default search action
10th WINCOM 2023: Istanbul, Turkiye
- Khalil Ibrahimi, Mohamed El-Kamili, Abdellatif Kobbane, Ibraheem Shayea:
10th International Conference on Wireless Networks and Mobile Communications, WINCOM 2023, Istanbul, Turkey, October 26-28, 2023. IEEE 2023, ISBN 979-8-3503-2967-4 - Haleema Sadia, Hafsa Iqbal, Ridha Alaa Ahmed:
MIMO-NOMA with OSTBC for B5G Cellular Networks with Enhanced Quality of Service. 1-6 - Maggie Shammaa, Maggie Mashaly, Ahmed El-Mahdy:
Power Optimization for Joint Large Intelligent Surface - Amplify-and-Forward Relay in Full-duplex Communications. 1-7 - Oumaima Chentoufi, Ilyas Alloug, Khalid Chougdali:
An Approach for intrusion detection using machine learning algorithms. 1-6 - Abdelkabir Rouagubi, Khalid Chougdali:
Internet of Things Systems Security Based on the Physical Objects: An overview. 1-6 - Tafsir-Moussa Sakho, Jalel Ben-Othman:
FedVANET-TP: Federated Trajectory Prediction Model for VANETs. 1-6 - Adilzhan Slyamkhanov, Zhanybek Bozbayev, Ayym Alzhanova, Artur Pan, Temirlan Ramazan, Leila Rzayeva:
Usage of Machine Learning in DDOS Attack Detection. 1-6 - Loukmane Maada, Khalid Al Fararni, Badraddine Aghoutane, Yousef Farhaoui, Mohammed Fattah:
Sentiment Analysis: Machine Learning approaches comparison. 1-6 - Francisco Javier Díaz, Ali Ahmad, Sandra Viciano-Tudela, Sandra Sendra, Jaime Lloret:
Wireless Sensor Network for Water Salinization Monitoring in Irrigation of Vertical Farming. 1-6 - Abdelmounaime Bikir, Otmane Idrissi, Khalifa Mansouri, Mohammed Qbadou:
Towards strengthening the efficiency of the Air Traffic Departure Manager DMAN using a Genetic Algorithm. 1-6 - Zahra Ali, Abdul Ahad, Ibraheem Shayea, Ivan Miguel Pires:
Improving Accuracy in Cloud Service Provider Ranking: Integrating TOPSIS with CAIQ-based QoS Assessment. 1-6 - Latif U. Khan, Mohsen Guizani:
Socially-Aware Green Distributed Metaverse for Wireless Systems. 1-6 - Mohammad Fayed, Amaan Zubairi, Nidal Nasser, Asmaa Ali, Meryeme Ayache:
Ensuring Authenticity and Sustainability in Perfume Production: A Blockchain Solution for the Fragrance Supply Chain. 1-6 - Loubna Mazgouti, Najiba El Amrani El Idrissi:
Comparative analysis of the performance of four learning models for predicting blood glucose levels in type 1 diabetic patients based on blood glucose measurements. 1-7 - Abdou Mohamed Naira, Imade Benelallam:
Evaluating ESG Impacts in African Cities through Topic-Level Sentiment Analysis. 1-6 - Zhenhua Zhang, Siyue Sun, Gaosai Liu, Xinglong Jiang, Jinpei Yu, Guang Liang, Shuai Han:
A New All-Optical Switching Satellite Network Architecture based on Optimized Wavelength-Mapping. 1-5 - Archi Taha, Mohammed Benattou:
A robust intrusion detection model based on a combination of PCA-GM and trunced LDA. 1-6 - D. Sugumar, Suriya K. S., Anto Michael Suraj T., Alphonse Vimal Jose J., K. Kavitha:
Seizure Detection using Machine Learning and Monitoring through IoT Devices. 1-6 - Chaymae Ziani, Abdelalim Sadiq, Khalid Housni:
Enhanced SH-CNN: Gender Prediction Based on Convolutional Neural Network. 1-5 - Hamza Reguieg, Mohammed El Hanjri, Mohamed El-Kamili, Abdellatif Kobbane:
A Comparative Evaluation of FedAvg and Per-FedAvg Algorithms for Dirichlet Distributed Heterogeneous Data. 1-6 - Ridha Alaa Ahmed, Haleema Sadia:
Cooperative Non-Orthogonal Multiple Access for B5G Wireless Networks: Modeling and Simulations. 1-6 - Waheeb Tashan, Ibraheem Shayea, Sultan Aldirmaz Çolak, Ayman A. El-Saleh:
Voronoi-Based Handover Self-Optimization Technique For Handover Ping-Pong Reduction in 5G Networks. 1-6 - Radi Khaoula, Moughit Mohamed:
K-means-dist: A Novel Approach for Enhanced Cybersecurity Clustering Using Combined Distance Metrics. 1-6 - Asma Ali Hussein Budalal:
Analysis of Rain Interference on Short-Range Millimetre-Wave Terrestrial Links. 1-7 - Khadija Hicham, Sara Laghmati, Amal Tmiri:
3D CT Scans for Colorectal Cancer Classification using VGG16 and Data Augmentation. 1-4 - Alberto Ivars-Palomares, Miguel Zaragoza-Esquerdo, Sandra Sendra, Jaime Lloret:
Design of a Platform for Data Storage and Data Management in IoT Networks. 1-6 - Sara Halim, Bouchaib Bounabat:
Conception of a Digital Government Maturity Model for Developing Countries. Application to Uruguay. 1-6 - Hajar Ouhmidou, Abdellah Nabou, Abdelouafi Ikidid, Wafa Bouassaba, Mohammed Ouzzif, Moulay Ahmed El Kiram:
Traffic Control, Congestion Management and Smart Parking through VANET, ML, and IoT: A Review. 1-6 - Ouroui Ayoub, Youssef Fakhri, Siham Boulaknadel, Mohamed Amnai:
Automatic classification of emails using Deep Learning. 1-6 - Aouatif Arqane, Omar Boutkhoum, Hakima Chouati, Abdelmajid El Moutaouakkil:
An optimized neural network-based IDS against DDoS attacks. 1-6 - Mohamed Darqaoui, Moussa Coulibaly, Ahmed Errami:
Smart Parking System Approaches and Positioning Technologies: A Survey. 1-8 - Carlos Gonzalez, Salim Mahamat Charfadine:
SDN Controllers and ML-Based Anomaly Detection in Embedded Systems: A Comparative Analysis. 1-6 - Kutluhan Taylan Iren, Tolga Girici:
A Simple Cascade Channel Estimation Method for UAV RIS-Enabled Millimeter Wave Transmissions. 1-6 - Mohamed M'Haouach, Mouad Choukhairi, Khalid Fardousse:
Benchmarking Client Selection Methods in Non-IID Federated Learning Scenarios. 1-7 - Mounir El Mejjatti, Ahmed Habbani:
Novel Soil Impact Prediction Model on Bandwidth. 1-6 - Lida Kouhalvandi, Mohammad Alibakhshikenari, Ladislau Matekovits, Ibraheem Shayea, Serdar Özoguz:
Future Communication Systems: Toward the Intelligent-based Optimization Approaches. 1-6 - Soule Issa Loutfi, Ufuk Tureli, Ibraheem Shayea:
Augmented Reality with Mobility Awareness in Mobile Edge Computing over 6G Network: A Survey. 1-6 - Ilham Salhane, Mounir Rifi, Hanae Terchoune, Soumaya Elmorabeti:
A Novel Wearable Circular Polarized Antenna Design for Wireless Power Transfer Systems in E-Health Applications. 1-5 - Mehmet Izzet Saglam:
Conditional Handover for Non-Terrestrial Networks. 1-5 - Youssef Oubaydallah, Khalil Ibrahimi, Rachid El Azouzi:
Recent Advances in Data Intensive Applications: Survey. 1-6 - Yasser Elouargui, Mahmoud Zyate, Abdellatif Sassioui, Meriyem Chergui, Mohamed El-Kamili, Mohammed Ouzzif:
A Comprehensive Survey On Efficient Transformers. 1-6 - Abdelhadi Rachad, Lotfi Gaiz, Khalid Bouragba, Mohammed Ouzzif:
Predictive Maintenance-as-a-Service (PdMaaS) in Industry 4.0 using Blockchain. 1-6 - Abdelkrim Saouabe, Merouane Mazar, Said Tkatek, Imad Mourtaji:
Evolution of Image Captioning Models: An Overview. 1-5 - Ayoub El-Alami, Younes Nadir, Lahcen Amhaimar, Khalifa Mansouri:
An efficient hybrid approach for vehicle detection and tracking. 1-8 - Mohamed Zelmati, Zakariae Oulqaid, Abdelmajid Elouadi:
Real-time Tracking of Auditing Process Progress with a Customizable Application for Cybersecurity Standards Compliance: A Case Study on ISO 27001 and TISAX. 1-7 - Salma Aboelmagd, Elmehdi Illi, Marwa K. Qaraqe:
Reconfigurable Intelligent Surfaces-aided Transmissions in a SIMO Network: A Secrecy Analysis. 1-6 - Idriss Moumen, Jaafar Abouchabaka, Najat Rafalia:
Enhanced Traffic Management Through Data Mining: Predictive Models for Congestion Reduction. 1-6 - Meisam Abdollahi, Ramin Sabzalizadeh, Samaneh Javadinia, Sepideh Mashhadi, Sara Sanati Mehrizi, Amirali Baniasadi:
Automatic Modulation Classification for NLOS 5G Signals with Deep Learning Approaches. 1-6 - Marriam Sikander, Faran Awais Butt, Jawwad Nasar Chattha, Ijaz Haider Naqvi:
Improving Wireless Communication through Beamwidth Optimization in Reconfigurable Intelligent Surfaces. 1-5 - Asmae Briouya, Hasnae Briouya, Ali Choukri, Mohamed Amnai, Youssef Fakhri:
Exploration of Question-Answering Systems: Survey. 1-6 - Samira Lafraxo, Mohamed El Ansari, Lahcen Koutti:
GastroSegNet: Polyp Segmentation using Colonoscopic Images Based on AttentionU-net Architecture. 1-6 - Hawraa Makki Razaq, Wasan Kadhim Saad:
Review of Free Space Optical Communication: Advantages and Disadvantages. 1-5 - Ayoub Jibouni, Dounia Lotfi, Ahmed Drissi El Maliani:
Link prediction in weighted complex networks using machine learning methods and similarity metrics. 1-6 - Hamza Alami, Meryem Janati Idrissi, Abdelkader El Mahdaouy, Abdelhak Bouayad, Zakaria Yartaoui, Ismail Berrada:
Investigating Domain Adaptation for Network Intrusion Detection. 1-7 - Mohammed El Moudni, Elhoussine Ziyati:
Data Leakage Prevention Approach Based On Insider Trust Calculation. 1-6 - Bouchra Rguig, Brahim Es-Sousy, Said Ouhmi, Khalid Housni:
IoT Security Based on Smart Contracts: Classification of Algorithms, Complexity, Robustness and Fields of Application. 1-8 - Fatima Chahal, Hacène Fouchal, Dominique Gaïti:
Preserving User Privacy and Empowering Control in Proximity Marketing. 1-6 - Md Imran Hossain, Murat Tahtali, Ugur Turhan:
Performance Analysis of Private Blockchain in Mobile Ad-hoc Networks (MANETs). 1-6 - Kamal Elhattab, Karim Abouelmehdi, Said Elatar:
New Model to Monitor Plant Growth Remotely using ESP32-CAM and Mobile Application. 1-6 - Othmane Cherqi, Anass Sebbar, Khalid Chougdali, Mohammed Boulmalf, Houda Benbrahim:
Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis. 1-7 - M. S. Gayathree, Sreelakshmi Manjunath:
Towards reliability analysis of IEEE 802.11p MAC for platooning in a heterogeneous traffic setup. 1-7 - Edgard Ndassimba, Yvan Paillard Kalia-Sya Dodoagnen, Eugene Baba Sire Zabolo, Gervais Mendy, Samuel Ouya:
Proposal to set up a private 5G network to improve the quality of education: case of the University of Bangui. 1-6 - Yassine Oukdach, Zakaria Kerkaou, Mohamed El Ansari, Lahcen Koutti, Ahmed Fouad El Ouafdi:
ConV-ViT: Feature Fusion-based Detection of Gastrointestinal Abnormalities using CNN and ViT in WCE Images. 1-6 - Fatma Aktas, Ibraheem Shayea, Mustafa Ergen, Ayman A. El-Saleh:
AI-Enabled Routing in Next-Gen Networks: A Brief Overview. 1-6 - Amina A. Mohamednour, Maitha R. Alzaabi, Aisha Alnuaimi, Hanane Lamaazi, Mohamed Adel Serhani:
Slinker: A Safe Linker For An Efficient Data Encryption. 1-6 - Yasmina El Khalfaoui, Brahim Alibouch, Ahmed Fouad El Ouafdi:
Combining Deep CNNs and Superpixels for Polyp Segmentation in Colonoscopy Images. 1-6 - Youssef Frist, Mourad Elhabchi, Mohamed Nabil Srifi:
A Novel Frequency Reconfigurable Antenna Based on Metamaterial for Millimeter-Wave 5G Applications. 1-5 - Ayoub Seck, Eugene Baba Sire Zabolo, Constantin S. E. Bassene, Ndèye Coumba Sene, Samuel Ouya:
BOPIS-Software: A Python based Software application for SDN East-West inter Autonomous System communication and Programmable Network Monitoring tool. 1-6 - Emre Kizilay, Cemanur Aydinalp, Mehmet Nuri Akinci:
Analysis of Walnut Freshness: Preliminary Study. 1-4 - Jalel Ben-Othman, Lynda Mokdad:
Analytical Study for Vehicle Mobility Modeling. 1-6 - Houda El Mohamadi, Mohammed El Hassouni:
Enhanced Deep Learning Explainability for COVID-19 Diagnosis from Chest X-ray Images by Fusing Texture and Shape Features. 1-6 - Hiba El Fadili, Tomader Mazri:
Security and Privacy Issues of Implantable Pacemakers. 1-4 - Mouad Choukhairi, Mohamed M'Haouach, Youssef Fakhri, Mohamed Amnai:
Tree-Driven Intelligent Security System for Intrusion Detection in IoT environment. 1-7 - Christos Bouras, Damianos Diasakos, Apostolos Gkamas, Vasileios Kokkinos, Philippos Pouyioutas, Nikolaos Prodromos:
Evaluation of User Allocation Techniques in Massive MIMO 5G Networks. 1-6 - Mojtaba Mahdavi:
Fully Parallel and Reconfigurable Realization of DFT/IDFT using In-Memory Computing. 1-8 - Senthil Kumaran Devarajalu, Deepak Jose:
Performance Evaluation of OTFS Under Different Channel Conditions for LEO Satellite Downlink. 1-6 - Abdulaziz Aborujilah, Abdulaziz Alashbi, Ibraheem Shayea, Abdul Hakim H. M. Mohamed, Abdulraqeb Alhammadi, Ayman A. El-Saleh, Abdul Ahad:
IoT Integration in Agriculture: Advantages, Challenges, and Future Perspectives: Short survey. 1-7 - Aki Nagano:
Institutional Values and CDR for Green ITC: Transforming E-waste to Ethical Gems. 1-6 - Dana Turlykozhayeva, Sayat Akhtanov, Nurzhan Ussipov, Almat Akhmetali, Aslan Bolysbay, Yerkin Shabdan:
Routing Algorithm for Software Defined Network Based on Boxcovering Algorithm. 1-5 - Omayma Amezian, Soufiane Hajbi, Younes Chihab:
Towards a large Biscript Moroccan Lexicon. 1-6 - Marouane Zaizoune, Youssef Fakhri, Siham Boulaknadel:
Automatic emails classification. 1-4 - Ibrahim Yazici, Emre Gures:
A Robust Machine Learning Approach for Path Loss Prediction in 5G Networks with Nested Cross Validation. 1-6 - Ouidad Saber, Tomader Mazri:
In-Vehicle Intrusion Detection based on Machine Learning. 1-6 - Dauha Elamrani Abou Elassad, Zouhair Elamrani Abou Elassad, Othmane El Meslouhi, Mohamed Ameksa, Hajar Mousannif, El Houssine El Mazoudi:
A non-intrusive multivariate analysis for monitoring inattentive driving based on physiological signals, driver inputs and visual features: A hybrid deep learning approach. 1-7 - Asmae Bentaleb, Houda Belaabed, Jaafar Abouchabaka:
New Approach for DDoS Attacks Detection: ConvXGB. 1-6 - Nada Bendahman, Dounia Lotfi:
A Novel Centrality based Measure for Influential Nodes Detection in Social Networks. 1-7 - Mehdi Attioui, Mohamed Lahby:
Deep Learning-Based Congestion Forecasting: A Literature Review and Future. 1-8 - Richard Verhoeven, Bram van Berlo, Nirvana Meratnia:
Exception Analysis of Running Complex and Computation-intensive Deep Learning Models. 1-7 - Souad Labghough, Fouad Ayoub, Faissal El Bouanani, Mostafa Belkasmi, Khalid A. Qaraqe:
Performance Analysis of Coded CSOC-Assisted Energy Harvesting AF Dual-hop RF/FSO System. 1-6 - Chaymae El Mechal, Najiba El Amrani El Idrissi:
Two-Stream nnU-Net: A Novel Architecture for Precise Tumor Segmentation in Medical Imaging. 1-6 - Noor Ahmed:
On The Practicality of Blockchain-based Security and Privacy for Next Generation SDN. 1-6 - Hacène Fouchal, Timothé Kruk, Cyril Rabat:
A Distributed Scheme for Optimal Road Intersection Management. 1-5 - Fatima ZAhrae Ait Hamou Aadi, Abdelalim Sadiq, Zakia Labd:
Comparing Object Tracking Algorithms for Real-Time Applications: Performance Analysis and Implementation Study. 1-5 - Mohamed Amine Madani, Abdelmounaim Kerkri:
Access Control for Collaboration in Cloud Environment: A Comparative Analysis. 1-7 - Hasan Sattar Mohsin, Wasan Kadhim Saad, Ibraheem Shayea:
Literature Review of Handover Decision Algorithms in 5G Networks. 1-6 - Abdessamad Essaidi, Mostafa Bellafkih, Kandoussi el Mehdi:
Proposed Sentiment Analysis of COVID-19 Tweets using Machine Learning Algorithm. 1-6 - Mohamed Ossama ElShafei, Maggie Shammaa, Engy Aly Maher, Minar El-Aasser:
Evaluating Lora's Transmission Range and Reliability for Connected Vehicles. 1-6 - Saba Tariq, Waleed Tariq Sethi, Arbab Abdur Rahim:
High Gain Dual-band Compact Antenna Array for Millimeter Wave Applications. 1-6 - Maggie Shammaa, Maggie Mashaly, Ahmed El-Mahdy:
Power Allocation for Joint Large Intelligent Surfaces Decode-And-Forward Relay in Full-Duplex Communications - A Deep Learning Approach. 1-6 - Zhour Rachidi, Khalid Chougdali, Abdellatif Kobbane:
Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms. 1-5 - Lida Kouhalvandi, Sercan Aygun, Ladislau Matekovits, Farshad Miramirkhani:
Optimizing Indoor Localization Accuracy with Neural Network Performance Metrics and Software-Defined IEEE 802.11az Wi-Fi Set-Up. 1-4 - Ismail Elbouknify, Afaf Bouhoute, Khalid Fardousse, Ismail Berrada, Abdelmajid Badri:
CT-xCOV: a CT-scan based Explainable Framework for COVid-19 diagnosis. 1-8 - Ibrahim Bouabdallaoui, Fatima Guerouate, Mohammed Sbihi:
Assessing Topic Modeling in Online Forums: A Comparative Study of Hierarchical and Centroid-Based Clustering Algorithms. 1-7 - Meryem Janati Idrissi, Hamza Alami, Abdelhak Bouayad, Ismail Berrada:
NF-NIDS: Normalizing Flows for Network Intrusion Detection Systems. 1-7 - Hajar Bnouachir, Meriyem Chergui, Hicham Medromi:
Intelligent Systems Engineering in Open Pit Mines: Intelligent Systems for Mining Fleet Management. 1-6 - Fahmi Fadhl Al-Hosaini, Naif Mohammed Al-Hada, Mustfa M. A. Mudhish, Abdullah Mahfoud Baadhem, Abdulwadod S. A. Hassan, Ali S. A. Maaodhah, Majid Al-Nabae:
The Influence of Spirituality Perspective on Internal Business Process in Private Universities. 1-6 - Abdellatif Sassioui, Rachid Benouini, Yasser El Ouargui, Mohamed El-Kamili, Meriyem Chergui, Mohammed Ouzzif:
Visually-Rich Document Understanding: Concepts, Taxonomy and Challenges. 1-7 - Salah El Hajla, Ennaji Mahfoud, Yassine Maleh, Soufyane Mounir:
Attack and anomaly detection in IoT Networks using machine learning approaches. 1-7 - Hawraa Makki Razaq, Wasan Kadhim Saad:
Performance Analysis of NG-PON2 with DWDM-FSO System with Eight Wavelengths and 80Gbps Data Rate. 1-6 - Mohamed Ridani, Mohamed Amnai, Ali Choukri, Youssef Fakhri, Noreddine Gherabi:
Indexation techniques in decision support systems: Study and Evaluation. 1-7 - Haleema Sadia, Ziaul Haq Abbas, Ahmad Kamal Hassan, Ghulam Abbas:
Outage Probability Analysis of Reconfigurable Intelligent Surface (RIS)-Enabled NOMA Network. 1-6 - Andrey Garnaev, Wade Trappe:
A non-zero sum game of a joint radar and communication system and a jammer. 1-6 - Gabriel Avanzi Ubiali, Taufik Abrão, José Carlos Marinello:
User Scheduling in Multi-State Los/NLoS Crowded XL-MIMO Channels. 1-6 - Bilal Saoud, Ibraheem Shayea:
Performance evaluation of MIMO-OFDM system in wireless network. 1-5 - Noura Bentaher, Younes Kabbadj, Mohamed Ben Salah:
Enhancing Breast Masses Detection and Segmentation: A Novel U-Net-Based Approach. 1-6 - Mohamed Janati Idrissi, Salah Eddine Essalhi, Mohammed Raiss El-Fenni:
Intelligent Hypervisor Placement for VSDN: Adapting to Fluctuating Traffic Scenarios. 1-6 - Adil Maralbayev, Gabdu-Samad Omar, Meruyert Abdulayeva, Leila Rzayeva, Gaukhar Kalybek, Erasyl Rakhym:
New Algorithm of Weak Password Detection. 1-6 - Hatim Lakhdar, Fatna Elmendili, Younes El Bouzekri El Idrissi:
Blockchain-based spam detection approach. 1-7 - Ahmet Caner Gül, Mehmet Nuri Akinci, Semih Dogu:
Millimeter-Wave Channel Modeling In Rural Areas. 1-4 - Omer Gulec, Emre Sahin:
Maximizing Nano-Sensor Node Coverage using BWO in WNSNs. 1-6 - H. Hakan Kilinc, Faruk Kaledibi:
Audio Deepfake Detection by using Machine and Deep Learning. 1-5 - Karima Bouyahia, Mahfoud Benchaïba, Haroun Benkaouha:
Enhancing Connectivity Repairing in wireless sensor networks with Void Regions. 1-6 - Ibrahim Yazici, Emre Gures:
A Novel Approach for Machine Learning-based Load Balancing in High-speed Train System using Nested Cross Validation. 1-6 - Mehdi Ait Lhouss, Rachid Bouhouch, Omar Boudhar, Fouad Safiri, Kalid Nafil, Mohammed El Koutbi:
Traffic Monitoring Using IoT And Lambda Architecture. 1-7 - Abdulkadir Dauda, Olivier Flauzac, Florent Nolot:
IoT: A Universal Dynamic Gateway. 1-6 - Mohammed El Moudni, Elhoussine Ziyati:
A Multi-Cloud and Zero-Trust based Approach for Secure and Redundant Data Storage. 1-6 - Mamma Ahizoune, Tomader Mazri, Omar Mouhib:
Handover for 5G mobile network. 1-6 - Archi Taha, Mohammed Benattou:
An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems. 1-6 - Assiya Sarinova, Leila Rzayeva, Noyan Tendikov, Ibraheem Shayea:
Simple Implementation of Terrain Classification Models via Fully Convolutional Neural Networks. 1-6 - Kalid Nafil, Aziza Saufi, Ouafae Hdili, Sara Faqihi, Halima Maghraoui, Abdellatif Kobbane, Mohammed El Koutbi:
Lettuce Leaf Disease Protection and Detection Using Image Processing Technique. 1-6 - Hina Ayaz, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Waqas:
Secrecy Capacity Analysis with Imperfect Channel State Information and Varying Interference for 6G C-V2X Communication. 1-6 - Laasri Nadia, Dounia Lotfi, Ahmed Drissi El Maliani:
Enhancing Vaccination Strategy Effectiveness in Epidemic Networks: Exploring a New Centrality Measure and Community Detection Methods. 1-6 - Rajae Tamri, Jilali Antari, Radouane Iqdour:
An enhanced IoT architecture for healthcare using secure Software-Defined Fog gateway. 1-4 - Habiba Hadri, Mourad Ouadou, Khalid Minaoui:
A LightGBM-Based Approach to improve Sybil Attack Detection in VANET networks. 1-6 - Saba Tariq, Waleed Tariq Sethi, Arbab Abdur Rahim:
A Miniaturized Slotted Patch Antenna for 5G Millimeter Wave Applications. 1-5 - Kamal Souali, Manal Souali, Mohammed Ouzzif:
An RFID-Based Traceability Approach to Improve the Overall Health Status Management in Morocco. 1-6 - Abdelhadi Ennajih, Azzeddine Sardi, Mohamed Sadik, Jamal Zbitou:
Design and Analysis of Intelligent Reflecting Surface for 5G Applications. 1-5 - Christophe Maudoux, Selma Boumerdassi:
Unsupervised Anomaly Knowledge Flow: a Digital Signatures Extraction Approach. 1-6 - Bahaa Eddine Elbaghazaoui, Mohamed Amnai, Youssef Fakhri, Ali Choukri, Noreddine Gherabi:
Profiling Language Sign Using Deep Learning. 1-6 - Shahid Anwar, Abdul Ahad, Mudassar Hussain, Ibraheem Shayea, Ivan Miguel Pires:
Ransomware Detection and Classification using Ensemble Learning: A Random Forest Tree Approach. 1-6 - Fatima Lakrami, Mohamed El-Kamili, Najib Elkamoun, Hind Sounni, Ouidad Labouidya:
A secure based trust model for Optimized Link State Routing protocol (OLSR). 1-5 - Mahmoud El Hamlaoui, Mohamed Amine Lahsaini, Sara Helmy Moselhy, Tarik Fissaa, Youness Laghouaouta:
Basketball Free Throw Analysis using Object Detection Techniques. 1-6 - Fatima Ghazi, Aziza Benkuider, Mohamed Zraidi, Fouad Ayoub, Khalil Ibrahimi:
Neighborhood Feature Extraction and Haralick Attributes for Medical Image Analysis: Application to Breast Cancer Mammography Image. 1-6 - Sepideh Mashhadi, Abolfazl Diyanat, Meisam Abdollahi, Amirali Baniasadi:
DSP: A Deep Neural Network Approach for Serving Cell Positioning in Mobile Networks. 1-6 - Ilyes Ahmim, Nacira Ghoualmi-Zine, Feriel Bouakkaz, Abderrezak Rachedi:
Enhancement of a User Authentication Scheme for Big Data Collection in IoT-Based Intelligent Transportation System. 1-6 - Mohamed Gouhail, El Houssin El Mazoudi, Issam Salhi, Saïd Doubabi:
Fuzzy Logic Control of Four-Phase Interleaved Boost Converter for PEM Fuel Cell. 1-6 - Abdelilah Serhane, El-Mehdi Hamzaoui, Khalil Ibrahimi:
IA Applied to IIoT Intrusion Detection: An Overview. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.