


default search action
Mohamed El Marraki
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j8]Raihana Mokhlissi, Dounia Lotfi
, Mohamed El Marraki, Joyati C. Debnath:
The structural properties and the spanning trees entropy of the generalized Fractal Scale-Free Lattice. J. Complex Networks 8(2) (2020) - [j7]Khawla Asmi
, Dounia Lotfi
, Mohamed El Marraki:
Overlapping community detection based on the union of all maximum spanning trees. Libr. Hi Tech 38(2): 276-292 (2020) - [j6]Ayoub Jibouni
, Dounia Lotfi
, Mohamed El Marraki, Ahmed Hammouch:
Accurate link prediction method based on path length between a pair of unlinked nodes and their degree. Soc. Netw. Anal. Min. 10(1): 9 (2020)
2010 – 2019
- 2019
- [c23]Khawla Asmi, Dounia Lotfi
, Mohamed El Marraki:
A new local algorithm for overlapping community detection based on clustering coefficient and common neighbor similarity. ArabWIC 2019: 7:1-7:6 - 2018
- [j5]Imane Taghbalout, Fadoua Ataa-Allah, Mohamed El Marraki:
Towards UNL-based machine translation for Moroccan Amazigh language. Int. J. Comput. Sci. Eng. 17(1): 43-54 (2018) - [j4]Raihana Mokhlissi
, Dounia Lotfi
, Joyati C. Debnath, Mohamed El Marraki, Noussaima E. L. Khattabi:
The Evaluation of the Number and the Entropy of Spanning Trees on Generalized Small-World Networks. J. Appl. Math. 2018: 1017308:1-1017308:7 (2018) - [c22]Meryam Zeryouh, Mohamed El Marraki, Mohamed Essalih
:
A Measure for Quantifying the Topological Structure of Some Networks. NETYS 2018: 371-381 - [c21]Ayoub Jibouni
, Dounia Lotfi
, Mohamed El Marraki, Ahmed Hammouch:
A novel parameter free approach for link prediction. WINCOM 2018: 1-6 - 2017
- [j3]Abdelali Saidi
, Elmehdi Bendriss, Ali Kartit, Mohamed El Marraki:
Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing. Int. J. Interact. Multim. Artif. Intell. 4(3): 75-78 (2017) - [j2]Khawla Asmi
, Dounia Lotfi
, Mohamed El Marraki:
Large-scale community detection based on a new dissimilarity measure. Soc. Netw. Anal. Min. 7(1): 17:1-17:10 (2017) - [c20]Meryam Zeryouh, Mohamed El Marraki, Mohamed Essalih
:
Studying the Structure of Some Networks Using Certain Topological Indices. COMPLEX NETWORKS 2017: 543-554 - [c19]Raihana Mokhlissi
, Dounia Lotfi
, Joyati C. Debnath, Mohamed El Marraki:
An Innovative Combinatorial Approach for the Spanning Tree Entropy in Flower Network. NETYS 2017: 3-14 - 2016
- [c18]Hajar Sahbani, Mohamed El Marraki:
Robustness study in closed social networks using spanning tree approach. CIST 2016: 100-103 - [c17]Raihana Mokhlissi
, Dounia Lotfi
, Joyati C. Debnath, Mohamed El Marraki:
Complexity Analysis of "Small-World Networks" and Spanning Tree Entropy. COMPLEX NETWORKS 2016: 197-208 - [c16]Fouad Yakoubi
, Mohamed El Marraki, Noussaima El Khattabi:
The number of spanning trees in corona edge product of tree and S-linear chain map. ICMCS 2016: 50-53 - [c15]Meryam Zeryouh, Mohamed El Marraki, Mohamed Essalih
:
On the Terminal Wiener index of networks. ICMCS 2016: 533-536 - [c14]Hajar Sahbani, Mohamed El Marraki:
Complexity of closed networks based on spanning tree approach. ICMCS 2016: 554-557 - [c13]Fouad Yakoubi
, Mohamed El Marraki:
Corona Product Complexity of Planar Graph and S-chain Graph. NETYS 2016: 361-366 - [c12]Khawla Asmi
, Dounia Lotfi
, Mohamed El Marraki:
An approach based on the clustering coefficient for the community detection in social networks. SSIC 2016: 1-8 - [c11]Khawla Asmi
, Dounia Lotfi
, Mohamed El Marraki:
A novel approach based on the minimum spanning tree to discover communities in social networks. WINCOM 2016: 286-290 - 2015
- [j1]Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki, Driss Aboutajdine:
Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms. J. Inf. Process. Syst. 11(4): 495-508 (2015) - [c10]Raihana Mokhlissi
, Dounia Lotfi
, Mohamed El Marraki:
Spanning tree based method for a social network analysis. AICCSA 2015: 1-8 - [c9]Imane Taghablout, Fadoua Ataa-Allah
, Mohamed El Marraki:
Amazigh verb in the Universal Networking Language. AICCSA 2015: 1-4 - [c8]Hajar Sahbani, Mohamed El Marraki:
Reliability of the Closed-Chain-Fan Social Network. FiCloud 2015: 722-725 - [c7]Ali Azougaghe, Zaid Kartit, Mustapha Hedabou, Mostafa Belkasmi
, Mohamed El Marraki:
An efficient algorithm for data security in Cloud storage. ISDA 2015: 421-427 - [c6]Zaid Kartit, Ali Azougaghe, Hamza Kamal Idrissi
, Mohamed El Marraki, Mustapha Hedabou, Mostafa Belkasmi
, Ali Kartit:
Applying Encryption Algorithm for Data Security in Cloud Storage. UNet 2015: 141-154 - 2014
- [c5]Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki, Driss Aboutajdine:
Medical image watermarking for copyright protection based on Visual Cryptography. ICMCS 2014: 93-98 - [c4]Dounia Lotfi
, Mohamed El Marraki, Driss Aboutajdine:
Spanning trees in a closed chain of planar networks. ICMCS 2014: 1229-1234 - 2013
- [c3]Meryem Benyoussef, Samira Mabtoul, Mohamed El Marraki, Driss Aboutajdine:
Blind Invisible Watermarking Technique in DT-CWT Domain Using Visual Cryptography. ICIAP (1) 2013: 813-822 - 2012
- [c2]Mohamed Essalih
, Mohamed El Marraki, Driss Aboutajdine:
The two first levels of Spider's Web planar graph and The Network planar graph. ICMCS 2012: 57-60 - [c1]Dounia Lotfi
, Mohamed El Marraki, Driss Aboutajdine:
Spanning Trees Structures of Communications Networks. IP&C 2012: 283-290
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint