Abstract is missing.
- Enhancing Signal Strength and ISI-Avoidance of Diffusion-based Molecular CommunicationOussama Abderrahmane Dambri, Soumaya Cherkaoui. 1-6 [doi]
- Algorithm and Realization of the Key Modules for IQ-Separated Receiver StructureHaoran Hao, Yukui Pei. 7-11 [doi]
- High-Resolution Wideband Digital Channelizer with Adjustable Reconstruction PerformanceWeicheng Ling, Jian Yan 0001, Jianhua Lu. 12-17 [doi]
- A Novel RTRLNN Model for Passive Intermodulation Cancellation in Satellite CommunicationsBizheng Liang, Xiangyuan Bu, Mucheng Li, Pengfei Guo, Celun Liu. 18-23 [doi]
- Joint User Scheduling and PRB Mapping Scheme in Satellite LTE NetworksGbolahan Aiyetoro, Fambirai Takawira. 24-29 [doi]
- Transmission Rate Allocation for Reliable Video Transmission in Aerial Vehicle NetworksLiYue Zhu, Cheng Zhan, Han Hu. 30-35 [doi]
- MO-PR: Message-Oriented Partial-Reliability MPTCP for Real-time Multimedia Transmission in Wireless NetworksJiuren Qin, Changqiao Xu, Hui Huang, Lujie Zhong, Gabriel-Miro Muntean. 36-41 [doi]
- A Distributed Social-Aware Clustering Approach in D2D Multicast CommunicationsLianxin Yang, Dan Wu 0001, Yueming Cai. 42-47 [doi]
- Wi-Live, Adaptive Scenario-Aware Wireless Multicast Solution for Living Streaming Based on Software Defined NetworksTong Qin, Hewu Li, Qian Wu, Naijia Liu, FengHua Li. 48-53 [doi]
- Exploiting heuristic techniques for efficient energy management system in smart gridMuhammad Hassan Rahim, Nadeem Javaid, Sundas Shafiq, Muhammad Nadeem Iqbal, Muhammad Umair Khalid, Ubed Ullah Memon. 54-59 [doi]
- Integration of Cloud and Fog based Environment for Effective Resource Distribution in Smart BuildingsItrat Fatima, Nadeem Javaid, Muhammad Nadeem Iqbal, Isra Shafi, Ayesha Anjum, Ubed Ullah Memon. 60-64 [doi]
- An Improved Cluster Head Selection Algorithm for Wireless Sensor NetworksKhalid A. Darabkh, Jumana N. Zomot. 65-70 [doi]
- A New Fixed Clustering Based Algorithm for Wireless Sensor NetworksKhalid A. Darabkh, Laith Al-Jdayeh. 71-76 [doi]
- Effect of Data Validation Schemes on the Energy Consumptions of Edge Device in IoT /WSNN. A. M. Alduais, J. Abdullah, A. Jamil, Lukman M. Audah, R. Alias. 77-81 [doi]
- QGAC: Quantum Genetic Based-Clustering Algorithm for WSNsDjamila Mechta, Saad Harous. 82-88 [doi]
- Performance of Caching in a Layered CoAP ProxyVojislav B. Misic, Jelena V. Misic. 89-94 [doi]
- A MPTCP-based RTT-aware Packet Delivery Prioritisation Algorithm in AR/VR ScenariosFabio Silva, Diana Bogusevschi, Gabriel-Miro Muntean. 95-100 [doi]
- Fault Tolerance of Real-time Video Streaming Protocols over SDN NetworksShailendra Gaikwad, Sana Tafleen, Raju Gottumukkala, Khalid Elgazzar. 101-107 [doi]
- On the strengthening of the speech encryption schemes for communication systems based on blind source separation approachAnissa Farhati, Anis Ben Aicha, Ridha Bouallegue. 108-111 [doi]
- QoE Prediction for IPTV Based on Imbalanced Dataset by the PNN-PSO algorithmXin Wei 0001, Mengwen Diao, Zhengying Hu, Xiao Hu, Yun Gao, Ruochen Huang. 112-117 [doi]
- Impact of hidden nodes on uplink transmission in IEEE 802.11ax heterogeneous networkM. Zulfiker Ali, Jelena V. Misic, Vojislav B. Misic. 118-123 [doi]
- Service migration versus service replication in Multi-access Edge ComputingPantelis A. Frangoudis, Adlen Ksentini. 124-129 [doi]
- Is the Optimized FFR Interference Avoidance Scheme Challenging the Future HetNets?Jihene Ben Abderrazak, Hichem Besbes. 130-135 [doi]
- A Low-Complexity Scheduling for Joint Unicast and Multicast Transmissions in LTE-A NetworkAbdennaceur Ghandri, Yassine Boujelben, Maher Ben Jemaa. 136-141 [doi]
- On the Impact of Fading on Residual Self-Interference Power of In-Band Full-Duplex Wireless SystemsLuis Irio, Rodolfo Oliveira. 142-146 [doi]
- Decentralized PHY/MAC Design for the Uplink of Multi-Packet Reception Wireless NetworksAntónio Furtado, Rodolfo Oliveira, Luís Bernardo, Rui Dinis. 147-152 [doi]
- Mobility-Aware User Association in HetNets with Millimeter Wave Base StationsCirine Chaieb, Zoubeir Mlika, Fatma Abdelkefi, Wessam Ajib. 153-157 [doi]
- HARQ Performance over FSO Channels with Atmospheric Fading and Pointing ErrorsAbir Touati, Mazen O. Hasna, Farid Touati. 158-163 [doi]
- Relaying in Non-Orthogonal Multiple Access Systems with Simultaneous Wireless Information and Power TransferNouha Dahi, Noureddine Hamdi. 164-168 [doi]
- Wireless Power Transfer in Two-Way AF Relaying with Maximal-Ratio Combining under Nakagami-m FadingUgrasen Singh, Sourabh Solanki, Devendra Singh Gurjar, Prabhat K. Upadhyay, Daniel Benevides da Costa. 169-173 [doi]
- Body Area Networks: Path Loss Modeling and Antenna DesignAmina Nahali, Abdelaziz Hamdi, Rafik Braham. 174-179 [doi]
- QoS-Based Virtualization of User Equipment in 5G Networks (Invited Paper)Slim Zaidi, Oussama Ben Smida, Sofiène Affes, Usa Vilaipornsawai, Liqing Zhang, Peiying Zhu. 180-187 [doi]
- OFDMA-based Hybrid Channel Access for IEEE 802.11ax WLANJorden Lee. 188-193 [doi]
- Design and Implementation of a Hybrid RF-VLC System with Bandwidth AggregationZhouchi Li, Sihua Shao, Abdallah Khreishah, Moussa Ayyash, Iman Abdalla, Hany Elgala, Michael B. Rahaim, Thomas D. C. Little. 194-200 [doi]
