default search action
8th COMNET 2020: Virtual Event, Tunisia
- Eighth IEEE International Conference on Communications and Networking, ComNet 2020, Virtual Event, Tunisia, October 28-30, 2020. IEEE 2020, ISBN 978-1-7281-5320-9
- Nesrine Zaghdoud, Adel Ben Mnaouer, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati:
Secure Performance of DF Relaying in Cooperative NOMA over Rician Fading Channels. 1-6 - Joe Samuel, Zied Bouida, Pooria Shafia, Mohamed Hozayen, Leen Yassin Kassab, Lama Kassab, Mohamed Ibnkahla:
Diabetes Analytics and Recommendation Engine (DARE). 1-6 - Chowdhury Saleha Ferdowsy, Zied Bouida, Mohamed Ibnkahla:
Energy and Spectral Efficient Scheduling for Heterogeneous IoT Sensor Nodes. 1-6 - Lotfi Mhamdi, Desmond C. McLernon, Fadi El-Moussa, Syed Ali Raza Zaidi, Mounir Ghogho, Tuan A. Tang:
A Deep Learning Approach Combining Autoencoder with One-class SVM for DDoS Attack Detection in SDNs. 1-6 - Inès Raïssa Djouela Kamgang, Ghayet El Mouna Zhioua, Nabil Tabbane:
Resource Allocation Steps for an Efficient End-to-End Service Delivery in Network Function Virtualization: A Survey. 1-8 - Muhammad Usman, Marwa K. Qaraqe, Muhammad Rizwan Asghar, Imran Shafique Ansari:
Energy Efficient Wireless Body Area Networks: Proximity-based Clustering in Medical Implants. 1-5 - Ibtissem Brahmi, Hend Koubaa, Faouzi Zarai:
Genetic Algorithm based Resource Allocation for V2X Communications. 1-5 - Marwa Fattoum, Zakia Jellali, Leïla Najjar Atallah:
A Joint Clustering and Routing Algorithm based on GA for Multi Objective Optimization in WSN. 1-5 - Soumaya Bel Hadj Youssef, Noureddine Boudriga, Slim Rekhis:
A trust-aware micropayment system for data muling in cloud environment: a Blockchain based approach. 1-8 - Yantong Wang, Vasilis Friderikos:
Network Orchestration in Mobile Networks via a Synergy of Model-driven and AI-based Techniques. 1-5 - Abubakar U. Makarfi, Rupak Kharel, Khaled M. Rabie, Xingwang Li, Osamah S. Badarneh, Galymzhan Nauryzbayev, Sultangali Arzykulov, Omprakash Kaiwartya:
Performance Analysis of SWIPT Networks over Composite Fading Channels. 1-7 - Noureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari:
Securing Smart Homes using a Behavior Analysis based Authentication Approach. 1-5 - Tharaka Mawanane Hewa, Anshuman Kalla, Avishek Nag, Mika E. Ylianttila, Madhusanka Liyanage:
Blockchain for 5G and IoT: Opportunities and Challenges. 1-8 - Tian Hong Loh, Haoyu Lin:
On the Improvement of Positioning Accuracy in Wireless Sensor Network using Smart Antennas. 1-4 - Qasim Zeeshan Ahmed, Maryam Hafeez, Faheem Ahmad Khan, Pavlos I. Lazaridis:
Towards Beyond 5G Future Wireless Networks with focus towards Indoor Localization. 1-5 - Mohammed W. Baidas, Mubarak Al-Mubarak, Emad Alsusa, Mohamad Khattar Awad:
A Two-Stage Solution Procedure to Joint Subcarrier Assignment and Global Energy-Efficient Power Allocation in Energy-Harvesting Two-Tier Downlink NOMA HetNets. 1-8 - Bouthaina Smari, Mondher Labidi, Fethi Choubani:
Design of a Metamatrial Terahertz Resonant inclusion for 5G Applications. 1-4 - Parham Kazemi, Hanan Al-Tous, Christoph Studer, Olav Tirkkonen:
SNR Prediction in Cellular Systems based on Channel Charting. 1-8 - Armielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair:
