Abstract is missing.
- Tor Network Detection By Using Machine Learning And Artificial Neural NetworkMurat Soykan, Pinar Sarisaray Bölük. 1-4 [doi]
- High speed low power SEU tolerant Pseudo dual port memory in 7nmSuresh Babu Kotha, Kumar Rahul, Mohammad Anees, Santosh Yachareni, Subodh Kumar. 1-5 [doi]
- Antenna Array Inter-Element Coupling impact on Linearization of Active Phased ArrayFeridoon Jalili, Daniel E. Serup, Ondrej Franek, Ming Shen, Gert Frølund Pedersen. 1-5 [doi]
- CDNET: A Content Delivery Network EmulatorHoang-Loc La, Anh-Tu Ngoc Tran, Masato Yoshimi, Takuma Nakajima, Nam Thoai. 1-7 [doi]
- On the Sensitivity of Implantable Antenna Performance to Variations in the Electrical Properties of Body TissuesAla Alemaryeen. 1-4 [doi]
- Building Autonomous Features in a Small Electric Vehicle ModelDeena Z. Khalaf, Noor A. AlMohammad, Maitha K. AlShebli, Fadi T. El-Hassan. 1-6 [doi]
- Utilizing Spatio-Temporal Redundancy to Maximize the Performance of Video Steganography: An Octree ApproachMohammed Baziyad, Tamer Rabie, Ibrahim Kamel. 1-6 [doi]
- Towards flexible hardware authentication for IoTAnjana Prabhakar, Tricha Anjali. 1-6 [doi]
- Evaluation of a new Radio Technology and Visible Light Communication for a Platooning ApplicationFouzi Boukhalfa, Mohamed Hadded, Paul Muhlethaler, Oyunchimeg Shagdar. 1-7 [doi]
- Evaluation and Optimization of learning-based DNS over HTTPS Traffic ClassificationYue Li 0011, Abdulhalim Dandoush, Ji Liu. 1-6 [doi]
- Performance Evaluation of MillimeterWave-Massive MIMO with Beamforming TechniquesTewelgn Kebede, Yihenew Wondie, Johannes Steinbrunn. 1-8 [doi]
- Fractal-Shaped Koch-Ring Microstrip PatchOmar Saraereh, Jeevani Jayasinghe, Aurora Andújar, Jaume Anguera. 1-5 [doi]
- Clustering Based User Allocation in 5G NetworksChristos Bouras, Rafail Kalogeropoulos, Ioannis Sina. 1-6 [doi]
- On Cognitive Management Architectures for Enhancing Septic Shock Predictions in Intensive Care UnitsChristina-Athanasia I. Alexandropoulou, Ilias E. Panagiotopoulos, George J. Dimitrakopoulos. 1-6 [doi]
- A Study on Natural Language Chatbot-based Authentication SystemsPeter Voege, Abdelkader Ouda. 1-4 [doi]
- Architecture definition for a multi-utility management platformR. Carlucci, Alessio Di Iorio, Paris A. Fokaides, A. Ioannou, Michele Luglio, Mattia Quadrini, Cesare Roseti, Francesco Zampognaro. 1-6 [doi]
- Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in BlockchainMalaw Ndiaye, Pr. Karim Konate. 1-8 [doi]
- Neural Networks Architecture for COVID-19 Early DetectionRita Zgheib, Ghazar Chahbandarian, Firuz Kamalov, Osman El Labban. 1-6 [doi]
- An Experimental Inter-Slice RAN Controller for 4G/5G Cellular NetworksAyman Maghrabi, Wibowo Hardjawana, Phee Lep Yeoh, Branka Vucetic. 1-6 [doi]
- Instagram Forensic Analysis Revisited: Does anything really vanish?Shreya Tarur Kumar, Umit Karabiyik. 1-6 [doi]
- Detecting Insider Attacks in Blockchain NetworksOluwaseyi Ajayi, Tarek N. Saadawi. 1-7 [doi]
