Implementation of Joint Network Channel Decoding Algorithm for Multiple Access Relay Channel Based on Convolutional Codes |
Youssef Zid1, Sonia Zaibi Ammar1 and Ridha Bouallegue2, 1National Engineering School of Tunis, Tunisia and 2Higher School of Communications of Tunis, Tunisia |
Volume : 5 volume number : 16 pdf |
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations |
Nabil Giweli, Seyed Shahrestani and Hon Cheung, Western Sydney University, Australia |
Volume : 5 volume number : 16 pdf |
A Method of Target Tracking and Prediction Based on Geomagnetic Sensor Technology |
Xinmin Tang1, Shangfeng Gao1, Songchen Han2, Zhiyuan Shen1, Liping Di2 and Binbin Liang2, 1Nanjing University of Aeronautics and Astronautics, China and 2Si Chuan University, China |
Volume : 5 volume number : 16 pdf |
Medium Access Control with Scheduled Group Contention for Massive M2M Devices |
Joo Rak Kang and Tae-Jin Lee, Sungkyunkwan University, Korea |
Volume : 5 volume number : 16 pdf |
Harvested Energy-Adaptive MAC Protocol for Energy Harvesting IOT Networks |
Hyeong-Kyu Lee, MinGyu Lee and Tae-Jin Lee, Sungkyunkwan University, South Korea |
Volume : 5 volume number : 16 pdf |
Table-Based Identification Protocol of Compuatational RFID Tags |
Yunmin Kim, Ji Hyoung Ahn and Tae-Jin Lee, Sungkyunkwan University, South Korea |
Volume : 5 volume number : 16 pdf |
SOTM : A Self Organized Trust Management System for VANET |
Amel Ltifi1, Ahmed Zouinkhi2 and Mohamed Salim Bouhlel1, 1Higher Institute of Biotechnology of Sfax, Tunisia and 2National Engineering school of Gabes, Tunisia |
Volume : 5 volume number : 16 pdf |
Reducing Latency in African NRENS Using Performance-Based LISP/SDN Traffic Engineering |
Josiah Chavula, Melissa Densmore and Hussein Suleman, University of Cape Town, South Africa |
Volume : 5 volume number : 16 pdf |
Limiting Self-Propagating Malware Based on Connection Failure Behavior |
Yian Zhou1, You Zhou1, Shigang Chen1 and O. Patrick Kreidl2, 1University of Florida, USA and 2University of North Florida, USA |
Volume : 5 volume number : 16 pdf |
Selective Opening Secure Functional Encryption |
Yuanyuan Ji, Haixia Xu and Peili Li, Chinese Academy of Sciences, China |
Volume : 5 volume number : 16 pdf |
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recent Developments |
Ali Gholami and Erwin Laure, KTH- Royal Institute of Technology, Sweden |
Volume : 5 volume number : 16 pdf |
Security Analysis of Mobile Authentication Using QR-Codes |
Siwon Sung1,2, Joonghwan Lee1,2, Jinmok Kim1,2, Jongho Mun2 and Dongho Won2, 1Samsung Electronics, Korea and 2Sungkyunkwan University, Korea |
Volume : 5 volume number : 16 pdf |
Application-Based QoS Evaluation of Heterogeneous Networks |
Farnaz Farid, Seyed Shahrestani and Chun Ruan, Western Sydney University, Australia |
Volume : 5 volume number : 16 pdf |
BLE-Based Accurate Indoor Location Tracking for Home and Office |
Joonghong Park1, Jaehoon Kim1 and Sungwon Kang2, 1Samsung Electronics, Republic of Korea and 2Korea Advanced of Science and Technology (KAIST), Republic of Korea |
Volume : 5 volume number : 16 pdf |
An Adaptive Remote Display Framework to Improve Power Efficiency |
Dong Hyun, Jo1 and Dae Young, Kim2, 1Samsung Electronics, South Korea and 2Korea Advanced of Science and Technology (KAIST), South Korea |
Volume : 5 volume number : 16 pdf |
Higher Educational Empowerment, Its Ideal Parameters and Their Corelation with Economy |
Mohit Satoskar1and Anuprita Satoskar2, 1Ramrao Adik Institute of Technology, India and 2Mumbai University, India |
Volume : 5 volume number : 16 pdf |
Real Human Face Detection for Surveillance System Using Heterogeneous Sensors |
Yoon-Ki Kim, Doo-Hyun Hwang and Chang-Sung Jeong, Korea University, South Korea |
Volume : 5 volume number : 16 pdf |
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment |
Du-Hyun Hwang, Yoon-Ki Kim and Chang-Sung Jeong, Korea University, Republic of Korea |
Volume : 5 volume number : 16 pdf |
Robust Human Tracking Method Based on Apperance and Geometrical Features in Non-Overlapping Views |
Binbin Liang1, Songchen Han1, Yan Zhu2, Liping Di1, 1Sichuan University, China and 2Nanjing University of Aeronautics and Astronautics, China |
Volume : 5 volume number : 16 pdf |
A Generalized Sampling Theorem Over Galois Field Domains for Experimental Design |
Yoshifumi Ukita, Yokohama College of Commerce, Japan |
Volume : 5 volume number : 16 pdf |