- Networked Data Transaction in Mobile Networks: A Prediction-based Approach Using AuctionJun Du, Chunxiao Jiang, Erol Gelenbe, Zhu Han, Yong Ren, Mohsen Guizani. 201-206 [doi]
- Cognitive Data Allocation for Auction-based Data Transaction in Mobile NetworksJun Du, Erol Gelenbe, Chunxiao Jiang, Zhu Han, Yong Ren, Mohsen Guizani. 207-212 [doi]
- Dynamic Learning for Distributed Power Control in Underlaid Cognitive Radio NetworksAli Taleb Zadeh Kasgari, Behrouz Maham, Hamed Kebriaei, Walid Saad. 213-218 [doi]
- Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep LearningMohammad Ashrafuzzaman, Yacine Chakhchoukh, Ananth A. Jillepalli, Predrag T. Tosic, Daniel Conte de Leon, Frederick T. Sheldon, Brian K. Johnson. 219-225 [doi]
- HESTIA: Adversarial Modeling and Risk Assessment for CPCSAnanth A. Jillepalli, Daniel Conte de Leon, Mohammad Ashrafuzzaman, Yacine Chakhchoukh, Brian K. Johnson, Frederick T. Sheldon, Jim Alves-Foss, Predrag T. Tosic, Michael A. Haney. 226-231 [doi]
- Task Proactive Caching Based Computation Offloading and Resource Allocation in Mobile-Edge Computing SystemsHongyu Zhao, Ying Wang, Ruijin Sun. 232-237 [doi]
- Constrained Time-Critical Routing For Multiple Mobile AgentsOla Felemban, Shaoen Wu. 238-242 [doi]
- Throughput Analysis for Full-duplex Sensing in Non-time-slotted Cognitive Radio NetworkJingwen Zhang, Fanggang Wang, Zhangdui Zhong. 243-248 [doi]
- A Simple Approach for Securing IoT Data Transmitted over Multi-RATsRida Diba, Elias Yaacoub, Mohammed Al-Husseini, Hassan Noura, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani. 249-254 [doi]
- Towards a Streaming Approach to the Mitigation of Covert Timing ChannelsOmar Darwish, Ala I. Al-Fuqaha, Ghassen Ben Brahim, Ilyes Jenhani, Muhammad T. Anan. 255-260 [doi]
- Improving the Secrecy of Distributed Storage Systems using Interference AlignmentNatasha Paunkoska, Venceslav Kafedziski, Ninoslav Marina. 261-266 [doi]
- C-DIDS: A Cooperative and Distributed Intrusion Detection System in Cloud environmentSaadia Ghribi, Amel Meddeb-Makhlouf, Faouzi Zarai. 267-272 [doi]
- Biometric-based Per-Packet Authentication Techniques in Communication NetworksIhsen Nakouri, Mohamed Hamdi, Tai-Hoon Kim. 273-278 [doi]
- Multi-Objective Virtual Machine Placement Algorithm Based on Particle Swarm OptimizationKhaoula Braiki, Habib Youssef. 279-284 [doi]
- Radio Data Transmission Reduction in Power-Constrained WSNKoffi V. C. Kevin de Souza, Jalal Almhana, Philippe Fournier-Viger. 285-290 [doi]
- An Overview of the Internet of Things Closed Source Operating SystemsAya Al-Sakran, Mahmoud H. Qutqut, Fadi Almasalha, Hossam S. Hassanein, Mohammad Hijjawi. 291-297 [doi]
- En-Route Data Filtering Technique for Maximizing Wireless Sensor Network LifetimeHassan Harb, Abdallah Makhoul, Chady Abou Jaoude. 298-303 [doi]
- BFAN: A Bloom Filter-Based Authentication in Wireless Sensor NetworksBacem Mbarek, Nabil Sahli, Nafaâ Jabeur. 304-309 [doi]
- Coverage and Connectivity of WSN Models for Health Open-Pit Mines MonitoringJridi Mohamed Hechmi, Amira Zrelli, Mohamed Kbida, Hacen Khlaifi, Tahar Ezzedine. 310-315 [doi]
- Wireless Sensor Network Localization Problem by Hybridized Moth Search AlgorithmIvana Strumberger, Eva Tuba, Nebojsa Bacanin, Marko Beko, Milan Tuba. 316-321 [doi]
- Channel Assignment for D2D communication : A Regret Matching Based ApproachSafae Lhazmir, Abdellatif Kobbane, Jalel Ben-Othman. 322-327 [doi]
- Detection and Analysis Algorithms of punctual road events from vehicular data in the search for the optimal route An Overview of the AMNAM platformJihene Rezgui, Pascal Dally-Belanger, Philippe Rivest. 328-333 [doi]
- An Optimization-based mTSP Clustering Algorithm for Wireless Sensor NetworksJianxin Ma, Shuo Shi, Xuemai Gu. 334-338 [doi]
- Joint Optimization of Sample Capacity and Access Point by Hypothesis Test for Indoor LocalizationYacong Wei, Xiaolong Geng. 339-344 [doi]
- Joint Optimization of Resource and Power Allocation in Heterogeneous Urban Dense Cellular NetworksAmira Bezzina, Mouna Ayari, Rami Langar, Leïla Azouz Saïdane. 345-351 [doi]
- Performance Modeling of IEEE 802.15.4-TSCH with Shared Access and ON-OFF trafficSahar Ben Yaala, Fabrice Theoleyre, Ridha Bouallegue. 352-357 [doi]
- Deep learning and low rank dictionary model for mHealth data classificationAhmed Ben Said, Amr Mohamed, Tarek Elfouly, Khalid Abualsaud, Khaled A. Harras. 358-363 [doi]
- Classification for Imperfect EEG Epileptic Seizure in IoT applications: A Comparative StudyKhalid Abualsaud, Amr Mohamed, Tamer Khattab, Elias Yaacoub, Mazen O. Hasna, Mohsen Guizani. 364-369 [doi]
- Convolutional Autoencoder Approach for EEG Compression and Reconstruction in m-Health SystemsAbeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad. 370-375 [doi]
- Wearables with Heart Rate Monitors and Dynamic Workout PlansAntonio Ferreira, Jorge Coelho 0001, Nuno Nogueira. 376-381 [doi]
- BDTMS: Binomial Distribution-based Trust Management Scheme for Healthcare-oriented Wireless Sensor NetworkWeidong Fang, Chunsheng Zhu, Wei Chen, Wuxiong Zhang, Joel J. P. C. Rodrigues. 382-387 [doi]
