


default search action
CITS 2023: Genoa, Italy
- Mohammad S. Obaidat, Franco Davoli, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:
International Conference on Computer, Information and Telecommunication Systems, CITS 2023, Genoa, Italy, July 10-12, 2023. IEEE 2023, ISBN 979-8-3503-3609-2 - Rebeca Estrada
, Nelson Vera, Xavier Aizaga:
Evaluation of Machine Learning Prediction Models for Wifi based Indoor Positioning System. 1-7 - Yousuf Al-Aali
, Said Boussakta:
Lightweight Hash Function based on Fermat Number Transform (FNT). 1-6 - Marialaura Tamburello, Giuseppe Caruso, Davide Adami
, Stefano Giordano:
A reparameterization and monitoring platform for energy efficient GPS trackers in behavioural analysis of wildlife. 1-6 - Surabhi Gusain Rawat, Mohammad S. Obaidat, Sumit Pundir, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Kuei-Fang Hsiao:
A Survey of DDoS Attacks Detection Schemes in SDN Environment. 1-6 - Daniel Dik
, Iacob Larsen, Michael Stübert Berger
:
MACsec and AES-GCM Hardware Architecture with Frame Preemption Support for Transport Security in Time Sensitive Networking. 1-7 - Aya Kh. Ahmed
, Hamed S. Al-Raweshidy:
Deep Learning Polar Convolutional Parallel Concatenated (DL-PCPC) Channel Decoding for 6G Communications. 1-5 - Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios Papadimitriou:
Balancing reliability and energy efficiency in LoRa networks using reinforcement learning. 1-6 - Marialaura Tamburello, Giuseppe Caruso, Davide Adami
, Stefano Giordano, Mike Oluwatayo Ojo:
Lifetime estimation and reparameterization of GPS devices for tracking applications. 1-6 - Oscal T.-C. Chen, Li-Cheng Yan:
Deep Neural Network for User Attribute Recognition in Metaverse Hand Images. 1-6 - Akshita Doad, Nitin Gupta, Mohammad S. Obaidat, Kuldeep Singh Jadon, Piyush Rawat, Kuei-Fang Hsiao:
Profit aware Resource Allocation in Fog Computing: A Stackelberg Game Approach. 1-8 - Adnan Nadeem, Muhammad Ashraf
, Amir Mehmood
, Muhammad Shoaib Siddiqui, Hani Almoamari, Qammer H. Abbasi:
Identification of Damaged Date Palm Tree in a Farm using IoT-based Thermal Image Analysis. 1-7 - Layeba Faheem, Soumya Mukherjee
, Mohammad S. Obaidat, Arup Kumar Pal, SK Hafizul Islam, Balqies Sadoun:
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor. 1-8 - Joelle Kabdjou
, Elie Tagne Fute, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua:
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC). 1-7 - Shubham Jain, Enda Fallon
:
Leveraging Unstructured Data to Improve Customer Engagement and Revenue in Financial Institutions: A Deep Reinforcement Learning Approach to Personalized Transaction Recommendations. 1-8 - Riya Kakkar, Rajesh Gupta, Mohammad S. Obaidat, Nilesh Kumar Jadav, Sudeep Tanwar:
Majority Voting-based Consensus Mechanism for UAVs Decision Making in Battlefield. 1-5 - Neda Maleki, Arslan Musaddiq
, David Mozart, Tobias Olsson, Mustafa Omareen, Fredrik Ahlgren:
DeltaBin: An Efficient Binary Data Format for Low Power IoT Devices. 1-5 - Julio Cesar Gancino Vargas, Segundo Moises Toapanta Toapanta, Yngrid Josefina Melo Quintana, Danny Santiago Páez Oscullo
:
Blockchain model based on human DNA to modify blocks in P2P networks. 1-7 - Ahlam Alshukaili, Khairi A. Hamdi:
Spreading Factor Recovery in LoRa Using Machine Learning. 1-7 - Helen D. Karatza
:
Scheduling Delay-Sensitive Bag-of-Task Jobs with Imprecise Computations on Distributed Resources. 1-6 - Yasantha Samarawickrama, Álvaro Augusto M. de Medeiros, Victor Cionca:
Mission-level URLLC under variable Rician channel conditions. 1-6 - Sergei Semenov, Sha Hu, Kuangda Tian:
High Layer Coding for Video Transmission. 1-6 - Hsiao-Hui Li, Jian-Jie Lian, Yuan-Hsun Liao:
Design an Adaptive Virtual Reality Game to Promote Elderly Health. 1-7 - Stefano Cirici, Michele Paolino, Daniel Raho:
SVFF: An Automated Framework for SR-IOV Virtual Function Management in FPGA Accelerated Virtualized Environments. 1-6 - Chandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Parkash Tambare, Agbotiname Lucky Imoize:
An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment. 1-6 - Karan Gupta
, Sanjay Kumar Dhurandher:
CASE: Channel Allocation for optimized Spectral Efficiency using deep neural network in underlay cognitive radios. 1-6 - Maria Iloridou, Petros Nicopolitidis, Georgios Papadimitriou:
Two-step Random Access with Collision Resolution Queueing for Cellular IoT networks. 1-5 - Dongeun Lee, Yoonji Kim, Dongho Seo, Wonjin Lee, Dongweon Yoon:
Automatic Recognition for LPI Radar Waveform Using Sequence-based Deep Learning Model. 1-4 - Xinnian Guo, Ziyang Kang, Yang Shen, Yingna Su, Hongyan Ding, Lizhe Tan:
On Implementation of Sparse Finite Impulse Response Secondary Path for Active Noise Control. 1-5 - Shokoufeh Seifi, Ronald Beaubrun, Martine Bellaïche, Talal Halabi:
A Study on the Efficiency of Intrusion Detection Systems in IoT Networks. 1-8 - Segundo Moisés Toapanta Toapanta, Rodrigo Humberto Del Pozo Durango, Eriannys Zharayth Gómez Díaz, Jose Antonio Orizaga Trejo
, Luis Enrique Mafla Gallegos, Ma. Roció Maciel Arellano, Oscar Marcelo Zambrano Vizuete, María Mercedes Baño Hifóng:
Proposal for a security model applying artificial intelligence for administrative management in a higher education institution. 1-5 - Xueting Tang, Jun Yan:
A CSI Amplitude-phase Information Based Graph Construction for GNN Localization. 1-7 - Shuo Jin, Meiqin Liu, Yu Guo, Chao Yao, Mohammad S. Obaidat:
Multi-frame Correlated Representation Network for Video Super-Resolution. 1-7 - Xuewen Xiao, Jun Yan:
A Transfer Learning Based CSI Indoor Localization Using GASF Image Construction. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.