Abstract is missing.
- ML EM Estimation of Fast Time-Varying OFDM-Type ChannelsSouheib Ben Amor, Sofiène Affes, Faouzi Bellili. 1-6 [doi]
- A CMOS Transimpedence Amplifier With Ambient Light Rejection for Visible Light Communication in Intelligent Transport SystemsMoaaz Ahmed, Amine Bermak. 7-13 [doi]
- Mobility Traffic Model Based on Combination of Multiple Transportation Forms in the Smart CityMohammed Bin Hariz, Dhaou Said, Hussein T. Mouftah. 14-19 [doi]
- Dictionary Learning-Based Beamspace Channel Estimation in Millimeter-Wave Massive MIMO Systems with a Lens Antenna ArrayMahmoud Nazzal, Mehmet Ali Aygül, Ali Görçin, Hüseyin Arslan. 20-25 [doi]
- Single Carrier Transmission for URLLC with Adaptive Radio Resource UtilizationArmed Tusha, Seda Dogan, Hüseyin Arslan. 26-30 [doi]
- An Event Prediction-based IP Multimedia Subsystem Service ExposureArmielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair. 31-36 [doi]
- A Distributed Predictive Road Traffic Management System in Urban VANETsAhmed Mejdoubi, Hacène Fouchal, Ouadoudi Zytoune, Mohamed Ouadou. 37-42 [doi]
- Reputation based Intelligent Control ProtocolNabila Bermad, Salah Zemmoudj, Mawloud Omar. 43-48 [doi]
- Interference Management by Adaptive Beamforming Algorithm in Massive MIMO NetworksHosni Manai, Larbi Ben Hadj Slama, Ridha Bouallegue. 49-54 [doi]
- A Novel Crowd-sourcing Inference MethodJia Liu, William C. Tang, Yuanfang Chen, MingChu Li, Mohsen Guizani. 55-60 [doi]
- Bayesian Model Updating Method Based Android Malware Detection for IoT ServicesFei Wu, Limin Xiao, Jinbin Zhu. 61-66 [doi]
- Traffic Analysis of LEO Satellite Internet of ThingsCong Jin, Xin He, Xiaojin Ding. 67-71 [doi]
- A Multi-objective Service Function Chain Mapping Mechanism for IoT networksCong Han, Siya Xu, Shaoyong Guo, Xuesong Qiu, Ao Xiong, Peng Yu 0001, Kunya Guo, Dong Guo. 72-77 [doi]
- Generative Adversarial Networks For Launching and Thwarting Adversarial Attacks on Network Intrusion Detection SystemsMuhammad Usama, Muhammad Asim, Siddique Latif, Junaid Qadir, Ala I. Al-Fuqaha. 78-83 [doi]
- Black-box Adversarial Machine Learning Attack on Network Traffic ClassificationMuhammad Usama, Adnan Qayyum, Junaid Qadir, Ala I. Al-Fuqaha. 84-89 [doi]
- Using advanced detection and prevention technique to mitigate threats in SDN architectureAnass Sebbar, Karim Zkik, Youssef Baddi, Mohammed Boulmalf, Mohamed Dâfir Ech-Cherif El Kettani. 90-95 [doi]
- A secret classified label control model based on the identity-based cryptographyZhijun Wu, Shan Tian, Wen Li, Meng Yue, Jian Wang. 96-101 [doi]
- A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNsVimal Kumar. 102-107 [doi]
- Hierarchical anomaly based intrusion detection and localization in IoTAymen Yahyaoui, Takoua Abdellatif, Rabah Attia. 108-113 [doi]
- CASK: Conditional Authentication and Session Key Establishment In Fog-assisted Social IoT NetworkArij Ben Amor, Mohamed Abid, Aref Meddeb. 114-119 [doi]
- An Enhanced Random Access Scheme: Multi-Power Contention Resolution Diversity Slotted AlohaYu Liang, Zuyao Ni, Linling Kuang. 120-125 [doi]
- Joint Active User and Data Detection in Uplink Grant-Free NOMA by Message-Passing AlgorithmRui Xin, Zuyao Ni, Linling Kuang, Haoge Jia, Purui Wang. 126-130 [doi]
- Research on LoRa Adaptability in the LEO Satellites Internet of ThingsTingwei Wu, Dexin Qu, Gengxin Zhang. 131-135 [doi]
- Analysis of Co-channel Interference in Low-orbit Satellite Internet of ThingsDajian Xu, Gengxin Zhang, Xiaojin Ding. 136-139 [doi]
- Physical Layer Representation in LEO Satellite with a Hybrid Multi-BeamformingAndrey Ivanov, Maria Stoliarenko, Andrey Savinov, Serafim Novichkov. 140-145 [doi]
- Communication Experiments and Analysis Based on the Plasma Sheath Channel Simulation SystemYawei Hu, Ning Ge. 146-151 [doi]
- A New UWB-MIMO Multi-Antennas With High Isolation For Satellite CommunicationsChafai Abdelhamid, Marwa Daghari, Hedi Sakli, Chafaa Hamrouni. 152-155 [doi]
- Three-Dimensional Visible Light Positioning Using Regression Neural NetworkPeixi Liu, Tianqi Mao, Ke Ma, Jiaxuan Chen, Zhaocheng Wang 0001. 156-160 [doi]
- Clustering in WSNs based on Artificial Fish Swarming AlgorithmDjamila Mechta, Saad Harous. 161-167 [doi]
- Two Tier Data Reduction Technique for Reducing Data Transmission in IoT SensorsAli Kadhum M. Al-Qurabat, Chady Abou Jaoude, Ali Kadhum Idrees. 168-173 [doi]
- Principal Component Analysis based Clustering Approach for WSN with Locally Uniformly Correlated DataZakia Jellali, Leïla Najjar Atallah, Sofiane Cherif. 174-179 [doi]
- A Two-Tier Clustering based Downlink Resource Allocation Algorithm for Small Cell NetworksJun Zheng, Donghong Jia, Baoxian Zhang. 180-185 [doi]
- New Sensing Matrices Based On Orthogonal Hadamard Matrices For Compressive SensingHamid Nouasria, Mohamed Et-tolba, Abla Bedoui. 186-191 [doi]
- Instantaneous Throughput Maximization for Cognitive Radio NetworksGhassan Alnwaimi, Hatem Boujemaa. 192-196 [doi]
- A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to RelayOluyomi Simpson, Yichuang Sun. 197-202 [doi]
- A Task Allocation Algorithm for Profit Maximization in NFC-RANYang Cai, Xiaofeng Lu, Yuansheng Luo, Kezhi Wang, Dongwei Chen, Kun Yang. 203-207 [doi]
- Design and Evaluation of Self-Assembled Actin-Based Nano-CommunicationOussama Abderrahmane Dambri, Soumaya Cherkaoui, Biswadeep Chakraborty. 208-213 [doi]
- Multi-user detection in optical wireless communicationFederica Aveta, Hazem H. Refai, Peter G. LoPresti. 214-219 [doi]
- Energy Modeling of Wireless Body Area Networks with On-Body Communication Channel CharacterizationAmina Nahali, Abdelaziz Hamdi, Matthieu Gautier, Antoine Courtay, Rafik Braham. 220-225 [doi]
- Important Complexity Reduction of Random Forest in Multi-Classification ProblemKawther Hassine, Aiman Erbad, Ridha Hamila. 226-231 [doi]
- Research on Indoor Location Algorithm Based on K Value SelectionGuanghua Zhang, Xue Sun, Tao Jiang, Weidang Lu. 232-236 [doi]
- A New Weighted Indoor Positioning Algorithm Based On the Physical Distance and ClusteringHao Qin, Shuo Shi, Xiangyu Tong. 237-242 [doi]
- Accurate Blind Synchronization for Free Space Optical Communication System Using 2-PPM ModulationMohamed Maalej, Hichem Besbes. 243-248 [doi]
- Design of a service caching and task offloading mechanism in smart grid edge networkMengyu Li, Lanlan Rui, Xuesong Qiu, Shaoyong Guo, Xiuzhi Yu. 249-254 [doi]
- Energy-efficient Mobile Edge Computation Offloading with Multiple Base StationsPeng Zhang, Jie Yang, Rongfei Fan. 255-259 [doi]
- Content Caching Strategy for Edge and Cloud Cooperation ComputingBiyao Li, Lanlan Rui, Xuesong Qiu, Haoqiu Huang. 260-265 [doi]
- Differentiated Service Mechanism According to Vehicle Environment in Vehicular Edge NetworkZuoyan Tan, Lanlan Rui, Wenjing Li 0001, Xuesong Qiu, Shaoyong Guo, Xiuzhi Yu. 266-271 [doi]
