Abstract is missing.
- Unsupervised Online Feature Selection for Cost-Sensitive Medical DiagnosisArun Verma, Manjesh K. Hanawal, Nandyala Hemachandra. 1-6 [doi]
- Blockchain-based Interoperable Healthcare using Zero-Knowledge Proofs and Proxy Re-EncryptionBhavye Sharma, Raju Halder, Jawar Singh. 1-6 [doi]
- VeriBlock: A Novel Blockchain Framework based on Verifiable Computing and Trusted Execution EnvironmentLakshmi Padmaja Maddali, Meena Singh Dilip Thakur, R. Vigneswaran, M. A. Rajan, Srujana Kanchanapalli, Batsayan Das. 1-6 [doi]
- Detection of Algorithmically Generated Domain Names using LSTMPalak Vij, Sayali Nikam, Ashutosh Bhatia. 1-6 [doi]
- HTmRPL++ : A Trust-Aware RPL Routing Protocol for Fog Enabled Internet of ThingsNishanth Subramanian, Shashwatha Mitra G. B, John Paul Martin, K. Chandra Sekaran. 1-5 [doi]
- Deep Reinforcement Learning based Intrusion Detection System for Cloud InfrastructureKamalakanta Sethi, Rahul Kumar, Nishant Prajapati, Padmalochan Bera. 1-6 [doi]
- Software Wallet Based Secure Participation in Hyperledger Fabric NetworksAnil Raj Thota, Prashant Upadhyay, Srihari Kulkarni, Parameswaram Selvam, Balaji Viswanathan. 1-6 [doi]
- An Automated Solution for Improving the Efficiency of Cryptocurrency MiningMan-Ching Yuen, Ka-Ming Lau, Ka-Fai Ng. 1-5 [doi]
- Distributed Off-Chain Storage of Patient Diagnostic Reports in Healthcare System Using IPFS and BlockchainRandhir Kumar, Ningrinla Marchang, Rakesh Tripathi. 1-5 [doi]
- Reputation based Routing in MANET using BlockchainMaqsood Ahamed Abdul Careem, Aveek Dutta. 1-6 [doi]
- Fountain Coding for Bootstrapping of the BlockchainRudrashish Pal. 1-5 [doi]
- Evaluation of Feature and Signature based Training Approaches for Malware Classification using AutoencodersS. S. Tirumala, Maheswara Rao Valluri, David Nanadigam. 1-5 [doi]
- Privacy-Aware Switch-Controller Mapping in SDN-Based IoT NetworksVignesh Sridharan, Kushan Sudheera Kalupahana Liyanage, Mohan Gurusamy. 1-6 [doi]
- A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size DifferenceKamalakanta Sethi, Rahul Kumar, Nishant Prajapati, Padmalochan Bera. 1-6 [doi]
- Non-invasive modeling of heart rate and blood pressure from a photoplethysmography by using machine learning techniquesGovinda Rao Nidigattu, Govardhan Mattela, Sayan Jana. 7-12 [doi]
- Designing for Safety and Efficacy: An Assessment of a Medtech Development PlatformPooja Kadambi, Vijayarajan Alagumalai. 13-18 [doi]
- Security issues and challenges in Healthcare Automated DevicesAjay Jangid, Priyansh Kumar Dubey, B. R. Chandavarkar. 19-23 [doi]
- Predicting Human Response in Feature Binding Experiment Using EEG DataSyesha Girdher, Anubha Gupta, Snehlata Jaswal, Vinayak Naik. 24-28 [doi]
- Cloud-based Mobile and Web application to support managing the treatment of TuberculosisMridula Goel, Tanmay Dixit, Priyesh Srivastava, Rajath Reghunath, R. Hariram. 29-34 [doi]
- Prevalence of Musculoskeletal Disorders and its Impact on Lost Production Days among Industrial Workers: A Data Analytics ApproachAlok Ranjan, Yanxiao Zhao. 35-40 [doi]
