Abstract is missing.
- A Bibliometric Analysis of Machine Learning in Maritime Industry as Part of Industry 4.0/5.0Ayoub El Idrissi, Abdelfatteh Haidine, Mohamed Hanine. 1-7 [doi]
- A Multi-Layered Architecture for AI-Enhanced Learning in the Edu-MetaverseChaimae Illi, Azeddine Elhassouny. 1-6 [doi]
- Review of AI Methods for Intelligent Photovoltaic Systems in Smart Grids: Forecasting, Sizing, MPPT, and Fault DiagnosisOumayma Lanaya, Hajar El Karch, Youssef Natij, Meriem Elatik, Abdelmounaim Belaarbi, Abdelkader Mezouari. 1-4 [doi]
- Alignment-Free DNA Sequence Clustering Using Deep Siamese BiLSTM and Attention MechanismsAdnane Touiyate, Tarik Boujiha, Chaïmaâ Kissi, Idriss Moumen. 1-6 [doi]
- Seizure Detection Using Reduced Temporal EEG Channels: A Performance-Driven ApproachMohsin Khalil, Raheel Asif, Muhammad Amir Tahir, Muhammad Nasar Jamal. 1-6 [doi]
- Performance Modeling of Recursive Networks with PEPA: Quantitative Insights and Scalability ChallengesPeyman Teymoori, Toktam Ramezanifarkhani. 1-8 [doi]
- Dual Parameters of Influence: Unveiling a Novel Centrality Measure for Social Media NetworksNada Bendahman, Dounia Lotfi. 1-6 [doi]
- Hierarchical Federated Learning for Crop Yield Prediction in Smart Agricultural Production SystemsAnas Abouaomar, Mohammed El Hanjri, Abdellatif Kobbane, Anis Laouiti, Khalid Nafil. 1-6 [doi]
- An Intelligent Intrusion Detection Framework for IoT Using Active Learning and Metaheuristic OptimizationAymin Javed, Nadeem Javaid, Zeeshan Ali 0006, Nidal Nasser, Asmaa Ali. 1-6 [doi]
- Optimizing Firewall Policy Rule Ordering Using Discrete Cuckoo Search AlgorithmFadwa Bezzazi, Dounia Lotfi. 1-6 [doi]
- Where 6G Stands Today: Evolution, Enablers, and Research GapsSalma Tika, Abdelkrim Haqiq, Essaid Sabir, Elmahdi Driouch. 1-8 [doi]
- Hybrid Deep Learning for Intrusion Detection in IIoT Networks: A CNN-LSTM-Attention ApproachDouaaw El Achhab, Meryeme Ayache, Ait Oualhaj Omar. 1-6 [doi]
- Zero-Shot YOLOv8 Descriptors for Low-Latency Object TrackingAyoub El-Alami, Younes Nadir, Khalifa Mansouri. 1-5 [doi]
- AgriTwin-Sim: An Interactive Digital Twin Framework for AI-Driven Smart FarmingYassine Ben-Aboud, Abdellatif Kobbane. 1-6 [doi]
- Approaches of Deep Learning for Diagnostic use on Cone Beam CT Imaging in Dentistry: A ReviewJamila El Moubaraki, Omar Boutkhoum, Hamid El Byad. 1-8 [doi]
- No-Reference Image Quality Assessment Using FPLBP Features with Laplacian of GaussianYassine Benhlal, Khadija Marzagui, Abdelkaher Ait Abdelouahad, Abdellatif Dahmouni. 1-6 [doi]
- Comparative Radiation Analysis of Vertical and Circular Disk Monopole Antennas for 433 MHz LoRa IoT Applications Using Method of MomentsJinfeng Li, Haolin Zhou. 1-6 [doi]
- NLP-Assisted Requirements Traceability Pipeline: Multimedia System use CaseSaida Haidrar, Adil Anwar, Leila Amdah, Hajar Elmaghraoui, Yasmine Ghazlane, Hafsa Ouchra. 1-6 [doi]
- On Convolutional Neural Networks for Mini UAV SwarmsRyan McCarthy, Noor Ahmed. 1-6 [doi]
- Adaptive Fuzzy Energy-Efficient Clustering and Energy Optimization Protocol for Underwater Wireless Sensors NetworksHamza Zradgui, Khalil Ibrahimi, Mohamed El-Kamili. 1-6 [doi]
