


default search action
11th UEMCON 2020: New York City, NY, USA
- 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2020, New York City, NY, USA, October 28-31, 2020. IEEE 2020, ISBN 978-1-7281-9656-5

- Shahid Al Noor, Yasser Karim, Md. Mahmud Hossain, Ragib Hasan

:
CrowdPick: A Generic Framework for Delivering Service Specific Crowd Infrastructure. 1-7 - Mohamed Sofiane Batta, Zibouda Aliouat, Hakim Mabed, Saad Harous

:
LTEOC: Long Term Energy Optimization Clustering For Dynamic IoT Networks. 8-14 - Russell Skaggs-Schellenberg, Daniel Wright, Nan Wang:

Development and Implementation of S-MAC based RPL Protocol to Increase Energy Efficiency for the TelosB. 15-20 - Michael Stepzinski, Shamik Sengupta:

Cybersecurity analysis in Dedicated Short-Range Communications in vehicular networks. 21-27 - Subhrajit Majumder, Deepthi Chandrika Mandava, Junghwan Kim, Ahmad Y. Javaid:

Multimedia Transmission for V2X Communication over Legacy LTE-A Network Infrastructure - A Performance Evaluation. 28-34 - Wei Pang, Yufeng Li, Shengli Lu:

8-bit Convolutional Neural Network Accelerator for Face Recognition. 35-39 - Tian Lan, Yuxin Qian, Wenxin Tai, Boce Chu, Qiao Liu:

Deep Attractor with Convolutional Network for Monaural Speech Separation. 40-44 - T. A. Wanigaaratchi, V. G. T. N. Vidanagama:

Anomaly Detection and Identification Using Visual Techniques in Streaming Video. 45-51 - Stafford Hutchins, Earl E. Swartzlander Jr.:

A Bfloat16 Fused Multiplier-Adder. 52-55 - Suhana Ambol, Sherif Rashad:

Continuous Authentication of Smartphone Users using Machine Learning. 56-62 - Gregory Larrick, Yun Tian, Uri Rogers, Halim Acosta, Fangyang Shen:

Interactive Visualization of 3D Terrain Data Stored in the Cloud. 63-70 - Bohui Wang, Hui Li

, Yan Zhao, Xin Yang, Huajun Ma, Xin Xie, Kaixuan Xing:
A Data Structure for Efficient File Deduplication in Cloud Storage. 71-77 - Siddartha Mootha, Sashank Sridhar

, Rahul Seetharaman, S. Chitrakala
:
Stock Price Prediction using Bi-Directional LSTM based Sequence to Sequence Modeling and Multitask Learning. 78-86 - Nisha Thorakkattu Madathil, Saad Harous

:
Central versus Distributed Statistical Computing Algorithms-A Comparison. 87-92 - Patrick Adjei, Nittin S. Sethi, Camila P. E. de Souza

, Miriam A. M. Capretz:
Energy Disaggregation using Multilabel Binarization and Gaussian Naive Bayes Classifier. 93-100 - Yevgeniy Byeloborodov, Sherif Rashad:

Design of Machine Learning Algorithms for Behavioral Prediction of Objects for Self-Driving Cars. 101-105 - Shafinaz Islam, Damian Valles

, Michael R. J. Forstner:
Performance Analysis and Evaluation of LSTM and GRU Architectures for Houston toad and Crawfish frog Call Detection. 106-111 - Purvesh Sharma, Damian Valles

:
Backbone Neural Network Design of Single Shot Detector from RGB-D Images for Object Detection. 112-117 - Ruchi Bagwe, Kiran George:

Automatic Numerical Question Answering on Table using BERT-GNN. 118-124 - Jahnavi Kachhia, Rashika Natharani, Kiran George:

Deep Learning Enhanced BCI Technology for 3D Printing. 125-130 - Ahmed E. Elshafey, Soumaia Ahmed Al Ayyat, Sherif Gamal Aly

:
OPSCAN: Density-based Spatial Clustering in Opportunistic Networks. 131-136 - Utpal Kumar Dey, Robert Akl, Robin Chataut

, Mohammadreza Robaei:
Modified PHY Layer for High Performance V2X Communication using 5G NR. 137-142 - Omar Alruwaili, Ivica Kostanic, Ali Al-Sabbagh, Hamad Almohamedh:

IoT Based: Air Quality Index and Traffic Volume Correlation. 143-147 - Moises Levy:

A Novel Framework for Data Center Risk Assessment. 148-154 - Md. Monowar Anjum, Noman Mohammed:

PAARS: Privacy Aware Access Regulation System. 155-161 - Michal Aibin

:
LSTM for Cloud Data Centers Resource Allocation in Software-Defined Optical Networks. 162-167 - Ziyin Zhang, Wei Hao:

A New Caching Algorithm for Boosting Edge Computing Performance. 168-175 - Yuanyuan Yang, Hui Li

, Xiangdong Cheng, Xin Yang, Yaoguang Huo:
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service. 176-182 - Ayad N. Bihnam, Xian Liu:

Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading Channel. 183-188 - Jeremy Lytle, Devon Santillo, Kristiina Valter Mai, Jeremy Wright:

Remote monitoring of evapotranspiration from green roof systems. 189-194 - Tapan Kumar

, Pradyumn Sharma, Nupur Prakash:
Comparison of Machine learning models for Parkinson's Disease prediction. 195-199 - Paul Gorday, Nurgün Erdöl, Hanqi Zhuang:

A Noncoherent Incremental Learning Demodulator. 200-206 - Olusola Tolulope Odeyomi:

Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed Bandit. 207-212 - Sinead V. Fernandes, Muhammad Sana Ullah

:
Phychoacoustic Masking of Delta and Time -Difference Cepstrum Features for Deception Detection. 213-217 - Michal Aibin

, Stephen Cheng, David Xiao, Aldrich Huang:
Optimization of Regenerator Placement in Optical Networks Using Deep Tensor Neural Network. 218-225 - Raghu Nandan Avula, Cliff C. Zou:

Performance Evaluation of TPC-C Benchmark on Various Cloud Providers. 226-233 - Jingang Liu, Chunhe Xia, Haihua Yan, Jie Sun:

A Feasible Chinese Text Data Preprocessing Strategy. 234-239 - Jean E. Piou:

Computation of Posterior Cramer-Rao Bounds for Deep Learning Networks. 240-244 - Kyle Spurlock

, Heba Elgazzar:
Predicting COVID-19 Infection Groups using Social Networks and Machine Learning Algorithms. 245-251 - Randy Krauss, Matthew Vaysfeld, Murad Arslaner, Gregg Vesonder:

Streamlining Smart Cities to Create Safer Spaces. 252-257 - Justina Celentano, Eman Abdelfattah:

Analyzing Gun Violence in the United States. 258-261 - Salam Ismaeel, Mirza Kamaludeen, Ali Miri:

Secure Digital Service as a Utility and the Unit of Measure. 262-267 - Abhishek Shivanna

, Sujan Ray, Khaldoon Alshouiliy, Dharma P. Agrawal:
Detection of Fraudulence in Credit Card Transactions using Machine Learning on Azure ML. 268-273 - Julie E. McKenna, Tyler R. Hopkins, Lucas T. Lavallee, Douglas E. Dow:

Knee Injury Diagnostic Device. 274-279 - Jiadao Zou, Qingxue Zhang, Kyle Frick:

Intelligent Mobile Electrocardiogram Monitor-empowered Personalized Cardiac Big Data. 280-284 - Michael Guarino, Pablo Rivas

, Casimer M. DeCusatis:
Towards Adversarially Robust DDoS-Attack Classification. 285-291 - Lanier A. Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin:

Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks. 292-297 - Lama A. Alqahtani, Hanadi M. Alotaibi, Irfan Ullah Khan, Nida Aslam

:
Automated prediction of Heart disease using optimized machine learning techniques. 298-302 - Lanier A. Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel D. Rubin:

A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy. 303-308 - Kishor Datta Gupta

, Dipankar Dasgupta, Zahid Akhtar
:
Adversarial Input Detection Using Image Processing Techniques (IPT). 309-315 - Madhuri Gurunathrao Desai, Yong Shi, Kun Suo:

IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning. 316-322 - Sivaselvan N

, Vivekananda Bhat K., Muttukrishnan Rajarajan:
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment. 323-330 - Sarra Hammoudi, Abdelhak Bentaleb, Saad Harous

, Zibouda Aliouat
:
Scheduling in IEEE 802.15.4e Time Slotted Channel Hopping: A Survey. 331-336 - Jaimie Kelley, Caileigh Marshall:

Extending Conductive Thread Use to Unintended Microcontrollers. 337-342 - Stelios Neophytou, Pavlos Tsiantis, Ilias Alexopoulos

, Ioannis Kyriakides, Camille de Veyrac, Ehson Abdi, Daniel R. Hayes:
Agile Edge Classification of Ocean Sounds. 343-348 - Qian Liu, Manfred Hauswirth:

A Provenance Meta Learning Framework for Missing Data Handling Methods Selection. 349-358 - Abdulrahman Aldhaheri, Je Lee, Khaled Almgren:

An Event Detection Platform to Detect Gender Using Deep Learning. 359-363 - Sudarshan S. Chawathe:

Analyzing Auction Data for Anomalous Bidding. 364-370 - Christine F. Reilly, Matthew Clark

:
Moving Recursion Out of the RDBMS for Transactional Graph Workloads. 371-376 - Shaimaa Ezz-ElDin, Omar Nabil, Hussam Murad, Farah Adel, Ahmed AbdEl-Jalil, Khaled Salah, Ayub Khan:

MINI-SSD: A Fast Object Detection Framework in Autonomous Driving. 377-380 - Kemal Uçak, Gülay Öke Günel:

Adaptive Sliding Mode Control based on SVR. 381-386 - Jordan Fernandes, Jack Li, Keye Li, Joseph Mirabile, Gregg Vesonder:

Exploring a Plugin-Based System for Crowd and Pathogen Simulation in Unity. 387-392 - Dennis Hou, Raymond Hou, Janpu Hou:

Interpretable Saab Subspace Network for COVID-19 Lung Ultrasound Screening. 393-398 - Indira Kalyan Dutta, Bhaskar Ghosh, Albert H. Carlson, Michael W. Totaro, Magdy A. Bayoumi:

Generative Adversarial Networks in Security: A Survey. 399-405 - Yash Shah, Shamik Sengupta:

A survey on Classification of Cyber-attacks on IoT and IIoT devices. 406-413 - Sudarshan S. Chawathe:

Estimating Predicate Selectivities in a NoSQL Database Service. 414-420 - M. Tealab, Ahmed Hassebo, A. Dabour, M. AbdelAziz:

Smart Cities Digital transformation and 5G - ICT Architecture. 421-425 - Golam Kayas, Md. Mahmud Hossain, Jamie Payton, S. M. Riazul Islam

:
VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT Networks. 426-433 - Alice Tolio, Davide Boem, Thomas Marchioro, Leonardo Badia

:
A Bayesian Game Framework for a Semi-Supervised Allocation of the Spreading Factors in LoRa Networks. 434-439 - Minh Tri Tran

, Anna Kuwana, Haruo Kobayashi:
Ringing Test for Third-Order Ladder Low-Pass Filters. 440-446 - Stephen Hopkins

, Ezhil Kalaimannan, Caroline Sangeetha John:
Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation System. 447-454 - Amina Shrestha, Rhishav Mahaju, Sandun S. Kuruppu:

Feedback Path Delay Effect on Stability of Controlled PMSMs. 455-460 - Murad Mehrab Abrar, Raian Islam, Md. Abid Hasan Shanto:

An Autonomous Delivery Robot to Prevent the Spread of Coronavirus in Product Delivery System. 461-466 - Antonio Ornatelli

, Andrea Tortorelli, Alessandro Giuseppi
:
Iterative MPC for Energy Management and Load Balancing in 5G Heterogeneous Networks. 467-471 - Giovanni Perin

, David Nophut, Leonardo Badia
, Frank H. P. Fitzek
:
Maximizing Airtime Efficiency for Reliable Broadcast Streams in WMNs with Multi-Armed Bandits. 472-478 - Gianmarco Baldini, Raimondo Giuliani, Monica Gemo:

Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform. 479-485 - Brook W. Abegaz, Naxi Shah:

Sensors based Lane Keeping and Cruise Control of Self Driving Vehicles. 486-491 - Almon Chai

, Evon Wan Ting Lim, Phei-Chin Lim:
Optimized Approach to Improve Classification of Wrist Movements via Electromyography Signals. 492-495 - Lynda Farinella, Eric Fernandes, Nathan Michener, Marco Polimeni, Gregg Vesonder:

Identification of Food Waste through Object Recognition. 496-499 - Aaron Hunter, Konstantin Boyarinov:

On the Development of Tools for Modelling Dynamic Beliefs Based on Past Data. 500-505 - Yash Parikh, Eman Abdelfattah:

Clustering Algorithms and RFM Analysis Performed on Retail Transactions. 506-511 - Elon Litman:

Computer-aided Ischemic Stroke Classification from EEG Data Using a Single-tiered Spiking Neural Network Framework. 512-516 - Shreehar Joshi, Eman Abdelfattah:

Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks. 517-521 - Carl Haberfeld, Alaa F. Sheta, Md. Shafaeat Hossain, Hamza Turabieh

, Salim Surani:
SAS Mobile Application for Diagnosis of Obstructive Sleep Apnea Utilizing Machine Learning Models. 522-529 - Alexey Lagunov, Sergey Zabolotniy

:
Mobile Natural Gas Concentration Intelligence Device Study for the Arctic. 530-535 - Colin Galen, Robert Steele:

Performance Maintenance Over Time of Random Forest-based Malware Detection Models. 536-541 - Maryam Heidari, James H. Jones:

Using BERT to Extract Topic-Independent Sentiment Features for Social Media Bot Detection. 542-547 - Logan Eisenbeiser:

Latent Walking Techniques for Conditioning GAN-Generated Music. 548-553 - Qi Wang, Xianping Wang:

Deep Convolutional Neural Network for Decoding EMG for Human Computer Interaction. 554-557 - Qi Wang, Xianping Wang:

EMG-based Hand Gesture Recognition by Deep Time-frequency Learning for Assisted Living & Rehabilitation. 558-561 - Hong Tien Vu, Quang Minh Dinh, Dai-Duong Nguyen, Minh Thuy Le

:
Simple Dual Band Rectifier Based on Diplexer for Ambient RF Energy Harvesting Application. 562-565 - Hong Yu, Joushua Lorrain, Fanming Liu, Cory Lo:

Cross-platform for the development environment of smart home system. 566-569 - Vamshi Manthena, Sandeep Miryala, Grzegorz Deptuch

, Gabriella Carini:
A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm Process. 570-576 - Zhankun Luo, Yaan Zhang, Lizhe Tan:

Multi-level Random Sample Consensus Method for Improving Structured Light Vision Systems. 577-582 - Nafiz Sadman

, Md. Manjurul Ahsan, M. A. Parvez Mahmud
:
ADCR: An Adaptive TOOL to select "Appropriate Developer for Code Review" based on Code Context. 583-591 - Fu-Shiung Hsieh:

A Particle Swarm Optimization Algorithm to Meet Trust Requirements in Ridesharing Systems. 592-595 - Narayana Darapaneni, Amitavo Basu, Sanket Savla, Raamanathan Gururajan, Najmus Saquib, Sudarshan Singhavi, Aishwarya Kale, Pratik Bid, Anwesh Reddy Paduri:

Automated Portfolio Rebalancing using Q-learning. 596-602 - Pangao Du, Xianghong Lin, Xiaomei Pi, Xiangwen Wang:

An Unsupervised Learning Algorithm for Deep Recurrent Spiking Neural Networks. 603-607 - Jordan Juliano

, Jaron Lin, Alex Erdogan, Kiran George:
Radar Pulse on Pulse Identification Parallel FFT and Power Envelope Algorithm. 609-613 - Sai G. Pavan, Binsu J. Kailath:

Reusable Spiking Neural Network Architecture. 614-620 - Xianghong Lin, Han Lu, Xiaomei Pi, Xiangwen Wang:

An FPGA-based Implementation Method for Quadratic Spiking Neuron Model. 621-627 - Aristide T.-J. Akem

, Edwin Mugume
:
A Machine Learning Approach to Temporal Traffic-Aware Energy-Efficient Cellular Networks. 628-634 - Shrikant S. Jadhav

, Clay Gloster, Jannatun Naher, Christopher C. Doss, Youngsoo Kim:
An FPGA-based Optimized Memory Controller for Accessing Multiple Memories. 635-642 - Bhaskar Ghosh, Indira Kalyan Dutta, Albert H. Carlson, Michael W. Totaro, Magdy A. Bayoumi:

An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes. 643-648 - Narayana Darapaneni, Deepali Nikam, Anagha Lomate, Vaibhav Kherde, Swanand Katdare, Anwesh Reddy Paduri, Kameswara Rao, Anima Shukla:

Coronavirus Outburst Prediction in India using SEIRD, Logistic Regression and ARIMA Model. 649-655 - Zihan Xu, Li Jiang, Yiduo Liang, Yong Jia, Guolong Cui, Longfei Tan:

Three-Dimensional Down-View Imaging Based on MIMO Through-Wall-Radar. 656-661 - Khaled Elleithy

, Thomas Arciuolo, Akram Abu-aisheh:
Implementation and Performance Evaluation of Overlay End System Multicast (ESM) for Stable and Fast Streaming of Multimedia Applications over Satellite Networks. 662-667 - Narayana Darapaneni, Rahul Choubey, Pratik Salvi, Ankur Pathak, Sajal Suryavanshi, Anwesh Reddy Paduri:

Facial Expression Recognition and Recommendations Using Deep Neural Network with Transfer Learning. 668-673 - Omar A. Zargelin, Fadel M. Lashhab, Walid K. Hasan:

Localization Methods based on Error Analysis and Modeling in One Dimension. 674-683 - Jiali Li, Rex Li, Michael B. Rahaim:

Design and Implementation of a Heterogeneous Multi-Hop OWC/RF Relay Architecture for Opportunistic Ultra-Dense Wireless Networks. 684-689 - Omar A. Zargelin, Fadel M. Lashhab, Walid K. Hasan:

Localization Methods based on Error Analysis and Modeling in Two Dimensions. 690-699 - Ryoko Nino, Takayuki Nishio, Tutomu Murase:

IEEE 802.11ad Communication Quality Measurement in In-vehicle Wireless Communication with Real Machines. 700-706 - Christopher Arnold, Jason Brown:

Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV Swarm. 707-712 - Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy:

Radio-Factor Authentication: Identity Management over the 900MHz Band. 713-719 - Md Shohel Khan, Ajoy Das, Md. Shohrab Hossain

, Husnu S. Narman
:
Prediction of Dengue Infected Areas using A Novel Blockchain based Crowdsourcing Framework. 720-726 - Hosam Alamleh

, Ali Abdullah S. AlQahtani:
Enforcing Location-based Access Policies Using the Existing IEEE 802.11 Infrastructure. 727-731 - Baker Al Smadi, Manki Min:

A Critical review of Credit Card Fraud Detection Techniques. 732-736 - Oguz Ülgen

, Serhat Erküçük, Tunçer Baykas:
Non-Orthogonal Multiple Access for Terahertz Communication Networks. 737-742 - Zubaidah Al-Mashhadani, Balasubramaniyan Chandrasekaran:

Autonomous Ripeness Detection Using Image Processing for an Agricultural Robotic System. 743-748 - Manas Abhilash Gundapuneni, Anzum Bano, Navjot Singh:

Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing. 749-755 - Joseph Finkelstein, In Cheol Jeong:

Towards Contactless Monitoring of Blood Pressure at Rest and During Exercise Using Infrared Imaging. 756-758 - William Barnhart

, Zhi Tian:
The Capacity of Multi-user Private Information Retrieval for Computationally Limited Databases. 759-763 - Ilker Kara, Murat Aydos:

Cyber Fraud: Detection and Analysis of the Crypto-Ransomware. 764-769 - Azhar Hasan Nsaif Drebee, Ahmet E. Topcu

, Yasamin Alagrash:
Healthcare Security Based on Blockchain within Multi-parameter Chaotic Map. 770-778 - Md. Turab Hossain, Md. Shohrab Hossain

, Husnu S. Narman
:
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring. 779-785 - Adam Asadoorian, Melvin Alberto, Md Liakat Ali:

Creating and Using Secure Software. 786-792 - Abena Primo:

A Comparison of Blockchain-Based Wireless Sensor Network Protocols. 793-799 - Narayana Darapaneni, Kiran Mogeraya, Shubham Mandal, Ashwin Narayanan, Prasanna Siva, Anwesh Reddy Paduri, Faisal Khan, Praful Mohan Agadi:

Computer Vision based License Plate Detection for Automated Vehicle Parking Management System. 800-805 - Kristen Tan, Karun Sekhar, Jenna Wong, Jarod Holgado, Michael Ameer, Gregg Vesonder:

Alexa Eldercare Toolbox: A Smarthome Solution for the Elderly. 806-812 - Hadi Alasti

:
An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor Networks. 813-819 - Eunseo Lee, Gregg Vesonder, Elijah Wendel:

Eldercare Robotics - Alexa. 820-825 - Soo-Yeon Ji

, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong
:
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach. 826-832 - M. A. Majid:

The largest QWI in the InGaP/InAlGaP laser structure using high compressive strain at elevated temperatures. 833-836 - Faisal Alghayadh, Debatosh Debnath:

Performance Evaluation of Machine Learning for Prediction of Network Traffic in a Smart Home. 837-842 - Maha Rita Arabia-Obedoza, Gloria Rodriguez, Amber Johnston, Fatima Salahdine, Naima Kaabouch:

Social Engineering Attacks A Reconnaissance Synthesis Analysis. 843-848 - Frederik Valocký, Martin Puchalik, Milos Orgon:

Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line. 849-854 - Nader Nagui, Omneya Attallah

, Mohamed Saad Zaghloul, Iman G. Morsi:
Smart Real-Time Autonomous Navigation System using integration of MEMS-based Low-Cost IMU/GPS. 855-861 - Leonardo Badia

, Nunzio Borra:
Crowdsensing Strategies Inspired by Choir Management Analyzed via Game Theory. 862-868 - Narayana Darapaneni, Christopher Bellarmine, Anwesh Reddy Paduri, Sujana Entoori, Abir Kumar, S. V. Vybhav, Koushik Mondal:

Movie Success Prediction Using ML. 869-874 - Siwei Zhao, Sanyami Shah, Kishan Patel, Nickyta Patel, Vachana Shetty, Michal Aibin

:
Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical Networks. 875-880 - Narayana Darapaneni, Amol Kobal, Rohit Chaoji, Rajiv Tiwari, Suman Saurav, Anwesh Reddy Paduri:

Effects of Lockdown and Post Lockdown on Covid19 cases across India using Supervised Learning Techniques. 881-887 - Bijal Patel, Haiyang Ji, Swati Nayak, Ting Ding, Yue Pan, Michal Aibin

:
On Efficient Candidate Path Selection for Dynamic Routing in Elastic Optical Networks. 889-894 - Narayana Darapaneni, Deepak Reddy, Anwesh Reddy Paduri, Pooja Acharya, H. S. Nithin:

Forecasting of COVID-19 in India Using ARIMA Model. 894-899 - Naheem Olakunle Adesina, Ashok Srivastava:

A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor Technology. 901-906 - Brett Wiens, Daniel C. Lee:

Optimal Labeling with Cyclic Gray Codes for Generalized 16PAM Constellations. 906-912 - Nourhan Muhammed, Nour Hussein, Khaled Salah, Ayub Khan:

Assertion and Coverage Driven Test Generation Tool for RTL Designs. 913-916 - Takumi Shiohara, Tutomu Murase:

QoS Control for Mission-critical Communication on Vehicles with IEEE802.11 Wireless LAN under Dynamic Interference. 917-922 - Edder Sebastian Mendoza Garibay, Muhammad Sana Ullah

:
Analysis and Synthesis of Respiratory Rate for Male Patients. 923-927 - William F. Chabala, Ismail Jouny:

Comparison of Convolutional Neural Network Architectures on Dermastopic Imagery. 928-931 - Djamila Mechta, Saad Harous

:
HC-LEACH: Huffman Coding-based energy-efficient LEACH protocol for WSN. 932-938 - Islam Amine Bouchedjera, Lemia Louail

, Zibouda Aliouat, Saad Harous
:
DCCORONA: Distributed Cluster-based Coordinate and Routing System for Nanonetworks. 939-945 - Jaron Lin, Jordan Juliano

, Alex Erdogan, Kiran George:
Pulse Separation Using Independent Component Analysis. 946-950 - Ahmed Hassebo, Mohamed A. Ali:

Robust Cellular connectivity-Based Smart LED Street Lighting System: A Platform For Innovative Mission Critical Smart City IoT Applications. 951-957 - Devaj Parikh, Kiran George:

Conceptual Neuroadaptive Brain Computer Interface for Autonomous Control of Automobile Brakes. 958-961

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














