Journal: IJCNIS

Volume 13, Issue 3

0 -- 0Andrey Silva. Security Improvements for Connected Vehicles Position-Based Routing
0 -- 0Nabeel Tawalbeh, Mohammad Malkawi, Hanan M. Abusamaha, Sahban Alnaser. Demand Based Cost Optimization of Electric Bills for Household Users
0 -- 0Wanderson L. Costa, Ariel L. C. Portela, Rafael Lopes Gomes. Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing
0 -- 0Mohammed Ali Tawfeeq. Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam Distribution Model
0 -- 0Lavanya-Nehan Degambur, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth. Resource Allocation in 4G and 5G Networks: A Review
0 -- 0Sandugash Serikbayeva, J. A. Tussupov, M. A. Sambetbayeva, A. S. Yerimbetova, Gauchar Borankulova, Aigul Tungatarova. A Model of a Distributed Information System based on the Z39.50 Protocol
0 -- 0Essraa Hesham Mahmoud, Mohammed S. Gadelrab, Khaled Elsayed 0001, Abdel Rahman Sallam. Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications
0 -- 0Reham Abdellatif Abouhogail. Untraceable Authentication Protocol for IEEE802.11s Standard
0 -- 0Lavanya-Nehan Degambur, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth. Resource Allocation in 4G and 5G Networks: A Review
0 -- 0Mohammed Abdulhammed Al-Shabi. Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks
0 -- 0Oleksandr Laptiev, Serhii Yevseiev, Larysa Hatsenko, Olena Daki, Vitaliy Ivanenko, Valery Fedunov, Spartak Hohoniants. The method of discretization signals to minimize the fallibility of information recovery
0 -- 0Ahmed El-Yahyaoui, Fouzia Omary. An improved Framework for Biometric Database's privacy
0 -- 0Nabeel Tawalbeh, Mohammad Malkawi, Hanan M. Abusamaha, Sahban Alnaser. Demand Based Cost Optimization of Electric Bills for Household Users
0 -- 0Rana Al-Rawashdeh, Mohammad Al-Fawa'reh, Wail Mardini. Enhanced Epileptic Seizure diagnosis using EEG Signals with Support vector machine and Bagging Classifiers
0 -- 0Reham Abdellatif Abouhogail. Untraceable Authentication Protocol for IEEE802.11s Standard
0 -- 0Marwa Ahmad, Nameer N. El-Emam, Ali F. Al-Azawi. Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information
0 -- 0Mohammed Abdulhammed Al-Shabi. Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks
0 -- 0Ja'afer Al-Saraireh, Haya Joudeh. An Efficient Authentication Scheme for Internet of Things
0 -- 0Rana Al-Rawashdeh, Mohammad Al-Fawa'reh, Wail Mardini. Enhanced Epileptic Seizure diagnosis using EEG Signals with Support vector machine and Bagging Classifiers
0 -- 0Srinivas K, T. Srinivasulu. Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System
0 -- 0Oleksandr Laptiev, Serhii Yevseiev, Larysa Hatsenko, Olena Daki, Vitaliy Ivanenko, Valery Fedunov, Spartak Hohoniants. The method of discretization signals to minimize the fallibility of information recovery
0 -- 0Essraa Hesham Mahmoud, Mohammed S. Gadelrab, Khaled Elsayed 0001, Abdel Rahman Sallam. Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications
0 -- 0Sandugash Serikbayeva, J. A. Tussupov, M. A. Sambetbayeva, A. S. Yerimbetova, Gauchar Borankulova, Aigul Tungatarova. A Model of a Distributed Information System based on the Z39.50 Protocol
0 -- 0Kabiru Yusuf, Dahiru Sani Shu'aibu, Suleiman Aliyu Babale. Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs)
0 -- 0Kabiru Yusuf, Dahiru Sani Shu'aibu, Suleiman Aliyu Babale. Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs)
0 -- 0Norliza Katuk, Ikenna Rene Chiadighikaobi. An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment
0 -- 0Oleksandr Leonidovich Turovsky, Vadym Vlasenko, Nataliia Rudenko, Oleksandr Golubenko, Oleh Kitura, Oleksandr Drobyk. Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems
0 -- 0Husna Sarirah Husin. Preventing data leakage by securing chat session with randomized session ID
0 -- 0Husna Sarirah Husin. Preventing data leakage by securing chat session with randomized session ID
0 -- 0Srinivas K, T. Srinivasulu. Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System
0 -- 0Ahmed El-Yahyaoui, Fouzia Omary. An improved Framework for Biometric Database's privacy
0 -- 0Jaafer Saraireh, Haya Joudeh. An Efficient Authentication Scheme for Internet of Things
0 -- 0Yana Kremenetska, Anatoliy Makarenko, Andrii Bereznyuk, Serhii Lazebnyi, Natalia Rudenko, Olexander Vlasov. High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies
0 -- 0Oleksandr Leonidovich Turovsky, Vadym Vlasenko, Nataliia Rudenko, Oleksandr Golubenko, Oleh Kitura, Oleksandr Drobyk. Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems
0 -- 0Utpala Borgohain, Surajit Borkotokey, S. K. Deka. A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead
0 -- 0Mohammed Ali Tawfeeq. Enhancing Route lifetime in Vehicular Ad Hoc ‎Networks Based on Skellam Distribution Model
0 -- 0Utpala Borgohain, Surajit Borkotokey, S. K. Deka. A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead
0 -- 0Norliza Katuk, Ikenna Rene Chiadighikaobi. An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment
0 -- 0Yana Kremenetska, Anatoliy Makarenko, Andrii Bereznyuk, Serhii Lazebnyi, Natalia Rudenko, Olexander Vlasov. High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies
0 -- 0Wanderson L. Costa, Ariel L. C. Portela, Rafael Lopes Gomes. Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing
0 -- 0Andrey Silva. Security Improvements for Connected Vehicles Position-Based Routing
0 -- 0Marwa Ahmad, Nameer N. El-Emam, Ali F. Al-Azawi. Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information

