Abstract is missing.
- Audio Deepfake Detection by using Machine and Deep LearningH. Hakan Kilinc, Faruk Kaledibi. 1-5 [doi]
- Institutional Values and CDR for Green ITC: Transforming E-waste to Ethical GemsAki Nagano. 1-6 [doi]
- Sentiment Analysis: Machine Learning approaches comparisonLoukmane Maada, Khalid Al Fararni, Badraddine Aghoutane, Yousef Farhaoui, Mohammed Fattah. 1-6 [doi]
- Outage Probability Analysis of Reconfigurable Intelligent Surface (RIS)-Enabled NOMA NetworkHaleema Sadia, Ziaul Haq Abbas, Ahmad Kamal Hassan, Ghulam Abbas 0002. 1-6 [doi]
- Investigating Domain Adaptation for Network Intrusion DetectionHamza Alami, Meryem Janati Idrissi, Abdelkader El Mahdaouy, Abdelhak Bouayad, Zakaria Yartaoui, Ismail Berrada. 1-7 [doi]
- Ransomware Detection and Classification using Ensemble Learning: A Random Forest Tree ApproachShahid Anwar, Abdul-Ahad, Mudassar Hussain, Ibraheem Shayea, Ivan Miguel Pires. 1-6 [doi]
- A Robust Machine Learning Approach for Path Loss Prediction in 5G Networks with Nested Cross ValidationIbrahim Yazici, Emre Gures. 1-6 [doi]
- Predictive Maintenance-as-a-Service (PdMaaS) in Industry 4.0 using BlockchainAbdelhadi Rachad, Lotfi Gaiz, Khalid Bouragba, Mohammed Ouzzif. 1-6 [doi]
- Intelligent Hypervisor Placement for VSDN: Adapting to Fluctuating Traffic ScenariosMohamed Janati Idrissi, Salah Eddine Essalhi, Mohammed Raiss El-Fenni. 1-6 [doi]
- Hybrid intrusion detection system based on Random forest, decision tree and Multilayer Perceptron (MLP) algorithmsZhour Rachidi, Khalid Chougdali, Abdellatif Kobbane. 1-5 [doi]
- Enhancement of a User Authentication Scheme for Big Data Collection in IoT-Based Intelligent Transportation SystemIlyes Ahmim, Nacira Ghoualmi-zine, Feriel Bouakkaz, Abderrezak Rachedi. 1-6 [doi]
- Towards strengthening the efficiency of the Air Traffic Departure Manager DMAN using a Genetic AlgorithmAbdelmounaime Bikir, Otmane Idrissi, Khalifa Mansouri, Mohammed Qbadou. 1-6 [doi]
- An optimized neural network-based IDS against DDoS attacksAouatif Arqane, Omar Boutkhoum, Hakima Chouati, Abdelmajid El Moutaouakkil. 1-6 [doi]
- An efficient hybrid approach for vehicle detection and trackingAyoub El-Alami, Younes Nadir, Lahcen Amhaimar, Khalifa Mansouri. 1-8 [doi]
- Millimeter-Wave Channel Modeling In Rural AreasAhmet Caner Gül, Mehmet Nuri Akinci, Semih Dogu. 1-4 [doi]
- A robust intrusion detection model based on a combination of PCA-GM and trunced LDAArchi Taha, Mohammed Benattou. 1-6 [doi]
- IoT Security Based on Smart Contracts: Classification of Algorithms, Complexity, Robustness and Fields of ApplicationBouchra Rguig, Brahim Es-Sousy, Said Ouhmi, Khalid Housni. 1-8 [doi]
- IoT: A Universal Dynamic GatewayAbdulkadir Dauda, Olivier Flauzac, Florent Nolot. 1-6 [doi]
- A LightGBM-Based Approach to improve Sybil Attack Detection in VANET networksHabiba Hadri, Mourad Ouadou, Khalid Minaoui. 1-6 [doi]
- ConV-ViT: Feature Fusion-based Detection of Gastrointestinal Abnormalities using CNN and ViT in WCE ImagesYassine Oukdach, Zakaria Kerkaou, Mohamed El Ansari, Lahcen Koutti, Ahmed Fouad El Ouafdi. 1-6 [doi]
- Design of a Platform for Data Storage and Data Management in IoT NetworksAlberto Ivars-Palomares, Miguel Zaragoza-Esquerdo, Sandra Sendra, Jaime Lloret 0001. 1-6 [doi]
- A Novel Frequency Reconfigurable Antenna Based on Metamaterial for Millimeter-Wave 5G ApplicationsYoussef Frist, Mourad Elhabchi, Mohamed Nabil Srifi. 1-5 [doi]
- Conditional Handover for Non-Terrestrial NetworksMehmet Izzet Saglam. 1-5 [doi]
- A Simple Cascade Channel Estimation Method for UAV RIS-Enabled Millimeter Wave TransmissionsKutluhan Taylan Iren, Tolga Girici. 1-6 [doi]
- Proposal to set up a private 5G network to improve the quality of education: case of the University of BanguiEdgard Ndassimba, Yvan Paillard Kalia-Sya Dodoagnen, Eugene Baba Sire Zabolo, Gervais Mendy, Samuel Ouya. 1-6 [doi]
- Data Leakage Prevention Approach Based On Insider Trust CalculationMohammed El Moudni, Elhoussine Ziyati. 1-6 [doi]
- Seizure Detection using Machine Learning and Monitoring through IoT DevicesD. Sugumar, Suriya K. S., Anto Michael Suraj T., Alphonse Vimal Jose J., K. Kavitha. 1-6 [doi]
- Power Allocation for Joint Large Intelligent Surfaces Decode-And-Forward Relay in Full-Duplex Communications - A Deep Learning ApproachMaggie Shammaa, Maggie Mashaly, Ahmed El-Mahdy 0001. 1-6 [doi]
- On The Practicality of Blockchain-based Security and Privacy for Next Generation SDNNoor Ahmed. 1-6 [doi]
- Visually-Rich Document Understanding: Concepts, Taxonomy and ChallengesAbdellatif Sassioui, Rachid Benouini, Yasser El Ouargui, Mohamed El-Kamili, Meriyem Chergui, Mohammed Ouzzif. 1-7 [doi]
- Unsupervised Anomaly Knowledge Flow: a Digital Signatures Extraction ApproachChristophe Maudoux, Selma Boumerdassi. 1-6 [doi]
- An Approach for intrusion detection using machine learning algorithmsOumaima Chentoufi, Ilyas Alloug, Khalid Chougdali. 1-6 [doi]
- Routing Algorithm for Software Defined Network Based on Boxcovering AlgorithmDana Turlykozhayeva, Sayat Akhtanov, Nurzhan Ussipov, Almat Akhmetali, Aslan Bolysbay, Yerkin Shabdan. 1-5 [doi]
- Secrecy Capacity Analysis with Imperfect Channel State Information and Varying Interference for 6G C-V2X CommunicationHina Ayaz, Ghulam Abbas 0002, Ziaul Haq Abbas, Muhammad Waqas 0001. 1-6 [doi]
- Traffic Control, Congestion Management and Smart Parking through VANET, ML, and IoT: A ReviewHajar Ouhmidou, Abdellah Nabou, Abdelouafi Ikidid, Wafa Bouassaba, Mohammed Ouzzif, Moulay Ahmed El Kiram. 1-6 [doi]
- DSP: A Deep Neural Network Approach for Serving Cell Positioning in Mobile NetworksSepideh Mashhadi, Abolfazl Diyanat, Meisam Abdollahi, Amirali Baniasadi. 1-6 [doi]
- Tree-Driven Intelligent Security System for Intrusion Detection in IoT environmentMouad Choukhairi, Mohamed M'Haouach, Youssef Fakhri, Mohamed Amnai. 1-7 [doi]
- BOPIS-Software: A Python based Software application for SDN East-West inter Autonomous System communication and Programmable Network Monitoring toolAyoub Seck, Eugene Baba Sire Zabolo, Constantin S. E. Bassene, Ndèye Coumba Sene, Samuel Ouya. 1-6 [doi]
- An RFID-Based Traceability Approach to Improve the Overall Health Status Management in MoroccoKamal Souali, Manal Souali, Mohammed Ouzzif. 1-6 [doi]
- Analysis of Rain Interference on Short-Range Millimetre-Wave Terrestrial LinksAsma Ali Hussein Budalal. 1-7 [doi]
- Augmented Reality with Mobility Awareness in Mobile Edge Computing over 6G Network: A SurveySoule Issa Loutfi, Ufuk Tureli, Ibraheem Shayea. 1-6 [doi]
- Towards a large Biscript Moroccan LexiconOmayma Amezian, Soufiane Hajbi, Younes Chihab. 1-6 [doi]
- Slinker: A Safe Linker For An Efficient Data EncryptionAmina A. Mohamednour, Maitha R. Alzaabi, Aisha Alnuaimi, Hanane Lamaazi, Mohamed Adel Serhani. 1-6 [doi]
- Recent Advances in Data Intensive Applications: SurveyYoussef Oubaydallah, Khalil Ibrahimi, Rachid El Azouzi. 1-6 [doi]
- Benchmarking Client Selection Methods in Non-IID Federated Learning ScenariosMohamed M'Haouach, Mouad Choukhairi, Khalid Fardousse. 1-7 [doi]
- Proposed Sentiment Analysis of COVID-19 Tweets using Machine Learning AlgorithmAbdessamad Essaidi, Mostafa Bellafkih, Kandoussi el Mehdi. 1-6 [doi]
- A Multi-Cloud and Zero-Trust based Approach for Secure and Redundant Data StorageMohammed El Moudni, Elhoussine Ziyati. 1-6 [doi]
- A Comparative Evaluation of FedAvg and Per-FedAvg Algorithms for Dirichlet Distributed Heterogeneous DataHamza Reguieg, Mohammed El Hanjri, Mohamed El-Kamili, Abdellatif Kobbane. 1-6 [doi]
- Exploration of Question-Answering Systems: SurveyAsmae Briouya, Hasnae Briouya, Ali Choukri, Mohamed Amnai, Youssef Fakhri. 1-6 [doi]
- An enhanced IoT architecture for healthcare using secure Software-Defined Fog gatewayRajae Tamri, Jilali Antari, Radouane Iqdour. 1-4 [doi]
- A Miniaturized Slotted Patch Antenna for 5G Millimeter Wave ApplicationsSaba Tariq, Waleed Tariq Sethi, Arbab Abdur Rahim. 1-5 [doi]
- Conception of a Digital Government Maturity Model for Developing Countries. Application to UruguaySara Halim, Bouchaib Bounabat. 1-6 [doi]
- Evaluating Lora's Transmission Range and Reliability for Connected VehiclesMohamed Ossama ElShafei, Maggie Shammaa, Engy Aly Maher, Minar El-Aasser. 1-6 [doi]
- Fuzzy Logic Control of Four-Phase Interleaved Boost Converter for PEM Fuel CellMohamed Gouhail, El Houssin El Mazoudi, Issam Salhi, Saïd Doubabi. 1-6 [doi]
- Power Optimization for Joint Large Intelligent Surface - Amplify-and-Forward Relay in Full-duplex CommunicationsMaggie Shammaa, Maggie Mashaly, Ahmed El-Mahdy. 1-7 [doi]
- In-Vehicle Intrusion Detection based on Machine LearningOuidad Saber, Tomader Mazri. 1-6 [doi]
- High Gain Dual-band Compact Antenna Array for Millimeter Wave ApplicationsSaba Tariq, Waleed Tariq Sethi, Arbab Abdur Rahim. 1-6 [doi]
- Voronoi-Based Handover Self-Optimization Technique For Handover Ping-Pong Reduction in 5G NetworksWaheeb Tashan, Ibraheem Shayea, Sultan Aldirmaz Çolak, Ayman A. El-Saleh. 1-6 [doi]
- User Scheduling in Multi-State Los/NLoS Crowded XL-MIMO ChannelsGabriel Avanzi Ubiali, Taufik Abrão, José Carlos Marinello Filho. 1-6 [doi]
- Novel Soil Impact Prediction Model on BandwidthMounir El Mejjatti, Ahmed Habbani. 1-6 [doi]
- Simple Implementation of Terrain Classification Models via Fully Convolutional Neural NetworksAssiya Sarinova, Leila Rzayeva, Noyan Tendikov, Ibraheem Shayea. 1-6 [doi]
- Evaluating ESG Impacts in African Cities through Topic-Level Sentiment AnalysisAbdou Mohamed Naira, Imade Benelallam. 1-6 [doi]
- Evaluating Wi-Fi Security Through Wardriving: A Test-Case AnalysisOthmane Cherqi, Anass Sebbar, Khalid Chougdali, Mohammed Boulmalf, Houda Benbrahim. 1-7 [doi]