- Detecting Electricity Theft Cyber-attacks in CAT AMI System Using Machine LearningMohamed I. Ibrahem, Sherif Abdelfattah, Mohamed Mahmoud 0001, Waleed Alasmary. 1-6 [doi]
- Efficient Probabilistic Packet Marking for AS TracebackAbdullah Yasin Nur. 1-6 [doi]
- Removing Seasonal Effect on City Based Daily Electricity Load Forecasting with Linear RegressionShanga Kareem, Mustafa Akpinar. 1-6 [doi]
- A lightweight Distributed Database Management in WSNShereen Ismail, Eman Alkhader, Aydan Gasimova, Hassan Reza. 1-5 [doi]
- Lightweight Diagnostic-based Secure Framework for Electronic Control Units in VehiclesTasneem A. Awaad, M. Watheq El-Kharashi, Mohamed Taher. 1-5 [doi]
- AI Based 5G RAN PlanningSiddhartha Shakya, Ashraf Roushdy, Himadri Sikhar Khargharia, Asad Musa, Amr Omar. 1-6 [doi]
- Automatic Data Repairs with Statistical Relational LearningLing Li, Weibang Li, Lidong Zhu, Chengjie Li, Zhen Zhang. 1-6 [doi]
- Research of the Modular Operational Performance Analysis for Consortium BlockchainYean-Fu Wen, Chen-Min Hsu. 1-6 [doi]
- OpenFunction for Software Defined IoTNian Xue, Daojing Guo, Jie Zhang 0030, Jihao Xin, Zhen Li 0047, Xin Huang 0005. 1-8 [doi]
- A Permissioned Consensus Algorithm Based DAGs-to-Blockchain in Hierarchical Architecture for Decentralized Internet of ThingsIstabraq M. Al-Joboury, Emad H. Al-Hemiary. 1-6 [doi]
- Autonomic Architectural Framework for Internet of Brain Controlled Things (IoBCT)Haider Khaleel Raad, Farah Fargo, Olivier Franza. 1-4 [doi]
- A Fog-based Reputation Evaluation Model for VANETsRasha Jamal Atwa, Paola Flocchini, Amiya Nayak. 1-7 [doi]
- Massive MIMO Linear Precoding Techniques Performance AssessmentTewelgn Kebede, Yihenew Wondie, Johannes Steinbrunn. 1-8 [doi]
- A light neural network for modulation detection under impairmentsThomas Courtat, Hélion du Mas des Bourboux. 1-7 [doi]
- A Novel Realistic Dataset for Intrusion Detection in IoT based on Machine LearningWalid Dhifallah, Mounira Tarhouni, Tarek Moulahi, Salah Zidi. 1-6 [doi]
- Blockchain-Based Ride-Sharing System with Accurate Matching and Privacy-PreservationMahmoud M. Badr, Mohamed Baza, Sherif Abdelfattah, Mohamed Mahmoud 0001, Waleed Alasmary. 1-8 [doi]
- Design of a Wireless Heliostat SystemMohammed Yafeai, Ibrahim Abou Shehada, Sultan Alsulami, Ibrahim Abou Mahmoud, Ali Muqaibel, Mohamed Abido, Aboubakr Salem. 1-5 [doi]
- Generating a PUF Fingerprint from an on-Chip Resistive Ladder DAC and ADCChristian Zajc, Markus Haberler, Gerald Holweg, Christian Steger. 1-7 [doi]
- Mobility Aware Edge Computing Segmentation Towards Localized OrchestrationSam Aleyadeh, Abdallah Moubayed, Abdallah Shami. 1-6 [doi]
- Detecting Network Attacks Exhibiting Irregular Periodic BehaviorAbdulmuneem Bashaiwth, Basil AsSadhan. 1-7 [doi]
- Characterising the Impact of Antenna Beamwidth on the Performance of Vehicle-to-Infrastructure (V2I) Millimetre Wave CommunicationKhalid A. Al Mallak, Manish Nair, Geoffrey Hilton, Tian Hong Loh, Mark A. Beach. 1-6 [doi]
- Adaptive KPCA for Outlier detection in Wireless Sensor Networks: Water pipeline caseOussama Ghorbel, Rami Ayadi, Ahmed Sulaiman Alanazi, Rayen Alanazi, Raed N. Alabdali, Mohamed Abid. 1-5 [doi]