Volume 13, Issue 2

0 -- 0Ahmad Y. Alhusenat, Abdallah Y. Alma'aitah, Khaled F. Hayajneh. Matching Subcarrier Resource Allocation and Offloading Decision
0 -- 0Mohammad Malkawi, Wail Mardini, Toqa' Abu Zaitoun. Auto Signature Verification Using Line Projection Features Combined With Different Classifiers and Selection Methods
0 -- 0Abdelouafi Ikidid, Abdelaziz El Fazziki, Mohamed Sadgal. A multi-agent Framework for dynamic traffic management Considering Priority Link
0 -- 0Hemangi Goswami, Hiten Choudhury. Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions
0 -- 0Abdirisaq Jama, Othman O. Khalifa, Nantha Kumar Subramaniam. Novel Approach for IP-PBX Denial of Service Intrusion Detection Using Support Vector Machine Algorithm
0 -- 0Vaneet Kaur Bhatia, Akshay Girdhar, Sawtantar Singh Khurmi. Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks
0 -- 0Inad A. Aljarrah. Effect of image degradation on performance of Convolutional Neural Networks
0 -- 0Mohialdeen Mustafa Mohammed, Zaika Viktor, Khlaponin Yurii, Berkman Lyubov, Polonskyi Konstiantyn, Oleksandr Leonidovich Turovsky. Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types
0 -- 0Nikheel Tashvin Seechurn, Avinash Mungur, Sheeba Armoogum, Sameerchand Pudaruth. Issues and Challenges for Network Virtualisation
0 -- 0Yassine El Khanboubi, Mostafa Hanoune, Mohamed El Ghazouani. A New Data Deletion Scheme for a Blockchain-based De-duplication System in the Cloud
0 -- 0Mohammed A Alqhatani. Machine Learning Techniques for Malware Detection with Challenges and Future Directions
0 -- 0Mohammed N. Alenezi, Fawaz S. Al-Anzi. A Study of Z-Transform Based Encryption Algorithm
0 -- 0Rachid Zagrouba, Reem Alhajri. Machine Learning based Attacks Detection and Countermeasures in IoT
0 -- 0Himanshu Agarwal, Farooq Husain. Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme
0 -- 0Siham Arfaoui, Abdelhamid Belmekki, Abdellatif Mezrioui. A Privacy by Design Methodology Application in Telecom Domain
0 -- 0Karina Turzhanova, Valery Tikhvinskiy, Sergey Konshin, Alexandr Solochshenko. Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area
0 -- 0Raed A. Alsaqour, Ahmed Majrashi, Mohammed Alreedi, Khalid Alomar, Maha S. Abdelhaq. Defense in Depth: Multilayer of security
0 -- 0Irwan Piesessa, Benfano Soewito. Analysis of BGP4 Peering Establishment Time on IPv6 Connection over 6PE and 6VPE
0 -- 0Thamer Alhussain. An Energy-Efficient Scheme for IoT Networks
0 -- 0Oleksandr Laptiev, Volodymyr Tkachev, Oleksii Maystrov, Oleksandr Krasikov, Pavlo Open'ko, Volodimir Khoroshko, Lubomir Parkhuts. The method of spectral analysis of the determination of random digital signals
0 -- 0Nor Azman Mat Ariff. Ensemble Method for Mobile Malware Detection using N-Gram Sequences of System Calls

