Abstract is missing.
- MobSpiro: Mobile based spirometry for detecting COPDFatma Zubaydi, Assim Sagahyroon, Fadi A. Aloul, Hasan Mir. 1-4 [doi]
- High-accuracy localization via measurements of RSSIs and LED light angles for low-cost WMSNsYu Kawahama, Ryo Katsuma. 1-7 [doi]
- Bi-subspace saliency detectionJin Lu, Fei Dou. 1-7 [doi]
- Performance analysis of a threshold-based parallel multiple beam selection scheme for WDM-based systems for Gamma-Gamma distributionsSung Sik Nam, Changseok Yoon, Mohamed-Slim Alouini. 1-7 [doi]
- Two-step Feature Extraction in a Transform domain for face recognitionTaif Alobaidi, Wasfy B. Mikhael. 1-4 [doi]
- Mutation and memory mechanism for improving Glowworm Swarm Optimization algorithmAtheer Bassel, Mohd Jan Nordin. 1-7 [doi]
- Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet codeJames A. Jerkins. 1-5 [doi]
- New interconnection methodology of TSNs using V2X communicationJuho Lee, Sungkwon Park. 1-6 [doi]
- Designing a hybrid approach with computational analysis and visual analytics to detect network intrusionsDong Hyun Jeong, Bong-Keun Jeong, Soo-Yeon Ji. 1-7 [doi]
- Spam filtering email classification (SFECM) using gain and graph mining algorithmM. K. Chae, Abeer Alsadoon, P. W. C. Prasad, Amr Elchouemi. 1-7 [doi]
- Joint network coding and machine learning for error-prone wireless broadcastDong Nguyen 0003, Canh Nguyen, Thuan Duong-Ba, Hung Nguyen, Anh Nguyen, Tuan Tran 0001. 1-7 [doi]
- Evaluating marijuana-related tweets on TwitterAnh Nguyen, Quang Hoang, Hung Nguyen, Dong Nguyen 0003, Tuan Tran 0001. 1-7 [doi]
- Optimizations of cooperative spectrum sensing with reporting errors over myriad fading channelsShumon Alam, Annamalai Annamalai, Cajetan M. Akujuobi. 1-5 [doi]
- Maximizing available diversity in a MIMO fading channelWeilian Su, Wei Gee Ng, Tri Ha. 1-7 [doi]
- A probabilistic approach for threaded process learningMaha Zayoud, Soraia Oueida, Yehia Kotb, Pierre AbiChar. 1-6 [doi]
- Proposal of the Virtualized Control system for the integrated management of multiple servicesSatoshi Kodama, Rei Nakagawa, Toshimitsu Tanouchi. 1-5 [doi]
- Analysis of optical OFDM based wireless LANSalih Kenshil, Gasem Rashwan, Mohamed Matin. 1-5 [doi]
- Co-simulation of cyber-physical systems using HLAThomas Nägele, Jozef Hooman. 1-6 [doi]
- Modelling of clustering with relay nodes in wireless sensor networksManel Souissi, Aref Meddeb. 1-6 [doi]
- On increasing the energy efficiency of cognitive radio network base stationsEfe Francis Orumwense, Thomas J. Afullo, Viranjay M. Srivastava. 1-6 [doi]
- DCnet: A new data center network architectureDouglas Comer, Rajas H. Karandikar, Adib Rastegarnia. 1-6 [doi]
- MAC sub-layer design to reduce interference in LTE networksWeilian Su, Kim Hong Tan, Ric A. Romero, Tri T. Ha. 1-8 [doi]
- Developing countries and Internet-of-Everything (IoE)Asim Majeed. 1-4 [doi]
- Scalability in mobile Ad hoc networks with Brownian mobilityLina Abou Haibeh, Nadir Hakem, Ousama Abu Safia. 1-2 [doi]
- Minimizing energy consumption of smart grid data centers using cloud computingShahab Tayeb, Miresmaeil Mirnabibaboli, Lina Chato, Shahram Latifi. 1-5 [doi]
- Internet Transit Access Point placement and bandwidth allocation in Wireless Mesh NetworksLiqaa Nawaf, Stuart M. Allen, Omer Rana. 1-8 [doi]
- A specialized event-driven network simulator for security and anonymity applications of Wireless Sensor NetworksAnas Bushnag, Ausif Mahmood. 1-6 [doi]
