


default search action
10th WINCOM 2023: Istanbul, Turkiye
- Khalil Ibrahimi, Mohamed El-Kamili, Abdellatif Kobbane, Ibraheem Shayea:

10th International Conference on Wireless Networks and Mobile Communications, WINCOM 2023, Istanbul, Turkey, October 26-28, 2023. IEEE 2023, ISBN 979-8-3503-2967-4 - Haleema Sadia

, Hafsa Iqbal
, Ridha Alaa Ahmed:
MIMO-NOMA with OSTBC for B5G Cellular Networks with Enhanced Quality of Service. 1-6 - Maggie Shammaa, Maggie Mashaly, Ahmed El-Mahdy:

Power Optimization for Joint Large Intelligent Surface - Amplify-and-Forward Relay in Full-duplex Communications. 1-7 - Oumaima Chentoufi, Ilyas Alloug, Khalid Chougdali:

An Approach for intrusion detection using machine learning algorithms. 1-6 - Abdelkabir Rouagubi, Khalid Chougdali:

Internet of Things Systems Security Based on the Physical Objects: An overview. 1-6 - Tafsir-Moussa Sakho

, Jalel Ben-Othman
:
FedVANET-TP: Federated Trajectory Prediction Model for VANETs. 1-6 - Adilzhan Slyamkhanov, Zhanybek Bozbayev, Ayym Alzhanova, Artur Pan, Temirlan Ramazan, Leila Rzayeva:

Usage of Machine Learning in DDOS Attack Detection. 1-6 - Loukmane Maada

, Khalid Al Fararni, Badraddine Aghoutane, Yousef Farhaoui, Mohammed Fattah:
Sentiment Analysis: Machine Learning approaches comparison. 1-6 - Francisco Javier Díaz, Ali Ahmad, Sandra Viciano-Tudela, Sandra Sendra, Jaime Lloret:

Wireless Sensor Network for Water Salinization Monitoring in Irrigation of Vertical Farming. 1-6 - Abdelmounaime Bikir, Otmane Idrissi, Khalifa Mansouri, Mohammed Qbadou:

Towards strengthening the efficiency of the Air Traffic Departure Manager DMAN using a Genetic Algorithm. 1-6 - Zahra Ali, Abdul Ahad, Ibraheem Shayea

, Ivan Miguel Pires:
Improving Accuracy in Cloud Service Provider Ranking: Integrating TOPSIS with CAIQ-based QoS Assessment. 1-6 - Latif U. Khan, Mohsen Guizani:

Socially-Aware Green Distributed Metaverse for Wireless Systems. 1-6 - Mohammad Fayed, Amaan Zubairi

, Nidal Nasser
, Asmaa Ali, Meryeme Ayache:
Ensuring Authenticity and Sustainability in Perfume Production: A Blockchain Solution for the Fragrance Supply Chain. 1-6 - Loubna Mazgouti, Najiba El Amrani El Idrissi:

Comparative analysis of the performance of four learning models for predicting blood glucose levels in type 1 diabetic patients based on blood glucose measurements. 1-7 - Abdou Mohamed Naira

, Imade Benelallam:
Evaluating ESG Impacts in African Cities through Topic-Level Sentiment Analysis. 1-6 - Zhenhua Zhang, Siyue Sun, Gaosai Liu, Xinglong Jiang, Jinpei Yu, Guang Liang, Shuai Han:

A New All-Optical Switching Satellite Network Architecture based on Optimized Wavelength-Mapping. 1-5 - Archi Taha

, Mohammed Benattou:
A robust intrusion detection model based on a combination of PCA-GM and trunced LDA. 1-6 - D. Sugumar

, Suriya K. S., Anto Michael Suraj T., Alphonse Vimal Jose J., K. Kavitha:
Seizure Detection using Machine Learning and Monitoring through IoT Devices. 1-6 - Chaymae Ziani, Abdelalim Sadiq, Khalid Housni:

Enhanced SH-CNN: Gender Prediction Based on Convolutional Neural Network. 1-5 - Hamza Reguieg

, Mohammed El Hanjri
, Mohamed El-Kamili, Abdellatif Kobbane:
A Comparative Evaluation of FedAvg and Per-FedAvg Algorithms for Dirichlet Distributed Heterogeneous Data. 1-6 - Ridha Alaa Ahmed, Haleema Sadia