- Cost-Efficient Tasks Scheduling for Smart Grid Communication Network with Edge Computing SystemJiming Yao, Zhifeng Li, Yintao Li, Jie Bai, Jue Wang, Peng Lin. 272-277 [doi]
- A Clustering Algorithm Based on Communication Overhead and Link Stability for Cloud-assisted Mobile Adhoc NetworksKun Xiao, Siya Xu, Shaoyong Guo, Xuesong Qiu, Peng Yu, Xingyu Chen, Wei Deng, Kunya Guo. 278-283 [doi]
- A Deep Reinforcement Learning based Mechanism for Cell Outage Compensation in Massive IoT EnvironmentsJianli Guo, ZhiHao Wang, Xiujuan Shi, Xiao Yang, Peng Yu, Lei Feng 0001, Wenjing Li 0001. 284-289 [doi]
- Study on sharing and compatibility between ITS and Fixed ServiceZhang Yanyan, Wang Baocong, Li Xin, Liu Na. 290-293 [doi]
- ThermCont: A machine Learning enabled Thermal Comfort Control Tool in a real timeBouziane Brik, Moez Esseghir, Leïla Merghem-Boulahia, Hichem Snoussi. 294-300 [doi]
- An Investigation of Different Machine Learning Approaches for Epileptic Seizure DetectionPaulo Resque, Alex Barros, Denis do Rosário, Eduardo Cerqueira. 301-306 [doi]
- Heart of IoT: ECG as biometric sign for authentication and identificationAlex Barros, Denis do Rosário, Paulo Resque, Eduardo Cerqueira. 307-312 [doi]
- Intrusion cancellation for anomaly detection in healthcare applicationsMbarka Belhaj Mohamed, Amel Meddeb-Makhlouf, Ahmed Fakhfakh. 313-318 [doi]
- An ontology-based healthcare monitoring system in the Internet of ThingsSondes Titi, Hadda Ben Elhadj, Lamia Chaari. 319-324 [doi]
- Maximizing Lifetime in Energy-Harvesting WBSN for Health Monitoring Systems Through Dynamic Slots AllocationNedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane, Salama Ikki. 325-329 [doi]
- DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using BlockchainJamal N. Al-Karaki, Amjad Gawanmeh, Meryeme Ayache, Ashraf Mashaleh. 330-335 [doi]
- Cost Based Optimal Data Sampling Rate in Wireless Sensor NetworkKoffi V. C. Kevin de Souza, Catherine Almhana, Jalal Almhana, Lutful Karim. 336-341 [doi]
- Cognitive Radio Networks Channel State Estimation Using Machine Learning TechniquesDina Tarek, Abderrahim Benslimane, M. Darwish, Amira M. Kotb. 342-347 [doi]
- Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Zhihong Tian, Mingli Song, Chunsheng Zhu. 348-353 [doi]
- QFM-MRPL: Towards a QoS and Fault Management based of Mobile-RPL in IoT for mobile applicationsDjamila Bendouda, Hafid Haffaf. 354-359 [doi]
- Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer SchemesMiroslav Mitev, Arsenia Chorti, Martin Reed. 360-365 [doi]
- Video Summarization based on Motion Detection for Surveillance SystemsOmar ElHarrouss, Noor Al-Máadeed, Somaya Al-Máadeed. 366-371 [doi]
- Practical Optimisation of Path Planning and Completion Time of Data Collection for UAV-enabled Disaster CommunicationsTrung Q. Duong, Long D. Nguyen, Loi Kim Nguyen. 372-377 [doi]
- Error Probability Analysis for Dual-Hop Mixed RF-FSO System using CSOC Codes with MLGD DecodingSouad Labghough, Fouad Ayoub, Mostafa Belkasmi. 378-383 [doi]
- An Iterative Massive-MIMO NOMA Receiver with Superimposed Pilots based Estimator for Sparse ChannelsSyed Junaid Nawaz, Babar Mansoor, Mohammad N. Patwary, Mak Sharma. 384-390 [doi]
- Decision-based Algorithm for Robust 2D-DoA Estimation with L-shaped ArraySahbi Mazlout, M. Bassem Ben Salah, Abdelaziz Samet. 391-396 [doi]
- Performance Analysis of Rateless-Coded Non-Orthogonal Multiple AccessYingmeng Hu, Rongke Liu, Aryan Kaushik, John S. Thompson, Xinwei Yue. 397-402 [doi]
- A New Self-adaptive Wireless Communication System for Spinal CodesXiangqiang Gao, Rongke Liu, Hongxiu Bian, Yingmeng Hu. 403-408 [doi]
- Weighted-Sum Average Age of Information in Unilaterally Powered Two-Way Data Exchanging SystemsCheng Hu, Yunquan Dong. 409-414 [doi]
- PPSA: Profiling and Preventing Security Attacks in Cloud ComputingNahid Eddermoug, Mohamed Sadik, Essaid Sabir, Abdeljebar Mansour, Mohamed Azmi. 415-421 [doi]
- Canonical Coalition Game for Solving Wifi and LTE Coexistence Issues on the 5Ghz BandHager Ben Hafaiedh, Inès El Korbi, Rami Langar, Leïla Azouz Saïdane, Abdellatif Kobbane. 422-427 [doi]
- Two Dimensional Markov Chain Approximation for MPTCP over HetNets: Performance EvaluationEmad Abd-Elrahman, Adel Mounir Sareh Said. 428-433 [doi]
- Towards a Distributed Computation Offloading Architecture for Cloud RoboticsRihab Chaari, Omar Cheikhrouhou, Anis Koubâa, Habib Youssef, Habib Hmam. 434-441 [doi]
- An Evolutionary Game-Theoretic Approach for Cache-Enabled Cognitive D2D NetworksBasma Nissar, Ahmed El Ouadrhiri, Mohamed El-Kamili. 442-448 [doi]
- Toward a Mapping Cost Minimization Model under Delay and Resource Constraints in NFVInès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, Nabil Tabbane. 449-454 [doi]
- Low Energy System Proposal for UAV Applications Using Flexible Solar CellsSghaier Guizani. 455-458 [doi]
- Audio Based Drone Detection and Identification using Deep LearningSara Al-Emadi, Abdulla Al-Ali, Amr Mohammad, Abdulaziz Al-Ali. 459-464 [doi]
- Long-term QoE Optimization in IoV Based on Cross-layer Resource ManagementYanhua He, Liangrui Tang, Zhenyu Zhou, Yun Ren. 465-470 [doi]
- A Comparison of AI-Based Throughput Prediction for Cellular Vehicle-To-Server CommunicationJosef Schmid, Mathias Schneider, Alfred Höß, Björn W. Schuller. 471-476 [doi]
- Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVsKai Li 0002, Salil S. Kanhere, Wei Ni 0001, Eduardo Tovar, Mohsen Guizani. 477-482 [doi]
- Dynamic Scheduling Algorithm based on Priority Assignment for LTE-V2X vehicular NetworksAla Din Trabelsi, Marouane Hend, Faouzi Zarai, Amel Meddeb-Makhlouf. 483-488 [doi]
- On Building Cooperative Intelligent Transportation Systems over Public TransportsImen Mahjri, Sébastien Faye, Djamel Khadraoui. 489-495 [doi]
- Efficient Scheduling and Resource Allocation for D2D-based LTE-V2X CommunicationsAhlem Masmoudi, Souhir Feki, Kais Mnif, Faouzi Zarai. 496-501 [doi]
- A survey on Blockchain based access control for Internet of ThingsImen Riabi, Hella Kaffel Ben Ayed, Leïla Azouz Saïdane. 502-507 [doi]
- A Scalable Slotted Aloha for Massive IoT: A Throughput AnalysisIhirri Soukaina, Essaid Sabir, Ahmed Errami, Mohamed Khaldoun. 508-513 [doi]
- Enhanced ADR for LoRaWAN networks with mobilityNorhane Benkahla, Hajer Tounsi, Ye-Qiong Song, Mounir Frikha. 514-519 [doi]
- Indoor localization algorithm based on combination of Kalman filter and clusteringGuanghua Zhang, Ke Bao, Tao Jiang, Weidang Lu. 520-524 [doi]
- Power Saving Extension for the NDN-Based GIF Protocol for the Internet of ThingsAhmed Aboud, Haifa Touati, Brahim Hnich. 525-530 [doi]
- Efficient Data Dissemination in Electromagnetic Wireless Nano-Sensor NetworksHanen Ferjani, Haifa Touati. 531-536 [doi]
- NB-IoT Network Field Trial: Indoor, Outdoor and Underground Coverage CampaignHassan Malik, Sikandar Zulqarnain Khan, Jeffrey Leonel Redondo Sarmiento, Alar Kuusik, Muhammad Mahtab Alam, Yannick Le Moullec, Sven Pärand. 537-542 [doi]
