default search action
ACOSIS 2016: Marrakesh, Morocco
- International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016, Marrakesh, Morocco, October 17-19, 2016. IEEE 2016, ISBN 978-1-5090-6227-0
- Mouna Garai, Noureddine Boudriga:
A secure QoS aware VANET. 1-6 - Mehdi Ezzarii, Hamid Elghazi, Hassan El Ghazi, Tayeb Sadiki:
Epigenetic algorithm for performing intrusion detection system. 1-6 - Mounia Bouabdellah, Faissal El Bouanani, Hussain Ben-Azza:
A secure cooperative transmission model in VANET using attribute based encryption. 1-6 - Souad Labghough, Fouad Ayoub, Mostafa Belkasmi:
Majority logic coding schemes performance over FSO channels. 1-6 - Ahlam Berkani, Mostafa Belkasmi:
A reduced complexity decoder using compact genetic algorithm for linear block codes. 1-6 - Ahmed Maarof, Mohamed Senhadji, Zouheir Labbi, Mostafa Belkasmi:
Authentication protocol conforming to EPC class-1 Gen-2 standard. 1-6 - Elmehdi Illi, Faissal El Bouanani, Fouad Ayoub:
Performance analysis of dual-hop underwater communication system subject to k-μ shadowed fading channel. 1-6 - Karim Rkizat, Mohammed Lahmer, Mostafa Belkasmi, Saïd Nouh:
Construction and iterative threshold decoding for low rates Quasi-Cyclic One Step Majority logic decodable codes. 1-7 - Hanaa Marshoud, Paschalis C. Sofotasios, Sami Muhaidat, George K. Karagiannidis:
Multi-user techniques in visible light communications: A survey. 1-6 - Zakaria M'rabet, Fouad Ayoub, Mostafa Belkasmi, Anouar Yatribi, Zine El Abidine Alaoui Ismaili:
Non-binary Euclidean Geometry codes: Majority Logic Decoding. 1-7 - Anouar Yatribi, Mostafa Belkasmi, Fouad Ayoub, Zakaria M'rabet:
Non-binary cyclic majority-logic decodable codes: An algebraic construction by using Genetic Algorithms. 1-9 - Abdelmajid Bessate, Faissal El Bouanani:
A new performance results of MIMO system with orthogonal STBC over independent and identical weibull fading channels. 1-7 - Mohammed Hussein, Israa Elayyan, Wasel Ghanem:
Topology-aware approach for reducing power consumption in LEO satellite constellations. 1-5 - Sarah Kamel, Mireille Sarkiss, Ghaya Rekaya-Ben Othman:
Improving GGH cryptosystem using generalized low density lattices. 1-6 - Sanaa Oulaourf, Abdelfatteh Haidine, Hassan Ouahmane:
Review on using game theory in resource allocation for LTE/LTE-Advanced. 1-7 - Abdelilah Kadi, Mostafa Mrabti, Said Najah, Emmanuel Boutillon:
Novel method for improving performances of normalized MS decoder using WIMAX code. 1-5 - Abdelfatteh Haidine, Sanae El Hassani, Abdelhak Aqqal:
Designing optimal wireless-based ICT platform for smart grid - CDMA450 proof-of-concept. 1-7 - M. Bennani Mohamed Taj, M. Ait Kbir:
ICH-LEACH: An enhanced LEACH protocol for wireless sensor network. 1-5 - Brahim I. D. Messaoud, Karim Guennoun, Mohamed Wahbi, Mohamed Sadik:
Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges. 1-6 - Bassma Guermah, Hassan El Ghazi, Tayeb Sadiki, Yann Ben Maissa, Esmail Ahouzi:
A comparative performance analysis of position estimation algorithms for GNSS localization in urban areas. 1-7 - Mounia Zaydi, Bouchaib Nassereddine:
Information system security governance: Technology intelligence perspective. 1-6 - Amal Hadri, Khalid Chougdali, Rajae Touahni:
Intrusion detection system using PCA and Fuzzy PCA techniques. 1-7 - Kawtar Zerhouni, Raja Elassali, Khalid Elbaamrani, Noureddine Idboufker, Fouzia Elbahhar Boukour:
Threshold of the symmetry property of cyclic autocorrelation function detector. 1-6 - Mohamed Labbi, Nabil BenSalah, Nabil Kannouf, Youssef Douzi, Mohammed Benabdellah, Abdelmalek Azizi:
A game theoretic approach to multipath traffic control in Content-Centric Networking. 1-7 - Reda Benkhouya, Idriss Chana, Youssef Hadi:
Correction of sensing imperfections using channel coding in cognitive radio networks while keeping sensing time low. 1-5 - Toufik Chaayra, Faissal El Bouanani, Hussain Ben-Azza:
Performance analysis of TAS/MRC based MIMO systems over Weibull fading channels. 1-6 - Abdellah Houmz, Mohamed Salim Mezzene, Asmaa Tellabt, Ghita Mezzour, Mohammed El Koutbi:
Field study of cybercafe usage & security in Morocco. 1-7 - Hamza Boualame, Noria Tahiri, Idriss Chana, Ahmed Azouaoui, Mostafa Belkasmi:
An efficient soft decision decoding algorithm using cyclic permutations and compact genetic algorithm. 1-6 - Khalid Sabri, Abdelouahad Choklati:
Sparse deconvolution of periodic random impulses based on convex relaxation. 1-8 - Issam Abderrahman Joundan, Saïd Nouh, Abdelwahed Namir:
Design of good linear codes for a decoder based on majority voting procedure. 1-6 - Imen Arfaoui, Noureddine Boudriga, Khalifa Trimeche:
Design and analysis of protecting strategies against border crossing under irregular conditions. 1-6 - Wassim Fassi Fihri, Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch:
A survey on decentralized random access MAC protocols for cognitive radio networks. 1-7 - Mariyam Ouaissa, Mariam Benmoussa, Abdallah Rhattoy, Mohammed Lahmer, Idriss Chana:
Performance analysis of random access mechanisms for machine type communications in LTE networks. 1-6 - Abderrazak Farchane, Mostafa Belkasmi:
New decoder for linear block codes. 1-5 - Kamran Ali, Huan Xuan Nguyen, Purav Shah, Quoc-Tuan Vien:
Energy efficient and scalable D2D architecture design for public safety network. 1-6 - Ali Azougaghe, Omar Ait Oualhaj, Mustapha Hedabou, Mostafa Belkasmi, Abdellatif Kobbane:
Many-to-one matching game towards secure virtual machines migration in cloud computing. 1-7 - Abdelfatteh Haidine, Sanae El Hassani:
LTE-a pro (4.5G) as pre-phase for 5G deployment: Closing the gap between technical requirements and network performance. 1-7 - Zouheir Labbi, Mohamed Senhadji, Ahmed Maarof, Mostafa Belkasmi:
A novel efficient ultralightweight authentication algorithm for RFID systems. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.