Abstract is missing.
- A Synthesis Technique for Concentric Rings Array Using Sectional ExcitationSalman Behboudi Amlashi. 1-5 [doi]
- Cross-Layer Multipath Multichannel MAC protocol for MANETsNawaf S. Mirza, Hamish Taylor, Mohamed A. Abdelshafy, Peter J. B. King, Imed Romdhani, Atif A. Alghamdi. 1-8 [doi]
- A Cluster-Based Mobile Data-Gathering Scheme for Underwater Sensor NetworksSeyed Mohammad Ghoreyshi, Alireza Shahrabi, Tuleen Boutaleb. 1-6 [doi]
- Need of Time-domain Pre-processing of Impulse Noises for PLC/xDSL SystemsNeelima Singh, Brejesh Lall. 1-6 [doi]
- Generalized Memory-Assisted Adaptive-Threshold Detection Scheme for On-OFF-Keying Diffusion-Based Molecular CommunicationsGhalib H. Alshammri, Walid K. M. Ahmed, Victor B. Lawrence. 1-7 [doi]
- Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring SystemsMouna Rekik 0002, Christophe Gransart, Marion Berbineau. 1-6 [doi]
- An Efficient Jamming Rejection Scheme of FH-Based Adaptive Beamforming System for High-Mobility Communication LinksQi Zeng, Jun-zhong, Xianhua Niu. 1-6 [doi]
- Proposal of Multi-Pathization Method of UDP with SDN for NFSKaori Iwata, Yoshihiro Ito. 1-5 [doi]
- An Analysis of the Energy Consumption of LPWA-based IoT DevicesJoseph Finnegan, Stephen Brown. 1-6 [doi]
- Latency Guarantee for Multimedia Streaming Service to Moving Subscriber with 5G SlicingLijun Dong, Renwei Li. 1-7 [doi]
- An Enhanced Architecture for Serial Fusion based Multi-biometric Verification SystemMd Shafaeat Hossain, Jundong Chen, Khandaker Rahman. 1-6 [doi]
- Perfomance Analysis of the Loop-Shaped Plasma Antenna Under Different Pressure ConditionsSamineh Sarbazi Golazari, Mohsen Khalily, Fariborz Entezami, Pei Xiao. 1-4 [doi]
- Communities' Detection in Social Networks: State of the art and perspectivesRachid Djerbi, Rabah Imache, Mourad Amad. 1-6 [doi]
- Small Size, High Power Density, Solid State Amplifiers for Space ApplicationDavide Passi, Alberto Leggieri, Alessio Mattioni, Franco Di Paolo, Maurizio D'Antoni, Marco Bartocci, Egidio Ciacia, Antonio Tafuto. 1-5 [doi]
- Development of a suite of IPv6 vulnerability scanning tests using the TTCN-3 languageAdriano Galindo Leal, Igor Cunha Teixeira. 1-6 [doi]
- An Experimental Study towards Examining Human Body Movements in Indoor Wave Propagation at 18-22 GHzAhmed Alabish, Ali Kara, Yaser Dalveren. 1-4 [doi]
- Joint Spectrum Allocation and Power Control for Cognitive Radio Networks Based on Potential GameXi Yu, Weilian Xue. 1-8 [doi]
- Discovering True Kids Mobile BehaviorMassimo Marchiori. 1-8 [doi]
- Interference and Link Budget Analysis in Integrated Satellite and Terrestrial Mobile SystemRan Bi, Mingchuan Yang, Gang Wang. 1-6 [doi]
- Joint Beamforming Design and BBU Computational Resources Allocation in Heterogeneous C-RAN with QoS GuaranteeMostafa M. Abdelhakam, Mahmoud M. Elmesalawy. 1-6 [doi]
- Millimeter-wave System for the Detection of Cracks using Weiner Filter-based Layered Synthetic Aperture Radar (WL-SAR) TechniqueV. Natarajan, M. F. Karim, L. C. Ong, A. Alphones. 1-4 [doi]
- Enhancing 802.11ac Dynamic Access method for Increasing the Throughput of Low Priority Access Categories BK and BESouhila Mammeri, Mohand Yazid, Louiza Bouallouche-Medjkoune, Thanina Belkhir. 1-5 [doi]
