


default search action
6. DICTAP 2016: Konya, Turkey
- Sixth International Conference on Digital Information and Communication Technology and its Applications, DICTAP 2016, Konya, Turkey, July 21-23, 2016. IEEE 2016, ISBN 978-1-4673-9609-7

- Ibrahim Aydin, Ümit Aygölü:

Energy-efficient link adaptation for distributed space time block code in wireless relay networks. 1-5 - Murat Yücel

, Nail Ferhat Ozturk, Cemal Gemci:
Design of a Fiber Bragg Grating multiple temperature sensor. 6-11 - Yunus Sarikaya, Hazer Inaltekin

, Tansu Alpcan, Jamie S. Evans:
Interference scaling in multi-cell network with rate guarantees. 12-17 - Takashi Takeuchi, Yuki Nishikawa, Ryosuke Fujiwara:

Fast channel switching technique for interference avoidance with 5 GHz dual channel wireless LAN. 18-23 - Kerem Küçük

:
Design and implementation of a real-time ERP-OFDM SDR receiver on the USRP2 platform. 24-29 - Muhammad Fahim

, Asad Masood Khattak, Thar Baker
, Francis Chow, Babar Shah
:
Micro-context recognition of sedentary behaviour using smartphone. 30-34 - Muhammad Fahim

, Halil Ibrahim Cebe, Jawad Rasheed
, Farzad Kiani
:
mHealth: Blood donation application using android smartphone. 35-38 - Afdallyna Fathiyah Harun, Steve Benford

, Claire O'Malley, Nor Laila Md. Noor:
Glyphing it! Children using markers in school. 39-44 - Mostafa Korashy, Khaled F. Hussain

, H. M. Ibrahim:
Teleoperation of dogs using controlled laser beam. 45-49 - Haipeng Wang, Weiwei Sun, Xueyuan Lin, Ziling Wang:

A centralized multi-sensor particle filter algorithm of formation targets. 50-55 - Haipeng Wang, Yu Cong, Xinlong Pan, Weiwei Sun:

Track anti-bias refined correlation algorithm of group targets based on double fussy topology. 56-62 - Hassan Saad Alqahtani

, Paul Sant
:
A multi-cloud approach for secure data storage on smart device. 63-69 - Daniel Krauss, Christoph Thomalla:

Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures. 70-73 - Tanjila Farah

, Moniruzzaman Shojol, Maruf Hassan
, Delwar Alam:
Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF. 74-78 - Shahid Alam

, Ryan D. Riley, Ibrahim Sogukpinar
, Necmeddin Carkaci:
DroidClone: Detecting android malware variants by exposing code clones. 79-84 - Shahid Alam

:
SUIS: An online graphical Signature-Based User Identification System. 85-89 - Saiful Izwan Suliman, Graham Kendall, Ismail Musirin:

Implementing immune-based algorithm for bandwidth spectrum allocation in wireless communication. 90-96 - Sarah Alnasser, Hachemi Bennaceur:

An efficient Genetic Algorithm for the global robot path planning problem. 97-102 - Can Umut Ileri

, Orhan Dagdeviren
:
Performance evaluation of distributed maximum weighted matching algorithms. 103-108 - Ozan Zorlu

, Ozgur Koray Sahingoz
:
Increasing the coverage of homogeneous wireless sensor network by genetic algorithm based deployment. 109-114 - Haitham Alsaif, Naz E. Islam:

Truncated compact design of monopole antenna with modified ground plane for UWB applications. 115-118 - Kishor Krishnan Nair, Albert Helberg

, Johannes Van Der Merwe:
An approach to Improve the Match-on-Card Fingerprint Authentication System security. 119-125 - Hazwani Mohd Mohadis

, Nazlena Mohamad Ali
:
Designing persuasive application to encourage physical activity at workplace among older workers. 126-130 - Taner Çevik, Ali Mustafa Ali Alshaykha, Nazife Cevik:

Performance analysis of GLCM-based classification on Wavelet Transform-compressed fingerprint images. 131-135 - Syed Yasser Arafat, Muhammad Inzimam Saghir, Mubah Ishtiaq, Umer Bashir:

Comparison of techniques for leaf classification. 136-141 - Baha Fergani, Mohamed-Khireddine Kholladi

:
A discrete particle swarm optimisation algorithm for geographical map contour reconstruction. 142-144 - Necip Gözüaçik, Hatice Murtaza:

Mobile Number Portability service regulation interacts with national VoIP switch. 145-147 - Nazanin Mazlooman

, Behrouz Sahebkar:
Evaluate the effect of teledentistry and information technology on dentistry: Case study Iran. 148-155 - Serkan Turan, Ekram Hussien Mohammed, Sarp Ertürk:

Hardware CODEC based JPEG2000 video encoder design for combat system video networks. 156-158 - Islam A. T. F. Taj-Eddin

, Mahmoud Afifi
, Mostafa Korashy, Doha Hamdy, Marwa Nasser, Shimaa Derbaz:
A new compression technique for surveillance videos: Evaluation using new dataset. 159-164 - Farag M. Sallabi

, Khaled Shuaib:
Internet of things network management system architecture for smart healthcare. 165-170 - Yasin Tekin, Ozgur Koray Sahingoz

:
A Publish/Subscribe messaging system for wireless sensor networks. 171-176 - Muhammad Aamir Nadeem, Taimur Karamat:

A survey of cloud network overlay protocols. 177-182 - Musa Aydin

, Emin Kugu
:
Finding smoothness area on the topographic maps for the unmanned aerial vehicle's landing site estimation. 183-186

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














