Abstract is missing.
- Receding Horizon Control for Wireless Charging NetworksVincent J. Winstead, Amina Jemi. 1-7 [doi]
- Deep Brain Stimulation of Anterior Nuclei of the Thalamus and Hippocampal Seizure Rate Modulate Verbal Memory PerformanceVictoria S. Marks, Tom J. Richner, Nicholas M. Gregg, Vladimir Sladky, Jaromir Dolezal, Václav Kremen, Gregory A. Worrell, Michal T. Kucewicz. 1-4 [doi]
- Speech Intelligibility Enhancement using Microphone Array via Intra-Vehicular BeamformingDevin McDonald, Joseph Mesnard, Yufeng Lu, Jing Wang. 1-5 [doi]
- Real-time Classification of Jamming Attacks against UAVs via on-board Software-defined Radio and Machine Learning-based Receiver ModuleJoshua Price, Yuchen Li, Khair Al Shamaileh, Quamar Niyaz, Naima Kaabouch, Vijay K. Devabhaktuni. 1-5 [doi]
- Electronic Control Unit (ECU) Identification for Controller Area Networks (CAN) using Machine LearningNiroop Sugunaraj, Prakash Ranganathan. 1-7 [doi]
- Performance Evaluation of the Weighted Least Connection Scheduling for Datacenters with BigHouse SimulatorTimothy Radtke, Cristinel Ababei. 1-4 [doi]
- Building an Interconnected Environment And Dependency on Internet of ThingsQuinn Au, Amedeo Carmine, Tauheed Khan Mohd. 1-4 [doi]
- IoT Security for Smart Home: Issues and SolutionsIoannis Antzoulis, Md Minhaz Chowdhury, Shadman Latiff. 1-7 [doi]
- BERT Against Social Engineering Attack: Phishing Text DetectionNafiz Rifat, Mostofa Ahsan, Md. Chowdhury, Rahul Gomes. 1-6 [doi]
- Design Flow and Implementation of an AI-Enabled Smart Guidance System for Art GalleriesAlvaro Belloso Esteban, Mario Silvestre Delgado, Xinrui Yu, Won-Jae Yi, Jafar Saniie. 1-4 [doi]
- Pedestrian Group Detection with K-Means and DBSCAN Clustering MethodsMingzuoyang Chen, Shadi Banitaan, Mina Maleki, Yichun Li. 1-6 [doi]
- Inertia Measurement Unit-Based Displacement Estimation via Velocity Drift Compensation Using Ordinary Least Squares MethodQuazi Irfan, Marco Ciarcià, Gary Hatfield. 1-7 [doi]
- Risks in Blockchain - A Survey about Recent Attacks with Mitigation Methods and Solutions for OverallKristian Mrazek, Brian Holton, Charles Cathcart, Jacob Speirer, john do, Tauheed Khan Mohd. 5-10 [doi]
- A FDCCII Based High CMRR CMIA Design, Compatible with Both Voltage and Current Input SignalsS. Ahmadi, A. Mahmoudi, Dinesh Maddipatla, E. Khorami, Massood Z. Atashbar. 15-18 [doi]
- Fault Detection and Classification in Microgrid Using Long Short-Term MemoryMd Motaher Hossain, Sri R. Kolla. 19-26 [doi]
- SH-P2P: Self-Healing Peer-to-Peer Network with Optimal Multicast RoutingMaher Kaddoura, Nathan Bahr, Erin Gambucci. 27-31 [doi]
- Cybersecurity Based Simulation of Connected Automated Vehicles for Instructional UseTauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, Ahmad Y. Javaid. 32-36 [doi]
- Securing CAN Bus in Connected and Autonomous Vehicles Using Supervised Machine Learning ApproachesRavalika Gundu, Mina Maleki. 42-46 [doi]
- Near-Optimal Synchronization of Multiple Robot Carts Using Online Reinforcement LearningJakob Harig, Ryan Russell, Jing Wang, Yufeng Lu. 47-52 [doi]
- Data Analytics On Nasdaq Stock Prices: Reddit Social Media Case StudyChristopher N. Broadhurst, Osama Abuomar, Piotr Szczurek. 53-60 [doi]
- From Industry 4.0 towards Industry 5.0Dietmar P. F. Möller, Hamid Vakilzadian, Roland E. Haas. 61-68 [doi]
- Remote-Controlled Electric Basic Utility VehicleAdeel Sultan, Cesar D. Campos-Martinez, Warren S. Vaz. 75-79 [doi]
- Bearing Fault Diagnosis Based on Multi-scale Neural NetworksXiaofan Liu, Yuanyang Cai, Yanan Song, Lizhe Tan. 80-85 [doi]
- An Optimal Fast Charging Scheme for Li-ion Batteries Using a Continuous Exponentially Decaying Current ProfileSaad Jarid, Manohar Das. 86-90 [doi]
- Using Machine Learning Techniques for Clickbait ClassificationJulia Huette, Mahmood Al-khassaweneh, James Oakley. 91-95 [doi]
- Electrical Equivalent Circuit of Split-Shaft Wind Energy Conversion SystemsRasoul Akbari, Afshin Izadian. 103-108 [doi]
- Wafer Pattern Counting, Detection and Classification Based on Encoder-Decoder CNN StructureYu Lin. 109-113 [doi]
- A Secure API-Driven Framework for AES Modes of Encryption Enhanced with Machine LearningAtif Tirmizi, Osama Abuomar. 118-124 [doi]
- Split-Shaft Wind Energy Conversion Systems Scalability and Components SelectionRasoul Akbari, Afshin Izadian. 125-130 [doi]
- Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best PracticesMuhammad Maaz Ali Khan, Enow Nkongho Ehabe, Akalanka B. Mailewa. 131-138 [doi]
- Recent, Rapid Advancement in Visual Question Answering: a ReviewVenkat Kodali, Daniel Berleant. 139-146 [doi]
- Machine Parameter Error Influence on PMSM Position Sensor Offset Error QuantificationSandun S. Kuruppu. 147-152 [doi]
- Machine Learning Models for Cyberattack Detection in Industrial Control SystemsDavid Arnold, John Ford, Jafar Saniie. 166-170 [doi]
- High Precision Analog Gauge Reader Using Optical Flow and Computer VisionShruti Chavan, Xinrui Yu, Jafar Saniie. 171-175 [doi]
- Design Flow of mmWave Radar and Machine Vision Fusion for Pedestrian Collision WarningKaitlyn Graves, Madiha Kanwal, Xinrui Yu, Jafar Saniie. 176-181 [doi]
- PowerShell Malware Analysis Using a Novel Malware Rating SystemDavid Arnold, Charlotte David, Jafar Saniie. 182-187 [doi]
- On the Shielding Properties of Woven Microfiber Materials for Potential EMC Applications of IoT DevicesMuhammad Nadeem Rafiq, Dipankar Mitra, Adnan Iftikhar, Abdul M. Kirmani, Benjamin D. Braaten. 188-192 [doi]
- Design Flow of Blowfish Symmetric-Key Block Cipher on FPGAPiotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie. 193-197 [doi]
- Machine Vision Surveillance System - Artificial Intelligence For Covid-19 NormsRitika Nigam, Arpan Kundu, Xinrui Yu, Jafar Saniie. 198-202 [doi]
- Assisting Visually Impaired People using Autonomous Navigation System and Computer Vision for Grocery ShoppingPatricia Sanchez Miralles, Laura Fernandez Gonzalez, Xinrui Yu, Jafar Saniie. 203-208 [doi]
- Machine Learning Safety System for Treadmill UsersRavishankar Natarajan, Xinrui Yu, Jafar Saniie. 209-214 [doi]
