Abstract is missing.
- CrowdPick: A Generic Framework for Delivering Service Specific Crowd InfrastructureShahid Al Noor, Yasser Karim, Md. Mahmud Hossain, Ragib Hasan. 1-7 [doi]
- LTEOC: Long Term Energy Optimization Clustering For Dynamic IoT NetworksMohamed Sofiane Batta, Zibouda Aliouat, Hakim Mabed, Saad Harous. 8-14 [doi]
- Development and Implementation of S-MAC based RPL Protocol to Increase Energy Efficiency for the TelosBRussell Skaggs-Schellenberg, Daniel Wright, Nan Wang. 15-20 [doi]
- Cybersecurity analysis in Dedicated Short-Range Communications in vehicular networksMichael Stepzinski, Shamik Sengupta. 21-27 [doi]
- Multimedia Transmission for V2X Communication over Legacy LTE-A Network Infrastructure - A Performance EvaluationSubhrajit Majumder, Deepthi Chandrika Mandava, Junghwan Kim, Ahmad Y. Javaid. 28-34 [doi]
- 8-bit Convolutional Neural Network Accelerator for Face RecognitionWei Pang, Yufeng Li, Shengli Lu. 35-39 [doi]
- Deep Attractor with Convolutional Network for Monaural Speech SeparationTian Lan, Yuxin Qian, Wenxin Tai, Boce Chu, Qiao Liu 0003. 40-44 [doi]
- Anomaly Detection and Identification Using Visual Techniques in Streaming VideoT. A. Wanigaaratchi, V. G. T. N. Vidanagama. 45-51 [doi]
- A Bfloat16 Fused Multiplier-AdderStafford Hutchins, Earl Swartzlander. 52-55 [doi]
- Continuous Authentication of Smartphone Users using Machine LearningSuhana Ambol, Sherif Rashad. 56-62 [doi]
- Interactive Visualization of 3D Terrain Data Stored in the CloudGregory Larrick, Yun Tian, Uri Rogers, Halim Acosta, Fangyang Shen. 63-70 [doi]
- A Data Structure for Efficient File Deduplication in Cloud StorageBohui Wang, Hui Li, Yan Zhao, Xin Yang, Huajun Ma, Xin Xie, Kaixuan Xing. 71-77 [doi]
- Stock Price Prediction using Bi-Directional LSTM based Sequence to Sequence Modeling and Multitask LearningSiddartha Mootha, Sashank Sridhar, Rahul Seetharaman, S. Chitrakala. 78-86 [doi]
- Central versus Distributed Statistical Computing Algorithms-A ComparisonNisha Thorakkattu Madathil, Saad Harous. 87-92 [doi]
- Energy Disaggregation using Multilabel Binarization and Gaussian Naive Bayes ClassifierPatrick Adjei, Nittin S. Sethi, Camila P. E. de Souza, Miriam A. M. Capretz. 93-100 [doi]
- Design of Machine Learning Algorithms for Behavioral Prediction of Objects for Self-Driving CarsYevgeniy Byeloborodov, Sherif Rashad. 101-105 [doi]
- Performance Analysis and Evaluation of LSTM and GRU Architectures for Houston toad and Crawfish frog Call DetectionShafinaz Islam, Damian Valles, Michael R. J. Forstner. 106-111 [doi]
- Backbone Neural Network Design of Single Shot Detector from RGB-D Images for Object DetectionPurvesh Sharma, Damian Valles. 112-117 [doi]
- Automatic Numerical Question Answering on Table using BERT-GNNRuchi Bagwe, Kiran George. 118-124 [doi]
- Deep Learning Enhanced BCI Technology for 3D PrintingJahnavi Kachhia, Rashika Natharani, Kiran George. 125-130 [doi]
- OPSCAN: Density-based Spatial Clustering in Opportunistic NetworksAhmed E. Elshafey, Soumaia Ahmed Al Ayyat, Sherif Gamal Aly. 131-136 [doi]
- Modified PHY Layer for High Performance V2X Communication using 5G NRUtpal Kumar Dey, Robert Akl, Robin Chataut, Mohammadreza Robaei. 137-142 [doi]
- IoT Based: Air Quality Index and Traffic Volume CorrelationOmar Alruwaili, Ivica Kostanic, Ali Al-Sabbagh, Hamad Almohamedh. 143-147 [doi]
- A Novel Framework for Data Center Risk AssessmentMoises Levy. 148-154 [doi]
- PAARS: Privacy Aware Access Regulation SystemMd. Monowar Anjum, Noman Mohammed. 155-161 [doi]
- LSTM for Cloud Data Centers Resource Allocation in Software-Defined Optical NetworksMichal Aibin. 162-167 [doi]
