Abstract is missing.
- Dual Autoencoders for Network-Based Detection of BaIoT AttacksRym Moussaoui, Djihane Oum Keltoum Harouni, Osman Salem, Ahmed Mehaoua. 1-6 [doi]
- Linear Complexity for k-Coverage Sensor Redundancy Determination in IoTManel Chenait, Chafika Benzaïd, Bahia Zebbane. 1-6 [doi]
- Noise2Seg: Automatic Few-Shot Selection from Noisy Web Data for Underwater Tropical Fishes SegmentationNauman Ullah Gilal, Fahad Majeed, Khaled A. Al-Thelaya, Mehak Khan, Jens Schneider 0002, Marco Agus. 1-6 [doi]
- An Efficient Blockchain and Smart Contracts Based Approach for Document VerificationSaptarsi Saha, Himanshu Gupta, Nama Ravi Teja, Soumya Kothari, D. V. N. Siva Kumar. 1-8 [doi]
- Resource Allocation in Large Intelligent Surfaces/Antennas Using Genetic Algorithm ApproachAizhan Ayapbergenova, Mahyar Nemati, Behrouz Maham. 1-6 [doi]
- Secure and Successful Transmission Probability Analysis for PLC NetworksAymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro. 1-7 [doi]
- Microstrip Patch Rectenna for Electromagnetic Wireless Power Transfer at 2.45 GHzOleg Serov, Mohamed Zied Chaari. 1-5 [doi]
- NOMA BER and BLER Performance Evaluation Under the Received Eb/N0Hamad Yahya, Emad Alsusa, Arafat Al-Dweik. 1-5 [doi]
- Deep Reinforcement Learning for Autonomous Navigation on Duckietown Platform: Evaluation of Adversarial RobustnessAbdullah Hosseini, Saeid Houti, Junaid Qadir 0001. 1-6 [doi]
- Privacy Protection Smart Agriculture Based on Functional EncryptionMiaomiao Shen. 1-5 [doi]
- A Genetic Algorithm-Based Improved Availability Framework for Controller Placement in SDNEmmanuel Asamoah, Ampratwum Isaac Owusu, Amiya Nayak. 1-7 [doi]
- Transmission Power Control for Interference Reduction in Cellular D2D NetworksMehrdad Sadehvand, Neda Moghim, Behrouz Shahgholi Ghahfarokhi, Sachin Shetty. 1-6 [doi]
- Malicious Encrypted Network Traffic Detection Using Deep Auto-Encoder with a Custom Reconstruction LossAhmed Ramzi Bahlali, Abdelmalik Bachir, Abdelhakim Cheriet. 1-7 [doi]
- Programmer Performance Prediction with Cognitive Tests: A Granular ApproachAyman Aboulmagd Farghaly, Passent Mohammed El-Kafrawy. 1-6 [doi]
- AssureAIDoctor- A Bias-Free AI BotYulia Kumar, Justin Delgado, E. Kupershtein, B. Hannon, Z. Gordon, J. Jenny Li, Patricia Morreale. 1-6 [doi]
- Internet Evolution with IPswen: Towards the Next Generation TCP/IPv4 Internet ArchitectureBing Swen Sun. 1-14 [doi]
- Estimating 5G Cell Utilization by Passive Measurement: A Machine Learning ApproachDominik Krah, Stefan Farthofer, Peter Dorfinger. 1-6 [doi]
- Design of OvTDM Toward Enhanced Physical Layer SecurityChongda Huang, Kaiyuan Huang, Xiaoyuan Li, Yue Xiao. 1-4 [doi]
- Leveraging Blockchain for a Robust and Scalable Device Identification in LoRaWANLounès Meddahi, Ahmed Meddahi, Patrick Sondi, Fen Zhou 0001. 1-6 [doi]
- A Reasoning System Architecture for Spectrum Decision MakingUdayan Das, Cynthia S. Hood 0001, Vaishali Nagpure. 1-10 [doi]
- A Novel Integrity Protocol Based on Physical Unclonable FunctionsAbdulaziz Al-Meer, Saif Al-Kuwari. 1-6 [doi]
- Importance of Realistic Considerations of Time Synchronization for TAS in TSN NetworksAviroop Ghosh, Thomas Kunz, Saleh Yousefi. 1-6 [doi]
- Indoor Multi-Lingual Scene Text Database with Different ViewsYounes Akbari, Jayakanth Kunhoth, Omar ElHarrouss, Somaya Al-Máadeed, Khalid Abualsaud, Amr Mohamed 0001, Tamer Khattab. 1-6 [doi]
- Absolute Added Correlative Coding using APDs for LEO-LEO OISLsAmrita Gill, Gnanam Gnanagurunathan, Nafizah Khan, Amin Malekmohammadi. 1-6 [doi]
