Abstract is missing.
- Generalized Slotted Aloha Revisited: A Throughput and Stability AnalysisEssaid Sabir, Sidi Ahmed Ezzahidi, El-Houssine Bouyakhf. 3-15 [doi]
- Enhanced Hybrid Uplink Time Difference of Arrival and Assisted Global Positioning System for UMTS UsersIlham El Mourabit, Aïcha Sahel, Abdelmajid Badri, Abdennaceur Baghdad. 17-25 [doi]
- Efficient Incentive Scheme forWireless Random Channel Access with Selfish UsersAbdelillah Karouit. 27-38 [doi]
- A Pricing-Based Spectrum Leasing Framework with Adaptive Distributed Learning for Cognitive Radio NetworksSara Handouf, Essaid Sabir, Mohamed Sadik. 39-51 [doi]
- Theoretical Analysis of BER Performance for Asynchronous FBMC Based Multi-cellular Networks with Non Linear DistortionsBrahim Elmaroud, Moulay Ahmed Faqihi, Mohammed Abbad, Driss Aboutajdine. 53-61 [doi]
- Towards a Zero-Failure Distributed Access for Wireless Collision ChannelsSara Arabi, Ahmed Errami, Mohamed Khaldoun, Essaid Sabir, Jelloul El Mesbahi. 63-76 [doi]
- Toward a New Extension of the Access Control Model ABAC for Cloud ComputingMaryam Ed-Daibouni, Adil Lebbat, Saida Tallal, Hicham Medromi. 79-89 [doi]
- A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive SystemsHayat Routaib, Elarbi Badidi, Essaid Sabir, Mohammed El Koutbi. 91-104 [doi]
- A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud ComputingZakaria Elmrabet, Hamid Elghazi, Tayeb Sadiki, Hassan Elghazi. 105-116 [doi]
- Text Mining for Suspicious Contents in Mobile Cloud Computing EnvironmentSalim Alami, Omar Elbeqqali. 117-128 [doi]
- Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learningAsmaa Kassid, Najib El Kamoun. 129-139 [doi]
- Applying Encryption Algorithm for Data Security in Cloud StorageZaid Kartit, Ali Azougaghe, Hamza Kamal Idrissi, Mohamed El Marraki, Mustapha Hedabou, Mostafa Belkasmi, Ali Kartit. 141-154 [doi]
- A New Shared and Comprehensive Tool of Cloud Computing Security Risk AssessmentSaadia Drissi, Siham Benhadou, Hicham Medromi. 155-167 [doi]
- The Behavior of CPW-Fed Slotted Cantor Set Fractal AntennaAbdelati Reha, Abdelkebir El Amri, Othmane Benhmammouch, Ahmed Oulad-Said. 171-182 [doi]
- Directive Beam-Steering Patch Antenna Using Adjustable Metamaterial SuperstrateHayat Errifi, Abdennaceur Baghdad, Abdelmajid Badri, Aicha Sahel. 183-194 [doi]
- High Sensitive and Efficient Circular Polarized Rectenna Design for RF Energy Harvesting at 5.8 GHzMohamed Adel Sennouni, Jamal Zbitou, Benaissa Abboud, Abdelwahed Tribak, Hamid Bennis, Mohamed Latrach. 195-209 [doi]
- Miniaturized Wideband Flexible CPW Antenna with Hexagonal Ring Slots for Early Breast Cancer DetectionAmal Afyf, Larbi Bellarbi, Anouar Achour, Fatima Riouch, Abdelhamid Errachid. 211-222 [doi]
- Maximizing QoS in Heterogeneous Wireless Sensor Networks Using Game Theory and Learning AlgorithmsHajar El Hammouti, Loubna Echabbi, Yann Ben Maissa. 225-236 [doi]
- Traffic Congestion Manager, a Cost-Effective ApproachAhmed Adnane, Mohamed Salim Lmimouni, Maha Rezzai, Hicham Medromi. 237-248 [doi]
- Automated SLA Negotiation: A Novel Approach for Optimizing Cloud Data OverloadLatifa Maftahi, Said Rakrak, Said Raghay. 249-257 [doi]
- Frequency-Domain Analysis and Design of a TCP Flow Controller Using the AQM MechanismKhalid Lefrouni, Rachid Ellaia. 259-270 [doi]
- Quality of Service Provision and Data Security in Communication Networks Based on Traffic ClassificationJeferson Wilian de Godoy Stênico, Lee Luan Ling. 271-283 [doi]