Volume 13, Issue 1

0 -- 0Azeddine Wahbi, Anas el Habti el Idrissi, Ahmed Roukhe, Bahloul Bensassi, Laamari Hlou. Design, optimization and Real Time implementation of a new Embedded Chien Search Block for Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) codes on FPGA Board
0 -- 0Oleksandr Laptiev, Vitalii Savchenko, Andrii Kotenko, Volodimir Akhramovych, Vladimir Samosyuk, German Shuklin, Anatjliy Biehun. Method of Determining Trust and Protection of Personal Data in Social Networks
0 -- 0Khalil Ibrahim Mohammad Abuzanouneh, Mohammed Hadwan. Multi-Stage Protection Using Pixel Selection Technique for Enhancing Steganography
0 -- 0Hala Al-Zu'bi, Osama Al-Khaleel, Ali M. Shatnawi. FPGA Implementation of Data Flow Graphs for Digital Signal Processing Applications
0 -- 0Ahmed Amine Barakate, Rida Abdelmoumene, Azeddine Wahbi, Mohamed Maddi, Laamari Hlou, Abdelkader Hadjoudja. Modeling, Development and Analysis Performance of an Intelligent Control of Photovoltaic System by Fuzzy Logic approach for Maximum Power Point Tracking
0 -- 0Manjula C. Belavagi, Balachandra Muniyal. Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification
0 -- 0Hanan A. Hosni Mahmoud. A Low Power Architectural Framework for Automated Surveillance System with Low Bit Rate Transmission
0 -- 0Nesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed. Secure and Efficient Video Transmission in VANET
0 -- 0Alaa' Al-Ahmad, Omar Saad Almousa, Qusai Abuein. Enhancing Steganography by Image Segmentation and Multi-level Deep Hiding
0 -- 0Khalil Al-Shqeerat, Khalil Ibrahim Abuzanouneh. A Hybrid Graphical User Authentication Scheme in Mobile Cloud Computing Environments
0 -- 0Drishya S. R., Renukadevi S., Vaidehi V.. A Stable Clustering Scheme with Node Prediction in MANET
0 -- 0Mohammad Malkawi, Khaldoon Al-Zoubi, Ahmed Shatnawi. Quasi Real-Time Intermodulation Interference Method: Analysis and Performance
0 -- 0Saîd El Abdellaoui, Youssef Fakhri. Power Management Strategies in Energy-Harvesting Wireless Sensor Networks
0 -- 0Khalid Adnan Alissa, Bashar AlDeeb, Hanan A. Alshehri, Shahad A. Dahdouh, Basstaa M. Alsubaie, Afnan M. Alghamdi, Mutasem Alsmadi. Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies
0 -- 0Oleksandr Laptiev, Vitalii Savchenko, Andrii Pravdyvyi, Ivan Ablazov, Rostyslav Lisnevsky, Oleksandr Koloss, Viktor Hudyma. Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model
0 -- 0Malek Alzaqebah, Sana Jawarneh, Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh. Improved Multi-Verse Optimizer Feature Selection Technique With Application To Phishing, Spam, and Denial Of Service Attacks
0 -- 0Anas Abu Taleb. Sink Mobility Model for Wireless Sensor Networks Using Kohonen Self-Organizing Map
0 -- 0Duhaq Ehasn Mohsen, Ali Mehdi Hammadi, Ali J. Al-Askery. WDM and DWDM based RoF system in Fiber Optic Communication Systems: A review