- Smart Parking System Approaches and Positioning Technologies: A SurveyMohamed Darqaoui, Moussa Coulibaly, Ahmed Errami. 1-8 [doi]
- CT-xCOV: a CT-scan based Explainable Framework for COVid-19 diagnosisIsmail Elbouknify, Afaf Bouhoute, Khalid Fardousse, Ismail Berrada, Abdelmajid Badri. 1-8 [doi]
- Preserving User Privacy and Empowering Control in Proximity MarketingFatima Chahal, Hacène Fouchal, Dominique Gaïti. 1-6 [doi]
- A Novel Approach for Machine Learning-based Load Balancing in High-speed Train System using Nested Cross ValidationIbrahim Yazici, Emre Gures. 1-6 [doi]
- Comparative analysis of the performance of four learning models for predicting blood glucose levels in type 1 diabetic patients based on blood glucose measurementsLoubna Mazgouti, Najiba El Amrani El Idrissi. 1-7 [doi]
- New Approach for DDoS Attacks Detection: ConvXGBAsmae Bentaleb, Houda Belaabed, Jaafar Abouchabaka. 1-6 [doi]
- Link prediction in weighted complex networks using machine learning methods and similarity metricsAyoub Jibouni, Dounia Lotfi, Ahmed Drissi El Maliani. 1-6 [doi]
- Analytical Study for Vehicle Mobility ModelingJalel Ben-Othman, Lynda Mokdad. 1-6 [doi]
- Indexation techniques in decision support systems: Study and EvaluationMohamed Ridani, Mohamed Amnai, Ali Choukri, Youssef Fakhri, Noreddine Gherabi. 1-7 [doi]
- Profiling Language Sign Using Deep LearningBahaa Eddine Elbaghazaoui, Mohamed Amnai, Youssef Fakhri, Ali Choukri, Noreddine Gherabi. 1-6 [doi]
- Internet of Things Systems Security Based on the Physical Objects: An overviewAbdelkabir Rouagubi, Khalid Chougdali. 1-6 [doi]
- Future Communication Systems: Toward the Intelligent-based Optimization ApproachesLida Kouhalvandi, Mohammad Alibakhshikenari, Ladislau Matekovits, Ibraheem Shayea, Serdar Özoguz. 1-6 [doi]
- NF-NIDS: Normalizing Flows for Network Intrusion Detection SystemsMeryem Janati Idrissi, Hamza Alami, Abdelhak Bouayad, Ismail Berrada. 1-7 [doi]
- Handover for 5G mobile networkMamma Ahizoune, Tomader Mazri, Omar Mouhib. 1-6 [doi]
- Neighborhood Feature Extraction and Haralick Attributes for Medical Image Analysis: Application to Breast Cancer Mammography ImageFatima Ghazi, Aziza Benkuider, Mohamed Zraidi, Fouad Ayoub, Khalil Ibrahimi. 1-6 [doi]
- AI-Enabled Routing in Next-Gen Networks: A Brief OverviewFatma Aktas, Ibraheem Shayea, Mustafa Ergen, Ayman A. El-Saleh. 1-6 [doi]
- Analysis of Walnut Freshness: Preliminary StudyEmre Kizilay, Cemanur Aydinalp, Mehmet Nuri Akinci. 1-4 [doi]
- SDN Controllers and ML-Based Anomaly Detection in Embedded Systems: A Comparative AnalysisCarlos Gonzalez, Salim Mahamat Charfadine. 1-6 [doi]
- Automatic emails classificationMarouane Zaizoune, Youssef Fakhri, Siham Boulaknadel. 1-4 [doi]
- A Comprehensive Survey On Efficient TransformersYasser Elouargui, Mahmoud Zyate, Abdellatif Sassioui, Meriyem Chergui, Mohamed El-Kamili, Mohammed Ouzzif. 1-6 [doi]
- A New All-Optical Switching Satellite Network Architecture based on Optimized Wavelength-MappingZhenhua Zhang, Siyue Sun, Gaosai Liu, Xinglong Jiang, Jinpei Yu, Guang Liang, Shuai Han 0002. 1-5 [doi]