- The Improved Implementation of the Message freshness on CAN XL using FPGAFarag Mohamed E. Lagnf, Subramaniam Ganesan. 215-220 [doi]
- Adaptive DBSCAN LiDAR Point Cloud Clustering For Autonomous Driving ApplicationsMohammad El Yabroudi, Khalfalla Awedat, Rakan C. Chabaan, Osama Abudayyeh, Ikhlas Abdel-Qader. 221-224 [doi]
- Artificial Intelligence System for Emotion Recognition and Text AnalyticsNamrata Chaudhari, Reshu Agarwal, Meghna Narwade, Xinrui Yu, Jafar Saniie. 225-230 [doi]
- Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart GridTala Talaei Khoei, Wen-Chen Hu, Naima Kaabouch. 231-237 [doi]
- A Self-Reconfigurable System for Mobile Health Text Misinformation DetectionSanjaikanth E. Vadakkethil Somanathan Pillai, Abdelrahman Ahmed ElSaid, Wen-Chen Hu. 242-247 [doi]
- Modular Delay Audio Effect System on FPGADean Cannon, Tianyang Fang, Jafar Saniie. 248-251 [doi]
- Indoor Navigation System for Visually Impaired People using Computer VisionAdrian Leyte Fraga, Xinrui Yu, Won-Jae Yi, Jafar Saniie. 257-260 [doi]
- Engineering Frequency Regulation Strategy for PV Inverters in Large-scale Renewable Energy Integrated Power SystemZhengkui Zhao, Chaofan Zhao, Jun Yang, Kaiwen Hou, Haijun Liu. 261-267 [doi]
- A Virtual Impedance Based Control for Power Sharing in a Microgrid with Uncertainty in Line ImpedanceRamkrishna Mishan, Arturo De La Cruz, Jianwu Zeng, Taesic Kim. 268-272 [doi]
- Performance of monocular and stereo camera in indoor environment for Visual SLAM using ORB methodTianshu Ruan, V. Amrusha Aryasomyajula, Nasser Houshangi. 273-278 [doi]
- A Comparative Analysis of Supervised and Unsupervised Models for Detecting GPS Spoofing Attack on UAVsT. Talaei Khoei, Aydan Gasimova, M. A. Ahajjam, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch. 279-284 [doi]
- Distributed Gesture Controlled Systems for Human-Machine InterfaceHans Johnson, Jafar Saniie. 285-289 [doi]
- Tackling Multiple Security Threats in an IoT EnvironmentMikhail Gromov, David Arnold, Jafar Saniie. 290-295 [doi]
- An Enhanced RSSI-based Framework for Localization of Bluetooth DevicesHe Zhou, Jigang Liu. 296-304 [doi]
- Auditory Brainwave Entrainment System using Time-Series Analysis of EEG SignalSimrat Kaur, Rajesh Kumar Krishnan, Xinrui Yu, Jafar Saniie. 305-310 [doi]
- Beat-by-beat Classification of ECG Signals with Machine Learning Algorithm for Cardiac EpisodesI Hua Tsai, Bashir I. Morshed. 311-314 [doi]
- A Deep Learning Multi-Task Approach for the Detection of Alzheimer's Disease in a Longitudinal StudyTala Talaei Khoei, Mohammad Aymane Ahajjam, Wen-Chen Hu, Naima Kaabouch. 315-319 [doi]
- Design Flow and Implementation of a Vision-Based Gesture-Controlled DroneArthur Findelair, Xinrui Yu, Jafar Saniie. 320-324 [doi]
- Point Cloud Generation with Stereo and Monocular Depth Estimation on FPGAAlejandro Perez-Vicente, David Hernandez, Tianyang Fang, Jafar Saniie. 325-329 [doi]
- Unsupervised Learning for Detection of Defects in Pulsed Infrared Thermography of MetalsXin Zhang, Jafar Saniie, Sasan Bakhtiari, Alexander Heifetz. 330-334 [doi]
