default search action
8th ISNCC 2021: Dubai, United Arab Emirates
- International Symposium on Networks, Computers and Communications, ISNCC 2021, Dubai, United Arab Emirates, October 31 - November 2, 2021. IEEE 2021, ISBN 978-1-6654-0304-7
- Suresh Babu Kotha, Kumar Rahul, Mohammad Anees, Santosh Yachareni, Subodh Kumar:
High speed low power SEU tolerant Pseudo dual port memory in 7nm. 1-5 - Mahmoud M. Badr, Mohamed I. Ibrahem, Mohamed Baza, Mohamed Mahmoud, Waleed Alasmary:
Detecting Electricity Fraud in the Net-Metering System Using Deep Learning. 1-6 - Mohamed I. Ibrahem, Sherif Abdelfattah, Mohamed Mahmoud, Waleed Alasmary:
Detecting Electricity Theft Cyber-attacks in CAT AMI System Using Machine Learning. 1-6 - Amar Meddahi, Hassen Drira, Ahmed Meddahi:
SIP-GAN: Generative Adversarial Networks for SIP traffic generation. 1-6 - Alaa Al-Refaei, Mohammed W. Baidas:
Network Sum-Rate Maximization for NOMA-Based Multicast Cognitive Radio Networks with SWIPT-Enabled Relays. 1-7 - Mingchuan Yang, Yingzhe Dou, Bingyu Xie:
Statistical modeling of Land Mobile Satellite Dual-Polarized MIMO Propagation Channel. 1-5 - Gaspard Baye, Fatima Hussain, Alma Oracevic, Rasheed Hussain, S. M. Ahsan Kazmi:
API Security in Large Enterprises: Leveraging Machine Learning for Anomaly Detection. 1-6 - M. Saifeddine Hadj Sassi, Lamia Chaari Fourati:
Deep Learning and Augmented Reality for IoT-based Air Quality Monitoring and Prediction System. 1-6 - Alshaimaa Al Naqbi, Sheikha Salem Alyieliely, Manar Abu Talib, Qassim Nasir, Maamar Bettayeb, Chaouki Ghenai:
Energy Reduction in Building Energy Management Systems Using the Internet of Things: Systematic Literature Review. 1-7 - Mohammed W. Baidas, Ahmed M. AbdelGhaffar, Emad Alsusa:
Joint Power Allocation and Antenna Selection for Network Sum-Rate Maximization in Clustered Downlink NOMA Networks. 1-7 - Thomas Taylor, Amna Eleyan:
Using Variational Autoencoders to Increase the Performance of Malware Classification. 1-6 - Oladayo Olufemi Olakanmi, Kosisochukwu Pal Nnoli, Kehinde Oluwasesan Odeyemi, Mbadiwe Samuel Benyeogor:
Enhanced Secure Process Control and Data Routing for Multi-plant Biogas Production System in IoT Environment : *A Practical Approach to Securing Smart Bio-energy Infrastructure. 1-5 - Fouzi Boukhalfa, Mohamed Hadded, Paul Muhlethaler, Oyunchimeg Shagdar:
Evaluation of a new Radio Technology and Visible Light Communication for a Platooning Application. 1-7 - Ammar Qaid, Özgür Ertug:
Transition from IPv4 to IPv6 Mechanisms by GNS3 Emulation: YPTC as a Case Study. 1-7 - Chuyang Liu, Zihao Jian, Minshan Xie, Irene Cheng:
A Real-Time Mobile Application for Cattle Tracking using Video Captured from a Drone. 1-6 - Kinan Ghanem, Stephen Ugwuanyi, Rameez Asif, James Irvine:
Challenges and Promises of 5G for Smart Grid Teleprotection Applications. 1-7 - Bradley Comar, R. Scott Frazier:
Design of a Joint Alamouti-MIMO and Wavelet Packet Modulation System. 1-8 - Ala Alemaryeen:
On the Sensitivity of Implantable Antenna Performance to Variations in the Electrical Properties of Body Tissues. 1-4 - Andrew Tao, Kevin Qi, Daniel Che, Mikhail Y. Shalaginov, Tingying Helen Zeng:
Comparison of Media Sources for COVID-19 by Machine Learning Sentiment Analysis. 1-4 - Firuz Kamalov, Sherif Moussa, Ziad El-Khatib, Adel Ben Mnaouer:
Orthogonal variance-based feature selection for intrusion detection systems. 1-5 - Amamer Saied, Abdanaser Okaf, Dongyu Qiu:
An Efficient Resource Allocation for D2D Communications Underlaying in HetNets. 1-6 - Yue Li, Abdulhalim Dandoush, Ji Liu:
Evaluation and Optimization of learning-based DNS over HTTPS Traffic Classification. 1-6 - Mahmoud M. Badr, Mohamed Baza, Sherif Abdelfattah, Mohamed Mahmoud, Waleed Alasmary:
Blockchain-Based Ride-Sharing System with Accurate Matching and Privacy-Preservation. 1-8 - Muhannad Y. Muhsin, Ali J. Salim, Jawad K. Ali:
An Eight-Element MIMO Antenna system for 5G Mobile Handsets. 1-4 - Khuhawar Arif Raza, Alia Asheralieva, Md. Monjurul Karim, Kashif Sharif, Mehdi Gheisari, Salabat Khan:
A Novel Forwarding and Caching Scheme for Information-Centric Software-Defined Networks. 1-8 - Mohammad Meraj Mirza, Umit Karabiyik:
Enhancing IP Address Geocoding, Geolocating and Visualization for Digital Forensics. 1-7 - Firuz Kamalov, Hana Sulieman:
Time series signal recovery methods: comparative study. 1-5 - Kosala Yapa Bandara, John G. Breslin:
BaaS Architecture for DApps and Application for Veterinary Medicine Case Study in Ireland. 1-6 - Enrica Zola, Israel Martín-Escalona, Francisco Barceló-Arroyo, Sergio Machado:
Implementation and analysis of the AODVv2 Routing Protocol in ARM devices. 1-6 - Hoang-Loc La, Anh-Tu Ngoc Tran, Masato Yoshimi, Takuma Nakajima, Nam Thoai:
CDNET: A Content Delivery Network Emulator. 1-7 - Abdullah Yasin Nur:
Analysis of Autonomous System Level Internet Topology Graphs and Multigraphs. 1-7 - Sifatul Mostafi, Khalid Elgazzar:
An Open Source Tool to Extract Traffic Data from Google Maps: Limitations and Challenges. 1-8 - Muhammed Emir çakici, Feyza Yildirim Okay, Suat Özdemir:
Real-time Aircraft Tracking System: A Survey and A Deep Learning Based Model. 1-6 - Pantelimon-Teodor Tivig, Eugen Borcoci, Alexandru Brumaru, Andra-Isabela-Elena Ciobanu:
Layer 3 Forwarder Application - Implementation Experiments Based on Ryu SDN Controller. 1-6 - Eduardo Andrés-Marcelo, Elizabeth Pérez Cortés, Adán G. Medrano-Chávez, Miguel López-Guerrero:
Human Mobility Brings Scalability to BitTorrent over MANET. 1-6 - Mohammed S. Elbasheir, Rashid A. Saeed, Salaheldin Edam:
5G Base Station Deployment Review for RF Radiation. 1-5 - Ali A. Alnoman:
Delay-aware Scheduling Scheme for Ubiquitous IoT Applications in Edge Computing. 1-4 - Christophe Loyez, Michael Bocquet, Kamel Haddadi:
Quadratic Detection-Based Millimeter-Wave MMIC for Wireless Communication and Localization. 1-5 - Christian Zajc, Markus Haberler, Gerald Holweg, Christian Steger:
Generating a PUF Fingerprint from an on-Chip Resistive Ladder DAC and ADC. 1-7 - Renzo Carlucci, Alessio Di Iorio, Paris A. Fokaides, Anna Ioannou, Michele Luglio, Mattia Quadrini, Cesare Roseti, Francesco Zampognaro:
Architecture definition for a multi-utility management platform. 1-6 - Alaa Albtoush, Noor Maizura Mohamad Noor, Farizah Yunus:
Utility-based Scheduling Solution for Scientific Workflow on Cloud. 1-6 - Manjul Shrestha, Xingya Liu, Moushmi Sreekanthan:
A Bluetooth-Based Contact-Tracing Mobile App for Airborne-Based Epidemic Control. 1-5 - Malaw Ndiaye, Pr. Karim Konate:
Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain. 1-8 - Jihene Rezgui, Félix Jobin, Simon Beaulieu, Zarine Ardekani-Djoneidi:
Autonomous Learning Intelligent Vehicles Engineering in a Programming Learning Application for Youth: ALIVE PLAY. 1-6 - Bradley Comar:
Decoding and Equalization in a Joint Alamouti-WPM System. 1-8 - Nandeesh Basavaraju, Naveen Alexander, Jochen Seitz:
Performance Evaluation of Advanced Message Queuing Protocol (AMQP): An Empirical Analysis of AMQP Online Message Brokers. 1-8 - Elezabeth Mathew, Sherief Abdulla:
Machine learning to find purchase duration of chain hotels in the UAE. 1-6 - Xu Deng, Lidong Zhu, Qi Tan, Ying Yang, Yong Zhang:
Multi-layer satellite network resource management based on genetic algorithm. 1-6 - Oussama Ghorbel, Rami Ayadi, Ahmed Sulaiman Alanazi, Rayen Alanazi, Raed N. Alabdali, Mohamed Abid:
Adaptive KPCA for Outlier detection in Wireless Sensor Networks: Water pipeline case. 1-5 - Lijun Dong, Richard Li:
Distributed Knowledge Inference and Reasoning in the Network Based on New IP. 1-7 - Argen Mary Arceño, Michael Buenviaje, Mave Rick Credo, Ronn Joaquin Cuenco, Rollison Joshua Tabuyan, Carlos Sison, Thaddeo Garcia, Antonio Tee:
Voice Controlled Ultraviolet Sterilization Robot for Disinfection with Monitoring Features. 1-6 - Mahendrakumar Gunasekaran, Kumar Rahul, Santosh Yachareni:
Optimizing Sub bytes and Mix Column to improve performance of AES in Virtex 7 FPGA. 1-5 - Haider Khaleel Raad, Farah Fargo, Olivier Franza:
Autonomic Architectural Framework for Internet of Brain Controlled Things (IoBCT). 1-4 - Firuz Kamalov, Ashraf Elnagar:
Kernel density estimation-based sampling for neural network classification. 1-4 - Abdullah Yasin Nur:
Efficient Probabilistic Packet Marking for AS Traceback. 1-6 - Ebrahim Ali Alburshaid, Mohab A. Mangoud:
Palm Trees Detection Using the Integration between GIS and Deep Learning. 1-6 - Aicha Idriss Hentati, Lamia Chaari Fourati:
A Convoy of Ground Mobile Vehicles Protection using Cooperative UAVs-based System. 1-6 - Feyza Yildirim Okay, Mustafa Yildirim, Suat Özdemir:
Interpretable Machine Learning: A Case Study of Healthcare. 1-6 - Tewelgn Kebede, Yihenew Wondie, Johannes Steinbrunn:
Performance Evaluation of MillimeterWave-Massive MIMO with Beamforming Techniques. 1-8 - Natalia Khuri, Esteban Murillo Burford, Sarah Parsons, Chenqi Xu:
A Game-Theoretical Approach for Data Acquisition From Fitness Tracking Devices. 1-6 - Murat Soykan, Pinar Sarisaray Bölük:
Tor Network Detection By Using Machine Learning And Artificial Neural Network. 1-4 - Betul Dundar, Diyar Akay, Suat Ozdemir:
Linguistic Descriptions of Airport Evaluation Data for Recommendation Strategies. 1-8 - Simona Riurean, Monica Leba, Lilia Crivoi:
Enhanced Security Level for Sensitive Medical Data Transmitted through Visible Light. 1-6 - Omar A. Saraereh, Jeevani W. Jayasinghe, Aurora Andújar, Jaume Anguera:
Fractal-Shaped Koch-Ring Microstrip Patch. 1-5 - Benjamin Beichler, Michael Rethfeldt, Hannes Raddatz, Lukas Steffen, Dirk Timmermann, Christian Haubelt:
A SystemC Model of the IEEE 802.11 EDCA Protocol for Virtual Prototyping. 1-7 - Anjana Prabhakar, Tricha Anjali:
Towards flexible hardware authentication for IoT. 1-6 - Aya N. Alkhafaji, Jawad K. Ali, Sinan M. Abdulsatar, Ali I. Hammoodi:
On the Design of Triple Band Dipole Flexible Antenna for Wearable RFID Devices. 1-3 - Christian Hemminghaus, Jan Bauer, Konrad Wolsing:
SIGMAR: Ensuring Integrity and Authenticity of Maritime Systems using Digital Signatures. 1-6 - Abdulmuneem Bashaiwth, Basil AsSadhan:
Detecting Network Attacks Exhibiting Irregular Periodic Behavior. 1-7 - Haorui Peng, William Tärneberg, Emma Fitzgerald, Maria Kihl:
Punctual Cloud: Unbinding Real-time Applications from Cloud-induced Delays. 1-8 - Mohammed Yafeai, Ibrahim Abou Shehada, Sultan Alsulami, Ibrahim Abou Mahmoud, Ali H. Muqaibel, Mohammad A. Abido, Aboubakr Salem:
Design of a Wireless Heliostat System. 1-5 - Saleh A. Alawsh, Ali H. Muqaibel:
Optimized Multi-Level Prime Array Configurations. 1-4 - Abdullah M. Alqahtani, Barzan A. Yosuf, Sanaa H. Mohamed, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani:
Energy Minimized Federated Fog Computing over Passive Optical Networks. 1-6 - Nian Xue, Daojing Guo, Jie Zhang, Jihao Xin, Zhen Li, Xin Huang:
OpenFunction for Software Defined IoT. 1-8 - Nadia Charef, Adel Ben Mnaouer, Ouns Bouachir:
AI-based Energy Model for Adaptive Duty Cycle Scheduling in Wireless Networks. 1-6 - Saloua Hendaoui, Nawel Zangar:
Leveraging SDN slicing isolation for improved adaptive satellite-5G downlink scheduler. 1-5 - Burak Han Çorak, Ibrahim Kök, Suat Özdemir:
A Novel Low-Latency and Cost-Effective Communication Protocol Design for Internet of Flying Things. 1-6 - Ghazal Najafi, Saeed Ghazi-Maghrebi:
Optimization of Channel Allocation in Heterogeneous 5G Networks Based on Genetic Algorithm and Fuzzy Logic. 1-6 - Tewelgn Kebede, Yihenew Wondie, Johannes Steinbrunn:
Channel Estimation and Beamforming Techniques for mm Wave-Massive MIMO: Recent Trends, Challenges and Open Issues. 1-8 - Qi Tan, Lidong Zhu, Xu Deng, Zhongru Zhu:
An Adaptive DOA Estimation Method Based on Transfer Joint Matching for Space Communications. 1-5 - Christos Bouras, Rafail Kalogeropoulos, Ioannis Sina:
Clustering Based User Allocation in 5G Networks. 1-6 - Marcelo Camilo, David F. C. Moura, Ronaldo M. Salles:
Combined Interference and Communications strategy evaluation as a defense mechanism in typical Cognitive Radio Military Networks. 1-8 - Ahmed Osama, Mahmoud Elsaadany, Shoukry I. Shams, Omar A. M. Aly, Usama S. Mohammed, Ghyslain Gagnon:
Hybrid Precoder Design for mmWave Massive MIMO Systems with Partially Connected Architecture. 1-6 - Peter Voege, Abdelkader Ouda:
A Study on Natural Language Chatbot-based Authentication Systems. 1-4 - Balume Mburano, Weisheng Si, Wei Xing Zheng:
A Comparative Study on the Variants of R Metric for Network Robustness. 1-6 - Michael Windisch, Olimpiu Stoicuta, Monica Leba, Simona Riurean:
Remote Control of Solenoid Valves Using RS485 and LiFi Technology. 1-6 - Ayman Maghrabi, Wibowo Hardjawana, Phee Lep Yeoh, Branka Vucetic:
An Experimental Inter-Slice RAN Controller for 4G/5G Cellular Networks. 1-6 - Martin Kyselak, David Grenar, Cestmir Vlcek, Karel Slávicek, Jiri Vavra:
The Relative Tolerances of Polarization Multiplex on Long Optical Paths. 1-4 - Tarek Elmahdy, Ahmed F. Bendary:
Novel technique in 4G Handover parameter tuning and prediction using statistical trend analysis and supervised machine learning. 1-5 - Colin Wilcox, Soufiene Djahel, Vasileios Giagos:
Identifying the Main Causes of Medical Data Incompleteness in the Smart Healthcare Era. 1-6 - Ahmed Shafee, Mahmoud Nabil, Mohamed Mahmoud, Waleed Alasmary, Fathi H. Amsaad:
Detection of Denial of Charge (DoC) Attacks in Smart Grid Using Convolutional Neural Networks. 1-7 - Shitian Zhang, Yunduan Cui, Naitian Deng, Huiyun Li:
Model Predictive Control of Autonomous Driving using Unscented Kalman Filter with Sparse Spectrum Gaussian Processes. 1-6 - Siddhartha Shakya, Ashraf Roushdy, Himadri Sikhar Khargharia, Asad Musa, Amr Omar:
AI Based 5G RAN Planning. 1-6 - Navid Ordouie, Nirmala Soundararajan, Ramesh K. Karne, Alexander L. Wijesinha:
Developing Computer Applications without any OS or Kernel in a Multi-core Architecture. 1-8 - Avinash Kumar, Ye Zhu:
Extending Direct Sequence Spread-Spectrum for Secure Communication. 1-5 - Haider Khaleel Raad, Heidrun Schmitzer, Ali Hammoodi, Casey White, Dennis Tierney, Wilbur Walters, Khalid H. Abed:
A Single-Band Optically Transparent Antenna for Wearable Smart Glasses. 1-4 - Ali A. Alnoman:
Edge Computing Services for Smart Cities: A Review and Case Study. 1-6 - Mohamed Rahali, Jean-Michel Sanner, Cao-Thanh Phan, Gerardo Rubino:
A network tomography approach for anomaly localization in Service Function Chaining. 1-6 - Yong Zhang, Lidong Zhu, Chengjie Li, Xu Deng, Huazhi Feng:
Store-Load Phased Array Antenna for Tracking and Communication with LEO Satellites. 1-6 - Jihene Rezgui, Enric Soldevila, Younes Kechout:
Novel Mind Controller to Assess Student Concentration with Connected Vehicles: ALIVE Mind. 1-6 - Hassan Noura, Ali Chehab:
Efficient and Robust Keyed Hash Function Based on Artificial Neural Networks. 1-7 - Artrim Kjamilji, Albert Levi, Erkay Savas, Osman Berke Güney:
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT. 1-8 - Sam Aleyadeh, Abdallah Moubayed, Abdallah Shami:
Mobility Aware Edge Computing Segmentation Towards Localized Orchestration. 1-6 - Mohamed I. Ibrahem, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Waleed Alasmary:
Countering Presence Privacy Attack in Efficient AMI Networks Using Interactive Deep-Learning. 1-7 - Oluwaseyi Ajayi, Tarek N. Saadawi:
Detecting Insider Attacks in Blockchain Networks. 1-7 - Ahmet Serdar Tan, Onur Sahin, Sungkwon Hong:
CRC Aided Short-Cycle Free BP Decoding for Polar Codes. 1-6 - Anood Al Hamedi, Bashaer Al Seiari, Meera Al Taher, Hasan Abu Hilal:
Network Growth in Smart Cities. 1-6 - Vusi Skosana, Adnan M. Abu-Mahfouz:
Performance Comparison of Video Encoding at Low Sampling Rates. 1-7 - Michele Luglio, Mattia Quadrini, Cesare Roseti, Francesco Zampognaro:
Scenarios and implementation use-cases for satellite-based NB-IoT. 1-6 - Guilherme N. N. Barbosa, Martin Andreoni Lopez, Dianne S. V. Medeiros, Diogo M. F. Mattos:
An Entropy-based Hybrid Mechanism for Large-Scale Wireless Network Traffic Prediction. 1-6 - Sherif Abdelfattah, Mohamed Baza, Mohamed Mahmoud, Waleed Alasmary:
CSES: Customized Searchable Encryption Scheme with Efficient Key Management Over Medical Cloud Data. 1-7 - Navid Shaghaghi, Adi Relan, James Ossam, Hanna Albright:
Public Transit Hub (PTHub). 1-5 - Bharat S. Rawal, Gunasekaran Manogaran:
Implementation of a secure multi-cloud storage framework with next-generation cryptosystems and split-protocol. 1-6 - Danila Morozovskii, Krunal Thummar, Talal Halabi, Sheela Ramanna:
Toward Efficient and Robust Deep Learning-based Malware Detection in Fog Computing. 1-6 - Shereen Ismail, Eman AlKhader, Aydan Gasimova, Hassan Reza:
A lightweight Distributed Database Management in WSN. 1-5 - Simon Delisle, Naser Ezzati-Jivan, Michel R. Dagenais:
Integrated modeling tool for indexing and analyzing state machine trace. 1-8 - Shahad Alotaibi, Khadijah Alharbi, Huda Alwabli, Hanan Aljoaey, Balsam Abaalkhail, Salim El Khediri:
Threats, crimes and issues of privacy of users' information shared on online social networks. 1-8 - Mohamed Ali Ayed, Chamseddine Talhi:
Federated Learning for Anomaly-Based Intrusion Detection. 1-8 - Guomin Tang, Lidong Zhu, Qi Wu, Qihui He, Le Yu:
A Hybrid Spread Spectrum Communication Method Based on Chaotic Sequence. 1-5 - Peter Brand, Joachim Falk, Eduard Potwigin, Jürgen Teich:
Multi-Step Ahead Grant Prediction for Dynamic Power Management in Cellular Modems. 1-6 - Rasha Jamal Atwa, Paola Flocchini, Amiya Nayak:
A Fog-based Reputation Evaluation Model for VANETs. 1-7 - Christos Bouras, Apostolos Gkamas, Spyridon Aniceto Katsampiris Salgado:
Energy Efficient Mechanism over LoRa for Search and Rescue operations. 1-6