- Impact of outdated CSI on the secrecy performance of dual-hop networks using cooperative jammingWalid Mallat, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati. 543-548 [doi]
- Secure Semi-Blind AF relaying networks using multiple eavesdroppersWided Hadj Alouane. 549-554 [doi]
- Partial Relay Selection for Secure Outdated-CSI AF in Untrusted-Relay NetworksWided Hadj Alouane. 555-560 [doi]
- Benchmarking Convolutional and Recurrent Neural Networks for Malware ClassificationHaïdar Safa, Mohamed Nassar 0001, Wael Al Rahal Al Orabi. 561-566 [doi]
- A Lightweight IoT Security SolutionHicham Yassine, Mohammad Malli. 567-572 [doi]
- Iterative Nonlinear Detection and Decoding in Multi-User Massive MIMOAndrey Ivanov, Andrey Savinov, Dmitry Yarotsky. 573-578 [doi]
- Efficient Lossless Feedback Compression for FDD Massive MIMOPapis Ndiaye, Moussa Diallo, Moustapha Mbaye, Idy Diop, Madoune Robert Seye. 579-585 [doi]
- Efficient Kalman Modeling of Multipath Wireless Channel for Secret Key GenerationAbdelkader Aljerme, Huaping Liu. 586-590 [doi]
- A game theoretical based rebroadcasting protocol for content dissemination in VANETsAssia Naja, Mohammed Boulmalf, Mohamed Essaaidi. 591-596 [doi]
- Emergent LBS: If GNSS Fails, How Can 5G-enabled Vehicles Get Locations Using Fogs?Sheng Yu, Jianhua Li, Jun Wu 0001. 597-602 [doi]
- A Name-to-Hash Encoding Scheme for Vehicular Named Data NetworksHakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla. 603-608 [doi]
- Performance of topology-based data routing with regard to radio connectivity in VANETChérifa Boucetta, Oumaya Baala, Kahina Ait Ali, Alexandre Caminada. 609-614 [doi]
- Delay Study in Multi-controller Software Defined Vehicular Network Using OpenDaylight for Emergency ApplicationsKarima Smida, Hajer Tounsi, Mounir Frikha, Ye-Qiong Song. 615-620 [doi]
- MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial SystemsAzza Allouch, Omar Cheikhrouhou, Anis Koubâa, Mohamed Khalgui, Tarek Abbes. 621-628 [doi]
- BlockLoc: Secure Localization in the Internet of Things using BlockchainOmar Cheikhrouhou, Anis Koubâa. 629-634 [doi]
- Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity NetworkLamiaa Basyoni, Aiman Erbad, Mashael Al Sabah, Noora Fetais, Mohsen Guizani. 635-642 [doi]
- A DASH-based Efficient Throughput and Buffer Occupancy-based Adaptation Algorithm for Smooth Multimedia StreamingAbid Yaqoob, Ting Bi, Gabriel-Miro Muntean. 643-649 [doi]
- SE-PSO: Resource Scheduling Strategy for Multimedia Cloud Platform Based on Security Enhanced Virtual MigrationTengchao Ma, Changqiao Xu, Zan Zhou, Xiaohui Kuang, Lujie Zhong. 650-655 [doi]
- Joint Social-Aware and Mobility-Aware Caching in Cooperative D2DZhe Yuan, Wenqin Zhuang, Xin Wei 0001, Liang Zhou 0002. 656-661 [doi]
- Energy Efficient for Scalable Video Caching Service over Device-to-Device CommunicationHan Xiao, Changqiao Xu, Tengfei Cao, Shujie Yang, Lujie Zhong, Gabriel-Miro Muntean. 662-667 [doi]
- A Load Balancing Strategy based on Request Queue for P2P-VoD SystemXin Wei, Pingchuan Ding, Fang Zho, Jinglei Lou, Yun Gao. 668-673 [doi]
- Weighted Feature Fusion Based Emotional Recognition for Variable-length Speech using DNNSifan Wu, Fei Li, Pengyuan Zhang. 674-679 [doi]
- Mining User Opinion Influences on Twitter Social Network: Find that Friend who Leads your Opinion Using Bayesian Method and a New Emotional PageRank AlgorithmArmielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair. 680-685 [doi]
- A Mobile Quality-oriented Cooperative Multimedia Delivery SolutionJohn Monks, Cristina Hava Muntean, Gabriel-Miro Muntean. 686-691 [doi]
- Enhancing dynamic adaptive streaming over HTTP for multi-homed users using a Multi-Armed Bandit algorithmAli Hodroj, Marc Ibrahim, Yassine Hadjadj Aoul, Bruno Sericola. 692-697 [doi]
- A novel opportunistic Fuzzy logic based objective function for the Routing Protocol for Low-Power and Lossy NetworksInès Kechiche, Inès Bousnina, Abdelaziz Samet. 698-703 [doi]
- Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs)Fahad E. Salamh, Umit Karabiyik, Marcus Rogers, Fawaz Al Hazemi. 704-710 [doi]
- Energy Efficiency Analysis of FeICIC in Dense Heterogeneous NetworksYanzan Sun, Han Xu, Shunqing Zhang, Yating Wu, Tao Wang, Yong Fang, Shugong Xu. 711-716 [doi]
- Passive TCP Identification for Wired and Wireless Networks: A Long-Short Term Memory ApproachXiaoyu Chen, Shugong Xu, Xudong Chen, Shan Cao, Shunqing Zhang, Yanzan Sun. 717-722 [doi]
- Delay Constrainted-Rate Allocation for SVC over Device-to-Device NetworksLei Wang 0009, Huangda Lin, Mingkai Chen, Bin Kang, Xuguang Zhang, Wenqin Zhuang. 723-728 [doi]
- Impact of the Direct Link on the Performance of Single-Relay Buffer-Aided FSO CommunicationsChadi Abou-Rjeily, Wissam Fawaz. 729-734 [doi]
- Packet Length Optimization for Two Way RelayingGhassan Alnwaimi, Hatem Boujemaa, Kamran Arshad. 735-740 [doi]
- RL-Based User Association and Resource Allocation for Multi-UAV enabled MECLiang Wang, Peiqiu Huang, Kezhi Wang, Guopeng Zhang, Lei Zhang, Nauman Aslam, Kun Yang. 741-746 [doi]
- Energy Efficiency Optimization in OFDM based Two-Way DF Relaying Networks with Energy HarvestingWeidang Lu, Weilin Zhao, Hong Peng, Su Hu, Yuan Gao. 747-751 [doi]
- Secure half-duplex dual-hop AF relaying networks with partial relay selectionWalid Mallat, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati. 752-757 [doi]
- Temporal mobility evolution of freely floating underwater sensor networksFatma Bouabdallah. 758-762 [doi]
- An NB-IoT-based smart trash can system for improved health in smart citiesYujie Zhu, Gangyong Jia, Guangjie Han, Zeren Zhou, Mohsen Guizani. 763-768 [doi]
- Small Number but Big Influence: Analysis of Routing Usability in ISTNWenying Dai, Hewu Li, Qian Wu, Xiaomo Wang. 769-774 [doi]
- Self-learning Congestion Control of MPTCP in Satellites CommunicationsTianle Mai, Haipeng Yao, Yaqing Jing, Xiaobin Xu, Xiaolong Wang, Zhe Ji. 775-780 [doi]
- Experimental Performance Evaluation of TCP Over an Integrated Satellite-Terrestrial Network EnvironmentAnas A. Bisu, Andrew Gallant, Hongjian Sun, Katharine Brigham, Alan Purvis. 781-786 [doi]
- Space Edge Cloud Enabling Network Slicing for 5G Satellite NetworkSuzhi Cao, Junyong Wei, Hao Han, Yi Zhao, Shuling Yang, Lei Yan, Shaojun Wu, Yongsheng Gong. 787-792 [doi]
- An Efficient Method for Multipath Mitigation Applicable to BOC Signals in GNSSFahad Alhussein, Huaping Liu. 793-798 [doi]
- Space-Time Variation of Property Crime in Beijing with ESDA MethodSheng Li, Wenzhong Tang. 799-804 [doi]
- Secrecy Performance of AF relaying in Cooperative NOMA over Rician ChannelNesrine Zaghdoud, Wided Hadj Alouane, Hatem Boujemaa, Adel Ben Mnaouer, Farid Touati. 805-810 [doi]
- An MMSE Integrated Equalization for HARQ Chase Combining in OQAM-FBMC systemsAbla Bedoui, Mohamed Et-tolba, Hamid Nouasria. 811-816 [doi]
