Abstract is missing.
- Managing Security Policies within Cloud Environments Using Aspect-Oriented State MachinesMeryeme Ayache, Ahmed Khoumsi, Mohammed Erradi. 1-10 [doi]
- GIS Based Fuzzy Analytic Hierarchy Process for wind Energy Sites SelectionFatma Elmahmoudi, Oum Elkheir Abra, Abdelhadi Raihani, Ouafae Serrar, Lhousine Bahatti. 1-8 [doi]
- A Clever Approach to Develop an Efficient Deep Neural Network Based IDS for Cloud Environments Using a Self-Adaptive Genetic AlgorithmZouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohamed Rida. 1-9 [doi]
- Performance Improvement of White LED-Based VLC Systems Using Blue and Flattening FiltersSezer Can Tokgoz, Noha Anous, Serhan Yarkan, Diaa Khalil, Khalid A. Qaraqe. 1-6 [doi]
- Adaptive Self-Interference Cancellation for Full Duplex Systems with Auxiliary ReceiverMaggie Shammaa, Hendrik Vogt, Ahmed El-Mahdy, Aydin Sezgin. 1-8 [doi]
- Superior Selective Reporting-Based Spectrum Sensing in Energy Harvesting-Aided HCRNsRajalekshmi Kishore, Sanjeev Gurugopinath, Sami Muhaidat, Paschalis C. Sofotasios, Kahtan Mezher, Octavia A. Dobre, Naofal Al-Dhahir. 1-7 [doi]
- Optimal Decision on Placement of an Auxiliary Aerial Wireless Base Station Using the Artificial Bee Colony AlgorithmAshraf Tahat, Talal Edwan, Dana Mbaideen, Nada Murrar, Ola Al-Qutob, Leen Ayman. 1-6 [doi]
- H.264/AVC Video Transmission over UWB AV PHY IEEE 802.15.3c using UEP and Adaptive Modulation TechniquesAsma Ben Abdallah, Amin Zribi, Ali Dziri, Fethi Tlili, Michel Terré. 1-6 [doi]
- PAPR Reduction in MIMO-OFDM Based on Polar Codes and Companding TechniqueBrahim Bakkas, Idriss Chana, Hussain Ben-Azza. 1-6 [doi]
- Smart Sensor Node of WSNs for River Water Pollution Monitoring SystemEvizal Abdul Kadir, Apri Siswanto, Sri Listia Rosa, Abdul Syukur, Hitoshi Irie, Mahmod Othman. 1-5 [doi]
- A Meter Band Rate Mechanism to Improve the Native QoS Capability of OpenFlow and OpenDaylightMohamed Saleh Al Breiki, Suiping Zhou, Yuan Roger Luo. 1-6 [doi]
- Automated Trust Negotiation for Cloud Applications in Identity-as-a-ServiceTri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann, Steven Furnell. 1-8 [doi]
- Physical-Layer Security over Generalized SIMO Multipath Fading ChannelsJules Merlin Mouatcho Moualeu, Paschalis C. Sofotasios, Daniel B. da Costa, Walaa Hamouda, Ugo Silva Dias, Sami Muhaidat. 1-6 [doi]
- BER Analysis in Relay-Based DF Cooperative Diversity Systems Over Rayleigh Fading Channels with Non-Identical Interferers Near the DestinationMamoun F. Al-Mistarihi, Rami Mohaisen, Khalid A. Darabkh. 1-5 [doi]
- Improve R2L Attack Detection Using Trimmed PCAElkhadir Zyad, Archi Taha, Benattou Mohammed. 1-5 [doi]
- Performance Analysis of a Smart Street Lighting Application Using LoRa WanYaye Sarr, Bamba Gueye, Cheikh Sarr. 1-6 [doi]
- On the Secrecy Analysis of Dual-Hop Underlay Multi-Source CRNs with Multi-Eavesdroppers and a Multi-Antenna DestinationMounia Bouabdellah, Faissal El Bouanani, Daniel Benevides da Costa, Paschalis C. Sofotasios, Hussain Ben-Azza, Kahtan Mezher, Sami Muhaidat. 1-7 [doi]
- Physical Layer Security of an Amplify-and-Forward Energy Harvesting-Based Mixed RF/UOW SystemElmehdi Illi, Faissal El Bouanani, Fouad Ayoub. 1-8 [doi]