- Performance Evaluation of Machine Learning-Based Misbehavior Detection Systems in VANETs: A Comprehensive StudyHela Marouane, Abdulhalim Dandoush, Lamine Amour, Aiman Erbad. 1-6 [doi]
- VANET-Sec: A Framework to Secure Vehicular Ad-Hoc Networks Using a Permissioned BlockchainThabet Kacem. 1-6 [doi]
- Arabic Sign Language Datasets: Review and ImprovementsAlaa Jalal Tamimi, Iyad Hashlamon. 1-6 [doi]
- Utilizing 1D Convolutional Neural Networks for Enhanced Design and Optimization of Rectangular Patch Antenna ParametersChaima Ferchichi, Dorsaf Omri, Taoufik Aguili. 1-6 [doi]
- Explainability of Artificial Intelligence Systems: A SurveyMazharul Hossain, Saikat Das, Bhargavi Krishnamurthy, Sajjan G. Shiva. 1-6 [doi]
- DI-ESN: Dual Input-Echo State Network for Time Series ForecastingChafika Ouni, Emna Benmohamed, Hela Ltifi. 1-6 [doi]
- Rapid CNN-Assisted Iterative RIS Element ConfigurationSamed Kesir, Muhammed Yaser Yagan, Ibrahim Hökelek, Ali Emre Pusane, Ali Görçin. 1-6 [doi]
- A Combinatorial Approach to Cardinality Constraint Sampling Using Branch-and-Bound TechniqueSakshi Pandey, Amit Banerjee. 1-6 [doi]
- Resilient Model-Based Mobile Location Estimators Incorporating Measured Target Speed for Maneuver TrackingTan-Jan Ho, Bo-Han Huang. 1-6 [doi]
- Fabry-Perot Cavity Based Decagonal Shape Patch Antenna for Millimeter-Wave Band ApplicationsJawad Ahmad, Mohammad S. Hashmi, Galymzhan Nauryzbayev. 1-4 [doi]
- Location Estimation of Moving Targets by Passive Sonobuoy and Recurrent Deep Neural NetworkHooshang Abbaspour, Ghazal Najafi. 1-6 [doi]
- A Nested Genetic Algorithm-Based Optimized Topology and Routing Scheme for WSNAmpratwum Isaac Owusu, Amiya Nayak. 1-6 [doi]
- Achieving Quality of Service and Traffic Equilibrium in Software-Defined IoT NetworksSamra Zafar, Muhammad Ibrar, Aiman Erbad, Bakhtawar Zafar, Nizam Hussain Zaydi, Xiaopeng Hu. 1-6 [doi]
- Secure Automated Delivery of Critical Goods with RFID-Based Tracking and AuthenticationChaza Araji, Hala Aburajouh, Maryam Al Hail, Elias Yaacoub. 1-6 [doi]
- Joint Backhaul Pairing and Resource Allocation of Moving Small Cells Using NOMAMyra Khalid, Aamina Akbar, Hassaan Khaliq Qureshi, Sobia Jangsher. 1-6 [doi]
- A Deep Learning Approach for the Classification of Tuberculosis and Pneumonia Using NIH DatasetBharti Moryani, Kanika Sood, Kirti Chaudhary. 1-8 [doi]
- A Comparison of Authentication Protocols for Unified Client ApplicationsFloris Breggeman, Mohammed El-hajj, Florian Hahn 0001. 1-7 [doi]
- An HLA and OPNET Based Co-Simulation System for Internet of VehiclesYantao Liu, Na Qin. 1-4 [doi]
- Zero Trust Security Strategy for Collaboration SystemsRodrigue N'goran, Aguié Pacôme Bertrand Brou, Koffi Ghislain Pandry, Jean-Louis Tetchueng, Yvon Kermarrec, Olivier Asseu. 1-6 [doi]
- Toward Detection of Arabic Cyberbullying on Online Social Networks using Arabic BERT ModelsMeshari Essa AlFarah, Ibrahim Kamel, Zaher Al Aghbari. 1-6 [doi]
- Cyberbullying Detection Through Acoustic and Linguistic AnalysisRafik Aimen Silakhal, Sara Zekri, Osman Salem, Ahmed Mehaoua. 1-5 [doi]
- Monitoring Medicine Quality Conservation: An IoT-Based Platform DesignJosep Genovard-Oliver, Maria Frontera-Bergas, Miguel Vinaixa-Fernández, Bartomeu Oliver-Riera, Jaume Ramis-Bibiloni, Eugeni Isern 0001, Miquel Roca 0001, Bartomeu Alorda-Ladaria. 1-8 [doi]
- Underwater Localization: a Pragmatic ApproachAnisur Rahman. 1-7 [doi]
- SmartyBin: A Tangible AI-Based Waste Classification PrototypeSarah Al-Shareeda, Hamza Hasan, Ali Alkhayyat. 1-6 [doi]
