default search action
10th UEMCON 2019: New York City, NY, USA
- 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2019, New York City, NY, USA, October 10-12, 2019. IEEE 2019, ISBN 978-1-7281-3885-5
- Cullen D. Johnson, Brian H. Curtin, Nikhil Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews:
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security. 1-7 - Rafael Lopez, Christian DeGuzman, Abdelrahman Elleithy:
Use of Sensor Node Networks for Car Security. 8-14 - Sara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy:
Location Tracking of Mobile Objects and the Privacy Tradeoff. 15-22 - Leo Kobayashi, Mukul Rocque, Haibo Wang, Geoffrey A. Capraro, Carlin C. Chuck Scb, Chris K. Kim, Katherine Luchette, Alana Oster, Derek Merck, Ihor Kirenko, Kees van Zon, Marek Bartula:
Pilot Study of Emergency Department Patient Vital Signs Acquisition Using Experimental Video Photoplethysmography and Passive Infrared Thermography Devices. 23-32 - Milankumar Patel, Siddhartha Bhattacharyya, Ali Alfageeh:
Formal Trust Architecture for Assuring Trusted Interactions in the Internet of Things. 33-39 - Milos Pilipovic, Dragan Samardzija:
Optimized Wireless Connectivity for Cyber-Physical Systems with Publisher/Subscriber Architecture. 40-49 - Mark Caswell, Yao Liang:
Simulation of Transitional and Bursty Wireless Visual Sensor Networks. 50-56 - Brandan Quinn, Eman Abdelfattah:
Machine Learning Meteorologist Can Predict Rain. 57-62 - Andrew Brandon, Melanie Seekins, Joshua Beulah Vedhavalli, Samuel Chelliah, John Haller:
Network Data Analysis to Support Risk Management in an IoT Environment. 63-68 - Yash Parikh, Eman Abdelfattah:
Comparison of Machine Learning Models to Predict Twitter Buzz. 69-73 - Ross Arnold, Kevin Carey, Benjamin Abruzzo, Christopher M. Korpela:
What is A Robot Swarm: A Definition for Swarming Robotics. 74-81 - Brian H. Curtin, Suzanne J. Matthews:
Deep Learning for Inexpensive Image Classification of Wildlife on the Raspberry Pi. 82-87 - Jiong Si, Evangelos A. Yfantis, Sarah L. Harris:
A SS-CNN on an FPGA for Handwritten Digit Recognition. 88-93 - Vanesa Getseva, Salil Maharjan, Eman Abdelfattah:
Performance of Classification Models on Various Types of Character Data. 94-98 - Amartya Hatua, Trung T. Nguyen, Andrew H. Sung:
Goal-Oriented Conversational System Using Transfer Learning and Attention Mechanism. 99-104 - Lidong Wang, Randy Jones:
Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction. 105-111 - Shireesha Chandra, Aparna S. Varde, Jiayin Wang:
A Hive and SQL Case Study in Cloud Data Analytics. 112-118 - Jackie Leung, Min Chen:
Image Recognition with MapReduce Based Convolutional Neural Networks. 119-125 - Yaobin Qin, Brandon Hoffmann, Yuwei Wang, David J. Lilja:
Exploring A Forecasting Structure for the Capacity Usage in Backup Storage Systems. 126-134 - Resham Jhangiani, Doina Bein, Abhishek Verma:
Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce Transactions. 135-140 - Raghu Nandan Avula, Cliff C. Zou:
Improving Rider Safety Using QR Code & Fingerprint Biometrics. 141-144 - Chuck Easttom, Nagi Mei:
Mitigating Implanted Medical Device Cybersecurity Risks. 145-148 - Paul K. Mandal, Abhishek Verma:
Novel Hash-Based Radix Sorting Algorithm. 149-153 - Muath Obaidat, Matluba Khodjaeva, Suhaib Obeidat, Douglas Salane, Jennifer Holst:
Security Architecture Framework for Internet of Things (IoT). 154-157 - Ali Alqahtani, Mohamed A. Zohdy, Subramaniam Ganesan, Richard Olawoyin:
A Novel Phase Tracking in ZigBee Receiver Using Extended Kalman Filtering over AWGN Channel. 158-162 - Caileigh Marshall, Jaimie Kelley, Cynthia Turnbull:
Improv Performance with Wi-Fi Enabled Costume Lights. 163-168 - Ankit Roy:
Deep Convolutional Neural Networks for Breast Cancer Detection. 169-171 - Mohammadreza Robaei, Robert Akl:
Time-Variant Broadband mmWave Channel Estimation Based on Compressed Sensing. 172-178 - William Shue, Nischal Paudyal, Mahmoud Rabiah, Douglas E. Dow, Mehmet Ergezer, Mira Yun:
A Thermally Regulated Footwear & Alerting System. 179-182 - Agnelo Rocha da Silva, Ruzbeh Akbar, Richard H. Chen, Kazem Bakian-Dogaheh, Negar Golestani, Mahta Moghaddam, Dara Entekhabi:
Duty-Cycled, Sub-GHz Wake-up Radio with -95dBm Sensitivity and Addressing Capability for Environmental Monitoring Applications. 183-191 - Bulent Ayhan, Chiman Kwan:
A New Approach to Change Detection Using Heterogeneous Images. 192-197 - Luis Camal, Anup Kirtane, Teresa Blanco, Roberto Casas, Federico Rossano, Baris Aksanli:
A Wearable Device Network to Track Animal Behavior and Relationships in the Wild. 198-202 - Amin Sahba, Ramin Sahba, Paul Rad, Mo M. Jamshidi:
Optimized IoT Based Decision Making For Autonomous Vehicles In Intersections. 203-206 - Waleed Aldosari, Mohamed A. Zohdy, Richard Olawoyin:
Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman Filter. 207-212 - Joong-Lyul Lee, Stephen C. Kerns, Sangjin Hong:
A Secure IoT-Fog-Cloud Framework Using Blockchain Based on DAT for Mobile IoT. 213-218 - Jim A. Scheibmeir, Yashwant K. Malaiya:
Quality Model for Testing Augmented Reality Applications. 219-226 - Drashti Pathak, Aparna S. Varde, Clement Alo, Felix Oteng:
Ubiquitous Access for Local Water Management Through HCI Based App Development. 227-233 - Sudarshan S. Chawathe:
Data Modeling for a NoSQL Database Service. 234-240 - David William Honorio Araujo da Silva, Carlos Paz de Araujo, C. Edward Chow, Bryan Sosa Barillas:
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra. 241-249 - Andrew Camphouse, Lucien Ngalamou:
Securing a Connected Home. 250-256 - Kevin B. Hall, Lucien Ngalamou:
Securing Wireless Scada Systems in Rural American Power Grids. 257-262 - Mark E. Royer, Sudarshan S. Chawathe:
Trusted Remote Function Interface. 263-269 - Thu Vo, Chetan Jaiswal:
AdRemover: The Improved Machine Learning Approach for Blocking Ads. 270-275 - Meizhu He, Leon Wu:
SIPSA: Secure IoT Protocol-Based Smart Adapter for Communicating and Optimizing Building Energy Management with Smart Grid. 276-279 - Debjyoti Sinha, Mohamed El-Sharkawy:
Thin MobileNet: An Enhanced MobileNet Architecture. 280-285 - Md Reshad Ul Hoque, Roland Burks, Chiman Kwan, Jiang Li:
Deep Learning for Remote Sensing Image Super-Resolution. 286-292 - Ahmed Aly, Gianluca Guadagni, Joanne Bechta Dugan:
Derivative-Free Optimization of Neural Networks using Local Search. 293-299 - Yash Parikh, Eman Abdelfattah:
Machine Learning Models to Predict Multiclass Protein Classifications. 300-304 - Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems. 305-311 - Durga Sundaram, Abhishek Sarode, Kiran George:
Vision-Based Trainable Robotic Arm for Individuals with Motor Disability. 312-315 - Bulent Ayhan, Chiman Kwan:
New Results in Change Detection Using Optical and Multispectral Images. 316-321 - Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. 322-328 - Mehdi Karimibiuki, Michal Aibin, Yuyu Lai, Raziq Khan, Ryan Norfield, Aaron Hunter:
Drones' Face off: Authentication by Machine Learning in Autonomous IoT Systems. 329-333 - Bulent Ayhan, Chiman Kwan:
Practical Considerations in Unsupervised Change Detection Using SAR Images. 334-339 - Mahssa Abdolahi, Hao Jiang, Bozena Kaminska:
Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching. 340-346 - Hafiz Mohammd Junaid Khan, Quamar Niyaz, Vijay K. Devabhaktuni, Site Guo, Umair Shaikh:
Identifying Generic Features for Malicious URL Detection System. 347-352 - Sandun S. Kuruppu, Alexander Shibilski:
Clock Variation Impact on Digital Control System Performance. 353-358 - Jordan Fernandes, Keye Li, Joey Mirabile, Gregg Vesonder:
Application of Robot Operating System in Robot Flocks. 359-363 - Amina Shrestha, Rhishav Mahaju, Sandun S. Kuruppu:
On Stability of Current Controlled Drives with Delay in Feedback Path. 364-370 - Brad Wheeler, Andrew Ng, Brian G. Kilberg, Filip Maksimovic, Kristofer S. J. Pister:
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems. 371-376 - Kiavash Fathi, Mehdi Mahdavi:
Control System Response Improvement via Denoising Using Deep Neural Networks. 377-382 - Kervins Nicolas, Yi Wang:
A novel double spending attack countermeasure in blockchain. 383-388 - Vanessa DeFreese, Tyler Wright, Ivy Robalino, Gregg Vesonder:
Robotic Solutions for Eldercare. 389-394 - Badar Almarri, Sanguthevar Rajasekaran, Chun-Hsi Huang:
Unsupervised Similarity-based Sensor Selection for Time Series Data. 395-400 - Pablo Rivas, Casimer M. DeCusatis, Matthew Oakley, Alex Antaki, Nicholas Blaskey, Steven LaFalce, Stephen Stone:
Machine Learning for DDoS Attack Classification Using Hive Plots. 401-407 - Khalid Hamad Motleb Alnafisah:
An algorithmic Solution in Data Visualization for the "Hair Ball" Problem. 408-418 - Josef Ur, Mathew Craner, Rehab El Hajj:
What Makes a National Football League Team Successful? an Analysis of Play by Play Data. 419-425 - Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj:
Data Mining in The NBA: An Applied Approach. 426-432 - Mihaela Dimovska, Travis Johnston, Catherine D. Schuman, J. Parker Mitchell, Thomas E. Potok:
Multi-Objective Optimization for Size and Resilience of Spiking Neural Networks. 433-439 - Azkario Rizky Pratama, Alexander Lazovik, Marco Aiello:
Office Multi-Occupancy Detection using BLE Beacons and Power Meters. 440-448 - Chiman Kwan, Jerry Yang, Bryan Chou:
Change Detection Using Original and Fused Landsat and Worldview Images. 449-454 - Mikeera Brown, Shawnoah Pollock, Wafa Elmannai, Michael Joseph, Khaled Elleithy:
Vulnerability Analysis and Modeling. 455-461 - Peter Stubberud:
The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover. 462-468 - Chiman Kwan, David Gribben, Trac D. Tran:
Multiple Human Objects Tracking and Classification Directly in Compressive Measurement Domain for Long Range Infrared Videos. 469-475 - Md Inzamam Ul Haque, Damian Valles:
Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication Abilities. 476-482 - Michael Joseph, Khaled Elleithy, Mohamed Mohamed:
A new Quantum Processor Architecture. 483-487 - Chiman Kwan, David Gribben, Trac D. Tran:
Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical Videos. 488-494 - Jarrett B. Knox, Eric M. Pereira, Anthony Sousa, Douglas E. Dow:
Activity Monitoring System to Support Elderly Independent Living. 495-498 - Kingsley Udeh, David W. Wanik, Nick Bassill, Emmanouil N. Anagnostou:
Time Series Modeling of Storm Outages with Weather Mesonet Data for Emergency Preparedness and Response. 499-505 - Kenshi Saho, Kazuki Uemura, Masahiro Fujimoto, Michito Matsumoto:
Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living. 506-510 - Ramin Sahba, Amin Sahba, Mo M. Jamshidi, Paul Rad:
3D Object Detection Based on LiDAR Data. 511-514 - Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, Esam Aloufi, Mohamed A. Zohdy, Ming Hua:
FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities. 515-522 - Zuhair Alqarni, Johnson A. Asumadu:
Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation. 523-527 - Matthew Regueiro, Bhagyashree Shirke, Mandy Chiu, Nicholas Capobianco, Kiran George:
Electroencephalographic (EEG) Analysis of Individuals Experiencing Acute Mental Stress. 528-534 - Sudarshan S. Chawathe:
Using Historical Data to Predict Parking Occupancy. 534-540 - Oluwaseyi Ajayi, Obinna Igbe, Tarek N. Saadawi:
Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution. 541-549 - Alyssa Donawa, Inema Orukari, Corey E. Baker:
Scaling Blockchains to Support Electronic Health Records for Hospital Systems. 550-556 - Sree Bala Shruthi Bhamidi, Mohamed El-Sharkawy:
Residual Capsule Network. 557-560 - S. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar:
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users. 561-567 - Sara Hebal, Djamila Mechta, Saad Harous:
ACO-based Distributed Energy Routing Protocol In Smart Grid. 568-571 - Mark E. Royer, Sudarshan S. Chawathe:
Unformatted, Certified Scientific Objects. 572-577 - Brody E. Nagy, Sean A. Demers, Douglas E. Dow:
Automated Well Water Contamination Tester and Web Service. 578-584 - Joseph Russell, Jeroen Bergmann:
Probabilistic sensor design for healthcare technology. 585-590 - Hy Do, Vu Truong, Kiran George, Bhagyashree Shirke:
EEG-Based Biometrics Utilizing Image Recognition for Patient Identification. 591-595 - Miguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M. R. Alrashidi, Douglas E. Dow:
Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily Living. 596-599 - Niranjan Ravi, Mohamed El-Sharkawy:
Integration of UAVs with Real Time Operating Systems using UAVCAN. 600-605 - Paul L. Kaprielian, Thach Pham, Alex Young, Douglas E. Dow, Scott A. Grenquist, Bruce M. Decker:
Winter Cabin Water Tap Monitor and Release System to Reduce Risk of Freezing. 606-609 - Christina Berke, Elizabeth Fassman-Beck, Jack Li, Gregg Vesonder:
Towards Better Management of Combined Sewage Systems. 610-613 - Izbaila Imtiaz, Imran Ahmed, Misbah Ahmad, Kaleem Ullah, Awais Adnan, Maaz Ahmad:
Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing. 614-619 - Anil R. Patel, Ashish Patel:
Comparative Analysis of Stereo Matching Algorithms. 620-626 - Misbah Ahmad, Imran Ahmed, Awais Adnan:
Overhead View Person Detection Using YOLO. 627-633 - Walid Abdel Gelil, Thomas Kunz:
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs). 640-646 - Muhammet Ali Karabulut, A. F. M. Shahen Shah, Haci Ilhan:
Performance of the CR-MAC with Channel Fading and Capture Effect under Practical Traffic Scenarios for VANETs. 647-652 - Ali Alfageeh, Siddhartha Bhattacharyya, Samuel Perl, Milankumar Patel:
Assurance for CyberSecurity with Assume-Guarantee Reasoning. 653-659 - Roland Burks, Kazi Aminul Islam, Yan Lu, Jiang Li:
Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study. 660-665 - Soo-Yeon Ji, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform. 666-672 - Shajina Anand, Gunasekaran Raja, Aishwarya Ganapathisubramaniyan:
AECC: An Enhanced Public Key Cryptosystem for User Defined Messages. 673-678 - Xin-Wen Wu, Waleed Farag, Sanwar Ali, Siddhivinayak Kulkarni:
An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices. 679-685 - Mamadou I. Wade, Mohamed F. Chouikha, Tepper Gill, Wayne Patterson, Talitha M. Washington, Jianchao Zeng:
Distributed Image Encryption Based On a Homomorphic Cryptographic Approach. 686-696 - Yi Huang, Jayanta Debnath, Michaela Iorga, Anup Kumar, Bin Xie:
CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management. 697-707 - Avimita Chatterjee:
Formulating Support for Superpages to reduce the number of TLB Faults in Contiguous Virtual Memory Space. 708-715 - Alaa T. Al Ghazo, Ratnesh Kumar:
Identification of Critical-Attacks Set in an Attack-Graph. 716-722 - Rajiv Bagai, Seth Layton, Srikanth Gampa, Kavitha Chandrashekar:
Maximum Diversity in Web Application User Action Privacy. 723-729 - Chuck Easttom, Willie Sanders:
On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. 730-735 - Dat Tran, Chetan Jaiswal:
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack. 736-743 - Adrian Jaesim, Adel Aldalbahi, Nazli Siasi, Diogo Oliveira, Nasir Ghani:
Dual-Beam Analog Beamforming for mmWave Communications. 744-748 - Anurag Thantharate, Cory C. Beard, Sreekar Marupaduga:
An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G Networks. 749-754 - Akira Kawai, Shinichi Taniguchi, Hui Li LI, Shizue Izumi:
A Physical Strength Measurement and Analysis System for Elderly People Using Motion Sensors. 755-761 - Anurag Thantharate, Rahul Arun Paropkari, Vijay Walunj, Cory C. Beard:
DeepSlice: A Deep Learning Approach towards an Efficient and Reliable Network Slicing in 5G Networks. 762-767 - Mohamed Sofiane Batta, Zibouda Aliouat, Saad Harous:
A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT. 768-774 - Jay Ashok Shah, Dushyant Dubaria:
NetDevOps: A New Era Towards Networking & DevOps. 775-779 - J. P. Piotrowski, Evangelos A. Yfantis, A. Campagna, Q. Cornu, G. M. Gallitano:
Voice Interactive Games. 780-784 - Ashutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale:
Automated System for Cervical Abnormality Detection using Machine Learning. 785-790 - Brook W. Abegaz:
Stability Improvement of Power Networks using Cluster based Dynamic Excitation of AVR. 791-795 - Brian Luu, Bradley Hansberger, Thanat Tothong, Kiran George:
Conceptual Neuroadaptive Brain-Computer Interface utilizing Event-related Desynchronization. 796-802 - Damianos Gavalas, Charalampos Konstantopoulos, Grammati E. Pantziou, Nikolaos Vathis:
An Efficient Heuristic for the Vacation Planning Problem. 803-808 - Brook W. Abegaz:
ASCPN - A Security Evaluation System for Cyber Power Networks. 809-816 - Chuanhong Du, Licai Liu, Shuaishuai Shi:
Synchronization of Fractional-Order Complex Chaotic System Using Active Control Method. 817-823 - Junho Son, Hyuntae Cho, Chong-Min Kyung:
Design and Implementation of an Indoor Ambient Noise Monitoring System with Localization. 824-829 - Mohammad M. Kadhum, Nur Nazmah Mat Zin:
Congestion Control and Traffic Management in Wireless Sensor Networks. 830-836 - Claudiu Moise, Rachel F. Adler:
Facing the Music: Performance Implications of Working with Music in the Background. 837-843 - Giovanni Miraglia, Loyd R. Hook:
Feedback Motion Plan Verification for Vehicles with Bounded Curvature Constraints. 844-854 - John Lamb, Nina S. Godbole:
Smart Energy Efficiency for a Sustainable World. 855-861 - Amanda Kyung, Yuna Lee, Ho Jeong Kwon:
Study on the Nano-scaled Molecules Used in Treatment for Melanoma Using Bio-chemical and Computational Analysis. 862-866 - Arjun Dutta, Amit Kumar, Bittu Kumar, Abhishek Roy, Poulami Paul, Swarnabha Roy, Rahul Agarwala, Abhisikta Chakraborty, Asesh Ghosh, Himadri Nath Saha, Anirup Roy, Ashish Adarsh:
GSM Based Irrigation System. 867-872 - Shea Ketsdever, Michael J. Fischer:
Incentives Don't Solve Blockchain's Problems. 873-876 - Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek:
Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments. 877-882 - Parnian A. ShirinAbadi, Arash Abbasi:
On Approximation of Gaussian Q-Function and its Applications. 883-887 - Tomoki Ito, Hirofumi Noguchi, Misao Kataoka, Takuma Isoda, Yoji Yamato, Tutomu Murase:
Evaluation of a Realistic Example of Information-Centric Network Metadata Management. 888-893 - Mong Tee Sim, Darshika G. Perera:
A Fast and Secure Pipelined Barrel Processor for Safety-Critical Applications for Real-Time Operating Systems. 894-904 - R. Madhusudhan, Manjunath Hegde:
Smart Card Based Remote User Authentication Scheme for Cloud Computing. 905-910 - Muhammad Irfan, Nordin Bin Saad, Ansar Ali, K. Vinoth Kumar, Muhammad Aman Sheikh, Muhammad Awais:
A Condition Monitoring System for the Analysis of Bearing Distributed Faults. 911-915 - Ilche Georgievski, Prashant Gupta, Marco Aiello:
Activity Learning for Intelligent Buildings. 916-923 - Min Chen:
Music Streaming Service Prediction with MapReduce-based Artificial Neural Network. 924-928 - Andres F. Ruiz-Olaya, Cesar A. Quinayas Burgos, Leonardo Torres Londoño:
A Low-Cost Arm Robotic Platform based on Myoelectric Control for Rehabilitation Engineering. 929-933 - A. F. M. Shahen Shah, Haci Ilhan, Ufuk Tureli:
Designing and Analysis of IEEE 802.11 MAC for UAVs Ad Hoc Networks. 934-939 - Anju Arya, Amita Rani, Sanjay Kumar:
Coverage and Routing Hole Detection in Cyber-physical Network Paradigm. 934-939 - Shilpa Choudhary, Hemant Purohit, Amit Sehgal, Awanish Kaushik:
Performance Study of Detectability of RFID System With Varying Atmospheric Conditions. 940-944 - Riken Parekh, Kushal Jain, David Luu, Kiran George:
Scavenging Residual Energy from Wi-Fi Sources Using a Rectenna Circuit. 945-950 - Divyashikha Sethia, Anadi Shakya, Ritik Aggarwal, Saksham Bhayana:
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices. 951-957 - Gordana Barb, Marius Otesteanu:
On the Influence of Delay Spread in TDL and CDL Channel Models for Downlink 5G MIMO Systems. 958-962 - Hemant Purohit, Parneet Kaur, Darlius Bosco Mwebesa, Shilpa Choudhary, Kanika Joshi:
Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda. 963-967 - Ushashi Chowdhury, Pranjal Chowdhury, Sourav Paul, Anwesha Sen, Partho Protim Sarkar, Shubhankur Basak, Abari Bhattacharya:
Multi-sensor Wearable for Child Safety. 968-972 - Ali Nikoukar, Seyedehyalda Akbarzadeh, Mansour Abboud, Mesut Günes, Behnam Dezfouli:
A Comprehensive Experimental Evaluation of Radio Irregularity in BLE Networks. 973-978 - Afshan Ejaz, Maria Rahim, Shakeel Ahmed Khoja:
The Effect of Cognitive Load on Gesture Acceptability of Older Adults in Mobile Application. 979-986 - Andrew Kyung, Steve Nam:
Study on Unemployment Rate in USA Using Computational and Statistical Methods. 987-993 - Souvik Sengupta, Jordi Garcia, Xavi Masip-Bruin, Andrés Prieto-González:
An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm. 994-1002 - Richard Kyung, Louis Sungwoo Cho:
Analysis of Trend in Traffic Flow Using Computational and Statistical Approaches. 1003-1009 - Chenbo Wang, Liang Hao, Baoji Wang, Jianhua Zhang, Yiming Lei:
Performance Analysis for Nonlinear MU-OFDM-DCSK Communication Systems. 1010-1014 - Chuck Easttom:
SecML: A Proposed Modeling Language for CyberSecurity. 1015-1021 - Mohamed G. Anany, Mahmoud M. Elmesalawy, Eman Serag El Din:
A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets. 1022-1028 - S. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar:
Efficient Feature Selection for Intrusion Detection Systems. 1029-1034 - Noha A. Elmosilhy, Ahmed M. Abd El-Haleem, Mahmoud M. Elmesalawy:
Optimal Deployment of Heterogeneous Wireless Nodes in Integrated LTElWi-Fi Networks. 1035-1041 - Yuyang Du, Liang Hao, Zhaohui Liu, Yingyang Chen, Yiming Lei:
Ergodic Rate Performance in Nonlinear Omnidirectional Coding MIMO-OFDM Systems. 1042-1045 - Arthur Kim, Peter Kim:
Estimation of the 2020 US Presidential Election Competition and Election Stratagies. 1046-1050 - Mohammad Aminul Hoque, Ragib Hasan:
Towards a Threat Model for Vehicular Fog Computing. 1051-1057 - Aneesh Kar, Soujanya Syamal, Suvraneel Chatterjee, Antarika Basu, Himadri Nath Saha, Srijata Choudhuri:
SPEED CONTROLLING & TRAFFIC MANAGEMENT SYSTEM (SCTMS). 1058-1063 - Parnian A. ShirinAbadi, Arash Abbasi:
UWB Channel Classification Using Convolutional Neural Networks. 1064-1068 - Jun Shen, Shihui Zhao, Mingzi Ye:
Suicide Prediction Analysis with Generalized Addictive Model. 1069-1073 - Shajina Anand, Gunasekaran Raja, Gokul Anand, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
Mirage: A Protocol for Decentralized and Secured Communication of IoT Devices. 1074-1080 - Misbah Ahmad, Imran Ahmed, Kaleem Ullah, Maaz Ahmad:
A Deep Neural Network Approach for Top View People Detection and Counting. 1082-1088 - Gunasekaran Raja, Sudha Anbalagan, Vikraman Sathiya Narayanan, Srinivas Jayaram, Aishwarya Ganapathisubramaniyan:
Inter-UAV Collision Avoidance using Deep-Q-Learning in Flocking Environment. 1089-1095 - Omor Faruk, Xiaoyang Zhong, Yao Liang, Xu Liang:
Smart Phone Based Mobile Code Dissemination for Heterogeneous Wireless Sensor Networks. 1096-1102 - Anas M. Abdelhafez, Hussein M. ElAttar, Mohamed A. Aboul-Dahab:
Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications. 1103-1109 - Yasser Karim, Ragib Hasan:
Towards a Threat Model for Fog Computing. 1110-1116 - Joseph Kamel, Farah Haidar, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
A Misbehavior Authority System for Sybil Attack Detection in C-ITS. 1117-1123 - Xiao Sha, Yasha Karimi, Samir R. Das, Petar M. Djuric, Milutin Stanacevic:
Study of mm-sized Coil to Coil Backscatter Based Communication Link. 1124-1129 - Heekyung Kim, Ken Choi:
Low Power FPGA-SoC Design Techniques for CNN-based Object Detection Accelerator. 1130-1134 - Weiwei Lyu, Xianghong Cheng, Jinling Wang:
Adaptive Compensation H∞ Filter with Convergence Criterion for SINS' Transfer Alignment. 1135-1144 - Ola Ashour, Marc St-Hilaire, Thomas Kunz, Maoyu Wang:
A Survey of Applying Reinforcement Learning Techniques to Multicast Routing. 1145-1151 - Andrés Felipe Ruiz Olaya, Javier Mauricio Antelis, Alexander Cerquera:
Decoding Steady-State Visual Evoked Potentials From EEG Signals: Towards an EEG-Triggered FES System to Restore Hand Grasp Function. 1152-1157 - Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag:
IoT Based Smart Security and Home Automation System. 1158-1161 - Amina Annagrebah, E. Bechetoille, I. B. Laktineh, H. Chanal:
A Multi-Phase Time-to-Digital Converter Differential Vernier Ring Oscillator. 1162-1167 - Dulana Rupanetti, Hassan A. Salamy:
Thermal-Constrained. Energy-Aware Load Management on MPSoC Architectures. 1168-1174 - Ali Manzak, Sadi Evren Seker:
Low Power Design for DVFS Capable Software. 1175-1179 - Giovanni Miraglia, Loyd R. Hook:
A Feedback Motion Plan for Vehicles with Bounded Curvature Constraints. 1180-1186 - Maxwell Ruggieri, Tzu-Tang Hsu, Md Liakat Ali:
Security Considerations for the Development of Secure Software Systems. 1187-1193 - Farshid Sahba, Amin Sahba, Ramin Sahba:
Applying Ad Hoc Technology in Inner City Communication. 1194-1198 - Abu Bony Amin, Muhammad Sana Ullah:
Performance Analysis of Squarely Packed Polymorphic SWCNT Interconnect. 1199-1203 - Ramnhell P. Alday, Maryli F. Rosas:
Business Intelligence Solution for Bikers Haven Restaurant. 1204-1210 - Aditi Singh:
Dynamic Beam Management for NR using Adaptive Antenna Array. 1211-1218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.