Abstract is missing.
- Harvesting Indoor Available Light for Low-power Wireless NetworksA. C. G. Caldeira, A. P. Almeida. 1-7 [doi]
- A novel Turbo ICI cancellation technique for FBMC-OQAM trough a doubly selective channelAbla Bedoui, Mohamed Et-tolba. 1-6 [doi]
- Multiband Fractal Antenna for Wireless ApplicationsFatima Ez-Zaki, Abdelilah Ghammaz, H. Belahrach. 1-6 [doi]
- Optimum design of a tri-band MPA with parasitic elements for CubeSat communications using Genetic AlgorithmMohamed El Bakkali, Najiba El Amrani El Idrissi, Faisel Em Tubbal, Gurjot Singh Gaba. 1-4 [doi]
- How mobile RSUs can enhance communications in VANETs?Secil Ercan, Marwane Ayaida, Nadhir Messai. 1-5 [doi]
- A Game Theoretical Approach to D2D Underlaying Downlink NOMA NetworksRajaa Elouafadi, Mohammed Raiss El-Fenni, Mustapha Benjillali. 1-6 [doi]
- An Optimal Sparse Signals Recovery Using Constraint ProgrammingHamid Nouasria, Mohamed Et-tolba. 1-6 [doi]
- A Hierarchical Game for Wireless Sensor Network with Wireless Energy TransferOussama Habachi, Vahid Meghdadi, Jean-Pierre Cances. 1-6 [doi]
- Per Packet Flow Anonymization in 6LoWPAN IoT NetworksAsma Iman Kouachi, Somia Sahraoui, Abdelmalik Bachir. 1-7 [doi]
- Software Defined Networks in Internet of Things Integration Security: Challenges and SolutionsAiman Nait Abbou, Youssef Baddi, Abderrahim Hasbi. 1-6 [doi]
- Simulation of wireless sensors in collective motionYounes Regragui, Najem Moussa. 1-6 [doi]
- Fast spatio-temporal stereo matching method for omnidirectional imagesZakaria Kerkaou, Mohamed El Ansari, Lhoussaine Masmoudi. 1-6 [doi]
- Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3Abdellah Nabou, My Driss Laanaoui, Mohammed Ouzzif. 1-6 [doi]
- Assessment of Regression-based Techniques for Data Location Verification at Country-Level (Invited Paper)Malik Irain, Zoubir Mammeri, Jacques Jorda. 1-6 [doi]
- A Network Model for Internet of vehicles based on SDN and Cloud ComputingRoumissa Sahbi, Salim Ghanemi, Ramissa Djouani. 1-4 [doi]
- Low Complexity Antenna Array DOA System for Localization ApplicationsMohammed A. G. Al-Sadoon, Rameez Asif, Mohammed S. Bin-Melha, H. A. Obeidat, A. Zweid, James M. Noras, R. A. Abd-Alhameed. 1-5 [doi]
- Reliability Analysis for Peer Selection in D2D NetworksMuhammad Saleem Khan, Sobia Jangsher. 1-6 [doi]
- Mathematical Evaluation of Human Immune Systems For Securing Software Defined NetworksHeena Rathore, Mohsen Guizani, Amr Mohamed. 1-6 [doi]
- Localization Algorithms for Mobile Nodes for Three-Dimentional WSNsAbdelali Hadir, Khalid Zine-Dine, Mohamed Bakhouya, J. El Kafi, A. Tmiri. 1-8 [doi]
- IoT Based Tracking System For Supply Chain ManagementMarwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim. 1-5 [doi]
- Decision-Oriented Communications: Application to Energy-Efficient Resource AllocationHang Zou, Chao Zhang 0005, Samson Lasaulce, Lucas Saludjian, Patrick Panciatici. 1-6 [doi]
- A Minimum Variance Noise Algorithm for 2D and 3D Direction Estimation in MIMO Wireless Communication SystemsMohammed A. G. Al-Sadoon, A. Zweid, Rameez Asif, Mohammed S. Bin-Melha, Nabeel Abduljabbar, James M. Noras, R. A. Abd-Alhameed. 1-5 [doi]
- A Security Proposal for IoT integrated with SDN and CloudRamissa Djouani, Karim Djouani, Fateh Boutekkouk, Roumissa Sahbi. 1-5 [doi]
- Soft Metrics Performance Analysis for BICM-Based V2X Communication Systems over Rayleigh and Weibull Fading ChannelsAnas Fedoul, Mustapha Benjillali. 1-5 [doi]
