


default search action
10th ISNCC 2023: Doha, Qatar
- International Symposium on Networks, Computers and Communications, ISNCC 2023, Doha, Qatar, October 23-26, 2023. IEEE 2023, ISBN 979-8-3503-3559-0

- Yosra Bouchoucha, Dorsaf Omri, Taoufik Aguili:

Study of an Improved Rectenna for RF Energy Harvesting in the ISM Band for Energy-Autonomous IoT Cardio Stimulator Applications. 1-6 - Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah:

Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. 1-6 - Dina Banjabi, Nora Almezeini:

Customer Satisfaction Toward Commercial E-Services in Saudi Arabia: A Sentiment Analysis. 1-6 - Bagylan Kadirbay, Saddam Husain, Mohammad S. Hashmi

:
Small-Signal Modeling of GaN-on-Diamond HEMT Using ANFIS Method. 1-6 - Md. Rashed Iqbal Nekvi, Sajal Saha, Yaser Al Mtawa, Anwar Haque

:
Examining Generative Adversarial Network for Smart Home DDoS Traffic Generation. 1-6 - Miaomiao Shen:

Privacy Protection Smart Agriculture Based on Functional Encryption. 1-5 - Mahmudul Hasan, Sachin Shetty:

Sentiment Analysis With Lipschitz Recurrent Neural Networks. 1-4 - Jihene Rezgui, Enric Soldevila, Abderrazak Mokraoui:

LRIMa City: A Fog-Computing-Based Smart City with Integrated Self-Driving Cars. 1-7 - Dheya Mustafa, Safaa M. Khabour, Ahmed S. Shatnawi, Eyad Taqieddin:

Arabic Sentiment Analysis of Food Delivery Services Reviews. 1-6 - Wesam Al Amiri, Omar Abdelsalam, James T. Jones, Terry N. Guo, Allen B. MacKenzie:

Signals of Opportunity for Car Density Estimation with Limited Training Data. 1-6 - Anas AliAhmad, Derar Eleyan, Amna Eleyan

, Tarek Bejaoui, Mohamad Fadli Zolkipli, Mohammed Al-Khalidi:
Malware Detection Issues, Future Trends and Challenges: A Survey. 1-6 - Matthias Rüb, Jan Herbst, Christoph Lipps, Hans Dieter Schotten:

Piezoelectric Beam Path Modulation for Visible Light Communication. 1-6 - Yantao Liu, Na Qin:

An HLA and OPNET Based Co-Simulation System for Internet of Vehicles. 1-4 - Rudolph Etzel, Omar Narine, Konstantinos Georgiou, Thomas Diakogeorgios, Jaden Usman, Puya Ghazizadeh:

Effectiveness of Trust-Based Authentication in Vehicular Cloud Computing. 1-5 - Wuqu Wang, Nan Liu, Wei Kang:

Coded Caching in Request-robust D2D Communication Networks. 1-6 - Chaza Araji, Ayaa Zahra, Leen Alinsari, Maryam Al-aloosi, Omar Elharrouss, Somaya Al-Máadeed:

Multi-scale-based Network for Image Dehazing. 1-5 - Albert H. Carlson, Indira Kalyan Dutta, Bhaskar Ghosh:

A Demonstrable Break of PCBC Mode. 1-6 - Xintong Li, Lidong Zhu, Ke Chu, Wenjun Shi:

High-Throughput Satellite Resource Allocation Strategy Based on OFDM. 1-6 - Eranga Bandara, Sachin Shetty, Peter Foytik, Abdul Rahman, Ravi Mukkamala, Xueping Liang, Nadini Sahabandu:

Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment. 1-8 - Mazharul Hossain

, Saikat Das
, Bhargavi Krishnamurthy, Sajjan G. Shiva:
Explainability of Artificial Intelligence Systems: A Survey. 1-6 - Muhammad Esmat, Bo Liu, Ali Al-Shaikhi, Sherif M. Hanafy, Mohamed A. Mohandes, Faramarz Fekri

:
Automatic First Arrival Picking for Seismic Data using Kalman Filter. 1-5 - Jeong Min Kong, Elvino Sousa:

Adaptive Ratio-Based-Threshold Gradient Sparsification Scheme for Federated Learning. 1-5 - Mohamed Zied Chaari, Mohamed Abdelfath, Gilroy Philbert Pereira

, Rabab Sedrati, Mouad El Moudden, Otman Aghzout:
Powering HTC Thermometers and LED Lamps with Microwave Energy. 1-7 - Rafik Aimen Silakhal, Sara Zekri, Osman Salem, Ahmed Mehaoua:

Cyberbullying Detection Through Acoustic and Linguistic Analysis. 1-5 - Fatima Zahra Rabahi, Saadi Boudjit, Leila Benarous:

UAV-Assisted Mesh Network for Emergency Communication in Disaster Areas. 1-6 - Amit Kumar Pathak, Venkatesh Khammammetti

, Saif Khan Mohammed:
Spectral Efficiency Performance of OTFS Based Multi-Cell Systems. 1-6 - Toghrul Garalov, Mohammad El-Hajj:

Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System. 1-7 - Ahmed Elmasry, Abdullatif Albaseer, Mohamed Abdallah:

OpenPLC and lib61850 Smart Grid Testbed: Performance Evaluation and Analysis of GOOSE Communication. 1-6 - Mohammed Baziyad, Ibrahim Kamel, Tamer Rabie:

On the Linguistic Limitations of ChatGPT: An Experimental Case Study. 1-6 - Saloua Hendaoui, Nawel Zangar:

Leveraging Unsupervised Machine Learning for New Traffic Types Classification in Hybrid Satellite Terrestrial Network. 1-5 - Hend Fourati, Leïla Azouz Saïdane:

HealthGlasses Project: WBAN Based Communication for Health Monitoring Through Smart Glasses. 1-6 - Jinan Y. Azem, Joni Salminen, Soon-Gyo Jung, Bernard J. Jansen:

Measuring Engagement Through Remote Interactions of Customers: Introducing METRIC. 1-7 - Ioannis Chiotis

, Aris L. Moustakas:
Optimal MMSE Processing for Limited-Capacity Radio Stripes. 1-6 - Chaza Araji, Hala Aburajouh, Maryam Al Hail, Elias Yaacoub:

Secure Automated Delivery of Critical Goods with RFID-Based Tracking and Authentication. 1-6 - Abia Amin, Ayalvadi Ganesh

, Robert J. Piechocki
:
A Novel Intrusion Detection Scheme Using Variational Autoencoders. 1-7 - Mohammed F. Suleiman

, Usman Adeel:
Energy-Efficient Routing Using LSTM-Based Deep Learning for Sink Mobility Prediction to Enhance Lifetime and Stability of Wireless Sensor Networks. 1-8 - Claire Rightley, Umit Karabiyik:

Digital Forensic Analysis of AGPTEK Smartwatch Application on Android OS. 1-8 - Khalid Mahmoud Mohammad Dolaat, Aiman Erbad, Muhammad Ibrar:

Enhancing Global Model Accuracy: Federated Learning for Imbalanced Medical Image Datasets. 1-4 - Changrong Chen, Eran A. Edirisinghe, Andrew Leoncé, Greg Simkins, Tamer Khafaga, Moayyed Sher Shah, Umar Yahya

:
Deep Neural Networks Based Multiclass Animal Detection and Classification in Drone Imagery. 1-8 - Aviroop Ghosh

, Thomas Kunz, Saleh Yousefi:
Importance of Realistic Considerations of Time Synchronization for TAS in TSN Networks. 1-6 - Kashif Khan

, Saddam Husain, Galymzhan Nauryzbayev, Mohammad S. Hashmi
:
On Temperature-Dependent Small-Signal Behavioral Modelling of GaN HEMT Using GWO-PSO and WOA. 1-6 - Hana Mejdi

, Sami Elmadssia, Taher Ezzedine:
Influence of Interference and Sampling Period in the Performance of Networked Control Systems. 1-5 - Marwa Faydi, Amira Zrelli

, Tahar Ezzedine
:
Smart Environment Monitoring Systems for PM2.5 Prediction Using Deep Learning Models in Smart City. 1-6 - Muhammad Irfan

, Aymen Omri, Javier Hernandez Fernandez
, Savio Sciancalepore
, Gabriele Oligeri:
Jamming Detection in Power Line Communications Leveraging Deep Learning Techniques. 1-6 - Ahmed Ramzi Bahlali

, Abdelmalik Bachir, Abdelhakim Cheriet:
Malicious Encrypted Network Traffic Detection Using Deep Auto-Encoder with a Custom Reconstruction Loss. 1-7 - Guoxu Wang, Andrew Leoncé, Eran A. Edirisinghe, Tamer Khafaga, Gregory Simkins, Umar Yahya

, Moayyed Sher Shah:
Ghaf Tree Detection from Unmanned Aerial Vehicle Imagery Using Convolutional Neural Networks. 1-8 - Sabiha Yousuf, Roudha Al-Mannai, Bana Al-Naemi, Somaya Al-Máadeed, Naveed Nawaz, Mohamed Zied Chaari:

Smart System for a Self-Driving Scooter Prototype. 1-5 - Mehrdad Sadehvand

, Neda Moghim
, Behrouz Shahgholi Ghahfarokhi, Sachin Shetty:
Transmission Power Control for Interference Reduction in Cellular D2D Networks. 1-6 - Jawad Khalife, Almaha Mohammed R. M. Albuainain, Eman Humaid S. H. Al-Ejji:

Simple Heuristics For Fast DDoS Detection. 1-5 - AbdulAzeez R. Alobaidi

, Thameur Dhieb, Zeina N. Nuimi, Tarek M. Hamdani, Ali Wali, Adel M. Alimi
:
New In-Air Signature Datasets. 1-6 - Viet Minh Nguyen, Abdullah Yasin Nur

:
Major CyberSecurity Threats in Healthcare During Covid-19 Pandemic. 1-8 - Anestis Papakotoulas, Anastasios Terzidis, Stathes Hadjiefthymiades:

ERITA: Ensuring the Reliability of Internet of Things-Based Applications. 1-6 - Hsuan-Yun Chang, Ahmad Salman

:
Cross-Platform Compatibility and Power Optimization for the SAWBRID System. 1-6 - Hana Mejdi

, Sami Elmadssia, Taher Ezzedine:
A Study of a Networked Control System under Time Delay. 1-5 - Asma Alotaibi, Alma Oracevic

:
Context-Aware Security in the Internet of Things: What We Know and Where We are Going. 1-8 - Sourou Tossou, Miftahul Qorib, Thabet Kacem

:
Anomaly Based Intrusion Detection System: A Deep Learning Approach. 1-6 - Ayman Aboulmagd Farghaly

, Passent Mohammed El-Kafrawy:
Programmer Performance Prediction with Cognitive Tests: A Granular Approach. 1-6 - Fatma Dhaoui, Amira Zrelli:

Retinal Diseases Classification System Using OCT Images Combined with CNN Models. 1-6 - Hussam Kanaan, Maria Sainz-Ezkerra Galarraga, Mahdi Houchati, Javier Ontañon Ruiz, Santiago Bañales Lopez, Miguel Rodriguez Asensio:

An Improved Distributed Computing Time-Series Short-term Load Forecasting Pipeline for MV Transmission Planning. 1-7 - Amrita Gill

, Gnanam Gnanagurunathan
, Nafizah Khan
, Amin Malekmohammadi
:
Absolute Added Correlative Coding using APDs for LEO-LEO OISLs. 1-6 - Chongda Huang

, Kaiyuan Huang, Xiaoyuan Li, Yue Xiao:
Design of OvTDM Toward Enhanced Physical Layer Security. 1-4 - Ling Li, Lidong Zhu, Weibang Li:

A Representation Learning Approach Incorporating Entity Descriptions and Types. 1-6 - Mohammad Taghi Dabiri, Mazen O. Hasna, Tamer Khattab:

THz vs. FSO: An Outage Probability and Channel Capacity Performance Comparison Study. 1-6 - Khaoula ElBedoui

:
ECG Classifiction Based on Federated Unlearning. 1-5 - Samra Zafar, Muhammad Ibrar, Aiman Erbad, Bakhtawar Zafar, Nizam Hussain Zaydi, Xiaopeng Hu:

Achieving Quality of Service and Traffic Equilibrium in Software-Defined IoT Networks. 1-6 - Marie-Rita Hojeij

, Joseph El Assad:
New Resource Allocation Schemes in Multi-Cell Environment Based on Non-Orthogonal Multiple Access for Beyond 5G Systems. 1-6 - Karima Massmi, Khaled Hamouid, Kamel Adi

:
Secure Electric Vehicle Dynamic Charging Based on Smart Contracts. 1-6 - Hamad Yahya, Emad Alsusa, Arafat Al-Dweik:

NOMA BER and BLER Performance Evaluation Under the Received Eb/N0. 1-5 - Rahil Bensaid, Adel Ben Mnaouer

, Hatem Boujemaa:
Delay Analysis of Routing Protocols for WSN. 1-6 - Aymen Omri, Javier Hernandez Fernandez

, Roberto Di Pietro
:
Secure and Successful Transmission Probability Analysis for PLC Networks. 1-7 - Fatma Rouissi, Wided Belhaj Sghaier, Héla Gassara, Fethi Tlili:

LSTM-Based Algorithm For Cooperative Communication in Impulse Noise Impaired PLC Channel. 1-5 - Aizhan Ayapbergenova, Mahyar Nemati, Behrouz Maham:

Resource Allocation in Large Intelligent Surfaces/Antennas Using Genetic Algorithm Approach. 1-6 - Mohamed El Hadi Haouari, Abdelkader Tounsi, Osman Salem, Ahmed Mehaoua:

Multimodal Cyber-Harassment Detection. 1-6 - Boniface Uwizeyimana

, Osamu Muta, Ahmed H. Abd El-Malek
, Mohammed Abo-Zahhad, Maha Elsabrouty:
A Multi-Agent Multi-Armed Bandit Approach for User Pairing in UAV-Assisted NOMA-Networks. 1-6 - Samed Kesir, Muhammed Yaser Yagan, Ibrahim Hökelek, Ali Emre Pusane, Ali Görçin:

Rapid CNN-Assisted Iterative RIS Element Configuration. 1-6 - Jawad Ahmad

, Mohammad S. Hashmi
, Galymzhan Nauryzbayev:
Fabry-Perot Cavity Based Decagonal Shape Patch Antenna for Millimeter-Wave Band Applications. 1-4 - Ali Belgacem, Abbas Bradai, Kadda Beghdad Bey:

ChatGPT backend: A comprehensive analysis. 1-6 - Ali Haider, Sana Saeed, Kashif Bilal, Aiman Erbad:

A Hybrid Approach for Food Name Recognition in Restaurant Reviews. 1-6 - Yiming Li

, Yanxiu Jin:
MC-YOLOv5: A small target detection model based on YOLOv5. 1-6 - Mattia Quadrini, Cesare Roseti:

Architectures for Non-Terrestrial RAN: Integrated Satellite Access and Backhaul. 1-6 - Abdulaziz Al-Meer, Saif Al-Kuwari:

A Novel Integrity Protocol Based on Physical Unclonable Functions. 1-6 - Kenneth Okello, Elijah Mwangi, Ahmed H. Abd El-Malek

:
Connectivity Probability Analysis for VANETs with Big Vehicle Shadowing. 1-6 - Wesam Al Amiri, Terry N. Guo, Allen B. MacKenzie:

Road Traffic Density Estimation For Adaptive Beam Allocation in an ISAC Setup. 1-6 - Mahdi Houchati, Aymen Omri, Hussam Kanaan, Aiman Erbad, Muhammad Ibrar, Juan M. Corchado, Sergio Márquez Sánchez:

A Novel Optimal Wireless Thermal Sensor Placement Approach for Large Commercial Buildings. 1-7 - Meshari Essa AlFarah

, Ibrahim Kamel, Zaher Al Aghbari:
Toward Detection of Arabic Cyberbullying on Online Social Networks using Arabic BERT Models. 1-6 - Rajaa Alqudah, Aya Abugharbieh, Malak Khasawneh, Rasha Harahsheh:

Real-time Translation of American Sign Language into Text Using Machine Learning. 1-6 - Amrin Karim, Jannatul Ema, Tasnia Yasmin, Palash Roy

, Md. Abdur Razzaque:
Latency and Cost-Aware Deployment of Dynamic Service Function Chains in 5G Networks. 1-6 - Sakshi Pandey

, Amit Banerjee:
A Combinatorial Approach to Cardinality Constraint Sampling Using Branch-and-Bound Technique. 1-6 - Mouna Dhmiri, Yassine Manai, Tahar Ezzedine:

Three-Dimensional Numerical Demonstrating of Blood Light Absorption across Multilayered Biological Tissues. 1-6 - Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:

Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. 1-6 - Hira Hameed, Lubna

, Muhammad Usman
, Hasan T. Abbas, Ahsen Tahir, Kamran Arshad, Khaled Assaleh, Ahmed Alkhayyat, Muhammad Ali Imran
, Qammer H. Abbasi:
Contactless Privacy-Preserving Head Movement Recognition Using Deep Learning for Driver Fatigue Detection. 1-6 - Ali Adnan Abubaker, Derar Eleyan, Amna Eleyan

, Tarek Bejaoui, Norliza Katuk, Mohammed Al-Khalidi:
Social Engineering in Social Network: A Systematic Literature Review. 1-7 - Labiba Binte Ismail, Mahira Ibnath Joytu

, Tasnim Islam Plabon, Muhammad Shafayat Oshman
:
Evaluation of Machine Learning Models to Forecast Inflation: Bangladesh as a Case Study. 1-6 - Hemant Gupta, Amiya Nayak:

Use of MQTT-SN in Sending Distress Signals in Vehicular Communication. 1-6 - Saptarsi Saha, Himanshu Gupta, Nama Ravi Teja, Soumya Kothari, D. V. N. Siva Kumar:

An Efficient Blockchain and Smart Contracts Based Approach for Document Verification. 1-8 - Javad B. Ebrahimi, Alireza Tofighi Mohammadi, Fatemeh Kermani:

Differentially Private All-Pairs Shortest Distances for Low Tree-Width Graphs. 1-6 - Najmath Ottakath, Younes Akbari, Somaya Al-Máadeed, Ahmed Bouridane, Fouad Khelifi

:
Exploring Classification Models for Video Source Device Identification: A Study of CNN-SVM and Softmax Classifier. 1-6 - Hooshang Abbaspour

, Ghazal Najafi:
Location Estimation of Moving Targets by Passive Sonobuoy and Recurrent Deep Neural Network. 1-6 - Muneera Al-Ghafran, Fatemeh Ahmadizadeh, Asma Al-Naimi, Khalid Abualsaud, Elias Yaacoub:

Asthma Assessment Device for Pediatric Patients: A Proof of Concept. 1-6 - Dominic John Mondia, Kyle Nathan Naranjo, Stephen Tristan Galamay, Nestor Michael C. Tiglao:

AIComprehend: An Adaptive Reading Comprehension Learning Platform Using Machine Learning. 1-6 - Dominik Krah, Stefan Farthofer, Peter Dorfinger:

Estimating 5G Cell Utilization by Passive Measurement: A Machine Learning Approach. 1-6 - Tufik M. Buzid, Hisham Sager, Abdeljawad E. Ramadan:

Frequency Domain UWB Receiver Instead of Low Complexity Rake Receiver. 1-4 - Dareen Douglas, Nada Ben Hassen, Asmaa Aslam, Omar Elharrouss, Somaya Al-Máadeed:

Face Anti-Spoofing Detection Using Structure-Texture Decomposition. 1-5 - Jan Herbst, Jan Petershans, Matthias Rüb, Christoph Lipps, Ann-Kathrin Beck

, Joana C. Carmo, Thomas Lachmann, Hans Dieter Schotten:
Inception Based Deep Learning: Biometric Identification Using Electroencephalography (EEG). 1-7 - Saraa N. K. Alasadi

, Oula M. H. Fatla:
Utilizing Artificial Neural Networks for Predicting Delays and Assessing Contractor Performance in Roadworks Projects. 1-5 - Mansoor Al-Thani, Dena Al-Thani:

Link Analysis and Shortest Path Algorithm for Money Laundry Detection. 1-7 - Mattia Quadrini, Domenico Verde

, Michele Luglio, Cesare Roseti, Francesco Zampognaro
:
Implementation and Testing of MP-TCP ATSSS in a 5G Multi-Access Configuration. 1-6 - Lamiaa Basyoni, Junaid Qadir:

AI Generated Content in the Metaverse: Risks and Mitigation Strategies. 1-4 - Floris Breggeman, Mohammad El-Hajj, Florian Hahn

:
A Comparison of Authentication Protocols for Unified Client Applications. 1-7 - Amine Bab, Saïah Bekkar-Djelloul-Saïah

, Djamel Eddine Baba Hamed, Boualem Nasri
, Abdelhak Benikhlef:
Comparative Approach in the Gain Study for Two Popular Shapes of S-Band Microstrip Patch Antenna for CubeSats. 1-6 - Hemant Gupta, Amiya Nayak:

Addressing IoT Security Challenges: A Framework for Determining Security Requirements of Smart Locks Leveraging MQTT-SN. 1-7 - Wenjun Shi, Lidong Zhu, Yanggege Zhang, Ke Chu, Ean He, Yimai Shi, Yong Zhang, Wen He, Kun Liu:

A DOA Estimation Method with High Resolution in the Presence of Satellite Array Error. 1-6 - Mohammad Meraj Mirza

, Shinelle Hutchinson, Rebecca Gee, Umit Karabiyik:
No Filters: A Deep Dive into Photo Sharing Apps on Android and iOS. 1-8 - Oleg Serov, Mohamed Zied Chaari:

Microstrip Patch Rectenna for Electromagnetic Wireless Power Transfer at 2.45 GHz. 1-5 - Mohammed Lalou, Hamamache Kheddouci:

Network Vulnerability Assessment Using Critical Nodes Identification. 1-6 - Saddam Husain, Miras Akhmetov, Damir Kanymkulov, Galymzhan Nauryzbayev, Mohammad S. Hashmi

:
Optimization of Behavioral Model of VO2 Switches Using Slime Mould Algorithm. 1-6 - Tarek Ali, Amna Eleyan, Tarek Bejaoui:

Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review. 1-7 - Sahar Salmanzade Yazdi, Fatma Najar, Nizar Bouguila:

Generalized Probabilistic Clustering Projection Models for Discrete Data. 1-7 - Farag Azzedin, Mustafa Ghaleb, Yasser El-Alfy, Raed Katib, Md. Hossain:

A Federated Learning Approach to Banking Loan Decisions. 1-7 - Mohamed Yanis Sadaoui, Sirine Hamza, Osman Salem, Ahmed Mehaoua:

Bluetooth Just Works: Security and Vulnerability. 1-5 - Alaa Jalal Tamimi

, Iyad Hashlamon
:
Arabic Sign Language Datasets: Review and Improvements. 1-6 - Mehri Borhani Kakhki, Ahmed Shehata Abdellatif, Hari Krishna Pothula, David Wessel:

Topology of $32\times 32$ Butler Matrix. 1-4 - Muna Al-Fadhli, Somaya Al-Máadeed, Nuri Cihat Onat, Abdelhamid Abdessadok:

A Data-Driven Approach to Assessing Digital Transformation Maturity Factors in Government Institutes. 1-8 - Viswanath KumarSkandPriya

, Abdulhalim Dandoush
, Gladys Diaz:
Slicenet: a Simple and Scalable Flow-Level Simulator for Network Slice Provisioning and Management. 1-6 - Umair Mehmood, Ali Kashif Bashir, Khaled M. Rabie, John Broderick, Simon Davies:

Vending Machine Product Demand Prediction Using Machine Learning Algorithms. 1-6 - Erol Özkan, Ibrahim Kök, Suat Özdemir:

Autonomous Micro-Grids: A Reinforcement Learning-Based Energy Management Model in Smart Cities. 1-6 - Mattia Quadrini, Cesare Roseti, Francesco Zampognaro

, Lorenzo Serranti:
Data Collection Using NWDAF Network Function in a 5G Core Network with Real Traffic. 1-7 - Thabet Kacem

:
VANET-Sec: A Framework to Secure Vehicular Ad-Hoc Networks Using a Permissioned Blockchain. 1-6 - Myra Khalid, Aamina Akbar, Hassaan Khaliq Qureshi, Sobia Jangsher

:
Joint Backhaul Pairing and Resource Allocation of Moving Small Cells Using NOMA. 1-6 - Yashovardhan Bapat, Shreya Aiyer, Akhil A Binu, Chandra Shekar R K, Shubhangi K. Gawali, Lucy J. Gudino, Neena Goveas:

IoT-Based Local Setup for Interfacing Resource Constrained Devices: A Survey. 1-6 - Zakia Zouaghia, Zahra Kodia Aouina

, Lamjed Ben Said:
Hybrid Machine Learning Model for Predicting NASDAQ Composite Index. 1-6 - Josep Genovard-Oliver, Maria Frontera-Bergas, Miguel Vinaixa-Fernández, Bartomeu Oliver-Riera, Jaume Ramis-Bibiloni

, Eugeni Isern, Miquel Roca, Bartomeu Alorda-Ladaria:
Monitoring Medicine Quality Conservation: An IoT-Based Platform Design. 1-8 - Abdullah Hosseini

, Saeid Houti
, Junaid Qadir:
Deep Reinforcement Learning for Autonomous Navigation on Duckietown Platform: Evaluation of Adversarial Robustness. 1-6 - Chafika Ouni, Emna Benmohamed

, Hela Ltifi:
DI-ESN: Dual Input-Echo State Network for Time Series Forecasting. 1-6 - Dheya Mustafa, Layan Sawaged, Safaa M. Khabour:

Predictive Analysis of Jordan Road Accidents Severity Using Machine Learning. 1-6 - Rodrigue N'goran, Aguié Pacôme Bertrand Brou

, Koffi Ghislain Pandry, Jean-Louis Tetchueng, Yvon Kermarrec, Olivier Asseu:
Zero Trust Security Strategy for Collaboration Systems. 1-6 - Aliya Tabassum, Ezieddin Elmahjub, Junaid Qadir:

Pathway to Prosocial AI-XR Metaverses: A Synergy of Technical and Regulatory Approaches. 1-8 - Yimai Shi, Lidong Zhu, Ean He, Wenjun Shi, Yong Zhang, Wen He, Kun Liu:

An Interference Null Widening Algorithm Based on U-V Domain Expansion of Steering Vector. 1-6 - Bing Swen Sun

:
Internet Evolution with IPswen: Towards the Next Generation TCP/IPv4 Internet Architecture. 1-14 - Younes Akbari, Jayakanth Kunhoth, Omar Elharrouss, Somaya Al-Máadeed, Khalid Abualsaud, Amr Mohamed, Tamer Khattab:

Indoor Multi-Lingual Scene Text Database with Different Views. 1-6 - Isaac Ampratwum, Amiya Nayak:

A Nested Genetic Algorithm-Based Optimized Topology and Routing Scheme for WSN. 1-6 - Mahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya, Mahamat Charfadine Salim, Mahamat Borgour Hassan:

Latest Generation Technologies for Network Coverage in Infrastructure-Less Areas. 1-6 - Haitham Alajmi, Mohammed M. Bait-Suwailam

:
Multi-Band Electromagnetic Metasurface Absorber Design Using Concentric Split-Ring Resonators. 1-4 - Rim Moussa, Riad Ouechtatti, Ahmed Rezgui, Tarek Bejaoui:

Exploration of Document-Oriented Stores' Capacities for Managing Community e-Mailing Lists: Elastic Stack as a Case Study. 1-6 - Rym Moussaoui, Djihane Oum Keltoum Harouni, Osman Salem, Ahmed Mehaoua:

Dual Autoencoders for Network-Based Detection of BaIoT Attacks. 1-6 - Yassine Lakhdari, Enric Soldevila, Jihene Rezgui, Éric Renault:

Detection of Plant Diseases in an Industrial Greenhouse: Development, Validation & Exploitation. 1-6 - Takoua Mahjoub

, Adel Ben Mnaouer
, Hatem Boujemaa, Maymouna Ben Said:
Performance Analysis of LoRa for Rice Fading Channels. 1-6 - Chaima Ferchichi, Dorsaf Omri, Taoufik Aguili:

Utilizing 1D Convolutional Neural Networks for Enhanced Design and Optimization of Rectangular Patch Antenna Parameters. 1-6 - Tan-Jan Ho, Bo-Han Huang:

Resilient Model-Based Mobile Location Estimators Incorporating Measured Target Speed for Maneuver Tracking. 1-6 - Auns Khaled, Dorsaf Omri, Taoufik Aguili:

Novel Mathematical Formulation in Time and Space Domains of Transient Scattering Problem Applied to a Parabolic Antenna. 1-6 - Steven Rico, Kanika Sood, Kevin Hsu, Ethan Trinh:

Interpreting Live Video Sign Language and Translate into Text. 1-6 - Anisur Rahman:

Underwater Localization: a Pragmatic Approach. 1-7 - Kevin Coello, Kaiyue Zhou, Harsha Nutalapati, Nestor Michael C. Tiglao:

Performance Analysis of Credit Card Fraud Analysis and Detection Machine Learning Algorithms. 1-6 - Souryendu Das, Stavros Kalafatis:

Network Coding to Reduce Congestion and Improve Memory Buffer in Smart Switch. 1-6 - Nauman Ullah Gilal, Fahad Majeed

, Khaled A. Al-Thelaya, Mehak Khan
, Jens Schneider, Marco Agus:
Noise2Seg: Automatic Few-Shot Selection from Noisy Web Data for Underwater Tropical Fishes Segmentation. 1-6 - Mickael Mohammed, Osman Salem, Ahmed Mehaoua:

Artificial Intelligence for Anomaly Detection in IoMTs. 1-6 - Mostafa Abdelhamid, Mohammed Alhato, Ali Elmancy, Somaya Al-Máadeed, Omar Elharrouss:

Intelligent Brain Tumor Detector. 1-6 - Kunal Chhatrapati, Kanika Sood, Purva Surve:

Human Activity Recognition Using Ambient Sensors. 1-8 - Nishat Ara Nipa, Yan Lu

, Sachin Shetty
:
U-Net Based Disaster Damage Detection Through Semantic Segmentation. 1-5 - Guoxu Wang, Andrew Leoncé, Hakim Hacid, Eran A. Edirisinghe:

Deep Neural Network Based Automatic Litter Detection in Desert Areas Using Unmanned Aerial Vehicle Imagery. 1-8 - Lounès Meddahi, Ahmed Meddahi, Patrick Sondi

, Fen Zhou:
Leveraging Blockchain for a Robust and Scalable Device Identification in LoRaWAN. 1-6 - Zeneya Sharmin, Palash Roy

, Md. Abdur Razzaque:
User Quality of Experience and Profit Aware Task Allocation in Mobile Device Cloud. 1-6 - Yutong He, Lidong Zhu, Sixi Cheng:

ICST Chaotic Mapping for Anti-Prediction Frequency Hopping Sequence Generation. 1-5 - Marcel Fernandez, Grigory Kabatiansky, Ibrahim Kamel, Ying Miao, Tamer F. Rabie:

Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise. 1-5 - Mariam Fliss R., Mahdi Houchati, Arantxa Ortiz Marina, Santiago Bañales Lopez:

Data Driven DRL Model For Home-Energy Control. 1-7 - Thomas Hupperich:

On DDoS Attacks as an Expression of Digital Protest in the Russo-Ukrainian War 2022. 1-8 - El-Habib Bensikaddour, Boualem Nasri

, Abdelhak Benikhlef, Djamel Eddine Baba Hamed:
Acquisition of Satellite Telemtry Using a Low-Cost FPGA Board. 1-5 - Arwa Amaira, Koubaa Hend, Faouzi Zarai:

Performance Study in HetNets Using Dual Connectivity and Deep Reinforcement Learning. 1-6 - Zakia Zouaghia, Zahra Kodia Aouina

, Lamjed Ben Said:
Stock Movement Prediction Based On Technical Indicators Applying Hybrid Machine Learning Models. 1-4 - Nada Shahin

, Leila Ismail:
ChatGPT, Let Us Chat Sign Language: Experiments, Architectural Elements, Challenges and Research Directions. 1-7 - Jawad Khalife, Fatima Tariq Hussain M. Nassar, Maryam Hamad M. KH Al Marri:

New Heuristics Method for Malicious URLs Detection Using Machine Learning. 1-6 - Yulia Kumar

, Justin Delgado, E. Kupershtein, Brendan Hannon, Zachary Gordon, J. Jenny Li, Patricia Morreale:
AssureAIDoctor- A Bias-Free AI Bot. 1-6 - Yazan Aref, Abdelkader Ouda:

Still Computers Networking is Less Secure Than It should be, Causes and Solution. 1-8 - Emmanuel Asamoah, Isaac Ampratwum, Amiya Nayak:

A Genetic Algorithm-Based Improved Availability Framework for Controller Placement in SDN. 1-7 - Bharti Moryani, Kanika Sood, Kirti Chaudhary:

A Deep Learning Approach for the Classification of Tuberculosis and Pneumonia Using NIH Dataset. 1-8 - Hela Marouane, Abdulhalim Dandoush

, Lamine Amour
, Aiman Erbad:
Performance Evaluation of Machine Learning-Based Misbehavior Detection Systems in VANETs: A Comprehensive Study. 1-6 - Andy Reed

, Laurence S. Dooley, Soraya Kouadri Mostéfaoui:
Packet Filtering and Sampling for Efficient Slow Denial of Service Detection in Resource Scarce IoT Networks. 1-6 - Jayakanth Kunhoth, Mahdi Alkaeed, Adeel Ehsan, Junaid Qadir:

VisualAid+: Assistive System for Visually Impaired with TinyML Enhanced Object Detection and Scene Narration. 1-8 - Khaled Hamouid, Mohamed Mohammedi:

Dynamic and Flexible Access Control for IoT-Enabled Smart Healthcare. 1-6 - Syed Rizvi, Anthony Hammill, Hans Esteban, Mark Ihnat:

Data Protection and Data Recovery Plan for IoT Transportation Domain. 1-8 - Udayan Das

, Cynthia S. Hood, Vaishali Nagpure:
A Reasoning System Architecture for Spectrum Decision Making. 1-10 - Moutaz Saleh Mustafa Saleh, Roudha Al-Rumaihi, Slafa Al-Dulaimi, Alaa Abashar:

IPattern: Islamic-Inspired Pattern Generation Using Generative Adversarial Networks. 1-6 - Noor Khial

, Nema Ahmed, Reem Bassam Tluli, Elias Yaacoub, Amr Mohamed:
Online Learning Approach for Jammer Detection in UAV Swarms Using Multi-Armed Bandits. 1-6 - Jiahong Wu, Nan Liu, Wei Kang:

The Closure of the Entropy Region is Not Closed Under Polymatroid Duality for Four Discrete Random Variables. 1-4 - Ahmed Badawi

, Hassan Ali
, I. M. Elzein, Alhareth Zyoud, Ammar M. Abu-Hudrouss:
Highly Efficient Pure Sine Wave Inverter Using Microcontroller for Photovoltaic Applications. 1-6 - Manel Chenait, Chafika Benzaïd, Bahia Zebbane:

Linear Complexity for k-Coverage Sensor Redundancy Determination in IoT. 1-6 - Mofareh Waqdan

, Habib Louafi, Malek Mouhoub:
An IoT Security Risk Assessment Framework for Healthcare Environment. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