- The Relative Tolerances of Polarization Multiplex on Long Optical PathsMartin Kyselak, David Grenar, Cestmir Vlcek, Karel Slávicek, Jiri Vavra. 1-4 [doi]
- Training Sequence Design For Burst Mode Single Side Band CPM SynchronizationKarim Kassan, Haïfa Farès, Yves Louët, Christian Glattli. 1-5 [doi]
- Using Variational Autoencoders to Increase the Performance of Malware ClassificationThomas Taylor, Amna Eleyan. 1-6 [doi]
- Transition from IPv4 to IPv6 Mechanisms by GNS3 Emulation: YPTC as a Case StudyAmmar Qaid, Özgür Ertug. 1-7 [doi]
- Intelligent DDoS Detection in Botnet Combined with Packet-Level Features under SDNShuhan Chen, Congqi Shen, Danrui Yu, Yuqin Wu, Chunming Wu 0001. 1-6 [doi]
- Enhanced Non-Orthogonal Multiple Access Using Data-Aware Power AssignmentHamad Yahya, Emad Alsusa, Arafat Al-Dweik. 1-6 [doi]
- Utility-based Scheduling Solution for Scientific Workflow on CloudAlaa Albtoush, Noor Maizura Mohamad Noor, Farizah Yunus. 1-6 [doi]
- Design of an Active Inductor based Reconfigurable Mixer for Software-Defined RadiosShilpa Mehta, Xue Jun Li. 1-6 [doi]
- Channel Estimation and Beamforming Techniques for mm Wave-Massive MIMO: Recent Trends, Challenges and Open IssuesTewelgn Kebede, Yihenew Wondie, Johannes Steinbrunn. 1-8 [doi]
- An Open Source Tool to Extract Traffic Data from Google Maps: Limitations and ChallengesSifatul Mostafi, Khalid Elgazzar. 1-8 [doi]
- Integrated modeling tool for indexing and analyzing state machine traceSimon Delisle, Naser Ezzati Jivan, Michel R. Dagenais. 1-8 [doi]
- SDN for Gateway Diversity Implementation in Satellite NetworksMario Minardi, Christos Politis, Frank Zimmer, Symeon Chatzinotas. 1-5 [doi]
- Unsupervised Time-Series based Anomaly Detection in ICS/SCADA NetworksAli Tekeoglu, Korkut Bekiroglu, Chen-Fu Chiang, Sam Sengupta. 1-6 [doi]
- Variational Learning of the Mixture of Shifted-Scaled Dirichlet Distributions via Entropy SplittingAhmed Rebei, Oumayma Dalhoumi, Narges Manouchehri, Ali Baghdadi, Manar Amayri, Nizar Bouguila. 1-6 [doi]
- Overlap-Minimization Scheduling Strategy for Data Transmission in VANETYong Zhang, Mao Ye, Lin Guan. 1-7 [doi]
- Performance of Time and Frequency Approaches for Synchronization Tracking in 5G NR SystemsAbdelmohsen Ali, Mahmoud Elsaadany, Ghyslain Gagnon. 1-6 [doi]
- SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital SignaturesChristian Hemminghaus, Jan Bauer, Konrad Wolsing. 1-6 [doi]
- Multi-Step Ahead Grant Prediction for Dynamic Power Management in Cellular ModemsPeter Brand, Joachim Falk, Eduard Potwigin, Jürgen Teich. 1-6 [doi]
- Developing Computer Applications without any OS or Kernel in a Multi-core ArchitectureNavid Ordouie, Nirmala Soundararajan, Ramesh K. Karne, Alexander L. Wijesinha. 1-8 [doi]
- Remote Control of Solenoid Valves Using RS485 and LiFi TechnologyMichael Windisch, Olimpiu Stoicuta, Monica Leba, Simona Riurean. 1-6 [doi]
- Detecting Electricity Fraud in the Net-Metering System Using Deep LearningMahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Baza, Mohamed Mahmoud 0001, Waleed Alasmary. 1-6 [doi]
