Search

Your search keyword '"Rifi, Mounir"' showing total 85 results

Search Constraints

Start Over You searched for: Author "Rifi, Mounir" Remove constraint Author: "Rifi, Mounir"
85 results on '"Rifi, Mounir"'

Search Results

1. Design of a Microstrip Triangular Patch Array at 5.8 GHz for Enhancing UAV Autonomy in IoT Applications

3. Design and Simulation of Three Bands Planar Inverted F Antenna Array for 5G Communication Systems

5. Implementation of an Hierarchical Hybrid Intrusion Detection Mechanism in Wireless Sensor Network Based on Energy Management

6. 5.8 GHz Rectenna for wireless powering battery-less sensors

7. Direction of arrival estimation in smart Antenna for tracking system

11. Contribution to the Study of Beamforming at 2.4 GHz of a Smart Antenna Alimented by a 4 × 4 Butler Matrix for Wireless Applications

14. A numerical study of the salt water flow inside a channel with horizontal metal walls subjected to a constant DC voltage realizes a uniform electrostatic field contributing to the desalination of seawater by forcing cations (Na+) and anions (Cl-) to deflect: effect of electrostatic field intensity and temperature variation

19. A numerical study of the salt water flow inside a channel with horizontal metal walls subjected to a constant DC voltage realizes a uniform electrostatic field contributing to the desalination of seawater by forcing cations (Na+) and anions (Cl-) to deflect: effect of electrostatic field intensity and temperature variation

20. Consortium franco-africain « AfriConnect » sur l'internet des objets

21. La technologie 5G pour les objets connectés

27. Utilisation des antennes adaptatives dans les systèmes RADAR de poursuite

28. Rectifier Circuit Designs for RF Energy Harvesting applications

29. A simplified approach to determine the amplitude of the transient voltage induced on a cable bundle

31. Study of Strategies for Real-Time Supervision of Industrial Network Security

32. Energy Efficiency in Heterogeneous Multicore Systems

33. Python in Real Time Application for Mobile Robot

44. Protecting outsourced data in cloud computing: novel politic of security based on capability list

45. Data Security and access management in Cloud Computing: capability list-based cryptography

Catalog

Books, media, physical & digital resources