Abstract is missing.
- A Distributed Density-Grid Clustering Algorithm for Multi-Dimensional DataDaniel Brown, Yong Shi. 1-8 [doi]
- Continuous Error Detection and Correction of Arithmetic in a Complement RRNSEric B. Olsen. 9-17 [doi]
- Prediction of Oblique Saccade Trajectories Using Learned Velocity Profile Parameter MappingsHenry K. Griffith, Samantha Aziz, Oleg Komogortsev. 18-24 [doi]
- A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe ScenarioQuazi Mamun, Muhammad Arif Khan. 25-30 [doi]
- Crumple TreesColeman Nugent, Kevin A. Wortman. 31-37 [doi]
- Parallelizing the Bounded K-Nearest Neighbors Algorithm for Distributed Computing SystemsArialdis Japa, Yong Shi. 38-45 [doi]
- Designing a Feature Selection Technique for Analyzing Mixed DataDuc Manh Doan, Dong Hyun Jeong, Soo-Yeon Ji. 46-52 [doi]
- A Scalable System for Neural Architecture SearchJeffrey Hajewski, Suely Oliveira. 53-60 [doi]
- DFB Laser Chip Defect Detection Based on Successive Subspace LearningDennis Hou, Tuo Liu, Xiaobin Zhang, Yuxi Wang, Yen-Ting Pan, Janpu Hou. 61-64 [doi]
- A Wavelet Compression based Multi-resolution Bidirectional LSTM Network for Electrocardiogram Biometric Classification in constructing Biometric OntologyHtet Myet Lynn, Taekeun Hong, Hyoungju Kim, Sung-Hwan Kim, PanKoo Kim. 65-70 [doi]
- An Evolutionary Approach to Variational AutoencodersJeffrey Hajewski, Suely Oliveira. 71-77 [doi]
- On-device Training for Breast Ultrasound Image ClassificationDennis Hou, Raymond Hou, Janpu Hou. 78-82 [doi]
- Accelerated and Preconditioned Refinement of Gauss-Seidel Method for Uplink Signal Detection in 5G Massive MIMO SystemsRobin Chataut, Robert Akl, Mohammadreza Robaei. 83-89 [doi]
- Adaptive Beamforming and Modulation Design for 5G V2I NetworksTadilo Endeshaw Bogale. 90-96 [doi]
- Grouping Proofs for Dynamic Groups of RFID Tags: A Secure and Scalable ProtocolVanya Cherneva, Jerry L. Trahan. 97-103 [doi]
- Analysis of Human Behaviors in Real-Time SwarmsGregg Willcox, Louis-Rosenberg, Colin Domnauer. 104-109 [doi]
- High Throughput Vehicular Communication Using Spatial Multiplexing MIMOUtpal Kumar Dey, Robert Akl, Robin Chataut. 110-115 [doi]
- CSI Feedback Overhead Reduction for 5G Massive MIMO SystemsAhmed Hindy, Udar Mittal, Tyler Brown. 116-120 [doi]
- A Fuzzy Linguistic Programming for Sustainable Ecotourism ActivitiesEsra Çakir, H. Ziya Ulukan. 121-126 [doi]
- Dynamic Constellation Mapping and SER Performance for Asynchronized PNC Using QPSKAditi Singh, Tamseel M. Syed, Laurie L. Joiner. 127-133 [doi]
- Energy Consumption Analysis of Scheduling Algorithms for Cloud Computing SystemsPatrick Hovsepian, Yun Tian. 134-141 [doi]
- NetForager: Geographically-Distributed Network Performance Monitoring of Web ApplicationsLevent Dane, Deniz Gurkan. 142-149 [doi]
- A Resilient Cooperative Localization Strategy for Autonomous Underwater Vehicles in SwarmsMark Allison. 150-156 [doi]
- Dilated Causal Convolutional Model For RF FingerprintingJosh Robinson, Scott Kuzdeba, James Stankowicz, Joseph M. Carmack. 157-162 [doi]
- A Simple Model for Reasoning about Limits on Coupling in Object-Oriented SoftwareHayden Melton. 163-168 [doi]
- A Decentralized Approach to Architecture-Based Self-Protecting Software SystemsJason Porter, Emad Albassam. 169-175 [doi]
- The Paradoxical Effects of Jitter on Fairness in Financial Exchanges: Engineering ImplicationsHayden Melton. 176-181 [doi]
- Adapting a Container Infrastructure for Autonomous Vehicle DevelopmentYujing Wang, Qinyang Bao. 182-187 [doi]
- The self- upgrading mobile application for the automatic malaria detectionIsabel H. J. Song, Wanzin Yazar, Austin Tsang. 188-193 [doi]
- DeeperCoder: Code Generation Using Machine LearningSimon Shim, Pradnyesh Patil, Rajiv Ramesh Yadav, Anurag Shinde, Venkatesh Devale. 194-199 [doi]
- Detecting Malign Encrypted Network Traffic Using Perlin Noise and Convolutional Neural NetworkWajdi Bazuhair, Wonjun Lee. 200-206 [doi]
- A Data-Centric Approach to Taming the Message Dissemination in the Internet of VehiclesFletcher Trueblood, Sumanjit Gill, Robert Wong, Shahab Tayeb, Matin Pirouz. 207-214 [doi]
- Automated Radar Signal Analysis Based on Deep LearningRuchi Bagwe, Jahnavi Kachhia, Alex Erdogan, Kiran George. 215-221 [doi]
- Deep Reinforcement Learning Pairs Trading with a Double Deep Q-NetworkAndrew Brim. 222-227 [doi]
- Cost-Effective, Re-Configurable Cluster Approach for Resource Constricted FPGA Based Machine Learning and AI ApplicationsDulana Rupanetti, Kundan Nepal, Hassan A. Salamy, Cheol-Hong Min. 228-233 [doi]
- Ultra-thin MobileNetDebjyoti Sinha, Mohamed El-Sharkawy. 234-240 [doi]
- Decentralized Security Bounty Management on Blockchain and IPFSAlex Hoffman, Eric Becerril-Blas, Kevin Moreno, Yoohwan Kim. 241-247 [doi]
- Synchronized Power Injection From PVA To Grid With Reduced THD And Dc Voltage Ripple Using PID Controller for Dc Grid ApplicationsZuhair Alqarni, Johnson A. Asumadu. 248-256 [doi]
- Optimal Power Sharing of Renewable Sources and Backup Power Supply Maintenance During Grid Power FailureZuhair Alqarni, Johnson A. Asumadu, Ibrahim Alsaduni. 257-261 [doi]
- Inductive and Deductive Reasoning to Assist in Cyber-Attack PredictionEricsson Marin, Mohammed Almukaynizi, Paulo Shakarian. 262-268 [doi]
- Area and Energy Efficient Radiation Hardened Gain Cell MemoryAnudeep Bonasu, K. N. S. Reshma, M. Maria Dominic Savio, Nan Wang. 269-274 [doi]
- A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model ApproachAbdullah Alqahtani, Mazen Gazzan, Frederick T. Sheldon. 275-279 [doi]
- A Victims Detection Approach for Burning Building Sites Using Convolutional Neural NetworksFarah B. Jaradat, Damian Valles. 280-286 [doi]
- RMNv2: Reduced Mobilenet V2 for CIFAR10Maneesh Ayi, Mohamed El-Sharkawy. 287-292 [doi]
- Simulation of Surface Reflections and Shadowing in Molecular Communication SystemsUri Rogers, Yun Tian, Saqer Alhloul. 293-299 [doi]
- Machine Learning Techniques for Motion Analysis of Fatigue from Manual Material Handling Operations Using 3D Motion Capture DataGeovanni Hernandez, Damian Valles, David C. Wierschem, Rachel M. Koldenhoven, George Koutitas, Francis A. Méndez Mediavilla, Semih Aslan, Jesus Jimenez. 300-305 [doi]
- Application of RXD Algorithm to Word Vector Representation for Keyword IdentificationAlex Sumarsono. 306-310 [doi]
- Deep Convolutional Neural Network Design Approach for 3D Object Detection for Robotic GraspingPurvesh Sharma, Damian Valles. 311-316 [doi]
- BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access ControlShahriar Badsha, Iman Vakilinia, Shamik Sengupta. 317-323 [doi]
- Facial Expression Recognition with Convolutional Neural NetworksShekhar Singh, Fatma Nasoz. 324-328 [doi]
- Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic ClassificationIbraheem Saleh, Hao Ji. 329-334 [doi]
- An Automated Framework for Real-time Phishing URL DetectionFarhan Sadique, Raghav Kaul, Shahriar Badsha, Shamik Sengupta. 335-341 [doi]
- Unravelling of Convolutional Neural Networks through Bharatanatyam Mudra Classification with Limited DataAnuja P. Parameshwaran, Heta P. Desai, Michael Weeks, Rajshekhar Sunderraman. 342-347 [doi]
- Throughput, Delay, and Complexity Tradeoffs in Interference ChannelsSajjad Nassirpour, Alireza Vahid. 348-354 [doi]
- Two Methods for Authentication Using Variable Transmission Power PatternsHosam Alamleh, Ali Abdullah S. AlQahtani. 355-358 [doi]
- Optimizing B-Spline Surface Reconstruction for Sharp Feature PreservationDaniel Lee, Isabella Quan, Chris Wu, Jason Wu, Dan E. Tamir, Naphtali Rishe. 359-364 [doi]
- Using Machine Learning to Estimate Utilization and Throughput for OpenCL-Based Matrix-Vector Multiplication (MVM)Jannatun Naher, Clay Gloster, Christopher C. Doss, Shrikant S. Jadhav. 365-372 [doi]
- Pulse on Pulse Deinterleaving Radar AlgorithmAlex Erdogan, Jaron Lin, Jordan Juliano, Kiran George. 373-377 [doi]
- Implementing ROS Communications for Sensor Integration with the RB5 Collaborative RobotJason Kreitz, Moonyoung Lee, Hyun SubPark, Paul Y. Oh, Jun-Ho Oh. 378-383 [doi]
- HID-SMART: Hybrid Intrusion Detection Model for Smart HomeFaisal Alghayadh, Debatosh Debnath. 384-389 [doi]
- Data Compression and Re-computation Based Performance Improvement in Multi-Core ArchitecturesHakduran Koc, Mounika Garlapati, Pranitha P. Madupu. 390-395 [doi]
- 3.5-9 GHz Ultra-Wideband LNA With Variable Gain and Noise Cancellation for Wireless CommunicationHossein Khosravi, Mahdi Sheikhi, Abolfazl Bijari, Nabeeh Kandalaft. 396-401 [doi]
- Wireless Communication Between FPGA and MicrocontrollerPratik Shrestha, Binayak Subedi, Megan Girard, Chirag Parikh, Nabeeh Kandalaft. 402-405 [doi]
- Corpora of Russian Spontaneous Speech as a Tool for Modelling Natural Speech Production and RecognitionElena I. Riekhakaynen. 406-411 [doi]
- A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer StudiesChuck Easttom, Sudip Thapa, Justin Lawson. 412-416 [doi]
- AIOPS Prediction for Hard Drive Failures Based on Stacking Ensemble ModelHaifeng Wang, Haili Zhang. 417-423 [doi]
- On the Application of Algebraic Graph Theory to Modeling Network IntrusionsChuck Easttom. 424-430 [doi]
- On the Application of the Complexity Zeta Function to Modelling Complexity and Emergence in Neuro-EngineeringChuck Easttom. 431-436 [doi]
- Monitoring and Alarm System Timing Analysis for an Interconnecting GridSteve Chan, Parnmook Nopphawan. 437-443 [doi]
- Environmental Perception in Autonomous Vehicles Using Edge Level Situational AwarenessNima Ghafoorianfar, Mehdi Roopaei. 444-448 [doi]
- The Blindspot of Electromagnetic Interference Affecting Sensitive Medical Devices at Hospitals and Healthcare FacilitiesSteve Chan, Marco Zennaro, Ermanno Pietrosemoli, Marco Rainone, Ika Oktavianti, Parnmook Nopphawan. 449-457 [doi]
- A New Highly Power-Efficient Inverse Class-D PA for NB-IoT ApplicationsMehrdad Harifi-Mood, Abolfazl Bijari, Hossein Alizadeh, Nabeeh Kandalaft. 458-462 [doi]
- Design of A 2-3 GHz Down-Conversion Active Mixer With Improved LinearitySalman Zandian, Hossein Khosravi, Abolfazl Bijari, Nabeeh Kandalaft. 463-468 [doi]
- Edge Based Decision Making In Disaster Response SystemsJonas Wagner, Mehdi Roopaei. 469-473 [doi]
- Image Classification on NXP i.MX RT1060 using Ultra-thin MobileNet DNNSaurabh Ravindra Desai, Debjyoti Sinha, Mohamed El-Sharkawy. 474-480 [doi]
- Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS)Jacob Coleman, Farah Kandah, Brennan Huber. 481-487 [doi]
- Investigating the Security Threats on Networked Medical DevicesDavid Zaldivar, Lo'ai Ali Tawalbeh, Fadi Muheidat. 488-493 [doi]
- Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure OwnersAdrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier Watkins, William H. Robinson, Aviel Rubin. 494-499 [doi]
- UDPP: Blockchain based Open Platform as a Privacy EnablerXin Pei, Xuefeng Li, Xiaochuan Wu, Liang Sun, Yixin Cao 0003. 500-505 [doi]
- Practical Data Sharing at Untrusted StoresXin Pei, Xiaochuan Wu, Liang Sun. 506-510 [doi]
- Houston Toad and Other Chorusing Amphibian Species Call Detection Using Deep Learning ArchitecturesShafinaz Islam, Damian Valles. 511-516 [doi]
- A Non-Linear GPU Performance Modeling Approach and Consolidated Linear Hardware Model Performance Evaluation of the LEAP ClusterDavid Johnson, Damian Valles. 517-523 [doi]
- Rice Disease Detection by Image AnalysisSudarshan S. Chawathe. 524-530 [doi]
- The Voltage Regulation of Boost Converters Using Dual Heuristic ProgrammingSepehr Saadatmand, Mohammadamir Kavousi, Sima Azizi. 531-536 [doi]
- Identification of Wild Species in Texas from Camera-trap Images using Deep Neural Network for Conservation MonitoringSazida B. Islam, Damian Valles. 537-542 [doi]
- Topic Analysis of Climate-Change NewsSudarshan S. Chawathe. 543-549 [doi]
- A Robotic Control System Using Robot Operating System and MATLAB for Sensor Fusion and Human-Robot InteractionAriel Y. Ramos Ruiz, Balasubramaniyan Chandrasekaran. 550-555 [doi]
- Autonomous Control of a Line Follower Robot Using a Q-Learning ControllerSepehr Saadatmand, Sima Azizi, Mohammadamir Kavousi, Donald Wunsch. 556-561 [doi]
- An Intrusion Detection System Against DDoS Attacks in IoT NetworksMonika Roopak, Gui Yun Tian, Jonathon Chambers. 562-567 [doi]
- ROS-MATLAB Interface and Setup for a Fault Tolerant Robotic System Using Human Robot InteractionLuis J. Figueroa Rivera, Balasubramaniyan Chandrasekaran. 568-575 [doi]
- A Robotic System for Elderly Care and Monitoring using Human Robot InteractionJames Andrews, Mihir Lad, Balasubramaniyan Chandrasekaran. 576-579 [doi]
- A Data Driven PID Control SystemEvangelos A. Yfantis, William Culbreth. 580-585 [doi]
- MARS: Machine learning based Adaptable and Robust Network Management for Software-defined NetworksFarah Kandah, Ilker Özçelik, Brennan Huber. 586-591 [doi]
- Error Detection using Augmented Reality in the Subtractive Manufacturing ProcessMeghashree Hulkood Sreekanta, Abhishek Sarode, Kiran George. 592-597 [doi]
- Combinatorial-Based Event Sequences for Reduction of Android Test SuitesRyan Michaels, David Adamo, Renée C. Bryce. 598-605 [doi]
- Integer vs. Floating-Point Processing on Modern FPGA TechnologyDon Lahiru Nirmal Hettiarachchi, Venkata Salini Priyamvada Davuluru, Eric J. Balster. 606-612 [doi]
- Area-Optimized UAV Swarm Network for Search and Rescue OperationsLaik Ruetten, Paulo Alexandre Regis, David Feil-Seifer, Shamik Sengupta. 613-618 [doi]
- Zoning Effect on the Capacity and Placement Planning for Battery Exchange Stations in Battery Consolidation SystemsDara Nyknahad, Rojin Aslani, Wolfgang W. Bein, Laxmi Gewali. 619-625 [doi]
- Multi-Stage Distributed Computing for Big Data: Evaluating Connective TopologiesRasha Gargees, Grant J. Scott. 626-633 [doi]
- Prediction of Cancer Drug Effectiveness Based on Multi-Fusion Deep Learning ModelQian Li, Jie Huang, Hongming Zhu, Qin Liu. 634-639 [doi]
- Supervised Sentiment Analysis of Twitter Handle of President Trump with Data Visualization TechniqueKalyan Sahu, Yu Bai 0004, Yoonsuk Choi. 640-646 [doi]
- Multi-Tenant Big Data Analytics on AWS Cloud PlatformVinay Khedekar, Yun Tian. 647-653 [doi]
- An Investigation of Factors Influencing Private Technology Organizations' Intention to Adopt Open Government Data in Saudi ArabiaAbdullah Alhujaylan, Leslie Car, Matthew Ryan. 654-661 [doi]
- Complex Food Recognition using Hyper-Spectral ImageryShirin Nasr Esfahani, Venkatesan Muthukumar, Emma E. Regentova, Kazem Taghva, Mohamed B. Trabia. 662-667 [doi]
- A Multi Sensor Real-time Tracking with LiDAR and CameraSurya Kollazhi Manghat, Mohamed El-Sharkawy. 668-672 [doi]
- High Impulse Noise Intensity Removal in Natural Images Using Convolutional Neural NetworkMehdi Mafi, Walter Izquierdo, Malek Adjouadi. 673-677 [doi]
- A Scalable Approach to Time Series Anomaly Detection & Failure Analysis for Industrial SystemsS. M. Azharul Karim, Nitin Ranjan, Darshit Shah. 678-683 [doi]
- Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine LearningJeffrey S. Chavis, Anna L. Buczak, Aviel Rubin, Lanier A. Watkins. 684-690 [doi]
- Squeeze-and-Excitation SqueezeNext: An Efficient DNN for Hardware DeploymentRavi Teja N. V. S. Chappa, Mohamed El-Sharkawy. 691-697 [doi]
- GFSK Demodulation Using Learned Sequence CorrelationPaul Gorday, Nurgün Erdöl, Hanqi Zhuang. 698-704 [doi]
- Differential Pricing of 5G Network Slices for Heterogeneous CustomersSiying Chen, Bhaskar Krishnamachari. 705-711 [doi]
- Social Network Analysis and Mining: Privacy and Security on TwitterMansour Alshaikh, Mohamed Zohdy, Richard Olawoyin, Debatosh Debnath, Zahraddeen Gwarzo, Jalal Alowibdi. 712-718 [doi]
- Light-Based Interpretation of Quanta and its Implications on Quantum ComputingPravir Malik. 719-726 [doi]
- Buterin's Scalability Trilemma viewed through a State-change-based Classification for Common Consensus AlgorithmsAmani Altarawneh, Tom Herschberg, Sai Medury, Farah Kandah, Anthony Skjellum. 727-736 [doi]
- Evolution of Machine Learning Algorithms on Autonomous RobotsManasa Mainampati, Balasubramaniyan Chandrasekarar. 737-741 [doi]
- Location Privacy Protection in Online Query based-on Privacy Region ReplacementYali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin. 742-747 [doi]
- Fine-Grained Access Control in the Era of Cloud Computing: An Analytical ReviewKhalid Albulayhi, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon. 748-755 [doi]
- Complex Motion Detection Based on Channel State Information and LSTM-RNNPengyu Zhang, Zhuoran Su, Zehua Dong, Kaveh Pahlavan. 756-760 [doi]
- Analyzing Variation Among IoT Botnets Using Medium Interaction HoneypotsBryson Lingenfelter, Iman Vakilinia, Shamik Sengupta. 761-767 [doi]
- Interface for Human Machine Interaction for assistant devices: A ReviewSaifuddin Mahmud, Xiangxu Lin, Jong-Hoon Kim. 768-773 [doi]
- Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLsMustafa Aydin, Ismail Butun, Kemal Bicakci, Nazife Baykal. 774-779 [doi]
- Can Mobile Phone Usage Affect Hypothalamus-Pituitary-Adrenal Axis Response?Niyazi K. Uluaydin, Osman Cerezci, Selim S. Seker. 780-783 [doi]
- Optical Communication and Positioning Method of Underwater Observation Apparatus for Environmental MonitorEriko Enomoto, Takahiro Kohno, Jun Yamada, Masayuki Shimojo, Shigeki Matsuo, Umamaheswari Rajagopalan, So Yoon Lee, Xiaobin Zhang, Yoshikazu Koike, Hideki Yokoi, Hiroyuki Nishikawa, Sumito Nagasawa, Nobuyuki Futai. 784-788 [doi]
- Node Replacement Method for Disaster Resilient Wireless Sensor NetworksAlberto Gallegos Ramonet, Taku Noguchi. 789-795 [doi]
- Optimal Contention Window Based on Performance Analysis for Full Duplex WLANsShota Sakakura, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori. 796-802 [doi]
- Risk-Averse Traffic Allocation for Multi-RAT Connectivity in HetNetsFateh Elsherif, Edwin K. P. Chong. 803-811 [doi]
- Performance comparative of OpenCV Template Matching method on Jetson TX2 and Jetson Nano developer kitsArtiom Basulto-Lantsova, José A. Padilla Medina, Francisco Javier Pérez-Pinal, Alejandro Israel Barranco Gutiérrez. 812-816 [doi]
- Towards Deep Learning based Traffic Accident AnalysisAtif Naseer, Mohammed K. Nour, Basem Y. Alkazemi. 817-820 [doi]
- NVMe-over-RPMsg: A Virtual Storage Device Model Applied to Heterogeneous Multi-Core SoCsXiaohao Zhang, Yunjie Li, Gang Chen. 821-826 [doi]
- Energy Efficient 5Gb/s/pin Baseband Transceiver for 3D Memory InterfaceAhmed Alzahmi, Mohammed Alswat, Chung-Ching Lin. 827-829 [doi]
- A Secure Biometric Based User Authentication Protocol in Wireless Sensor NetworksSungJin Yu, Joon YoungLee, MyeongHyun Kim, Youngho Park. 830-834 [doi]
- Theoretical and Experimental Study of GSM Frequencies in the OfficesOsman Cerezci, Selim S. Seker, Niyazi K. Uluaydin. 835-838 [doi]
- Robotics Technology Kernel for Radiation Sensing and Site ExploitationWilliam Brooks, Dominic Larkin, Christopher M. Korpela. 839-844 [doi]
- A Bayesian based Model to Credential Learners' Content Skill AssessmentPhuoc Hung Pham, Javed I. Khan. 845-851 [doi]
- Secure5G: A Deep Learning Framework Towards a Secure Network Slicing in 5G and BeyondAnurag Thantharate, Rahul Arun Paropkari, Vijay Walunj, Cory Beard, Poonam Kankariya. 852-857 [doi]
- Design and Implementation of Cadastral Geo-spatial IoT Network Gateway Analyzer for Urban Scale Infrastructure Health MonitoringHasan Tariq, Abderrazak Abdaoui, Farid Touati, Mohammed Abdulla E. Al-Hitmi, Damiano Crescini, Adel Ben Mnaouer. 858-863 [doi]
- Extension of the Statistical MIMO Model by Alias as an Independent SubchannelFranz G. Aletsee, Sören Kohnert, Reinhard Stolle. 864-868 [doi]
- Roadway Crack Segmentation Based on an Encoder-decoder Deep Network with Multi-scale Convolutional BlocksMengyuan Sun, Runhua Guo, Jinhui Zhu, Wenhui Fan. 869-874 [doi]
- Applying k-means Method to the Modified Bottleneck Assignment Problem in Vector CaseYuusaku Kamura. 875-880 [doi]
- The Basis for Development of a Foundational Biomarker Reflectance Signature Database System for Plant Cell Identification, Disease Detection, and Classification PurposesJeanette Hariharan, Yiannis Ampatzidis, Jaafar Abdulridha. 881-887 [doi]
- Modeling and Simulation of Software Execution Time in Embedded SystemsStefan Resmerita, Anton Poelzleitner, Stefan Lukesch. 888-894 [doi]
- A New Maximum Weight Submatrix Solver Tool for Identifying Mutated Driver Pathways in Cancer using PythonFouad Kharroubi, Yassine El Kati, Shu-Lin Wang, Mohammed El Jourmi, Hassan Ouahmane. 895-900 [doi]
- Multilayer Perceptron Algorithms for Network Intrusion Detection on Portable Low Power HardwareKayla Chisholm, Chris Yakopcic, Md. Shahanur Alam, Tarek M. Taha. 901-906 [doi]
- A Time-varying Neural-network-based ARX Model of the Traffic in Mobile NetworksAbdelkader Aljerme, Huaping Liu. 907-912 [doi]
- Focus Detection Using Spatial Release From MaskingUrmil Shah, Brandon Hoang, Ryan Villanueva, Kiran George. 913-917 [doi]
- Service Robot Navigation and Computer Vision Application in a Banquet Hall SettingFausto Vega, Eric Hwang, Luke Park, Brandon Chan, Paul Oh. 918-923 [doi]
- A CCRW receiver with a single window of variable width for mitigation of multipath and ambiguity in GNSS with MBOC signalsFahad Alhussein, Huaping Liu. 924-931 [doi]
- The Future of Work: Towards Service Robot Control through Brain-Computer InterfaceLeonardo Georgescu, Dylan Wallace, Daniel Kyong, Alex Chun, Kathy Chun, Paul Oh. 932-937 [doi]
- Ticket-Based Authentication for Securing Internet of ThingsAnish Prasad Shrestha, S. M. Riazul Islam, Kyung Sup Kwak. 938-941 [doi]
- Towards Smart Classroom: Affordable and Simple Approach to Dynamic Projection Mapping for EducationAkshay Dave, Mirue Kang, Jihyun Hwang, Mia Lorenzo, Paul Oh. 942-947 [doi]
- Virtual Reality-Based Musical Therapy for Mental Health ManagementXiangxu Lin, Saifuddin Mahmud, Ethan Jones, Alfred Shaker, Alena Miskinis, Shadi Kanan, Jong-Hoon Kim. 948-952 [doi]
- Image Stitching Using Green Coordinates and Robust Elastic WarpingYuxing Mao, Shenghong Hu, Zhengyu He. 953-957 [doi]
- Shamir's Secret Sharing for Authentication without Reconstructing PasswordKishor Datta Gupta, Md Lutfar Rahman, Dipankar Dasgupta, Subash Poudyal. 958-963 [doi]
- Average Consensus-Based Data Fusion in Networked Sensor Systems for Target TrackingMd Ali Azam, Shawon Dey, Hans D. Mittelmann, Shankarachary Ragi. 964-969 [doi]
- CRADLE: Cross-Layer Design for Load-Aware Routing in IEEE 802.11-based Wireless Mesh and Sensor NetworksNemesio A. Macabale, Alexander N. Villasoto, Jerome D. Rivera, Aliyah C. Ventanilla, Miguel Paulo P. Talplacido, Angeliko L. Sevilla, Jerome O. Garcia. 970-974 [doi]
- Docker Container Security in Cloud ComputingKelly Brady, Seung Moon, Tuan Nguyen, Joel Coffman. 975-980 [doi]
- Performance Evaluation and Analysis of Proactive and Reactive MANET Protocols at Varied SpeedsRussell Skaggs-Schellenberg, Nan Wang, Daniel Wright. 981-985 [doi]
- A Secured IoT Scheme for Microgrids MonitoringJosué Martínez-Martínez, Carmen Carvajal-Jiménez, Diego A. Aponte-Roa. 986-990 [doi]
- Brain-IoT based Emotion Recognition SystemBhagyashree Shirke, Jonathan Wong, Jonathan Clyde Libut, Kiran George, Sang June Oh. 991-995 [doi]
- Exploiting Capture Diversity in Distributed Passive RFID SystemsRoberto Valentini, Piergiuseppe Di Marco, Roberto Alesii, Fortunato Santucci. 996-1000 [doi]
- A Study of Ensemble Methods for Cyber SecurityNicholas Lower, Felix Zhan. 1001-1009 [doi]
- Smart Jamming Attacks in 5G New Radio: A ReviewYouness Arjoune, Saleh Faruque. 1010-1015 [doi]
- Segregating Hazardous Waste Using Deep Neural Networks in Real-Time VideoDorothy Hua, Julia Gao, Roger Mayo, Albert Smedley, Piyush Puranik, Justin Zhan. 1016-1022 [doi]
- Artificial Intelligence for 5G Wireless Systems: Opportunities, Challenges, and Future Research DirectionYouness Arjoune, Saleh Faruque. 1023-1028 [doi]
- Hardware Trojan Detection Method Based on Time Feature of Chip TemperatureLian Yang, Xiong Li, Huan Li. 1029-1032 [doi]
- Similarity Metric for Millions of Unlabeled Face ImagesHadi Salman, Justin Zhan. 1033-1040 [doi]
- Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic DiseasesTiffany Zhan, Felix Zhan, Vince Choi, Justin Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, Dennis Garcia, Sam Vinh, Jeremy Eddy. 1041-1048 [doi]
- Healthcare Yelp: Health Care Services PredictionFelix Zhan, Yuria Mann, Nicholas Lower, Haemin Choi. 1049-1057 [doi]
- Improve Accuracy of Speech Emotion Recognition with Attention Head FusionMingke Xu, Fan Zhang, Samee U. Khan. 1058-1064 [doi]
- Increasing Reliability of Terahertz Communication Links Using Onboard Fiber ConnectivityKathirvel Nallappan, Yang Cao, Guofu Xu, Hichem Guerboukha, Chahé Nerguizian, Maksim Skorobogatiy. 1065-1070 [doi]
- A Predictive Tool For Grid Data Analysis Using Machine Learning AlgorithmsDavid Penn, Vinitha Hannah Subburaj, Anitha Sarah Subburaj, Mark Harral. 1071-1077 [doi]