- Effectiveness of Trust-Based Authentication in Vehicular Cloud ComputingRudolph Etzel, Omar Narine, Konstantinos Georgiou, Thomas Diakogeorgios, Jaden Usman, Puya Ghazizadeh. 1-5 [doi]
- Examining Generative Adversarial Network for Smart Home DDoS Traffic GenerationMd. Rashed Iqbal Nekvi, Sajal Saha, Yaser Al Mtawa, Anwar Haque. 1-6 [doi]
- Adaptive Ratio-Based-Threshold Gradient Sparsification Scheme for Federated LearningJeong Min Kong, Elvino Sousa. 1-5 [doi]
- Three-Dimensional Numerical Demonstrating of Blood Light Absorption across Multilayered Biological TissuesMouna Dhmiri, Yassine Manai, Tahar Ezzedine. 1-6 [doi]
- Predictive Analysis of Jordan Road Accidents Severity Using Machine LearningDheya Mustafa, Layan Sawaged, Safaa M. Khabour. 1-6 [doi]
- Architectures for Non-Terrestrial RAN: Integrated Satellite Access and BackhaulMattia Quadrini, Cesare Roseti. 1-6 [doi]
- A Hybrid Approach for Food Name Recognition in Restaurant ReviewsAli Haider, Sana Saeed, Kashif Bilal, Aiman Erbad. 1-6 [doi]
- ChatGPT, Let Us Chat Sign Language: Experiments, Architectural Elements, Challenges and Research DirectionsNada Shahin, Leila Ismail. 1-7 [doi]
- AIComprehend: An Adaptive Reading Comprehension Learning Platform Using Machine LearningDominic John Mondia, Kyle Nathan Naranjo, Stephen Tristan Galamay, Nestor Michael C. Tiglao. 1-6 [doi]
- Network Vulnerability Assessment Using Critical Nodes IdentificationMohammed Lalou, Hamamache Kheddouci. 1-6 [doi]
- A DOA Estimation Method with High Resolution in the Presence of Satellite Array ErrorWenjun Shi, Lidong Zhu, Yanggege Zhang, Ke Chu, Ean He, Yimai Shi, Yong Zhang, Wen He, Kun Liu. 1-6 [doi]
- Acquisition of Satellite Telemtry Using a Low-Cost FPGA BoardEl-Habib Bensikaddour, Boualem Nasri, Abdelhak Benikhlef, Djamel Eddine Baba Hamed. 1-5 [doi]
- Multi-Band Electromagnetic Metasurface Absorber Design Using Concentric Split-Ring ResonatorsHaitham Alajmi, Mohammed M. Bait-Suwailam. 1-4 [doi]
- A Novel Optimal Wireless Thermal Sensor Placement Approach for Large Commercial BuildingsMahdi Houchati, A. Omri, H. Kanaan, Aiman Erbad, Muhammad Ibrar, Juan M. Corchado, Sergio Márquez Sánchez. 1-7 [doi]
- Automatic First Arrival Picking for Seismic Data using Kalman FilterMuhammad Esmat, Bo Liu 0041, Ali Al-Shaikhi, Sherif M. Hanafy, Mohamed A. Mohandes, Faramarz Fekri. 1-5 [doi]
- An IoT Security Risk Assessment Framework for Healthcare EnvironmentMofareh Waqdan, Habib Louafi, Malek Mouhoub. 1-8 [doi]
- Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced EnvironmentEranga Bandara, Sachin Shetty, Peter Foytik, Abdul-Rahman, Ravi Mukkamala, Xueping Liang, Nadini Sahabandu. 1-8 [doi]
- Highly Efficient Pure Sine Wave Inverter Using Microcontroller for Photovoltaic ApplicationsAhmed Badawi, Hassan Ali, I. M. Elzein, Alhareth Zyoud, Ammar Abu-Hudrouss. 1-6 [doi]
- Intelligent Brain Tumor DetectorMostafa Abdelhamid, Mohammed Alhato, Ali Elmancy, Somaya Al-Máadeed, Omar ElHarrouss. 1-6 [doi]
- A Representation Learning Approach Incorporating Entity Descriptions and TypesLing Li, Lidong Zhu, Weibang Li. 1-6 [doi]
- An Improved Distributed Computing Time-Series Short-term Load Forecasting Pipeline for MV Transmission PlanningHussam Kanaan, Maria Sainz-Ezkerra Galarraga, Mahdi Houchati, Javier Ontañon Ruiz, Santiago Bañales Lopez, Miguel Rodriguez Asensio. 1-7 [doi]
- LRIMa City: A Fog-Computing-Based Smart City with Integrated Self-Driving CarsJihene Rezgui, Enric Soldevila, Abderrazak Mokraoui. 1-7 [doi]
- Network Coding to Reduce Congestion and Improve Memory Buffer in Smart SwitchSouryendu Das, Stavros Kalafatis. 1-6 [doi]
