Abstract is missing.
- D2D Communication: COVID-19 Contact Tracing Application Using Wi-Fi DirectHamid Mcheick, Houssam Hajj Hassan, Hanane Kteich. 1-6 [doi]
- Smart & automated production based on MQTTChristian Überall, Marcel Bartholet, Roman Khudaybergenov. 1-6 [doi]
- Cost effective and Accurate Vehicle Make/Model Recognition method Using YoloV5Di Wang, Ahmad Al-Rubaie, Yaqoub Ismail Alsarkal, Sandra Stincic, John Davies. 1-4 [doi]
- Deployment of 5G Experiments on Underserved Areas using the Open5GENESIS SuiteAlejandro Fornes-Leal, Régel Gonzalez Usach, Carlos E. Palau, Manuel Esteve, Dimitris Lioprasitis, Athanasios Priovolos, Georgios Gardikis, Spyros Pantazis, Socrates Costicoglou, Andreas Perentos, Eleftheria Hadjioannou, Michael Georgiades, Alexander Phinikarides. 1-4 [doi]
- Using Deep Learning for COVID-19 Control: Implementing a Convolutional Neural Network in a Facemask Detection ApplicationCaolan Deery, Kevin Meehan. 1-6 [doi]
- Privacy-aware Robust Proactive Content Caching using Edge Service ProvidersRishi Kashyap, Manasa Bhat, Deepa Umashankar, Vamsi Krishna Tumuluru. 1-6 [doi]
- Data-Driven Anomaly Detection Based on Multi-Sensor Data FusionDi Wang, Ahmad Al-Rubaie, Sandra Stincic, John Davies, Alia Aljasmi. 1-8 [doi]
- Challenges and Approaches to Time-Series Forecasting for Traffic Prediction at Data CentersShruti Jadon, Ajit Patankar, Jan Kanty Milczek. 1-8 [doi]
- On Finger Stretching and Bending Dynamics as a Biometric ModalitySraddhanjali Acharya, Abdul Serwadda. 1-8 [doi]
- Campus Microgrid-Design and Secure Operation to Prevent OvervoltageSafaa S. Qasim Al-Maliki, Junhui Zhao, Zaid H. Ali. 1-5 [doi]
- AMQP and beyondAmbar Prajapati. 1-6 [doi]
- Decentralized Computation Offloading in Mobile Edge Computing SystemsRohan Sharma, Kushaal Gummaraju, Pranav Anantharam, Ojaswi Saraf, Vamsi Krishna Tumuluru. 1-6 [doi]
- A Hybridized Approach for Testing Neural Network Based Intrusion Detection SystemsFaqeer ur Rehman, Clemente Izurieta. 1-8 [doi]
- Precise fruits: Hardware supported time-synchronisation on the RaspberryPIMarian Ulbricht, Javier Acevedo, Surik Krdoyan, Frank H. P. Fitzek. 1-6 [doi]
- A Mixed Spectrum Sharing Strategy for Cognitive Radio SystemsRaouia Masmoudi Ghodhbane. 1-6 [doi]
- Fault Prediction in HVAC Chillers by Analysis of Internal System DynamicsKumar Padmanabh, Ahmad Al-Rubaie, John Davies, Sandra Stincic Clarke, Alia Abdulaziz Ali Abdulla Aljasmi. 1-6 [doi]
- Industrial and Consumer Internet of Things: Cyber Security Considerations, Threat Landscape, and Countermeasure OpportunitiesStephen Ugwuanyi, James Irvine. 1-8 [doi]
- Position Discrimination of a 2.4 GHz IEEE 802.15.4 RF Mobile Source Inside-Outside a VehicleVlad Marsic, Erik Kampert, Matthew D. Higgins. 1-6 [doi]
- Cushioning the Impact of Covid-19 on the Psyche of Individuals by Using Internet of ThingsSyed Rameem Zahra, Mohammad Ahsan Chishti, Asif Iqbal Baba, Fan Wu. 1-4 [doi]
- Reflective In-Band Full Duplex NOMA Communications for Secure 5G NetworksRabia Khan, Rameez Asif. 1-6 [doi]
- Detecting Application-Level Associations Between IoT Devices Using A Modified Apriori AlgorithmJuan Benedicto L. Aceron, Marc Elizette R. Teves, Wilson M. Tan. 1-8 [doi]
- Performance Characterization of Communication Protocols in Microservice ApplicationsPrajwal Kiran Kumar, Radhika Agarwal, Rahul Shivaprasad, Dinkar Sitaram, Subramaniam Kalambur. 1-5 [doi]
- Bandwidth Efficient Secure Authentication and Encryption Techniques on IEC-60870-5-104 for Remote OutstationsKinan Ghanem, Jidapa Hansawangkit, Rameez Asif, Stephen Ugwuanyi, Ross McPherson, James Irvine. 1-6 [doi]
- Node Clustering in Binary Asymmetric Stochastic Block Model with Noisy Label Attributes via SDPAydin Jadidi, Mostafa Rahimi Dizadji. 1-6 [doi]