- Novel technique in 4G Handover parameter tuning and prediction using statistical trend analysis and supervised machine learningTarek Elmahdy, Ahmed F. Bendary. 1-5 [doi]
- A Comparative Study on the Variants of R Metric for Network RobustnessBalume Mburano, Weisheng Si, Wei Xing Zheng 0001. 1-6 [doi]
- 5G Base Station Deployment Review for RF RadiationMohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam. 1-5 [doi]
- Vote and KNN outlier detection in Wireless Sensor NetworksAymen Abid, Salim el Khediri, Tarek Moulahi, Rym Chéour, Abdennaceur Kachouri. 1-6 [doi]
- Analysis of Autonomous System Level Internet Topology Graphs and MultigraphsAbdullah Yasin Nur. 1-7 [doi]
- Threats, crimes and issues of privacy of users' information shared on online social networksShahad Alotaibi, Khadijah Alharbi, Huda Alwabli, Hanan Aljoaey, Balsam Abaalkhail, Salim el Khediri. 1-8 [doi]
- Distributed Knowledge Inference and Reasoning in the Network Based on New IPLijun Dong, Richard Li. 1-7 [doi]
- Hybrid Precoder Design for mmWave Massive MIMO Systems with Partially Connected ArchitectureAhmed Osama, Mahmoud Elsaadany, Shoukry I. Shams, Omar A. M. Aly, Usama S. Mohammed, Ghyslain Gagnon. 1-6 [doi]
- Energy Minimized Federated Fog Computing over Passive Optical NetworksAbdullah M. Alqahtani, Barzan Yosuf, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani. 1-6 [doi]
- Deep Learning and Augmented Reality for IoT-based Air Quality Monitoring and Prediction SystemM. Saifeddine Hadj Sassi, Lamia Chaari Fourati. 1-6 [doi]
- Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-LearningMohamed I. Ibrahem, Mahmoud M. Badr, Mohamed Mahmoud 0001, Mostafa M. Fonda, Waleed Alasmary. 1-7 [doi]
- Enhanced Fuzzy logic-based Cluster Stability in Vehicular ad hoc NetworkMohamed Aissa, Badia Bouhdid, Adel Ben Mnaouer. 1-6 [doi]
- A Hybrid Spread Spectrum Communication Method Based on Chaotic SequenceGuomin Tang, Lidong Zhu, Qi Wu, Qihui He, Le Yu. 1-5 [doi]
- Palm Trees Detection Using the Integration between GIS and Deep LearningE. A. Alburshaid, M. A. Mangoud. 1-6 [doi]
- Analysis of Self-Blockage Impact on Handover Probability for User with Mobility in 5G Mm-Wave Cellular NetworkAbdanaser Okaf, Amamer Saied, Dongyu Qiu. 1-5 [doi]
- An Adaptive DOA Estimation Method Based on Transfer Joint Matching for Space CommunicationsQi Tan, Lidong Zhu, Xu Deng, Zhongru Zhu. 1-5 [doi]
- Time series signal recovery methods: comparative studyFiruz Kamalov, Hana Sulieman. 1-5 [doi]
- CSES: Customized Searchable Encryption Scheme with Efficient Key Management Over Medical Cloud DataSherif Abdelfattah, Mohamed Baza, Mohamed Mahmoud 0001, Waleed Alasmary. 1-7 [doi]
- Low-power Characteristics and Data Retention Abilities of A New Multiplexer Logic for Interconnect Logic of FPGAsKarol Niewiadomski, Dietmar Tutsch. 1-7 [doi]
- Store-Load Phased Array Antenna for Tracking and Communication with LEO SatellitesYong Zhang, Lidong Zhu, Chengjie Li, Xu Deng, Huazhi Feng. 1-6 [doi]
