Published: 2019-04-24

Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals

Mohammed SABER, Abdessamad EL RHARRAS, Rachid SAADANE, Hatim KHARRAZ AROUSSI, Mohammed WAHBI

ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments

Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Deon Du Plessis, Solly Maswikaneng, Topside Mathonsi

A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring

A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi

Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method

Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Muchtar, Mohd. Yazid Idris, Rahmat Budiarto

Traffic congestion prevention system

Hamza TOULNI, Mounia MIYARA, Benayad NSIRI, Mohcine BOUDHANE

Application-based authentication on an inter-VM traffic in a Cloud environment

Karim Benzidane, Saad Khoudali, Leila Fetjah, Said Jai Andaloussi, Abderrahim Sekkaki

Dynamic Detection of Software Defects Using Supervised Learning Techniques

Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi

Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs

Gabriel Vasconcelos, Rodrigo Miani, Vitor Guizlini, Jefferson Souza

A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION

AMJAD Yosef HENDI, Majed Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S Soliman

Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment

Nayab Taj, Mohammad Haseeb Zafar, Shakeel Ahmad Waqas, Humaira Rehman, Madini O Alassafi, Imran Khan

Review on Leakage Resilient Key Exchange Security Model

Zheng Wei Clement Chan, Chai Wen Chuah, Janaka Alawatugoda