


default search action
11th WINCOM 2024: Leeds, UK
- Syed Ali Raza Zaidi, Khalil Ibrahimi, Mohamed El-Kamili, Abdellatif Kobbane:

11th International Conference on Wireless Networks and Mobile Communications, WINCOM 2024, Leeds, United Kingdom, July 23-25, 2024. IEEE 2024, ISBN 979-8-3503-7786-6 - Haleema Sadia

, Hafsa Iqbal
, Sana Qadir:
Physical Layer Security in Intelligent Reflecting Surface-Enabled Small NOMA IoT Network. 1-6 - Fatima-Zahra Guerss

, Khalil Ibrahimi:
Fencing Sport Strategy Using Game Theory. 1-6 - Idriss Moumen

, Najat Rafalia, Jaafar Abouchabaka:
A Machine Learning Approach to Residential Energy Prediction Using Large-Scale Datasets in MongoDB. 1-6 - Fatima Abouzid, Hicham Ghennioui, Alami Hassani Aicha:

Benchmarking of Detection and Classification Methods for Traffic Sign Recognition: Application on Moroccan Context. 1-6 - Shaymaa Ammar Kashmoola

, Ali Othman Al Janaby:
Integrating Sensing and Communication-Based Target Detection and Speed Estimation for Beyond-Generation Networks. 1-6 - Rachid Mafamane, Mourad Ouadou, Khalid Minaoui

:
Hybrid Anti-Collision Protocol for RFID-IoT Networks Based on Artificial Immune and Neural Networks. 1-6 - Riya Deshpande

, Faheem Ahmad Khan, Qasim Zeeshan Ahmed
:
Support Vector Machine Based Spectrum Sensing in Beyond 5G Wireless Networks. 1-5 - Samira Lafraxo, Mohamed El Ansari, Lahcen Koutti, Zakaria Kerkaou, Meryem Souaidi:

AttDenseUnet : Segmentation of Polyps from Colonoscopic Images Based on Attention-DenseNet-Unet Architecture. 1-6 - Rungrat Viratikul, Kamol Boonlom, Ian D. Robertson, Timothy J. Amsdon

, Panuwat Janpugdee, Nutapong Somjit
:
Design and Evaluation of Optical Wireless Communication Systems for Underwater IoT Applications. 1-6 - Yasir Saleem

, Nathalie Mitton, Valeria Loscrì:
Analysis of Common Required Metrics for Vehicular Networks. 1-6 - Radi Khaoula, Moughit Imane, Moughit Mohamed:

Improving Cyber Defense with DNS Query Clustering Analysis. 1-6 - Noor Ahmed, Matthew Paulini, Alex Andrekanic:

UAV Sub-Networking via Geo-Hashing. 1-6 - Karamot Kehinde Biliaminu, Sherif Adeshina Busari

, Joaquim Bastos, Jonathan Rodriguez:
Impacts of Dataset and Codebook Sizes on ML-Driven Beam Prediction for mmWave V2I Communication. 1-6 - Mohammed M. H. Qazzaz, Syed Ali Raza Zaidi, Desmond C. McLernon, Abdelaziz Salama, Aubida A. Al-Hameed

:
Optimizing Search and Rescue UAV Connectivity in Challenging Terrain Through Multi Q-Learning. 1-8 - Abdelmajid Bessate, Youssef Miftah, Faissal El Bouanani, Hussain Ben-Azza:

Effective Capacity of MIMO-STBC Subject to Fading Channels: Tractable and Accurate Analysis. 1-6 - Youssef Regragui, Abdellah Mazighi, Lahoucine Ballihi, Ghizlane Orhanou:

Impact Evaluation of Feature Selection Algorithms on Machine Learning-Based Intrusion Detection. 1-6 - Fatehi Altalqi

, Sara Fennane
, Houda Kacimi
, Hamza Mabchour, Adil Echchelh:
Development of a Multi-Band High Bandwidth Circular Microstrip Patch Antenna for Radar Implementations. 1-5 - Fatima Cheddi, Ahmed Habbani, Hammadi Nait-Charif:

A Multi-Modal Feature Fusion-Based Approach for Chest X-Ray Report Generation. 1-7 - Assiya Akli

, Khalid Chougdali
:
A Survey on IOTA Based Technology for Enhanced IoT Security. 1-6 - Khadija Marzagui, Abdelkaher Ait Abdelouahad, Abdellatif Dahmouni, Ahmed Drissi El Maliani:

A Review on Image Quality Assessment for Air Quality Index Estimation. 1-6 - Bisma Amjad, Qasim Zeeshan Ahmed

, Faheem Ahmad Khan, Zaharias D. Zaharis, Pavlos I. Lazaridis:
Target Localization from mm-Wave Point Clouds Using Deep Learning Based Classifiers. 1-5 - Ahmed Shuhaiber, Ibrahim Mashal:

A Multi-Layered Trust Model in the Internet of Things Smart Home Ecosystem. 1-7 - Issam Trrad, Huthaifa A. Obeidat, Muhammad Ali Malik, Ali M. Hayajneh, Issa T. E. Elfergani, Omar Obeidat, Raed Abd-Alhameed:

A Simulation Approach to Indoor Channel Design for 5G Networks at 39 GHz. 1-6 - Abdulaziz Alatawi, Hamid R. Sadjadpour, Zouheir Rezki, Mohammad Moltafet, Abdelrahman Elfikky:

Adaptive Deep Neural Network for Non-Stationary Wireless Channels. 1-6 - Ayush Verma

, Tanuj Chandela
, Geetanjali Rathee, Abhinav Tomar:
A Multilayered Trusted and Secure Surveillance with Frame Encoding, ML, and Hashgraph. 1-6 - Yassine Ben-Aboud, Abdellatif Kobbane:

Towards a Modular Digital Twin Framework for Energy-Optimized IoT Sensor Devices. 1-7 - Rehab Alawadh, Poonam Yadav, Hamed Ahmadi:

HIFFR: Hybrid Intelligent Fast Failure Recovery Framework for Enhanced Resilience in Software Defined Networks. 1-7 - Yousra Fadili, Yassine El Yamani

, Jihad Kilani, Najib El Kamoun, Youssef Baddi, Faycal Bensalah:
An Enhancing Timeseries Anomaly Detection Using LSTM and Bi-LSTM Architectures. 1-6 - Abdelmounaime Bikir, Otmane Idrissi, Khalifa Mansouri, Mohammed Qbadou:

The Impact Of Aircraft Performance Variety In A Departure Sequence Prior to Takeoff Operations Following A Standard Instrument Departure Route. 1-6 - Tao Xu, John S. Thompson, Wasiu O. Popoola:

Design of Rydberg Sensor Arrays for Radio Frequency Sensing. 1-6 - Yasmin Derraz, Redouan Korchiyne, Abderrahmane Laraqui, Mehdi Benassila, Mouad Ergouyeg

, Hicham Cherrab
, Zakaria Benzyane, Meriem Sbai, Zineb Squalli Houssaini:
Machine Learning in Breast Cancer Diagnosis: A Comprehensive Analysis and Prediction Methodology. 1-6 - Mohamed Mamad, Ouissal Chichi

:
Towards a Human-Centred Artificial Intelligence in the Age of Industry 5.0: A Cross-Country Analysis. 1-6 - M'barek Iaousse, Mohamed El-Kamili, Amal Hmimou, Youness Jouilil:

Contributions to Meteorological Forecasting: A Comparative Study of Machine Learning-Driven Temperature Predictions at Menara Station in Morocco. 1-7 - Sanar Ahmed Shehab, A. Z. Yonis:

Design and Simulation of Fractional N-PLL 2.4 GHz for WLAN in IEEE 802.11 Standards. 1-6 - Charaf Eddine Ragba, Abdelhak Boulaalam, Insaf Bellamine:

Survey on the Segmentation of Brain Tumors Using Deep Learning Techniques. 1-6 - Jinfeng Li

, Haorong Li
:
Navigating Aspect Ratio Effects in Response Time Challenges of Liquid Crystal Coaxial Phase Shifters for Next-Generation mmW Communications. 1-5 - Abdelaali Kemmou

, Adil El Makrani
, Ikram Elazmi, Fouad Lehlou, Moulay Hafid Aabidi:
Improved Facial Expression Recognition Through Occluded Optical Flow Reconstruction Using Deep Convolutional Generative Adversarial Network. 1-7 - Ziad Akiirne

, Abbes Benkirane, Driss Bouzidi:
A Comparative Study of Authentication Protocols in DGC-Based Smart Lock Systems. 1-6 - Latifa Oufkir, Asma El Hamzaoui:

EHR Data Persistence for a Nationwide Shared Medical Record: An Overview. 1-9 - Khalil Ibrahimi

, Mohammed Jouhari
, Zineb Jakout:
Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset. 1-6 - Jalal Eddine Bahbouhi, Saif Islam Bouderba, Abdelali Elkouay, Najem Moussa:

Exploring the Impact of Group-Based Incentives on Cooperative Dynamics in Public Goods Game. 1-5 - Meriem Ouadah, Fatiha Merazka:

Securing UAV Communication: Authentication and Integrity. 1-7 - Sher Nawaz, Waleed Tariq Sethi:

Broadband Planar Antenna with V-Slots Configuration for Sub-THz Communication. 1-6 - Reem Alhabib, Poonam Yadav:

Hyperledger Fabric Platform for Secure and Efficient Data Sharing in Autonomous Vehicles. 1-9 - Yassine El Yamani

, Yousra Fadili, Jihad Kilani, Najib El Kamoun, Youssef Baddi, Faycal Bensalah:
Hybrid Models for IoT Security: Tackling Class Imbalance. 1-6 - Maryam Et-Tolba

, Charifa Hanin, Abdelhamid Belmekki:
DL-Based XSS Attack Detection Approach Using LSTM Neural Network with Word Embeddings. 1-6 - Wiâme Bouhali, Elmostafa Belmekki

, Mostafa Bellafkih
:
Advanced Techniques for Security Incident Analysis. 1-6 - Abdulaziz Alashbi, Adzmely Mansor, Abdul Hakim H. M. Mohamed

, Ibraheem Shayea
, Ayman A. El-Saleh:
Advancing Fetal Heart Rate Monitoring: AI-Based Approach for Baseline Detection and Classification. 1-5 - Aicha Khalfaoui, Abdelmajid Badri, Ilham El Mourabit:

A Deep Learning Framwork with Attention-Guided Feature Learning for Robust Object Detection in Surveillance Systems. 1-6 - Rajaa Sliman, Ahmed Azouaoui:

Tifinagh Handwritten Character Recognition Using the Convolutional Neural Network. 1-5 - Khalid El Fayq

, Said Tkatek, Lahcen Idouglid
:
Towards Emotional Authenticity in News Presentation: A Machine Learning Approach. 1-7 - Archi Taha

, Mohammed Benattou:
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA. 1-6 - Alejandro Carnero

, Omer Waqar, Cristian Martín, Manuel Díaz:
Distributed Federated and Incremental Learning for Electric Vehicles Model Development in Kafka-ML. 1-8 - Youssef Natij

, Hajar El Karch, Ayyad Maafiri, Abdelkader Mezouari:
Evaluating the Performance of YOLO Object Detectors for Plant Disease Detection. 1-6 - Hefdhallah Sakran, Charbel Lahoud

, Shahab Ehsanfar, Klaus Moessner:
Active Eavesdropping Attacks Detection in Massive Multiple Input Multiple Output Based on Machine Learning. 1-6 - Maha Alruwail, Karim Djemame

, Li Zhang
:
Prediction of Power to Autonomous Vehicles Using Machine Learning Techniques. 1-7 - Zakariyae Bouflous

, Fadoua Haraka, Mohammed Ouzzif, Khalid Bouragba:
Enhanced Vertical Pod Auto Scaling with Decision Tree Regressor-Max in Kubernetes. 1-5 - Abdoul-Hadi Konfé, Pasteur Poda, Raphaël Le Bidan:

Low-Complexity Sliding Window Decoding of Spatially-Coupled LDPC Codes Constructed from Short 5G NR LDPC. 1-7 - Adnane Souha, Lamya Benaddi, Charaf Ouaddi

, El Mahi Bouziane, Abdeslam Jakimi:
A New Decision Support System for Enhancing Tourism Destination Management and Competitiveness. 1-6 - Youssef Natij, Ayyad Maafiri, Hajar El Karch, Yassine Himeur, Khalid Chougdali, Abdelkader Mezouari:

Plant Disease Recognition: A Comprehensive Mini Review. 1-8 - Zakaria Kerkaou, Yassine Oukdach, Mohamed El Ansari, Lahcen Koutti, Samira Lafraxo, Meryem Souaidi:

VGG16U-Net with Attention Based Semantic Segmentation of Gastrointestinal Abnormalities. 1-5 - Mohammed Jouhari, Hafsa Benaddi, Khalil Ibrahimi:

Efficient Intrusion Detection: Combining X2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset. 1-6 - Achraf Sayah

, Saïd Aqil, Bouchra Aadil, Mohamed Lahby:
Two Hybrid Heuristic Algorithms for Optimizing Data Processing Schedules in Distributed Edge Computing. 1-6 - M. R. Wali, Mirza Shujaat Ali

, Jalil Ur Rehman Kazim, Farooq A. Tahir, Muhammad Ali Imran
, Qammer H. Abbasi:
A Broadband CP Square Slot Antenna Array for Future 5G Communication Systems. 1-5 - Kalid Nafil, N. Mofid, H. Boutarkha, C. Razzouki, H. Zouai, Abdellatif Kobbane, Mohammed Elkoutbi:

Development of an IoT-Based Real-Time System for Monitoring Pedestrian Passageway Traffic Violations. 1-6 - Mohammad Tubishat, Mustafa Rawshdeh

, Shahed Obeidat
:
An Improved Golden Jackal Optimization Based on New Local Search Operator for Global Optimization: Invited Paper. 1-4 - Zaid Alkhawlani

, Khalil Ibrahimi, Mohammed Boutabia:
Intrusion Detection Systems for the Internet of Things Network: Survey on Rare Attacks. 1-6 - Ibrahim Yazici, Emrecan Özkan, Emre Gures:

Enhancing Path Loss Prediction Through Explainable Machine Learning Approach. 1-5 - Muhammed Burak Goktas

, Zhiguo Ding
:
Computation Energy Efficiency Maximization of SWIPT-Assisted FD-NOMA MEC Systems. 1-6 - Lachhab Youssef, Elhoussine Ziyati:

Arabic Aspect Category Detection Using Traditional Neural Networks and Arbert. 1-6 - Jalal Rabbah, Mohammed Ridouani

, Larbi Hassouni:
Bridging Healthcare and Telecommunications A Unified Model for Multi-Task Image Classification. 1-8 - Mojtaba Mahdavi:

Hardware Realization of Vector and Matrix Norm Calculation for Signal Processing Applications. 1-7 - Moukhliss Ghizlane

, Lahyani Khalid
, Reda Filali Hilali, Belhadaoui Hicham:
A New AI-Based University Guidance Model for Moroccan Students. 1-6 - Mohamed Mouhiha

, Omar Ait Oualhaj, Abdelfettah Mabrouk:
Combining Collaborative Filtering and Content Based Filtering for Recommendation Systems. 1-6 - Cheng Cheng, John S. Thompson, Symon K. Podilchak:

Zeros Insertion: An OTFS Scheme for a Sparse Equivalent Channel Matrix. 1-6 - Mohamed Akouhar, Abdallah Abarda

, Mohamed El Fatini
, Mohamed Ouhssini
:
A Deep Learning and Resampling Approach to Credit Card Fraud Detection. 1-6 - Laasri Nadia, Dounia Lotfi

, Ahmed Drissi El Maliani:
Advancing Post-Earthquake Relief: A Comprehensive Strategy Using Existing and New Centrality Measures - A Morocco's Earthquake Case Study. 1-6 - Muhammad Zain Uddin, Syed Muhammad Faisal Iradat

:
IoT Pro-Active SDN: A Smart Predictive-Based Approach for IoT Devices in SDN. 1-6 - Adib Oubadriss

, Jalal Laassiri, Adil El Makrani
:
Intelligent Approach to Massive Data Analysis and Its Impact on Leaf Disease Detection Decision-Making. 1-7 - Mohamed Redha Bouakouk, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman

:
AOF-RPL: Towards an MCDM Based Adaptive Objective Function in RPL. 1-6 - Jeffrey Redondo

, Zhenhui Yuan, Nauman Aslam, Juan Zhang
:
Coverage-Aware and Reinforcement Learning Using Multi-Agent Approach for HD Map QoS in a Realistic Environment. 1-6 - Qamar Hassan, Mirza Shujaat Ali

, Jalil Ur Rehman Kazim, Farooq A. Tahir, Muhammad Ali Imran
, Qammer H. Abbasi:
Design of RF MEMS Shunt Capacitive Switches Using Dimples and Meanders. 1-4 - Ruobin Han, Abdoalbaset Abohmra, Tomas Pires, Vaithinathan Karthikeyan, Farooq A. Tahir, João Paulo Ponciano, Muhammad Ali Imran

, Qammer H. Abbasi:
Terahertz Photoconductive Antenna Based on Tai-Chi Totem and Plasmonic Structure for Cancer Detection. 1-6 - Mohammed A. Alshorbaji, Ahmed Q. Lawey, Syed Ali Raza Zaidi:

Energy Efficient Bandwidth Allocation and Routing in Electromagnetic Nano-Networks via Reinforcement Learning. 1-8 - Andrey Garnaev, Wade Trappe

:
An IoT Game with Heterogeneous Communication Nodes. 1-6 - Hamid Ouidir, Amine Berqia, Siham Aouad:

Improving UWSN Performance Using Reinforcement Learning Algorithm QENDIP. 1-6 - Alican Topcu