- Performance of IA-MMSE Iterative Structures for SFBC Decoding in MIMO Systems Using Realistic System ParametersMarina Mondin, Fred Daneshgaran, Francesco Di Stasio. 1-6 [doi]
- A Complexity-less Approach for Automated Development of Data-intensive Web ApplicationsTommaso Panetti, Andrea D'Ambrogio. 1-6 [doi]
- Secure Mobile Software Development with Vulnerability Detectors in Static Code AnalysisXianyong Meng, Kai Qian, Dan Chia-Tien Lo, Prabir Bhattacharya, Fan Wu. 1-4 [doi]
- Modelling Botnet Propagation in Networks with Layered DefencesDilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos. 1-6 [doi]
- Security for Internet of Things: The SerIoT ProjectErol Gelenbe, Joanna Domanska, Tadeusz Czachórski, Anastasios Drosou, Dimitrios Tzovaras. 1-5 [doi]
- Quasi-Orthogonal FHMA System under Large Access Delay: Code Design and Performance AnalysisQi Zeng, Xing Liu. 1-6 [doi]
- Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical DevicesTaha Belkhouja, Amr Mohamed, Abdulla K. Al-Ali, Xiaojiang Du, Mohsen Guizani. 1-6 [doi]
- A Secure RFID Authentication Scheme for Healthcare Environments Based on Digital Signature AlgorithmMustapha Benssalah, Mustapha Djeddou, Karim Drouiche. 1-6 [doi]
- Fronthaul-aware User Association in 5G Heterogeneous Cloud Radio Access Networks: A Matching Game PerspectiveM. K. Elhattab, Mahmoud M. Elmesalawy, Tawfik Ismail. 1-6 [doi]
- Rain Intensity Estimation Using Satellite Beacon Signal Measurements A Dual Frequency StudyLászló Csurgai-Horváth, János Bitó. 1-5 [doi]
- FPGA implementation of Spectrum Sensing methods for Cognitive RadioDjamel Teguig, Mohamed S. Azzaz. 1-5 [doi]
- A Joint Filtering and Precoding Based Uplink MC-NOMAImran Baig, Umer Farooq, Najam Ul Hasan, Manaf Zghaibeh, U. Mukhtar Rana, Muhammad Imran 0001, Muhammad Ayaz. 1-4 [doi]
- Managing IoT-Based Smart Healthcare Systems Traffic with Software Defined NetworksFarag Sallabi, Faisal Naeem, Mamoun Awad, Khaled Shuaib. 1-6 [doi]
- High Frequency Dynamic Voltage Forecasting Under Reduced Wireless Sensor Network ObservabilityJohn Paul F. Cajanding, Miguel Alberto C. Mercado, Nestor Michael C. Tiglao. 1-6 [doi]
- Practical Approach of Fast-Data Architecture Applied to Alert Generation in Emergency Evacuation SystemsAndres Munoz-Arcentales, Washington Velasquez, Joaquín Salvachúa. 1-6 [doi]
- The Impact of D2D Connections on Network-Assisted Mobile Data OffloadingAhmet Serdar Tan, Engin Zeydan. 1-6 [doi]
- Policy-based QoS Management Framework for Software-Defined NetworksAhmed Al-Jawad, Purav Shah, Orhan Gemikonakli, Ramona Trestian. 1-6 [doi]
- Comparative Analysis of IoT Communication ProtocolsBurak H. Corak, Feyza Yildirim Okay, Metehan Guzel, Sahin Murt, Suat Ozdemir. 1-6 [doi]
- Lightweight IoT Group Key Establishment Scheme Using One-way AccumulatorTeklay Gebremichael, Ulf Jennehag, Mikael Gidlund. 1-7 [doi]
- Multiple Sink Placement Strategy for Underwater Wireless Sensor NetworksFaiza Al-Salti, Khaled Day, Nasser Alzeidi, Abderezak Touzene. 1-6 [doi]
