Abstract is missing.
- Detection of bowler's strong and weak area in cricket through commentarySubhan Arif, Muhammad Umair, Syed Muhammad Kumail Naqvi, Ahmad Ikram, Anam Ikram. [doi]
- "Hop count" dynamic double trickle timer algorithm use case: data aggregation in smart green houseHaneen Shehadeh, Wail Mardini, Muneer O. Bani Yassein, Doaa Habeeb Allah, Waed Bani Yaseen. [doi]
- Analysis of social network for telecommunication companiesAktham Sawan, Rashid Jayousi. [doi]
- CryptDBaaS: query over encrypted DBaaS without third-partyFadi Draidi, Mohammad Hmedat, Barakat Abwe, Amr Atrash. [doi]
- A comprehensive study of cyber attacks & counter measures for web systemsAbid Jamil, Kashif Asif, Rehan Ashraf, Sheraz Mehmood, Ghulam Mustafa. [doi]
- Violent material detection systemKhurram Shahzad, Abdul Moiz, Usman Ahmed, Syed Jawad Hussain, Khalid Hussain, Ahthasham Sajid. [doi]
- Rank based binary particle swarm optimisation for feature selection in classificationMajdi Mafarja, Nasser R. Sabar. [doi]
- A distributed security protocol designed for the context of internet of thingsAbdelkader Laouid, Muath AlShaikh, Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Madani Bezoui, Habib Aissaoua, Abdelkamel Tari. [doi]
- The users experience quality of responsive web design on multiple devicesAsad Jameel, Khurram Shahzad, Afia Zafar, Usman Ahmed, Syed Jawad Hussain, Ahthasham Sajid. [doi]
- Web technologies used for virtual classroomAttia Nafees Ul Haq, Khurram Shahzad, Usman Ahmed, Syed Jawad Hussain, Ahthasham Sajid. [doi]
- Advances in PAPR reduction for OFDM systems with machine learningKelvin O. O. Anoh. [doi]
- Integrating smart city applications in 5G networksMuhammad Usman 0003, Muhammad Rizwan Asghar, Fabrizio Granelli, Khalid A. Qaraqe. [doi]
- IoT standardisation: challenges, perspectives and solutionJibran Saleem, Mohammad Hammoudeh, Umar Raza, Bamidele Adebisi, Ruth Ande. [doi]
- Detecting gaps and voids in WSNs and IoT networks: the minimum x-coordinate based methodAhcène Bounceur, Madani Bezoui, Loïc Lagadec, Reinhardt Euler, Abdelkader Laouid, Mahamadou Traore, Mounir Lallali. [doi]
- Unconsciousness detection supervision system using faster RCNN architectureWafaa M. Salih Abedi. [doi]
- Clustering algorithm for AODV routing protocol based on artificial bee colony in MANETAmjad Rattrout, Adwan Yasin, Mahmoud Abu-Zant, Mariam Yasin, Mohammed Dwaikat. [doi]
- Utilizing feature selection techniques in intrusion detection system for internet of thingsShatha H. Jafier. [doi]
- Quicker re-allocation of regions in opensimulator frameworkUmar Farooq, Ihsan Rabbi, Kashif Zia, Syeda Zohra Israr, Muneeba Shereen. [doi]
- Organizational management role in information security management systemAbdallah Qusef, Mais Arafat, Samar Al-Taher. [doi]
- Deployment of reliable, simple, and cost-effective medium access control protocols for multi-layer flying ad-hoc networksMuhammad Asghar Khan, Inam Ullah Khan, Ijaz Mansoor Qureshi, Muhammad Kashif Alam, Syed Bilal Hussain Shah, Muhammad Shafiq. [doi]
- Optimisation of the public key encryption infrastructure for the internet of thingsDaniel Kelly, Mohammad Hammoudeh. [doi]
- Real-time RDF adaptation model for smart human-care querying in IoT based mobile applicationsSohail Jabbar, Kaleem Razzaq Malik, Mudassar Ahmad. [doi]
- Virtual microgrids: a management concept for peer-to-peer energy tradingKelvin O. O. Anoh, Augustine Ikpehai, Dragana Bajovic, Olamide Jogunola, Bamidele Adebisi, Dejan Vukobratovic, Mohammad Hammoudeh. [doi]