- Malware Detection Issues, Future Trends and Challenges: A SurveyAnas AliAhmad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mohamad Fadli Zolkipli, Mohammed Al-Khalidi. 1-6 [doi]
- New Heuristics Method for Malicious URLs Detection Using Machine LearningJawad Khalife, Fatima Tariq Hussain M. Nassar, Maryam Hamad M. KH Al Marri. 1-6 [doi]
- No Filters: A Deep Dive into Photo Sharing Apps on Android and iOSMohammad Meraj Mirza, Shinelle Hutchinson, Rebecca Gee, Umit Karabiyik. 1-8 [doi]
- MC-YOLOv5: A small target detection model based on YOLOv5Yiming Li, Yanxiu Jin. 1-6 [doi]
- Online Learning Approach for Jammer Detection in UAV Swarms Using Multi-Armed BanditsNoor Khial, Nema Ahmed, Reem Bassam Tluli, Elias Yaacoub, Amr Mohamed 0001. 1-6 [doi]
- A Multi-Agent Multi-Armed Bandit Approach for User Pairing in UAV-Assisted NOMA-NetworksBoniface Uwizeyimana, Osamu Muta, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad, Maha Elsabrouty. 1-6 [doi]
- Detection of Plant Diseases in an Industrial Greenhouse: Development, Validation & ExploitationYassine Lakhdari, Enric Soldevila, Jihene Rezgui, Éric Renault. 1-6 [doi]
- Multi-scale-based Network for Image DehazingChaza Araji, Ayaa Zahra, Leen Alinsari, Maryam Al-aloosi, Omar ElHarrouss, Somaya Al-Máadeed. 1-5 [doi]
- Optimization of Behavioral Model of VO2 Switches Using Slime Mould AlgorithmSaddam Husain, Miras Akhmetov, Damir Kanymkulov, Galymzhan Nauryzbayev, Mohammad S. Hashmi. 1-6 [doi]
- A Study of a Networked Control System under Time DelayHana Mejdi, Sami Elmadssia, Taher Ezzedine. 1-5 [doi]
- Data Collection Using NWDAF Network Function in a 5G Core Network with Real TrafficMattia Quadrini, Cesare Roseti, Francesco Zampognaro, Lorenzo Serranti. 1-7 [doi]
- Leveraging Unsupervised Machine Learning for New Traffic Types Classification in Hybrid Satellite Terrestrial NetworkSaloua Hendaoui, Nawel Zangar. 1-5 [doi]
- Exploring Classification Models for Video Source Device Identification: A Study of CNN-SVM and Softmax ClassifierNajmath Ottakath, Younes Akbari, Somaya Al-Máadeed, Ahmed Bouridane, Fouad Khelifi. 1-6 [doi]
- Topology of $32\times 32$ Butler MatrixMehri Borhani Kakhki, Ahmed Shehata Abdellatif, Hari Krishna Pothula, David Wessel. 1-4 [doi]
- Cross-Platform Compatibility and Power Optimization for the SAWBRID SystemHsuan-Yun Chang, Ahmad Salman. 1-6 [doi]
- AI Generated Content in the Metaverse: Risks and Mitigation StrategiesLamiaa Basyoni, Junaid Qadir 0001. 1-4 [doi]
- Pathway to Prosocial AI-XR Metaverses: A Synergy of Technical and Regulatory ApproachesAliya Tabassum, Ezieddin Elmahjub, Junaid Qadir 0001. 1-8 [doi]
- Performance Study in HetNets Using Dual Connectivity and Deep Reinforcement LearningArwa Amaira, Koubaa Hend, Faouzi Zarai. 1-6 [doi]
- Latest Generation Technologies for Network Coverage in Infrastructure-Less AreasMahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya, Mahamat Charfadine Salim, Mahamat Borgour Hassan. 1-6 [doi]
- A Demonstrable Break of PCBC ModeAlbert H. Carlson, Indira Kalyan Dutta, Bhaskar Ghosh. 1-6 [doi]
- Ghaf Tree Detection from Unmanned Aerial Vehicle Imagery Using Convolutional Neural NetworksGuoxu Wang, Andrew Leoncé, Eran A. Edirisinghe, Tamer Khafaga, Gregory Simkins, Umar Yahya, Moayyed Sher Shah. 1-8 [doi]
- Enhancing Global Model Accuracy: Federated Learning for Imbalanced Medical Image DatasetsKhalid Mahmoud Mohammad Dolaat, Aiman Erbad, Muhammad Ibrar. 1-4 [doi]
