175 | -- | 180 | Een-Kee Hong, Jung-Yeon Baek, Ye-Ok Jang, Jeehyeon Na, Kyung-Sook Kim. QoS-guaranteed scheduling for small cell networks |
181 | -- | 185 | Emtithal Ahmed, Ryuji Kohno. Error control coding and decoding with medical QoS constraints for WBAN end-to-end connection via UMTS channel |
186 | -- | 193 | Seong-Jin Park, Byung-Mok Kim, Eun-Soo Kim. Single-shot digital holographic microscopy based on computational telecentricity using a single-arm off-axis interferometer |
194 | -- | 198 | Vivekanand Jha, Nupur Prakash, Sweta Sagar. Wearable anger-monitoring system |
199 | -- | 202 | Negar Dordaie, Nima Jafari Navimipour. A hybrid particle swarm optimization and hill climbing algorithm for task scheduling in the cloud environments |
203 | -- | 208 | Udit Narayana Kar, Debarshi Kumar Sanyal. An overview of device-to-device communication in cellular networks |
209 | -- | 215 | Hayder A. A. Al-Kashoash, Fadoua Hassen, Harith Kharrufa, Andrew H. Kemp 0001. Analytical modelling of congestion for 6LoWPAN networks |
216 | -- | 220 | Shayhan Ameen Chowdhury, Mir Md. Saki Kowsar, Kaushik Deb. Human detection utilizing adaptive background mixture models and improved histogram of oriented gradients |
221 | -- | 227 | Shihan Bao, Waleed Hathal, Haitham S. Cruickshank, Zhili Sun, Phillip Asuquo, Ao Lei. A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters |
228 | -- | 233 | Alex Mouapi, Nadir Hakem, Gilles Y. Delisle. A new approach to design of RF energy harvesting system to enslave wireless sensor networks |
234 | -- | 238 | Yiqiao Wei, Seung-Hoon Hwang. Investigation of spectrum values in rural environments |
239 | -- | 242 | Alaa Mohasseb, Mohamed Bader-El-Den, Mihaela Cocea. Classification of factoid questions intent using grammatical features |
243 | -- | 246 | Swapna G., Vinayakumar R., Soman K. P.. Diabetes detection using deep learning algorithms |
247 | -- | 254 | Shallu Sharma, Rajesh Mehra. Breast cancer histology images classification: Training from scratch or transfer learning? |
255 | -- | 258 | Vinayakumar R., Soman K. P.. DeepMalNet: Evaluating shallow and deep networks for static PE malware detection |