default search action
CITS 2023: Genoa, Italy
- Mohammad S. Obaidat, Franco Davoli, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:
International Conference on Computer, Information and Telecommunication Systems, CITS 2023, Genoa, Italy, July 10-12, 2023. IEEE 2023, ISBN 979-8-3503-3609-2 - Rebeca Estrada, Nelson Vera, Xavier Aizaga:
Evaluation of Machine Learning Prediction Models for Wifi based Indoor Positioning System. 1-7 - Yousuf Al-Aali, Said Boussakta:
Lightweight Hash Function based on Fermat Number Transform (FNT). 1-6 - Marialaura Tamburello, Giuseppe Caruso, Davide Adami, Stefano Giordano:
A reparameterization and monitoring platform for energy efficient GPS trackers in behavioural analysis of wildlife. 1-6 - Surabhi Gusain Rawat, Mohammad S. Obaidat, Sumit Pundir, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Kuei-Fang Hsiao:
A Survey of DDoS Attacks Detection Schemes in SDN Environment. 1-6 - Daniel Dik, Iacob Larsen, Michael Stübert Berger:
MACsec and AES-GCM Hardware Architecture with Frame Preemption Support for Transport Security in Time Sensitive Networking. 1-7 - Aya Kh. Ahmed, Hamed S. Al-Raweshidy:
Deep Learning Polar Convolutional Parallel Concatenated (DL-PCPC) Channel Decoding for 6G Communications. 1-5 - Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios Papadimitriou:
Balancing reliability and energy efficiency in LoRa networks using reinforcement learning. 1-6 - Marialaura Tamburello, Giuseppe Caruso, Davide Adami, Stefano Giordano, Mike Oluwatayo Ojo:
Lifetime estimation and reparameterization of GPS devices for tracking applications. 1-6 - Oscal T.-C. Chen, Li-Cheng Yan:
Deep Neural Network for User Attribute Recognition in Metaverse Hand Images. 1-6 - Akshita Doad, Nitin Gupta, Mohammad S. Obaidat, Kuldeep Singh Jadon, Piyush Rawat, Kuei-Fang Hsiao:
Profit aware Resource Allocation in Fog Computing: A Stackelberg Game Approach. 1-8 - Adnan Nadeem, Muhammad Ashraf, Amir Mehmood, Muhammad Shoaib Siddiqui, Hani Almoamari, Qammer H. Abbasi:
Identification of Damaged Date Palm Tree in a Farm using IoT-based Thermal Image Analysis. 1-7 - Layeba Faheem, Soumya Mukherjee, Mohammad S. Obaidat, Arup Kumar Pal, SK Hafizul Islam, Balqies Sadoun:
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor. 1-8 - Joelle Kabdjou, Elie Tagne Fute, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC). 1-7 - Shubham Jain, Enda Fallon:
Leveraging Unstructured Data to Improve Customer Engagement and Revenue in Financial Institutions: A Deep Reinforcement Learning Approach to Personalized Transaction Recommendations. 1-8 - Riya Kakkar, Rajesh Gupta, Mohammad S. Obaidat, Nilesh Kumar Jadav, Sudeep Tanwar:
Majority Voting-based Consensus Mechanism for UAVs Decision Making in Battlefield. 1-5 - Neda Maleki, Arslan Musaddiq, David Mozart, Tobias Olsson, Mustafa Omareen, Fredrik Ahlgren:
DeltaBin: An Efficient Binary Data Format for Low Power IoT Devices. 1-5 - Julio Cesar Gancino Vargas, Segundo Moises Toapanta Toapanta, Yngrid Josefina Melo Quintana, Danny Santiago Páez Oscullo:
Blockchain model based on human DNA to modify blocks in P2P networks. 1-7 - Ahlam Alshukaili, Khairi A. Hamdi:
Spreading Factor Recovery in LoRa Using Machine Learning. 1-7 - Helen D. Karatza:
Scheduling Delay-Sensitive Bag-of-Task Jobs with Imprecise Computations on Distributed Resources. 1-6 - Yasantha Samarawickrama, Álvaro Augusto M. de Medeiros, Victor Cionca:
Mission-level URLLC under variable Rician channel conditions. 1-6 - Sergei Semenov, Sha Hu, Kuangda Tian:
High Layer Coding for Video Transmission. 1-6 - Hsiao-Hui Li, Jian-Jie Lian, Yuan-Hsun Liao:
Design an Adaptive Virtual Reality Game to Promote Elderly Health. 1-7 - Stefano Cirici, Michele Paolino, Daniel Raho:
SVFF: An Automated Framework for SR-IOV Virtual Function Management in FPGA Accelerated Virtualized Environments. 1-6 - Chandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Parkash Tambare, Agbotiname Lucky Imoize:
An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment. 1-6 - Karan Gupta, Sanjay Kumar Dhurandher:
CASE: Channel Allocation for optimized Spectral Efficiency using deep neural network in underlay cognitive radios. 1-6 - Maria Iloridou, Petros Nicopolitidis, Georgios Papadimitriou:
Two-step Random Access with Collision Resolution Queueing for Cellular IoT networks. 1-5 - Dongeun Lee, Yoonji Kim, Dongho Seo, Wonjin Lee, Dongweon Yoon:
Automatic Recognition for LPI Radar Waveform Using Sequence-based Deep Learning Model. 1-4 - Xinnian Guo, Ziyang Kang, Yang Shen, Yingna Su, Hongyan Ding, Lizhe Tan:
On Implementation of Sparse Finite Impulse Response Secondary Path for Active Noise Control. 1-5 - Shokoufeh Seifi, Ronald Beaubrun, Martine Bellaïche, Talal Halabi:
A Study on the Efficiency of Intrusion Detection Systems in IoT Networks. 1-8 - Segundo Moisés Toapanta Toapanta, Rodrigo Humberto Del Pozo Durango, Eriannys Zharayth Gómez Díaz, Jose Antonio Orizaga Trejo, Luis Enrique Mafla Gallegos, Ma. Roció Maciel Arellano, Oscar Marcelo Zambrano Vizuete, María Mercedes Baño Hifóng:
Proposal for a security model applying artificial intelligence for administrative management in a higher education institution. 1-5 - Xueting Tang, Jun Yan:
A CSI Amplitude-phase Information Based Graph Construction for GNN Localization. 1-7 - Shuo Jin, Meiqin Liu, Yu Guo, Chao Yao, Mohammad S. Obaidat:
Multi-frame Correlated Representation Network for Video Super-Resolution. 1-7 - Xuewen Xiao, Jun Yan:
A Transfer Learning Based CSI Indoor Localization Using GASF Image Construction. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.