


default search action
8th ISNCC 2021: Dubai, United Arab Emirates
- International Symposium on Networks, Computers and Communications, ISNCC 2021, Dubai, United Arab Emirates, October 31 - November 2, 2021. IEEE 2021, ISBN 978-1-6654-0304-7

- Suresh Babu Kotha, Kumar Rahul, Mohammad Anees, Santosh Yachareni, Subodh Kumar:

High speed low power SEU tolerant Pseudo dual port memory in 7nm. 1-5 - Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Baza, Mohamed Mahmoud, Waleed Alasmary:

Detecting Electricity Fraud in the Net-Metering System Using Deep Learning. 1-6 - Mohamed I. Ibrahem

, Sherif Abdelfattah
, Mohamed Mahmoud, Waleed Alasmary:
Detecting Electricity Theft Cyber-attacks in CAT AMI System Using Machine Learning. 1-6 - Amar Meddahi

, Hassen Drira, Ahmed Meddahi:
SIP-GAN: Generative Adversarial Networks for SIP traffic generation. 1-6 - Alaa Al-Refaei, Mohammed W. Baidas

:
Network Sum-Rate Maximization for NOMA-Based Multicast Cognitive Radio Networks with SWIPT-Enabled Relays. 1-7 - Mingchuan Yang, Yingzhe Dou, Bingyu Xie:

Statistical modeling of Land Mobile Satellite Dual-Polarized MIMO Propagation Channel. 1-5 - Gaspard Baye

, Fatima Hussain, Alma Oracevic
, Rasheed Hussain
, S. M. Ahsan Kazmi:
API Security in Large Enterprises: Leveraging Machine Learning for Anomaly Detection. 1-6 - M. Saifeddine Hadj Sassi, Lamia Chaari Fourati

:
Deep Learning and Augmented Reality for IoT-based Air Quality Monitoring and Prediction System. 1-6 - Alshaimaa Al Naqbi, Sheikha Salem Alyieliely, Manar Abu Talib, Qassim Nasir, Maamar Bettayeb, Chaouki Ghenai:

Energy Reduction in Building Energy Management Systems Using the Internet of Things: Systematic Literature Review. 1-7 - Mohammed W. Baidas

, Ahmed M. AbdelGhaffar, Emad Alsusa:
Joint Power Allocation and Antenna Selection for Network Sum-Rate Maximization in Clustered Downlink NOMA Networks. 1-7 - Thomas Taylor, Amna Eleyan:

Using Variational Autoencoders to Increase the Performance of Malware Classification. 1-6 - Oladayo Olufemi Olakanmi, Kosisochukwu Pal Nnoli

, Kehinde Oluwasesan Odeyemi, Mbadiwe Samuel Benyeogor:
Enhanced Secure Process Control and Data Routing for Multi-plant Biogas Production System in IoT Environment : *A Practical Approach to Securing Smart Bio-energy Infrastructure. 1-5 - Fouzi Boukhalfa, Mohamed Hadded

, Paul Muhlethaler, Oyunchimeg Shagdar
:
Evaluation of a new Radio Technology and Visible Light Communication for a Platooning Application. 1-7 - Ammar Qaid, Özgür Ertug:

Transition from IPv4 to IPv6 Mechanisms by GNS3 Emulation: YPTC as a Case Study. 1-7 - Chuyang Liu, Zihao Jian, Minshan Xie, Irene Cheng:

A Real-Time Mobile Application for Cattle Tracking using Video Captured from a Drone. 1-6 - Kinan Ghanem, Stephen Ugwuanyi, Rameez Asif

, James Irvine:
Challenges and Promises of 5G for Smart Grid Teleprotection Applications. 1-7 - Bradley Comar, R. Scott Frazier:

Design of a Joint Alamouti-MIMO and Wavelet Packet Modulation System. 1-8 - Ala Alemaryeen:

On the Sensitivity of Implantable Antenna Performance to Variations in the Electrical Properties of Body Tissues. 1-4 - Andrew Tao, Kevin Qi, Daniel Che, Mikhail Y. Shalaginov, Tingying Helen Zeng:

Comparison of Media Sources for COVID-19 by Machine Learning Sentiment Analysis. 1-4 - Firuz Kamalov

, Sherif Moussa, Ziad El-Khatib, Adel Ben Mnaouer
:
Orthogonal variance-based feature selection for intrusion detection systems. 1-5 - Amamer Saied, Abdanaser Okaf, Dongyu Qiu:

An Efficient Resource Allocation for D2D Communications Underlaying in HetNets. 1-6 - Yue Li, Abdulhalim Dandoush

, Ji Liu:
Evaluation and Optimization of learning-based DNS over HTTPS Traffic Classification. 1-6 - Mahmoud M. Badr

, Mohamed Baza, Sherif Abdelfattah
, Mohamed Mahmoud, Waleed Alasmary:
Blockchain-Based Ride-Sharing System with Accurate Matching and Privacy-Preservation. 1-8 - Muhannad Y. Muhsin

, Ali J. Salim, Jawad K. Ali
:
An Eight-Element MIMO Antenna system for 5G Mobile Handsets. 1-4 - Khuhawar Arif Raza, Alia Asheralieva

, Md. Monjurul Karim
, Kashif Sharif
, Mehdi Gheisari, Salabat Khan
:
A Novel Forwarding and Caching Scheme for Information-Centric Software-Defined Networks. 1-8 - Mohammad Meraj Mirza

, Umit Karabiyik:
Enhancing IP Address Geocoding, Geolocating and Visualization for Digital Forensics. 1-7 - Firuz Kamalov

, Hana Sulieman:
Time series signal recovery methods: comparative study. 1-5 - Kosala Yapa Bandara, John G. Breslin

:
BaaS Architecture for DApps and Application for Veterinary Medicine Case Study in Ireland. 1-6 - Enrica Zola, Israel Martín-Escalona, Francisco Barceló-Arroyo, Sergio Machado:

Implementation and analysis of the AODVv2 Routing Protocol in ARM devices. 1-6 - Hoang-Loc La, Anh-Tu Ngoc Tran, Masato Yoshimi, Takuma Nakajima, Nam Thoai:

CDNET: A Content Delivery Network Emulator. 1-7 - Abdullah Yasin Nur

:
Analysis of Autonomous System Level Internet Topology Graphs and Multigraphs. 1-7 - Sifatul Mostafi, Khalid Elgazzar:

An Open Source Tool to Extract Traffic Data from Google Maps: Limitations and Challenges. 1-8 - Muhammed Emir çakici, Feyza Yildirim Okay, Suat Özdemir:

Real-time Aircraft Tracking System: A Survey and A Deep Learning Based Model. 1-6 - Pantelimon-Teodor Tivig, Eugen Borcoci, Alexandru Brumaru, Andra-Isabela-Elena Ciobanu:

Layer 3 Forwarder Application - Implementation Experiments Based on Ryu SDN Controller. 1-6 - Eduardo Andrés-Marcelo, Elizabeth Pérez Cortés, Adán G. Medrano-Chávez, Miguel López-Guerrero:

Human Mobility Brings Scalability to BitTorrent over MANET. 1-6 - Mohammed S. Elbasheir

, Rashid A. Saeed, Salaheldin Edam:
5G Base Station Deployment Review for RF Radiation. 1-5 - Ali A. Alnoman

:
Delay-aware Scheduling Scheme for Ubiquitous IoT Applications in Edge Computing. 1-4 - Christophe Loyez, Michael Bocquet, Kamel Haddadi:

Quadratic Detection-Based Millimeter-Wave MMIC for Wireless Communication and Localization. 1-5 - Christian Zajc, Markus Haberler

