{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:53Z","timestamp":1750219733452,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,24]]},"DOI":"10.1145\/3607720.3607724","type":"proceedings-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T17:14:08Z","timestamp":1699895648000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Wireless In-band Full-Duplex FSK: Performance Optimization Using a Novel Synchronization Loop"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7116-4358","authenticated-orcid":false,"given":"Mohammed","family":"El Khattabi","sequence":"first","affiliation":[{"name":"NEST Research Group, LRI Laboratory E.N.S.E.M, Hassan II University, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2442-1048","authenticated-orcid":false,"given":"Mohammed","family":"Khaldoun","sequence":"additional","affiliation":[{"name":"NEST Research Group, LRI Laboratory E.N.S.E.M, Hassan II University, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0206-828X","authenticated-orcid":false,"given":"Ahmed","family":"Errami","sequence":"additional","affiliation":[{"name":"NEST Research Group, LRI Laboratory E.N.S.E.M, Hassan II University, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0207-5164","authenticated-orcid":false,"given":"Jelloul","family":"Elmesbahi","sequence":"additional","affiliation":[{"name":"NEST Research Group, LRI Laboratory E.N.S.E.M, Hassan II University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.]. USRP B200\/B210 Bus Series. Ettus Research. https:\/\/www.ettus.com\/wp-content\/uploads\/2019\/01\/b200-b210_spec_sheet.pdf[Online","author":"Ettus Research","year":"2023","unstructured":"Ettus Research [n. d.]. USRP B200\/B210 Bus Series. Ettus Research. https:\/\/www.ettus.com\/wp-content\/uploads\/2019\/01\/b200-b210_spec_sheet.pdf[Online ; accessed 18-Febrary- 2023 ]. Ettus Research [n. d.]. USRP B200\/B210 Bus Series. Ettus Research. https:\/\/www.ettus.com\/wp-content\/uploads\/2019\/01\/b200-b210_spec_sheet.pdf[Online; accessed 18-Febrary-2023]."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1986.1096561"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.24425\/ijet.2019.129795"},{"key":"e_1_3_2_1_4_1","volume-title":"Digital Communications: A Discrete-Time Approach (1 ed.). Pearson.","author":"Michael Rice","year":"2008","unstructured":"Rice Michael . 2008 . Digital Communications: A Discrete-Time Approach (1 ed.). Pearson. Rice Michael. 2008. Digital Communications: A Discrete-Time Approach (1 ed.). Pearson."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/freq-2020-0208"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093326"},{"key":"e_1_3_2_1_7_1","volume-title":"d.]. GNU Radio","author":"Radio Foundation The GNU","year":"2023","unstructured":"The GNU Radio Foundation , Inc [n. d.]. GNU Radio . The GNU Radio Foundation, Inc. https:\/\/www.gnuradio.org\/[Online; accessed 18-Febrary- 2023 ]. The GNU Radio Foundation, Inc [n. d.]. GNU Radio. The GNU Radio Foundation, Inc. https:\/\/www.gnuradio.org\/[Online; accessed 18-Febrary-2023]."}],"event":{"name":"NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security","acronym":"NISS 2023","location":"Larache Morocco"},"container-title":["Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607720.3607724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:29Z","timestamp":1750178189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":7,"alternative-id":["10.1145\/3607720.3607724","10.1145\/3607720"],"URL":"https:\/\/doi.org\/10.1145\/3607720.3607724","relation":{},"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"2023-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}