Abstract is missing.
- A Raspberry Pi Mesh Sensor Network for Portable Perimeter SecurityCullen D. Johnson, Brian H. Curtin, Nikhil Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews. 1-7 [doi]
- Use of Sensor Node Networks for Car SecurityRafael Lopez, Christian DeGuzman, Abdelrahman Elleithy. 8-14 [doi]
- Location Tracking of Mobile Objects and the Privacy TradeoffSara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy. 15-22 [doi]
- Pilot Study of Emergency Department Patient Vital Signs Acquisition Using Experimental Video Photoplethysmography and Passive Infrared Thermography DevicesLeo Kobayashi, Mukul Rocque, Haibo Wang, Geoffrey A. Capraro M. D. MPH, Carlin C. Chuck Scb, Chris K. Kim, Katherine Luchette, B. S. Alana Oster, Derek Merck, Ihor Kirenko, Kees van Zon, Marek Bartula. 23-32 [doi]
- Formal Trust Architecture for Assuring Trusted Interactions in the Internet of ThingsMilankumar Patel, Siddhartha Bhattacharyya, Ali Alfageeh. 33-39 [doi]
- Optimized Wireless Connectivity for Cyber-Physical Systems with Publisher/Subscriber ArchitectureMilos Pilipovic, Dragan Samardzija. 40-49 [doi]
- Simulation of Transitional and Bursty Wireless Visual Sensor NetworksMark Caswell, Yao Liang. 50-56 [doi]
- Machine Learning Meteorologist Can Predict RainBrandan Quinn, Eman Abdelfattah. 57-62 [doi]
- Network Data Analysis to Support Risk Management in an IoT EnvironmentAndrew Brandon, Melanie Seekins, Joshua Beulah Vedhavalli, Samuel Chelliah, John Haller. 63-68 [doi]
- Comparison of Machine Learning Models to Predict Twitter BuzzYash Parikh, Eman Abdelfattah. 69-73 [doi]
- What is A Robot Swarm: A Definition for Swarming RoboticsRoss Arnold, Kevin Carey, Benjamin Abruzzo, Christopher M. Korpela. 74-81 [doi]
- Deep Learning for Inexpensive Image Classification of Wildlife on the Raspberry PiBrian H. Curtin, Suzanne J. Matthews. 82-87 [doi]
- A SS-CNN on an FPGA for Handwritten Digit RecognitionJiong Si, Evangelos Yfantis, Sarah L. Harris. 88-93 [doi]
- Performance of Classification Models on Various Types of Character DataVanesa Getseva, Salil Maharjan, Eman Abdelfattah. 94-98 [doi]
- Goal-Oriented Conversational System Using Transfer Learning and Attention MechanismAmartya Hatua, Trung T. Nguyen, Andrew H. Sung. 99-104 [doi]
- Big Data Analytics in Cybersecurity: Network Data and Intrusion PredictionLidong Wang, Randy Jones. 105-111 [doi]
- A Hive and SQL Case Study in Cloud Data AnalyticsShireesha Chandra, Aparna S. Varde, Jiayin Wang. 112-118 [doi]
- Image Recognition with MapReduce Based Convolutional Neural NetworksJackie Leung, Min Chen. 119-125 [doi]
- Exploring A Forecasting Structure for the Capacity Usage in Backup Storage SystemsYaobin Qin, Brandon Hoffmann, Yuwei Wang, David J. Lilja. 126-134 [doi]
- Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce TransactionsResham Jhangiani, Doina Bein, Abhishek Verma. 135-140 [doi]
- Improving Rider Safety Using QR Code & Fingerprint BiometricsRaghu Nandan Avula, Cliff Zou. 141-144 [doi]
- Mitigating Implanted Medical Device Cybersecurity RisksChuck Easttom, Nagi Mei. 145-148 [doi]
- Novel Hash-Based Radix Sorting AlgorithmPaul K. Mandal, Abhishek Verma. 149-153 [doi]
- Security Architecture Framework for Internet of Things (IoT)Muath Obaidat, Matluba Khodjaeva, Suhaib Obeidat, Douglas Salane, Jennifer Holst. 154-157 [doi]
