Abstract is missing.
- Distance Monitoring System with ESP8266 for Industrial Automation MachinesIa Mosashvili, Salome Oniani. 1-5 [doi]
- Low Power LoRaWAN Node Based on FRAM MicrocontrollerMarcel Meli, Claudio Furter, Konstantinos Karakostas, Charalampos S. Kouzinopoulos, Dimitrios Tzovaras. 1-6 [doi]
- An Approach for Managing Availability in Software Defined Network InfrastructureYuri Monakhov, Anna P. Kuznetsova, Denis Mamaev. 1-6 [doi]
- Investigation of Hybrid Beamforming in mmWave Massive MIMO SystemsDimitriya Angelova Mihaylova, Zlatka Valkova-Jarvis, Vladimir Poulkov, Viktor Stoynov, Georgi Iliev. 1-5 [doi]
- Remote Sensing Approaches for Deforestation Identification in UkraineLeonid Shumilo, Bohdan Yailymov, Mykola Lavreniuk, Yuliia Bilokonska. 1-4 [doi]
- Software System for Physical Activity Monitoring: Smart Watch CaseYaroslav Krainyk, Yevhen Darnapuk, Irina Simakova. 1-4 [doi]
- Normalization Techniques Comparison for QoS-based Web Services Selection by LSP MethodRavil Kudermetov, Olga Polska, Vadym Shkarupylo, Natalia Shcherbak. 1-4 [doi]
- Automatic Anomaly Detection Methodology for Crop Classification Data Using Morphological FeaturesLeonid Shumilo. 1-5 [doi]
- Clustering Analysis for Big Data in Network Security Domain Using a Spark-Based MethodHui Xu, Wei Zhang, Man Gao, Hongwei Chen. 1-4 [doi]
- Collaborative Business Model Structures for Wireless Ambient Assisted Living SystemsJelena Bleja, Dominik Wiewelhove, Uwe Grossmann, Elisabetta Mörz. 1-5 [doi]
- Low Light Energy Autonomous LoRaWAN NodeMarcel Meli, Manuel Brütsch, Stefan Stajic, Manuel Böbel, David Lorenz, Lukas Hegetschweiler, Dimitris Karanassos, Charalampos S. Kouzinopoulos. 1-6 [doi]
- Remote Monitoring of Electrical Equipment for Smart House System Safe ExploitationArseniy Arhipov, Artem Tulenkov, Anzhelika Parkhomenko, Yaroslav Zalyubovskiy, Andriy Parkhomenko. 1-6 [doi]
- Method of Reliable Data Storage Based on Redundant Residue Number SystemVasyl Yatskiv, Serhii Kulyna, Pavlo Bykovyy, Taras Maksymyuk, Anatoliy Sachenko. 1-4 [doi]
- Detecting Low-Level Attacks on Wireless OT NetworksDaniel Mahrenholz, Georg Lukas, Julius Paffrath, Kai-Oliver Detken. 1-6 [doi]
- Cost-Effective Indoor Positioning Using IoT SolutionsGalina Shilo, Denys Romaniuk, Andrii Pysarskyi, Anastasiia Lebedieva-Dychko. 1-5 [doi]
- Development of Methods for Improving Crypto Transformations in the Block-Symmetric CodeRoman Kochan, Serhii Yevseiev, Roman Korolyov, Stanislav Milevskyi, Imad Ireifidzh, Tomasz Gancarczyk, Rafal Szklarczyk. 1-9 [doi]
- Subtask Prioritization on Workflow Execution in Distributed Wireless Computer System With Network-Centric Approach to Resource ControlVadym Mukhin, Yaroslav Kornaga, Mikhail Tkach, Oksana Herasymenko, Yuriy Bazaka, Oleg Mukhin. 1-5 [doi]
- The Influence of Antenna Installation Accuracy on Quality of Signal ReceptionMykhaylo Palamar, Andrii Chaikovskyi, Myroslava Yavorska, Vira Pasternak, Serhiy Shevchuk. 1-5 [doi]
- Adaptive Radar System Configuration TuningAndrii Cheredarchuk, Galyna Kriukova, Andrii Malenko, Maksym Sarana, Oleksandr O. Sudakov, Sergii Vodopyan, Yevhenii Volynets. 1-6 [doi]