- A New Caching Algorithm for Boosting Edge Computing PerformanceZiyin Zhang, Wei Hao. 168-175 [doi]
- A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage ServiceYuanyuan Yang, Hui Li, Xiangdong Cheng, Xin Yang, Yaoguang Huo. 176-182 [doi]
- Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading ChannelAyad N. Bihnam, Xian Liu. 183-188 [doi]
- Remote monitoring of evapotranspiration from green roof systemsJeremy Lytle, Devon Santillo, Kristiina Valter Mai, Jeremy Wright. 189-194 [doi]
- Comparison of Machine learning models for Parkinson's Disease predictionTapan Kumar, Pradyumn Sharma, Nupur Prakash. 195-199 [doi]
- A Noncoherent Incremental Learning DemodulatorPaul Gorday, Nurgün Erdöl, Hanqi Zhuang. 200-206 [doi]
- Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed BanditOlusola Tolulope Odeyomi. 207-212 [doi]
- Phychoacoustic Masking of Delta and Time -Difference Cepstrum Features for Deception DetectionSinead V. Fernandes, Muhammad S. Ullah. 213-217 [doi]
- Optimization of Regenerator Placement in Optical Networks Using Deep Tensor Neural NetworkMichal Aibin, Stephen Cheng, David Xiao, Aldrich Huang. 218-225 [doi]
- Performance Evaluation of TPC-C Benchmark on Various Cloud ProvidersRaghu Nandan Avula, Cliff Zou. 226-233 [doi]
- A Feasible Chinese Text Data Preprocessing StrategyJingang Liu, Chunhe Xia, Haihua Yan, Jie Sun. 234-239 [doi]
- Computation of Posterior Cramer-Rao Bounds for Deep Learning NetworksJean E. Piou. 240-244 [doi]
- Predicting COVID-19 Infection Groups using Social Networks and Machine Learning AlgorithmsKyle Spurlock, Heba Elgazzar. 245-251 [doi]
- Streamlining Smart Cities to Create Safer SpacesRandy Krauss, Matthew Vaysfeld, Murad Arslaner, Gregg Vesonder. 252-257 [doi]
- Analyzing Gun Violence in the United StatesJustina Celentano, Eman Abdelfattah. 258-261 [doi]
- Secure Digital Service as a Utility and the Unit of MeasureSalam Ismaeel, Mirza Kamaludeen, Ali Miri. 262-267 [doi]
- Detection of Fraudulence in Credit Card Transactions using Machine Learning on Azure MLAbhishek Shivanna, Sujan Ray, Khaldoon Alshouiliy, Dharma P. Agrawal. 268-273 [doi]
- Knee Injury Diagnostic DeviceJulie E. McKenna, Tyler R. Hopkins, Lucas T. Lavallee, Douglas E. Dow. 274-279 [doi]
- Intelligent Mobile Electrocardiogram Monitor-empowered Personalized Cardiac Big DataJiadao Zou, Qingxue Zhang, Kyle Frick. 280-284 [doi]
- Towards Adversarially Robust DDoS-Attack ClassificationMichael Guarino, Pablo Rivas, Casimer DeCusatis. 285-291 [doi]
- Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise NetworksLanier A. Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin. 292-297 [doi]
- Automated prediction of Heart disease using optimized machine learning techniquesLama A. Alqahtani, Hanadi M. Alotaibi, Irfan Ullah Khan, Nida Aslam. 298-302 [doi]
- A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking AutonomyLanier A. Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel D. Rubin. 303-308 [doi]
- Adversarial Input Detection Using Image Processing Techniques (IPT)Kishor Datta Gupta, Dipankar Dasgupta, Zahid Akhtar. 309-315 [doi]
- IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine LearningMadhuri Gurunathrao Desai, Yong Shi, Kun Suo. 316-322 [doi]
- Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT EnvironmentSivaselvan N, Vivekananda Bhat K, Muttukrishnan Rajarajan. 323-330 [doi]
- Scheduling in IEEE 802.15.4e Time Slotted Channel Hopping: A SurveySarra Hammoudi, Abdelhak Bentaleb, Saad Harous, Zibouda Aliouat. 331-336 [doi]
- Extending Conductive Thread Use to Unintended MicrocontrollersJaimie Kelley, Caileigh Marshall. 337-342 [doi]