:
Cooperative Non-Orthogonal Multiple Access for B5G Wireless Networks: Modeling and Simulations. 1-6 - Waheeb Tashan

, Ibraheem Shayea
, Sultan Aldirmaz Çolak, Ayman A. El-Saleh:
Voronoi-Based Handover Self-Optimization Technique For Handover Ping-Pong Reduction in 5G Networks. 1-6 - Radi Khaoula, Moughit Mohamed

:
K-means-dist: A Novel Approach for Enhanced Cybersecurity Clustering Using Combined Distance Metrics. 1-6 - Asma Ali Hussein Budalal

:
Analysis of Rain Interference on Short-Range Millimetre-Wave Terrestrial Links. 1-7 - Khadija Hicham, Sara Laghmati, Amal Tmiri:

3D CT Scans for Colorectal Cancer Classification using VGG16 and Data Augmentation. 1-4 - Alberto Ivars-Palomares

, Miguel Zaragoza-Esquerdo, Sandra Sendra, Jaime Lloret:
Design of a Platform for Data Storage and Data Management in IoT Networks. 1-6 - Sara Halim, Bouchaib Bounabat:

Conception of a Digital Government Maturity Model for Developing Countries. Application to Uruguay. 1-6 - Hajar Ouhmidou

, Abdellah Nabou
, Abdelouafi Ikidid, Wafa Bouassaba, Mohammed Ouzzif, Moulay Ahmed El Kiram:
Traffic Control, Congestion Management and Smart Parking through VANET, ML, and IoT: A Review. 1-6 - Ouroui Ayoub, Youssef Fakhri

, Siham Boulaknadel, Mohamed Amnai
:
Automatic classification of emails using Deep Learning. 1-6 - Aouatif Arqane, Omar Boutkhoum, Hakima Chouati, Abdelmajid El Moutaouakkil:

An optimized neural network-based IDS against DDoS attacks. 1-6 - Mohamed Darqaoui, Moussa Coulibaly, Ahmed Errami

:
Smart Parking System Approaches and Positioning Technologies: A Survey. 1-8 - Carlos Gonzalez, Salim Mahamat Charfadine:

SDN Controllers and ML-Based Anomaly Detection in Embedded Systems: A Comparative Analysis. 1-6 - Kutluhan Taylan Iren, Tolga Girici:

A Simple Cascade Channel Estimation Method for UAV RIS-Enabled Millimeter Wave Transmissions. 1-6 - Mohamed M'Haouach, Mouad Choukhairi, Khalid Fardousse:

Benchmarking Client Selection Methods in Non-IID Federated Learning Scenarios. 1-7 - Mounir El Mejjatti

, Ahmed Habbani:
Novel Soil Impact Prediction Model on Bandwidth. 1-6 - Lida Kouhalvandi, Mohammad Alibakhshikenari, Ladislau Matekovits

, Ibraheem Shayea
, Serdar Özoguz:
Future Communication Systems: Toward the Intelligent-based Optimization Approaches. 1-6 - Soule Issa Loutfi

, Ufuk Tureli
, Ibraheem Shayea
:
Augmented Reality with Mobility Awareness in Mobile Edge Computing over 6G Network: A Survey. 1-6 - Ilham Salhane, Mounir Rifi, Hanae Terchoune, Soumaya Elmorabeti:

A Novel Wearable Circular Polarized Antenna Design for Wireless Power Transfer Systems in E-Health Applications. 1-5 - Mehmet Izzet Saglam:

Conditional Handover for Non-Terrestrial Networks. 1-5 - Youssef Oubaydallah, Khalil Ibrahimi, Rachid El Azouzi:

Recent Advances in Data Intensive Applications: Survey. 1-6 - Yasser Elouargui, Mahmoud Zyate, Abdellatif Sassioui, Meriyem Chergui, Mohamed El-Kamili, Mohammed Ouzzif:

A Comprehensive Survey On Efficient Transformers. 1-6 - Abdelhadi Rachad, Lotfi Gaiz, Khalid Bouragba, Mohammed Ouzzif:

Predictive Maintenance-as-a-Service (PdMaaS) in Industry 4.0 using Blockchain. 1-6 - Abdelkrim Saouabe

, Merouane Mazar
, Said Tkatek, Imad Mourtaji:
Evolution of Image Captioning Models: An Overview. 1-5 - Ayoub El-Alami, Younes Nadir

, Lahcen Amhaimar, Khalifa Mansouri:
An efficient hybrid approach for vehicle detection and tracking. 1-8 - Mohamed Zelmati, Zakariae Oulqaid

, Abdelmajid Elouadi:
Real-time Tracking of Auditing Process Progress with a Customizable Application for Cybersecurity Standards Compliance: A Case Study on ISO 27001 and TISAX. 1-7 - Salma Aboelmagd, Elmehdi Illi, Marwa K. Qaraqe:

Reconfigurable Intelligent Surfaces-aided Transmissions in a SIMO Network: A Secrecy Analysis. 1-6 - Idriss Moumen

, Jaafar Abouchabaka, Najat Rafalia:
Enhanced Traffic Management Through Data Mining: Predictive Models for Congestion Reduction. 1-6 - Meisam Abdollahi, Ramin Sabzalizadeh, Samaneh Javadinia, Sepideh Mashhadi, Sara Sanati Mehrizi, Amirali Baniasadi:

Automatic Modulation Classification for NLOS 5G Signals with Deep Learning Approaches. 1-6 - Marriam Sikander, Faran Awais Butt, Jawwad Nasar Chattha, Ijaz Haider Naqvi:

Improving Wireless Communication through Beamwidth Optimization in Reconfigurable Intelligent Surfaces. 1-5 - Asmae Briouya, Hasnae Briouya, Ali Choukri, Mohamed Amnai

, Youssef Fakhri
:
Exploration of Question-Answering Systems: Survey. 1-6 - Samira Lafraxo, Mohamed El Ansari, Lahcen Koutti

:
GastroSegNet: Polyp Segmentation using Colonoscopic Images Based on AttentionU-net Architecture. 1-6 - Hawraa Makki Razaq, Wasan Kadhim Saad:

Review of Free Space Optical Communication: Advantages and Disadvantages. 1-5 - Ayoub Jibouni

, Dounia Lotfi
, Ahmed Drissi El Maliani:
Link prediction in weighted complex networks using machine learning methods and similarity metrics. 1-6 - Hamza Alami, Meryem Janati Idrissi

, Abdelkader El Mahdaouy, Abdelhak Bouayad, Zakaria Yartaoui, Ismail Berrada:
Investigating Domain Adaptation for Network Intrusion Detection. 1-7 - Mohammed El Moudni

, Elhoussine Ziyati:
Data Leakage Prevention Approach Based On Insider Trust Calculation. 1-6 - Bouchra Rguig, Brahim Es-Sousy

, Said Ouhmi
, Khalid Housni:
IoT Security Based on Smart Contracts: Classification of Algorithms, Complexity, Robustness and Fields of Application. 1-8 - Fatima Chahal, Hacène Fouchal, Dominique Gaïti:

Preserving User Privacy and Empowering Control in Proximity Marketing. 1-6 - Md Imran Hossain, Murat Tahtali, Ugur Turhan

:
Performance Analysis of Private Blockchain in Mobile Ad-hoc Networks (MANETs). 1-6 - Kamal Elhattab

, Karim Abouelmehdi
, Said Elatar:
New Model to Monitor Plant Growth Remotely using ESP32-CAM and Mobile Application. 1-6 - Othmane Cherqi, Anass Sebbar, Khalid Chougdali, Mohammed Boulmalf, Houda Benbrahim:

Evaluating Wi-Fi Security Through Wardriving: A Test-Case Analysis. 1-7 - M. S. Gayathree, Sreelakshmi Manjunath:

Towards reliability analysis of IEEE 802.11p MAC for platooning in a heterogeneous traffic setup. 1-7 - Edgard Ndassimba, Yvan Paillard Kalia-Sya Dodoagnen, Eugene Baba Sire Zabolo, Gervais Mendy, Samuel Ouya:

Proposal to set up a private 5G network to improve the quality of education: case of the University of Bangui. 1-6 - Yassine Oukdach, Zakaria Kerkaou, Mohamed El Ansari, Lahcen Koutti