- A Novel Phase Tracking in ZigBee Receiver Using Extended Kalman Filtering over AWGN ChannelAli Alqahtani, Mohamed Zohdy, Subramaniam Ganesan, Richard Olawoyin. 158-162 [doi]
- Improv Performance with Wi-Fi Enabled Costume LightsCaileigh Marshall, Jaimie Kelley, Cynthia Turnbull. 163-168 [doi]
- Deep Convolutional Neural Networks for Breast Cancer DetectionAnkit Roy. 169-171 [doi]
- Time-Variant Broadband mmWave Channel Estimation Based on Compressed SensingMohammadreza Robaei, Robert Akl. 172-178 [doi]
- A Thermally Regulated Footwear & Alerting SystemWilliam Shue, Nischal Paudyal, Mahmoud Rabiah, Douglas E. Dow, Mehmet Ergezer, Mira Yun. 179-182 [doi]
- Duty-Cycled, Sub-GHz Wake-up Radio with -95dBm Sensitivity and Addressing Capability for Environmental Monitoring ApplicationsAgnelo Rocha da Silva, Ruzbeh Akbar, Richard Chen, Kazem Bakian-Dogaheh, Negar Golestani, Mahta Moghaddam, Dara Entekhabi. 183-191 [doi]
- A New Approach to Change Detection Using Heterogeneous ImagesBulent Ayhan, Chiman Kwan. 192-197 [doi]
- A Wearable Device Network to Track Animal Behavior and Relationships in the WildLuis Camal, Anup Kirtane, Teresa Blanco, Roberto Casas, Federico Rossano, Baris Aksanli. 198-202 [doi]
- Optimized IoT Based Decision Making For Autonomous Vehicles In IntersectionsAmin Sahba, Ramin Sahba, Paul Rad, Mo Jamshidi. 203-206 [doi]
- Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman FilterWaleed Aldosari, Mohamed Zohdy, Richard Olawoyin. 207-212 [doi]
- A Secure IoT-Fag-Cloud Framework Using Blockchain Based on DAT for Mobile IoTJoong-Lyul Lee, Stephen C. Kerns, Sangjin Hong. 213-218 [doi]
- Quality Model for Testing Augmented Reality ApplicationsJim Scheibmeir, Yashwant K. Malaiya. 219-226 [doi]
- Ubiquitous Access for Local Water Management Through HCI Based App DevelopmentDrashti Pathak, Aparna S. Varde, Clement Alo, Felix Oteng. 227-233 [doi]
- Data Modeling for a NoSQL Database ServiceSudarshan S. Chawathe. 234-240 [doi]
- A New Approach Towards Fully Homomorphic Encryption Over Geometric AlgebraDavid William Honorio Araujo da Silva, Carlos Paz de Araujo, Edward Chow, Bryan Sosa Barillas. 241-249 [doi]
- Securing a Connected HomeAndrew Camphouse, Lucien Ngalamou. 250-256 [doi]
- Securing Wireless Scada Systems in Rural American Power GridsKevin B. Hall, Lucien Ngalamou. 257-262 [doi]
- Trusted Remote Function InterfaceMark E. Royer, Sudarshan S. Chawathe. 263-269 [doi]
- AdRemover: The Improved Machine Learning Approach for Blocking AdsThu Vo, Chetan Jaiswal. 270-275 [doi]
- SIPSA: Secure IoT Protocol-Based Smart Adapter for Communicating and Optimizing Building Energy Management with Smart GridMeizhu He, Leon Wu. 276-279 [doi]
- Thin MobileNet: An Enhanced MobileNet ArchitectureDebjyoti Sinha, Mohamed El-Sharkawy. 280-285 [doi]
- Deep Learning for Remote Sensing Image Super-ResolutionMd Reshad U. I. Hoque, Roland Burks, Chiman Kwan, Jiang Li. 286-292 [doi]
- Derivative-Free Optimization of Neural Networks using Local SearchAhmed Aly, Gianluca Guadagni, Joanne B. Dugan. 293-299 [doi]
- Machine Learning Models to Predict Multiclass Protein ClassificationsYash Parikh, Eman Abdelfattah. 300-304 [doi]
- Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation ProblemsTrung T. Nguyen, Amartya Hatua, Andrew H. Sung. 305-311 [doi]
