


default search action
6th WINCOM 2018: Marrakesh, Morocco
- Essaid Sabir, Mohamed Sadik, Amal Tmiri, Rachid El Azouzi, Eitan Altman:
6th International Conference on Wireless Networks and Mobile Communications, WINCOM 2018, Marrakesh, Morocco, October 16-19, 2018. IEEE 2018, ISBN 978-1-5386-7330-0 - Ayoub Jibouni
, Dounia Lotfi
, Mohamed El Marraki, Ahmed Hammouch:
A novel parameter free approach for link prediction. 1-6 - Zainab Ennya, Moulay Youssef Hadi
, Amine Abouaomar
:
Computing Tasks Distribution in Fog Computing: Coalition Game Model. 1-4 - Rajaa Elouafadi, Mohammed Raiss El-Fenni
, Mustapha Benjillali:
A Game Theoretical Approach to D2D Underlaying Downlink NOMA Networks. 1-6 - El Arbi Abdellaoui Alaoui, Khalid Nassiri, Mustapha El Moudden, Joel Jaquet:
On Circulation Efficiency of Message Ferries in Delay Tolerant Networks: DRHT case. 1-8 - Oussama Habachi
, Vahid Meghdadi
, Jean-Pierre Cances:
A Hierarchical Game for Wireless Sensor Network with Wireless Energy Transfer. 1-6 - Abdelmoula Ait Allal, Khalifa Mansouri
, Mohamed Youssfi
, Mohammed Qbadou
:
Reliable and cost-effective communication at high seas, for a safe operation of autonomous ship. 1-8 - Abdellatif Kobbane, Charkaoui Abdelmouttalib:
Graph-Based Computing Resource Allocation for Mobile Blockchain. 1-4 - Abdellah Nabou
, My Driss Laanaoui, Mohammed Ouzzif:
Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3. 1-6 - Marwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim:
IoT Based Tracking System For Supply Chain Management. 1-5 - Roumissa Sahbi, Salim Ghanemi, Ramissa Djouani:
A Network Model for Internet of vehicles based on SDN and Cloud Computing. 1-4 - Salma Ibnalfakih, Essaid Sabir
, Mohamed Sadik
:
Energy-Aware Mode Selection and Power Control in D2D-Enabled HetNets. 1-6 - Fatima Ez-Zaki
, Abdelilah Ghammaz, Hassan Belahrach
:
Multiband Fractal Antenna for Wireless Applications. 1-6 - Mohamed El Amrani, Driss Ait Omar
, Mohamed Baslam
, Brahim Minaoui
:
A Game Theoretic Approach to Optimize Transmission Strategies for Mobile Applications. 1-6 - Anass Lekbich
, Abdelaziz Belfqih
, Chaimae Zedak
, Jamal Boukherouaa, Faissal El Mariami:
A secure wireless control of Remote Terminal Unit using the Internet of Things in smart grids. 1-6 - Zakaria Kerkaou, Mohamed El Ansari, Lhoussaine Masmoudi
:
Fast spatio-temporal stereo matching method for omnidirectional images. 1-6 - Mohamed El Bakkali, Najiba El Amrani El Idrissi, Faisel Em Tubbal
, Gurjot Singh Gaba
:
Optimum design of a tri-band MPA with parasitic elements for CubeSat communications using Genetic Algorithm. 1-4 - Loubna El Amrani, Tomader Mazri, Nabil Hmina
:
The Specific Absorption Rate induced in human organs due Ionizing and Non Ionizing Radiations exposure. 1-4 - Hang Zou, Chao Zhang, Samson Lasaulce, Lucas Saludjian, Patrick Panciatici:
Decision-Oriented Communications: Application to Energy-Efficient Resource Allocation. 1-6 - Saif Islam Bouderba, Najem Moussa:
Impact of green wave traffic light system on V2V communications. 1-6 - Younes Regragui
, Najem Moussa:
Simulation of wireless sensors in collective motion. 1-6 - Secil Ercan
, Marwane Ayaida, Nadhir Messai:
How mobile RSUs can enhance communications in VANETs? 1-5 - Fariea Khalid, Sobia Jangsher
:
Upper Bound of Capacity for a MU-MIMO NOMA in a Two Way Relaying Network. 1-6 - Muhammad Saleem Khan, Sobia Jangsher
:
Reliability Analysis for Peer Selection in D2D Networks. 1-6 - Abla El bekkali
, Mohammed Boulmalf, Mohammad Essaaidi
, Ghita Mezzour:
Securing the Internet of Things (IoT). 1-6 - Mohammed A. G. Al-Sadoon
