


default search action
10th UEMCON 2019: New York City, NY, USA
- 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2019, New York City, NY, USA, October 10-12, 2019. IEEE 2019, ISBN 978-1-7281-3885-5

- Cullen D. Johnson, Brian H. Curtin, Nikhil Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews

:
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security. 1-7 - Rafael Lopez, Christian DeGuzman, Abdelrahman Elleithy:

Use of Sensor Node Networks for Car Security. 8-14 - Sara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy:

Location Tracking of Mobile Objects and the Privacy Tradeoff. 15-22 - Leo Kobayashi, Mukul Rocque, Haibo Wang, Geoffrey A. Capraro, Carlin C. Chuck Scb, Chris K. Kim

, Katherine Luchette, Alana Oster, Derek Merck, Ihor Kirenko, Kees van Zon, Marek Bartula:
Pilot Study of Emergency Department Patient Vital Signs Acquisition Using Experimental Video Photoplethysmography and Passive Infrared Thermography Devices. 23-32 - Milankumar Patel, Siddhartha Bhattacharyya

, Ali Alfageeh:
Formal Trust Architecture for Assuring Trusted Interactions in the Internet of Things. 33-39 - Milos Pilipovic, Dragan Samardzija:

Optimized Wireless Connectivity for Cyber-Physical Systems with Publisher/Subscriber Architecture. 40-49 - Mark Caswell, Yao Liang:

Simulation of Transitional and Bursty Wireless Visual Sensor Networks. 50-56 - Brandan Quinn, Eman Abdelfattah:

Machine Learning Meteorologist Can Predict Rain. 57-62 - Andrew Brandon, Melanie Seekins, Joshua Beulah Vedhavalli, Samuel Chelliah, John Haller:

Network Data Analysis to Support Risk Management in an IoT Environment. 63-68 - Yash Parikh, Eman Abdelfattah:

Comparison of Machine Learning Models to Predict Twitter Buzz. 69-73 - Ross Arnold

, Kevin Carey, Benjamin Abruzzo, Christopher M. Korpela:
What is A Robot Swarm: A Definition for Swarming Robotics. 74-81 - Brian H. Curtin, Suzanne J. Matthews

:
Deep Learning for Inexpensive Image Classification of Wildlife on the Raspberry Pi. 82-87 - Jiong Si, Evangelos A. Yfantis, Sarah L. Harris:

A SS-CNN on an FPGA for Handwritten Digit Recognition. 88-93 - Vanesa Getseva, Salil Maharjan, Eman Abdelfattah:

Performance of Classification Models on Various Types of Character Data. 94-98 - Amartya Hatua, Trung T. Nguyen

, Andrew H. Sung
:
Goal-Oriented Conversational System Using Transfer Learning and Attention Mechanism. 99-104 - Lidong Wang, Randy Jones:

Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction. 105-111 - Shireesha Chandra, Aparna S. Varde, Jiayin Wang:

A Hive and SQL Case Study in Cloud Data Analytics. 112-118 - Jackie Leung, Min Chen:

Image Recognition with MapReduce Based Convolutional Neural Networks. 119-125 - Yaobin Qin, Brandon Hoffmann, Yuwei Wang, David J. Lilja:

Exploring A Forecasting Structure for the Capacity Usage in Backup Storage Systems. 126-134 - Resham Jhangiani, Doina Bein, Abhishek Verma

:
Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce Transactions. 135-140 - Raghu Nandan Avula, Cliff C. Zou:

Improving Rider Safety Using QR Code & Fingerprint Biometrics. 141-144 - Chuck Easttom, Nagi Mei:

Mitigating Implanted Medical Device Cybersecurity Risks. 145-148 - Paul K. Mandal

, Abhishek Verma
:
Novel Hash-Based Radix Sorting Algorithm. 149-153 - Muath Obaidat, Matluba Khodjaeva, Suhaib Obeidat, Douglas Salane, Jennifer Holst:

Security Architecture Framework for Internet of Things (IoT). 154-157 - Ali Alqahtani, Mohamed A. Zohdy, Subramaniam Ganesan, Richard Olawoyin

:
A Novel Phase Tracking in ZigBee Receiver Using Extended Kalman Filtering over AWGN Channel. 158-162 - Caileigh Marshall, Jaimie Kelley, Cynthia Turnbull:

Improv Performance with Wi-Fi Enabled Costume Lights. 163-168 - Ankit Roy:

Deep Convolutional Neural Networks for Breast Cancer Detection. 169-171 - Mohammadreza Robaei, Robert Akl:

Time-Variant Broadband mmWave Channel Estimation Based on Compressed Sensing. 172-178 - William Shue, Nischal Paudyal, Mahmoud Rabiah, Douglas E. Dow, Mehmet Ergezer, Mira Yun:

A Thermally Regulated Footwear & Alerting System. 179-182 - Agnelo Rocha da Silva, Ruzbeh Akbar, Richard H. Chen, Kazem Bakian-Dogaheh, Negar Golestani, Mahta Moghaddam, Dara Entekhabi:

Duty-Cycled, Sub-GHz Wake-up Radio with -95dBm Sensitivity and Addressing Capability for Environmental Monitoring Applications. 183-191 - Bulent Ayhan, Chiman Kwan

:
A New Approach to Change Detection Using Heterogeneous Images. 192-197 - Luis Camal, Anup Kirtane, Teresa Blanco

, Roberto Casas, Federico Rossano
, Baris Aksanli
:
A Wearable Device Network to Track Animal Behavior and Relationships in the Wild. 198-202 - Amin Sahba, Ramin Sahba, Paul Rad, Mo M. Jamshidi:

Optimized IoT Based Decision Making For Autonomous Vehicles In Intersections. 203-206 - Waleed Aldosari

, Mohamed A. Zohdy, Richard Olawoyin
:
Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman Filter. 207-212 - Joong-Lyul Lee

, Stephen C. Kerns, Sangjin Hong:
A Secure IoT-Fog-Cloud Framework Using Blockchain Based on DAT for Mobile IoT. 213-218 - Jim A. Scheibmeir, Yashwant K. Malaiya:

Quality Model for Testing Augmented Reality Applications. 219-226 - Drashti Pathak, Aparna S. Varde, Clement Alo, Felix Oteng:

Ubiquitous Access for Local Water Management Through HCI Based App Development. 227-233 - Sudarshan S. Chawathe:

Data Modeling for a NoSQL Database Service. 234-240 - David William Honorio Araujo da Silva

, Carlos Paz de Araujo, C. Edward Chow, Bryan Sosa Barillas:
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra. 241-249 - Andrew Camphouse, Lucien Ngalamou:

Securing a Connected Home. 250-256 - Kevin B. Hall, Lucien Ngalamou:

Securing Wireless Scada Systems in Rural American Power Grids. 257-262 - Mark E. Royer

, Sudarshan S. Chawathe:
Trusted Remote Function Interface. 263-269 - Thu Vo, Chetan Jaiswal:

AdRemover: The Improved Machine Learning Approach for Blocking Ads. 270-275 - Meizhu He, Leon Wu:

SIPSA: Secure IoT Protocol-Based Smart Adapter for Communicating and Optimizing Building Energy Management with Smart Grid. 276-279 - Debjyoti Sinha, Mohamed El-Sharkawy:

Thin MobileNet: An Enhanced MobileNet Architecture. 280-285 - Md Reshad Ul Hoque, Roland Burks, Chiman Kwan

, Jiang Li:
Deep Learning for Remote Sensing Image Super-Resolution. 286-292 - Ahmed Aly, Gianluca Guadagni

, Joanne Bechta Dugan:
Derivative-Free Optimization of Neural Networks using Local Search. 293-299 - Yash Parikh, Eman Abdelfattah:

Machine Learning Models to Predict Multiclass Protein Classifications. 300-304 - Trung T. Nguyen

, Amartya Hatua, Andrew H. Sung:
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems. 305-311 - Durga Sundaram, Abhishek Sarode, Kiran George:

Vision-Based Trainable Robotic Arm for Individuals with Motor Disability. 312-315 - Bulent Ayhan, Chiman Kwan

:
New Results in Change Detection Using Optical and Multispectral Images. 316-321 - Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:

Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. 322-328 - Mehdi Karimibiuki, Michal Aibin

, Yuyu Lai, Raziq Khan, Ryan Norfield, Aaron Hunter:
Drones' Face off: Authentication by Machine Learning in Autonomous IoT Systems. 329-333 - Bulent Ayhan, Chiman Kwan

:
Practical Considerations in Unsupervised Change Detection Using SAR Images. 334-339 - Mahssa Abdolahi, Hao Jiang

