Abstract is missing.
- A low rank model based improved eye detection under spectaclesM. Zefree Lazarus, Supratim Gupta. 1-6 [doi]
- Real-time intragroup familiarity analysis model using beacon based on proximityJung-In Choi, Hwan-Seung Yong. 1-5 [doi]
- Authorship categorization of public domain literatureTudor Boran, John Voss, Md Shafaeat Hossain. 1-7 [doi]
- Improving edge finite element assembly for geophysical electromagnetic modelling on shared-memory architecturesOctavio Castillo Reyes, Josep de la Puente, José María Cela. 1-6 [doi]
- An auspicious secure processing technique for near field communication systemsAbu Asaduzzaman, Shanta Mazumder, Sergio Salinas. 1-6 [doi]
- K-means-Jensen-Shannon divergence for a WLAN indoor positioning systemO. Abdullah, Ikhlas Abdel-Qader, Bradley J. Bazuin. 1-5 [doi]
- Home automation using Internet of ThingShopan Dey, Ayon Roy, Sandip Das. 1-6 [doi]
- Ubiquitous operational governance framework: Managing consumer mobile commerce active indexVikas S. Shah. 1-8 [doi]
- Analytical studies of fragmented-spectrum multi-level OFDM-CDMA technique in cognitive radio networksFarhad Akhoundi, Saeed Sharifi-Malvajerdi, Omid Poursaeed, Jawad A. Salehi. 1-6 [doi]
- A noise reduction method based on subspace approach for speech communicationJunsheng Mu, Xiaojun Jing, Hai Huang, Ning Gao. 1-7 [doi]
- Denoising signals in cognitive radio systems using an evolutionary algorithm based adaptive filterAdnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch. 1-6 [doi]
- JMS hybrid single electron model and its simulation using MATLABJ. Gope, S. Chowdhury, M. Panda, N. Bhattacharyya, S. Bhadra. 1-3 [doi]
- Fast point-to-point Dyck constrained shortest paths on a DAG (Extended abstract)Phillip G. Bradford, Venkatesh Choppella. 1-7 [doi]
- Optimized data flow management in event driven wireless sensor networks: A case study on landslide surveillanceDaniel Petrisor, Cristian Zet, Cristian Fosalau. 1-7 [doi]
- Segmentation-based image compressionRatan Kumar Basak, Bipasha Mukhopadhyay, Souvik Chatterjee, Sukalyan Goswami, Amrin Zaman, Ronit Ray, Abhriya Roy, Shalini Guha, Saptarshi De, Riddhi Dutta. 1-6 [doi]
- Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5Rupayan Das, Sauvik Bal, Soumajit Das, Mrinal Kanti Sarkar, Debdeep Majumder, Anirban Chakraborty, Koushik Majumder. 1-9 [doi]
- Data storage security in cloud computing using container clusteringRohan Raj Gupta, Gaurav Mishra, Subham Katara, Arpit Agarwal, Mrinal Kanti Sarkar, Rupayan Das, Sanjay Kumar. 1-7 [doi]
- Intelligent hybrid adaptive broadcast for VANETElnaz Limouchi, Imad Mahgoub. 1-7 [doi]
- Simulation and modeling technique for EMI measurement of the ECM motors in HVAC systemsIstiaque Maruf Ahmad, Abdullah Eroglu, Carlos A. Pomalaza-Raez, Ming Li. 1-6 [doi]
- Reliability evaluation of iBeacon for micro-localizationMd Sayedul Aman, Haowen Jiang, Cuyler Quint, Kumar Yelamarthi, Ahmed Abdelgawad. 1-5 [doi]
- ADDSMART: Address digitization and smart mailbox with RFID technologyJonathan Ross Tew, Lydia Ray. 1-6 [doi]
- FPGA based implementation of BPSK and QPSK modulators using address reverse accumulatorsAmean Al Safi, Bradley J. Bazuin. 1-6 [doi]
- On minimizing signaling costs for PMIPv6-based distributed dynamic mobility managementByunghun Song, Junho Shin, Seung-Hoon La, Jongpil Jeong. 1-7 [doi]
