Abstract is missing.
- Live Video Streaming Application with Geo- Tagging to alert authorities about an on-going crimeMuntaha Saleem. 1-6 [doi]
- Improving Estimation of a Sparse Channel for OFDM Systems by Utilizing Side InformationSeyed Hadi Hashemi Rafsanjani, Saeid Ghazi-Maghrebi. 1-6 [doi]
- Multi-Priority Based Interference Mitigation Scheme for HetNets Uplinks: A Frequency Hopping MethodQi Zeng, Xing Liu 0001. 1-6 [doi]
- Dual-Mode Index Modulation Aided OFDM with Generalized PrefixYusuf Acar, Sultan Aldirmaz Çolak, Todor Cooklev. 1-4 [doi]
- Implementing Enterprise Resource Planning Systems in the Cloud: Challenges and SolutionsAhmad Rabay'a, Kalman Graffi. 1-8 [doi]
- A Novel Utility Based Metric and Routing for Energy Efficiency in Software Defined NetworkingBeakal Gizachew Assefa, Öznur Özkasap. 1-4 [doi]
- Performance Analysis of Acousto Optical Modulator-Free Space Optical System Over Gamma-Gamma Turbulent ChannelRaed Mesleh, Ayat Al-Olaimat. 1-6 [doi]
- A GFDM-CDMA Scheme for Hybrid Satellite-Terrestrial Communication SystemYang Yang, Lidong Zhu, Xing Mao. 1-6 [doi]
- Comparative Study of Security Methods against DDOS Attacks in Cloud Computing EnvironmentHedjaz Sabrine, Abderrahmane Baadache, Semchedine Fouzi. 1-5 [doi]
- Dynamic Channel Allocation Strategy of Satellite Communication Systems Based on Grey PredictionQinyang Zou, Lidong Zhu. 1-5 [doi]
- AMP-based Detector for Uplink OFDM-IDMA with Carrier Frequency OffsetRanran He, Jiesi Kang, Yue Xiao, Bin Fu. 1-5 [doi]
- Side Channel Analysis Using EM Radiation of RSA Algorithm Implemented on Raspberry PiErsin Hatun, Gokhan Kaya, Elif Buyukkaya, Siddika Berna Ors Yalcin. 1-6 [doi]
- Path Loss Results for Wireless Sensor Network Deployment in a Sparse Tree EnvironmentAbdulaziz AlSayyari, Abdallah Aldosary. 1-6 [doi]
- A Fair and Privacy-preserving Reservation Scheme for Charging Electric VehiclesKhaled Rabieh, Ahmet Furkan Aydogan. 1-6 [doi]
- Key-based Reversible Data Masking for Business Intelligence Healthcare Analytics PlatformsOsama Ali-Ozkan, Abdelkader Ouda. 1-6 [doi]
- Efficient Network Intrusion Detection Using PCA-Based Dimensionality Reduction of FeaturesRazan Abdulhammed, Miad Faezipour, Hassan Musafer, Abdelshakour A. Abuzneid. 1-6 [doi]
- Proving Yourself: Addressing the Refugee Identity Crisis with Bayesi-Chain Probability & Digital FootprintsJuanita Blue, Joan Condell, Tom Lunney. 1-6 [doi]
- An Internet of Things (IoT) Management System for Improving Homecare - A Case StudyAreej Almazroa, Hongjian Sun. 1-5 [doi]
- A Semi-Automated User-Centric Decision System for Green Communications Incorporating the Particle Swarm Optimization AlgorithmAshraf Tahat, Mohammad Abdelrahman, Qusai Abu-Khlaif, Lara Qatarneh, Zaina Abu-Shamma, Omar Saraereh. 1-6 [doi]
- Resilient Deployment of Drone Base StationsAlper Akarsu, Tolga Girici. 1-5 [doi]
- Self-adapting Linear Network Coding EmulationNuno B. Coelho, Francisco A. Monteiro, Rui J. Lopes. 1-7 [doi]
- Low-cost sensor using a dsPIC for measuring a specific heat capacity of liquidsSwapna Chintakunta, Kanchi Raghavendra Rao, Patrick K. M. Nkwari, Khmaies Ouahada. 1-5 [doi]
- CS-Based Multiuser Detector for SCMA SystemsMehmet Hakan Durak, Özgür Ertug. 1-4 [doi]
- A Comparative Study of Biometric Authentication in Cloud ComputingTarfah Mohammed Alsultan, Asiya Abdus Salam, Khalid Adnan Alissa, Nazar Abbas Saqib. 1-6 [doi]
- A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data EmbeddingGhadir Mostafa, Wassim Alexan. 1-6 [doi]
- InterOpT: A new testing platform based on oneM2M standards for IoT systemsSenay Tuna Demirel, Mehmet Demirel, Ibrahim Dogru, Resul Das. 1-6 [doi]
- Hop-2 IEEE 802.15.5 Optimization framework for Resource Allocation with Service DifferentiationSamar Sindian, Abed Ellatif Samhat, Ayman Khalil, Matthieu Crussière, Jean-François Hélard, Samer Sindian. 1-6 [doi]
- A Smart School Bus Tracking SystemIlker Korkmaz, Alp Camci, Cihangir Cengiz, Dogan Dirik, Emre Cekci, Fatih Mehmet Akbaba. 1-6 [doi]
- Performance Evaluation of Wavelet Packet Modulation for Wireless Digital CommunicationsMohammad Ridwan Effendi, Tati Latifah Rajab Mengko, Arief Hamdani Gunawan, Achmad Munir. 1-4 [doi]
- Reliable Transmission Scheme Against Security Attacks in Wireless Sensor NetworksNazli Siasi, Adel Aldalbahi, Mohammed A. Jasim. 1-6 [doi]
- Cooperative Caching based on Small Base Station Selection for Wireless NetworksRuimeng Gan, Yucheng Liao, Yue Xiao, Ping Yang, Bin Fu. 1-5 [doi]
- Investigation on the RF and Microwave Energy Harvesting from wireless and mobile communication networksChemseddine Benkalfate, Mohammed Feham, Achour Ouslimani, Abdelhak Kasbari. 1-6 [doi]
- LBFT: Load Balancing and Fault Tolerance in distributed controllersAyeh Mahjoubi, Omid Zeynalpour, Benyamin Eslami, Nasser Yazdani. 1-6 [doi]
- F-DCTCP: Fair Congestion Control for SDN-Based Data Center NetworksJonathan Aina, Lotfi Mhamdi, Hédi Hamdi. 1-6 [doi]
- Preliminary Study of Improving Position in North of Algeria Using GPS and EGNOS CorrectionsTabti Lahouaria, Salem Kahlouche, Benadda Belkacem. 1-5 [doi]
- Provisioning of UE Behavior Prognostic by Multiaccess Edge ComputingIvaylo Atanasov, Evelina Pencheva, Aleksandar Nametkov, Ventsislav Trifonov. 1-6 [doi]
- Quadrature Spatial Modulation OFDM System Performance in the Presence of High Power Amplifier NonlinearitiesAnas Al Ashqar, Raed Mesleh. 1-6 [doi]
- A Two-Stage Relay Selection and Power Allocation Algorithm for NOMA-Based Multicast Cognitive Radio NetworksMohammed Wael Baidas, Emad Alsusa, Khairi A. Hamdi. 1-7 [doi]
- Performance of FBMC in 5G Mobile Communications Over Different Modulation TechniquesAli S. Rachini, Mustafa Musa Jaber. 1-6 [doi]
- Wildfire Propagation Simulation Tool using Cellular Automata and GISWashington Velasquez, Andres Munoz-Arcentales, Thomas Michael Bohnert, Joaquín Salvachúa. 1-7 [doi]
- Dynamic Wider Bandwidth Channel Access in the Next Generation Vehicular NetworksRonny Yongho Kim. 1-2 [doi]
- Can I Trust Her? Intelligent Personal Assistants and GDPREoghan Furey, Juanita Blue. 1-6 [doi]
- A New Approach to Simulating Node Deployment for Smart City Applications Using Geospatial DataIzzet Fatih Senturk, Gaoussou Youssouf Kebe. 1-5 [doi]
- Handover Implementation for Femtocell Deployment in LTE Heterogeneous NetworksAzita Laily Yusof, Mohd Saufi Nasro Ali, Norsuzila Ya'acob. 1-5 [doi]
- Blockchain Enabled Distributed Cooperative D2D CommunicationsYulan Gao, Mingming Wu, Yue Xiao, Ping Yang, Bin Fu, Dongyan Wang. 1-6 [doi]
- Packet Data Session Management as a ServiceEvelina Pencheva, Ivaylo Atanasov, Vladislav Vladislavov, Ventsislav Trifonov. 1-6 [doi]
- A Wideband High Flat Gain Waveguide-Fed Aperture Antenna Using Superstrate and ShieldMehdi Ghorbani, Mohsen Khalily, Pei Xiao, Rahim Tafazolli. 1-6 [doi]
- The Presence of Thermal, Shot, Impulsive and Flicker Noise at Millimeter-Wave FrequenciesHasan Amca. 1-6 [doi]
- Research on Executive Control Strategy of Mimic Web Defense GatewayShuang-Xi Chen, Xin-Yue Jiang, Gao-Ning Pan, Chun-Ming Wu. 1-7 [doi]
- Resource-Efficient Decoupling in Ultra-Dense 5G NetworksChristos Bouras, Vasileios Kokkinos, Evangelos Michos. 1-6 [doi]
- Indoor Location Finding of the Transmitter Based on Bluetooth Received Signal StrengthMurat Ture, Aysenur Hatipoglu. 1-5 [doi]
- A Matching-Theoretic Approach to Joint Subcarrier Assignment and Weighted-Sum Energy-Efficient Power Allocation in Multi-Carrier NOMA Relay NetworksMohammed Wael Baidas, Emad Alsusa, Khairi A. Hamd. 1-8 [doi]
- QUIC-proxy based architecture for satellite communication to enhance a 5G scenarioA. Abdel Salam, Michele Luglio, M. Quadrini, Cesare Roseti, Francesco Zampognaro. 1-6 [doi]
- Enhancing V ANET's Secure Routing with the Trust MetricAfef Slama, Ilhem Lengliz. 1-5 [doi]
- Improved Route Selection Strategy Based on K Shortest PathGuanghao Huang, Wei Lu, Jidong Xie, Gengxin Zhang. 1-4 [doi]
- An Application Framework of Crowdsourcing based Emergency Events Reporting in Smart CitiesMuhammad Taha Jilani, Muhammad Zaka ur Rehman, M. Azeem Abbas. 1-5 [doi]
- Context-Aware Operation-Based Access Control for Internet of Things ApplicationsDidem Genç, Emrah Tomur, Yusuf Murat Erten. 1-6 [doi]
- Reconstruction Distortion Oriented Light Field Image Dataset for Visual CommunicationZhijiao Huang, Mei Yu 0001, Gangyi Jiang, Ken Chen, Zongju Peng, Fen Chen. 1-5 [doi]
- A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry DefenseCongqi Shen, Shuang-Xi Chen, Chun-Ming Wu. 1-6 [doi]
- Emotion Recognition Based on Decoupling the Spatial Context from the Temporal Dynamics of Facial ExpressionsRami Alazrai, Khalil M. Ahmad Yousef, Mohammad I. Daoud. 1-6 [doi]
- CoAP based IoT data transfer from a Raspberry Pi to CloudThomas Lee Scott, Amna Eleyan. 1-6 [doi]
- Fine Tuning Distributed Divergecast Scheduling Algorithms in IEEE 802.1S.4e TSCH for Internet of EverythingAlper K. Demir, Sedat Bilgili. 1-6 [doi]
- Number Analysis and Operator Detection in Telecommunication SystemsMurat Berk, Onder Aycicek, Ismail Ay, Seda Gonenc, Suleyman Tosun. 1-5 [doi]
- Finding better learning algorithms for self-driving cars: An overview of the LAOP platformJihene Rezgui, Clément Bisaillon, Léonard Oest O'Leary. 1-6 [doi]
- Broadband Millimeter Wave Planar Power Combiner/DividerAli Ghavidel, Ali Khierdoost. 1-4 [doi]
- Review of RDMA-enabled Consensus ProtocolsKarim Sonbol, Öznur Özkasap. 1-4 [doi]
- Finding a needle in a haystack - A comparative study of IPv6 scanning methodsErik Bergenholtz, Dragos Ilie, Andrew Moss, Emiliano Casalicchio. 1-6 [doi]
- Investigation of Ionospheric Scintillation and Total Electron Content during Maximum and Minimum Solar CycleNorsuzila Ya'acob, Noraisyah Tajudin, Azita Laily Yusof, Murizah Kassim, Suzi Seroja Sarnin, Nur Zahraa'Zaharudin. 1-6 [doi]
- 'The ZNSL Network': A Novel Approach to Virtual NetworkingErik Joseph Seidel, Songjie Wei. 1-4 [doi]
- Efficient Privacy-preserving User Identity with Purpose-based EncryptionTri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann, Steven Furnell. 1-8 [doi]
- It is Probably Me: A Bayesian Approach to Weighting Digital Identity SourcesJuanita Blue, Joan Condell, Tom Lunney. 1-6 [doi]
- A New CEP-based Air Quality Prediction Framework for Fog based IoTMetehan Guzel, Suat Ozdemir. 1-6 [doi]
- An Efficient Way for Satellite Interference Signal Recognition Via Incremental LearningYing Yang, Lidong Zhu. 1-5 [doi]
- Scaled Conjugate Gradient Neural Network for Optimizing Indoor Positioning SystemNour Aburaed, Shadi Atalla, Husameldin Mukhtar, Mina Al-Saad, Wathiq Mansoor. 1-4 [doi]
- A Blockchain Smart ContractApplication FrameworkArifFurkan Mendi, Tolga Erol, Emre Safak, Tolga Kaym. 1-4 [doi]
- Use of Particle Filtering in RSSI-Based Localization by Drone Base StationsSerife Senem Karaman, Alper Akarsu, Tolga Girici. 1-5 [doi]
- Performance analysis of OFDM-IM over Faded Shadowing Channel with co-channel interferenceIbrahim Aboharba, Quazi M. Rahman, Raveendra K. Rao. 1-7 [doi]
- A Fully Distributed Fault-Tolerant Cluster Head Selection Algorithm for Unit Disk GraphsOzkan Arapoglu, Orhan Dagdeviren. 1-6 [doi]
- On the Usage of DSCP and ECN Codepoints in Internet Backbone Traffic Traces for IPv4 and IPv6Nils Rodday, Klement Streit, Gabi Dreo Rodosek, Aiko Pras. 1-6 [doi]
- Special Aspects of Ultra-Short Radio Wave Propagation above the Sea Surface. Theoretical Background and Experimental ResultsVasily V. Popovich, Oksana V. Smirnova, Tatiana V. Popovich. 1-6 [doi]
- Circularly Polarized Sequentially Rotated Patch Antenna Array at 2.45 GHzMohamad Alwan, Mervat Madi, Karim Y. Kabalan. 1-4 [doi]
- The Effect of Random Node Distribution and Transmission Ranges on Connectivity Robustness in Wireless Sensor NetworksOrhan Dagdeviren, Vahid Khalilpour Akram. 1-5 [doi]
- Capacity guaranteed sleep mode algorithm for 5G femtocell tierChristos Bouras, Georgios Diles, Nikolareas Konstantinos. 1-6 [doi]
- Capacity of Outdoor VLC Links Using a Visible LASER BeamAlain Richard Ndjiongue, Khmaies Ouahada. 1-6 [doi]
- Performance Evaluation of Thread Protocol based Wireless Mesh Networks for Lighting SystemsSrikanth Sistu, Qingzhi Liu, Tanir Ozcelebi, Esko Dijk, Teresa Zotti. 1-8 [doi]
- Bandwidth Enhancement and Radiation Characteristics Improvement of Triangular Dielectric Resonator AntennaMehdi Ghorbani, Mohsen Khalily, Habib Ghorbaninejad, Pei Xiao, Rahim Tafazolli. 1-5 [doi]
- A Matching-Theoretic Approach to Distributed SWIPT in Ad-Hoc Wireless NetworksMohammed Wael Baidas, Masoud M. Afghah, Fatemeh Afghah. 1-6 [doi]
- An Exploratory Data Analytics Platform for Factories of FutureEngin Zeydan, Omer Dedeoglu. 1-6 [doi]
- An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH ClusteringZainab H. Fakhri, Firas A. Sabir, Hamed S. Al-Raweshidy. 1-8 [doi]
- A Systematic Approach to Identify an Appropriate Classifier for Limited-Sized Data SetsAlanoud Bin Dris, Najla Alzakari, Heba Kurdi. 1-6 [doi]
- Blind Source Separation Via Geometric Segmentation with Canonical Correlation Analysis in Satellite CommunicationsChengjie Li, Lidong Zhu, Zhen Zhang. 1-5 [doi]
- DoS Attack Detection using Packet Statistics in SDNNail Goksel, Mehmet Demirci. 1-6 [doi]
- An Implementation of Network Service Chaining for SDN-enabled Mobile Packet Data NetworksYekta Turk, Engin Zeydan. 1-6 [doi]
- Medical Applications of Image Reconstruction Using Electromagnetic Field in Terahertz Frequency RangeAbdel-Aziz Ibrahim Mahmoud Hassanin, Amr Saadeldien Elsayed Shaaban, Fathi E. Abd El-Samie. 1-4 [doi]
- Edge Computing based Smart Meeting Room ControllerKemal Cagri Serdaroglu, Sebnem Baydere. 1-4 [doi]
- A Novel Scheduling Scheme for Ultra-Dense NetworksHuseyin Haci, Amr Abdelbari. 1-6 [doi]
- High Efficient Millimeter Wave Rectangular Cavity Power Combiner/DividerAli Ghavidel, Roghich Karimzadeh Baee, Esfandiar Mehrshahi. 1-4 [doi]
- Employing a Continuous Measurement Process During Digital Tool ValidationNicolas Hughes, Khaled Rabieh, Ahmet Furkan Aydogan. 1-6 [doi]
- Base Station Selection for Cache-enabled Wireless NetworksYucheng Liao, Ruimeng Gan, Yue Xiao, Ping Yang, Bin Fu. 1-5 [doi]
- IoT based Hand Hygiene Compliance MonitoringNoushin Karimpour, Burak Karaduman, Aybars Ural, Moharram Challenger, Orhan Dagdeviren. 1-6 [doi]
- Securing Blockchain Shards By Using Learning Based Reputation and Verifiable Random FunctionsAhmet Bugday, Adnan Ozsoy, Hayri Sever. 1-4 [doi]
- Development of 24GHz millimeter wave radar for energy-saving in an intelligent street lighting systemSeungeon Song, Sangdong Kim, Young-Seok Jin, Chun Hwan Nam, Sung Hae Ye, Jonghun Lee. 1-2 [doi]
- Performance of NOMA-eMBMS Cellular Broadcasting for Multicast/Unicast Applications in 5G NetworksHeydar Shariatzadeh, Saeed Ghazi-Maghrebi. 1-7 [doi]
- Investigation of Multi-Beam Interference Impact on State-of-Polarization OCDMA Optical NetworksNaser G. Tarhuni. 1-6 [doi]
- Examining Liberalization of Railway Communication ServicesMaziar Yazdani, Fatemeh Hajizadeh, Saeed Ghazi-Mazhrebi. 1-8 [doi]
- Grating Lobes Reduction in Linear Arrays Composed of Subarrays Using PSOGhazale Tashtarian, Mohammad Saeed Majedi. 1-6 [doi]
- Impact of I/Q Imbalance on Receive Space Modulation TechniquesOmar Hiari, Raed Mesleh. 1-6 [doi]
- Veiled Shared key Generation for Intra-Convoy Secret Communication SessionsSarah Al-Shareeda. 1-7 [doi]
- On the Average Hamming Correlation of Frequency-Hopping Sequence Sets with Low Hit ZoneXing Liu 0001, Liang Zhou, Qi Zeng, Xianhua Niu. 1-6 [doi]
- An Asynchronous Self-Stabilizing Maximal Independent Set Algorithm in Wireless Sensor Networks Using Two-Hop InformationOzkan Arapoglu, Orhan Dagdeviren. 1-5 [doi]
- The Nearest Origin-Shield (NOS): A Jitter-Free Overlay Routing Framework for Content Delivery NetworksNima Najaflou, Ahmet Aris, Berk Canberk, Zeynep Gürkas Aydin. 1-6 [doi]