- Vision-Based Trainable Robotic Arm for Individuals with Motor DisabilityDurga Sundaram, Abhishek Sarode, Kiran George. 312-315 [doi]
- New Results in Change Detection Using Optical and Multispectral ImagesBulent Ayhan, Chiman Kwan. 316-321 [doi]
- Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked SystemsSafia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid. 322-328 [doi]
- Drones' Face off: Authentication by Machine Learning in Autonomous IoT SystemsMehdi Karimibiuki, Michal Aibin, Yuyu Lai, Raziq Khan, Ryan Norfield, Aaron Hunter. 329-333 [doi]
- Practical Considerations in Unsupervised Change Detection Using SAR ImagesBulent Ayhan, Chiman Kwan. 334-339 [doi]
- Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretchingMahssa Abdolahi, Hao Jiang, Bozena Kaminska. 340-346 [doi]
- Identifying Generic Features for Malicious URL Detection SystemHafiz Mohammd Junaid Khan, Quamar Niyaz, Vijay K. Devabhaktuni, Site Guo, Umair Shaikh. 347-352 [doi]
- Clock Variation Impact on Digital Control System PerformanceSandun S. Kuruppu, Alexander Shibilski. 353-358 [doi]
- Application of Robot Operating System in Robot FlocksJordan Fernandes, Keye Li, Joey Mirabile, Gregg Vesonder. 359-363 [doi]
- On Stability of Current Controlled Drives with Delay in Feedback PathAmina Shrestha, Rhishav Mahaju, Sandun Kuruppu. 364-370 [doi]
- A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous MicrosystemsBrad Wheeler, Andrew Ng 0002, Brian G. Kilberg, Filip Maksimovic, Kristofer S. J. Pister. 371-376 [doi]
- Control System Response Improvement via Denoising Using Deep Neural NetworksKiavash Fathi, Mehdi Mahdavi. 377-382 [doi]
- A novel double spending attack countermeasure in blockchainKervins Nicolas, Yi Wang. 383-388 [doi]
- Robotic Solutions for EldercareVanessa DeFreese, Tyler Wright, Ivy Robalino, Gregg Vesonder. 389-394 [doi]
- Unsupervised Similarity-based Sensor Selection for Time Series DataBadar Almarri, Sanguthevar Rajasekaran, Chun-Hsi Huang. 395-400 [doi]
- Machine Learning for DDoS Attack Classification Using Hive PlotsPablo Rivas, Casimer DeCusatis, Matthew Oakley, Alex Antaki, Nicholas Blaskey, Steven LaFalce, Stephen Stone. 401-407 [doi]
- An algorithmic Solution in Data Visualization for the "Hair Ball" ProblemKhalid Hamad Motleb Alnafisah. 408-418 [doi]
- What Makes a National Football League Team Successful? an Analysis of Play by Play DataJosef Ur, Mathew Craner, Rehab El Hajj. 419-425 [doi]
- Data Mining in The NBA: An Applied ApproachJordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El Hajj. 426-432 [doi]
- Multi-Objective Optimization for Size and Resilience of Spiking Neural NetworksMihaela Dimovska, Travis Johnston, Catherine D. Schuman, J. Parker Mitchell, Thomas E. Potok. 433-439 [doi]
- Office Multi-Occupancy Detection using BLE Beacons and Power MetersAzkario Rizky Pratama, Alexander Lazovik, Marco Aiello 0001. 440-448 [doi]
- Change Detection Using Original and Fused Landsat and Worldview ImagesChiman Kwan, Jerry Yang, Bryan Chou. 449-454 [doi]
- Vulnerability Analysis and ModelingMikeera Brown, Shawnoah Pollock, Wafa Elmannai, Michael Joseph, Khaled Elleithy. 455-461 [doi]
- The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi CrossoverPeter Stubberud. 462-468 [doi]
