Abstract is missing.
- Subcarrier allocation in LTE network deployment with mobilityUttara Sawant, Robert Akl. 1-8 [doi]
- A framework for data center site risk metricMoises Levy, Daniel Raviv. 9-15 [doi]
- The design of ultra low noise CMOS transimpedance amplifier for biosensing applicationsKavyashree Puttananjegowda, Majdi Ababneh, Sylvia Thomas. 16-19 [doi]
- Urban legislation assessment by data analytics with smart city characteristicsXu Du, Diane Liporace, Aparna S. Varde. 20-25 [doi]
- LTE fallback optimization using decision treeHussein Al Dorai, Luay Ali Al Irkhis. 26-30 [doi]
- Fast CS algorithm for chirp signals parameters estimation using multi-resolution DCFT atom transformationLuay Ali Al Irkhis. 31-36 [doi]
- Battery independence: Reducing the dependence on batteries in wearable computing through energy harvesting techniquesDavid Pasko, Michael Mrazik, Khaled Elleithy. 37-46 [doi]
- Enhanced topology based 9 level H-bridge inverterD. Venkata Manikanta, Mohinder Bassi, Harpreet Bedi. 47-52 [doi]
- Scaled offset PSO based PTS for PAPR reduction in OFDM systemsSanjana Prasad, Research Scholar, Ramesh Jayabalan. 53-57 [doi]
- Artificial Swarm Intelligence amplifies accuracy when predicting financial marketsLouis-Rosenberg, Niccolo Pescetelli, Gregg Willcox. 58-62 [doi]
- Addressing fake news: Open standards & easy identificationJoshua Hyman. 63-69 [doi]
- Electromagnetic analysis method for ultra low power cipher MidoriMasaya Yoshikawa, Yusuke Nozaki. 70-75 [doi]
- An efficient automated technique for epilepsy seizure detection using EEG signalsZakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, Khaled Elleithy. 76-82 [doi]
- Smart phone application development for monitoring epilepsy seizure detection based on EEG signal classificationZakareya Lasefr, Ramasani Rakesh Reddy, Khaled Elleithy. 83-87 [doi]
- New sparsity based pansharpening algorithms for hyperspectral imagesChiman Kwan, Bence Budavari, Minh Dao, Jin Zhou. 88-93 [doi]
- Debayering RGBW color filter arrays: A pansharpening approachChiman Kwan, Bryan Chou, Li-Yun Martin Kwan, Bence Budavari. 94-100 [doi]
- Development of a motion controlled robotic armJean Jiang, Alex McCoy, Eric Lee, Li Tan. 101-105 [doi]
- Development of a radiation detecting rover systemJean Jiang, Dillon Seniff, David Callahan, Li Tan, Yoonill Lee. 106-108 [doi]
- Data analysis of cyber-activity within high performance computing environmentsL. Ji, S. Kolhe, A. D. Clark. 109-114 [doi]
- Enhancing sink node anonymity in tactical sensor networks using a reactive routing protocolThomas Haakensen, Preetha Thulasiraman. 115-121 [doi]
- A new tree target tracking algorithm in WSNsAmmar Odeh, Eman Abdelfattah. 122-126 [doi]
- Smart power-strip: Home automation by bringing outlets into the IoTYoonill Lee, Jean Jiang, Gabriel Underwood, Austin Sanders, Matt Osborne. 127-130 [doi]
- Proactive algorithm to reduce power consumption and handovers in heterogeneous mobile networksMichel Nahas, Mohammad Sabati, Rana Kanso, Mohammad Azizi. 131-137 [doi]
- Channel sparsity-aware recursive least squares algorithms for nonlinear system modeling and active noise controlLi Tan, Vinith Vijayarajan, Nicholas M. Chimitt, Jean Jiang, Alain Togbé. 138-144 [doi]
- Smartwatch-based transcription biometricsFrancesco Ciuffo, Gary M. Weiss. 145-149 [doi]
- A comparative of range free localization algorithms and DV-Hop using the Particle Swarm Optimization algorithmJ. Mass-Sanchez, Erica Ruiz-Ibarra, A. Espinoza-Ruiz, Luis Rizo Domínguez. 150-157 [doi]
