default search action
Fatiha Merazka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Tarek Gueham, Fatiha Merazka:
Packet loss concealment method based on hidden Markov model and decision tree for AMR-WB codec. Multim. Tools Appl. 83(4): 11261-11297 (2024) - [c21]Islem Teboub, Amar Aissani, Fatiha Merazka:
A Queuing Model for Software-Defined Networking in Cloud and Multi-Controller Environments. PAIS 2024: 1-7 - [c20]Meriem Ouadah, Fatiha Merazka:
Securing UAV Communication: Authentication and Integrity. WINCOM 2024: 1-7 - [i13]Abdellah Tahenni, Fatiha Merazka:
SD-WAN over MPLS: A Comprehensive Performance Analysis and Security with Insights into the Future of SD-WAN. CoRR abs/2401.01344 (2024) - [i12]Elias Benamira, Fatiha Merazka, Günes Karabulut-Kurt:
Outage Probability in Network Coding Based Cooperative Wireless Networks over Nakagami-m Fading Channels. CoRR abs/2406.08781 (2024) - 2023
- [j12]Tarek Gueham, Fatiha Merazka:
Packet loss concealment method based on interpolation in packet voice coding. Comput. Stand. Interfaces 85: 103709 (2023) - [c19]Abdellah Tahenni, Fatiha Merazka, Fatma Zahra Hab:
Quantum Computing for DNA Analysis and AI in Genomics. AICCSA 2023: 1-6 - [i11]Nacereddine Sitouah, Fatiha Merazka, Abdenour Hedjazi:
Deep learning approach for interruption attacks detection in LEO satellite networks. CoRR abs/2301.03998 (2023) - [i10]Ghania Khraimech, Fatiha Merazka:
A Cooperative NOMA User Pairing in UAV-Based Wireless Networks. CoRR abs/2304.13499 (2023) - [i9]Mohamed Amine Brahimi, Fatiha Merazka:
Subspace Coding for Error Control and Interference Mitigation in Routing Solutions with Cooperative Destination Nodes. CoRR abs/2304.13500 (2023) - [i8]Mokhtar Bouteggui, Fatiha Merazka, Gunes Karabulut-Kurt:
Effective Capacity Analysis of H-ARQ Assisted Cooperative Communication Systems. CoRR abs/2304.13503 (2023) - 2022
- [j11]Mohamed Amine Brahimi, Fatiha Merazka:
Data confidentiality-preserving schemes for random linear network coding-capable networks. J. Inf. Secur. Appl. 66: 103136 (2022) - 2021
- [j10]Elias Benamira, Fatiha Merazka:
Maximizing throughput in RLNC-based multi-source multi-relay with guaranteed decoding. Digit. Signal Process. 117: 103164 (2021) - [j9]Messaouda Boumaraf, Fatiha Merazka:
Secure speech coding communication using hyperchaotic key generators for AMR-WB codec. Multim. Syst. 27(2): 247-269 (2021) - [j8]Mohamed Amine Brahimi, Fatiha Merazka, Gunes Karabulut-Kurt:
Secure network coding for data encoded using subspace codes. Phys. Commun. 48: 101408 (2021) - 2020
- [j7]Mokhtar Bouteggui, Fatiha Merazka:
Outage analysis for joint antenna and path selection decode-and-forward relay networks. Digit. Signal Process. 98: 102638 (2020) - [j6]Mokhtar Bouteggui, Fatiha Merazka, Gunes Karabulut-Kurt:
The effective capacity of two-unicast network coding STBC under retransmission schemes. Digit. Signal Process. 106: 102819 (2020) - [c18]Elias Benamira, Fatiha Merazka, Günes Karabulut-Kurt:
NCC Wireless Networks: Reed-Solomon Channel Coding and Outage Probability. IDAACS-SWS 2020: 1-4 - [c17]Mohamed Amine Brahimi, Fatiha Merazka:
A secure algorithm for Random Linear Network Coding. IDAACS-SWS 2020: 1-4
2010 – 2019
- 2019
- [j5]Mokhtar Bouteggui, Fatiha Merazka:
Performance analysis of sub-optimal transmit and receive antenna selection amplify and forward cooperative communication. IET Commun. 13(20): 3537-3546 (2019) - [j4]Hocine Chaouch, Fatiha Merazka, Philippe Marthon:
Multiple description coding technique to improve the robustness of ACELP based coders AMR-WB. Speech Commun. 108: 33-40 (2019) - [c16]Messaouda Boumaraf, Fatiha Merazka:
Speech Coding Combining Chaos Encryption and Error Recovery for G.722.2 Codec. ICNLSP 2019: 128-134 - [c15]Mokhtar Bouteggui, Fatiha Merazka:
A Joint Antenna and Path Selection for MIMO Cooperative Communication With Single Selective Decode and Forward Relay. WINCOM 2019: 1-5 - [i7]Elias Benamira, Fatiha Merazka, Gunes Karabulut-Kurt:
Joint Channel Coding and Cooperative Network Coding on PSK Constellations in Wireless Networks. CoRR abs/1902.01913 (2019) - [i6]Tarek Gueham, Fatiha Merazka:
An Enhanced Interleaving Frame Loss Concealment Method for Voice Over IP Network Services. CoRR abs/1902.01920 (2019) - [i5]Oualid Benamara, Fatiha Merazka:
A New Distribution Version of Boneh-Goh-Nissim Cryptosystem: Security and performance analysis. CoRR abs/1907.07282 (2019) - 2018
- [c14]Tarek Gueham, Fatiha Merazka:
An Enhanced Interleaving Frame Loss Concealment Method for Voice Over IP Network Services. EUSIPCO 2018: 1302-1306 - [c13]Messaouda Boumaraf, Fatiha Merazka:
Partial and full speech encryption schemes based on 1D chaotic maps for AMR-WB codec. ICNLSP 2018: 1-5 - 2017
- [c12]Messaouda Boumaraf, Fatiha Merazka:
Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec. ICITST 2017: 87-91 - [c11]Tarek Gueham, Fatiha Merazka:
An enhanced insertion packet loss concealment method for voice over IP network services. TSP 2017: 377-382 - [c10]Fatiha Merazka, Mokhtar Bouteggui:
Performance of source transmit antenna selection for MIMO cooperative communication system based DF protocol: Symbol error rate and diversity order. WINCOM 2017: 1-8 - [i4]Mokhtar Bouteggui, Fatiha Merazka:
Performance of Source transmit Antenna selection for MIMO cooperative communication System Based DF protocol: Symbol Error Rate and Diversity order. CoRR abs/1711.03576 (2017) - 2016
- [j3]Fulvio Babich, Massimiliano Comisso, Riccardo Corrado, Fatiha Merazka:
Joint Voice/Video Retry Limit Adaptation for On-Demand Streaming Over WiFi Networks. IEEE Commun. Lett. 20(9): 1852-1855 (2016) - [j2]Oualid Benamara, Fatiha Merazka, Kamel Betina:
An improvement of a cryptanalysis algorithm. Inf. Process. Lett. 116(2): 192-196 (2016) - 2015
- [c9]Fatiha Merazka, Fulvio Babich:
Dynamic forward error correction algorithm over IP network services for ITU-T G.722.2 codec. ICITST 2015: 369-372 - [c8]Wahiba Hentabli, Fatiha Merazka:
An extension of RSA_512 to RSA_1024 core under hardware platform based on montgomery powering. ICITST 2015: 448-453 - [c7]Dalila Slimani, Fatiha Merazka:
Encryption of speech signal with multiple secret keys. ICNLSP 2015: 79-88 - 2014
- [c6]Fatiha Merazka:
Intraframe quantization of line spectrum pairs for narrowband speech coding in packet networks. CSNDSP 2014: 48-51 - [c5]Fatiha Merazka:
A comparison of packet loss concealment and control for voice transmission over IP network services. CSNDSP 2014: 497-501 - [c4]Fatiha Merazka:
Wideband Speech Encryption Based Arnold Cat Map for AMR-WB G.722.2 Codec. ICISP 2014: 658-664 - [i3]Aziz Mouzali, Fatiha Merazka, Damian Markham:
Quantum Secret Sharing with error correction. CoRR abs/1409.3620 (2014) - [i2]Oualid Benamara, Fatiha Merazka:
An improvement of a cryptanalysis algorithm. CoRR abs/1409.5287 (2014) - [i1]Aziz Mouzali, Fatiha Merazka:
Quantum correction with three codes. CoRR abs/1409.7853 (2014) - 2013
- [c3]Fatiha Merazka:
Packet loss concealment using piggybacking for speech over IP network services. IDAACS 2013: 509-512 - 2012
- [j1]Fatiha Merazka:
Intraframe quantization of speech line spectrum pairs for code-excited linear prediction based coders in packet networks. Trans. Emerg. Telecommun. Technol. 23(8): 789-804 (2012) - [c2]Fatiha Merazka:
Differential quantization of spectral parameters for CELP based coders in packet networks. IECON 2012: 1495-1498 - [c1]Fatiha Merazka:
VQ Codebook Design Using Genetic Algorithms for Speech Line Spectral Frequencies. ISICA 2012: 557-566
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint