


default search action
Annales des Télécommunications, Volume 80
Volume 80, Number 1-2, February 2025
- Paulo F. C. Barbosa
, Bruna Alves da Silva, Cleber Zanchettin, Renato M. de Moraes
:
A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning. 1-15 - Ahmed Zebouchi, Youcef Aklouf:
pRTMNSGA-III: a novel multi-objective algorithm for QoS-aware multi-cloud IoT service selection. 17-38 - Roopa Vuppula, Himansu Shekhar Pradhan
:
Smart contract implementation on network sharing for 6G wireless networks. 39-62 - Luona Song, Yinglei Teng, Yeyuan Feng, Nicolas Merveille, Jian Zhang
:
Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators. 63-78 - Marwa Abdelfatah, Abdelhalim Zekry, Shaimaa ElSayed
:
Orthogonal beamforming technique for massive MIMO systems. 79-97 - Hareesh Ayanampudi, Ravindra Dhuli:
Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications. 99-107 - Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan
:
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network. 109-122 - Muhammad Shahid Farid
, Badi uz Zaman Babar, Muhammad Hassan Khan:
Efficient representation of disoccluded regions in 3D video coding. 123-137 - Nagendra Kumar
:
Impact of NLPA and imperfect CSI on ASER performance of QAM schemes for two-way 3P-ANC multiple-relay network. 139-151 - Pauline Loygue, Khaldoun Al Agha, Guy Pujolle:
Carbon footprint of cloud, edge, and Internet of Edges. 153-169
Volume 80, Number 3-4, April 2025
- Khaled A. M. Al Soufy
, Faisal S. Al-Kamali, Claude D'Amours, Nagi H. N. Al-Ashwal
, Farhan M. A. Nashwan, Mohamed A. Swillam:
Performance evaluation of DFT/DCT/DST-based SC-FDMA systems in the presence of CFOs for wireless images transmission. 171-207 - Vivek Kumar, Kamal Kumar, Maheep Singh:
Generating practical adversarial examples against learning-based network intrusion detection systems. 209-226 - Thi Quynh Nguyen, Romain Laborde
, Abdelmalek Benzekri, Arnaud Oglaza, Mehdi Mounsif:
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels. 227-249 - Anil Kumar Kamboj
, Poonam Jindal, Pankaj Verma
:
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks. 251-263 - Abdelmounaim Bouroudi
, Abdelkader Outtagarts, Yassine Hadjadj-Aoul:
A dynamic AI-based algorithm selection for Virtual Network Embedding. 265-281 - Zhaolan Huang, Koen Zandberg, Kaspar Schleiser, Emmanuel Baccelli:
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models. 283-297 - F. Sinhababu, Arindum Mukherjee
, S. Sarkar, B. Chatterjee, A. Sarkar:
Impact of phase modulator on the performance of Costas loop. 299-309 - Tengteng Ma
, Chen Li, Yuanmou Chen, Zehui Li, Zhenyu Zhang, Jing Zhao:
Joint MEC selection and wireless resource allocation in 5G RAN. 311-322 - Aparna Singh
, Geetanjali Rathee:
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks. 323-339 - João Vitorino
, Miguel Silva
, Eva Maia
, Isabel Praça
:
Reliable feature selection for adversarially robust cyber-attack detection. 341-355 - Ludovic Paillat, Claudia-Lavinia Ignat, Davide Frey, Mathieu Turuani, Amine Ismail:
Discreet: distributed delivery service with context-aware cooperation. 357-374
Volume 80, Number 5-6, June 2025
- Abdellah Adib, Sofia Ben Jebara, Raja Elassali, Khalid Minaoui, Samir Saoudi:
ISIVC 2024 special issue - signal and audio processing, digital communications, and networking. 375-377 - Adil Chakhtouna, Sara Sekkate, Abdellah Adib:
Efficient bimodal emotion recognition system based on speech/text embeddings and ensemble learning fusion. 379-399 - Awatef Messaoudi, Hayet Boughrara, Zied Lachiri:
Multimodal emotion recognition: integrating speech and text for improved valence, arousal, and dominance prediction. 401-415 - Sara Sekkate, Safa Chebbi, Abdellah Adib, Sofia Ben Jebara:
Handling data scarcity through data augmentation for detecting offensive speech. 417-426 - Anass El Hallani, Adil Chakhtouna, Abdellah Adib:
Advanced speech biomarker integration for robust Alzheimer's disease diagnosis. 427-444 - Derek Kwaku Pobi Asiedu, Kwabena Ebo Bennin, Dennis Agyemanh Nana Gookyi, Mustapha Benjillali, Samir Saoudi:
Deep neural network-driven precision agriculture multi-path multi-hop noisy plant image data transmission and plant disease detection. 445-457 - Ameur Salem Zaidoun, Zied Lachiri:
A hybrid deep learning model for multi-class DDoS detection in SDN networks. 459-472 - Siham Sadiki, Hanae Belmajdoub, Nisrine Ibadah, Khalid Minaoui:
Enhanced deep learning approach for high-accuracy mobility coordinate prediction. 473-488 - Oummany Youssef, Raja Elassali, Fouzia Elbahhar Boukour:
Optimizing resource allocation in 5G-V2X communication: adaptive strategies for enhanced QoS in intelligent transportation systems. 489-500 - L'houssaine Aarif, Mohamed Tabaa, Hanaa Hachimi:
RSSI prediction and optimization of transmission power for improved LoRa communications performance. 501-520 - Nouhayla El Anzoul, Younes Karfa Bekali, Khalid Minaoui, Mohammed Lahsaini, Ilyass Saouidi:
Design and fabrication of a novel frequency-reconfigurable patch antenna for WiFi and 5 G applications. 521-531 - Inas Hasnaoui, Maria Zrikem, Raja Elassali:
Adaptive rollup execution: dynamic opcode-based sequencing for smart transaction ordering in Layer 2 rollups. 533-546 - Mouad Riyad, Abdellah Adib:
CET-attention mechanism impact on the classification of EEG signals. 547-555

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.