- On Delay-Sensitive Healthcare Data Analytics at the Network Edge Based on Deep LearningZubair Md. Fadlullah, Al-Sakib Khan Pathan, Haris Gacanin. 388-393 [doi]
- Enhancing E-Healthcare Privacy Preservation Framework through L-DiversityAdeel Shah, Haider Abbas, Waseem Iqbal, Rabia Latif. 394-399 [doi]
- A Low Complexity Communication Technique for Mobile-to-Mobile Communication SystemsPetros S. Bithas, Athanasios G. Kanatas, Daniel B. da Costa, Prabhat Kumar Upadhyay. 400-405 [doi]
- Sparse Channel Estimation for MIMO Systems based on Time-Domain Training Sequence OptimizationXu Ma 0003, Fang Yang, Ling Cheng 0001, Jian Song. 406-411 [doi]
- Low Complexity Hybrid Precoding Algorithm for GenSM Aided mmWave MIMO SystemsZhilin Lu, Longzhuang He, Jintao Wang, Jian Song. 412-417 [doi]
- Energy Efficient Hybrid Precoding for Cooperative Multicell Multiuser Massive MIMO Systems with Multiple Base Station AssociationImran Akhtar, Lixin Li, Fucheng Yang, Xu Li, Ang Gao, Wei Chen, Zhu Han. 418-423 [doi]
- An Efficient Blind CFO Estimation Technique for MIMO-OFDM Systems Using Space-time DiversityManish Kumar, Sudhan Majhi. 424-429 [doi]
- Secrecy Outage Analysis by Applying Bi-directional Beamforming in Underlay MIMO-CRNNibedita Nandan, Sudhan Majhi. 430-434 [doi]
- Geometrical Model for Point-to-Point Multi-Polarized Massive MIMO SystemsXudong Cheng, Yejun He. 435-439 [doi]
- Deep Reinforcement Learning based Distributed Resource Allocation for V2V BroadcastingHao Ye, Geoffrey Ye Li. 440-445 [doi]
- Multi-Destination Computation Offloading in Vehicular NetworksSiqi Mu, Zhangdui Zhong, Minming Ni. 446-451 [doi]
- Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing EnvironmentJoelle Klaimi, Sidi-Mohammed Senouci, Mohamed Ayoub Messous. 452-457 [doi]
- A Functional Complexity Framework for Dynamic Resource Allocation in VANETsKunal Pattanayak, Aritra Chatterjee 0002, Merim Dzaferagic, Suvra Sekhar Das, Nicola Marchetti. 458-463 [doi]
- Proposal of More Accurate Energy Model of Electric Vehicle For SUMOInsaf Sagaama, Amine Kchiche, Wassim Trojet, Farouk Kamoun. 464-469 [doi]
- WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning TechniquesRim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith. 470-475 [doi]
- DTW based Authentication for Wireless Medical Device SecurityHeena Rathore, Abdulla K. Al-Ali, Amr Mohamed, Xiaojiang Du, Mohsen Guizani. 476-481 [doi]
- Reliable Fully Homomorphic Disguising Matrix Computation Outsourcing SchemeYonghui Chen, Bo Gu, Cheng Zhang 0007, Hongzhang Shu. 482-487 [doi]
- Adaptive Biometric Strategy using Doddington Zoo Classification of User's Keystroke DynamicsAbir Mhenni, Estelle Cherrier, Christophe Rosenberger, Najoua Essoukri Ben Amara. 488-493 [doi]
- A Whole-Home Level Intrusion Detection System using WiFi-enabled IoTYue Jin, Zengshan Tian, Mu Zhou, Ze Li, Zhenyuan Zhang. 494-499 [doi]
- Secure Data Management in P2P Social Networks Using Access TokensMohammed Hamed Al-Amin, Mohamed Shaheen Elgamel, Ayman Abdel-Hamid. 500-505 [doi]
- Non-Negative Matrix Factorization (NMF) for outlier detection in Wireless Sensor NetworksHamoud Alshammari, Oussama Ghorbel, Mohammed Aseeri, Mohamed Abid. 506-511 [doi]
- A Module for Protecting Data Location Privacy on Mobile DevicesFatima Makki, Wassim El-Hajj, Haïdar Safa, Abbas Alhakim. 512-517 [doi]
- On the Collaborative Inference of DDoS: An Information-theoretic Distributed ApproachFatima Ezzahra Ouerfelli, Khaled Barbaria, Elias Bou-Harb, Claude Fachkha, Belhassen Zouari. 518-523 [doi]
- Enhancing Wireless Intrusion Detection Using Machine Learning Classification with Reduced Attribute SetsRazan Abdulhammed, Miad Faezipour, Abdelshakour A. Abuzneid, Ali Alessa. 524-529 [doi]
- A Model of Role-Risk Based Intrusion Prevention for Cloud EnvironmentWided Ben Daoud, Amel Meddeb-Makhlouf, Faouzi Zarai. 530-535 [doi]
- Towards Predicting Cyber Attacks Using Information Exchange and Data MiningMartin Husák, Jaroslav Kaspar. 536-541 [doi]
- Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?Martin Lastovicka, Antonin Dufka, Jana Komárková. 542-547 [doi]
- Correlation for efficient anomaly detection in medical environmentMbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh. 548-553 [doi]
- A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc NetworksMaha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi. 554-559 [doi]
- Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A SurveyGaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho. 560-565 [doi]
- On the effect of misalignment fading in DF dual-hop hybrid FSO/RF system using MPPM coding method under GG Channel turbulence modelHechmi Saidi, Noureddine Hamdi. 566-570 [doi]
- Effect of Annotation on Multiple-Player-Tracking AlgorithmsAfnan Al-Ali, Somaya Al-Máadeed. 571-576 [doi]
- Analysis of the Channel Capacity With Shadowing Fading in VANETChenguang He, Kaiyu Zhang, Shouming Wei. 577-581 [doi]
- Efficient Multi Objective Cross Layer Approach for 802.11e over MANETsMahadev A. Gawas, Mridini M. Gawas. 582-587 [doi]
- MoT: A Deterministic Latency MAC Protocol for Mission-Critical IoT ApplicationsGalal Hassan, Hossam S. Hassanein. 588-593 [doi]