- Hybrid Machine Learning Models for Accurate Onshore/Offshore Wind Farm ForecastsTemitope Bankefa, Ashoke Kumar Biswas, Prakash Ranganathan. 335-341 [doi]
- Using Metamorphic Relationships and Genetic Algorithms to Test Open-Source SoftwareAlex Billedeaux, Byron DeVries. 342-345 [doi]
- Optimizing Trade-offs Between Distance and Coverage for Facility LocationJhoseph Ruiz Fachin, Christian Trefftz, Xiang Cao, Byron DeVries. 346-351 [doi]
- A Perspective on Research Initiatives in Cybersecurity Engineering for Future SmartGridsMariana Hentea. 352-357 [doi]
- Automatic Detection of Situational Context Using AI from Minimal Sensor ModalityNabonita Mitra, Bashir I. Morshed. 358-362 [doi]
- Optimal Capacity Allocation of Integrated Energy Systems Considering Renewable Energy AccommodationYuantian Xue, Fan Jiang, Yunlian Liu, Jinian Yuan, Wu Dou, Chun Wei. 363-367 [doi]
- FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android AppsBalakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy. 368-374 [doi]
- A Secure Software Engineering Design Framework for Educational PurposeAbel A. Reyes Angulo, Xiaoli Yang, Quamar Niyaz, Paheding Sidike, Ahmad Y. Javaid. 375-381 [doi]
- Jaxium: A Trusted Social Network with Maximum PrivacyJackson Lauder, Sayeed Z. Sajal. 389-392 [doi]
- Low-cost Subscription-less Home Security SystemReid Kutter, Sayeed Z. Sajal. 393-400 [doi]
- Classification of COVID-19 Disease Severity using CT Scans via Deep Convolutional Neural NetworksMadison Davis, Bashir I. Morshed. 401-404 [doi]
- ADS-B Message Injection Attack on UAVs: Assessment of SVM-based Detection TechniquesHadjar Ould Slimane, Selma Benouadah, Khair Al Shamaileh, Vijay K. Devabhaktuni, Naima Kaabouch. 405-410 [doi]
- A UAV Payload for Real-time Inspection of Highway Ancillary StructuresRajrup Mitra, Jack Hackel, Amrita Das, Sattar Dorafshan, Naima Kaabouch. 411-416 [doi]
- COVID-19 Sentiment Analysis applying BERTNafiz Rifat, Mostofa Ahsan, Rahul Gomes, Md. Chowdhury. 417-422 [doi]
- Frequency Shift Baseline Removal for Improved Flow Measurement using Microwave Cavity ResonatorTianyang Fang, Jafar Saniie, Sasan Bakhtiari, Alexander Heifetz. 436-439 [doi]
- State of Health Indicator Modeling of Lithium-ion Batteries Using Machine Learning TechniquesYichun Li, Mina Maleki, Shadi Banitaan, Mingzuoyang Chen. 440-445 [doi]
- Cyber Security Threats for 5G NetworksJaya Preethi Mohan, Niroop Sugunaraj, Prakash Ranganathan. 446-454 [doi]
- Instrument Detection for the Intracorporeal Suturing Task in the Laparoscopic Box Trainer Using Single-stage object detectorsMohsen Mohaidat, Janos L. Grantner, Saad A. Shebrain, Ikhlas Abdel-Qader. 455-460 [doi]
- Detecting Cyber Attacks: A Reinforcement Learning Based Intrusion Detection SystemMostofa Ahsan, Nafiz Rifat, Md Chowdhury, Rahul Gomes. 461-466 [doi]
- Intrusion Detection for IoT Network Security with Deep Neural NetworkMostofa Ahsan, Nafiz Rifat, Md Chowdhury, Rahul Gomes. 467-472 [doi]
- Cloud Computing: Arduino Cloud IoT Integration with REST APINemese Kalubi, Sayeed Z. Sajal. 473-476 [doi]