- Multiple distance sensors based smart stick for visually impaired peopleSharang Sharma, Manind Gupta, Amit Kumar, Meenakshi Tripathi, Manoj Singh Gaur. 1-5 [doi]
- Deterministic consumer applications enabled Policy Architecture of Mobile Edge Computing ecosystemVikas S. Shah. 1-7 [doi]
- Gender prediction on a real life blog data set using LSI and KNNJianle Chen, Tianqi Xiao, Jie Sheng, Ankur Teredesai. 1-6 [doi]
- Interactive clothes based on IOT using NFC and Mobile ApplicationKishore Kumar Reddy N. G., Rajeshwari K.. 1-4 [doi]
- Input/output processing using on-chip memory for Cyber Physical SystemHoang Nguyen, Hakduran Koc. 1-6 [doi]
- Recognition of human activities using machine learning methods with wearable sensorsLong Cheng, Yani Guan, Kecheng Zhu, Yiyang Li. 1-7 [doi]
- Proposal of a communication structure model for activating reactive signaling in an emergency evacuation systemsAndres Munoz-Arcentales, Wendy Yanez-Pazmino, Washington Velasquez Vargas. 1-5 [doi]
- Efficient indoor exploration using mobile nodes by maintaining communicable regionKenshin Terada, Kodai Ogura, Ryo Katsuma. 1-7 [doi]
- Performance evaluation of VoIP calls over MANET for different voice codecsLina Abou Haibeh, Nadir Hakem, Ousama Abu Safia. 1-6 [doi]
- Spatial sampling requirements for Received Signal Level measurements in cellular networksAbdlmagid Basere, Ivica Kostanic. 1-4 [doi]
- Next generation wireless-LAN: Security issues and performance analysisKyle McHugh, Walter Akpedeye, Thaier Hayajneh. 1-7 [doi]
- Enhancing electric load forecasting of ARIMA and ANN using adaptive Fourier seriesMaged M. Eljazzar, Elsayed E. Hemayed. 1-6 [doi]
- A personalized time-bound activity Recommendation SystemRohin Mittal, Vaibhav Sinha. 1-7 [doi]
- Noise cancellation in cognitive radio systems: A performance comparison of evolutionary algorithmsAdnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch. 1-7 [doi]
- Low-bandwidth transmission algorithm for reliable wireless communicationEvangelos A. Yfantis, Masanori Nakakuni, Ernesto Zamora Ramos. 1-5 [doi]
- Techniques for dealing with uncertainty in cognitive radio networksFatima Salahdine, Naima Kaabouch, Hassan El Ghazi. 1-6 [doi]
- Optically reconfigurable gate array platform for mono-instruction set computer architectureHiroki Shinba, Minoru Watanabe. 1-4 [doi]
- Discrete Wavelet Transform based V-I image fusion with Artificial Bee Colony OptimizationAnkita Chatterjee, Mainak Biswas, Debasis Maji, Debashis Jana, Subhajit Brojabasi, Gautam Sarkar, Ayoshna Saha, Arnab Kumar Saha, Allama Hossain, Sampriti Podder, Sanchari Das, Ankhi Bhattacharya. 1-4 [doi]
- A volatility-driven stock trading framework based on automated, short-term recommendation methodSiddharth Das. 1-6 [doi]
- A probabilistic graphical model for learning as searchChandra N. Sekharan. 1-4 [doi]
- Embedding cryptographically secure matrix transformation in structured Compressive SensingRomeo Ayemele Djeujo, Christoph Ruland. 1-7 [doi]
- C(0) protocol based cooperative wireless communication over Nakagami-m fading channels: PEP and SER analysis at optimal powerRavi Shankar, Km Niharika Pandey, Aradhana Kumari, Vikash Sachan, Ritesh Kumar Mishra. 1-7 [doi]
- Large scale border security systems modeling and simulation with OPNETMosad Alkhathami, Lubna K. Alazzawi, Ali M. Elkateeb. 1-8 [doi]
- An infrastructure as a Service for Mobile Ad-hoc CloudVenkatraman Balasubramanian 0002, Ahmed Karmouch. 1-7 [doi]