- Reinforced-2GSeg: A Dual-Generator cGAN Enhanced with Channel and Spatial Attention for Accurate and Resource-Efficient Medical Image SegmentationTarik Benabbou, Aïcha Sahel, Abdelmajid Badri, Ilham El Mourabit. 1-6 [doi]
- Tifinagh Handwritten Word Recognition Using CNN AlgorithmLaghzil Said, Lahcen Niharmine, Ahmed Azouaoui, Moulay Youssef Hadi. 1-5 [doi]
- LSTM-Based Channel Estimation for OFDM SystemsAbdulaziz Alatawi, Hamid R. Sadjadpour, Zouheir Rezki. 1-5 [doi]
- Securing Microservices: Risk-Adaptive gRPC Access Control PoliciesRami Alboqmi, Rose F. Gamble. 1-6 [doi]
- A Robust Optimal Patient Distribution Enforced by BlockchainAhmed Khoumsi. 1-8 [doi]
- Diagnosis of Gallbladder Diseases Using Artificial Intelligence: A Comprehensive SurveyJawaher Badr Alotibi, Samia Dardouri. 1-5 [doi]
- AttriGen: Automated Multi-Attribute Annotation for Blood Cell DatasetsYoussef Sabiri, Walid Houmaidi, Fatima Zahra Iguenfer, Amine Abouaomar. 1-6 [doi]
- LRAE: A Low-Rank Autoencoder for Real-Time Efficient CAN Bus Intrusion DetectionNadim Ahmed, Md. Ashraful Babu, Md. Manir Hossain Mollah, Md. Mortuza Ahmmed, Md. Mostafizur Rahman, Mufti Mahmud. 1-6 [doi]
- A Flexible Architecture for Securing Transactions and Data Flows in Smart Home IoTAli Bouchareb, Boucif Amar Bensaber, Ismaïl Biskri. 1-8 [doi]
- Toward Dynamic Risk Assessment: Machine Learning and LLMs in Software Vulnerability PrioritizationMohammed Moustaid, Soufiane Hamida, Abdelaziz Daaif, Bouchaib Cherradi. 1-6 [doi]
- EHKEA: A Lightweight and Secure Authentication Protocol for Healthcare Iot Systems in 5G Networks with Enhanced Resistance to Emerging ThreatsYounes-Amine Loutfi, Marc Frappier, Brahim El Bhiri, Pierre-Martin Tardif, Mohammed Raiss El-Fenni. 1-6 [doi]
- Accelerating Cerebral Diagnostics with BrainFusion: A Comprehensive MRI Tumor FrameworkWalid Houmaidi, Youssef Sabiri, Salmane El Mansour Billah, Amine Abouaomar. 1-6 [doi]
- AI-Enhanced Routing Optimization for SDN/NFV Architectures in Large-Scale IoT NetworksHatim Jaadouni, Samya Bouhaddour, Imane Daha Belghiti, Chaimae Saadi, Habiba Chaoui. 1-6 [doi]
- MALOS-IoT: A Multi-Stage Advance Learning and Optimization Framework for IoT Intrusion DetectionMuhammad Hasnain, Nadeem Javaid, Nidal Nasser, AbdulAziz Al-Helali. 1-6 [doi]
- S-Cup: A Security Protocol for Self-Reconfiguration by Clustering on Programmable Matter Based Modular RobotsYoussou Faye, Abdallah Makhoul, Serigne Mbacké Diene, Mohammed Ouzzif, Cheikhou Oumar Sow. 1-8 [doi]
- Advancements in Leaf Recognition Technologies: a Comprehensive ReviewKhaled Suwais, Sally Almanasra. 1-6 [doi]
- Intrusion Detection in IoT Networks Using Hybrid Feature SelectionAya El Hjajbi, Archi Taha, Mohammed Benattou. 1-6 [doi]
- Blockchain-Enabled Smart Tourism: Key Benefits and Systemic Comparison with Centralized ModelsAbdelaziz Boukhalfa, Meryem Lasaad, Lamya Benaddi, Abdeslam Jakimi, Moulay Youssef Hadi. 1-7 [doi]
- Knowledge Distillation with Enhanced Lightweight STGCN for Gait Disorders RecognitionZakariae Zrimek, Youssef Mourchid, Mohammed El Hassouni. 1-6 [doi]
- Enhancing Security and Anomaly Detection in IoMT Systems Using Autoencoders and BlockchainAnass Rghioui, Mariam Cherrabi. 1-6 [doi]
- W-RPC: A Weighted Reducer Placement and Coflow Scheduling SchemeYoussef Oubaydallah, Khalil Ibrahimi, Rachid El Azouzi, Hatim Ousilmaati. 1-7 [doi]