- AMP-B-SBL: An algorithm for clustered sparse signals using approximate message passingMohammad Shekaramiz, Todd K. Moon, Jacob H. Gunther. 1-5 [doi]
- Improving LEACH-C using sink mobilityDjamila Mechta, Saad Harous. 1-6 [doi]
- A framework to ensure data storage security in cloud computingMrinal Kanti Sarkar, Sanjay Kumar. 1-4 [doi]
- Canonical representation of the human energy metabolism of lean mass, fat mass, and insulin resistanceZsolt Ori, Ilona Ori. 1-8 [doi]
- Ontology based meta knowledge extraction with Semantic Web tools for ubiquitous computingAliva M. Pradhan, Aparna S. Varde. 1-6 [doi]
- Secuirity in cloud storage: An enhanced technique of data storage in cloud using RNSAtreyee Kar, Kathakali Sur, Suman Godara, Santanu Basak, Dipta Mukherjee, Aninda Sankar Sukla, Rupayan Das, Ritwika Choudhury. 1-4 [doi]
- Expectation-maximization algorithm for topic modeling on big data streamsWalisa Romsaiyud. 1-7 [doi]
- An RTL power optimization technique based on System Verilog assertionsKhaled Khalifa, Khaled Salah. 1-4 [doi]
- A comparison of two methods for the topical clustering of social media postsElizabeth Williams, Jeffrey G. Gray, Edwin J. Morris, Ben Bradshaw, Keegan Williams, Brandon Dixon. 1-7 [doi]
- Using text analysis on web filter data to explore K-12 student learning behaviorJigar Jadav, Charles C. Tappert, Michael Kollmer, Andrew M. Burke, Pratik Dhiman. 1-5 [doi]
- Impact of APs selection scheme on compressive sensing-fingerprinting based IPS performanceHussein Al-Moukhles, Ali K. Jaber, Ikhlas Abdel-Qader. 1-7 [doi]
- Novel CNN architecture with residual learning and deep supervision for large-scale scene image categorizationHussein A. Al-Barazanchi, Hussam Qassim, Abhishek Verma. 1-7 [doi]
- Gender classification system from offline survey data using neural networksSaptarshi Rudra, Soham Mitra, Soumyajit Das, Abhisek Roy, Shibasis Guha, Dibyendu Bikash Seal, Sohini Mukherjee, Souvik Chatterjee. 1-5 [doi]
- Transmit receive chain in LTEH. Srikanth Kamath, Humdard Singh, Aayush Khanna. 1-7 [doi]
- JSM gate - A new proposition in spin based reversible logic circuitryJ. Gope, S. Chowdhury, K. S. Ghosal, K. Sarkar, M. Pal, S. Bhadra. 1-4 [doi]
- Gene ranking: An entropy & decision tree based approachDibyendu Bikash Seal, Sujay Saha, Prokriti Mukherjee, Mayukh Chatterjee, Aradhita Mukherjee, Kashi Nath Dey. 1-5 [doi]
- A context-aware, info-bead and fuzzy inference approach to notification managementKieran Fraser, Bilal Yousuf, Owen Conlan. 1-7 [doi]
- WiFi RSS fingerprinting indoor localization for mobile devicesWondimu K. Zegeye, Seifemichael B. Amsalu, Yacob Astatke, Farzad Moazzami. 1-6 [doi]
- FPGA-based color space conversion system design and implementationXiaojing Zhang, Xuemei Li, Wei Yang, Ruoqiao Li. 1-4 [doi]
- Load balancing in the cloud using specializationSarra Hammoudi, Abdelhafid Benaouda, Saad Harous, Zibouda Aliouat. 1-7 [doi]
- ASK and PPM modulation based FSO system under varying weather conditionsSandip Das, Moitrayee Chakraborty. 1-7 [doi]
- Fingerprint-based technique for indoor positioning system via machine learning and convex optimizationO. Abdullah, Ikhlas Abdel-Qader, Bradley J. Bazuin. 1-6 [doi]
- Evaluating GeoContext: A system for creating geographical topics from a social media streamElizabeth Williams, Jeff Gray, Brandon Dixon. 1-7 [doi]
- Group owner election in Wi-Fi directMuhammad Asif Khan, Wael Chérif, Fethi Filali. 1-9 [doi]
- Wireless multihop networks formed by unmanned aerial vehicles with separable access points and replaceable batteriesRyoichi Shinkuma, Yuki Goto. 1-6 [doi]
- Mobile ascertainment of smoking status through breath: A machine learning approachStephanie Valencia, Megan V. Smith, Adham Atyabi, Frederick Shic. 1-7 [doi]
- Quantum computation: From Church-Turing thesis to QubitsShankhadip Kundu, Rajdeep Kundu, Shubhabrata Kundu, Anubhab Bhattachaijee, Sayantan Gupta, Souvik Ghosh, Indranil Basu. 1-5 [doi]
- Study of the power consumtion of a landslide sensor nodeCristian Zet, Cristian Fosalau, Daniel Petrisor, Ionel Hogas. 1-5 [doi]
- Role of cooling rate in selective synthesis of graphene and carbon nanotube on Fe foil using hot filament chemical vapor depositionMahssa Abdolahi, Bozena Kaminska, Omid Akhavan, Samereh Talebi, Mahmood Ghoranneviss, Zeinab Arab. 1-5 [doi]
- Noise elimination and ECG R peak detection using wavelet transformS. Das, S. Mukherjee, S. Chatterjee, H. K. Chatterjee. 1-5 [doi]
- Employing vector quantization in a transform domain for face recognitionTaif Alobaidi, Ahmed Aldhahab, Wasfy B. Mikhael. 1-4 [doi]
- Second order statistics of SC macrodiversity system in the presence of gamma shadowed nLoS short term fading and CCICaslav Stefanovic, Stefan Panic, Marko Antonic, Srdjan Jovkovic, Dusan Stefanovic, Mihajlo C. Stefanovic. 1-7 [doi]
- Wireless femtocell coverage on the go: A case in the Kingdom of Saudi ArabiaAbdullah Alhumaidi Alotaibi, Marios C. Angelides. 1-7 [doi]
- The real implementation of NDN forwarding strategy on Android smartphoneXuewei Piao, Lei Huang, Kaiqi Yuan, Jie Yuan, Kai Lei. 1-6 [doi]
- A comparative-techno economic feasibility study between roof-top and building integrated photovoltaic technology for development of green campusSucheta Nag, Shubhabrata Kundu, Diptonil Sinha, Simantadeep RoyChowdhury, Preetam Mukherjee, Utpal Goswami, Rajiv Ganguly. 1-6 [doi]
- Optimal beamforming-based power control in wireless body area networksHussein Moosavi, Francis Minhthang Bui. 1-5 [doi]
- PATH: Person authentication using trace historiesUpal Mahbub, Rama Chellappa. 1-8 [doi]
- System self-awareness towards deep learning and discovering high-value informationYing Zhao, Charles C. Zhou. 1-8 [doi]
- Wireless sensor network-based infrastructure damage detection constrained by energy consumptionWilliam Contreras, Sotirios Ziavras. 1-7 [doi]
- Implementation of a landslide monitoring system as a wireless sensor networkCristian Fosalau, Cristian Zet, Daniel Petrisor. 1-6 [doi]
- Technology and performance: Carbon nanotube (CNT) field effect transistor (FET) in VLSI circuit designSoheli Farhana, Mohd Fauzan Noordin. 1-4 [doi]
- Inferring read and write operations of solid-state drives based on energy consumptionJonPaul Canclini, James McMasters, James Shey, Owens Walker, Ryan N. Rakvic, Hau T. Ngo, Kevin D. Fairbanks. 1-6 [doi]
- Evaluation of Bluetooth beacons behaviorKevin Bouchard, Ramin Ramezani, Arjun, Arash Naeim. 1-3 [doi]
- Performance evaluation of spectrum sensing techniques for cognitive radio systemsMohsen Riahi Manesh, Md. Shakib Apu, Naima Kaabouch, Wen-Chen Hu. 1-7 [doi]
- Enhanced detection of advanced malicious softwareJames B. Fraley, James Cannady. 1-6 [doi]
- A strategic frame work for designing MATLAB based single spin logic tool for inclusion in SIMSCAPEJ. Gope, B. Kar, M. Panda, S. Bhadra, S. Saha, R. Bhattacharya, S. Biswas. 1-3 [doi]
- Evaluation of channel switching overhead for multicast communications in wireless mesh networksAlireza Moghaddam, Uyen Trang Nguyen. 1-7 [doi]
- Graph theory based mobile network insight analysis frameworkMurong Lin, Quanmin Ye, Yinghua Ye. 1-7 [doi]
- An asynchronous load balancing scheme for multi-server systemsFang Liu, Yi Chen, Wing Shing Wong. 1-7 [doi]
- Hindu Arabic character recognition using mathematical morphologyRatan Kumar Basak, Bipasha Mukhopadhyay, Souvik Chatterjee, Sukalyan Goswami, Amrin Zaman, Ronit Ray, Abhriya Roy, Shalini Guha, Saptarshi De, Sucheta Nag. 1-5 [doi]
- Body temperature control circuitAdmir Horta, Eric Gernux, Matt Couceiro, Dieter Haemmerich, Mohamed Almekkawy. 1-4 [doi]
- Health condition identification of affected people in post disaster area using DTNAritra Roy, Supriyo Mahanta, Mallika Tripathy, Sagarika Ghosh, Sauvik Bal. 1-3 [doi]
- Layered T methodology in QCA: NAND/NOR based circuit designing approachChiradeep Mukherjee, Sayak Pramanik, Dipayan Singha Roy, Souvik Mondal, Aritro Sinha, Arnab Guha Roy, Subham Bid, Shirsha Chakraborty. 1-6 [doi]
- A Bayesian model of the aggregate interference power in cognitive radio networksMohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, Wen-Chen Hu. 1-7 [doi]
- Online process phase detection using multimodal deep learningXinyu Li, Yanyi Zhang, Mengzhu Li, Shuhong Chen, Farneth R. Austin, Ivan Marsic, Randall S. Burd. 1-7 [doi]
- Modelling of single electron ternary flip-flop using SIMONJ. Gope, S. Bhadra, S. Chanda, M. Sarkar, S. Pal, A. Rai. 1-9 [doi]
- A compact dual-band half-mode SIW based semi-circular antennaSoumen Banerjee, Subhajit Chatterjee, Twinkle Mohanty, Sreshtha Ray, Tishya Sarma Sarkar, Malay Gangopadhyaya. 1-3 [doi]
- Generalized solutions for THD investigation in cascaded multicell multilevel converters modulated with selective harmonic elimination PWM switching methodHaider Hashim, Ikhlas Abdel-Qader. 1-7 [doi]
- Feature selection using modified ant colony optimization for wireless capsule endoscopyShahed K. Mohammed, Farah Deeba, Francis Minhthang Bui, Khan A. Wahid. 1-4 [doi]
- Using CART for advanced prediction of asthma attacks based on telemonitoring dataJoseph Finkelstein, In Cheol Jeong. 1-5 [doi]
- Power optimization and service level agreement trade-off in SPECjbb2015Hitoshi Oi. 1-6 [doi]
- AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadataNuray Baltaci Akhuseyinoglu, Kamil Akhuseyinoglu. 1-7 [doi]
- Bayesian compressive sensing with circulant matrix for spectrum sensing in cognitive radio networksFatima Salahdine, Naima Kaabouch, Hassan El Ghazi. 1-6 [doi]
- Design and implementation of prototype potable base station for catastrophic situationAmean Al Safi, Lalith Narasimhan, Bradley J. Bazuin. 1-6 [doi]
- Generalizable spatial feature for human positioning based on Bluetooth beaconsKevin Bouchard, Mahir Rafi Eusufzai, Ramin Ramezani, Arash Naeim. 1-5 [doi]
- Tracking semantic relations among spatial objects for situation-aware interactive environmentsYoung-Ho Suh, Sang Keun Rhee, Kang-Woo Lee. 1-5 [doi]
- A development of UHF RFID device for mobile IoT serviceSeongSoo Park. 1-7 [doi]
- Cloud storage with key-value stores over content-centric networking architectureDaiki Ito, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii. 1-6 [doi]
- A study on compression-based sequential prediction methods for occupancy prediction in smart homesSreerama Krishna Sama, Mahshid Rahnamay-Naeini. 1-8 [doi]
- Autonomous vehicles safe-optimal trajectory selection based on big data analysis and predefined user preferencesHamzah Al Najada, Imad Mahgoub. 1-6 [doi]
- A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequenceNazimuddin Sheikh, Kanyasree Mustafi, Indraneel Mukhopadhyay. 1-9 [doi]
- MAvanet: Message authentication in VANET using social networksAnirudh Paranjothi, Mohammad S. Khan, Mais Nijim, Rajab Challoo. 1-8 [doi]
- RASS - A concurrency based bitwise symmetric key cryptographic algorithmAbhriya Roy, Ronit Ray, Saptarshi De, Shalini Guha, Sukalyan Goswami, Ratan Kumar Basak, Bipasha Mukhopadhyay, Souvik Chatterjee, Amrin Zaman, Sucheta Nag. 1-6 [doi]
- Comparative evaluation of cyclostationary detection based cognitive spectrum sensingIkram Ilyas, Shuva Paul, Akhlaqur Rahman, Ripan Kumar Kundu. 1-7 [doi]
- High precision localization for autonomous vehicles via multiple sensors, data fusion and novel wireless technologiesSourav Chakraborty, Hitesh Laware, David Castanon, Seyed Reza Zekavat. 1-9 [doi]
- Investigation of RFID based localization for SmartDrive vehicular network testbedAlain Edwards, Imad Mahgoub, Monika Rathod. 1-6 [doi]
- The delivery assignment solution for swarms of UAVs dealing with multi-dimensional chromosome representation of genetic algorithmKhin Thida San, Eun-Young Lee, Yoon Seok Chang. 1-7 [doi]
- A Bayesian inference method for estimating the channel occupancyHector Reyes, Sriram Subramaniam, Naima Kaabouch, Wen-Chen Hu. 1-6 [doi]
- Development of universal FMC carrier card based on PXI ExpressWang Liu, Yanlin Ren, David He, Liyan Qiao. 1-6 [doi]
- Centaur: A evolutionary design of hybrid NDN/IP transport architecture for streaming applicationXiang Zhang, Lirui Gong, Yunbo Xun, Xuewei Piao, Kai Lei. 1-7 [doi]
- Design of a new cost-effective head for a low-cost humanoid robotLi Dang, Jaerock Kwon. 1-7 [doi]
- A framework to identify educational relevance in social networking postsMuhammad Fahim Uddin. 1-8 [doi]
- Model order reduction using genetic algorithmAhmed Adel, Khaled Salah. 1-6 [doi]
- A comparison of performance and preference on mobile devices vs. desktop computersSushma Adepu, Rachel F. Adler. 1-7 [doi]
- Arithmetic circuit design with memristor based high fan-out logic gatesNagaraja Revanna, Earl E. Swartzlander Jr.. 1-6 [doi]
- Wideband spectrum sensing using Multi Stage Weiner FilterAmeena Badarudeen, Graduate Student, K. Gopakumar. 1-5 [doi]
- The method of controlling traffic paths in IoT-based software defined networkEun Joo Kim, Jong-Arm Jun, Naesoo Kim. 1-4 [doi]
- Gene - Gene Interaction: A clustering, correlation & entropy based approachDibyendu Bikash Seal, Sujay Saha, Mayukh Chatterjee, Prokriti Mukherjee, Aradhita Mukherjee, Bipasha Mukhopadhyay, Sohini Mukherjee. 1-6 [doi]
- Management system by using embedded packet for hierarchical local area networkSatoshi Kodama, Rei Nakagawa, Toshimitsu Tanouchi, Shinya Kameyama. 1-4 [doi]