- Cost-efficient Multi-tasking in Coverage-aware Mobile Crowd SensingRawan F. El Khatib, Nizar Zorba, Hossam S. Hassanein. 594-599 [doi]
- Automatic charging of an energy harvesting powered sensor node from controllable energy sourceJuha Petäjäjärvi, Jarkko Kaleva, Konstantin Mikhaylov, Heikki Pulkkinen, Jukka Ahola, Max Bjorkgren. 600-605 [doi]
- Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area NetworksAmel Arfaoui, Asma Ben Letaifa, Ali Kribeche, Sidi-Mohammed Senouci, Mohamed Hamdi. 606-611 [doi]
- A Cross-Layer Adaptive Routing for Wireless Mesh NetworksTong Liu, Shuo Shi, Xuemai Gu. 612-617 [doi]
- Fog-assisted Congestion Avoidance Scheme for Internet of VehiclesShumayla Yaqoob, Ata Ullah, Muhammad Akbar, Muhammad Imran 0001, Mohsen Guizani. 618-622 [doi]
- Contrasting MISO Schemes for IM/DD FSO Communications with Photon-Counting ReceiversChadi Abou-Rjeily, Rami Mawla. 623-628 [doi]
- FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light CommunicationsOzgur Yildiz, Burhan Gulbahar. 629-635 [doi]
- Orbital Angular Momentum Multiplexing for Free-space Quantum Key Distribution Impaired by TurbulenceYu Chen, Shenjie Huang, Majid Safari. 636-641 [doi]
- A Novel VLC Attocell Network Structure Using Superimposed Optical-OFDMZhi Li, Chao Zhang. 642-647 [doi]
- Towards Better Understanding the Challenges of Reliable and Trust-Aware Critical Communications in the Aftermath of DisasterMilena Radenkovic, Adam Walker, Li Bai. 648-653 [doi]
- Online Energy Restoration by a Mobile Robot in a Ring of SensorsEman Omar, Paola Flocchini, Nicola Santoro. 654-659 [doi]
- Fine-to-Coarse Multiscale Permutation Entropy for Rolling Bearing Fault DiagnosisZhiqiang Huo, Yu Zhang, Lei Shu 0001. 660-665 [doi]
- Lifetime Maximization for Pipeline Monitoring based on Data Aggregation and Bio-inspired Clustering AlgorithmMaroua Abdelhafidh, Mohamed Fourati, Lamia Chaari Fourati, Adel Ben Mnaouer, Mokhtar Zid. 666-671 [doi]
- PA-RPL: A Partition Aware IoT Routing Protocol For Precision AgricultureKarim FathAllah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane. 672-677 [doi]
- Survey of Optical Sensors for Strain Monitoring in Underground MiningAmira Zrelli, Hamadi Larthani, Tahar Ezzedine. 678-682 [doi]
- Developing a Self-Powered Enlarging Smart Waste BinNesreen Alsbou, Mohamed Abdul Samad, Mohammed Alhashem, Alaeddin S. A. Abuabed. 683-689 [doi]
- Poly-parametric performance evaluation of mobility models for clustering Wireless Mobile Sensor NetworksMaria Iloridou, Fotini-Niovi Pavlidou. 690-695 [doi]
- DEEP: Delay and energy efficient proactive routing protocol for event-driven WSNsSoumaya Argoubi, Karima Maâlaoui, Leïla Azouz Saïdane, Rihab Boussada. 696-701 [doi]
- Q-Learning for energy balancing and avoiding the void hole routing protocol in underwater sensor networksNadeem Javaid, Obaida Abdul Karim, Arshad Sher, Muhammad Imran 0001, Ansar-Ul-Haque Yasar, Mohsen Guizani. 702-706 [doi]
- An Improved Reactive Routing Protocol over Mobile Ad-hoc NetworksKhalid A. Darabkh, Mohammad S. E. Judeh. 707-711 [doi]
- A New Density-Based Relaying Protocol for Wireless Sensor NetworksKhalid A. Darabkh, Saja M. Odetallah, Zouhair Al-qudah, Ala F. Khalifeh. 712-717 [doi]
- Energy Efficient Sink Placement in Wireless Sensor Networks by Brain Storm Optimization AlgorithmEva Tuba, Dana Simian, Edin Dolicanin, Raka Jovanovic, Milan Tuba. 718-723 [doi]
- On Secrecy Bounds of MIMO Wiretap Channels with ZF detectorsLong Kong, Georges Kaddoum, Daniel Benevides da Costa, Elias Bou-Harb. 724-729 [doi]
- Secrecy Capacity for Multi-Antenna Wireless-Powered AF Relaying SystemsAbdelhamid Salem, Leila Musavian. 730-735 [doi]
- On the Average Secrecy Outage Rate and Average Secrecy Outage Duration of Wiretap Channels with Rician FadingMonir Abughalwa, Aymen Omri, Mazen O. Hasna. 736-740 [doi]
- Secure two-user AF relaying networks using cooperative jammingWalid Mallat, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati. 741-746 [doi]
- Multi Criteria Automatic Generation of Optimal Routing for WSNAnis Mezni, Emil Dumitrescu, Éric Niel, Samir Ben Ahmed. 747-752 [doi]
- Sparsity Order Estimation Algorithm In Compressed Sensing by Exploiting Slope AnalysisYulong Gao, Yanling Si, Baoqi Zhu, Yuming Wei. 753-756 [doi]
- Cross-Layer Design Approach Based Packet Scheduling in Next Generation Wireless NetworksSibonelo Xulu, Gbolahan Aiyetoro. 757-761 [doi]
- A new protocol for an efficient and green biometric-based security key establishment in WBAN'sAmal Sammoud, Omessaad Hamdi, Mohamed Aymen Chalouf, Ammar Bouallegue. 762-767 [doi]
- Performance Analysis of Beamforming Algorithms In Physical Layer SecurityCiyuan Gao, Shuai Han, Xuedong Wang, Weixiao Meng, Fang Gao. 768-773 [doi]
- A Privacy-Preserving Scheme Using Chaos Theory for Wireless Body Area NetworkNeila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim. 774-779 [doi]
- 3D indoor redeployment in IoT collection networks: a real prototyping using a hybrid PI-NSGA-III-VFSami Mnasri, Nejah Nasri, Adrien van den Bossche, Thierry Val. 780-785 [doi]
