


default search action
8th CCWC 2018: Las Vegas, NV, USA
- IEEE 8th Annual Computing and Communication Workshop and Conference, CCWC 2018, Las Vegas, NV, USA, January 8-10, 2018. IEEE 2018, ISBN 978-1-5386-4649-6

- Al-Bakri Fawaz

, Muhi Laheeb, Khafaji Salwan
:
Online algorithm for controlling an inverted pendulum system under uncertainty in design parameters and initial conditions using Monte-Carlo simulation. 1-7 - Upasana Bhattacharyya, Carl Baum:

Estimating the location of a nuclear source in a three-dimensional environment using a two-stage adaptive algorithm. 8-14 - Chunlai Zhou, Ziyan Lin:

Study on fraud detection of telecom industry based on rough set. 15-19 - Evangelos A. Yfantis:

A new cyclic cryptographic algorithm. 20-25 - Ahmed K. Abed

, Hussein Al-Moukhles
, Ikhlas Abdel-Qader
:
An adaptive K-NN based on multiple services set identifiers for indoor positioning system with an ensemble approach. 26-32 - Haider Abdallatif Mohamed K, Ikhlas Abdel-Qader

:
A framework for sparse adaptive system identification via integrating a new multiple time-varying stepsize and zero-attracting techniques. 33-39 - Sudarshan S. Chawathe:

Compact representations of character-sets. 40-46 - Sudarshan S. Chawathe:

Lexical text segmentation using dictionaries. 47-53 - Amirabbas Tabatabaei, Farshid Torabi, Paitoon Tontiwachwuthikul

:
Simultaneous scheduling of machines and automated guided vehicles utilizing heuristic search algorithm. 54-59 - Xingzhi Zhang, Yan Yang, Zhurong Zhou:

A novel credit scoring model based on optimized random forest. 60-65 - Marci McBride, Robert Mitchell:

Enhanced dynamic cyber zone defense. 66-71 - Ahmed Youssef, Samah Senbel:

A Bi-level heuristic solution for the nurse scheduling problem based on shift-swapping. 72-78 - Lindsay Cain, Jeffrey Clark, Eric Pauls, Ben Ausdenmoore, Richard Clouse, Ted Josue:

Convolutional neural networks for radar emitter classification. 79-83 - Shinjini Ray, Sayan Tapadar, Suhrid Krishna Chatterjee, Robin Karlose, Sudipta Saha, Himadri Nath Saha:

Optimizing routine collection efficiency in IoT based garbage collection monitoring systems. 84-90 - Himadri Nath Saha, Sayan Tapadar, Shinjini Ray, Suhrid Krishna Chatterjee, Sudipta Saha:

A Machine Learning Based Approach for Hand Gesture Recognition using Distinctive Feature Extraction. 91-98 - Veton Këpuska, Gamal Bohouta

:
Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home). 99-103 - David M. Isaacson:

The ODNI-OUSD(I) xpress challenge: An experimental application of artificial intelligence techniques to National Security Decision Support. 104-109 - Haifeng Wang, Haili Zhang:

Movie genre preference prediction using machine learning for customer-based information. 110-116 - Khadija Shakeel, Ghulam Rasool Tahir, Irsha Tehseen, Mubashir Ali:

A framework of Urdu topic modeling using latent dirichlet allocation (LDA). 117-123 - Parisa Lotfallahtabrizi, Yasser L. Morgan:

A novel host intrusion detection system using neural network. 124-130 - Abdalrahman Alsaedi, Ikhlas Abdel-Qader

, Niaz Mohammad, Alvis Cheuk M. Fong:
Extended cox proportional hazard model to analyze and predict conversion from mild cognitive impairment to alzheimer's disease. 131-136 - Saptarshi Sengupta

, Sanchita Basak, Richard Alan Peters:
Data Clustering using a Hybrid of Fuzzy C-Means and Quantum-behaved Particle Swarm Optimization. 137-142 - Muyeed Ahmed

, Mir Tahsin Imtiaz, Raiyan Khan:
Movie recommendation system using clustering and pattern recognition network. 143-147 - Muhammad Asif Manzoor, Yasser L. Morgan:

Vehicle make and model recognition using random forest classification for intelligent transportation systems. 148-154 - Luke Jones, Delbert Christman, Sebastian Banescu

, Martin C. Carlisle
:
ByteWise: A case study in neural network obfuscation identification. 155-164 - Washington Velasquez

, Andres Munoz-Arcentales
, Joaquín Salvachúa:
Fast-data architecture proposal to alert people in emergency. 165-168 - Hussam Qassim, Abhishek Verma

, David Feinzimer:
Compressed residual-VGG16 CNN model for big data places image recognition. 169-175 - Ashay Argal, Siddharth Gupta, Ajay Modi, Pratik Pandey, Simon Shim, Chang Choo:

Intelligent travel chatbot for predictive recommendation in echo platform. 176-183 - Ankil Shah, Bhargav Jain, Bhavin Agrawal, Saurabh Jain, Simon Shim:

Problem solving chatbot for data structures. 184-189 - Austin P. Arechiga, Alan J. Michaels:

The effect of weight errors on neural networks. 190-196 - Sinjini Mitra, Mikhail I. Gofman, Gregory Parsons, Jessie J. Peissig

:
Facial asymmetry versus facial makeup. 197-203 - Daniel E. Kim, Mikhail Gofman:

Comparison of shallow and deep neural networks for network intrusion detection. 204-208 - Xiaofeng Ma, Zhurong Zhou:

Student pass rates prediction using optimized support vector machine and decision tree. 209-215 - Simon Shim, Gaurav Chodwadia, Kavish Jain, Chirag Patel, Ekta Sorathia, Chang Choo:

Supervised question answering system for technical support. 216-220 - Andres Munoz-Arcentales

, Andreina Montoya, T. Marjorie Chalen, Washington Velasquez
:
Improve customer experience based on recommendation and detection of a pattern change in eating habits. 221-225 - Abhijit Thakur, Shakib Chowdhury, Tasmia Bhuiyan:

Development of digitalization of leased land in Bangladesh. 226-232 - Christian Trefftz, Hugh McGuire, Zack Kurmas, Jerry Scripps, Juan D. Pineda:

Exhaustive community enumeration on a cluster. 233-237 - K. M. D. Muthumali Karunarathna:

Predicting ICU death with summarized patient data. 238-247 - Huy Huynh, Elliott Sobek, Mohamad El-Hajj, Sunny Atwal:

An analysis of rock climbing sport regarding performance, sponsorship, and health. 248-254 - Salyean Giri, Abeer Alsadoon

, Chandana Withana
, Salih Ali, A. Elchouemic:
Prediction of dementia by increasing subspace size in rank forest. 255-260 - Gargi Kulkarni, Lourdes V. Abellera, Anand Panangadan:

Unsupervised classification of online community input to advance transportation services. 261-267 - Emelia Opoku Aboagye

, Jianbin Gao
, Ampoma Affum Emmanuel:
Efficient parallelization for big data collaborative recommendation decisions. 268-274 - Yong Shi:

An attempt to analyze data distribution for abnormal behaviors. 275-280 - Marco Sánchez

, Jenny Torres
, Patricio Zambrano
, Pamela Flores
:
FraudFind: Financial fraud detection by analyzing human behavior. 281-286 - Shahab Tayeb, Abigail Week, Joshua Yee, Mayra Carrera, Kuira Edwards, Vicki Murray-Garcia, Meghann Marchello, Justin Zhan, Matin Pirouz:

Toward metadata removal to preserve privacy of social media users. 287-293 - Amik Singh, Mohit Gupta, Manoj Misra:

Parallel progressive sequential pattern (PPSP) mining. 294-300 - Zhao Fu, Jiao Cheng, Mei Yang, Jacimaria Batista:

Prediction of industrial wastewater quality parameters based on wavelet de-noised ANFIS model. 301-306 - Weijie Qi, Baoling Zhang, Bozhong Chen, Jie Zhang

:
A user-based K-means clustering offloading algorithm for heterogeneous network. 307-312 - Andrew Ydenberg, Navtej Heir, Bob Gill:

Security, SDN, and VANET technology of driver-less cars. 313-316 - Sayan Majumder