- Jamming Detection in Power Line Communications Leveraging Deep Learning TechniquesMuhammad Irfan, Aymen Omri, Javier Hernandez Fernandez, Savio Sciancalepore, Gabriele Oligeri. 1-6 [doi]
- Coded Caching in Request-robust D2D Communication NetworksWuqu Wang, Nan Liu 0001, Wei Kang 0002. 1-6 [doi]
- Slicenet: a Simple and Scalable Flow-Level Simulator for Network Slice Provisioning and ManagementViswanath KumarSkandPriya, Abdulhalim Dandoush, Gladys Diaz. 1-6 [doi]
- Evaluation of Machine Learning Models to Forecast Inflation: Bangladesh as a Case StudyLabiba Binte Ismail, Mahira Ibnath Joytu, Tasnim Islam Plabon, Muhammad Shafayat Oshman. 1-6 [doi]
- Context-Aware Security in the Internet of Things: What We Know and Where We are GoingAsma Alotaibi, Alma Oracevic. 1-8 [doi]
- Secure Electric Vehicle Dynamic Charging Based on Smart ContractsKarima Massmi, Khaled Hamouid, Kamel Adi. 1-6 [doi]
- Asthma Assessment Device for Pediatric Patients: A Proof of ConceptMuneera Al-Ghafran, Fatemeh Ahmadizadeh, Asma Al-Naimi, Khalid Abualsaud, Elias Yaacoub. 1-6 [doi]
- ERITA: Ensuring the Reliability of Internet of Things-Based ApplicationsAnestis Papakotoulas, Anastasios Terzidis, Stathes Hadjiefthymiades. 1-6 [doi]
- Influence of Interference and Sampling Period in the Performance of Networked Control SystemsHana Mejdi, Sami Elmadssia, Taher Ezzedine. 1-5 [doi]
- Data Protection and Data Recovery Plan for IoT Transportation DomainSyed Rizvi, Anthony Hammill, Hans Esteban, Mark Ihnat. 1-8 [doi]
- Sentiment Analysis With Lipschitz Recurrent Neural NetworksMahmudul Hasan, Sachin Shetty. 1-4 [doi]
- Link Analysis and Shortest Path Algorithm for Money Laundry DetectionMansoor Al-Thani, Dena Al-Thani. 1-7 [doi]
- Major CyberSecurity Threats in Healthcare During Covid-19 PandemicViet Minh Nguyen, Abdullah Yasin Nur. 1-8 [doi]
- Performance Analysis of LoRa for Rice Fading ChannelsTakoua Mahjoub, Adel Ben Mnaouer, Hatem Boujemaa, Maymouna Ben Said. 1-6 [doi]
- Exploration of Document-Oriented Stores' Capacities for Managing Community e-Mailing Lists: Elastic Stack as a Case StudyRim Moussa, Riad Ouechtatti, Ahmed Rezgui, Tarek Bejaoui. 1-6 [doi]
- Addressing IoT Security Challenges: A Framework for Determining Security Requirements of Smart Locks Leveraging MQTT-SNHemant Gupta, Amiya Nayak. 1-7 [doi]
- Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection SystemToghrul Garalov, Mohammed Elhajj. 1-7 [doi]
- Bluetooth Just Works: Security and VulnerabilityMohamed Yanis Sadaoui, Sirine Hamza, Osman Salem, Ahmed Mehaoua. 1-5 [doi]
- Anomaly Based Intrusion Detection System: A Deep Learning ApproachSourou Tossou, Miftahul Qorib, Thabet Kacem. 1-6 [doi]
- IoT-Based Local Setup for Interfacing Resource Constrained Devices: A SurveyYashovardhan Bapat, Shreya Aiyer, Akhil A Binu, Chandra Shekar R K, Shubhangi K. Gawali, Lucy J. Gudino, Neena Goveas. 1-6 [doi]
- New In-Air Signature DatasetsAbdulAzeez R. Alobaidi, Thameur Dhieb, Zeina N. Nuimi, Tarek M. Hamdani, Ali Wali, Adel M. Alimi. 1-6 [doi]
- Frequency Domain UWB Receiver Instead of Low Complexity Rake ReceiverTufik M. Buzid, Hisham Sager, Abdeljawad E. Ramadan. 1-4 [doi]
- Face Anti-Spoofing Detection Using Structure-Texture DecompositionDareen Douglas, Nada Ben Hassen, Asmaa Aslam, Omar ElHarrouss, Somaya Al-Máadeed. 1-5 [doi]
- VisualAid+: Assistive System for Visually Impaired with TinyML Enhanced Object Detection and Scene NarrationJayakanth Kunhoth, Mahdi Alkaeed, Adeel Ehsan, Junaid Qadir 0001. 1-8 [doi]
- Performance Analysis of Credit Card Fraud Analysis and Detection Machine Learning AlgorithmsKevin Coello, Kaiyue Zhou, Harsha Nutalapati, Nestor Michael C. Tiglao. 1-6 [doi]