- On Correlation-Based Channel Sensing with IQ ImbalanceAhmed ElSamadouny, Heba Shehata, Tamer Khattab, Khalid Abualsaud, Mohsen Guizani. 817-820 [doi]
- Design And Simulations Of Stable Pass-Band Filtering Response Using Miniaturized Element Frequency Selective Surface (MEFSS)Marwa Daghari, Chafai Abdelhamid, Hedi Sakli, Divitha Seetharamdoo. 821-825 [doi]
- Novel Frequency Offset Estimation Scheme for Reliable Wireless Communication using Modified K-Means ClusteringNaji Albakay, Michael Hempel, Mahmoud Alahmad, Hamid Sharif. 826-829 [doi]
- Matrix Approximate Inversion Based Signal Detection in Large-scale 3D-MIMO SystemsWei Ren, Yang Zhou, Wei Ji, Ting Li, Yan Liang, Fei Li. 830-835 [doi]
- Location Aided and Machine Learning-Based Beam Allocation for 3D Massive MIMO SystemsYuchen Xie, Wei Ji, Ting Li, Yan Liang, Fei Li. 836-841 [doi]
- Subchannel Assignment for SWIPT-NOMA based HetNet with Imperfect Channel State InformationIshan Budhiraja, Sudhanshu Tyagi, Sudeep Tanwar, Neeraj Kumar 0001, Nadra Guizani. 842-847 [doi]
- Averaging Neural Network Ensembles Model for Quantification of Volatile Organic CompoundAtiq ur Rehman, Amine Bermak. 848-852 [doi]
- Using a Kalman Filter to improve schedulers performance in mobile networksMárcio José Teixeira, Varese Salvador Timóteo. 853-858 [doi]
- Training Genetic Neural Networks Algorithms for Autonomous Cars with the LAOP PlatformJihene Rezgui, Léonard Oest O'Leary, Clément Bisaillon, Lamia Chaari Fourati. 859-864 [doi]
- Relay Selection Based on Deep Learning for Broadcasting in VANETAbir Mchergui, Tarek Moulahi, Salem Nasri. 865-870 [doi]
- IoT-based Seismic Hazard Detection in Coal Mines using Grey Systems TheoryNimisha Ghosh, Indrajit Banerjee. 871-876 [doi]
- A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning DetectionNuha Almasalmeh, Firas Saidi, Zouheir Trabelsi. 877-882 [doi]
- Predicting Probing Rate Severity by Leveraging Twitter SentimentsHicham Hammouchi, Ghita Mezzour, Mounir Ghogho, Mohammed El Koutbi. 883-888 [doi]
- State of the art on Privacy Risk Estimation Related to Android ApplicationsZied El May, Hella Kaffel Ben Ayed, Dorra Machfar. 889-894 [doi]
- Anomaly Detection Model Over Blockchain Electronic TransactionsSirine Sayadi, Sonia Ben Rejeb, Zièd Choukair. 895-900 [doi]
- A light-weight implementation of latch-based true random number generatorNaoki Fujieda, Hitomi Kishibe, Shuichi Ichikawa. 901-906 [doi]
- Augmented Perception by V2X Cooperation (PAC-V2X): Security issues and misbehavior detection solutionsMohamed Hadded, Oyunchimeg Shagdar, Pierre Merdrignac. 907-912 [doi]
- A Novel Sybil Attack Detection Mechanism for C-ITSMarwane Ayaida, Nadhir Messai, Geoffrey Wilhelm, Sameh Najeh. 913-918 [doi]
- Computing Resource Allocation in LEO Satellites System: A Stackelberg Game ApproachTianle Mai, Haipeng Yao, Feixiang Li, Xiaobin Xu, Yaqing Jing, Zhe Ji. 919-924 [doi]
- Resource Allocation for Beam-hopping User Downlinks in Multi-beam Satellite SystemLin Wang, Chen Zhang, Dexin Qu, Gengxin Zhang. 925-929 [doi]
- Dynamic Resource Allocation in LEO SatelliteAndrey Ivanov, Maria Stoliarenko, Stanislav Kruglik, Serafim Novichkov, Andrey Savinov. 930-935 [doi]
- Double Auction Based Resource Allocation for Secure Video Caching in Heterogeneous NetworksJun Du, Chunxiao Jiang, Haijun Zhang, Yong Ren, Tony Q. S. Quek. 936-341 [doi]
- Second-Price Auction Based Cognitive Traffic Offloading in Heterogeneous NetworksJun Du, Chunxiao Jiang, Haijun Zhang, Yong Ren, Victor C. M. Leung. 942-947 [doi]
- Multi-Resource Management for Multi-Tier Space Information Networks: A Cooperative GameXinru Mi, Chungang Yang, Zheng Chang. 948-953 [doi]
- Body Area Networks MAC Protocols for Healthcare: Performance EvaluationFerdawss Douma, Rafik Braham. 954-960 [doi]
- A Two-Level Clustering based on Position, Data Correlation and Residual Energy in WSNMarwa Fattoum, Zakia Jellali, Leïla Najjar Atallah. 961-966 [doi]
- On Improving Flight Energy Efficiency in Simultaneous Transmission and Reception of Relay Using UAVsAyaka Hanyu, Yuichi Kawamoto, Nei Kato. 967-972 [doi]
- Integrated Divide and Conquer with Enhanced k-means technique for Energy-saving Data Aggregation in Wireless Sensor NetworksAli Kadhum Idrees, Ali Kadhum M. Al-Qurabat, Chady Abou Jaoude, Wathiq Laftah Al-Yaseen. 973-978 [doi]
- A Distributed Processing Technique for Sensor Data Applied to Underwater Sensor NetworksMohamad Mortada, Abdallah Makhoul, Chady Abou Jaoude, Hassan Harb, David Laiymani. 979-984 [doi]
- Proposal of a new self-organizing protocol for data collection regarding Mobile Wireless Sensor and actor NetworksKamel Barka, Lyamine Guezouli, Samir Gourdache, Djallel Eddine Boubiche. 985-990 [doi]
- Distributed Interference and Power Control based-Game Theory for D2D CommunicationSameh Najeh, Ammar Bouallegue. 991-996 [doi]
- Energy Trading Scheme Based on Contract Theory in Cooperative Relay NetworkChen Liu, Weidang Lu, Hong Peng, Su Hu, Yuan Gao. 997-1001 [doi]
- Self-organization Smart Protocol for Mobile Wireless Sensor NetworksLyamine Guezouli, Kamel Barka, Samir Gourdache, Djallel Eddine Boubiche. 1002-1006 [doi]
- Resource Management in Cloud Data Centers: A SurveyKhaoula Braiki, Habib Youssef. 1007-1012 [doi]
- Sub-Optimum Detection Scheme with Double the Full Diversity for Asynchronous Cooperative Relay NetworkAbdulghani M. Elazreg, Ahmad Kharaz. 1013-1018 [doi]
- Performance and Correctness of Mobile Cloud Computing Systems: Taxonomy and Open ChallengesFairouz Fakhfakh. 1019-1024 [doi]
- Impact of Clustering Algorithms on the performance of Multilevel Switch Boxes FPGA with Long WiresKhouloud Bouaziz, Sonda Chtourou, Mohamed Abid, Zied Marrakchi, Abdulfattah Mohammad Obeid. 1025-1030 [doi]
- CEET: Cooperative Energy Efficient Tracking System using SmartphonesYousef Ali, Uthman Baroudi. 1031-1036 [doi]
- Securing Fast PMIPv6 protocol in case of Vertical HandOver in 5G networkWafa Haddar, Sirine Ben Ameur, Faouzi Zarai. 1037-1042 [doi]
- FW-TR: Towards a Novel Generation of Firewalls Based on Trust-Risk Assessment of Filtering Rules and PoliciesFaouzi Jaïdi. 1043-1048 [doi]
- SAMAFog: Service-Aware Mutual Authentication Fog-based ProtocolArij Ben Amor, Mohamed Abid, Aref Meddeb. 1049-1054 [doi]
- The Security Evaluation of Big Data Research for Smart GridZhifeng Li, Yintao Li, Peng Lin. 1055-1059 [doi]
- A novel Approach for Privacy-Preserving Data Aggregation in Smart GridRihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim. 1060-1066 [doi]
- At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart gridRihem Ben Romdhane, Hamza Hammami, Mohamed Hamdi, Tai-Hoon Kim. 1067-1072 [doi]
- A new vehicular blackbox architecture based on searchable encryptionEmna Jaidane, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim. 1073-1078 [doi]