- Detecting gaps and voids in WSNs and IoT networks: the angle-based methodMadani Bezoui, Ahcène Bounceur, Loïc Lagadec, Reinhardt Euler, Mohammad Hammoudeh, Abdelkader Laouid, Abdelkamel Tari. [doi]
- Information security management system challenges within a cloud computing environmentMais Arafat. [doi]
- A lightweight only receiver clock synchronization technique for wireless sensor networksHabib Aissaoua, Makhlouf Aliouat, Ahcène Bounceur, Reinhardt Euler, Abdelkader Laouid, Farid Lalem, Abdelkamel Tari. [doi]
- An efficient privacy preserving cryptographic approach in cloud computingJayashree Agarkhed, Ashalatha. R, Siddarama R. Patil. [doi]
- Discrete time markov chain model for analyzing characteristics of RACH procedure under massive machine type communicationsEkaterina G. Medvedeva, Elvira R. Zaripova, Irina Gudkova, Oksana Semenova, Anastasiya Vlaskina, Yuliya Gaidamaka. [doi]
- A study of current trends in the design of processors for the internet of thingsM. Tariq Banday. [doi]
- Li-local: green communication modulations for indoor localizationMuhammad Irshad, Wenyuan Liu, Lin Wang, Syed Bilal Hussian Shah, Muhammad Noman Sohail, Muhammad Musa Uba. [doi]
- A survey on IoT contribution in smart goods ordering cycle: Amazon buttonsDuha Shubair, Imtiaz Ahmed, Maytham Safar. [doi]
- A new mechanism for textual password hardening using adopted typing rhythmKhalid Mansour. [doi]
- Design of an IoT based warfare car robot using sensor network connectivityLaiqa Binte Imran, Muhammad Farhan, Rana M. Amir Latif, Ahsan Rafiq. [doi]
- Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threatIbrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Francisco J. Aparicio-Navarro, Khaled M. Rabie, Ahmad Jabban. [doi]
- Ant colony based optimization technique to mitigate dynamic routing challenges in packet based networksInam Ullah Khan, Ijaz Mansoor Qureshi, Muhammad Asghar Khan, Syed Bilal Hussain Shah, Imran Shafique Ansari, Muhammad Hamza Akhlaq. [doi]
- Wimax technology for maritime intelligent transport systems communicationAyoub Bahnasse, Abdelmajid Badri, Mohamed Talea, Fatima Ezzahraa Louhab, Adel Al-Harbi, Azeddine Khiat, Said Broumi. [doi]
- Market segmentation and analysis of online shopping in Jordan and the regionGeorge Sammour, Lina Sharawi. [doi]
- Training neural networks using Salp Swarm Algorithm for pattern classificationAhmed A. Abusnaina, Sobhi Ahmad, Radi Jarrar, Majdi Mafarja. [doi]
- IoT system to control greenhouse agriculture based on the needs of Palestinian farmersWaleed Abdallah, Mohamad Khdair, Mosab Ayyash, Issa Asad. [doi]
- An adaptive and efficient fully homomorphic encryption techniqueMohammed Amine Yagoub, Abdelkader Laouid, Okba Kazar, Ahcène Bounceur, Reinhardt Euler, Muath AlShaikh. [doi]
- Enhanced routing algorithm based on depth traversal in software defined wireless sensor networksAmr Abu Abdo, Raffi Al-Qurran, Wail Mardini. [doi]
- Key solutions for light limitations: toward tactile internet system realizationAbdelhamied A. Ateya, Anastasia Vybornova, Ammar Muthanna, Ekaterina V. Markova, Irina Gudkova, Alexander Gogol, Andrey Koucheryavy. [doi]
- An adaptive opportunistic routing scheme for reliable data delivery in WSNsMalik Hasnain, Mazhar Hussain Malik, Mehmet Emin Aydin. [doi]
- Multipath routing in a 3D torus network on chipKhaled Day, Nasser Alzeidi, Abderezak Touzene. [doi]
