Abstract is missing.
- Studying Node Cooperation in Reputation Based Packet Forwarding Within Mobile Ad Hoc NetworksSara Berri, Vineeth S. Varma, Samson Lasaulce, Mohammed Said Radjef, Jamal Daafouz. 3-13 [doi]
- Routing Game on the Line: The Case of Multi-playersAbdelillah Karouit, Majed Haddad, Eitan Altman, Moulay Abdellatif Lmater. 14-24 [doi]
- QoS-Aware Tactical Power Control for 5G NetworksHajar El Hammouti, Essaid Sabir, Hamidou Tembine. 25-37 [doi]
- A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11Mohammed-Alamine El Houssaini, Abdessadek Aaroud, Ali El Hore, Jalel Ben-Othman. 38-47 [doi]
- Leveraging User Intuition to Predict Item Popularity in Social NetworksNada Sbihi, Ihsane Gryech, Mounir Ghogho. 48-55 [doi]
- Quality of Experience in HTTP Adaptive Video Streaming SystemsZakaria Ye, Rachid El Azouzi, Tania Jiménez. 56-69 [doi]
- Community Detection Through Topic Modeling in Social NetworksImane Tamimi, El Khadir Lamrani, Mohamed El-Kamili. 70-80 [doi]
- A Formal Framework for AdaptationAnne Marie Amja, Abdel Obaid, Hafedh Mili, Zahi Jarir. 81-94 [doi]
- A Comprehensive Study of Intelligent Transportation System Architectures for Road Congestion AvoidanceSara El Hamdani, Nabil Benamar. 95-106 [doi]
- Enhancing Security in Optimized Link State Routing Protocol for Mobile Ad Hoc NetworksHouda Moudni, Mohamed Er-rouidi, Hassan Faouzi, Hicham Mouncif, Benachir El Hadadi. 107-116 [doi]
- A New Data Forwarding Scheme for DTNs Based on Coalition GameYouness Larabi, Khalil Ibrahimi, Nabil Benamar. 117-126 [doi]
- Impact of Link Lifetime on QoS in Mobile Ad-Hoc NetworksNabil Mesbahi, Hamza Dahmouni. 127-138 [doi]
- A Multi-broker Cloud Architecture for the Purpose of Large Scale Sensing Applications DevelopmentSoumaya Bel Hadj Youssef, Slim Rekhis, Noureddine Boudriga. 141-153 [doi]
- A Simulation Framework for IT Governance in the Context of Corporate RelocationRabii El Ghorfi, Mohamed El Aroussi, Mohamed Ouadou, Driss Aboutajdine. 154-165 [doi]
- NGN Management with NGOSS Framework-Based IMS Use CaseBrahim Raouyane, Sara Khairi, Imane Haddar, Mostafa Bellafkih. 166-178 [doi]
- Migration from Web Services to Cloud ServicesHassina Nacer, Kada Beghdad Bey, Nabil Djebari. 179-192 [doi]
- Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel ProcessingOussama Mjihil, Dijiang Huang, Abdelkrim Haqiq. 193-205 [doi]
- Performance Analysis of Intrusion Detection Systems in Cloud-Based SystemsRachid Cherkaoui, Mostapha Zbakh, An Braeken, Abdellah Touhafi. 206-213 [doi]
- Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image ProcessingMbarek Marwan, Ali Kartit, Hassan Ouahmane. 214-224 [doi]
- A Verifiable Secret Sharing Approach for Secure MultiCloud StorageKamal Benzekki, Abdeslam El Fergougui, Abdelbaki Elbelrhiti Elalaoui. 225-234 [doi]
- A Priority Based Task Scheduling in Cloud Computing Using a Hybrid MCDM ModelHicham Ben Alla, Said Ben Alla, Abdellah Ezzati. 235-246 [doi]
- A Novel Approach for Security in Cloud-Based Medical Image Storage Using SegmentationMbarek Marwan, Ali Kartit, Hassan Ouahmane. 247-258 [doi]
- Toward Reliable Maritime Communication for a Safe Operation of Autonomous ShipAbdelmoula Ait Allal, Khalifa Mansouri, Mohamed Youssfi, Mohammed Qbadou. 261-274 [doi]
- A Secure Machine-to-Machine Wireless Communication Using DNP3 Protocol for Feeder Automation in Smart GridAnass Lekbich, Abdelaziz Belfqih, Cherkaoui Nazha, Faissal El Mariami, Jamal Boukherouaa, Omar Sabri, Mohamed Nouh Dazahra. 275-286 [doi]
- L-CAHASH: A Novel Lightweight Hash Function Based on Cellular Automata for RFIDCharifa Hanin, Bouchra Echandouri, Fouzia Omary, Souad El Bernoussi. 287-298 [doi]
- Group Authentication with Fault Tolerance for Internet of ThingsOtmane Elmouaatamid, Mohammed Lahmer, Mostafa Belkasmi. 299-307 [doi]
- Fully Distributed Indexing over a Distributed Hash TableSimon Désaulniers, Adrien Béraud, Alexandre Blondin Massé, Nicolas Reynaud. 308-318 [doi]
- IoT-Empowered Smart Agriculture: A Real-Time Light-Weight Embedded Segmentation SystemSaad Abouzahir, Mohamed Sadik, Essaid Sabir. 319-332 [doi]
- Random Access Procedure Based on an Adaptive Prioritization Method for Integration of MTC in Mobile NetworksAlejandro Borrajo Romero, Raquel Perez Leal, Ana García Armada. 333-344 [doi]