- THz vs. FSO: An Outage Probability and Channel Capacity Performance Comparison StudyMohammad Taghi Dabiri, Mazen O. Hasna, Tamer Khattab. 1-6 [doi]
- Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial NoiseMarcel Fernandez, Grigory Kabatiansky, Ibrahim Kamel, Ying Miao 0001, Tamer F. Rabie. 1-5 [doi]
- ChatGPT backend: A comprehensive analysisAli Belgacem, Abbas Bradai, Kadda Beghdad Bey. 1-6 [doi]
- Smart Environment Monitoring Systems for PM2.5 Prediction Using Deep Learning Models in Smart CityMarwa Faydi, Amira Zrelli, Tahar Ezzedine. 1-6 [doi]
- Arabic Sentiment Analysis of Food Delivery Services ReviewsDheya Mustafa, Safaa M. Khabour, Ahmed S. Shatnawi, Eyad Taqieddin. 1-6 [doi]
- Latency and Cost-Aware Deployment of Dynamic Service Function Chains in 5G NetworksAmrin Karim, Jannatul Ema, Tasnia Yasmin, Palash Roy, Md. Abdur Razzaque. 1-6 [doi]
- Vending Machine Product Demand Prediction Using Machine Learning AlgorithmsUmair Mehmood, Ali Kashif Bashir, Khaled Rabie, John Broderick, Simon Davies. 1-6 [doi]
- User Quality of Experience and Profit Aware Task Allocation in Mobile Device CloudZeneya Sharmin, Palash Roy, Md. Abdur Razzaque. 1-6 [doi]
- Powering HTC Thermometers and LED Lamps with Microwave EnergyMohamed Zied Chaari, Mohamed Abdelfath, Gilroy Philbert Pereira, Rabab Sedrati, Mouad El Moudden, Otman Aghzout. 1-7 [doi]
- Measuring Engagement Through Remote Interactions of Customers: Introducing METRICJinan Y. Azem, Joni Salminen, Soon-Gyo Jung, Bernard J. Jansen. 1-7 [doi]
- Dynamic and Flexible Access Control for IoT-Enabled Smart HealthcareKhaled Hamouid, Mohamed Mohammedi. 1-6 [doi]
- Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic ReviewTarek Ali, Amna Eleyan, Tarek Bejaoui. 1-7 [doi]
- Deep Neural Networks Based Multiclass Animal Detection and Classification in Drone ImageryChangrong Chen, Eran A. Edirisinghe, Andrew Leoncé, Greg Simkins, Tamer Khafaga, Moayyed Sher Shah, Umar Yahya. 1-8 [doi]
- Utilizing Artificial Neural Networks for Predicting Delays and Assessing Contractor Performance in Roadworks ProjectsSaraa N. K. Alasadi, Oula M. H. Fatla. 1-5 [doi]
- Detecting Human Gait Phases and Conditions with Deep LearningSarah Al-Shareeda, Jaafar Al-Jadahsa. 1-6 [doi]
- HealthGlasses Project: WBAN Based Communication for Health Monitoring Through Smart GlassesHend Fourati, Leïla Azouz Saïdane. 1-6 [doi]
- Multimodal Cyber-Harassment DetectionMohamed El Hadi Haouari, Abdelkader Tounsi, Osman Salem, Ahmed Mehaoua. 1-6 [doi]
- Small-Signal Modeling of GaN-on-Diamond HEMT Using ANFIS MethodBagylan Kadirbay, Saddam Husain, Mohammad S. Hashmi. 1-6 [doi]
- U-Net Based Disaster Damage Detection Through Semantic SegmentationNishat Ara Nipa, Yan Lu, Sachin Shetty. 1-5 [doi]
- A Novel Intrusion Detection Scheme Using Variational AutoencodersAbia Amin, Ayalvadi Ganesh 0001, Robert J. Piechocki. 1-7 [doi]
- Real-time Translation of American Sign Language into Text Using Machine LearningRajaa Alqudah, Aya Abugharbieh, Malak Khasawneh, Rasha Harahsheh. 1-6 [doi]
- Still Computers Networking is Less Secure Than It should be, Causes and SolutionYazan Aref, Abdelkader Ouda. 1-8 [doi]
- Piezoelectric Beam Path Modulation for Visible Light CommunicationMatthias Rüb, Jan Herbst, Christoph Lipps, Hans Dieter Schotten. 1-6 [doi]
- Energy-Efficient Routing Using LSTM-Based Deep Learning for Sink Mobility Prediction to Enhance Lifetime and Stability of Wireless Sensor NetworksMohammed F. Suleiman, Usman Adeel. 1-8 [doi]
