of conflicts between resource authorization rules in extensible access control markup language based on dynamic description logic dynamic description logic (DDL), extensible access control markup language (XACML), access control rule (ACR), rule conflict detection 25, 3, 285-294https://doi.org/10.18280/isi.250301 Yang, S.Y., Tan, C. (2020). Detection of conflicts between resource authorization rules in extensible access control markup language based on dynamic description logic. Ingé nierie des Systèmes d’Information, Vol. 25, No. 3, p. 285- 294. https://doi.org/10.18280/isi.250301 567 Kerbaa, T.H., Mezache, A., Oudira, H. Parameter estimation in radar K-clutter plus noise based on Otsu’s algorithm K-clutter plus noise, parameter estimation, fractional order moments, thresholding, Otsu’s algorithm 25, 3, 295-302https://doi.org/10.18280/isi.250302 Kerbaa, T.H., Mezache, A., Oudira, H. (2020). Parameter estimation in radar K-clutter plus noise based on Otsu’s algorithm. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 295-302. https://doi.org/10.18280/isi.250302 568 Djawad, Y.A., Rehman, H., Jumadi, O., Tufail, M., Anwar, S., Bourgougnon, N. Discrimination of nitrogen concentration of fertilized corn with extracted algae and polymer based on its leaf color images nitrogen level, colour intensity, image processing 25, 3, 303-309https://doi.org/10.18280/isi.250303 Djawad, Y.A., Rehman, H., Jumadi, O., Tufail, M., Anwar, S., Bourgougnon, N. (2020). Discrimination of nitrogen concentration of fertilized corn with extracted algae and polymer based on its leaf color images. Ingénierie des Systè mes d’Information, Vol. 25, No. 3, p. 303-309. https://doi.org/10.18280/isi.250303 569Zhang, R.X. Design and application of a prediction model for user purchase intention based on big data analysis big data analysis, purchase intentions, purchase behaviors, deep convolutional neural network (D-CNN) 25, 3, 311-317https://doi.org/10.18280/isi.250304 Zhang, R.X. (2020). Design and application of a prediction model for user purchase intention based on big data analysis. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 311-317. https://doi.org/10.18280/isi.250304 570 Ksantini, M., Kadri, N., Ellouze, A., Turki, S.H. Artificial intelligence prediction algorithms for future evolution of COVID-19 cases artificial intelligence, machine learning, deep learning, COVID-19, belief functions, pandemic, home isolation, Dempster-Shafer theory 25, 3, 319-325https://doi.org/10.18280/isi.250305 Ksantini, M., Kadri, N., Ellouze, A., Turki, S.H. (2020). Artificial intelligence prediction algorithms for future evolution of COVID-19 cases. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 319-325. https://doi.org/10.18280/isi.250305 571Doni, A.R., Sasipraba, T. LSTM-RNN based approach for prediction of dengue cases in India deep learning, epidemic, LSTM, dengue, infuenza, weather, geographical location, CNN 25, 3, 327-335https://doi.org/10.18280/isi.250306 Doni, A.R., Sasipraba, T. (2020). LSTM-RNN based approach for prediction of dengue cases in India. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 327-335. https://doi.org/10.18280/isi.250306 572Dai, F.W. A data management strategy for property management information system based on the internet of things internet of things (IoT), property management, small data management, clustering analysis 25, 3, 337-343https://doi.org/10.18280/isi.250307 Dai, F.W. (2020). A data management strategy for property management information system based on the internet of things. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 337-343. https://doi.org/10.18280/isi.250307 573 Metwaly, S.S., Abd El-Haleem, A.M., El-Ghandour, O. NOMA based matching game algorithm for narrowband internet of things (NB-IoT) system NB-IoT, NOMA, matching game, LTE, URLLC, mMTC 25, 3, 345-350https://doi.org/10.18280/isi.250308 Metwaly, S.S., Abd El-Haleem, A.M., El-Ghandour, O. (2020). NOMA based matching game algorithm for narrowband internet of things (NB-IoT) system. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 345-350. https://doi.org/10.18280/isi.250308 574 Chigozirim, A., Vivian, N.O., Uchenna, N.J., Oreoluwa, A.A. A patient monitoring system using internet of things technology microcontroller, patient monitoring, internet of things, interfacing, internet 25, 3, 351-357 https://doi.org/10.18280/isi.250309 Chigozirim, A., Vivian, N.O., Uchenna, N.J., Oreoluwa, A.A. (2020). A patient monitoring system using internet of things technology. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 351-357. https://doi.org/10.18280/isi.250309 575 Liu, Y., Yang, H., Sun, G.X., Bin, S. Collaborative filtering recommendation algorithm based on multi-relationship social network collaborative filtering recommendation algorithm, complex network, matrix decomposition, data sparsity, social network 25, 3, 359-364https://doi.org/10.18280/isi.250310 Liu, Y., Yang, H., Sun, G.X., Bin, S. (2020). Collaborative filtering recommendation algorithm based on multi-relationship social network. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 359-364. https://doi.org/10.18280/isi.250310 576 Faruq, A., Arsa, H.P., Hussein, S.F.M., Razali, C.M.C., Marto, A., Abdullah, S.S. Deep learning-based forecast and warning of floods in Klang river, Malaysia flood forecasting, early warning system, deep learning, machine learning 25, 3, 365-370 https://doi.org/10.18280/isi.250311 Faruq, A., Arsa, H.P., Hussein, S.F.M., Razali, C.M.C., Marto, A., Abdullah, S.S. (2020). Deep learning-based forecast and warning of floods in Klang river, Malaysia. Ingénierie des Syst èmes d’Information, Vol. 25, No. 3, p. 365-370. https://doi.org/10.18280/isi.250311 577 Kanagala, H.K., Krishnaiah, V.V.J. Detection of glaucoma using optic disk segmentation based on CNN and VAE models glaucoma, eye, convolution neural networks, machine learning, variable auto encoder, optic disk, medical images, classification 25, 3, 371-376 https://doi.org/10.18280/isi.250312 Kanagala, H.K., Krishnaiah, V.V.J. (2020). Detection of glaucoma using optic disk segmentation based on CNN and VAE models. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 371-376. https://doi.org/10.18280/isi.250312 578 Chen, F., Cheng, R., Zhu, Y.Y., Miao, S.W., Zhou, L. An intrusion detection method for enterprise network based on backpropagation neural network Backpropagation neural network, intrusion detection system (IDS), network security, enterprise network 25, 3, 377-382https://doi.org/10.18280/isi.250313 Chen, F., Cheng, R., Zhu, Y.Y., Miao, S.W., Zhou, L. (2020). An intrusion detection method for enterprise network based on backpropagation neural network. Ingénierie des Systèmes d’ Information, Vol. 25, No. 3, p. 377-382. https://doi.org/10.18280/isi.250313 579 Utomo, M.N.Y., Sudaryanto, M., Saddhono, K. Tools and strategy for distance learning to respond COVID-19 pandemic in Indonesia distance learning, online learning, pandemic, COVID-19, distance learning tools 25, 3, 383-390 https://doi.org/10.18280/isi.250314 Utomo, M.N.Y., Sudaryanto, M., Saddhono, K. (2020). Tools and strategy for distance learning to respond COVID-19 pandemic in Indonesia. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 383-390. https://doi.org/10.18280/isi.250314 580 Veeranjaneyulu, N., Bodapati, J.D., Buradagunta, S. Classifying limited resource data using semi-supervised SVM supervised learning, Laplacian SVM, semi- supervised learning, SVM-light, S3VM 25, 3, 391-395https://doi.org/10.18280/isi.250315 Veeranjaneyulu, N., Bodapati, J.D., Buradagunta, S. (2020). Classifying limited resource data using semi-supervised SVM. Ingénierie des Systèmes d’Information, Vol. 25, No. 3, p. 391-395. https://doi.org/10.18280/isi.250315 581Liang, H.Q. A precision advertising strategy based on deep reinforcement learning deep reinforcement learning (DRL), precision advertising, Q-learning, feature extraction 25, 3, 397-403https://doi.org/10.18280/isi.250316 Liang, H.Q. (2020). A precision advertising strategy based on deep reinforcement learning. Ingénierie des Systèmes d’ Information, Vol. 25, No. 3, p. 397-403. https://doi.org/10.18280/isi.250316 582 Chabbi, S., Boudour, R., Semchedine, F. A secure cloud password and secure authentication protocol for electronic NFC payment between ATM and smartphone authentication, confidentiality, hash function, NFC, automated teller machine, smartphone payment, secure element 25, 2, 139-152https://doi.org/10.18280/isi.250201 Chabbi, S., Boudour, R., Semchedine, F. (2020). A secure cloud password and secure authentication protocol for electronic NFC payment between ATM and smartphone. Ingé nierie des Systèmes d’Information, Vol. 25, No. 2, p. 139- 152. https://doi.org/10.18280/isi.250201 583Geng, J., Yan, L., Liu, Y.C. A novel log-based tensor completion algorithm tensor completion, log function of tensor, image inpainting, tensor decomposition 25, 2, 153-163https://doi.org/10.18280/isi.250202 Geng, J., Yan, L., Liu, Y.C. (2020). A novel log-based tensor completion algorithm. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 153-163. https://doi.org/10.18280/isi.250202 584Heni, B. COVID-19, Bacille Calmette-Guérin (BCG) and tuberculosis: Cases and recovery previsions with deep learning sequence prediction COVID-19, deep learning, RNN, GRU, LSTM, BCG, tuberculosis 25, 2, 165-172https://doi.org/10.18280/isi.250203 Heni, B. (2020). COVID-19, Bacille Calmette-Guérin (BCG) and tuberculosis: Cases and recovery previsions with deep learning sequence prediction. Ingénierie des Systèmes d’ Information, Vol. 25, No. 2, p. 165-172. https://doi.org/10.18280/isi.250203 585Hussain, M.A., Duraisamy, B. Preventing malicious packet drops in MANETs by counter based authenticated acknowledgement MANET, acknowledgment, packet drop, resource, mitigation and key agreement 25, 2, 173-181https://doi.org/10.18280/isi.250204 Hussain, M.A., Duraisamy, B. (2020). Preventing malicious packet drops in MANETs by counter based authenticated acknowledgement. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 173-181. https://doi.org/10.18280/isi.250204 586Yang, Z.H. Analysis of the impacts of open residential communities on road traffic based on AHP and fuzzy theory open residential community, AHP, fuzzy comprehensive evaluation, VISSIM traffic simulation 25, 2, 183-190https://doi.org/10.18280/isi.250205 Yang, Z.H. (2020). Analysis of the impacts of open residential communities on road traffic based on AHP and fuzzy theory. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 183-190. https://doi.org/10.18280/isi.250205 587 Saddhono, K., Setyawan, B.W., Raharjo, Y.M., Devilito, R. The diagnosis of online game addiction on Indonesian adolescent using certainty factor method game online addiction, Indonesian adolescent, certainty factor method, expert system 25, 2, 191-197https://doi.org/10.18280/isi.250206 Saddhono, K., Setyawan, B.W., Raharjo, Y.M., Devilito, R. (2020). The diagnosis of online game addiction on Indonesian adolescent using certainty factor method. Ingénierie des Systè mes d’Information, Vol. 25, No. 2, p. 191-197. https://doi.org/10.18280/isi.250206 588 Subramanian, B., Yesudhas, H.R., Enoch, G.J. Channel-based encrypted binary arithmetic coding in wireless sensor networks crypto signature, hash function, code conversion, efficiency 25, 2, 199-206https://doi.org/10.18280/isi.250207 Subramanian, B., Yesudhas, H.R., Enoch, G.J. (2020). Channel-based encrypted binary arithmetic coding in wireless sensor networks. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 199-206. https://doi.org/10.18280/isi.250207 589Luo, H.N. An emergency management system for government data security based on artificial intelligence government data resilience chain (GDRC), emergency management, multi-agent formation, fault tolerance 25, 2, 207-213 https://doi.org/10.18280/isi.250208 Luo, H.N. (2020). An emergency management system for government data security based on artificial intelligence. Ingé nierie des Systèmes d’Information, Vol. 25, No. 2, p. 207- 213. https://doi.org/10.18280/isi.250208 590 Hadi, F., Aliouat, Z., Hammoudi, S. Efficient platform as a service (PaaS) model on public cloud for CBIR system clouds, CBIR, computer network reliability, decision trees, DICOM, wireless communication 25, 2, 215-225https://doi.org/10.18280/isi.250209 Hadi, F., Aliouat, Z., Hammoudi, S. (2020). Efficient platform as a service (PaaS) model on public cloud for CBIR system. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 215-225. https://doi.org/10.18280/isi.250209 591 Guttikonda, P., Mundukur, N.B. Secret sharing with reduced share size and data integrity audio shares, integrity mechanism, Lagrange’s interpolation, polynomial, secret sharing, steganography 25, 2, 227-237 https://doi.org/10.18280/isi.250210 Guttikonda, P., Mundukur, N.B. (2020). Secret sharing with reduced share size and data integrity. Ingénierie des Systèmes d ’Information Vol. 25, No. 2, p. 227-237. https://doi.org/10.18280/isi.250210 592 Wang, TM., Shen, H.W., Xue, Y.J., Hu, Z.K. A traffic signal recognition algorithm based on self-paced learning and deep learning traffic signal recognition, self-paced learning (SPL), machine learning (ML), deep learning (DL), unmanned driving 25, 2, 239-244 https://doi.org/10.18280/isi.250211 Wang, TM., Shen, H.W., Xue, Y.J., Hu, Z.K. (2020). A traffic signal recognition algorithm based on self-paced learning and deep learning. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 239-244. https://doi.org/10.18280/isi.250211 593Rachapalli, D.R., Kalluri, H.K. Color QR pattern-driven cancelable biometric fingerprint system cancelable biometrics, fingerprint biometric, quick response code, texture, GLCM 25, 2, 245-251https://doi.org/10.18280/isi.250212 Rachapalli, D.R., Kalluri, H.K. (2020). Color QR pattern- driven cancelable biometric fingerprint system. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 245-251. https://doi.org/10.18280/isi.250212 594 Yang, B.H., Ren, Q.H., Li, H.S., Song, J.K. A low-signal-to-noise ratio estimation algorithm for multipath channels multipath channel, periodic sequences, signal-to-noise ratio (SNR), low SNR estimation, white Gaussian noise (WGN) 25, 2, 253-258 https://doi.org/10.18280/isi.250213 Yang, B.H., Ren, Q.H., Li, H.S., Song, J.K. (2020). A low- signal-to-noise ratio estimation algorithm for multipath channels. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 253-258. https://doi.org/10.18280/isi.250213 595 Bodapati, J.D., Vijay, A., Veeranjaneyulu, N. Brain tumor detection using deep features in the latent space brain tumor detection, linear transformation, transfer learning, latent space, radial basis kernel (RBF), linear kernel, glioma detection, deep neural features 25, 2, 259-265https://doi.org/10.18280/isi.250214 Bodapati, J.D., Vijay, A., Veeranjaneyulu, N. (2020). Brain tumor detection using deep features in the latent space. Ingé nierie des Systèmes d’Information, Vol. 25, No. 2, p. 259- 265. https://doi.org/10.18280/isi.250214 596Xu, M.B., Peng, D.H. Fire safety assessment of high-rise buildings based on fuzzy theory and radial basis function neural network high-rise buildings, fuzzy logic system, radial basis function neural network (RBFNN), fire safety 25, 2, 267-274https://doi.org/10.18280/isi.250215 Xu, M.B., Peng, D.H. (2020). Fire safety assessment of high- rise buildings based on fuzzy theory and radial basis function neural network. Ingénierie des Systèmes d’Information, Vol. 25, No. 2, p. 267-274. https://doi.org/10.18280/isi.250215 597 Singh, I., Jindal, R., Pandey, K., Agrawal, K., Kukreja, K. Revised grey wolf optimized SVM- KNN ensemble based automated diagnosis of breast cancer breast cancer diagnosis, ensemble learning, grey wolf optimization, K-nearest neighbor, support vector machine, weighted majority voting 25, 2, 275-284https://doi.org/10.18280/isi.250216 Singh, I., Jindal, R., Pandey, K., Agrawal, K., Kukreja, K. (2020). Revised grey wolf optimized SVM-KNN ensemble based automated diagnosis of breast cancer. Ingénierie des Syst èmes d’Information, Vol. 25, No. 2, p. 275-284. https://doi.org/10.18280/isi.250216 598Mourad, A., Latifa, M. A generic modeling approach for E- administration based on holonic systems - case study of collective move due to a natural disaster E-administration, E-administrative service, holonic multi agents system (HMAS), Holon, Holonisation, Interoperability, integrated services, holonic architecture 25, 1, 1-10https://doi.org/10.18280/isi.250101 Mourad, A., Latifa, M. (2020). A generic modeling approach for E-administration based on holonic systems - case study of collective move due to a natural disaster. Ingénierie des Systè mes d’Information, Vol. 25, No. 1, p. 1-10. https://doi.org/10.18280/isi.250101 599 Wielfrid, M.M., Iza, M.S., Tra, G.B. Information extraction model to improve learning game metadata indexing educational ontology, information extraction, game indexing, learning games, semantic web 25, 1, 11-19https://doi.org/10.18280/isi.250102 Wielfrid, M.M., Iza, M.S., Tra, G.B. (2020). Information extraction model to improve learning game metadata indexing. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 11- 19. https://doi.org/10.18280/isi.250102 600 Tian, Y.H., Zheng, B., Li, Z.Y., Zhang, Y., Wu, Q. Online car-hailing supply-demand forecast based on deep learning online car-hailing (OCH), supply-demand forecast, long short-term memory (LSTM), Nesterov-accelerated adaptive moment estimation (Nadam) algorithm 25, 1, 21-26https://doi.org/10.18280/isi.250103 Tian, Y.H., Zheng, B., Li, Z.Y., Zhang, Y., Wu, Q. (2020). Online car-hailing supply-demand forecast based on deep learning. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 21-26. https://doi.org/10.18280/isi.250103 601 Jallal, M.A., Yassini, A.E., Chabaa, S., Zeroual, A., Ibnyaich, S. AI data driven approach-based endogenous inputs for global solar radiation forecasting artificial neural network, time series, global solar radiation, autoregressive, prediction 25, 1, 27-34https://doi.org/10.18280/isi.250104 Jallal, M.A., Yassini, A.E., Chabaa, S., Zeroual, A., Ibnyaich, S. (2020). AI data driven approach-based endogenous inputs for global solar radiation forecasting. Ingénierie des Systèmes d ’Information, Vol. 25, No. 1, p. 27-34. https://doi.org/10.18280/isi.250104 602Çinar, A., Yildirim, M. Classification of malaria cell images with deep learning architectures AlexNet, CNN, deep learning, DenseNet201, Malaria, Resnet50 25, 1, 35-39https://doi.org/10.18280/isi.250105 Çinar, A., Yildirim, M. (2020). Classification of malaria cell images with deep learning architectures. Ingénierie des Systè mes d’Information, Vol. 25, No. 1, p. 35-39. https://doi.org/10.18280/isi.250105 603Bouldjadj, S., Aliouat, Z. High throughput and thermal aware routing protocol (HTTRP) for wireless body area networks energy-aware, routing protocols, thermal- aware, throughput, wireless body area networks 25, 1, 41-48https://doi.org/10.18280/isi.250106 Bouldjadj, S., Aliouat, Z. (2020). High throughput and thermal aware routing protocol (HTTRP) for wireless body area networks. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 41-48. https://doi.org/10.18280/isi.250106 604Zhao, Y.M. Improvement and application of multi- layer LSTM algorithm based on spatial- temporal correlation long-short term memory (LSTM) network, air pollutant concentration prediction, recurrent neural network (RNN), spatial- temporal correlation, PM2.5 concentration 25, 1, 49-58 https://doi.org/10.18280/isi.250107 Zhao, Y.M. (2020). Improvement and application of multi- layer LSTM algorithm based on spatial-temporal correlation. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 49- 58. https://doi.org/10.18280/isi.250107 605 Yadav, S., Mohan, R., Yadav, P.K. Task allocation model for optimal system cost using fuzzy c-means clustering technique in distributed system distributed system, task scheduling, load balancing, fuzzy c-means, Hungarian method 25, 1, 59-68https://doi.org/10.18280/isi.250108 Yadav, S., Mohan, R., Yadav, P.K. (2020). Task allocation model for optimal system cost using fuzzy c-means clustering technique in distributed system. Ingénierie des Systèmes d’ Information, Vol. 25, No. 1, p. 59-68. https://doi.org/10.18280/isi. 250108 606 Widyaningrum, H.K., Hasanudin, C., Fitrianingsih, A., Novianti, D.E., Saddhono, K., Supratmi, N. he use of Edmodo apps in flipped classroom learning. How is the students ’ creative thinking ability? flipped classroom, Edmodo apps, creative thinking ability, a course of Indonesian language and literature study 25, 1, 69-74 https://doi.org/10.18280/isi.250109 Widyaningrum, H.K., Hasanudin, C., Fitrianingsih, A., Novianti, D.E., Saddhono, K., Supratmi, N. (2020). The use of Edmodo apps in flipped classroom learning. How is the students’ creative thinking ability? Ingénierie des Systèmes d’ Information, Vol. 25, No. 1, p. 69-74. https://doi.org/10.18280/isi.250109 607 Tang, X., Zeng, T., Tan, Y., Ding, B.X. Conflict analysis based on three-way decision theoretic fuzzy rough set over two universes conflict information system (CIS), fuzzy rough set (FRS), conflict analysis, three- way decision, two universes 25, 1, 75-82 https://doi.org/10.18280/isi.250110 Tang, X., Zeng, T., Tan, Y., Ding, B.X. (2020). Conflict analysis based on three-way decision theoretic fuzzy rough set over two universes. Ingénierie des Systèmes d’Information, Vol. 25, No.1, p. 75-82. https://doi.org/10.18280/isi.250110 608 Nannapaneni, S., Sistla, V., Kolli, V.K.K. Performance evaluation of generative adversarial networks for computer vision applications distributed system, task scheduling, load balancing, fuzzy c-means, hungarian method 25, 1, 83-92https://doi.org/10.18280/isi.250111 Nannapaneni, S., Sistla, V., Kolli, V.K.K. (2020). Performance evaluation of generative adversarial networks for computer vision applications. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 83-92. https://doi.org/10.18280/isi.250111 609Du, M., Du, D. Incentive mechanism for P2P networks based on feature weighting and game theory P2P network, feature weighting, negative migration, evolutionary game 25, 1, 93-100 https://doi.org/10.18280/isi.250112 Du, M., Du, D. (2020). Incentive mechanism for P2P networks based on feature weighting and game theory. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 93-100. https://doi.org/10.18280/isi.250112 610 Santosh, T., Ramesh, D. Machine learning approach on apache spark for credit card fraud detection index terms – credit card fraud, spark, Hadoop, K-Means, decision tree 25, 1, 101-106https://doi.org/10.18280/isi.250113 Santosh, T., Ramesh, D. (2020). Machine learning approach on apache spark for credit card fraud detection. Ingénierie des Syst èmes d’Information, Vol. 25, No. 1, p. 101-106. https://doi.org/10.18280/isi.250113 611Shang, H. Model and algorithms of enterprise informatization software selection based on grey relational analysis enterprise informatization, software selection, grey relational analysis (GRA), model and algorithm, decision and optimization 25, 1, 107-112https://doi.org/10.18280/isi.250114 Shang, H. (2020). Model and algorithms of enterprise informatization software selection based on grey relational analysis. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 107-112. https://doi.org/10.18280/isi.250114 612 Buradagunta, S., Bodapati, J.D., Mundukur, N.B., Salma, S. Performance comparison of sorting algorithms with random numbers as inputs random inputs, UNH sort, bubble sort, insertion sort, selection sort, merge sort, quick sort 25, 1, 113-117https://doi.org/10.18280/isi.250115 Buradagunta, S., Bodapati, J.D., Mundukur, N.B., Salma, S. (2020). Performance comparison of sorting algorithms with random numbers as inputs. Ingénierie des Systèmes d’ Information, Vol. 25, No. 1, p. 113-117. https://doi.org/10.18280/isi.250115 613Bai, X.Y. A hierarchical model of E-commerce sellers based on data mining E-commerce sellers, hierarchical model, self-organizing feature map (SOM), principal component analysis (PCA), data mining 25, 1, 119-125https://doi.org/10.18280/isi.250116 Bai, X.Y. (2020). A hierarchical model of E-commerce sellers based on data mining. Ingénierie des Systèmes d’Information, Vol. 25, No. 1, p. 119-125. https://doi.org/10.18280/isi.250116 614 Rasheed, M.M., Faieq, A.K., Hashim, A.A. Android botnet detection using machine learning mobile security, botnet detection, machine learning detection 25, 1, 127-130https://doi.org/10.18280/isi.250117 Rasheed, M.M., Faieq, A.K., Hashim, A.A. (2020). Android botnet detection using machine learning. Ingénierie des Systè mes d’Information, Vol. 25, No. 1, .p. 127-130. https://doi.org/10.18280/isi.250117 615 Cong, L.G., Yang, H.M., Wang, Y.H. Routing algorithm for delay-tolerant network based on price game delay-tolerant network (DTN), price game, routing algorithm 25, 1, 131-137https://doi.org/10.18280/isi.250118 Cong, L.G., Yang, H.M., Wang, Y.H. (2020). Routing algorithm for delay-tolerant network based on price game. Ingé nierie des Systèmes d’Information, Vol. 25, No. 1, p. 131- 137. https://doi.org/10.18280/isi.250118 616 Hasanudin, C., Fitrianingsih, A., Sadhono, K. How is the student’s negotiation text in collaborative learning of flipped classroom and a CyberLink power director media apps negotiation text, flipped classroom, cyberlink power director apps 24, 6, 559-567https://doi.org/10.18280/isi.240601 Hasanudin, C., Fitrianingsih, A., Sadhono, K. (2019). How is the student’s negotiation text in collaborative learning of flipped classroom and a CyberLink power director media apps. Ingénierie des Systèmes d’Information, Vol. 24, No. 6, p. 559-567. https://doi.org/10.18280/isi.240601 617 Islam, M.M., Neom, N.H., Imtiaz, M.S., Nooruddin, S., Islam, M.R., Islam, M.R. A review on fall detection systems using data from smartphone sensors fall, fall detection, smartphone, threshold based system, machine learning based