


default search action
6th ICMCS 2018: Rabat, Morocco
- Abdelaaziz El Hibaoui, Mohamed Essaaidi, Youssef Zaz:

6th International Conference on Multimedia Computing and Systems, ICMCS 2018, Rabat, Morocco, May 10-12, 2018. IEEE 2018, ISBN 978-1-5386-6221-2 - Hajar Zankadi

, Imane Hilal
, Najima Daoudi
, Abdellah Idrissi
:
Facebook and MOOCs: a Comparative Analysis for a Collaborative Learning. 1-7 - Jalal Kiswani

, Sergiu M. Dascalu, Muhanna Muhanna
, Frederick C. Harris Jr.:
Clowiz: A Model-driven Development Platform for Cloud-based Information Systems. 1-6 - Zakia Menssouri, Zineb Mrabet, Lahbib Zenkouar, Hassan Qjidaa

, Karim El Khadiri
:
Design of VDD generator circuit for a passive UHF RFID tag in 180nm CMOS. 1-6 - Sara Lafkih, Youssef Zaz

:
Image Mosaicing Review: application on solar plant frames. 1-7 - Mohammed Saber, Hatim Kharraz Aroussi, Abdessamad El Rharras, Rachid Saadane

:
Raspberry Pi and RTL-SDR for Spectrum Sensing based on FM Real Signals. 1-6 - Hanen Mehrez, Rim Barrak, Adel Ghazel, Muriel Muller, Ghalid I. Abib:

Experimental Validation of a Reconfigurable GPS RF Sampling Receiver. 1-6 - Ibra Dioum

, Kadidiatou Diallo, Mamadou M. Khouma, Idy Diop
, Lamine Sane, Assane Ngom:
Miniature MIMO Antennas for 5G Mobile Terminals. 1-6 - Oussama Elhammoumi, Fatima Ezzahra Benmarrakchi

, Nihal Ouherrou, Jamal El Kafi, Ali El Hore:
Emotion Recognition in E-learning Systems. 1-6 - Ouassim Karrakchou

, Nancy Samaan, Ahmed Karmouch:
A Survey of Routing Mechanisms in ICNs. 1-6 - Rababe Safoine, Soufyane Mounir

, Abdelmajid Farchi:
Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks. 1-5 - Asmaa Hilmi, Soufiane Mezroui

, Ahmed El Oualkadi
:
Overview of Visual Cryptographic Systems Based on XOR Function. 1-4 - Mohannad AlMousa, Rachid Benlamri, Richard Khoury

:
NLP-Enriched Automatic Video Segmentation. 1-6 - Arisa Tajima, Hiroki Sato, Hayato Yamana

:
Outsourced Private Set Intersection Cardinality with Fully Homomorphic Encryption. 1-8 - Ouissale Ouazzani, Saad Dosse Bennani

, Mohammed Jorio
:
Design and Simulation of two elements rectangular Microstrip Patch Antenna at 5.8 GHz for RFID Reader Applications with high Directivity and Gain. 1-5 - Rafik Taouil, Ilyass Belghannou:

Restructuring Iceberg Lattice For Multilevel Analysis. 1-6 - Ayoub Abdellaoui, Jamal Elmhamdi

, Halim Berradi
:
Spatial Relation for Multipoint Relays Selection Algorithm in Mobile Ad Hoc Networks. 1-7 - Mohamed Iben Yaich, Mohammed Kanjaa

, Soufiane El Adraoui, Khalid Mounirh, Mohsine Khalladi:
An Unsplit Formulation of the 3D-PML Absorbing Boundary Conditions for TLM-Method in Time Domain. 1-5 - F. Z. Khoutar, M. Aznabet, Otman El Mrabet:

Gain and Directivity Enhancement of a Rectangular Microstrip Patch Antenna using a Single Layer Metamaterial Superstrate. 1-4 - Rui Li, Jun Yang:

Improved YOLOv2 Object Detection Model. 1-6 - Maha Rezzai, Wafaa Dachry, Fouad Moutaouakkil

, Hicham Medromi:
Design and realization of a new architecture based on multi-agent systems and reinforcement learning for traffic signal control. 1-6 - Mohammed Amin Rabah, Mohammed Bekhti:

New Design of Polygonal Antenna for Ka-band Applications. 1-3 - Abdessalam El Yassini, Saida Ibnyaich, Abdelouaheb Zeroual:

Design of Rectangular Patch Antenna by using an artificial planar meta-surface for Mobile RFID Reader. 1-4 - Omar Azouz, Youssef Lefdaoui:

Gamification design frameworks: a systematic mapping study. 1-9 - Hicham Tribak, Youssef Zaz

, Houria Kelkoul:
Advanced Video Watermarking Approach based on Convolutional Encoding : Search for new solution against cinematography piracy traffic. 1-7 - Chaimae Zedak

, Anass Lekbich
, Abdelaziz Belfqih
, Jamal Boukherouaa, Touria Haidi
, Faissal El Mariami:
A proposed secure remote data acquisition architecture of photovoltaic systems based on the Internet of Things. 1-5 - Ibtissame Bouhassoune, Rachid Saadane

, Khalid Minaoui
:
Design of UHF RFID Z Shaped Slot Patch Tag for Human Monitoring Applications. 1-6 - Btissam Boustani, Abdennaceur Baghdad

, Aicha Sahel
, Abdelmajid Badri
, Abdelhakim Ballouk:
Adaptive algorithm for smart antenna system. 1-5 - Khadidja Sadeddine, Rachida Djeradi, Fatma-Zohra Chelali, Amar Djeradi:

Recognition of Static Hand Gesture. 1-6 - Hilmi Lazrag, Hasna Chaibi, Rachid Saadane

, Moulay Driss Rahmani
:
An Optimal and Secure Routing Protocol for Wireless Sensor Networks. 1-5 - Zineb Bakraouy, Amine Baïna, Mostafa Bellafkih

:
Availability of Web Services based on Autonomous Classification and Negotiation of SLAs. 1-6 - D. J. Falimiaramanana, F. E. Ratolojanahary, I. Naciri, P. M. Rabotovao, L. Elmaimouni

, Jean Etienne Lefebvre, Mohamed Rguiti
, Tadeusz Gryba:
Modeling of Rosen-type piezoelectric transformer by mean of a polynomial approach. 1-6 - Zineb El Hariti, Abdelhakim Alali, Mohamed Sadik

:
Power and Temperature Estimation for Soft-core Processor Task at the SystemC/TLM. 1-5 - Sidi Mohamed Snineh, Mohamed Youssfi

, Omar Bouattane
, Abdelaziz Daaif
, Oum El Kheir Abra
:
Real-time management model for frequent Big Data errors : Automatic Clean Repository For Big Data (ACR). 1-6 - Noureddine El Abid Amrani, Mohamed Youssfi

, Oum El Kheir Abra
:
Semantic interoperability between heterogeneous multi-agent systems based on Deep Learning. 1-6 - Khalid El Ouahabi, Khalid Roky, Otman El Mrabet:

New Design of Compact CSRR Antenna Loaded with Rectangular Slots. 1-3 - Aziz Srai, Fatima Guerouate, Naoual Berbiche, Hilal Drissi Lahsini:

MDA Approach for EJB Model. 1-6 - Hafawa Messaoudi, Taoufik Aguili:

Use of a Split Ring Resonators with Dipole and PIFA Antenna to Reduce the SAR in a Spherical Multilayered Head Model. 1-6 - Mohamed El Bakkali

, Otman El Mrabet, Mohamed El Khamlichi, Mohsine Khalladi, Mohammed Ali Ennasar:
Single-Layer UHF RFID Tag Antenna with Multifunctional Characteristics. 1-3 - Ivana Strumberger, Eva Tuba

, Nebojsa Bacanin
, Marko Beko, Milan Tuba:
Modified Monarch Butterfly Optimization Algorithm for RFID Network Planning. 1-6 - Kaouther Taleb Ali, Sonia Ben Rejeb

, Zièd Choukair:
Energy Conservation Strategy for M2M Differentiated Services in 5G/HetNet. 1-6 - Teddy Mantoro, Media A. Ayu, Suhendi:

Multi-Faces Recognition Process Using Haar Cascades and Eigenface Methods. 1-5 - Ismail Er Rachid

, Redouane Chaibi, Badreddine El Haiek
, El Houssaine Tissir
, Abdelaziz Hmamed:
Robust Observer-Based Controller Design for Uncertain Discrete-time Systems in Finite Frequency Domain. 1-6 - M. L. Moutis, Mohammed Ali Ennasar, I. Aznabet, Otman El Mrabet, A. Elfarkhsi:

A Low Cost Automated RFID Tag Antenna Measurement Set-up Based on UHF-RFID Reader. 1-5 - Ilham Maskani

, Jaouad Boutahar, Souhaïl El Ghazi El Houssaïni:
Modeling telemedicine security requirements using a SysML security extension. 1-6 - Amal Afyf, Mohamed Adel Sennouni, Larbi Bellarbi

, Anouar Achour, Nourdin Yaakoubi
:
Enhanced RF Energy Harvester for Power Efficient Internet-of-Things Wireless Sensors. 1-6 - Sara Serbout, Mohammed Benattou

:
Toward a Constraint Based Test Case Generation of Parallel BPEL Process. 1-6 - Youssra Chatei, Imane Maslouhi, Kamal Ghoumid, El Miloud Ar-reyouchi

:
Performance enhancement of wireless sensor networks using an efficient coding approach. 1-5 - Omar Barki

, Zouhair Guennoun
, Adnane Addaim
:
Artificial Neural Networks for Communication Wireless Networks: a Synthetic Study. 1-5 - Amal Kammoun, Nabil Tabbane, Gladys Diaz

, Nadjib Achir:
Admission Control Algorithm for Network Slicing Management in SDN-NFV Environment. 1-6 - Ali Alqarni, Abdennour El Rhalibi, Yuanyuan Shen:

Game-Theoretic Based Service Level Agreement for Cloud Computing. 1-6 - Fouad Farah, Mustapha El Alaoui

, Karim El Khadiri
, Hassan Qjidaa
:
New Analog Li-Ion Battery Charger Using Pulsed Charging Method. 1-4 - Mohamed El Khamlichi, Otman El Mrabet, Mohamed El Bakkali

, Mohsine Khalladi, Mohammed Ali Ennasar:
T-shaped Tag antenna for UHF RFID Applications. 1-4 - Mostafa Hefnawi, Esmael Yahya:

Capacity-Aware Hybrid beamforming for Multi-User Massive MIMO. 1-3 - Lakbir Belrhiti, Fatima Riouch, Abdelwahed Tribak

, Jaouad Terhzaz
, Abdelmalik Bouyahyaoui, Angel Mediavilla Sanchez:
Comparison and Evaluation of SAR Induced in Four Human Head models for Two Types of Antennas Used in Mobile Telephones. 1-6 - A. Abattouy, M. Y. Douieb, Mohammed Ali Ennasar, Otman El Mrabet, K. Ameziane:

Desing of a low cost meander line RFID tag antenna using 3D printing Technology. 1-3 - Maryame Naji, Najima Daoudi

, Rachida Ajhoun:
Spatio-temporal context for improving sentiment analysis accuracy. 1-6 - Fatima Ezzahra Ezzrhari

, Hassna Bensag, Mohamed Youssfi
, Omar Bouattane
, Oum El Kheir Abra
:
Towards a New Micro Agents Middleware for Massively Distributed Systems. 1-6 - Safaa Achour, Mohammed Benattou

:
Vulnerabilities Constraint Based Analysis Approach for Java Bytecode Programs. 1-6 - Larbi Mouhibbi, Majda Elhozmari, Ahmed Ettalbi:

Sorting and persisting REST and SOAP client for MaaS based architecture. 1-5 - Kawtar Dahmani, Abderrahim Tahiri, Olivier Habert:

An Enhanced Approach of an Intelligent Model of Home Support for People with Loss of Autonomy. 1-4 - Eva Tuba

