Stop the war!
Остановите войну!
for scientists:
default search action
9th BlackSeaCom 2021: Bucharest, Romania
- 2021 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2021, Bucharest, Romania, May 24-28, 2021. IEEE 2021, ISBN 978-1-6654-0308-5
- Biruk E. Tegicho, Tsinuel N. Geleta, Tadilo Endeshaw, Abdullah Eroglu, William W. Edmonson, Girma T. Bitsuamlak:
Effect of Wind on the Connectivity and Safety of Large Scale UAV Swarms. 1-6 - Neeta Jha, Saptarshi Chaudhuri, Jyotsna Bapat, Debabrata Das:
An Efficient Beam Search Algorithm for mmWave Massive MIMO. 1-6 - Mutlu Ahmetoglu, Orhan Tahir Yavascan, Elif Uysal:
MiSTA: Threshold-ALOHA with Mini Slots. 1-6 - Halil Umut Ozdemir, Halil Ibrahim Orhan, Meriç Turan, Baris Büyüktas, H. Birkan Yilmaz:
Estimating Capture Probabilities for Complex Topologies in 2D Molecular Communication via Diffusion Channel using Artificial Neural Networks. 1-6 - Alexandru Vulpe, Ionut Girla, Razvan Craciunescu, Madalina Georgiana Berceanu:
Machine Learning based Software-Defined Networking Traffic Classification System. 1-5 - Razvan Sfat, Iuliana Marin, Nicolae Goga, Ramona Popa, Ion Cristian Darla, Constantin Viorel Marian:
Conceptualization of an Intelligent HL7 Application based on Questionnaire Generation and Editing. 1-4 - Cristian Capota, Simona Halunga, Eugen Stancu, Popescu Madalin:
Vulnerabilities of UMTS-LTE Authentication Process - Theoretical and Practical Aspects during RF Measurements. 1-5 - Sergiu Eftimie, Vlad Cotenescu, Radu Moinescu, Ciprian Racuciu, Dragos Glavan:
A Case Study in Anticipating Insider Vulnerabilities Using Psychological Profiling. 1-4 - Xian Liu:
A Primitive Cipher with Machine Learning. 1-6 - Giban Laura Elena, Popovici Eduard Cristian:
Circuit with directional coupler properties, in microstrip technology, for 2.4GHz ISM band applications. 1-6 - Md Fahad Monir, Dan Pan:
Exploiting a Virtual Load Balancer with SDN-NFV Framework. 1-6 - Burak Emre Un, Huseyin Ugur Yildiz, Bülent Tavli:
Impact of Critical Node Failures on Lifetime of UWSNs with Incomplete Secure Connectivity. 1-6 - Cristian Capota, Simona Halunga, Octavian Fratu, Eugen Stancu, Popescu Madalin:
Security Aspects and Vulnerabilities in Authentication Process WiFi Calling - RF measurements. 1-5 - Amir Omidi, Ming Zeng, Jiachuan Lin, Leslie A. Rusch:
Geometric Constellation Shaping Using Initialized Autoencoders. 1-5 - Xian Liu:
Communication Secrecy in Offshore Wind Farms. 1-6 - Evren Çatak, Ferhat Özgür Çatak, Arild Moldsvor:
Adversarial Machine Learning Security Problems for 6G: mmWave Beam Prediction Use-Case. 1-6 - Mert Ozates, Mohammad Kazemi, Çagri Göken, Tolga M. Duman:
Channel Reconstruction Based Multiuser Precoding with Limited Feedback. 1-6 - Yusuf Bulbul, Mohammed Elamassie, Tuncer Baykas, Murat Uysal:
Analysis and Optimization of the Network Throughput in IEEE 802.15.13 based Visible Light Communication Networks. 1-6 - Alessandro Andreadis, Giovanni Giambene, Riccardo Zambon:
Convolutional Neural Networks for audio classification on ultra low power IoT devices. 1-6 - Larysa Globa, Nataliia Gvozdetska:
Experimental analysis of PCPB-2: Comprehensive Energy-Efficient Approach to Distributed Workload Processing in Communication Networks. 1-3 - Mustafa Khaleel Hamadani, Eugen Borcoci:
Fog Computing and D2D Networks Integration. 1-6 - Andra-Isabela-Elena Ciobanu, Eugen Borcoci, Marius-Constantin Vochin:
A Quality-of-Service Scenario Awareness for Use-Cases of Open-Source Management and Control System Hub in Edge Computing. 1-5 - Marius Nedelcu, Teodor Petrescu, Victor Nitu:
Evaluation of electromagnetic field exposure in the vicinity of mobile phone base stations. 1-5 - Aleksey S. Gvozdarev, Yury A. Bryukhanov:
Statistical Analysis of the Low-Bit Quantizer's Output in Presence of Multipath Fading Effects. 1-6 - Chris Hall, Ivan B. Djordjevic:
Mixer Imbalance Correction in Wireless OFDM Systems. 1-6 - Liu Cao, Hao Yin:
Resource Allocation for Vehicle Platooning in 5G NR-V2X via Deep Reinforcement Learning. 1-7 - Md Fahad Monir, Ryhan Uddin, Dan Pan:
Implementation of a Click Based IDS on SDN-NFV Architecture and Performance Evaluation. 1-6 - Ana-Maria Nedelcu, Alexandru Martian, Eduard-Cristian Popovici:
Study of millimeter waves in 5G. 1-4 - Tahir Kerem Oguz, Elif Uysal, Tolga Girici:
Implementation and Evaluation of Age-Aware Downlink Scheduling Policies. 1-3 - Robert E. Litts, Dimitrie C. Popescu, Otilia Popescu:
Authentication Protocol for Enhanced Security of the Automatic Identification System. 1-6 - M. Ajmal Khan, Ahmed Ammar:
Modulation Diversity in a Two-Way Cooperative System with an Energy Harvesting Relay. 1-6 - Halil Deniz, Murat Simsek, Burak Kantarci:
On Delay Sensitivity Clusters of Microgrid Data Aggregation Under LTE-A Links. 1-6 - Ionut Cernica, Nirvana Popescu, Razvan Craciunescu:
Detecting indicators of compromise in web applications using access logs. 1-5 - Ramona Cristina Popa, Constantin Viorel Marian, Nicolae Goga:
PrEmISES - optimizing the Semantically-Enabled data used by small and medium enterprises. 1-5 - Andrei Avadanei, Lucian Nitescu, Ioan Constantin, Cristian Patachia-Sultanoiu:
Predictive Model for Software Vulnerability Management in Telecommunication Infrastructures. 1-5 - Haochuan Shi, Adnan Aijaz, Nan Jiang:
Evaluating the Performance of Over-the-Air Time Synchronization for 5G and TSN Integration. 1-6 - Arooba Zeshan, Mehdi Karbalayghareh, Farshad Miramirkhani, Murat Uysal, Tuncer Baykas:
Comparative Performance Evaluation of VLC, LTE and WLAN Technologies in Indoor Environments. 1-6 - Sergey Sosnin, Artyom Lomayev, Alexey Khoryaev:
NLOS Links Detection Algorithm for Improved 5G NR Indoor Positioning. 1-6 - Mircea Popescu, Razvan Bartusica:
Aspects regarding the customized analysis of emission security risks for certain types of compromising signals. 1-6 - Nusrath Tabassum, Farhin Faiza Neha, Md. Shohrab Hossain, Husnu S. Narman:
A Hybrid Machine Learning based Phishing Website Detection Technique through Dimensionality Reduction. 1-6 - Mircea Stanic, Radu Mitran:
A Technique for Passive Ionosphere Sounding based on Machine Learning Algorithms. 1-7 - Michel Kulhandjian, Hovannes Kulhandjian, Claude D'Amours:
Uniquely Decodable Ternary Codes via Augmented Sylvester-Hadamard Matrices. 1-6 - Cuneyd Ozturk, Sinan Gezici:
Anchor Placement in TOA based Wireless Localization Networks via Convex Relaxation. 1-6 - Paul Cotae, Nii Emil Alexander Reindorf:
Using Counterfactual Regret Minimization and Monte Carlo Tree Search for Cybersecurity Threats. 1-6 - Aysun Gurur Önalan, Mehmet Hakan Kurtoglu, Eren Soyak:
Passive Side-Channel Interference Estimation for WiFi Networks. 1-6 - Khadijeh Ali Mahmoodi, Murat Uysal:
AUV Trajectory Optimization for an Optical Underwater Sensor Network in the Presence of Ocean Currents. 1-6 - Alexandru Martian, Florin-Lucian Chiper, Razvan Craciunescu, Calin Vladeanu, Octavian Fratu, Ion Marghescu:
RF Based UAV Detection and Defense Systems: Survey and a Novel Solution. 1-4 - Cristian Anghel, Cristian Lucian Stanciu, Constantin Paleologu:
A practical controlled NLMS algorithm for network echo cancellation. 1-5 - Yicheng Xu, Hongyun Chu, Pingping Xu:
Joint Channel Estimation and Passive Beamforming for Reconfigurable Intelligent Surface Aided Multi-user Massive MIMO System. 1-3 - Bilgehan Akdemir, Muhammet Ali Karabulut, Haci Ilhan:
Performance of Deep Learning Methods in DF Based Cooperative Communication Systems. 1-6 - Raed T. Al-Zubi, Khalid A. Darabkh, Yazid M. Khattabi, Mohannad T. Abu Issa:
Modeling and Analysis for HARQ-Aided NOMA Scheme Using Markov-Based Approach. 1-6 - Hichem Semira, Ferdi Kara:
Error Performance of Uplink SIMO-NOMA with Joint Maximum-Likelihood and Adaptive M-PSK. 1-6 - Ibrahim Pehlivan, Sinem Coleri:
Effect of Downlink Energy Transfer Scheduling on SDMA and TDMA Uplink Transmission. 1-5 - Aysegül Ilay Tunali, Hakan Ali Çirpan:
Impact of Imperfect Channel Estimation on 5G-NR. 1-6 - Mohamed Benzaghta, Remziye Busra Coruk, Bengisu Yalcinkaya, Ali Kara:
An Experimental Study on the Influence of Human Movement in Indoor Radio Channel at 28GHz. 1-3 - Joannes Sam Mertens, Laura Galluccio, Giacomo Morabito:
Federated learning through model gossiping in wireless sensor networks. 1-6 - Inci Umakoglu, Mustafa Namdar, Arif Basgumus, Ferdi Kara, Hakan Kaya, Halim Yanikomeroglu:
BER Performance Comparison of AF and DF Assisted Relay Selection Schemes in Cooperative NOMA Systems. 1-6 - Cristian Capota, Simona Halunga, Eugen Stancu, Popescu Madalin:
Vulnerabilities of UMTS-LTE Authentication Process - Theoretical and Practical Aspects during RF Measurements. 1-5 - Naina Patrascu, Alina Dartu, Tudor Cornea, Serban Georgica Obreja, Marina Ciurezu, Alexandru Brumaru:
Security Solution for Cloud Based on Software Defined Networking. 1-6 - Vasileios Asteriou, Georgios Papadimitriou, Petros Nicopolitidis:
Adaptive MAC Protocols for IoT Edge Computing Architectures with Event-Triggered Traffic. 1-6 - Mircea Cristian Stana, Nicolae Goga, Constantin Viorel Marian, Ramona Popa, Catalina-Mihaela Vulpe, Cristian Taslitchi:
G-Cloud Briefcase - Electronic Archive for Academic Certificates and General Certificates of Education Documents Using Public Private Hyperspace for E-Government Library Services Based on NOSQL Databases. 1-5 - Karim El-Abbasy, Ramy F. Taki ElDin, Salwa El-Ramly, Bassant Abdelhamid:
Generalized Schematic Successive Cancellation Decoding for Polar Codes. 1-6 - Constantin Viorel Marian:
DNS Records Secure Provisioning Mechanism for Virtual Machines automatic management in high density data centers. 1-5 - Cristian Patachia-Sultanoiu, Ion Bogdan, George Suciu, Alexandru Vulpe, Oana Badita, Bogdan Rusti:
Advanced 5G Architectures for Future NetApps and Verticals. 1-6 - Furkan Kokdogan, Sinan Gezici:
Position Estimation in Visible Light Systems in the Presence of Malicious LED Transmitters. 1-6 - Shaikhum Monira, Upama Kabir, Mosarrat Jahan, Uchswas Paul:
An Efficient and Secure Handover Mechanism for SDN-Enabled 5G HetNet. 1-6 - Benjamin Kone, Ahmed Dooguy Kora, Robert Botez, Iustin-Alexandru Ivanciu, Virgil Dobrota:
Use Case of a Management and Orchestration for Network Functions Virtualization in a VoIP Testbed. 1-5 - Andreea Buda, Annamaria Sârbu:
Development of an Android application for user exposure assessment to electromagnetic fields emitted by an IEEE 802.11ax client. 1-5 - Razvan Craciunescu, Cristian Patachia-Sultanoiu, Octavian Fratu, Ion Bogdan:
Testing Scenarios for off-the-shelf 5G devices. 1-4 - Badula Eduard-Marian, Octavian Fratu:
Radio-frequency transport platform for video cameras. 1-5 - Hemant Kumar Srivastava, Ravi Yadav, Gaurav Baranwal:
Service Selection using Ethereum. 1-3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.