- A new Infrastructure as a Service for IoT-CloudSarra Hammoudi, Zibouda Aliouat, Saad Harous. 786-792 [doi]
- Context-aware Automatic Access Policy Specification for IoT EnvironmentsAshraf Alkhresheh, Khalid Elgazzar, Hossam S. Hassanein. 793-799 [doi]
- Popularity-Based Cache Placement for Fog NetworksIbrahim Althamary, Chih-Wei Huang, Phone Lin, Shun-Ren Yang, Chien-Wei Cheng. 800-804 [doi]
- A Double Auction-Based Approach for Multi-User Resource Allocation in Mobile Edge ComputingYanlin Yue, Wen Sun 0004, Jiajia Liu. 805-810 [doi]
- Efficient Resource Provisioning for Smart Buildings Utilizing Fog and Cloud Based EnvironmentAnila Yasmeen, Nadeem Javaid, Obaid Ur Rehman, Hina Iftikhar, Muhammad Faizan Malik, Fatima J. Muhammad. 811-816 [doi]
- A Secure and Privacy-Preserving Solution for IoT over NDN Applied to E-healthRihab Boussada, Balkis Hamdane, Mohamed Elhoucine Elhdhili, Soumaya Argoubi, Leïla Azouz Saïdane. 817-822 [doi]
- On the Achievable Degrees of Freedom of a Relay Aided X-ChannelDuaa Abumaali, Ahmed Badawy, Tamer Khattab. 823-827 [doi]
- A Consensus-based Distributed Clock Synchronization for Wireless Sensor NetworkLin Zhu, Shuo Shi, Xuemai Gu. 828-832 [doi]
- Improvement of Target Discrimination for Monitoring Area Application by a New Proposed Network Design of WSNHacen Khlaifi, Jridi Mohamed Hechmi, Amira Zrelli, Tahar Ezzedine. 833-838 [doi]
- A New Insight Towards Buffer-Aided Relaying in Cooperative Wireless NetworksHina Nasir, Nadeem Javaid, Waseem Raza, Muhammad Imran 0001, Muhammad Shoaib 0005. 839-844 [doi]
- Simultaneous Wireless Information and Power Transfer for Buffer-Aided Cooperative Relaying SystemsHina Nasir, Nadeem Javaid, Muhammad Imran 0001, Muhammad Shoaib 0005, Mehmoon Anwar. 845-849 [doi]
- Buffer Occupancy Based Link Prioritization for Cooperative Wireless NetworksWaseem Raza, Nadeem Javaid, Hina Nasir, Muhammad Imran 0001, Ansar-Ul-Haque Yasar. 850-855 [doi]
- Cyclic Spectrum Estimation Under Compressive Sensing by the Strip Spectral Correlation AlgorithmYulong Gao, Song Wang, Yanping Chen, Yuming Wei. 856-860 [doi]
- Green Distributed Cloud Services Provisioning in SDN-enabled Cloud EnvironmentKhaled Alhazmi, Abdallah Moubayed, Abdallah Shami. 861-867 [doi]
- Age of Information as a QoS Metric in a Relay-Based IoT Mobility SolutionAnderson Augusto Simiscuka, Gabriel-Miro Muntean. 868-873 [doi]
- Dual Metric scheduling based on Quality of service and Power Control for network assisted D2D communicationsFatma Loussaief, Marouane Hend, Koubaa Hend, Faouzi Zarai. 874-879 [doi]
- Understanding Complementary Multi-layer Collaborative Heuristics for Adaptive Caching in Heterogeneous Mobile Opportunistic NetworksVu San Ha Huynh, Milena Radenkovic. 880-885 [doi]
- ThingsGame: when sending data rate depends on the data usefulness in IoT networksBouziane Brik, Moez Esseghir, Leïla Merghem-Boulahia, Hichem Snoussi. 886-891 [doi]
- On the Effect of Traffic and Road Conditions on the Drivers' Behavior: A Statistical AnalysisAbdalla Abdelrahman, najah abu ali, Hossam S. Hassanein. 892-897 [doi]
- Priority based Algorithm for Traffic Intersections Streaming Using VANETMohamed Akram Ameddah, Bhaskar Das, Jalal Almhana. 898-903 [doi]
- Data Gathering for Internet of Vehicles SafetyChahrazed Ksouri, Imen Jemili, Mohamed Mosbah, Abdelfettah Belghith. 904-909 [doi]
- An Online Time Warping based Map Matching for Vulnerable Road Users' SafetyEsubalew Alemneh, Sidi-Mohammed Senouci, Philippe Brunet. 910-915 [doi]
- A Multilevel Authentication Protocol (MAP) for Human Safety in VANETNesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed. 916-921 [doi]
- Deployment of Secure EV Charging System Using Open Charge Point ProtocolBinod Vaidya, Hussein T. Mouftah. 922-927 [doi]
- The 3D indoor deployment in DL-IoT with experimental validation using a particle swarm algorithm based on the dialects of songsSami Mnasri, Nejah Nasri, Thierry Val. 928-933 [doi]
- Methodical Detection Of Pesticide Residues Using PotentiostatGeorge Suciu, Vlad Poenaru, Alexandru Drosu, Carmen Nadrag, Sebastien Mirambet. 934-937 [doi]
- A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network TelescopesFarooq Shaikh, Elias Bou-Harb, Jorge Crichigno, Nasir Ghani. 938-943 [doi]
- Effects of Wireless Power Transfer on LoRaWAN Join ProcedureSyed Muhammad Danish, Hassaan Khaliq Qureshi, Sobia Jangsher, Marios Lestas. 944-949 [doi]
- Scratch Analysis Tool(SAT): A Modern Scratch Project Analysis Tool based on ANTLR to Assess Computational Thinking SkillsZhong Chang, Yan Sun 0004, Tin Yu Wu, Mohsen Guizani. 950-955 [doi]
- Alternatives to Binary Routing Policies Applied to a Military MANET CoalitionFlorian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse. 956-961 [doi]
- Practical Compressed Sensing and Network Coding for Intelligent Distributed Communication NetworksMaroua Taghouti, Anil Kumar Chorppath, Tobias Waurick, Frank H. P. Fitzek. 962-968 [doi]
- Congestion control dependability assessmentMaroua Belkneni, Mohamed Taha Bennani, Samir Ben Ahmed, Ali Kalakech. 969-974 [doi]
- Indoor Environment Blind Zone Recognition using Fractional Fourier TransformShaochuan Wu, Xiaokang Zhou, Yuming Wei, Yanwu Song. 975-980 [doi]
