{"id":"https://openalex.org/W2736758579","doi":"https://doi.org/10.1109/iwcmc.2017.7986284","title":"Cooperative D2D discovery approach for public safety based on spreading technique","display_name":"Cooperative D2D discovery approach for public safety based on spreading technique","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2736758579","doi":"https://doi.org/10.1109/iwcmc.2017.7986284","mag":"2736758579"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2017.7986284","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986284","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068073947","display_name":"Linda Jedidi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112335","display_name":"\u00c9cole Sup\u00e9rieure Priv\u00e9e d'Ing\u00e9nierie et de Technologies","ror":"https://ror.org/021f99908","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210112335"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Linda Jedidi","raw_affiliation_strings":["ESPRIT School of Engineering, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"ESPRIT School of Engineering, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210112335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022013430","display_name":"Meriem Chekir","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112335","display_name":"\u00c9cole Sup\u00e9rieure Priv\u00e9e d'Ing\u00e9nierie et de Technologies","ror":"https://ror.org/021f99908","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210112335"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Meriem Chekir","raw_affiliation_strings":["ESPRIT School of Engineering, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"ESPRIT School of Engineering, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210112335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069802735","display_name":"Fatma Louati","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112335","display_name":"\u00c9cole Sup\u00e9rieure Priv\u00e9e d'Ing\u00e9nierie et de Technologies","ror":"https://ror.org/021f99908","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210112335"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Fatma Louati","raw_affiliation_strings":["ESPRIT School of Engineering, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"ESPRIT School of Engineering, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210112335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056656402","display_name":"Rahma Bouraoui","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112335","display_name":"\u00c9cole Sup\u00e9rieure Priv\u00e9e d'Ing\u00e9nierie et de Technologies","ror":"https://ror.org/021f99908","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210112335"]},{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Rahma Bouraoui","raw_affiliation_strings":["ESPRIT School of Engineering, Tunis, Tunisia","University of Carthage, Research Lab. COSIM, Tunisia"],"affiliations":[{"raw_affiliation_string":"ESPRIT School of Engineering, Tunis, Tunisia","institution_ids":["https://openalex.org/I4210112335"]},{"raw_affiliation_string":"University of Carthage, Research Lab. COSIM, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008512450","display_name":"Hichem Besbes","orcid":"https://orcid.org/0000-0003-1063-494X"},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Hichem Besbes","raw_affiliation_strings":["University of Carthage, Research Lab. COSIM, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Research Lab. COSIM, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068073947"],"corresponding_institution_ids":["https://openalex.org/I4210112335"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65334166,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"190","last_page":"195"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7524032592773438},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.66802978515625},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.6240836977958679},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5568898320198059},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5487086772918701},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.548637330532074},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.5011041164398193},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4620954096317291},{"id":"https://openalex.org/keywords/ask-price","display_name":"Ask price","score":0.43736207485198975},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.4200356602668762},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3560827374458313},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.32967787981033325},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3110680878162384},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1900346279144287},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10934796929359436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7524032592773438},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.66802978515625},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.6240836977958679},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5568898320198059},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5487086772918701},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.548637330532074},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.5011041164398193},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4620954096317291},{"id":"https://openalex.org/C90329073","wikidata":"https://www.wikidata.org/wiki/Q914232","display_name":"Ask price","level":2,"score":0.43736207485198975},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4200356602668762},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3560827374458313},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.32967787981033325},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3110680878162384},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1900346279144287},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10934796929359436},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc.2017.7986284","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2017.7986284","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1597034200","https://openalex.org/W1613112286","https://openalex.org/W1990557017","https://openalex.org/W1992942660","https://openalex.org/W2004215803","https://openalex.org/W2068324908","https://openalex.org/W2081880107","https://openalex.org/W2104086762","https://openalex.org/W2433009033","https://openalex.org/W2525961823","https://openalex.org/W2610695834","https://openalex.org/W2610893680","https://openalex.org/W3098915991","https://openalex.org/W6636402550","https://openalex.org/W6648204559"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W1983393909","https://openalex.org/W2040150569","https://openalex.org/W2132174924","https://openalex.org/W1911540634","https://openalex.org/W2013909972"],"abstract_inverted_index":{"In":[0,83],"world":[1],"news,":[2],"natural":[3,45],"disasters":[4],"are":[5],"frequently":[6],"cited.":[7],"Their":[8,196],"devastating":[9],"consequences":[10],"make":[11],"of":[12,26,54,71,157,226,234],"them":[13],"a":[14,44,49,91,99,136,140,189,203],"crucial":[15],"study":[16],"subject":[17],"to":[18,31,33,61,79,88,108,111,133,143,153,166,173,187,222],"decrease":[19],"their":[20,66,81],"impact.":[21],"Scientific":[22],"researchers":[23],"take":[24],"advantage":[25],"3GPP":[27],"and":[28,123,206,213,238],"D2D":[29,36],"communication":[30,42,78],"help":[32,146],"save":[34],"lives.":[35],"technology":[37],"can":[38],"be":[39,59,109,200],"an":[40,119,193],"alternative":[41],"in":[43,69,98,106,127,131,159,171],"disaster":[46],"situation":[47],"with":[48],"total":[50],"or":[51,75,147],"partial":[52],"absence":[53],"network":[55],"infrastructure.":[56],"Victims":[57],"must":[58],"able":[60,110],"transmit":[62],"SOS":[63,120,194],"messages":[64],"using":[65,139],"devices":[67],"even":[68],"presence":[70],"other":[72,76],"victims":[73],"transmission":[74],"systems":[77],"guarantee":[80],"detection.":[82],"this":[84],"paper,":[85],"we":[86],"propose":[87],"consider":[89],"that":[90],"receiver":[92,129],"probes":[93],"all":[94],"physical":[95],"resource":[96],"blocs":[97],"given":[100],"spectrum":[101],"band":[102],"based":[103,178,208,230],"LTE":[104],"networks":[105],"order":[107,132,172],"detect":[112],"victims.":[113],"Spreading":[114],"technique":[115],"is":[116,121,125,138],"used":[117],"when":[118],"transmitted":[122],"correlation":[124],"analysed":[126],"the":[128,155,168,175,224,232,235],"side":[130],"decide":[134],"whether":[135],"victim":[137],"Resource":[141],"Bloc":[142],"ask":[144],"for":[145],"not.":[148],"We":[149],"propose,":[150],"as":[151],"well,":[152],"multiply":[154],"number":[156],"receivers":[158,184],"different":[160],"locations.":[161],"This":[162],"will":[163,185,199],"let":[164],"us":[165],"exploit":[167],"users":[169],"diversity":[170],"enhance":[174],"detection":[176],"accuracy":[177],"on":[179,209,231],"hard":[180,197],"information":[181],"combining.":[182],"Hence,":[183],"cooperate":[186],"derive":[188],"reliable":[190],"decision":[191],"about":[192],"transmission.":[195],"decisions":[198],"gathered":[201],"by":[202],"fusion":[204],"center":[205],"combined":[207],"OR,":[210],"AND,":[211],"Majority":[212],"Two":[214],"Witnesses":[215],"Rules.":[216],"Finally,":[217],"simulations":[218],"were":[219],"carried":[220],"out":[221],"prove":[223],"effectiveness":[225],"our":[227],"proposed":[228],"scheme":[229],"analysis":[233],"detection,":[236],"mis-detection":[237],"false":[239],"alarm":[240],"probabilities.":[241]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
