default search action
10th ISNCC 2023: Doha, Qatar
- International Symposium on Networks, Computers and Communications, ISNCC 2023, Doha, Qatar, October 23-26, 2023. IEEE 2023, ISBN 979-8-3503-3559-0
- Yosra Bouchoucha, Dorsaf Omri, Taoufik Aguili:
Study of an Improved Rectenna for RF Energy Harvesting in the ISM Band for Energy-Autonomous IoT Cardio Stimulator Applications. 1-6 - Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah:
Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. 1-6 - Dina Banjabi, Nora Almezeini:
Customer Satisfaction Toward Commercial E-Services in Saudi Arabia: A Sentiment Analysis. 1-6 - Bagylan Kadirbay, Saddam Husain, Mohammad S. Hashmi:
Small-Signal Modeling of GaN-on-Diamond HEMT Using ANFIS Method. 1-6 - Md. Rashed Iqbal Nekvi, Sajal Saha, Yaser Al Mtawa, Anwar Haque:
Examining Generative Adversarial Network for Smart Home DDoS Traffic Generation. 1-6 - Miaomiao Shen:
Privacy Protection Smart Agriculture Based on Functional Encryption. 1-5 - Mahmudul Hasan, Sachin Shetty:
Sentiment Analysis With Lipschitz Recurrent Neural Networks. 1-4 - Jihene Rezgui, Enric Soldevila, Abderrazak Mokraoui:
LRIMa City: A Fog-Computing-Based Smart City with Integrated Self-Driving Cars. 1-7 - Dheya Mustafa, Safaa M. Khabour, Ahmed S. Shatnawi, Eyad Taqieddin:
Arabic Sentiment Analysis of Food Delivery Services Reviews. 1-6 - Wesam Al Amiri, Omar Abdelsalam, James T. Jones, Terry N. Guo, Allen B. MacKenzie:
Signals of Opportunity for Car Density Estimation with Limited Training Data. 1-6 - Anas AliAhmad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mohamad Fadli Zolkipli, Mohammed Al-Khalidi:
Malware Detection Issues, Future Trends and Challenges: A Survey. 1-6 - Matthias Rüb, Jan Herbst, Christoph Lipps, Hans Dieter Schotten:
Piezoelectric Beam Path Modulation for Visible Light Communication. 1-6 - Yantao Liu, Na Qin:
An HLA and OPNET Based Co-Simulation System for Internet of Vehicles. 1-4 - Rudolph Etzel, Omar Narine, Konstantinos Georgiou, Thomas Diakogeorgios, Jaden Usman, Puya Ghazizadeh:
Effectiveness of Trust-Based Authentication in Vehicular Cloud Computing. 1-5 - Wuqu Wang, Nan Liu, Wei Kang:
Coded Caching in Request-robust D2D Communication Networks. 1-6 - Chaza Araji, Ayaa Zahra, Leen Alinsari, Maryam Al-aloosi, Omar Elharrouss, Somaya Al-Máadeed:
Multi-scale-based Network for Image Dehazing. 1-5 - Albert H. Carlson, Indira Kalyan Dutta, Bhaskar Ghosh:
A Demonstrable Break of PCBC Mode. 1-6 - Xintong Li, Lidong Zhu, Ke Chu, Wenjun Shi:
High-Throughput Satellite Resource Allocation Strategy Based on OFDM. 1-6 - Eranga Bandara, Sachin Shetty, Peter Foytik, Abdul Rahman, Ravi Mukkamala, Xueping Liang, Nadini Sahabandu:
Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment. 1-8 - Mazharul Hossain, Saikat Das, Bhargavi Krishnamurthy, Sajjan G. Shiva:
Explainability of Artificial Intelligence Systems: A Survey. 1-6 - Muhammad Esmat, Bo Liu, Ali Al-Shaikhi, Sherif M. Hanafy, Mohamed A. Mohandes, Faramarz Fekri:
Automatic First Arrival Picking for Seismic Data using Kalman Filter. 1-5 - Jeong Min Kong, Elvino Sousa:
Adaptive Ratio-Based-Threshold Gradient Sparsification Scheme for Federated Learning. 1-5 - Mohamed Zied Chaari, Mohamed Abdelfath, Gilroy Philbert Pereira, Rabab Sedrati, Mouad El Moudden, Otman Aghzout:
Powering HTC Thermometers and LED Lamps with Microwave Energy. 1-7 - Rafik Aimen Silakhal, Sara Zekri, Osman Salem, Ahmed Mehaoua:
Cyberbullying Detection Through Acoustic and Linguistic Analysis. 1-5 - Fatima Zahra Rabahi, Saadi Boudjit, Leila Benarous:
UAV-Assisted Mesh Network for Emergency Communication in Disaster Areas. 1-6 - Amit Kumar Pathak, Venkatesh Khammammetti, Saif Khan Mohammed:
Spectral Efficiency Performance of OTFS Based Multi-Cell Systems. 1-6 - Toghrul Garalov, Mohammad El-Hajj:
Enhancing IoT Security: Design and Evaluation of a Raspberry Pi-Based Intrusion Detection System. 1-7 - Ahmed Elmasry, Abdullatif Albaseer, Mohamed Abdallah:
OpenPLC and lib61850 Smart Grid Testbed: Performance Evaluation and Analysis of GOOSE Communication. 1-6 - Mohammed Baziyad, Ibrahim Kamel, Tamer Rabie:
On the Linguistic Limitations of ChatGPT: An Experimental Case Study. 1-6 - Saloua Hendaoui, Nawel Zangar:
Leveraging Unsupervised Machine Learning for New Traffic Types Classification in Hybrid Satellite Terrestrial Network. 1-5 - Hend Fourati, Leïla Azouz Saïdane:
HealthGlasses Project: WBAN Based Communication for Health Monitoring Through Smart Glasses. 1-6 - Jinan Y. Azem, Joni Salminen, Soon-Gyo Jung, Bernard J. Jansen:
Measuring Engagement Through Remote Interactions of Customers: Introducing METRIC. 1-7 - Ioannis Chiotis, Aris L. Moustakas:
Optimal MMSE Processing for Limited-Capacity Radio Stripes. 1-6 - Chaza Araji, Hala Aburajouh, Maryam Al Hail, Elias Yaacoub:
Secure Automated Delivery of Critical Goods with RFID-Based Tracking and Authentication. 1-6 - Abia Amin, Ayalvadi Ganesh, Robert J. Piechocki:
A Novel Intrusion Detection Scheme Using Variational Autoencoders. 1-7 - Mohammed F. Suleiman, Usman Adeel:
Energy-Efficient Routing Using LSTM-Based Deep Learning for Sink Mobility Prediction to Enhance Lifetime and Stability of Wireless Sensor Networks. 1-8 - Claire Rightley, Umit Karabiyik:
Digital Forensic Analysis of AGPTEK Smartwatch Application on Android OS. 1-8 - Khalid Mahmoud Mohammad Dolaat, Aiman Erbad, Muhammad Ibrar:
Enhancing Global Model Accuracy: Federated Learning for Imbalanced Medical Image Datasets. 1-4 - Changrong Chen, Eran A. Edirisinghe, Andrew Leoncé, Greg Simkins, Tamer Khafaga, Moayyed Sher Shah, Umar Yahya:
Deep Neural Networks Based Multiclass Animal Detection and Classification in Drone Imagery. 1-8 - Aviroop Ghosh, Thomas Kunz, Saleh Yousefi:
Importance of Realistic Considerations of Time Synchronization for TAS in TSN Networks. 1-6 - Kashif Khan, Saddam Husain, Galymzhan Nauryzbayev, Mohammad S. Hashmi:
On Temperature-Dependent Small-Signal Behavioral Modelling of GaN HEMT Using GWO-PSO and WOA. 1-6 - Hana Mejdi, Sami Elmadssia, Taher Ezzedine:
Influence of Interference and Sampling Period in the Performance of Networked Control Systems. 1-5 - Marwa Faydi, Amira Zrelli, Tahar Ezzedine:
Smart Environment Monitoring Systems for PM2.5 Prediction Using Deep Learning Models in Smart City. 1-6 - Muhammad Irfan, Aymen Omri, Javier Hernandez Fernandez, Savio Sciancalepore, Gabriele Oligeri:
Jamming Detection in Power Line Communications Leveraging Deep Learning Techniques. 1-6 - Ahmed Ramzi Bahlali, Abdelmalik Bachir, Abdelhakim Cheriet:
Malicious Encrypted Network Traffic Detection Using Deep Auto-Encoder with a Custom Reconstruction Loss. 1-7 - Guoxu Wang, Andrew Leoncé, Eran A. Edirisinghe, Tamer Khafaga, Gregory Simkins, Umar Yahya, Moayyed Sher Shah:
Ghaf Tree Detection from Unmanned Aerial Vehicle Imagery Using Convolutional Neural Networks. 1-8 - Sabiha Yousuf, Roudha Al-Mannai, Bana Al-Naemi, Somaya Al-Máadeed, Naveed Nawaz, Mohamed Zied Chaari:
Smart System for a Self-Driving Scooter Prototype. 1-5 - Mehrdad Sadehvand, Neda Moghim, Behrouz Shahgholi Ghahfarokhi, Sachin Shetty:
Transmission Power Control for Interference Reduction in Cellular D2D Networks. 1-6 - Jawad Khalife, Almaha Mohammed R. M. Albuainain, Eman Humaid S. H. Al-Ejji:
Simple Heuristics For Fast DDoS Detection. 1-5 - AbdulAzeez R. Alobaidi, Thameur Dhieb, Zeina N. Nuimi, Tarek M. Hamdani, Ali Wali, Adel M. Alimi:
New In-Air Signature Datasets. 1-6 - Viet Minh Nguyen, Abdullah Yasin Nur:
Major CyberSecurity Threats in Healthcare During Covid-19 Pandemic. 1-8 - Anestis Papakotoulas, Anastasios Terzidis, Stathes Hadjiefthymiades:
ERITA: Ensuring the Reliability of Internet of Things-Based Applications. 1-6 - Hsuan-Yun Chang, Ahmad Salman:
Cross-Platform Compatibility and Power Optimization for the SAWBRID System. 1-6 - Hana Mejdi, Sami Elmadssia, Taher Ezzedine:
A Study of a Networked Control System under Time Delay. 1-5 - Asma Alotaibi, Alma Oracevic:
Context-Aware Security in the Internet of Things: What We Know and Where We are Going. 1-8 - Sourou Tossou, Miftahul Qorib, Thabet Kacem:
Anomaly Based Intrusion Detection System: A Deep Learning Approach. 1-6 - Ayman Aboulmagd Farghaly, Passent Mohammed El-Kafrawy:
Programmer Performance Prediction with Cognitive Tests: A Granular Approach. 1-6 - Fatma Dhaoui, Amira Zrelli:
Retinal Diseases Classification System Using OCT Images Combined with CNN Models. 1-6 - Hussam Kanaan, Maria Sainz-Ezkerra Galarraga, Mahdi Houchati, Javier Ontañon Ruiz, Santiago Bañales Lopez, Miguel Rodriguez Asensio:
An Improved Distributed Computing Time-Series Short-term Load Forecasting Pipeline for MV Transmission Planning. 1-7 - Amrita Gill, Gnanam Gnanagurunathan, Nafizah Khan, Amin Malekmohammadi:
Absolute Added Correlative Coding using APDs for LEO-LEO OISLs. 1-6 - Chongda Huang, Kaiyuan Huang, Xiaoyuan Li, Yue Xiao:
Design of OvTDM Toward Enhanced Physical Layer Security. 1-4 - Ling Li, Lidong Zhu, Weibang Li:
A Representation Learning Approach Incorporating Entity Descriptions and Types. 1-6 - Mohammad Taghi Dabiri, Mazen O. Hasna, Tamer Khattab:
THz vs. FSO: An Outage Probability and Channel Capacity Performance Comparison Study. 1-6 - Khaoula ElBedoui:
ECG Classifiction Based on Federated Unlearning. 1-5 - Samra Zafar, Muhammad Ibrar, Aiman Erbad, Bakhtawar Zafar, Nizam Hussain Zaydi, Xiaopeng Hu:
Achieving Quality of Service and Traffic Equilibrium in Software-Defined IoT Networks. 1-6 - Marie-Rita Hojeij, Joseph El Assad:
New Resource Allocation Schemes in Multi-Cell Environment Based on Non-Orthogonal Multiple Access for Beyond 5G Systems. 1-6 - Karima Massmi, Khaled Hamouid, Kamel Adi:
Secure Electric Vehicle Dynamic Charging Based on Smart Contracts. 1-6 - Hamad Yahya, Emad Alsusa, Arafat Al-Dweik:
NOMA BER and BLER Performance Evaluation Under the Received Eb/N0. 1-5 - Rahil Bensaid, Adel Ben Mnaouer, Hatem Boujemaa:
Delay Analysis of Routing Protocols for WSN. 1-6 - Aymen Omri, Javier Hernandez Fernandez, Roberto Di Pietro:
Secure and Successful Transmission Probability Analysis for PLC Networks. 1-7 - Fatma Rouissi, Wided Belhaj Sghaier, Héla Gassara, Fethi Tlili:
LSTM-Based Algorithm For Cooperative Communication in Impulse Noise Impaired PLC Channel. 1-5 - Aizhan Ayapbergenova, Mahyar Nemati, Behrouz Maham:
Resource Allocation in Large Intelligent Surfaces/Antennas Using Genetic Algorithm Approach. 1-6 - Mohamed El Hadi Haouari, Abdelkader Tounsi, Osman Salem, Ahmed Mehaoua:
Multimodal Cyber-Harassment Detection. 1-6 - Boniface Uwizeyimana, Osamu Muta, Ahmed H. Abd El-Malek, Mohammed Abo-Zahhad, Maha Elsabrouty:
A Multi-Agent Multi-Armed Bandit Approach for User Pairing in UAV-Assisted NOMA-Networks. 1-6 - Samed Kesir, Muhammed Yaser Yagan, Ibrahim Hökelek, Ali Emre Pusane, Ali Görçin:
Rapid CNN-Assisted Iterative RIS Element Configuration. 1-6 - Jawad Ahmad, Mohammad S. Hashmi, Galymzhan Nauryzbayev:
Fabry-Perot Cavity Based Decagonal Shape Patch Antenna for Millimeter-Wave Band Applications. 1-4 - Ali Belgacem, Abbas Bradai, Kadda Beghdad Bey:
ChatGPT backend: A comprehensive analysis. 1-6 - Ali Haider, Sana Saeed, Kashif Bilal, Aiman Erbad:
A Hybrid Approach for Food Name Recognition in Restaurant Reviews. 1-6 - Yiming Li, Yanxiu Jin:
MC-YOLOv5: A small target detection model based on YOLOv5. 1-6 - Mattia Quadrini, Cesare Roseti:
Architectures for Non-Terrestrial RAN: Integrated Satellite Access and Backhaul. 1-6 - Abdulaziz Al-Meer, Saif Al-Kuwari:
A Novel Integrity Protocol Based on Physical Unclonable Functions. 1-6 - Kenneth Okello, Elijah Mwangi, Ahmed H. Abd El-Malek:
Connectivity Probability Analysis for VANETs with Big Vehicle Shadowing. 1-6 - Wesam Al Amiri, Terry N. Guo, Allen B. MacKenzie:
Road Traffic Density Estimation For Adaptive Beam Allocation in an ISAC Setup. 1-6 - Mahdi Houchati, Aymen Omri, Hussam Kanaan, Aiman Erbad, Muhammad Ibrar, Juan M. Corchado, Sergio Márquez Sánchez:
A Novel Optimal Wireless Thermal Sensor Placement Approach for Large Commercial Buildings. 1-7 - Meshari Essa AlFarah, Ibrahim Kamel, Zaher Al Aghbari:
Toward Detection of Arabic Cyberbullying on Online Social Networks using Arabic BERT Models. 1-6 - Rajaa Alqudah, Aya Abugharbieh, Malak Khasawneh, Rasha Harahsheh:
Real-time Translation of American Sign Language into Text Using Machine Learning. 1-6 - Amrin Karim, Jannatul Ema, Tasnia Yasmin, Palash Roy, Md. Abdur Razzaque:
Latency and Cost-Aware Deployment of Dynamic Service Function Chains in 5G Networks. 1-6 - Sakshi Pandey, Amit Banerjee:
A Combinatorial Approach to Cardinality Constraint Sampling Using Branch-and-Bound Technique. 1-6 - Mouna Dhmiri, Yassine Manai, Tahar Ezzedine:
Three-Dimensional Numerical Demonstrating of Blood Light Absorption across Multilayered Biological Tissues. 1-6 - Hala Amin, Jawaher Kaldari, Nora Mohamed, Waqas Aman, Saif Al-Kuwari:
Hybrid PLS-ML Authentication Scheme for V2I Communication Networks. 1-6 - Hira Hameed, Lubna, Muhammad Usman, Hasan T. Abbas, Ahsen Tahir, Kamran Arshad, Khaled Assaleh, Ahmed Alkhayyat, Muhammad Ali Imran, Qammer H. Abbasi:
Contactless Privacy-Preserving Head Movement Recognition Using Deep Learning for Driver Fatigue Detection. 1-6 - Ali Adnan Abubaker, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Norliza Katuk, Mohammed Al-Khalidi:
Social Engineering in Social Network: A Systematic Literature Review. 1-7 - Labiba Binte Ismail, Mahira Ibnath Joytu, Tasnim Islam Plabon, Muhammad Shafayat Oshman:
Evaluation of Machine Learning Models to Forecast Inflation: Bangladesh as a Case Study. 1-6 - Hemant Gupta, Amiya Nayak:
Use of MQTT-SN in Sending Distress Signals in Vehicular Communication. 1-6 - Saptarsi Saha, Himanshu Gupta, Nama Ravi Teja, Soumya Kothari, D. V. N. Siva Kumar:
An Efficient Blockchain and Smart Contracts Based Approach for Document Verification. 1-8 - Javad B. Ebrahimi, Alireza Tofighi Mohammadi, Fatemeh Kermani:
Differentially Private All-Pairs Shortest Distances for Low Tree-Width Graphs. 1-6 - Najmath Ottakath, Younes Akbari, Somaya Al-Máadeed, Ahmed Bouridane, Fouad Khelifi:
Exploring Classification Models for Video Source Device Identification: A Study of CNN-SVM and Softmax Classifier. 1-6 - Hooshang Abbaspour, Ghazal Najafi:
Location Estimation of Moving Targets by Passive Sonobuoy and Recurrent Deep Neural Network. 1-6 - Muneera Al-Ghafran, Fatemeh Ahmadizadeh, Asma Al-Naimi, Khalid Abualsaud, Elias Yaacoub:
Asthma Assessment Device for Pediatric Patients: A Proof of Concept. 1-6 - Dominic John Mondia, Kyle Nathan Naranjo, Stephen Tristan Galamay, Nestor Michael C. Tiglao:
AIComprehend: An Adaptive Reading Comprehension Learning Platform Using Machine Learning. 1-6 - Dominik Krah, Stefan Farthofer, Peter Dorfinger:
Estimating 5G Cell Utilization by Passive Measurement: A Machine Learning Approach. 1-6 - Tufik M. Buzid, Hisham Sager, Abdeljawad E. Ramadan:
Frequency Domain UWB Receiver Instead of Low Complexity Rake Receiver. 1-4 - Dareen Douglas, Nada Ben Hassen, Asmaa Aslam, Omar Elharrouss, Somaya Al-Máadeed:
Face Anti-Spoofing Detection Using Structure-Texture Decomposition. 1-5 - Jan Herbst, Jan Petershans, Matthias Rüb, Christoph Lipps, Ann-Kathrin Beck, Joana C. Carmo, Thomas Lachmann, Hans Dieter Schotten:
Inception Based Deep Learning: Biometric Identification Using Electroencephalography (EEG). 1-7 - Saraa N. K. Alasadi, Oula M. H. Fatla:
Utilizing Artificial Neural Networks for Predicting Delays and Assessing Contractor Performance in Roadworks Projects. 1-5 - Mansoor Al-Thani, Dena Al-Thani:
Link Analysis and Shortest Path Algorithm for Money Laundry Detection. 1-7 - Mattia Quadrini, Domenico Verde, Michele Luglio, Cesare Roseti, Francesco Zampognaro:
Implementation and Testing of MP-TCP ATSSS in a 5G Multi-Access Configuration. 1-6 - Lamiaa Basyoni, Junaid Qadir:
AI Generated Content in the Metaverse: Risks and Mitigation Strategies. 1-4 - Floris Breggeman, Mohammad El-Hajj, Florian Hahn:
A Comparison of Authentication Protocols for Unified Client Applications. 1-7 - Amine Bab, Saïah Bekkar-Djelloul-Saïah, Djamel Eddine Baba Hamed, Boualem Nasri, Abdelhak Benikhlef:
Comparative Approach in the Gain Study for Two Popular Shapes of S-Band Microstrip Patch Antenna for CubeSats. 1-6 - Hemant Gupta, Amiya Nayak:
Addressing IoT Security Challenges: A Framework for Determining Security Requirements of Smart Locks Leveraging MQTT-SN. 1-7 - Wenjun Shi, Lidong Zhu, Yanggege Zhang, Ke Chu, Ean He, Yimai Shi, Yong Zhang, Wen He, Kun Liu:
A DOA Estimation Method with High Resolution in the Presence of Satellite Array Error. 1-6 - Mohammad Meraj Mirza, Shinelle Hutchinson, Rebecca Gee, Umit Karabiyik:
No Filters: A Deep Dive into Photo Sharing Apps on Android and iOS. 1-8 - Oleg Serov, Mohamed Zied Chaari:
Microstrip Patch Rectenna for Electromagnetic Wireless Power Transfer at 2.45 GHz. 1-5 - Mohammed Lalou, Hamamache Kheddouci:
Network Vulnerability Assessment Using Critical Nodes Identification. 1-6 - Saddam Husain, Miras Akhmetov, Damir Kanymkulov, Galymzhan Nauryzbayev, Mohammad S. Hashmi:
Optimization of Behavioral Model of VO2 Switches Using Slime Mould Algorithm. 1-6 - Tarek Ali, Amna Eleyan, Tarek Bejaoui:
Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review. 1-7 - Sahar Salmanzade Yazdi, Fatma Najar, Nizar Bouguila:
Generalized Probabilistic Clustering Projection Models for Discrete Data. 1-7 - Farag Azzedin, Mustafa Ghaleb, Yasser El-Alfy, Raed Katib, Md. Hossain:
A Federated Learning Approach to Banking Loan Decisions. 1-7 - Mohamed Yanis Sadaoui, Sirine Hamza, Osman Salem, Ahmed Mehaoua:
Bluetooth Just Works: Security and Vulnerability. 1-5 - Alaa Jalal Tamimi, Iyad Hashlamon:
Arabic Sign Language Datasets: Review and Improvements. 1-6