, Rameez Asif
, Mohammed S. Bin-Melha, Huthaifa A. Obeidat, A. Zweid, James M. Noras, R. A. Abd-Alhameed:
Low Complexity Antenna Array DOA System for Localization Applications. 1-5 - A. C. G. Caldeira, A. P. Almeida:
Harvesting Indoor Available Light for Low-power Wireless Networks. 1-7 - Abdelhafid Elharoussi, Mustapha Benjillali:
Performance Analysis of Uplink Massive MIMO in Inverse-Gamma Shadowing Channels. 1-6 - Stéphane Cédric Koumétio Tékouabou, Walid Cherif, Hassan Silkan
:
Optimizing the prediction of telemarketing target calls by a classification technique. 1-6 - Hayat Jebbar, Sanae El Hassani
, Ahmed El Abbassi
:
PAPR Reduction for 5G Waveforms. 1-6 - Malik Irain, Zoubir Mammeri, Jacques Jorda:
Assessment of Regression-based Techniques for Data Location Verification at Country-Level (Invited Paper). 1-6 - Abdelfatteh Haidine, Abdelhak Aqqal, Aziz Dahbi:
Performance Evaluation of Low-Power Wide Area based on LoRa Technology for Smart Metering. 1-6 - El Bhiri Brahim, Zerououl Rafiqa:
An efficient clustering in Heterogenous Wireless Sensor Networks based on Near Optimal Bi-Partitions. 1-6 - Wenjie Xiong, Chun Shan, Zhaoliang Sun, Qinglei Meng:
Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System. 1-4 - Wissam Abbass, Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih
:
Classifying IoT security risks using Deep Learning algorithms. 1-6 - Marwa Ben Abdessalem
, Amin Zribi, Tadashi Matsumoto, Ammar Bouallegue:
LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay Channel. 1-6 - Mohammed A. G. Al-Sadoon
, A. Zweid, Rameez Asif
, Mohammed S. Bin-Melha, Nabeel Abduljabbar, James M. Noras, R. A. Abd-Alhameed:
A Minimum Variance Noise Algorithm for 2D and 3D Direction Estimation in MIMO Wireless Communication Systems. 1-5 - Hafsa Benaddi
, Khalil Ibrahimi
, Abderrahim Benslimane:
Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN. 1-6 - Asma Iman Kouachi, Somia Sahraoui
, Abdelmalik Bachir:
Per Packet Flow Anonymization in 6LoWPAN IoT Networks. 1-7 - Aiman Nait Abbou, Youssef Baddi
, Abderrahim Hasbi
:
Software Defined Networks in Internet of Things Integration Security: Challenges and Solutions. 1-6 - Ramissa Djouani, Karim Djouani
, Fateh Boutekkouk, Roumissa Sahbi:
A Security Proposal for IoT integrated with SDN and Cloud. 1-5 - Heena Rathore, Mohsen Guizani, Amr Mohamed
:
Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks. 1-6 - Sara Handouf, Essaid Sabir
, Mohammed Sadik
:
A Leasing-based Spectrum Sharing Framework for Cognitive Radio Networks. 1-5 - Khalid E. L. Khadiri, Ouidad Labouidya, Najib Elkamoun, Rachid Hilal:
Comparative Study Between Dynamic IPv6 Routing Protocols of Distance Vectors and Link States. 1-6 - Hamid Nouasria, Mohamed Et-tolba
:
An Optimal Sparse Signals Recovery Using Constraint Programming. 1-6 - Abdelali Hadir, Khalid Zine-Dine
, Mohamed Bakhouya
, Jamal El Kafi, A. Tmiri:
Localization Algorithms for Mobile Nodes for Three-Dimentional WSNs. 1-8 - Abla Bedoui, Mohamed Et-tolba
:
A novel Turbo ICI cancellation technique for FBMC-OQAM trough a doubly selective channel. 1-6 - Anas Fedoul, Mustapha Benjillali:
Soft Metrics Performance Analysis for BICM-Based V2X Communication Systems over Rayleigh and Weibull Fading Channels. 1-5 - Mariya Ouaissa
, Abdallah Rhattoy, Idriss Chana
:
New Security Level of Authentication and Key Agreement Protocol for the IoT on LTE Mobile Networks. 1-6 - Wafae Ouali Alami, Essaid Sabir
, Lakksir Brahim:
A H-Slotted Patch Antenna Array for 79 GHz Automotive Radar Sensors. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.