- NTLV algorithm: Critical path analysis in connected vehicles using network tomographyMounika Kasaraneni, Mohammad. S. Khan. 1-5 [doi]
- Kernel based principal axis treeQiaozhi Li, Jie Sheng, Ankur Teredesai. 1-4 [doi]
- Understanding sensor data with uncertainty using a visual representationJihun Lee, Bong-Keun Jeong. 1-2 [doi]
- Clock signal characterization for signal integrityAhmed Saeed 0005, Alaa E. El-Rouby, Yehea I. Ismail, Hani F. Ragai. 1-6 [doi]
- Recent trends in the Internet of ThingsHimadri Nath Saha, Abhilasha Mandal, Abhirup Sinha. 1-4 [doi]
- Jol-Shinchon: Design and development of a sensor based intelligent auto irrigation systemK. M. Ragibul Haque, M. Abu Muyeed, Shahriar Sadat, Rajesh Palit. 1-5 [doi]
- Real-time server overloaded monitoring algorithm using back propagation artificial neural networkJongouk Choi, Chi Shen, Jens Hannemann, Siddhartha Bhattacharyya. 1-7 [doi]
- An implemented, initialization algorithm for many-dimension, Monte Carlo circuit simulations using SpiceMichael A. Turi, José G. Delgado-Frias. 1-4 [doi]
- Generation of vital event notifications from DHIS2 for strengthening CRVS systemFarzana Haque, Fouzia Tamanna, Rajesh Palit. 1-5 [doi]
- Cross-platform machine learning characterization for task allocation in IoT ecosystemsWanlin Cui, Yeseong Kim, Tajana S. Rosing. 1-7 [doi]
- Linkography ontology refinement and cyber securityRobert Mitchell, Andrew Fisher, Scott Watson, John Jarocki. 1-9 [doi]
- Fall detection system for the elderlyJoseph Santiago, Eric Cotto, Luis Gabriel Jaimes, Idalides J. Vergara-Laurens. 1-4 [doi]
- Intelligent traffic management system for cross section of roads using computer visionTousif Osman, Shahreen Shahjahan Psyche, J. M. Shafi Ferdous, Hasan U. Zaman. 1-7 [doi]
- Human activity recognition based on compressed sensingLong Cheng, Yiyang Li, Yani Guan. 1-7 [doi]
- Conversion of wasted heat energy into electrical energy using TEGHasan U. Zaman, Chowdhury Erfan Shourov, Abdullah-Al Mahmood, Noor E. Alam Siddique. 1-5 [doi]
- Vehicle Make and Model classification system using bag of SIFT featuresMuhammad Asif Manzoor, Yasser L. Morgan. 1-5 [doi]
- Remote patients monitoring: ChallengesAssim Sagahyroon. 1-4 [doi]
- An overview of Wireless Sensor Networks towards internet of thingsMustafa Kocakulak, Ismail Butun. 1-6 [doi]
- Cloud for Engineering Education: Learning networks for effective student engagementNatasha Madhav, Meera K. Joseph. 1-4 [doi]
- Privacy and trust relations in Internet of Things from the user point of viewIsmail Butun. 1-5 [doi]
- A real-time flood alert system for parking lotsHomar Baez, Idalides J. Vergara-Laurens, Luz Torres-Molina, Luis Gabriel Jaimes, Miguel A. Labrador. 1-5 [doi]
- COLAP: A predictive framework for service function chain placement in a multi-cloud environmentLav Gupta, Mohammed Samaka, Raj Jain, Aiman Erbad, Deval Bhamare, Chris Metz. 1-9 [doi]
- A genetic algorithm to optimize the adaptive Support Vector Regression model for forecasting the reliability of diesel engine systemsLina Chato, Shahab Tayeb, Shahram Latifi. 1-7 [doi]
- Source separation based on transfer function between microphones and its dispersionSayuri Kohmura, Taro Togawa, Takeshi Otani. 1-6 [doi]
- A Feedback-based Admission Control Unit for QoS provision of video Transmission over WLANsAli Mohammed Mansoor, Mohammed A. Al-Maqri, Aznul Qalid Md Sabri, Hamid A. Jalab, Ainuddin Wahid Abdul Wahab, Wagdy kahtan Al-kopati. 1-6 [doi]