- Multiple Human Objects Tracking and Classification Directly in Compressive Measurement Domain for Long Range Infrared VideosChiman Kwan, David Gribben, Trac D. Tran. 469-475 [doi]
- Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication AbilitiesMd Inzamam Ul Haque, Damian Valles. 476-482 [doi]
- A new Quantum Processor ArchitectureMichael Joseph, Khaled Elleithy, Mohamed Mohamed. 483-487 [doi]
- Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical VideosChiman Kwan, David Gribben, Trac Tran. 488-494 [doi]
- Activity Monitoring System to Support Elderly Independent LivingJarrett B. Knox, Eric M. Pereira, Anthony Sousa, Douglas E. Dow. 495-498 [doi]
- Time Series Modeling of Storm Outages with Weather Mesonet Data for Emergency Preparedness and ResponseKingsley Udeh, David W. Wanik, Nick Bassill, Emmanouil N. Anagnostou. 499-505 [doi]
- Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily LivingKenshi Saho, Kazuki Uemura, Masahiro Fujimoto, Michito Matsumoto. 506-510 [doi]
- 3D Object Detection Based on LiDAR DataRamin Sahba, Amin Sahba, Mo Jamshidi, Paul Rad. 511-514 [doi]
- FBAD: Fog-based Attack Detection for IoT Healthcare in Smart CitiesIbrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, Esam Aloufi, Mohamed A. Zohdy, Hua Ming. 515-522 [doi]
- Battery Charging Application Thorough PVA and MPPT Controller with Voltage RegulationZuhair Alqarni, Johnson Asumadu. 523-527 [doi]
- Electroencephalographic (EEG) Analysis of Individuals Experiencing Acute Mental StressMatthew Regueiro, Bhagyashree Shirke, Mandy Chiu, Nicholas Capobianco, Kiran George. 528-534 [doi]
- Using Historical Data to Predict Parking OccupancySudarshan S. Chawathe. 534-540 [doi]
- Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features DistributionOluwaseyi Ajayi, Obinna Igbe, Tarek N. Saadawi. 541-549 [doi]
- Scaling Blockchains to Support Electronic Health Records for Hospital SystemsAlyssa Donawa, Inema Orukari, Corey E. Baker. 550-556 [doi]
- Residual Capsule NetworkSree Bala Shruthi Bhamidi, Mohamed El-Sharkawy. 557-560 [doi]
- Machine Learning Models for Activity Recognition and Authentication of Smartphone UsersS. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar. 561-567 [doi]
- ACO-based Distributed Energy Routing Protocol In Smart GridSara Hebal, Djamila Mechta, Saad Harous. 568-571 [doi]
- Unformatted, Certified Scientific ObjectsMark E. Royer, Sudarshan S. Chawathe. 572-577 [doi]
- Automated Well Water Contamination Tester and Web ServiceBrody E. Nagy, Sean A. Demers, Douglas E. Dow. 578-584 [doi]
- Probabilistic sensor design for healthcare technologyJoseph Russell, Jeroen Bergmann. 585-590 [doi]
- EEG-Based Biometrics Utilizing Image Recognition for Patient IdentificationHy Do, Vu Truong, Kiran George, Bhagyashree Shirke. 591-595 [doi]
- Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily LivingMiguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M. R. Alrashidi, Douglas E. Dow. 596-599 [doi]
- Integration of UAVs with Real Time Operating Systems using UAVCANNiranjan Ravi, Mohamed El-Sharkawy. 600-605 [doi]
- Winter Cabin Water Tap Monitor and Release System to Reduce Risk of FreezingPaul L. Kaprielian, Thach Pham, Alex Young, Douglas E. Dow, Scott A. Grenquist, Bruce M. Decker. 606-609 [doi]
- Towards Better Management of Combined Sewage SystemsChristina Berke, Elizabeth Fassman-Beck, Jack Li, Gregg Vesonder. 610-613 [doi]