- Study on the parameters for the convergence of the Method of Auxiliary SourcesSami Hidouri, Eljamai Messaoud, Taoufik Aguili. 1079-1083 [doi]
- Energy consumption of virtual machine migration within varied DCN architecturesNawel Kortas, Habib Youssef. 1084-1089 [doi]
- Green Handoff in Femtocell NetworkInes Damak, Hela Chaieb, Ridha Bouallegue. 1090-1095 [doi]
- Online Transmission Policy in Wireless Powered Networks with Urgency-aware Age of InformationYang Lu 0008, Ke Xiong, Pingyi Fan, Zhangdui Zhong, Khaled Ben Letaief. 1096-1101 [doi]
- Broadcast Age of Information in CSMA/CA Based Wireless NetworksMei Wang, Yunquan Dong. 1102-1107 [doi]
- Green data center networks: a holistic survey and design guidelinesEmna Baccour, Sebti Foufou, Ridha Hamila, Aiman Erbad. 1108-1114 [doi]
- Dynamic Spectrum Allocation with Priority for Different Services in Cognitive-Radio-based Neighborhood Area Network for Smart GridKepeng Yang, Yueqi Zi, Lei Feng, Peng Yu, Wenjing Li, Qinghai Ou. 1115-1120 [doi]
- Transmission Strategy of GOOSE Service based on Cellular Multimedia Broadcasting in Smart GridJiming Yao, Zhifeng Li, Yintao Li, Jie Bai, Jue Wang, Peng Lin. 1121-1126 [doi]
- Resource Allocation for Multi-class Businesses in LTE-A Uplink Communication for Smart GridYun Liang 0011, Yao Wang, Wenfeng Tian, Pengfei Zeng, Xiaoyan Sun, Lei Feng, Jinlong Chai, Qiang Zhao, Yueqi Zi. 1127-1132 [doi]
- Analysis of the Impact of eMTC on Legacy LTEZhirong Zhang, Xuetian Zhu, Zhijun Li, Yong Zeng. 1133-1138 [doi]
- CAPM: Context-Aware Privacy Model for IoT-Based Smart HospitalsSalah Zemmoudj, Nabila Bermad, Mawloud Omar. 1139-1144 [doi]
- Combining Deep Neural Network with SVM to Identify Used in IOTNguyen Nang An, Nguyen Quang Thanh, Yanbing Liu, Fei Wu. 1145-1149 [doi]
- Intelligent Tag Prediction Algorithms for Acupuncture ExpertsQingtao Zeng, Anping Xu, Yeli Li, Chunhe Piao. 1150-1153 [doi]
- A Survey on Multi-Agent Reinforcement Learning Methods for Vehicular NetworksIbrahim Althamary, Chih-Wei Huang, Phone Lin. 1154-1159 [doi]
- Service Discovery in Heterogeneous IoT Environments based on OCF/IoTivityKhaled Elsayed, Mohamed Abu Baker Ibrahim, Haitham S. Hamza. 1160-1165 [doi]
- Virtual Network Function Placement in IoT NetworkDuong Tuan Nguyen, Chuan Pham, Kim Khoa Nguyen, Mohamed Cheriet. 1166-1171 [doi]
- Upper Bound Performance of Uplink Class A LoRa NetworksJoão Pacheco, António Furtado, Rodolfo Oliveira. 1172-1177 [doi]
- Analysis of RSSI Fingerprinting in LoRa NetworksMahnoor Anjum, Muhammad Abdullah Khan, Syed Ali Hassan, Aamir Mahmood, Mikael Gidlund. 1178-1183 [doi]
- Enhancing MQTT-SN Performance via Fountain Codes in Extreme ConditionsAhmad Alshantout, Louai Al-Awami. 1184-1189 [doi]
- A Survey on Recent Approaches in Intrusion Detection System in IoTsAliya Tabassum, Aiman Erbad, Mohsen Guizani. 1190-1197 [doi]
- On The Use of Software Defined Wireless Network in Vehicular Fog Computing EnvironmentsJoseph Khoury, Hani Sami, Haïdar Safa, Wassim El-Hajj. 1198-1203 [doi]
- Inhomogeneous Multi-UAV Aerial Base Stations Deployment: A Mean-Field-Type Game ApproachYan Sun, Lixin Li, Kaiyuan Xue, Xu Li, Wei Liang, Zhu Han. 1204-1208 [doi]
- An Evaluative Review of the Formal Verification for VANET ProtocolsFaten Fakhfakh, Mohamed Tounsi 0001, Mohamed Mosbah. 1209-1214 [doi]
- Adaptive Security for the Intra-Electric Vehicular Wireless NetworksYosra Fraiji, Lamia Ben Azzouz, Wassim Trojet, Leïla Azouz Saïdane, Ghaled Hoblos. 1215-1220 [doi]
- Video Streaming in Vehicular Ad Hoc Networks: Applications, Challenges and techniquesNadia Zribi, Bechir Alaya, Tarek Moulahi. 1221-1226 [doi]
- Forecasting Traffic Congestion Using ARIMA ModelingTaghreed Alghamdi, Khalid Elgazzar, Magdi Bayoumi, Taysseer Sharaf, Sumit Shah. 1227-1232 [doi]
- Automated Sensor-Fusion Based Emergency Rescue for Remote and Extreme Sport ActivitiesBenjamin Leiding, Arne Bochem, Luca Hernández Acosta. 1233-1238 [doi]
- Adaptive Range-based Anomaly Detection in Drone-assisted Cellular NetworksChérifa Boucetta, Boubakr Nour, Seif Eddine Hammami, Hassine Moungla, Hossam Afifi. 1239-1244 [doi]
- Stacked Auto-Encoder for Scalable Indoor Localization in Wireless Sensor NetworksSouad BelMannoubi, Haifa Touati, Hichem Snoussi. 1245-1250 [doi]
- A comparative Analysis of Machine Learning Classification Approaches for Fountain Data Estimation in Wireless Sensor NetworksFatma Belabed, Ridha Bouallegue. 1251-1254 [doi]
- An Adaptive Sampling Technique for Massive Data Collection in Distributed Sensor NetworksAhmad Karaki, Abbass Nasser, Chady Abou Jaoude, Hassan Harb. 1255-1260 [doi]
- Efficient EEG Mobile Edge Computing and Optimal Resource Allocation for Smart Health ApplicationsAbeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad, Abdulla K. Al-Ali, Mohsen Guizani. 1261-1266 [doi]
- Analysis of the Effect of QoS on Video Conferencing QoEN. Rao, A. Maleki, F. Chen, W. Chen, C. Zhang, N. Kaur, A. Haque. 1267-1272 [doi]
- A Comparative Study on the Quality of Narrow-Band and Wide-Band AMR VoLTE CallsElena Cipressi, Maria Luisa Merani. 1273-1278 [doi]
- Evaluating QoS in SDN-Based EPC: A Comparative AnalysisYaser Al Mtawa, A. Memari, Anwar Haque, H. Lutfiyya. 1279-1286 [doi]
- Dynamic QoS-aware Queuing for Heterogeneous Traffic in Smart HomeMaroua Ben Attia, Kim Khoa Nguyen, Mohamed Cheriet. 1287-1292 [doi]
- Accurate Passive Indoor RFID Alignment System for Service StationRahma Zayoud, Habib Hamam. 1293-1298 [doi]
- Novel Hybrid Physical Layer Security Technique in RFID SystemsGehad Essam, Heba Shehata, Tamer Khattab, Khalid Abualsaud, Mohsen Guizani. 1299-1304 [doi]
- Joint Optimization of EE and SE Considering Interference Threshold in Ultra-Dense NetworksXu Chen, Xuanli Wu, Shuai Han, Ziyi Xie. 1305-1310 [doi]
- A Secure Efficient and Lightweight authentication protocol for 5G cellular networks: SEL-AKAIkram Gharsallah, Salima Smaoui, Faouzi Zarai. 1311-1316 [doi]
- A Machine Learning Approach of Load Balance Routing to Support Next-Generation Wireless NetworksHaipeng Yao, Xin Yuan, Peiying Zhang, Jingjing Wang, Chunxiao Jiang, Mohsen Guizani. 1317-1322 [doi]
- Enhancing Energy Efficiency by Neighbors-Aware Algorithm in Femtocell NetworksDorsaf Ghozlani, Seifeddine Bouallegue, Aymen Omri, Anthony Busson, Ridha Bouallegue. 1323-1327 [doi]
- Average and Instantaneous Throughput Maximization for Millimeter Wave CommunicationsGhassan Alnwaimi, Hatem Boujemaa. 1328-1332 [doi]
- Joint Power and Channel Allocation for Underlay D2D Communications with Proportional FairnessMiaomiao Liu, Li Zhang, You You. 1333-1338 [doi]
- Low-Complexity Channel Tracking in Fast-varying MIMO EnvironmentsRuoxu Wang, Wei Peng 0003, Tao Jiang, Fumiyuki Adachi. 1339-1343 [doi]
- Shipwrecked Victims Localization and Tracking using UAVsImen Nasr, Meriem Chekir, Hichem Besbes. 1344-1348 [doi]
- Software Defined Internet of Vehicles: a survey from QoS and scalability perspectivesKarima Smida, Hajer Tounsi, Mounir Frikha, Ye-Qiong Song. 1349-1354 [doi]
