Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MOWNET
MOWNET 2016
Generate Citations
2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT)
April 11 2016 to April 13 2016
Cairo, Egypt
Table of Contents
Index
Freely available from IEEE.
pp. 1-2
Committees
Freely available from IEEE.
pp. 1-4
Table of contents
Freely available from IEEE.
pp. 1-4
Technical programme
Freely available from IEEE.
pp. 1-9
2016 International Workshop on Scalable Internet of Things
Freely available from IEEE.
pp. 1-1
2016 International Workshop on the M2M and H2H Communications Coexistence on 5G Cellular Networks
Freely available from IEEE.
pp. 1-1
CBQoS-Vanet: Cluster-based artificial bee colony algorithm for QoS routing protocol in VANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mohammed El Amine Fekair
,
Abderrahmane Lakas
,
Ahmed Korichi
Autonomous localization scheme for mobile sensor networks in fading environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Salah Abdel Mageid
An enhanced TDMA Cluster-based MAC (ETCM) for multichannel vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nurullah Shahin
,
Young-Tak Kim
Distributed time synchronization mechanism for large-scale vehicular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yamen Y. Nasrallah
,
Irfan Al-Anbagi
,
Hussein T. Mouftah
Wide-band sensing and optimization for cognitive radio networks using multi-rate sub-Nyquist spectrum sensing (MS3)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamed A. Torad
,
Ahmed El-Kassas
,
Hadia El-Hennawy
PSO-adaptive power allocation for multiuser GFDM-based cognitive radio networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abd ElhamedM. Dawoud
,
Ahmed. A. Rosas
,
Mona Shokair
,
Mohamed Elkordy
,
Said El Halafawy
On the beamforming and blind interference threshold estimation in underlay cognitive system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yasser Naguib Ahmed
,
Mohamed Hafez
Generalized implicit cooperation with slotted contention in cognitive radio wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hany Ali
,
Ahmed Khattab
,
Magdi Fikri
Minimal throughput maximization for MIMO cognitive radio networks using particle swarm optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Abd Elhamed M. Dawoud
,
Mona Shokair
,
Mohamed Elkordy
,
Said El Halafawy
Automation of understanding textual contents in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Fatma El-zahraa El-taher
,
Alaa Aldin Hammouda
,
Salah Abdel-Mageid
VOLTE deployment scenarios: Perspectives and performance assessments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
M. El Wakiel
,
H. El Badawy
,
H. El Hennawy
Consensus-based information synchronization for content-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Gyewan An
,
Gijeong Kim
,
Sungwon Lee
Smart mobile system for pregnancy care using body sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Mario W. L. Moreira
,
Joel J. P. C. Rodrigues
,
Antonio M. B. Oliveira
,
Kashif Saleem
Partial discharge impulsive noise in 735 kV electricity substations and its impacts on 2.4 GHz ZigBee communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ndeye Bineta Sarr
,
Herve Boeglen
,
Basile L. Agba
,
Francois Gagnon
,
Rodolphe Vauzelle
Lattice reduction and orthogonal space-frequency block code in correlated channels: Performance analysis and new results
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Diaa A. Noby
,
Ahmed H. Mehana
,
Ahmed F. Shalash
Determining the effectiveness of soil treatment on plant stress using smart-phone cameras
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Anurag Panwar
,
Mariam Al-Lami
,
Pratool Bharti
,
Sriram Chellappan
,
Joel Burken
Performance of WiMAX for smart grid applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Oana Neagu
,
Walaa Hamouda
Performance of smart grid communication in the presence of impulsive noise
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Oana Neagu
,
Walaa Hamouda
Multi-RAT mobile node architecture for efficient handover using software defined network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yumi Oh
,
Gijeong Kim
,
Sungwon Lee
A dimensioning framework for indoor DAS LTE networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Salah Elhoshy
,
Mohamed Ibrahim
,
Mohamed Ashour
,
Tallal Elshabrawy
,
Hany Hammad
,
M. R. M Rizk
An SDR platform for performance evaluation of OFDM-based indoor DAS solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Kareem Tarek
,
Tallal Elshabrawy
,
Mohamed Ashour
,
Hany Hammad
Persistent store-based dual replication system for distributed SDN controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Sangyun Han
,
Sungwon Lee
Millimeter-wave small-cells traffic off-loading with large-scale antenna arrays for UDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Haitham Abbas
,
Mohamed Shehata
,
Khaled Hassan
,
Martin Kurras
,
Lars Thiele
Investigating different factors affecting the infection rate of Internet worms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Nagwan Abdelsamee
A fast ray tracing algorithm for network planning based on relative coverage computations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamed Ashour
,
Mohamed Ibrahim
,
Salah Elhoshy
,
Youstina Megalli
,
Tallal El-Shabrawy
,
Hany Hammad
,
M. R. M Rizk
Performance evaluation of IoT protocols under a constrained wireless access network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yuang Chen
,
Thomas Kunz
CBSTM-IoT: Context-based social trust model for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sherif Emad Abdel Rafey
,
Ayman Abdel-Hamid
,
Mohamad Abou El-Nasr
Classification and analysis of IEEE 802.15.4 PHY layer attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yasmin M. Amin
,
Amr T. Abdel-Hamid
Slinging MUD: Manufacturer usage descriptions: How the network can protect things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Eliot Lear
,
Brian Weis
Distributed monitoring in 6LoWPAN based Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
B. Mostafa
,
A. Benslimane
,
E. Boureau
,
M. Molnar
,
M. Saleh
Towards a modular IoT network model: Low power radio domain use-case in linear-topology wireless sensor network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Sushanta Mohan Rakshit
,
Michael Hempel
,
Subharthi Banerjee
,
Hamid Sharif
Contiki-AMAC — The enhanced adaptive radio duty cycling protocol: Proposal and analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Moataz F. Youssef
,
Khaled M. F. Elsayed
,
Ahmed H. Zahran
An annulus-based access class barring scheme for stationary machine-type communications devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiangdong Gao
,
Hui Tian
,
Xinchen Lyu
Overlaying machine-to-machine (M2M) traffic over human-to-human (H2H) traffic in OFDMA system: Compressive-sensing approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ameha T. Abebe
,
Chung G. Kang
Benefits of the IEEE 802.15.4's MAC layer acknowledgements in Ad-Hoc networks: An experimental analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Muhammad Omer Farooq
,
Thomas Kunz
An identification and prevention of theft-of-service attack on cloud computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Azeem Ahmad
,
Nidal Nasser
,
Muhammad Anan
Power allocation strategies for Non-Orthogonal Multiple Access
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Mohamed M. El-Sayed
,
Ahmed S. Ibrahim
,
Mohamed M. Khairy
Detection techniques for data-level spoofing in GPS-based phasor measurement units
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fu Zhu
,
Amr Youssef
,
Walaa Hamouda
Performance evaluation of CoMP methods under RF calibration errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Amr Khashaba
,
Mirette Sadek
,
Salwa El-Ramly
Showing 45 out of 45