- Differentially Private All-Pairs Shortest Distances for Low Tree-Width GraphsJavad B. Ebrahimi, Alireza Tofighi Mohammadi, Fatemeh Kermani. 1-6 [doi]
- A Data-Driven Approach to Assessing Digital Transformation Maturity Factors in Government InstitutesMuna Al-Fadhli, Somaya Al-Maadeed, Nuri C. Onat, Abdelhamid Abdessadok. 1-8 [doi]
- On DDoS Attacks as an Expression of Digital Protest in the Russo-Ukrainian War 2022Thomas Hupperich. 1-8 [doi]
- Delay Analysis of Routing Protocols for WSNRahil Bensaid, Adel Ben Mnaouer, Hatem Boujemaa. 1-6 [doi]
- Autonomous Micro-Grids: A Reinforcement Learning-Based Energy Management Model in Smart CitiesErol Özkan 0002, Ibrahim Kök, Suat Özdemir. 1-6 [doi]
- Spectral Efficiency Performance of OTFS Based Multi-Cell SystemsAmit Kumar Pathak, Venkatesh Khammammetti, Saif Khan Mohammed. 1-6 [doi]
- On the Linguistic Limitations of ChatGPT: An Experimental Case StudyMohammed Baziyad, Ibrahim Kamel, Tamer Rabie. 1-6 [doi]
- Deep Neural Network Based Automatic Litter Detection in Desert Areas Using Unmanned Aerial Vehicle ImageryGuoxu Wang, Andrew Leoncé, Hakim Hacid, Eran A. Edirisinghe. 1-8 [doi]
- Packet Filtering and Sampling for Efficient Slow Denial of Service Detection in Resource Scarce IoT NetworksAndy Reed, Laurence S. Dooley, Soraya Kouadri Mostéfaoui. 1-6 [doi]
- Inception Based Deep Learning: Biometric Identification Using Electroencephalography (EEG)Jan Herbst, Jan Petershans, Matthias Rüb, Christoph Lipps, Ann-Kathrin Beck, Joana C. Carmo, Thomas Lachmann, Hans Dieter Schotten. 1-7 [doi]
- ICST Chaotic Mapping for Anti-Prediction Frequency Hopping Sequence GenerationYutong He, Lidong Zhu, Sixi Cheng. 1-5 [doi]
- LSTM-Based Algorithm For Cooperative Communication in Impulse Noise Impaired PLC ChannelFatma Rouissi, Wided Belhaj Sghaier, Héla Gassara, Fethi Tlili. 1-5 [doi]
- Hybrid Machine Learning Model for Predicting NASDAQ Composite IndexZakia Zouaghia, Zahra Kodia Aouina, Lamjed Ben Said. 1-6 [doi]
- OpenPLC and lib61850 Smart Grid Testbed: Performance Evaluation and Analysis of GOOSE CommunicationAhmed Elmasry, Abdullatif Albaseer, Mohamed Abdallah. 1-6 [doi]
- Use of MQTT-SN in Sending Distress Signals in Vehicular CommunicationHemant Gupta, Amiya Nayak. 1-6 [doi]
- The Closure of the Entropy Region is Not Closed Under Polymatroid Duality for Four Discrete Random VariablesJiahong Wu, Nan Liu 0001, Wei Kang 0002. 1-4 [doi]
- Optimal MMSE Processing for Limited-Capacity Radio StripesIoannis Chiotis, Aris L. Moustakas. 1-6 [doi]
- Generalized Probabilistic Clustering Projection Models for Discrete DataSahar Salmanzade Yazdi, Fatma Najar, Nizar Bouguila. 1-7 [doi]
- An Interference Null Widening Algorithm Based on U-V Domain Expansion of Steering VectorYimai Shi, Lidong Zhu, Ean He, Wenjun Shi, Yong Zhang, Wen He, Kun Liu. 1-6 [doi]
- IPattern: Islamic-Inspired Pattern Generation Using Generative Adversarial NetworksMoutaz Saleh, Roudha Al-Rumaihi, Slafa Al-Dulaimi, Alaa Abashar. 1-6 [doi]
- Road Traffic Density Estimation For Adaptive Beam Allocation in an ISAC SetupWesam Al Amiri, Terry N. Guo, Allen B. MacKenzie. 1-6 [doi]
- Digital Forensic Analysis of AGPTEK Smartwatch Application on Android OSClaire Rightley, Umit Karabiyik. 1-8 [doi]
- Human Activity Recognition Using Ambient SensorsKunal Chhatrapati, Kanika Sood, Purva Surve. 1-8 [doi]
- Smart System for a Self-Driving Scooter PrototypeSabiha Yousuf, Roudha Al-Mannai, Bana Al-Naemi, Somaya Al-Máadeed, Naveed Nawaz, Mohamed Zied Chaari. 1-5 [doi]
