Abstract is missing.
- Virtual and physical parallelism environments evaluationMustapha M. Baua'a, Jehan K. Shareef, Aqeel M. Hamad. 1-5 [doi]
- Population-based guided local search for multidimensional Knapsack problemNasser Tairan, Abdulmohsen Algarni, Justin Varghese, Muhammad Asif Jan. 1-5 [doi]
- Current communication technologies in language processingJolanta Mizera-Pietraszko. 1-6 [doi]
- Current communication technologies in language processingJolanta Mizera-Pietraszko. 1-6 [doi]
- Data exchange protocol for healthcare service in ThailandRuedeemart Jessadapattharakul, Santitham Prom-on, Chularat Tanprasert, Tiranee Achalakul. 1-6 [doi]
- A hybrid approach to combat email-based cyberstalkingZinnar Ghasem, Ingo Frommholz, Carsten Maple. 1-6 [doi]
- Towards fault diagnosis based on agent technology for wireless sensor networksÁlvaro Carrera, Carlos Angel Iglesias. 1-6 [doi]
- Smart irrigation using internet of thingsBenahmed Khelifa, Douli Amel, Bouzekri Amel, Chabane Mohamed, Benahmed Tarek. 1-6 [doi]
- Network coding for reliable safety message communication in vehicular Ad-Hoc networks: a reviewShehu Jabaka Muhammad, Sijing Zhang, Vladimir Dyo. 1-6 [doi]
- Relay self-interference minimisation for QAM signalsSaleh O. Al-Jazzar, Sami Aldalahmeh. 1-4 [doi]
- Fast fourier transform for feature extraction and neural network for classification of electrocardiogram signalsMartina Mironovova, Jirí Bíla. 1-6 [doi]
- Last mile cable route optimization using openstreetmap data - an experimentMarkus Prossegger. 1-5 [doi]
- Deriving the first and the second moments of the normalized timing error of first order early-late tracking loops using linear analysis and real time simulation for wireless receivers moving away linearly from the transmitterSaqer Alhloul, Thomas Walsh. 1-6 [doi]
- The convoluted multiaddress networking architecture principles and applicationVladimir Krylov, Kirill Kravtsov. 1-6 [doi]
- A secure role-based service discovery technique for emergency intervention operationsMohamed Adel Serhani, Ezedin E. Barka, Yasser Gadallah. 1-6 [doi]
- Arrhythmia disease classification using a higher-order neural unitRicardo Rodriguez, Osslan O. Vergara Villegas, Vianey G. Cruz Sanchez, Jiri Bila, Adriana Mexicano. 1-6 [doi]
- A simple yet effective approach for resource allocation in outband device-to-device communicationYao-Liang Chung, Jin-An Wu. 1-3 [doi]
- Debunking the designs of contemporary nature-inspired computing algorithms: from moving particles to roaming elephantsSimon Fong, Raymond K. Wong, Pit Pichappan. 1-11 [doi]
- Smart phones and health monitoringPinar Kirci, Gökhan Kurt. 1-4 [doi]
- System level simulation and radio resource management for distributed antenna systems with cognitive radio and multi-cell cooperationRamiro Samano-Robles, Atílio Gameiro, Nuno Pereira. 1-6 [doi]
- Data mining approach to situation-aware sensor actuation in wireless sensor networksJong P. Yoon, Juan Ortiz. 1-6 [doi]
- Estimation of collision probability in a saturated vehicular Ad-Hoc networksElias Chinedum Eze, Sijing Zhang, Enjie Liu. 1-7 [doi]
- Network optimization for integration of WiFi and WiMAXJuwita Mohd Sultan, Garik Markarian. 1-6 [doi]
- Energy-spectral efficiency trade-off in coordinated multicell OFDMA systemsMurtadha Al-Saedy, Hamed Al-Raweshidy. 1-5 [doi]
- Fast antenna selection algorithm for multiuser MIMO systems under block diagonalizationMohammed Al-Shuraifi, Hamed Al-Raweshidy. 1-5 [doi]
- Performance comparison of top N recommendation algorithmsGhulam Mustafa, Ingo Frommholz. 1-6 [doi]
- A conceptual model for IT governance in public sectorsLeena Janahi, Marie Griffiths, Hesham Al-Ammal. 1-9 [doi]
- Managing CSCW's users in scripting languageZainura Idrus, Siti Z. Z. Abidin, N. Omar. 1-6 [doi]