- p for resource-constrained networksMohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia. [doi]
- Loop unrolling effect on parallel code optimizationKarim Soliman, Marwa El Shenawy, Ahmed Abou El Farag. [doi]
- SDN multi-controller networks with load balancedAmmar Muthanna, Abdelhamied A. Ateya, Maria Makolkina, Anastasia Vybornova, Ekaterina V. Markova, Alexander Gogol, Andrey Koucheryavy. [doi]
- Transactive energy systems: what has communications got to do with it?Bamidele Adebisi. [doi]
- Feature selection using binary particle swarm optimization with time varying inertia weight strategiesMajdi Mafarja, Radi Jarrar, Sobhi Ahmad, Ahmed A. Abusnaina. [doi]
- Malware detection using DNS records and domain name featuresKhulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, Fatna Belqasmi. [doi]
- Graphical authentication based on anti-shoulder surfing mechanismGoh Wen Bin, Sohail Safdar, Rehan Akbar, Suresh Subramanian. [doi]
- Scheduling techniques for complex workloads in distributed systemsGeorgios L. Stavrinides, Helen D. Karatza. [doi]
- Evaluating health information apps on real life smart phone useReda Shaheen, Safina Kanwal, Rimsha Iftikhar, Muhammad Rehman shahid. [doi]
- Parallel genetic algorithm with elite and diverse cores for solving the minimum connected dominating set problem in wireless networks topology controlAbdel-Rahman Hedar, Gamal A. El-Sayed. [doi]
- Depth based routing protocol using smart clustered sensor nodes in underwater WSNSyed Bilal Hussain Shah, Zhe Chen 0005, Syed Hassan Ahmed, Fuliang Yin, Muhammad Faheem, Seema Begum. [doi]
- A review of data security and cryptographic techniques in IoT based devicesGhulam Mustafa, Rehan Ashraf, Muhammad Ayzed Mirza, Abid Jamil, Muhammad. [doi]
- Low-energy smart trash bin architecture for dynamic waste collection systemSlamet Kristanto Tirto Utomo, Takeo Hamada, Noboru Koshizuka. [doi]
- IoT-fog based system structure with SDN enabledAbdukodir Khakimov, Abdelhamied A. Ateya, Ammar Muthanna, Irina Gudkova, Ekaterina V. Markova, Andrey Koucheryavy. [doi]
- An IoT based monitoring and controlling system for water chlorination treatmentNael Zidan, Mohammed Maree, Subhi Samhan. [doi]
- Contemporary alternatives to traditional processor design in the post Moore's law eraAndy Kuszyk, Mohammad Hammoudeh. [doi]
- LPBR: location prediction based routing protocol for mobile IoT systemsHamza Aldabbas. [doi]
- DDoS attacks on the internet of things and their prevention methodsHanan Mustapha, Ahmed M. Alghamdi. [doi]
- Social vehicle-to-everything (V2X) communication model for intelligent transportation systems based on 5G scenarioNaeem Raza, Sohail Jabbar, Jihun Han, Kijun Han. [doi]
- A traffic tracking algorithm for a fast detection of active network sourcesAyah Atiyah, Sufyan Almajali. [doi]
- Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcareMohammed Al-Khafajiy, Lee Webster, Thar Baker, Atif Waraich. [doi]
- Comparative analysis of routing protocols for under-water wireless sensor networksHala Jodeh, Aisha Mikkawi, Ahmed Awad, Othman Othman. [doi]
- KNN-fuzzy classification for cloud service selectionHumaira Nadeem, Imran Mujaddid Rabbani, Muhammad Aslam, Ana María Martínez Enríquez. [doi]
- Embedded key cryptosystem for cloud computing applicationsShadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy. [doi]
- Detection and prevention of malicious cryptocurrency mining on internet-connected devicesAbedAlqader Swedan, Ahmad N. Khuffash, Othman Othman, Ahmed Awad. [doi]