Information-Centric Networking Challenges and Opportunities in Service Discovery: A Survey. 1-8 - George C. Hadjichristofi, George Varveris, Konstantinos Katzis:
Assessing Trustworthiness of IoT-Health Devices in Hospital Environments. 1-5 - Konstantinos Katzis, Luzango Mfupe, Habib Mohammed Hussien:
Opportunities and Challenges of Bridging the Digital Divide using 5G enabled High Altitude Platforms and TVWS spectrum. 1-7 - Abdullateef Almohamad, Saud Althunibat, Marwa K. Qaraqe, Raed Mesleh, Mazen O. Hasna:
Performance Analysis of Index Modulation Based Multiple Access Under Imperfect Channel Estimation. 1-5 - Li Manman, Qin Xin, Pratik Goswami, Amrit Mukherjee, Lixia Yang:
Energy-Efficient Dynamic Clustering for IoT Applications: A Neural Network Approach. 1-7 - Mohd Mat Isa, Lotfi Mhamdi:
Native SDN Intrusion Detection using Machine Learning. 1-7 - Meriam Dhouibi, Ahmed Karim Ben Salem, Slim Ben Saoud:
CNN for object recognition implementation on FPGA using PYNQ framework. 1-6 - Karima Smida, Hajer Tounsi, Mounir Frikha, Ye-Qiong Song:
Efficient SDN Controller for Safety Applications in SDN-Based Vehicular Networks: POX, Floodlight, ONOS or OpenDaylight? 1-6 - Amel Ksentini, Maha Jebalia, Sami Tabbane:
How much can Fog Computing enhance performances of heterogeneous delay-sensitive services in Smart Cities? 1-8 - Maziar M. Nekovee, Sachin Sharma, Navdeep Uniyal, Avishek Nag, Reza Nejabati, Dimitra Simeonidou:
Towards AI-enabled Microservice Architecture for Network Function Virtualization. 1-8 - Mounia Bouabdellah, Elmehdi Illi, Faissal El Bouanani, Mohamed-Slim Alouini:
Hybrid Very High Throughput Satellites: Potential, Challenges, and Research Directions. 1-6 - Maroua Boudaya, Inès Kammoun, Mohamed Siala:
HARQ performance over massive MIMO channels using chase combining and CZA pilot decontamination. 1-7 - Mehdi Monemi, Hina Tabassum, Ramein Zahedi:
On the Performance of Non-Orthogonal Multiple Access (NOMA): Terrestrial vs. Aerial Networks. 1-8 - Muhammad Khalid, Nauman Aslam, Liang Wang:
A Reinforcement Learning based Path Guidance Scheme for Long-range Autonomous Valet Parking in Smart Cities. 1-7 - Changyoung An, Heung-Gyoon Ryu:
Compensation Systems and Performance Comparison of the Very High Doppler Frequency. 1-4 - Mohammad Reza Amini, Mohammed W. Baidas:
Performance Analysis of Cognitive-Radio IoT Networks. 1-7 - Mai Kafafy, Mohamed Abdallah:
Topology for Robust RF/FSO Backhauling under Random Jamming Attacks and Adversary Weather Conditions. 1-5 - Widad Belaoura, Khalida Ghanem, Mohummed Zeeshan Shakir, Khalid A. Qaraqe:
Impact of Hardware Impairments on the Performance of Millimeter-Wave Massive MU-MIMO Systems with Distributed Antennas. 1-4 - Aryan Kaushik, John S. Thompson, Evangelos Vlachos:
Energy Efficiency Maximization in Millimeter Wave Hybrid MIMO Systems for 5G and Beyond. 1-7 - Masato Oguchi, Saneyasu Yamaguchi:
Development of Advanced Edge Computing Framework using Rich Client Devices. 1-6 - Murao Lin, Baokang Zhao, Qin Xin:
ERID: A Deep Learning-based Approach Towards Efficient Real-Time Intrusion Detection for IoT. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.