- Agile Edge Classification of Ocean SoundsStelios Neophytou, Pavlos Tsiantis, Ilias Alexopoulos, Ioannis Kyriakides, Camille de Veyrac, Ehson Abdi, Daniel R. Hayes. 343-348 [doi]
- A Provenance Meta Learning Framework for Missing Data Handling Methods SelectionQian Liu, Manfred Hauswirth. 349-358 [doi]
- An Event Detection Platform to Detect Gender Using Deep LearningAbdulrahman Aldhaheri, Je Lee, Khaled Almgren. 359-363 [doi]
- Analyzing Auction Data for Anomalous BiddingSudarshan S. Chawathe. 364-370 [doi]
- Moving Recursion Out of the RDBMS for Transactional Graph WorkloadsChristine F. Reilly, Matthew Clark. 371-376 [doi]
- MINI-SSD: A Fast Object Detection Framework in Autonomous DrivingShaimaa Ezz-ElDin, Omar Nabil, Hussam Murad, Farah Adel, Ahmed AbdEl-Jalil, Khaled Salah, Ayub Khan. 377-380 [doi]
- Adaptive Sliding Mode Control based on SVRKemal Uçak, Gülay Öke Günel. 381-386 [doi]
- Exploring a Plugin-Based System for Crowd and Pathogen Simulation in UnityJordan Fernandes, Jack Li, Keye Li, Joseph Mirabile, Gregg Vesonder. 387-392 [doi]
- Interpretable Saab Subspace Network for COVID-19 Lung Ultrasound ScreeningDennis Hou, Raymond Hou, Janpu Hou. 393-398 [doi]
- Generative Adversarial Networks in Security: A SurveyIndira Kalyan Dutta, Bhaskar Ghosh, Albert H. Carlson, Michael Totaro, Magdy A. Bayoumi. 399-405 [doi]
- A survey on Classification of Cyber-attacks on IoT and IIoT devicesYash Shah, Shamik Sengupta. 406-413 [doi]
- Estimating Predicate Selectivities in a NoSQL Database ServiceSudarshan S. Chawathe. 414-420 [doi]
- Smart Cities Digital transformation and 5G - ICT ArchitectureM. Tealab, A. Hassebo, A. Dabour, M. Abdelaziz. 421-425 [doi]
- VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT NetworksGolam Kayas, Mahmud Hossain, Jamie Payton, S. M. Riazul Islam. 426-433 [doi]
- A Bayesian Game Framework for a Semi-Supervised Allocation of the Spreading Factors in LoRa NetworksAlice Tolio, Davide Boem, Thomas Marchioro, Leonardo Badia. 434-439 [doi]
- Ringing Test for Third-Order Ladder Low-Pass FiltersMinhTri Tran, Anna Kuwana, Haruo Kobayashi 0001. 440-446 [doi]
- Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation SystemStephen Hopkins, Ezhil Kalaimannan, Caroline Sangeetha John. 447-454 [doi]
- Feedback Path Delay Effect on Stability of Controlled PMSMsAmina Shrestha, Rhishav Mahaju, Sandun Kuruppu. 455-460 [doi]
- An Autonomous Delivery Robot to Prevent the Spread of Coronavirus in Product Delivery SystemMurad Mehrab Abrar, Raian Islam, Md. Abid Hasan Shanto. 461-466 [doi]
- Iterative MPC for Energy Management and Load Balancing in 5G Heterogeneous NetworksAntonio Ornatelli, Andrea Tortorelli, Alessandro Giuseppi. 467-471 [doi]
- Maximizing Airtime Efficiency for Reliable Broadcast Streams in WMNs with Multi-Armed BanditsGiovanni Perin, David Nophut, Leonardo Badia, Frank H. P. Fitzek. 472-478 [doi]
- Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley TransformGianmarco Baldini, Raimondo Giuliani, Monica Gemo. 479-485 [doi]
- Sensors based Lane Keeping and Cruise Control of Self Driving VehiclesBrook W. Abegaz, Naxi Shah. 486-491 [doi]
- Optimized Approach to Improve Classification of Wrist Movements via Electromyography SignalsAlmon Chai, Evon Wan Ting Lim, Phei-Chin Lim. 492-495 [doi]
- Identification of Food Waste through Object RecognitionLynda Farinella, Eric Fernandes, Nathan Michener, Marco Polimeni, Gregg Vesonder. 496-499 [doi]
- On the Development of Tools for Modelling Dynamic Beliefs Based on Past DataAaron Hunter, Konstantin Boyarinov. 500-505 [doi]