, Gerald Holweg, Christian Steger
:
Generating a PUF Fingerprint from an on-Chip Resistive Ladder DAC and ADC. 1-7 - Renzo Carlucci, Alessio Di Iorio, Paris A. Fokaides, Anna Ioannou, Michele Luglio, Mattia Quadrini

, Cesare Roseti, Francesco Zampognaro
:
Architecture definition for a multi-utility management platform. 1-6 - Alaa Albtoush, Noor Maizura Mohamad Noor, Farizah Yunus:

Utility-based Scheduling Solution for Scientific Workflow on Cloud. 1-6 - Manjul Shrestha, Xingya Liu, Moushmi Sreekanthan:

A Bluetooth-Based Contact-Tracing Mobile App for Airborne-Based Epidemic Control. 1-5 - Malaw Ndiaye

, Karim Konaté:
Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain. 1-8 - Jihene Rezgui, Félix Jobin, Simon Beaulieu, Zarine Ardekani-Djoneidi:

Autonomous Learning Intelligent Vehicles Engineering in a Programming Learning Application for Youth: ALIVE PLAY. 1-6 - Bradley Comar:

Decoding and Equalization in a Joint Alamouti-WPM System. 1-8 - Nandeesh Basavaraju, Naveen Alexander, Jochen Seitz:

Performance Evaluation of Advanced Message Queuing Protocol (AMQP): An Empirical Analysis of AMQP Online Message Brokers. 1-8 - Elezabeth Mathew

, Sherief Abdulla:
Machine learning to find purchase duration of chain hotels in the UAE. 1-6 - Xu Deng, Lidong Zhu, Qi Tan, Ying Yang, Yong Zhang:

Multi-layer satellite network resource management based on genetic algorithm. 1-6 - Oussama Ghorbel, Rami Ayadi

, Ahmed Sulaiman Alanazi, Rayen Alanazi, Raed N. Alabdali, Mohamed Abid:
Adaptive KPCA for Outlier detection in Wireless Sensor Networks: Water pipeline case. 1-5 - Lijun Dong, Richard Li

:
Distributed Knowledge Inference and Reasoning in the Network Based on New IP. 1-7 - Argen Mary Arceño, Michael Buenviaje, Mave Rick Credo, Ronn Joaquin Cuenco, Rollison Joshua Tabuyan, Carlos Sison, Thaddeo Garcia, Antonio Tee:

Voice Controlled Ultraviolet Sterilization Robot for Disinfection with Monitoring Features. 1-6 - Mahendrakumar Gunasekaran, Kumar Rahul, Santosh Yachareni:

Optimizing Sub bytes and Mix Column to improve performance of AES in Virtex 7 FPGA. 1-5 - Haider Khaleel Raad, Farah Fargo, Olivier Franza:

Autonomic Architectural Framework for Internet of Brain Controlled Things (IoBCT). 1-4 - Firuz Kamalov

, Ashraf Elnagar
:
Kernel density estimation-based sampling for neural network classification. 1-4 - Abdullah Yasin Nur

:
Efficient Probabilistic Packet Marking for AS Traceback. 1-6 - Ebrahim Ali Alburshaid, Mohab A. Mangoud:

Palm Trees Detection Using the Integration between GIS and Deep Learning. 1-6 - Aicha Idriss Hentati, Lamia Chaari Fourati

:
A Convoy of Ground Mobile Vehicles Protection using Cooperative UAVs-based System. 1-6 - Feyza Yildirim Okay, Mustafa Yildirim, Suat Özdemir:

Interpretable Machine Learning: A Case Study of Healthcare. 1-6 - Tewelgn Kebede

, Yihenew Wondie
, Johannes Steinbrunn:
Performance Evaluation of MillimeterWave-Massive MIMO with Beamforming Techniques. 1-8 - Natalia Khuri, Esteban Murillo Burford, Sarah Parsons, Chenqi Xu:

A Game-Theoretical Approach for Data Acquisition From Fitness Tracking Devices. 1-6 - Murat Soykan, Pinar Sarisaray Bölük