- Zero Knowledge Proof in Vehicular NetworksMohcine Baalla, Driss Bouzidi. 1-6 [doi]
- IoT Applications Management Approach for Universal Container-Based Gateway Using WebservicesAbdulkadir Dauda, Olivier Flauzac, Florent Nolot. 1-6 [doi]
- Federated Learning for DDoS Attack Detection in SDN: A Privacy-Preserving ApproachHind Amrani, Jamal Elhachmi, Abdellatif Kobbane. 1-6 [doi]
- vChainnet: Accurate and Scalable End-to-End Slice Modeling for 5G and Beyond NetworksHadj Ahmed Chikh Dahmane, Sherif Mostafa, Moustafa Youssef, Muhammad Sulaiman, Raouf Boutaba. 1-6 [doi]
- EcoFL: Resource Allocation for Energy-Efficient Federated Learning in Multi-RAT ORAN NetworksAbdelaziz Salama, Mohammed M. H. Qazzaz, Syed Danial Ali Shah, Maryam Hafeez, Syed Ali Raza Zaidi, Hamed Ahmadi. 1-7 [doi]
- Semantics Driven Multi Agent Artificial Intelligence Framework for Adaptive Resource Management in SixG Mobile Edge NetworksNada M. Sallam, Samah Osman. 1-6 [doi]
- Performance Evaluation of MQTT and ZeroMQ Messaging Protocols for UAV ApplicationsYufei Liu, Noor Ahmed. 1-6 [doi]
- Financial Factor Returns and Portfolio Optimization: From Forecasting to Investment Strategy Using Temporal Fusion Transformers and Genetic AlgorithmsEnnaciri Hicham, Farissi Youssra, Yasser Elouargui, Meriyem Chergui, Imtiaz Adam. 1-6 [doi]
- Long-Term Hybrid MRC with Imperfect CSI for Distributed MU-MIMO SystemsShunrui Huang, Shuang Li 0012, Peter J. Smith 0001, Pawel A. Dmochowski, Longxiang Guo, Yuxiang Zhang, Wei Ge. 1-6 [doi]
- Hybrid IDS for IoT Approach Combining Deep Extraction and Robust ClassificationNouhaila Sennouni, Jamal Elhachmi, Abdellatif Kobbane, Khaoula Oulidi Omali. 1-6 [doi]
- MDP-Based Modeling of TSN Switches Under Stochastic Flow BehaviorsMeihan Lin, Cailian Chen, Yanzhou Zhang, Lynda Mokdad, Mohamad Assaad, Jalel Ben-Othman. 1-6 [doi]
- Gain Improvement of a Monopole Antenna for Wimax /Wlan 5G/6G Applications Using Amc TechniqueTarik El Arrouch, Najiba El Amrani El Idrissi, Chaibi Mohamed, Sudipta Das, Errajraji Karim. 1-7 [doi]
- ECHO: An Explainable Cooperative Highway Operator for Human-Centric ADASMoad Dehbi, Mohamed Amine Bouzaidi Tiali, Yassin El Hillali, Atika Rivenq, Marwane Ayaida. 1-7 [doi]
- Combating Neural Network Adversaries in Autonomous Vehicles: A 6G-Ready Defense FrameworkMohammad J. Akhtar, Rishabh Jain, Iqra Batool, Mostafa M. Fouda, Mohamed I. Ibrahem, Sherief Hashima, Zubair Md Fadlullah. 1-6 [doi]
- Modeling and Automated Code Generation of the Backend of Tourism ApplicationsAdnane Souha, Charaf Ouaddi, Lamya Benaddi, Abdeslam Jakimi. 1-6 [doi]
- Advanced Self-Supervised Learning for Enhanced Heart Disease PredictionNesrine Atitallah, Feras Dalou, Bandar Ali Al-Rami Al-Ghamdi. 1-7 [doi]
- Hybrid Malware Classification using Static and Dynamic Features with Machine LearningMohammed Ibrahim El-Hajj. 1-8 [doi]
- Bridging Digital Divide for Participants of Videoconferencing Sessions with Unequal Access to Mobile Internet: A MEC-Based ApproachBernard Armel Sanou, D. O. Abdoul Fatas Bamogo, Pasteur Poda. 1-6 [doi]
- Designing Personas for Business AI AgentsAki Nagano. 1-6 [doi]
- OASIS: Optimized Active Sampling for Intrusion Detection in IoT SystemsAymin Javed, Nadeem Javaid, Zeeshan Ali 0006, Nidal Nasser. 1-6 [doi]