, Ivana Strumberger, Dejan Zivkovic
, Nebojsa Bacanin
, Milan Tuba:
Rigid Image Registration by Bare Bones Fireworks Algorithm. 1-6 - Imran Shafiq Ahmad, Songqiao Sun, Boubakeur Boufama:

Agent-based Crowd Simulation Modeling in a Gaming Environment. 1-6 - Yassir Samadi, Mostapha Zbakh, Najlae Kasmi:

The impact of checkpointing interval selection on the scheduling performance of Hadoop framework. 1-6 - Haithem Rezgui

, Fatma Rouissi, Adel Ghazel:
Design Methodology Proposal of Digital Predistorter Using Matlab and Modelsim Cosimulation. 1-5 - Achraf Elouerghi

, Amal Afyf, Larbi Bellarbi
:
A Novel Miniaturized Circular UWB Patch Antenna: Referencing Study. 1-5 - Houda Elkoubaiti, Radouane Mrabet:

A Generic Architecture of Augmented and Virtual Reality in Classrooms. 1-4 - Sanaa Abu Alasal, Mohammad A. Alsmirat

, Qanita Bani Baker
, Yaser Jararweh:
Improving Passive 3D Model Reconstruction using Image Enhancement. 1-7 - Moukhliss Ghizlane

, Reda Filali Hilali
, Belhadaoui Hicham:
A Security Policy for Access Control to Academic Services Based on Public Key Infrastructures and Smart Cards. 1-6 - Houria Kelkoul, Youssef Zaz

, Hicham Tribak, Gerald Schaefer
:
A Robust Combined Audio and Video Watermark Algorithm Against Cinema Piracy. 1-4 - Farid Ykhlef:

Frequency Estimation and Tracking in Electrical Power Systems. 1-4 - Lamine Sane, Assane Ngom, Khaly Tall, Ibra Dioum

, Idy Diop
, M. Mansour Khouma, Kadidiatou Diallo, Sidi Mohamed Farssi:
Dual Band Pattern Reconfigurable MIMO Antenna System Design for 5G Wireless Applications. 1-5 - Faycal Bensalah

, Najib El Kamoun, Ayoub Bahnasse
:
Software Defined Networking for Smart Quality of Service Management on New Generation Network. 1-6 - Sara Bakkali, Hafssa Benaboud

, Mouad Ben Mamoun:
Performance Evaluation of QoS-CMS Mechanism for Inter-domain Quality of Service. 1-7 - Manal Amraoui, Najima Daoudi

, Imane Hilal
, Rachida Ajhoun:
VANET protocols for more safety and fluidity in Intelligent Transportation Systems. 1-6 - Ihssene Menhour, M'hamed Bilal Abidine, Belkacem Fergani:

A New Framework Using PCA, LDA and KNN-SVM to Activity Recognition Based SmartPhone's Sensors. 1-5 - Meryem Ameur, Najlae Idrissi

, Cherki Daoui:
Color Images Segmentation using Pairwise Markov Chain. 1-6 - Amine Amraoui

, Youssef Fakhri
, Mounir Ait Kerroum
:
Multispectral Palmprint Recognition based on Fusion of Local Features. 1-6 - Safa Najjar, Fatma Rouissi, A. J. Han Vinck, Héla Gassara, Adel Ghazel:

SFSK versus OFDM Performances under the Narrowband PLC Channel Impairments. 1-5 - Qianyu Wu, Xinyue Zhang, Xudong Zhang:

An Improved Method for Oil Spill Detection. 1-5 - Soukaina Cherif Bourki Semlali, Mohammed Essaid Riffi

, Faycal Chebihi:
Hybrid chicken swarm optimization with a GRASP constructive procedure using multi-threads to solve the quadratic assignment problem. 1-6 - Siwar Louati, Mohamed Ould-Elhassen

, Fethi Choubani:
Design and Performance Evaluation of a 4*4 Butler Matrix Feeding Network Antennas with 26 GHz. 1-6 - Fatma-Zohra Chelali, Noureddine Cherabit

, Amar Djeradi, Leila Falek
:
Wavelet transform for speech compression and denoising. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














