default search action
6. DICTAP 2016: Konya, Turkey
- Sixth International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2016, Konya, Turkey, July 21-23, 2016. IEEE 2016, ISBN 978-1-4673-9609-7
- Ibrahim Aydin, Ümit Aygölü:
Energy-efficient link adaptation for distributed space time block code in wireless relay networks. 1-5 - Murat Yücel, Nail Ferhat Ozturk, Cemal Gemci:
Design of a Fiber Bragg Grating multiple temperature sensor. 6-11 - Yunus Sarikaya, Hazer Inaltekin, Tansu Alpcan, Jamie S. Evans:
Interference scaling in multi-cell network with rate guarantees. 12-17 - Takashi Takeuchi, Yuki Nishikawa, Ryosuke Fujiwara:
Fast channel switching technique for interference avoidance with 5 GHz dual channel wireless LAN. 18-23 - Kerem Küçük:
Design and implementation of a real-time ERP-OFDM SDR receiver on the USRP2 platform. 24-29 - Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, Babar Shah:
Micro-context recognition of sedentary behaviour using smartphone. 30-34 - Muhammad Fahim, Halil Ibrahim Cebe, Jawad Rasheed, Farzad Kiani:
mHealth: Blood donation application using android smartphone. 35-38 - Afdallyna Fathiyah Harun, Steve Benford, Claire O'Malley, Nor Laila Md. Noor:
Glyphing it! Children using markers in school. 39-44 - Mostafa Korashy, Khaled F. Hussain, H. M. Ibrahim:
Teleoperation of dogs using controlled laser beam. 45-49 - Haipeng Wang, Weiwei Sun, Xueyuan Lin, Ziling Wang:
A centralized multi-sensor particle filter algorithm of formation targets. 50-55 - Haipeng Wang, Yu Cong, Xinlong Pan, Weiwei Sun:
Track anti-bias refined correlation algorithm of group targets based on double fussy topology. 56-62 - Hassan Saad Alqahtani, Paul Sant:
A multi-cloud approach for secure data storage on smart device. 63-69 - Daniel Krauss, Christoph Thomalla:
Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures. 70-73 - Tanjila Farah, Moniruzzaman Shojol, Maruf Hassan, Delwar Alam:
Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF. 74-78 - Shahid Alam, Ryan D. Riley, Ibrahim Sogukpinar, Necmeddin Carkaci:
DroidClone: Detecting android malware variants by exposing code clones. 79-84 - Shahid Alam:
SUIS: An online graphical Signature-Based User Identification System. 85-89 - Saiful Izwan Suliman, Graham Kendall, Ismail Musirin:
Implementing immune-based algorithm for bandwidth spectrum allocation in wireless communication. 90-96 - Sarah Alnasser, Hachemi Bennaceur:
An efficient Genetic Algorithm for the global robot path planning problem. 97-102 - Can Umut Ileri, Orhan Dagdeviren:
Performance evaluation of distributed maximum weighted matching algorithms. 103-108 - Ozan Zorlu, Ozgur Koray Sahingoz:
Increasing the coverage of homogeneous wireless sensor network by genetic algorithm based deployment. 109-114 - Haitham Alsaif, Naz E. Islam:
Truncated compact design of monopole antenna with modified ground plane for UWB applications. 115-118 - Kishor Krishnan Nair, Albert Helberg, Johannes Van Der Merwe:
An approach to Improve the Match-on-Card Fingerprint Authentication System security. 119-125 - Hazwani Mohd Mohadis, Nazlena Mohamad Ali:
Designing persuasive application to encourage physical activity at workplace among older workers. 126-130 - Taner Çevik, Ali Mustafa Ali Alshaykha, Nazife Cevik:
Performance analysis of GLCM-based classification on Wavelet Transform-compressed fingerprint images. 131-135 - Syed Yasser Arafat, Muhammad Inzimam Saghir, Mubah Ishtiaq, Umer Bashir:
Comparison of techniques for leaf classification. 136-141 - Baha Fergani, Mohamed-Khireddine Kholladi:
A discrete particle swarm optimisation algorithm for geographical map contour reconstruction. 142-144 - Necip Gözüaçik, Hatice Murtaza:
Mobile Number Portability service regulation interacts with national VoIP switch. 145-147 - Nazanin Mazlooman, Behrouz Sahebkar:
Evaluate the effect of teledentistry and information technology on dentistry: Case study Iran. 148-155 - Serkan Turan, Ekram Hussien Mohammed, Sarp Ertürk:
Hardware CODEC based JPEG2000 video encoder design for combat system video networks. 156-158 - Islam A. T. F. Taj-Eddin, Mahmoud Afifi, Mostafa Korashy, Doha Hamdy, Marwa Nasser, Shimaa Derbaz:
A new compression technique for surveillance videos: Evaluation using new dataset. 159-164 - Farag M. Sallabi, Khaled Shuaib:
Internet of things network management system architecture for smart healthcare. 165-170 - Yasin Tekin, Ozgur Koray Sahingoz:
A Publish/Subscribe messaging system for wireless sensor networks. 171-176 - Muhammad Aamir Nadeem, Taimur Karamat:
A survey of cloud network overlay protocols. 177-182 - Musa Aydin, Emin Kugu:
Finding smoothness area on the topographic maps for the unmanned aerial vehicle's landing site estimation. 183-186
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.