- OFDM lags SC/FDE for Ultra Wideband (UWB) in Context of IoTHisham Sager, Tufik M. Buzid, Masoud M. Eddaghel. 1-5 [doi]
- Model Predictive Control of Autonomous Driving using Unscented Kalman Filter with Sparse Spectrum Gaussian ProcessesShitian Zhang, Yunduan Cui, Naitian Deng, Huiyun Li. 1-6 [doi]
- A SystemC Model of the IEEE 802.11 EDCA Protocol for Virtual PrototypingBenjamin Beichler, Michael Rethfeldt, Hannes Raddatz, Lukas Steffen, Dirk Timmermann, Christian Haubelt. 1-7 [doi]
- Human Mobility Brings Scalability to BitTorrent over MANETEduardo Andrés-Marcelo, Elizabeth Pérez Cortés, Adán G. Medrano-Chávez, Miguel López-Guerrero. 1-6 [doi]
- An Intelligent Management Functionality for In-Vehicle Driving Style Reconfigurations Leveraging on Bayesian Networking PrinciplesIlias E. Panagiotopoulos, George J. Dimitrakopoulos. 1-6 [doi]
- Efficient and Robust Keyed Hash Function Based on Artificial Neural NetworksHassan Noura 0001, Ali Chehab. 1-7 [doi]
- Combined Interference and Communications strategy evaluation as a defense mechanism in typical Cognitive Radio Military NetworksMarcelo Camilo, David F. C. Moura, Ronaldo M. Salles. 1-8 [doi]
- Linguistic Descriptions of Airport Evaluation Data for Recommendation StrategiesBetul Dundar, Diyar Akay, Suat Ozdemir. 1-8 [doi]
- Extending Direct Sequence Spread-Spectrum for Secure CommunicationAvinash Kumar, Ye Zhu. 1-5 [doi]
- A Novel Low-Latency and Cost-Effective Communication Protocol Design for Internet of Flying ThingsBurak Han Çorak, Ibrahim Kök, Suat Özdemir. 1-6 [doi]
- BaaS Architecture for DApps and Application for Veterinary Medicine Case Study in IrelandKosala Yapa Bandara, John G. Breslin. 1-6 [doi]
- API Security in Large Enterprises: Leveraging Machine Learning for Anomaly DetectionGaspard Baye, Fatima Hussain, Alma Oracevic, Rasheed Hussain, S. M. Ahsan Kazmi. 1-6 [doi]
- Image-based with Peak Load Ensemble Prediction System for Demand Response in Smart GridJiawei Dong, Abdulsalam Yassine, Andy Armitage. 1-6 [doi]
- Adaptive Learning on Fog-Cloud Collaborative Architecture for Stream Data ProcessingNawaf Abdulla, Mehmet Demirci, Suat Özdemir. 1-6 [doi]
- An Entropy-based Hybrid Mechanism for Large-Scale Wireless Network Traffic PredictionGuilherme N. N. Barbosa, Martin Andreoni Lopez, Dianne S. V. Medeiros, Diogo M. F. Mattos. 1-6 [doi]
- Joint Power Allocation and Antenna Selection for Network Sum-Rate Maximization in Clustered Downlink NOMA NetworksMohammed W. Baidas, Ahmed M. AbdelGhaffar, Emad Alsusa. 1-7 [doi]
- Punctual Cloud: Unbinding Real-time Applications from Cloud-induced DelaysHaorui Peng, William Tärneberg, Emma Fitzgerald, Maria Kihl. 1-8 [doi]
- Research on Satellite Network Security Mechanism Based on BlockChain TechnologyChengjie Li, Lidong Zhu, Michele Luglio, Zhongqiang Luo, Zhen Zhang. 1-6 [doi]
- Self-adaptive trust management model for social IoT servicesRihab Abidi, Nadia Ben Azzouna. 1-7 [doi]
- SIP-GAN: Generative Adversarial Networks for SIP traffic generationAmar Meddahi, Hassen Drira, Ahmed Meddahi. 1-6 [doi]
