default search action
6th ICMCS 2018: Rabat, Morocco
- Abdelaaziz El Hibaoui, Mohamed Essaaidi, Youssef Zaz:
6th International Conference on Multimedia Computing and Systems, ICMCS 2018, Rabat, Morocco, May 10-12, 2018. IEEE 2018, ISBN 978-1-5386-6221-2 - Hajar Zankadi, Imane Hilal, Najima Daoudi, Abdellah Idrissi:
Facebook and MOOCs: a Comparative Analysis for a Collaborative Learning. 1-7 - Jalal Kiswani, Sergiu M. Dascalu, Muhanna Muhanna, Frederick C. Harris Jr.:
Clowiz: A Model-driven Development Platform for Cloud-based Information Systems. 1-6 - Zakia Menssouri, Zineb Mrabet, Lahbib Zenkouar, Hassan Qjidaa, Karim El Khadiri:
Design of VDD generator circuit for a passive UHF RFID tag in 180nm CMOS. 1-6 - Sara Lafkih, Youssef Zaz:
Image Mosaicing Review: application on solar plant frames. 1-7 - Mohammed Saber, Hatim Kharraz Aroussi, Abdessamad El Rharras, Rachid Saadane:
Raspberry Pi and RTL-SDR for Spectrum Sensing based on FM Real Signals. 1-6 - Hanen Mehrez, Rim Barrak, Adel Ghazel, Muriel Muller, Ghalid I. Abib:
Experimental Validation of a Reconfigurable GPS RF Sampling Receiver. 1-6 - Ibra Dioum, Kadidiatou Diallo, Mamadou M. Khouma, Idy Diop, Lamine Sane, Assane Ngom:
Miniature MIMO Antennas for 5G Mobile Terminals. 1-6 - Oussama Elhammoumi, Fatima Ezzahra Benmarrakchi, Nihal Ouherrou, Jamal El Kafi, Ali El Hore:
Emotion Recognition in E-learning Systems. 1-6 - Ouassim Karrakchou, Nancy Samaan, Ahmed Karmouch:
A Survey of Routing Mechanisms in ICNs. 1-6 - Rababe Safoine, Soufyane Mounir, Abdelmajid Farchi:
Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks. 1-5 - Asmaa Hilmi, Soufiane Mezroui, Ahmed El Oualkadi:
Overview of Visual Cryptographic Systems Based on XOR Function. 1-4 - Mohannad AlMousa, Rachid Benlamri, Richard Khoury:
NLP-Enriched Automatic Video Segmentation. 1-6 - Arisa Tajima, Hiroki Sato, Hayato Yamana:
Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption. 1-8 - Ouissale Ouazzani, Saad Dosse Bennani, Mohammed Jorio:
Design and Simulation of two elements rectangular Microstrip Patch Antenna at 5.8 GHz for RFID Reader Applications with high Directivity and Gain. 1-5 - Rafik Taouil, Ilyass Belghannou:
Restructuring Iceberg Lattice For Multilevel Analysis. 1-6 - Ayoub Abdellaoui, Jamal Elmhamdi, Halim Berradi:
Spatial Relation for Multipoint Relays Selection Algorithm in Mobile Ad Hoc Networks. 1-7 - Mohamed Iben Yaich, Mohammed Kanjaa, Soufiane El Adraoui, Khalid Mounirh, Mohsine Khalladi:
An Unsplit Formulation of the 3D-PML Absorbing Boundary Conditions for TLM-Method in Time Domain. 1-5 - F. Z. Khoutar, M. Aznabet, Otman El Mrabet:
Gain and Directivity Enhancement of a Rectangular Microstrip Patch Antenna using a Single Layer Metamaterial Superstrate. 1-4 - Rui Li, Jun Yang:
Improved YOLOv2 Object Detection Model. 1-6 - Maha Rezzai, Wafaa Dachry, Fouad Moutaouakkil, Hicham Medromi:
Design and realization of a new architecture based on multi-agent systems and reinforcement learning for traffic signal control. 1-6 - Mohammed Amin Rabah, Mohammed Bekhti:
New Design of Polygonal Antenna for Ka-band Applications. 1-3 - Abdessalam El Yassini, Saida Ibnyaich, Abdelouaheb Zeroual:
Design of Rectangular Patch Antenna by using an artificial planar meta-surface for Mobile RFID Reader. 1-4 - Omar Azouz, Youssef Lefdaoui:
Gamification design frameworks: a systematic mapping study. 1-9 - Hicham Tribak, Youssef Zaz, Houria Kelkoul:
Advanced Video Watermarking Approach based on Convolutional Encoding : Search for new solution against cinematography piracy traffic. 1-7 - Chaimae Zedak, Anass Lekbich, Abdelaziz Belfqih, Jamal Boukherouaa, Touria Haidi, Faissal El Mariami:
A proposed secure remote data acquisition architecture of photovoltaic systems based on the Internet of Things. 1-5 - Ibtissame Bouhassoune, Rachid Saadane, Khalid Minaoui:
Design of UHF RFID Z Shaped Slot Patch Tag for Human Monitoring Applications. 1-6 - Btissam Boustani, Abdennaceur Baghdad, Aicha Sahel, Abdelmajid Badri, Abdelhakim Ballouk:
Adaptive algorithm for smart antenna system. 1-5 - Khadidja Sadeddine, Rachida Djeradi, Fatma-Zohra Chelali, Amar Djeradi:
Recognition of Static Hand Gesture. 1-6 - Hilmi Lazrag, Hasna Chaibi, Rachid Saadane, Moulay Driss Rahmani:
An Optimal and Secure Routing Protocol for Wireless Sensor Networks. 1-5 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih:
Availability of Web Services based on Autonomous Classification and Negotiation of SLAs. 1-6 - D. J. Falimiaramanana, F. E. Ratolojanahary, I. Naciri, P. M. Rabotovao, L. Elmaimouni, Jean Etienne Lefebvre, Mohamed Rguiti, Tadeusz Gryba:
Modeling of Rosen-type piezoelectric transformer by mean of a polynomial approach. 1-6 - Zineb El Hariti, Abdelhakim Alali, Mohamed Sadik:
Power and Temperature Estimation for Soft-core Processor Task at the SystemC/TLM. 1-5 - Sidi Mohamed Snineh, Mohamed Youssfi, Omar Bouattane, Abdelaziz Daaif, Oum El Kheir Abra:
Real-time management model for frequent Big Data errors : Automatic Clean Repository For Big Data (ACR). 1-6 - Noureddine El Abid Amrani, Mohamed Youssfi, Oum El Kheir Abra:
Semantic interoperability between heterogeneous multi-agent systems based on Deep Learning. 1-6 - Khalid El Ouahabi, Khalid Roky, Otman El Mrabet:
New Design of Compact CSRR Antenna Loaded with Rectangular Slots. 1-3 - Aziz Srai, Fatima Guerouate, Naoual Berbiche, Hilal Drissi Lahsini:
MDA Approach for EJB Model. 1-6 - Hafawa Messaoudi, Taoufik Aguili:
Use of a Split Ring Resonators with Dipole and PIFA Antenna to Reduce the SAR in a Spherical Multilayered Head Model. 1-6 - Mohamed El Bakkali, Otman El Mrabet, Mohamed El Khamlichi, Mohsine Khalladi, Mohammed Ali Ennasar:
Single-Layer UHF RFID Tag Antenna with Multifunctional Characteristics. 1-3 - Ivana Strumberger, Eva Tuba, Nebojsa Bacanin, Marko Beko, Milan Tuba:
Modified Monarch Butterfly Optimization Algorithm for RFID Network Planning. 1-6 - Kaouther Taleb Ali, Sonia Ben Rejeb, Zièd Choukair:
Energy Conservation Strategy for M2M Differentiated Services in 5G/HetNet. 1-6 - Teddy Mantoro, Media A. Ayu, Suhendi:
Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods. 1-5 - Ismail Er Rachid, Redouane Chaibi, Badreddine El Haiek, El Houssaine Tissir, Abdelaziz Hmamed:
Robust Observer-Based Controller Design for Uncertain Discrete-time Systems in Finite Frequency Domain. 1-6 - M. L. Moutis, Mohammed Ali Ennasar, I. Aznabet, Otman El Mrabet, A. Elfarkhsi:
A Low Cost Automated RFID Tag Antenna Measurement Set-up Based on UHF-RFID Reader. 1-5 - Ilham Maskani, Jaouad Boutahar, Souhaïl El Ghazi El Houssaïni:
Modeling telemedicine security requirements using a SysML security extension. 1-6 - Amal Afyf, Mohamed Adel Sennouni, Larbi Bellarbi, Anouar Achour, Nourdin Yaakoubi:
Enhanced RF Energy Harvester for Power Efficient Internet-of-Things Wireless Sensors. 1-6 - Sara Serbout, Mohammed Benattou:
Toward a Constraint Based Test Case Generation of Parallel BPEL Process. 1-6 - Youssra Chatei, Imane Maslouhi, Kamal Ghoumid, El Miloud Ar-reyouchi:
Performance enhancement of wireless sensor networks using an efficient coding approach. 1-5 - Omar Barki, Zouhair Guennoun, Adnane Addaim:
Artificial Neural Networks for Communication Wireless Networks: a Synthetic Study. 1-5 - Amal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir:
Admission Control Algorithm for Network Slicing Management in SDN-NFV Environment. 1-6 - Ali Alqarni, Abdennour El Rhalibi, Yuanyuan Shen:
Game-Theoretic Based Service Level Agreement for Cloud Computing. 1-6 - Fouad Farah, Mustapha El Alaoui, Karim El Khadiri, Hassan Qjidaa:
New Analog Li-Ion Battery Charger Using Pulsed Charging Method. 1-4 - Mohamed El Khamlichi, Otman El Mrabet, Mohamed El Bakkali, Mohsine Khalladi, Mohammed Ali Ennasar:
T-shaped Tag antenna for UHF RFID Applications. 1-4 - Mostafa Hefnawi, Esmael Yahya:
Capacity-Aware Hybrid beamforming for Multi-User Massive MIMO. 1-3 - Lakbir Belrhiti, Fatima Riouch, Abdelwahed Tribak, Jaouad Terhzaz, Abdelmalik Bouyahyaoui, Angel Mediavilla Sanchez:
Comparison and Evaluation of SAR Induced in Four Human Head models for Two Types of Antennas Used in Mobile Telephones. 1-6 - A. Abattouy, M. Y. Douieb, Mohammed Ali Ennasar, Otman El Mrabet, K. Ameziane:
Desing of a low cost meander line RFID tag antenna using 3D printing Technology. 1-3 - Maryame Naji, Najima Daoudi, Rachida Ajhoun:
Spatio-temporal context for improving sentiment analysis accuracy. 1-6 - Fatima Ezzahra Ezzrhari, Hassna Bensag, Mohamed Youssfi, Omar Bouattane, Oum El Kheir Abra:
Towards a New Micro Agents Middleware for Massively Distributed Systems. 1-6 - Safaa Achour, Mohammed Benattou:
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs. 1-6 - Larbi Mouhibbi, Majda Elhozmari, Ahmed Ettalbi:
Sorting and persisting REST and SOAP client for MaaS based architecture. 1-5 - Kawtar Dahmani, Abderrahim Tahiri, Olivier Habert:
An Enhanced Approach of an Intelligent Model of Home Support for People with Loss of Autonomy. 1-4 - Eva Tuba, Ivana Strumberger, Dejan Zivkovic, Nebojsa Bacanin, Milan Tuba:
Rigid Image Registration by Bare Bones Fireworks Algorithm. 1-6 - Imran Shafiq Ahmad, Songqiao Sun, Boubakeur Boufama:
Agent-based Crowd Simulation Modeling in a Gaming Environment. 1-6 - Yassir Samadi, Mostapha Zbakh, Najlae Kasmi:
The impact of checkpointing interval selection on the scheduling performance of Hadoop framework. 1-6 - Haithem Rezgui, Fatma Rouissi, Adel Ghazel:
Design Methodology Proposal of Digital Predistorter Using Matlab and Modelsim Cosimulation. 1-5 - Achraf Elouerghi, Amal Afyf, Larbi Bellarbi:
A Novel Miniaturized Circular UWB Patch Antenna: Referencing Study. 1-5 - Houda Elkoubaiti, Radouane Mrabet:
A Generic Architecture of Augmented and Virtual Reality in Classrooms. 1-4 - Sanaa Abu Alasal, Mohammad A. Alsmirat, Qanita Bani Baker, Yaser Jararweh:
Improving Passive 3D Model Reconstruction using Image Enhancement. 1-7 - Moukhliss Ghizlane, Reda Filali Hilali, Belhadaoui Hicham:
A Security Policy for Access Control to Academic Services Based on Public Key Infrastructures and Smart Cards. 1-6 - Houria Kelkoul, Youssef Zaz, Hicham Tribak, Gerald Schaefer:
A Robust Combined Audio and Video Watermark Algorithm Against Cinema Piracy. 1-4 - Farid Ykhlef:
Frequency Estimation and Tracking in Electrical Power Systems. 1-4 - Lamine Sane, Assane Ngom, Khaly Tall, Ibra Dioum, Idy Diop, M. Mansour Khouma, Kadidiatou Diallo, Sidi Mohamed Farssi:
Dual Band Pattern Reconfigurable MIMO Antenna System Design for 5G Wireless Applications. 1-5 - Faycal Bensalah, Najib El Kamoun, Ayoub Bahnasse:
Software Defined Networking for Smart Quality of Service Management on New Generation Network. 1-6 - Sara Bakkali, Hafssa Benaboud, Mouad Ben Mamoun:
Performance Evaluation of QoS-CMS Mechanism for Inter-domain Quality of Service. 1-7 - Manal Amraoui, Najima Daoudi, Imane Hilal, Rachida Ajhoun:
VANET protocols for more safety and fluidity in Intelligent Transportation Systems. 1-6 - Ihssene Menhour, M'hamed Bilal Abidine, Belkacem Fergani:
A New Framework Using PCA, LDA and KNN-SVM to Activity Recognition Based SmartPhone's Sensors. 1-5 - Meryem Ameur, Najlae Idrissi, Cherki Daoui:
Color Images Segmentation using Pairwise Markov Chain. 1-6 - Amine Amraoui, Youssef Fakhri, Mounir Ait Kerroum:
Multispectral Palmprint Recognition based on Fusion of Local Features. 1-6 - Safa Najjar, Fatma Rouissi, A. J. Han Vinck, Héla Gassara, Adel Ghazel:
SFSK versus OFDM Performances under the Narrowband PLC Channel Impairments. 1-5 - Qianyu Wu, Xinyue Zhang, Xudong Zhang:
An Improved Method for Oil Spill Detection. 1-5 - Soukaina Cherif Bourki Semlali, Mohammed Essaid Riffi, Faycal Chebihi:
Hybrid chicken swarm optimization with a GRASP constructive procedure using multi-threads to solve the quadratic assignment problem. 1-6 - Siwar Louati, Mohamed Ould-Elhassen, Fethi Choubani:
Design and Performance Evaluation of a 4*4 Butler Matrix Feeding Network Antennas with 26 GHz. 1-6 - Fatma-Zohra Chelali, Noureddine Cherabit, Amar Djeradi, Leila Falek:
Wavelet transform for speech compression and denoising. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.