


default search action
6th WINCOM 2018: Marrakesh, Morocco
- Essaid Sabir, Mohamed Sadik, Amal Tmiri, Rachid El Azouzi, Eitan Altman:

6th International Conference on Wireless Networks and Mobile Communications, WINCOM 2018, Marrakesh, Morocco, October 16-19, 2018. IEEE 2018, ISBN 978-1-5386-7330-0 - Ayoub Jibouni

, Dounia Lotfi
, Mohamed El Marraki, Ahmed Hammouch:
A novel parameter free approach for link prediction. 1-6 - Zainab Ennya, Moulay Youssef Hadi

, Amine Abouaomar
:
Computing Tasks Distribution in Fog Computing: Coalition Game Model. 1-4 - Rajaa Elouafadi, Mohammed Raiss El-Fenni

, Mustapha Benjillali:
A Game Theoretical Approach to D2D Underlaying Downlink NOMA Networks. 1-6 - El Arbi Abdellaoui Alaoui, Khalid Nassiri, Mustapha El Moudden, Joel Jaquet:

On Circulation Efficiency of Message Ferries in Delay Tolerant Networks: DRHT case. 1-8 - Oussama Habachi

, Vahid Meghdadi
, Jean-Pierre Cances:
A Hierarchical Game for Wireless Sensor Network with Wireless Energy Transfer. 1-6 - Abdelmoula Ait Allal, Khalifa Mansouri

, Mohamed Youssfi
, Mohammed Qbadou
:
Reliable and cost-effective communication at high seas, for a safe operation of autonomous ship. 1-8 - Abdellatif Kobbane, Charkaoui Abdelmouttalib:

Graph-Based Computing Resource Allocation for Mobile Blockchain. 1-4 - Abdellah Nabou

, My Driss Laanaoui, Mohammed Ouzzif:
Evaluation of MANET Routing Protocols under Black Hole Attack Using AODV and OLSR in NS3. 1-6 - Marwa Chamekh, Sadok El Asmi, Mohamed Hamdi, Tai-Hoon Kim:

IoT Based Tracking System For Supply Chain Management. 1-5 - Roumissa Sahbi, Salim Ghanemi, Ramissa Djouani:

A Network Model for Internet of vehicles based on SDN and Cloud Computing. 1-4 - Salma Ibnalfakih, Essaid Sabir

, Mohamed Sadik
:
Energy-Aware Mode Selection and Power Control in D2D-Enabled HetNets. 1-6 - Fatima Ez-Zaki

, Abdelilah Ghammaz, Hassan Belahrach
:
Multiband Fractal Antenna for Wireless Applications. 1-6 - Mohamed El Amrani, Driss Ait Omar

, Mohamed Baslam
, Brahim Minaoui
:
A Game Theoretic Approach to Optimize Transmission Strategies for Mobile Applications. 1-6 - Anass Lekbich

, Abdelaziz Belfqih
, Chaimae Zedak
, Jamal Boukherouaa, Faissal El Mariami:
A secure wireless control of Remote Terminal Unit using the Internet of Things in smart grids. 1-6 - Zakaria Kerkaou, Mohamed El Ansari, Lhoussaine Masmoudi

:
Fast spatio-temporal stereo matching method for omnidirectional images. 1-6 - Mohamed El Bakkali

, Najiba El Amrani El Idrissi, Faisel Em Tubbal
, Gurjot Singh Gaba
:
Optimum design of a tri-band MPA with parasitic elements for CubeSat communications using Genetic Algorithm. 1-4 - Loubna El Amrani, Tomader Mazri, Nabil Hmina

:
The Specific Absorption Rate induced in human organs due Ionizing and Non Ionizing Radiations exposure. 1-4 - Hang Zou

, Chao Zhang, Samson Lasaulce, Lucas Saludjian, Patrick Panciatici:
Decision-Oriented Communications: Application to Energy-Efficient Resource Allocation. 1-6 - Saif Islam Bouderba, Najem Moussa:

Impact of green wave traffic light system on V2V communications. 1-6 - Younes Regragui

, Najem Moussa:
Simulation of wireless sensors in collective motion. 1-6 - Secil Ercan

, Marwane Ayaida, Nadhir Messai:
How mobile RSUs can enhance communications in VANETs? 1-5 - Fariea Khalid, Sobia Jangsher

:
Upper Bound of Capacity for a MU-MIMO NOMA in a Two Way Relaying Network. 1-6 - Muhammad Saleem Khan

, Sobia Jangsher
:
Reliability Analysis for Peer Selection in D2D Networks. 1-6 - Abla El bekkali