- Segmentation of Skin Lesion Using Harris Corner Detection and Region GrowingIzbaila Imtiaz, Imran Ahmed, Misbah Ahmad, Kaleem Ullah, Awais Adnan, Maaz Ahmad. 614-619 [doi]
- Comparative Analysis of Stereo Matching AlgorithmsAnil R. Patel, Ashish Patel. 620-626 [doi]
- Overhead View Person Detection Using YOLOMisbah Ahmad, Imran Ahmed, Awais Adnan. 627-633 [doi]
- A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs)Walid Abdel Gelil, Thomas Kunz. 640-646 [doi]
- Performance of the CR-MAC with Channel Fading and Capture Effect under Practical Traffic Scenarios for VANETsMuhammet Ali Karabulut, A. F. M. Shahen Shah, Haci Ilhan. 647-652 [doi]
- Assurance for CyberSecurity with Assume-Guarantee ReasoningAli Alfageeh, Siddhartha Bhattacharyya, Samuel Perl, Milankumar Patel. 653-659 [doi]
- Data Augmentation with Generative Models for Improved Malware Detection: A Comparative StudyRoland Burks, Kazi Aminul Islam, Yan Lu, Jiang Li. 660-665 [doi]
- An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet TransformSoo-Yeon Ji, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong. 666-672 [doi]
- AECC: An Enhanced Public Key Cryptosystem for User Defined MessagesShajina Anand, Gunasekaran Raja, Aishwarya Ganapathisubramaniyan. 673-678 [doi]
- An Efficient Security Scheme for the Internet of Things with Resource-Constrained DevicesXin-Wen Wu, Waleed Farag, Sanwar Ali, Siddhivinayak Kulkarni. 679-685 [doi]
- Distributed Image Encryption Based On a Homomorphic Cryptographic ApproachMamadou I. Wade, Mohamed Chouikha, Tepper Gill, Wayne Patterson, Talitha M. Washington, Jianchao Zeng. 686-696 [doi]
- CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk ManagementYi Huang, Jayanta Debnath, Michaela Iorga, Anup Kumar, Bin Xie 0001. 697-707 [doi]
- Formulating Support for Superpages to reduce the number of TLB Faults in Contiguous Virtual Memory SpaceAvimita Chatterjee. 708-715 [doi]
- Identification of Critical-Attacks Set in an Attack-GraphAlaa T. Al Ghazo, Ratnesh Kumar. 716-722 [doi]
- Maximum Diversity in Web Application User Action PrivacyRajiv Bagai, Seth Layton, Srikanth Gampa, Kavitha Chandrashekar. 723-729 [doi]
- On the Efficacy of Using Android Debugging Bridge for Android Device ForensicsChuck Easttom, Willie Sanders. 730-735 [doi]
- PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with CounterattackDat Tran, Chetan Jaiswal. 736-743 [doi]
- Dual-Beam Analog Beamforming for mmWave CommunicationsAdrian Jaesim, Adel Aldalbahi, Nazli Siasi, D. Oliveira, N. Ghani. 744-748 [doi]
- An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G NetworksAnurag Thantharate, Cory Beard, Sreekar Marupaduga. 749-754 [doi]
- A Physical Strength Measurement and Analysis System for Elderly People Using Motion SensorsAkira Kawai, Shinichi Taniguchi, Hui Li LI, Shizue Izumi. 755-761 [doi]
- DeepSlice: A Deep Learning Approach towards an Efficient and Reliable Network Slicing in 5G NetworksAnurag Thantharate, Rahul Arun Paropkari, Vijay Walunj, Cory Beard. 762-767 [doi]
- A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoTMohamed Sofiane Batta, Zibouda Aliouat, Saad Harous. 768-774 [doi]
- NetDevOps: A New Era Towards Networking & DevOpsJay Ashok Shah, Dushyant Dubaria. 775-779 [doi]