- The Prediction of Heart Rate During Running Using Bayesian Combined PredictorHaibin Zhang, Bo Wen, Jiajia Liu. 981-986 [doi]
- Channel Estimation for FBMC/OQAM with Fast Fading Channels by Kalman FilterShaochuan Wu, Xiaoqing Liu, Yuming Wei, Xu Bai. 987-992 [doi]
- A mixed integer linear programming based optimal home energy management scheme considering grid-connected microgridsSheraz Aslam, Nadeem Javaid, Muhammad Asif Raza, Umar Iqbal, zafar iqbal, Mian Ahmer Sarwar. 993-998 [doi]
- Energy Efficiency Analysis of Centralized-Synchronous LoRa-based MAC ProtocolsGalal Hassan, Mohamed ElMaradny, Mohamed A. Ibrahim, Abdulmonem M. Rashwan, Hossam S. Hassanein. 999-1004 [doi]
- Spectrum Sensing of DVB-T2 Signals using a Low Computational Noise Power EstimationOluyomi Simpson, Yusuf Abdulkadir, Yichuang Sun, Mohamad Cheikh. 1005-1010 [doi]
- Energy Harvesting Multi-path Routing for Wireless Multimedia Nanosensor Networks in Terahertz BandJuan Xu, Jiaolong Jiang, Zhiyu Wang, Yakun Zhao. 1011-1017 [doi]
- Cloud-Based platform for enhancing energy consumption awareness and substantiating the adoption of energy efficiency measures within SMEsGeorge Suciu, Lucian Necula, Victor Suciu, Yasemin Curtmola. 1018-1023 [doi]
- Time-Dependent Pricing for On-Demand Bandwidth Slicing in Software Defined NetworksBo Gu, Junhao Feng, Zhenyu Zhou, Mohsen Guizani. 1024-1029 [doi]
- A Discrete Time Queueing Model of Cognitive Radio Networks with Multi-Modal Overlay/Underlay Switching Service LevelsAttahiru Sule Alfa, Haitham Abu-Ghazaleh, Bodhaswar T. Maharaj. 1030-1035 [doi]
- The Selective Clustering Energy Detector for Cognitive Radio Networks - Conceptual Design and Experimental AssessmentChristopher Kohlstruck, Markus Engel, Reinhard Gotzhein. 1036-1042 [doi]
- Optimizing communication costs based on novel cooperative localization techniques using coalitional game theory in wireless networksKaouther Hedhly, Mohamed Laaraiedh, Fatma Abdelkefi, Mohamed Siala 0001. 1043-1046 [doi]
- Bargaining-Based Cooperative Co-existence Framework for LTE-U SystemsMohamed Abdelraheem. 1047-1052 [doi]
- Cycle-Based Routing Protocol for Device-to-Device Group CommunicationsMarwa Dammak, Yassine Boujelben, Noura Sellami. 1053-1058 [doi]
- Adaptive Coverage Solution In Multi-UAVs Emergency Communication System: A Discrete-Time Mean-Field GameKaiyuan Xue, Zihe Zhang, Lixin Li, Huisheng Zhang, Xu Li, Ang Gao. 1059-1064 [doi]
- Secured IoT Gateway For Smart Nation ApplicationsPaul Loh Ruen Chze, Kan Siew Leong, Ang Khoon Wee, Elizabeth Sim, Ee-May Kan, Yong Jun Jie, Hing Siew Wing. 1065-1068 [doi]
- Security Challenges Against Cognitive IoT DevelopmentLamia Chaari Fourati, Mohamed Fourati, Adel Ben Mnaouer. 1069-1073 [doi]
- An Innovative Four-Quarter IoT Secure Architecture Based on Secure ElementPascal Urien. 1074-1080 [doi]
- Hardware based Two-Factor User Authentication for the Internet of ThingsMehdi Akbari Gurabi, Omar Alfandi, Arne Bochem, Dieter Hogrefe. 1081-1086 [doi]
- Game-Based Adaptive Risk Management in Wireless Body Area NetworksAmel Arfaoui, Ali Kribeche, Sidi-Mohammed Senouci, Mohamed Hamdi. 1087-1093 [doi]
- A Kosambi-Karhunen-Loève Learning Approach to Cooperative Spectrum Sensing in Cognitive Radio NetworksOluyomi Simpson, Yusuf Abdulkadir, Yichuang Sun, Pan Cao. 1094-1098 [doi]
- A Comparative Study on the Capacity of SCMA and LDSMAShuang Chen, Kewu Peng, Yushu Zhang, Jian Song. 1099-1103 [doi]
- Selection of UE-based Virtual Small Cell Base Stations using Affinity Propagation ClusteringPravati Swain, Christophoros Christophorou, Upasana Bhattacharjee, Cristiano M. Silva, Andreas Pitsillides. 1104-1109 [doi]
- DAS Modifications for More Efficient Network Cost in 5GChristos Bouras, Anastasia Kollia, Andreas Papazois. 1110-1115 [doi]
- Asymptotic Analysis for NOMA over Fading Channel without CSITYushu Zhang, Kewu Peng, Shuang Chen, Jian Song. 1116-1120 [doi]
- Multihop Stability Analysis for Linear Adaptive Vehicular NetworksAnil Wagle, Marios Lestas, Chrysostomos Chrysostomou. 1121-1126 [doi]
- Modeling FlexRay macrotick generation process using Coloured Petri NetsHana Mejdi, Salem Hasnaoui. 1127-1130 [doi]
- DQ-EDCA: Dynamic Queue Management Based EDCA Mechanism for Vehicle CommunicationHaibin Zhang, Wanqing Tian, Jiajia Liu. 1131-1136 [doi]
- Outage Analysis of a Dual Relay SWIPT System in Hybrid Forwarding SchemesFarhan Nawaz, Syed Ali Hassan, Sajid Saleem. 1137-1141 [doi]
- Non-Orthogonal Multiple Access for Vehicular Networks based Software-Defined RadioRafik Zitouni, Samir Tohmé. 1142-1147 [doi]
- Enhancing Mobile User Performance Through Data Caching Over Edge Computing Wireless NetworksMuhammad Sheraz, Fang Wang, Yong Li. 1148-1153 [doi]
- A Cloud-Fog-Based Smart Grid Model for Efficient Resource UtilizationSaman Zahoor, Nadeem Javaid, Asif Khan, Bibi Ruqia, Fatima J. Muhammad, Maida Zahid. 1154-1160 [doi]
- Risk-based Decision for a Distributed and Cooperative network policy in Cloud ComputingFerdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai. 1161-1166 [doi]
- Analyzing Traces from a Google Data CenterPascale Minet, Eric Renault, Ines Khoufi, Selma Boumerdassi. 1167-1172 [doi]