- Clustering Algorithms and RFM Analysis Performed on Retail TransactionsYash Parikh, Eman Abdelfattah. 506-511 [doi]
- Computer-aided Ischemic Stroke Classification from EEG Data Using a Single-tiered Spiking Neural Network FrameworkElon Litman. 512-516 [doi]
- Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet AttacksShreehar Joshi, Eman Abdelfattah. 517-521 [doi]
- SAS Mobile Application for Diagnosis of Obstructive Sleep Apnea Utilizing Machine Learning ModelsCarl Haberfeld, Alaa F. Sheta, Md. Shafaeat Hossain, Hamza Turabieh, Salim Surani. 522-529 [doi]
- Mobile Natural Gas Concentration Intelligence Device Study for the ArcticAlexey Lagunov, Sergey Zabolotniy. 530-535 [doi]
- Performance Maintenance Over Time of Random Forest-based Malware Detection ModelsColin Galen, Robert Steele. 536-541 [doi]
- Using BERT to Extract Topic-Independent Sentiment Features for Social Media Bot DetectionMaryam Heidari, James H. Jones. 542-547 [doi]
- Latent Walking Techniques for Conditioning GAN-Generated MusicLogan Eisenbeiser. 548-553 [doi]
- Deep Convolutional Neural Network for Decoding EMG for Human Computer InteractionQi Wang, Xianping Wang. 554-557 [doi]
- EMG-based Hand Gesture Recognition by Deep Time-frequency Learning for Assisted Living & RehabilitationQi Wang, Xianping Wang. 558-561 [doi]
- Simple Dual Band Rectifier Based on Diplexer for Ambient RF Energy Harvesting ApplicationHong Tien Vu, Quang Minh Dinh, Dai Duong Nguyen, Minh Thuy Le. 562-565 [doi]
- Cross-platform for the development environment of smart home systemHong Yu, Joushua Lorrain, Fanming Liu, Cory Lo. 566-569 [doi]
- A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm ProcessVamshi Manthena, Sandeep Miryala, Grzegorz Deptuch, Gabriella Carini. 570-576 [doi]
- Multi-level Random Sample Consensus Method for Improving Structured Light Vision SystemsZhankun Luo, Yaan Zhang, Lizhe Tan. 577-582 [doi]
- ADCR: An Adaptive TOOL to select "Appropriate Developer for Code Review" based on Code ContextNafiz Sadman, Md. Manjurul Ahsan, M. A. Parvez Mahmud. 583-591 [doi]
- A Particle Swarm Optimization Algorithm to Meet Trust Requirements in Ridesharing SystemsFu-Shiung Hsieh. 592-595 [doi]
- Automated Portfolio Rebalancing using Q-learningNarayana Darapaneni, Amitavo Basu, Sanket Savla, Raamanathan Gururajan, Najmus Saquib, Sudarshan Singhavi, Aishwarya Kale, Pratik Bid, Anwesh Reddy Paduri. 596-602 [doi]
- An Unsupervised Learning Algorithm for Deep Recurrent Spiking Neural NetworksPangao Du, Xianghong Lin, Xiaomei Pi, Xiangwen Wang. 603-607 [doi]
- Radar Pulse on Pulse Identification Parallel FFT and Power Envelope AlgorithmJordan Juliano, Jaron Lin, Alex Erdogan, Kiran George. 609-613 [doi]
- Reusable Spiking Neural Network ArchitectureSai G. Pavan, Binsu J. Kailath. 614-620 [doi]
- An FPGA-based Implementation Method for Quadratic Spiking Neuron ModelXianghong Lin, Han Lu, Xiaomei Pi, Xiangwen Wang. 621-627 [doi]
- A Machine Learning Approach to Temporal Traffic-Aware Energy-Efficient Cellular NetworksAristide T.-J. Akem, Edwin Mugume. 628-634 [doi]
- An FPGA-based Optimized Memory Controller for Accessing Multiple MemoriesShrikant S. Jadhav, Clay Gloster, Jannatun Naher, Christopher C. Doss, Youngsoo Kim. 635-642 [doi]
- An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch SizesBhaskar Ghosh, Indira Kalyan Dutta, Albert H. Carlson, Michael Totaro, Magdy A. Bayoumi. 643-648 [doi]
- Coronavirus Outburst Prediction in India using SEIRD, Logistic Regression and ARIMA ModelNarayana Darapaneni, Deepali Nikam, Anagha Lomate, Vaibhav Kherde, Swanand Katdare, Anwesh Reddy Paduri, Kameswara Rao, Anima Shukla. 649-655 [doi]
- Three-Dimensional Down-View Imaging Based on MIMO Through-Wall-RadarZihan Xu, Li Jiang, Yiduo Liang, Yong Jia, Guolong Cui, Longfei Tan. 656-661 [doi]
- Implementation and Performance Evaluation of Overlay End System Multicast (ESM) for Stable and Fast Streaming of Multimedia Applications over Satellite NetworksKhaled Elleithy, Thomas Arciuolo, Akram Abu-aisheh. 662-667 [doi]
- Facial Expression Recognition and Recommendations Using Deep Neural Network with Transfer LearningNarayana Darapaneni, Rahul Choubey, Pratik Salvi, Ankur Pathak, Sajal Suryavanshi, Anwesh Reddy Paduri. 668-673 [doi]
- Localization Methods based on Error Analysis and Modeling in One DimensionOmar A. Zargelin, Fadel M. Lashhab, Walid K. Hasan. 674-683 [doi]
- Design and Implementation of a Heterogeneous Multi-Hop OWC/RF Relay Architecture for Opportunistic Ultra-Dense Wireless NetworksJiali Li, Rex Li, Michael B. Rahaim. 684-689 [doi]
- Localization Methods based on Error Analysis and Modeling in Two DimensionsOmar A. Zargelin, Fadel M. Lashhab, Walid K. Hasan. 690-699 [doi]
- IEEE 802.11ad Communication Quality Measurement in In-vehicle Wireless Communication with Real MachinesRyoko Nino, Takayuki Nishio, Tutomu Murase. 700-706 [doi]
- Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV SwarmChristopher Arnold, Jason Brown. 707-712 [doi]
- Radio-Factor Authentication: Identity Management over the 900MHz BandDaniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy. 713-719 [doi]
- Prediction of Dengue Infected Areas using A Novel Blockchain based Crowdsourcing FrameworkMd Shohel Khan, Ajoy Das, Md. Shohrab Hossain, Husnu S. Narman. 720-726 [doi]
- Enforcing Location-based Access Policies Using the Existing IEEE 802.11 InfrastructureHosam Alamleh, Ali Abdullah S. AlQahtani. 727-731 [doi]
- A Critical review of Credit Card Fraud Detection TechniquesBaker Al Smadi, Manki Min. 732-736 [doi]
- Non-Orthogonal Multiple Access for Terahertz Communication NetworksOguz Ülgen, Serhat Erküçük, Tunçer Baykas. 737-742 [doi]
- Autonomous Ripeness Detection Using Image Processing for an Agricultural Robotic SystemZubaidah Al-Mashhadani, Balasubramaniyan Chandrasekaran. 743-748 [doi]
- Enhanced Security Architecture for Visual Cryptography Based on Image Secret SharingManas Abhilash Gundapuneni, Anzum Bano, Navjot Singh. 749-755 [doi]
- Towards Contactless Monitoring of Blood Pressure at Rest and During Exercise Using Infrared ImagingJoseph Finkelstein, In Cheol Jeong. 756-758 [doi]
- The Capacity of Multi-user Private Information Retrieval for Computationally Limited DatabasesWilliam Barnhart, Zhi Tian. 759-763 [doi]
- Cyber Fraud: Detection and Analysis of the Crypto-RansomwareIlker Kara, Murat Aydos. 764-769 [doi]
- Healthcare Security Based on Blockchain within Multi-parameter Chaotic MapAzhar Hasan Nsaif Drebee, Ahmet E. Topcu, Yasamin Alagrash. 770-778 [doi]
- Detection of Undesired Events on Real-World SCADA Power System through Process MonitoringMd. Turab Hossain, Md. Shohrab Hossain, Husnu S. Narman. 779-785 [doi]
- Creating and Using Secure SoftwareAdam Asadoorian, Melvin Alberto, Md Liakat Ali. 786-792 [doi]
- A Comparison of Blockchain-Based Wireless Sensor Network ProtocolsAbena Primo. 793-799 [doi]
- Computer Vision based License Plate Detection for Automated Vehicle Parking Management SystemNarayana Darapaneni, Kiran Mogeraya, Shubham Mandal, Ashwin Narayanan, Prasanna Siva, Anwesh Reddy Paduri, Faisal Khan, Praful Mohan Agadi. 800-805 [doi]
- Alexa Eldercare Toolbox: A Smarthome Solution for the ElderlyKristen Tan, Karun Sekhar, Jenna Wong, Jarod Holgado, Michael Ameer, Gregg Vesonder. 806-812 [doi]