- DOA using uniform/nonuniform linear and uniform circular antenna arrays with Bayesian compressive sensingIsmail Jouny. 158-161 [doi]
- Epilepsy seizure detection using EEG signalsZakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, Khaled Elleithy. 162-167 [doi]
- A mechanism to detect urdu Spam emailsAyesha Akhtar, Ghulam Rasool Tahir, Khadija Shakeel. 168-172 [doi]
- Efficient infrastructure damage detection and localization using wireless sensor networks, with cluster generation for monitoring damage progressionWilliam Contreras, Sotirios Ziavras. 173-178 [doi]
- Recommended practices for the specification of multi-agent systems requirementsKhaled Slhoub, Marco Carvalho, Walter Bond. 179-185 [doi]
- Mastcam image enhancement using estimated point spread functionsC. Kwan, M. Dao, B. Chou, L. M. Kwan, B. Ayhan. 186-191 [doi]
- A comparative study of several supervised target detection algorithms for hyperspectral imagesD. Nguyen, C. Kwan, B. Ayhan. 192-196 [doi]
- Towards human-powered IoT: Optimizing harvested power from human daily motionQianao Ju, Hongsheng Li, Ying Zhang 0007. 197-202 [doi]
- Fuzzy logic approach for GNSS signal classification using RHCP and LHCP antennasBassma Guermah, Tayeb Sadiki, Hassan El Ghazi. 203-208 [doi]
- Topology maintenance of Ad Hoc wireless sensor networks with an optimum distributed power saving scheduling learning automata based algorithmShekufeh Shafeie, Mohammad Reza Meybodi. 209-216 [doi]
- Based continuous authentication while listening to music on your smart-phoneAbena Primo. 217-225 [doi]
- No inter-network tracking area update scenario toward 5G networkHussein Al Dorai, Luay Ali Al Irkhis. 226-230 [doi]
- Bio-medical image enhancement using hybrid metaheuristic coupled soft computing toolsShouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Soumen Banerjee, Aayush Sah, Sayan Pathak, Suparba Nath, Debkumar Roy. 231-236 [doi]
- Cellular image processing using morphological analysisMousomi Roy, Shouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Soumen Banerjee, Shibjit Mitra, Rajarshee Naskar, Anubhab Bhattacharjee. 237-241 [doi]
- Image based skin disease detection using hybrid neural network coupled bag-of-featuresShouvik Chakraborty, Kalyani Mali, Sankhadeep Chatterjee, Sumit Anand, Aavery Basu, Soumen Banerjee, Mitali Das, Abhishek Bhattacharya. 242-246 [doi]
- Efficient exact paths for dyck and semi-dyck labeled path reachability (extended abstract)Phillip G. Bradford. 247-253 [doi]
- Design of a SiC implantable rectenna for wireless in-vivo biomedical devicesMajdi M. Ababneh, Mohammed Jasim, Kavyashree Puttananjegowda, Samuel Perez, Shamima Afroz, Sylvia Thomas, Yen Kheng Tan. 254-257 [doi]
- Biometric studies with hidden Markov model and its extension on short fixed-text inputMd Liakat Ali, John V. Monaco, Charles C. Tappert. 258-264 [doi]
- LTE downlink throughput modeling using neural networksTayyab ur Rehman, Mirza Ali Imran Baig, Armaghan Ahmad. 265-270 [doi]
- Design of high performance dual-gate nano-scale In0.55Ga0.45 as transistor with modified substrate geometryBaldeo Sharan Sharma, M. S. Bhat. 271-277 [doi]
- Runway detection using unsupervised classificationRamakalavathi Marapareddy, A. Pothuraju. 278-281 [doi]
- An efficient clustering scheme in vehicular Ad-Hoc networksSudev Yaswanth Kannekanti, Gowri S. P. Nunna, Viswanath Koranjan Reddy Bobba, Anirudh Kumar Yadama, Abdelrahman Elleithy. 282-287 [doi]
- Autonomic security for zero trust networksDayna Eidle, Si Ya Ni, Casimer DeCusatis, Anthony Sager. 288-293 [doi]
- Denial of service attack detection using dendritic cell algorithmObinna Igbe, Oluwaseyi Ajayi, Tarek N. Saadawi. 294-299 [doi]
- Evaluating the performance of density grid-based clustering using ABC technique for efficient routing in WSNsEr. Navpreet Singh. 300-305 [doi]
- Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK schemeEr. Pushpinder Singh. 306-311 [doi]
- An energy efficient approach for corona based wireless sensor networkVivekanand Jha, Nupur Prakash, Shekhar Verma. 316-321 [doi]
- A joint sparsity approach to tunnel activity monitoring using high resolution satellite imagesMinh Dao, Chiman Kwan, Kris Koperski, Giovanni Marchisio. 322-328 [doi]
- Multi-modal data fusion of Voice and EMG data for robotic controlTauheed Khan Mohd, Jackson Carvalho, Ahmad Y. Javaid. 329-333 [doi]
- A crowdsensing algorithm for imputing Zika outbreak location dataJacob Livingston, Robert Steele. 334-340 [doi]
- Security solutions and design scenarios for software defined data centersSai Manogna Duttaluri, Bijan Karimi. 341-351 [doi]
- IBM research cloud evolution & efficienciesLorraine Herger, Carlos A. Fonseca, Bill Rippon, Mercy Bodarky. 352-355 [doi]
- Efficient structural health monitoring with wireless sensor networks using a vibration-based frequency domain pattern matching techniqueWilliam Contreras, Sotirios Ziavras. 356-362 [doi]
- Packet scheduling bandwidth type-based mechanism for LTESultan Alotaibi, Robert Akl. 363-368 [doi]
- A performance-aware I/O interface for 3D stacked memory systemsNahid Mirzaie, Ahmed Alzahmi, Chung-Ching Lin, Gyung-Su Byun. 369-371 [doi]
- Analyzing the effect of DoS attacks on network performanceGaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, Alexander Pérez. 372-376 [doi]
- Design of K-user massive MIMO networksAnil Kumar Yerrapragada, Brian Kelley. 377-383 [doi]
- Assessing the credibility of vehicle data reported by anonymous sourcesRobert W. Thomas, Jose M. Vidal. 384-388 [doi]
- Low-power and high-performance 2.4 GHz RF transmitter for biomedical applicationAhmed Alzahmi, Nahid Mirzaie, Chung-Ching Lin, Gyung-Su Byun. 389-391 [doi]
- Analytical study of primary user emulation attack detection techniques in cognitive radio Adhoc networkJ. Gope, P. Dutta, S. Bhadra, S. Bhadra, S. Das, S. Jana, N. Dalmia, S. Choudhury. 392-395 [doi]
- Internet of Things and Body area network-an integrated futureSubhajit Chatterjee, Shreya Chatterjee, Soumyadeep Chowdhury, Sayan Basak, Srijan Dey, Suparna Sain, Kali Shreyo Ghosal, Niket Dalmia, Sachet Sircar. 396-400 [doi]
- A framework for big data technology in health and healthcareMegan Sheeran, Robert Steele. 401-407 [doi]
- Dynamic Fractional Frequency Reuse (FFR) scheme for two-tier network in LTESultan Alotaibi, Robert Akl. 408-413 [doi]
- Security and privacy risks in electronic communications: A user's assessmentFariborz Farahmand, Joshua Ripple, Mikhail J. Atallah, Robin L. Dillon-Merrill. 412-417 [doi]
- MATLAB-GUI based simulation framework for spintronicsJ. Gope, B. Kar, S. Chowdhury Koly, R. Shome, S. Bhadra, A. Bhattacharyya, R. Banerjee. 414-416 [doi]
- Smart home cleansing appliance-an initiative for smart livingJ. Gope, J. Kumar, M. Panda, D. Poddar, T. Bera, N. Ashara, S. Bhadra. 417-419 [doi]
- Resource scheduling in non-orthogonal multiple access (NOMA) based cloud-RAN systemsRupesh Rai, H. Zhu, Jiangzhou Wang. 418-422 [doi]
- Cooperative adaptive cruise control of connected and autonomous vehicles subject to input saturationWeinan Gao, Fernando Rios-Gutiérrez, Weitian Tong, Lei Chen. 418-423 [doi]
- A new mobile SIP proxy integration solution to increase scalability in 5G mobile operatorsLina Abou Haibeh, Nadir Hakem. 423-428 [doi]
- Business process re-engineering for smart manufacturingNoreen Maryam, Shoab Ahmed Khan. 424-430 [doi]
- MalFire: Malware firewall for malicious content detection and protectionWyatt Yost, Chetan Jaiswal. 428-433 [doi]
- Outage probability and system optimization of SSD-based dual-hop relaying system with multiple relaysMuhammad Ajmal Khan, Raveendra K. Rao, Xianbin Wang. 429-434 [doi]
- Eldercare robotics revolution-explaining robotics for eldercareNicholas DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder. 431-436 [doi]
- Novel MI-based (FracBot) sensor hardware design for monitoring hydraulic fractures and oil reservoirsCarlos H. Martins, Abdallah A. Alshehri, Ian F. Akyildiz. 434-441 [doi]
- Two-way signal space cooperative network with a DF relay - Outage and optimizationMuhammad Ajmal Khan, Raveendra K. Rao, Xianbin Wang. 435-440 [doi]
- Leveraging single board computers for anomaly detection in the smart gridSuzanne J. Matthews, Aaron St. Leger. 437-443 [doi]
- Total variation denoising method to improve the detection process in IR imagesLina Chato, Shahram Latifi, Pushkin Kachroo. 441-447 [doi]
- Analyzing the existing noninvasive hemoglobin measurement techniquesMd. Kamrul Hasan, Nazmus Sakib, Richard Love, Sheikh Iqbal Ahamed. 442-448 [doi]
- A novel bandwidth efficient orthogonal frequency division multiplexing schemeTaleb Moazzeni. 444-450 [doi]
- Hear the heart: Daily cardiac health monitoring using Ear-ECG and machine learningQingxue Zhang, Dian Zhou, Xuan Zeng. 448-451 [doi]
- Security issues with certificate authoritiesJake Berkowsky, Thaier Hayajneh. 449-455 [doi]
- Reevaluating the effectiveness of visual cues for website securityNeha A. Rana, Thaier Hayajneh. 451-457 [doi]
- PulsePrint: Single-arm-ECG biometric human identification using deep learningQingxue Zhang, Dian Zhou, Xuan Zeng. 452-456 [doi]
- A few-shot deep learning approach for improved intrusion detectionMd Moin Uddin Chowdhury, Frederick Hammond, Glenn Konowicz, Chunsheng Xin, Hongyi Wu, Jiang Li. 456-462 [doi]
- A portable real-time scene recognition system on smartphoneZhen-Wen Gui. 457-462 [doi]
- Security and privacy issues affecting cloud-based IP cameraJimmy Liranzo, Thaier Hayajneh. 458-465 [doi]
- Data mining approaches to identify predictors of frequent malpractice claims against dentistsJoseph Finkelstein, Sinan Zhu. 463-468 [doi]
- Residual squeeze CNDS deep learning CNN model for very large scale places image recognitionAbhishek Verma, Hussam Qassim, David Feinzimer. 463-469 [doi]
- On collision-free reinforced barriers for multi domain IoT with heterogeneous UAVsHyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Sungrae Cho, Paolo Bellavista. 466-471 [doi]
- Consensus protocols for blockchain-based data provenance: Challenges and opportunitiesDeepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla. 469-474 [doi]
- Enhanced load balancer with multi-layer processing architecture for heavy load over cloud networkNavdeep Singh Randhawa, Mandeep Dhami, Parminder Singh. 470-473 [doi]
- Detection and prevention of crypto-ransomwareDaniel Gonzalez, Thaier Hayajneh. 472-478 [doi]
- Web based electric home appliance controller and monitoring systemMd. Saidur Rahman, Saqif Masud, Shahida Sultana, Mohammad Rezaul Bari. 474-477 [doi]
- Finger printing on the webPreethi Josephina Mudialba, Siddharth Nair, Jun Ma. 475-477 [doi]
- A scalable and secure key distribution scheme for group signature based authentication in VANETKiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu. 478-483 [doi]