- Resource Allocation using Fog-2-Cloud based Environment for Smart BuildingsSakeena Javaid, Nadeem Javaid, Sahrish Khan Tayyaba, Norin Abdul Sattar, Bibi Ruqia, Maida Zahid. 1173-1177 [doi]
- Multi-Path Routing for Maximum Bandwidth with K Edge-Disjoint PathsTao Wang, Chase Q. Wu, Yongqiang Wang, Aiqin Hou, Huiyan Cao. 1178-1183 [doi]
- A User Association and Energy Efficiency Analysis of D2D Communication under HetNetsAmal Algedir, Hazem H. Refai. 1184-1190 [doi]
- Small Base Station Management - Improving Energy Efficiency in Heterogeneous NetworksDongfeng Fang, Feng Ye, Yi Qian, Hamid Sharif. 1191-1196 [doi]
- Power Allocation for SCMA Downlink Systems Based on Maximum Energy EfficiencyYiteng Huang, Shuai Han, Shizeng Guo, Weixiao Meng, Cheng Li 0005. 1197-1202 [doi]
- Adaptive Transmission Policy for Energy Harvesting Relaying systemsAbdelhamid Salem, Leïla Musavian. 1203-1207 [doi]
- Performance Analysis of Energy Harvesting based scheme for 3-D Cellular NetworksSoumaya Bachtobji, Aymen Omri, Kais Hassan, Ridha Bouallegue, Kosai Raoof. 1208-1212 [doi]
- Energy Efficient Prioritized Bandwidth Allocation Algorithm Supporting RF Energy ChargingYitian Zhang, Kun Yang, Xiaofeng Lu. 1213-1218 [doi]
- Reliable Energy-Efficient Routing Algorithm for Vehicle-Assisted Wireless Ad-Hoc NetworksMeidong Huang, Bin Yang, Xiaohu Ge, Wei Xiang, Qiang Li. 1219-1224 [doi]
- Optimal Placement of a UAV to Maximize the Lifetime of Wireless DevicesHazim Shakhatreh, Abdallah Khreishah. 1225-1230 [doi]
- Utilization of Wavelet Packet Sensor De-noising for Accurate Positioning in Intelligent Road ServicesAmr S. El-Wakeel, Aboelmagd Noureldin, Hossam S. Hassanein, Nizar Zorba. 1231-1236 [doi]
- An Alternative Data Gathering of the Air Pollutants In the Urban Environment using LoRa and LoRaWANHaiahem Rahim, Cherif Ghazel, Leïla Azouz Saïdane. 1237-1242 [doi]
- Service-Oriented Big Data Analytics for Improving Buildings Energy Management in Smart CitiesNader Mohamed, Jameela Al-Jaroodi, Imad Jawhar. 1243-1248 [doi]
- Cloud based mobile application for remote control of intelligent wheelchairAgnes Ghorbel, Sabri Bouguerra, Nader Ben Amor, Mohamed Jallouli. 1249-1254 [doi]
- Advanced Measurement of Road Traffic Information in City EnvironmentsTawfiq Nebbou, Mohamed Lehsaini, Hacène Fouchal. 1255-1260 [doi]
- A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable FunctionsAshwija Reddy Korenda, Fatemeh Afghah, Bertrand Cambou. 1261-1266 [doi]
- Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M DevicesHassan Noura, Reem Melki, Ali Chehab, Mohammad M. Mansour, Steven Martin 0001. 1267-1272 [doi]
- UAV-based Semi-Autonomous Data Acquisition and ClassificationAhmed Mohamed Hussain, Sherif B. Azmy, Ahmed Abuzrara, Khalid Al-Hajjaji, Abdelmonem Hassan, Husain Khamdan, Mouadh Ezzin, Abdelhakim El Hassani, Nizar Zorba. 1273-1277 [doi]
- Ant Colony Optimization based Relay Selection for Secrecy Enhancement in Decode-and-Forward Relay NetworksP. M. Shemi, M. G. Jibukumar, M. A. Ali. 1278-1283 [doi]
- On the Impact of DDoS Attacks on Software-Defined Internet-of-Vehicles Control PlaneAbdul Jabbar Siddiqui, Azzedine Boukerche. 1284-1289 [doi]
- Distributed Sensor Network for Indirect Occupancy Measurement in Smart BuildingsColin Brennan, Graham W. Taylor, Petros Spachos. 1290-1295 [doi]
- Optimal Array size for Multiuser MIMOKhalid W. Hameed, James M. Noras, Ayman Radwan, Fadi Al-Turjman, Jonathan Rodriguez 0001, Raed A. Abd-Alhameed. 1296-1300 [doi]
- Analysis and Enhancement of Platoon Management in Smart CityFatma Marzouk, Jonathan Rodriguez 0001, Ayman Radwan. 1301-1306 [doi]
- The importance of mixture of Thermography, Ultrasound Diagnostics & Power Analysis for energy audit and sustainable maintenance in Agricultural IndustryAnastasios Tzoumpas, George Anastasopoulos, George Kormentzas. 1307-1312 [doi]
- BrainNets: Human Emotion Recognition Using an Internet of Brian Things PlatformHuimin Lu, Hyoungseop Kim, Yujie Li, Yin Zhang 0009. 1313-1316 [doi]
- Intelligent Healthcare Systems Assisted by Data Analytics and Mobile ComputingXiao Ma, Zie Wang, Sheng Zhou, Haoyu Wen, Yin Zhang 0009. 1317-1322 [doi]
- RoCoSense: Integrating Robotics, Smart Clothing and Big Data Clouds for Emotion SensingJun Yang, Mengchen Liu, Zeru Wei, Chao Han, Wei Li, Yiming Miao. 1323-1326 [doi]
- Sample expansion-oriented LDBN heart disease risk forecast modelZhenfei Wang, Jinlei Chen, Zhiyun Zheng, Junfeng Wang. 1327-1332 [doi]
- Towards IPv6-based Architecture for Big Data Processing of Community Medical Internet of ThingsChao Liu, Cheng Zhang, Fulong Chen 0002, Chuanxin Zhao. 1333-1338 [doi]
- An Enhanced Random Forest for Cardiac Diseases Identification based on ECG signalSihem Nita, Salim Bitam, Abdelhamid Mellouk. 1339-1344 [doi]
- A Cournot Economic Pricing Model for Caching Resource Management in 5G Wireless NetworksBouchaib Assila, Abdellatif Kobbane, Mohammed El Koutbi. 1345-1350 [doi]
- Information Dissemination using Opportunistic Networks in Scenarios with People RenewalLeonardo Chancay-Garcia, Enrique Hernández-Orallo, Pietro Manzoni, Carlos T. Calafate, Juan-Carlos Cano. 1351-1356 [doi]