- Efficient edge analytics in Internet-of-Things (IoT)Asim Majeed. 1-4 [doi]
- SEU tolerance of FinFET 6T SRAM, 8T SRAM and DICE memory cellsAhmed S. Sajit, Michael A. Turi. 1-5 [doi]
- Spectrum energy based voice activity detectionJing Pang. 1-5 [doi]
- Accelerating the Mobile cloud: Using Amazon Mobile Analytics and k-means clusteringMatthew Beck, Wei Hao, Alina Campan. 1-7 [doi]
- A distributed system model for managing data ingestion in a wireless sensor networkWashington Velasquez Vargas, Andres Munoz-Arcentales, Joaquin Salvachua Rodriguez. 1-5 [doi]
- A zoning algorithm for dynamic cyber zone defenseMarci McBride, Robert Mitchell. 1-6 [doi]
- Resilient packet delivery through software defined redundancy: An experimental studyDouglas Comer, Rajas H. Karandikar, Adib Rastegarnia. 1-6 [doi]
- The impact of tree-obstructed propagation environments on the performance of wireless sensor networksAbdallah Aldosary, Ivica Kostanic. 1-7 [doi]
- An optimized SNR estimation technique using particle swarm optimization algorithmMohsen Riahi Manesh, Adnan Quadri, Sriram Subramaniam, Naima Kaabouch. 1-6 [doi]
- Self-adjustment downlink transmission power for femtocells in co-channel deployment in heterogeneous networksSultan Alotaibi, Robert Akl. 1-6 [doi]
- Correlation discovery between high school Student Web Queries and their Grade Point AverageJigar Jadav, Andrew M. Burke, Greg Goldberg, Dawn Lindelin, Andrew Preciado, Charles C. Tappert, Michael Kollmer. 1-7 [doi]
- Low-cost, real-time obstacle avoidance for mobile robotsShawn Ricardo, Doina Bein, Anand Panagadan. 1-7 [doi]
- Double-Hashing Operation Mode for EncryptionSultan Almuhammadi, Ahmad Amro. 1-7 [doi]
- Hierarchical power analysis attack for falsification detection cipherMasaya Yoshikawa, Yusuke Nozaki. 1-6 [doi]
- MMC-based phase partitioning for data intensive applicationsHakduran Koc, Mehmet Ucar. 1-4 [doi]
- A survey on IoT communication and computation frameworks: An industrial perspectiveShahab Tayeb, Shahram Latifi, Yoohwan Kim. 1-6 [doi]
- Toward detecting accidents with already available passive traffic informationRobert W. Thomas, Jose M. Vidal. 1-4 [doi]
- Internet of Things (IoT): A verification frameworkAsim Majeed. 1-3 [doi]
- A location-aided flooding mechanism in community-based IoT networksWei Liu, Kiyohide Nakauchi, Yozo Shoji. 1-6 [doi]
- Collision analysis of driving scenariosEric Watkins, Matt Kloc, Shane Weerasuriya, Mohamad El Hajj. 1-7 [doi]
- Person re-identification using color name descriptor-based sparse representationMiri Kim, Jaehoon Jung, Hyuncheol Kim, Joonki Paik. 1-4 [doi]
- Password-free authentication for social networksErol Ozan. 1-5 [doi]
- Quantitative measures to evaluate neural network weight initialization strategiesErnesto Zamora Ramos, Masanori Nakakuni, Evangelos Yfantis. 1-7 [doi]
- A method and implementation for the empirical study of deleted file persistence in digital devices and mediaJames H. Jones, Tahir M. Khan. 1-7 [doi]
- Half-iteration early termination of turbo decodingMohammed AlMahamdy, Jeffrey Dill. 1-5 [doi]
- A modular architecture for scalable inter-domain routingYoshihiro Nozaki, Erik F. Golen, Nirmala Shenoy. 1-6 [doi]
- Global communication coverage using CubesatsWeilian Su, Jianwen Lin, Tri T. Ha. 1-7 [doi]
- Evaluation of software quality in the TopCoder crowdsourcing environmentXin Wang, Wenjun Wu, Zhenghui Hu. 1-6 [doi]
- FICUR: Employing SDN programmability to secure ARPAjay Nehra, Meenakshi Tripathi, M. S. Gaur. 1-8 [doi]