- Voice Interactive GamesJ. P. Piotrowski, E. A. Yfantis, A. Campagna, Q. Cornu, G. M. Gallitano. 780-784 [doi]
- Automated System for Cervical Abnormality Detection using Machine LearningAshutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale. 785-790 [doi]
- Stability Improvement of Power Networks using Cluster based Dynamic Excitation of AVRBrook W. Abegaz. 791-795 [doi]
- Conceptual Neuroadaptive Brain-Computer Interface utilizing Event-related DesynchronizationBrian Luu, Bradley Hansberger, Thanat Tothong, Kiran George. 796-802 [doi]
- An Efficient Heuristic for the Vacation Planning ProblemDamianos Gavalas, Charalampos Konstantopoulos, Grammati E. Pantziou, Nikolaos Vathis. 803-808 [doi]
- ASCPN - A Security Evaluation System for Cyber Power NetworksBrook W. Abegaz. 809-816 [doi]
- Synchronization of Fractional-Order Complex Chaotic System Using Active Control MethodChuanhong Du, Licai Liu, Shuaishuai Shi. 817-823 [doi]
- Design and Implementation of an Indoor Ambient Noise Monitoring System with LocalizationJunho Son, Hyuntae Cho, Chong-Min Kyung. 824-829 [doi]
- Congestion Control and Traffic Management in Wireless Sensor NetworksMohammad M. Kadhum, Nur Nazmah Mat Zin. 830-836 [doi]
- Facing the Music: Performance Implications of Working with Music in the BackgroundClaudiu Moise, Rachel F. Adler. 837-843 [doi]
- Feedback Motion Plan Verification for Vehicles with Bounded Curvature ConstraintsGiovanni Miraglia, Loyd R. Hook. 844-854 [doi]
- Smart Energy Efficiency for a Sustainable WorldJohn Lamb, Nina S. Godbole. 855-861 [doi]
- Study on the Nano-scaled Molecules Used in Treatment for Melanoma Using Bio-chemical and Computational AnalysisAmanda Kyung, Yuna Lee, Ho Jeong Kwon. 862-866 [doi]
- GSM Based Irrigation SystemArjun Dutta, Amit Kumar, Bittu Kumar, Abhishek Roy, Poulami Paul, Swarnabha Roy, Rahul Agarwala, Abhisikta Chakraborty, Asesh Ghosh, Himadri Nath Saha, Anirup Roy, Ashish Adarsh. 867-872 [doi]
- Incentives Don't Solve Blockchain's ProblemsShea Ketsdever, Michael J. Fischer. 873-876 [doi]
- Airborne-Relay-based Algorithm for Locating Crashed UAVs in GPS-Denied EnvironmentsDonghan Oh, JaeSung Lim, Jong Kwan Lee, Hoki Baek. 877-882 [doi]
- On Approximation of Gaussian Q-Function and its ApplicationsParnian A. ShirinAbadi, Arash Abbasi. 883-887 [doi]
- Evaluation of a Realistic Example of Information-Centric Network Metadata ManagementTomoki Ito, Hirofumi Noguchi, Misao Kataoka, Takuma Isoda, Yoji Yamato, Tutomu Murase. 888-893 [doi]
- A Fast and Secure Pipelined Barrel Processor for Safety-Critical Applications for Real-Time Operating SystemsMong Tee Sim, Darshika G. Perera. 894-904 [doi]
- Smart Card Based Remote User Authentication Scheme for Cloud ComputingR. Madhusudhan, Manjunath Hegde. 905-910 [doi]
- A Condition Monitoring System for the Analysis of Bearing Distributed FaultsMuhammad Irfan, Nordin Saad, Ansar Ali, K. Vinoth Kumar, M. Aman Sheikh, M. Awais. 911-915 [doi]
- Activity Learning for Intelligent BuildingsIlche Georgievski, Prashant Gupta, Marco Aiello 0001. 916-923 [doi]
- Music Streaming Service Prediction with MapReduce-based Artificial Neural NetworkMin Chen. 924-928 [doi]
- A Low-Cost Arm Robotic Platform based on Myoelectric Control for Rehabilitation EngineeringAndres F. Ruiz-Olaya, Cesar A. Quinayas Burgos, Leonardo Torres Londoño. 929-933 [doi]