- Towards a distributed token based payment system using blockchain technologyMouad Zouina, Benaceur Outtai. 1-10 [doi]
- Towards a Clustering-Based Approach to Speed up IaaS Service Discovery ProcessDriss Riane, Ahmed Ettalbi. 1-5 [doi]
- Software Defined Networking for Energy Efficient Wireless Sensor NetworkMohamed Saad Azizi, Moulay Lahcen Hasnaoui. 1-7 [doi]
- Routing-Plan duplicator: A reliable assistant for safe and seamless migration toward SDNMadjed Bencheikh Lehocine, Salim Djaaboub, Mohamed Batouche. 1-10 [doi]
- Secure 2D Image Steganography Using Recamán's SequenceSara Farrag, Wassim Alexan. 1-6 [doi]
- Packet Scheduling in 4G and Beyond Networks Using Cross-Layer Design ApproachWisani Salani, Gbolahan Aiyetoro, Fambirai Takawira. 1-6 [doi]
- On the Physical Layer Security of a Regenerative Relay-Based mixed RF/UOWCElmehdi Illi, Faissal El Bouanani, Daniel Benevides da Costa, Paschalis C. Sofotasios, Fouad Ayoub, Kahtan Mezher, Sami Muhaidat. 1-7 [doi]
- Double-Layer Image Security Scheme with Aggregated Mathematical SequencesMarwa Tarek Elkandoz, Wassim Alexan, Hisham H. Hussein. 1-7 [doi]
- Network Traffic Monitoring and Analysis Using Packet SnifferApri Siswanto, Abdul Syukur, Evizal Abdul Kadir, Suratin. 1-4 [doi]
- Analysis of Identity Management Systems Using Blockchain TechnologySamia El Haddouti, Mohamed Dâfir Ech-Cherif El Kettani. 1-7 [doi]
- An Importance Sampling Method for Monte-Carlo Integration Model for Ultraviolet CommunicationRenzhi Yuan, Jianshe Ma, Ping Su, Yuhan Dong, Julian Cheng. 1-6 [doi]
- A High Capacity Geometrical Domain Based 3D Image Steganography SchemeSara Farrag, Wassim Alexan. 1-7 [doi]
- Modulation Schemes for Visible Light CommunicationsAmna Aliaberi, Paschalis C. Sofotasios, Sami Muhaidat. 1-10 [doi]
- Achievable Fixed Rate Capacity in Emerging Wireless Systems (Invited Paper)Paschalis C. Sofotasios, Seong Ki Yoo, Sami Muhaidat, Simon L. Cotton, F. Javier López-Martónez, Juan M. Romero-Jerez, Kahtan Mezher, George K. Karagiannidis. 1-9 [doi]
- MPBRP- Mobility Prediction Based Routing Protocol in VANETsMao Ye, Lin Guan, Mohammed Quddus. 1-7 [doi]
- Receiver Design for Dual-Mode Index Modulation Aided OFDMYusuf Acar, Sultan Aldirmaz Çolak. 1-5 [doi]
- Achievable Ergodic Capacity Under F Composite Fading ConditionsPaschalis C. Sofotasios, Seong Ki Yoo, Simon L. Cotton, Sami Muhaidat, F. Javier López-Martínez, Juan M. Romero-Jerez, Kahtan Mezher, George K. Karagiannidis. 1-6 [doi]
- Maximal Codes for Finite Chain RingsMohammed Sabiri. 1-5 [doi]
- An Improved Multi-Objective Finite Control Set Model Predictive Control for Grid Connected Three-Level Neutral-Point Clamped InverterAbdiddaim Katkout, Ahmed Essadki, Tamou Nasser. 1-6 [doi]
- An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated networkZhuo Yi, Xuehui Du, Ying Liao, Xin Lu. 1-9 [doi]
- Substitution Box Design Based on Chaotic Maps and Cuckoo Search AlgorithmTanveer Akhtar, Nizamud Din, Jamal Uddin. 1-7 [doi]
- Triple-Layer Image Security Using a Zigzag Embedding PatternSara Farrag, Wassim Alexan, Hisham H. Hussein. 1-8 [doi]