- RETIS - Real-Time Sensitive Wireless Communication Solution for Industrial Control ApplicationsRoman Cecil, Vlastimil Setka, David M. Tolar, Axel Sikora. 1-9 [doi]
- Design Approach of Wideband Steerable Antenna Array Fed by optimized 4x4 Butler MatrixNadia Chater, Tomader Mazri, Mohamed Benbrahim. 1-5 [doi]
- Improving the Productivity of Distributed Computer Systems Through the Use of Knowledge EngineeringNataliia Kulykovska, Ravil Kudermetov. 1-4 [doi]
- Adaptation of Smart House System for People with Special Needs Based on Wireless TechnologiesArtem Tulenkov, Yevhenii Yaremchenko, Anzhelika Parkhomenko, Yaroslav Zalyubovskiy, Andriy Parkhomenko, Marina Kalinina. 1-6 [doi]
- Secure Wireless Architecture for Communications in a Parcel Delivery SystemSaeed Abdolinezhad, Manuel Schappacher, Axel Sikora. 1-6 [doi]
- Performance Effective Task Scheduling With Duplication - PETSDShankar Lokeshwara, Naveen Chengappa Chandura Poovaiah, Shambhavi Kolte, Lukas Krawczyk. 1-5 [doi]
- The Phase-Frequency Response Influence on the Tunable Frequency-Dependent Component CoefficientsHanna Ukhina, Ivan Afanasyev, Valerii Sytnikov, Oleg Streltsov, Pavel Stupen. 1-5 [doi]
- Container Filling Level Estimation using Vibration Resonance BehaviorSteffen Schmelter, Claus Fühner, Christof Röhrig. 1-6 [doi]
- Applying Extension Semantic Web to Event Representation for Software-Defined NetworkingHui Xu, Hongwei Chen, Wei Liu, Qianyun Li. 1-4 [doi]
- Secure Information- and Energy-efficient Wireless Networks With Packet Transmission CreationBohdan Shevchuk, Orest Ivakhiv, Yuriy Brayko, Mykhaylo Geraimchuk. 1-7 [doi]
- Integration of Information Models for Industrial Intemet Based on ExtenicsHui Xu, Qianyun Li, Jun Su, Lingyu Yan. 1-6 [doi]
- Sliding-Window Approach for Improving Response Time of Mission-Critical ApplicationsJaime Burbano, Aly Sakr, Rolf Schuster. 1-7 [doi]
- QoS-Aware Score-Based Edge Resource Allocation ModelAly Sakr, Seenu Mohiyadeen, Bheeshmaraya Vruksharaj, Rolf Schuster. 1-7 [doi]
- Losses Assessment for Winter Crops Based on Satellite Data and Fuzzy LogicYuliia Bilokonska, Hanna Yailymova, Bohdan Yailymov, Andrii Shelestov, Leonid Shumilo, Mykola Lavreniuk. 1-5 [doi]
- Using a COTS Smartphone to Control an Autonomous Self-Driving PlatformPhilipp Köhler, Niklas Röske, Steffen Schmelter, Claus Fühner. 1-5 [doi]
- Interference Investigation of Wireless ISM Band Devices in Rescue HelicoptersJanusz Wituski, Guido Dietl. 1-6 [doi]
- Algebraic Modelling of Logistical Systems Equipped by Wireless Monitoring DevicesOleksandr A. Letychevskyi, Serhii Horbatiuk, Viktor Horbatiuk. 1-6 [doi]
- HRPL Protocol for 6LoWPAN Smart Home System: A Performance Assessment AnalysisNin Hayati Mohd Yusoff, Nurul Azma Zakaria, Axel Sikora, E. Jubin Sebastian. 1-5 [doi]
- An Improved XGBoost Model Based on Spark for Credit Card Fraud PredictionHongwei Chen, He Ai, Zhihui Yang, Weiwei Yang, Zhiwei Ye, Dawei Dong. 1-6 [doi]
- Image Classification Based on Principal Component Analysis optimized Generative Adversarial NetworksChunzhi Wang, Pan Wu, Jia-Run Fu, Yan Zhou, Jiwei Hu, Lingyu Yan. 1-4 [doi]
