


default search action
ACOSIS 2019: Marrakesh, Morocco
- Mostafa Belkasmi

, Jalel Ben-Othman
, Cheng Li
, Mohamed Essaaidi
:
Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers. Communications in Computer and Information Science 1264, Springer 2020, ISBN 978-3-030-61142-2
Wireless Communications and Services
- Abdelfettah Belhabib

, Mohamed Boulouird
, Moha M'Rabet Hassani:
Pilot Assignment vs Soft Pilot Reuse to Surpass the Pilot Contamination Problem: A Comparative Study in the Uplink Phase. 3-13 - Hocine Merah, Larbi Talbi, Mokhtaria Mesri, Khaled Tahkoubit:

New Channel Estimation for MC-CDMA System Under Fast Multipath Channel. 14-24 - Riza Arda Kirmizioglu, A. Murat Tekalp:

Multi-party WebRTC as a Managed Service over Multi-Operator SDN. 25-37 - El Miloud Ar-Reyouchi

, Yousra Lamrani, Imane Benchaib, Salma Rattal, Kamal Ghoumid:
NCBP: Network Coding Based Protocol for Recovering Lost Packets in the Internet of Things. 38-49
Vehicular Communications
- Khawla A. Alnajjar

, Noora Abdulrahman, Fatma Mahdi, Marwah Alramsi:
Vehicle Collision Avoidance. 53-64 - Saif Islam Bouderba, Najem Moussa:

On the V2X Velocity Synchronization at Unsignalized Intersections: Right Hand Priority Based System. 65-72 - Btissam Bousarhane, Driss Bouzidi:

Convolutional Neural Networks for Traffic Signs Recognition. 73-91
Channel Coding
- Hamza Boualame

, Idriss Chana
, Mostafa Belkasmi:
An Efficient Semi-Algebraic Decoding Algorithm for Golay Code. 95-102 - Es-Said Azougaghe

, Abderrazak Farchane, Saïd Safi
, Mostafa Belkasmi
:
Iterative Decoding of GSCB Codes Based on RS Codes Using Adapted Scaling Factors. 103-114 - Abdelghani Boudaoud

, Mustapha Elharoussi, Elhassane Abdelmounim:
Turbo Decoder Based on DSC Codes for Multiple-Antenna Systems. 115-120 - Zakaria M'rabet

, Fouad Ayoub
, Mostafa Belkasmi
:
A Threshold Decoding Algorithm for Non-binary OSMLD Codes. 121-133
Construction of Error Correcting Codes
- Jamal Laaouine:

On the Hamming and Symbol-Pair Distance of Constacyclic Codes of Length ps over $\mathbb {F}_{p^m}+ u\mathbb {F}_{p^m}$. 137-154
Intrusion Detection Techniques
- Basma Karbal

, Rahal Romadi
:
A Comparison of Different Machine Learning Algorithms for Intrusion Detection. 157-169 - Meryem Amar, Bouabid El Ouahidi

:
A Weighted LSTM Deep Learning for Intrusion Detection. 170-179 - Mohamed Amine Kerrich, Adnane Addaim, Loubna Damej:

Proposed Solution for HID Fileless Ransomware Using Machine Learning. 180-192
Wireless and Mobile Network Security
- Oualid Boumaouche, Afifa Ghenai, Nadia Zeghib:

Data Oriented Blockchain: Off-Chain Storage with Data Dedicated and Prunable Transactions. 195-204 - Hafsa Benaddi

, Khalil Ibrahimi
, Haytham Dahri, Abderrahim Benslimane:
A Framework to Secure Cluster-Header Decision in Wireless Sensor Network Using Blockchain. 205-218 - Nada Mouchfiq

, Chaimae Benjbara
, Ahmed Habbani:
Security in MANETs: The Blockchain Issue. 219-232 - Abdelaali Tioutiou, Ouafaa Diouri:

Improving IoT Security with Software Defined Networking (SDN). 233-238
Applied Cryptography
- Wiam Zamrani, Esmail Ahouzi:

Optical Image Encryption Process Using Triple Deterministic Spherical Phase Masks Array. 241-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














