Search Results - "2017 2nd International Conference on Computer and Communication Systems (ICCCS)"

Refine Results
  1. 1

    Comparative study of recent MEA malware phylogeny by Moubarak, Joanna, Chamoun, Maroun, Filiol, Eric

    “…Governments in the MEA did not take cyberwarfare seriously a few years ago. Nowadays, there is a shift to a more concerned posture on the subject of cyber…”
    Get full text
    Conference Proceeding
  2. 2

    An improved residual LSTM architecture for acoustic modeling by Lu Huang, Jiasong Sun, Ji Xu, Yi Yang

    “…Long Short-Term Memory (LSTM) is the primary recurrent neural networks architecture for acoustic modeling in automatic speech recognition systems. Residual…”
    Get full text
    Conference Proceeding
  3. 3

    Designing of customer and employee churn prediction model based on data mining method and neural predictor by Dolatabadi, Sepideh Hassankhani, Keynia, Farshid

    “…In recent years due to increased competition between companies in the services sector, predict churn customer in order to retain customers is so important. The…”
    Get full text
    Conference Proceeding
  4. 4

    Centralized adaptive routing in multihop cellular D2D communications by Shaikh, Farrukh Salim, Wismuller, Roland

    “…In cellular communication system, a user can communicate with another user only by using the services of base station (BS) as a relay for forwarding the data…”
    Get full text
    Conference Proceeding
  5. 5

    Wi-Fi direct based mobile ad hoc network by Jae Hyeck Lee, Myong-Soon Park, Shah, Sayed Chhattan

    “…A mobile ad hoc network is a wireless network of mobile devices that communicate with one another without any fixed network infrastructure. Existing mobile ad…”
    Get full text
    Conference Proceeding
  6. 6

    Long range robot teleoperation system based on internet of things by Uddin, Mohammad Salah, Gianni, Mario, Lab, Alcor

    “…Nowadays, we can no longer imagine that Internet can be considered just a network of computers. We also have to state that it's becoming even more a network of…”
    Get full text
    Conference Proceeding
  7. 7

    Source code comprehension analysis in software maintenance by Al-Saiyd, Nedhal A.

    “…Source code comprehension is considered as an essential part of the software maintenance process. It is considered as one of the most critical and…”
    Get full text
    Conference Proceeding
  8. 8

    Fusion of color and infrared images using gradient transfer and total variation minimization by Nawaz, Arooj, Kanwal, Irsa, Idrees, Sidra, Imtiaz, Rida, Jalil, Abdul, Ali, Ahmad, Ahmed, Javed

    “…The objective of this paper is to propose an algorithm for fusion of images of two different image modalities, i.e., color visual image and its corresponding…”
    Get full text
    Conference Proceeding
  9. 9

    The internet of things as socio-technological institution of civil society in post-informational era by Yury, Shaev, Samoylova, Elena

    “…We live in the post-informational era. Nowadays technologies transform many segments of human life. The Internet of things is becoming one of the most…”
    Get full text
    Conference Proceeding
  10. 10

    Analysis of optimal power control and energy efficiency in multicast D2D communications by Hmila, Mariem, Fernandez-Veiga, Manuel

    “…In this paper, we study new schemes to maximize network and users' minimum EE energy efficiency through transmission power control. The problem is formulated…”
    Get full text
    Conference Proceeding
  11. 11

    Preface

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  12. 12

    On MAC design for mobility-aware wireless sensor networks by Kazmi, Syed Wajahat Abbas, Kacso, Adrian, Wismuller, Roland

    “…The usage of mobile sink or sensor nodes may improve the performance of some wireless sensor network (WSN) applications, such as wildlife monitoring. Mobility…”
    Get full text
    Conference Proceeding
  13. 13

    Interference-Conscious routing in multihop D2D communications by Shaikh, Farrukh Salim, Wismuller, Roland

    “…In cellular networks, end-users receive wireless network services only by a base station (BS). Device-to-device (D2D) communication is a new paradigm in…”
    Get full text
    Conference Proceeding
  14. 14

    A comparison of methods for detecting preambles with frequency offset at low SNR by Wuerll, Rene, Robert, Joerg, Kilian, Gerd, Heuberger, Albert

    “…Low power wide area network (LPWAN) receivers must first decide about the presence of a transmission in order to retrieve the information that was being sent…”
    Get full text
    Conference Proceeding
  15. 15

    Computer vision based intruder detection framework (CV-IDF) by Shahid, Aasma, Tayyab, Alina, Mehmood, Musfira, Anum, Rida, Jalil, Abdul, Ali, Ahmad, Ali, Haider, Ahmed, Javed

    “…Surveillance has become a major issue in recent years after food and clothing, the focus is how to prevent sudden attacks to secure our lives. In this paper,…”
    Get full text
    Conference Proceeding
  16. 16

    Development and Construction of Security-Enhanced LTE traffic signal system in Korea by Myunghee Son, Hoon Jung

    “…As urbanization increases, traffic congestion and road safety problems become serious social problems. Korea has 1.6 times higher urbanization rate than the…”
    Get full text
    Conference Proceeding
  17. 17

    Sigma shift keying (SSK): A paradigm shift in digital modulation techniques by Kramer, Martin, Bessai, Horst

    “…A new digital modulation technique, named Sigma Shift Keying (SSK), is introduced with minimal transmitter power output (TPO) and very low probability of…”
    Get full text
    Conference Proceeding
  18. 18

    A qualitative comparison of popular middleware distributions used in grid computing environment by Nawaz, Rab, WuYang Zhou, Shahid, Muhammad Usman, Khalid, Osman

    “…The advancement in the fields of science, engineering, social networking and e-commerce along with the tremendous growth in the pervasive technologies has…”
    Get full text
    Conference Proceeding
  19. 19

    Named data networking testbed for scientific data by Huhnkuk Lim, Ni, Alexander, Dabin Kim, Young-Bae Ko

    “…Named Data Networking (NDN) is one of the future internet architectures, which is a clean-slate approach. NDN provides intelligent data retrieval using the…”
    Get full text
    Conference Proceeding
  20. 20

    A procedure to build multiword expression data set by Metin, Senem Kumova, Taze, Mehmet

    “…In this paper, we propose a procedure employing natural language processing methods to build a golden standard multiword expression data set and present our…”
    Get full text
    Conference Proceeding