- Social Engineering in Social Network: A Systematic Literature ReviewAli Adnan Abubaker, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Norliza Katuk, Mohammed Al-Khalidi. 1-7 [doi]
- Hybrid PLS-ML Authentication Scheme for V2I Communication NetworksHala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari. 1-6 [doi]
- New Resource Allocation Schemes in Multi-Cell Environment Based on Non-Orthogonal Multiple Access for Beyond 5G SystemsMarie-Rita Hojeij, Joseph El Assad. 1-6 [doi]
- Comparative Approach in the Gain Study for Two Popular Shapes of S-Band Microstrip Patch Antenna for CubeSatsAmine Bab, Saïah Bekkar-Djelloul-Saïah, Djamel Eddine Baba Hamed, Boualem Nasri, Abdelhak Benikhlef. 1-6 [doi]
- Novel Mathematical Formulation in Time and Space Domains of Transient Scattering Problem Applied to a Parabolic AntennaAuns Khaled, Dorsaf Omri, Taoufik Aguili. 1-6 [doi]
- On Temperature-Dependent Small-Signal Behavioral Modelling of GaN HEMT Using GWO-PSO and WOAKashif Khan, Saddam Husain, Galymzhan Nauryzbayev, Mohammad S. Hashmi. 1-6 [doi]
- ECG Classifiction Based on Federated UnlearningKhaoula ElBedoui. 1-5 [doi]
- Data Driven DRL Model For Home-Energy ControlMariam Fliss R., Mahdi Houchati, Arantxa Ortiz Marina, Santiago Bañales Lopez. 1-7 [doi]
- Connectivity Probability Analysis for VANETs with Big Vehicle ShadowingKenneth Okello, Elijah Mwangi, Ahmed H. Abd El-Malek. 1-6 [doi]
- Study of an Improved Rectenna for RF Energy Harvesting in the ISM Band for Energy-Autonomous IoT Cardio Stimulator ApplicationsYosra Bouchoucha, Dorsaf Omri, Taoufik Aguili. 1-6 [doi]
- Artificial Intelligence for Anomaly Detection in IoMTsMickael Mohammed, Osman Salem, Ahmed Mehaoua. 1-6 [doi]
- Retinal Diseases Classification System Using OCT Images Combined with CNN ModelsFatma Dhaoui, Amira Zrelli. 1-6 [doi]
- High-Throughput Satellite Resource Allocation Strategy Based on OFDMXintong Li, Lidong Zhu, Ke Chu, Wenjun Shi. 1-6 [doi]
- Customer Satisfaction Toward Commercial E-Services in Saudi Arabia: A Sentiment AnalysisDina Banjabi, Nora Almezeini. 1-6 [doi]
- Implementation and Testing of MP-TCP ATSSS in a 5G Multi-Access ConfigurationMattia Quadrini, Domenico Verde, Michele Luglio, Cesare Roseti, Francesco Zampognaro. 1-6 [doi]
- UAV-Assisted Mesh Network for Emergency Communication in Disaster AreasFatima Zahra Rabahi, Saadi Boudjit, Leila Benarous. 1-6 [doi]
- Interpreting Live Video Sign Language and Translate into TextSteven Rico, Kanika Sood, Kevin Hsu, Ethan Trinh. 1-6 [doi]
- Stock Movement Prediction Based On Technical Indicators Applying Hybrid Machine Learning ModelsZakia Zouaghia, Zahra Kodia Aouina, Lamjed Ben Said. 1-4 [doi]
- Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM AutoencoderSajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa Qaraqe, Mohamed Abdallah 0001. 1-6 [doi]
- Contactless Privacy-Preserving Head Movement Recognition Using Deep Learning for Driver Fatigue DetectionHira Hameed, Lubna, Muhammad Usman 0003, Hasan T. Abbas, Ahsen Tahir, Kamran Arshad, Khaled Assaleh 0001, Ahmed Alkhayyat, Muhammad Ali Imran 0001, Qammer H. Abbasi. 1-6 [doi]
- Simple Heuristics For Fast DDoS DetectionJawad Khalife, Almaha Mohammed R. M. Albuainain, Eman Humaid S. H. Al-Ejji. 1-5 [doi]
- A Federated Learning Approach to Banking Loan DecisionsFarag Azzedin, Mustafa Ghaleb, Yasser El-Alfy, Raed Katib, Md. Hossain. 1-7 [doi]
- Signals of Opportunity for Car Density Estimation with Limited Training DataWesam Al Amiri, Omar Abdelsalam, James T. Jones, Terry N. Guo, Allen B. MacKenzie. 1-6 [doi]