default search action
ACOSIS 2019: Marrakesh, Morocco
- Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi:
Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers. Communications in Computer and Information Science 1264, Springer 2020, ISBN 978-3-030-61142-2
Wireless Communications and Services
- Abdelfettah Belhabib, Mohamed Boulouird, Moha M'Rabet Hassani:
Pilot Assignment vs Soft Pilot Reuse to Surpass the Pilot Contamination Problem: A Comparative Study in the Uplink Phase. 3-13 - Hocine Merah, Larbi Talbi, Mokhtaria Mesri, Khaled Tahkoubit:
New Channel Estimation for MC-CDMA System Under Fast Multipath Channel. 14-24 - Riza Arda Kirmizioglu, A. Murat Tekalp:
Multi-party WebRTC as a Managed Service over Multi-Operator SDN. 25-37 - El Miloud Ar-Reyouchi, Yousra Lamrani, Imane Benchaib, Salma Rattal, Kamal Ghoumid:
NCBP: Network Coding Based Protocol for Recovering Lost Packets in the Internet of Things. 38-49
Vehicular Communications
- Khawla A. Alnajjar, Noora Abdulrahman, Fatma Mahdi, Marwah Alramsi:
Vehicle Collision Avoidance. 53-64 - Saif Islam Bouderba, Najem Moussa:
On the V2X Velocity Synchronization at Unsignalized Intersections: Right Hand Priority Based System. 65-72 - Btissam Bousarhane, Driss Bouzidi:
Convolutional Neural Networks for Traffic Signs Recognition. 73-91
Channel Coding
- Hamza Boualame, Idriss Chana, Mostafa Belkasmi:
An Efficient Semi-Algebraic Decoding Algorithm for Golay Code. 95-102 - Es-Said Azougaghe, Abderrazak Farchane, Said Safi, Mostafa Belkasmi:
Iterative Decoding of GSCB Codes Based on RS Codes Using Adapted Scaling Factors. 103-114 - Abdelghani Boudaoud, Mustapha Elharoussi, Elhassane Abdelmounim:
Turbo Decoder Based on DSC Codes for Multiple-Antenna Systems. 115-120 - Zakaria M'rabet, Fouad Ayoub, Mostafa Belkasmi:
A Threshold Decoding Algorithm for Non-binary OSMLD Codes. 121-133
Construction of Error Correcting Codes
- Jamal Laaouine:
On the Hamming and Symbol-Pair Distance of Constacyclic Codes of Length ps over $\mathbb {F}_{p^m}+ u\mathbb {F}_{p^m}$. 137-154
Intrusion Detection Techniques
- Basma Karbal, Rahal Romadi:
A Comparison of Different Machine Learning Algorithms for Intrusion Detection. 157-169 - Meryem Amar, Bouabid El Ouahidi:
A Weighted LSTM Deep Learning for Intrusion Detection. 170-179 - Mohamed Amine Kerrich, Adnane Addaim, Loubna Damej:
Proposed Solution for HID Fileless Ransomware Using Machine Learning. 180-192
Wireless and Mobile Network Security
- Oualid Boumaouche, Afifa Ghenai, Nadia Zeghib:
Data Oriented Blockchain: Off-Chain Storage with Data Dedicated and Prunable Transactions. 195-204 - Hafsa Benaddi, Khalil Ibrahimi, Haytham Dahri, Abderrahim Benslimane:
A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain. 205-218 - Nada Mouchfiq, Chaimae Benjbara, Ahmed Habbani:
Security in MANETs: The Blockchain Issue. 219-232 - Abdelaali Tioutiou, Ouafaa Diouri:
Improving IoT Security with Software Defined Networking (SDN). 233-238
Applied Cryptography
- Wiam Zamrani, Esmail Ahouzi:
Optical Image Encryption Process Using Triple Deterministic Spherical Phase Masks Array. 241-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.