- Sensory Systems for Human Body Gesture Recognition and Motion CaptureGiovanni Saggio, Giancarlo Orengo, Antonio Pallotti, Vito Errico, Mariachiara Ricci. 1-6 [doi]
- Multirate 5G Downlink Performance Comparison for f-OFDM and w-OFDM Schemes with Different NumerologiesFrancesco Di Stasio, Marina Mondin, Fred Daneshgaran. 1-6 [doi]
- Better Performance of Wireless Systems Using WPT Instead of FFT in Standard RA6 Fading ChannelsF. Khordadpour-Deylamani, Saeed Ghazi-Maghrebi. 1-6 [doi]
- TCP Wave estimation of the optimal operating point using ACK trainsA. Abdelsalam, Cesare Roseti, Francesco Zampognaro, N. Patriciello. 1-6 [doi]
- Indoor Thermal Comfort Collection of People with Physical DisabilitiesBouziane Brik, Moez Esseghir, Leïla Merghem-Boulahia, Hichem Snoussi. 1-6 [doi]
- An Effective Algorithm for Finding Common Control Channel in Cognitive Radio Ad Hoc Networks Using a Single Transceiver and a Backup ChannelHeydar Shariatzadeh, Saeed Ghazi-Maghrebi. 1-6 [doi]
- Multiple Base Stations Diversity for UNB Systems: Theoretical Analysis and PerformancesYuqi Mo, Claire Goursaud, Jean-Marie Gorce. 1-6 [doi]
- Optimal Placement of Virtual Security Functions to Minimize Energy ConsumptionSedef Demirci, Mehmet Demirci, Seref Sagiroglu. 1-6 [doi]
- Preserving Privacy in Wireless Sensor Networks using Onion RoutingAmr El-Mougy, Sandra Sameh. 1-6 [doi]
- Millimeter-Wave MIMO Balanced Antipodal Vivaldi Antenna Design for Autonomous CarsAli Araghi, Mohsen Khalily, Pei Xiao, Arash Kosari, Houman Zarrabi, Rahim Tafazolli. 1-4 [doi]
- On a Dynamic Data Placement Strategy for Heterogeneous Hadoop ClustersYang Liu, Chase Q. Wu, Meng Wang, Aiqin Hou, Yongqiang Wang. 1-7 [doi]
- IoT based Smart CitiesHusam Rajab, Tibor Cinkelr. 1-4 [doi]
- An Extension of Mobile Edge Computing Bandwidth Management APIEvelina Pencheva, Denitsa Kireva-Mihova, Ivaylo Atanasov, Ventsislav Trifonov. 1-6 [doi]
- Toward Efficient Simulation Platform for Platoon Communication in Large Scale C-ITS ScenariosAhmed Soua, Oyunchimeg Shagdar, Jean-Marc Lasgouttes. 1-6 [doi]
- Effective Features Selection and Machine Learning Classifiers for Improved Wireless Intrusion DetectionRazan Abdulhammed, Miad Faezipour, Abdelshakour A. Abuzneid, Ali Alessa. 1-6 [doi]
- Performance Evaluation of a Virtualized 5G Core Network in Indoor EnvironmentsBong-Hwan Oh, Serdar Vural, Yogaratnam Rahulan, Ning Wang 0001, Rahim Tafazolli. 1-6 [doi]
- User-Centered Design of a Service-Oriented Application to Help People with Memory LimitationsCristian Cuerda-Gonzalez, José A. Gallud, Daniyal M. Alghazzawi. 1-6 [doi]
- Hierarchical Cloud Communication for Supply Management and Power Distribution via Wireless Mesh Network into the Smart GridJihene Rezgui, Wiem Benrhaiem. 1-6 [doi]
- Analysis and Experimental Characterization of Channel Congestion Control in Vehicular NetworksElena Cinque, Francesco Valentini, Marco Pratesi, Sandro Chiocchio, Arianna Persia. 1-4 [doi]
- Softwarization of Network Coding Functions and Logical Mapping to SDNM. A. Vazquez-Castro, Luis Miguel Contreras Murillo. 1-6 [doi]
- Search Algorithms for Distributed Data Structures in P2P NetworksRaed Al-Aaridhi, Iakov Dlikman, Newton Masinde, Kalman Graffi. 1-8 [doi]
- A Data-aided Interference Cancellation GFDM Receiver for Hybrid Satellite-Terrestrial Communication SystemsYang Yang, Lidong Zhu. 1-6 [doi]
- Inferring Political Alignments of Twitter UsersKutlu Emre Yilmaz, Osman Abul. 1-6 [doi]
- Design of a Wireless Sensor Network to Detect Car Accidents on HighwaysChristopher S. Baidal, David S. Salazar, Vladimir Sanchez Padilla, Rebeca L. Estrada, Nestor X. Arreaga. 1-6 [doi]
- Open Access to Intersystem Handover Control Using Multi-access Edge ComputingEvelina Pencheva, Denitsa Kireva, Ivaylo Atanasov, Ventsislav Trifonov. 1-7 [doi]
- Integrated circuits for data communication receiversGiancarlo Orengo. 1-6 [doi]
- Hybrid Beamforming for Large-scale MIMO-OFDM in Frequency Selective FadingYanping Xiao, Yue Xiao, Feng Yu, You Li 0003, Yong Wang, Bin Fu. 1-4 [doi]
- Design of a Photoconductive Antenna for Pulsed-Terahertz Spectroscopy with Polarization DiversitySalman Behboudi Amlashi, Ali Araghi, Gholamreza Dadashzadeh. 1-5 [doi]
- Experimental evaluation of SAPC-R: an adaptive power control protocol for mobile sensorsDebraj Basu, Gourab Sen Gupta, Yi Zhang, Avishek Nag, Linda Doyle. 1-6 [doi]
- Joint Channel Estimation of Multiple Transmitters on Shared Resource Blocks by Approximating Channel States with Constant Frequency SinusoidsZhenghao Zhang, Avishek Mukherjee. 1-4 [doi]
- Insights from Eye-movement Events in an Educational Computer-based-simulation Environment (ECE) for Endo-neurosurgery Training Considering Gender, Hand Condition and Scenario EffectsGonca Gokce Menekse Dalveren, Nergiz Ercil Cagiltay. 1-5 [doi]
- TCP performance for Satellite M2M applications over Random Access linksA. Abdelsalam, Cesare Roseti, Francesco Zampognaro. 1-5 [doi]
- Achievable Rate of N-Continuous Precoded SIM-OFDMXun Li, Peng Wei 0002, Yue Xiao, Bin Fu. 1-6 [doi]
- A Novel Fingerprint Protection Approach based on SoPC Chaotic EncryptionMohamed Salah Azzaz, Noureddine Aissaoui, Camel Tanougast. 1-6 [doi]
- Cloud Stock Exchange for TelecommunicationAkos Leiter. 1-4 [doi]
- LEACH-S: Low Energy Adaptive Clustering Hierarchy for Sensor NetworkAmira Bendjeddou, Houria Laoufi, Saadi Boudiit. 1-6 [doi]
- Capacity Analysis of A MEO Satellite Constellation SystemYahui Wang, Lidong Zhu. 1-4 [doi]
- Survival Analysis of Elderly while Escaping from a Simulated BuildingW. Velasquez, T. Marjorie Chalen, Joaquín Salvachúa. 1-6 [doi]
- Design and Implementation of IoT-Based Automation System for Smart HomeWaheb A. Jabbar, Mohammed Hayyan Alsibai, Nur Syaira S. Amran, Samiah K. Mahayadin. 1-6 [doi]
- SHINE: Secure Hybrid In Network caching EnvironmentSimon Pietro Romano, Cesare Roseti, Antonia Maria Tulino. 1-6 [doi]
- The Bufferboost Effect: when Drops and Redundancy boost the ThroughputCarlo Augusto Grazia, Martin Klapez, Maurizio Casoni. 1-6 [doi]
- Ensemble-based Adaptive Single-shot Multi-box DetectorViral Thakar, Walid Ahmed, Mohammad M. Soltani, Jia Yuan Yu. 1-6 [doi]
- Traffic Sign Detection and Recognition Using Adaptive Threshold Segmentation with Fuzzy Neural Network ClassificationAbdulrahman S. Alturki. 1-7 [doi]
- Malicious Host Detection by Imaging SYN Packets and A Neural NetworkRyo Nakamura, Yuji Sekiya, Daisuke Miyamoto, Kazuya Okada, Tomohiro Ishihara. 1-4 [doi]
- Building a Traffic Policer for DDoS Mitigation on Top of Commodity HardwareErkin Kirdan, Daniel Raumer, Paul Emmerich, Georg Carle. 1-5 [doi]
- A Fault Tolerant Approach for Malicious URL FilteringMansoor Ahmed, Abid Khan, Osama Saleem, Muhammad Haris. 1-6 [doi]
- Building an Intelligent and Efficient Smart Space to Detect Human Behavior in Common AreasSagar Shelke, Jacob Harbour, Baris Aksanli. 1-6 [doi]
- Fix Me Up: Smart Pathways Status DetectionMassimo Marchiori. 1-6 [doi]
- Satellite telecommunication networks Simulation and Emulation requirementsA. Abdelsalam, Cesare Roseti, Francesco Zampognaro. 1-7 [doi]
- A New Efficient Adaptive Normalized Min-Sum Decoder for Irregular LDPC Codes in OFDMAmir Atashbar-Tehrani, Saeed Ghazi-Maghrebi. 1-4 [doi]
- Underdetermined Blind Separation Via Rough Equivalence Clustering for Satellite CommunicationsChengjie Li, Lidong Zhu, Zhongqiang Luo. 1-5 [doi]
- GiLAN Roaming: Roam Like at Home in a Multi-Provider NFV EnvironmentJuhoon Kim, Luis M. Contreras, Pierluigi Greto, Hilmar Magnusson, Hagen Woesner, Daniel Fritzsche, Luca Cominardi, Carlos Jesus Bernardos. 1-4 [doi]
- A Survey of Smart City Assets for Future Military UsageManas Pradhan. 1-6 [doi]
- Towards Smart Networking through Context Aware Traffic Identification Kit (TriCK) in 5GLina Xu, Ruifeng Duan. 1-6 [doi]
- A New Radio Wave Propagation Model Optimization Approach for Tehran City Based on Standard Model TuningParisa Bayan, Saeed Ghazi-Maghrebi, Ali Rahmanian. 1-5 [doi]
- A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPRJuanita Blue, Eoghan Furey. 1-6 [doi]
- Design and Implementation of MPLS SDN Controller Application based on OpenDaylightEmir Husni, Adhy Bramantyo. 1-5 [doi]
- A Suboptimal Routing Algorithm for Massive LEO Satellite NetworksYilun Liu, Lidong Zhu. 1-5 [doi]
- High Speed Elephant Flow Detection Under Partial InformationJordi Ros-Giralt, Alan Commike, Sourav Maji, Malathi Veeraraghavan. 1-7 [doi]
- SatNetCode: Functional Design and Experimental Validation of Network Coding over SatelliteM. A. Vazquez-Castro, Paresh Saxena, Tan Do-Duy, TF. Vamstad, Harald Skinnemoen. 1-6 [doi]
- A password generator tool to increase users' awareness on bad password construction strategiesPieris Tsokkis, Eliana Stavrou. 1-5 [doi]
- An Improved Earliest-Delivery Routing Algorithm in Double-layered Satellite Delay Tolerant NetworksGuokui Zhao, Mingchuan Yang, Qing Guo 0001, Gang Wang. 1-6 [doi]
- On the Impact of the Multiplication Decrease Factor of QUICMaiass Zaher, Sandor Molnar. 1-5 [doi]
- A U-shaped Wide band frequency reconfigurable dielectric resonator antenna for 5G applicationsShahid Khan, Hazrat Ali, Jamal Nasir, Loïc Siéler, Camel Tanougast. 1-4 [doi]
- A Frequency Reconfigurable Dual-Band Monopole Antenna for Wireless ApplicationsBilal Ijaz, Adnan Iftikhar, Khurram Saleem Alimgeer, M. S. Khan, Raed M. Shubair. 1-5 [doi]
- Autonomic Management Approach for Dynamic Service Based IoT SystemsGuillaume Garzone, Nawal Guermouche, Thierry Monteil 0001. 1-8 [doi]