, Ahmed Q. Lawey, Syed Ali Raza Zaidi:
Joint Power and Flexible Numerology Allocation in 5G Networks Using Deep Reinforcement Learning. 1-6 - Benlemlih Youssef, Berrada Ismail:

Cybersecurity and Surveillance Strategies in the Banking Sector: The Threat of CryptoJacking and ENISA's Methodologies against the Dark Side of Cryptocurrencies. 1-8 - Ke Chen, Li Zhang

, Jihai Zhong:
Vertical Handover Strategy in Satellite-Aerial Based Emergency Communication Networks. 1-6 - Xuanyu Liang, Ahmed Al-Tahmeesschi, Qiao Wang

, Swarna Bindu Chetty, Chenrui Sun, Hamed Ahmadi:
Enhancing Energy Efficiency in O-RAN Through Intelligent xApps Deployment. 1-6 - Xicheng Lu

, Zhendong Chen, Wei Liu, Haixin Sun:
One-Bit Underdetermined DOA Estimation with Sparse Arrays via Structured Covariance Reconstruction: Invited Paper. 1-6 - Jihai Zhong, Li Zhang

:
Fuzzy Inference System Based Handover Scheme in UAV-Assisted MEC Network. 1-6 - Khadeeja Tariq, Hamza Ahmad, Salman Liaquat

, Faran Awais Butt, Ijaz Haider Naqvi, Nor Muzlifah Mahyuddin, Saleh A. Alawsh, Ali H. Muqaibel:
A Framework for Improving Search and Rescue Operations Through SDR-Based FMCW Radar and LPWAN Technology. 1-6 - Andreas Andreou, Constandinos X. Mavromoustakis, Evangelos K. Markakis

, Athina Bourdena
, George Mastorakis:
On the Quantum Analysis by Using Semantic Integration and Covert Communication for Next-Generation Networks. 1-6 - Anass Garbaz

, Yassine Oukdach, Said Charfi, Mohamed El Ansari, Lahcen Koutti, Mouna Salihoun:
Bleeding Segmentation Based on a U-Formed Network with Separable Contextual Feature-Guided in Wireless Capsule Endoscopy Images. 1-6 - Jasmin Ebert

, Peter Winzer:
B2C Product and Price Policy of Mobile Providers Insights from Qualitative Expert Interviews in the German and Swiss Market. 1-6 - Imad Bourian

, Anass Sebbar, Mounir Arioua, Khalid Chougdali:
Blockchain Based Smart Contract to Enhance Security in Smart City. 1-6 - Nabil Tazi Chibi, Omar Ait Oualhaj, Hassan El Ghazi, Wassim Fassi Fihri:

Secured Storage of Smart Grid Events: Blockchain Based on Multi Agents Markov Decision Processes. 1-7 - Idriss Moumen

, Najat Rafalia, Jaafar Abouchabaka:
A Next-Generation Platform for Law Enforcement Vehicle Detection. 1-6 - Imane Daha Belghiti, Lakhdachi Hamza, Fatima Guerouate:

Optimizing Energy Utilization in Smart Manufacturing Using Machine Learning Within the Framework of Industry 4.0. 1-6 - Noor Ali Alshuraify

, Ali A. Yassin
, Zaid Ameen Abduljabbar
:
Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields. 1-8 - El Hadji Malick Ndoye, Ousmane Diallo, Mohamed El-Kamili:

LoRaWAN Behavior Analysis in a Linear Topology for Border Monitoring. 1-6 - Syed Salman Haider, Muhammad Noman, Farooq A. Tahir, Muhammad Imran

, Qammer H. Abbasi:
A Fractal Dual-Band Polarization Diversity Antenna Array for 5G Communications. 1-5 - Huthaifa A. Obeidat, Muhammad Ali Malik, Issam Trrad, Issa T. E. Elfergani, Ashwain Rayit, Omar Obeidat, Raed Abd-Alhameed:

Path Loss Exponent Modeling for 6G Applications at 245 GHz. 1-6 - Meshari D. Alanazi

:
Wideband Hemisphere Dielectric Resonator Antenna for Next 5G Networks. 1-4 - Mojtaba Mahdavi:

Channel Estimation using Processing In Memory Based on System Identification Technique. 1-8 - Ayoub Wehby, Rida Khatoun, Ahmad Fadlallah

:
Shielding the Connected Cars: A Dataset-Powered Defense Against DDoS. 1-7 - Chenrui Sun, Gianluca Fontanesi, Swarna Bindu Chetty, Xuanyu Liang, Berk Canberk, Hamed Ahmadi:

Continuous Transfer Learning for UAV Communication-Aware Trajectory Design. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














