Stop the war!
Остановите войну!
for scientists:
default search action
15th IWCMC 2019: Tangier, Morocco
- 15th International Wireless Communications & Mobile Computing Conference, IWCMC 2019, Tangier, Morocco, June 24-28, 2019. IEEE 2019, ISBN 978-1-5386-7747-6
TM-1: Invited Papers
- Souheib Ben Amor, Sofiène Affes, Faouzi Bellili:
ML EM Estimation of Fast Time-Varying OFDM-Type Channels. 1-6 - Moaaz Ahmed, Amine Bermak:
A CMOS Transimpedence Amplifier With Ambient Light Rejection for Visible Light Communication in Intelligent Transport Systems. 7-13 - Mohammed Bin Hariz, Dhaou Said, Hussein T. Mouftah:
Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart City. 14-19 - Mahmoud Nazzal, Mehmet Ali Aygül, Ali Görçin, Hüseyin Arslan:
Dictionary Learning-Based Beamspace Channel Estimation in Millimeter-Wave Massive MIMO Systems with a Lens Antenna Array. 20-25 - Armed Tusha, Seda Dogan, Hüseyin Arslan:
Single Carrier Transmission for URLLC with Adaptive Radio Resource Utilization. 26-30
TM-2: Network Management (Wireless Nets Symposium)
- Armielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair:
An Event Prediction-based IP Multimedia Subsystem Service Exposure. 31-36 - Ahmed Mejdoubi, Hacène Fouchal, Ouadoudi Zytoune, Mohamed Ouadou:
A Distributed Predictive Road Traffic Management System in Urban VANETs. 37-42 - Nabila Bermad, Salah Zemmoudj, Mawloud Omar:
Reputation based Intelligent Control Protocol. 43-48 - Hosni Manai, Larbi Ben Hadj Slama, Ridha Bouallegue:
Interference Management by Adaptive Beamforming Algorithm in Massive MIMO Networks. 49-54 - Jia Liu, William C. Tang, Yuanfang Chen, Mingchu Li, Mohsen Guizani:
A Novel Crowd-sourcing Inference Method. 55-60
TM-3: IoT Services (5G-IoT Workshop)
- Fei Wu, Limin Xiao, Jinbin Zhu:
Bayesian Model Updating Method Based Android Malware Detection for IoT Services. 61-66 - Cong Jin, Xin He, Xiaojin Ding:
Traffic Analysis of LEO Satellite Internet of Things. 67-71 - Cong Han, Siya Xu, Shaoyong Guo, Xuesong Qiu, Ao Xiong, Peng Yu, Kunya Guo, Dong Guo:
A Multi-objective Service Function Chain Mapping Mechanism for IoT networks. 72-77
TM-4: Network Security (Security Symposium)
- Muhammad Usama, Muhammad Asim, Siddique Latif, Junaid Qadir, Ala I. Al-Fuqaha:
Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection Systems. 78-83 - Muhammad Usama, Adnan Qayyum, Junaid Qadir, Ala I. Al-Fuqaha:
Black-box Adversarial Machine Learning Attack on Network Traffic Classification. 84-89 - Anass Sebbar, Karim Zkik, Youssef Baddi, Mohammed Boulmalf, Mohamed Dafir Ech-Cherif El Kettani:
Using advanced detection and prevention technique to mitigate threats in SDN architecture. 90-95 - Zhijun Wu, Shan Tian, Wen Li, Meng Yue, Jian Wang:
A secret classified label control model based on the identity-based cryptography. 96-101 - Vimal Kumar:
A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs. 102-107 - Aymen Yahyaoui, Takoua Abdellatif, Rabah Attia:
Hierarchical anomaly based intrusion detection and localization in IoT. 108-113 - Arij Ben Amor, Mohamed Abid, Aref Meddeb:
CASK: Conditional Authentication and Session Key Establishment In Fog-assisted Social IoT Network. 114-119
TM-5: SatCom Physical Layer and Multiple Access (Satellite Symposium)
- Yu Liang, Zuyao Ni, Linling Kuang:
An Enhanced Random Access Scheme: Multi-Power Contention Resolution Diversity Slotted Aloha. 120-125 - Rui Xin, Zuyao Ni, Linling Kuang, Haoge Jia, Purui Wang:
Joint Active User and Data Detection in Uplink Grant-Free NOMA by Message-Passing Algorithm. 126-130 - Tingwei Wu, Dexin Qu, Gengxin Zhang:
Research on LoRa Adaptability in the LEO Satellites Internet of Things. 131-135 - Dajian Xu, Gengxin Zhang, Xiaojin Ding:
Analysis of Co-channel Interference in Low-orbit Satellite Internet of Things. 136-139 - Andrey Ivanov, Maria Stoliarenko, Andrey Savinov, Serafim Novichkov:
Physical Layer Representation in LEO Satellite with a Hybrid Multi-Beamforming. 140-145 - Yawei Hu, Ning Ge:
Communication Experiments and Analysis Based on the Plasma Sheath Channel Simulation System. 146-151 - Chafai Abdelhamid, Marwa Daghari, Hedi Sakli, Chafaa Hamrouni:
A New UWB-MIMO Multi-Antennas With High Isolation For Satellite Communications. 152-155 - Peixi Liu, Tianqi Mao, Ke Ma, Jiaxuan Chen, Zhaocheng Wang:
Three-Dimensional Visible Light Positioning Using Regression Neural Network. 156-160
TM-6: Data and Energy Management in WSNs (WSNs Symposium)
- Djamila Mechta, Saad Harous:
Clustering in WSNs based on Artificial Fish Swarming Algorithm. 161-167 - Ali Kadhum M. Al-Qurabat, Chady Abou Jaoude, Ali Kadhum Idrees:
Two Tier Data Reduction Technique for Reducing Data Transmission in IoT Sensors. 168-173 - Zakia Jellali, Leïla Najjar Atallah, Sofiane Cherif:
Principal Component Analysis based Clustering Approach for WSN with Locally Uniformly Correlated Data. 174-179 - Jun Zheng, Donghong Jia, Baoxian Zhang:
A Two-Tier Clustering based Downlink Resource Allocation Algorithm for Small Cell Networks. 180-185 - Hamid Nouasria, Mohamed Et-tolba, Abla Bedoui:
New Sensing Matrices Based On Orthogonal Hadamard Matrices For Compressive Sensing. 186-191 - Ghassan Alnwaimi, Hatem Boujemaa:
Instantaneous Throughput Maximization for Cognitive Radio Networks. 192-196 - Oluyomi Simpson, Yichuang Sun:
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay. 197-202 - Yang Cai, Xiaofeng Lu, Yuansheng Luo, Kezhi Wang, Dongwei Chen, Kun Yang:
A Task Allocation Algorithm for Profit Maximization in NFC-RAN. 203-207
TM-7: Emerging Technologies and Applications (Wireless Nets Symposium)
- Oussama Abderrahmane Dambri, Soumaya Cherkaoui, Biswadeep Chakraborty:
Design and Evaluation of Self-Assembled Actin-Based Nano-Communication. 208-213 - Federica Aveta, Hazem H. Refai, Peter G. LoPresti:
Multi-user detection in optical wireless communication. 214-219 - Amina Nahali, Abdelaziz Hamdi, Matthieu Gautier, Antoine Courtay, Rafik Braham:
Energy Modeling of Wireless Body Area Networks with On-Body Communication Channel Characterization. 220-225 - Kawther Hassine, Aiman Erbad, Ridha Hamila:
Important Complexity Reduction of Random Forest in Multi-Classification Problem. 226-231 - Guanghua Zhang, Xue Sun, Tao Jiang, Weidang Lu:
Research on Indoor Location Algorithm Based on K Value Selection. 232-236 - Hao Qin, Shuo Shi, Xiangyu Tong:
A New Weighted Indoor Positioning Algorithm Based On the Physical Distance and Clustering. 237-242 - Mohamed Maalej, Hichem Besbes:
Accurate Blind Synchronization for Free Space Optical Communication System Using 2-PPM Modulation. 243-248
TA-1: Fog/Edge/Cloud IoT (5G IoT Symposium)
- Mengyu Li, Lanlan Rui, Xuesong Qiu, Shaoyong Guo, Xiuzhi Yu:
Design of a service caching and task offloading mechanism in smart grid edge network. 249-254 - Peng Zhang, Jie Yang, Rongfei Fan:
Energy-efficient Mobile Edge Computation Offloading with Multiple Base Stations. 255-259 - Biyao Li, Lanlan Rui, Xuesong Qiu, Haoqiu Huang:
Content Caching Strategy for Edge and Cloud Cooperation Computing. 260-265 - Zuoyan Tan, Lanlan Rui, Wenjing Li, Xuesong Qiu, Shaoyong Guo, Xiuzhi Yu:
Differentiated Service Mechanism According to Vehicle Environment in Vehicular Edge Network. 266-271 - Jiming Yao, Zhifeng Li, Yintao Li, Jie Bai, Jue Wang, Peng Lin:
Cost-Efficient Tasks Scheduling for Smart Grid Communication Network with Edge Computing System. 272-277 - Kun Xiao, Siya Xu, Shaoyong Guo, Xuesong Qiu, Peng Yu, Xingyu Chen, Wei Deng, Kunya Guo:
A Clustering Algorithm Based on Communication Overhead and Link Stability for Cloud-assisted Mobile Adhoc Networks. 278-283 - Jianli Guo, Zhihao Wang, Xiujuan Shi, Xiao Yang, Peng Yu, Lei Feng, Wenjing Li:
A Deep Reinforcement Learning based Mechanism for Cell Outage Compensation in Massive IoT Environments. 284-289 - Yanyan Zhang, Baocong Wang, Xin Li, Na Liu:
Study on sharing and compatibility between ITS and Fixed Service. 290-293
TA-2: e-Health (e-Health Symposium)
- Bouziane Brik, Moez Esseghir, Leïla Merghem-Boulahia, Hichem Snoussi:
ThermCont: A machine Learning enabled Thermal Comfort Control Tool in a real time. 294-300 - Paulo Resque, Alex Barros, Denis do Rosário, Eduardo Cerqueira:
An Investigation of Different Machine Learning Approaches for Epileptic Seizure Detection. 301-306 - Alex Barros, Denis do Rosário, Paulo Resque, Eduardo Cerqueira:
Heart of IoT: ECG as biometric sign for authentication and identification. 307-312 - Mbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh:
Intrusion cancellation for anomaly detection in healthcare applications. 313-318 - Sondes Titi, Hadda Ben Elhadj, Lamia Chaari:
An ontology-based healthcare monitoring system in the Internet of Things. 319-324 - Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane, Salama Ikki:
Maximizing Lifetime in Energy-Harvesting WBSN for Health Monitoring Systems Through Dynamic Slots Allocation. 325-329 - Jamal N. Al-Karaki, Amjad Gawanmeh, Meryeme Ayache, Ashraf Mashaleh:
DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain. 330-335
TA-3: Communication Systems (General Symposium)
- Koffi V. C. Kevin de Souza, Catherine Almhana, Jalal Almhana, Lutful Karim:
Cost Based Optimal Data Sampling Rate in Wireless Sensor Network. 336-341 - Dina Tarek, Abderrahim Benslimane, M. Darwish, Amira M. Kotb:
Cognitive Radio Networks Channel State Estimation Using Machine Learning Techniques. 342-347 - Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Zhihong Tian, Mingli Song, Chunsheng Zhu:
Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful? 348-353 - Djamila Bendouda, Hafid Haffaf:
QFM-MRPL: Towards a QoS and Fault Management based of Mobile-RPL in IoT for mobile applications. 354-359 - Miroslav Mitev, Arsenia Chorti, Martin J. Reed:
Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes. 360-365 - Omar Elharrouss, Noor Al-Máadeed, Somaya Al-Máadeed:
Video Summarization based on Motion Detection for Surveillance Systems. 366-371 - Trung Q. Duong, Long Dinh Nguyen, Loi Kim Nguyen:
Practical Optimisation of Path Planning and Completion Time of Data Collection for UAV-enabled Disaster Communications. 372-377 - Souad Labghough, Fouad Ayoub, Mostafa Belkasmi:
Error Probability Analysis for Dual-Hop Mixed RF-FSO System using CSOC Codes with MLGD Decoding. 378-383
TA-4: Comm. & SP (Comm. & SP Symposium)
- Syed Junaid Nawaz, Babar Mansoor, Mohammad N. Patwary, Mak Sharma:
An Iterative Massive-MIMO NOMA Receiver with Superimposed Pilots based Estimator for Sparse Channels. 384-390 - Sahbi Mazlout, Mohamed Bassem Ben Salah, Abdelaziz Samet:
Decision-based Algorithm for Robust 2D-DoA Estimation with L-shaped Array. 391-396 - Yingmeng Hu, Rongke Liu, Aryan Kaushik, John S. Thompson, Xinwei Yue:
Performance Analysis of Rateless-Coded Non-Orthogonal Multiple Access. 397-402 - Xiangqiang Gao, Rongke Liu, Hongxiu Bian, Yingmeng Hu:
A New Self-adaptive Wireless Communication System for Spinal Codes. 403-408 - Cheng Hu, Yunquan Dong:
Weighted-Sum Average Age of Information in Unilaterally Powered Two-Way Data Exchanging Systems. 409-414
TA-5: Heterogeneous Networks (Wireless Nets Symposium)
- Nahid Eddermoug, Mohamed Sadik, Essaid Sabir, Abdeljebar Mansour, Mohamed Azmi:
PPSA: Profiling and Preventing Security Attacks in Cloud Computing. 415-421 - Hager Ben Hafaiedh, Inès El Korbi, Rami Langar, Leïla Azouz Saïdane, Abdellatif Kobbane:
Canonical Coalition Game for Solving Wifi and LTE Coexistence Issues on the 5Ghz Band. 422-427 - Emad Abd-Elrahman, Adel Mounir Sareh Said:
Two Dimensional Markov Chain Approximation for MPTCP over HetNets: Performance Evaluation. 428-433 - Rihab Chaari, Omar Cheikhrouhou, Anis Koubâa, Habib Youssef, Habib Hmam:
Towards a Distributed Computation Offloading Architecture for Cloud Robotics. 434-441 - Basma Nissar, Ahmed El Ouadrhiri, Mohamed El-Kamili:
An Evolutionary Game-Theoretic Approach for Cache-Enabled Cognitive D2D Networks. 442-448 - Inès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, Nabil Tabbane:
Toward a Mapping Cost Minimization Model under Delay and Resource Constraints in NFV. 449-454 - Sghaier Guizani:
Low Energy System Proposal for UAV Applications Using Flexible Solar Cells. 455-458
TA-6: Vehicular Communications I (Vehicular Symposium)
- Sara Al-Emadi, Abdulla K. Al-Ali, Amr Mohammad, Abdulaziz Al-Ali:
Audio Based Drone Detection and Identification using Deep Learning. 459-464 - Yanhua He, Liangrui Tang, Zhenyu Zhou, Yun Ren:
Long-term QoE Optimization in IoV Based on Cross-layer Resource Management. 465-470 - Josef Schmid, Mathias Schneider, Alfred Höß, Björn W. Schuller:
A Comparison of AI-Based Throughput Prediction for Cellular Vehicle-To-Server Communication. 471-476 - Kai Li, Salil S. Kanhere, Wei Ni, Eduardo Tovar, Mohsen Guizani:
Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs. 477-482 - Ala Din Trabelsi, Hend Marouane, Faouzi Zarai, Amel Meddeb-Makhlouf:
Dynamic Scheduling Algorithm based on Priority Assignment for LTE-V2X vehicular Networks. 483-488 - Imen Mahjri, Sébastien Faye, Djamel Khadraoui:
On Building Cooperative Intelligent Transportation Systems over Public Transports. 489-495 - Ahlem Masmoudi, Souhir Feki, Kais Mnif, Faouzi Zarai:
Efficient Scheduling and Resource Allocation for D2D-based LTE-V2X Communications. 496-501
TA-7: Internet of Things (Wireless Nets Symposium)
- Imen Riabi, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane:
A survey on Blockchain based access control for Internet of Things. 502-507 - Ihirri Soukaina, Essaid Sabir, Ahmed Errami, Mohamed Khaldoun:
A Scalable Slotted Aloha for Massive IoT: A Throughput Analysis. 508-513 - Norhane Benkahla, Hajer Tounsi, Ye-Qiong Song, Mounir Frikha:
Enhanced ADR for LoRaWAN networks with mobility. 514-519 - Guanghua Zhang, Ke Bao, Tao Jiang, Weidang Lu:
Indoor localization algorithm based on combination of Kalman filter and clustering. 520-524 - Ahmed Aboud, Haifa Touati, Brahim Hnich:
Power Saving Extension for the NDN-Based GIF Protocol for the Internet of Things. 525-530 - Hanen Ferjani, Haifa Touati:
Efficient Data Dissemination in Electromagnetic Wireless Nano-Sensor Networks. 531-536 - Hassan Malik, Sikandar M. Zulqarnain Khan, Jeffrey Leonel Redondo Sarmiento, Alar Kuusik, Muhammad Mahtab Alam, Yannick Le Moullec, Sven Pärand:
NB-IoT Network Field Trial: Indoor, Outdoor and Underground Coverage Campaign. 537-542
TA-8: Physical Layer Security (Security Symposium)
- Walid Mallat, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati:
Impact of outdated CSI on the secrecy performance of dual-hop networks using cooperative jamming. 543-548 - Wided Hadj Alouane:
Secure Semi-Blind AF relaying networks using multiple eavesdroppers. 549-554 - Wided Hadj Alouane:
Partial Relay Selection for Secure Outdated-CSI AF in Untrusted-Relay Networks. 555-560 - Haïdar Safa, Mohamed Nassar, Wael Al Rahal Al Orabi:
Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification. 561-566 - Hicham Yassine, Mohammad Malli:
A Lightweight IoT Security Solution. 567-572 - Andrey Ivanov, Andrey Savinov, Dmitry Yarotsky:
Iterative Nonlinear Detection and Decoding in Multi-User Massive MIMO. 573-578 - Papis Ndiaye, Moussa Diallo, Moustapha Mbaye, Idy Diop, Madoune Robert Seye:
Efficient Lossless Feedback Compression for FDD Massive MIMO. 579-585 - Abdelkader Aljerme, Huaping Liu:
Efficient Kalman Modeling of Multipath Wireless Channel for Secret Key Generation. 586-590
TA-9: Digital Investigation & Information Assurance Techniques (DIIAT)
- Assia Naja, Mohammed Boulmalf, Mohamed Essaaidi:
A game theoretical based rebroadcasting protocol for content dissemination in VANETs. 591-596 - Sheng Yu, Jianhua Li, Jun Wu:
Emergent LBS: If GNSS Fails, How Can 5G-enabled Vehicles Get Locations Using Fogs? 597-602 - Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla:
A Name-to-Hash Encoding Scheme for Vehicular Named Data Networks. 603-608 - Chérifa Boucetta, Oumaya Baala, Kahina Ait Ali, Alexandre Caminada:
Performance of topology-based data routing with regard to radio connectivity in VANET. 609-614 - Karima Smida, Hajer Tounsi, Mounir Frikha, Ye-Qiong Song:
Delay Study in Multi-controller Software Defined Vehicular Network Using OpenDaylight for Emergency Applications. 615-620 - Azza Allouch, Omar Cheikhrouhou, Anis Koubâa, Mohamed Khalgui, Tarek Abbes:
MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems. 621-628 - Omar Cheikhrouhou, Anis Koubâa:
BlockLoc: Secure Localization in the Internet of Things using Blockchain. 629-634 - Lamiaa Basyoni, Aiman Erbad, Mashael Al Sabah, Noora Fetais, Mohsen Guizani:
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network. 635-642
TA-10: Multimedia Information Processing (Multimedia Symposium)
- Abid Yaqoob, Ting Bi, Gabriel-Miro Muntean:
A DASH-based Efficient Throughput and Buffer Occupancy-based Adaptation Algorithm for Smooth Multimedia Streaming. 643-649 - Tengchao Ma, Changqiao Xu, Zan Zhou, Xiaohui Kuang, Lujie Zhong:
SE-PSO: Resource Scheduling Strategy for Multimedia Cloud Platform Based on Security Enhanced Virtual Migration. 650-655 - Zhe Yuan, Wenqin Zhuang, Xin Wei, Liang Zhou:
Joint Social-Aware and Mobility-Aware Caching in Cooperative D2D. 656-661 - Han Xiao, Changqiao Xu, Tengfei Cao, Shujie Yang, Lujie Zhong, Gabriel-Miro Muntean:
Energy Efficient for Scalable Video Caching Service over Device-to-Device Communication. 662-667 - Xin Wei, Pingchuan Ding, Fang Zho, Jinglei Lou, Yun Gao:
A Load Balancing Strategy based on Request Queue for P2P-VoD System. 668-673 - Sifan Wu, Fei Li, Pengyuan Zhang:
Weighted Feature Fusion Based Emotional Recognition for Variable-length Speech using DNN. 674-679 - Armielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair:
Mining User Opinion Influences on Twitter Social Network: Find that Friend who Leads your Opinion Using Bayesian Method and a New Emotional PageRank Algorithm. 680-685
TA-11: Multimedia & Networking (Multimedia Symposium)
- John Monks, Cristina Hava Muntean, Gabriel-Miro Muntean:
A Mobile Quality-oriented Cooperative Multimedia Delivery Solution. 686-691 - Ali Hodroj, Marc Ibrahim, Yassine Hadjadj Aoul, Bruno Sericola:
Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithm. 692-697