- Recognizing AR markers using optical illusion markers and a low-cost cameraDaisuke Horie, Ryo Katsuma. 1-7 [doi]
- Outage probability estimation technique based on a Bayesian model for cognitive radio networksTarek Elderini, Naima Kaabouch, Hector Reyes. 1-6 [doi]
- Design of Binary Spray and wait protocol for intermittently connected mobile networksP. Maitreyi, M. Sreenivas Rao. 1-3 [doi]
- Analysis of PAPR hybrid reduction technique based on PTS and SLMGasem Rashwan, Salih Kenshi, M. Matin. 1-4 [doi]
- A cost effective way to build a web controlled search and CO detector roverAli Adib Arnab, Sheikh Sadia Afrin, F. M. Fahad, Hasan U. Zaman. 1-6 [doi]
- Implementation of HEVC decoder in distributed mobile embedded systemLiu Wei, Yeongkwang Park, Yongbeom Cho. 1-5 [doi]
- Energy efficient transmit antenna selection for MIMO systems: A cross layer approachElizabeth M. Okumu, Mqhele E. Dlodlo. 1-6 [doi]
- Routing in CarRing 4 - a transparent communication mean for field buses and LANsA. Obeid, H. Richter. 1-8 [doi]
- Comparison of energy consumption in Wi-Fi and bluetooth communication in a Smart BuildingGuntur Dharma Putra, Azkario Rizky Pratama, Alexander Lazovik, Marco Aiello 0001. 1-6 [doi]
- Holistic DDoS mitigation using NFVTalal Alharbi, Ahamed Aljuhani, Hang Liu. 1-4 [doi]
- On a cyberinfrastructure platform for multidisciplinary, data-intensive scientific researchXiangrong Ma, Zhao Fu, Yingtao Jiang, Mei Yang, Haroon Stephen. 1-6 [doi]
- On the development of intelligent optical inspectionsJohannes Richter, Detlef Streitferdt, Elena Rozova. 1-6 [doi]
- Circuit design to improve security of telecommunication devicesHengameh Bahrami, Khosrow Hajsadeghi. 1-4 [doi]
- Complex analysis of united states flight data using a data mining approachMegan Baluch, Tristan Bergstra, Mohamad El Hajj. 1-6 [doi]
- Spectral and energy efficiency for massive MIMO systems using exponential correlation modelSaleh Albdran, Ahmed Alshammari, Mohammad A. Matin. 1-5 [doi]
- No-reference image quality metric based on features evaluationOmar Alaql, Kambiz Ghazinour, Cheng-Chang Lu. 1-7 [doi]
- Performance evaluation of network productivity for LTE heterogeneous networks with reward-penalty weights assessmentUttara Sawant, Robert Akl. 1-6 [doi]
- Event detection on large social media using temporal analysisAbdulrahman Aldhaheri, JeongKyu Lee. 1-6 [doi]
- Design optimization of delay-constrained routing in wireless sensor networksManel Souissi, Aref Meddeb. 1-6 [doi]
- Network delay modeling in Mobile Wireless Mesh Networks using Network TomographyRohan N. Pradhan, Mohammad S. Khan, Mais Nijim, Rajab Challoo. 1-8 [doi]
- A step towards the linking of the Culture Heritage in the Egyptian museumsNashwa Nabil Owais, Haytham Tawfeek al Feel, Ehab Ezzat Hassanein. 1-7 [doi]
- Real-Time Peak Control algorithm using Stochastic OptimizationMoses Amoasi Acquah, Sekyung Han, Hongjoon Kim, Soonwoo Park, Heeje Han. 1-6 [doi]
- An Enhanced Voting Algorithm for Hybrid Jamming attacks in VANETMohamed S. Mohamed, Sherif Hussein, Axel Krings. 1-7 [doi]
- The effect of channel spatial correlation on capacity and energy efficiency of massive MIMO systemsAhmed Alshammari, Saleh Albdran, Mohammad Matin. 1-5 [doi]
- A new approach to data center infrastructure monitoring and management (DCIMM)Moises Levy, Jason O. Hallstrom. 1-6 [doi]
- Virtualized Network Functions security attacks and vulnerabilitiesAhamed Aljuhani, Talal Alharbi. 1-4 [doi]