- Optimizing the prediction of telemarketing target calls by a classification techniqueCedric Stephane Tekouabou Koumetio, Walid Cherif, Silkan Hassan. 1-6 [doi]
- Securing the Internet of Things (IoT)Abla El bekkali, Mohammed Boulmalf, Mohammad Essaaidi, Ghita Mezzour. 1-6 [doi]
- Graph-Based Computing Resource Allocation for Mobile BlockchainKobbane Abdellatif, Charkaoui Abdelmouttalib. 1-4 [doi]
- New Security Level of Authentication and Key Agreement Protocol for the IoT on LTE Mobile NetworksMariyam Ouaissa, Abdallah Rhattoy, Idriss Chana. 1-6 [doi]
- A Leasing-based Spectrum Sharing Framework for Cognitive Radio NetworksSara Handouf, Essaid Sabir, Mohammed Sadik. 1-5 [doi]
- Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring SystemWenjie Xiong, Chun Shan, Zhaoliang Sun, Qinglei Meng. 1-4 [doi]
- Upper Bound of Capacity for a MU-MIMO NOMA in a Two Way Relaying NetworkFariea Khalid, Sobia Jangsher. 1-6 [doi]
- Impact of green wave traffic light system on V2V communicationsSaif islam Bouderba, Najem Moussa. 1-6 [doi]
- Performance Analysis of Uplink Massive MIMO in Inverse-Gamma Shadowing ChannelsAbdelhafid Elharoussi, Mustapha Benjillali. 1-6 [doi]
- The Specific Absorption Rate induced in human organs due Ionizing and Non Ionizing Radiations exposureLoubna El Amrani, Tomader Mazri, Nabil Hmina. 1-4 [doi]
- Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNNHafsa Benaddi, Khalil Ibrahimi, Abderrahim Benslimane. 1-6 [doi]
- Energy-Aware Mode Selection and Power Control in D2D-Enabled HetNetsSalma Ibnalfakih, Essaid Sabir, Mohamed Sadik. 1-6 [doi]
- A novel parameter free approach for link predictionAyoub Jibouni, Dounia Lotfi, Mohamed El Marraki, Ahmed Hammouch. 1-6 [doi]
- A secure wireless control of Remote Terminal Unit using the Internet of Things in smart gridsAnass Lekbich, Abdelaziz Belfqih, Chaimae Zedak, Jamal Boukherouaa, Faissal El Mariami. 1-6 [doi]
- A Game Theoretic Approach to Optimize Transmission Strategies for Mobile ApplicationsMohamed El Amrani, Driss Ait Omar, Mohamed Baslam, Brahim Minaoui. 1-6 [doi]
- On Circulation Efficiency of Message Ferries in Delay Tolerant Networks: DRHT caseEl Arbi Abdellaoui Alaoui, Khalid Nassiri, Mustapha El Moudden, Joel Jaquet. 1-8 [doi]
- PAPR Reduction for 5G WaveformsHayat Jebbar, Sanae El Hassani, Ahmed El Abbassi. 1-6 [doi]
- Comparative Study Between Dynamic IPv6 Routing Protocols of Distance Vectors and Link StatesKhalid E. L. Khadiri, Ouidad Labouidya, Najib Elkamoun, Rachid Hilal. 1-6 [doi]
- LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay ChannelMarwa Ben Abdessalem, Amin Zribi, Tadashi Matsumoto 0001, Ammar Bouallegue. 1-6 [doi]
- Computing Tasks Distribution in Fog Computing: Coalition Game ModelZainab Ennya, Moulay Youssef Hadi, Amine Abouaomar. 1-4 [doi]
- Classifying IoT security risks using Deep Learning algorithmsWissam Abbass, Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih. 1-6 [doi]
- Reliable and cost-effective communication at high seas, for a safe operation of autonomous shipAbdelmoula Ait Allal, Khalifa Mansouri, Mohamed Youssfi, Mohammed Qbadou. 1-8 [doi]
- An efficient clustering in Heterogenous Wireless Sensor Networks based on Near Optimal Bi-PartitionsEl Bhiri Brahim, Zerououl Rafiqa. 1-6 [doi]
- A H-Slotted Patch Antenna Array for 79 GHz Automotive Radar SensorsWafae Ouali Alami, Essaid Sabir, Lakksir Brahim. 1-6 [doi]
- Performance Evaluation of Low-Power Wide Area based on LoRa Technology for Smart MeteringAbdelfatteh Haidine, Abdelhak Aqqal, Aziz Dahbi. 1-6 [doi]