- Adopting Fuzzy Technique to Save Energy in Smart Home Control SystemSergio Henrique Monte Santo Andrade, Edvar da Luz Oliveira, Rodrigo Dias Alfaia, Anderson Vinicius de Freitas Souto, Nandamudi Lankalapalli Vijaykumar, Carlos Renato Lisboa Francês. 345-356 [doi]
- Multi-hop Clustering Solution Based on Beacon Delay for Vehicular Ad-Hoc NetworksSoufiane Ouahou, Slimane Bah, Zohra Bakkoury, Abdelhakim Hafid. 357-367 [doi]
- F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion Using MQTT ProtocolIstabraq M. Al-Joboury, Emad H. Al-Hemiary. 368-379 [doi]
- Compact Dual-Band CPW-Fed Patch Antenna for 2.45/5.80 GHz RFID ApplicationsMohamed Tarbouch, Abdelkebir El Amri, Hanae Terchoune. 380-389 [doi]
- MRA*: Parallel and Distributed Path in Large-Scale Graph Using MapReduce-A* Based ApproachWilfried Yves Hamilton Adoni, Tarik Nahhal, Brahim Aghezzaf, Abdeltif Elbyed. 390-401 [doi]
- Study of Energy Consumption in Wireless Sensor Networks Using S-Rhombus, S-Square and S-Circle DeploymentSaleh Bouarafa, Rachid Saadane, Moulay Driss Rahmani, Driss Aboutajdine. 402-410 [doi]
- Toward a New Extension of IPv6 Addressing to Connect Non IP ObjectsAli El Ksimi, Leghris Cherkaoui, Faddoul Khoukhi. 411-421 [doi]
- Channel Coherence Classification with Frame-Shifting in Massive MIMO SystemsAhmad Abboud, Oussama Habachi, Ali H. Jaber, Jean-Pierre Cances, Vahid Meghdadi. 425-437 [doi]
- Spectral Efficiency Analysis of Two-Way Massive MIMO Full-Duplex Relay Systems with Direct LinkHouda Chafnaji. 438-449 [doi]
- Robust Trajectory Planning for Robotic Communications Under Fading ChannelsDaniel Bonilla Licea, Vineeth S. Varma, Samson Lasaulce, Jamal Daafouz, Mounir Ghogho, Desmond C. McLernon. 450-460 [doi]
- Performance of Enhanced LTE OTDOA Positioning Approach Through Nakagami-m Fading ChannelIlham El Mourabit, Abdelmajid Badri, Aicha Sahel, Abdennaceur Baghdad. 461-471 [doi]
- Chaotic ZKP Based Authentication and Key Distribution Scheme in Environmental Monitoring CPSWided Boubakri, Walid Abdallah, Noureddine Boudriga. 472-483 [doi]
- Implementation and Performance Evaluation of Network Intrusion Detection SystemsMohammed Saber, Mohammed Ghaouth Belkasmi, Sara Chadli, Mohamed Emharraf. 484-495 [doi]
- An Efficient Authentication Protocol for 5G Heterogeneous NetworksYounes El Hajjaji El Idrissi, Noureddine Zahid, Mohamed Jedra. 496-508 [doi]
- An Agreement Graph-Based-Authentication Scheme for 5G NetworksMaroua Gharam, Noureddine Boudriga. 509-520 [doi]
- Green Base Station Placement for Microwave Backhaul LinksAlonso Silva, Antonia Maria Masucci. 521-531 [doi]
- Joint Frame Detection and Channel Estimation for DCO-OFDM LiFi SystemsYufei Jiang, Majid Safari, Harald Haas. 532-541 [doi]
- SIR Based Performance Analysis of Dual-Branch SC Over Correlated \kappa -\mu Fading ChannelsStefan Panic, Caslav Stefanovic, Hranislav Milosevic. 542-549 [doi]
- Performance Analysis of Asynchronous and Non Linear FBMC SystemsBrahim Elmaroud, Moulay Ahmed Faqihi, Driss Aboutajdine. 550-561 [doi]
- An Improved Bernoulli Sensing Matrix for Compressive SensingHamid Nouasria, Mohamed Et-tolba. 562-571 [doi]
- Contribution to the Study of Beamforming at 2.4 GHz of a Smart Antenna Alimented by a 4 × 4 Butler Matrix for Wireless ApplicationsMohamed Hanaoui, Mounir Rifi. 572-583 [doi]
- Adaptive Mapping for Multiple Applications on Parallel ArchitecturesIsmail Assayad, Alain Girault. 584-595 [doi]
- Verification of SystemC Components Using the Method of DeductionElbouanani Soumia, Assayad Ismail, Sadik Mohammed. 596-606 [doi]
- Image Segmentation by Deep Community Detection ApproachYoussef Mourchid, Mohammed El Hassouni, Hocine Cherifi. 607-618 [doi]
- Data Mining Approaches for Alzheimer's Disease DiagnosisEl Mehdi Benyoussef, Abdeltif Elbyed, Hind El Hadiri. 619-631 [doi]
- Image Search Engine Based on Color Histogram and Zernike MomentNawal Chifa, Abdelmajid Badri, Yassine Ruichek, Aicha Sahel. 632-640 [doi]
- Risk Assessment and Alert Prioritization for Intrusion Detection SystemsEl Mostapha Chakir, Mohamed Moughit, Youness Idrissi Khamlichi. 641-655 [doi]