- GastroSegNet: Polyp Segmentation using Colonoscopic Images Based on AttentionU-net ArchitectureSamira Lafraxo, Mohamed El Ansari, Lahcen Koutti. 1-6 [doi]
- Evaluation of User Allocation Techniques in Massive MIMO 5G NetworksChristos Bouras, Damianos Diasakos, Apostolos Gkamas, Vasileios Kokkinos, Philippos Pouyioutas, Nikolaos Prodromos. 1-6 [doi]
- Reconfigurable Intelligent Surfaces-aided Transmissions in a SIMO Network: A Secrecy AnalysisSalma Aboelmagd, Elmehdi Illi, Marwa K. Qaraqe. 1-6 [doi]
- Enhancing Vaccination Strategy Effectiveness in Epidemic Networks: Exploring a New Centrality Measure and Community Detection MethodsLaasri Nadia, Dounia Lotfi, Ahmed Drissi El Maliani. 1-6 [doi]
- IA Applied to IIoT Intrusion Detection: An OverviewAbdelilah Serhane, El-Mehdi Hamzaoui, Khalil Ibrahimi. 1-6 [doi]
- Attack and anomaly detection in IoT Networks using machine learning approachesSalah El Hajla, Ennaji Mahfoud, Yassine Maleh, Soufyane Mounir. 1-7 [doi]
- A non-intrusive multivariate analysis for monitoring inattentive driving based on physiological signals, driver inputs and visual features: A hybrid deep learning approachDauha Elamrani Abou Elassad, Zouhair Elamrani Abou Elassad, Othmane El Meslouhi, Mohamed Ameksa, Hajar Mousannif, El Houssine El Mazoudi. 1-7 [doi]
- Blockchain-based spam detection approachHatim Lakhdar, Fatna Elmendili, Younes El Bouzekri El Idrissi. 1-7 [doi]
- Improving Wireless Communication through Beamwidth Optimization in Reconfigurable Intelligent SurfacesMarriam Sikander, Faran Awais Butt, Jawwad Nasar Chattha, Ijaz Haider Naqvi. 1-5 [doi]
- Comparing Object Tracking Algorithms for Real-Time Applications: Performance Analysis and Implementation StudyFatima ZAhrae Ait Hamou Aadi, Abdelalim Sadiq, Zakia Labd. 1-5 [doi]
- Review of Free Space Optical Communication: Advantages and DisadvantagesHawraa Makki Razaq, Wasan Kadhim Saad. 1-5 [doi]
- Design and Analysis of Intelligent Reflecting Surface for 5G ApplicationsAbdelhadi Ennajih, Azzeddine Sardi, Mohamed Sadik, Jamal Zbitou. 1-5 [doi]
- A Novel Wearable Circular Polarized Antenna Design for Wireless Power Transfer Systems in E-Health ApplicationsIlham Salhane, Mounir Rifi, Hanae Terchoune, Soumaya Elmorabeti. 1-5 [doi]
- Optimizing Indoor Localization Accuracy with Neural Network Performance Metrics and Software-Defined IEEE 802.11az Wi-Fi Set-UpLida Kouhalvandi, Sercan Aygun, Ladislau Matekovits, Farshad Miramirkhani. 1-4 [doi]
- Intelligent Systems Engineering in Open Pit Mines: Intelligent Systems for Mining Fleet ManagementHajar Bnouachir, Meriyem Chergui, Hicham Medromi. 1-6 [doi]
- New Model to Monitor Plant Growth Remotely using ESP32-CAM and Mobile ApplicationKamal Elhattab, Karim Abouelmehdi, Said Elatar. 1-6 [doi]
- Assessing Topic Modeling in Online Forums: A Comparative Study of Hierarchical and Centroid-Based Clustering AlgorithmsIbrahim Bouabdallaoui, Fatima Guerouate, Mohammed Sbihi. 1-7 [doi]
- Traffic Monitoring Using IoT And Lambda ArchitectureMehdi Ait Lhouss, Rachid Bouhouch, Omar Boudhar, Fouad Safiri, Kalid Nafil, Mohammed El Koutbi. 1-7 [doi]
- An Automatic Truncated Mean Approach for PCA In Intrusion Detection SystemsArchi Taha, Mohammed Benattou. 1-6 [doi]