- A Variable Step-Size Blind Equalization Algorithm Based on Particle Swarm OptimizationOmar Alhmouz, Shafayat Abrar, Naveed Iqbal, Azzedine Zerguine. 1357-1361 [doi]
- A Switch to the Concern of User: Importance Coefficient in Utility Distribution and Message Importance MeasureShanyun Liu, Rui She, Shuo Wan, Pingyi Fan, Yunquan Dong. 1362-1367 [doi]
- Massive Data Mining, Cyber Security ApproachSghaier Guizani. 1368-1372 [doi]
- High Throughput Parallel Concatenated Encoding and Decoding for Polar Codes: Design, Implementation and Performance AnalysisJiaying Yin, Lixin Li, Huisheng Zhang, Xu Li, Ang Gao, Wei Chen, Zhu Han. 1373-1378 [doi]
- Understanding Information Centric Layer of Adaptive Collaborative Caching Framework in Mobile Disconnection-Prone NetworksVu San Ha Huynh, Milena Radenkovic, Robert John. 1379-1384 [doi]
- A Novel Modulation Scheme of Polar CodesXiaotong Jia, Fang Wang, Yanzan Sun, Shunqing Zhang. 1385-1390 [doi]
- Detection and Impact of the Hidden Node Problem in LAA-WiFi Coexistence ScenariosPablo Campos, Ángela Hernández-Solana, Antonio Valdovinos Bardaji. 1391-1397 [doi]
- Rate-Compatible LDPC Based IDMA Scheme Supporting Grant-Free Transmission in eMBBZhangmei Chen, Kewu Peng, Yushu Zhang. 1398-1403 [doi]
- Two novel schemes to compensate HPA non-linearity on the FBMC/OQAM signalMounira Laabidi, Ridha Bouallegue. 1404-1408 [doi]
- A Multi-channel Scheduling Algorithm in Wireless on-board BusWangxiang Liu, Yukui Pei, Jianhua Lu. 1409-1413 [doi]
- An Integrating Unicast and Multicast Solution by Extending Content Delivery Network to SatelliteHui Yang, Hewu Li, Qian Wu. 1414-1419 [doi]
- Comprehensive Evaluation of Space Information Network Simulation System Based on GEO SatelliteDingyuan Shi, Feng Liu, Ligang Fei, Kunkun Nie. 1420-1424 [doi]
- Performance Analysis of QUIC Protocol in Integrated Satellites and Terrestrial NetworksSiyu Yang, Hewu Li, Qian Wu. 1425-1430 [doi]
- A LEO Satellite Network Capacity Model for Topology and Routing Algorithm AnalysisYunlu Xiao, Tao Zhang, Dingyuan Shi, Feng Liu. 1431-1436 [doi]
- Fast-Decoding Channel Estimation Technique for Downlink Control Channel in LTE-MTC SystemsMahmoud Elsaadany, Abdelmohsen Ali, Walaa Hamouda. 1437-1442 [doi]
- Spoken Language Identification Based on I-vectors and Conditional Random FieldsPanikos Heracleous, Yasser Mohammad, Kohichi Takai, Keiji Yasuda, Akio Yoneyama. 1443-1447 [doi]
- Angle of Arrival Based Positioning Method in Single Frequency NetworksRuiqi Liu, Chao Zhang. 1448-1452 [doi]
- Spectral Efficiency Maximization for Spatial Modulation Aided Layered Division Multiplexing: An Injection Level Optimization PerspectiveYue Sun, Jintao Wang, Changyong Pan, Longzhuang He. 1453-1458 [doi]
- Design and Simulation of a Green Bi-Variable Mono-Parametric SHM Node and Early Seismic Warning Algorithm for Wave Identification and ScatteringFarid Touati, Hasan Tariq, Damiano Crescini, Adel Ben Manouer. 1459-1464 [doi]
- Using DWT Lifting Scheme for Lossless Data Compression in Wireless Body Sensor NetworksJoseph Azar, Rony Darazi, Carol Habib, Abdallah Makhoul, Jacques Demerjian. 1465-1470 [doi]
- On Hybrid RSS/TOA Target Localization in NLOS EnvironmentsSlavisa Tomic, Marko Beko, Rodolfo Oliveira, Luís Bernardo, Nebojsa Bacanin, Milan Tuba. 1471-1476 [doi]
- Precoding Design for Drone Small Cells Cluster Network with Massive MIMO: A Game Theoretical ApproachZhibin Xu, Lixin Li, Haitao Xu, Ang Gao, Xu Li, Wei Chen, Zhu Han. 1477-1482 [doi]
- Passive monitoring and geo-based prediction of mobile network vehicle-to-server communicationJosef Schmid, Philipp Hes, Alfred Hos, Björn W. Schuller. 1483-1488 [doi]
- In-car Gateway Architecture for Intra and Inter-vehicular NetworksAmal Hbaieb, Olfa Ben Rhaiem, Lamia Chaari. 1489-1494 [doi]
- Simulation Tools, Environments and Frameworks for UAV Systems Performance AnalysisAicha Idriss Hentati, Lobna Krichen, Mohamed Fourati, Lamia Chaari Fourati. 1495-1500 [doi]
- Towards Proactive Social Learning Approach for Traffic Event Detection based on Arabic TweetsAhmad Nsouli, Azzam Mourad, Danielle Azar. 1501-1506 [doi]
- Online Internet Traffic Monitoring and DDoS Attack Detection Using Big Data FrameworksBaojun Zhou, Jie Li, Yusheng Ji, Mohsen Guizani. 1507-1512 [doi]
- A New Digital Power Supply System for Fog and Edge ComputingSong Ci, Ni Lin, Yanglin Zhou, Hongjia Li, Yang Yang 0001. 1513-1517 [doi]
- Density and Transmission Power in Intelligent Wireless Sensor NetworksMichele Chincoli, Stavros Stavrou, Antonio Liotta. 1518-1523 [doi]
- The Effective Recycling of Crashed Drone Based on Machine IntelligenceJun Yang, Jiayi Lu, Yiming Miao, Lu Wang, Yiting Zhao, Yong Cao. 1524-1529 [doi]
- Big Data Viewpoint On Channel Information Measures Based on ACE AlgorithmShanyun Liu, Rui She, Jiaxun Lu, Pingyi Fan. 1530-1535 [doi]
- A Large-scale Measurement Study of Mobile Web Security Through Traffic MonitoringShaoran Xiao, Fang Wang, Jingtao Ding, Yong Li. 1536-1541 [doi]
- Creation of Materialized Views Based on Neural Network AlgorithmKamel Abbasse, Tahar Ezzedine. 1542-1547 [doi]