- Enhanced Secure Process Control and Data Routing for Multi-plant Biogas Production System in IoT Environment : *A Practical Approach to Securing Smart Bio-energy InfrastructureOladayo Olufemi Olakanmi, Kosisochukwu Pal Nnoli, Kehinde Oluwasesan Odeyemi, Mbadiwe Samuel Benyeogor. 1-5 [doi]
- Layer 3 Forwarder Application - Implementation Experiments Based on Ryu SDN ControllerPantelimon-Teodor Tivig, Eugen Borcoci, Alexandru Brumaru, Andra-Isabela-Elena Ciobanu. 1-6 [doi]
- Network Growth in Smart CitiesAnood Al Hamedi, Bashaer Al Seiari, Meera Al Taher, Hasan Abu Hilal. 1-6 [doi]
- Edge Computing Services for Smart Cities: A Review and Case StudyAli Alnoman. 1-6 [doi]
- Performance of NOMA with Massive MIMO for 5GMário Marques da Silva, Rui Dinis 0001. 1-5 [doi]
- Energy Efficient Mechanism over LoRa for Search and Rescue operationsChristos Bouras, Apostolos Gkamas, Spyridon Aniceto Katsampiris Salgado. 1-6 [doi]
- Performance Comparison of Video Encoding at Low Sampling RatesVusi Skosana, Adnan M. Abu-Mahfouz. 1-7 [doi]
- Real-time Aircraft Tracking System: A Survey and A Deep Learning Based ModelMuhammed Emir çakici, Feyza Yildirim Okay, Suat Özdemir. 1-6 [doi]
- Optimized Multi-Level Prime Array ConfigurationsSaleh A. Alawsh, Ali H. Muqaibel. 1-4 [doi]
- An Eight-Element MIMO Antenna system for 5G Mobile HandsetsMuhannad Y. Muhsin, Ali J. Salim, Jawad K. Ali. 1-4 [doi]
- Delay-aware Scheduling Scheme for Ubiquitous IoT Applications in Edge ComputingAli Alnoman. 1-4 [doi]
- Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoTArtrim Kjamilji, Albert Levi, Erkay Savas, Osman Berke Güney. 1-8 [doi]
- Machine learning to find purchase duration of chain hotels in the UAEElezabeth Mathew, Sherief Abdulla. 1-6 [doi]
- Orthogonal variance-based feature selection for intrusion detection systemsFiruz Kamalov, Sherif Moussa, Ziad El-Khatib, Adel Ben Mnaouer. 1-5 [doi]
- An Adaptive Power Output Control System for CAMAmr Sayed AbdelFattah. 1-6 [doi]
- Enhancing IP Address Geocoding, Geolocating and Visualization for Digital ForensicsMohammad Meraj Mirza, Umit Karabiyik. 1-7 [doi]
- Comparison of Media Sources for COVID-19 by Machine Learning Sentiment AnalysisAndrew Tao, Kevin Qi, Daniel Che, Mikhail Y. Shalaginov, Tingying Helen Zeng. 1-4 [doi]
- AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless NetworksNadia Charef, Adel Ben Mnaouer, Ouns Bouachir. 1-6 [doi]
- A network tomography approach for anomaly localization in Service Function ChainingMohamed Rahali, Jean-Michel Sanner, Cao-Thanh Phan, Gerardo Rubino. 1-6 [doi]
- Performance Evaluation of Advanced Message Queuing Protocol (AMQP): An Empirical Analysis of AMQP Online Message BrokersNandeesh Basavaraju, Naveen Alexander, Jochen Seitz. 1-8 [doi]
- Voice Controlled Ultraviolet Sterilization Robot for Disinfection with Monitoring FeaturesArgen Mary Arceño, Michael Buenviaje, Mave Rick Credo, Ronn Joaquin Cuenco, Rollison Joshua Tabuyan, Carlos Sison, Thaddeo Garcia, Antonio Tee. 1-6 [doi]