- Soccer Player Recognition using Artificial Intelligence and Computer VisionCharles-Alexandre Diop, Baptiste Pelloux, Xinrui Yu, Won-Jae Yi, Jafar Saniie. 477-481 [doi]
- Autonomous Robotic Arm for Object Sorting and Motion Compensation using Kalman FilterMelanie Acelor Ndambani, Tianyang Fang, Jafar Saniie. 488-491 [doi]
- Uncover Security Weakness Before the Attacker Through Penetration TestingChristian D. Hines, Md Minhaz Chowdhury. 492-497 [doi]
- IoT Security and PrivacyWarren Detres, Md Minhaz Chowdhury, Nafiz Rifat. 498-503 [doi]
- Society 5.0 illustrated by the example of Computer Aided JournalismAndré Klahold, Madjid Fathi, Johannes Zenkert. 504-506 [doi]
- Computer Forensics: Complementing Cyber SecurityQuinn R. McCluskey, Md Minhaz Chowdhury, Shadman Latif, Krishna Kambhampaty. 507-512 [doi]
- Malware: A Software for CybercrimeRobert Vanness, Md Minhaz Chowdhury, Nafiz Rifat. 513-518 [doi]
- Computational Trust for Securing IoTJulian Ortiz, Md Minhaz Chowdhury. 519-526 [doi]
- Exploit Security Vulnerabilities by Penetration TestingDevin Sweigert, Md Minhaz Chowdhury, Nafiz Rifat. 527-532 [doi]
- Data Breaches: Vulnerable PrivacyAaron Fleury-Charles, Md Minhaz Chowdhury, Nafiz Rifat. 538-543 [doi]
- Bitcoin: Cryptographic Algorithms, Security Vulnerabilities and MitigationsTimothy Kowalski, Md Minhaz Chowdhury, Shadman Latif, Krishna Kambhampaty. 544-549 [doi]
- Adding Context to Industry 4.0 Analytics: A New Document Driven Knowledge Graph Construction and Contextualization ApproachChristian Weber 0003, Hasan Abu Rasheed, Madjid Fathi. 550-555 [doi]
- Cybersecurity Certificate in Digital TransformationDietmar P. F. Möller, Hamid Vakilzadian, Roland E. Haas. 556-561 [doi]
- Password Security: What Are We Doing Wrong?Donald K. Davis, Md Minhaz Chowdhury, Nafiz Rifat. 562-567 [doi]
- Card Skimming: A Cybercrime by HackersKyle Guers, Md Minhaz Chowdhury, Nafiz Rifat. 575-579 [doi]
- Active Cyber Defense by Benevolent WormsMd Minhaz Chowdhury, Joshua M. Del Toro, Krishna Kambhampaty. 580-585 [doi]
- Unmanned Aerial System (UAS) Swarm Design, Flight Patterns, Communication Type, Applications, and RecommendationsMatthew V. Krishnan Myjak, Prakash Ranganathan. 586-594 [doi]
- Capstone Design: Remote Controlled Drone using Thrust VectoringStrider Houx, Nathan Keep, Matthew Ryan, Ahmet Turkmen. 595-599 [doi]
- Capstone Project Experience: AI-Driven Virtual Therapist for Administering VibeTech Treatments Using Artificial RealityMax Walker, Jacob Paul, Ahmet Turkmen, Jeff Leismer. 600-605 [doi]
- Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence ApproachPankaj Jairu, Akalanka B. Mailewa. 606-615 [doi]
- Cyber Fraud Economics, Scam Types, and Potential Measures to Protect U.S. Seniors: A Short ReviewNiroop Sugunaraj, Akshay Ram Ramchandra, Prakash Ranganathan. 623-627 [doi]
- Analyzing the Effects of Mismatch Currents in Interferential Current TherapySarosh H. Patel, Navarun Gupta, Lawrence V. Hmurcik, Bhushan Dharmadhikari. 628-631 [doi]