- C2Cloud: A cloud computing frameworkTyrone S. Toland. 1-7 [doi]
- Design and evaluation of hierarchical hybrid automatic modulation classifier using software defined radiosJithin Jagannath, Daniel O'Connor, Nicholas Polosky, Brendan Sheaffer, Svetlana Foulke, Lakshmi Narasimhan Theagarajan, Pramod K. Varshney. 1-7 [doi]
- Distributed MPI cluster with Docker Swarm modeNikyle Nguyen, Doina Bein. 1-7 [doi]
- Using semi-supervised machine learning to address the Big Data problem in DNS networksLanier Watkins, Sean Beck, Jared Zook, Anna Buczak, Jeffrey S. Chavis, William H. Robinson, Jose Andre Morales, Samuel Mishra. 1-6 [doi]
- Design and implementation of a fingerprint based lock system for shared accessJayasree Baidya, Trina Saha, Ryad Moyashir, Rajesh Palit. 1-6 [doi]
- Vector sensor based channel equalizer for underwater communication systemsFarheen Fauziya, Brejesh Lall, Monika Agrawal. 1-5 [doi]
- Selecting influential and trustworthy neighbors for collaborative filtering recommender systemsZiyang Zhang, Yuhong Liu, Zhigang Jin, Rui Zhang. 1-7 [doi]
- An investigation of Bluetooth security vulnerabilitiesPeter Cope, Joseph Campbell, Thaier Hayajneh. 1-7 [doi]
- A simulator for spotlight SAR image formationEric J. Balster, Frank A. Scarpino, Andrew M. Kordik, Kerry L. Hill. 1-5 [doi]
- Toward digital transmitters with Amplitude Shift Keying and Quadrature Amplitude Modulators implementation examplesAmean Al Safi, Bradley J. Bazuin. 1-7 [doi]
- Simplified FADE with sharing feature (SFADE+): A overlay approach for cloud storage systemRaisa Nusrat, Rajesh Palit. 1-6 [doi]
- Maximum distance estimation of far-field model for underwater magnetic field communicationJiaxin Zhou, Jianyong Chen. 1-5 [doi]
- Overcoming the challenge for text classification in the open worldTri Doan, Jugal Kalita. 1-7 [doi]
- Total harmonics distortion reduction using adaptive, Weiner, and Kalman filtersLiqaa Alhafadhi, Johnson Asumadu, Amean Alsafi. 1-8 [doi]
- Applying software engineering processes for big data analytics applications developmentJameela Al-Jaroodi, Brandon Hollein, Nader Mohamed. 1-7 [doi]
- Risk analysis in Internet of Things using EBIOSBerrehili Fatima Zahra, Belmekki Abdelhamid. 1-7 [doi]
- A broad overview of GPS fundamentals: Now and futureSaffet Vatansever, Ismail Butun. 1-6 [doi]
- Classification of Student Web QueriesJigar Jadav, Andrew M. Burke, Pratik Dhiman, Michael Kollmer, Charles C. Tappert. 1-7 [doi]
- Future stress, forecasting physiological signalsLuis Gabriel Jaimes, Kanwalinderjit Gagneja, Mustafa Ilhan Akbas, Idalides J. Vergara-Laurens. 1-5 [doi]
- StAdHyTM: A Statically Adaptive Hybrid Transactional Memory: A scalability study on large parallel graphsMohammad A. Qayum, Abdel-Hameed A. Badawy, Jeanine E. Cook. 1-7 [doi]
- Dynamic Economic Emission Dispatch using self-adaptive multivariate distribution based modified Real Coded Genetic AlgorithmDebashis Jana, Ankita Chatterjee, Niladri Chakraborty, Ayoshna Saha, Arnab Kumar Saha, Allama Hossain, Sampriti Podder, Sanchari Das, Ankhi Bhattacharya. 1-5 [doi]
- Compressive sensing: Performance comparison of sparse recovery algorithmsYouness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui. 1-7 [doi]
- SuperCaly: Smart life assistance by integrating a calendar app with location tracking, media organization and social connectionIlmi Yoon, Gary Ng, Xuejing Dong, Haichuan Duan, Anu Aggarwal, Rujoota Shah, Gloria Ku. 1-7 [doi]