default search action
11th WINCOM 2024: Leeds, UK
- Syed Ali Raza Zaidi, Khalil Ibrahimi, Mohamed El-Kamili, Abdellatif Kobbane:
11th International Conference on Wireless Networks and Mobile Communications, WINCOM 2024, Leeds, United Kingdom, July 23-25, 2024. IEEE 2024, ISBN 979-8-3503-7786-6 - Haleema Sadia, Hafsa Iqbal, Sana Qadir:
Physical Layer Security in Intelligent Reflecting Surface-Enabled Small NOMA IoT Network. 1-6 - Fatima-Zahra Guerss, Khalil Ibrahimi:
Fencing Sport Strategy Using Game Theory. 1-6 - Idriss Moumen, Najat Rafalia, Jaafar Abouchabaka:
A Machine Learning Approach to Residential Energy Prediction Using Large-Scale Datasets in MongoDB. 1-6 - Fatima Abouzid, Hicham Ghennioui, Alami Hassani Aicha:
Benchmarking of Detection and Classification Methods for Traffic Sign Recognition: Application on Moroccan Context. 1-6 - Shaymaa Ammar Kashmoola, Ali Othman Al Janaby:
Integrating Sensing and Communication-Based Target Detection and Speed Estimation for Beyond-Generation Networks. 1-6 - Rachid Mafamane, Mourad Ouadou, Khalid Minaoui:
Hybrid Anti-Collision Protocol for RFID-IoT Networks Based on Artificial Immune and Neural Networks. 1-6 - Riya Deshpande, Faheem Ahmad Khan, Qasim Zeeshan Ahmed:
Support Vector Machine Based Spectrum Sensing in Beyond 5G Wireless Networks. 1-5 - Samira Lafraxo, Mohamed El Ansari, Lahcen Koutti, Zakaria Kerkaou, Meryem Souaidi:
AttDenseUnet : Segmentation of Polyps from Colonoscopic Images Based on Attention-DenseNet-Unet Architecture. 1-6 - Rungrat Viratikul, Kamol Boonlom, Ian D. Robertson, Timothy J. Amsdon, Panuwat Janpugdee, Nutapong Somjit:
Design and Evaluation of Optical Wireless Communication Systems for Underwater IoT Applications. 1-6 - Yasir Saleem, Nathalie Mitton, Valeria Loscrì:
Analysis of Common Required Metrics for Vehicular Networks. 1-6 - Radi Khaoula, Moughit Imane, Moughit Mohamed:
Improving Cyber Defense with DNS Query Clustering Analysis. 1-6 - Noor Ahmed, Matthew Paulini, Alex Andrekanic:
UAV Sub-Networking via Geo-Hashing. 1-6 - Karamot Kehinde Biliaminu, Sherif Adeshina Busari, Joaquim Bastos, Jonathan Rodriguez:
Impacts of Dataset and Codebook Sizes on ML-Driven Beam Prediction for mmWave V2I Communication. 1-6 - Mohammed M. H. Qazzaz, Syed Ali Raza Zaidi, Desmond C. McLernon, Abdelaziz Salama, Aubida A. Al-Hameed:
Optimizing Search and Rescue UAV Connectivity in Challenging Terrain Through Multi Q-Learning. 1-8 - Abdelmajid Bessate, Youssef Miftah, Faissal El Bouanani, Hussain Ben-Azza:
Effective Capacity of MIMO-STBC Subject to Fading Channels: Tractable and Accurate Analysis. 1-6 - Youssef Regragui, Abdellah Mazighi, Lahoucine Ballihi, Ghizlane Orhanou:
Impact Evaluation of Feature Selection Algorithms on Machine Learning-Based Intrusion Detection. 1-6 - Fatehi Altalqi, Sara Fennane, Houda Kacimi, Hamza Mabchour, Adil Echchelh:
Development of a Multi-Band High Bandwidth Circular Microstrip Patch Antenna for Radar Implementations. 1-5 - Fatima Cheddi, Ahmed Habbani, Hammadi Nait-Charif:
A Multi-Modal Feature Fusion-Based Approach for Chest X-Ray Report Generation. 1-7 - Assiya Akli, Khalid Chougdali:
A Survey on IOTA Based Technology for Enhanced IoT Security. 1-6 - Khadija Marzagui, Abdelkaher Ait Abdelouahad, Abdellatif Dahmouni, Ahmed Drissi El Maliani:
A Review on Image Quality Assessment for Air Quality Index Estimation. 1-6 - Bisma Amjad, Qasim Zeeshan Ahmed, Faheem Ahmad Khan, Zaharias D. Zaharis, Pavlos I. Lazaridis:
Target Localization from mm-Wave Point Clouds Using Deep Learning Based Classifiers. 1-5 - Ahmed Shuhaiber, Ibrahim Mashal:
A Multi-Layered Trust Model in the Internet of Things Smart Home Ecosystem. 1-7 - Issam Trrad, Huthaifa A. Obeidat, Muhammad Ali Malik, Ali M. Hayajneh, Issa T. E. Elfergani, Omar Obeidat, Raed Abd-Alhameed:
A Simulation Approach to Indoor Channel Design for 5G Networks at 39 GHz. 1-6 - Abdulaziz Alatawi, Hamid R. Sadjadpour, Zouheir Rezki, Mohammad Moltafet, Abdelrahman Elfikky:
Adaptive Deep Neural Network for Non-Stationary Wireless Channels. 1-6 - Ayush Verma, Tanuj Chandela, Geetanjali Rathee, Abhinav Tomar:
A Multilayered Trusted and Secure Surveillance with Frame Encoding, ML, and Hashgraph. 1-6 - Yassine Ben-Aboud, Abdellatif Kobbane:
Towards a Modular Digital Twin Framework for Energy-Optimized IoT Sensor Devices. 1-7 - Rehab Alawadh, Poonam Yadav, Hamed Ahmadi:
HIFFR: Hybrid Intelligent Fast Failure Recovery Framework for Enhanced Resilience in Software Defined Networks. 1-7 - Yousra Fadili, Yassine El Yamani, Jihad Kilani, Najib El Kamoun, Youssef Baddi, Faycal Bensalah:
An Enhancing Timeseries Anomaly Detection Using LSTM and Bi-LSTM Architectures. 1-6 - Abdelmounaime Bikir, Otmane Idrissi, Khalifa Mansouri, Mohammed Qbadou:
The Impact Of Aircraft Performance Variety In A Departure Sequence Prior to Takeoff Operations Following A Standard Instrument Departure Route. 1-6 - Tao Xu, John S. Thompson, Wasiu O. Popoola:
Design of Rydberg Sensor Arrays for Radio Frequency Sensing. 1-6 - Yasmin Derraz, Redouan Korchiyne, Abderrahmane Laraqui, Mehdi Benassila, Mouad Ergouyeg, Hicham Cherrab, Zakaria Benzyane, Meriem Sbai, Zineb Squalli Houssaini:
Machine Learning in Breast Cancer Diagnosis: A Comprehensive Analysis and Prediction Methodology. 1-6 - Mohamed Mamad, Ouissal Chichi:
Towards a Human-Centred Artificial Intelligence in the Age of Industry 5.0: A Cross-Country Analysis. 1-6 - M'barek Iaousse, Mohamed El-Kamili, Amal Hmimou, Youness Jouilil:
Contributions to Meteorological Forecasting: A Comparative Study of Machine Learning-Driven Temperature Predictions at Menara Station in Morocco. 1-7 - Sanar Ahmed Shehab, A. Z. Yonis:
Design and Simulation of Fractional N-PLL 2.4 GHz for WLAN in IEEE 802.11 Standards. 1-6 - Charaf Eddine Ragba, Abdelhak Boulaalam, Insaf Bellamine:
Survey on the Segmentation of Brain Tumors Using Deep Learning Techniques. 1-6 - Jinfeng Li, Haorong Li:
Navigating Aspect Ratio Effects in Response Time Challenges of Liquid Crystal Coaxial Phase Shifters for Next-Generation mmW Communications. 1-5 - Abdelaali Kemmou, Adil el Makrani, Ikram Elazmi, Fouad Lehlou, Moulay Hafid Aabidi:
Improved Facial Expression Recognition Through Occluded Optical Flow Reconstruction Using Deep Convolutional Generative Adversarial Network. 1-7 - Ziad Akiirne, Abbes Benkirane, Driss Bouzidi:
A Comparative Study of Authentication Protocols in DGC-Based Smart Lock Systems. 1-6 - Latifa Oufkir, Asma El Hamzaoui:
EHR Data Persistence for a Nationwide Shared Medical Record: An Overview. 1-9 - Khalil Ibrahimi, Mohammed Jouhari, Zineb Jakout:
Enhancing Intrusion Detection Systems Using Machine Learning Classifiers on the CSE-CIC-IDS2018 Dataset. 1-6 - Jalal Eddine Bahbouhi, Saif Islam Bouderba, Abdelali Elkouay, Najem Moussa:
Exploring the Impact of Group-Based Incentives on Cooperative Dynamics in Public Goods Game. 1-5 - Meriem Ouadah, Fatiha Merazka:
Securing UAV Communication: Authentication and Integrity. 1-7 - Sher Nawaz, Waleed Tariq Sethi:
Broadband Planar Antenna with V-Slots Configuration for Sub-THz Communication. 1-6 - Reem Alhabib, Poonam Yadav:
Hyperledger Fabric Platform for Secure and Efficient Data Sharing in Autonomous Vehicles. 1-9 - Yassine El Yamani, Yousra Fadili, Jihad Kilani, Najib El Kamoun, Youssef Baddi, Faycal Bensalah:
Hybrid Models for IoT Security: Tackling Class Imbalance. 1-6 - Maryam Et-Tolba, Charifa Hanin, Abdelhamid Belmekki:
DL-Based XSS Attack Detection Approach Using LSTM Neural Network with Word Embeddings. 1-6 - Wiâme Bouhali, Elmostafa Belmekki, Mostafa Bellafkih:
Advanced Techniques for Security Incident Analysis. 1-6 - Abdulaziz Alashbi, Adzmely Mansor, Abdul Hakim H. M. Mohamed, Ibraheem Shayea, Ayman A. El-Saleh:
Advancing Fetal Heart Rate Monitoring: AI-Based Approach for Baseline Detection and Classification. 1-5 - Aicha Khalfaoui, Abdelmajid Badri, Ilham El Mourabit:
A Deep Learning Framwork with Attention-Guided Feature Learning for Robust Object Detection in Surveillance Systems. 1-6 - Rajaa Sliman, Ahmed Azouaoui:
Tifinagh Handwritten Character Recognition Using the Convolutional Neural Network. 1-5 - Khalid El Fayq, Said Tkatek, Lahcen Idouglid:
Towards Emotional Authenticity in News Presentation: A Machine Learning Approach. 1-7 - Archi Taha, Mohammed Benattou:
Efficient Dimensionality Reduction in Intrusion Detection Systems via Weighted Power Mean for PCA and LDA. 1-6 - Alejandro Carnero, Omer Waqar, Cristian Martín, Manuel Díaz:
Distributed Federated and Incremental Learning for Electric Vehicles Model Development in Kafka-ML. 1-8 - Youssef Natij, Hajar El Karch, Ayyad Maafiri, Abdelkader Mezouari:
Evaluating the Performance of YOLO Object Detectors for Plant Disease Detection. 1-6 - Hefdhallah Sakran, Charbel Lahoud, Shahab Ehsanfar, Klaus Moessner:
Active Eavesdropping Attacks Detection in Massive Multiple Input Multiple Output Based on Machine Learning. 1-6 - Maha Alruwail, Karim Djemame, Li Zhang:
Prediction of Power to Autonomous Vehicles Using Machine Learning Techniques. 1-7 - Zakariyae Bouflous, Fadoua Haraka, Mohammed Ouzzif, Khalid Bouragba:
Enhanced Vertical Pod Auto Scaling with Decision Tree Regressor-Max in Kubernetes. 1-5 - Abdoul-Hadi Konfé, Pasteur Poda, Raphaël Le Bidan:
Low-Complexity Sliding Window Decoding of Spatially-Coupled LDPC Codes Constructed from Short 5G NR LDPC. 1-7 - Adnane Souha, Lamya Benaddi, Charaf Ouaddi, El Mahi Bouziane, Abdeslam Jakimi:
A New Decision Support System for Enhancing Tourism Destination Management and Competitiveness. 1-6 - Youssef Natij, Ayyad Maafiri, Hajar El Karch, Yassine Himeur, Khalid Chougdali, Abdelkader Mezouari:
Plant Disease Recognition: A Comprehensive Mini Review. 1-8 - Zakaria Kerkaou, Yassine Oukdach, Mohamed El Ansari, Lahcen Koutti, Samira Lafraxo, Meryem Souaidi:
VGG16U-Net with Attention Based Semantic Segmentation of Gastrointestinal Abnormalities. 1-5 - Mohammed Jouhari, Hafsa Benaddi, Khalil Ibrahimi:
Efficient Intrusion Detection: Combining X2 Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset. 1-6 - Achraf Sayah, Saïd Aqil, Bouchra Aadil, Mohamed Lahby:
Two Hybrid Heuristic Algorithms for Optimizing Data Processing Schedules in Distributed Edge Computing. 1-6 - M. R. Wali, Mirza Shujaat Ali, Jalil Ur Rehman Kazim, Farooq A. Tahir, Muhammad Ali Imran, Qammer H. Abbasi:
A Broadband CP Square Slot Antenna Array for Future 5G Communication Systems. 1-5 - Kalid Nafil, N. Mofid, H. Boutarkha, C. Razzouki, H. Zouai, Abdellatif Kobbane, Mohammed Elkoutbi:
Development of an IoT-Based Real-Time System for Monitoring Pedestrian Passageway Traffic Violations. 1-6 - Mohammad Tubishat, Mustafa Rawshdeh, Shahed Obeidat:
An Improved Golden Jackal Optimization Based on New Local Search Operator for Global Optimization: Invited Paper. 1-4 - Zaid Alkhawlani, Khalil Ibrahimi, Mohammed Boutabia:
Intrusion Detection Systems for the Internet of Things Network: Survey on Rare Attacks. 1-6 - Ibrahim Yazici, Emrecan Özkan, Emre Gures:
Enhancing Path Loss Prediction Through Explainable Machine Learning Approach. 1-5 - Muhammed Burak Goktas, Zhiguo Ding:
Computation Energy Efficiency Maximization of SWIPT-Assisted FD-NOMA MEC Systems. 1-6 - Lachhab Youssef, Elhoussine Ziyati:
Arabic Aspect Category Detection Using Traditional Neural Networks and Arbert. 1-6 - Jalal Rabbah, Mohammed Ridouani, Larbi Hassouni:
Bridging Healthcare and Telecommunications A Unified Model for Multi-Task Image Classification. 1-8 - Mojtaba Mahdavi:
Hardware Realization of Vector and Matrix Norm Calculation for Signal Processing Applications. 1-7 - Moukhliss Ghizlane, Lahyani Khalid, Reda Filali Hilali, Belhadaoui Hicham:
A New AI-Based University Guidance Model for Moroccan Students. 1-6 - Mohamed Mouhiha, Omar Ait Oualhaj, Abdelfettah Mabrouk:
Combining Collaborative Filtering and Content Based Filtering for Recommendation Systems. 1-6 - Cheng Cheng, John S. Thompson, Symon K. Podilchak:
Zeros Insertion: An OTFS Scheme for a Sparse Equivalent Channel Matrix. 1-6 - Mohamed Akouhar, Abdallah Abarda, Mohamed Elfatini, Mohamed Ouhssini:
A Deep Learning and Resampling Approach to Credit Card Fraud Detection. 1-6 - Laasri Nadia, Dounia Lotfi, Ahmed Drissi El Maliani:
Advancing Post-Earthquake Relief: A Comprehensive Strategy Using Existing and New Centrality Measures - A Morocco's Earthquake Case Study. 1-6 - Muhammad Zain Uddin, Syed Muhammad Faisal Iradat:
IoT Pro-Active SDN: A Smart Predictive-Based Approach for IoT Devices in SDN. 1-6 - Adib Oubadriss, Jalal Laassiri, Adil el Makrani:
Intelligent Approach to Massive Data Analysis and Its Impact on Leaf Disease Detection Decision-Making. 1-7 - Mohamed Redha Bouakouk, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
AOF-RPL: Towards an MCDM Based Adaptive Objective Function in RPL. 1-6 - Jeffrey Redondo, Zhenhui Yuan, Nauman Aslam, Juan Zhang:
Coverage-Aware and Reinforcement Learning Using Multi-Agent Approach for HD Map QoS in a Realistic Environment. 1-6 - Qamar Hassan, Mirza Shujaat Ali, Jalil Ur Rehman Kazim, Farooq A. Tahir, Muhammad Ali Imran, Qammer H. Abbasi:
Design of RF MEMS Shunt Capacitive Switches Using Dimples and Meanders. 1-4 - Ruobin Han, Abdoalbaset Abohmra, Tomas Pires, Vaithinathan Karthikeyan, Farooq A. Tahir, João Paulo Ponciano, Muhammad Ali Imran, Qammer H. Abbasi:
Terahertz Photoconductive Antenna Based on Tai-Chi Totem and Plasmonic Structure for Cancer Detection. 1-6 - Mohammed A. Alshorbaji, Ahmed Q. Lawey, Syed Ali Raza Zaidi:
Energy Efficient Bandwidth Allocation and Routing in Electromagnetic Nano-Networks via Reinforcement Learning. 1-8 - Andrey Garnaev, Wade Trappe:
An IoT Game with Heterogeneous Communication Nodes. 1-6 - Hamid Ouidir, Amine Berqia, Siham Aouad:
Improving UWSN Performance Using Reinforcement Learning Algorithm QENDIP. 1-6 - Alican Topcu, Ahmed Q. Lawey, Syed Ali Raza Zaidi:
Joint Power and Flexible Numerology Allocation in 5G Networks Using Deep Reinforcement Learning. 1-6 - Benlemlih Youssef, Berrada Ismail:
Cybersecurity and Surveillance Strategies in the Banking Sector: The Threat of CryptoJacking and ENISA's Methodologies against the Dark Side of Cryptocurrencies. 1-8 - Ke Chen, Li Zhang, Jihai Zhong:
Vertical Handover Strategy in Satellite-Aerial Based Emergency Communication Networks. 1-6 - Xuanyu Liang, Ahmed Al-Tahmeesschi, Qiao Wang, Swarna Bindu Chetty, Chenrui Sun, Hamed Ahmadi:
Enhancing Energy Efficiency in O-RAN Through Intelligent xApps Deployment. 1-6 - Xicheng Lu, Zhendong Chen, Wei Liu, Haixin Sun:
One-Bit Underdetermined DOA Estimation with Sparse Arrays via Structured Covariance Reconstruction: Invited Paper. 1-6 - Jihai Zhong, Li Zhang:
Fuzzy Inference System Based Handover Scheme in UAV-Assisted MEC Network. 1-6 - Khadeeja Tariq, Hamza Ahmad, Salman Liaquat, Faran Awais Butt, Ijaz Haider Naqvi, Nor Muzlifah Mahyuddin, Saleh A. Alawsh, Ali H. Muqaibel:
A Framework for Improving Search and Rescue Operations Through SDR-Based FMCW Radar and LPWAN Technology. 1-6 - Andreas Andreou, Constandinos X. Mavromoustakis, Evangelos K. Markakis, Athina Bourdena, George Mastorakis:
On the Quantum Analysis by Using Semantic Integration and Covert Communication for Next-Generation Networks. 1-6 - Anass Garbaz, Yassine Oukdach, Said Charfi, Mohamed El Ansari, Lahcen Koutti, Mouna Salihoun:
Bleeding Segmentation Based on a U-Formed Network with Separable Contextual Feature-Guided in Wireless Capsule Endoscopy Images. 1-6 - Jasmin Ebert, Peter Winzer:
B2C Product and Price Policy of Mobile Providers Insights from Qualitative Expert Interviews in the German and Swiss Market. 1-6 - Imad Bourian, Anass Sebbar, Mounir Arioua, Khalid Chougdali:
Blockchain Based Smart Contract to Enhance Security in Smart City. 1-6 - Nabil Tazi Chibi, Omar Ait Oualhaj, Hassan El Ghazi, Wassim Fassi Fihri:
Secured Storage of Smart Grid Events: Blockchain Based on Multi Agents Markov Decision Processes. 1-7 - Idriss Moumen, Najat Rafalia, Jaafar Abouchabaka:
A Next-Generation Platform for Law Enforcement Vehicle Detection. 1-6 - Imane Daha Belghiti, Lakhdachi Hamza, Fatima Guerouate:
Optimizing Energy Utilization in Smart Manufacturing Using Machine Learning Within the Framework of Industry 4.0. 1-6 - Noor Ali Alshuraify, Ali A. Yassin, Zaid Ameen Abduljabbar:
Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields. 1-8 - El Hadji Malick Ndoye, Ousmane Diallo, Mohamed El-Kamili:
LoRaWAN Behavior Analysis in a Linear Topology for Border Monitoring. 1-6 - Syed Salman Haider, Muhammad Noman, Farooq A. Tahir, Muhammad Imran, Qammer H. Abbasi:
A Fractal Dual-Band Polarization Diversity Antenna Array for 5G Communications. 1-5 - Huthaifa A. Obeidat, Muhammad Ali Malik, Issam Trrad, Issa T. E. Elfergani, Ashwain Rayit, Omar Obeidat, Raed Abd-Alhameed:
Path Loss Exponent Modeling for 6G Applications at 245 GHz. 1-6 - Meshari D. Alanazi:
Wideband Hemisphere Dielectric Resonator Antenna for Next 5G Networks. 1-4 - Mojtaba Mahdavi:
Channel Estimation using Processing In Memory Based on System Identification Technique. 1-8 - Ayoub Wehby, Rida Khatoun, Ahmad Fadlallah:
Shielding the Connected Cars: A Dataset-Powered Defense Against DDoS. 1-7 - Chenrui Sun, Gianluca Fontanesi, Swarna Bindu Chetty, Xuanyu Liang, Berk Canberk, Hamed Ahmadi:
Continuous Transfer Learning for UAV Communication-Aware Trajectory Design. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.