, Debika Bhattacharyya:
Mitigating wormhole attack in MANET using absolute deviation statistical approach. 317-320 - Yun Tian, Ryan Babcock, Carol Taylor, Yanqing Ji:

A new live video streaming approach based on Amazon S3 pricing model. 321-328 - Ziyin Zhang, Wei Hao:

Development of a new cloudlet content caching algorithm based on web mining. 329-335 - Nileshkumar Pandey, Doina Bein:

Web application for social networking using RTC. 336-340 - Jun Yin, Riaz Ali, Li Li, Weiyin Ma

, Ahmad Ali:
Edge network model based on double dimension. 341-346 - Srijita Basu, Arjun Bardhan, Koyal Gupta, Payel Saha, Mahasweta Pal, Manjima Bose, Kaushik Basu, Saunak Chaudhury, Pritika Sarkar:

Cloud computing security challenges & solutions-A survey. 347-356 - Boris Grozev, George Politis, Emil Ivov, Thomas Noël:

Considerations for deploying a geographically distributed video conferencing system. 357-361 - Quan Ding, Bo Tang, Prakash Manden, Jin Ren:

A learning-based cost management system for cloud computing. 362-367 - Juliette Miller, Chetan Jaiswal:

Women in computer science: A liberal arts perspective. 368-374 - R. Rohith, Vijeta Rathore, Vivek Chaturvedi

, Amit Kumar Singh, Thambipillai Srikanthan, Siew-Kei Lam:
LifeSim: A lifetime reliability simulator for manycore systems. 375-381 - Divya Geethakumari Anil, Yu Bai, Yoonsuk Choi:

Performance evaluation of ternary computation in SRAM design using graphene nanoribbon field effect transistors. 382-388 - Majeed Nader, Yunrui Li, John Q. Liu:

Chip design for turbo encoder module for in-vehicle system. 389-393 - Abdullah Aljuhni, C. Edward Chow, Amer Aljaedi, Shaji Yusuf, Francisco Torres-Reyes:

Towards understanding application performance and system behavior with the full dynticks feature. 394-401 - Jiong Si, Sarah L. Harris:

Handwritten digit recognition system on an FPGA. 402-407 - Ratna Chakrabarty, Dipak Kumar Mahato, Abhisekh Banerjee, Sayantani Choudhuri, Moumita Dey, Niranjan Kumar Mandal:

A novel design of flip-flop circuits using quantum dot cellular automata (QCA). 408-414 - Himandri Nath Saha, Pooja Joshi, Shreya Mondal, Fahim Karim, Ravi Kumar, Amitosh Banerjee, Pooja Singh, Subham Sha:

Low power shorted gate fin-FET based high performance amplifier. 415-420 - Himadri Nath Saha, Pooja Joshi

, Adriza Chattopadhyay, Barsha Deb, Anurupa Ghosh, Puja Kumari, Dipak Kumar Mahato, Sayantani Choudhuri, Sayani Bhattacharjee, Sourav Chattopadhyay, Pranami Dash, Basab BijoyGharai:
Performance optimization in flip flop circuit design. 421-423 - Muhi Laheeb, Khafaji Salwan

, Al-Bakri Fawaz
, Lami Sarah
:
Online algorithm for controlling a cruise system under uncertainty in design parameters and environmental conditions using Monte-Carlo simulation. 424-430 - Robert Mitchell, Brian Healy:

A game theoretic model of computer network exploitation campaigns. 431-438 - Suhrid Krishna Chatterjee, Sudipta Saha, Zubayr Khalid, Himadri Nath Saha, Pritam Paul, Robin Karlose:

Space effective and encrypted QR code with sender authorized security levels. 439-443 - Chuck Easttom:

A generalized methodology for designing non-linear elements in symmetric cryptographic primitives. 444-449 - Rashed Rabie, Maroua Drissi

:
Applying sigmoid filter for detecting the low-rate denial of service attacks. 450-456 - Amrit Regmi, Abeer Alsadoon

, Chandana Withana
, Salih Ali, A. Elchouemic:
Impact of privacy invasion in social network sites. 457-462 - Elbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev:

Securing data forwarding against blackhole attacks in mobile ad hoc networks. 463-467 - Mohammad G. Raeini, Mehrdad Nojoumian:

Secure error correction using multiparty computation. 468-473 - Casimer M. DeCusatis, Marcus Zimmermann, Anthony Sager:

Identity-based network security for commercial blockchain services. 474-477 - Roberto O. Andrade

, Jenny Torres
, Pamela Flores
:
Management of information security indicators under a cognitive security model. 478-483 - E. F. Dettrey, Evangelos A. Yfantis:

A new elliptic cryptographic algorithm. 484-489 - Sven Dominka, Michael Mandl, Michael Dübner, Dominik Ertl:

Using combinatorial testing for distributed automotive features: Applying combinatorial testing for automated feature-interaction-testing. 490-495 - Mehrgan Mostowfi:

HTTP timed redirection to reduce the energy use of servers. 496-501 - Riana J. Freedman, Damian Valles

:
A communication benchmark tailored to intel broadwell nodes and tuned to the DEAC cluster. 502-508 - Ibrahim Almutairy, Johnson A. Asumadu:

Examination of breaker-based protection systems for implementation in LVDC SSCB applications. 509-514 - Peibo Wen, Lilin Dan, Ruimeng Gan, Yue Xiao, Bin Fu:

Power allocation for multi-homing heterogeneous network aided by energy harvesting. 515-519 - Hakduran Koc, Pranitha P. Madupu:

Optimizing energy consumption in cyber physical systems using multiple operating modes. 520-525 - Kan Lin, Jie Zhang

:
Energy efficiency enhancement via power modification with simulated annealing cell selection. 526-531 - Baoling Zhang, Weijie Qi, Jie Zhang

:
An energy efficiency and ping-pong handover ratio optimization in two-tier heterogeneous networks. 532-536 - Nii Longdon Sowah

, Qingbo Wu, Fanman Meng:
A classification and clustering method for tracking multiple objects. 537-544 - Jean Jiang:

Audio processing with channel filtering using DSP techniques. 545-550 - Yang Jiao, Hananeh Derakhshan, Barbara St. Pierre Schneider, Emma E. Regentova, Mei Yang:

Automated quantification of white blood cells in light microscopic images of injured skeletal muscle. 551-557 - Trung H. Duong

, Lawrence L. Hoberock:
DUHO image segmentation based on unseeded region growing on superpixels. 558-563 - Dylan Wallace

, Blake Hament, Jean Chagas Vaz
, Paul Yu Oh:
Augmenting a miniature humanoid platform with a low-cost networked computer vision framework. 564-569 - Cong Pu

:
Mitigating DAO inconsistency attack in RPL-based low power and lossy networks. 570-574 - Matthew L. Grimes, David G. M. Mitchell:

Design of nested protograph-based LDPC codes with low error-floors. 575-579 - Fayezah Anjum, Abu Saleh Mohammed Shoaib, Md. Abdullah Ibne Hossain, Mohammad Monirujjaman Khan

:
Online health care. 580-583 - Sayan Tapadar, Shinjini Ray, Himadri Nath Saha, Arnab Kumar Saha, Robin Karlose:

Accident and alcohol detection in bluetooth enabled smart helmets for motorbikes. 584-590 - Washington Velasquez

, Andres Munoz-Arcentales
, W. Yanez, Joaquín Salvachúa:
Resilient smart cities: An approach of damaged cities by natural risks. 591-597 - Ziyan Lin, Chunlai Zhou:

Research on extracting risk control rules for Internet of Things business. 598-601 - Jayeeta Saha, Arnab Kumar Saha, Aiswarya Chatterjee, Suyash Agrawal, Ankita Saha, Avirup Kar, Himadri Nath Saha:

Advanced IOT based combined remote health monitoring, home automation and alarm system. 602-606 - Arnab Kumar Saha, Sachet Sircar, Priyasha Chatterjee, Souvik Dutta, Anwesha Mitra, Aiswarya Chatterjee, Soummyo Priyo Chattopadhyay, Himadri Nath Saha:

A raspberry Pi controlled cloud based air and sound pollution monitoring system with temperature and humidity sensing. 607-611 - Arnab Kumar Saha, Jayeeta Saha, Radhika Ray, Sachet Sircar, Subhojit Dutta, Soummyo Priyo Chattopadhyay, Himadri Nath Saha:

IOT-based drone for improvement of crop quality in agricultural field. 612-615 - S. M. Riazul Islam, Md. Mahmud Hossain

, Ragib Hasan
, Trung Q. Duong:
A conceptual framework for an IoT-based health assistant and its authorization model. 616-621 - BahaaEldin El-Shweky, Karim ElKholy, Mahmoud Abdelghany, Mahmoud Salah, Mohamed Wael, Omar Alsherbini

, Yehea Ismail, Khaled Salah, Mohamed Abdelsalam:
Internet of things: A comparative study. 622-631 - Raj Mani Shukla, Shamik Sengupta, Amar Nath Patra:

Smart plug-in electric vehicle charging to reduce electric load variation at a parking place. 632-638 - Amit Kumar Sikder

, Abbas Acar
, Hidayet Aksu, A. Selcuk Uluagac
, Kemal Akkaya, Mauro Conti
:
IoT-enabled smart lighting systems for smart cities. 639-645 - Asim Majeed

, Mahmood Ali:
How Internet-of-Things (IoT) making the university campuses smart? QA higher education (QAHE) perspective. 646-648 - Himadri Nath Saha, Nisith K. Das, Susanta K. Pal, Srijita Basu, Supratim Auddy, Ratul Dey, Arnab Nandy, Debjit Pal

, Nirjhar Roy, Dipanjan Mitra, Saunak Biswas, Tamanna Maity:
A cloud based autonomous multipurpose system with self-communicating bots and swarm of drones. 649-653 - Himadri Nath Saha, Srijita Basu, Supratim Auddy, Ratul Dey, Arnab Nandy, Debjit Pal

, Nirjhar Roy, Subhadeep Jasu, Ankita Saha, Soummyo Priyo Chattopadhyay, Tamanna Maity:
A low cost fully autonomous GPS (Global Positioning System) based quad copter for disaster management. 654-660 - Vinay Ramappa, Doina Bein:

MusiqGlobe.fm using MEAN stack. 661-664 - Aqiel N. Almamori

, Seshadri Mohan
:
Estimation of channel state information for massive MIMO based on received data using Kalman filter. 665-669 - Aqiel N. Almamori

, Seshadri Mohan
:
Improved MMSE channel estimation in massive MIMO system with a method for the prediction of channel correlation matrix. 670-672 - Mrugen A. Deshmukh, Stephen G. Wilson:

Channel estimation in OFDM: Interpolation versus ESPRIT. 673-678 - Debika Bhattacharyya, Avimita Chatterjee, Baisakhi Chatterjee, Arnab Kumar Saha, Arnab Santra:

A novel approach to energy efficient low cost routing in MANET by reduction in packet size. 679-684 - Luis Gabriel Jaimes, Juan Manuel Calderón

:
Gaussian mixture model for crowdsensing incentivization. 685-689 - Luis Gabriel Jaimes, Juan Manuel Calderón

:
Location-based social networks data for mobile crowdsensing. 690-694 - Susan Sabra, Mazen Alobaidi, Khalid Mahmood Malik

, Vian Sabeeh
:
Performance evaluation for semantic-based risk factors extraction from clinical narratives. 695-701 - Washington Velasquez

, Andres Munoz-Arcentales
, T. Marjorie Chalen, Joaquín Salvachúa:
Survival analysis of people with cardiac problems in a simulated earthquake environment. 702-706 - Hussein Al-Moukhles

, Ikhlas Abdel-Qader
, Ahmed K. Abed
:
Multiple-Fingerprints technique for WLAN and compressive sensing based IPS. 707-713 - Zhalong Hu, Abeer Alsadoon

, Manoranjan Paul
, P. W. C. Prasad
, Salih Ali, A. Elchouemic:
Early stage oral cavity cancer detection: Anisotropic pre-processing and fuzzy C-means segmentation. 714-719 - Steven Letourneau, Nathan Ell, Peter Cheung, Jordan McCaskill, Mohamad El-Hajj:

The effects of neighbourhood characteristics on crime incidence. 720-726 - Taif Alobaidi

, Wasfy B. Mikhael:
A modified discriminant sparse representation method for face recognition. 727-730 - Jason Ligon, Doina Bein, Phillip Ly, Brian Onesto:

3D point cloud processing using spin images for object detection. 731-736 - Natalie Ang, Doina Bein, David Dao, Luigi Sanchez, Justine Tran, Navie Vurdien:

Emotional prosody analysis on human voices. 737-741 - Mubashir Ali, Shehzad Khalid, Mazhar Iqbal Rana, Fizza Azhar:

A probabilistic framework for short text classification. 742-747 - Nirmalya Thakur

, Chia Y. Han:
A complex activity based emotion recognition algorithm for affect aware systems. 748-753 - Bo Tang, Haibo He:

MILE: A minimally interactive learning framework for visual data analysis. 754-762 - Pritesh Pimpale, Anand Panangadan, Lourdes V. Abellera:

Analyzing spread of influence in social networks for transportation applications. 763-768 - Arnab Kumar Saha, Subhronil Roy, Aranya Bhattacharya, Prabhat Shankar, Anindya Kumar Sarkar, Himadri Nath Saha, Pratanu Dasgupta:

A low cost remote controlled underwater rover using raspberry Pi. 769-772 - Young Tae Shin, Ying-Khai Teh:

Design analysis and considerations of power efficient electronic speed controller for small-scale quadcopter unmanned aerial vehicle. 773-776 - Tristan Brodeur, Alex Cater, Jean Chagas Vaz

, Paul Yu Oh:
Directory navigation with robotic assistance. 777-778 - Jennifer Alexandra, Mendez Rangel, José Mauro P. Fortes:

A detection probability based radio environment mapping technique for cognitive high density fixed satellite systems. 779-785 - (Withdrawn) Low power 16-channel electronic neuronal brain interface design. 786-795

- Raj Mani Shukla, Shamik Sengupta, Amar Nath Patra:

Software-defined network based resource allocation in distributed servers for unmanned aerial vehicles. 796-802 - Yucheng Fang, Huibiao Zhu, Frank Zeyda

, Yuan Fei:
Modeling and analysis of the disruptor framework in CSP. 803-809 - Matthew Chiang, Eric William Burger

:
An affordable solution for authenticated communications for enterprise and personal use. 810-815 - Mark E. Royer

, Sudarshan S. Chawathe:
Java unit annotations for units-of-measurement error prevention. 816-822 - Wassim Fassi Fihri, Youness Arjoune, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd

:
A particle swarm optimization based algorithm for primary user emulation attack detection. 823-827 - Youness Arjoune, Zakaria El Mrabet

, Hassan El Ghazi, Ahmed Tamtaoui:
Spectrum sensing: Enhanced energy detection technique based on noise measurement. 828-834 - Mohsen Riahi Manesh, Youness Arjoune, Naima Kaabouch:

A bit error rate estimation method for wireless communication systems. 835-840 - Kasun Somaratne, F. John Dian, Amirhossein Yousefi:

Accuracy analysis of time synchronization using current consumption pattern of BLE devices. 841-844 - Robin Chataut

, Robert Akl:
Optimal pilot reuse factor based on user environments in 5G Massive MIMO. 845-851 - Zaenab D. Shakir

, Josko Zec, Ivica Kostanic:
Measurement-based geolocation in LTE cellular networks. 852-856 - Shaochi Cheng, Yuan Gao, Xiangyang Li, Su Hu:

Positioning accuracy analysis of Indian regional navigation satellite system on STK. 857-860 - Rahul Sharma

, Hitesh Sarda, Tanisha Bhattacharjee, Aiswarya Roy, Prithwiswar Bhattacharya, Sugata Chowdhury, Shankhadip Mallick, Tapapriya Sengupta, Jayati Banerjee, Priyodarshini Roy, Siddhartha Sarker, Subhasree Chakraborty, Sauvik Bal
, Rupayan Das, Somen Nayak
:
USB level data security using cryptographic approach. 861-866 - Surajit Sur

, Aniket Dey, Siddhartha Sarker, Pramit Dutta, Prithwiswar Bhattacharya, Jyotirmoy Saha, Nabanit Saha, Priyam Pradhan, Himadri Ghosh, Rajarshi Ghosh, Anirban Sinha, Sagarika Ghosh, Sauvik Bal
, Rupayan Das:
Atechnical study on wireless body area network with its application. 867-873 - Jaskaran Singh, Karanjit Singh:

Advanced VANET information dissemination scheme using Fuzzy logic. 874-879 - Rose-Margaret Ekeng-Itua:

Assessing the impact of cell phones on African societies: An investigation into the impact of cell phones on a community of practice of business women in Nigeria. 880-890 - P. R. Sriram, R. Chandralekha, H. Ummahabiba:

Modelling 3×3 reflectarray antenna using microstrip resonator. 891-894 - Shylesh Umapathy, Meet Shah, Nan Wang:

Encircle routing: An efficient deterministic network on chip routing algorithm. 895-899 - Aaron E. Cohen

:
Automated HDL signal processing deployment performance from high level MATLAB specification for an unmanned aerial vehicle (UAV). 900-905 - F. John Dian, Amirhossein Yousefi, Kasun Somaratne:

Performance evaluation of time synchronization using current consumption pattern of BLE devices. 906-910 - Yassine Ramadhane Khlifi, Majed AlOtaibi:

A novel multicast grooming scheme for dynamic QoS provision over OLS networks. 911-917 - Mojtaba Jafari, Abeer Alsadoon

, Chandana Withana
, Salih Ali, A. Elchouemic:
Segment based model for TCP protocol optimization: Enhancing the bandwidth and congestion. 918-924 - Kumar Sharshembiev, Seong-Moo Yoo, Elbasher Elmahdi:

Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networks. 925-930 - Peter Stubberud, Benju Koirala:

A comparison of simulation methods for continuous time sigma delta modulators. 931-936 - Lilin Dan, Chiheng Zhang, Jie Yuan, Peibo Wen, Bin Fu:

Improved N-continuous OFDM using adaptive power allocation. 937-940 - David Martin Amitu

, Roseline Nyongarwizi Akol, Peter Nakeba:
QoS-aware splitting and radio resource allocation for machine type communications. 941-947 - Lauren J. Wong, William C. Headley

, Alan J. Michaels:
Estimation of transmitter I/Q imbalance using convolutional neural networks. 948-955 - Nahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun:

A 3D flash ADC structure for high-speed communication applications. 956-958 - Samar A. Alzahrani, Iyad A. Katib

:
Impact of varying IP/MPLS capacity module's size in three-layer networks. 959-964 - Xing Wei, Shiwen Fan, Yue Xiao, Qidi You, Wu Chen:

Space shift keying MIMO transmission with reduced pilot overhead. 965-968 - Ahmad Saeed Mohammad

, Narsi Reddy, Fathima James, Cory C. Beard:
Demodulation of faded wireless signals using deep convolutional neural networks. 969-975 - Xing Wei, Yanping Xiao, Yue Xiao, Qidi You, Wu Chen:

Spatial and directional modulation with random frequency diverse array. 976-979 - Majid Alshammari

, Khaled M. Elleithy
:
Efficient key distribution protocol for wireless sensor networks. 980-985 - Apurv Shaha, Duy H. N. Nguyen:

Space-Time coding implementation with a software-defined radio testbed. 986-992 - Abolfazl Razi, Chaoju Wang, Fahad Almaraghi, Qiyuan Huang, Yuting Zhang, Hanxiao Lu, Arnau Rovira-Sugranes:

Predictive routing for wireless networks: Robotics-based test and evaluation platform. 993-999 - Yefa Mai, Fernando Molina Rodriguez, Nan Wang:

CC-ADOV: An effective multiple paths congestion control AODV. 1000-1004 - Phillip G. Bradford:

Preliminary exploration of co-functional gene networks for wireless sensor networks. 1005-1008 - Hao Li, Jiliang Zhang

, Qi Hong, Hui Zheng, Jie Zhang
:
Exploiting adaptive modulation in E-band software-defined backhaul network. 1009-1013 - Xiaomin Ma, Matthew R. Samuelson, Emily A. Garvie:

New approach to enhancing vehicular communication reliability for safety applications. 1014-1017 - Balbir Bob Gill, Cameron Morgan, Cole Raschpichler, Paul Wiebe:

Insights into indoor navigation. 1018-1022

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














