Abstract is missing.
- Online algorithm for controlling an inverted pendulum system under uncertainty in design parameters and initial conditions using Monte-Carlo simulationAl-Bakri Fawaz, Muhi Laheeb, Khafaji Salwan. 1-7 [doi]
- Estimating the location of a nuclear source in a three-dimensional environment using a two-stage adaptive algorithmUpasana Bhattacharyya, Carl Baum. 8-14 [doi]
- Study on fraud detection of telecom industry based on rough setChunlai Zhou, Ziyan Lin. 15-19 [doi]
- A new cyclic cryptographic algorithmE. A. Yfantis. 20-25 [doi]
- An adaptive K-NN based on multiple services set identifiers for indoor positioning system with an ensemble approachAhmed K. Abed, Hussein Al-Moukhles, Ikhlas Abdel-Qader. 26-32 [doi]
- A framework for sparse adaptive system identification via integrating a new multiple time-varying stepsize and zero-attracting techniquesHaider Abdallatif Mohamed K, Ikhlas Abdel-Qader. 33-39 [doi]
- Compact representations of character-setsSudarshan S. Chawathe. 40-46 [doi]
- Lexical text segmentation using dictionariesSudarshan S. Chawathe. 47-53 [doi]
- Simultaneous scheduling of machines and automated guided vehicles utilizing heuristic search algorithmAmirabbas Tabatabaei, Farshid Torabi, Tontiwachwuthikul Paitoon. 54-59 [doi]
- A novel credit scoring model based on optimized random forestXingzhi Zhang, Yan Yang, Zhurong Zhou. 60-65 [doi]
- Enhanced dynamic cyber zone defenseMarci McBride, Robert Mitchell. 66-71 [doi]
- A Bi-level heuristic solution for the nurse scheduling problem based on shift-swappingAhmed Youssef, Samah Senbel. 72-78 [doi]
- Convolutional neural networks for radar emitter classificationLindsay Cain, Jeffrey Clark, Eric Pauls, Ben Ausdenmoore, Richard Clouse, Ted Josue. 79-83 [doi]
- Optimizing routine collection efficiency in IoT based garbage collection monitoring systemsShinjini Ray, Sayan Tapadar, Suhrid Krishna Chatterjee, Robin Karlose, Sudipta Saha, Himadri Nath Saha. 84-90 [doi]
- A Machine Learning Based Approach for Hand Gesture Recognition using Distinctive Feature ExtractionHimadri Nath Saha, Sayan Tapadar, Shinjini Ray, Suhrid Krishna Chatterjee, Sudipta Saha. 91-98 [doi]
- Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home)Veton Kepuska, Gamal Bohouta. 99-103 [doi]
- The ODNI-OUSD(I) xpress challenge: An experimental application of artificial intelligence techniques to National Security Decision SupportDavid M. Isaacson. 104-109 [doi]
- Movie genre preference prediction using machine learning for customer-based informationHaifeng Wang, Haili Zhang. 110-116 [doi]
- A framework of Urdu topic modeling using latent dirichlet allocation (LDA)Khadija Shakeel, Ghulam Rasool Tahir, Irsha Tehseen, Mubashir Ali. 117-123 [doi]
- A novel host intrusion detection system using neural networkParisa Lotfallahtabrizi, Yasser L. Morgan. 124-130 [doi]
- Extended cox proportional hazard model to analyze and predict conversion from mild cognitive impairment to alzheimer's diseaseAbdalrahman Alsaedi, Ikhlas Abdel-Qader, Niaz Mohammad, Alvis C. Fong. 131-136 [doi]
- Data Clustering using a Hybrid of Fuzzy C-Means and Quantum-behaved Particle Swarm OptimizationSaptarshi Sengupta, Sanchita Basak, Richard Alan Peters. 137-142 [doi]
- Movie recommendation system using clustering and pattern recognition networkMuyeed Ahmed, Mir Tahsin Imtiaz, Raiyan Khan. 143-147 [doi]
- Vehicle make and model recognition using random forest classification for intelligent transportation systemsMuhammad Asif Manzoor, Yasser L. Morgan. 148-154 [doi]
- ByteWise: A case study in neural network obfuscation identificationLuke Jones, Delbert Christman, Sebastian Banescu, Martin C. Carlisle. 155-164 [doi]
- Fast-data architecture proposal to alert people in emergencyWashington Velasquez, Andres Munoz-Arcentales, Joaquín Salvachúa. 165-168 [doi]
- Compressed residual-VGG16 CNN model for big data places image recognitionHussam Qassim, Abhishek Verma, David Feinzimer. 169-175 [doi]
- Intelligent travel chatbot for predictive recommendation in echo platformAshay Argal, Siddharth Gupta, Ajay Modi, Pratik Pandey, Simon Shim, Chang Choo. 176-183 [doi]
- Problem solving chatbot for data structuresAnkil Shah, Bhargav Jain, Bhavin Agrawal, Saurabh Jain, Simon Shim. 184-189 [doi]
- The effect of weight errors on neural networksAustin P. Arechiga, Alan J. Michaels. 190-196 [doi]
- Facial asymmetry versus facial makeupSinjini Mitra, Mikhail I. Gofman, Gregory Parsons, Jessie Peissig. 197-203 [doi]
- Comparison of shallow and deep neural networks for network intrusion detectionDaniel E. Kim, Mikhail Gofman. 204-208 [doi]
- Student pass rates prediction using optimized support vector machine and decision treeXiaofeng Ma, Zhurong Zhou. 209-215 [doi]
- Supervised question answering system for technical supportSimon Shim, Gaurav Chodwadia, Kavish Jain, Chirag Patel, Ekta Sorathia, Chang Choo. 216-220 [doi]
- Improve customer experience based on recommendation and detection of a pattern change in eating habitsAndres Munoz-Arcentales, A. Montoya, T. Marjorie Chalen, Washington Velasquez. 221-225 [doi]
- Development of digitalization of leased land in BangladeshAbhijit Thakur, Shakib Chowdhury, Tasmia Bhuiyan. 226-232 [doi]
- Exhaustive community enumeration on a clusterChristian Trefftz, Hugh McGuire, Zack Kurmas, Jerry Scripps, Juan D. Pineda. 233-237 [doi]
- Predicting ICU death with summarized patient dataK. M. D. Muthumali Karunarathna. 238-247 [doi]
- An analysis of rock climbing sport regarding performance, sponsorship, and healthHuy Huynh, Elliott Sobek, Mohamad El Hajj, Sunny Atwal. 248-254 [doi]
- Prediction of dementia by increasing subspace size in rank forestSalyean Giri, Abeer Alsadoon, Chandana Withana, Salih Ali, A. Elchouemic. 255-260 [doi]
- Unsupervised classification of online community input to advance transportation servicesGargi Kulkarni, Lourdes V. Abellera, Anand Panangadan. 261-267 [doi]
- Efficient parallelization for big data collaborative recommendation decisionsEmelia Opoku Aboagye, Jianbin Gao, Ampoma Affum Emmanuel. 268-274 [doi]
- An attempt to analyze data distribution for abnormal behaviorsYong Shi. 275-280 [doi]
- FraudFind: Financial fraud detection by analyzing human behaviorMarco Sánchez, Jenny Torres, Patricio Zambrano, Pamela Flores. 281-286 [doi]
- Toward metadata removal to preserve privacy of social media usersShahab Tayeb, Abigail Week, Joshua Yee, Mayra Carrera, Kuira Edwards, Vicki Murray-Garcia, Meghann Marchello, Justin Zhan, Matin Pirouz. 287-293 [doi]
- Parallel progressive sequential pattern (PPSP) miningAmik Singh, Mohit Gupta, Manoj Misra. 294-300 [doi]
- Prediction of industrial wastewater quality parameters based on wavelet de-noised ANFIS modelZhao Fu, Jiao Cheng, Mei Yang, Jacimaria Batista. 301-306 [doi]
- A user-based K-means clustering offloading algorithm for heterogeneous networkWeijie Qi, Baoling Zhang, Bozhong Chen, Jie Zhang. 307-312 [doi]
- Security, SDN, and VANET technology of driver-less carsAndrew Ydenberg, Navtej Heir, Bob Gill. 313-316 [doi]
- Mitigating wormhole attack in MANET using absolute deviation statistical approachSayan Majumder, Debika Bhattacharyya. 317-320 [doi]
- A new live video streaming approach based on Amazon S3 pricing modelYun Tian, Ryan Babcock, Carol Taylor, Yanqing Ji. 321-328 [doi]
- Development of a new cloudlet content caching algorithm based on web miningZiyin Zhang, Wei Hao. 329-335 [doi]
- Web application for social networking using RTCNileshkumar Pandey, Doina Bein. 336-340 [doi]
- Edge network model based on double dimensionJun Yin, Riaz Ali, Li Li, Weiyin Ma, Ahmad Ali. 341-346 [doi]
- Cloud computing security challenges & solutions-A surveySrijita Basu, Arjun Bardhan, Koyal Gupta, Payel Saha, Mahasweta Pal, Manjima Bose, Kaushik Basu, Saunak Chaudhury, Pritika Sarkar. 347-356 [doi]
- Considerations for deploying a geographically distributed video conferencing systemBoris Grozev, George Politis, Emil Ivov, Thomas Noël. 357-361 [doi]
- A learning-based cost management system for cloud computingQuan Ding, Bo Tang 0011, Prakash Manden, Jin Ren. 362-367 [doi]
- Women in computer science: A liberal arts perspectiveJuliette Miller, Chetan Jaiswal. 368-374 [doi]
- LifeSim: A lifetime reliability simulator for manycore systemsR. Rohith, Vijeta Rathore, Vivek Chaturvedi, Amit Kumar Singh, Thambipillai Srikanthan, Siew Kei Lam. 375-381 [doi]
- Performance evaluation of ternary computation in SRAM design using graphene nanoribbon field effect transistorsDivya Geethakumari Anil, Yu Bai 0004, Yoonsuk Choi. 382-388 [doi]
- Chip design for turbo encoder module for in-vehicle systemMajeed Nader, Yunrui Li, John Q. Liu. 389-393 [doi]
- Towards understanding application performance and system behavior with the full dynticks featureAbdullah Aljuhni, C. Edward Chow, Amer Aljaedi, Shaji Yusuf, Francisco Torres-Reyes. 394-401 [doi]
- Handwritten digit recognition system on an FPGAJiong Si, Sarah L. Harris. 402-407 [doi]
- A novel design of flip-flop circuits using quantum dot cellular automata (QCA)Ratna Chakrabarty, Dipak Kumar Mahato, Abhisekh Banerjee, Sayantani Choudhuri, Moumita Dey, N. K. Mandal. 408-414 [doi]
- Low power shorted gate fin-FET based high performance amplifierHimandri Nath Saha, Pooja Joshi, Shreya Mondal, Fahim Karim, Ravi Kumar, Amitosh Banerjee, Pooja Singh, Subham Sha. 415-420 [doi]
- Performance optimization in flip flop circuit designHimadri NathSaha, Pooja Joshi, Adriza Chattopadhyay, Barsha Deb, Anurupa Ghosh, Puja Kumari, Dipak Kumar Mahato, Sayantani Choudhuri, Sayani Bhattacharjee, Sourav Chattopadhyay, Pranami Dash, Basab BijoyGharai. 421-423 [doi]
- Online algorithm for controlling a cruise system under uncertainty in design parameters and environmental conditions using Monte-Carlo simulationMuhi Laheeb, Khafaji Salwan, Al-Bakri Fawaz, Lami Sarah. 424-430 [doi]
- A game theoretic model of computer network exploitation campaignsRobert Mitchell, Brian Healy. 431-438 [doi]
- Space effective and encrypted QR code with sender authorized security levelsSuhrid Krishna Chatterjee, Sudipta Saha, Zubayr Khalid, Himadri Nath Saha, Pritam Paul, Robin Karlose. 439-443 [doi]
- A generalized methodology for designing non-linear elements in symmetric cryptographic primitivesChuck Easttom. 444-449 [doi]
- Applying sigmoid filter for detecting the low-rate denial of service attacksRashed Rabie, Maroua Drissi. 450-456 [doi]
- Impact of privacy invasion in social network sitesAmrit Regmi, Abeer Alsadoon, Chandana Withana, Salih Ali, A. Elchouemic. 457-462 [doi]
- Securing data forwarding against blackhole attacks in mobile ad hoc networksElbasher Elmahdi, Seong-Moo Yoo, Kumar Sharshembiev. 463-467 [doi]
- Secure error correction using multiparty computationMohammad G. Raeini, Mehrdad Nojoumian. 468-473 [doi]
- Identity-based network security for commercial blockchain servicesCasimer DeCusatis, Marcus Zimmermann, Anthony Sager. 474-477 [doi]
- Management of information security indicators under a cognitive security modelRoberto Andrade, Jenny Torres, Pamela Flores. 478-483 [doi]
- A new elliptic cryptographic algorithmE. F. Dettrey, E. A. Yfantis. 484-489 [doi]
- Using combinatorial testing for distributed automotive features: Applying combinatorial testing for automated feature-interaction-testingSven Dominka, Michael Mandl, Michael Dübner, Dominik Ertl. 490-495 [doi]
- HTTP timed redirection to reduce the energy use of serversMehrgan Mostowfi. 496-501 [doi]
- A communication benchmark tailored to intel broadwell nodes and tuned to the DEAC clusterRiana J. Freedman, Damian Valles. 502-508 [doi]
- Examination of breaker-based protection systems for implementation in LVDC SSCB applicationsIbrahim Almutairy, Johnson Asumadu. 509-514 [doi]
- Power allocation for multi-homing heterogeneous network aided by energy harvestingPeibo Wen, Lilin Dan, Ruimeng Gan, Yue Xiao, Bin Fu. 515-519 [doi]
- Optimizing energy consumption in cyber physical systems using multiple operating modesHakduran Koc, Pranitha P. Madupu. 520-525 [doi]
- Energy efficiency enhancement via power modification with simulated annealing cell selectionKan Lin, Jie Zhang. 526-531 [doi]
- An energy efficiency and ping-pong handover ratio optimization in two-tier heterogeneous networksBaoling Zhang, Weijie Qi, Jie Zhang. 532-536 [doi]
- A classification and clustering method for tracking multiple objectsNii Longdon Sowah, Qingbo Wu 0001, Fanman Meng. 537-544 [doi]
- Audio processing with channel filtering using DSP techniquesJean Jiang. 545-550 [doi]
- Automated quantification of white blood cells in light microscopic images of injured skeletal muscleYang Jiao, Hananeh Derakhshan, Barbara St. Pierre Schneider, Emma E. Regentova, Mei Yang. 551-557 [doi]
- DUHO image segmentation based on unseeded region growing on superpixelsTrung H. Duong, Lawrence L. Hoberock. 558-563 [doi]
- Augmenting a miniature humanoid platform with a low-cost networked computer vision frameworkDylan Wallace, Blake Hament, Jean Chagas Vaz, Paul Yu Oh. 564-569 [doi]
- Mitigating DAO inconsistency attack in RPL-based low power and lossy networksCong Pu. 570-574 [doi]
- Design of nested protograph-based LDPC codes with low error-floorsMatthew L. Grimes, David G. M. Mitchell. 575-579 [doi]
- Online health careFayezah Anjum, Abu Saleh Mohammed Shoaib, Md. Abdullah Ibne Hossain, Mohammad Monirujjaman Khan. 580-583 [doi]
- Accident and alcohol detection in bluetooth enabled smart helmets for motorbikesSayan Tapadar, Shinjini Ray, Himadri Nath Saha, Arnab Kumar Saha, Robin Karlose. 584-590 [doi]
- Resilient smart cities: An approach of damaged cities by natural risksWashington Velasquez, Andres Munoz-Arcentales, W. Yanez, Joaquín Salvachúa. 591-597 [doi]
- Research on extracting risk control rules for Internet of Things businessZiyan Lin, Chunlai Zhou. 598-601 [doi]
- Advanced IOT based combined remote health monitoring, home automation and alarm systemJayeeta Saha, Arnab Kumar Saha, Aiswarya Chatterjee, Suyash Agrawal, Ankita Saha, Avirup Kar, Himadri Nath Saha. 602-606 [doi]
- A raspberry Pi controlled cloud based air and sound pollution monitoring system with temperature and humidity sensingArnab Kumar Saha, Sachet Sircar, Priyasha Chatterjee, Souvik Dutta, Anwesha Mitra, Aiswarya Chatterjee, Soummyo Priyo Chattopadhyay, Himadri Nath Saha. 607-611 [doi]
- IOT-based drone for improvement of crop quality in agricultural fieldArnab Kumar Saha, Jayeeta Saha, Radhika Ray, Sachet Sircar, Subhojit Dutta, Soummyo Priyo Chattopadhyay, Himadri Nath Saha. 612-615 [doi]
- A conceptual framework for an IoT-based health assistant and its authorization modelS. M. Riazul Islam, Md. Mahmud Hossain, Ragib Hasan, Trung Q. Duong. 616-621 [doi]
- Internet of things: A comparative studyBahaaEldin El-Shweky, Karim ElKholy, Mahmoud Abdelghany, Mahmoud Salah, Mohamed Wael, Omar Alsherbini, Yehea Ismail, Khaled Salah, Mohamed AbdElSalam. 622-631 [doi]
- Smart plug-in electric vehicle charging to reduce electric load variation at a parking placeRaj Mani Shukla, Shamik Sengupta, Amar Nath Patra. 632-638 [doi]
- IoT-enabled smart lighting systems for smart citiesAmit Kumar Sikder, Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya, Mauro Conti. 639-645 [doi]
- How Internet-of-Things (IoT) making the university campuses smart? QA higher education (QAHE) perspectiveAsim Majeed, Mahmood Ali. 646-648 [doi]
- A cloud based autonomous multipurpose system with self-communicating bots and swarm of dronesHimadri Nath Saha, Nisith K. Das, Susanta K. Pal, Srijita Basu, Supratim Auddy, Ratul Dey, Arnab Nandy, Debjit Pal, Nirjhar Roy, Dipanjan Mitra, Saunak Biswas, Tamanna Maity. 649-653 [doi]
- A low cost fully autonomous GPS (Global Positioning System) based quad copter for disaster managementHimadri Nath Saha, Srijita Basu, Supratim Auddy, Ratul Dey, Arnab Nandy, Debjit Pal, Nirjhar Roy, Subhadeep Jasu, Ankita Saha, Soummyo Priyo Chattopadhyay, Tamanna Maity. 654-660 [doi]
- MusiqGlobe.fm using MEAN stackVinay Ramappa, Doina Bein. 661-664 [doi]
- Estimation of channel state information for massive MIMO based on received data using Kalman filterAqiel Almamori, Seshadri Mohan. 665-669 [doi]
- Improved MMSE channel estimation in massive MIMO system with a method for the prediction of channel correlation matrixAqiel Almamori, Seshadri Mohan. 670-672 [doi]
- Channel estimation in OFDM: Interpolation versus ESPRITMrugen A. Deshmukh, Stephen G. Wilson. 673-678 [doi]
- A novel approach to energy efficient low cost routing in MANET by reduction in packet sizeDebika Bhattacharyya, Avimita Chatterjee, Baisakhi Chatterjee, Arnab Kumar Saha, Arnab Santra. 679-684 [doi]
- Gaussian mixture model for crowdsensing incentivizationLuis Gabriel Jaimes, Juan M. Calderon. 685-689 [doi]
- Location-based social networks data for mobile crowdsensingLuis Gabriel Jaimes, Juan M. Calderon. 690-694 [doi]
- Performance evaluation for semantic-based risk factors extraction from clinical narrativesSusan Sabra, Mazen Alobaidi, Khalid Mahmood Malik, Vian Sabeeh. 695-701 [doi]
- Survival analysis of people with cardiac problems in a simulated earthquake environmentWashington Velasquez, Andres Munoz-Arcentales, T. Marjorie Chalen, Joaquín Salvachúa. 702-706 [doi]
- Multiple-Fingerprints technique for WLAN and compressive sensing based IPSHussein Al-Moukhles, Ikhlas Abdel-Qader, Ahmed K. Abed. 707-713 [doi]
- Early stage oral cavity cancer detection: Anisotropic pre-processing and fuzzy C-means segmentationZhalong Hu, Abeer Alsadoon, Manoranjan Paul, P. W. C. Prasad, Salih Ali, A. Elchouemic. 714-719 [doi]
- The effects of neighbourhood characteristics on crime incidenceSteven Letourneau, Nathan Ell, Peter Cheung, Jordan McCaskill, Mohamad El Hajj. 720-726 [doi]
- A modified discriminant sparse representation method for face recognitionTaif Alobaidi, Wasfy B. Mikhael. 727-730 [doi]
- 3D point cloud processing using spin images for object detectionJason Ligon, Doina Bein, Phillip Ly, Brian Onesto. 731-736 [doi]
- Emotional prosody analysis on human voicesNatalie Ang, Doina Bein, David Dao, Luigi Sanchez, Justine Tran, Navie Vurdien. 737-741 [doi]
- A probabilistic framework for short text classificationMubashir Ali, Shehzad Khalid, Mazhar Iqbal Rana, Fizza Azhar. 742-747 [doi]
- A complex activity based emotion recognition algorithm for affect aware systemsNirmalya Thakur, Chia Y. Han. 748-753 [doi]
- MILE: A minimally interactive learning framework for visual data analysisBo Tang, Haibo He. 754-762 [doi]
- Analyzing spread of influence in social networks for transportation applicationsPritesh Pimpale, Anand Panangadan, Lourdes V. Abellera. 763-768 [doi]
- A low cost remote controlled underwater rover using raspberry PiArnab Kumar Saha, Subhronil Roy, Aranya Bhattacharya, Prabhat Shankar, Anindya Kumar Sarkar, Himadri Nath Saha, Pratanu Dasgupta. 769-772 [doi]
- Design analysis and considerations of power efficient electronic speed controller for small-scale quadcopter unmanned aerial vehicleYoung Tae Shin, Ying Khai Teh. 773-776 [doi]
- Directory navigation with robotic assistanceTristan Brodeur, Alex Cater, Jean Chagas Vaz, Paul Yu Oh. 777-778 [doi]
- A detection probability based radio environment mapping technique for cognitive high density fixed satellite systemsJennifer Alexandra, Mendez-Rangel, Jose Mauro Fortes. 779-785 [doi]
- Low power 16-channel electronic neuronal brain interface designWei Cai, Nansong Wu. 786-795 [doi]
- Software-defined network based resource allocation in distributed servers for unmanned aerial vehiclesRaj Mani Shukla, Shamik Sengupta, Amar Nath Patra. 796-802 [doi]
- Modeling and analysis of the disruptor framework in CSPYucheng Fang, Huibiao Zhu, Frank Zeyda, Yuan-fei. 803-809 [doi]
- An affordable solution for authenticated communications for enterprise and personal useMatthew Chiang, Eric Burger. 810-815 [doi]
- Java unit annotations for units-of-measurement error preventionMark E. Royer, Sudarshan S. Chawathe. 816-822 [doi]
- A particle swarm optimization based algorithm for primary user emulation attack detectionWassim Fassi Fihri, Youness Arjoune, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd. 823-827 [doi]
- Spectrum sensing: Enhanced energy detection technique based on noise measurementYouness Arjoune, Zakaria El Mrabet, Hassan El Ghazi, Ahmed Tamtaoui. 828-834 [doi]
- A bit error rate estimation method for wireless communication systemsMohsen Riahi Manesh, Youness Arjoune, Naima Kaabouch. 835-840 [doi]
- Accuracy analysis of time synchronization using current consumption pattern of BLE devicesKasun Somaratne, F. John Dian, Amirhossein Yousefi. 841-844 [doi]
- Optimal pilot reuse factor based on user environments in 5G Massive MIMORobin Chataut, Robert Akl. 845-851 [doi]
- Measurement-based geolocation in LTE cellular networksZaenab Shakir, Josko Zec, Ivica Kostanic. 852-856 [doi]
- Positioning accuracy analysis of Indian regional navigation satellite system on STKShaochi Cheng, Yuan Gao, Xiangyang Li, Su Hu. 857-860 [doi]
- USB level data security using cryptographic approachRahul Sharma, Hitesh Sarda, Tanisha Bhattacharjee, Aiswarya Roy, Prithwiswar Bhattacharya, Sugata Chowdhury, Shankhadip Mallick, Tapapriya Sengupta, Jayati Banerjee, Priyodarshini Roy, Siddhartha Sarker, Subhasree Chakraborty, Sauvik Bal, Rupayan Das, Somen Nayak. 861-866 [doi]
- Atechnical study on wireless body area network with its applicationSurajit Sur, Aniket Dey, Siddhartha Sarker, Pramit Dutta, Prithwiswar Bhattacharya, Jyotirmoy Saha, Nabanit Saha, Priyam Pradhan, Himadri Ghosh, Rajarshi Ghosh, Anirban Sinha, Sagarika Ghosh, Sauvik Bal, Rupayan Das. 867-873 [doi]
- Advanced VANET information dissemination scheme using Fuzzy logicJaskaran Singh, Karanjit Singh. 874-879 [doi]
- Assessing the impact of cell phones on African societies: An investigation into the impact of cell phones on a community of practice of business women in NigeriaRose-Margaret Ekeng-Itua. 880-890 [doi]
- Modelling 3×3 reflectarray antenna using microstrip resonatorP. R. Sriram, R. Chandralekha, H. Ummahabiba. 891-894 [doi]
- Encircle routing: An efficient deterministic network on chip routing algorithmShylesh Umapathy, Meet Shah, Nan Wang. 895-899 [doi]
- Automated HDL signal processing deployment performance from high level MATLAB specification for an unmanned aerial vehicle (UAV)Aaron E. Cohen. 900-905 [doi]
- Performance evaluation of time synchronization using current consumption pattern of BLE devicesF. John Dian, Amirhossein Yousefi, Kasun Somaratne. 906-910 [doi]
- A novel multicast grooming scheme for dynamic QoS provision over OLS networksYassine Khlifi, Majid Alotaibi. 911-917 [doi]
- Segment based model for TCP protocol optimization: Enhancing the bandwidth and congestionMojtaba Jafari, Abeer Alsadoon, Chandana Withana, Salih Ali, A. Elchouemic. 918-924 [doi]
- Broadcast storm mitigation from unintentional misbehavior in vehicular ad hoc networksKumar Sharshembiev, Seong-Moo Yoo, Elbasher Elmahdi. 925-930 [doi]
- A comparison of simulation methods for continuous time sigma delta modulatorsPeter Stubberud, Benju Koirala. 931-936 [doi]
- Improved N-continuous OFDM using adaptive power allocationLilin Dan, Chiheng Zhang, Jie Yuan, Peibo Wen, Bin Fu. 937-940 [doi]
- QoS-aware splitting and radio resource allocation for machine type communicationsDavid Martin Amitu, Roseline Nyongarwizi Akol, Peter Nakeba. 941-947 [doi]
- Estimation of transmitter I/Q imbalance using convolutional neural networksLauren J. Wong, William C. Headley, Alan J. Michaels. 948-955 [doi]
- A 3D flash ADC structure for high-speed communication applicationsNahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun. 956-958 [doi]
- Impact of varying IP/MPLS capacity module's size in three-layer networksSamar A. Alzahrani, Iyad A. Katib. 959-964 [doi]
- Space shift keying MIMO transmission with reduced pilot overheadXing Wei, Shiwen Fan, Yue Xiao, Qidi You, Wu Chen. 965-968 [doi]
- Demodulation of faded wireless signals using deep convolutional neural networksAhmad Saeed Mohammad, Narsi Reddy, Fathima James, Cory Beard. 969-975 [doi]
- Spatial and directional modulation with random frequency diverse arrayXing Wei, Yanping Xiao, Yue Xiao, Qidi You, Wu Chen. 976-979 [doi]
- Efficient key distribution protocol for wireless sensor networksMajid Alshammari, Khaled M. Elleithy. 980-985 [doi]
- Space-Time coding implementation with a software-defined radio testbedApurv Shaha, Duy H. N. Nguyen. 986-992 [doi]
- Predictive routing for wireless networks: Robotics-based test and evaluation platformAbolfazl Razi, Chaoju Wang, Fahad Almaraghi, Qiyuan Huang, Yuting Zhang, Hanxiao Lu, Arnau Rovira-Sugranes. 993-999 [doi]
- CC-ADOV: An effective multiple paths congestion control AODVYefa Mai, Fernando Molina Rodriguez, Nan Wang. 1000-1004 [doi]
- Preliminary exploration of co-functional gene networks for wireless sensor networksPhillip G. Bradford. 1005-1008 [doi]
- Exploiting adaptive modulation in E-band software-defined backhaul networkHao Li, Jiliang Zhang 0001, Qi Hong, Hui Zheng, Jie Zhang. 1009-1013 [doi]
- New approach to enhancing vehicular communication reliability for safety applicationsXiaomin Ma, Matthew R. Samuelson, Emily A. Garvie. 1014-1017 [doi]
- Insights into indoor navigationBalbir Bob Gill, Cameron Morgan, Cole Raschpichler, Paul Wiebe. 1018-1022 [doi]