- Cooperative Non-Orthogonal Multiple Access for B5G Wireless Networks: Modeling and SimulationsRidha Alaa Ahmed, Haleema Sadia. 1-6 [doi]
- Performance Analysis of NG-PON2 with DWDM-FSO System with Eight Wavelengths and 80Gbps Data RateHawraa Makki Razaq, Wasan Kadhim Saad. 1-6 [doi]
- Usage of Machine Learning in DDOS Attack DetectionAdilzhan Slyamkhanov, Zhanybek Bozbayev, Ayym Alzhanova, Artur Pan, Temirlan Ramazan, Leila Rzayeva. 1-6 [doi]
- Deep Learning-Based Congestion Forecasting: A Literature Review and FutureMehdi Attioui, Mohamed Lahby. 1-8 [doi]
- FedVANET-TP: Federated Trajectory Prediction Model for VANETsTafsir-Moussa Sakho, Jalel Ben-Othman. 1-6 [doi]
- Performance Analysis of Coded CSOC-Assisted Energy Harvesting AF Dual-hop RF/FSO SystemSouad Labghough, Fouad Ayoub, Faissal El Bouanani, Mostafa Belkasmi, Khalid A. Qaraqe. 1-6 [doi]
- 3D CT Scans for Colorectal Cancer Classification using VGG16 and Data AugmentationKhadija Hicham, Sara Laghmati, Amal Tmiri. 1-4 [doi]
- Exception Analysis of Running Complex and Computation-intensive Deep Learning ModelsRichard Verhoeven, Bram van Berlo, Nirvana Meratnia. 1-7 [doi]
- Enhanced Traffic Management Through Data Mining: Predictive Models for Congestion ReductionIdriss Moumen, Jaafar Abouchabaka, Najat Rafalia. 1-6 [doi]
- Two-Stream nnU-Net: A Novel Architecture for Precise Tumor Segmentation in Medical ImagingChaymae El Mechal, Najiba El Amrani El Idrissi. 1-6 [doi]
- A Distributed Scheme for Optimal Road Intersection ManagementHacène Fouchal, Timothé Kruk, Cyril Rabat. 1-5 [doi]
- Fully Parallel and Reconfigurable Realization of DFT/IDFT using In-Memory ComputingMojtaba Mahdavi. 1-8 [doi]
- Wireless Sensor Network for Water Salinization Monitoring in Irrigation of Vertical FarmingFrancisco Javier Díaz, Ali Ahmad, Sandra Viciano-Tudela, Sandra Sendra, Jaime Lloret 0001. 1-6 [doi]
- A Novel Centrality based Measure for Influential Nodes Detection in Social NetworksNada Bendahman, Dounia Lotfi. 1-7 [doi]
- Combining Deep CNNs and Superpixels for Polyp Segmentation in Colonoscopy ImagesYasmina El Khalfaoui, Brahim Alibouch, Ahmed Fouad El Ouafdi. 1-6 [doi]
- MIMO-NOMA with OSTBC for B5G Cellular Networks with Enhanced Quality of ServiceHaleema Sadia, Hafsa Iqbal, Ridha Alaa Ahmed. 1-6 [doi]
- Maximizing Nano-Sensor Node Coverage using BWO in WNSNsOmer Gulec, Emre Sahin. 1-6 [doi]
- Automatic classification of emails using Deep LearningOuroui Ayoub, Youssef Fakhri, Siham Boulaknadel, Mohamed Amnai. 1-6 [doi]
- Lettuce Leaf Disease Protection and Detection Using Image Processing TechniqueKalid Nafil, Aziza Saufi, Ouafae Hdili, Sara Faqihi, Halima Maghraoui, Abdellatif Kobbane, Mohammed El Koutbi. 1-6 [doi]
- Performance evaluation of MIMO-OFDM system in wireless networkBilal Saoud, Ibraheem Shayea. 1-5 [doi]
- Performance Evaluation of OTFS Under Different Channel Conditions for LEO Satellite DownlinkSenthil Kumaran Devarajalu, Deepak Jose. 1-6 [doi]
- A secure based trust model for Optimized Link State Routing protocol (OLSR)Fatima Lakrami, Mohamed El-Kamili, Najib Elkamoun, Hind Sounni, Ouidad Labouidya. 1-5 [doi]
- Basketball Free Throw Analysis using Object Detection TechniquesMahmoud El Hamlaoui, Mohamed Amine Lahsaini, Sara Helmy Moselhy, Tarik Fissaa, Youness Laghouaouta. 1-6 [doi]
- IoT Integration in Agriculture: Advantages, Challenges, and Future Perspectives: Short surveyAbdulaziz Aborujilah, Abdulaziz Alashbi, Ibrahim Shayea, Abdul Hakim Mohamed, Abdulraqeb Alhammadi, Ayman A. El-Saleh, Abdul-Ahad. 1-7 [doi]
- Enhancing Connectivity Repairing in wireless sensor networks with Void RegionsKarima Bouyahia, Mahfoud Benchaïba, Haroun Benkaouha. 1-6 [doi]
- Literature Review of Handover Decision Algorithms in 5G NetworksHasan Sattar Mohsin, Wasan Kadhim Saad, Ibraheem Shayea. 1-6 [doi]
- Towards reliability analysis of IEEE 802.11p MAC for platooning in a heterogeneous traffic setupM. S. Gayathree, Sreelakshmi Manjunath. 1-7 [doi]
- New Algorithm of Weak Password DetectionAdil Maralbayev, Gabdu-Samad Omar, Meruyert Abdulayeva, Leila Rzayeva, Gaukhar Kalybek, Erasyl Rakhym. 1-6 [doi]
- Improving Accuracy in Cloud Service Provider Ranking: Integrating TOPSIS with CAIQ-based QoS AssessmentZahra Ali, Abdul-Ahad, Ibraheem Shayea, Ivan Miguel Pires. 1-6 [doi]
- Security and Privacy Issues of Implantable PacemakersHiba El Fadili, Tomader Mazri. 1-4 [doi]
- Performance Analysis of Private Blockchain in Mobile Ad-hoc Networks (MANETs)Md Imran Hossain, Murat Tahtali, Ugur Turhan. 1-6 [doi]
- Real-time Tracking of Auditing Process Progress with a Customizable Application for Cybersecurity Standards Compliance: A Case Study on ISO 27001 and TISAXMohamed Zelmati, Zakariae Oulqaid, Abdelmajid Elouadi. 1-7 [doi]
- Ensuring Authenticity and Sustainability in Perfume Production: A Blockchain Solution for the Fragrance Supply ChainMohammad Fayed, Amaan Zubairi, Nidal Nasser, Asmaa Ali, Meryeme Ayache. 1-6 [doi]
- The Influence of Spirituality Perspective on Internal Business Process in Private UniversitiesFahmi Fadhl Al-Hosaini, Naif Mohammed Al-Hada, Mustfa M. A. Mudhish, Abdullah Mahfoud Baadhem, Abdulwadod S. A. Hassan, Ali S. A. Maaodhah, Majid Al-Nabae. 1-6 [doi]
- Socially-Aware Green Distributed Metaverse for Wireless SystemsLatif U. Khan, Mohsen Guizani. 1-6 [doi]
- Automatic Modulation Classification for NLOS 5G Signals with Deep Learning ApproachesMeisam Abdollahi, Ramin Sabzalizadeh, Samaneh Javadinia, Sepideh Mashhadi, Sara Sanati Mehrizi, Amirali Baniasadi. 1-6 [doi]
- Evolution of Image Captioning Models: An OverviewAbdelkrim Saouabe, Merouane Mazar, Said Tkatek, Imad Mourtaji. 1-5 [doi]
- Enhanced SH-CNN: Gender Prediction Based on Convolutional Neural NetworkChaymae Ziani, Abdelalim Sadiq, Khalid Housni. 1-5 [doi]
- A non-zero sum game of a joint radar and communication system and a jammerAndrey Garnaev, Wade Trappe. 1-6 [doi]
- Enhancing Breast Masses Detection and Segmentation: A Novel U-Net-Based ApproachNoura Bentaher, Younes Kabbadj, Mohamed Ben Salah. 1-6 [doi]
- Enhanced Deep Learning Explainability for COVID-19 Diagnosis from Chest X-ray Images by Fusing Texture and Shape FeaturesHouda El Mohamadi, Mohammed El Hassouni. 1-6 [doi]
- K-means-dist: A Novel Approach for Enhanced Cybersecurity Clustering Using Combined Distance MetricsRadi Khaoula, Moughit Mohamed. 1-6 [doi]
- Access Control for Collaboration in Cloud Environment: A Comparative AnalysisMohamed Amine Madani, Abdelmounaim Kerkri. 1-7 [doi]