- Design of a Solar-Powered Automated Dip Spray System for Small Stock Farmers in Remote Areas in Developing CountriesKelebaone Tsamaase, Sajid Mubashir Sheikh, Theo Motlhatlhedi, Thabang Seeketso, Karabo L. Sithole. 1-6 [doi]
- Trust Verification in Connected Vehicles Using Unsupervised Variational AutoencoderRamzi Boutahala, Hacène Fouchal, Marwane Ayaida, Shiwen Mao. 1-6 [doi]
- The Effectiveness of Prompt Engineering for Arabic Aspect Category Polarity AnalysisLachhab Youssef, Elhoussine Ziyati. 1-6 [doi]
- UAV-Assisted Surface Hole Detection and Volume Estimation for Construction Site MonitoringSabella Millicent Sefho, Sajid Mubashir Sheikh, Ali Akbar Firoozi. 1-6 [doi]
- Towards Transparent IoT Malware Detection: A ML/DL and XAI-Based Multi-Class Classification ApproachMohamed Elsersy, Ahmed AbdelWahab. 1-8 [doi]
- Comparative Analysis of Series YOLO Models for Loose Fruits Palm Oil Detection: A Comprehensive Performance EvaluationElly Warni, Indrabayu, Andani Achmad. 1-6 [doi]
- TRCP-SSG: A Tamper-Resilient Cryptographic Protocol for Secure Smart GridsNabeil Eltayieb, Majdi Abdellatief, Samah Mohamed Osman, Rashad Elhabob. 1-7 [doi]
- A Multi-Agent DDQN-Based Joint Spectral and Energy-Efficient Resource Allocation in D2D-Assisted Heterogeneous 6G NetworksHafiz Muhammad Fahad Noman, Effariza Hanafi, Kaharudin Dimyati, Kamarul Ariffin Noordin, Atef Abdrabou. 1-6 [doi]
- Application of Blockchain Technology in International Maritime Logistics: Case of Smart Bill of LadingAbdelhadi Rachad, Lotfi Gaiz, Khalid Bouragba, Mohammed Ouzzif. 1-6 [doi]
- Custom Image-To-Graph Transformation Strategies for Object Detection with GATs on the KITTI DatasetRabab Benfouina, Ahmed Drissi El Maliani. 1-6 [doi]
- CodeWisp: AST Guided Retrieval Augmented Generation for Code Generation and CompletionHamza El Atrassi, Yasmina El Idrissi, Yahya Benkaouz. 1-6 [doi]
- A Zone-Based LoRa Deployment for Agriculture Area MonitoringEl Hadji Malick Ndoye, Ousmane Diallo, Malaw Ndiaye, Mohamed El-Kamili. 1-6 [doi]
- Device- and Location-Aware Client Clustering for Heterogeneous Federated LearningMaryam Ben Driss, Essaid Sabir. 1-6 [doi]
- A Hybrid Approach for Threat Detection in Social Networks Using Graph Metrics and GANsHajar Sahbani, Mouad Assadi, Najwa Rhefrali, Yassine Inbach, Mourad Ouadou. 1-5 [doi]
- ML-Based UAV Routing with Dynamic Geofencing Using 5G NEF and CAMARA APIsWassim Kribaa, Miloud Bagaa, Ibrahim Afolabi, Adlen Ksentini, Mohammed S. Elmusrati, Petri Välisuo. 1-8 [doi]
- From Structure to Strength: A Deep Learning Approach to Edge Weighting in Graph-Based Community DetectionEl Ouatiq Meriem, Abdelkaher Ait Abdelouahad, Abdellatif Dahmouni. 1-6 [doi]
- Cyberattack Detection in Multi-Agent SystemRawaa Dkhil, Boumedyen Boussaid, Ahmed Zouinkhi, Mohamed Djemai. 1-6 [doi]
- Parametric Analysis of a Rectangular Microstrip Antenna Array Resonating at 5.8 GHz for a Microwave Power Transfer SystemIlham Salhane, Hanae Terchoune, Mounir Rifi. 1-5 [doi]
- Performance and Security in AI-Driven mHealth: A Comparative Evaluation of PostgreSQL, MongoDB, and Firebase for Endometriosis ManagementManal Ed-Daoudi, Karima Moumane, Zineb Mouman, Ibtissam AIT Lakhal, Farha Oudaoud. 1-7 [doi]