system 24, 6, 569-576https://doi.org/10.18280/isi.240602 Islam, M.M., Neom, N.H., Imtiaz, M.S., Nooruddin, S., Islam, M.R., Islam, M.R. (2019). A review on fall detection systems using data from smartphone sensors. Ingénierie des Systèmes d ’Information, Vol. 24, No. 6, p. 569-576. https://doi.org/10.18280/isi.240602 618Xing, R.F., Fan, Y.Y., Liu, W. A Markov chain-based overlapping community detection algorithm for complex networks complex networks, overlapping community detection, markov chain, random walk 24, 6, 577-582https://doi.org/10.18280/isi.240603 Xing, R.F., Fan, Y.Y., Liu, W. (2019). A Markov chain-based overlapping community detection algorithm for complex networks. Ingénierie des Systèmes d’Information, Vol. 24, No. 6, p. 577-582. https://doi.org/10.18280/isi.240603 619 Venuthurumilli, P., Mandapati, S. An energy and deadline aware scheduling using greedy algorithm for cloud computing cloud computing, scheduling, energy efficiency, Cloud Service Provider (CSP), First Come First Served (FCFS) scheduling, min-min scheduling and greedy algorithm 24, 6, 583-590 https://doi.org/10.18280/isi.240604 Venuthurumilli, P., Mandapati, S. (2019). An energy and deadline aware scheduling using greedy algorithm for cloud computing. Ingénierie des Systèmes d’Information, Vol. 24, No. 6, p. 583-590. https://doi.org/10.18280/isi.240604 620 Djerioui, M., Brik, Y., Ladjal, M., Attallah, B. Neighborhood component analysis and support vector machines for heart disease prediction heart disease, prediction, neighborhood component analysis, support vector machines, feature selection 24, 6, 591-595https://doi.org/10.18280/isi.240605 Djerioui, M., Brik, Y., Ladjal, M., Attallah, B. (2019). Neighborhood component analysis and support vector machines for heart disease prediction. Ingénierie des Systèmes d’Information, Vol. 24, No. 6, p. 591-595. https://doi.org/10.18280/isi.240605 621Zhang, C.H., Xue, W., Xin, Y. Design and application of an intelligent patrol algorithm for forest management and protection based on global positioning system Intelligent Patrol Algorithm, Global Positioning System (GPS), dijkstra’s algorithm, forest management and protection (M&P) 24, 6, 597-602 https://doi.org/10.18280/isi.240606 Zhang, C.H., Xue, W., Xin, Y. (2019). Design and application of an intelligent patrol algorithm for forest management and protection based on global positioning system. Ingénierie des Systèmes d’Information, Vol. 24, No. 6, p. 597-602. https://doi.org/10.18280/isi.240606 622 Yakobu, D., Kalluri, H.K., Dondeti, V. An enhanced secure, robust and efficient crypto scheme for ensuring data privacy in public cloud using obfuscation & encryption cloud computing, privacy, obfuscation, cryptography 24, 6, 603-609 https://doi.org/10.18280/isi.240607 Yakobu, D., Kalluri, H.K., Dondeti, V. (2019). An enhanced secure, robust and efficient crypto scheme for ensuring data privacy in public cloud using obfuscation & encryption. Ingé nierie des Systèmes d’Information, Vol. 24, No. 6, p. 603- 609. https://doi.org//10.18280/isi.240607 623Yadav, A., Ritika, Garg, M.L. Monitoring based security approach for cloud computing cloud storage server, data monitor, hybrid encryption scheme, RSA digital signature, SHA hash 24, 6, 611-617https://doi.org/10.18280/isi.240608 Yadav, A., Ritika, Garg, M.L. (2019). Monitoring based security approach for cloud computing. Ingénierie des Systè mes d’Information, Vol. 24, No. 6, p. 611-617. https://doi.org/10.18280/isi.240608 624Wang, W.X. Site selection of fire stations in cities based on geographic information system (GIS) and fuzzy analytic hierarchy process (FAHP) site selection of fire stations, Geographic Information System (GIS), fuzzy optimization, Analytic Hierarchy Process (AHP) 24, 6, 619-626 https://doi.org/10.18280/isi.240609 Wang, W.X. (2019). Site selection of fire stations in cities based on geographic information system (GIS) and fuzzy analytic hierarchy process (FAHP). Ingénierie des Systèmes d’ Information, Vol. 24, No. 6, p. 619-626. https://doi.org/10.18280/isi.240609 625 Bhat, M.N., Buradagunta, S., Rani, K.U. A novel approach to key management using visual cryptography trusted third party, XOR based visual cryptography, regeneration, redistribution, key management 24, 6, 627-632https://doi.org/10.18280/isi.240610 Bhat, M.N., Buradagunta, S., Rani, K.U. (2019). A novel approach to key management using visual cryptography. Ingé nierie des Systèmes d’Information, Vol. 24, No. 6, p. 627- 632. https://doi.org/10.18280/isi.240610 626Zhang, S.F. Classification of urban land use based on graph theory and geographic information system Geographic Information System (GIS), Relational Attribute Neighborhood Graph (RANG), graph theory, classification, urban land use 24, 6, 633-639https://doi.org/10.18280/isi.240611 Zhang, S.F. (2019). Classification of urban land use based on graph theory and geographic information system. Ingénierie des Systèmes d’Information, Vol. 24, No. 6, p. 633-639. https://doi.org/10.18280/isi.240611 627 Tuncer, T., Yar, O. Fuzzy logic-based smart parking system fuzzy logic, mobile communication, wireless sensor networks 24, 5, 455-461https://doi.org/10.18280/isi.240501 Tuncer, T., Yar, O. (2019). Fuzzy logic-based smart parking system. Ingénierie des Systèmes d’Information, Vol. 24, No. 5, p. 455-461. https://doi.org/10.18280/isi.240501 628 Moezzi, S., Jalali, M., Forghani, Y. TWSVC+: Improved twin support vector machine-based clustering Plane-Based Clustering, Support Vector Clustering (SVC), Twin Support Vector Clustering (TWSVC), Convex 24, 5, 463-471https://doi.org/10.18280/isi.240502 Moezzi, S., Jalali, M., Forghani, Y. (2019). TWSVC+: Improved twin support vector machine-based clustering. Ingé nierie des Systèmes d’Information, Vol. 24, No. 5, p. 463- 471. https://doi.org/10.18280/isi.240502 629Liu, J.L., Li, K. An information system of clinical pathway management based on the integration between knowledge management and learning organization Clinical Pathway (CP), knowledge management, learning organization, organizational performance, Structural Equation Modelling (SEM) 24, 5, 473-480https://doi.org/10.18280/isi.240503 Liu, J.L., Li, K. (2019). An information system of clinical pathway management based on the integration between knowledge management and learning organization. Ingénierie des Systèmes d’Information, Vol. 24, No. 5, p. 473-480. https://doi.org/10.18280/isi.240503 630 Balaji, S.,Robinson, Y.H., Julie, E.G. GBMS: A new centralized graph based mirror system approach to prevent evaders for data handling with arithmetic coding in wireless sensor networks crypto signature, hash function, skolemization, code conversion, efficiency, security 24, 5, 481-490https://doi.org/10.18280/isi.240504 Balaji, S.,Robinson, Y.H., Julie, E.G. (2019). GBMS: A new centralized graph based mirror system approach to prevent evaders for data handling with arithmetic coding in wireless sensor networks. Ingénierie des Systèmes d’Information, Vol. 24, No. 5, p. 481-490. https://doi.org/10.18280/isi.240504 631Cheng, X., Zhao, C.Y. Prediction of tourist consumption based on Bayesian network and big data Big Data Analysis, Bayesian Network (BN), Neural Network (N), air ticket price, hotel price, tourist consumption 24, 5, 491-496https://doi.org/10.18280/isi.240505 Cheng, X., Zhao, C.Y. (2019). Prediction of tourist consumption based on Bayesian network and big data. Ingé nierie des Systèmes d’Information, Vol. 24, No. 5, p. 491- 496. https://doi.org/10.18280/isi.240505 632 Deb, K., Banerjee, S., Chatterjee, R.P., Das, A., Bag, R. Educational website ranking using fuzzy logic and k-means clustering based hybrid method decisive criteria, fuzzy set, Fuzzy Inference System (FIS), Utility Value (UV), Major Cluster (MC) 24, 5, 497-506https://doi.org/10.18280/isi.240506 Deb, K., Banerjee, S., Chatterjee, R.P., Das, A., Bag, R. (2019). Educational website ranking using fuzzy logic and k- means clustering based hybrid method. Ingénierie des Systè mes d’Information, Vol. 24, No. 5, p. 497-506. https://doi.org/10.18280/isi.240506 633 Reddy, T.M.K., Premamayudu, B. Vehicle insurance model using telematics system with improved machine learning techniques: A survey motor insurance, premium calculation, drivers driving conduct, block chain, machine learning approach 24, 5, 507-512https://doi.org/10.18280/isi.240507 Reddy, T.M.K., Premamayudu, B. (2019). Vehicle insurance model using telematics system with improved machine learning techniques: A survey. Ingénierie des Systèmes d’ Information, Vol. 24, No. 5, p. 507-512. https://doi.org/10.18280/isi.240507 634 Alem, A., Dahmani, Y., Mebarek, B. Skyline computation for improving naï ve Bayesian classifier in intrusion detection system network security, intrusion detection system, naïve bayesian network, skyline operator 24, 5, 513-518 https://doi.org/10.18280/isi.240508 Alem, A., Dahmani, Y., Mebarek, B. (2019). Skyline computation for improving naïve Bayesian classifier in intrusion detection system. Ingénierie des Systèmes d’ Information, Vol. 24, No. 5, p. 513-518. https://doi.org/10.18280/isi.240508 635 Li, M.X., Liao, R.Q., Dong, Y. Adaptive determination of time delay in grey prediction model with time delay Grey System Theory (GST), Time Delay, Representative Subsequence (RS), Automatic Extraction 24, 5, 519-524https://doi.org/10.18280/isi.240509 Li, M.X., Liao, R.Q., Dong, Y. (2019). Adaptive determination of time delay in grey prediction model with time delay. Ingé nierie des Systèmes d’Information, Vol. 24, No. 5, p. 519- 524. https://doi.org/10.18280/isi.240509 636Li, X.L., Li, Z. A hybrid prediction model for e- commerce customer churn based on logistic regression and extreme gradient boosting algorithm customer churn, logistic regression, e- commerce, Extreme Gradient Boosting (XGBoost) algorithm, empirical analysis 24, 5, 525-530 https://doi.org/10.18280/isi.240510 Li, X.L., Li, Z. (2019). A hybrid prediction model for e- commerce customer churn based on logistic regression and extreme gradient boosting algorithm. Ingénierie des Systèmes d ’Information, Vol. 24, No. 5, p. 525-530. https://doi.org/10.18280/isi.240510 637 Madhu, S., Midde, R.R., Ramu, G., Jayanthi, A., Somasekar, J., Ramesh, G., Reddy, P.D.K. A secured framework to protect association rules in the big data environment using fuzzy logic big data, association rules, fuzzy logic, data mining 24, 5, 531-537 https://doi.org/10.18280/isi.240511 Madhu, S., Midde, R.R., Ramu, G., Jayanthi, A., Somasekar, J., Ramesh, G., Reddy, P.D.K. (2019). A secured framework to protect association rules in the big data environment using fuzzy logic. Ingénierie des Systèmes d’Information, Vol. 24, No. 5, p. 531-537. https://doi.org/10.18280/isi.240511 638 Yakobu, D., Reddy, C.V.R., Sistla, V.K. A novel energy efficient scheduling for VM consolidation and migration in cloud data centers virtualization, cloud data center, green computing, energy efficient scheduling algorithm 24, 5, 539-546https://doi.org/10.18280/isi.240512 Yakobu, D., Reddy, C.V.R., Sistla, V.K. (2019). A novel energy efficient scheduling for VM consolidation and migration in cloud data centers. Ingénierie des Systèmes d’Information, Vol. 24, No. 5, p. 539-546. https://doi.org/10.18280/isi.240512 639Liu, W. Traffic flow prediction based on local mean decomposition and big data analysis time series, traffic data, big data technology, Local Mean Decomposition (LMD), Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Model 24, 5, 547-552 https://doi.org/10.18280/isi.240513 Liu, W. (2019). Traffic flow prediction based on local mean decomposition and big data analysis. Ingénierie des Systèmes d ’Information, Vol. 24, No. 5, p. 547-552. https://doi.org/10.18280/isi.240513 640 Sikder, S., Metya, S.K., Goswami, R.S. Exception-tolerant decision tree / rule based classifiers classification, exception tolerant, bagging, boosting, default rule, inefficient rules 24, 5, 553-558https://doi.org/10.18280/isi.240514 Sikder, S., Metya, S.K., Goswami, R.S. (2019). Exception- tolerant decision tree / rule based classifiers. Ingénierie des Systèmes d’Information, Vol. 24, No. 5, p. 553-558. https://doi.org/10.18280/isi.240514 641Shi, L.L., Liu, S.H., Petrović, S. Cryptanalysis of a pseudorandom generator for cross-border E-commerce Cryptanalysis, Linear Feedback Shift Registers (LFSRs), cascade, irregular clocking, constrained edit distance 24, 4, 361-365https://doi.org/10.18280/isi.240401 Shi, L.L., Liu, S.H., Petrović, S. (2019). Cryptanalysis of a pseudorandom generator for cross-border E-commerce. Ingé nierie des Systèmes d’Information, Vol. 24, No. 4, p. 361- 365. https://doi.org/10.18280/isi.240401 642 Saddhono, K., Hasanudin, C., Fitrianingsih, A. The ability to think creatively on SSCS using schoology Apps, how is the student’s language metacognitive awareness? creative thinking, metacognitive awareness, schoology apps, Search, Solve, Create and Share (SSCS) learning 24, 4, 367-375https://doi.org/10.18280/isi.240402 Saddhono, K., Hasanudin, C., Fitrianingsih, A. (2019). The ability to think creatively on SSCS using schoology Apps, how is the student’s language metacognitive awareness? Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 367-375. https://doi.org/10.18280/isi.240402 643Meng, J.Z., Zhang, J.R.A fast algorithm for particle stacking particle packing, fast particle random algorithm, discrete element, 2D/3D generation efficiency 24, 4, 377-384https://doi.org/10.18280/isi.240403 Meng, J.Z., Zhang, J.R. (2019). A fast algorithm for particle stacking. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 377-384. https://doi.org/10.18280/isi.240403 644Bulla, S., Rao, B.B. Performance and cost analysis of web application in elastic cloud environment cloud computing, single class of service, Amazon AWS, e-commerce 24, 4, 385-389https://doi.org/10.18280/isi.240404 Bulla, S., Rao, B.B. (2019). Performance and cost analysis of web application in elastic cloud environment. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 385-389. https://doi.org/10.18280/isi.240404 645 Polisetty, K., Paidipati, K.K., Bodapati, J.D. Modelling of monthly rainfall patterns in the north-west India using SVM support vector machine (SVM), kernels, rainfall forecast, accuracy, northwest India 24, 4, 391-395https://doi.org/10.18280/isi.240405 Polisetty, K., Paidipati, K.K., Bodapati, J.D. (2019). Modelling of monthly rainfall patterns in the north-west India using SVM. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 391-395. https://doi.org/10.18280/isi.240405 646 Zang, H.J., Huang, Y., Cao, H.B., Li, C.C. A novel privacy protection protocol for vehicular ad hoc networks based on elliptic curve bilinear mapping vehicular ad hoc networks (VANETs), conditional privacy protection (CPP), group signature, elliptic curve bilinear mapping 24, 4, 397-402https://doi.org/10.18280/isi.240406 Zang, H.J., Huang, Y., Cao, H.B., Li, C.C. (2019). A novel privacy protection protocol for vehicular ad hoc networks based on elliptic curve bilinear mapping. Ingenierie des Systemes d'Information, Vol. 24, No. 4, p. 397-402. https://doi.org/10.18280/isi.240406 647 HimaBindu, G., Anuradha, C., Chandra Murty, P.S.R. Feature extraction techniques in associate with opposition based whale optimization algorithm near-duplicate video (NDV) detection, digital rights management, feature extraction, optimization techniques, the opposition-based whale optimization algorithm (OWOA) 24, 4, 403-410https://doi.org/10.18280/isi.240407 HimaBindu, G., Anuradha, C., Chandra Murty, P.S.R. (2019). Feature extraction techniques in associate with opposition based whale optimization algorithm. Ingénierie des Systèmes d ’Information, Vol. 24, No. 4, p. 403-410. https://doi.org/10.18280/isi.240407 648 Veeramalla, S.K., Talari, V.K.H.R. Estimation of neural sources from EEG measurements using sequential monte carlo method electroencephalography (EEG), particle filter, source localization, Metropolis- Hastings (M-H) resampling 24, 4, 411-417https://doi.org/10.18280/isi.240408 Veeramalla, S.K., Talari, V.K.H.R. (2019). Estimation of neural sources from EEG measurements using sequential monte carlo method. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 411-417. https://doi.org/10.18280/isi.240408 649Wang, F.F., Hu, H.F. An improved energy-efficient cluster routing protocol for wireless sensor network cluster routing, energy-efficient, transfer nodes, load balancing 24, 4, 419-424 https://doi.org/10.18280/isi.240409 Wang, F.F., Hu, H.F. (2019). An improved energy-efficient cluster routing protocol for wireless sensor network. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 419-424. https://doi.org/10.18280/isi.240409 650 Bansal, N., Sharma, A., Singh, R.K. An evolving hybrid deep learning framework for legal document classification convolution neural network (CNN), bidirectional long short-term memory (BiLSTM), neuroevolution, hyper- parameters, optimization 24, 4, 425-431https://doi.org/10.18280/isi.240410 Bansal, N., Sharma, A., Singh, R.K. (2019). An evolving hybrid deep learning framework for legal document classification. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 425-431. https://doi.org/10.18280/isi.240410 651Yu, J. Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy peer-to-peer network (P2P), privacy preserving, differential privacy, sensitivity, privacy budget 24, 4, 433-437 https://doi.org/10.18280/isi.240411 Yu, J. (2019). Design of a privacy-preserving algorithm for peer-to-peer network based on differential privacy. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 433-437. https://doi.org/10.18280/isi.240411 652Hocine, T., Salem, A. Modified flower pollination algorithm constrained optimal power flow power system, optimal power flow, global optimization, flower pollination algorithm (FPA), security constrained 24, 4, 439-444 https://doi.org/10.18280/isi.240412 Hocine, T., Salem, A. (2019). Modified flower pollination algorithm constrained optimal power flow. Ingénierie des Systè mes d’Information, Vol. 24, No. 4, p. 439-444. https://doi.org/10.18280/isi.240412 653Kurra, A.K., Nelakuditi, U.R. Design of a reliable current starved inverter based arbiter physical unclonable functions (PUFs) for hardware cryptography current starved inverter (CSI), cryptographic keys, physical unclonable functions (PUFs), support vector machine (SVM), temperature instability 24, 4, 445-454https://doi.org/10.18280/isi.240413 Kurra, A.K., Nelakuditi, U.R. (2019). Design of a reliable current starved inverter based arbiter physical unclonable functions (PUFs) for hardware cryptography. Ingénierie des Systèmes d’Information, Vol. 24, No. 4, p. 445-454. https://doi.org/10.18280/isi.240413 654 Elembaby, S.M., Ghoneim, V.F., Abdel-Wahed, M. ANOVAG3: A hybrid algorithm for inferring gene regulatory network using time series gene expression data gene regulatory network, GENIE3, DREAM5, one-way analysis of variance, tree-based ensemble method 24, 3, 229-232 https://doi.org/10.18280/isi.240301 Elembaby, S.M., Ghoneim, V.F., Abdel-Wahed, M. (2019). ANOVAG3: A hybrid algorithm for inferring gene regulatory network using time series gene expression data. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 229-232. https://doi.org/10.18280/isi.240301 655 Sama, H.R., Vemuri, V.K., Talagadadeevi, S.R., Bhavirisetti, S.K. Analysis of an N-policy MX/M/1 two- phase queueing system with state- dependent arrival rates and unreliable server batch arrival, breakdowns, delayed repair, generating functions, cost function 24, 3, 233-240https://doi.org/10.18280/isi.240302 Sama, H.R., Vemuri, V.K., Talagadadeevi, S.R., Bhavirisetti, S.K. (2019). Analysis of an N-policy MX/M/1 two-phase queueing system with state-dependent arrival rates and unreliable server. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 233-240. https://doi.org/10.18280/isi.240302 656Wang, H.S., Zhu, J.Y. A quadtree spatial index method with inclusion relations and its application in landcover database update spatial index, landcover database, inclusion relation, quadtree, incremental update 24, 3, 241-247https://doi.org/10.18280/isi.240303 Wang, H.S., Zhu, J.Y. (2019). A quadtree spatial index method with inclusion relations and its application in landcover database update. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 241-247. https://doi.org/10.18280/isi.240303 657 Jiao, Q.J., Jin, Y.Y. Multi-scale view reveals easily detectable community in complex networks complex network, community, multi-scale, community detection 24, 3, 249-253https://doi.org/10.18280/isi.240304 Jiao, Q.J., Jin, Y.Y. (2019). Multi-scale view reveals easily detectable community in complex networks. Ingénierie des Syst èmes d’Information, Vol. 24, No. 3, p. 249-253. https://doi.org/10.18280/isi.240304 658 Bodapati, J.D., Krishna Sajja, V.R., Mundukur, N.B., Veeranjaneyulu, N. Robust cluster-then-label (RCTL) approach for heart disease prediction linear kernel, polynomial kernel, rbf kernel, logistic regression, naïve baye’s, spectral clustering, cluster then label 24, 3, 255-260https://doi.org/10.18280/isi.240305 Bodapati, J.D., Krishna Sajja, V.R., Mundukur, N.B., Veeranjaneyulu, N. (2019). Robust cluster-then-label (RCTL) approach for heart disease prediction. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 255-260. https://doi.org/10.18280/isi.240305 659 Murugan, S., Kulanthaivel, G., Ulagamuthalvi, V. Selection of test case features using fuzzy entropy measure and random forest code metrics, design metrics, entropy, faults, feature selection, fuzzy, hurwicz criterion, random forest 24, 3, 261-268https://doi.org/10.18280/isi.240306 Murugan, S., Kulanthaivel, G., Ulagamuthalvi, V. (2019). Selection of test case features using fuzzy entropy measure and random forest. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 261-268. https://doi.org/10.18280/isi.240306 660 Guo, Y.H., Jiang, S., Chen, F.T., Li, Y.C., Luo, C.Y. Borrower-lender information fusion for P2P lending: A nonparametric approach P2P lending, multi-source information fusion, multi-kernel learning, investment decisions 24, 3, 269-279https://doi.org/10.18280/isi.240307 Guo, Y.H., Jiang, S., Chen, F.T., Li, Y.C., Luo, C.Y. (2019). Borrower-lender information fusion for P2P lending: A nonparametric approach. Ingénierie des Systèmes d’ Information, Vol. 24, No. 3, p. 269-279. https://doi.org/10.18280/isi.240307 661 Soliman, G.M.A., Abou-El- Enien, T.H.M., Emary, E., Khorshid, M.M.H. A hybrid modified whale optimization algorithm with simulated annealing for terrorism prediction hybrid algorithms, memetic algorithm, whale optimization algorithm, feature selection, spiral path, tournament selection 24, 3, 281-287https://doi.org/10.18280/isi.240308 Soliman, G.M.A., Abou-El-Enien, T.H.M., Emary, E., Khorshid, M.M.H. (2019). A hybrid modified whale optimization algorithm with simulated annealing for terrorism prediction. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 281-287. https://doi.org/10.18280/isi.240308 662Kanrar, S.,Singha S. Content delivery through hybrid architecture in video on demand system content-driven, content transfer, hybrid network, mesh structure, multitier, peer-to- peer, storage server 24, 3, 289-301https://doi.org/10.18280/isi.240309 Kanrar, S.,Singha S. (2019).Content delivery through hybrid architecture in video on demand system. Ingénierie des Systè mes d’Information, Vol. 24, No. 3, p. 289-301. https://doi.org/10.18280/isi.240309 663Lei, T.T., Zou, G.T. Interactive design of commercial space signage system based on object detection Commercial Space Signage System (CSSS), interactive design, object detection, analysis and evaluation, Convolutional Neural Network (CNN) 24, 3, 303-311https://doi.org/10.18280/isi.240310 Lei, T.T., Zou, G.T. (2019). Interactive design of commercial space signage system based on object detection. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 303-311. https://doi.org/10.18280/isi.240310 664Liu, Y.L., Pang, L., Lu, X.L. Click-through rate prediction based on mobile computing and big data analysis big data analysis, mobile computing, Click- through Rate (CTR), feature extraction, abnormal user 24, 3, 313-319 https://doi.org/10.18280/isi.240311 Liu, Y.L., Pang, L., Lu, X.L. (2019). Click-through rate prediction based on mobile computing and big data analysis. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 313-319. https://doi.org/10.18280/isi.240311 665 Masoumi, S., Mahjur, A.Collaborative component interaction programming language, reusability, collaboration, event, sop 24, 3, 321-329https://doi.org/10.18280/isi.240312 Masoumi, S., Mahjur, A. (2019). Collaborative component interaction. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 321-329. https://doi.org/10.18280/isi.240312 666Bai, L., Du, C.L. Design and simulation of a collision- free path planning algorithm for mobile robots based on improved ant colony optimization Path Planning, Ant Colony Optimization (ACO), collision-free algorithm, b-spline curve 24, 3, 331-336 https://doi.org/10.18280/isi.240313 Bai, L., Du, C.L. (2019). Design and simulation of a collision- free path planning algorithm for mobile robots based on improved ant colony optimization. Ingénierie des Systèmes d’ Information, Vol. 24, No. 3, p. 331-336. https://doi.org/10.18280/isi.240313 667 Li, L.X., Gao, J., Wang, H., Deng, D., Lin, H. Construction and optimization of a file distribution model for all-to-all comparison of big dataset. distributed system, all-to-all comparison problem, file distribution, Linear Programming (LP), model optimization 24, 3, 337-342 https://doi.org/10.18280/isi.240314 Li, L.X., Gao, J., Wang, H., Deng, D., Lin, H. (2019). Construction and optimization of a file distribution model for all-to-all comparison of big dataset. Ingénierie des Systèmes d’ Information, Vol. 24, No. 3, p. 337-342. https://doi.org/10.18280/isi.240314 668Verma, G., Chakraborty, R. A hybrid privacy preserving scheme using finger print detection in cloud environment cloud computing, security, biometric, fingerprint detection, minutiae points, elliptic curve 24, 3, 343-351https://doi.org/10.18280/isi.240315 Verma, G., Chakraborty, R. (2019). A hybrid privacy preserving scheme using finger print detection in cloud environment. Ingénierie des Systèmes d’Information, Vol. 24, No. 3, p. 343-351. https://doi.org/10.18280/isi.240315 669 Gade, A., Bhat, M.N., Thakare, N. Adaptive league championship algorithm (ALCA) for independent task scheduling in cloud computing meta-heuristic algorithms, LCA, makespan, cloud utilization, job scheduling, economy of scale, resource utilization 24, 3, 353-359 https://doi.org/10.18280/isi.240316 Gade, A., Bhat, M.N., Thakare, N. (2019). Adaptive league championship algorithm (ALCA) for independent task scheduling in cloud computing. Ingénierie des Systèmes d’ Information, Vol. 24, No. 3, p. 353-359. https://doi.org/10.18280/isi.240316 670 Hasanzadeh, N., Forghani, Y. Improving the accuracy of M-distance based nearest neighbor recommendation system by using ratings variance m-distance, recommendation system, MBR, collaborative filtering,nearest neighbor 24, 2, 131-137https://doi.org/10.18280/isi.240201 Hasanzadeh, N., Forghani, Y. (2019). Improving the accuracy of M-distance based nearest neighbor recommendation system by using ratings variance. Ingénierie des Systèmes d’ Information, Vol. 24, No. 2, p. 131-137. https://doi.org/10.18280/isi.240201 671 Krishna, K.V.S.S.R., Prakash, B.B. Intrusion detection system employing multi-level feed forward neural network along with firefly optimization (FMLF2N2) intrusion detection system, KDD info set, firefly ALG, neural network 24, 2, 139-145https://doi.org/10.18280/isi.240202 Krishna, K.V.S.S.R., Prakash, B.B. (2019). Intrusion detection system employing multi-level feed forward neural network along with firefly optimization (FMLF2N2). Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 139-145. https://doi.org/10.18280/isi.240202 672 Wang, Y.H., Qiao, P.L., Chen, H.B., Luo, Z.Y., Sun, G.L. The reliability assessment of ICS based on evidential reasoning and semi- quantitative information er method, industrial control system, reliability assessment, semi-quantitative information 24, 2, 147-154https://doi.org/10.18280/isi.240203 Wang, Y.H., Qiao, P.L., Chen, H.B., Luo, Z.Y., Sun, G.L. (2019). The reliability assessment of ICS based on evidential reasoning and semi-quantitative information. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 147-154. https://doi.org/10.18280/isi.240203 673Chu, H.Y., Xu, L.T., Liu, Y.X. An optimal power allocation algorithm for cognitive radio networks based on maximum rate and interference constraint Cognitive Radio (CR) network, interference level constraint, power allocation, rate optimization, Karush-Kuhn–Tucker (KKT) Conditions 24, 2, 155-159https://doi.org/10.18280/isi.240204 Chu, H.Y., Xu, L.T., Liu, Y.X. (2019). An optimal power allocation algorithm for cognitive radio networks based on maximum rate and interference constraint. Ingénierie des Systè mes d’Information, Vol. 24, No. 2, p. 155-159. https://doi.org/10.18280/isi.240204 674Chiramdasu, R. Extended statistical analysis on multimedia concealed data detections statistical analysis, classifier, extended statistical analysis, rs analysis, filter groups 24, 2, 161-165https://doi.org/10.18280/isi.240205 Chiramdasu, R. (2019). Extended statistical analysis on multimedia concealed data detections. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 161-165. https://doi.org/10.18280/isi.240205 675Shi, T.T. Spatial data mining and big data analysis of tourist travel behavior big data analysis, spatial data mining, travel behavior, kernel density analysis 24, 2, 167-172https://doi.org/10.18280/isi.240206 Shi, T.T. (2019). Spatial data mining and big data analysis of tourist travel behavior. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 167-172. https://doi.org/10.18280/isi.240206 676 Reddy, U.J., Dhanalakshmi, P., Reddy, P.D.K. Image segmentation technique using SVM classifier for detection of medical disorders. MRI image, SVM, brain tumor, correlation, edge detection, image segmentation 24, 2, 173-176https://doi.org/10.18280/isi.240207 Reddy, U.J., Dhanalakshmi, P., Reddy, P.D.K. (2019). Image segmentation technique using SVM classifier for detection of medical disorders. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 173-176. https://doi.org/10.18280/isi.240207 677Jonnala, P., Reddy, U.J. Secured data representation in images using graph wavelet transformation technique secure data, wavelet transformation, image transformation, noise removal, embedding data 24, 2, 177-181https://doi.org/10.18280/isi.240208 Jonnala, P., Reddy, U.J. (2019). Secured data representation in images using graph wavelet transformation technique. Ingé nierie des Systèmes d’Information, Vol. 24, No. 2, p. 177- 181. https://doi.org/10.18280/isi.240208 678 Zhang, B.Y., Zhang, K.S., Zhong, L., Zhang, X.Y. Research on dirichlet process mixture model for clustering clustering, nonparametric bayesian, DPMM, hierarchical DPMM 24, 2, 183-189https://doi.org/10.18280/isi.240209 Zhang, B.Y., Zhang, K.S., Zhong, L., Zhang, X.Y. (2019). Research on dirichlet process mixture model for clustering. Ing énierie des Systèmes d’Information, Vol. 24, No. 2, p. 183- 189. https://doi.org/10.18280/isi.240209 679Guan, B., Liu, M.H. A novel video compression algorithm based on wireless sensor network Wireless Sensor Network (WSN), Rate Control, Error Concealment 24, 2, 191-196 https://doi.org/10.18280/isi.240210 Guan, B., Liu, M.H. (2019). A novel video compression algorithm based on wireless sensor network. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 191-196. https://doi.org/10.18280/isi.240210 680 Premamayudu, B., Inturu, L.P., Ramesh, G. New reliability routing path for detects malicious link security, wormhole, most limited way, mobile specially appointed systems, applications, assaults, secure, binary search probing, reliability 24, 2, 197-200https://doi.org/10.18280/isi.240211 Premamayudu, B., Inturu, L.P., Ramesh, G. (2019). New reliability routing path for detects malicious link. Ingenierie des Systemes d'Information, Vol. 24, No. 2, p. 197-200. https://doi.org/10.18280/isi.240211 681Mebarek, B., Keddam, M. Prediction model for studying the growth kinetics of Fe2B boride layers during boronizing thermochemical treatment, boriding, Fe2B, simulation, artificial neural network 24, 2, 201-205 https://doi.org/10.18280/isi.240212 Mebarek, B., Keddam, M. (2019). Prediction model for studying the growth kinetics of Fe2B boride layers during boronizing. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 201-205. https://doi.org/10.18280/isi.240212 682Qiao, X., Yang, F., Zheng, J. Ground penetrating radar weak signals denoising via semi-soft threshold empirical wavelet transform. road security, ground penetrating radar, empirical wavelet transform, signal denoising, threshold function 24, 2, 207-213 https://doi.org/10.18280/isi.240213 Qiao, X., Yang, F., Zheng, J. (2019). Ground penetrating radar weak signals denoising via semi-soft threshold empirical wavelet transform. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 207-213. https://doi.org/10.18280/isi.240213 683 Bouzidi, A., Haddar, N., Haddar, K. Traceability and synchronization between BPMN and UML use case models alignment, traceability, synchronization, model integration, BPMN, use case model, integration mechanism, model transformations 24, 2, 215-228https://doi.org/10.18280/isi.240214 Bouzidi, A., Haddar, N., Haddar, K. (2019). Traceability and synchronization between BPMN and UML use case models. Ingénierie des Systèmes d’Information, Vol. 24, No. 2, p. 215-228. https://doi.org/10.18280/isi.240214 684 El-Feky S.F., Abou-El-Enien T.H.M. Hybrid algorithm for rough multi-level multi-objective decision making problems compromise programming, rough programming, topsis method, global criterion method, multi-objective programming, multi-level programming 24, 1, 1-17 https://doi.org/10.18280/isi.240101 El-Feky S.F., Abou-El-Enien T.H.M. (2019). Hybrid algorithm for rough multi-level multi-objective decision making problems, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 1-17. https://doi.org/10.18280/isi.240101 685 Khonde S.R., Venugopal U. Hybrid architecture for distributed intrusion detection system ensemble, feature selection, naïve bayes, random forest, intrusion detection, ids, network security 24, 1, 19-28https://doi.org/10.18280/isi.240102 Khonde S.R., Venugopal U. (2019). Hybrid architecture for distributed intrusion detection system, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 19-28. https://doi.org/10.18280/isi.240102 686 Zhang D.S., Tan J., Tian H., Wang Z.Z., Guo W.J. Aquifer parameter inversion by artificial fish swarm algorithm based on quantum theory quantum computing, artificial fish swarm algorithm (AFSA), hydrogeological parameter 24, 1, 29-33https://doi.org/10.18280/isi.240103 Zhang D.S., Tan J., Tian H., Wang Z.Z., Guo W.J. (2019). Aquifer parameter inversion by artificial fish swarm algorithm based on quantum theory, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 29-33. https://doi.org/10.18280/isi.240103 687 Cai F., Mou X.H., Zhang X., Chen J., Li J., Xu W.P. Network adjacency matrix blocked- compressive sensing: a novel algorithm for link prediction compressive sensing (CS), measurement matrix, adjacency matrix, link prediction, subspace pursuit (SP) 24, 1, 35-42https://doi.org/10.18280/isi.240104 Cai F., Mou X.H., Zhang X., Chen J., Li J., Xu W.P. (2019). Network adjacency matrix blocked-compressive sensing: a novel algorithm for link prediction, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 35-42. https://doi.org/10.18280/isi.240104 688Lenin K. Brachytrupes algorithm for solving optimal reactive power problem optimal reactive power, real power, transmission loss, brachytrupes 24, 1, 43-46https://doi.org/10.18280/isi.240105 Lenin K. (2019). Brachytrupes algorithm for solving optimal reactive power problem, Ingenierie des Systemesd'Information, Vol. 24, No. 1, p. 43-46. https://doi.org/10.18280/isi.240105 689 Praveena K., Sirisha G., Babu S.S., Rao P.S. Efficient method in association rule hiding for privacy preserving with data mining approach confidence, support, association rules, item sets, data mining, association rules, privacy preservation, sensitive association rules 24, 1, 47-50https://doi.org/10.18280/isi.240106 Praveena K., Sirisha G., Babu S.S., Rao P.S. (2019). Efficient method in association rule hiding for privacy preserving with data mining approach, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 47-50. https://doi.org/10.18280/isi.240106 690Dhanalakshmi P. A novel frequent pattern mining technique for prediction of user behavior on web stream data frequent pattern mining, classification, user behavior, web data, data extraction 24, 1, 51-56https://doi.org/10.18280/isi.240107 Dhanalakshmi P. (2019). A novel frequent pattern mining technique for prediction of user behavior on web stream data, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 51- 56. https://doi.org/10.18280/isi.240107 691Jiang N., Li J.Y. Adaptive speech enhancement algorithm based on hilbert-huang transform HILBERT-huang transform, empirical mode decomposition, intrinsic mode function, speech enhancement 24, 1, 57-60https://doi.org/10.18280/isi.240108 Jiang N., Li J.Y. (2019). Adaptive speech enhancement algorithm based on hilbert-huang transform, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 57-60. https://doi.org/10.18280/isi.240108 692 Cheng Q., Jiao J.P., Chen H.H., Xu F. Application of impulse response method in identifying the causes of gold price fluctuation Impulse Response (IR), gold price fluctuation, demand shock 24, 1, 61-66https://doi.org/10.18280/isi.240109 Cheng Q., Jiao J.P., Chen H.H., Xu F. (2019). Application of impulse response method in identifying the causes of gold price fluctuation, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 61-66. https://doi.org/10.18280/isi.240109 693Maji S., Kanrar S. SpliceCombo: A hybrid technique efficiently use for principal component analysis of splice site prediction gene identification, splicing site, Principal Component Analysis (PCA), Cased Based Reasoning (CBR), Cased Based Reasoning (CBR), Support Vector Machine (SVM) 24, 1, 67-75https://doi.org/10.18280/isi.240110 Maji S., Kanrar S. (2019). SpliceCombo: A hybrid technique efficiently use for principal component analysis of splice site prediction, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 67-75. https://doi.org/10.18280/isi.240110 694Rafi D.M., Bharathi C.R. A case study of medical data classification using hybrid adboost KNN along with krill herd algorithm (KHA) case study investigation, medical classification, krill herd algorithm, hybrid adaboost k-nearest neighbor, accuracy, sensitivity and specificity 24, 1, 77-81 https://doi.org/10.18280/isi.240111 