default search action
SmartNets 2023: Istanbul, Turkey
- International Conference on Smart Applications, Communications and Networking, SmartNets 2023, Istanbul, Turkey, July 25-27, 2023. IEEE 2023, ISBN 979-8-3503-0252-3
- Annu, Rajalakshmi Pachamuthu, Praveen Tammana:
Optimizing Latency for Real-time Traffic and Road Safety Applications through MEC-based V2X System. 1-8 - Yuh-Shyan Chen, Chih-Shun Hsu, Bo-Xuan Yang:
The Design of a Cough Disease Classification System Using Cube-Transformer. 1-6 - Lamya Almansoori, Fatima Almusabi, Meera Alharbi, Ahmed Shuhaiber, Mohammad Tubishat:
'Robpha': A Robotic-Based Pharmacy for a Smart Hospital. 1-6 - Ruwa F. Abu Hweidi, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
SATA M.2 on Forensics: Trim Function Effect on Recovering Permanently Deleted Files. 1-6 - Siraj Munir, Stefano Ferretti:
Towards symbolic representation-based modeling of Temporal Knowledge Graphs. 1-8 - Khawla A. Alnajjar, Abdallah Y. I Abushawish, Sam Ansari:
Hardware-Based Error Correction Systems for Hamming Codes: a Review of the Literature. 1-8 - Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino, Aram Shumavon:
Optimum Noise Mechanism for Probabilistic Differentially Private Queries in Discrete Finite Sets. 1-6 - Mouza Alzaabi, Mahra Almeheiri, Shuaa Alqubaisi, Ahmed Shuhaiber:
'AI-Teacher' Assistant System: A Smart Attendance and Participation tracking system for students. 1-6 - Abubakar-Sadiq Shehu, António Pinto, Manuel Eduardo Correia:
SPIDVerify: A Secure and Privacy-Preserving Decentralised Identity Verification Framework. 1-7 - Yury Yakhno, Selin Metin:
Extracting Insights from Big Source Code Repositories with Automatic Clustering of Projects by File Names and Types. 1-6 - Salama Alhameli, Amna Almazrouei, Amal Almenhali, Ahmed Shuhaiber:
Towards an Infrastructure and Architecture of Nanotechnology in Agriculture for Abu Dhabi. 1-7 - Samsul Huda, Yasuyuki Nogami, Takuma Akada, Maya Rahayu, Md. Biplob Hossain, Muhammad Bisri Musthafa, Le Hoang Anh, Yang Jie:
A Proposal of IoT Application for Plant Monitoring System with AWS Cloud Service. 1-5 - Alfian Akbar Gozali:
Comparative Analysis of Machine Learning Methods for Multi-Year CVD Prediction. 1-6 - Victor Tran, Kanika Sood, Kayhan Bakian, Aneesh Reddy Sannapu:
Indoor Navigation Assistance System for Visually Impaired with Semantic Segmentation using EdgeTPU. 1-8 - Mohamad Ghandour, Hamid Mcheick, Mohamed Dbouk:
Aχon: IoT Attribute-based dynamic connector For Emergency Applications. 1-8 - Mehmet Ariman, Lal Verda Çakir, Mehmet Özdem, Berk Canberk:
Opportunistic RL-based WiFi Access for Aerial Sensor Nodes in Smart City Applications. 1-5 - Ndala Yves Mulongo, Khathutshelo Mushavhanamdi, Octavia Mpanza:
A Systematic Review of The Relationship Between Industry 4.0 Application and Performance Improvement. 1-6 - Mousa Al-Kfairy, Ahmed Al-Adaileh, Mohammad Tubishat, Omar Alfandi, Maitha BinAmro, Ayham Alomari:
A Sentiment Analysis Approach for Identifying Users' Security and Privacy Perception of Metaverse In Twitter. 1-6 - Edgar Wallace Bowlin, Mohammad S. Khan, Biju Bajracharya:
Reducing Bootstrap Overhead within VANET Blockchain Applications through Pruning. 1-6 - Ali Ahmad Suliman, Ahmad Bassim Humaidi, Mohammed Eid Eid, Mahmoud A. M. Albreem, Sam Ansari:
An Efficient Massive MIMO Detector Based on Deep Learning and Approximate Matrix Inversion Methods. 1-5 - Tarik Üveys Sen, Gokhan Bakal:
A Transfer Learning Application on the Reliability of Psychological Drugs' Comments. 1-6 - Umut Altunan, Halenur Sazak, Ahmet Yazar:
ML-Based Service Type Priority Decision Method Using Ambient Information for 5GB. 1-5 - Ahmed Maache, Abdesattar Kalache:
FPGA-based tunable Keccak core. 1-6 - Rasheed Yousef, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
A Machine Learning Framework & Development for Insider Cyber-crime Threats Detection. 1-6 - Olubukola David, Paul Thornley, Maryam Bagheri:
Software Defined Networking (SDN) for Campus Networks, WAN, and Datacenter. 1-8 - Nurhaliza Hassan, Kanika Sood, Gabriel Suzuki:
Machine Learning with Bitcoin Heist Ransomware. 1-6 - Christian Jay C. Adducul, John Rufino I. Macasaet, Nestor Michael C. Tiglao:
Edge-based Battery Remaining Useful Life Estimation Using Deep Learning. 1-6 - Remah Younisse, Qasem Abu Al-Haija:
An empirical study on utilizing online k-means clustering for intrusion detection purposes. 1-5 - Karrar Shakir Muttair, Oras A. Shareef Al-Ani, Ahmed Mahmood Farhan, Mahmood Farhan Mosleh, Hazeem B. Taher, Ali Z. Ghazi Zahid, Abbas Ali Diwan, Raed Hameed Chyad Alfilh:
A High-Capacity 4-Port MIMO Antenna for 5G and 6G Devices. 1-6 - Noor B. Khalaf, Hadeel K. Aljobouri, Mohammed S. Najim:
Identification and Classification of Retinal Diseases by Using Deep Learning Models. 1-5 - Farnaz Farid:
BioEnvsense: A Usable Cybersecurity Framework for Critical Infrastructure. 1-5 - S. M. Abu Adnan Abir, Mohammed A. Abuibaid, Jun Steed Huang, Yang Hong:
Harnessing 5G Networks for Health Care: Challenges and Potential Applications. 1-6 - Muhammad Anas Khan, Adeeb Khan, Mohammed A. Abuibaid, Jun Steed Huang:
Harnessing 5G Networks for Enhanced Precision Agriculture: Challenges and potential Solutions. 1-6 - Abdelkareem Jaradat, Muhamed Alarbi, Hanan Lutfiyya, Anwar Haque:
Appliances Operation Modes Identification Using States Clustering. 1-6 - Luis A. Mata, Sinan Wannous, David Duarte, Eva Maia, Pedro Vieira, Isabel Praça:
On the Implementation of a Secure and Energetically Efficient NOC for Mobile Networks. 1-8 - Gianmarco Baldini, Fausto Bonavitacola:
Specific Emitter Identification with Principal Component Analysis (PCA) Dimensionality Reduction and Convolutional Neural Network. 1-5 - Argyro Mavrogiorgou, Athanasios Kiourtis, Georgios Makridis, Dimitrios Kotios, Vasileios Koukos, Dimosthenis Kyriazis, John Soldatos, Georgios Fatouros, Dimitrios Drakoulis, Pedro Maló, Martin Serrano, Mauro Isaja, Raquel Lazcano, Juan Manuel Vera, Fabiana Fournier, Lior Limonad, Konstantinos Perakis, Dimitrios Miltiadou, Pavlos Kranas, Alper Sen, Irene Zattarin, Ernesto Troiano:
FAME: Federated Decentralized Trusted Data Marketplace for Embedded Finance. 1-6 - Aryan Jadon, Shashank Kumar:
Leveraging Generative AI Models for Synthetic Data Generation in Healthcare: Balancing Research and Privacy. 1-4 - Gökberk Açikgöz, Feyza Yildirim Okay, Suat Özdemir:
A Novel Blockchain Based Decentralized Data Management Model for Swarm UAV Systems. 1-6 - Alex Modarresi, John Symons:
Failures to Food, Energy, and Water Systems: Mapping and Simulating Components to Improve Resilience. 1-6 - Surbhi Kakar, Deepali Dhaka, Monica Mehrotra:
Tweet recommendation using Clustered Bert and Word2vec Models. i-vi - Ndala Mulongo, Mahtlatse Matlala, Khathutshelo Mushavhanamadi:
Prisma Analysis of Innovative Technologies on Advancement of Optimisation of Manufacturing Industry. 1-6 - Sadia Yeasmin, Anwar Haque:
Collaborative DDoS Attack Defense for OTA Updates in CAVs using Hyperledger Fabric Blockchain. 1-6 - Kemal Cagri Serdaroglu, Sebnem Baydere, Boonyarith Saovapakhiran, Chalermpol Charnsripinyo:
Location Aware Fog Computing Based Air Quality Monitoring System. 1-6 - Rahmi Arda Aral, Cemil Zalluhoglu, Ebru Akçapinar Sezer:
Wildfire Classification Using Infrared Unmanned Aerial Vehicle Data with Convolutional Neural Networks. 1-6 - Elif Bozkaya, Tugçe Bilen, Müge Erel-Özçevik, Yusuf Özçevik:
Energy-Aware Task Scheduling for Digital Twin Edge Networks in 6G. 1-6 - Sertap Ünlü Cinalioglu, Tolga Girici:
Low Complexity Scheduling and Phase Shift Optimization in RIS-Aided mmWave Downlink Transmission. 1-6 - Ndala Yves Mulongo, Khathutshelo Mushavhanamadi, Avumile Fetsha:
Integration of Industry 4.0 in the Metal Roofing Manufacturing Industry. 1-7 - Ece Gürbüz, Özlem Turgut, Ibrahim Kök:
Explainable AI-Based Malicious Traffic Detection and Monitoring System in Next-Gen IoT Healthcare. 1-6 - Tasneem Durid, Derar Eleyan, Amna Eleyan, Tarek Bejaoui, Mahmoud Jazzar:
Cybersecurity in Fitness Devices-A Systematic Literature Review. 1-6 - MS Hasibuan, Firmansyah YA, Sri Lestari, M. Ariza Eka Yusendra, Lilla Rahmawati, Yayan Sopian-Dhedy Adi Nugroho:
Strategy for Community Empowerment Through an Integrated Waste Bank. 1-4 - Montaser N. A. Ramadan, Mohammad Alkhedher, Bekir Tevfik Akgün, Sina Alp:
Portable AI-powered spice recognition system using an eNose based on metal oxide gas sensors. 1-6 - Ömer Sokmaz, Ahmet Yazar:
C-V2X Link Decision with Machine Learning. 1-5 - Daniel Hosseini, Rong Jin:
Graph Neural Network based Approach for Rumor Detection on Social Networks. 1-6 - Salman Hussain, Eman Almohsen, Tara Henari, Safwan Shatnawi, Anwaar Buzaboon, Mohammed Fardan, Khawla Albinali:
Using Machine Learning and SEM to Analyze Attitudes towards adopting Metaverse in Higher Education. 1-6 - Damir Kabdualiyev, Askar Madiyev, Adil Rakhaliyev, Balgynbek Dikhan, Kassymzhan Gizhduan, Hashim Ali:
A Web-Based Platform for Real-Time Speech Emotion Recognition using CNN. 1-6 - Gianmarco Baldini, Fausto Bonavitacola, Jean-Marc Chareau:
Fading Channel Classification with Walsh-Hadamard Transform and Convolutional Neural Network. 1-6 - Khadija Rammeh Houerbi, Dorra Machfar, Hella Kaffel-Ben Ayed:
Blockchain for Ridesharing: A Systematic Literature Review. 1-6 - Ali J. Almasadeh, Khawla A. Alnajjar, Mahmoud A. M. Albreem:
Deep Learning Applications in MIMO Systems. 1-6 - Agus Harya Maulana, I. G. P. Ari Suyasa, Erwan Kurniawan:
Analysis of the Demilitarized Zone Implementation in Java Madura Bali Electrical Systems to Increase the Level of IT/OT Cyber Security With the Dual DMZ Firewall Architecture Method. 1-6 - Omar Otoniel Flores-Cortez, Carlos Pocasangre Jimenez, Fernando Arévalo, Ricardo León López, David Peña Martínez, Oscar Perez Rafael:
A Low-cost IoT Mobile System for Air Quality Monitoring in Developing Countries, a Study Case in El Salvador. 1-8 - Peng Wu, Wei Wang, Lanxin Qiu, Yue Yu, Jiming Yao:
Optimal configuration method of edge computing unit considering computing load balancing in fault location of power distribution grid. 1-8 - Mustafa Aljerbi, Ahmed S. Ashur, Nabil Naas:
Data Offloading from LTE to Wi-Fi. 1-5 - Mohammad Tubishat, Feras N. Al-Obeidat, Ahmed Shuhaiber:
Sentiment Analysis of Using ChatGPT in Education. 1-7 - Ali Akkaya, Gokhan Bakal:
A Computational Drug Repositioning Effort using Patients' Reviews Dataset. 1-6 - Hussein Mohammed Naser, Oras A. Shareef Al-Ani, Karrar Shakir Muttair, Mahmood Farhan Mosleh, Hazeem B. Taher:
Wideband MIMO Antenna in the Shape of a Hand Grip. 1-6 - Muhammad Umair Hassan, Magnus Stava, Ibrahim A. Hameed:
Deep Privacy based Face Anonymization for Smart Cities. 1-6 - Zahra Esfandiari Baiat, Sebnem Baydere:
Smart City Traffic Monitoring:YOLOv7 Transfer Learning Approach for Real-Time Vehicle Detection. 1-6 - Mathieu Boussard, Pierre Peloso, Vincent Verdot, Richard Douville, Nicolas Le Sauze:
Distributed Personal OS Environments - exploring Cooperative Fog Computing. 1-4 - Siddharth Sharma, L. Rajya Lakshmi:
Improved k-NN Regression Model Using Random Forests for Air Pollution Prediction. 1-7 - Yuh-Shyan Chen, Chih-Shun Hsu, Fang-Yu Chang Chien:
A Music Generation Scheme with Beat Weight Learning. 1-6 - Aaron Jay V. Argel, Madeleine M. Ragmac, Markus Elija Thomas E. Lindo, Nestor Michael C. Tiglao:
Intellitell: A Web-based Storytelling Platform for Emotion Recognition with Machine Learning. 1-6 - Romain Greard, Mohamed Himdi, Dominique Lemur, Gwenal Le Dem, Pierre Thaly, Cyrille Le Meins:
An Elliptical Folded Dipole With Directive Radiation for UWB Applications. 1-4 - Madhab Chandra Das, Fatema Tabassum Liza, Partha Pratim Pandit, Fariha Tabassum, Miraz Al Mamun, Sharmistha Bhattacharjee, Md Shakil Bin Kashem:
A comparative study of machine learning approaches for heart stroke prediction. 1-6 - Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu:
Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats. 1-8 - Mohammad Sahinur Hossen, Dongwan Shin:
Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacks. 1-8 - Kemal Cagri Serdaroglu, Boonyarith Saovapakhiran, Zahra Esfandiari Baiat, Sebnem Baydere, Chalermpol Charnsripinyo, F. Mulyadi, Suat Özdemir:
Demonstration of Multi-Layer IoT Platform with QoS Support. 1-4 - Mahawish Fatima, Osama Rehman, Ibrahim M. H. Rehman:
Li-IDS: An Approach Towards a Lightweight IDS for Resource-Constrained IoT. 1-6 - F. I. Azman, M. S. F. M. Fazdli, Nur Luqman Saleh, A. S. M. Noor, A. M. Ali:
Residential College's Smart Restroom Monitoring System. 1-6 - Mohammed Omar, Ahmed Badawy, Khalid Abulsaud, Elias Yaacoub, Mohsen Guizani:
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks. 1-6 - Abdallatif S. Abu-Issa, S. Hajjaj, S. Al-Jamal, D. Barghotti, A. Awad, M. Hussein, Iyad Tumar, Abualsoud Hanani:
Design and Implementation of Proactive Multi-Type Context-Aware Recommender System for Patients Suffering Diabetes. 1-7 - Ismail Hakki Turan, Dogan Yildiz, Sercan Demirci:
Protocol Stack-Aware Comparison of Centroid Localization Algorithms Based on Anchor Density Using Cooja. 1-6 - Ahmed Shuhaiber, Rund Hiyasat, Amjad Abuelsamen, Nasreen Ghanem, Mouza Alhammadi, Alreem Alghafri:
A Smart Desk: A Smart Solution for Young Students. 1-6 - Tayfun Bekar, Sedat Görmüs, Burak Aydin, Hakan Aydin:
Q-Learning Algorithm Inspired Objective Function Optimization For IETF 6TiSCH Networks. 1-6 - Halil Arslan, Selim Yilmaz, Sevil Sen:
Dynamic MAC Scheduling in O-RAN using Federated Deep Reinforcement Learning. 1-8 - Sotirios T. Spantideas, Anastasios E. Giannopoulos, Marta Amor Cambeiro, Óscar Trullols-Cruces, Eneko Atxutegi, Panagiotis Trakadas:
Intelligent Mission Critical Services over Beyond 5G Networks: Control Loop and Proactive Overload Detection. 1-6 - May Itani, Hanaa S. Basheer, Fouad Eddine:
Attack Detection in IoT-Based Healthcare Networks Using Hybrid Federated Learning. 1-7 - Mitchell Timken, Onat Güngör, Tajana Rosing, Baris Aksanli:
Analysis of Machine Learning Algorithms for Cyber Attack Detection in SCADA Power Systems. 1-6 - Nisha Thorakkattu Madathil, Winner Abula, Shooq Alaboolan, Maryam Almadhaani, Saed Alrabaee:
PESS: Progress Enhancing Student Support. 1-6 - Almira Askhatova, Yerlik Gabdulla, Amanali Bekbolat, Essam Shehab, Md. Hazrat Ali:
Machine Learning-Based Topology Optimization in 3D Printing. 1-6 - Mohammad Soleimanikia, Omid Bushehrian, Davood Mahmoodi:
A Novel Graph-Based Energy Efficient Sensor Selection Scheme in Edge Computing. 1-6 - Imad Afyouni, Baraa Kakah, Maissan Bazazeh:
Arabic Geo-Social Event Detection using a Hybrid Learning Architecture. 1-6 - Jessé Da Costa Rocha, Marcela Alves De Souza, Evelin Helena Silva Cardoso, Nandamudi Vijaykumar, Jasmine Priscyla Leite De Araújo, Carlos Renato Lisboa Francês:
A Platform for Monitoring Student Commuting in the Use of School Transport in Smart Cities - A Facial Recognition Based Approach. 1-6 - Marios Charalampides, Theodoros Bozios, Dimitris Tsoukalas, Sotirios Ntouskas, Stavros Chatzandroulis, Evangelos Skotadis, Evangelos Aslanidis, Themistoklis Sfetsas, Georgia Dimitropoulou, George Tsekenis, Georgios Samaras:
Advanced Edge to Cloud system architecture for Smart Real-Time water quality monitoring using cutting-edge portable IoT biosensor devices. 1-6 - Mahadi Hasan, Miraz Al Mamun, Madhab Chandra Das, Md Maruf Hasan, ASM Mohaimenul Islam:
The application and comparison of Deep Learning models for the prediction of chest cancer prognosis. 1-5 - Ndala Yves Mulongo, Khathutshelo Mushavhanamadi:
Emerging Role of Artificial Intelligence in Addressing The Electricity Crisis. 1-4 - Sayani Mallick, Pranav Ruparel, Shubhangi K. Gawali, Neena Goveas:
Resource-Constrained Device Characterization for Detecting Sleep Apnea Using Machine Learning. 1-7 - Gayeong Kim, Youngju Nam, Hyunseok Choi, Euisin Lee:
Multi-hop Precaching scheme with Relaying in Intermittently Connected Vehicular Networks. 1-6 - L. Rajya Lakshmi:
Load-Aware Resource Scheduling in Fog Computing Based Delay-Sensitive IoT Networks. 1-7 - Merouane Bouzid, Nacèra Meziane, Salah Eddine Cheraitia:
Efficient coding of wideband ISF parameters : Application of variable rate SSVQ scheme. 1-5 - Afia Farjana, Fatema Tabassum Liza, Miraz Al Mamun, Madhab Chandra Das, Md Maruf Hasan:
SARS CovidAID: Automatic detection of SARS CoV-19 cases from CT scan images with pretrained transfer learning model (VGG19, RESNet50 and DenseNet169) architecture. 1-6 - Ayokunle Awelewa, Ebubechi Ezenwanne, Kayode Ojo, Isaac Samuel, Olawale M. Popoola:
Impact of a Web Based Crowdfunding Application for Renewable Energy Projects in Nigeria. 1-8 - Nacèra Meziane, Dalila Meziane, Merouane Bouzid:
Discrete wavelet transform-based denoising method for real electrocardiogram. 1-5 - Ruwa F. Abu Hweidi, Mahmoud Jazzar, Amna Eleyan, Tarek Bejaoui:
Forensics Investigation on Social Media Apps and Web Apps Messaging in Android Smartphone. 1-7 - Ahmed Shuhaiber, Aysha Alkuwaiti, Mera Alremeithi, Hamda Almenhali:
The Development of Smart E-Portfolio Generator System for University students: An SDLC Approach. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.