


default search action
7th CommNet 2024: Rabat, Morocco
- 7th International Conference on Advanced Communication Technologies and Networking, CommNet 2024, Rabat, Morocco, December 4-6, 2024. IEEE 2024, ISBN 979-8-3503-6702-7
- Younes Elgargouh, Mohamed Ghazali, Mohammed Reda Chbihi Louhdi, El Moukhtar Zemmouri, Hicham Behja:
Computer Vision for Damage Detection in Cars Images. 1-8 - Sarra Erregui, Otmane El Mouaatamid, El Mehdi Loualid:
Securing Healthcare Data in IoT: A Study on Homomorphic Encryption. 1-7 - Abdoul Nasser Hassane Amadou, Anas Motii, Mohammed Jouhari:
HC-HackerRank: Identifying Key Hackers in Cybercrime Social Network Forums. 1-8 - Raneem F. Abdelrahim
, Jana M. AlNatour, Layan T. AbuRayyan, Yanal S. Faouri:
3D Printed Frequency Reconfigurable DRA for Wireless Applications. 1-5 - El Mahi Bouziane, Lahbib Naimi
, Charaf Ouaddi, Lamya Benaddi, Abdeslam Jakimi:
Use Cases and Scenarios Engineering in Smart Software Application Development Services. 1-7 - Ikram Hamdaoui, Khalid El Makkaoui, Zakaria El Allali:
Evaluating Machine Learning Algorithms for Intrusion Detection: A Step Toward Securing Real-Time Big Data. 1-7 - Hind Kadim Alaoui, Moussa Coulibaly, Ahmed Errami:
Adaptive Energy Management for Smart Parking Sensors: Enhancing Efficiency and Sustainability. 1-6 - Hanae El Ouardani, Toufik Chaayra
, Zakaria El Allali:
Stochastic Modeling for Waterborne Diseases Dynamics: A survey. 1-6 - Abadila Alaktif, Meriyem Chergui, Imane Daoudi, Abdelkrim Ammoumou:
All You Should Know About Large Language Models (LLMs). 1-10 - Nada Essam, Bassant Abdelhamid, Michael Ibrahim:
Triple-Layer TTD Hybrid Beamformer for Beam Split Mitigation in Wideband THz Systems. 1-7 - Samia El Haddouti
, Mohamed Dafir Ech-Cherif El Kettani, Habiba Chaoui:
Unveiling Blockchain Security and Resilience in the Quantum Age: An Analytical Study of Post-Quantum and Quantum Approaches. 1-8 - Thangavel Murugan, Fotoon Khaleifah Abdulla Mosabbas Aldahmani, Ghalya Salem Mohamed Alshuraiqi Almehrzi, Eiman Mohamed Salem Mohamed Alsereidi, Aaesha Abdulla Khalfan Ali Aldahmani, Eiman Mubarak Masoud Alahbabi:
Recent Research Study on AI-based Crime Scene Evidence Detection. 1-8 - Widad Belaoura, Saud Althunibat, Mazen O. Hasna, Khalid A. Qaraqe:
MIMO-Aided Index Modulation-Based Orthogonal Frequency Division Multiple Access. 1-5 - Charaf Ouaddi
, Lamya Benaddi, Lahbib Naimi
, El Mahi Bouziane, Abdeslam Jakimi:
A Graphical DSL for Accelerating Chatbot Development. 1-6 - Farman Ullah, Mohammad Hayajneh, Najah AbuAli
, Haroon Asad, Fiza Saeed Malik, Bisni Fahad Mon:
Autonomous Control with Vision and Deep Learning: A Raspberry Pi Edge Computing Platform for Obstacle Detection in SUAV Path. 1-9 - Mustapha Hilia, Bouchaib Aylaj, Fouad Ayoub, Adil Hilmani, Khalil Ibrahimi, Faissal El Bouanani:
Algebraic Construction of Non-Primitive BCH Codes on GF(2m) with Minimum Distance Checking for Degrees up to 10. 1-4 - Chaimae El Filali, Imad Bourian, Khalid Chougdali:
Privacy-Preserving And Access Control Scheme For IoT-Based Healthcare Systems Using Ethereum Blockchain. 1-6 - Salmane Douch, Mohamed Riduan Abid, Khalid Zine-Dine, Driss Bouzidi, Driss Benhaddou:
Novel Lightweight Method for Detecting Backdoor Attacks in Edge-Deployed Neural Networks. 1-6 - Fouad Younes, Iyad Lahsen Cherif, Hassan El Ghazi:
Toward a City Digital Twin: Design Principles, and Challenges. 1-5 - Mohammad Abdus Salam, A. F. M. Saifuddin Saif, Priya Hamsa Katroju, Robert Kassouf-Short:
A Constructive Analysis on Machine Learning Integration in High Delay Tolerant Networking (HDTN). 1-6 - Hind Mikram, Said El Kafhali
:
AI-Driven Autonomous Systems for Optimal Management of Fog Computing Resources. 1-7 - Mohammed Bouhassane, Abderrahim Kaabouch, Abdelalim Sadiq, Oussama Aziz, Mohamed Oualla:
Intrusion Detection for Internet of Things Integrating Blockchain Technologies: A Review Paper. 1-6 - Mohammad Taghi Dabiri, Mazen O. Hasna, Saud Althunibat, Khalid A. Qaraqe, Mohamed-Slim Alouini
:
A Balloon-Based UAV-Aided Non-Terrestrial Sectorized Network for Post Disaster Cellular Coverage: A Dynamic Environment Perspective. 1-7 - Rachid El Ibraqui, Moulay Othman Aboutafail, Redouane Nouira:
Modeling and mathematical analysis of liquidity-credit risk contagion in the banking system. 1-5 - Imane Laassar, Moulay Youssef Hadi, Amine Mrhari
, Soukaina Ouhame:
Enhancing Industrial IoT Intrusion Detection with Hyperparameter Optimization. 1-6 - Khalid A. Darabkh, Mamoun F. Al-Mistarihi, Bayan Abdallah Odat:
Integrating Software-Defined Networking and Fog Computing for a Novel Routing Protocol in Vehicular Ad-Hoc Networks. 1-6 - Anargyros J. Roumeliotis, Evangelos Kosmatos, Konstantinos V. Katsaros, Angelos J. Amditis:
Multi-Service And Multi-Tier Edge-Cloud Continuum Planning. 1-7 - Aouatif Arqane, Omar Boutkhoum, Abdelmajid El Moutaouakkil:
Optimizing Feature Selection for IoT Intrusion Detection: A Hybrid Bio-Inspired Method. 1-7 - Alimouch Zoubair, Mohamed Et-tolba, Najib Naja:
A Wind Speed-Driven Approach to Round Earth Loss Modeling for Maritime Communications. 1-6 - Yassine Aitamar
, Jamal El Abbadi:
MeanC-IQR: Enhanced Fault Detection in WSNs for Smart Farming. 1-4 - Farman Ullah, Mohamed Isa, Ahmed Abdulraheim Alhammadi, Abdalla Ahmed Ali Alyassi, Shumayla Yaqoob, Ihtesham Jadoon:
Sign Language Recognition of Autistic Children using Wearable Sensors Signals Features Selection. 1-7 - Adil Hilmani, Yassine Sabri, Abderrahim Maizate, Siham Aouad, Mohammed Koundi, Fouad Ayoub:
Energy Efficiency Optimization of Wireless Sensor Networks with K-Means Integration. 1-6 - Ilham Es Sadki, Bouazza El Wahbi, Larbi Zraoula:
Weak Almost Grothendieck Operators in Banach Lattices. 1-4 - Abdelhalim Houssaoui, Otmane El Mouaatamid, Mostafa Belkasmi:
Efficient Quantum Key Distribution Using Balanced Incomplete Block Designs. 1-8 - Ghizlane Mounir, Jamal El Abbadi:
Antenna Array Design for 28 GHz Millimeter-Wave 5G Communication Systems. 1-4 - Mohammed Sabiri, Bassou Aouijil:
On quantum and LCD Codes Over The Ring Fq[u, v, w, z]/3<u3-u, v2-v, w2-w, z2-z, uv, vu, uw, wu, uz, zu, vw, wv, vz, zv, wz-zw>. 1-5 - Kentaro Kusumi, Hiroshi Koide:
MQTT-MTD: Integrating Moving Target Defense into MQTT Protocol as an Alternative to TLS. 1-8 - Khalil Ibrahimi, Mohammed Jouhari, Salif Sow, Fouad Ayoub, Mohamed El-Kamili, Khalid Chougdali:
Reinforcement Learning for Optimized Resource Allocation in 5G URLLC. 1-6 - Bishal Shyam Purkayastha, Md. Musfiqur Rahman, Maryam Shahpasand:
Android Malware Detection Using Machine Learning and Neural Network: A Hybrid Approach with Federated Learning. 1-5 - Farida Bouroumane, Ikram Hamdaoui, Mustapha Abarkan:
Evaluation of Serious Games Intended to Be Used in Education: Systematic Review. 1-6 - Otmane Filali Razzouki, Anas Charroud, Zakaria El Allali, Abdelaziz Chetouani, Nassime Aslimani:
A Survey of Advanced Gradient Methods in Machine Learning. 1-7 - Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, Vasileios Kokkinos
, Apostolos Gkamas, Christos Bouras, Philippos Pouyioutas:
Enhancing Spectral Efficiency in 5G MIMO Networks Through Adaptive Beamforming Techniques. 1-7 - Abdellatif Kichna, Abderrazak Farchane, Said Hakimi:
Analyzing the Impact of Thresholds in Bit-Flipping Decoding for QC-MDPC based McEliece cryptosystems. 1-5 - Mohamed Mourabet, Yassir Alaoua, Mohamed Ech-Chad
:
A Note on an elementary Operator with Quasi-M-Hyponormal Operator Entries. 1-7 - Mohamed Bourhail, Toufik Chaayra
, Faissal El Bouanani, Zakaria El Allali:
Accurate Approximations for the Ratio of Sums of Independent Rayleigh Random Variables. 1-6 - Fatima Ghazi, Fouad Ayoub, Khalil Ibrahimi, Aziza Benkuider:
Osteoporosis Classification Using Multifractal Features and Neighbourhood Determination of Extrema for BMED. 1-8 - Hassane Ansary, Larbi Zraoula, Mohamed Ech-Chad
:
On Order Gelfand-Phillips Property And Order Limited Completely Continuous Operators. 1-5 - Radheshyam Singh, Mohamed Aymen Chalouf, Léo Mendiboure, Michael S. Berger
, Lars Dittmann
:
Towards an SDN-based Reconfigurable Edge Architecture for Railway Environment. 1-7 - Radheshyam Singh, Diaa Jadaan, Drona Ghimire, Michael S. Berger
, Amund Skavhaug, Lars Dittmann
:
Evaluating Energy Efficiency: A Comparative Study of LTE, 5G-NSA, 5G-SA, and Private 5G Networks. 1-7 - Raed T. Al-Zubi, Yazid M. Khattabi, Mohammed Hawa, Hasan Farahneh
, Khalid A. Darabkh, Khaled F. Hayajneh:
New Approach for Studying HARQ-Aided MIMO-NOMA Communication System. 1-5 - Younes Hamzaoui, Mohammed Chekour
:
Enhancing MPR Selection in Ad Hoc Networks Through Balanced Neighbor Distribution. 1-4 - Soukaina Madani, Mohamed Morjane, Mohamed Ech-Chad
:
On the Δ-Symmetric Operators and Applications. 1-6 - Ayam Saddouq, Mamoun F. Al-Mistarihi, Mahmoud A. Khodeir, Khalid A. Darabkh:
Enhancing Physical-Layer Security in Full-Duplex Cooperative Wireless Networks over α-μ Fading Channels. 1-7 - Mohamed Faraji, Meryeme Ayache, Hanan El Bakkali:
Security Challenges in Integrating BIoT Systems: A Comprehensive Review. 1-6 - Petya Popova, Veselin Popov:
Artificial Intelligence and Big Data Analytics for Supply Chain Sustainability. 1-8 - Abdelmajid Bessate, Abdellah Madani, Faissal El Bouanani, Mohamed Elomari:
Effective Capacity of Maximal Ratio Combining Subject to the Fading Impairment. 1-5 - Nguyen Thi Thu Hang
, Serengul Smith, Huan X. Nguyen:
Adaptive PMME Medium Access Control Protocol for Multi-Event IoT Sensor Networks. 1-7 - Ilyas Tammouch
, Abdelamine Elouafi, Ibtissam Essadik
:
Betting on Machine Learning: Extracting Patterns from Football's Anarchic Odds. 1-7 - Karim Azhoum, Mohamed Missouri, Mohamed Ech-Chad
:
On the Δ-Finite Operators and their Applications. 1-6 - Lamya Benaddi, Charaf Ouaddi
, Adnane Souha, Abdeslam Jakimi, Brahim Ouchao:
Code Generation Templates for Accelerating Chatbot Development in Smart Tourism. 1-5 - Yuncan Zhu, Meiling Li, Faissal El Bouanani, Yubin Zhao:
IRS-Assisted Collaborative Tracking for ISAC in Vehicular Networks. 1-6 - Mohammed El Amrani, Larbi Zraoula, Bouazza El Wahbi:
Unbounded Order-Order Continuous Operators. 1-5 - Talal Alqahtani, Shuja Ansari, Yusuf A. Sambo, Muhammad Ali Imran:
Blockchain Based Decentralized Spectrum Trading Using Smart Contracts. 1-5 - Ouba Issam, Larbi Zraoula, Bouazza El Wahbi:
Some Results About The Class Of Order Weakly Demicompact Operators On Banach Lattices. 1-6 - Youssef Oubaydallah, Khalil Ibrahimi, Youness Larabi:
Crowdsourcing: Modeling Techniques and Comprehensive Studies. 1-7 - Abdul Saboor
, Evgenii Vinogradov, Zhuangzhuang Cui, Sander Coene, Wout Joseph, Sofie Pollin:
Elevating the Future of Mobility: UAV-enabled Intelligent Transportation Systems. 1-7 - Iness Hassani Idrissi, Mohammed Jouhari, Hafsa Benaddi, Anas Motii, Khalil Ibrahimi:
Deep Learning-Based Traffic Banner Recognition for Enhanced Road Safety in Autonomous Vehicles. 1-6 - Adil Driouich, Larbi Zraoula, Bouazza El Wahbi:
On the Class of Absolutely Weakly Compact Operators. 1-6 - Yongtao Wei, Farid Naït-Abdesselam, Siqi Wang, Aziz Benlarbi-Delaï:
A Comparative Study of Supervised Learning Algorithms for Spiking Neural Networks. 1-6 - Mohamed Aghroud, Yassin Elgountery, Mohamed Oualla, Lahcen El Bermi, Abdelalim Sadiq:
Comparative Analysis of Blockchain Platforms for Adapting Proof of Authentication in IoT. 1-7 - Abderrahim Kaabouch, Mohammed Bouhassane, Abdelalim Sadiq, Oussama Aziz, Mohamed Oualla:
A Comparative Analysis of Apache Cloud Projects for Data Storage. 1-9 - Ali Abou El Qassime, Hasna Nhaila, Lhoussain Bahatti:
Chaos-Based Encryption: Performance Metrics for Secure Multimedia Communication and Comparative Analysis. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.