- Toward Efficient and Robust Deep Learning-based Malware Detection in Fog ComputingDanila Morozovskii, Krunal Thummar, Talal Halabi, Sheela Ramanna. 1-6 [doi]
- Network Sum-Rate Maximization for NOMA-Based Multicast Cognitive Radio Networks with SWIPT-Enabled RelaysAlaa Al-Refaei, Mohammed W. Baidas. 1-7 [doi]
- Task Ordering Matters for Incremental LearningZhaonan Yang, Huiyun Li. 1-6 [doi]
- Identifying the Main Causes of Medical Data Incompleteness in the Smart Healthcare EraColin Wilcox, Soufiene Djahel, Vasileios Giagos. 1-6 [doi]
- Optimizing Sub bytes and Mix Column to improve performance of AES in Virtex 7 FPGAMahendrakumar Gunasekaran, Kumar Rahul, Santosh Yachareni. 1-5 [doi]
- Multi-layer satellite network resource management based on genetic algorithmXu Deng, Lidong Zhu, Qi Tan, Ying Yang, Yong Zhang. 1-6 [doi]
- Challenges and Promises of 5G for Smart Grid Teleprotection ApplicationsKinan Ghanem, Stephen Ugwuanyi, Rameez Asif, James Irvine 0001. 1-7 [doi]
- Implementation of a secure multi-cloud storage framework with next-generation cryptosystems and split-protocolBharat S. Rawal, Gunasekaran Manogaran. 1-6 [doi]
- Energy Reduction in Building Energy Management Systems Using the Internet of Things: Systematic Literature ReviewAlshaimaa Al Naqbi, Sheikha Salem Alyieliely, Manar Abu Talib, Qassim Nasir, Maamar Bettayeb, Chaouki Ghenai. 1-7 [doi]
- Enhanced Security Level for Sensitive Medical Data Transmitted through Visible LightSimona Riurean, Monica Leba, Lilia Crivoi. 1-6 [doi]
- A Game-Theoretical Approach for Data Acquisition From Fitness Tracking DevicesNatalia Khuri, Esteban Murillo Burford, Sarah Parsons, Chenqi Xu. 1-6 [doi]
- A Single-Band Optically Transparent Antenna for Wearable Smart GlassesHaider Khaleel Raad, Heidrun Schmitzer, Ali Hammoodi, Casey White, Dennis Tierney, Wilbur Walters, Khalid Abed. 1-4 [doi]
- On the Design of Triple Band Dipole Flexible Antenna for Wearable RFID DevicesAya N. Alkhafaji, Jawad K. Ali, Sinan M. Abdulsatar, Ali I. Hammoodi. 1-3 [doi]
- Interpretable Machine Learning: A Case Study of HealthcareFeyza Yildirim Okay, Mustafa Yildirim, Suat Özdemir. 1-6 [doi]
- LiFi/WiFi Authentication and Handover Protocols: Survey, Evaluation, and RecommendationIman I. M. Abu Sulayman, Rongji He, Marlin Manka, Andrew Ning, Abdelkader Ouda. 1-6 [doi]
- Quadratic Detection-Based Millimeter-Wave MMIC for Wireless Communication and LocalizationChristophe Loyez, Michael Bocquet, Kamel Haddadi. 1-5 [doi]
- Statistical modeling of Land Mobile Satellite Dual-Polarized MIMO Propagation ChannelMingchuan Yang, Yingzhe Dou, Bingyu Xie. 1-5 [doi]
- On Secrecy Performance of Multiuser FSO Networks with Opportunistic User SchedulingWafaa Mohammed Ridha Shakir. 1-6 [doi]
- Kernel density estimation-based sampling for neural network classificationFiruz Kamalov, Ashraf Elnagar. 1-4 [doi]
- LLR Metrics for 1024-QAM Soft-Decision: Implementation in IEEE 802.11ax (Wi-Fi 6)Roger Pierre Fabris Hoefel. 1-6 [doi]
- A Novel Forwarding and Caching Scheme for Information-Centric Software-Defined NetworksKhuhawar Arif Raza, Alia Asheralieva, Md. Monjurul Karim, Kashif Sharif, Mehdi Gheisari, Salabat Khan. 1-8 [doi]