- Characterization of a Low Cost, Automated and Field Deployable 2-Lead Myocardial Infarction Detection SystemNeha Arora, Biswajit Mishra. 41-46 [doi]
- Smart Neck-Band for Rehabilitation of Musculoskeletal DisordersKorupalli V. Rajesh Kumar, Susan Elias. 47-52 [doi]
- Predicting Human Response in Feature Binding Experiment using EEG DataSyesha Girdher, Anubha Gupta, Snehlata Jaswal, Vinayak Naik. 53-57 [doi]
- Understanding Functional Brain Activation using Source Localization of EEG Signals in Motor Imagery TasksMansi Saxena, Ekansh Sareen, Anubha Gupta. 58-63 [doi]
- Use of Smartphone's Headset Microphone to Estimate the Rate of RespirationKanchanjot Kaur Phokela, Vinayak Naik. 64-69 [doi]
- Self-Powered Cardiac Pacemaker: The Viability of a Piezoelectric Energy HarvesterSanjana Gururaj, Alexis Applequist, Sujata Bhattarai, Abhishek M. Appaji, Pooja Kadambi. 70-75 [doi]
- Validation of an Infrastructure Independent CPAP for Newborns Suffering from Respiratory Distress SyndromeYaagyanika Gehlot, M. Basava Kumar, Goutham Prasad, Sujay Shetty, A. Senthil, Nachiket Deval, Nitesh Kumar Jangir, A. Vijayrajan. 76-81 [doi]
- A Heuristic Adaptive Traffic Control Algorithm for Signalized IntersectionsBijul Raveendran, Tom V. Mathew, Nagendra R. Velaga. 82-86 [doi]
- Locator: A Cloud-Fog-Enabled Framework for Facilitating Efficient Location based ServicesShreya Ghosh, Jaydeep Das, Soumya K. Ghosh. 87-92 [doi]
- Intelligent Fault Diagnosis of Air Brake System in Heavy Commercial Road VehiclesRadhika Raveendran, K. B. Devika, Shankar C. Subramanian. 93-98 [doi]
- A Case Study on Kernel Density Estimation and Hotspot Analysis Methods in Traffic Safety ManagementLakshmi Srikanth, Ishwarya Srikanth. 99-104 [doi]
- Vehicle Fall Severity Modeling using IoT and K-Nearest Neighbor AlgorithmNikhil Kumar, Anurag Barthwal, Divya Lohani, Debopam Acharya. 105-109 [doi]
- An Intelligent Triphase Rule-Based Wheel Slip Controller with Slip Estimation for Heavy VehiclesKarthik Ramakrushnan, Akhil Challa, Harshal Patil, Shankar C. Subramanian, Gunasekaran Vivekanandan, Sriram Sivaram. 110-115 [doi]
- Multivariate Analysis of Freeways Speed and Time Headway Under Mixed Traffic StreamsSandeep Singh, Akshay Kumar, Muhamed Niyas, Moses Santhakumar. 116-121 [doi]
- A Distributed V2V-Based Virtual Traffic Light SystemMarco Rapelli, Claudio Casetti, Marcello Sgarbi. 122-128 [doi]
- PHY-Based Key Agreement Scheme using Audio NetworkingDania Qara Bala, Bhaskaran Raman. 129-136 [doi]
- DA-TV: Dynamic Adaptive Television Broadcast for Mobile UsersMonalisa Ghosh, Anubhav, Chetna Singhal. 137-143 [doi]
- PanOpticon: A Comprehensive Benchmarking Tool for Serverless ApplicationsNikhila Somu, Nilanjan Daw, Umesh Bellur, Purushottam Kulkarni. 144-151 [doi]
- Deep Learning based Prediction Model for Adaptive Video StreamingAnirban Lekharu, K. Y. Moulii, Arijit Sur, Arnab Sarkar. 152-159 [doi]
- A Distributed Learning Simulation Platform for Edge HierarchiesAlka Bhushan, Aniket Shirke, Govind Lahoti, Umesh Bellur. 160-167 [doi]
- Secrets in Source Code: Reducing False Positives using Machine LearningAakanksha Saha, Tamara Denning, Vivek Srikumar, Sneha Kumar Kasera. 168-175 [doi]
- Unsupervised Anomaly Detection and Root Cause Analysis in Mobile NetworksCheolmin Kim, Veena B. Mendiratta, Marina Thottan. 176-183 [doi]
- Semi-supervised Subject Recognition through Pseudo Label Generation in Ubiquitous Sensor DataSourish Gunesh Dhekane, Krishnam Vajra, Dip Sankar Banerjee. 184-191 [doi]
- Practical Server-side Indoor Localization: Tackling Cardinality & Outlier ChallengesAnuradha Ravi, Archan Misra. 192-199 [doi]
- Finding summaries to obtain event phrases from streaming Microblogs using Word Co-occurrence NetworkMuskan Garg, Mukesh Kumar. 200-206 [doi]
- Low PAPR DMRS sequence Design for 5G-NR UplinkM. Sibgath Ali Khan, Koteswara Rao, SaiDhiraj Amuru, Kiran Kuchi. 207-212 [doi]
- Resource Allocation with Admission Control for GBR and Delay QoS in 5G Network SlicesTulja Vamshi Kiran Buyakar, Harsh Agarwal, Bheemarjuna Reddy Tamma, A. Antony Franklin. 213-220 [doi]
- End-to-End Delay Jitter in LTE Uplink: Simple Models, Empirical Validation & ApplicationsMegha Sahu, Arzad A. Kherani. 221-228 [doi]
- Scalable and Fair Resource Sharing Among 5G D2D Users and Legacy 4G Users: A Game Theoretic ApproachSreetama Mukherjee, Sasthi C. Ghosh. 229-236 [doi]
- Removing the PDCCH Bottleneck and Enhancing the Capacity of 4G Massive MIMO SystemsM. Pavan Reddy, Harish Kumar D., SaiDhiraj Amuru, Kiran Kuchi. 237-244 [doi]
- CORNET: A Co-Simulation Middleware for Robot NetworksSrikrishna Acharya, Amrutur Bharadwaj, Yogesh Simmhan, Aditya Gopalan, Parimal Parag, Himanshu Tyagi. 245-251 [doi]
- PSO-Based Rendezvous Point Selection for Delay Efficient Trajectory Formation for Mobile Sink in Wireless Sensor NetworksAnjula Mehto, Shashikala Tapaswi, K. K. Pattanaik. 252-258 [doi]
- Improving Access to Network Resources in IoT NetworksKaumudi Singh, Tamma V. Prabhakar, Joy Kuri. 259-266 [doi]
- Behavior Analysis through Routine Cluster Discovery in Ubiquitous Sensor DataManan Sharma, Shivam Tiwari, Suchetana Chakraborty, Dip Sankar Banerjee. 267-274 [doi]
- Machine Learning in the Wild: The Case of User-Centered Learning in Cyber Physical SystemsAtieh R. Khamesi, Eura Shin, Simone Silvestri. 275-281 [doi]
- ProxiCar: Proximity-Based Secure Digital Key Solution for CarsGirish Revadigar, Chitra Javali, Sanjay Jha. 282-289 [doi]
- Rand-OFDM: A Secured Wireless SignalHesham Mohammed, Dola Saha. 290-297 [doi]
- Privc: Privacy Preserving Verifiable ComputationHardik Gajera, Manik Lal Das. 298-305 [doi]
- Opinion Control Competition in a Social NetworkMohak Goyal, D. Manjunath. 306-313 [doi]
- "Please Come Back Later": Benefiting from Deferrals in Service SystemsAnmol Kagrecha, Jayakrishnan Nair. 314-321 [doi]
- Context-Aware Design of Cyber-Physical Human Systems (CPHS)Supratik Mukhopadhyay, Subhajit Sidhanta, Arnab Ganguly 0002, Qun Liu, Edward Collier, Yimin Zhu, Ravindra Gudishala, Chanachok Chokwitthaya, Robert DiBiano, Alimire Nabijiang, Sanaz Saeidi. 322-329 [doi]
- Design and Analysis of Fast IP Address-Lookup Schemes based on Cooperation Among RoutersGanesh Chennimala Sankaran, Krishna M. Sivalingam. 330-339 [doi]
- SBL-Based Interference Cancellation and Data Recovery for Uplink C-RANAnupama Rajoriya, Vidushi Katiyar, Rohit Budhiraja. 340-345 [doi]
- Study and Mitigation of Platform Related UWB Ranging ErrorsNour Smaoui, Omprakash Gnawali, Kyungki Kim. 346-353 [doi]
- Effects of Sensing & Control Errors on Quality of Adaptation in Networked SystemsKaliappa Ravindran, Arun Adiththan. 354-361 [doi]
- BH-MAC: An efficient Hybrid MAC Protocol for Vehicular CommunicationSaurabh Kumar, HyungWon Kim 0001. 362-367 [doi]
- ROSE: Random Opportunistic and Selective Exploration for Cooperative Edge Swarm of UAVsSudip Misra, Anandarup Mukherjee, Aniq Ur Rahman, Narendra Singh Raghuwanshi. 368-374 [doi]
- Charge Scheduling in Wireless Rechargeable Sensor Networks Using Mobile Charging VehiclesRohit Kumar, Joy Chandra Mukherjee. 375-382 [doi]
- A Journey in Applying Blockchain for Cyberphysical SystemsVolkan Dedeoglu, Ali Dorri, Raja Jurdak, Regio A. Michelin, Roben Castagna Lunardi, Salil S. Kanhere, Avelino F. Zorzo. 383-390 [doi]
- From Spanning Trees to Meshed TreesH. B. Acharya, John F. Hamilton, Nirmala Shenoy. 391-395 [doi]
- AROM: An Adaptive Resource Optimization Model for Mobile IoT EdgeRamesh Guntha, Sethuraman N. Rao, Maneesha V. Ramesh, Maik Benndorf, Thomas Haenselmann. 396-403 [doi]
- On Some Universally Good Fractional Repetition CodesShreyansh A. Prajapati, Sourav Deb, Manish K. Gupta 0004. 404-411 [doi]
- The Watermark-Securable Subspace of a Linear System Containing a Single Malicious ActuatorBharadwaj Satchidanandan, P. R. Kumar. 412-418 [doi]
- An Interoperable ECC based Authentication and Key Agreement Scheme for IoT EnvironmentAsit Sahoo, Shreeya Swagatika Sahoo, Sampa Sahoo, Bibhudatta Sahoo 0001, Ashok Kumar Turuk. 419-426 [doi]
- VRMap: A Cost and Time Aware Remapping of Virtual Data Centres Over a Geo-distributed InfrastructureAnurag Satpathy, Manmath Narayan Sahoo, Lipsa Chottray, Banshidhar Majhi, Ashutosh Mishra, Sambit Bakshi. 427-434 [doi]
- BER Performance of Full-Duplex Two-Way Relay System with User MobilityTanvi Kaple, Prasanna Raut, Prabhat Kumar Sharma. 435-439 [doi]
- Energy Efficient Multi-Pair Massive MIMO Two-Way AF Relaying: A Deep Learning ApproachVenkatesh Tentu, Dheeraj Naidu Amudala, Anupama Rajoriya, Ekant Sharma, Rohit Budhiraja. 440-445 [doi]
- Copula-Based Cooperative Sensing of OFDM Signals in Cognitive RadiosAkhil Singh, Sai Praneeth Chokkarapu, Sachin Chaudhari, Pramod K. Varshney. 446-451 [doi]
- Cache-Aided Non-Orthogonal Multiple Access Over Fading Channels in Downlink Cellular NetworksShreshta Mohan, Shreya Morgansgate, Priyadarshini Basket, Sanjeev Gurugopinath, Sami Muhaidat. 452-459 [doi]
- A Decoupling Property in Low-Resolution MIMO-OFDM Systems and its ApplicationsNarayan Prasad, Xiao-Feng Qi. 460-467 [doi]
- Relay Selection in Millimeter Wave D2D Communications Through Obstacle LearningSubhojit Sarkar, Sasthi C. Ghosh. 468-475 [doi]
- Joint Control and Shared Channel Scheduling for Downlink in 3GPP Narrowband-IoTM. Pavan Reddy, Abhinav Kumar 0001, Kiran Kuchi. 476-483 [doi]
- Optimal Downlink Scheduling and Power Allocation with Reconfiguration DelayGowri Muraleedharan, B. S. Vineeth, K. Premkumar. 484-490 [doi]
- CONETSI: On Demand Distributed Network State Information Collection using Opportunistic Exploration for Resource Constrained NetworksSrijith Nair, Aadreesh Sahu, Srikanth Mantravadi, S. V. R. Anand, Malati Hegde. 491-498 [doi]
- Social Network Aware Dynamic Edge Server Placement for Next-Generation Cellular NetworksG. Manasvi, Abhishek Chakraborty 0002, B. S. Manoj. 499-502 [doi]
- Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid ApplicationsKamalakanta Sethi, Ankit Pradhan, Padmalochan Bera. 503-506 [doi]
- Power Scaling for Massive MIMO UAV Communication SystemSoumyadeep Datta, Ekant Sharma, Rohit Budhiraja. 507-510 [doi]
- Adaptive Flow-Level Scheduling for the IoT MACPragya Sharma, Jayakrishnan Nair, Raman Singh. 515-518 [doi]
- BER Analysis of Reconfigurable Intelligent Surface Assisted Downlink Power Domain NOMA SystemVetrivel Chelian Thirumavalavan, Thiruvengadam S. Jayaraman. 519-522 [doi]
- Anticipatory QoE Mechanisms for 5G Data AnalyticsR. Vidhya, P. Karthik, Satish Jamadagni. 523-526 [doi]
- A Study on Real-Time Edge Computed Occupancy Estimation in an Indoor EnvironmentAnirban Das, Rohan Gupta, Suchetana Chakraborty. 527-530 [doi]
- A Binary Classification Approach for Time Granular Traffic in SDWMN based IoT NetworksRohit Kumar, Venkanna U., Vivek Tiwari. 531-534 [doi]
- Storage and Rack Sensitive Replica Placement Algorithm for Distributed Platform with Data as FilesVinay Venkataramanachary, Enrique Reveron, Wei Shi. 535-538 [doi]
- Dynamic Control of Packet Duplication in 5G-NR Dual Connectivity ArchitectureSwarajya Madhuri Rayavarapu, Sai Dhiraj Amuru, Kuchi Kiran. 539-542 [doi]
- SilentInformer: A Framework for Information Dispersion Using Inaudible Acoustic SignalsUtkalika Satapathy, Soumyajit Chatterjee, Sandip Chakraborty. 543-546 [doi]
- MIMO-TTR+: A Novel Topology-Transparent Scheduling Scheme for MIMO Wireless NetworksDipti Dash, Debarshi Kumar Sanyal. 547-550 [doi]
- Impact of Earthquakes based on Satellite Images using IoT and Sensor NetworksSameer Rajput, Amar Ippili, Divya Puraswani, Shubh Johri, Aarathi Nadathur, Subhankar Dhar. 551-554 [doi]
- I Know Who You are: A Learning Framework to Profile Smartphone UsersMihika Naik, Ashutosh Bhatia, Kamlesh Tiwari. 555-558 [doi]
- EM Radiation Reduction in WCN: Towards Safe GenerationsHaneet Kour, Rakesh Kumar Jha. 559-562 [doi]
- Time Series Snapshot of Event Boundary Detection and Area Estimation in Wireless Sensor NetworksSrabani Kundu, Nabanita Das, Avirup Das. 563-566 [doi]
- Efficient Keyword Matching for Deep Packet Inspection based Network Traffic ClassificationPratibha Khandait, Neminath Hubballi, Bodhisatwa Mazumdar. 567-570 [doi]
- Contextual Bandits Evolving Over Finite TimeHarsh Deshpande, Vishal Jain, Sharayu Moharir. 571-574 [doi]
- Performance Analysis of UAV-aided RF Energy TransferSuraj Suman, Swades De. 575-578 [doi]
- Link Quality Measurements for Marine Vehicular to Infrastructure Network (V2I)Dhanesh Raj, Maneesha Vinodini Ramesh, Sethuraman N. Rao. 578-581 [doi]
- Machine Learning & Concept Drift based Approach for Malicious Website DetectionSiddharth Singhal, Utkarsh Chawla, Rajeev Shorey. 582-585 [doi]
- Deterministic Linear Transmit Processing for Single-User MIMO SystemsSandeep Joshi, Ranjan K. Mallik, Jack H. Winters. 586-589 [doi]
- Multihop D2D Communication to Minimize and Balance SAR in 5GAvirup Das, Nabanita Das. 590-593 [doi]
- A Secure and Privacy-Preserved Road Condition Monitoring SystemBarnana Baruah, Subhasish Dhal. 594-597 [doi]
- Sparse Robust Distributed Estimation by Diffusion AdaptationSowjanya Modalavalasa, Upendra Kumar Sahoo, Ajit Kumar Sahoo, Ajitesh Yadav. 598-601 [doi]
- Energy-Throughput Tradeoff with Optimal Sensing Order in Cognitive Radio NetworksM. Santhoshkumar, K. Premkumar. 602-605 [doi]
- Analysis of Underwater Acoustic Channel based on Angle of Arrival DistributionManishika Rawat, Brejesh Lall, Seshan Srirangarajan. 606-609 [doi]
- Positive Information Diffusion for Rumor Containment in Online Social NetworksRohit Tripathi 0001, Shilpa Rao. 610-613 [doi]
- Demonstration of High Data-rate Multimedia Streaming in a Laser-based Indoor Visible Light Communication SystemR. N. Sathisha, Vidit Jha, Faheem Ahmad, Varun Raghunathan. 614-617 [doi]
- Experimental Test-Bed Implementation of Hybrid Opportunistic Routing Design for Low Power, Lossy Wireless Sensor NetworkJayavignesh Thyagarajan, Suganthi K. 618-621 [doi]
- Achieving Real-Time Sign Language Translation Using a Smartphone's True Depth ImagesHyeonjung Park, Jong-Seok Lee, JeongGil Ko. 622-625 [doi]
- Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic ApproachJ. Jithish, Sriram Sankaran, Krishnashree Achuthan. 626-629 [doi]
- Whittle Index for AoI-Aware SchedulingBejjipuram Sombabu, Aditya Mate, D. Manjunath, Sharayu Moharir. 630-633 [doi]
- A New Approach to Correlated Multi Armed BanditsIshank Juneja, Devanshu Singh Gaharwar, Dhruv Varshney, Sharayu Moharir. 634-637 [doi]
- Architectural Considerations for Building a Robust Crowdsourced Disaster Relief ApplicationRamesh Guntha, Sethuraman N. Rao, Maneesha V. Ramesh. 638-641 [doi]
- Deep Learning-Based Smart Parking Solution using Channel State Information in LTE-Based Cellular NetworksAmala Sonny, Prabhat Kumar Rai, Abhinav Kumar 0001, Mohammed Zafar Ali Khan. 642-645 [doi]
- Learning based Beam Tracking in 5G NRIpshita Panda, Sreenath Ramanath. 646-649 [doi]
- Unreliable Multi-Armed Bandits: A Novel Approach to Recommendation SystemsAditya Narayan Ravi, Pranav Poduval, Sharayu Moharir. 650-653 [doi]