, Ahmed Fouad El Ouafdi:
ConV-ViT: Feature Fusion-based Detection of Gastrointestinal Abnormalities using CNN and ViT in WCE Images. 1-6 - Fatma Aktas, Ibraheem Shayea

, Mustafa Ergen, Ayman A. El-Saleh:
AI-Enabled Routing in Next-Gen Networks: A Brief Overview. 1-6 - Amina A. Mohamednour, Maitha R. Alzaabi, Aisha Alnuaimi, Hanane Lamaazi, Mohamed Adel Serhani:

Slinker: A Safe Linker For An Efficient Data Encryption. 1-6 - Yasmina El Khalfaoui, Brahim Alibouch, Ahmed Fouad El Ouafdi:

Combining Deep CNNs and Superpixels for Polyp Segmentation in Colonoscopy Images. 1-6 - Youssef Frist, Mourad Elhabchi, Mohamed Nabil Srifi:

A Novel Frequency Reconfigurable Antenna Based on Metamaterial for Millimeter-Wave 5G Applications. 1-5 - Ayoub Seck, Eugene Baba Sire Zabolo, Constantin S. E. Bassene, Ndèye Coumba Sene, Samuel Ouya:

BOPIS-Software: A Python based Software application for SDN East-West inter Autonomous System communication and Programmable Network Monitoring tool. 1-6 - Emre Kizilay, Cemanur Aydinalp, Mehmet Nuri Akinci:

Analysis of Walnut Freshness: Preliminary Study. 1-4 - Jalel Ben-Othman

, Lynda Mokdad:
Analytical Study for Vehicle Mobility Modeling. 1-6 - Houda El Mohamadi

, Mohammed El Hassouni:
Enhanced Deep Learning Explainability for COVID-19 Diagnosis from Chest X-ray Images by Fusing Texture and Shape Features. 1-6 - Hiba El Fadili, Tomader Mazri:

Security and Privacy Issues of Implantable Pacemakers. 1-4 - Mouad Choukhairi, Mohamed M'Haouach, Youssef Fakhri

, Mohamed Amnai
:
Tree-Driven Intelligent Security System for Intrusion Detection in IoT environment. 1-7 - Christos Bouras, Damianos Diasakos, Apostolos Gkamas

, Vasileios Kokkinos
, Philippos Pouyioutas, Nikolaos Prodromos:
Evaluation of User Allocation Techniques in Massive MIMO 5G Networks. 1-6 - Mojtaba Mahdavi:

Fully Parallel and Reconfigurable Realization of DFT/IDFT using In-Memory Computing. 1-8 - Senthil Kumaran Devarajalu, Deepak Jose:

Performance Evaluation of OTFS Under Different Channel Conditions for LEO Satellite Downlink. 1-6 - Abdulaziz Aborujilah, Abdulaziz Alashbi, Ibraheem Shayea

, Abdul Hakim H. M. Mohamed
, Abdulraqeb Alhammadi
, Ayman A. El-Saleh, Abdul Ahad:
IoT Integration in Agriculture: Advantages, Challenges, and Future Perspectives: Short survey. 1-7 - Aki Nagano

:
Institutional Values and CDR for Green ITC: Transforming E-waste to Ethical Gems. 1-6 - Dana Turlykozhayeva

, Sayat Akhtanov, Nurzhan Ussipov, Almat Akhmetali
, Aslan Bolysbay
, Yerkin Shabdan:
Routing Algorithm for Software Defined Network Based on Boxcovering Algorithm. 1-5 - Omayma Amezian

, Soufiane Hajbi
, Younes Chihab:
Towards a large Biscript Moroccan Lexicon. 1-6 - Marouane Zaizoune, Youssef Fakhri

, Siham Boulaknadel:
Automatic emails classification. 1-4 - Ibrahim Yazici, Emre Gures:

A Robust Machine Learning Approach for Path Loss Prediction in 5G Networks with Nested Cross Validation. 1-6 - Ouidad Saber

, Tomader Mazri:
In-Vehicle Intrusion Detection based on Machine Learning. 1-6 - Dauha Elamrani Abou Elassad, Zouhair Elamrani Abou Elassad, Othmane El Meslouhi

, Mohamed Ameksa, Hajar Mousannif, El Houssine El Mazoudi:
A non-intrusive multivariate analysis for monitoring inattentive driving based on physiological signals, driver inputs and visual features: A hybrid deep learning approach. 1-7 - Asmae Bentaleb, Houda Belaabed, Jaafar Abouchabaka:

New Approach for DDoS Attacks Detection: ConvXGB. 1-6 - Nada Bendahman, Dounia Lotfi

:
A Novel Centrality based Measure for Influential Nodes Detection in Social Networks. 1-7 - Mehdi Attioui

, Mohamed Lahby:
Deep Learning-Based Congestion Forecasting: A Literature Review and Future. 1-8 - Richard Verhoeven, Bram van Berlo

, Nirvana Meratnia:
Exception Analysis of Running Complex and Computation-intensive Deep Learning Models. 1-7 - Souad Labghough

, Fouad Ayoub, Faissal El Bouanani, Mostafa Belkasmi, Khalid A. Qaraqe
:
Performance Analysis of Coded CSOC-Assisted Energy Harvesting AF Dual-hop RF/FSO System. 1-6 - Chaymae El Mechal, Najiba El Amrani El Idrissi:

Two-Stream nnU-Net: A Novel Architecture for Precise Tumor Segmentation in Medical Imaging. 1-6 - Noor Ahmed:

On The Practicality of Blockchain-based Security and Privacy for Next Generation SDN. 1-6 - Hacène Fouchal, Timothé Kruk, Cyril Rabat

:
A Distributed Scheme for Optimal Road Intersection Management. 1-5 - Fatima Zahrae Ait Hamou Aadi

, Abdelalim Sadiq, Zakia Labd:
Comparing Object Tracking Algorithms for Real-Time Applications: Performance Analysis and Implementation Study. 1-5 - Mohamed Amine Madani, Abdelmounaim Kerkri

:
Access Control for Collaboration in Cloud Environment: A Comparative Analysis. 1-7 - Hasan Sattar Mohsin, Wasan Kadhim Saad, Ibraheem Shayea

:
Literature Review of Handover Decision Algorithms in 5G Networks. 1-6 - Abdessamad Essaidi

, Mostafa Bellafkih
, Kandoussi el Mehdi:
Proposed Sentiment Analysis of COVID-19 Tweets using Machine Learning Algorithm. 1-6 - Mohamed Ossama ElShafei

, Maggie Shammaa, Engy Aly Maher, Minar El-Aasser:
Evaluating Lora's Transmission Range and Reliability for Connected Vehicles. 1-6 - Saba Tariq

, Waleed Tariq Sethi, Arbab Abdur Rahim:
High Gain Dual-band Compact Antenna Array for Millimeter Wave Applications. 1-6 - Maggie Shammaa, Maggie Mashaly, Ahmed El-Mahdy:

Power Allocation for Joint Large Intelligent Surfaces Decode-And-Forward Relay in Full-Duplex Communications - A Deep Learning Approach. 1-6 - Zhour Rachidi, Khalid Chougdali, Abdellatif Kobbane:

Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithms. 1-5 - Lida Kouhalvandi, Sercan Aygun, Ladislau Matekovits

, Farshad Miramirkhani:
Optimizing Indoor Localization Accuracy with Neural Network Performance Metrics and Software-Defined IEEE 802.11az Wi-Fi Set-Up. 1-4 - Ismail Elbouknify, Afaf Bouhoute, Khalid Fardousse, Ismail Berrada, Abdelmajid Badri:

CT-xCOV: a CT-scan based Explainable Framework for COVid-19 diagnosis. 1-8 - Ibrahim Bouabdallaoui, Fatima Guerouate, Mohammed Sbihi:

Assessing Topic Modeling in Online Forums: A Comparative Study of Hierarchical and Centroid-Based Clustering Algorithms. 1-7 - Meryem Janati Idrissi

, Hamza Alami, Abdelhak Bouayad, Ismail Berrada:
NF-NIDS: Normalizing Flows for Network Intrusion Detection Systems. 1-7 - Hajar Bnouachir, Meriyem Chergui, Hicham Medromi:

Intelligent Systems Engineering in Open Pit Mines: Intelligent Systems for Mining Fleet Management. 1-6 - Fahmi Fadhl Al-Hosaini

, Naif Mohammed Al-Hada
, Mustfa M. A. Mudhish, Abdullah Mahfoud Baadhem, Abdulwadod S. A. Hassan, Ali S. A. Maaodhah, Majid Al-Nabae:
The Influence of Spirituality Perspective on Internal Business Process in Private Universities. 1-6 - Abdellatif Sassioui, Rachid Benouini, Yasser El Ouargui, Mohamed El-Kamili, Meriyem Chergui, Mohammed Ouzzif:

Visually-Rich Document Understanding: Concepts, Taxonomy and Challenges. 1-7 - Salah El Hajla

, Ennaji Mahfoud, Yassine Maleh
, Soufyane Mounir
:
Attack and anomaly detection in IoT Networks using machine learning approaches. 1-7 - Hawraa Makki Razaq, Wasan Kadhim Saad:

Performance Analysis of NG-PON2 with DWDM-FSO System with Eight Wavelengths and 80Gbps Data Rate. 1-6 - Mohamed Ridani, Mohamed Amnai, Ali Choukri, Youssef Fakhri

, Noreddine Gherabi
:
Indexation techniques in decision support systems: Study and Evaluation. 1-7 - Haleema Sadia

, Ziaul Haq Abbas, Ahmad Kamal Hassan, Ghulam Abbas:
Outage Probability Analysis of Reconfigurable Intelligent Surface (RIS)-Enabled NOMA Network. 1-6 - Andrey Garnaev, Wade Trappe:

A non-zero sum game of a joint radar and communication system and a jammer. 1-6 - Gabriel Avanzi Ubiali, Taufik Abrão

, José Carlos Marinello:
User Scheduling in Multi-State Los/NLoS Crowded XL-MIMO Channels. 1-6 - Bilal Saoud, Ibraheem Shayea

:
Performance evaluation of MIMO-OFDM system in wireless network. 1-5 - Noura Bentaher, Younes Kabbadj, Mohamed Ben Salah:

Enhancing Breast Masses Detection and Segmentation: A Novel U-Net-Based Approach. 1-6 - Mohamed Janati Idrissi

, Salah Eddine Essalhi, Mohammed Raiss El-Fenni:
Intelligent Hypervisor Placement for VSDN: Adapting to Fluctuating Traffic Scenarios. 1-6 - Adil Maralbayev, Gabdu-Samad Omar, Meruyert Abdulayeva, Leila Rzayeva, Gaukhar Kalybek, Erasyl Rakhym:

New Algorithm of Weak Password Detection. 1-6 - Hatim Lakhdar, Fatna Elmendili

, Younes El Bouzekri El Idrissi:
Blockchain-based spam detection approach. 1-7 - Ahmet Caner Gül, Mehmet Nuri Akinci, Semih Dogu:

Millimeter-Wave Channel Modeling In Rural Areas. 1-4 - Omer Gulec, Emre Sahin:

Maximizing Nano-Sensor Node Coverage using BWO in WNSNs. 1-6 - H. Hakan Kilinc, Faruk Kaledibi:

Audio Deepfake Detection by using Machine and Deep Learning. 1-5 - Karima Bouyahia, Mahfoud Benchaïba, Haroun Benkaouha:

Enhancing Connectivity Repairing in wireless sensor networks with Void Regions. 1-6 - Ibrahim Yazici, Emre Gures:

A Novel Approach for Machine Learning-based Load Balancing in High-speed Train System using Nested Cross Validation. 1-6 - Mehdi Ait Lhouss, Rachid Bouhouch, Omar Boudhar, Fouad Safiri, Kalid Nafil, Mohammed El Koutbi:

Traffic Monitoring Using IoT And Lambda Architecture. 1-7 - Abdulkadir Dauda

, Olivier Flauzac, Florent Nolot:
IoT: A Universal Dynamic Gateway. 1-6 - Mohammed El Moudni

, Elhoussine Ziyati:
A Multi-Cloud and Zero-Trust based Approach for Secure and Redundant Data Storage. 1-6 - Mamma Ahizoune, Tomader Mazri, Omar Mouhib