, Mohammed Boulmalf, Mohammad Essaaidi
, Ghita Mezzour:
Securing the Internet of Things (IoT). 1-6 - Mohammed A. G. Al-Sadoon

, Rameez Asif
, Mohammed S. Bin-Melha, Huthaifa A. Obeidat, A. Zweid, James M. Noras, R. A. Abd-Alhameed:
Low Complexity Antenna Array DOA System for Localization Applications. 1-5 - A. C. G. Caldeira, A. P. Almeida:

Harvesting Indoor Available Light for Low-power Wireless Networks. 1-7 - Abdelhafid Elharoussi, Mustapha Benjillali:

Performance Analysis of Uplink Massive MIMO in Inverse-Gamma Shadowing Channels. 1-6 - Stéphane Cédric Koumétio Tékouabou, Walid Cherif, Hassan Silkan

:
Optimizing the prediction of telemarketing target calls by a classification technique. 1-6 - Hayat Jebbar, Sanae El Hassani

, Ahmed El Abbassi
:
PAPR Reduction for 5G Waveforms. 1-6 - Malik Irain, Zoubir Mammeri, Jacques Jorda:

Assessment of Regression-based Techniques for Data Location Verification at Country-Level (Invited Paper). 1-6 - Abdelfatteh Haidine, Abdelhak Aqqal, Aziz Dahbi:

Performance Evaluation of Low-Power Wide Area based on LoRa Technology for Smart Metering. 1-6 - El Bhiri Brahim, Zerououl Rafiqa:

An efficient clustering in Heterogenous Wireless Sensor Networks based on Near Optimal Bi-Partitions. 1-6 - Wenjie Xiong, Chun Shan, Zhaoliang Sun, Qinglei Meng:

Real-time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System. 1-4 - Wissam Abbass, Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih

:
Classifying IoT security risks using Deep Learning algorithms. 1-6 - Marwa Ben Abdessalem

, Amin Zribi, Tadashi Matsumoto, Ammar Bouallegue:
LDPC-based Joint Source-Channel-Network Coding for the Multiple Access Relay Channel. 1-6 - Mohammed A. G. Al-Sadoon

, A. Zweid, Rameez Asif
, Mohammed S. Bin-Melha, Nabeel Abduljabbar, James M. Noras, R. A. Abd-Alhameed:
A Minimum Variance Noise Algorithm for 2D and 3D Direction Estimation in MIMO Wireless Communication Systems. 1-5 - Hafsa Benaddi

, Khalil Ibrahimi
, Abderrahim Benslimane:
Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN. 1-6 - Asma Iman Kouachi, Somia Sahraoui

, Abdelmalik Bachir:
Per Packet Flow Anonymization in 6LoWPAN IoT Networks. 1-7 - Aiman Nait Abbou, Youssef Baddi

, Abderrahim Hasbi
:
Software Defined Networks in Internet of Things Integration Security: Challenges and Solutions. 1-6 - Ramissa Djouani, Karim Djouani

, Fateh Boutekkouk, Roumissa Sahbi:
A Security Proposal for IoT integrated with SDN and Cloud. 1-5 - Heena Rathore, Mohsen Guizani, Amr Mohamed

:
Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks. 1-6 - Sara Handouf, Essaid Sabir

, Mohammed Sadik
:
A Leasing-based Spectrum Sharing Framework for Cognitive Radio Networks. 1-5 - Khalid E. L. Khadiri, Ouidad Labouidya, Najib Elkamoun, Rachid Hilal:

Comparative Study Between Dynamic IPv6 Routing Protocols of Distance Vectors and Link States. 1-6 - Hamid Nouasria

, Mohamed Et-tolba
:
An Optimal Sparse Signals Recovery Using Constraint Programming. 1-6 - Abdelali Hadir, Khalid Zine-Dine

, Mohamed Bakhouya
, Jamal El Kafi, A. Tmiri:
Localization Algorithms for Mobile Nodes for Three-Dimentional WSNs. 1-8 - Abla Bedoui, Mohamed Et-tolba

:
A novel Turbo ICI cancellation technique for FBMC-OQAM trough a doubly selective channel. 1-6 - Anas Fedoul, Mustapha Benjillali:

Soft Metrics Performance Analysis for BICM-Based V2X Communication Systems over Rayleigh and Weibull Fading Channels. 1-5 - Mariya Ouaissa

, Abdallah Rhattoy, Idriss Chana
:
New Security Level of Authentication and Key Agreement Protocol for the IoT on LTE Mobile Networks. 1-6 - Wafae Ouali Alami, Essaid Sabir

, Lakksir Brahim:
A H-Slotted Patch Antenna Array for 79 GHz Automotive Radar Sensors. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














