default search action
Mohamed Lahby
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Omar Nejjarou, Said Aqil, Mohamed Lahby:
Hybrid meta-heuristic solving no-wait flow shop scheduling minimizing maximum tardiness. Evol. Intell. 17(5): 3935-3959 (2024) - [j8]Youssra Cheriguene, Fatima Zohra Bousbaa, Chaker Abdelaziz Kerrache, Soumia Djellikh, Nasreddine Lagraa, Mohamed Lahby, Abderrahmane Lakas:
COCOMA: a resource-optimized cooperative UAVs communication protocol for surveillance and monitoring applications. Wirel. Networks 30(5): 4429-4445 (2024) - [c24]Achraf Sayah, Saïd Aqil, Bouchra Aadil, Mohamed Lahby:
Two Hybrid Heuristic Algorithms for Optimizing Data Processing Schedules in Distributed Edge Computing. WINCOM 2024: 1-6 - 2023
- [j7]Mohamed Lahby, Rachid Saadane, Sérgio D. Correia:
Integration of IoT with cloud computing for next generation wireless technology. Ann. des Télécommunications 78(11-12): 653-654 (2023) - [j6]Geetanjali Rathee, Chaker Abdelaziz Kerrache, Mohamed Lahby:
TrustBlkSys: A Trusted and Blockchained Cybersecure System for IIoT. IEEE Trans. Ind. Informatics 19(2): 1592-1599 (2023) - [c23]Omar Nejjarou, Saïd Aqil, Mohamed Lahby:
Improvement artificial bee colony meta-heuristic for solving manufacturing flow-shop scheduling problem under blocking constraint. SITA 2023: 1-6 - [c22]Achraf Sayah, Saïd Aqil, Mohamed Lahby:
Minimizing Maximum Tardiness in a Distributed Flow Shop Manufacturing Problem under No-Waiting and Sequence Dependent Setup Time Constraints. SITA 2023: 1-6 - [c21]Mehdi Attioui, Mohamed Lahby:
Deep Learning-Based Congestion Forecasting: A Literature Review and Future. WINCOM 2023: 1-8 - 2022
- [j5]Hamza Mourad, Said Fahim, Adriana Burlea-Schiopoiu, Mohamed Lahby, Abdelbaki Attioui:
Modeling and Mathematical Analysis of Liquidity Risk Contagion in the Banking System. J. Appl. Math. 2022: 5382153:1-5382153:11 (2022) - [c20]Hind Khoulimi, Mohamed Lahby, Othman Benammar:
Towards an intelligent system to manage IDS for IoT. CIoT 2022: 9-16 - [c19]Omar Nejjarou, Saïd Aqil, Mohamed Lahby:
Constructive heuristics and mathematical formulation for solving the permutation flow shop scheduling problem with setup time. ICECOCS 2022: 1-5 - 2020
- [b2]Mohamed Lahby:
Contributions à la modélisation et à l'optimisation des problèmes en temps réel. FST Mohammedia, Morocco, 2020 - [j4]Mohamed Lahby:
Enhancing Modeling for Network Selection Using Graph Theory in Beyond 4G Networks. Int. J. Bus. Data Commun. Netw. 16(1): 48-69 (2020) - [c18]Youness Abakarim, Mohamed Lahby, Abdelbaki Attioui:
Bank Failure Prediction: A Deep Learning Approach. SITA 2020: 34:1-34:7
2010 – 2019
- 2019
- [j3]Mohamed Lahby, Ayoub Essouiri, Abderrahim Sekkaki:
A novel modeling approach for vertical handover based on dynamic k-partite graph in heterogeneous networks. Digit. Commun. Networks 5(4): 297-307 (2019) - 2018
- [c17]Youness Abakarim, Mohamed Lahby, Abdelbaki Attioui:
Towards An Efficient Real-time Approach To Loan Credit Approval Using Deep Learning. ISIVC 2018: 306-313 - [c16]Mohamed Lahby, Abderrahim Sekkaki:
A Graph Theory Based Network Selection Algorithm in Heterogeneous Wireless Networks. NTMS 2018: 1-4 - [c15]Youness Abakarim, Mohamed Lahby, Abdelbaki Attioui:
An Efficient Real Time Model For Credit Card Fraud Detection Based On Deep Learning. SITA 2018: 30:1-30:7 - 2017
- [c14]Mohamed Lahby, Abderrahim Sekkaki:
Optimal vertical handover based on TOPSIS algorithm and utility function in heterogeneous wireless networks. ISNCC 2017: 1-6 - [c13]Mohamed Lahby, Abdelbaki Attioui, Abderrahim Sekkaki:
An improved policy for network selection decision based on enhanced-topsis and utility function. IWCMC 2017: 2175-2180 - 2016
- [c12]Mohamed Lahby, Yassine Ismaili, Abdelbaki Attioui, Abderrahim Sekkaki:
Performance analysis of minutia-based fingerprint matching algorithms. SITA 2016: 1-5 - [c11]Mohamed Lahby, Abdelbaki Attioui, Abderrahim Sekkaki:
An Optimized Vertical Handover Approach Based on M-ANP and TOPSIS in Heterogeneous Wireless Networks. UNet 2016: 15-29 - 2015
- [c10]Mohamed Lahby, Silki Baghla, Abderrahim Sekkaki:
Survey and comparison of MADM methods for network selection access in heterogeneous networks. NTMS 2015: 1-6 - 2014
- [c9]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Performance analysis of normalization techniques for network selection access in heterogeneous wireless networks. SITA 2014: 1-5 - 2013
- [b1]Mohamed Lahby:
Optimisation et évaluation des performances des communications mobiles dans un environnement réseaux multi-accès. (Optimization and performances evaluation of mobiles communications in heterogeneous wireless networks). University of Hassan II Casablanca, Morocco, 2013 - [j2]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
A Novel Ranking Algorithm Based Network Selection For Heterogeneous Wireless Access. J. Networks 8(2): 263-272 (2013) - [c8]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Novel validation approach for network selection algorithm by applying the group MADM. AICCSA 2013: 1-4 - [c7]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An enhanced-TOPSIS based network selection technique for next generation wireless networks. ICT 2013: 1-5 - [c6]Mohamed Lahby, Abdellah Adib:
Network selection mechanism by using M-AHP/GRA for heterogeneous networks. WMNC 2013: 1-6 - [c5]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
New Validation Approach Based on Group MADM for Network Selection. NETYS 2013: 306-310 - 2012
- [j1]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Towards an Efficient Network Selection Technique Based on Differentiated Weight of Access Interface. Int. J. Bus. Data Commun. Netw. 8(4): 32-48 (2012) - [c4]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
New multi access selection method using differentiated weight of access interface. ICCIT 2012: 237-242 - [c3]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Network selection algorithm based on Diff-AHP and TOPSIS in heterogeneous wireless networks. ICMCS 2012: 485-490 - [c2]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
A survey and comparison study on weighting algorithms for access network selection. WONS 2012: 35-38 - [i3]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An Intelligent Network Selection Strategy Based on MADM Methods in Heterogeneous Networks. CoRR abs/1204.1383 (2012) - [i2]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks. CoRR abs/1206.1587 (2012) - [i1]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
An Enhanced Evaluation Model For Vertical Handover Algorithm In Heterogeneous Networks. CoRR abs/1206.1848 (2012) - 2011
- [c1]Mohamed Lahby, Leghris Cherkaoui, Abdellah Adib:
A Hybrid Approach for Network Selection in Heterogeneous Multi-Access Environments. NTMS 2011: 1-5
Coauthor Index
aka: Leghris Cherkaoui
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint