Abstract is missing.
- Development and Evaluation of a Remote Controlled Electric Lawn MowerDiego A. Aponte-Roa, Xavier Collazo Fernandez, Miguel Goenaga, Albert A. Espinoza, Kasandra Vazquez. 1-5 [doi]
- Driver Drowsiness Detection Algorithms Using Electrocardiogram Data AnalysisMohsen Babaeian, Mohammad Mozumdar. 1-6 [doi]
- Wind Farm Layout Optimization Problem Using Joint Probability Distribution of CVaR AnalysisRamin Farajifijani, Saeed Ahmadian, Saba Ebrahimi, Ehsan Ghotbi. 7-12 [doi]
- An Optimization Algorithm for VMI Test EvaluationChristos Liambas, Stylianos Perrakis. 13-18 [doi]
- Implementation of A* Algorithm for Optimal Transmission Expansion Planning Portfolios Comprised of Competitively Bid ProjectsJason Terhune, Kalen Coleman. 19-23 [doi]
- Performance Analysis of Excess Mean Square Error of Adjusting Log-Based Stepsize for LMS Algorithm with High Variance InputHaider Abdallatif Mohamed K, Ikhlas Abdel-Qader. 24-29 [doi]
- A Parallel Algorithm to Calculate an Approximation to the Order-K Voronoi Diagram using Java Streams and ThrustChristian Trefftz, Debaditya Gautam, Joseph S. Szakas. 30-33 [doi]
- An Algorithm for the Emergence of Life Based on a Multi-Layered Symmetry-Based Model of LightPravir Malik, Leon Pretorius. 34-41 [doi]
- A Log-Based Step-Size Adaptation Technique for Fast and Robust Maximum Power Point Tracking Method for Solar PV Grid Tied SystemHaider Abdallatif Mohamed K, Ikhlas Abdel-Qader. 42-47 [doi]
- A Fast Density-Grid Based Clustering MethodDaniel Brown, Arialdis Japa, Yong Shi. 48-54 [doi]
- Assured Delegation on Data Storage and Computation via Blockchain SystemXin Pei, Xuefeng Li, Xiaochuan Wu, Kaiyan Zheng, Boheng Zhu, Yixin Cao 0003. 55-61 [doi]
- On the Uniqueness of Stationary Solutions of an Asynchronous Parallel and Distributed Algorithm for Diffusion EquationsKooktae Lee, Raktim Bhattacharya. 62-68 [doi]
- Swagger-based jQuery Ajax ValidationYahya M. Tashtoush, Mohammed Nour AlRashdan, Osama Salameh, Mohammad A. Alsmirat. 69-72 [doi]
- Control System Design for a 400W Micro Wind Turbine for DC Loads ApplicationsXavier Collazo Fernandez, Javier Sánchez Navarro, Luis C. Rendon Estrada, Jeffrey Borres Martinez, Diego A. Aponte-Roa, Melvin J. Nunez Santiago. 73-78 [doi]
- A Benchtop DC Microgrid for Renewable Energy Sources IntegrationDiego A. Aponte-Roa, Jeffrey Borres Martinez, Xavier Collazo Fernandez, Wayne W. Weaver. 79-84 [doi]
- Supervisory Control and Data Acquisition Testbed for Research and EducationJohn Stranahan, Tapan Soni, Vahid Heydari. 85-89 [doi]
- A Sensor Fusion Based Robotic System Architecture using Human Interaction for Motion ControlAriel Y. Ramos Ruiz, Luis J. Figueroa Rivera, Balasubramaniyan Chandrasekaran. 95-100 [doi]
- Smart Traffic Management System using Deep Learning for Smart City ApplicationsGuy M. Lingani, Danda B. Rawat, Moses Garuba. 101-106 [doi]
- An Impressive Method for Performing Fixed and Variable Flight Maneuvers by a Pilot on a Swarm Comprised of Several Groups of QuadrotorsMohammad Ranjbari Koohi, Morteza Modarresi Asem. 107-113 [doi]
- Forecasting of total daily solar energy generation using ARIMA: A case studySharif Atique, Subrina Noureen, Vishwajit Roy, Vinitha Subburaj, Stephen Bayne, Joshua Macfie. 114-119 [doi]
- Recognizing Human Falls and Routine Activities Using AccelerometersSudarshan S. Chawathe. 120-126 [doi]
- Data Mining for Generalizable Pre-admission Prediction of Elective Length of StayRobert James Steele, Brandon Thompson. 127-133 [doi]
- Computer Vision for Attendance and Emotion Analysis in School SettingsSarah Deniz, Dakyung Lee, Grace Kurian, Lourdes Altamirano, Darren Yee, Michael Ferra, Blake Hament, Justin Zhan, Laxmi Gewali, Paul Y. Oh. 134-139 [doi]
- Performance Comparison of Classification Algorithms on Medical DatasetsBendi Venkata Ramana, Raja Sarath Kumar Boddu. 140-145 [doi]
- Data Center Modeling Using a Cyber-Physical Systems LensMoises Levy, Daniel Raviv, Jason O. Hallstrom. 146-155 [doi]
- Improving Supply Chain Visibility Using IoT-Internet of ThingsAshok Kumar Pundir, Jadhav Devpriya Jagannath, L. Ganapathy. 156-162 [doi]
- A Study on Flat and Hierarchical System Deployment for Edge ComputingDawei Li, Boxiang Dong, En Wang, Michelle Zhu. 163-169 [doi]
- Technology Integration for Improved Performance: A Case Study in Digitization of Supply Chain with Integration of Internet of Things and Blockchain TechnologyAshok Kumar Pundir, Jadhav Devpriya, Mrinmoy Chakraborty, L. Ganpathy. 170-176 [doi]
- Security Analysis in Context-Aware Distributed Storage and Query Processing in Hybrid Cloud FrameworkGeremew Begna, Danda B. Rawat. 177-183 [doi]
- Building Modern Clouds: Using Docker, Kubernetes & Google Cloud PlatformJay Shah, Dushyant Dubaria. 184-189 [doi]
- Facial expression detection using Six Facial Expressions Hexagon (SFEH) modelMarryam Murtaza, Muhammad Sharif 0001, Musarrat AbdullahYasmin, Tanveer Ahmad. 190-195 [doi]
- A simple sufficient condition for stability and robust stability of a discrete Lotka-Volterra modelDragana Lj. Cvetkovic. 196-200 [doi]
- New pseudospectra localizations with application in ecology and vibration analysisDragana Lj. Cvetkovic, Ljiljana Cvetkovic, Vladimir R. Kostic. 201-205 [doi]
- Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment FrameworkSri Nikhil Gupta Gourisetti, Michael Mylrea, Hirak Patangia. 206-213 [doi]
- Optimal filtering for noise reduction in myoelectric signals on an embedded systemFernando Gonzalez-Espinoza, Luis Rizo Domínguez. 214-217 [doi]
- UAS-based object tracking via Deep LearningMarc Dinh, Brendan Morris, Yoohwan Kim. 217-275 [doi]
- CMOS oscillators to satisfy 802.15.4 and Bluetooth LE PHY specifications without a crystal referenceDavid C. Burnett, Brad Wheeler, Lydia Lee, Filip Maksimovic, Arvind Sundararajan, Osama Khan, Kristofer S. J. Pister. 218-223 [doi]
- Motor Measurement and Control System Realization in Marine Electric PropulsionBei Chen, Wenlun Cao, Yuyao He, Zhenhong Jiao, Hong Li, Chongwu Wang. 224-226 [doi]
- Prediction of Crop CultivationNeha Rale, Raxitkumar Solanki, Doina Bein, James Andro-Vasko, Wolfgang Bein. 227-232 [doi]
- A Spatial Voting Approach for Indoor Positioning System Using PNN-Multiclassifier Based on Multiple SSIDsAhmed K. Abed, Ikhlas Abdel-Qader. 233-239 [doi]
- Bayesian Learning for Policy Search in Trajectory Control of a Planar ManipulatorVahid Tavakol Aghaei, Arda Agababaoglu, Ahmet Onat, Sinan Yildirim. 240-246 [doi]
- AI on edge device for laser chip defect detectionDennis Hou, Tuo Liu, Yen-Ting Pan, Janpu Hou. 247-251 [doi]
- Study of Distributed Framework Hadoop and Overview of Machine Learning using Apache MahoutRaxitkumar Solanki, Sree Harsha Ravilla, Doina Bein. 252-257 [doi]
- Performance Investigation of SR-HARQ transmission scheme in realistic Cognitive Radio SystemMadeeha Ishtiaq, Ateeq Ur Rehman, Fazlullah Khan, Abdus Salam, Shahzad Khan. 258-263 [doi]
- Novel Deep Learning Model with CNN and Bi-Directional LSTM for Improved Stock Market Index PredictionJithin Eapen, Doina Bein, Abhishek Verma. 264-270 [doi]
- A Reinforcement Learning Approach for Multipath TCP Data SchedulingJiacheng Luo, Xin Su 0001, Bei Liu. 276-280 [doi]
- Status of Smart Manufacturing in the United StatesKhalid Hasan Tantawi, Ismail Fidan, Anwar Tantawy. 281-283 [doi]
- Embedded System Enabled Vehicle Collision Detection: An ANN ClassifierDewant Katare, Mohamed El-Sharkawy. 284-289 [doi]
- Comparing ANN, SVM, and HMM based Machine Learning Methods for American Sign Language Recognition using Wearable Motion SensorsRabeet Fatmi, Sherif Rashad, Ryan Integlia. 290-297 [doi]
- Social Media Sensing Framework for Population HealthAlvaro Esperanca, Zina Ben-Miled, Malika Mahoui. 298-304 [doi]
- AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine LearningIbrahim Alrashdi, Ali Alqazzaz, Esam Aloufi, Raed Alharthi, Mohamed A. Zohdy, Hua Ming. 305-310 [doi]
- Self Error Detection and Correction for Noisy Labels Based on Error Correcting Output Code in Convolutional Neural NetworksYang Jiao, Shahram Latifi, Mei Yang. 311-316 [doi]
- Intelligent Multi-Camera Video Surveillance System for Smart City ApplicationsAbdullah Alshammari, Danda B. Rawat. 317-323 [doi]
- Adapting RGB Pose Estimation to New DomainsGururaj Mulay, Bruce A. Draper, J. Ross Beveridge. 324-330 [doi]
- Architecturally Compressed CNN: An Embedded Realtime Classifier (NXP Bluebox2.0 with RTMaps)Durvesh Pathak, Mohamed El-Sharkawy. 331-336 [doi]
- Parallel Multi-View Graph Matrix Completion for Large Input MatrixArezou Koohi, Houman Homayoun. 337-341 [doi]
- Using Temporal Awareness to Improve Distributed Problem SolvingSaeid Samadidana, Roger Mailler. 342-348 [doi]
- Improvement of Protein Model Scoring Using Grouping and Interpreter for Machine LearningBogdan D. Czejdo, Sambit Bhattacharya, Catherine Spooner. 349-353 [doi]
- Classification Techniques for Diagnosing Respiratory Sounds in Infants and ChildrenAlaa Gouda, Saleh el Shehaby, Nancy Diaa Moussa, Mohamed M. Abougabal. 354-360 [doi]
- Smartphones, Grounds, Satellites, UAVs for Earthquake NowcastHong Yu, Harold H. Szu, Hongzhou Huang. 361-365 [doi]
- Comparison of Deep Reinforcement Learning Approaches for Intelligent Game PlayingAnoop Jeerige, Doina Bein, Abhishek Verma. 366-371 [doi]
- Analyzing Beauty by Building Custom Profiles Using Machine LearningThomas Abrahams, Doina Bein. 372-376 [doi]
- Reverse Parking a Car-Like Mobile Robot with Deep Reinforcement Learning and Preview ControlEduardo Bejar, Antonio Moran. 377-383 [doi]
- Design and Implementation of a Hybrid Face Recognition TechniqueAsim Chaudhry, Heba Elgazzar. 384-391 [doi]
- Pruning the Convolution Neural Network (SqueezeNet) based on L2 Normalization of Activation MapsAkash Sunil Gaikwad, Mohamed El-Sharkawy. 392-396 [doi]
- Implementation of an Indoor Positioning System using the WKNN AlgorithmJaren Golenbiewski, Girma S. Tewolde. 397-400 [doi]
- Musical Key Estimation with Unsupervised Pattern RecognitionMichael Finley, Abolfazl Razi. 401-408 [doi]
- A UAV with Autonomy, Pattern Recognition for Forest Fire Prevention, and AI for Providing Advice to Firefighters Fighting Forest FiresE. A. Yfantis. 409-413 [doi]
- A Comparative Analysis of Quality Assurance Automated Testing Tools for Windows Mobile ApplicationsDuaa R. Mohammad, Sajedah Al-Momani, Yahya M. Tashtoush, Mohammad A. Alsmirat. 414-419 [doi]
- Rounding Technique Analysis for Power-Area & Energy Efficient Approximate Multiplier DesignPriyanka Lohray, Satwik Gali, Srirathan Rangisetti, Tooraj Nikoubin. 420-425 [doi]
- Fast & Energy Efficient Binary to BCD Converter with Complement Based Logic Design (CBLD) for BCD MultipliersAshish Joshi, Srirathan Rangisetti, Priyanka Lohray, Tooraj Nikoubin. 426-434 [doi]
- A Robotic Control System for Fault Tolerance and Safety using Human Robot InteractionLuis J. Figueroa Rivera, Ariel Y. Ramos Ruiz, Balasubramaniyan Chandrasekaran. 435-439 [doi]
- Connectivity Tracking Methods for a Network of Unmanned Aerial VehiclesJames Trimble 0003, Daniel J. Pack, Zachary Ruble. 440-447 [doi]
- Reliability Modeling and Analysis for Cyber Physical SystemsHakduran Koc, Sai S. Shaik, Pranitha P. Madupu. 448-451 [doi]
- Deep Learning Models for Cyber Security in IoT NetworksMonika Roopak, Gui Yun Tian, Jonathon Chambers. 452-457 [doi]
- Data Center Predictions using MATLAB Machine Learning ToolboxMoises Levy, Daniel Raviv, Justin Baker. 458-464 [doi]
- Data Center Simulations Deployed in MATLAB and Simulink Using a Cyber-Physical Systems LensMoises Levy, Daniel Raviv, Justin Baker. 465-474 [doi]
- Lightweight Cryptography for Internet of Insecure Things: A SurveyIndira Kalyan Dutta, Bhaskar Ghosh, Magdy Bayoumi. 475-481 [doi]
- Dynamic Key Generation for Polymorphic EncryptionDuane Booher, Bertrand Cambou, Albert H. Carlson, Christopher Philabaum. 482-487 [doi]
- Key Exchange using Ternary system to Enhance SecuritySareh Assiri, Bertrand Cambou, Duane Booher, Dina Ghanai Miandoab, Mohammad Mohammadinodoushan. 488-492 [doi]
- A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P)Farhan Sadique, Khalid Bakhshaliyev, Jeff Springer, Shamik Sengupta. 493-498 [doi]
- Minimizing Routing Broadcast and Packet Loss in Wireless Ad-hoc Networks with a Cluster-Based Self-Organized Algorithm as MAC protocolFrancisco E. Balart-Sanchez, Luis F. Gutierrez Preciado, J. Guadalupe Olascuaga-Cabrera. 499-505 [doi]
- Random Forest Twitter Bot ClassifierJames Schnebly, Shamik Sengupta. 506-512 [doi]
- A Remote Field-Programmable Custom Computing Machine AcceleratorShrikant S. Jadhav, Clay Gloster, Christopher C. Doss, Youngsoo Kim, Jannatun Naher. 513-520 [doi]
- WiFi Dimensioning to offload LTE in 5G NetworksDanielle Saliba, Rodrigue Imad, Sébastien Houcke, Bachar El Hassan. 521-526 [doi]
- Design and Implementation of An Efficient Multipath AODV Routing Algorithm for MANETsHarshdeep Jhajj, Rijutha Datla, Nan Wang. 527-531 [doi]
- Dynamic UE-Grouping Based Interference Management for Ultra-Dense NetworksJi Hwan Choi. 532-536 [doi]
- ScanAlert: Electronic Medication Monitor and Reminder to Improve Medical AdherenceVanessa Sanchez, Russell Ro, Lauryn Kent, Jamie Navas, Oluwatosin Diyan, Chris Roussel, Shahab Tayeb, Matin Pirouz, Carter Chiu, Elliott Ploutz, Justin Zhan, Laxmi Gewali, Paul Y. Oh. 537-543 [doi]
- A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart CitiesFarah Kandah, Brennan Huber, Anthony Skjellum, Amani Altarawneh. 544-549 [doi]
- Industrial Applications of BlockchainJameela Al-Jaroodi, Nader Mohamed. 550-555 [doi]
- Implementation of Neural Network Based Control Scheme on the Benchmark Conical Tank Level SystemSanjay Bhadra, Atanu Panda, Parijat Bhowmick, Shinjinee Goswami, Sayan Podder, Debayan Dutta, Zeet Chowdhury. 556-560 [doi]
- Six Lower Order Harmonics Elimination From Output Voltage Waveform Of Single Phase Full Bridge Conventional Inverter With Adjustable OutputArchita Bhattacharya, Shounak Roychowdhury, Shruti Mitra, Gautam Ghosh. 561-568 [doi]
- Frequency-Based Releasing of Insulin in the Langerhans Islets To Counteract the Beginning of the Type-2 Diabetes in Pre-diabetes PatientsHuber Nieto-Chaupis. 569-573 [doi]
- The Big potential of Big Data towards universities outcome based fundingMmatshuene Anna Segooa, Billy Mathias Kalema. 574-578 [doi]
- Shared Entry Logger to Eliminate Duplicate Requests to SDN ControllerAbu Asaduzzaman, Abdulrahman Almohaimeed, Kishore K. Chidella. 579-584 [doi]
- Introducing Edge Controlling to Software Defined Networking to Reduce Processing TimeAbdulrahman Almohaimeed, Abu Asaduzzaman. 585-590 [doi]
- Dedicated Backup Units to Alleviate Overload on SDN ControllersAbdulrahman Almohaimeed, Abu Asaduzzaman. 591-596 [doi]
- Parallel Implementation of AC Optimal Power Flow and Time Constrained Optimal Power Flow using High Performance ComputingAlex Werner, Kapil Duwadi, Nicholas Stegmeier, Timothy M. Hansen, Jung-Han Kimn. 597-602 [doi]
- An Adaptive Flow Measurement Method for VBR Video Flow in Software-Defined NetworksJixing Tang, Yue Zhang, Jinhao Jiang. 603-610 [doi]
- Enhanced Chemical Structure Recognition and Prediction Using Bayesian FusionFakheredine Keyrouz, Lara Tauk, Elias Feghali. 611-616 [doi]
- Enhancing Safety of UAVs in National AirspaceChiman Kwan, Bulent Ayhan. 617-622 [doi]
- Effect of Hardware Trojan Attacks on the Performance of On-Chip Multicast Routing AlgorithmsBinayak Tiwari, Mei Yang, Yingtao Jiang, Xiaohang Wang. 623-629 [doi]
