


default search action
7th CommNet 2024: Rabat, Morocco
- 7th International Conference on Advanced Communication Technologies and Networking, CommNet 2024, Rabat, Morocco, December 4-6, 2024. IEEE 2024, ISBN 979-8-3503-6702-7

- Younes Elgargouh, Mohamed Ghazali, Mohammed Reda Chbihi Louhdi, El Moukhtar Zemmouri, Hicham Behja:

Computer Vision for Damage Detection in Cars Images. 1-8 - Sarra Erregui, Otmane El Mouaatamid, El Mehdi Loualid:

Securing Healthcare Data in IoT: A Study on Homomorphic Encryption. 1-7 - Abdoul Nasser Hassane Amadou, Anas Motii

, Mohammed Jouhari:
HC-HackerRank: Identifying Key Hackers in Cybercrime Social Network Forums. 1-8 - Raneem F. Abdelrahim

, Jana M. AlNatour, Layan T. AbuRayyan, Yanal S. Faouri
:
3D Printed Frequency Reconfigurable DRA for Wireless Applications. 1-5 - El Mahi Bouziane, Lahbib Naimi

, Charaf Ouaddi
, Lamya Benaddi, Abdeslam Jakimi:
Use Cases and Scenarios Engineering in Smart Software Application Development Services. 1-7 - Ikram Hamdaoui, Khalid El Makkaoui, Zakaria El Allali:

Evaluating Machine Learning Algorithms for Intrusion Detection: A Step Toward Securing Real-Time Big Data. 1-7 - Hind Kadim Alaoui, Moussa Coulibaly, Ahmed Errami:

Adaptive Energy Management for Smart Parking Sensors: Enhancing Efficiency and Sustainability. 1-6 - Hanae El Ouardani, Toufik Chaayra

, Zakaria El Allali:
Stochastic Modeling for Waterborne Diseases Dynamics: A survey. 1-6 - Abadila Alaktif, Meriyem Chergui, Imane Daoudi, Abdelkrim Ammoumou:

All You Should Know About Large Language Models (LLMs). 1-10 - Nada Essam, Bassant Abdelhamid, Michael Ibrahim:

Triple-Layer TTD Hybrid Beamformer for Beam Split Mitigation in Wideband THz Systems. 1-7 - Samia El Haddouti

, Mohamed Dafir Ech-Cherif El Kettani, Habiba Chaoui:
Unveiling Blockchain Security and Resilience in the Quantum Age: An Analytical Study of Post-Quantum and Quantum Approaches. 1-8 - Thangavel Murugan

, Fotoon Khaleifah Abdulla Mosabbas Aldahmani, Ghalya Salem Mohamed Alshuraiqi Almehrzi, Eiman Mohamed Salem Mohamed Alsereidi, Aaesha Abdulla Khalfan Ali Aldahmani, Eiman Mubarak Masoud Alahbabi:
Recent Research Study on AI-based Crime Scene Evidence Detection. 1-8 - Widad Belaoura, Saud Althunibat, Mazen O. Hasna, Khalid A. Qaraqe:

MIMO-Aided Index Modulation-Based Orthogonal Frequency Division Multiple Access. 1-5 - Charaf Ouaddi

, Lamya Benaddi, Lahbib Naimi
, El Mahi Bouziane, Abdeslam Jakimi:
A Graphical DSL for Accelerating Chatbot Development. 1-6 - Farman Ullah, Mohammad Hayajneh, Najah AbuAli

, Haroon Asad, Fiza Saeed Malik, Bisni Fahad Mon:
Autonomous Control with Vision and Deep Learning: A Raspberry Pi Edge Computing Platform for Obstacle Detection in SUAV Path. 1-9 - Mustapha Hilia, Bouchaib Aylaj, Fouad Ayoub, Adil Hilmani, Khalil Ibrahimi, Faissal El Bouanani:

Algebraic Construction of Non-Primitive BCH Codes on GF(2m) with Minimum Distance Checking for Degrees up to 10. 1-4 - Chaimae El Filali, Imad Bourian

, Khalid Chougdali:
Privacy-Preserving And Access Control Scheme For IoT-Based Healthcare Systems Using Ethereum Blockchain. 1-6 - Salmane Douch, Mohamed Riduan Abid, Khalid Zine-Dine, Driss Bouzidi, Driss Benhaddou:

Novel Lightweight Method for Detecting Backdoor Attacks in Edge-Deployed Neural Networks. 1-6 - Fouad Younes, Iyad Lahsen Cherif, Hassan El Ghazi:

Toward a City Digital Twin: Design Principles, and Challenges. 1-5 - Mohammad Abdus Salam, A. F. M. Saifuddin Saif, Priya Hamsa Katroju, Robert Kassouf-Short:

A Constructive Analysis on Machine Learning Integration in High Delay Tolerant Networking (HDTN). 1-6 - Hind Mikram, Said El Kafhali

:
AI-Driven Autonomous Systems for Optimal Management of Fog Computing Resources. 1-7 - Mohammed Bouhassane, Abderrahim Kaabouch, Abdelalim Sadiq, Oussama Aziz, Mohamed Oualla

:
Intrusion Detection for Internet of Things Integrating Blockchain Technologies: A Review Paper. 1-6 - Mohammad Taghi Dabiri, Mazen O. Hasna, Saud Althunibat, Khalid A. Qaraqe, Mohamed-Slim Alouini

:
A Balloon-Based UAV-Aided Non-Terrestrial Sectorized Network for Post Disaster Cellular Coverage: A Dynamic Environment Perspective. 1-7 - Rachid El Ibraqui, Moulay Othman Aboutafail, Redouane Nouira:

Modeling and mathematical analysis of liquidity-credit risk contagion in the banking system. 1-5 - Imane Laassar, Moulay Youssef Hadi, Amine Mrhari

, Soukaina Ouhame:
Enhancing Industrial IoT Intrusion Detection with Hyperparameter Optimization. 1-6 - Khalid A. Darabkh, Mamoun F. Al-Mistarihi, Bayan Abdallah Odat:

Integrating Software-Defined Networking and Fog Computing for a Novel Routing Protocol in Vehicular Ad-Hoc Networks. 1-6 - Anargyros J. Roumeliotis, Evangelos Kosmatos, Konstantinos V. Katsaros, Angelos J. Amditis:

Multi-Service And Multi-Tier Edge-Cloud Continuum Planning. 1-7 - Aouatif Arqane, Omar Boutkhoum, Abdelmajid El Moutaouakkil:

Optimizing Feature Selection for IoT Intrusion Detection: A Hybrid Bio-Inspired Method. 1-7 - Alimouch Zoubair, Mohamed Et-tolba, Najib Naja:

A Wind Speed-Driven Approach to Round Earth Loss Modeling for Maritime Communications. 1-6 - Yassine Aitamar

, Jamal El Abbadi:
MeanC-IQR: Enhanced Fault Detection in WSNs for Smart Farming. 1-4 - Farman Ullah, Mohamed Isa, Ahmed Abdulraheim Alhammadi, Abdalla Ahmed Ali Alyassi, Shumayla Yaqoob, Ihtesham Jadoon

:
Sign Language Recognition of Autistic Children using Wearable Sensors Signals Features Selection. 1-7 - Adil Hilmani, Yassine Sabri, Abderrahim Maizate, Siham Aouad, Mohammed Koundi, Fouad Ayoub:

Energy Efficiency Optimization of Wireless Sensor Networks with K-Means Integration. 1-6 - Ilham Es Sadki, Bouazza El Wahbi, Larbi Zraoula:

Weak Almost Grothendieck Operators in Banach Lattices. 1-4 - Abdelhalim Houssaoui, Otmane El Mouaatamid, Mostafa Belkasmi:

Efficient Quantum Key Distribution Using Balanced Incomplete Block Designs. 1-8 - Ghizlane Mounir, Jamal El Abbadi:

Antenna Array Design for 28 GHz Millimeter-Wave 5G Communication Systems. 1-4 - Mohammed Sabiri, Bassou Aouijil:

On quantum and LCD Codes Over The Ring Fq[u, v, w, z]/3<u3-u, v2-v, w2-w, z2-z, uv, vu, uw, wu, uz, zu, vw, wv, vz, zv, wz-zw>. 1-5 - Kentaro Kusumi, Hiroshi Koide:

MQTT-MTD: Integrating Moving Target Defense into MQTT Protocol as an Alternative to TLS. 1-8 - Khalil Ibrahimi, Mohammed Jouhari, Salif Sow, Fouad Ayoub, Mohamed El-Kamili, Khalid Chougdali:

Reinforcement Learning for Optimized Resource Allocation in 5G URLLC. 1-6 - Bishal Shyam Purkayastha, Md. Musfiqur Rahman, Maryam Shahpasand:

Android Malware Detection Using Machine Learning and Neural Network: A Hybrid Approach with Federated Learning. 1-5 - Farida Bouroumane, Ikram Hamdaoui, Mustapha Abarkan:

Evaluation of Serious Games Intended to Be Used in Education: Systematic Review. 1-6 - Otmane Filali Razzouki, Anas Charroud, Zakaria El Allali, Abdelaziz Chetouani, Nassime Aslimani:

A Survey of Advanced Gradient Methods in Machine Learning. 1-7 - Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, Vasileios Kokkinos

, Apostolos Gkamas, Christos Bouras, Philippos Pouyioutas:
Enhancing Spectral Efficiency in 5G MIMO Networks Through Adaptive Beamforming Techniques. 1-7 - Abdellatif Kichna, Abderrazak Farchane, Said Hakimi:

Analyzing the Impact of Thresholds in Bit-Flipping Decoding for QC-MDPC based McEliece cryptosystems. 1-5 - Mohamed Mourabet

, Yassir Alaoua, Mohamed Ech-Chad
:
A Note on an elementary Operator with Quasi-M-Hyponormal Operator Entries. 1-7 - Mohamed Bourhail, Toufik Chaayra

, Faissal El Bouanani, Zakaria El Allali:
Accurate Approximations for the Ratio of Sums of Independent Rayleigh Random Variables. 1-6 - Fatima Ghazi, Fouad Ayoub, Khalil Ibrahimi, Aziza Benkuider:

Osteoporosis Classification Using Multifractal Features and Neighbourhood Determination of Extrema for BMED. 1-8 - Hassane Ansary

, Larbi Zraoula, Mohamed Ech-Chad
:
On Order Gelfand-Phillips Property And Order Limited Completely Continuous Operators. 1-5 - Radheshyam Singh, Mohamed Aymen Chalouf, Léo Mendiboure, Michael S. Berger

, Lars Dittmann
:
Towards an SDN-based Reconfigurable Edge Architecture for Railway Environment. 1-7 - Radheshyam Singh, Diaa Jadaan, Drona Ghimire, Michael S. Berger

, Amund Skavhaug, Lars Dittmann
:
Evaluating Energy Efficiency: A Comparative Study of LTE, 5G-NSA, 5G-SA, and Private 5G Networks. 1-7 - Raed T. Al-Zubi, Yazid M. Khattabi, Mohammed Hawa, Hasan Farahneh

, Khalid A. Darabkh, Khaled Farouq Hayajneh:
New Approach for Studying HARQ-Aided MIMO-NOMA Communication System. 1-5 - Younes Hamzaoui, Mohammed Chekour

:
Enhancing MPR Selection in Ad Hoc Networks Through Balanced Neighbor Distribution. 1-4 - Soukaina Madani, Mohamed Morjane, Mohamed Ech-Chad

:
On the Δ-Symmetric Operators and Applications. 1-6 - Ayam Saddouq, Mamoun F. Al-Mistarihi, Mahmoud A. Khodeir, Khalid A. Darabkh:

Enhancing Physical-Layer Security in Full-Duplex Cooperative Wireless Networks over α-μ Fading Channels. 1-7 - Mohamed Faraji, Meryeme Ayache, Hanan El Bakkali:

Security Challenges in Integrating BIoT Systems: A Comprehensive Review. 1-6 - Petya Popova, Veselin Popov:

Artificial Intelligence and Big Data Analytics for Supply Chain Sustainability. 1-8 - Abdelmajid Bessate, Abdellah Madani

, Faissal El Bouanani, Mohamed Elomari:
Effective Capacity of Maximal Ratio Combining Subject to the Fading Impairment. 1-5 - Nguyen Thi Thu Hang

, Serengul Smith, Huan X. Nguyen:
Adaptive PMME Medium Access Control Protocol for Multi-Event IoT Sensor Networks. 1-7 - Ilyas Tammouch

, Abdelamine Elouafi
, Ibtissam Essadik
:
Betting on Machine Learning: Extracting Patterns from Football's Anarchic Odds. 1-7 - Karim Azhoum

, Mohamed Missouri, Mohamed Ech-Chad
:
On the Δ-Finite Operators and their Applications. 1-6 - Lamya Benaddi, Charaf Ouaddi

, Adnane Souha, Abdeslam Jakimi, Brahim Ouchao:
Code Generation Templates for Accelerating Chatbot Development in Smart Tourism. 1-5 - Yuncan Zhu, Meiling Li, Faissal El Bouanani, Yubin Zhao:

IRS-Assisted Collaborative Tracking for ISAC in Vehicular Networks. 1-6 - Mohammed El Amrani, Larbi Zraoula, Bouazza El Wahbi:

Unbounded Order-Order Continuous Operators. 1-5 - Talal Alqahtani, Shuja Ansari, Yusuf A. Sambo

, Muhammad Ali Imran:
Blockchain Based Decentralized Spectrum Trading Using Smart Contracts. 1-5 - Ouba Issam, Larbi Zraoula, Bouazza El Wahbi:

Some Results About The Class Of Order Weakly Demicompact Operators On Banach Lattices. 1-6 - Youssef Oubaydallah, Khalil Ibrahimi, Youness Larabi

:
Crowdsourcing: Modeling Techniques and Comprehensive Studies. 1-7 - Abdul Saboor

, Evgenii Vinogradov, Zhuangzhuang Cui, Sander Coene, Wout Joseph, Sofie Pollin:
Elevating the Future of Mobility: UAV-enabled Intelligent Transportation Systems. 1-7 - Iness Hassani Idrissi, Mohammed Jouhari, Hafsa Benaddi, Anas Motii

, Khalil Ibrahimi:
Deep Learning-Based Traffic Banner Recognition for Enhanced Road Safety in Autonomous Vehicles. 1-6 - Adil Driouich, Larbi Zraoula, Bouazza El Wahbi:

On the Class of Absolutely Weakly Compact Operators. 1-6 - Yongtao Wei, Farid Naït-Abdesselam, Siqi Wang, Aziz Benlarbi-Delaï:

A Comparative Study of Supervised Learning Algorithms for Spiking Neural Networks. 1-6 - Mohamed Aghroud, Yassin Elgountery, Mohamed Oualla

, Lahcen El Bermi, Abdelalim Sadiq:
Comparative Analysis of Blockchain Platforms for Adapting Proof of Authentication in IoT. 1-7 - Abderrahim Kaabouch, Mohammed Bouhassane, Abdelalim Sadiq, Oussama Aziz, Mohamed Oualla

:
A Comparative Analysis of Apache Cloud Projects for Data Storage. 1-9 - Ali Abou El Qassime

, Hasna Nhaila, Lhoussain Bahatti:
Chaos-Based Encryption: Performance Metrics for Secure Multimedia Communication and Comparative Analysis. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














