default search action
10th ISNCC 2023: Doha, Qatar
- International Symposium on Networks, Computers and Communications, ISNCC 2023, Doha, Qatar, October 23-26, 2023. IEEE 2023, ISBN 979-8-3503-3559-0
- Yosra Bouchoucha, Dorsaf Omri, Taoufik Aguili:
Study of an Improved Rectenna for RF Energy Harvesting in the ISM Band for Energy-Autonomous IoT Cardio Stimulator Applications. 1-6 - Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah:
Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. 1-6 - Dina Banjabi, Nora Almezeini:
Customer Satisfaction Toward Commercial E-Services in Saudi Arabia: A Sentiment Analysis. 1-6 - Bagylan Kadirbay, Saddam Husain, Mohammad S. Hashmi:
Small-Signal Modeling of GaN-on-Diamond HEMT Using ANFIS Method. 1-6 - Md. Rashed Iqbal Nekvi, Sajal Saha, Yaser Al Mtawa, Anwar Haque:
Examining Generative Adversarial Network for Smart Home DDoS Traffic Generation. 1-6 - Miaomiao Shen:
Privacy Protection Smart Agriculture Based on Functional Encryption. 1-5 - Mahmudul Hasan, Sachin Shetty:
Sentiment Analysis With Lipschitz Recurrent Neural Networks. 1-4 - Jihene Rezgui, Enric Soldevila, Abderrazak Mokraoui:
LRIMa City: A Fog-Computing-Based Smart City with Integrated Self-Driving Cars. 1-7 - Dheya Mustafa, Safaa M. Khabour, Ahmed S. Shatnawi, Eyad Taqieddin:
Arabic Sentiment Analysis of Food Delivery Services Reviews. 1-6 - Wesam Al Amiri, Omar Abdelsalam, James T. Jones, Terry N. Guo, Allen B. MacKenzie:
Signals of Opportunity for Car Density Estimation with Limited Training Data. 1-6 - Anas AliAhmad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mohamad Fadli Zolkipli, Mohammed Al-Khalidi:
Malware Detection Issues, Future Trends and Challenges: A Survey. 1-6 - Matthias Rüb, Jan Herbst, Christoph Lipps, Hans Dieter Schotten:
Piezoelectric Beam Path Modulation for Visible Light Communication. 1-6 - Yantao Liu, Na Qin:
An HLA and OPNET Based Co-Simulation System for Internet of Vehicles. 1-4 - Rudolph Etzel, Omar Narine, Konstantinos Georgiou, Thomas Diakogeorgios, Jaden Usman, Puya Ghazizadeh:
Effectiveness of Trust-Based Authentication in Vehicular Cloud Computing. 1-5 - Wuqu Wang, Nan Liu, Wei Kang:
Coded Caching in Request-robust D2D Communication Networks. 1-6 - Chaza Araji, Ayaa Zahra, Leen Alinsari, Maryam Al-aloosi, Omar Elharrouss, Somaya Al-Máadeed:
Multi-scale-based Network for Image Dehazing. 1-5 - Albert H. Carlson, Indira Kalyan Dutta, Bhaskar Ghosh:
A Demonstrable Break of PCBC Mode. 1-6 - Xintong Li, Lidong Zhu, Ke Chu, Wenjun Shi:
High-Throughput Satellite Resource Allocation Strategy Based on OFDM. 1-6 - Eranga Bandara, Sachin Shetty, Peter Foytik, Abdul Rahman, Ravi Mukkamala, Xueping Liang, Nadini Sahabandu:
Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment. 1-8 - Mazharul Hossain, Saikat Das, Bhargavi Krishnamurthy, Sajjan G. Shiva:
Explainability of Artificial Intelligence Systems: A Survey. 1-6 - Muhammad Esmat, Bo Liu, Ali Al-Shaikhi, Sherif M. Hanafy, Mohamed A. Mohandes, Faramarz Fekri:
Automatic First Arrival Picking for Seismic Data using Kalman Filter. 1-5 - Jeong Min Kong, Elvino Sousa:
Adaptive Ratio-Based-Threshold Gradient Sparsification Scheme for Federated Learning. 1-5 - Mohamed Zied Chaari, Mohamed Abdelfath, Gilroy Philbert Pereira, Rabab Sedrati, Mouad El Moudden, Otman Aghzout:
Powering HTC Thermometers and LED Lamps with Microwave Energy. 1-7 - Rafik Aimen Silakhal, Sara Zekri, Osman Salem, Ahmed Mehaoua:
Cyberbullying Detection Through Acoustic and Linguistic Analysis. 1-5 - Fatima Zahra Rabahi, Saadi Boudjit, Leila Benarous:
UAV-Assisted Mesh Network for Emergency Communication in Disaster Areas. 1-6 - Amit Kumar Pathak, Venkatesh Khammammetti, Saif Khan Mohammed:
Spectral Efficiency Performance of OTFS Based Multi-Cell Systems. 1-6 - Toghrul Garalov, Mohammad El-Hajj:
Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System. 1-7 - Ahmed Elmasry, Abdullatif Albaseer, Mohamed Abdallah:
OpenPLC and lib61850 Smart Grid Testbed: Performance Evaluation and Analysis of GOOSE Communication. 1-6 - Mohammed Baziyad, Ibrahim Kamel, Tamer Rabie:
On the Linguistic Limitations of ChatGPT: An Experimental Case Study. 1-6 - Saloua Hendaoui, Nawel Zangar:
Leveraging Unsupervised Machine Learning for New Traffic Types Classification in Hybrid Satellite Terrestrial Network. 1-5 - Hend Fourati, Leïla Azouz Saïdane:
HealthGlasses Project: WBAN Based Communication for Health Monitoring Through Smart Glasses. 1-6 - Jinan Y. Azem, Joni Salminen, Soon-Gyo Jung, Bernard J. Jansen:
Measuring Engagement Through Remote Interactions of Customers: Introducing METRIC. 1-7 - Ioannis Chiotis, Aris L. Moustakas:
Optimal MMSE Processing for Limited-Capacity Radio Stripes. 1-6 - Chaza Araji, Hala Aburajouh, Maryam Al Hail, Elias Yaacoub:
Secure Automated Delivery of Critical Goods with RFID-Based Tracking and Authentication. 1-6 - Abia Amin, Ayalvadi Ganesh, Robert J. Piechocki:
A Novel Intrusion Detection Scheme Using Variational Autoencoders. 1-7 - Mohammed F. Suleiman, Usman Adeel:
Energy-Efficient Routing Using LSTM-Based Deep Learning for Sink Mobility Prediction to Enhance Lifetime and Stability of Wireless Sensor Networks. 1-8 - Claire Rightley, Umit Karabiyik:
Digital Forensic Analysis of AGPTEK Smartwatch Application on Android OS. 1-8 - Khalid Mahmoud Mohammad Dolaat, Aiman Erbad, Muhammad Ibrar:
Enhancing Global Model Accuracy: Federated Learning for Imbalanced Medical Image Datasets. 1-4 - Changrong Chen, Eran A. Edirisinghe, Andrew Leoncé, Greg Simkins, Tamer Khafaga, Moayyed Sher Shah, Umar Yahya:
Deep Neural Networks Based Multiclass Animal Detection and Classification in Drone Imagery. 1-8 - Aviroop Ghosh, Thomas Kunz, Saleh Yousefi:
Importance of Realistic Considerations of Time Synchronization for TAS in TSN Networks. 1-6 - Kashif Khan, Saddam Husain, Galymzhan Nauryzbayev, Mohammad S. Hashmi:
On Temperature-Dependent Small-Signal Behavioral Modelling of GaN HEMT Using GWO-PSO and WOA. 1-6 - Hana Mejdi, Sami Elmadssia, Taher Ezzedine:
Influence of Interference and Sampling Period in the Performance of Networked Control Systems. 1-5 - Marwa Faydi, Amira Zrelli, Tahar Ezzedine:
Smart Environment Monitoring Systems for PM2.5 Prediction Using Deep Learning Models in Smart City. 1-6 - Muhammad Irfan, Aymen Omri, Javier Hernandez Fernandez, Savio Sciancalepore, Gabriele Oligeri:
Jamming Detection in Power Line Communications Leveraging Deep Learning Techniques. 1-6 - Ahmed Ramzi Bahlali, Abdelmalik Bachir, Abdelhakim Cheriet:
Malicious Encrypted Network Traffic Detection Using Deep Auto-Encoder with a Custom Reconstruction Loss. 1-7 - Guoxu Wang, Andrew Leoncé, Eran A. Edirisinghe, Tamer Khafaga, Gregory Simkins, Umar Yahya, Moayyed Sher Shah:
Ghaf Tree Detection from Unmanned Aerial Vehicle Imagery Using Convolutional Neural Networks. 1-8 - Sabiha Yousuf, Roudha Al-Mannai, Bana Al-Naemi, Somaya Al-Máadeed, Naveed Nawaz, Mohamed Zied Chaari:
Smart System for a Self-Driving Scooter Prototype. 1-5 - Mehrdad Sadehvand, Neda Moghim, Behrouz Shahgholi Ghahfarokhi, Sachin Shetty:
Transmission Power Control for Interference Reduction in Cellular D2D Networks. 1-6 - Jawad Khalife, Almaha Mohammed R. M. Albuainain, Eman Humaid S. H. Al-Ejji:
Simple Heuristics For Fast DDoS Detection. 1-5 - AbdulAzeez R. Alobaidi, Thameur Dhieb, Zeina N. Nuimi, Tarek M. Hamdani, Ali Wali, Adel M. Alimi:
New In-Air Signature Datasets. 1-6 - Viet Minh Nguyen, Abdullah Yasin Nur:
Major CyberSecurity Threats in Healthcare During Covid-19 Pandemic. 1-8 - Anestis Papakotoulas, Anastasios Terzidis, Stathes Hadjiefthymiades:
ERITA: Ensuring the Reliability of Internet of Things-Based Applications. 1-6 - Hsuan-Yun Chang, Ahmad Salman:
Cross-Platform Compatibility and Power Optimization for the SAWBRID System. 1-6 - Hana Mejdi, Sami Elmadssia, Taher Ezzedine:
A Study of a Networked Control System under Time Delay. 1-5 - Asma Alotaibi, Alma Oracevic:
Context-Aware Security in the Internet of Things: What We Know and Where We are Going. 1-8 - Sourou Tossou, Miftahul Qorib, Thabet Kacem:
Anomaly Based Intrusion Detection System: A Deep Learning Approach. 1-6 - Ayman Aboulmagd Farghaly, Passent Mohammed El-Kafrawy:
Programmer Performance Prediction with Cognitive Tests: A Granular Approach. 1-6 - Fatma Dhaoui, Amira Zrelli:
Retinal Diseases Classification System Using OCT Images Combined with CNN Models. 1-6 - Hussam Kanaan, Maria Sainz-Ezkerra Galarraga, Mahdi Houchati, Javier Ontañon Ruiz, Santiago Bañales Lopez, Miguel Rodriguez Asensio:
An Improved Distributed Computing Time-Series Short-term Load Forecasting Pipeline for MV Transmission Planning. 1-7 - Amrita Gill, Gnanam Gnanagurunathan, Nafizah Khan, Amin Malekmohammadi:
Absolute Added Correlative Coding using APDs for LEO-LEO OISLs. 1-6 - Chongda Huang, Kaiyuan Huang, Xiaoyuan Li, Yue Xiao:
Design of OvTDM Toward Enhanced Physical Layer Security. 1-4 - Ling Li, Lidong Zhu, Weibang Li:
A Representation Learning Approach Incorporating Entity Descriptions and Types. 1-6 - Mohammad Taghi Dabiri, Mazen O. Hasna, Tamer Khattab:
THz vs. FSO: An Outage Probability and Channel Capacity Performance Comparison Study. 1-6 - Khaoula ElBedoui:
ECG Classifiction Based on Federated Unlearning. 1-5 - Samra Zafar, Muhammad Ibrar, Aiman Erbad, Bakhtawar Zafar, Nizam Hussain Zaydi, Xiaopeng Hu:
Achieving Quality of Service and Traffic Equilibrium in Software-Defined IoT Networks. 1-6 - Marie-Rita Hojeij, Joseph El Assad:
New Resource Allocation Schemes in Multi-Cell Environment Based on Non-Orthogonal Multiple Access for Beyond 5G Systems. 1-6 - Karima Massmi, Khaled Hamouid, Kamel Adi:
Secure Electric Vehicle Dynamic Charging Based on Smart Contracts. 1-6 - Hamad Yahya, Emad Alsusa, Arafat Al-Dweik:
NOMA BER and BLER Performance Evaluation Under the Received Eb/N0. 1-5 - Rahil Bensaid, Adel Ben Mnaouer, Hatem Boujemaa:
Delay Analysis of Routing Protocols for WSN. 1-6 - Aymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro:
Secure and Successful Transmission Probability Analysis for PLC Networks. 1-7 - Fatma Rouissi, Wided Belhaj Sghaier, Héla Gassara, Fethi Tlili:
LSTM-Based Algorithm For Cooperative Communication in Impulse Noise Impaired PLC Channel. 1-5 - Aizhan Ayapbergenova, Mahyar Nemati, Behrouz Maham:
Resource Allocation in Large Intelligent Surfaces/Antennas Using Genetic Algorithm Approach. 1-6 - Mohamed El Hadi Haouari, Abdelkader Tounsi, Osman Salem, Ahmed Mehaoua:
Multimodal Cyber-Harassment Detection. 1-6 - Boniface Uwizeyimana, Osamu Muta, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad, Maha Elsabrouty:
A Multi-Agent Multi-Armed Bandit Approach for User Pairing in UAV-Assisted NOMA-Networks. 1-6 - Samed Kesir, Muhammed Yaser Yagan, Ibrahim Hökelek, Ali Emre Pusane, Ali Görçin:
Rapid CNN-Assisted Iterative RIS Element Configuration. 1-6 - Jawad Ahmad, Mohammad S. Hashmi, Galymzhan Nauryzbayev:
Fabry-Perot Cavity Based Decagonal Shape Patch Antenna for Millimeter-Wave Band Applications. 1-4 - Ali Belgacem, Abbas Bradai, Kadda Beghdad Bey:
ChatGPT backend: A comprehensive analysis. 1-6 - Ali Haider, Sana Saeed, Kashif Bilal, Aiman Erbad:
A Hybrid Approach for Food Name Recognition in Restaurant Reviews. 1-6 - Yiming Li, Yanxiu Jin:
MC-YOLOv5: A small target detection model based on YOLOv5. 1-6 - Mattia Quadrini, Cesare Roseti:
Architectures for Non-Terrestrial RAN: Integrated Satellite Access and Backhaul. 1-6 - Abdulaziz Al-Meer, Saif Al-Kuwari:
A Novel Integrity Protocol Based on Physical Unclonable Functions. 1-6 - Kenneth Okello, Elijah Mwangi, Ahmed H. Abd El-Malek:
Connectivity Probability Analysis for VANETs with Big Vehicle Shadowing. 1-6 - Wesam Al Amiri, Terry N. Guo, Allen B. MacKenzie:
Road Traffic Density Estimation For Adaptive Beam Allocation in an ISAC Setup. 1-6 - Mahdi Houchati, Aymen Omri, Hussam Kanaan, Aiman Erbad, Muhammad Ibrar, Juan M. Corchado, Sergio Márquez Sánchez:
A Novel Optimal Wireless Thermal Sensor Placement Approach for Large Commercial Buildings. 1-7 - Meshari Essa AlFarah, Ibrahim Kamel, Zaher Al Aghbari:
Toward Detection of Arabic Cyberbullying on Online Social Networks using Arabic BERT Models. 1-6 - Rajaa Alqudah, Aya Abugharbieh, Malak Khasawneh, Rasha Harahsheh:
Real-time Translation of American Sign Language into Text Using Machine Learning. 1-6 - Amrin Karim, Jannatul Ema, Tasnia Yasmin, Palash Roy, Md. Abdur Razzaque:
Latency and Cost-Aware Deployment of Dynamic Service Function Chains in 5G Networks. 1-6 - Sakshi Pandey, Amit Banerjee:
A Combinatorial Approach to Cardinality Constraint Sampling Using Branch-and-Bound Technique. 1-6 - Mouna Dhmiri, Yassine Manai, Tahar Ezzedine:
Three-Dimensional Numerical Demonstrating of Blood Light Absorption across Multilayered Biological Tissues. 1-6 - Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:
Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. 1-6 - Hira Hameed, Lubna, Muhammad Usman, Hasan T. Abbas, Ahsen Tahir, Kamran Arshad, Khaled Assaleh, Ahmed Alkhayyat, Muhammad Ali Imran, Qammer H. Abbasi:
Contactless Privacy-Preserving Head Movement Recognition Using Deep Learning for Driver Fatigue Detection. 1-6 - Ali Adnan Abubaker, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Norliza Katuk, Mohammed Al-Khalidi:
Social Engineering in Social Network: A Systematic Literature Review. 1-7 - Labiba Binte Ismail, Mahira Ibnath Joytu, Tasnim Islam Plabon, Muhammad Shafayat Oshman:
Evaluation of Machine Learning Models to Forecast Inflation: Bangladesh as a Case Study. 1-6 - Hemant Gupta, Amiya Nayak:
Use of MQTT-SN in Sending Distress Signals in Vehicular Communication. 1-6 - Saptarsi Saha, Himanshu Gupta, Nama Ravi Teja, Soumya Kothari, D. V. N. Siva Kumar:
An Efficient Blockchain and Smart Contracts Based Approach for Document Verification. 1-8 - Javad B. Ebrahimi, Alireza Tofighi Mohammadi, Fatemeh Kermani:
Differentially Private All-Pairs Shortest Distances for Low Tree-Width Graphs. 1-6 - Najmath Ottakath, Younes Akbari, Somaya Al-Máadeed, Ahmed Bouridane, Fouad Khelifi:
Exploring Classification Models for Video Source Device Identification: A Study of CNN-SVM and Softmax Classifier. 1-6 - Hooshang Abbaspour, Ghazal Najafi:
Location Estimation of Moving Targets by Passive Sonobuoy and Recurrent Deep Neural Network. 1-6 - Muneera Al-Ghafran, Fatemeh Ahmadizadeh, Asma Al-Naimi, Khalid Abualsaud, Elias Yaacoub:
Asthma Assessment Device for Pediatric Patients: A Proof of Concept. 1-6 - Dominic John Mondia, Kyle Nathan Naranjo, Stephen Tristan Galamay, Nestor Michael C. Tiglao:
AIComprehend: An Adaptive Reading Comprehension Learning Platform Using Machine Learning. 1-6 - Dominik Krah, Stefan Farthofer, Peter Dorfinger:
Estimating 5G Cell Utilization by Passive Measurement: A Machine Learning Approach. 1-6 - Tufik M. Buzid, Hisham Sager, Abdeljawad E. Ramadan:
Frequency Domain UWB Receiver Instead of Low Complexity Rake Receiver. 1-4 - Dareen Douglas, Nada Ben Hassen, Asmaa Aslam, Omar Elharrouss, Somaya Al-Máadeed:
Face Anti-Spoofing Detection Using Structure-Texture Decomposition. 1-5 - Jan Herbst, Jan Petershans, Matthias Rüb, Christoph Lipps, Ann-Kathrin Beck, Joana C. Carmo, Thomas Lachmann, Hans Dieter Schotten:
Inception Based Deep Learning: Biometric Identification Using Electroencephalography (EEG). 1-7 - Saraa N. K. Alasadi, Oula M. H. Fatla:
Utilizing Artificial Neural Networks for Predicting Delays and Assessing Contractor Performance in Roadworks Projects. 1-5 - Mansoor Al-Thani, Dena Al-Thani:
Link Analysis and Shortest Path Algorithm for Money Laundry Detection. 1-7 - Mattia Quadrini, Domenico Verde, Michele Luglio, Cesare Roseti, Francesco Zampognaro:
Implementation and Testing of MP-TCP ATSSS in a 5G Multi-Access Configuration. 1-6 - Lamiaa Basyoni, Junaid Qadir:
AI Generated Content in the Metaverse: Risks and Mitigation Strategies. 1-4 - Floris Breggeman, Mohammad El-Hajj, Florian Hahn:
A Comparison of Authentication Protocols for Unified Client Applications. 1-7 - Amine Bab, Saïah Bekkar-Djelloul-Saïah, Djamel Eddine Baba Hamed, Boualem Nasri, Abdelhak Benikhlef:
Comparative Approach in the Gain Study for Two Popular Shapes of S-Band Microstrip Patch Antenna for CubeSats. 1-6 - Hemant Gupta, Amiya Nayak:
Addressing IoT Security Challenges: A Framework for Determining Security Requirements of Smart Locks Leveraging MQTT-SN. 1-7 - Wenjun Shi, Lidong Zhu, Yanggege Zhang, Ke Chu, Ean He, Yimai Shi, Yong Zhang, Wen He, Kun Liu:
A DOA Estimation Method with High Resolution in the Presence of Satellite Array Error. 1-6 - Mohammad Meraj Mirza, Shinelle Hutchinson, Rebecca Gee, Umit Karabiyik:
No Filters: A Deep Dive into Photo Sharing Apps on Android and iOS. 1-8 - Oleg Serov, Mohamed Zied Chaari:
Microstrip Patch Rectenna for Electromagnetic Wireless Power Transfer at 2.45 GHz. 1-5 - Mohammed Lalou, Hamamache Kheddouci:
Network Vulnerability Assessment Using Critical Nodes Identification. 1-6 - Saddam Husain, Miras Akhmetov, Damir Kanymkulov, Galymzhan Nauryzbayev, Mohammad S. Hashmi:
Optimization of Behavioral Model of VO2 Switches Using Slime Mould Algorithm. 1-6 - Tarek Ali, Amna Eleyan, Tarek Bejaoui:
Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review. 1-7 - Sahar Salmanzade Yazdi, Fatma Najar, Nizar Bouguila:
Generalized Probabilistic Clustering Projection Models for Discrete Data. 1-7 - Farag Azzedin, Mustafa Ghaleb, Yasser El-Alfy, Raed Katib, Md. Hossain:
A Federated Learning Approach to Banking Loan Decisions. 1-7 - Mohamed Yanis Sadaoui, Sirine Hamza, Osman Salem, Ahmed Mehaoua:
Bluetooth Just Works: Security and Vulnerability. 1-5 - Alaa Jalal Tamimi, Iyad Hashlamon:
Arabic Sign Language Datasets: Review and Improvements. 1-6 - Mehri Borhani Kakhki, Ahmed Shehata Abdellatif, Hari Krishna Pothula, David Wessel:
Topology of $32\times 32$ Butler Matrix. 1-4 - Muna Al-Fadhli, Somaya Al-Máadeed, Nuri Cihat Onat, Abdelhamid Abdessadok:
A Data-Driven Approach to Assessing Digital Transformation Maturity Factors in Government Institutes. 1-8 - Viswanath KumarSkandPriya, Abdulhalim Dandoush, Gladys Diaz:
Slicenet: a Simple and Scalable Flow-Level Simulator for Network Slice Provisioning and Management. 1-6 - Umair Mehmood, Ali Kashif Bashir, Khaled M. Rabie, John Broderick, Simon Davies:
Vending Machine Product Demand Prediction Using Machine Learning Algorithms. 1-6 - Erol Özkan, Ibrahim Kök, Suat Özdemir:
Autonomous Micro-Grids: A Reinforcement Learning-Based Energy Management Model in Smart Cities. 1-6 - Mattia Quadrini, Cesare Roseti, Francesco Zampognaro, Lorenzo Serranti:
Data Collection Using NWDAF Network Function in a 5G Core Network with Real Traffic. 1-7 - Thabet Kacem:
VANET-Sec: A Framework to Secure Vehicular Ad-Hoc Networks Using a Permissioned Blockchain. 1-6 - Myra Khalid, Aamina Akbar, Hassaan Khaliq Qureshi, Sobia Jangsher:
Joint Backhaul Pairing and Resource Allocation of Moving Small Cells Using NOMA. 1-6 - Yashovardhan Bapat, Shreya Aiyer, Akhil A Binu, Chandra Shekar R K, Shubhangi K. Gawali, Lucy J. Gudino, Neena Goveas:
IoT-Based Local Setup for Interfacing Resource Constrained Devices: A Survey. 1-6 - Zakia Zouaghia, Zahra Kodia Aouina, Lamjed Ben Said:
Hybrid Machine Learning Model for Predicting NASDAQ Composite Index. 1-6 - Josep Genovard-Oliver, Maria Frontera-Bergas, Miguel Vinaixa-Fernández, Bartomeu Oliver-Riera, Jaume Ramis-Bibiloni, Eugeni Isern, Miquel Roca, Bartomeu Alorda-Ladaria:
Monitoring Medicine Quality Conservation: An IoT-Based Platform Design. 1-8 - Abdullah Hosseini, Saeid Houti, Junaid Qadir:
Deep Reinforcement Learning for Autonomous Navigation on Duckietown Platform: Evaluation of Adversarial Robustness. 1-6 - Chafika Ouni, Emna Benmohamed, Hela Ltifi:
DI-ESN: Dual Input-Echo State Network for Time Series Forecasting. 1-6 - Dheya Mustafa, Layan Sawaged, Safaa M. Khabour:
Predictive Analysis of Jordan Road Accidents Severity Using Machine Learning. 1-6 - Rodrigue N'goran, Aguié Pacôme Bertrand Brou, Koffi Ghislain Pandry, Jean-Louis Tetchueng, Yvon Kermarrec, Olivier Asseu:
Zero Trust Security Strategy for Collaboration Systems. 1-6 - Aliya Tabassum, Ezieddin Elmahjub, Junaid Qadir:
Pathway to Prosocial AI-XR Metaverses: A Synergy of Technical and Regulatory Approaches. 1-8 - Yimai Shi, Lidong Zhu, Ean He, Wenjun Shi, Yong Zhang, Wen He, Kun Liu:
An Interference Null Widening Algorithm Based on U-V Domain Expansion of Steering Vector. 1-6 - Bing Swen Sun:
Internet Evolution with IPswen: Towards the Next Generation TCP/IPv4 Internet Architecture. 1-14 - Younes Akbari, Jayakanth Kunhoth, Omar Elharrouss, Somaya Al-Máadeed, Khalid Abualsaud, Amr Mohamed, Tamer Khattab:
Indoor Multi-Lingual Scene Text Database with Different Views. 1-6 - Isaac Ampratwum, Amiya Nayak:
A Nested Genetic Algorithm-Based Optimized Topology and Routing Scheme for WSN. 1-6 - Mahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya, Mahamat Charfadine Salim, Mahamat Borgour Hassan:
Latest Generation Technologies for Network Coverage in Infrastructure-Less Areas. 1-6 - Haitham Alajmi, Mohammed M. Bait-Suwailam:
Multi-Band Electromagnetic Metasurface Absorber Design Using Concentric Split-Ring Resonators. 1-4 - Rim Moussa, Riad Ouechtatti, Ahmed Rezgui, Tarek Bejaoui:
Exploration of Document-Oriented Stores' Capacities for Managing Community e-Mailing Lists: Elastic Stack as a Case Study. 1-6 - Rym Moussaoui, Djihane Oum Keltoum Harouni, Osman Salem, Ahmed Mehaoua:
Dual Autoencoders for Network-Based Detection of BaIoT Attacks. 1-6 - Yassine Lakhdari, Enric Soldevila, Jihene Rezgui, Éric Renault:
Detection of Plant Diseases in an Industrial Greenhouse: Development, Validation & Exploitation. 1-6 - Takoua Mahjoub, Adel Ben Mnaouer, Hatem Boujemaa, Maymouna Ben Said:
Performance Analysis of LoRa for Rice Fading Channels. 1-6 - Chaima Ferchichi, Dorsaf Omri, Taoufik Aguili:
Utilizing 1D Convolutional Neural Networks for Enhanced Design and Optimization of Rectangular Patch Antenna Parameters. 1-6 - Tan-Jan Ho, Bo-Han Huang:
Resilient Model-Based Mobile Location Estimators Incorporating Measured Target Speed for Maneuver Tracking. 1-6 - Auns Khaled, Dorsaf Omri, Taoufik Aguili:
Novel Mathematical Formulation in Time and Space Domains of Transient Scattering Problem Applied to a Parabolic Antenna. 1-6 - Steven Rico, Kanika Sood, Kevin Hsu, Ethan Trinh:
Interpreting Live Video Sign Language and Translate into Text. 1-6 - Anisur Rahman:
Underwater Localization: a Pragmatic Approach. 1-7 - Kevin Coello, Kaiyue Zhou, Harsha Nutalapati, Nestor Michael C. Tiglao:
Performance Analysis of Credit Card Fraud Analysis and Detection Machine Learning Algorithms. 1-6 - Souryendu Das, Stavros Kalafatis:
Network Coding to Reduce Congestion and Improve Memory Buffer in Smart Switch. 1-6 - Nauman Ullah Gilal, Fahad Majeed, Khaled A. Al-Thelaya, Mehak Khan, Jens Schneider, Marco Agus:
Noise2Seg: Automatic Few-Shot Selection from Noisy Web Data for Underwater Tropical Fishes Segmentation. 1-6 - Mickael Mohammed, Osman Salem, Ahmed Mehaoua:
Artificial Intelligence for Anomaly Detection in IoMTs. 1-6 - Mostafa Abdelhamid, Mohammed Alhato, Ali Elmancy, Somaya Al-Máadeed, Omar Elharrouss:
Intelligent Brain Tumor Detector. 1-6 - Kunal Chhatrapati, Kanika Sood, Purva Surve:
Human Activity Recognition Using Ambient Sensors. 1-8 - Nishat Ara Nipa, Yan Lu, Sachin Shetty:
U-Net Based Disaster Damage Detection Through Semantic Segmentation. 1-5 - Guoxu Wang, Andrew Leoncé, Hakim Hacid, Eran A. Edirisinghe:
Deep Neural Network Based Automatic Litter Detection in Desert Areas Using Unmanned Aerial Vehicle Imagery. 1-8 - Lounès Meddahi, Ahmed Meddahi, Patrick Sondi, Fen Zhou:
Leveraging Blockchain for a Robust and Scalable Device Identification in LoRaWAN. 1-6 - Zeneya Sharmin, Palash Roy, Md. Abdur Razzaque:
User Quality of Experience and Profit Aware Task Allocation in Mobile Device Cloud. 1-6 - Yutong He, Lidong Zhu, Sixi Cheng:
ICST Chaotic Mapping for Anti-Prediction Frequency Hopping Sequence Generation. 1-5 - Marcel Fernandez, Grigory Kabatiansky, Ibrahim Kamel, Ying Miao, Tamer F. Rabie:
Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise. 1-5 - Mariam Fliss R., Mahdi Houchati, Arantxa Ortiz Marina, Santiago Bañales Lopez:
Data Driven DRL Model For Home-Energy Control. 1-7 - Thomas Hupperich:
On DDoS Attacks as an Expression of Digital Protest in the Russo-Ukrainian War 2022. 1-8 - El-Habib Bensikaddour, Boualem Nasri, Abdelhak Benikhlef, Djamel Eddine Baba Hamed:
Acquisition of Satellite Telemtry Using a Low-Cost FPGA Board. 1-5 - Arwa Amaira, Koubaa Hend, Faouzi Zarai:
Performance Study in HetNets Using Dual Connectivity and Deep Reinforcement Learning. 1-6 - Zakia Zouaghia, Zahra Kodia Aouina, Lamjed Ben Said:
Stock Movement Prediction Based On Technical Indicators Applying Hybrid Machine Learning Models. 1-4 - Nada Shahin, Leila Ismail:
ChatGPT, Let Us Chat Sign Language: Experiments, Architectural Elements, Challenges and Research Directions. 1-7 - Jawad Khalife, Fatima Tariq Hussain M. Nassar, Maryam Hamad M. KH Al Marri:
New Heuristics Method for Malicious URLs Detection Using Machine Learning. 1-6 - Yulia Kumar, Justin Delgado, E. Kupershtein, Brendan Hannon, Zachary Gordon, J. Jenny Li, Patricia Morreale:
AssureAIDoctor- A Bias-Free AI Bot. 1-6 - Yazan Aref, Abdelkader Ouda:
Still Computers Networking is Less Secure Than It should be, Causes and Solution. 1-8 - Emmanuel Asamoah, Isaac Ampratwum, Amiya Nayak:
A Genetic Algorithm-Based Improved Availability Framework for Controller Placement in SDN. 1-7 - Bharti Moryani, Kanika Sood, Kirti Chaudhary:
A Deep Learning Approach for the Classification of Tuberculosis and Pneumonia Using NIH Dataset. 1-8 - Hela Marouane, Abdulhalim Dandoush, Lamine Amour, Aiman Erbad:
Performance Evaluation of Machine Learning-Based Misbehavior Detection Systems in VANETs: A Comprehensive Study. 1-6 - Andy Reed, Laurence S. Dooley, Soraya Kouadri Mostéfaoui:
Packet Filtering and Sampling for Efficient Slow Denial of Service Detection in Resource Scarce IoT Networks. 1-6 - Jayakanth Kunhoth, Mahdi Alkaeed, Adeel Ehsan, Junaid Qadir:
VisualAid+: Assistive System for Visually Impaired with TinyML Enhanced Object Detection and Scene Narration. 1-8 - Khaled Hamouid, Mohamed Mohammedi:
Dynamic and Flexible Access Control for IoT-Enabled Smart Healthcare. 1-6 - Syed Rizvi, Anthony Hammill, Hans Esteban, Mark Ihnat:
Data Protection and Data Recovery Plan for IoT Transportation Domain. 1-8 - Udayan Das, Cynthia S. Hood, Vaishali Nagpure:
A Reasoning System Architecture for Spectrum Decision Making. 1-10 - Moutaz Saleh Mustafa Saleh, Roudha Al-Rumaihi, Slafa Al-Dulaimi, Alaa Abashar:
IPattern: Islamic-Inspired Pattern Generation Using Generative Adversarial Networks. 1-6 - Noor Khial, Nema Ahmed, Reem Bassam Tluli, Elias Yaacoub, Amr Mohamed:
Online Learning Approach for Jammer Detection in UAV Swarms Using Multi-Armed Bandits. 1-6 - Jiahong Wu, Nan Liu, Wei Kang:
The Closure of the Entropy Region is Not Closed Under Polymatroid Duality for Four Discrete Random Variables. 1-4 - Ahmed Badawi, Hassan Ali, I. M. Elzein, Alhareth Zyoud, Ammar M. Abu-Hudrouss:
Highly Efficient Pure Sine Wave Inverter Using Microcontroller for Photovoltaic Applications. 1-6 - Manel Chenait, Chafika Benzaïd, Bahia Zebbane:
Linear Complexity for k-Coverage Sensor Redundancy Determination in IoT. 1-6 - Mofareh Waqdan, Habib Louafi, Malek Mouhoub:
An IoT Security Risk Assessment Framework for Healthcare Environment. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.