:
Tor Network Detection By Using Machine Learning And Artificial Neural Network. 1-4 - Betul Dundar

, Diyar Akay, Suat Ozdemir:
Linguistic Descriptions of Airport Evaluation Data for Recommendation Strategies. 1-8 - Simona Riurean, Monica Leba, Lilia Crivoi:

Enhanced Security Level for Sensitive Medical Data Transmitted through Visible Light. 1-6 - Omar A. Saraereh

, Jeevani W. Jayasinghe, Aurora Andújar, Jaume Anguera:
Fractal-Shaped Koch-Ring Microstrip Patch. 1-5 - Benjamin Beichler, Michael Rethfeldt, Hannes Raddatz, Lukas Steffen, Dirk Timmermann, Christian Haubelt:

A SystemC Model of the IEEE 802.11 EDCA Protocol for Virtual Prototyping. 1-7 - Anjana Prabhakar

, Tricha Anjali:
Towards flexible hardware authentication for IoT. 1-6 - Aya N. Alkhafaji, Jawad K. Ali

, Sinan M. Abdulsatar
, Ali I. Hammoodi:
On the Design of Triple Band Dipole Flexible Antenna for Wearable RFID Devices. 1-3 - Christian Hemminghaus, Jan Bauer, Konrad Wolsing

:
SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures. 1-6 - Abdulmuneem Bashaiwth

, Basil AsSadhan:
Detecting Network Attacks Exhibiting Irregular Periodic Behavior. 1-7 - Haorui Peng, William Tärneberg, Emma Fitzgerald, Maria Kihl:

Punctual Cloud: Unbinding Real-time Applications from Cloud-induced Delays. 1-8 - Mohammed Yafeai, Ibrahim Abou Shehada, Sultan Alsulami, Ibrahim Abou Mahmoud, Ali H. Muqaibel, Mohammad A. Abido, Aboubakr Salem:

Design of a Wireless Heliostat System. 1-5 - Saleh A. Alawsh, Ali H. Muqaibel:

Optimized Multi-Level Prime Array Configurations. 1-4 - Abdullah M. Alqahtani

, Barzan A. Yosuf, Sanaa H. Mohamed
, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
Energy Minimized Federated Fog Computing over Passive Optical Networks. 1-6 - Nian Xue, Daojing Guo, Jie Zhang, Jihao Xin

, Zhen Li, Xin Huang:
OpenFunction for Software Defined IoT. 1-8 - Nadia Charef, Adel Ben Mnaouer

, Ouns Bouachir:
AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless Networks. 1-6 - Saloua Hendaoui, Nawel Zangar:

Leveraging SDN slicing isolation for improved adaptive satellite-5G downlink scheduler. 1-5 - Burak Han Çorak, Ibrahim Kök, Suat Özdemir:

A Novel Low-Latency and Cost-Effective Communication Protocol Design for Internet of Flying Things. 1-6 - Ghazal Najafi, Saeed Ghazi-Maghrebi:

Optimization of Channel Allocation in Heterogeneous 5G Networks Based on Genetic Algorithm and Fuzzy Logic. 1-6 - Tewelgn Kebede

, Yihenew Wondie
, Johannes Steinbrunn:
Channel Estimation and Beamforming Techniques for mm Wave-Massive MIMO: Recent Trends, Challenges and Open Issues. 1-8 - Qi Tan, Lidong Zhu, Xu Deng, Zhongru Zhu:

An Adaptive DOA Estimation Method Based on Transfer Joint Matching for Space Communications. 1-5 - Christos Bouras, Rafail Kalogeropoulos, Ioannis Sina:

Clustering Based User Allocation in 5G Networks. 1-6 - Marcelo Camilo, David F. C. Moura, Ronaldo M. Salles

:
Combined Interference and Communications strategy evaluation as a defense mechanism in typical Cognitive Radio Military Networks. 1-8 - Ahmed Osama, Mahmoud Elsaadany, Shoukry I. Shams, Omar A. M. Aly, Usama S. Mohammed, Ghyslain Gagnon:

Hybrid Precoder Design for mmWave Massive MIMO Systems with Partially Connected Architecture. 1-6 - Peter Voege, Abdelkader Ouda:

A Study on Natural Language Chatbot-based Authentication Systems. 1-4 - Balume Mburano

, Weisheng Si
, Wei Xing Zheng:
A Comparative Study on the Variants of R Metric for Network Robustness. 1-6 - Michael Windisch, Olimpiu Stoicuta, Monica Leba, Simona Riurean:

Remote Control of Solenoid Valves Using RS485 and LiFi Technology. 1-6 - Ayman Maghrabi, Wibowo Hardjawana

, Phee Lep Yeoh, Branka Vucetic:
An Experimental Inter-Slice RAN Controller for 4G/5G Cellular Networks. 1-6 - Martin Kyselak, David Grenar

, Cestmir Vlcek, Karel Slávicek, Jiri Vavra:
The Relative Tolerances of Polarization Multiplex on Long Optical Paths. 1-4 - Tarek Elmahdy, Ahmed F. Bendary:

Novel technique in 4G Handover parameter tuning and prediction using statistical trend analysis and supervised machine learning. 1-5 - Colin Wilcox

, Soufiene Djahel
, Vasileios Giagos:
Identifying the Main Causes of Medical Data Incompleteness in the Smart Healthcare Era. 1-6 - Ahmed Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed Alasmary, Fathi H. Amsaad:

Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks. 1-7 - Shitian Zhang, Yunduan Cui, Naitian Deng, Huiyun Li:

Model Predictive Control of Autonomous Driving using Unscented Kalman Filter with Sparse Spectrum Gaussian Processes. 1-6 - Siddhartha Shakya, Ashraf Roushdy, Himadri Sikhar Khargharia

, Asad Musa, Amr Omar:
AI Based 5G RAN Planning. 1-6 - Navid Ordouie, Nirmala Soundararajan, Ramesh K. Karne, Alexander L. Wijesinha:

Developing Computer Applications without any OS or Kernel in a Multi-core Architecture. 1-8 - Avinash Kumar, Ye Zhu:

Extending Direct Sequence Spread-Spectrum for Secure Communication. 1-5 - Haider Khaleel Raad, Heidrun Schmitzer, Ali Hammoodi, Casey White, Dennis Tierney, Wilbur Walters, Khalid H. Abed:

A Single-Band Optically Transparent Antenna for Wearable Smart Glasses. 1-4 - Ali A. Alnoman

:
Edge Computing Services for Smart Cities: A Review and Case Study. 1-6 - Mohamed Rahali, Jean-Michel Sanner, Cao-Thanh Phan, Gerardo Rubino:

A network tomography approach for anomaly localization in Service Function Chaining. 1-6 - Yong Zhang, Lidong Zhu, Chengjie Li, Xu Deng, Huazhi Feng:

Store-Load Phased Array Antenna for Tracking and Communication with LEO Satellites. 1-6 - Jihene Rezgui, Enric Soldevila, Younes Kechout:

Novel Mind Controller to Assess Student Concentration with Connected Vehicles: ALIVE Mind. 1-6 - Hassan Noura

, Ali Chehab
:
Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks. 1-7 - Artrim Kjamilji

, Albert Levi, Erkay Savas, Osman Berke Güney:
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT. 1-8 - Sam Aleyadeh, Abdallah Moubayed

, Abdallah Shami
:
Mobility Aware Edge Computing Segmentation Towards Localized Orchestration. 1-6 - Mohamed I. Ibrahem

, Mahmoud M. Badr
, Mohamed Mahmoud, Mostafa M. Fouda
, Waleed Alasmary:
Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-Learning. 1-7 - Oluwaseyi Ajayi, Tarek N. Saadawi:

Detecting Insider Attacks in Blockchain Networks. 1-7 - Ahmet Serdar Tan, Onur Sahin, Sungkwon Hong:

CRC Aided Short-Cycle Free BP Decoding for Polar Codes. 1-6 - Anood Al Hamedi, Bashaer Al Seiari, Meera Al Taher, Hasan Abu Hilal

:
Network Growth in Smart Cities. 1-6 - Vusi Skosana

, Adnan M. Abu-Mahfouz:
Performance Comparison of Video Encoding at Low Sampling Rates. 1-7 - Michele Luglio, Mattia Quadrini

, Cesare Roseti, Francesco Zampognaro
:
Scenarios and implementation use-cases for satellite-based NB-IoT. 1-6 - Guilherme N. N. Barbosa

, Martin Andreoni Lopez
, Dianne S. V. Medeiros, Diogo M. F. Mattos:
An Entropy-based Hybrid Mechanism for Large-Scale Wireless Network Traffic Prediction. 1-6 - Sherif Abdelfattah

, Mohamed Baza, Mohamed Mahmoud, Waleed Alasmary:
CSES: Customized Searchable Encryption Scheme with Efficient Key Management Over Medical Cloud Data. 1-7 - Navid Shaghaghi, Adi Relan, James Ossam, Hanna Albright:

Public Transit Hub (PTHub). 1-5 - Bharat S. Rawal, Gunasekaran Manogaran:

Implementation of a secure multi-cloud storage framework with next-generation cryptosystems and split-protocol. 1-6 - Danila Morozovskii, Krunal Thummar, Talal Halabi

, Sheela Ramanna:
Toward Efficient and Robust Deep Learning-based Malware Detection in Fog Computing. 1-6 - Shereen Ismail

, Eman AlKhader, Aydan Gasimova, Hassan Reza:
A lightweight Distributed Database Management in WSN. 1-5 - Simon Delisle, Naser Ezzati-Jivan, Michel R. Dagenais:

Integrated modeling tool for indexing and analyzing state machine trace. 1-8 - Shahad Alotaibi, Khadijah Alharbi, Huda Alwabli, Hanan Aljoaey, Balsam Abaalkhail, Salim El Khediri:

Threats, crimes and issues of privacy of users' information shared on online social networks. 1-8 - Mohamed Ali Ayed, Chamseddine Talhi:

Federated Learning for Anomaly-Based Intrusion Detection. 1-8 - Guomin Tang, Lidong Zhu, Qi Wu, Qihui He, Le Yu:

A Hybrid Spread Spectrum Communication Method Based on Chaotic Sequence. 1-5 - Peter Brand, Joachim Falk, Eduard Potwigin, Jürgen Teich:

Multi-Step Ahead Grant Prediction for Dynamic Power Management in Cellular Modems. 1-6 - Rasha Jamal Atwa, Paola Flocchini, Amiya Nayak

:
A Fog-based Reputation Evaluation Model for VANETs. 1-7 - Christos Bouras, Apostolos Gkamas

, Spyridon Aniceto Katsampiris Salgado:
Energy Efficient Mechanism over LoRa for Search and Rescue operations. 1-6 - Nawaf Abdulla

, Mehmet Demirci, Suat Özdemir:
Adaptive Learning on Fog-Cloud Collaborative Architecture for Stream Data Processing. 1-6 - Ali Tekeoglu

, Korkut Bekiroglu, Chen-Fu Chiang, Sam Sengupta:
Unsupervised Time-Series based Anomaly Detection in ICS/SCADA Networks. 1-6 - Ahmed Rebei

, Oumayma Dalhoumi, Narges Manouchehri, Ali Baghdadi, Manar Amayri, Nizar Bouguila:
Variational Learning of the Mixture of Shifted-Scaled Dirichlet Distributions via Entropy Splitting. 1-6 - Roger Pierre Fabris Hoefel:

LLR Metrics for 1024-QAM Soft-Decision: Implementation in IEEE 802.11ax (Wi-Fi 6). 1-6 - Mohammed Baziyad, Tamer Rabie, Ibrahim Kamel:

Utilizing Spatio-Temporal Redundancy to Maximize the Performance of Video Steganography: An Octree Approach. 1-6 - Ziad El-Khatib, Firuz Kamalov

, Sherif Moussa, Ahmed Al-Gindy:
RF LNA with Active Inductor Linearizer for Wireless Communication. 1-4 - Christina-Athanasia I. Alexandropoulou, Ilias E. Panagiotopoulos, George J. Dimitrakopoulos:

On Cognitive Management Architectures for Enhancing Septic Shock Predictions in Intensive Care Units. 1-6 - Jiawei Dong, Abdulsalam Yassine, Andy Armitage:

Image-based with Peak Load Ensemble Prediction System for Demand Response in Smart Grid. 1-6 - Mario Minardi, Christos Politis, Frank Zimmer, Symeon Chatzinotas

:
SDN for Gateway Diversity Implementation in Satellite Networks. 1-5 - Yean-Fu Wen, Chen-Min Hsu:

Research of the Modular Operational Performance Analysis for Consortium Blockchain. 1-6 - Jamal Raiyn:

Real-time Intelligent Speed Adaptation in Heterogeneous Road Networks. 1-7 - Walid Dhifallah, Mounira Tarhouni, Tarek Moulahi, Salah Zidi:

A Novel Realistic Dataset for Intrusion Detection in IoT based on Machine Learning. 1-6 - Khalid A. Al Mallak, Manish Nair

, Geoffrey S. Hilton, Tian Hong Loh, Mark A. Beach
:
Characterising the Impact of Antenna Beamwidth on the Performance of Vehicle-to-Infrastructure (V2I) Millimetre Wave Communication. 1-6 - Amr Sayed AbdelFattah:

An Adaptive Power Output Control System for CAM. 1-6 - Tewelgn Kebede

, Yihenew Wondie
, Johannes Steinbrunn:
Massive MIMO Linear Precoding Techniques Performance Assessment. 1-8 - Hisham Sager, Tufik M. Buzid, Masoud M. Eddaghel:

OFDM lags SC/FDE for Ultra Wideband (UWB) in Context of IoT. 1-5 - Ilias E. Panagiotopoulos, George J. Dimitrakopoulos:

An Intelligent Management Functionality for In-Vehicle Driving Style Reconfigurations Leveraging on Bayesian Networking Principles. 1-6 - Abdanaser Okaf, Amamer Saied, Dongyu Qiu:

Analysis of Self-Blockage Impact on Handover Probability for User with Mobility in 5G Mm-Wave Cellular Network. 1-5 - Thomas Courtat, Hélion du Mas des Bourboux:

A light neural network for modulation detection under impairments. 1-7 - Deena Z. Khalaf, Noor A. AlMohammad, Maitha K. AlShebli, Fadi T. El-Hassan:

Building Autonomous Features in a Small Electric Vehicle Model. 1-6 - Iman I. M. Abu Sulayman, Rongji He, Marlin Manka, Andrew Ning, Abdelkader Ouda:

LiFi/WiFi Authentication and Handover Protocols: Survey, Evaluation, and Recommendation. 1-6 - Rihab Abidi

, Nadia Ben Azzouna:
Self-adaptive trust management model for social IoT services. 1-7 - Mário Marques da Silva, Rui Dinis

:
Performance of NOMA with Massive MIMO for 5G. 1-5 - Shilpa Mehta

, Xue Jun Li:
Design of an Active Inductor based Reconfigurable Mixer for Software-Defined Radios. 1-6 - Wafaa Mohammed Ridha Shakir

:
On Secrecy Performance of Multiuser FSO Networks with Opportunistic User Scheduling. 1-6 - Yong Zhang, Mao Ye, Lin Guan:

Overlap-Minimization Scheduling Strategy for Data Transmission in VANET. 1-7 - Tasneem A. Awaad

, M. Watheq El-Kharashi, Mohamed Taher:
Lightweight Diagnostic-based Secure Framework for Electronic Control Units in Vehicles. 1-5 - Istabraq M. Al-Joboury, Emad H. Al-Hemiary:

A Permissioned Consensus Algorithm Based DAGs-to-Blockchain in Hierarchical Architecture for Decentralized Internet of Things. 1-6 - Ling Li, Weibang Li, Lidong Zhu, Chengjie Li, Zhen Zhang:

Automatic Data Repairs with Statistical Relational Learning. 1-6 - Mohamed Aissa, Badia Bouhdid

, Adel Ben Mnaouer
:
Enhanced Fuzzy logic-based Cluster Stability in Vehicular ad hoc Network. 1-6 - Shanga Kareem, Mustafa Akpinar

:
Removing Seasonal Effect on City Based Daily Electricity Load Forecasting with Linear Regression. 1-6 - Chengjie Li, Lidong Zhu, Michele Luglio, Zhongqiang Luo, Zhen Zhang:

Research on Satellite Network Security Mechanism Based on BlockChain Technology. 1-6 - Karim Kassan, Haïfa Farès, Yves Louët, Christian Glattli:

Training Sequence Design For Burst Mode Single Side Band CPM Synchronization. 1-5 - Naitian Deng, Yunduan Cui, Shitian Zhang, Huiyun Li:

Autonomous Vehicle Motion Planning using Kernelized Movement Primitives. 1-6 - Rita Zgheib

, Ghazar Chahbandarian, Firuz Kamalov
, Osman El Labban:
Neural Networks Architecture for COVID-19 Early Detection. 1-6 - Philipp Ortner, Raphael Steinhöfler, Patrick Hödl, Erich Leitgeb

, Holger Flühr:
Geospatial Guidance of Unmanned Aerial Vehicles around no-fly-zones by Global Positioning System Spoofing. 1-7 - Hamad Yahya

, Emad Alsusa, Arafat Al-Dweik:
Enhanced Non-Orthogonal Multiple Access Using Data-Aware Power Assignment. 1-6 - Shuhan Chen, Congqi Shen, Danrui Yu, Yuqin Wu, Chunming Wu:

Intelligent DDoS Detection in Botnet Combined with Packet-Level Features under SDN. 1-6 - Abdelmohsen Ali, Mahmoud Elsaadany, Ghyslain Gagnon:

Performance of Time and Frequency Approaches for Synchronization Tracking in 5G NR Systems. 1-6 - Feridoon Jalili

, Yufeng Zhang, Felice Francesco Tafuri, Ole Kiel Jensen, Yunfeng Li
, Qingyue Chen, Ming Shen
, Gert Frølund Pedersen
:
Tuning of Deep Neural Networks for Over-The-Air Linearization of Highly Nonlinear Wide-Band Active Phased Arrays. 1-4 - Aymen Abid, Salim El Khediri, Tarek Moulahi, Rym Chéour, Abdennaceur Kachouri:

Vote and KNN outlier detection in Wireless Sensor Networks. 1-6 - Karol Niewiadomski, Dietmar Tutsch:

Low-power Characteristics and Data Retention Abilities of A New Multiplexer Logic for Interconnect Logic of FPGAs. 1-7 - Zhaonan Yang, Huiyun Li:

Task Ordering Matters for Incremental Learning. 1-6 - Shreya Tarur Kumar, Umit Karabiyik:

Instagram Forensic Analysis Revisited: Does anything really vanish? 1-6 - Feridoon Jalili

, Daniel E. Serup, Ondrej Franek
, Ming Shen
, Gert Frølund Pedersen
:
Antenna Array Inter-Element Coupling impact on Linearization of Active Phased Array. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