- LTE dynamic scheduling scheme for massive M2M and H2H communicationYasmina Alaa, Hussein M. ElAttar, Fadel Digham, Laila H. Afify, Hesham M. ElBadawy. 478-482 [doi]
- Smarter spaces, smarter campusSam DeLorenzo, George Ibuna, Sean Trinh, Gregg Vesonder. 479-484 [doi]
- A comparative analysis of simulation and experimental results on RPL performanceMd Sayedul Aman, Kumar Yelamarthi, Ahmed Abdelgawad. 483-487 [doi]
- Implementing directional Tx-Rx of high modulation QAM signaling with SDR testbedApurv Shaha, Duy H. N. Nguyen, Sunil Kumar. 484-490 [doi]
- Bit Error Rate (BER) analysis of Discrete Fractional Fourier Transform (DFrFT) based OFDM systemsAmir R. Nafchi, Eric E. Hamke, Ramiro Jordan, Balu Santhanam. 485-487 [doi]
- The design and implementation of a smart parking meter for Internet of Vehicle (IoV)Oluwatimilehin Olumolade, Haowen Jiang, Alexander Forde, Yazeed Almania, Barjas Alsahli, Yu Zhang, Md Anam Mahmud, Ahmed Abdelgawad, Kumar Yelamarthi. 488-493 [doi]
- Simulation of long term evolution (LTE) based communication system with different protocolsH. Srikanth Kamath, Vaishnavi Rao, Santhosh, Rajaram Kamath. 488-491 [doi]
- Medication adherence monitoring using modern technologyMurtadha Aldeer, Richard P. Martin. 491-497 [doi]
- Smart cooperative firewalls : An aid to a safer and secure cyber worldThomas Graves, Chetan Jaiswal. 492-498 [doi]
- Heterogeneous network formation by non-collaborative coexistence mechanismSagar Shriram Salwe, Krishna Naik Karamtot. 493-498 [doi]
- A smart campus internet of things frameworkYi Wang, Brandon Saez, Joseph Szczechowicz, Jonathan Ruisi, Tyler Kraft, Stephen Toscano, Zachary Vacco, Kervins Nicolas. 498-503 [doi]
- RGB pixel analysis of fingertip video image captured from sickle cell patient with low and high level of hemoglobinMd. Kamrul Hasan, Nazmus Sakib, Richard R. Love, Sheikh Iqbal Ahamed. 499-505 [doi]
- Real time video transceiver using SDR testbed with directional antennasApurv Shaha, Duy H. N. Nguyen, Nathaniel Rowe, Sunil Kumar. 499-504 [doi]
- Investigation of IGBT behavior in DC systems with advanced circuit breaker technologyIbrahim Almutairy, Johnson Asumadu, Marwan Alluhaidan. 504-508 [doi]
- Performance of multi-level amplify-and-forward relays with multihop diversityBirsen Sirkeci Mergen, Minakshmi Roy. 505-511 [doi]
- A real time spectrum scanning technique based on compressive sensing for cognitive radio networksFatima Salahdine, Hassan El Ghazi. 506-511 [doi]
- Performance comparison of load balancing algorithms using cloud analyst in cloud computingMuhammad Sohaib Shakir, Md. Abdul Razzaque. 509-513 [doi]
- Power efficiency of cooperative broadcast in 1-D dense networks with interferenceShiva Moballegh, Birsen Sirkeci Mergen. 512-516 [doi]
- Single-phase cascaded multilevel inverter topology for distributed DC sourcesBenozir Ahmed, Kennedy A. Aganah, Mandoye Ndoye, Md Arifin Arif, Cristopher Luciano, Gregory V. Murphy. 514-519 [doi]
- Analytical analysis of QoS for lossy network congestion controlAaron E. Cohen. 517-521 [doi]
- SPEProxy: Enforcing fine grained security and privacy controls on unmodified mobile devicesBrian Krupp, Dan Jesenseky, Amanda Szampias. 520-526 [doi]
- Framework for generating and designing spectrum awareness modules for opportunistic networkingOladiran G. Olaleye, Alaa Ali, Ahmed Aly, Muhammad A. Iqbal, Dmitri D. Perkins, Magdy Bayoumi. 522-527 [doi]
- Real time embedded system IPs protection using chaotic mapsKhaled Salah. 527-530 [doi]
