Stop the war!
Остановите войну!
for scientists:
default search action
10th UEMCON 2019: New York City, NY, USA
- 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2019, New York City, NY, USA, October 10-12, 2019. IEEE 2019, ISBN 978-1-7281-3885-5
- Cullen D. Johnson, Brian H. Curtin, Nikhil Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews:
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security. 1-7 - Rafael Lopez, Christian DeGuzman, Abdelrahman Elleithy:
Use of Sensor Node Networks for Car Security. 8-14 - Sara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy:
Location Tracking of Mobile Objects and the Privacy Tradeoff. 15-22 - Leo Kobayashi, Mukul Rocque, Haibo Wang, Geoffrey A. Capraro, Carlin C. Chuck Scb, Chris K. Kim, Katherine Luchette, Alana Oster, Derek Merck, Ihor Kirenko, Kees van Zon, Marek Bartula:
Pilot Study of Emergency Department Patient Vital Signs Acquisition Using Experimental Video Photoplethysmography and Passive Infrared Thermography Devices. 23-32 - Milankumar Patel, Siddhartha Bhattacharyya, Ali Alfageeh:
Formal Trust Architecture for Assuring Trusted Interactions in the Internet of Things. 33-39 - Milos Pilipovic, Dragan Samardzija:
Optimized Wireless Connectivity for Cyber-Physical Systems with Publisher/Subscriber Architecture. 40-49 - Mark Caswell, Yao Liang:
Simulation of Transitional and Bursty Wireless Visual Sensor Networks. 50-56 - Brandan Quinn, Eman Abdelfattah:
Machine Learning Meteorologist Can Predict Rain. 57-62 - Andrew Brandon, Melanie Seekins, Joshua Beulah Vedhavalli, Samuel Chelliah, John Haller:
Network Data Analysis to Support Risk Management in an IoT Environment. 63-68 - Yash Parikh, Eman Abdelfattah:
Comparison of Machine Learning Models to Predict Twitter Buzz. 69-73 - Ross Arnold, Kevin Carey, Benjamin Abruzzo, Christopher M. Korpela:
What is A Robot Swarm: A Definition for Swarming Robotics. 74-81 - Brian H. Curtin, Suzanne J. Matthews:
Deep Learning for Inexpensive Image Classification of Wildlife on the Raspberry Pi. 82-87 - Jiong Si, Evangelos A. Yfantis, Sarah L. Harris:
A SS-CNN on an FPGA for Handwritten Digit Recognition. 88-93 - Vanesa Getseva, Salil Maharjan, Eman Abdelfattah:
Performance of Classification Models on Various Types of Character Data. 94-98 - Amartya Hatua, Trung T. Nguyen, Andrew H. Sung:
Goal-Oriented Conversational System Using Transfer Learning and Attention Mechanism. 99-104 - Lidong Wang, Randy Jones:
Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction. 105-111 - Shireesha Chandra, Aparna S. Varde, Jiayin Wang:
A Hive and SQL Case Study in Cloud Data Analytics. 112-118 - Jackie Leung, Min Chen:
Image Recognition with MapReduce Based Convolutional Neural Networks. 119-125 - Yaobin Qin, Brandon Hoffmann, Yuwei Wang, David J. Lilja:
Exploring A Forecasting Structure for the Capacity Usage in Backup Storage Systems. 126-134 - Resham Jhangiani, Doina Bein, Abhishek Verma:
Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce Transactions. 135-140 - Raghu Nandan Avula, Cliff C. Zou:
Improving Rider Safety Using QR Code & Fingerprint Biometrics. 141-144 - Chuck Easttom, Nagi Mei:
Mitigating Implanted Medical Device Cybersecurity Risks. 145-148 - Paul K. Mandal, Abhishek Verma:
Novel Hash-Based Radix Sorting Algorithm. 149-153 - Muath Obaidat, Matluba Khodjaeva, Suhaib Obeidat, Douglas Salane, Jennifer Holst:
Security Architecture Framework for Internet of Things (IoT). 154-157 - Ali Alqahtani, Mohamed A. Zohdy, Subramaniam Ganesan, Richard Olawoyin:
A Novel Phase Tracking in ZigBee Receiver Using Extended Kalman Filtering over AWGN Channel. 158-162 - Caileigh Marshall, Jaimie Kelley, Cynthia Turnbull:
Improv Performance with Wi-Fi Enabled Costume Lights. 163-168 - Ankit Roy:
Deep Convolutional Neural Networks for Breast Cancer Detection. 169-171 - Mohammadreza Robaei, Robert Akl:
Time-Variant Broadband mmWave Channel Estimation Based on Compressed Sensing. 172-178 - William Shue, Nischal Paudyal, Mahmoud Rabiah, Douglas E. Dow, Mehmet Ergezer, Mira Yun:
A Thermally Regulated Footwear & Alerting System. 179-182 - Agnelo Rocha da Silva, Ruzbeh Akbar, Richard H. Chen, Kazem Bakian-Dogaheh, Negar Golestani, Mahta Moghaddam, Dara Entekhabi:
Duty-Cycled, Sub-GHz Wake-up Radio with -95dBm Sensitivity and Addressing Capability for Environmental Monitoring Applications. 183-191 - Bulent Ayhan, Chiman Kwan:
A New Approach to Change Detection Using Heterogeneous Images. 192-197 - Luis Camal, Anup Kirtane, Teresa Blanco, Roberto Casas, Federico Rossano, Baris Aksanli:
A Wearable Device Network to Track Animal Behavior and Relationships in the Wild. 198-202 - Amin Sahba, Ramin Sahba, Paul Rad, Mo M. Jamshidi:
Optimized IoT Based Decision Making For Autonomous Vehicles In Intersections. 203-206 - Waleed Aldosari, Mohamed A. Zohdy, Richard Olawoyin:
Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman Filter. 207-212 - Joong-Lyul Lee, Stephen C. Kerns, Sangjin Hong:
A Secure IoT-Fog-Cloud Framework Using Blockchain Based on DAT for Mobile IoT. 213-218 - Jim A. Scheibmeir, Yashwant K. Malaiya:
Quality Model for Testing Augmented Reality Applications. 219-226 - Drashti Pathak, Aparna S. Varde, Clement Alo, Felix Oteng:
Ubiquitous Access for Local Water Management Through HCI Based App Development. 227-233 - Sudarshan S. Chawathe:
Data Modeling for a NoSQL Database Service. 234-240 - David William Honorio Araujo da Silva, Carlos Paz de Araujo, C. Edward Chow, Bryan Sosa Barillas:
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra. 241-249 - Andrew Camphouse, Lucien Ngalamou:
Securing a Connected Home. 250-256 - Kevin B. Hall, Lucien Ngalamou:
Securing Wireless Scada Systems in Rural American Power Grids. 257-262 - Mark E. Royer, Sudarshan S. Chawathe:
Trusted Remote Function Interface. 263-269 - Thu Vo, Chetan Jaiswal:
AdRemover: The Improved Machine Learning Approach for Blocking Ads. 270-275 - Meizhu He, Leon Wu:
SIPSA: Secure IoT Protocol-Based Smart Adapter for Communicating and Optimizing Building Energy Management with Smart Grid. 276-279 - Debjyoti Sinha, Mohamed El-Sharkawy:
Thin MobileNet: An Enhanced MobileNet Architecture. 280-285 - Md Reshad Ul Hoque, Roland Burks, Chiman Kwan, Jiang Li:
Deep Learning for Remote Sensing Image Super-Resolution. 286-292 - Ahmed Aly, Gianluca Guadagni, Joanne Bechta Dugan:
Derivative-Free Optimization of Neural Networks using Local Search. 293-299 - Yash Parikh, Eman Abdelfattah:
Machine Learning Models to Predict Multiclass Protein Classifications. 300-304 - Trung T. Nguyen, Amartya Hatua, Andrew H. Sung:
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems. 305-311 - Durga Sundaram, Abhishek Sarode, Kiran George:
Vision-Based Trainable Robotic Arm for Individuals with Motor Disability. 312-315 - Bulent Ayhan, Chiman Kwan:
New Results in Change Detection Using Optical and Multispectral Images. 316-321 - Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. 322-328 - Mehdi Karimibiuki, Michal Aibin, Yuyu Lai, Raziq Khan, Ryan Norfield, Aaron Hunter:
Drones' Face off: Authentication by Machine Learning in Autonomous IoT Systems. 329-333 - Bulent Ayhan, Chiman Kwan:
Practical Considerations in Unsupervised Change Detection Using SAR Images. 334-339 - Mahssa Abdolahi, Hao Jiang, Bozena Kaminska:
Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching. 340-346 - Hafiz Mohammd Junaid Khan, Quamar Niyaz, Vijay K. Devabhaktuni, Site Guo, Umair Shaikh:
Identifying Generic Features for Malicious URL Detection System. 347-352 - Sandun S. Kuruppu, Alexander Shibilski:
Clock Variation Impact on Digital Control System Performance. 353-358 - Jordan Fernandes, Keye Li, Joey Mirabile, Gregg Vesonder:
Application of Robot Operating System in Robot Flocks. 359-363 - Amina Shrestha, Rhishav Mahaju, Sandun S. Kuruppu:
On Stability of Current Controlled Drives with Delay in Feedback Path. 364-370 - Brad Wheeler, Andrew Ng, Brian G. Kilberg, Filip Maksimovic, Kristofer S. J. Pister:
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems. 371-376 - Kiavash Fathi, Mehdi Mahdavi:
Control System Response Improvement via Denoising Using Deep Neural Networks. 377-382 - Kervins Nicolas, Yi Wang:
A novel double spending attack countermeasure in blockchain. 383-388 - Vanessa DeFreese, Tyler Wright, Ivy Robalino, Gregg Vesonder:
Robotic Solutions for Eldercare. 389-394 - Badar Almarri, Sanguthevar Rajasekaran, Chun-Hsi Huang:
Unsupervised Similarity-based Sensor Selection for Time Series Data. 395-400 - Pablo Rivas, Casimer M. DeCusatis, Matthew Oakley, Alex Antaki, Nicholas Blaskey, Steven LaFalce, Stephen Stone:
Machine Learning for DDoS Attack Classification Using Hive Plots. 401-407 - Khalid Hamad Motleb Alnafisah:
An algorithmic Solution in Data Visualization for the "Hair Ball" Problem. 408-418 - Josef Ur, Mathew Craner, Rehab El Hajj:
What Makes a National Football League Team Successful? an Analysis of Play by Play Data. 419-425 - Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj:
Data Mining in The NBA: An Applied Approach. 426-432 - Mihaela Dimovska, Travis Johnston, Catherine D. Schuman, J. Parker Mitchell, Thomas E. Potok:
Multi-Objective Optimization for Size and Resilience of Spiking Neural Networks. 433-439 - Azkario Rizky Pratama, Alexander Lazovik, Marco Aiello:
Office Multi-Occupancy Detection using BLE Beacons and Power Meters. 440-448 - Chiman Kwan, Jerry Yang, Bryan Chou:
Change Detection Using Original and Fused Landsat and Worldview Images. 449-454 - Mikeera Brown, Shawnoah Pollock, Wafa Elmannai, Michael Joseph, Khaled Elleithy:
Vulnerability Analysis and Modeling. 455-461 - Peter Stubberud:
The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover. 462-468 - Chiman Kwan, David Gribben, Trac D. Tran:
Multiple Human Objects Tracking and Classification Directly in Compressive Measurement Domain for Long Range Infrared Videos. 469-475 - Md Inzamam Ul Haque, Damian Valles:
Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication Abilities. 476-482 - Michael Joseph, Khaled Elleithy, Mohamed Mohamed:
A new Quantum Processor Architecture. 483-487 - Chiman Kwan, David Gribben, Trac D. Tran:
Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical Videos. 488-494 - Jarrett B. Knox, Eric M. Pereira, Anthony Sousa, Douglas E. Dow:
Activity Monitoring System to Support Elderly Independent Living. 495-498 - Kingsley Udeh, David W. Wanik, Nick Bassill, Emmanouil N. Anagnostou:
Time Series Modeling of Storm Outages with Weather Mesonet Data for Emergency Preparedness and Response. 499-505 - Kenshi Saho, Kazuki Uemura, Masahiro Fujimoto, Michito Matsumoto:
Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living. 506-510 - Ramin Sahba, Amin Sahba, Mo M. Jamshidi, Paul Rad:
3D Object Detection Based on LiDAR Data. 511-514 - Ibrahim Alrashdi, Ali Alqazzaz, Raed Alharthi, Esam Aloufi, Mohamed A. Zohdy, Ming Hua:
FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities. 515-522 - Zuhair Alqarni, Johnson A. Asumadu:
Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation. 523-527 - Matthew Regueiro, Bhagyashree Shirke, Mandy Chiu, Nicholas Capobianco, Kiran George:
Electroencephalographic (EEG) Analysis of Individuals Experiencing Acute Mental Stress. 528-534 - Sudarshan S. Chawathe:
Using Historical Data to Predict Parking Occupancy. 534-540 - Oluwaseyi Ajayi, Obinna Igbe, Tarek N. Saadawi:
Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution. 541-549 - Alyssa Donawa, Inema Orukari, Corey E. Baker:
Scaling Blockchains to Support Electronic Health Records for Hospital Systems. 550-556 - Sree Bala Shruthi Bhamidi, Mohamed El-Sharkawy:
Residual Capsule Network. 557-560 - S. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar:
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users. 561-567 - Sara Hebal, Djamila Mechta, Saad Harous:
ACO-based Distributed Energy Routing Protocol In Smart Grid. 568-571 - Mark E. Royer, Sudarshan S. Chawathe:
Unformatted, Certified Scientific Objects. 572-577 - Brody E. Nagy, Sean A. Demers, Douglas E. Dow:
Automated Well Water Contamination Tester and Web Service. 578-584 - Joseph Russell, Jeroen Bergmann:
Probabilistic sensor design for healthcare technology. 585-590 - Hy Do, Vu Truong, Kiran George, Bhagyashree Shirke:
EEG-Based Biometrics Utilizing Image Recognition for Patient Identification. 591-595 - Miguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M. R. Alrashidi, Douglas E. Dow:
Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily Living. 596-599 - Niranjan Ravi, Mohamed El-Sharkawy:
Integration of UAVs with Real Time Operating Systems using UAVCAN. 600-605 - Paul L. Kaprielian, Thach Pham, Alex Young, Douglas E. Dow, Scott A. Grenquist, Bruce M. Decker:
Winter Cabin Water Tap Monitor and Release System to Reduce Risk of Freezing. 606-609 - Christina Berke, Elizabeth Fassman-Beck, Jack Li, Gregg Vesonder:
Towards Better Management of Combined Sewage Systems. 610-613 - Izbaila Imtiaz, Imran Ahmed, Misbah Ahmad, Kaleem Ullah, Awais Adnan, Maaz Ahmad:
Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing. 614-619 - Anil R. Patel, Ashish Patel:
Comparative Analysis of Stereo Matching Algorithms. 620-626 - Misbah Ahmad, Imran Ahmed, Awais Adnan:
Overhead View Person Detection Using YOLO. 627-633 - Walid Abdel Gelil, Thomas Kunz:
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs). 640-646 - Muhammet Ali Karabulut, A. F. M. Shahen Shah, Haci Ilhan:
Performance of the CR-MAC with Channel Fading and Capture Effect under Practical Traffic Scenarios for VANETs. 647-652 - Ali Alfageeh, Siddhartha Bhattacharyya, Samuel Perl, Milankumar Patel:
Assurance for CyberSecurity with Assume-Guarantee Reasoning. 653-659 - Roland Burks, Kazi Aminul Islam, Yan Lu, Jiang Li:
Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study. 660-665 - Soo-Yeon Ji, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform. 666-672 - Shajina Anand, Gunasekaran Raja, Aishwarya Ganapathisubramaniyan:
AECC: An Enhanced Public Key Cryptosystem for User Defined Messages. 673-678 - Xin-Wen Wu, Waleed Farag, Sanwar Ali, Siddhivinayak Kulkarni:
An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices. 679-685 - Mamadou I. Wade, Mohamed F. Chouikha, Tepper Gill, Wayne Patterson, Talitha M. Washington, Jianchao Zeng:
Distributed Image Encryption Based On a Homomorphic Cryptographic Approach. 686-696 - Yi Huang, Jayanta Debnath, Michaela Iorga, Anup Kumar, Bin Xie:
CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management. 697-707 - Avimita Chatterjee:
Formulating Support for Superpages to reduce the number of TLB Faults in Contiguous Virtual Memory Space. 708-715 - Alaa T. Al Ghazo, Ratnesh Kumar:
Identification of Critical-Attacks Set in an Attack-Graph. 716-722 - Rajiv Bagai, Seth Layton, Srikanth Gampa, Kavitha Chandrashekar:
Maximum Diversity in Web Application User Action Privacy. 723-729 - Chuck Easttom, Willie Sanders:
On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. 730-735 - Dat Tran, Chetan Jaiswal:
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack. 736-743 - Adrian Jaesim, Adel Aldalbahi, Nazli Siasi, Diogo Oliveira, Nasir Ghani:
Dual-Beam Analog Beamforming for mmWave Communications. 744-748 - Anurag Thantharate, Cory C. Beard, Sreekar Marupaduga:
An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G Networks. 749-754 - Akira Kawai, Shinichi Taniguchi, Hui Li LI, Shizue Izumi:
A Physical Strength Measurement and Analysis System for Elderly People Using Motion Sensors. 755-761 - Anurag Thantharate, Rahul Arun Paropkari, Vijay Walunj, Cory C. Beard:
DeepSlice: A Deep Learning Approach towards an Efficient and Reliable Network Slicing in 5G Networks. 762-767 - Mohamed Sofiane Batta, Zibouda Aliouat, Saad Harous:
A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT. 768-774 - Jay Ashok Shah, Dushyant Dubaria:
NetDevOps: A New Era Towards Networking & DevOps. 775-779 - J. P. Piotrowski, Evangelos A. Yfantis, A. Campagna, Q. Cornu, G. M. Gallitano:
Voice Interactive Games. 780-784 - Ashutosh Kanitkar, Rutwik Kulkarni, Varun Joshi, Yash Karwa, Sanjyot Gindi, Geetanjali Vinayak Kale:
Automated System for Cervical Abnormality Detection using Machine Learning. 785-790