:
Handover for 5G mobile network. 1-6 - Archi Taha

, Mohammed Benattou:
An Automatic Truncated Mean Approach for PCA In Intrusion Detection Systems. 1-6 - Assiya Sarinova, Leila Rzayeva, Noyan Tendikov, Ibraheem Shayea

:
Simple Implementation of Terrain Classification Models via Fully Convolutional Neural Networks. 1-6 - Kalid Nafil, Aziza Saufi, Ouafae Hdili, Sara Faqihi, Halima Maghraoui, Abdellatif Kobbane, Mohammed El Koutbi:

Lettuce Leaf Disease Protection and Detection Using Image Processing Technique. 1-6 - Hina Ayaz, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Waqas:

Secrecy Capacity Analysis with Imperfect Channel State Information and Varying Interference for 6G C-V2X Communication. 1-6 - Laasri Nadia

, Dounia Lotfi
, Ahmed Drissi El Maliani:
Enhancing Vaccination Strategy Effectiveness in Epidemic Networks: Exploring a New Centrality Measure and Community Detection Methods. 1-6 - Rajae Tamri

, Jilali Antari, Radouane Iqdour:
An enhanced IoT architecture for healthcare using secure Software-Defined Fog gateway. 1-4 - Habiba Hadri, Mourad Ouadou, Khalid Minaoui

:
A LightGBM-Based Approach to improve Sybil Attack Detection in VANET networks. 1-6 - Saba Tariq

, Waleed Tariq Sethi, Arbab Abdur Rahim:
A Miniaturized Slotted Patch Antenna for 5G Millimeter Wave Applications. 1-5 - Kamal Souali, Manal Souali, Mohammed Ouzzif:

An RFID-Based Traceability Approach to Improve the Overall Health Status Management in Morocco. 1-6 - Abdelhadi Ennajih

, Azzeddine Sardi
, Mohamed Sadik, Jamal Zbitou:
Design and Analysis of Intelligent Reflecting Surface for 5G Applications. 1-5 - Christophe Maudoux, Selma Boumerdassi:

Unsupervised Anomaly Knowledge Flow: a Digital Signatures Extraction Approach. 1-6 - Bahaa Eddine Elbaghazaoui, Mohamed Amnai

, Youssef Fakhri
, Ali Choukri, Noreddine Gherabi
:
Profiling Language Sign Using Deep Learning. 1-6 - Shahid Anwar, Abdul Ahad, Mudassar Hussain, Ibraheem Shayea

, Ivan Miguel Pires:
Ransomware Detection and Classification using Ensemble Learning: A Random Forest Tree Approach. 1-6 - Fatima Lakrami, Mohamed El-Kamili, Najib Elkamoun, Hind Sounni

, Ouidad Labouidya:
A secure based trust model for Optimized Link State Routing protocol (OLSR). 1-5 - Mahmoud El Hamlaoui, Mohamed Amine Lahsaini, Sara Helmy Moselhy, Tarik Fissaa, Youness Laghouaouta:

Basketball Free Throw Analysis using Object Detection Techniques. 1-6 - Fatima Ghazi, Aziza Benkuider

, Mohamed Zraidi
, Fouad Ayoub, Khalil Ibrahimi:
Neighborhood Feature Extraction and Haralick Attributes for Medical Image Analysis: Application to Breast Cancer Mammography Image. 1-6 - Sepideh Mashhadi, Abolfazl Diyanat, Meisam Abdollahi, Amirali Baniasadi:

DSP: A Deep Neural Network Approach for Serving Cell Positioning in Mobile Networks. 1-6 - Ilyes Ahmim

, Nacira Ghoualmi-Zine, Feriel Bouakkaz
, Abderrezak Rachedi:
Enhancement of a User Authentication Scheme for Big Data Collection in IoT-Based Intelligent Transportation System. 1-6 - Mohamed Gouhail, El Houssin El Mazoudi, Issam Salhi, Saïd Doubabi:

Fuzzy Logic Control of Four-Phase Interleaved Boost Converter for PEM Fuel Cell. 1-6 - Abdelilah Serhane

, El-Mehdi Hamzaoui, Khalil Ibrahimi:
IA Applied to IIoT Intrusion Detection: An Overview. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