- Towards Proactive Cybersecurity in Smart Grids: Behavioral Advanced Persistent Threat Detection via Adversarial and Autoencoder ArchitecturesLahcen Hassine, Yassine Loukili, Hasna Chaibi, Younes Ledmaoui, Rachid Saadane, Abdellah Chehri. 1-6 [doi]
- Real-Time IoT Intrusion Detection using Deep Learning with Uncertainty and Optimization MechanismHira Khan, Nadeem Javaid, Asmaa Ali, Nidal Nasser, AbdulAziz Al-Helali. 1-7 [doi]
- A Novel Approach to Test Case Generation in Software Testing Using Pre-Trained Large Language ModelsMoughit Imane, Hafidi Imad, Najib Mouhassine, Moughit Mohamed. 1-7 [doi]
- Cyberattack Detection in a Robotic Network Using the LPV Kalman Filter ApproachRim Hamdaoui, Rawaa Dkhil, Abdullah Shawan, Boumedyen Boussaid, Mohamed Djemai. 1-6 [doi]
- Ranking Large Language Models with Human Preferences: A Game-Theoretic and Bayesian Comparative StudyAdil Haouas, Abdellatif Kobbane, Hamidou Tembine. 1-6 [doi]
- Knowledge Distillation or Efficient Attention? A Systematic Benchmark of Compact Transformers for ESG Text ClassificationYasser Elouargui, Abdellatif Sassioui, Meriyem Chergui, Rachid Benouini, El Mehdi Benyoussef, Mohamed El-Kamili, Mohamed Ouzzif. 1-6 [doi]
- Compact Low SAR X-Ku Band Planar Inverted F Antenna for Wearable ApplicationSahar Saleh, Tale Saeidi, Nick F. Timmons, Faroq Razzaz. 1-5 [doi]
- A Unified Framework for Decentralized Identity and Trust Management in IoT Using Self-Sovereign Identity and IOTAAssiya Akli, Khalid Chougdali. 1-5 [doi]
- A Novel Hybrid XGB-RF BlendStack Model for Traffic Flow PredictionIdriss Moumen, Adil el Makrani, Najat Rafalia, Jaafar Abouchabaka. 1-7 [doi]
- Graph-Based Analysis of Brain Connectivity Alterations Induced by TumorsFatiha Lamaallaoui, Sara Laghmati, Dounia Lotfi. 1-6 [doi]
- Credit Card Fraud Detection Model Based on Explainable Tabnet-Based Feature SelectionKarima El Hachimi, Ghizlane Orhanou, Lahoucine Ballihi. 1-7 [doi]
- An Integrated Mobile Application with Tangible Assistive Device for Braille Quranic StudiesDahlila Putri Dahnil, Maryati Mohd Yusof, Nurhidayah Bahar, Meng Chun Lam. 1-8 [doi]
- UAV-Assisted Federated Learning: Elevating Decentralized Training to Optimal HeightsAli Mohammad Hayajneh, Maryam Hafeez, Abdelaziz Salama, Syed Ali Raza Zaidi, Desmond C. McLernon. 1-6 [doi]
- Optimizing Falcon-Based Post-Quantum Blockchain Performance Through Compression IntegrationDahhak Hajar, Nadia Afifi, Imane Hilal. 1-6 [doi]
- Reconfigurable Ring-Enhanced Circular Patch Antenna for 5G and Dual-Band WiFi ApplicationsNouhayla El Anzoul, Younes Karfa Bekali, Khalid Minaoui. 1-6 [doi]
- A Hybrid Semi-Supervised Learning Approach Based Dimensionality Reduction for Emerging IoT Cyber Attack AnalysisYoussra Baja, Khalid Chougdali. 1-8 [doi]
- Boosting IoT Intrusion Detection with Hybrid Federated LearningSalah El Hajla, El Mahfoud Ennaji, Yassine Maleh, Soufyane Mounir. 1-6 [doi]
- EYE-DEX: Eye Disease Detection and EXplanation SystemYoussef Sabiri, Walid Houmaidi, Amine Abouaomar. 1-6 [doi]
- AI-Driven Diabetes Management: A Retrieval-Augmented Conversational ApproachAnass Bengmah, Abdelhakim Khaouiti, Mahmoud El Hamlaoui, Rdouan Faizi, Bouchaib Bounabat. 1-6 [doi]