, Bozena Kaminska:
Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching. 340-346 - Hafiz Mohammd Junaid Khan, Quamar Niyaz, Vijay K. Devabhaktuni, Site Guo, Umair Shaikh:

Identifying Generic Features for Malicious URL Detection System. 347-352 - Sandun S. Kuruppu, Alexander Shibilski:

Clock Variation Impact on Digital Control System Performance. 353-358 - Jordan Fernandes, Keye Li, Joey Mirabile, Gregg Vesonder:

Application of Robot Operating System in Robot Flocks. 359-363 - Amina Shrestha, Rhishav Mahaju, Sandun S. Kuruppu:

On Stability of Current Controlled Drives with Delay in Feedback Path. 364-370 - Brad Wheeler, Andrew Ng, Brian G. Kilberg, Filip Maksimovic, Kristofer S. J. Pister

:
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems. 371-376 - Kiavash Fathi, Mehdi Mahdavi

:
Control System Response Improvement via Denoising Using Deep Neural Networks. 377-382 - Kervins Nicolas, Yi Wang:

A novel double spending attack countermeasure in blockchain. 383-388 - Vanessa DeFreese, Tyler Wright, Ivy Robalino, Gregg Vesonder:

Robotic Solutions for Eldercare. 389-394 - Badar Almarri, Sanguthevar Rajasekaran, Chun-Hsi Huang:

Unsupervised Similarity-based Sensor Selection for Time Series Data. 395-400 - Pablo Rivas

, Casimer M. DeCusatis, Matthew Oakley, Alex Antaki, Nicholas Blaskey, Steven LaFalce, Stephen Stone:
Machine Learning for DDoS Attack Classification Using Hive Plots. 401-407 - Khalid Hamad Motleb Alnafisah:

An algorithmic Solution in Data Visualization for the "Hair Ball" Problem. 408-418 - Josef Ur, Mathew Craner, Rehab El Hajj:

What Makes a National Football League Team Successful? an Analysis of Play by Play Data. 419-425 - Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj:

Data Mining in The NBA: An Applied Approach. 426-432 - Mihaela Dimovska

, Travis Johnston, Catherine D. Schuman
, J. Parker Mitchell, Thomas E. Potok:
Multi-Objective Optimization for Size and Resilience of Spiking Neural Networks. 433-439 - Azkario Rizky Pratama

, Alexander Lazovik
, Marco Aiello:
Office Multi-Occupancy Detection using BLE Beacons and Power Meters. 440-448 - Chiman Kwan

, Jerry Yang, Bryan Chou:
Change Detection Using Original and Fused Landsat and Worldview Images. 449-454 - Mikeera Brown, Shawnoah Pollock, Wafa Elmannai, Michael Joseph, Khaled Elleithy

:
Vulnerability Analysis and Modeling. 455-461 - Peter Stubberud:

The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover. 462-468 - Chiman Kwan

, David Gribben, Trac D. Tran:
Multiple Human Objects Tracking and Classification Directly in Compressive Measurement Domain for Long Range Infrared Videos. 469-475 - Md Inzamam Ul Haque

, Damian Valles
:
Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication Abilities. 476-482 - Michael Joseph, Khaled Elleithy

, Mohamed Mohamed:
A new Quantum Processor Architecture. 483-487 - Chiman Kwan

, David Gribben, Trac D. Tran:
Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical Videos. 488-494 - Jarrett B. Knox, Eric M. Pereira, Anthony Sousa, Douglas E. Dow:

Activity Monitoring System to Support Elderly Independent Living. 495-498 - Kingsley Udeh, David W. Wanik, Nick Bassill, Emmanouil N. Anagnostou:

Time Series Modeling of Storm Outages with Weather Mesonet Data for Emergency Preparedness and Response. 499-505 - Kenshi Saho

, Kazuki Uemura, Masahiro Fujimoto, Michito Matsumoto:
Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living. 506-510 - Ramin Sahba, Amin Sahba, Mo M. Jamshidi, Paul Rad:

3D Object Detection Based on LiDAR Data. 511-514 - Ibrahim Alrashdi

, Ali Alqazzaz
, Raed Alharthi
, Esam Aloufi, Mohamed A. Zohdy, Ming Hua:
FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities. 515-522 - Zuhair Alqarni, Johnson A. Asumadu:

Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation. 523-527 - Matthew Regueiro, Bhagyashree Shirke, Mandy Chiu, Nicholas Capobianco, Kiran George:

Electroencephalographic (EEG) Analysis of Individuals Experiencing Acute Mental Stress. 528-534 - Sudarshan S. Chawathe:

Using Historical Data to Predict Parking Occupancy. 534-540 - Oluwaseyi Ajayi, Obinna Igbe, Tarek N. Saadawi:

Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution. 541-549 - Alyssa Donawa

, Inema Orukari, Corey E. Baker
:
Scaling Blockchains to Support Electronic Health Records for Hospital Systems. 550-556 - Sree Bala Shruthi Bhamidi, Mohamed El-Sharkawy:

Residual Capsule Network. 557-560 - S. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar

:
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users. 561-567 - Sara Hebal, Djamila Mechta, Saad Harous

:
ACO-based Distributed Energy Routing Protocol In Smart Grid. 568-571 - Mark E. Royer

, Sudarshan S. Chawathe:
Unformatted, Certified Scientific Objects. 572-577 - Brody E. Nagy, Sean A. Demers, Douglas E. Dow:

Automated Well Water Contamination Tester and Web Service. 578-584 - Joseph Russell

, Jeroen Bergmann
:
Probabilistic sensor design for healthcare technology. 585-590 - Hy Do, Vu Truong, Kiran George, Bhagyashree Shirke:

EEG-Based Biometrics Utilizing Image Recognition for Patient Identification. 591-595 - Miguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M. R. Alrashidi, Douglas E. Dow:

Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily Living. 596-599 - Niranjan Ravi, Mohamed El-Sharkawy:

Integration of UAVs with Real Time Operating Systems using UAVCAN. 600-605 - Paul L. Kaprielian, Thach Pham, Alex Young, Douglas E. Dow, Scott A. Grenquist, Bruce M. Decker:

Winter Cabin Water Tap Monitor and Release System to Reduce Risk of Freezing. 606-609 - Christina Berke, Elizabeth Fassman-Beck, Jack Li, Gregg Vesonder:

Towards Better Management of Combined Sewage Systems. 610-613 - Izbaila Imtiaz, Imran Ahmed

, Misbah Ahmad
, Kaleem Ullah, Awais Adnan, Maaz Ahmad:
Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing. 614-619 - Anil R. Patel, Ashish Patel:

Comparative Analysis of Stereo Matching Algorithms. 620-626 - Misbah Ahmad

, Imran Ahmed
, Awais Adnan:
Overhead View Person Detection Using YOLO. 627-633 - Walid Abdel Gelil, Thomas Kunz:

A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs). 640-646 - Muhammet Ali Karabulut

, A. F. M. Shahen Shah
, Haci Ilhan:
Performance of the CR-MAC with Channel Fading and Capture Effect under Practical Traffic Scenarios for VANETs. 647-652 - Ali Alfageeh, Siddhartha Bhattacharyya

, Samuel J. Perl
, Milankumar Patel:
Assurance for CyberSecurity with Assume-Guarantee Reasoning. 653-659 - Roland Burks, Kazi Aminul Islam

, Yan Lu
, Jiang Li:
Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study. 660-665 - Soo-Yeon Ji

, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong
:
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform. 666-672 - Shajina Anand, Gunasekaran Raja

, Aishwarya Ganapathisubramaniyan:
AECC: An Enhanced Public Key Cryptosystem for User Defined Messages. 673-678 - Xin-Wen Wu

, Waleed Farag, Sanwar Ali, Siddhivinayak Kulkarni:
An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices. 679-685 - Mamadou I. Wade, Mohamed F. Chouikha, Tepper Gill, Wayne Patterson, Talitha M. Washington, Jianchao Zeng:

Distributed Image Encryption Based On a Homomorphic Cryptographic Approach. 686-696 - Yi Huang, Jayanta K. Debnath, Michaela Iorga, Anup Kumar, Bin Xie:

CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management. 697-707 - Avimita Chatterjee:

Formulating Support for Superpages to reduce the number of TLB Faults in Contiguous Virtual Memory Space. 708-715 - Alaa T. Al Ghazo

, Ratnesh Kumar:
Identification of Critical-Attacks Set in an Attack-Graph. 716-722 - Rajiv Bagai, Seth Layton, Srikanth Gampa, Kavitha Chandrashekar:

Maximum Diversity in Web Application User Action Privacy. 723-729 - Chuck Easttom, Willie Sanders:

On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. 730-735 - Dat Tran, Chetan Jaiswal:

PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack. 736-743 - Adrian Jaesim, Adel Aldalbahi

, Nazli Siasi, Diogo Oliveira, Nasir Ghani:
Dual-Beam Analog Beamforming for mmWave Communications. 744-748 - Anurag Thantharate

, Cory C. Beard, Sreekar Marupaduga:
An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G Networks. 749-754 - Akira Kawai, Shinichi Taniguchi, Hui Li LI, Shizue Izumi:

A Physical Strength Measurement and Analysis System for Elderly People Using Motion Sensors. 755-761 - Anurag Thantharate

, Rahul Arun Paropkari, Vijay Walunj, Cory C. Beard:
DeepSlice: A Deep Learning Approach towards an Efficient and Reliable Network Slicing in 5G Networks. 762-767 - Mohamed Sofiane Batta

, Zibouda Aliouat
, Saad Harous
:
A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT. 768-774 - Jay Ashok Shah, Dushyant Dubaria:

NetDevOps: A New Era Towards Networking & DevOps. 775-779 - J. P. Piotrowski, Evangelos A. Yfantis, A. Campagna, Q. Cornu, G. M. Gallitano:

Voice Interactive Games. 780-784 - Ashutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale:

Automated System for Cervical Abnormality Detection using Machine Learning. 785-790 - Brook W. Abegaz:

Stability Improvement of Power Networks using Cluster based Dynamic Excitation of AVR. 791-795 - Brian Luu, Bradley Hansberger, Thanat Tothong, Kiran George:

Conceptual Neuroadaptive Brain-Computer Interface utilizing Event-related Desynchronization. 796-802 - Damianos Gavalas, Charalampos Konstantopoulos

, Grammati E. Pantziou
, Nikolaos Vathis:
An Efficient Heuristic for the Vacation Planning Problem. 803-808 - Brook W. Abegaz:

ASCPN - A Security Evaluation System for Cyber Power Networks. 809-816 - Chuanhong Du

, Licai Liu
, Shuaishuai Shi:
Synchronization of Fractional-Order Complex Chaotic System Using Active Control Method. 817-823 - Junho Son, Hyuntae Cho, Chong-Min Kyung:

Design and Implementation of an Indoor Ambient Noise Monitoring System with Localization. 824-829 - Mohammad M. Kadhum, Nur Nazmah Mat Zin:

Congestion Control and Traffic Management in Wireless Sensor Networks. 830-836 - Claudiu Moise, Rachel F. Adler

:
Facing the Music: Performance Implications of Working with Music in the Background. 837-843 - Giovanni Miraglia, Loyd R. Hook:

Feedback Motion Plan Verification for Vehicles with Bounded Curvature Constraints. 844-854 - John Lamb, Nina S. Godbole:

Smart Energy Efficiency for a Sustainable World. 855-861 - Amanda Kyung, Yuna Lee, Ho Jeong Kwon:

Study on the Nano-scaled Molecules Used in Treatment for Melanoma Using Bio-chemical and Computational Analysis. 862-866 - Arjun Dutta, Amit Kumar

, Bittu Kumar, Abhishek Roy, Poulami Paul, Swarnabha Roy, Rahul Agarwala, Abhisikta Chakraborty, Asesh Ghosh, Himadri Nath Saha, Anirup Roy, Ashish Adarsh:
GSM Based Irrigation System. 867-872 - Shea Ketsdever, Michael J. Fischer:

Incentives Don't Solve Blockchain's Problems. 873-876 - Donghan Oh, Jaesung Lim, Jong-Kwan Lee, Hoki Baek

:
Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied Environments. 877-882 - Parnian A. ShirinAbadi, Arash Abbasi:

On Approximation of Gaussian Q-Function and its Applications. 883-887 - Tomoki Ito, Hirofumi Noguchi, Misao Kataoka, Takuma Isoda, Yoji Yamato, Tutomu Murase:

Evaluation of a Realistic Example of Information-Centric Network Metadata Management. 888-893 - Mong Tee Sim, Darshika G. Perera:

A Fast and Secure Pipelined Barrel Processor for Safety-Critical Applications for Real-Time Operating Systems. 894-904 - R. Madhusudhan, Manjunath Hegde

:
Smart Card Based Remote User Authentication Scheme for Cloud Computing. 905-910 - Muhammad Irfan, Nordin Bin Saad

, Ansar Ali, K. Vinoth Kumar, Muhammad Aman Sheikh, Muhammad Awais
:
A Condition Monitoring System for the Analysis of Bearing Distributed Faults. 911-915 - Ilche Georgievski, Prashant Gupta, Marco Aiello:

Activity Learning for Intelligent Buildings. 916-923 - Min Chen:

Music Streaming Service Prediction with MapReduce-based Artificial Neural Network. 924-928 - Andres F. Ruiz-Olaya

, Cesar A. Quinayas Burgos, Leonardo Torres Londoño:
A Low-Cost Arm Robotic Platform based on Myoelectric Control for Rehabilitation Engineering. 929-933 - A. F. M. Shahen Shah

, Haci Ilhan, Ufuk Tureli
:
Designing and Analysis of IEEE 802.11 MAC for UAVs Ad Hoc Networks. 934-939 - Anju Arya, Amita Rani, Sanjay Kumar

:
Coverage and Routing Hole Detection in Cyber-physical Network Paradigm. 934-939 - Shilpa Choudhary, Hemant Purohit

, Amit Sehgal, Awanish Kaushik:
Performance Study of Detectability of RFID System With Varying Atmospheric Conditions. 940-944 - Riken Parekh, Kushal Jain, David Luu, Kiran George:

Scavenging Residual Energy from Wi-Fi Sources Using a Rectenna Circuit. 945-950 - Divyashikha Sethia

, Anadi Shakya, Ritik Aggarwal, Saksham Bhayana:
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices. 951-957 - Gordana Barb, Marius Otesteanu:

On the Influence of Delay Spread in TDL and CDL Channel Models for Downlink 5G MIMO Systems. 958-962 - Hemant Purohit

, Parneet Kaur
, Darlius Bosco Mwebesa, Shilpa Choudhary, Kanika Joshi:
Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of Uganda. 963-967 - Ushashi Chowdhury, Pranjal Chowdhury

, Sourav Paul
, Anwesha Sen, Partho Protim Sarkar, Shubhankur Basak, Abari Bhattacharya:
Multi-sensor Wearable for Child Safety. 968-972 - Ali Nikoukar

, Seyedehyalda Akbarzadeh, Mansour Abboud, Mesut Günes, Behnam Dezfouli:
A Comprehensive Experimental Evaluation of Radio Irregularity in BLE Networks. 973-978 - Afshan Ejaz, Maria Rahim, Shakeel Ahmed Khoja:

The Effect of Cognitive Load on Gesture Acceptability of Older Adults in Mobile Application. 979-986 - Andrew Kyung, Steve Nam:

Study on Unemployment Rate in USA Using Computational and Statistical Methods. 987-993 - Souvik Sengupta

, Jordi Garcia
, Xavi Masip-Bruin
, Andrés Prieto-González:
An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud Paradigm. 994-1002 - Richard Kyung, Louis Sungwoo Cho:

Analysis of Trend in Traffic Flow Using Computational and Statistical Approaches. 1003-1009 - Chenbo Wang

, Liang Hao, Baoji Wang, Jianhua Zhang, Yiming Lei:
Performance Analysis for Nonlinear MU-OFDM-DCSK Communication Systems. 1010-1014 - Chuck Easttom:

SecML: A Proposed Modeling Language for CyberSecurity. 1015-1021 - Mohamed G. Anany

, Mahmoud M. Elmesalawy, Eman Serag El Din:
A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNets. 1022-1028 - S. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar

:
Efficient Feature Selection for Intrusion Detection Systems. 1029-1034 - Noha A. Elmosilhy, Ahmed M. Abd El-Haleem

, Mahmoud M. Elmesalawy
:
Optimal Deployment of Heterogeneous Wireless Nodes in Integrated LTElWi-Fi Networks. 1035-1041 - Yuyang Du, Liang Hao, Zhaohui Liu, Yingyang Chen

, Yiming Lei:
Ergodic Rate Performance in Nonlinear Omnidirectional Coding MIMO-OFDM Systems. 1042-1045 - Arthur Kim, Peter Kim:

Estimation of the 2020 US Presidential Election Competition and Election Stratagies. 1046-1050 - Mohammad Aminul Hoque, Ragib Hasan

:
Towards a Threat Model for Vehicular Fog Computing. 1051-1057 - Aneesh Kar, Soujanya Syamal