- Public Transit Hub (PTHub)Navid Shaghaghi, Adi Relan, James Ossam, Hanna Albright. 1-5 [doi]
- Autonomous Vehicle Motion Planning using Kernelized Movement PrimitivesNaitian Deng, Yunduan Cui, Shitian Zhang, Huiyun Li. 1-6 [doi]
- Tuning of Deep Neural Networks for Over-The-Air Linearization of Highly Nonlinear Wide-Band Active Phased ArraysFeridoon Jalili, Yufeng Zhang 0006, Felice Francesco Tafuri, Ole Kiel Jensen, Yunfeng Li, Qingyue Chen, Ming Shen, Gert Frølund Pedersen. 1-4 [doi]
- Leveraging SDN slicing isolation for improved adaptive satellite-5G downlink schedulerSaloua Hendaoui, C. Nawel Zangarz. 1-5 [doi]
- CRC Aided Short-Cycle Free BP Decoding for Polar CodesAhmet Serdar Tan, Onur Sahin, Sungkwon Hong. 1-6 [doi]
- Novel Mind Controller to Assess Student Concentration with Connected Vehicles: ALIVE MindJihene Rezgui, Enric Soldevila, Younes Kechout. 1-6 [doi]
- Optimization of Channel Allocation in Heterogeneous 5G Networks Based on Genetic Algorithm and Fuzzy LogicGhazal Najafi, Saeed Ghazi-Maghrebi. 1-6 [doi]
- A Convoy of Ground Mobile Vehicles Protection using Cooperative UAVs-based SystemAicha Idriss Hentati, Lamia Chaari Fourati. 1-6 [doi]
- Scenarios and implementation use-cases for satellite-based NB-IoTMichele Luglio, Michela Quadrini, Cesare Roseti, Francesco Zampognaro. 1-6 [doi]
- Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural NetworksAhmed Shafee, Mahmoud Nabil, Mohamed Mahmoud 0001, Waleed Alasmary, Fathi Amsaad. 1-7 [doi]
- Decoding and Equalization in a Joint Alamouti-WPM SystemBradley Comar. 1-8 [doi]
- Implementation and analysis of the AODVv2 Routing Protocol in ARM devicesEnrica Zola, Israel Martín-Escalona, Francisco Barceló-Arroyo, Sergio Machado. 1-6 [doi]
- Geospatial Guidance of Unmanned Aerial Vehicles around no-fly-zones by Global Positioning System SpoofingPhilipp Ortner, Raphael Steinhöfler, Patrick Hödl, Erich Leitgeb, Holger Flühr. 1-7 [doi]
- Design of a Joint Alamouti-MIMO and Wavelet Packet Modulation SystemBradley Comar, R. Scott Frazier. 1-8 [doi]
- Real-time Intelligent Speed Adaptation in Heterogeneous Road NetworksJamal Raiyn. 1-7 [doi]
- A Bluetooth-Based Contact-Tracing Mobile App for Airborne-Based Epidemic ControlManjul Shrestha, Xingya Liu, Moushmi Sreekanthan. 1-5 [doi]
- RF LNA with Active Inductor Linearizer for Wireless CommunicationZiad El-Khatib, Firuz Kamalov, Sherif Moussa, Ahmed AlGindy. 1-4 [doi]
- An Efficient Resource Allocation for D2D Communications Underlaying in HetNetsAmamer Saied, Abdanaser Okaf, Dongyu Qiu. 1-6 [doi]
- A Real-Time Mobile Application for Cattle Tracking using Video Captured from a DroneChuyang Liu, Zihao Jian, Minshan Xie, Irene Cheng 0001. 1-6 [doi]
- Federated Learning for Anomaly-Based Intrusion DetectionMohamed Ali Ayed, Chamseddine Talhi. 1-8 [doi]
- Autonomous Learning Intelligent Vehicles Engineering in a Programming Learning Application for Youth: ALIVE PLAYJihene Rezgui, Félix Jobin, Simon Beaulieu, Zarine Ardekani-Djoneidi. 1-6 [doi]