- The autonomous pill dispenser: Mechanizing the delivery of tablet medicationShaantam Chawla. 1-4 [doi]
- A new algorithm for money laundering detection based on structural similarityReza Soltani, Uyen Trang Nguyen, Yang Yang, Mohammad Reza Faghani, Alaa Yagoub, Aijun An. 1-7 [doi]
- Case study of development boost converter with coupled inductors for PV system applicationsMuhammad Aurangzeb, Jinquan Zhao, Irfan Jamil, Muhammad Fahad Ali. 1-6 [doi]
- Dynamic RLC mode based upon link adaptation to reduce latency and improve throughput in cellular networksRitesh Shreevastav, Ricardo Simon Carbajo. 1-6 [doi]
- On the evolution of mobile computing software systems and C/C++ vulnerable code: Empirical investigationSaleh M. Alnaeli, Melissa Sarnowski, Md Sayedul Aman, Kumar Yelamarthi, Ahmed Abdelgawad, Haowen Jiang. 1-7 [doi]
- A novel approach to super quality software development using workflowsMuhammad Adnan, Muhammad Afzal. 1-3 [doi]
- An analytical jitter model in IMS networkB. A. Alassane, Konate Karim. 1-4 [doi]
- Incremental bit rates in FDD networks for LTE advanced over LTEGautam Thakur. 1-7 [doi]
- Energy efficient Grid Clustering Hierarchy (GCH) routing protocol for wireless sensor networksSeifemichael B. Amsalu, Wondimu K. Zegeye, Dereje Hailemariam, Yacob Astatke, Farzad Moazzami. 1-6 [doi]
- Quarter-mode SIW based compact triangular antenna for 2.5 GHz cellular spectrumSoumen Banerjee, Kyamelia Roy, Twinkle Mohanty, Sreshtha Ray, Tishya Sarma Sarkar, Malay Gangopadhyaya. 1-4 [doi]
- Evolutionary robotics applied to the multi-robot worst-case pursuit-evasion problemLivia Gregorin, Eduardo Freire, Elyson Carvalho, Lucas Molina, Sidney Givigi. 1-7 [doi]
- Cost analysis in FMIPv6 and FPMIPv6-based on HP2P-SIP networksAbel Diatta, Ibrahima Niang, Mandicou Ba. 1-7 [doi]
- Analysis of the throughput capacity and delay in a wireless sensor network with multiple sinksHajar Barani, Ahmad Golmohammadi, Hong Huang, Satyajayant Misra. 1-6 [doi]
- On demand secure routing protocol using Convex-Hull & K-mean approach in MANETAbhijit Kundu, Ritika Misra, Atreyee Kar, Sagarika Debchoudhury, Shilpa Pareek, Somen Nayak, Ratul Dey. 1-5 [doi]
- Establishing symmetric pairwise-keys using public-key cryptography in Wireless Sensor Networks (WSN)Ibrahim Nadir, Wondimu K. Zegeye, Farzad Moazzami, Yacob Astatke. 1-6 [doi]
- Context integrity measurement architecture: A privacy-preserving strategy for the era of ubiquitous computingJohn Morrison. 1-10 [doi]
- A hybrid analysis for mobile security threat detectionYong Shi, Wanqing You, Kai Qian, Prabir Bhattacharya, Ying Qian. 1-7 [doi]
- Mining typos in textNavya Nizamkari. 1-2 [doi]
- JBWM-μP learner - An ICT based initiative for μP learningJ. Gope, B. Kar, M. Panda, W. Akhtar, S. Bhadra, A. Roy, S. Saha, R. Bhattacharya, S. Bhadra. 1-6 [doi]
- Features based proximity localization with Bluetooth emittersKevin Bouchard, Ramin Ramezani, Arash Naeim. 1-5 [doi]
- Green energy harvesting using nantenna: An energy harvesting approach based on nantennaSurajit Sur, Rabel Guharoy, Arindam Haider, Subhojit Dutta, Shayan Rakshit, Afaq Ahmed, Mayank Srivastava. 1-2 [doi]
- Single-phase multilevel inverter topology for distributed DC sourcesKennedy A. Aganah, Benozir Ahmed, Aleck W. Leedy. 1-6 [doi]