- A Survey on QoS for OLSR Routing Protocol in MANETSFatima Lakrami, Najib Elkamoun, Mohamed El-Kamili. 287-300 [doi]
- New Classification of Nodes Cooperation in Delay Tolerant NetworksSalah Eddine Loudari, Maria Benamar, Nabil Benamar. 301-309 [doi]
- A Survey on Flat Routing Protocols in Wireless Sensor NetworksHassan Echoukairi, Khalid Bourgba, Mohammed Ouzzif. 311-324 [doi]
- An Energy-Aware Clustering Approach Based on the K-Means Method for Wireless Sensor NetworksRidouane El Mezouary, Ali Choukri, Abdellatif Kobbane, Mohammed El Koutbi. 325-337 [doi]
- An Efficient Key Establishment Protocol for Wireless Sensor NetworksYassin Maleh, Abdellah Ezzati. 339-352 [doi]
- Computer Aid Diagnostic in Mammogram Image Using SUSAN Algorithm and Hierarchical Watershed TransformChaimae Anibou, Mohammed Nabil Saidi, Driss Aboutajdine. 355-366 [doi]
- Improving the Performance of CBIR with Genetic Approach and FeedbackYoussef Bourass, Abdelkhalak Bahri, Hamid Zouaki. 367-379 [doi]
- Multi-scale Image Co-segmentationRachida Es-salhi, Imane Daoudi, Jonathan Weber, Hamid El Ouardi, Saida Tallal, Hicham Medromi. 381-390 [doi]
- A Novel Approach for Computing the Coefficient of ART Descriptor Using Polar Coordinates for Gray-Level and Binary ImagesAbderrahim Khatabi, Amal Tmiri, Ahmed Serhir. 391-401 [doi]
- A New Image Interpolation Using Laplacian OperatorSaid Ousguine, Fedwa Essannouni, Leila Essannouni, Mohammed Abbad, Driss Aboutajdine. 403-413 [doi]
- 3D Objects Comparison Using New Approach Based Similarity IndexKhalid Aznag, Nouhoun Kane, Ahmed El Oirrak, Essaid El Bachari. 415-421 [doi]
- Multilevel MPSoC Performance Evaluation, ISS Model with Timing and Priority ManagementAbdelhakim Alali, Ismail Assayad, Mohamed Sadik. 425-437 [doi]
- Hybrid Electrical Architecture for Vertical Takeoff and Landing Unmmaned Aerial VehiculeSouad Berradi, Fouad Moutaouakkil, Hicham Medromi. 439-448 [doi]
- SMART: Implementing a New Flight System Based on Multi-agent and Embedded on a Real-Time PlatformFirdaous Marzouk, Mohamed Ennaji, Hicham Medromi. 449-459 [doi]
- Analytical Study of Nonlinear Controls Applied to Wind Energy Conversion Systems Using a DFIGAbdelmajid Berdai, Moussa Reddak, Abdelaziz Belfqih, Boukherouaa Jamal, Faissal El Mariami, Abdelhamid Hmidat. 461-474 [doi]
- Statistical Learning Based Framework for Random Networks Knowledge Extraction Applied in Smart CitiesSmail Tigani, Mohammed Ouzzif, Rachid Saadane. 477-487 [doi]
- Just in Time: A Social Computing Approach for Finding Reliable Answers in Large Public SpacesNasim Mahmud. 489-498 [doi]
- A Decision Approach to Select the Best Framework to Treat an IT Problem by Using Multi-Agent System and Expert SystemsA. Chakir, M. Chergui, S. Elhasnaou, Hicham Medromi, Adil Sayouti. 499-511 [doi]
- An Abstract Framework for Introducing Computational Trust Models in JADE-Based Multi-Agent SystemsYoussef Mifrah, Abdeslam En-Nouaary, Mohamed Dahchour. 513-523 [doi]
- Including EAS-SGR IT Risk Framework in an IT GRC Global FrameworkHajar Iguer, Hicham Medromi, Adil Sayouti, Saadia Tallal. 525-533 [doi]
- Enterprise Architecture Complexity Component Based on Archimate LanguageJihane Lakhrouit, Karim Baïna. 535-546 [doi]
- A Multi-Agent Systems Contribution in Change of Information SystemNabil Benanbar, Laila Moussaid, Hicham Medromi. 547-558 [doi]
- Designing Multi Agent System Architecture for Project Performance Based on PMBOK StandardHouda Hammouch, Hicham Medromi, Adil Sayouti. 559-570 [doi]