- Coverage and Routing Hole Detection in Cyber-physical Network ParadigmAnju Arya, Amita Rani, Sanjay Kumar. 934-939 [doi]
- Designing and Analysis of IEEE 802.11 MAC for UAVs Ad Hoc NetworksA. F. M. Shahen Shah, Haci Ilhan, Ufuk Tureli. 934-939 [doi]
- Performance Study of Detectability of RFID System With Varying Atmospheric ConditionsShilpa Choudhary, Hemant Purohit, Amit Sehgal, Awanish Kaushik. 940-944 [doi]
- Scavenging Residual Energy from Wi-Fi Sources Using a Rectenna CircuitRiken Parekh, Kushal Jain, David Luu, Kiran George. 945-950 [doi]
- Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT DevicesDivyashikha Sethia, Anadi Shakya, Ritik Aggarwal, Saksham Bhayana. 951-957 [doi]
- On the Influence of Delay Spread in TDL and CDL Channel Models for Downlink 5G MIMO SystemsGordana Barb, Marius Otesteanu. 958-962 [doi]
- Channel Redundancy Analysis and Bandwidth Utilization in GSM Mobile Communication Network of UgandaHemant Purohit, Parneet Kaur, Darlius Bosco Mwebesa, Shilpa Choudhary, Kanika Joshi. 963-967 [doi]
- Multi-sensor Wearable for Child SafetyUshashi Chowdhury, Pranjal Chowdhury, Sourav Paul, Anwesha Sen, Partho Protim Sarkar, Shubhankur Basak, Abari Bhattacharya. 968-972 [doi]
- A Comprehensive Experimental Evaluation of Radio Irregularity in BLE NetworksAli Nikoukar, Seyedehyalda Akbarzadeh, Mansour Abboud, Mesut Günes, Behnam Dezfouli. 973-978 [doi]
- The Effect of Cognitive Load on Gesture Acceptability of Older Adults in Mobile ApplicationAfshan Ejaz, Maria Rahim, Shakeel Ahmed Khoja. 979-986 [doi]
- Study on Unemployment Rate in USA Using Computational and Statistical MethodsAndrew Kyung, Steve Nam. 987-993 [doi]
- An Architectural Schema for Performance Prediction using Machine Learning in the Fog-to-Cloud ParadigmSouvik Sengupta, Jordi Garcia, Xavi Masip-Bruin, Andrés Prieto-González. 994-1002 [doi]
- Analysis of Trend in Traffic Flow Using Computational and Statistical ApproachesRichard Kyung, Louis Sungwoo Cho. 1003-1009 [doi]
- Performance Analysis for Nonlinear MU-OFDM-DCSK Communication SystemsChenbo Wang, Liang Hao, Baoji Wang, Jianhua Zhang, Yiming Lei. 1010-1014 [doi]
- SecML: A Proposed Modeling Language for CyberSecurityChuck Easttom. 1015-1021 [doi]
- A Matching Game Solution for Optimal RAT Selection in 5G Multi-RAT HetNetsMohamed G. Anany, Mahmoud M. Elmesalawy, Eman Serag El Din. 1022-1028 [doi]
- Efficient Feature Selection for Intrusion Detection SystemsS. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar. 1029-1034 [doi]
- Optimal Deployment of Heterogeneous Wireless Nodes in Integrated LTElWi-Fi NetworksNoha A. Elmosilhy, Ahmed M. Abd El-Haleem, Mahmoud M. Elmesalawy. 1035-1041 [doi]
- Ergodic Rate Performance in Nonlinear Omnidirectional Coding MIMO-OFDM SystemsYuyang Du, Liang Hao, Zhaohui Liu, Yingyang Chen, Yiming Lei. 1042-1045 [doi]
- Estimation of the 2020 US Presidential Election Competition and Election StratagiesArthur Kim, Peter Kim. 1046-1050 [doi]
- Towards a Threat Model for Vehicular Fog ComputingMohammad Aminul Hoque, Ragib Hasan. 1051-1057 [doi]
- SPEED CONTROLLING & TRAFFIC MANAGEMENT SYSTEM (SCTMS)Aneesh Kar, Soujanya Syamal, Suvraneel Chatterjee, Antarika Basu, Himadri Nath Saha, Srijata Choudhuri. 1058-1063 [doi]