- An innovative approach of model order reduction using ant colony optimizationKhaled Salah. 531-534 [doi]
- Study of a parallel algorithm on pipelined computation of the finite difference schemes on FPGAWenshi Wang, Zhangqin Huang, Shuo Zhang. 535-539 [doi]
- Deep CNN-LSTM with combined kernels from multiple branches for IMDb review sentiment analysisAlec Yenter, Abhishek Verma. 540-546 [doi]
- Enabling densely-scalable low-power WSNs for shipping and industrial IoTJ. M. Williams, Juan Ruiz-Rosero, R. Khanna, Greeshma Pisharody, Y. Qian, J. Wang, C. Carlson, H. Liu, Gustavo Ramírez González. 547-552 [doi]
- Performance of vertical multi junction solar cell for long distance wireless power transfer using high intensity laser beamPradeep Kumar Sharma, Shaswata Banerjee, Subhodeep Bose, Biswajit Jana, Omkar Goswami, Surya Sen, Pradipan Dey, Ankan Bhunia, Pritam Modak, Arindam Shyam, Rajdip Mitra, Aritra Chandra, Rajib Sarkar, Supratim Sengupta, Divy Raj, Rajesh Kumar, Shiva Ashish, Pritam Kumar Mondal, Kamalesh Sarkar, Naushad Ahmed, Sougata Banerjee. 553-559 [doi]
- Issues and challenges of data security in a cloud computing environmentPradeep Kumar Sharma, Prem Shankar Kaushik, Prerna Agarwal, Payal Jain, Shivangi Agarwal, Kamlesh Dixit. 560-566 [doi]
- Chirp pulse envelope evaluation for SAR image formationEric J. Balster, Andrew M. Kordik, Frank A. Scarpino, Kerry L. Hill. 567-570 [doi]
- User concerns with personal routers used as public Wi-fi hotspotsJennifer Golbeck. 571-576 [doi]
- Automated facial expression recognition app development on smart phones using cloud computingHumaid Alshamsi, Veton Kepuska, Hongying Meng. 577-583 [doi]
- Mobile sensor-based biometrics using common daily activitiesKenichi Yoneda, Gary M. Weiss. 584-590 [doi]
- A survey on the industrial readiness for Internet of ThingsXianping Wang, Hao Qiu, Fei Xie. 591-596 [doi]
- Capacity augmentation in energy-efficient vehicular roadside infrastructureNaby Nikookaran, Terence D. Todd, George Karakostas. 597-603 [doi]
- An ℓ1-regularized least-squares deblurring algorithm with an application to GPR imagingHenry C. Ogworonjo, John M. M. Anderson, Mamadou Wade. 604-608 [doi]
- Home gateway for RF/PON based gigabit Transmission system for cable networkJoohan Lee, Juho Lee, Sungkwon Park, Jaewon Lee, Eunhee Hyun, Junyoung Jung. 609-613 [doi]
- Minimum cost security measurements for attack tree based threat models in smart gridNilotpal Chakraborty, Ezhil Kalaimannan. 614-618 [doi]
- KeyStroke logs: Are strong passwords enough?Darshanie Sukhram, Thaier Hayajneh. 619-625 [doi]
- Deep learning for effective detection of excavated soil related to illegal tunnel activitiesDaniel Perez Ibanez, Debrup Banerjee, Chiman Kwan, Minh Dao, Yuzhong Shen, Kris Koperski, Giovanni Marchisio, Jiang Li. 626-632 [doi]
- Vocoder susceptibility to baseband TrojansAaron E. Cohen, Yvette T. Lee, David A. Heide. 633-637 [doi]
- Handling changes of update reviewers in distributed free and open-source software meta-recommendationsShakre Elmane, Marius Silaghi. 638-644 [doi]
- Automation of traumatic brain injury diagnosis through an IoT-based embedded systems frameworkAmulya Balakrishnan, Sowmya Patapati. 645-649 [doi]
- Throughput optimization in cognitive radio using demand based adaptive genetic algorithmSubhajit Chatterjee, Sachet Sircar, Subhojit Dutta, Swapnil Majumder, Souvik Dutta, Anwesha Mitra, Swaham Dutta, Jibendu Sekhar Roy. 650-653 [doi]
- An efficient hardware implementation of vector-based odd-even merge sortingUday A. Korat, Pratik Yadav, Harshil Shah. 654-657 [doi]