- Semidefinite Relaxation of a Joint Beamforming and Power Control for Downlink V2X CommunicationsIbtissem Brahmi, Monia Hamdi, Fadoua Mhiri, Faouzi Zarai. 1355-1360 [doi]
- Coverage Optimization using Multiple Unmanned Aerial Vehicles with Connectivity ConstraintAmani Lamine, Fethi Mguis, Hichem Snoussi, Khaled Ghédira. 1361-1366 [doi]
- A Reinforcement Learning-based Radio Resource Management Algorithm for D2D-based V2V CommunicationSouhir Feki, Aymen Belghith, Faouzi Zarai. 1367-1372 [doi]
- SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home SystemsBacem Mbarek, Barbora Buhnova, Tomás Pitner. 1373-1378 [doi]
- Optimized Flow Assignment in a Multi-Interface IoT GatewayMohamed Ghazi Amor, Kim Khoa Nguyen, Chuan Pham, Mohamed Cheriet. 1379-1384 [doi]
- Joint Security and Energy Efficiency in IoT Networks Through Clustering and Bit FlippingElias Yaacoub, Ali Chehab, Mohammed Al-Husseini, Khalid Abualsaud, Tamer Khattab, Mohsen Guizani. 1385-1390 [doi]
- Edge Computing-Enhanced Uplink Scheduling for Energy-Constrained Cellular Internet of ThingsZih-Ning Lin, Shun-Ren Yang, Phone Lin. 1391-1396 [doi]
- Content Delivery in Named Data Networking based Internet of ThingsKaoutar Ahed, Maria Benamar, Rajae El Ouazzani. 1397-1402 [doi]
- Computer-Aided Software Engineering (CASE) Tool for Big Data and IoT ArchitectureM. Saifeddine Hadj Sassi, Faiza Ghozzi Jedidi, Lamia Chaari Fourati. 1403-1410 [doi]
- Performance Analysis of Relay Selection for IoT Networks over Generalized K DistributionAli Dziri, Michel Terré, Nidal Nasser. 1411-1415 [doi]
- Design of printed log-periodic antennas for long range communication modules: preliminary simulation resultsGian Luigi Gragnani, Claudio Montecucco. 1416-1421 [doi]
- A Frequency-Reconfigurable Printed Antenna with Switchable Capacitively Loaded LoopsMoheddine Smari, Saber Dakhli, Fethi Choubani. 1422-1425 [doi]
- The effect of High Power Amplifier Nonlinearity on MU-Massive MIMO System Performance over Rayleigh Fading ChannelMaha Cherif Dakhli, Ridha Bouallegue. 1426-1429 [doi]
- Antenna Polarization Impact on Electromagnetic Power Density for an Off-Body to In-Body Communication ScenarioAymen Ben Saada, Sofiane Ben Mbarek, Fethi Choubani. 1430-1433 [doi]
- MoM-GEC Modeling of Frequency-Reconfigurable Antenna for Wireless CommunicationsHeithem Helali, Mourad Aidi, Mohamed Hajji, Ahmed Nouainia, Taoufik Aguili. 1434-1439 [doi]
- Design of a switched line phase shifter for reconfigurable mm-wave AntennasIlhem Gharbi, Rim Barrak, Mohamed Latrach, Hedi Raggad, Mourad Menif. 1440-1444 [doi]
- RADR: Routing for Autonomous DronesNicole Chow, Gopi Gugan, Anwar Haque. 1445-1450 [doi]
- Ranking Fog nodes for Tasks Scheduling in Fog-Cloud Environments: A Fuzzy Logic ApproachMohammed Anis Benblidia, Bouziane Brik, Leïla Merghem-Boulahia, Moez Esseghir. 1451-1457 [doi]
- Predicting Solar Irradiance Using Machine Learning TechniquesAbeera Javed, Bakhtiar Khan Kasi, Faisal Ahmad Khan. 1458-1462 [doi]
- Enhancing cloud of things performance by avoiding unnecessary data through artificial intelligence toolsSami Mahfoudhi, Musheera Frehat, Tarek Moulahi. 1463-1467 [doi]
- Pose-based Human Activity Recognition: a reviewSameh Neili Boualia, Najoua Essoukri Ben Amara. 1468-1475 [doi]
- Fast CNN-Based Object Tracking Using Localization Layers and Deep Features InterpolationAl-Hussein A. El-Shafie, Mohamed H. Zaki, Serag E.-D. Habib. 1476-1481 [doi]
- Machine Learning Based Prediction and Classification of Computational Jobs in Cloud Computing CentersZheqi Zhu, Pingyi Fan. 1482-1487 [doi]
- A Modified Balls-into-Bins Model for Expected Buffer Occupancy in Mobile Opportunistic NetworksGourish Goudar, Suvadip Batabyal. 1488-1493 [doi]
- Pose Determination from Multi-View Image using Deep LearningShantong Sun, Rongke Liu, Yu Pan, Qiuchen Du, Shuqiao Sun, Han Su. 1494-1498 [doi]
- UAV detection and identification in the Internet of ThingsJingcheng Zhao, Xinru Fu, Zongkai Yang, Fengtong Xu. 1499-1503 [doi]
- Research on Reliability Modeling of Image Transmission Task Based on UAV Avionics SystemQiang Zhou, Jing Yang. 1504-1507 [doi]
- 3D Aerial Vehicle Base Station (UAV-BS) Position Planning based on Deep Q-Learning for Capacity Enhancement of Users With Different QoS RequirementsJianli Guo, Yonghua Huo, Xiujuan Shi, Jiahui Wu, Peng Yu, Lei Feng, Wenjin Li. 1508-1512 [doi]
- A Low-Complexity Implementation Scheme for PCM/FM Based on MLSDYou Zhou, Ruifeng Duan, Bofeng Jiang. 1513-1517 [doi]
- Double-layer Satellite Communication Network Routing Algorithm Based on priority and failure probabilityYu Zhu, Lanlan Rui, Xuesong Qiu, Haoqiu Huang. 1518-1523 [doi]
- An Improved Wavelet Packet Denoising Algorithm Based on Sample Entropy for IoTCheng Liu, Hongguang Duan, Ling Zhao. 1524-1528 [doi]
- Simulation and Analysis of Device Positioning in 5G Ultra-Dense NetworkQirui Liu, Rongke Liu, Zijie Wang, Yifan Zhang. 1529-1533 [doi]
- Minimization of Offloading Delay for Two-Tier UAV with Mobile Edge ComputingJingfang Liu, Lixin Li, Fucheng Yang, Xiaomin Liu, Xu Li, Xiao Tang, Zhu Han. 1534-1538 [doi]
- Segmented CRC-Aided Spinal Codes with a Novel Sliding Window Decoding AlgorithmHongxiu Bian, Rongke Liu, Aryan Kaushik, Ruifeng Duan. 1539-1543 [doi]
- Tensor-Train Based Deep Learning Approach for Compressive Sensing in Mobile ComputingCong Zou, Fang Yang. 1544-1549 [doi]
- CE-D2D: Dual Framework Chunks Caching and offloading in Collaborative Edge networks with D2D communicationEmna Baccour, Aiman Erbad, Amr Mohamed, Mohsen Guizani. 1550-1556 [doi]
- A Scalable and Adaptive Tasks Orchestration Platform for IoTCharafeddine Mechalikh, Hajer Taktak, Faouzi Moussa. 1557-1563 [doi]
- Artificial Intelligence based Camera CalibrationSyed Navid Raza, Hafiz Raza ur Rehman, Suk-Gyu Lee, Gyu Sang Choi. 1564-1569 [doi]
- Towards a New Clustering Algorithm based on Trust Management and Edge Computing for IoTNadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi. 1570-1575 [doi]
- CAPE: Continuous Access Policy Enforcement for IoT DeploymentsAshraf Alkhresheh, Khalid Elgazzar, Hossam S. Hassanein. 1576-1581 [doi]
- Distributed access control solution for the IoT based on multi-endorsed attributes and smart contractsSophie Dramé-Maigné, Maryline Laurent, Laurent Castillo. 1582-1587 [doi]
- A Cloud and Fog based Architecture for Energy Management of Smart City by using Meta-heuristic TechniquesAyesha Anjum Butt, Sajjad Khan, Tehreem Ashfaq, Sakeena Javaid, Norin Abdul Sattar, Nadeem Javaid. 1588-1593 [doi]
- Towards Buildings Energy Management: Using Seasonal Schedules Under Time of Use Pricing Tariff via Deep Neuro-Fuzzy OptimizerSakeena Javaid, Muhammad Abdullah, Nadeem Javaid, Tanzeela Sultana, Jawad Ahmed, Norin Abdul Sattar. 1594-1599 [doi]