- Study on the Optoelectronic Behavior of Zr Based MOFs Using Computational SimulationsRichard Kyung, Woong Jae Baek, Jaemin Choung, Andrew Kim. 630-633 [doi]
- Design and Implementation of 32-Channel ADPCM CODECRakshith Ravishankar, Yu Bai 0004, Yoonsuk Choi. 634-641 [doi]
- Mixed reality homework systemNathanial Wiggins, Milton Smith. 642-647 [doi]
- Gender Classification Using Machine Learning with Multi-Feature MethodSandeep Kumar, Sukhwinder Singh, Jagdish Kumar. 648-653 [doi]
- Face To Face with Next Flu Pandemic with a Wiener-Series-Based Machine Learning: Fast Decisions to Tackle Rapid SpreadHuber Nieto-Chaupis. 654-658 [doi]
- A Low-power Wireless Sensing Unit for Hydro-System AutomationNavid Shaghaghi, Peter Ferguson, Jesse Mayer, Zach Cameron, Behnam Dezfouli. 659-665 [doi]
- Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux SystemIgnacio Astaburuaga, Amee Lombardi, Brian La Torre, Carolyn Hughes, Shamik Sengupta. 666-672 [doi]
- An Accurate Congestion Control Mechanism in Programmable NetworkJinhao Jiang, Yue Zhang. 673-677 [doi]
- Cuckoo's Malware Threat Scoring and Classification: Friend or Foe?Aaron Walker, Muhammad Faisal Amjad, Shamik Sengupta. 678-684 [doi]
- Design Consideration of 433.92MHz ISM Band RF Rectifier for Wireless IoT Cloud ApplicationNutdanai Swangpattaraphon, Ying Khai Teh. 685-689 [doi]
- Towards Tattoo Previewing and Other Augmented/Mixed Reality Applications with Microsoft KinectAlexia Dreher, Alexis Sanchez, Andrea Sedano, Kevin Chung, Michael Dambach, Shabnam Waseem, Blake Hament, Paul Y. Oh, Justin Zhan, Laxmi Gewali. 690-694 [doi]
- Statistical Analysis of Packet Delay Time and Variation on the InternetSuat Mercan, Aymen I. Zreikat. 695-700 [doi]
- DOS Attack Mitigation Strategies on SDN ControllerYun Tian, Vincent Tran, Mutalifu Kuerban. 701-707 [doi]
- Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber DefenseShahriar Badsha, Iman Vakilinia, Shamik Sengupta. 708-714 [doi]
- DCentroid: Location Privacy-Preserving Scheme in Spatial CrowdsourcingRaed Alharthi, Esam Aloufi, Ali Alqazzaz, Ibrahim Alrashdi, Mohamed A. Zohdy. 715-720 [doi]
- A Framework for Insider Collusion Threat Prediction and Mitigation in Relational DatabasesQussai Yaseen, Aman Alabdulrazzaq, Firas AlBalas. 721-727 [doi]
- A Nobel Cryptosystem for Group Data Sharing in Cloud StorageRupam Banerjee, Arup Kumar Chattopadhyay, Amitava Nag, Kaushik Bose. 728-731 [doi]
- Design of a High-Throughput Match Search Unit for Lossless Compression AlgorithmsMatej Bartik, Tomás Benes, Pavel Kubalík. 732-738 [doi]
- Energy-Aware Cloud Architecture for Intense Social Mobile (Device to Device) 5G Communications in Smart CitySarah Shafqat, Saira Kishwer, Muhammad Ahsan Qureshi. 739-745 [doi]
- Noise Performance of Orthogonal RF Beamforming for THz Radio CommunicationsKrishan K. Tiwari, Eckhard Grass, Rolf Kraemer. 746-751 [doi]
- Towards Fault Tolerant Fog Computing for IoT-Based Smart City ApplicationsNader Mohamed, Jameela Al-Jaroodi, Imad Jawhar. 752-757 [doi]
- Online Estimation of Motif Distribution in Dynamic NetworksAbbas Al-Thaedan, Marco Carvalho. 758-764 [doi]
- Real-Time Energy-Conserving VM-Provisioning Framework for Cloud-Data CentersSalam Ismaeel, Ali Miri. 765-771 [doi]
- Impact of Non-Uniform Subnets on the Performance of Wireless Network-on-Chip ArchitecturesKishore Konda Chidella, Abu Asaduzzaman, Abdulrahman Almohaimeed. 772-777 [doi]
- Performance Evaluation of 5G Downlink Under Different Beamforming and Scheduling MethodsMonera Salah, Ivica Kostanic. 778-782 [doi]
- Secrecy Capacity for an Underwater Acoustic Channel with a Dominant Noise SourceHung-Yi Lo, James S. Lehnert, Phuong T. Tran. 783-787 [doi]
- A Low Power, High Gain 2.4/5.2 GHz Concurrent Dual-Band Low Noise AmplifierHossein Khosravi, Salman Zandian, Abolfazl Bijari, Nabeeh Kandalaft. 788-792 [doi]
- Pulse Width Modulated Visible Light Communication using Digital Micro-mirror Device Projector for Voice Information Guidance SystemMotoi Kodama, Shinichiro Haruyama. 793-799 [doi]
- A Reverse-Boot Enabled Embedded Computing System on SoC-FPGA for Prognostics and Health Management: An Application on Li-ion BatteriesRuolin Zhou, Yuan Liu, Eric Brodeur, Zhaojun Li, Jian Guo. 800-805 [doi]
- A New Search Algorithm for Allocating Pilots in Asymptotic TDD Massive MIMO SystemsRand Abdul Hussain, Josko Zec. 806-810 [doi]
- An Analysis of Leading Lattice-Based Asymmetric Cryptographic PrimitivesChuck Easttom. 811-818 [doi]
- Framework modeling for User privacy in cloud computingAljwhrh Almtrf, Yasamin Alagrash, Mohamed Zohdy. 819-826 [doi]
- Secure Visible Light Encryption Communication Technique for Smart Home ServiceYong Up Lee, Kyeong-Yoon Kang, GinKyu Choi. 827-831 [doi]
- RescueMe: Smartphone-Based Self Rescue System for Disaster RescueCong Pu, Xitong Zhou. 832-837 [doi]
- AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic SchemeAhmad Mansour, Khalid M. Malik, Niko Kaso. 838-846 [doi]
- Ultra High Resolution Jitter Measurement Method for Ethernet Based NetworksKarel Hynek, Tomás Benes, Matej Bartik, Pavel Kubalík. 847-851 [doi]
- Applying Blockchain in Industry 4.0 ApplicationsNader Mohamed, Jameela Al-Jaroodi. 852-858 [doi]
- Rate adaptation with Bayesian attractor model for MPEG-DASHMasayoshi Iwamoto, Tatsuya Otoshi, Daichi Kominami, Masayuki Murata. 859-865 [doi]
- Efficient Branch and Bound Motif Finding with Maximum Accuracy based on HashingSanjay Soundarajan, Michelle Salomon, Jin H. Park. 866-872 [doi]
- Macrophage-Like Nanorobots To Anticipate Bacterial DynamicsHuber Nieto-Chaupis. 873-879 [doi]
- Impulsive Noise Mitigation in Underwater Acoustic Communication Systems: Experimental StudiesReza Barazideh, Wensheng Sun, Balasubramaniam Natarajan, Alexei V. Nikitin, Zhaohui Wang. 880-885 [doi]
- Multimodal Biometrics for Enhanced IoT SecurityOscar Olazabal, Mikhail I. Gofman, Yu Bai 0004, Yoonsuk Choi, Noel Sandico, Sinjini Mitra, Kevin Pham. 886-893 [doi]
- Packet Tagging System Using Adaptive MSS Clamping on TCPSatoshi Kodama, Rei Nakagawa. 894-897 [doi]
- Condition Monitoring of Hydraulic Systems by Classifying Sensor Data StreamsSudarshan S. Chawathe. 898-904 [doi]
- A topology-based performance Evaluation for an adaptive tuning protocol for service and resource discovery in the Internet of ThingsFiras AlBalas, Wail Mardini, Majd Al-Soud, Qussai Yaseen. 905-909 [doi]
- Physical Layer Security for Cooperative Multihop Routing in Wireless NetworksAnish Prasad Shrestha, S. M. Riazul Islam, Rajendra Dhakal, Kyung Sup Kwak. 910-915 [doi]
- A Parallel Proof of Work to Improve Transaction Speed and Scalability in Blockchain SystemsShihab Shahriar Hazari, Qusay H. Mahmoud. 916-921 [doi]
- Power Surge and Clock Hiccup Side-Channel Watermarking Approach for Finite State MachinesJames Gil de Lamadrid, Seonho Choi. 922-928 [doi]
- Review on Safe Reversible Image Data HidingTalha Naqash, Assad Iqbal, Sajjad Hussain Shah. 929-932 [doi]
- Person Recognition for Access LoggingAndrew Boka, Brendan Morris. 933-936 [doi]
- Impulsive Noise Detection in OFDM-based Systems: A Deep Learning PerspectiveReza Barazideh, Solmaz Niknam, Balasubramaniam Natarajan. 937-942 [doi]
- A Modified McCumber Cube as a Basis for a Taxonomy of Cyber AttacksChuck Easttom, William Butler. 943-949 [doi]
- A Novel Parking Management System, for Smart Cities, to save Fuel, Time, and MoneySiddharth Das. 950-954 [doi]
- Novel Trace-Based Construction of the Parallel-In-Serial-Out Multiplication for Elliptic Curve Digital Signature Algorithm Like Binary Extension FieldsHayssam El-Razouk. 955-961 [doi]
- Scalable Rule Enforcement in SDN through Separate User IdentifiersXin Sun. 962-968 [doi]
- The Feynman Path Integral and Machine Learning Algorithms to Characterize and Anticipate Bacteria Chemotaxis in a Host Healthy BodyHuber Nieto-Chaupis. 969-973 [doi]
- Iris Live Detection Assessment; A Structural SurveySheida Asad Soleimani, Morteza Modarresi Asem. 974-980 [doi]
- Iris Recognition; From Classic to Modern ApproachesVahid Nazmdeh, Shaghayegh Mortazavi, Daniel Tajeddin, Hossein Nazmdeh, Morteza Modarresi Asem. 981-988 [doi]
- Electrochemical Biosensors for Cancer Detection Using Different BiomarkersMatineh Ghafoorian Eshghi, Zahra Fruhideh, Vala Mehryar Alviri, Morteza Modarresi Asem. 989-996 [doi]
- Assessment of Histogram-Based Medical Image Contrast Enhancement Techniques; An ImplementationMozhgan Kalhor, Atefeh Kajouei, Fatemeh Hamidi, Morteza Modarresi Asem. 997-1003 [doi]
- Multi-Stream LDPC Decoder on GPU of Mobile DevicesRoohollah Amiri, Hani Mehrpouyan. 1004-1009 [doi]
- Grating Lobes for Enhanced Scattering Intensity in Millimeter Wave Sparse ChannelsAdel Aldalbahi, Nazli Siasi, Majdi M. Ababneh, Mohammed Jasim. 1010-1014 [doi]
- On Placement of Base Stations for Cut-Through Links in Epidemic BroadcastYasuhiro Yamasaki, Hiroyuki Ohsaki. 1015-1020 [doi]
- An Analytical Scheme For Power Consumption of Battery-Operated peripheral BLE nodesF. John Dian. 1021-1026 [doi]
- Low-power Synchronized Multi-channel Data Acquisition Communication SystemF. John Dian. 1027-1031 [doi]
- Evaluation of DSRC and LTE for V2XTaajwar Bey, Girma S. Tewolde. 1032-1035 [doi]