


default search action
9th CCWC 2019: Las Vegas, NV, USA
- IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019, Las Vegas, NV, USA, January 7-9, 2019. IEEE 2019, ISBN 978-1-7281-0554-3

- Mohsen Babaeian, Mohammad Mozumdar:

Driver Drowsiness Detection Algorithms Using Electrocardiogram Data Analysis. 1-6 - Diego A. Aponte-Roa, Xavier Collazo Fernandez, Miguel Goenaga, Albert A. Espinoza, Kasandra Vazquez:

Development and Evaluation of a Remote Controlled Electric Lawn Mower. 1-5 - Ramin Farajifijani, Saeed Ahmadian, Saba Ebrahimi, Ehsan Ghotbi:

Wind Farm Layout Optimization Problem Using Joint Probability Distribution of CVaR Analysis. 7-12 - Christos Liambas

, Stylianos Perrakis:
An Optimization Algorithm for VMI Test Evaluation. 13-18 - Jason Terhune, Kalen Coleman:

Implementation of A* Algorithm for Optimal Transmission Expansion Planning Portfolios Comprised of Competitively Bid Projects. 19-23 - Haider Abdallatif Mohamed K, Ikhlas Abdel-Qader

:
Performance Analysis of Excess Mean Square Error of Adjusting Log-Based Stepsize for LMS Algorithm with High Variance Input. 24-29 - Christian Trefftz, Debaditya Gautam, Joseph S. Szakas:

A Parallel Algorithm to Calculate an Approximation to the Order-K Voronoi Diagram using Java Streams and Thrust. 30-33 - Pravir Malik

, Leon Pretorius
:
An Algorithm for the Emergence of Life Based on a Multi-Layered Symmetry-Based Model of Light. 34-41 - Haider Abdallatif Mohamed K, Ikhlas Abdel-Qader

:
A Log-Based Step-Size Adaptation Technique for Fast and Robust Maximum Power Point Tracking Method for Solar PV Grid Tied System. 42-47 - Daniel Brown, Arialdis Japa, Yong Shi:

A Fast Density-Grid Based Clustering Method. 48-54 - Xin Pei, Xuefeng Li, Xiaochuan Wu, Kaiyan Zheng, Boheng Zhu, Yixin Cao:

Assured Delegation on Data Storage and Computation via Blockchain System. 55-61 - Kooktae Lee

, Raktim Bhattacharya:
On the Uniqueness of Stationary Solutions of an Asynchronous Parallel and Distributed Algorithm for Diffusion Equations. 62-68 - Yahya M. Tashtoush

, Mohammed Nour AlRashdan, Osama Salameh, Mohammad A. Alsmirat
:
Swagger-based jQuery Ajax Validation. 69-72 - Xavier Collazo Fernandez, Javier Sánchez Navarro, Luis C. Rendon Estrada, Jeffrey Borres Martinez, Diego A. Aponte-Roa, Melvin J. Nunez Santiago:

Control System Design for a 400W Micro Wind Turbine for DC Loads Applications. 73-78 - Diego A. Aponte-Roa, Jeffrey Borres Martinez, Xavier Collazo Fernandez, Wayne W. Weaver

:
A Benchtop DC Microgrid for Renewable Energy Sources Integration. 79-84 - John Stranahan, Tapan Soni, Vahid Heydari

:
Supervisory Control and Data Acquisition Testbed for Research and Education. 85-89 - Ariel Y. Ramos Ruiz, Luis J. Figueroa Rivera, Balasubramaniyan Chandrasekaran:

A Sensor Fusion Based Robotic System Architecture using Human Interaction for Motion Control. 95-100 - Guy M. Lingani, Danda B. Rawat

, Moses Garuba:
Smart Traffic Management System using Deep Learning for Smart City Applications. 101-106 - Mohammad Ranjbari Koohi, Morteza Modarresi Asem:

An Impressive Method for Performing Fixed and Variable Flight Maneuvers by a Pilot on a Swarm Comprised of Several Groups of Quadrotors. 107-113 - Sharif Atique, Subrina Noureen, Vishwajit Roy, Vinitha Hannah Subburaj, Stephen Bayne, Joshua Macfie:

Forecasting of total daily solar energy generation using ARIMA: A case study. 114-119 - Sudarshan S. Chawathe:

Recognizing Human Falls and Routine Activities Using Accelerometers. 120-126 - Robert James Steele, Brandon Thompson:

Data Mining for Generalizable Pre-admission Prediction of Elective Length of Stay. 127-133 - Sarah Deniz, Dakyung Lee, Grace Kurian, Lourdes Altamirano, Darren Yee, Michael Ferra, Blake Hament, Justin Zhan, Laxmi P. Gewali, Paul Y. Oh:

Computer Vision for Attendance and Emotion Analysis in School Settings. 134-139 - Bendi Venkata Ramana, Raja Sarath Kumar Boddu

:
Performance Comparison of Classification Algorithms on Medical Datasets. 140-145 - Moises Levy, Daniel Raviv, Jason O. Hallstrom:

Data Center Modeling Using a Cyber-Physical Systems Lens. 146-155 - Ashok Kumar Pundir, Jadhav Devpriya Jagannath, L. Ganapathy:

Improving Supply Chain Visibility Using IoT-Internet of Things. 156-162 - Dawei Li

, Boxiang Dong, En Wang, Michelle Zhu:
A Study on Flat and Hierarchical System Deployment for Edge Computing. 163-169 - Ashok Kumar Pundir, Jadhav Devpriya, Mrinmoy Chakraborty, L. Ganpathy:

Technology Integration for Improved Performance: A Case Study in Digitization of Supply Chain with Integration of Internet of Things and Blockchain Technology. 170-176 - Geremew Begna, Danda B. Rawat

:
Security Analysis in Context-Aware Distributed Storage and Query Processing in Hybrid Cloud Framework. 177-183 - Jay Shah, Dushyant Dubaria:

Building Modern Clouds: Using Docker, Kubernetes & Google Cloud Platform. 184-189 - Marryam Murtaza, Muhammad Sharif, Musarrat AbdullahYasmin, Tanveer Ahmad

:
Facial expression detection using Six Facial Expressions Hexagon (SFEH) model. 190-195 - Dragana Lj. Cvetkovic

:
A simple sufficient condition for stability and robust stability of a discrete Lotka-Volterra model. 196-200 - Dragana Lj. Cvetkovic

, Ljiljana Cvetkovic
, Vladimir R. Kostic
:
New pseudospectra localizations with application in ecology and vibration analysis. 201-205 - Sri Nikhil Gupta Gourisetti, Michael Mylrea, Hirak Patangia:

Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment Framework. 206-213 - Fernando Gonzalez-Espinoza, Luis Rizo Domínguez:

Optimal filtering for noise reduction in myoelectric signals on an embedded system. 214-217 - Marc Dinh, Brendan Morris, Yoohwan Kim:

UAS-based object tracking via Deep Learning. 217-275 - David C. Burnett

, Brad Wheeler, Lydia Lee
, Filip Maksimovic, Arvind Sundararajan, Osama Khan, Kristofer S. J. Pister
:
CMOS oscillators to satisfy 802.15.4 and Bluetooth LE PHY specifications without a crystal reference. 218-223 - Bei Chen, Wenlun Cao

, Yuyao He, Zhenhong Jiao, Hong Li, Chongwu Wang:
Motor Measurement and Control System Realization in Marine Electric Propulsion. 224-226 - Neha Rale, Raxitkumar Solanki, Doina Bein, James Andro-Vasko, Wolfgang Bein:

Prediction of Crop Cultivation. 227-232 - Ahmed K. Abed

, Ikhlas Abdel-Qader
:
A Spatial Voting Approach for Indoor Positioning System Using PNN-Multiclassifier Based on Multiple SSIDs. 233-239 - Vahid Tavakol Aghaei

, Arda Agababaoglu, Ahmet Onat
, Sinan Yildirim
:
Bayesian Learning for Policy Search in Trajectory Control of a Planar Manipulator. 240-246 - Dennis Hou, Tuo Liu, Yen-Ting Pan, Janpu Hou:

AI on edge device for laser chip defect detection. 247-251 - Raxitkumar Solanki, Sree Harsha Ravilla, Doina Bein:

Study of Distributed Framework Hadoop and Overview of Machine Learning using Apache Mahout. 252-257 - Madeeha Ishtiaq, Ateeq Ur Rehman

, Fazlullah Khan
, Abdus Salam, Shahzad Khan:
Performance Investigation of SR-HARQ transmission scheme in realistic Cognitive Radio System. 258-263 - Jithin Eapen, Doina Bein, Abhishek Verma

:
Novel Deep Learning Model with CNN and Bi-Directional LSTM for Improved Stock Market Index Prediction. 264-270 - Jiacheng Luo, Xin Su, Bei Liu:

A Reinforcement Learning Approach for Multipath TCP Data Scheduling. 276-280 - Khalid Hasan Tantawi

, Ismail Fidan
, Anwar Tantawy:
Status of Smart Manufacturing in the United States. 281-283 - Dewant Katare

, Mohamed El-Sharkawy:
Embedded System Enabled Vehicle Collision Detection: An ANN Classifier. 284-289 - Rabeet Fatmi, Sherif Rashad, Ryan Integlia:

Comparing ANN, SVM, and HMM based Machine Learning Methods for American Sign Language Recognition using Wearable Motion Sensors. 290-297 - Alvaro Esperanca

, Zina Ben-Miled, Malika Mahoui:
Social Media Sensing Framework for Population Health. 298-304 - Ibrahim Alrashdi

, Ali Alqazzaz
, Esam Aloufi, Raed Alharthi
, Mohamed A. Zohdy, Ming Hua:
AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning. 305-310 - Yang Jiao, Shahram Latifi, Mei Yang:

Self Error Detection and Correction for Noisy Labels Based on Error Correcting Output Code in Convolutional Neural Networks. 311-316 - Abdullah Alshammari

, Danda B. Rawat
:
Intelligent Multi-Camera Video Surveillance System for Smart City Applications. 317-323 - Gururaj Mulay, Bruce A. Draper, J. Ross Beveridge:

Adapting RGB Pose Estimation to New Domains. 324-330 - Durvesh Pathak, Mohamed El-Sharkawy:

Architecturally Compressed CNN: An Embedded Realtime Classifier (NXP Bluebox2.0 with RTMaps). 331-336 - Arezou Koohi, Houman Homayoun:

Parallel Multi-View Graph Matrix Completion for Large Input Matrix. 337-341 - Saeid Samadidana, Roger Mailler:

Using Temporal Awareness to Improve Distributed Problem Solving. 342-348 - Bogdan D. Czejdo, Sambit Bhattacharya, Catherine Spooner:

Improvement of Protein Model Scoring Using Grouping and Interpreter for Machine Learning. 349-353 - Alaa Gouda, Saleh el Shehaby, Nancy Diaa Moussa

, Mohamed M. Abougabal:
Classification Techniques for Diagnosing Respiratory Sounds in Infants and Children. 354-360 - Hong Yu, Harold H. Szu, Hongzhou Huang:

Smartphones, Grounds, Satellites, UAVs for Earthquake Nowcast. 361-365 - Anoop Jeerige, Doina Bein, Abhishek Verma

:
Comparison of Deep Reinforcement Learning Approaches for Intelligent Game Playing. 366-371 - Thomas Abrahams, Doina Bein:

Analyzing Beauty by Building Custom Profiles Using Machine Learning. 372-376 - Eduardo Bejar, Antonio Morán

:
Reverse Parking a Car-Like Mobile Robot with Deep Reinforcement Learning and Preview Control. 377-383 - Asim Chaudhry, Heba Elgazzar:

Design and Implementation of a Hybrid Face Recognition Technique. 384-391 - Akash Sunil Gaikwad, Mohamed El-Sharkawy:

Pruning the Convolution Neural Network (SqueezeNet) based on L2 Normalization of Activation Maps. 392-396 - Jaren Golenbiewski, Girma S. Tewolde

:
Implementation of an Indoor Positioning System using the WKNN Algorithm. 397-400 - Michael Finley, Abolfazl Razi:

Musical Key Estimation with Unsupervised Pattern Recognition. 401-408 - Evangelos A. Yfantis:

A UAV with Autonomy, Pattern Recognition for Forest Fire Prevention, and AI for Providing Advice to Firefighters Fighting Forest Fires. 409-413 - Duaa R. Mohammad, Sajedah Al-Momani, Yahya M. Tashtoush

, Mohammad A. Alsmirat
:
A Comparative Analysis of Quality Assurance Automated Testing Tools for Windows Mobile Applications. 414-419 - Priyanka Lohray, Satwik Gali, Srirathan Rangisetti, Tooraj Nikoubin:

Rounding Technique Analysis for Power-Area & Energy Efficient Approximate Multiplier Design. 420-425 - Ashish Joshi, Srirathan Rangisetti, Priyanka Lohray, Tooraj Nikoubin:

Fast & Energy Efficient Binary to BCD Converter with Complement Based Logic Design (CBLD) for BCD Multipliers. 426-434 - Luis J. Figueroa Rivera, Ariel Y. Ramos Ruiz, Balasubramaniyan Chandrasekaran:

A Robotic Control System for Fault Tolerance and Safety using Human Robot Interaction. 435-439 - James Trimble, Daniel J. Pack, Zachary Ruble:

Connectivity Tracking Methods for a Network of Unmanned Aerial Vehicles. 440-447 - Hakduran Koc, Sai S. Shaik, Pranitha P. Madupu:

Reliability Modeling and Analysis for Cyber Physical Systems. 448-451 - Monika Roopak

, Gui Yun Tian, Jonathon A. Chambers:
Deep Learning Models for Cyber Security in IoT Networks. 452-457 - Moises Levy, Daniel Raviv, Justin Baker:

Data Center Predictions using MATLAB Machine Learning Toolbox. 458-464 - Moises Levy, Daniel Raviv, Justin Baker:

Data Center Simulations Deployed in MATLAB and Simulink Using a Cyber-Physical Systems Lens. 465-474 - Indira Kalyan Dutta, Bhaskar Ghosh, Magdy A. Bayoumi:

Lightweight Cryptography for Internet of Insecure Things: A Survey. 475-481 - Duane Booher, Bertrand Cambou, Albert H. Carlson, Christopher Robert Philabaum:

Dynamic Key Generation for Polymorphic Encryption. 482-487 - Sareh Assiri, Bertrand Cambou, Duane Booher, Dina Ghanai Miandoab, Mohammad Mohammadinodoushan

:
Key Exchange using Ternary system to Enhance Security. 488-492 - Farhan Sadique, Khalid Bakhshaliyev, Jeff Springer, Shamik Sengupta:

A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P). 493-498 - Francisco E. Balart-Sanchez, Luis F. Gutierrez Preciado, J. Guadalupe Olascuaga-Cabrera:

Minimizing Routing Broadcast and Packet Loss in Wireless Ad-hoc Networks with a Cluster-Based Self-Organized Algorithm as MAC protocol. 499-505 - James Schnebly, Shamik Sengupta:

Random Forest Twitter Bot Classifier. 506-512 - Shrikant S. Jadhav

, Clay Gloster, Christopher C. Doss, Youngsoo Kim, Jannatun Naher:
A Remote Field-Programmable Custom Computing Machine Accelerator. 513-520 - Danielle Saliba, Rodrigue Imad

, Sébastien Houcke, Bachar El-Hassan:
WiFi Dimensioning to offload LTE in 5G Networks. 521-526 - Harshdeep Jhajj, Rijutha Datla, Nan Wang:

Design and Implementation of An Efficient Multipath AODV Routing Algorithm for MANETs. 527-531 - Ji-Hwan Choi:

Dynamic UE-Grouping Based Interference Management for Ultra-Dense Networks. 532-536 - Vanessa Sanchez, Russell Ro, Lauryn Kent, Jamie Navas, Oluwatosin Diyan, Chris Roussel, Shahab Tayeb, Matin Pirouz, Carter Chiu

, Elliott Ploutz, Justin Zhan, Laxmi P. Gewali, Paul Y. Oh:
ScanAlert: Electronic Medication Monitor and Reminder to Improve Medical Adherence. 537-543 - Farah I. Kandah

, Brennan Huber, Anthony Skjellum, Amani Altarawneh:
A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities. 544-549 - Jameela Al-Jaroodi, Nader Mohamed:

Industrial Applications of Blockchain. 550-555 - Sanjay Bhadra, Atanu Panda, Parijat Bhowmick

, Shinjinee Goswami, Sayan Podder, Debayan Dutta, Zeet Chowdhury:
Implementation of Neural Network Based Control Scheme on the Benchmark Conical Tank Level System. 556-560 - Archita Bhattacharya, Shounak Roychowdhury, Shruti Mitra, Gautam Ghosh:

Six Lower Order Harmonics Elimination From Output Voltage Waveform Of Single Phase Full Bridge Conventional Inverter With Adjustable Output. 561-568 - Huber Nieto-Chaupis:

Frequency-Based Releasing of Insulin in the Langerhans Islets To Counteract the Beginning of the Type-2 Diabetes in Pre-diabetes Patients. 569-573 - Mmatshuene Anna Segooa

, Billy Mathias Kalema:
The Big potential of Big Data towards universities outcome based funding. 574-578 - Abu Asaduzzaman, Abdulrahman Almohaimeed, Kishore K. Chidella

:
Shared Entry Logger to Eliminate Duplicate Requests to SDN Controller. 579-584 - Abdulrahman Almohaimeed, Abu Asaduzzaman:

Introducing Edge Controlling to Software Defined Networking to Reduce Processing Time. 585-590 - Abdulrahman Almohaimeed, Abu Asaduzzaman:

Dedicated Backup Units to Alleviate Overload on SDN Controllers. 591-596 - Alex Werner, Kapil Duwadi, Nicholas Stegmeier, Timothy M. Hansen, Jung-Han Kimn:

Parallel Implementation of AC Optimal Power Flow and Time Constrained Optimal Power Flow using High Performance Computing. 597-602 - Jixing Tang, Yue Zhang, Jinhao Jiang:

An Adaptive Flow Measurement Method for VBR Video Flow in Software-Defined Networks. 603-610 - Fakheredine Keyrouz, Lara Tauk, Elias Feghali:

Enhanced Chemical Structure Recognition and Prediction Using Bayesian Fusion. 611-616 - Chiman Kwan

, Bulent Ayhan:
Enhancing Safety of UAVs in National Airspace. 617-622 - Binayak Tiwari, Mei Yang, Yingtao Jiang, Xiaohang Wang:

Effect of Hardware Trojan Attacks on the Performance of On-Chip Multicast Routing Algorithms. 623-629 - Richard Kyung, Woong Jae Baek, Jaemin Choung, Andrew Kim

:
Study on the Optoelectronic Behavior of Zr Based MOFs Using Computational Simulations. 630-633 - (Withdrawn) Design and Implementation of 32-Channel ADPCM CODEC. 634-641

- Nathanial Wiggins, Milton Smith:

Mixed reality homework system. 642-647 - Sandeep Kumar, Sukhwinder Singh, Jagdish Kumar:

Gender Classification Using Machine Learning with Multi-Feature Method. 648-653 - Huber Nieto-Chaupis:

Face To Face with Next Flu Pandemic with a Wiener-Series-Based Machine Learning: Fast Decisions to Tackle Rapid Spread. 654-658 - Navid Shaghaghi

, Peter Ferguson
, Jesse Mayer, Zach Cameron, Behnam Dezfouli:
A Low-power Wireless Sensing Unit for Hydro-System Automation. 659-665 - Ignacio Astaburuaga

, Amee Lombardi, Brian La Torre, Carolyn Hughes, Shamik Sengupta:
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System. 666-672 - Jinhao Jiang, Yue Zhang:

An Accurate Congestion Control Mechanism in Programmable Network. 673-677 - Aaron Walker

, Muhammad Faisal Amjad, Shamik Sengupta:
Cuckoo's Malware Threat Scoring and Classification: Friend or Foe? 678-684 - Nutdanai Swangpattaraphon, Ying-Khai Teh:

Design Consideration of 433.92MHz ISM Band RF Rectifier for Wireless IoT Cloud Application. 685-689 - Alexia Dreher, Alexis Sanchez, Andrea Sedano, Kevin Chung, Michael Dambach, Shabnam Waseem, Blake Hament, Paul Y. Oh, Justin Zhan, Laxmi P. Gewali:

Towards Tattoo Previewing and Other Augmented/Mixed Reality Applications with Microsoft Kinect. 690-694 - Suat Mercan, Aymen I. Zreikat

:
Statistical Analysis of Packet Delay Time and Variation on the Internet. 695-700 - Yun Tian, Vincent Tran, Mutalifu Kuerban:

DOS Attack Mitigation Strategies on SDN Controller. 701-707 - Shahriar Badsha, Iman Vakilinia

, Shamik Sengupta:
Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. 708-714 - Raed Alharthi

, Esam Aloufi, Ali Alqazzaz
, Ibrahim Alrashdi
, Mohamed A. Zohdy:
DCentroid: Location Privacy-Preserving Scheme in Spatial Crowdsourcing. 715-720 - Qussai Yaseen

, Aman Alabdulrazzaq, Firas AlBalas:
A Framework for Insider Collusion Threat Prediction and Mitigation in Relational Databases. 721-727 - Rupam Banerjee, Arup Kumar Chattopadhyay, Amitava Nag

, Kaushik Bose:
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage. 728-731 - Matej Bartik

, Tomás Benes, Pavel Kubalík:
Design of a High-Throughput Match Search Unit for Lossless Compression Algorithms. 732-738 - Sarah Shafqat, Saira Kishwer, Muhammad Ahsan Qureshi:

Energy-Aware Cloud Architecture for Intense Social Mobile (Device to Device) 5G Communications in Smart City. 739-745 - Krishan K. Tiwari

, Eckhard Grass, Rolf Kraemer:
Noise Performance of Orthogonal RF Beamforming for THz Radio Communications. 746-751 - Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar:

Towards Fault Tolerant Fog Computing for IoT-Based Smart City Applications. 752-757 - Abbas Al-Thaedan

, Marco Carvalho:
Online Estimation of Motif Distribution in Dynamic Networks. 758-764 - Salam Ismaeel

, Ali Miri:
Real-Time Energy-Conserving VM-Provisioning Framework for Cloud-Data Centers. 765-771 - Kishore Konda Chidella

, Abu Asaduzzaman, Abdulrahman Almohaimeed:
Impact of Non-Uniform Subnets on the Performance of Wireless Network-on-Chip Architectures. 772-777 - Monera Salah, Ivica Kostanic:

Performance Evaluation of 5G Downlink Under Different Beamforming and Scheduling Methods. 778-782 - Hung-Yi Lo, James S. Lehnert, Phuong T. Tran:

Secrecy Capacity for an Underwater Acoustic Channel with a Dominant Noise Source. 783-787 - Hossein Khosravi, Salman Zandian, Abolfazl Bijari

, Nabeeh Kandalaft:
A Low Power, High Gain 2.4/5.2 GHz Concurrent Dual-Band Low Noise Amplifier. 788-792 - Motoi Kodama

, Shinichiro Haruyama:
Pulse Width Modulated Visible Light Communication using Digital Micro-mirror Device Projector for Voice Information Guidance System. 793-799 - Ruolin Zhou, Yuan Liu, Eric Brodeur, Zhaojun Li, Jian Guo:

A Reverse-Boot Enabled Embedded Computing System on SoC-FPGA for Prognostics and Health Management: An Application on Li-ion Batteries. 800-805 - Rand Abdul Hussain

, Josko Zec:
A New Search Algorithm for Allocating Pilots in Asymptotic TDD Massive MIMO Systems. 806-810 - Chuck Easttom:

An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives. 811-818 - Aljwhrh Almtrf, Yasamin Alagrash, Mohamed A. Zohdy:

Framework modeling for User privacy in cloud computing. 819-826 - Yong Up Lee, Kyeong-Yoon Kang, Ginkyu Choi:

Secure Visible Light Encryption Communication Technique for Smart Home Service. 827-831 - Cong Pu

, Xitong Zhou:
RescueMe: Smartphone-Based Self Rescue System for Disaster Rescue. 832-837 - Ahmad Mansour, Khalid Mahmood Malik

, Niko Kaso:
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme. 838-846 - Karel Hynek

, Tomás Benes, Matej Bartik
, Pavel Kubalík:
Ultra High Resolution Jitter Measurement Method for Ethernet Based Networks. 847-851 - Nader Mohamed, Jameela Al-Jaroodi:

Applying Blockchain in Industry 4.0 Applications. 852-858 - Masayoshi Iwamoto, Tatsuya Otoshi

, Daichi Kominami, Masayuki Murata:
Rate adaptation with Bayesian attractor model for MPEG-DASH. 859-865 - Sanjay Soundarajan

, Michelle Salomon, Jin H. Park:
Efficient Branch and Bound Motif Finding with Maximum Accuracy based on Hashing. 866-872 - Huber Nieto-Chaupis:

Macrophage-Like Nanorobots To Anticipate Bacterial Dynamics. 873-879 - Reza Barazideh, Wensheng Sun, Balasubramaniam Natarajan

, Alexei V. Nikitin, Zhaohui Wang:
Impulsive Noise Mitigation in Underwater Acoustic Communication Systems: Experimental Studies. 880-885 - Oscar Olazabal, Mikhail I. Gofman, Yu Bai, Yoonsuk Choi, Noel Sandico, Sinjini Mitra, Kevin Pham:

Multimodal Biometrics for Enhanced IoT Security. 886-893 - Satoshi Kodama

, Rei Nakagawa:
Packet Tagging System Using Adaptive MSS Clamping on TCP. 894-897 - Sudarshan S. Chawathe:

Condition Monitoring of Hydraulic Systems by Classifying Sensor Data Streams. 898-904 - Firas AlBalas, Wail Mardini, Majd Al-Soud, Qussai Yaseen

:
A topology-based performance Evaluation for an adaptive tuning protocol for service and resource discovery in the Internet of Things. 905-909 - Anish Prasad Shrestha, S. M. Riazul Islam, Rajendra Dhakal

, Kyung Sup Kwak:
Physical Layer Security for Cooperative Multihop Routing in Wireless Networks. 910-915 - Shihab Shahriar Hazari, Qusay H. Mahmoud:

A Parallel Proof of Work to Improve Transaction Speed and Scalability in Blockchain Systems. 916-921 - James Gil de Lamadrid, Seonho Choi:

Power Surge and Clock Hiccup Side-Channel Watermarking Approach for Finite State Machines. 922-928 - Talha Naqash

, Assad Iqbal
, Sajjad Hussain Shah
:
Review on Safe Reversible Image Data Hiding. 929-932 - Andrew Boka, Brendan Morris:

Person Recognition for Access Logging. 933-936 - Reza Barazideh, Solmaz Niknam, Balasubramaniam Natarajan

:
Impulsive Noise Detection in OFDM-based Systems: A Deep Learning Perspective. 937-942 - Chuck Easttom, William Butler:

A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attacks. 943-949 - Siddharth Das:

A Novel Parking Management System, for Smart Cities, to save Fuel, Time, and Money. 950-954 - Hayssam El-Razouk:

Novel Trace-Based Construction of the Parallel-In-Serial-Out Multiplication for Elliptic Curve Digital Signature Algorithm Like Binary Extension Fields. 955-961 - Xin Sun:

Scalable Rule Enforcement in SDN through Separate User Identifiers. 962-968 - Huber Nieto-Chaupis:

The Feynman Path Integral and Machine Learning Algorithms to Characterize and Anticipate Bacteria Chemotaxis in a Host Healthy Body. 969-973 - Sheida Asad Soleimani, Morteza Modarresi Asem:

Iris Live Detection Assessment; A Structural Survey. 974-980 - Vahid Nazmdeh, Shaghayegh Mortazavi, Daniel Tajeddin, Hossein Nazmdeh, Morteza Modarresi Asem:

Iris Recognition; From Classic to Modern Approaches. 981-988 - Matineh Ghafoorian Eshghi, Zahra Fruhideh, Vala Mehryar Alviri

, Morteza Modarresi Asem:
Electrochemical Biosensors for Cancer Detection Using Different Biomarkers. 989-996 - Mozhgan Kalhor, Atefeh Kajouei, Fatemeh Hamidi, Morteza Modarresi Asem:

Assessment of Histogram-Based Medical Image Contrast Enhancement Techniques; An Implementation. 997-1003 - Roohollah Amiri, Hani Mehrpouyan:

Multi-Stream LDPC Decoder on GPU of Mobile Devices. 1004-1009 - Adel Aldalbahi

, Nazli Siasi, Majdi M. Ababneh, Mohammed Jasim:
Grating Lobes for Enhanced Scattering Intensity in Millimeter Wave Sparse Channels. 1010-1014 - Yasuhiro Yamasaki, Hiroyuki Ohsaki:

On Placement of Base Stations for Cut-Through Links in Epidemic Broadcast. 1015-1020 - F. John Dian:

An Analytical Scheme For Power Consumption of Battery-Operated peripheral BLE nodes. 1021-1026 - F. John Dian:

Low-power Synchronized Multi-channel Data Acquisition Communication System. 1027-1031 - Taajwar Bey, Girma S. Tewolde

:
Evaluation of DSRC and LTE for V2X. 1032-1035

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