Rafi D.M., Bharathi C.R. (2019). A case study of medical data classification using hybrid adboost KNN along with krill herd algorithm (KHA), Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 77-81. https://doi.org/10.18280/isi.240111 695 Yenduri G., Veeranjaneyulu N. An analysis of maintainability index influencing metrics and their behavior on similar open source gaming application developed in C, C++ and, JAVA maintainability metrics, software quality, SDLC, MI, Code Smell 24, 1, 83-87https://doi.org/10.18280/isi.240112 Yenduri G., Veeranjaneyulu N. (2019). An analysis of maintainability index influencing metrics and their behavior on similar open source gaming application developed in C, C++ and, JAVA, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 83-87. https://doi.org/10.18280/isi.240112 696 Cong L.G., Yang H.M., Di X.Q. Storage allocation plan for routing nodes in delay tolerant network, Delay Tolerant Network (DTN), weighted max-min fairness, routing algorithm 24, 1, 89-94 https://doi.org/10.18280/isi.240113 Cong L.G., Yang H.M., Di X.Q. (2019). Storage allocation plan for routing nodes in delay tolerant network, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 89-94. https://doi.org/10.18280/isi.240113 697 Satukumati S.B., Satla S., Kogila R. Feature extraction techniques for chronic kidney disease identification, Ingenierie des Systemesd'Information chronic kidney disease, feature extraction, feature identification, feature selection 24, 1, 95-99 https://doi.org/10.18280/isi.240114 Satukumati S.B., Satla S., Kogila R. (2019). Feature extraction techniques for chronic kidney disease identification, Ingenierie des Systemesd'Information, Vol. 24, No. 1, p. 95-99. https://doi.org/10.18280/isi.240114 698 Dong B.K., Zhu X.N., Yan R., Zhang C.L. Evaluation of third-party reverse logistics providers based on extension superiority method Third-party Reverse Logistics (3PRL) Providers, Evaluation Index System, Extension Superiority Method (ESM) 24, 1, 101-105https://doi.org/10.18280/isi.240115 Dong B.K., Zhu X.N., Yan R., Zhang C.L. (2019). Evaluation of third-party reverse logistics providers based on extension superiority method, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 101-105. https://doi.org/10.18280/isi.240115 699Nagamani C., Chittineni S. Efficient neighborhood density based outlier detection inside a sub network with high dimensional data anomaly detection, network, semi-network, density based, outliers, high dimensional data 24, 1, 107-111 https://doi.org/10.18280/isi.240116 Nagamani C., Chittineni S. (2019). Efficient neighborhood density based outlier detection inside a sub network with high dimensional data, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 107-111. https://doi.org/10.18280/isi.240116 700 Arepalli P.G., Narayana V.L., Venkatesh R., Kumar N.A. Certified node frequency in social network using parallel diffusion methods social network, greedy calculation, information diffusion, rumor influence, location-based network eager calculation 24, 1, 113-117https://doi.org/10.18280/isi.240117 Arepalli P.G., Narayana V.L., Venkatesh R., Kumar N.A. (2019). Certified node frequency in social network using parallel diffusion methods, Ingenierie des Systemesd'Information, Vol. 24, No. 1, p. 113-117. https://doi.org/10.18280/isi.240117 701Zhou H., Yu K.M. A novel wireless sensor network data aggregation algorithm based on self- organizing feature mapping neutral network Wireless Sensor Networks (WSNs), Self- organizing Feature Mapping (SOFM), neural network, data aggregation, feature extraction 24, 1, 119-123https://doi.org/10.18280/isi.240118 Zhou H., Yu K.M. (2019). A novel wireless sensor network data aggregation algorithm based on self-organizing feature mapping neutral network, Ingenierie des Systemes d'Information, Vol. 24, No. 1, p. 119-123. https://doi.org/10.18280/isi.240118 702 Bodapati J.D., Veeranjaneyulu N., Shaik S. Sentiment analysis from movie reviews using LSTMs recurrent neural networks, gated recurrent neural networks, text mining, word embedding, SVM, deep neural networks 24, 1, 125-129https://doi.org/10.18280/isi.240119 Bodapati J.D., Veeranjaneyulu N., Shaik S. (2019). Sentiment analysis from movie reviews using LSTMs, Ingenierie des Systemes d'Information, Vol. 24 No. 1, p. 125-129. https://doi.org/10.18280/isi.240119 703 Barrile, V., Fotia, A., Bilotta, G. Geodatabase for the assessment of energetic potential of territory GIS, Energy, Geodatabase23, 6, 7-17https://doi.org/10.3166/ISI.23.6.7-17 Barrile, V., Fotia, A., Bilotta, G. (2018). Geodatabase for the assessment of energetic potential of territory. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 7-17. https://doi.org/10.3166/ISI.23.6.7-17 704 Pandey, M., Litoriya, R., Pandey, P. Mobile APP development based on agility function App development, extreme programming, MAAF, life cycle model, requirement engineering 23, 6, 19-44https://doi.org/10.3166/ISI.23.6.19-44 Pandey, M., Litoriya, R., Pandey, P. (2018). Mobile APP development based on agility function. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 19-44. https://doi.org/10.3166/ISI.23.6.19-44 705 Ren, Q.H., Li, S.L., Song, B., Chen, C. Availability optimization of consistency and availability-based micro-service systems through elastic scheduling of container resources Consistency (C), Availability (A), Partition Tolerance (P), Micro-Service System, Container, Prediction Model, Elastic Scheduling 23, 6, 45-60https://doi.org/10.3166/ISI.23.6.45-60 Ren, Q.H., Li, S.L., Song, B., Chen, C. (2018). Availability optimization of consistency and availability-based micro- service systems through elastic scheduling of container resources. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 45-60. https://doi.org/10.3166/ISI.23.6.45-60 706 Gangadharaiah, N.K.C., Chinnasamy, C. Secured data storage with users validation in cloud environment privacy, encryption, decryption, cloud registering, security, Trusted Authenticator (TA), energy consumption, energy reduction 23, 6, 61-72https://doi.org/10.3166/ISI.23.6.61-72 Gangadharaiah, N.K.C., Chinnasamy, C. (2018). Secured data storage with users validation in cloud environment. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 61-72. https://doi.org/10.3166/ISI.23.6.61-72 707Li, L.X., Gao, J., Liu, Y.F. Opti-SW: An improved gene sequence alignment algorithm Gene Sequence Alignment, Smith- Waterman (SW) Algorithm, Optimization, Opti-SW 23, 6, 73-85https://doi.org/10.3166/ISI.23.6.73-85 Li, L.X., Gao, J., Liu, Y.F. (2018). Opti-SW: An improved gene sequence alignment algorithm. Ingénierie des Systèmes d’ Information, Vol. 23, No. 6, p. 73-85. https://doi.org/10.3166/ISI.23.6.73-85 708 Gopi, A.P., Lakshman Narayana, V., Ashok Kumar, N. Dynamic load balancing for client server assignment in distributed system using genetical gorithm distributed systems, dynamic load balancing, client-server assignment, networking, network traffic, server load, genetic algorithm 23, 6, 87-98https://doi.org/10.3166/ISI.23.6.87-98 Gopi, A. P., Lakshman Narayana, V., Ashok Kumar, N. (2018). Dynamic load balancing for client server assignment in distributed system using genetical gorithm. Ingénierie des Syst èmes d’Information, Vol. 23, No. 6, p. 87-98. https://doi.org/10.3166/ISI.23.6.87-98 709 Liu, S., Yang F., Wang, S.X., Chen, Y. Automatic generation of bas-relief on 3D models based on 2D images for rhinoceros Rhinoscript, Bas-Relief, 2D Images, Surface 23, 6, 99-113 https://doi.org/10.3166/ISI.23.6.99-113 Liu, S., Yang, F., Wang, S.X., Chen, Y. (2018). Automatic generation of bas-relief on 3D models based on 2D images for rhinoceros. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 99-113. https://doi.org/10.3166/ISI.23.6.99-113 710 Lakshman Narayana, V., Peda gopi, A., Ashok Kumar, N. Different techniques for hiding the text information using text steganography techniques: A survey steganography, hiding text, text steganography, hiding techniques, randomized techniques 23, 6, 115-125https://doi.org/10.3166/ISI.23.6.115-125 Lakshman Narayana, V., Peda gopi, A., Ashok Kumar, N. (2018). Different techniques for hiding the text information using text steganography techniques: A survey. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 115-125. https://doi.org/10.3166/ISI.23.6.115-125 711Xie, Z.L., Yin, H.K. Selection of optimal cloud services based on quality of service ontology Analytic Hierarchy Process (AHP), cloud services, optimization model, QoS ontology 23, 6, 127-141 https://doi.org/10.3166/ISI.23.6.127-141 Xie, Z.L., Yin, H.K. (2018). Selection of optimal cloud services based on quality of service ontology. Ingénierie des Systèmes d ’Information, Vol. 23, No. 6, p. 127-141. https://doi.org/10.3166/ISI.23.6.127-141 712 Li, B., Zhang, C., Han, C., Bai, B.X. Fingertip data fusion of Kinect v2 and leap motion in unity fingertip recognition, joint calibration, data fusion, natural human-computer interaction, leap motion, kinect v2 23, 6, 143-159 https://doi.org/10.3166/ISI.23.6.143-159 Li, B., Zhang, C., Han, C., Bai, B.X. (2018). Fingertip data fusion of Kinect v2 and leap motion in unity. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 143- 159.https://doi.org/10.3166/ISI.23.6.143-159 713 Lakshmipathi Anantha, N., Battula, B.P. Deep convolutional neural networks for product recommendation recommender system, convolutional neural network, content-based filtering, ranking 23, 6, 161-172https://doi.org/10.3166/ISI.23.6.161-172 Lakshmipathi Anantha, N., Battula, B.P. (2018). Deep convolutional neural networks for product recommendation. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 161-172. https://doi.org/10.3166/ISI.23.6.161-172 714Nagi Reddy, V., Subba Rao, P. Comparative analysis of breast cancer detection using K-means and FCM & EM segmentation techniques SFCM, mammogram image, fuzzy, k- means, EM algorithm 23, 6, 173-187 https://doi.org/10.3166/ISI.23.6.173-187 Nagi Reddy, V., Subba Rao, P. (2018). Comparative analysis of breast cancer detection using K-means and FCM & EM segmentation techniques. Ingénierie des Systèmes d’ Information, Vol. 23, No. 6, p. 173-187. https://doi.org/10.3166/ISI.23.6.173-187 715 Yu, J., Wang, H. A deep neural network-based algorithm for safe release of big data under random noise disturbance Deep Neural Network (DNN), big data, privacy preserving, differential privacy 23, 6, 189-200https://doi.org/10.3166/ISI.23.6.189-200 Yu, J., Wang, H. (2018). A deep neural network-based algorithm for safe release of big data under random noise disturbance. Ingénierie des Systèmes d’Information, Vol. 23, No. 6, p. 189-200. https://doi.org/10.3166/ISI.23.6.189-200 716Lassandro, P., Zonno, M. A work-related learning project for energy efficiency evaluation and indoor comfort of school buildings energy efficiency, indoor comfort, ICT, SAPR, school building, virtual tour 23, 5, 7-27https://doi.org/10.3166/ISI.23.5.7-27 Lassandro, P., Zonno, M. (2018). A work-related learning project for energy efficiency evaluation and indoor comfort of school buildings. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 7-27. https://doi.org/10.3166/ISI.23.5.7-27 717 Mebarek, B., Keddam, M., Aboshighiba, H. LS-SVM approach for modeling the growthe kinetics of FeB and Fe2B layers formed on Armco iron LS-SVM, prediction, boronizing, model, simulation 23, 5, 29-41https://doi.org/10.3166/ISI.23.5.29-41 Mebarek, B., Keddam, M., Aboshighiba, H. (2018). LS-SVM approach for modeling the growthe kinetics of FeB and Fe2B layers formed on Armco iron. Ingénierie des Systèmes d’ Information, Vol. 23, No. 5, p. 29-41. https://doi.org/10.3166/ISI.23.5.29-41 718 Xie, Z., Zhu, Z.H., Fu, J.Y., Yang, J.S., Peng, B. Geological logging of tunnel surrounding rock based on multi-view geometry and image stitching tunnel construction, computer vision, photographic geological logging 23, 5, 43-59https://doi.org/10.3166/ISI.23.5.43-59 Xie, Z., Zhu, Z.H., Fu, J.Y., Yang, J.S., Peng, B. (2018). Geological logging of tunnel surrounding rock based on multi- view geometry and image stitching. Ingénierie des Systèmes d’ Information, Vol. 23, No. 5, p. 43-59. https://doi.org/10.3166/ISI.23.5.43-59 719Kanagasabai, L. Reduction of real power loss by white male deer mating based optimization algorithm optimal reactive power, transmission loss, white deer, swarm optimization 23, 5, 61-68https://doi.org/10.3166/ISI.23.5.61-68 Kanagasabai, L. (2018). Reduction of real power loss by white male deer mating based optimization algorithm. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 61-68. https://doi.org/10.3166/ISI.23.5.61-68 720 Miao, Y.S., Wu, H.R., Zhu, H.J., Song, Y.L. Localization accuracy of farmland wireless sensor network localization algorithm based on received signal strength indicator Farmland Wireless Sensor Network (WSN), Localization Methods, Received Signal Strength Indicator (RSSI), range based localization, path loss exponent 23, 5, 69-80https://doi.org/10.3166/ISI.23.5.69-80 Miao, Y.S., Wu, H.R., Zhu, H.J., Song, Y.L. (2018). Localization accuracy of farmland wireless sensor network localization algorithm based on received signal strength indicator. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 69-80. https://doi.org/10.3166/ISI.23.5.69-80 721 Pandi, C., Dandibhotla, T.S., Bulusu, V.V. Reputation based online product recommendations product aspects, opinions, aspect rank, frequent aspects, aspect reputation, product similarity, product recommendations 23, 5, 81-103https://doi.org/10.3166/ ISI.23.5.81-103 Pandi, C., Dandibhotla, T.S., Bulusu, V.V. (2018). Reputation based online product recommendations. Ingénierie des Systè mes d’Information, Vol. 23, No. 5, p. 81-103. https://doi.org/10.3166/ ISI.23.5.81-103 722Zheng, B.H., Zhong, Y.F. Study on the impacts of urban network evolution on urban wind and heat environment based on improved genetic algorithm Urban Network, Urban Space, Wind and Heat Environment (W&HE), Urban Heat Island (UH) Effect, Improved Genetic Algorithm (GA), Backpropagation Neural Network (BPNN) 23, 5, 105-119https://doi.org/10.3166/ISI.23.5.105-119 Zheng, B.H., Zhong, Y.F. (2018). Study on the impacts of urban network evolution on urban wind and heat environment based on improved genetic algorithm. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 105-119. https://doi.org/10.3166/ISI.23.5.105-119 723Bikku, T. A new weighted based frequent and infrequent pattern mining method on real-time E-commerce market data, infrequent association rules, support 23, 5, 121-138https://doi.org/10.3166/ISI.23.5.121-138 Bikku, T. (2018). A new weighted based frequent and infrequent pattern mining method on real-time E-commerce. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 121-138. https://doi.org/10.3166/ISI.23.5.121-138 724Deng, X.Y., Wang, C. A hybrid collaborative filtering model with context and folksonomy for social recommendation collaborative filtering, hybrid recommendation, context, folksonomy, social tag 23, 5, 139-157 https://doi.org/10.3166/ ISI.23.5.139-157 Deng, X.Y., Wang, C. (2018). A hybrid collaborative filtering model with context and folksonomy for social recommendation. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 139-157. https://doi.org/10.3166/ ISI.23.5.139-157 725 Li, Y. Design and implementation of intelligent travel recommendation system based on internet of things internet of things, intelligent travel, recommendation platform, hadoop 23, 5, 159-173https://doi.org/10.3166/ISI.23.5.159-173 Li, Y. (2018). Design and implementation of intelligent travel recommendation system based on internet of things. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 159-173. https://doi.org/10.3166/ISI.23.5.159-173 726 Mahesh, V., Mahesh, V., Teggi, I., Bansal, A., Manjesh, S. Product design methodology applied in developing a liquid petroleum gas level indicator using android technology cylindre GPL, conception produit, android 23, 5, 175-184 https://doi.org/10.3166/ISI.23.5.175-184 Mahesh, V., Mahesh, V., Teggi, I., Bansal, A., Manjesh, S. (2018). Product design methodology applied in developing a liquid petroleum gas level indicator using android technology. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 175-184. https://doi.org/10.3166/ISI.23.5.175-184 727Yuan, B., Wang, F.S., Bao, D. Design and application of a wavelet neural network program for evaluation of goodwill value in corporate intellectual capital Wavelet Neural Network (WNN), Corporate Intellectual Capital (CIC), goodwill value 23, 5, 185-200 https://doi.org/10.3166/ISI.23.5.185-200 Yuan, B., Wang, F.S., Bao, D. (2018). Design and application of a wavelet neural network program for evaluation of goodwill value in corporate intellectual capital. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 185-200. https://doi.org/10.3166/ISI.23.5.185-200 728 Naresh, A., Syed, S.A., Prasad, B.V.V.S. Mining user actions with fuzzy related data security conviction in cloud computing cloud computing, security, privacy, trust, fuzzy analysis, pattern mining 23, 5, 201-212https://doi.org/10.3166/ISI.23.5.201-212 Naresh, A., Syed, S.A., Prasad, B.V.V.S. (2018). Mining user actions with fuzzy related data security conviction in cloud computing. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 201-212.https://doi.org/10.3166/ISI.23.5.201-212 729Singamaneni, K.K., Naidu, P.S. Secure key management in cloud environment using quantum cryptography cloud computing, cloud encryption model, quantum key allocation 23, 5, 213-222 https://doi.org/10.3166/ISI.23.5.213-222 Singamaneni, K.K., Naidu, P.S. (2018). Secure key management in cloud environment using quantum cryptography. Ingénierie des Systèmes d’Information, Vol. 23, No. 5, p. 213-222. https://doi.org/10.3166/ISI.23.5.213-222 730 Gandon, F. A survey of the first 20 years of research on semantic web and linked data linked data, semantic web, survey, web of data 23, 3-4, 11-56https://doi.org/10.3166/ISI.23.3-4.11-56 Gandon, F. (2018). A survey of the first 20 years of research on semantic web and linked data. Ingénierie des Systèmes d’ Information, Vol. 23, No. 3-4, p. 11-56. https://doi.org/10.3166/ISI.23.3-4.11-56 731 Duchateau, F., Lumineau, N., Aalberg, T. Impact of open and linked data on bibliographic catalogs data integration, integrated library systems, linked open data, semantic enrichment 23, 3-4, 57-93https://doi.org/10.3166/ISI.23.3-4.57-93 Duchateau, F., Lumineau, N., Aalberg, T. (2018). Impact of open and linked data on bibliographic catalogs. Ingénierie des Systèmes d’Information, Vol. 23, No. 3-4, p. 57-93. https://doi.org/10.3166/ISI.23.3-4.57-93 732 Raad, J., Beek, W., Pernelle, N., Saïs, F., Van Harmelen, F. Detection of false identity links using community detection in identity graphs Communities, Identity, Owl: same As, Web of data 23, 3-4, 95-118https://doi.org/10.3166/ISI.23.3-4.95-118 Raad, J., Beek, W., Pernelle, N., Saïs, F., Van Harmelen, F. (2018). Detection of false identity links using community detection in identity graphs. Ingénierie des Systèmes d’ Information, Vol. 23, No. 3-4, p. 95-118. https://doi.org/10.3166/ISI.23.3-4.95-118 733 Mendonça, M., Aguilar, J., Perozo, N. Application of category theory meta-ontologies, meta-concepts, category theory, collective intelligence 23, 2, 11-38https://doi.org/10.3166/isi.23.2.11-38 Mendonça, M., Aguilar, J., Perozo, N. (2018). Application of category theory. Ingénierie des Systèmes d’Information, Vol. 23, No. 2, p. 11-38. https://doi.org/10.3166/isi.23.2.11-38 734 Dong, T., Lamolle, M., Le Duc, C., Bonnot, P. Moteur de révision d’ontologie en SHIQ collective intelligence, ontology, revision, reasoning, web services 23, 2, 39-59https://doi.org/10.3166/isi.23.2.39-59 Dong, T., Lamolle, M., Le Duc, C., Bonnot, P. (2018). Moteur de révision d’ontologie en SHIQ. Ingénierie des Systèmes d’ Information, Vol. 23, No. 2, p. 39-59. https://doi.org/10.3166/isi.23.2.39-59 735 Monticolo, D., Gabriel, A., Chavez Barrios, P. Une approche de conception de systè mes multi-agents dédiés à la gestion des connaissances organizational model, multi agent system, knowledge management 23, 2, 61-88https://doi.org/10.3166/isi.23.2.61-88 Monticolo, D., Gabriel, A., Chavez Barrios, P. (2018). Une approche de conception de systèmes multi-agents dédiés à la gestion des connaissances. Ingénierie des Systèmes d’ Information, Vol. 23, No. 2, p. 61-88. https://doi.org/10.3166/isi.23.2.61-88 736 Anghour, A., Lamolle, M., Belhadj, F., Boyer, V. Appprentissage adaptatif temps réels par système multi-agent. Gestion de parcours individuels et collaboratifs adaptive learning, recommendation of pedagogical ressources, multi-usres context, web-based learning environment 23, 2, 89-109https://doi.org/10.3166/isi.23.2.89-109 Anghour, A., Lamolle, M., Belhadj, F., Boyer, V. (2018). Appprentissage adaptatif temps réels par système multi-agent. Gestion de parcours individuels et collaboratifs. Ingénierie des Systèmes d’Information, Vol. 23, No. 2, p. 89-109. https://doi.org/10.3166/isi.23.2.89-109 737 Bonacin, R., Dos Reis, J.C., Mendes Perciani, E., Nabuco, O. Exploring intentions on electronic health records retrieval. Studies with collaborative scenarios information retrieval, electronic health records, information sharing, query rxpansion, intentions, illocutions, speech acts theory 23, 2, 111-135https://doi.org/10.3166/isi.23.2.111-135 Bonacin, R., Dos Reis, J.C., Mendes Perciani, E., Nabuco, O. (2018). Exploring intentions on electronic health records retrieval. Studies with collaborative scenarios. Ingénierie des Systèmes d’Information, Vol. 23, No. 2, p. 111-135. https://doi.org/10.3166/isi.23.2.111-135 738 Ponsard, C., Touzani, M., Majchrowski, A. How to conduct big data projects: Methods overview and industrial feedback adoption process, agile methods, big data, case study, projet management 23, 1, 9-33https://doi.org/10.3166/ISI.23.1.9-33 Ponsard, C., Touzani, M., Majchrowski, A. (2018). How to conduct big data projects: Methods overview and industrial feedback. Ingénierie des Systèmes d’Information, Vol. 23, No. 1, p. 9-33. https://doi.org/10.3166/ISI.23.1.9-33 739 Miralles, A., Huchard, M., Carbonnel, J., Nebut, C. Union and intersection of models for information systems analysis class model, class model integration, class model intersection, class model matching, class model union, formal concept analysis, information system, UML 23, 1, 35-62 https://doi.org/10.3166/ISI.23.1.35-62 Miralles, A., Huchard, M., Carbonnel, J., Nebut, C. (2018). Union and intersection of models for information systems analysis. Ingénierie des Systèmes d’Information, Vol. 23, No. 1, p. 35-62. https://doi.org/10.3166/ISI.23.1.35-62 740 Fredj, F.B., Lammari, N., Comyn-Wattiau, I. Anonymizing data by generalization. A guided method anonymization, guidance, methodology, model-driven approach, ontology, privacy, security 23, 1, 63-87https://doi.org/10.3166/ISI.23.1.63-87 Fredj, F.B., Lammari, N., Comyn-Wattiau, I. (2018). Anonymizing data by generalization. A guided method. Ingé nierie des Systèmes d’Information, Vol. 23, No. 1, p. 63-87. https://doi.org/10.3166/ISI.23.1.63-87 741Mothe, J., Rakotonirina, A.J. Contextual collaborative filtering. A LDA-based approach collaborative filtering, hybrid recommender system, information retrieval, information systems, latent dirichlet allocation, recommender systems 23, 1, 89-109 https://doi.org/10.3166/ISI.23.1.89-109 Mothe, J., Rakotonirina, A.J. (2018). Contextual collaborative filtering. A LDA-based approach. Ingénierie des Systèmes d’ Information, Vol. 23, No. 1, p. 89-109. https://doi.org/10.3166/ISI.23.1.89-109 742 Ferrouk, M., Boubekeur, F., Belkacemi, L. Influence dans Twitter. Définition et utilisation en recherche d’information influence, twitter social network, social information retrieval, pagerank. 22, 6, 9-36 https://doi.org/10.3166/isi.22.6.9-36 Ferrouk, M., Boubekeur, F., Belkacemi, L. (2017). Influence dans Twitter. Définition et utilisation en recherche d’ information. Ingénierie des Systèmes d’Information, Vol. 22, No. 6, p. 9-36. https://doi.org/10.3166/isi.22.6.9-36 743 Othman, R., Belkaroui, R., Faiz, R. Nouvelle approche anaphorique pour le résumé automatique des textes d’ opinions dans les tweets opinion summarization, twitter, conversations, anaphora resolution 22, 6, 37-51https://doi.org/10.3166/isi.22.6.37-51 Othman, R., Belkaroui, R., Faiz, R. (2017). Nouvelle approche anaphorique pour le résumé automatique des textes d’opinions dans les tweets. Ingénierie des Systèmes d’Information, Vol. 22, No. 6, p. 37-51. https://doi.org/10.3166/isi.22.6.37-51 744Abel, M.H., Saleh, M. MEMORAe : un système d’information support d’un éco-système apprenant learning ecosystem, organizational learning, knowledge management, collaborative platform 22, 6, 53-69 https://doi.org/10.3166/isi.22.6.53-69 Abel, M.H., Saleh, M. (2017). MEMORAe: un système d’ information support d’un éco-système apprenant. Ingénierie des Systèmes d’Information, Vol. 22, No. 6, p. 53-69. https://doi.org/10.3166/isi.22.6.53-69 745 Bouzayane, S., Saad, I., Kassel, G., Gargouri, F. Recommandation basée sur l’aide multicritère à la décision pour personnaliser l’échange d’information recommender system, information exchange, support process, knowledge transfer, leader learner, MOOC 22, 6, 71-91https://doi.org/10.3166/isi.22.6.71-91 Bouzayane, S., Saad, I., Kassel, G., Gargouri, F. (2017). Recommandation basée sur l’aide multicritère à la décision pour personnaliser l’échange d’information. Ingénierie des Syst èmes d’Information, Vol. 22, No. 6, p. 71-91. https://doi.org/10.3166/isi.22.6.71-91 746 Arru, M., Negre, E., Rosenthal- Sabroux, C. Alerter ou ne pas alerter ? Une inté gration de connaissances sur les comportements des populations dans les systèmes d’alerte warning systems, data analysis, behaviors, populations, knowledge 22, 6, 93-117https://doi.org/10.3166/isi.22.6.93-117 Arru, M., Negre, E., Rosenthal-Sabroux, C. (2017). Alerter ou ne pas alerter? Une intégration de connaissances sur les comportements des populations dans les systèmes d’alerte. Ing énierie des Systèmes d’Information, Vol. 22, No. 6, p. 93- 117. https://doi.org/10.3166/isi.22.6.93-117 747 Joliveau, T., Noucher, M., Couderchet, L., Caquard, S. Enseigner le géoweb par la pratique et la critique criticism, geoweb, GIS, online learning, vocational education 22, 5, 11-33https://doi.org/10.3166/ISI.22.5.11-33 Joliveau, T., Noucher, M., Couderchet, L., Caquard, S. (2017). Enseigner le géoweb par la pratique et la critique. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 11-33. https://doi.org/10.3166/ISI.22.5.11-33 748Chopin, C., Genevois, S. Géomatique et enseignement secondaire data sets for education, geographic information; geomatic, open data, pedagogical scenarization, teachers practices 22, 5, 35-52https://doi.org/10.3166/ISI.22.5.35-52 Chopin, C., Genevois, S. (2017). Géomatique et enseignement secondaire. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 35-52. https://doi.org/10.3166/ISI.22.5.35-52 749Mericskay, B. Enjeux et perspectives de l’ enseignement des SIG aux géographes et aux urbanistes geography, GIS, pedagogy, planning, teaching, university 22, 5, 53-58https://doi.org/10.3166/ISI.22.5.53-58 Mericskay, B. (2017). Enjeux et perspectives de l’ enseignement des SIG aux géographes et aux urbanistes. Ingé nierie des Systèmes d’Information, Vol. 22, No. 5, p. 53-58. https://doi.org/10.3166/ISI.22.5.53-58 750 Puel, J.B., Mathieu, B., Crouzil, A. Applications mobile et Web pour les observatoires photographiques du paysage augmented reality, landscape reading, mobile app, photographic landscape observatory, serious games, web app 22, 5, 59-68https://doi.org/10.3166/ISI.22.5.59-68 Puel, J.B., Mathieu, B., Crouzil, A. (2017). Applications mobile et Web pour les observatoires photographiques du paysage. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 59-68. https://doi.org/10.3166/ISI.22.5.59-68 751Foch, H. Agriculture de précision pour l’é ducation au développement durable (AGRIPEDD) académie de toulouse, airbus defence, EI purpan, farmstar, precision farming, space, sustainable development 22, 5, 69-89https://doi.org/10.3166/ISI.22.5.69-89 Foch, H. (2017). Agriculture de précision pour l’éducation au d éveloppement durable (AGRIPEDD). Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 69-89. https://doi.org/10.3166/ISI.22.5.69-89 752Mothe, J., Rieu, G. FabSpace 2.0, utilisation d’images d’ observation de la Terre et des océans en classe copernicus program, earth observation images, Fabspace 2.0, technical platform, use in education of observation images 22, 5, 91-104https://doi.org/10.3166/ISI.22.5.91-104 Mothe, J., Rieu, G. (2017). FabSpace 2.0, utilisation d’images d’observation de la Terre et des océans en classe. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 91-104. https://doi.org/10.3166/ISI.22.5.91-104 753Renard, F., Alonso L. La combinaison de l’image satellitaire avec les données citoyennes pour la mesure de l’îlot de chaleur urbain landsat, participatory measurement, satellite imagery, temperatures, urban heat island 22, 5, 105-111https://doi.org/10.3166/ISI.22.5.105-111 Renard, F., Alonso, L. (2017). La combinaison de l’image satellitaire avec les données citoyennes pour la mesure de l’îlot de chaleur urbain. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 105-111. https://doi.org/10.3166/ISI.22.5.105- 111 754Pache, A., Ferré, S.J. Aborder les flux d’informations en classe citizenship, geography, information flow, mobility 22, 5, 113-125 https://doi.org/10.3166/ISI.22.5.113-125 Pache, A., Ferré, S.J. (2017). Aborder les flux d’informations en classe. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 113-125. https://doi.org/10.3166/ISI.22.5.113-125 755 Gazel, H. G2I: Géographie, informatique et internet geography, informatics, internet, learning progress, research-teaching transfer, urban planning workshop 22, 5, 127-143https://doi.org/10.3166/ISI.22.5.127-143 Gazel, H. (2017). G2I: Géographie, informatique et internet. Ingénierie des Systèmes d’Information, Vol. 22, No. 5, p. 127-143. https://doi.org/10.3166/ISI.22.5.127-143 756Sayar, I., Souquières, J. The validation in the early steps of the development process [La validation dans les premières étapes du processus de développement] refinement, requirements, specification, tools, validation, verification 22, 4, 11-41 https://doi.org/10.3166/ISI.22.4.11-41 Sayar, I., Souquières, J. (2017). The validation in the early steps of the development process. Ingénierie des Systèmes d’ Information, Vol. 22, No. 4, p. 11-41. https://doi.org/10.3166/ISI.22.4.11-41 757Touzani, M., Ponsard, C. Modelling and analysis techniques for spatio-temporal requirements argumentation, design decision, goal orientation, process guidance, requirements engineering, spatio-temporal requirements, traceability 22, 4, 43-75 https://doi.org/10.3166/ISI.22.2.43-75 Touzani, M., Ponsard, C. (2017). Modelling and analysis techniques for spatio-temporal requirements. Ingénierie des Systèmes d’Information, Vol. 22, No. 4, p. 43-75. https://doi.org/10.3166/ISI.22.2.43-75 758 Grati, R., Boukadi, K., Abdallah, H.B. A decision-making adaptation approach based on fuzzy logic systems for composite SaaS adaptation, cloud, composite saas, fuzzy system 22, 4, 77-106https://doi.org/10.3166/ISI.22.4.77-106 Grati, R., Boukadi, K., Abdallah, H.B. (2017). A decision- making adaptation approach based on fuzzy logic systems for composite SaaS. Ingénierie des Systèmes d’Information, Vol. 22, No. 4, p. 77-106. https://doi.org/10.3166/ISI.22.4.77-106 759 Dhouib, A., Trabelsi, A., Kolski, C., Neji, M. Prioritizing the usability criteria of adaptive user interfaces of information systems based on ISO/IEC 25040 standard ADAPTIVE USER INTERFACE, ISO/IEC 25040 standard, layered evaluation, multi- criteria decision analysis method, usability criteria 22, 4, 107-128 https://doi.org/10.3166/ISI.22.4.107-128 Dhouib, A., Trabelsi, A., Kolski, C., Neji, M. (2017). Prioritizing the usability criteria of adaptive user interfaces of information systems based on ISO/IEC 25040 standard. Ingé nierie des Systèmes d’Information, Vol. 22, No. 4, p. 107- 128. https://doi.org/10.3166/ISI.22.4.107-128 760 García Frey, A., Dupuy-Chessa, S., Calvary G. Model based self-explanatory user interfaces model-driven engineering, models at runtime, self explanation, user interfaces 22, 4, 129-157https://doi.org/10.3166/ISI.22.4.129-157 García Frey, A., Dupuy-Chessa, S., Calvary, G. (2017). Model based self-explanatory user interfaces. Ingénierie des Systèmes d’Information, Vol. 22, No. 4, p. 129-157. https://doi.org/10.3166/ISI.22.4.129-157 761 Hanusse, N., Wanko, P.K., Maabout, S. Computing and compressing the negative skycube algorithm, k-dominant, optimization, skyline query, subspace 22, 3, 9-33https://doi.org/10.3166/ISI.22.3.9-33 Hanusse, N., Wanko, P.K., Maabout, S. (2017). Computing and compressing the negative skycube. Ingénierie des Systè mes d’Information, Vol. 22, No. 3, p. 9-33. https://doi.org/10.3166/ISI.22.3.9-33 762 Raynaut, W., Soule-Dupuy, C., Valles-Parlangeau, N. Dataset dissimilarity algorithm selection, dataset characterization, dissimilarity, meta- features, meta-learning 22, 3, 35-63https://doi.org/10.3166/ISI.22.3.35-63 Raynaut, W., Soule-Dupuy, C., Valles-Parlangeau, N. (2017). Dataset dissimilarity. Ingénierie des Systèmes d’Information, Vol. 22, No. 3, p.35-63. https://doi.org/10.3166/ISI.22.3.35- 63 763 Washha, M., Mezghani, M., Sè des, F. Behavioural account-based features for filtering out social spammers in large- scale twitter data collections social network, spam, twitter22, 3, 65-88https://doi.org/10.3166/ISI.22.3.65-88 Washha, M., Mezghani, M., Sèdes, F. (2017). Behavioural account-based features for filtering out social spammers in large-scale twitter data collections. Ingénierie des Systèmes d’ Information, Vol. 22, No. 3, p.65-88. https://doi.org/10.3166/ISI.22.3.65-88 764 Li, Y., Constantin, C., du Mouza C. A block-based edge-partitionning for random walks algorithms in large social graphs graph partitioning, performance, social networks 22, 3, 89-113https://doi.org/10.3166/ISI.22.3.89-113 Li, Y., Constantin, C., du Mouza, C. (2017). A block-based edge-partitionning for random walks algorithms in large social graphs. Ingénierie des Systèmes d’Information, Vol. 22, No. 3, p. 89-113. https://doi.org/10.3166/ISI.22.3.89-113 765 Kornyshova, E., Deneckère, R., Iacovelli, A. Progressive integration of agile method components. Feedback from practice agile method, experience report, method component, progressive integration, situational method engineering 22, 2, 9-33https://doi.org/10.3166/ISI.22.2.9-33 Kornyshova, E., Deneckère, R., Iacovelli, A. (2017). Progressive integration of agile method components. Feedback from practice. Ingénierie des Systèmes d’Information, Vol. 22, No. 2, p. 9-33. https://doi.org/10.3166/ISI.22.2.9-33 766Ravat, F., Song, J., Teste, O. Unified modeling of warehoused data and linked open data. Concepts and experimental assessments data warehouse, linked open data, multidimensional analysis 22, 2, 35-67https://doi.org/10.3166/ISI.22.2.35-67 Ravat, F., Song, J., Teste, O. (2017). Unified modeling of warehoused data and linked open data. Concepts and experimental assessments. Ingénierie des Systèmes d’ Information, Vol. 22, No. 2, p. 35-67. https://doi.org/10.3166/ISI.22.2.35-67 767 Chahbandarian, G., Bricon- Souf, N., Megdiche, I., Bastide, R., Steinbach, J.C. Predicting the encoding of secondary diagnoses. An experience based on decision trees Coding ICD-10, data mining, decision tree, machine learning, PMSI, secondary diagnoses 22, 2, 69-94https://doi.org/10.3166/ISI.22.2.69-94 Chahbandarian, G., Bricon-Souf, N., Megdiche, I., Bastide, R., Steinbach, J.C. (2017). Predicting the encoding of secondary diagnoses. An experience based on decision trees, Ingénierie des Systèmes d’Information, Vol. 22, No. 2, p. 69-94. https://doi.org/10.3166/ISI.22.2.69-94 768Polacsek, T. Justification diagram. A new kind of diagram for validation, accreditation and certification argumentation, requirements, verification et validation 22, 2, 95-119https://doi.org/10.3166/ISI.22.2.95-119 Polacsek, T. (2017). Justification diagram. A new kind of diagram for validation, accreditation and certification. Ingé nierie des Systèmes d’Information, Vol. 22, No. 2, p. 95-119. https://doi.org/10.3166/ISI.22.2.95-119 769 Favre, C., Artaud, C., Duffau, C., Fraisier, O., Kombi, R.K. Forum jeunes chercheurs of inforsid 2016 information systems, inforsid, PhD symposium 22, 2, 121-147 https://doi.org/10.3166/ISI.22.2.121-147 Favre, C., Artaud, C., Duffau, C., Fraisier, O., Kombi, R.K. (2017). Forum jeunes chercheurs of inforsid 2016. Ingénierie des Systèmes d’Information, Vol. 22, No. 2, p. 121-147. https://doi.org/10.3166/ISI.22.2.121-147 770 Coste, B., Ray, C., Coatrieux, G. Trust modelling and measurements for the security of information systems security of information systems, trust22, 1, 19-41https://doi.org/10.3166/ISI.22.1.19-41 Coste, B., Ray, C., Coatrieux, G. (2017). Trust modelling and measurements for the security of information systems. Ingé nierie des Systèmes d’Information, Vol. 22, No. 1, p. 19-41. https://doi.org/10.3166/ISI.22.1.19-41 771 Jaramillo, G.E., Munier, M., Aniorté, P. From human collaboration control to semantic service contracts for information security contract, model, semantics, service, SOA, trust 22, 1, 43-64 https://doi.org/10.3166/ISI.22.1.43-64 Jaramillo, G.E., Munier, M., Aniorté, P. (2017). From human collaboration control to semantic service contracts for information security. Ingénierie des Systèmes d’Information, Vol. 22, No. 1, p. 43-64. https://doi.org/10.3166/ISI.22.1.43- 64 772 Goudalo, W., Kolski, C., Vanderhaegen, F. Towards an advanced enterprise it security engineering. A joint approach to security, usability and resilience in sociotechnical systems BPMN, conceptual model, design patterns, enterprise is, joint analysis, metrics, privacy, resilience, security, semantics, sociotechnical systems, UML, usability, user experience 22, 1, 65-107 https://doi.org/10.3166/ISI.22.1.65-107 Goudalo, W., Kolski, C., Vanderhaegen, F. (2017). Towards an advanced enterprise it security engineering. A joint approach to security, usability and resilience in sociotechnical systems. Ingé nierie des Systèmes d’Information, Vol. 22, No. 1, p. 65-107. https://doi.org/10.3166/ISI.22.1.65-107 773Rajaonah, B. A view of trust and information system security under the perspective of critical infrastructure protection critical infrastructure protection, information system, security, transdisciplinarity, trust 22, 1, 109-133https://doi.org/10.3166/ISI.22.1.109-133 Rajaonah, B. (2017). A view of trust and information system security under the perspective of critical infrastructure protection. Ingénierie des Systèmes d’Information, Vol. 22, No. 1, p. 109-133. https://doi.org/10.3166/ISI.22.1.109-133