关注
HICHAM ZOUGAGH
HICHAM ZOUGAGH
professeur informatique, FST, université moulay Slimane
在 usms.ma 的电子邮件经过验证
标题
引用次数
引用次数
年份
Intrusion detection system in Wireless Sensor Network based on mobile agent
YEL Mourabit, A Toumanari, A Bouirden, H Zougagh, R Latif
2014 Second World Conference on Complex Systems (WCCS), 248-251, 2014
252014
Predictive system of semiconductor failures based on machine learning approach
Y El Mourabit, Y El Habouz, H Zougagh, Y Wadiai
International journal of advanced computer science and applications (IJACSA …, 2020
132020
A mobile agent approach for IDS in Mobile Ad Hoc Network
Y El Mourabit, A Toumanari, H Zougagh
IJCSI International Journal of Computer Science Issues 11 (1), 148-152, 2014
132014
Modified olsr protocol for detection and prevention of packet dropping attack in manet
H Zougagh, A Toumanari, R Latif, Y Elmourabit, N Idboufker
International Journal of Computer Applications 100 (17), 2014
122014
A novel security approach for struggling black hole attack in optimised link state routing protocol
H Zougagh, A Toumanari, R Latif, N Idboufker
International Journal of Sensor Networks 18 (1-2), 101-110, 2015
112015
Filtering and analyzing normal and abnormal electromyogram signals
S Elouaham, A Dliou, M Laaboubi, R Latif, N Elkamoun, H Zougagh
Indones. J. Electr. Eng. Comput. Sci 20 (1), 176-184, 2020
102020
Denoising electromyogram and electroencephalogram signals using improved complete ensemble empirical mode decomposition with adaptive noise
S Elouaham, A Dliou, N Elkamoun, R Latif, S Said, H Zougagh, K Khadiri
Indonesian Journal of Electrical Engineering and Computer Science 23 (2), 829, 2021
82021
Denoising Ventricular tachyarrhythmia Signal
A Dliou, S Elouaham, M Laaboubi, H Zougagh, A Saddik
2018 9th International Symposium on Signal, Image, Video and Communications …, 2018
72018
A performance comparison of routing protocols for ad hoc networks
H Zougagh, A Toumanari, R Latif, N Idboufker, Y Elmourabit
International Journal of Engineering Research and Applications (IJERA), 124-131, 2014
72014
Evaluating and comparison of intrusion in mobile ad hoc networks
Z Hicham, T Ahmed, L Rachid, I Noureddin
International Journal of Distributed and Parallel Systems 3 (2), 243, 2012
72012
Combination time-frequency and empirical wavelet transform methods for removal of composite noise in EMG signals
S Elouaham, B Nassiri, A Dliou, H Zougagh, N El Kamoun, K El Khadiri, ...
TELKOMNIKA (Telecommunication Computing Electronics and Control) 21 (6 …, 2023
62023
Reducing energy footprint in cloud computing: a study on the impact of clustering techniques and scheduling algorithms for scientific workflows
Y Saadi, S Jounaidi, S El Kafhali, H Zougagh
Computing 105 (10), 2231-2261, 2023
42023
Prevention of Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems
H Zougagh, N Idboufker, R Zoubairi, R El Ayachi
International Journal of Business Data Communications and Networking (IJBDCN …, 2019
42019
Business Intelligence: 6th International Conference, CBI 2021, Beni Mellal, Morocco, May 27–29, 2021, Proceedings
M Fakir, M Baslam, R El Ayachi
Springer Nature, 2021
32021
Hicham zougagh, Rachid Latif,” Intrusion Detection System In wireless Sensor network Based On Mobile Agent”
YEL Mourabit, A Toumanari, A Bouirden
Second World Conference on Complex Systems (WCCS), IEEE DOI 10, 0
3
A Comparison of the Denoising Performance Using Capon Time-Frequency and Empirical Wavelet Transform Applied on Biomedical Signal.
K El Khadiri, S Elouaham, B Nassiri, O El Melhaoui, S Said, N El Kamoun, ...
International Journal on Engineering Applications 11 (5), 2023
22023
Sentiment analysis decision system for tracking climate change opinion in twitter
M Lydiri, Y El Habouz, H Zougagh
International Conference on Business Intelligence, 188-196, 2022
22022
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge
H Zougagh, N Idboufker, Y El Mourabit, Y Saadi, S Elouaham
Innovations in Bio-Inspired Computing and Applications: Proceedings of the …, 2021
22021
A new sentiment analysis system of tweets based on machine learning approach
Y El Mourabit, Y El Habouz, MLH Zougagh
22020
A New Solution to Defend Against Cooperative Black Hole Attack in Optimized Link State Routing Protocol
H Zougagh, A Toumanari, R Latif, N Idboufker
International Review on Computers and Software (IRECOS) 8 (2), 519-526, 2013
22013
系统目前无法执行此操作,请稍后再试。
文章 1–20