


default search action
10th CCWC 2020: Las Vegas, NV, USA
- 10th Annual Computing and Communication Workshop and Conference, CCWC 2020, Las Vegas, NV, USA, January 6-8, 2020. IEEE 2020, ISBN 978-1-7281-3783-4

- Daniel Brown, Yong Shi:

A Distributed Density-Grid Clustering Algorithm for Multi-Dimensional Data. 1-8 - Eric B. Olsen:

Continuous Error Detection and Correction of Arithmetic in a Complement RRNS. 9-17 - Henry K. Griffith, Samantha Aziz, Oleg Komogortsev:

Prediction of Oblique Saccade Trajectories Using Learned Velocity Profile Parameter Mappings. 18-24 - Quazi Mamun

, Muhammad Arif Khan
:
A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario. 25-30 - Coleman Nugent, Kevin A. Wortman:

Crumple Trees. 31-37 - Arialdis Japa, Yong Shi:

Parallelizing the Bounded K-Nearest Neighbors Algorithm for Distributed Computing Systems. 38-45 - Duc Manh Doan, Dong Hyun Jeong

, Soo-Yeon Ji
:
Designing a Feature Selection Technique for Analyzing Mixed Data. 46-52 - Jeffrey Hajewski, Suely Oliveira

:
A Scalable System for Neural Architecture Search. 53-60 - Dennis Hou, Tuo Liu, Xiaobin Zhang, Yuxi Wang, Yen-Ting Pan, Janpu Hou:

DFB Laser Chip Defect Detection Based on Successive Subspace Learning. 61-64 - Htet Myet Lynn, Taekeun Hong, Hyoungju Kim, Sung Hwan Kim, Pankoo Kim:

A Wavelet Compression based Multi-resolution Bidirectional LSTM Network for Electrocardiogram Biometric Classification in constructing Biometric Ontology. 65-70 - Jeffrey Hajewski, Suely Oliveira

:
An Evolutionary Approach to Variational Autoencoders. 71-77 - Dennis Hou, Raymond Hou, Janpu Hou:

On-device Training for Breast Ultrasound Image Classification. 78-82 - Robin Chataut

, Robert Akl, Mohammadreza Robaei:
Accelerated and Preconditioned Refinement of Gauss-Seidel Method for Uplink Signal Detection in 5G Massive MIMO Systems. 83-89 - Tadilo Endeshaw Bogale:

Adaptive Beamforming and Modulation Design for 5G V2I Networks. 90-96 - Vanya Cherneva, Jerry L. Trahan

:
Grouping Proofs for Dynamic Groups of RFID Tags: A Secure and Scalable Protocol. 97-103 - Gregg Willcox, Louis B. Rosenberg, Colin Domnauer:

Analysis of Human Behaviors in Real-Time Swarms. 104-109 - Utpal Kumar Dey, Robert Akl, Robin Chataut

:
High Throughput Vehicular Communication Using Spatial Multiplexing MIMO. 110-115 - Ahmed Hindy, Udar Mittal, Tyler Brown:

CSI Feedback Overhead Reduction for 5G Massive MIMO Systems. 116-120 - Esra Çakir

, H. Ziya Ulukan:
A Fuzzy Linguistic Programming for Sustainable Ecotourism Activities. 121-126 - Aditi Singh, Tamseel Mahmood Syed

, Laurie L. Joiner
:
Dynamic Constellation Mapping and SER Performance for Asynchronized PNC Using QPSK. 127-133 - Patrick Hovsepian, Yun Tian:

Energy Consumption Analysis of Scheduling Algorithms for Cloud Computing Systems. 134-141 - Levent Dane

, Deniz Gurkan:
NetForager: Geographically-Distributed Network Performance Monitoring of Web Applications. 142-149 - Mark Allison

:
A Resilient Cooperative Localization Strategy for Autonomous Underwater Vehicles in Swarms. 150-156 - Josh Robinson, Scott Kuzdeba, James Stankowicz

, Joseph M. Carmack:
Dilated Causal Convolutional Model For RF Fingerprinting. 157-162 - Hayden Melton:

A Simple Model for Reasoning about Limits on Coupling in Object-Oriented Software. 163-168 - Jason Porter, Emad Albassam

:
A Decentralized Approach to Architecture-Based Self-Protecting Software Systems. 169-175 - Hayden Melton:

The Paradoxical Effects of Jitter on Fairness in Financial Exchanges: Engineering Implications. 176-181 - Yujing Wang, Qinyang Bao:

Adapting a Container Infrastructure for Autonomous Vehicle Development. 182-187 - Isabel H. J. Song, Wanzin Yazar, Austin Tsang:

The self- upgrading mobile application for the automatic malaria detection. 188-193 - Simon Shim, Pradnyesh Patil, Rajiv Ramesh Yadav, Anurag Shinde, Venkatesh Devale:

DeeperCoder: Code Generation Using Machine Learning. 194-199 - Wajdi Bazuhair, Wonjun Lee:

Detecting Malign Encrypted Network Traffic Using Perlin Noise and Convolutional Neural Network. 200-206 - Fletcher Trueblood, Sumanjit Gill, Robert Wong, Shahab Tayeb, Matin Pirouz:

A Data-Centric Approach to Taming the Message Dissemination in the Internet of Vehicles. 207-214 - Ruchi Bagwe, Jahnavi Kachhia, Alex Erdogan, Kiran George:

Automated Radar Signal Analysis Based on Deep Learning. 215-221 - Andrew Brim:

Deep Reinforcement Learning Pairs Trading with a Double Deep Q-Network. 222-227 - Dulana Rupanetti, Kundan Nepal, Hassan A. Salamy, Cheol-Hong Min:

Cost-Effective, Re-Configurable Cluster Approach for Resource Constricted FPGA Based Machine Learning and AI Applications. 228-233 - Debjyoti Sinha, Mohamed El-Sharkawy:

Ultra-thin MobileNet. 234-240 - Alex Hoffman

, Eric Becerril-Blas, Kevin Moreno, Yoohwan Kim:
Decentralized Security Bounty Management on Blockchain and IPFS. 241-247 - Zuhair Alqarni, Johnson A. Asumadu:

Synchronized Power Injection From PVA To Grid With Reduced THD And Dc Voltage Ripple Using PID Controller for Dc Grid Applications. 248-256 - Zuhair Alqarni, Johnson A. Asumadu, Ibrahim Alsaduni:

Optimal Power Sharing of Renewable Sources and Backup Power Supply Maintenance During Grid Power Failure. 257-261 - Ericsson Marin, Mohammed Almukaynizi

, Paulo Shakarian
:
Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction. 262-268 - Anudeep Bonasu, K. N. S. Reshma, M. Maria Dominic Savio

, Nan Wang:
Area and Energy Efficient Radiation Hardened Gain Cell Memory. 269-274 - Abdullah Alqahtani, Mazen Gazzan

, Frederick T. Sheldon:
A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model Approach. 275-279 - Farah B. Jaradat, Damian Valles

:
A Victims Detection Approach for Burning Building Sites Using Convolutional Neural Networks. 280-286 - Maneesh Ayi, Mohamed El-Sharkawy:

RMNv2: Reduced Mobilenet V2 for CIFAR10. 287-292 - Uri Rogers, Yun Tian, Saqer Alhloul:

Simulation of Surface Reflections and Shadowing in Molecular Communication Systems. 293-299 - Geovanni Hernandez, Damian Valles

, David C. Wierschem, Rachel M. Koldenhoven
, George Koutitas, Francis A. Méndez Mediavilla, Semih Aslan, Jesús A. Jiménez:
Machine Learning Techniques for Motion Analysis of Fatigue from Manual Material Handling Operations Using 3D Motion Capture Data. 300-305 - Alex Sumarsono:

Application of RXD Algorithm to Word Vector Representation for Keyword Identification. 306-310 - Purvesh Sharma, Damian Valles

:
Deep Convolutional Neural Network Design Approach for 3D Object Detection for Robotic Grasping. 311-316 - Shahriar Badsha, Iman Vakilinia

, Shamik Sengupta:
BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control. 317-323 - Shekhar Singh

, Fatma Nasoz:
Facial Expression Recognition with Convolutional Neural Networks. 324-328 - Ibraheem Saleh, Hao Ji:

Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification. 329-334 - Farhan Sadique, Raghav Kaul, Shahriar Badsha, Shamik Sengupta:

An Automated Framework for Real-time Phishing URL Detection. 335-341 - Anuja P. Parameshwaran, Heta P. Desai, Michael Weeks, Rajshekhar Sunderraman:

Unravelling of Convolutional Neural Networks through Bharatanatyam Mudra Classification with Limited Data. 342-347 - Sajjad Nassirpour, Alireza Vahid:

Throughput, Delay, and Complexity Tradeoffs in Interference Channels. 348-354 - Hosam Alamleh

, Ali Abdullah S. AlQahtani
:
Two Methods for Authentication Using Variable Transmission Power Patterns. 355-358 - Daniel Lee, Isabella Quan, Chris Wu, Jason Wu, Dan E. Tamir, Naphtali Rishe

:
Optimizing B-Spline Surface Reconstruction for Sharp Feature Preservation. 359-364 - Jannatun Naher, Clay Gloster, Christopher C. Doss, Shrikant S. Jadhav

:
Using Machine Learning to Estimate Utilization and Throughput for OpenCL-Based Matrix-Vector Multiplication (MVM). 365-372 - Alex Erdogan, Jaron Lin, Jordan Juliano

, Kiran George:
Pulse on Pulse Deinterleaving Radar Algorithm. 373-377 - Jason Kreitz, Moonyoung Lee, Hyun SubPark, Paul Y. Oh, Jun-Ho Oh:

Implementing ROS Communications for Sensor Integration with the RB5 Collaborative Robot. 378-383 - Faisal Alghayadh, Debatosh Debnath:

HID-SMART: Hybrid Intrusion Detection Model for Smart Home. 384-389 - Hakduran Koc, Mounika Garlapati, Pranitha P. Madupu:

Data Compression and Re-computation Based Performance Improvement in Multi-Core Architectures. 390-395 - Hossein Khosravi, Mahdi Sheikhi, Abolfazl Bijari

, Nabeeh Kandalaft:
3.5-9 GHz Ultra-Wideband LNA With Variable Gain and Noise Cancellation for Wireless Communication. 396-401 - Pratik Shrestha, Binayak Subedi, Megan Girard, Chirag Parikh, Nabeeh Kandalaft:

Wireless Communication Between FPGA and Microcontroller. 402-405 - Elena I. Riekhakaynen

:
Corpora of Russian Spontaneous Speech as a Tool for Modelling Natural Speech Production and Recognition. 406-411 - Chuck Easttom, Sudip Thapa, Justin Lawson:

A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer Studies. 412-416 - Haifeng Wang, Haili Zhang:

AIOPS Prediction for Hard Drive Failures Based on Stacking Ensemble Model. 417-423 - Chuck Easttom:

On the Application of Algebraic Graph Theory to Modeling Network Intrusions. 424-430 - Chuck Easttom:

On the Application of the Complexity Zeta Function to Modelling Complexity and Emergence in Neuro-Engineering. 431-436 - Steve Chan

, Parnmook Nopphawan:
Monitoring and Alarm System Timing Analysis for an Interconnecting Grid. 437-443 - Nima Ghafoorianfar, Mehdi Roopaei:

Environmental Perception in Autonomous Vehicles Using Edge Level Situational Awareness. 444-448 - Steve Chan, Marco Zennaro, Ermanno Pietrosemoli, Marco Rainone, Ika Oktavianti, Parnmook Nopphawan:

The Blindspot of Electromagnetic Interference Affecting Sensitive Medical Devices at Hospitals and Healthcare Facilities. 449-457 - Mehrdad Harifi-Mood

, Abolfazl Bijari
, Hossein Alizadeh, Nabeeh Kandalaft:
A New Highly Power-Efficient Inverse Class-D PA for NB-IoT Applications. 458-462 - Salman Zandian, Hossein Khosravi, Abolfazl Bijari

, Nabeeh Kandalaft:
Design of A 2-3 GHz Down-Conversion Active Mixer With Improved Linearity. 463-468 - Jonas Wagner, Mehdi Roopaei:

Edge Based Decision Making In Disaster Response Systems. 469-473 - Saurabh Ravindra Desai, Debjyoti Sinha, Mohamed El-Sharkawy:

Image Classification on NXP i.MX RT1060 using Ultra-thin MobileNet DNN. 474-480 - Jacob Coleman, Farah I. Kandah

, Brennan Huber:
Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS). 481-487 - David Zaldivar, Lo'ai Ali Tawalbeh

, Fadi Muheidat
:
Investigating the Security Threats on Networked Medical Devices. 488-493 - Adrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin:

Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners. 494-499 - Xin Pei, Xuefeng Li, Xiaochuan Wu, Liang Sun, Yixin Cao:

UDPP: Blockchain based Open Platform as a Privacy Enabler. 500-505 - Xin Pei, Xiaochuan Wu, Liang Sun:

Practical Data Sharing at Untrusted Stores. 506-510 - Shafinaz Islam, Damian Valles

:
Houston Toad and Other Chorusing Amphibian Species Call Detection Using Deep Learning Architectures. 511-516 - David Johnson, Damian Valles

:
A Non-Linear GPU Performance Modeling Approach and Consolidated Linear Hardware Model Performance Evaluation of the LEAP Cluster. 517-523 - Sudarshan S. Chawathe:

Rice Disease Detection by Image Analysis. 524-530 - Sepehr Saadatmand, Mohammadamir Kavousi

, Sima Azizi:
The Voltage Regulation of Boost Converters Using Dual Heuristic Programming. 531-536 - Sazida B. Islam

, Damian Valles
:
Identification of Wild Species in Texas from Camera-trap Images using Deep Neural Network for Conservation Monitoring. 537-542 - Sudarshan S. Chawathe:

Topic Analysis of Climate-Change News. 543-549 - Ariel Y. Ramos Ruiz, Balasubramaniyan Chandrasekaran:

A Robotic Control System Using Robot Operating System and MATLAB for Sensor Fusion and Human-Robot Interaction. 550-555 - Sepehr Saadatmand, Sima Azizi, Mohammadamir Kavousi

, Donald Wunsch
:
Autonomous Control of a Line Follower Robot Using a Q-Learning Controller. 556-561 - Monika Roopak

, Gui Yun Tian, Jonathon A. Chambers:
An Intrusion Detection System Against DDoS Attacks in IoT Networks. 562-567 - Luis J. Figueroa Rivera, Balasubramaniyan Chandrasekaran:

ROS-MATLAB Interface and Setup for a Fault Tolerant Robotic System Using Human Robot Interaction. 568-575 - James Andrews, Mihir Lad, Balasubramaniyan Chandrasekaran:

A Robotic System for Elderly Care and Monitoring using Human Robot Interaction. 576-579 - Evangelos A. Yfantis, William Culbreth:

A Data Driven PID Control System. 580-585 - Farah I. Kandah

, Ilker Özçelik
, Brennan Huber:
MARS: Machine learning based Adaptable and Robust Network Management for Software-defined Networks. 586-591 - Meghashree Hulkood Sreekanta, Abhishek Sarode, Kiran George:

Error Detection using Augmented Reality in the Subtractive Manufacturing Process. 592-597 - Ryan Michaels, David Adamo, Renée C. Bryce:

Combinatorial-Based Event Sequences for Reduction of Android Test Suites. 598-605 - Don Lahiru Nirmal Hettiarachchi

, Venkata Salini Priyamvada Davuluru, Eric J. Balster:
Integer vs. Floating-Point Processing on Modern FPGA Technology. 606-612 - Laik Ruetten, Paulo Alexandre Regis, David Feil-Seifer

, Shamik Sengupta:
Area-Optimized UAV Swarm Network for Search and Rescue Operations. 613-618 - Dara Nyknahad, Rojin Aslani

, Wolfgang W. Bein, Laxmi P. Gewali:
Zoning Effect on the Capacity and Placement Planning for Battery Exchange Stations in Battery Consolidation Systems. 619-625 - Rasha Gargees, Grant J. Scott:

Multi-Stage Distributed Computing for Big Data: Evaluating Connective Topologies. 626-633 - Qian Li, Jie Huang, Hongming Zhu, Qin Liu:

Prediction of Cancer Drug Effectiveness Based on Multi-Fusion Deep Learning Model. 634-639 - Kalyan Sahu

, Yu Bai, Yoonsuk Choi:
Supervised Sentiment Analysis of Twitter Handle of President Trump with Data Visualization Technique. 640-646 - Vinay Khedekar, Yun Tian:

Multi-Tenant Big Data Analytics on AWS Cloud Platform. 647-653 - Abdullah Alhujaylan, Leslie Carr, Matthew Ryan:

An Investigation of Factors Influencing Private Technology Organizations' Intention to Adopt Open Government Data in Saudi Arabia. 654-661 - Shirin Nasr Esfahani, Venkatesan Muthukumar, Emma E. Regentova, Kazem Taghva

, Mohamed B. Trabia:
Complex Food Recognition using Hyper-Spectral Imagery. 662-667 - Surya Kollazhi Manghat, Mohamed El-Sharkawy:

A Multi Sensor Real-time Tracking with LiDAR and Camera. 668-672 - Mehdi Mafi, Walter Izquierdo, Malek Adjouadi

:
High Impulse Noise Intensity Removal in Natural Images Using Convolutional Neural Network. 673-677 - S. M. Azharul Karim, Nitin Ranjan, Darshit Shah:

A Scalable Approach to Time Series Anomaly Detection & Failure Analysis for Industrial Systems. 678-683 - Jeffrey S. Chavis, Anna L. Buczak, Aviel D. Rubin, Lanier A. Watkins:

Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning. 684-690 - Ravi Teja N. V. S. Chappa, Mohamed El-Sharkawy:

Squeeze-and-Excitation SqueezeNext: An Efficient DNN for Hardware Deployment. 691-697 - Paul Gorday, Nurgün Erdöl, Hanqi Zhuang:

GFSK Demodulation Using Learned Sequence Correlation. 698-704 - Siying Chen, Bhaskar Krishnamachari:

Differential Pricing of 5G Network Slices for Heterogeneous Customers. 705-711 - Mansour Alshaikh, Mohamed A. Zohdy, Richard Olawoyin

, Debatosh Debnath, Zahraddeen Gwarzo, Jalal S. Alowibdi:
Social Network Analysis and Mining: Privacy and Security on Twitter. 712-718 - Pravir Malik

:
Light-Based Interpretation of Quanta and its Implications on Quantum Computing. 719-726 - Amani Altarawneh, Tom Herschberg, Sai Medury, Farah I. Kandah

, Anthony Skjellum:
Buterin's Scalability Trilemma viewed through a State-change-based Classification for Common Consensus Algorithms. 727-736 - Manasa Mainampati, Balasubramaniyan Chandrasekarar:

Evolution of Machine Learning Algorithms on Autonomous Robots. 737-741 - Yali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin:

Location Privacy Protection in Online Query based-on Privacy Region Replacement. 742-747 - Khalid Albulayhi

, Abdullah Abuhussein, Faisal Alsubaei
, Frederick T. Sheldon:
Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. 748-755 - Pengyu Zhang, Zhuoran Su, Zehua Dong, Kaveh Pahlavan:

Complex Motion Detection Based on Channel State Information and LSTM-RNN. 756-760 - Bryson Lingenfelter, Iman Vakilinia

, Shamik Sengupta:
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. 761-767 - Saifuddin Mahmud, Xiangxu Lin, Jong-Hoon Kim:

Interface for Human Machine Interaction for assistant devices: A Review. 768-773 - Mustafa Aydin, Ismail Butun

, Kemal Bicakci
, Nazife Baykal:
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs. 774-779 - Niyazi K. Uluaydin, Osman Cerezci, Selim S. Seker:

Can Mobile Phone Usage Affect Hypothalamus-Pituitary-Adrenal Axis Response? 780-783 - Eriko Enomoto, Takahiro Kohno, Jun Yamada, Masayuki Shimojo, Shigeki Matsuo, Umamaheswari Rajagopalan, So Yoon Lee, Xiaobin Zhang, Yoshikazu Koike, Hideki Yokoi, Hiroyuki Nishikawa, Sumito Nagasawa, Nobuyuki Futai

:
Optical Communication and Positioning Method of Underwater Observation Apparatus for Environmental Monitor. 784-788 - Alberto Gallegos Ramonet

, Taku Noguchi
:
Node Replacement Method for Disaster Resilient Wireless Sensor Networks. 789-795 - Shota Sakakura, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori:

Optimal Contention Window Based on Performance Analysis for Full Duplex WLANs. 796-802 - Fateh Elsherif, Edwin K. P. Chong:

Risk-Averse Traffic Allocation for Multi-RAT Connectivity in HetNets. 803-811 - Artiom Basulto-Lantsova, José Alfredo Padilla-Medina

, Francisco Javier Pérez-Pinal
, Alejandro Israel Barranco-Gutiérrez:
Performance comparative of OpenCV Template Matching method on Jetson TX2 and Jetson Nano developer kits. 812-816 - Atif Naseer

, Mohammed K. Nour, Basem Y. Alkazemi
:
Towards Deep Learning based Traffic Accident Analysis. 817-820 - Xiaohao Zhang, Yunjie Li, Gang Chen:

NVMe-over-RPMsg: A Virtual Storage Device Model Applied to Heterogeneous Multi-Core SoCs. 821-826 - Ahmed Alzahmi, Mohammed Alswat

, Chung-Ching Lin:
Energy Efficient 5Gb/s/pin Baseband Transceiver for 3D Memory Interface. 827-829 - SungJin Yu

, JoonYoung Lee
, MyeongHyun Kim, YoungHo Park:
A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks. 830-834 - Osman Cerezci, Selim S. Seker, Niyazi K. Uluaydin:

Theoretical and Experimental Study of GSM Frequencies in the Offices. 835-838 - William Brooks, Dominic M. Larkin, Christopher M. Korpela:

Robotics Technology Kernel for Radiation Sensing and Site Exploitation. 839-844 - Phuoc Hung Pham, Javed I. Khan:

A Bayesian based Model to Credential Learners' Content Skill Assessment. 845-851 - Anurag Thantharate

, Rahul Arun Paropkari, Vijay Walunj, Cory C. Beard, Poonam Kankariya:
Secure5G: A Deep Learning Framework Towards a Secure Network Slicing in 5G and Beyond. 852-857 - Hasan Tariq, Abderrazak Abdaoui, Farid Touati, Mohammed Abdulla E. Al-Hitmi, Damiano Crescini, Adel Ben Mnaouer

:
Design and Implementation of Cadastral Geo-spatial IoT Network Gateway Analyzer for Urban Scale Infrastructure Health Monitoring. 858-863 - Franz G. Aletsee, Sören Kohnert

, Reinhard Stolle:
Extension of the Statistical MIMO Model by Alias as an Independent Subchannel. 864-868 - Mengyuan Sun, Runhua Guo

, Jinhui Zhu, Wenhui Fan:
Roadway Crack Segmentation Based on an Encoder-decoder Deep Network with Multi-scale Convolutional Blocks. 869-874 - Yuusaku Kamura:

Applying k-means Method to the Modified Bottleneck Assignment Problem in Vector Case. 875-880 - Jeanette Hariharan, Yiannis Ampatzidis, Jaafar Abdulridha:

The Basis for Development of a Foundational Biomarker Reflectance Signature Database System for Plant Cell Identification, Disease Detection, and Classification Purposes. 881-887 - Stefan Resmerita

, Anton Poelzleitner, Stefan Lukesch
:
Modeling and Simulation of Software Execution Time in Embedded Systems. 888-894 - Fouad Kharroubi

, Yassine El Kati, Shu-Lin Wang, Mohammed El Jourmi, Hassan Ouahmane:
A New Maximum Weight Submatrix Solver Tool for Identifying Mutated Driver Pathways in Cancer using Python. 895-900 - Kayla Chisholm, Chris Yakopcic, Md. Shahanur Alam, Tarek M. Taha:

Multilayer Perceptron Algorithms for Network Intrusion Detection on Portable Low Power Hardware. 901-906 - Abdelkader Aljerme, Huaping Liu

:
A Time-varying Neural-network-based ARX Model of the Traffic in Mobile Networks. 907-912 - Urmil Shah, Brandon Hoang, Ryan Villanueva, Kiran George:

Focus Detection Using Spatial Release From Masking. 913-917 - Fausto Vega, Eric Hwang, Luke Park, Brandon Chan, Paul Y. Oh:

Service Robot Navigation and Computer Vision Application in a Banquet Hall Setting. 918-923 - Fahad Alhussein, Huaping Liu

:
A CCRW receiver with a single window of variable width for mitigation of multipath and ambiguity in GNSS with MBOC signals. 924-931 - Leonardo Georgescu, Dylan Wallace

, Daniel Kyong, Alex Chun, Kathy Chun, Paul Y. Oh:
The Future of Work: Towards Service Robot Control through Brain-Computer Interface. 932-937 - Anish Prasad Shrestha, S. M. Riazul Islam

, Kyung Sup Kwak:
Ticket-Based Authentication for Securing Internet of Things. 938-941 - Akshay Dave, Mirue Kang, Jihyun Hwang, Mia Lorenzo, Paul Y. Oh:

Towards Smart Classroom: Affordable and Simple Approach to Dynamic Projection Mapping for Education. 942-947 - Xiangxu Lin, Saifuddin Mahmud, Ethan Jones, Alfred Shaker, Alena Miskinis, Shadi Kanan, Jong-Hoon Kim:

Virtual Reality-Based Musical Therapy for Mental Health Management. 948-952 - Yuxing Mao, Shenghong Hu, Zhengyu He:

Image Stitching Using Green Coordinates and Robust Elastic Warping. 953-957 - Kishor Datta Gupta

, Md Lutfar Rahman, Dipankar Dasgupta, Subash Poudyal:
Shamir's Secret Sharing for Authentication without Reconstructing Password. 958-963 - Md. Ali Azam

, Shawon Dey, Hans D. Mittelmann, Shankarachary Ragi:
Average Consensus-Based Data Fusion in Networked Sensor Systems for Target Tracking. 964-969 - Nemesio A. Macabale

, Alexander N. Villasoto, Jerome D. Rivera, Aliyah C. Ventanilla, Miguel Paulo P. Talplacido, Angeliko L. Sevilla, Jerome O. Garcia:
CRADLE: Cross-Layer Design for Load-Aware Routing in IEEE 802.11-based Wireless Mesh and Sensor Networks. 970-974 - Kelly Brady, Seung Moon, Tuan Nguyen, Joel Coffman

:
Docker Container Security in Cloud Computing. 975-980 - Russell Skaggs-Schellenberg, Nan Wang, Daniel Wright:

Performance Evaluation and Analysis of Proactive and Reactive MANET Protocols at Varied Speeds. 981-985 - Josué Martínez-Martínez

, Carmen Carvajal-Jiménez, Diego A. Aponte-Roa:
A Secured IoT Scheme for Microgrids Monitoring. 986-990 - Bhagyashree Shirke, Jonathan Wong, Jonathan Clyde Libut, Kiran George, Sang June Oh:

Brain-IoT based Emotion Recognition System. 991-995 - Roberto Valentini, Piergiuseppe Di Marco, Roberto Alesii, Fortunato Santucci:

Exploiting Capture Diversity in Distributed Passive RFID Systems. 996-1000 - Nicholas Lower, Felix Zhan:

A Study of Ensemble Methods for Cyber Security. 1001-1009 - Youness Arjoune, Saleh Faruque:

Smart Jamming Attacks in 5G New Radio: A Review. 1010-1015 - Dorothy Hua, Julia Gao, Roger Mayo, Albert Smedley, Piyush Puranik, Justin Zhan:

Segregating Hazardous Waste Using Deep Neural Networks in Real-Time Video. 1016-1022 - Youness Arjoune, Saleh Faruque:

Artificial Intelligence for 5G Wireless Systems: Opportunities, Challenges, and Future Research Direction. 1023-1028 - Lian Yang, Xiong Li, Huan Li:

Hardware Trojan Detection Method Based on Time Feature of Chip Temperature. 1029-1032 - Hadi Salman

, Justin Zhan:
Similarity Metric for Millions of Unlabeled Face Images. 1033-1040 - Tiffany Zhan, Felix Zhan, Vince Choi, Justin Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, Dennis Garcia, Sam Vinh, Jeremy Eddy:

Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic Diseases. 1041-1048 - Felix Zhan, Yuria Mann, Nicholas Lower, Haemin Choi:

Healthcare Yelp: Health Care Services Prediction. 1049-1057 - Mingke Xu, Fan Zhang, Samee U. Khan

:
Improve Accuracy of Speech Emotion Recognition with Attention Head Fusion. 1058-1064 - Kathirvel Nallappan, Yang Cao, Guofu Xu, Hichem Guerboukha

, Chahé Nerguizian, Maksim Skorobogatiy:
Increasing Reliability of Terahertz Communication Links Using Onboard Fiber Connectivity. 1065-1070 - David Penn, Vinitha Hannah Subburaj, Anitha Sarah Subburaj, Mark Harral:

A Predictive Tool For Grid Data Analysis Using Machine Learning Algorithms. 1071-1077

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