- Development of Intrusion Monitoring System in Wireless Sensor Networks Based on Neural NetworksOlexander Belej, Mikolaj Karpinski, Aigul Shaikhanova, Olga Veselska, Azamat Azatov. 1-6 [doi]
- Configuration of Wireless TSN NetworksKofi Atta Nsiah, Kamil Alkhouri, Axel Sikora. 1-5 [doi]
- An optimization Algorithm for the Same Primary and Backup Routing of Label Switching Path Based on KSP in PTNZaoning Wang, Ming Wei, Xing Li, Chunzhi Wang. 1-5 [doi]
- A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural BasisVladimir Barannik, Daniel Jancarczyk, Yurii Babenko, Oleg Stepanko, Joanna Nikodem, Stanislaw Zawislak. 1-5 [doi]
- A Scenario for a Multi-UAV Mapping and Surveillance System in Emergency Response ApplicationsMerlin Stampa, Andreas Sutorma, Uwe Jahn, Felix Willich, Sylvia Pratzler-Wanczura, Jörg Thiem, Christof Röhrig, Carsten Wolff. 1-6 [doi]
- Accuracy Improvements of Identification and Authentication of Devices by EM-MeasurementsAxel Sikora, Elena Nyemkova, Yuriy Lakh. 1-5 [doi]
- NCC Wireless Networks: Reed-Solomon Channel Coding and Outage ProbabilityElias Benamira, Fatiha Merazka, Günes Karabulut-Kurt. 1-4 [doi]
- A secure algorithm for Random Linear Network CodingMohamed Amine Brahimi, Fatiha Merazka. 1-4 [doi]
- Multispectral Control of Ecotoxicity of Waters Using Duckweed (Lemna Minor)Roman Kochan, Volodymyr Pohrebennyk, Serhii Kvaterniuk, Roman Petruk, Olena Kvaterniuk, Marcin Bernas, Rafal Szklarczyk, Ruslana Ziubina. 1-5 [doi]
- Two-Operand Operations of Strict Stable Cryptographic Coding with Different Operands' BitsDaniel Jancarczyk, Volodymyr Rudnytskyi, Roksolana Breus, Mykhailo Pustovit, Olga Veselska, Ruslana Ziubina. 1-8 [doi]
- Embedded Models Realization Platform in IoTOleksandr Khropatyi, Oleh Lohinov, Volodymyr Kazymyr. 1-6 [doi]
- An Improved K-means Clustering AlgorithmHui Xu, Shunyu Yao, Qianyun Li, Zhiwei Ye. 1-5 [doi]
- Timing Analysis of Car-to-Car Communication Systems Using Real-Time Calculus: A Case StudyMahmoud Bazzal, Lukas Krawczyk, Ram Prasath Govindarajan, Carsten Wolff. 1-8 [doi]
- Method of Generating Random Numbers by the Group of Quantum Generators of Random Numbers in the Synchronization ModeOleksii Nariezhnii, Daniel Jancarczyk, Ivan Gorbenko, Tetiana Grinenko, Vasyl P. Martsenyuk. 1-6 [doi]
- A Wideband Circularly Polarized Linear Parasitic Dielectric Resonators Antenna Array for 5G ApplicationsShahid Khan 0001, Mohsen Khalily, Anwar Ali, Haider Ali 0006, Camel Tanougast. 1-5 [doi]
- Heatmaps for Catering Establishments Web-Applications Available via MAS-Improved Wireless NetworksIryna Zhuravska, Kateryna Obukhova, Ivan Burlachenko, Volodymyr Savinov, Anzhela P. Boiko. 1-6 [doi]
- Evaluation of Information Security Software Using Quality and Reliability CriteriaMikolaj Karpinski, Ruslana Ziubina, Azamat Azatov, Aigul Shaikhanova, Valentyna Teliushchenko, Pawel Falat. 1-5 [doi]
- WSN IoT Ambient Environmental Monitoring SystemOscar Bautista Gonzalez, José Chilo. 1-4 [doi]
- Improving the Accuracy for Radio-Based Positioning in Mines Using SLAMDmitry I. Larionov, Oleg V. Lukashenko, Alex Moschevikin, Roman Voronov, Axel Sikora. 1-7 [doi]