- UWB Channel Classification Using Convolutional Neural NetworksParnian A. ShirinAbadi, Arash Abbasi. 1064-1068 [doi]
- Suicide Prediction Analysis with Generalized Addictive ModelJun Shen, Shihui Zhao, Mingzi Ye. 1069-1073 [doi]
- Mirage: A Protocol for Decentralized and Secured Communication of IoT DevicesShajina Anand, Gunasekaran Raja, Gokul Anand, Sajjad Hussain Chauhdary, Ali Kashif Bashir. 1074-1080 [doi]
- A Deep Neural Network Approach for Top View People Detection and CountingMisbah Ahmad, Imran Ahmed, Kaleem Ullah, Maaz Ahmad. 1082-1088 [doi]
- Inter-UAV Collision Avoidance using Deep-Q-Learning in Flocking EnvironmentGunasekaran Raja, Sudha Anbalagan, Vikraman Sathiya Narayanan, Srinivas Jayaram, Aishwarya Ganapathisubramaniyan. 1089-1095 [doi]
- Smart Phone Based Mobile Code Dissemination for Heterogeneous Wireless Sensor NetworksOmor Faruk, Xiaoyang Zhong, Yao Liang, Xu Liang. 1096-1102 [doi]
- Interference Mitigation by Intelligent Channel Selection for Device-to-Device CommunicationsAnas M. Abdelhafez, Hussein M. ElAttar, Mohamed A. Aboul-Dahab. 1103-1109 [doi]
- Towards a Threat Model for Fog ComputingYasser Karim, Ragib Hasan. 1110-1116 [doi]
- A Misbehavior Authority System for Sybil Attack Detection in C-ITSJoseph Kamel, Farah Haidar, Inès Ben Jemaa, Arnaud Kaiser, Brigitte Lonc, Pascal Urien. 1117-1123 [doi]
- Study of mm-sized Coil to Coil Backscatter Based Communication LinkXiao Sha, Yasha Karimi, Samir R. Das, Petar M. Djuric, Milutin Stanacevic. 1124-1129 [doi]
- Low Power FPGA-SoC Design Techniques for CNN-based Object Detection AcceleratorHeekyung Kim, Ken Choi. 1130-1134 [doi]
- Adaptive Compensation H∞ Filter with Convergence Criterion for SINS' Transfer AlignmentWeiwei Lyu, Xianghong Cheng, Jinling Wang. 1135-1144 [doi]
- A Survey of Applying Reinforcement Learning Techniques to Multicast RoutingOla Ashour, Marc St-Hilaire, Thomas Kunz, Maoyu Wang. 1145-1151 [doi]
- Decoding Steady-State Visual Evoked Potentials From EEG Signals: Towards an EEG-Triggered FES System to Restore Hand Grasp FunctionAndrés Felipe Ruiz Olaya, Javier Mauricio Antelis, Alexander Cerquera. 1152-1157 [doi]
- IoT Based Smart Security and Home Automation SystemSovik Sinha Chowdhury, Subam Sarkar, Soujanya Syamal, Soumyajit Sengupta, Priti Nag. 1158-1161 [doi]
- A Multi-Phase Time-to-Digital Converter Differential Vernier Ring OscillatorAmina Annagrebah, E. Bechetoille, I. B. Laktineh, H. Chanal. 1162-1167 [doi]
- Thermal-Constrained. Energy-Aware Load Management on MPSoC ArchitecturesDulana Rupanetti, Hassan A. Salamy. 1168-1174 [doi]
- Low Power Design for DVFS Capable SoftwareAli Manzak, Sadi Evren Seker. 1175-1179 [doi]
- A Feedback Motion Plan for Vehicles with Bounded Curvature ConstraintsGiovanni Miraglia, Loyd R. Hook. 1180-1186 [doi]
- Security Considerations for the Development of Secure Software SystemsMaxwell Ruggieri, Tzu-Tang Hsu, Md Liakat Ali. 1187-1193 [doi]
- Applying Ad Hoc Technology in Inner City CommunicationFarshid Sahba, Amin Sahba, Ramin Sahba. 1194-1198 [doi]
- Performance Analysis of Squarely Packed Polymorphic SWCNT InterconnectAbu Bony Amin, Muhammad Sana Ullah. 1199-1203 [doi]
- Business Intelligence Solution for Bikers Haven RestaurantRamnhell P. Alday, Maryli F. Rosas. 1204-1210 [doi]
- Dynamic Beam Management for NR using Adaptive Antenna ArrayAditi Singh. 1211-1218 [doi]