![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
6. DICTAP 2016: Konya, Turkey
- Sixth International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2016, Konya, Turkey, July 21-23, 2016. IEEE 2016, ISBN 978-1-4673-9609-7
- Ibrahim Aydin, Ümit Aygölü:
Energy-efficient link adaptation for distributed space time block code in wireless relay networks. 1-5 - Murat Yücel
, Nail Ferhat Ozturk, Cemal Gemci:
Design of a Fiber Bragg Grating multiple temperature sensor. 6-11 - Yunus Sarikaya, Hazer Inaltekin
, Tansu Alpcan, Jamie S. Evans:
Interference scaling in multi-cell network with rate guarantees. 12-17 - Takashi Takeuchi, Yuki Nishikawa, Ryosuke Fujiwara:
Fast channel switching technique for interference avoidance with 5 GHz dual channel wireless LAN. 18-23 - Kerem Küçük
:
Design and implementation of a real-time ERP-OFDM SDR receiver on the USRP2 platform. 24-29 - Muhammad Fahim
, Asad Masood Khattak, Thar Baker
, Francis Chow, Babar Shah:
Micro-context recognition of sedentary behaviour using smartphone. 30-34 - Muhammad Fahim
, Halil Ibrahim Cebe, Jawad Rasheed
, Farzad Kiani
:
mHealth: Blood donation application using android smartphone. 35-38 - Afdallyna Fathiyah Harun, Steve Benford
, Claire O'Malley, Nor Laila Md. Noor:
Glyphing it! Children using markers in school. 39-44 - Mostafa Korashy, Khaled F. Hussain
, H. M. Ibrahim:
Teleoperation of dogs using controlled laser beam. 45-49 - Haipeng Wang, Weiwei Sun, Xueyuan Lin, Ziling Wang:
A centralized multi-sensor particle filter algorithm of formation targets. 50-55 - Haipeng Wang, Yu Cong, Xinlong Pan, Weiwei Sun:
Track anti-bias refined correlation algorithm of group targets based on double fussy topology. 56-62 - Hassan Saad Alqahtani, Paul Sant:
A multi-cloud approach for secure data storage on smart device. 63-69 - Daniel Krauss, Christoph Thomalla:
Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures. 70-73 - Tanjila Farah, Moniruzzaman Shojol, Maruf Hassan
, Delwar Alam:
Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF. 74-78 - Shahid Alam
, Ryan D. Riley, Ibrahim Sogukpinar
, Necmeddin Carkaci:
DroidClone: Detecting android malware variants by exposing code clones. 79-84 - Shahid Alam
:
SUIS: An online graphical Signature-Based User Identification System. 85-89 - Saiful Izwan Suliman, Graham Kendall, Ismail Musirin:
Implementing immune-based algorithm for bandwidth spectrum allocation in wireless communication. 90-96 - Sarah Alnasser, Hachemi Bennaceur:
An efficient Genetic Algorithm for the global robot path planning problem. 97-102 - Can Umut Ileri
, Orhan Dagdeviren
:
Performance evaluation of distributed maximum weighted matching algorithms. 103-108 - Ozan Zorlu
, Ozgur Koray Sahingoz
:
Increasing the coverage of homogeneous wireless sensor network by genetic algorithm based deployment. 109-114 - Haitham Alsaif, Naz E. Islam:
Truncated compact design of monopole antenna with modified ground plane for UWB applications. 115-118 - Kishor Krishnan Nair, Albert Helberg
, Johannes Van Der Merwe:
An approach to Improve the Match-on-Card Fingerprint Authentication System security. 119-125 - Hazwani Mohd Mohadis
, Nazlena Mohamad Ali
:
Designing persuasive application to encourage physical activity at workplace among older workers. 126-130 - Taner Çevik, Ali Mustafa Ali Alshaykha, Nazife Cevik:
Performance analysis of GLCM-based classification on Wavelet Transform-compressed fingerprint images. 131-135 - Syed Yasser Arafat, Muhammad Inzimam Saghir, Mubah Ishtiaq, Umer Bashir:
Comparison of techniques for leaf classification. 136-141 - Baha Fergani, Mohamed-Khireddine Kholladi
:
A discrete particle swarm optimisation algorithm for geographical map contour reconstruction. 142-144 - Necip Gözüaçik, Hatice Murtaza:
Mobile Number Portability service regulation interacts with national VoIP switch. 145-147 - Nazanin Mazlooman
, Behrouz Sahebkar:
Evaluate the effect of teledentistry and information technology on dentistry: Case study Iran. 148-155 - Serkan Turan, Ekram Hussien Mohammed, Sarp Ertürk:
Hardware CODEC based JPEG2000 video encoder design for combat system video networks. 156-158 - Islam A. T. F. Taj-Eddin
, Mahmoud Afifi
, Mostafa Korashy, Doha Hamdy, Marwa Nasser, Shimaa Derbaz:
A new compression technique for surveillance videos: Evaluation using new dataset. 159-164 - Farag M. Sallabi
, Khaled Shuaib:
Internet of things network management system architecture for smart healthcare. 165-170 - Yasin Tekin, Ozgur Koray Sahingoz
:
A Publish/Subscribe messaging system for wireless sensor networks. 171-176 - Muhammad Aamir Nadeem, Taimur Karamat:
A survey of cloud network overlay protocols. 177-182 - Musa Aydin
, Emin Kugu
:
Finding smoothness area on the topographic maps for the unmanned aerial vehicle's landing site estimation. 183-186
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.