Abstract is missing.
- A Secure Protocol in MAC Layer of Cognitive Radio NetworksW. U. Huayi, B. A. I. Baohua. 1-4 [doi]
- Range Information and Amplitude-phase Information for Multi-carrier Radar SystemsHao Luo 0005, Dazhuan Xu, Yue Chen, Shengkai Xu. 1-5 [doi]
- Research on Gateway Deployment for Throughput Optimization in Wireless Mesh NetworksWei Liu 0043, Chang Xu, Zhao Tian, Dong-Kun Li, Guan-Zhong Lu, Wei She. 1-5 [doi]
- HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0Rajesh Gupta 0007, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar 0001, Mohammad S. Obaidat, Balqies Sadoun. 1-5 [doi]
- Analysis of Authentication System Based on Keystroke DynamicsAmanzhol Daribay, Mohammad S. Obaidat, Parimala Venkata Krishna. 1-6 [doi]
- A Deep Neural Network Based Hierarchical Multi-Label Classifier for Protein Function PredictionXin Yuan, Weite Li, Kui Lin, Jinglu Hu. 1-5 [doi]
- Specification of software requirements with support of business process ontologiesJorge Luís Gregório, Hilda Carvalho de Oliveira, Lukas Riehl Figueiredo, Simone G. D. Prado. 1-5 [doi]
- A Hash Function based on Sponge Structure with Chaotic Map for Spinal CodesWensha Huang, Lina Wang. 1-5 [doi]
- Research on Technology Empowerment in Digital Transformation of Library in Information AgeChunmeng Weng, Jinzhu Cao, Feiyun Zhu. 1-5 [doi]
- A Short Survey and Challenges for Multiobjective Evolutionary Algorithms Based on DecompositionQian Xu, Zhanqi Xu, Tao Ma. 1-5 [doi]
- Simplified Structure for Parameterizing Lp-Norm-Minimized Variable FiltersTian-Bo Deng. 1-4 [doi]
- Analysis of Appropriate Security Processes to Mitigate Risk in a Popular Election SystemSegundo Moises Toapanta Toapanta, Christopher Eduardo Solís Salazar, Daniel Humberto Plua Moran, Luis Enrique Mafla Gallegos, Ma. del Roció Maciel Arellano. 1-5 [doi]
- Optimization of Flue Gas Uplift Model Based on Eddy-dissipation Rate of Flight TurbulenceXinmiao Yan, Jiemin Zhou, Fanrong Sun. 1-5 [doi]
- Multi-level Reliable Security Mechanism Based on SpaceOSHongyi Liu, Xuan Hao, Jingang Liu. 1-5 [doi]
- A new task scheduling strategy based on improved ant colony algorithm in IaaS layerLi Liu, Taiyu Luo, Yuanyuan Du. 1-5 [doi]
- A Fast Aerial Images Mosaic Method Based on ORB Feature and Homography MatrixGuiqin Yang, Xing Chang, Zhanjun Jiang. 1-5 [doi]
- Wheeled robot navigation based on a unimodal potential functionGregor Klancar, Gasper Music, Hao Chen, Marija Seder. 1-5 [doi]
- BloHosT: Blockchain Enabled Smart Tourism and Hospitality ManagementUmesh Bodkhe, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar 0001, Mohammad S. Obaidat. 1-5 [doi]
- Min Norm Failure Vector Guided Yield Optimization Method for Nanometer SRAM DesignChengzhi Jiang, Xiaoming Fan, Yan Xing, Chao Duan, Jiaqi Zhang. 1-4 [doi]
- A New Indoor Localization Algorithm Using Received Signal Strength Indicator Measurements and Statistical Feature of the Channel State InformationChuanhui Ma, Mengwei Yang, Yi Jin, Kang Wu, Jun Yan. 1-5 [doi]
- A Secure Identity-based Deniable Authentication Protocol for MANETsDaya Sagar Gupta, SK Hafizul Islam, Mohammad S. Obaidat. 1-5 [doi]
- Improved LEACH-M Protocol for Aerial Sensor NetworksLi Tan, Minji Wang, Haoyu Wang, Li Liu. 1-4 [doi]
- Model of foresight work habits of agile software team members by personality traitsVanja Catic Kuko, Denis Music, Zanin Vejzovic, Jasmin Azemovic. 1-5 [doi]
- Real-time Resources Allocation Framework for Multi-Task Offloading in Mobile Cloud ComputingZhiqiang Gu, Ryuichi Takahashi, Yoshiaki Fukazawa. 1-5 [doi]
- Multi-factor Influenced Integrated Driving Behavior Clustering Analysis Evaluation ModelShaojie Liu, Ning Wang, Xiaoting Wang. 1-5 [doi]
- Medical Handwritten Prescription Recognition Using CRNNRoger Achkar, Khodor Ghayad, Rayan Haidar, Sawsan Saleh, Rana Al Hajj. 1-5 [doi]
- Review on Development of Software and Information Services Industry in BeijingHong-Xia Wang, Shao-Jie Wen. 1-5 [doi]
- Understanding Face Age Estimation: humans and machineJhan S. Alarifi, John Fry, Darren Dancey, Moi Hoon Yap. 1-5 [doi]
- Building a Biomedical Ontology for Chronic Liver DiseaseKanwal Wahab, Usman Qamar, Khawaja Sarmad Arif, Usman Ali. 1-5 [doi]
- Face Recognition Using Depth Images Base Convolutional Neural NetworkJuxiang Chen, Zhihao Zhang, Liansheng Yao, Bo Li, Tong Chen. 1-4 [doi]
- An Intelligent Parallel Algorithm for Online Virtual Network EmbeddingKhoa T. D. Nguyen, Changcheng Huang. 1-5 [doi]
- Prototype to Optimize the Management of Information Security Used by Internal Users in a Public Organization of EcuadorSegundo Moises Toapanta Toapanta, Francisco Xavier Castro De La Rosa, Eduardo Michael Navarrete Fernandez, Fabrizio Darío Triviño Triviño, Luis Enrique Mafla Gallegos. 1-5 [doi]
- A Novel Data Compression Technique Incorporated with Computer Offloading in RGB-D SLAMBiwei Li, Yu Guo, Zhenqiang Mi, Yang Yang 0004, Mohammad S. Obaidat. 1-5 [doi]
- Finding Persistent Items using Invertible Bloom Lookup TableZhoudan Lv, Feng He, Lin Chen. 1-5 [doi]
- Optimal Power Allocation Strategy for Multi-target Wireless Wideband Localization System via Genetic AlgorithmFang Liu, Jun Yan. 1-4 [doi]
- Link Congestion Prediction using Machine Learning for Software-Defined-Network Data PlaneJunying Wu, Yunfeng Peng, Meng Song, Manman Cui, Liang Zhang. 1-5 [doi]
- Scheduling Different Types of Gang Jobs in Distributed SystemsGeorgios L. Stavrinides, Helen D. Karatza. 1-5 [doi]
- Knowledge Management System Design using Gamification: A Case study of the e-Government Laboratory, Universitas IndonesiaMochammad Arief Hermawan Sutoyo, Hendri Priyambowo, Afifah Nurzahra, Dana Indra Sensuse, Shidiq Al Hakim, Deki Satria. 1-5 [doi]
- On the Asymptotic Capacity of Slotted Multiple Access ChannelFedor I. Ivanov, Pavel Sergeevich Rybin. 1-5 [doi]
- Multilevel Permission Extraction in Android Applications for Malware DetectionZhen Wang, Kai Li, Yan Hu, Akira Fukuda, Weiqiang Kong. 1-5 [doi]
- Switch Fault Tolerance in a Mirrored K-Ary N-TreeYamin Li, Wanming Chu. 1-5 [doi]
- An Optimization Based on General Airport of Complex ConditionHuimin Zhang, Fanrong Sun, Jingjing Qian. 1-5 [doi]
- Secure UAV Communication with Robust Communication and Trajectory DesignWenlu Fan, Yang Wu, Shaohua Ju, Kun Zhang, Weiwei Yang. 1-5 [doi]
- An Integrated Visible-Light and Radio Frequency Communications SystemPravallika Dhulipalla, Minju Kang, Taejin Kim, Nathaniel Tan, Siddhartan Govindasamy, Michael B. Rahaim. 1-6 [doi]
- Detecting Signal Spoofing and Jamming Attacks in UAV Networks using a Lightweight IDSMenaka Pushpa Arthur. 1-5 [doi]
- Model of Shared Secret Applied to a Voting System for the National Electoral Council of EcuadorSegundo Moises Toapanta Toapanta, Luis Antonio Palomino Romero, Felix Gustavo Mendoza Quimi, Maximo Geovani Tandazo Espinoza, Luis Enrique Mafla Gallegos. 1-5 [doi]
- Automatic Pavement Crack Detection Using HMRF-EM AlgorithmMingyuan Lin, Rundi Zhou, Qing Yan, Xin Xu. 1-5 [doi]
- Automatic Classification of Discourse in Chinese Classroom Based on Multi-feature FusionLili Xu, Xiuling He, Jing Zhang, Yangyang Li. 1-5 [doi]
- An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete LogarithmChandrashekhar Meshram, Mohammad S. Obaidat, Kuei-Fang Hsiao. 1-5 [doi]
- Evaluating the use of fuzzy logic in an educational game for offering adaptationSpyros Papadimitriou, Konstantina Chrysafiadi, Maria Virvou. 1-5 [doi]
- Air Quality Forecasting Using SVR with Quasi-Linear KernelHuilin Zhu, Jinglu Hu. 1-5 [doi]
- A Physical Layer Key Generation Scheme Based on Full-duplex Mode in Wireless Networks without Fixed InfrastructureZiyi Zhuang, Shengming Jiang, YanLi Xu, Xiang Luo, Xin Cheng. 1-5 [doi]
- CoNN: Collaborative Neural Network for Personalized Representation Learning with Application to Scalable Task ClassificationNanxing Li, Yiqiang Sheng, Hong Ni. 1-5 [doi]
- Dynamic Service Selection based on User Feedback in the IoT EnvironmentHuilan Quan, Ryuichi Takahashi, Fukazawa Yoshiaki. 1-5 [doi]
- Performance Evaluation of Fingerprint Recognition Modules on Mobile Device Based on Rule of ThreeJiaYing Guo, Yu Lu, Qian Xie, Qichao Guo. 1-4 [doi]
- Lightweight Two-dimensional Routing Mechanism Based on Agent CalculationYuanyuan Zhou, Wenlong Chen, Rong Xiao, Chengan Zhao, Tianzhu Shao. 1-5 [doi]
- AIRS-x: An eXtension to the Original Artificial Immune Recognition Learning AlgorithmDimitrios G. Giatzitzoglou, Dionisios N. Sotiropoulos, George A. Tsihrintzis. 1-5 [doi]
- Performance Analysis of Hatch Filtering for Cycle Slips Detection in Single Frequency RTK PositioningSalma Zainab Farooq, Dongkai Yang, Echoda Ngbede Joshua Ada. 1-5 [doi]
- The School District Reorganization by Combining with Traffic Congestion DataTong Zhou, Yu Guo, Yang Yang 0004, Zhenqiang Mi, Mohammad S. Obaidat. 1-5 [doi]
- Network polar coded-cooperative SC-FDMA systemRahim Umar, Fengfan Yang, Shoaib Mughal. 1-5 [doi]