- Versatile Multivariate Data Pruning in Smart Grid IoT NetworksSharda Tripathi, Mayukh Roy Chowdhury, Swades De. 654-657 [doi]
- Tracking and Stabilization of Heart-Rate using Pacemaker with FOF-PID Controller in Secured Medical Cyber-Physical SystemPritam Khan, Yasin Khan, Sudhir Kumar. 658-661 [doi]
- ATRNN: Using Seq2Seq Approach for Decoding Polar CodesAniket Dhok, Swapnil Bhole. 662-665 [doi]
- Caching Techniques to Improve Latency in Serverless ArchitecturesBishakh Chandra Ghosh, Sourav Kanti Addya, Nishant Baranwal Somy, Shubha Brata Nath, Sandip Chakraborty, Soumya K. Ghosh. 666-669 [doi]
- Energy Efficiency in Millimeter Wave based Cellular Networks with DUDe and Dynamic TDDYoghitha Ramamoorthi, Abhinav Kumar 0001. 670-673 [doi]
- Feedback-Based Keyphrase Extraction from Unstructured Text DocumentsNishtha Madaan, Mudit Saxena, Hima Patel, Sameep Mehta. 674-676 [doi]
- Detection of Traffic Discrimination in the InternetVinod S. Khandkar, Manjesh K. Hanawal. 677-679 [doi]
- An Interactive Approach Deployed for Rhinoplasty using Mixed RealityManasvi J. Maasthi, H. L. Gururaj, V. Janhavi, K. Harshitha, B. H. Swathi. 680-682 [doi]
- Shared Memory Enabled Service Plane OptimizationRamanathan Subramanian, Jeslin Puthenparambil. 683-684 [doi]
- NViZ: An Interactive Visualization of Network Security Systems LogsAmit Kumar Meena, Neminath Hubballi. 685-687 [doi]
- An Implementation of an Industrial Internet of Things on an SMT Assembly LineGaurav Bhandari, Rajeev Shorey, Rajesh Sundaresan, Prakash Hiremath M., Ashish Joglekar, Anupama Kulkarni, Devadatta M. Kulkarni, C. Mahadeva, Sampad B. Mohanty, D. Raghunath, M. B. Raju. 688-690 [doi]
- Prohibition of Mobile Phones in Restricted Areas Using Ibeacon Broadcaster and Device ManagerU. Tanuja, H. L. Gururaj, Janhavi V, C. K. Seema. 691-693 [doi]
- Demo: A Machine Learning based M-ary Amplitude Modulated Visible Light Communication SystemT. V. Sethuraman, Susan Elias, Ashwin Ashok. 694-695 [doi]
- Implementation of 5G Authentication and Key Agreement Protocol on Xbee NetworksS. V. Sriraam, Suraj Sajeev, Rohit Joshi, Amogh Vithalkar, Manish Bansal, Harshan Jagadeesh. 696-698 [doi]
- Smart IoT Communication: Circuits and SystemsWadood Ahmad Khan, Payali Das, Sushmita Ghosh, Mayukh Roy Chowdhury, Sharda Tripathi, Sandeep Kaur, Shouri Chatterjee, Swades De. 699-701 [doi]
- Scalability Analysis of an Emulated Platform for Heterogeneous NetworksGarima Mishra, Hemant Kumar Rath. 702-707 [doi]
- Networked Remote Music Collaboration using Machine LearningNishtha Nayar, Divya Lohani. 708-713 [doi]
- Enhancing Fault Detection in Time Sensitive Networks using Machine LearningNitin Desai, Sasikumar Punnekkat. 714-719 [doi]
- DeepSplit: Dynamic Splitting of Collaborative Edge-Cloud Convolutional Neural NetworksRishabh Mehta, Rajeev Shorey. 720-725 [doi]
- DeepMines: A fog Enabled Prediction Platform for Underground Coal MinesSunny Sanyal, Animesh Chattopadhyay. 726-730 [doi]
- Blockchain Enabled Trustless API MarketplaceVijay Arya, Sayandeep Sen, Palanivel A. Kodeswaran. 731-735 [doi]
- Ant-Taxi to Pie-Passenger: Optimizing Routes and Time for Distributed Taxi Ride SharingAishwarya Manjunath, Vaskar Raychoudhury, Snehanshu Saha. 736-741 [doi]
- An Efficient Pipeline for Distant Person Detection and Identification in 4K Video using GPUsGovardhan Mattela, Manmohan Tripathi, Chandrajit Pal, Rampelli Sai Dhiraj, Amit Acharyya. 744-749 [doi]
- A Novel Forest Fire Detection System Using Fuzzy Entropy Optimized Thresholding and STN-based CNNSuresh Babu Avula, Satya Jaswanth Badri, Gokul Reddy P. 750-755 [doi]
- Skeleton based Human Action Recognition for Smart City Application using Deep LearningM. Rashmi, Ram Mohana Reddy Guddeti. 756-761 [doi]
- An IoT-based System to Evaluate Indoor Air Pollutants Using Grey Relational AnalysisKrati Rastogi, Divya Lohani, Debopam Acharya. 762-767 [doi]
- Findings from an experimental study of student behavioral patterns using smartphone sensorsDimple Shah, Aswini Upasini, Kalyan Sasidhar. 768-772 [doi]
- Design of Smart Roads - A Vision on Indian Smart Infrastructure DevelopmentSai Deepthi Bhogaraju, Veera Rajesh Kumar Korupalli. 773-778 [doi]
- Learning from Peers at the Wireless EdgeShuvam Chakraborty, Hesham Mohammed, Dola Saha. 779-784 [doi]
- In Sync with Today's Industrial System ClocksRahul N. Gore, Elena Lisova, Johan Åkerberg, Mats Björkman. 785-790 [doi]
- Face Recognition: Challenges and Issues in Smart City/EnvironmentsG. B. Praveen, Dakala Jayachandra. 791-793 [doi]
- Smart City Renovation using SDN FrameworkMadhukrishna Priyadarsini, Pooja Mittal, Padmalochan Bera. 794-799 [doi]
- Cognitive Radio Networks with Energy Harvesting and Eavesdropping-Emulation ResilienceAvik Banerjee, Santi P. Maity. 873-875 [doi]
- Performance Evaluation of QoS in Marine Vehicle to Infrastructure (V2I) NetworkDhanesh Raj. 876-878 [doi]
- Half-Duplex Attack: An Effectual Attack Modelling in D2D CommunicationMisbah Shafi, Rakesh Kumar Jha. 879-881 [doi]
- VM Migration for Profit Maximization in Federated Cloud Data CentersMoustafa Najm, Venkatesh Tamarapalli. 882-884 [doi]
- Energy Efficient Wireless Communication for IoT Enabled GreenhousesRitesh Kumar Singh, Rafael Berkvens, Maarten Weyn. 885-887 [doi]
- A LoRaWAN based Open Source IOT Solution for Monitoring Rural Electrification PolicyMohammed Samdani Shaik, Dipam Shah, Raghuram Chetty, Rahul R. Marathe. 888-890 [doi]
- Identifying Outdoor Context by Correlating Air and Noise Pollution Sensor LogBiswajit Maity, Yashwant Polapragada, Arindam Ghosh 0002, Sanghita Bhattacharjee, Subrata Nandi. 891-893 [doi]
- Online Signature Profiling using Generative Adversarial NetworksChandra Sekhar Vorugunti, Prerana Mukherjee, Viswanath Pulabaigari. 894-896 [doi]
- Joint Preference Metric for Efficient Resource Allocation in Co-Existence of eMBB and URLLCAnnapurna Pradhan, Susmita Das. 897-899 [doi]
- Revenue Sharing in a Soft-Neutral RegimeFehmina Malik, Manjesh K. Hanawal, Yezekael Hayel, Jayakrishnan Nair. 900-902 [doi]