- Forecasting day, week and month ahead electricity load consumption of a building using empirical mode decomposition and extreme learning machineSajjad Khan, Nadeem Javaid, Annas Chand, Raza Abid Abbasi, Abdul Basit Majeed Khan, Hafiz Muhammad Faisal. 1600-1605 [doi]
- On Optimal Power Allocation for Downlink NOMA Transmissions under PHY QoS ConstraintsRajaa Elouafadi, Mustapha Benjillali. 1606-1611 [doi]
- TCO Game in 5G Multi-Tenant Virtualized Mobile BackHaul (V-MBH) NetworkNassim Haddaji, Kim Khoa Nguyen, Mohamed Cheriet. 1612-1618 [doi]
- Low-Complexity Cross-Layer Resource Allocation for Low-Latency D2D-Based Relay NetworksYahui Wang, Chen Xu 0002, Yanhua He, Zhenyu Zhou. 1619-1624 [doi]
- User Grouping Based Multi-Layer Precoding for Multi-Cell 3D MIMO System with Statistical CSIJishi Xue, Yan Liang, Ting Li, Wei Ji, Fei Li. 1625-1629 [doi]
- 5G Dynamic Borrowing Scheduler for IoT communicationsAhlem Saddoud, Wael Doghri, Emna Charfi, Lamia Chaari Fourati. 1630-1635 [doi]
- Social Weak-tie Assisted Cross-domain Short Video RecommendationXichen Wang, Chen Gao, Jingtao Ding, Long Hu, Ying Hu, Yong Li 0008, Depeng Jin. 1636-1643 [doi]
- Deep Convolutional Neural Network with Multi-Task Learning Scheme for Modulations RecognitionOmar S. Mossad, Mustafa ElNainay, Marwan Torki. 1644-1649 [doi]
- Enhancing Energy Efficiency in Wireless Heterogeneous Networks Using Coordinated Multipoint and eNB Parameters TuningNarjes Lassoued, Noureddine Boujnah, Ridha Bouallegue. 1650-1655 [doi]
- Improving Channel Utilization of LoRaWAN by using Novel Channel Access MechanismShahzeb Ahsan, Syed Ali Hassan, Ahsan Adeel, Hassaan Khaliq Qureshi. 1656-1661 [doi]
- Performance Analysis on Fractal Small Cell Networks with MIMO AntennasXiaotong Tian, Jiaqi Chen, Xiaohu Ge, Qiang Li 0009, Yonghui Li. 1662-1667 [doi]
- Efficient pilot design based on the divide and conquer approach for pilot contamination mitigation in massive MIMOMaroua Boudaya, Inès Kammoun 0001, Mohamed Siala 0001. 1668-1673 [doi]
- Centralized Cognitive Radio Based Frequency Allocation for UAVs CommunicationAmira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun. 1674-1679 [doi]
- Channel Estimation for TDD Uplink Massive MIMO Systems via Compressed SensingNoura Derria Lahbib, Maha Cherif Dakhli, Moez Hizem, Ridha Bouallegue. 1680-1684 [doi]
- An Optimized Spatially Cooperative Caching Strategy for Heterogeneous Caching NetworkShubin Zhang, Wen Sun 0004, Jiajia Liu. 1685-1689 [doi]
- Spectrum Occupancy for 802.11a/n/ac Homogeneous and Heterogeneous NetworksNika Mostahinic, Hazem H. Refai. 1690-1695 [doi]
- Hopfield Neural Network-based Fault Location in Wireless and Optical Networks for Smart City IoTBohui Wang, Hui Yang, Qiuyan Yao, Ao Yu, Tao Hong 0004, Jie Zhang, Michel Kadoch, Mohamed Cheriet. 1696-1701 [doi]
- Data Mining and Statistical Analysis on Smart City Services Based on 5G NetworkLei Yu, Qiang Lv, Yonghao Zhang, Hao Li, Peng Yu, Lei Feng 0001, Wenjing Li, Xuesong Qiu. 1702-1707 [doi]
- Location Prediction Based on Comment AnalysisChang Su, Pengfei Wu, Xianzhong Xie. 1708-1713 [doi]
- A Novel Multipath Mitigation Method for 5G PositioningZijie Wang, Rongke Liu, Yifan Zhang, Qirui Liu. 1714-1718 [doi]
- An access point load-balancing algorithm based on service attribute in wireless networkKunhong Li, Shanke Huang, Teng Zhang. 1719-1724 [doi]
- A scheme of seamless handover in Wireless Communications based on sentinel mechanismYanzhi Sun, Yuming Liu, Liqiong Jiang. 1725-1730 [doi]
- A Time-compensation TDOA-based Wireless Positioning Method for Multi-level IoT PositioningJunhua Chen, Tongtong Shi, Yanfei Liu, Shuangli Wu. 1731-1736 [doi]
- A Vibrating Mechanism to Prevent Neural Networks from OverfittingJian-xiong, Kai Zhang, Hao Zhang. 1737-1742 [doi]
- An ANTLR-based Feature Extraction and Detection System for ScratchPai Liu, Yan Sun 0004, Hong Luo. 1743-1748 [doi]
- Business Information Architecture for Big Data and Internet of ThingsM. Saifeddine Hadj Sassi, Lamia Chaari Fourati, Faiza Ghozzi Jedidi. 1749-1756 [doi]
- Embedding Multiple-Step-Ahead Traffic Prediction in Network Energy Efficiency ProblemAbdolkhalegh Bayati, Kim Khoa Nguyen, Mohamed Cheriet. 1757-1763 [doi]
- High Data Rate Multiband GFDM Over Long-haul Standard Single Mode Fiber CommunicationKhalil Aissaoui, Sofien Mhatli, Rabah Attia. 1764-1766 [doi]
- Flow-Based Multiple Spectrum Access in Cognitive Wireless Sensor NetworksHaitham Abu-Ghazaleh, Attahiru Sule Alfa. 1767-1772 [doi]
- MOO-SNLP: Multi Objectives Optimization for Sensor Network Localization ProblemBadia Bouhdid, Wafa Akkari, Abdelfettah Belghith. 1773-1778 [doi]
- Routing Of Spatial Queries Over IOT Enabled Wireless Sensor NetworksKarim FathAllah, Mohamed Amine Abid, Nejib Ben Hadj-Alouane. 1779-1784 [doi]
- Cooperative Sensing and Analysis for a Smart Pothole DetectionNguyen-Van Khang, Éric Renault. 1785-1790 [doi]
- DEEP: Design and Evaluation of an Energy-efficient Wireless Sensor Node for Leak Detection in Water PipesFatma Karray, Mariem Triki, Mohamed Abid. 1791-1796 [doi]
- Exploiting Energy Efficient Routing protocols for Void Hole Alleviation in IoT enabled Underwater WSNMuhammad Awais 0002, Nadeem Javaid, Nidal Naseer, Muhammad Imran. 1797-1802 [doi]
- Autonomous Living Building: Adapting to Occupant's BehaviorDriss Benhaddou, Lotanna Afogbuom, Farouk Attia, Muhammad T. Anan. 1803-1808 [doi]
- Towards a New Graph-based Occupant Behavior Modeling in Smart BuildingNour Haidar, Nouredine Tamani, Yacine Ghamri-Doudane, Alain Bouju. 1809-1814 [doi]
- A Fog Computing Architecture for Energy Demand Scheduling in Smart GridSamira Chouikhi, Leïla Merghem-Boulahia, Moez Esseghir. 1815-1821 [doi]
- An Attention-Mechanism-Based Traffic Flow Prediction Scheme for Smart CityXiao Hu, Xin Wei 0001, Yun Gao, Wenqin Zhuang, Mingzi Chen, Haibing Lv. 1822-1827 [doi]
- An Ad Hoc communication system for an Efficient Milk collection within White AreasMadoune R. Seye, Moussa Diallo, Bamba Gueye, Christophe Cambier. 1828-1832 [doi]
- A rapid detection method for hidden danger points of urban gas pipelines based on the identification areaZhongyu Xie, Zhili Wang, Siya Xu. 1833-1838 [doi]
- Forward-Secure Data Outsourcing Based on Revocable Attribute-Based EncryptionVan-Hoan Hoang, Elyes Lehtihet, Yacine Ghamri-Doudane. 1839-1846 [doi]
- Solving Security Problems in MEC SystemsXiao Zheng, MingChu Li, Yuanfang Chen, Mohsen Guizani, Jia Liu, Muhammad Tahir. 1847-1852 [doi]
- Enhancing Firewall Filter Performance Using Neural NetworksHeba Saleous, Zouheir Trabelsi. 1853-1859 [doi]
- Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud ComputingMariem Bouchaala, Cherif Ghazel, Leïla Azouz Saïdane. 1860-1865 [doi]
- Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model EnhancementPierrette Annie Evina, Faten Labbene-Ayachi, Faouzi Jaïdi, Adel Bouhoula. 1866-1871 [doi]
- XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud EnvironmentsMeryeme Ayache, Amjad Gawanmeh, Jamal N. Al-Karaki. 1872-1878 [doi]
- Deep Learning-Aided Constellation Design for Downlink NOMALu Jiang, Xiangming Li, Neng Ye, Aihua Wang. 1879-1883 [doi]
- Raptor Code based on punctured LDPC for Secrecy in Massive MiMoDjedjiga Benzid, Michel Kadoch, Mohamed Cheriet. 1884-1889 [doi]
- Scheme for High-rate LDPC Codes Based on Dual-Diagonal Matrix with Girth-6Yue Hu, Ling Zhao, Ji Li. 1890-1894 [doi]
- LSTM Based Multiple Beamforming for 5G HAPS IoT NetworksKe Xiao, Chaofei Li, Jianyu Zhao. 1895-1900 [doi]
- Compressed Sensing Based Traffic Prediction For 5G HetNet IoT Video StreamingShuangli Wu, Wei Mao, Tao Hong 0004, Cong Liu 0018, Michel Kadoch. 1901-1906 [doi]
- Design of 5G Dual-Antenna Passive Repeater Based On Machine LearningTao Tang, Tao Hong 0004, Cong Liu 0018, Weiting Zhao, Michel Kadoch. 1907-1912 [doi]
- Wireless Neural Network: Enabling Neural Computing over Wireless Sensor Network Based on Superposition TransmissionsHe Wang, Xiangming Li, Neng Ye, Aihua Wang. 1913-1917 [doi]
- Cluster Aware Mobility Encounter Dataset EnlargementRajarshi Haldar, Salih Safa Bacanli, Moayad Aloqaily, Adel Ben Mnaouer, Damla Turgut. 1918-1922 [doi]
- Real World Modeling and Design of Novel Simulator for Affective Computing Inspired Autonomous VehicleMuhammad Kabeer, Faisal Riaz, Sohail Jabbar, Moayad Aloqaily, Samia Abid. 1923-1928 [doi]
- A hybrid optimization algorithm based on K-means++ and Multi-objective Chaotic Ant Swarm Optimization for WSN in pipeline monitoringYandja Lalle, Maroua Abdelhafidh, Lamia Chaari Fourati, Jihene Rezgui. 1929-1934 [doi]
- Design and Implementation of Programmable Multi-Parametric 4-Degrees of Freedom Seismic Waves Ground Motion Simulation IoT PlatformHasan Tariq, Farid Touati, Mohammed Abdulla E. Al-Hitmi, Damiano Crescini, Adel Ben Manouer. 1935-1939 [doi]
- A Robust Digital Watermarking Algorithm for Text Document Copyright Protection based on Feature CodingMuhammad Munwar Iqbal, Umair Khadam, Ki Jun Han, Jihun Han, Sohail Jabbar. 1940-1945 [doi]
- Evaluating Precision of a new Hybrid Indoor Localization SystemAdel Thaljaoui, Nejah Nasri, Thierry Val, Sami Mahfoudhi, Damien Brulin. 1946-1951 [doi]
- A Fuzzy-based Delay and Energy-Aware Routing Protocol for Multi-hop Cellular NetworksSalwa Othmen, Somia Asklany, Aymen Belghith. 1952-1957 [doi]
- Short-range and Long-range Cooperative Communication for Littoral Environment MonitoringIsmail Bennis, A. Gaugue, M. Menard. 1958-1963 [doi]
- Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access ControlMaroua Nouioua, Belhassen Zouari, Adel Alti. 1964-1970 [doi]
- A New Dijkstra Front-Back Algorithm for Data Routing-Scheduling via Efficient-Energy Area Coverage in wireless Sensor NetworkAdda Boualem, Marwane Ayaida, Youcef Dahmani, Cyril De Runz, Abdelkader Maatoug. 1971-1976 [doi]
- Priority based Safety Management and Slot Reservation for Authenticated VehicleNesrine Meddeb, Amel Meddeb-Makhlouf, Mohamed Ali Ben Ayed. 1977-1982 [doi]
- A Comprehensive Survey on Broadcasting Emergency MessagesFaten Fakhfakh, Mohamed Tounsi 0001, Mohamed Mosbah. 1983-1988 [doi]
- Securing Smart Home Networks with Software-Defined PerimeterAhmed Sallam, Ahmed Refaey, Abdallah Shami. 1989-1993 [doi]
- Network Packetization In Multi-Path Environments & Next-Gen NetworksRazvan Cristian Voicu, Yusun Chang. 1994-2000 [doi]
- Task Offloading for Vehicular Fog Computing under Information Uncertainty: A Matching-Learning ApproachHaijun Liao, Zhenyu Zhou, Xiongwen Zhao, Bo Ai, Shahid Mumtaz. 2001-2006 [doi]
- Convolutional Neural Networks for blind decoding in Sparse Code Multiple AccessImen Abidi, Moez Hizem, Iness Ahriz, Maha Cherif Dakhli, Ridha Bouallegue. 2007-2012 [doi]
- A novel detection and decoding receiver for Polar-Coded SCMA systemImen Abidi, Moez Hizem, Iness Ahriz, Maha Cherif Dakhli, Ridha Bouallegue. 2013-2018 [doi]
- Energy-Efficient Solution Based on Reinforcement Learning Approach in Fog NetworksAdila Mebrek, Moez Esseghir, Leïla Merghem-Boulahia. 2019-2024 [doi]
- A novel approach for performance-based clustering and anagement of network traffic flowsMuna Al-Saadi, Bogdan V. Ghita, Stavros Shiaeles, Panagiotis Sarigiannidis. 2025-2030 [doi]
- Classification Algorithms for Semi-Blind Uplink/Downlink Decoupling in Sub-6 GHz/mmWave 5G NetworksHatim Chergui, Kamel Tourki, Redouane Lguensat, Mustapha Benjillali, Christos V. Verikoukis, Mérouane Debbah. 2031-2035 [doi]
- A Novel Biomimicry-based Analysis of D2D User Association Retention for Achieving Maximal ThroughputSubharthi Banerjee, Michael Hempel, Pejman Ghasemzadeh, Hamid Sharif. 2036-2042 [doi]
- Distributed Resource Allocation Using Iterative Combinatorial Auction for Device-to-Device Underlay Cellular NetworksMohamed Mahfoudhi, Monia Hamdi, Mourad Zaied. 2043-2049 [doi]
- Beam Alignment Game for Self-Organized MmWave-Empowered 5G Initial AccessWissal Attaoui, Khadija Bouraqia, Essaid Sabir, Mustapha Benjillali, Rachid El Azouzi. 2050-2057 [doi]
- Optimal TAS for Cross-Interference Mitigation in Cognitive MIMO MRC SystemsZakaria El-Moutaouakkil, Kamel Tourki, Samir Saoudi, Halim Yanikomeroglu. 2058-2063 [doi]
- UAV-GCS Centralized Data-Oriented Communication Architecture for Crowd Surveillance ApplicationsAmira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun. 2064-2069 [doi]
- A Multidimensional Reputation Evaluation Model for Mobile Crowd SensingDeyu Lin, Quan Wang 0006, Pengfei Yang, Zhiqiang Zhang. 2070-2073 [doi]
- Real-time Spectrum Sensing of Multiple OFDM Signals using Low Cost SDR based Prototype for Cognitive RadioF. Z. El Bahi, Hicham Ghennioui, Mohcine Zouak. 2074-2079 [doi]
- Energy Management For Electric Vehicles in Smart Cities: A Deep Learning ApproachMohammed Laroui, Aicha Dridi, Hossam Afifi, Hassine Moungla, Michel Marot, Moussa Ali Cherif. 2080-2085 [doi]
- A Blockchain based access control for IoTImen Riabi, Yosr Dhif, Hella Kaffel Ben Ayed, Khaled Zaatouri. 2086-2091 [doi]
- A New Optimal Deployment Model of Internet of Things Based on Wireless Sensor NetworksFaten Hajjej, Monia Hamdi, Ridha Ejbali, Mourad Zaied. 2092-2097 [doi]
- Self-Adaptive Management of SDN Distributed Controllers for Highly Dynamic IoT NetworksIntidhar Bedhief, Meriem Kassar, Taoufik Aguili, Luca Foschini, Paolo Bellavista. 2098-2104 [doi]
- Electromagnetic Modeling of Rectenna for Wireless Sensor NetworkSoulayma Smirani, Mourad Aidi, Taoufik Aguili. 2105-2110 [doi]
- An Intelligent Deterministic D2D Communication in Narrow-band Internet of ThingsAli Nauman, Muhammad Ali Jamshed, Yazdan Ahmad, Rashid Ali, Yousaf Bin Zikria, Sung Won Kim. 2111-2115 [doi]
- An IoT and Blockchain-Based Multi-Sensory In-Home Quality of Life Framework for Cancer PatientsMd. Abdur Rahman, Md. Mamunur Rashid, Stuart J. Barnes, M. Shamim Hossain, Elham Hassanain, Mohsen Guizani. 2116-2121 [doi]