- Mathematical Modeling and Metaheuristic Optimization of IoT Task Scheduling in Distributed Flow Shop Edge NetworksAchraf Sayah, Said Aqil, Mohamed Lahby. 1-6 [doi]
- Federated Learning Meets Cybersecurity: Aggregation Strategies Using UNSW-NB15 DatasetOumaima Ennasri, Iyad Lahsen Cherif, Omar Ait Oualhaj, Abdelah Najid. 1-6 [doi]
- Real-Time Sybil Attack Detection in Vehicular Networks Using Simulation-Based Machine LearningWasim A. Ali, Mohsen S. Alsaadi, Michele Roccotelli, Agostino Marcello Mangini, Maria Pia Fanti. 1-6 [doi]
- Leveraging Transformer-Based Models for Cyberbullying Detection in the Moroccan Arabic DialectHind Laachari, Abdellatif Kobbane, Hamidou Tembine. 1-6 [doi]
- LiteMixer: Scalable, Low-Overhead Multi-Scale Mixing for Time Series ForecastingIssam Ait Yahia, Abdelkader El Mahdaouy, Soufiane Oualil, Ismail Berrada. 1-7 [doi]
- TransUNet++: A Multiscale CNN-Transformer Hybrid Framework for Multi-Modal Brain Tumor SegmentationChaymae El Mechal, Najiba El Amrani El Idrissi, Loubna Mazgouti, Fatima-Zahra Ammor. 1-6 [doi]
- Reinforcement Learning for Hemodialysis Management: Framework, Simulation, and EvaluationAkkaoui Achraf, Wafaa Dachry, Zahidi Yassine, Mohamed El Moufid, Hicham Medromi, Gziri Hassan. 1-6 [doi]
- Early UAV Motor-Fault Prediction Using Classical Machine Learning on RflyMADAbdelilah Zadid, Soufiane Hamida, Amal Tmiri, Oumaima Majdoubi, Bouchaib Cherradi. 1-6 [doi]
- A Hybrid CNN-LSTM Architecture for Multiclass Intrusion Detection in IoT NetworksMehdi Moucharraf, Mohammed Ridouani, Fatima Salahdine, Naima Kaabouch. 1-7 [doi]
- Impact of RIS Orientation on Throughput in UAV-Assisted Wireless SystemsZawar Hussain, Faran Awais Butt, Ali Hussein Muqaibel, Saleh Ahmed Alawsh, Ijaz Haider Naqvi. 1-5 [doi]
- Optimized Threshold Selection for Client Participation in Iot-Based Federated LearningMoncef Zarrouk, Faissal El Bouanani, Zakaria El Allali, Fouad Ayoub. 1-5 [doi]
- Enhanced Cooperative UAV Swarm Search via LoPSO Integration and Adaptive Sequential Stopping StrategyHassan Saadaoui, Faissal El Bouanani, Karim Abouelmehdi. 1-7 [doi]
- Decentralized Privacy-Preserving Federated Learning Using Additive Secret SharingJaouhara Bouamama, Yahya Benkaouz, Mohammed Ouzzif. 1-6 [doi]
- A Strategy of Guaranteed Information Freshness for Several Receivers Under JammingAndrey Garnaev, Wade Trappe. 1-6 [doi]
- Hybrid Deep Reinforcement Learning for Joint Resource Allocation in Multi-Active RIS-Aided Uplink CommunicationsMohamed M. H. Shalma, Engy Aly Maher, Ahmed El-Mahdy 0001. 1-6 [doi]
- Impact of Interference on the Performance of Integrated Sensing and Backscatter CommunicationsKhaled Humaid Altuwairgi, Abdulkarim Al Hanif, Khairi Ashour Hamdi. 1-5 [doi]
- A Comparative Analysis of Edge Computing and Fog Computing in Decentralized Networks: Performance and ScalabilityAdnan A. Hnaif. 1-5 [doi]
- PFANS: An Intelligent 6G Framework for Dynamic Autonomous Vehicle LearningIqra Batool, Mostafa M. Fouda, Mohamed I. Ibrahem, Muhammad Ismail 0001, Sherief Hashima, Zubair Md Fadlullah. 1-6 [doi]
- Investigating Cyber Attacks on Linux: A Lightweight Forensic ToolkitWiâme Bouhali, Elmostafa Belmekki, Mostafa Bellafkih. 1-7 [doi]
- A SVM-GWO-Based Prediction Method in a Smart Home with a Security-Conscious Data ModelMarran Al Qwaid. 1-8 [doi]