, Suvraneel Chatterjee, Antarika Basu, Himadri Nath Saha, Srijata Choudhuri:
SPEED CONTROLLING & TRAFFIC MANAGEMENT SYSTEM (SCTMS). 1058-1063 - Parnian A. ShirinAbadi, Arash Abbasi:

UWB Channel Classification Using Convolutional Neural Networks. 1064-1068 - Jun Shen, Shihui Zhao, Mingzi Ye:

Suicide Prediction Analysis with Generalized Addictive Model. 1069-1073 - Shajina Anand

, Gunasekaran Raja
, Gokul Anand, Sajjad Hussain Chauhdary, Ali Kashif Bashir:
Mirage: A Protocol for Decentralized and Secured Communication of IoT Devices. 1074-1080 - Misbah Ahmad

, Imran Ahmed
, Kaleem Ullah, Maaz Ahmad:
A Deep Neural Network Approach for Top View People Detection and Counting. 1082-1088 - Gunasekaran Raja

, Sudha Anbalagan
, Vikraman Sathiya Narayanan, Srinivas Jayaram
, Aishwarya Ganapathisubramaniyan:
Inter-UAV Collision Avoidance using Deep-Q-Learning in Flocking Environment. 1089-1095 - Omor Faruk, Xiaoyang Zhong, Yao Liang, Xu Liang:

Smart Phone Based Mobile Code Dissemination for Heterogeneous Wireless Sensor Networks. 1096-1102 - Anas M. Abdelhafez, Hussein M. ElAttar, Mohamed A. Aboul-Dahab:

Interference Mitigation by Intelligent Channel Selection for Device-to-Device Communications. 1103-1109 - Yasser Karim, Ragib Hasan

:
Towards a Threat Model for Fog Computing. 1110-1116 - Joseph Kamel, Farah Haidar, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien

:
A Misbehavior Authority System for Sybil Attack Detection in C-ITS. 1117-1123 - Xiao Sha

, Yasha Karimi, Samir R. Das, Petar M. Djuric, Milutin Stanacevic:
Study of mm-sized Coil to Coil Backscatter Based Communication Link. 1124-1129 - Heekyung Kim, Ken Choi:

Low Power FPGA-SoC Design Techniques for CNN-based Object Detection Accelerator. 1130-1134 - Weiwei Lyu, Xianghong Cheng, Jinling Wang

:
Adaptive Compensation H∞ Filter with Convergence Criterion for SINS' Transfer Alignment. 1135-1144 - Ola Ashour, Marc St-Hilaire, Thomas Kunz, Maoyu Wang:

A Survey of Applying Reinforcement Learning Techniques to Multicast Routing. 1145-1151 - Andrés Felipe Ruiz Olaya, Javier Mauricio Antelis

, Alexander Cerquera:
Decoding Steady-State Visual Evoked Potentials From EEG Signals: Towards an EEG-Triggered FES System to Restore Hand Grasp Function. 1152-1157 - Sovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal

, Soumyajit Sengupta, Priti Nag:
IoT Based Smart Security and Home Automation System. 1158-1161 - Amina Annagrebah, E. Bechetoille, I. B. Laktineh, H. Chanal:

A Multi-Phase Time-to-Digital Converter Differential Vernier Ring Oscillator. 1162-1167 - Dulana Rupanetti, Hassan A. Salamy:

Thermal-Constrained. Energy-Aware Load Management on MPSoC Architectures. 1168-1174 - Ali Manzak

, Sadi Evren Seker
:
Low Power Design for DVFS Capable Software. 1175-1179 - Giovanni Miraglia, Loyd R. Hook:

A Feedback Motion Plan for Vehicles with Bounded Curvature Constraints. 1180-1186 - Maxwell Ruggieri, Tzu-Tang Hsu, Md Liakat Ali:

Security Considerations for the Development of Secure Software Systems. 1187-1193 - Farshid Sahba, Amin Sahba, Ramin Sahba:

Applying Ad Hoc Technology in Inner City Communication. 1194-1198 - Abu Bony Amin

, Muhammad Sana Ullah
:
Performance Analysis of Squarely Packed Polymorphic SWCNT Interconnect. 1199-1203 - Ramnhell P. Alday, Maryli F. Rosas

:
Business Intelligence Solution for Bikers Haven Restaurant. 1204-1210 - Aditi Singh:

Dynamic Beam Management for NR using Adaptive Antenna Array. 1211-1218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