- An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor NetworksHadi Alasti. 813-819 [doi]
- Eldercare Robotics - AlexaEunseo Lee, Gregg Vesonder, Elijah Wendel. 820-825 [doi]
- Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform ApproachSoo-Yeon Ji, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong. 826-832 [doi]
- The largest QWI in the InGaP/InAlGaP laser structure using high compressive strain at elevated temperaturesM. A. Majid. 833-836 [doi]
- Performance Evaluation of Machine Learning for Prediction of Network Traffic in a Smart HomeFaisal Alghayadh, Debatosh Debnath. 837-842 [doi]
- Social Engineering Attacks A Reconnaissance Synthesis AnalysisMaha Rita Arabia-Obedoza, Gloria Rodriguez, Amber Johnston, Fatima Salahdine, Naima Kaabouch. 843-848 [doi]
- Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power LineFrederik Valocký, Martin Puchalik, Milos Orgon. 849-854 [doi]
- Smart Real-Time Autonomous Navigation System using integration of MEMS-based Low-Cost IMU/GPSNader Nagui, Omneya Attallah, Mohamed S. Zaghloul, Iman Morsi. 855-861 [doi]
- Crowdsensing Strategies Inspired by Choir Management Analyzed via Game TheoryLeonardo Badia, Nunzio Borra. 862-868 [doi]
- Movie Success Prediction Using MLNarayana Darapaneni, Christopher Bellarmine, Anwesh Reddy Paduri, Sujana Entoori, Abir Kumar, S. V. Vybhav, Koushik Mondal. 869-874 [doi]
- Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical NetworksSiwei Zhao, Sanyami Shah, Kishan Patel, Nickyta Patel, Vachana Shetty, Michal Aibin. 875-880 [doi]
- Effects of Lockdown and Post Lockdown on Covid19 cases across India using Supervised Learning TechniquesNarayana Darapaneni, Amol Kobal, Rohit Chaoji, Rajiv Tiwari, Suman Saurav, Anwesh Reddy Paduri. 881-887 [doi]
- On Efficient Candidate Path Selection for Dynamic Routing in Elastic Optical NetworksBijal Patel, Haiyang Ji, Swati Nayak, Ting Ding, Yue Pan, Michal Aibin. 889-894 [doi]
- Forecasting of COVID-19 in India Using ARIMA ModelNarayana Darapaneni, Deepak Reddy, Anwesh Reddy Paduri, Pooja Acharya, H. S. Nithin. 894-899 [doi]
- A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor TechnologyNaheem Olakunle Adesina, Ashok Srivastava. 901-906 [doi]
- Optimal Labeling with Cyclic Gray Codes for Generalized 16PAM ConstellationsBrett Wiens, Daniel C. Lee. 906-912 [doi]
- Assertion and Coverage Driven Test Generation Tool for RTL DesignsNourhan Muhammed, Nour Hussein, Khaled Salah, Ayub Khan. 913-916 [doi]
- QoS Control for Mission-critical Communication on Vehicles with IEEE802.11 Wireless LAN under Dynamic InterferenceTakumi Shiohara, Tutomu Murase. 917-922 [doi]
- Analysis and Synthesis of Respiratory Rate for Male PatientsEdder Sebastian Mendoza Garibay, Muhammad Sana Ullah. 923-927 [doi]
- Comparison of Convolutional Neural Network Architectures on Dermastopic ImageryWilliam F. Chabala, Ismail Jouny. 928-931 [doi]
- HC-LEACH: Huffman Coding-based energy-efficient LEACH protocol for WSNDjamila Mechta, Saad Harous. 932-938 [doi]
- DCCORONA: Distributed Cluster-based Coordinate and Routing System for NanonetworksIslam Amine Bouchedjera, Lemia Louail, Zibouda Aliouat, Saad Harous. 939-945 [doi]
- Pulse Separation Using Independent Component AnalysisJaron Lin, Jordan Juliano, Alex Erdogan, Kiran George. 946-950 [doi]
- Robust Cellular connectivity-Based Smart LED Street Lighting System: A Platform For Innovative Mission Critical Smart City IoT ApplicationsAhmed Hassebo, Mohamed A. Ali. 951-957 [doi]
- Conceptual Neuroadaptive Brain Computer Interface for Autonomous Control of Automobile BrakesDevaj Parikh, Kiran George. 958-961 [doi]