default search action
10th CCWC 2020: Las Vegas, NV, USA
- 10th Annual Computing and Communication Workshop and Conference, CCWC 2020, Las Vegas, NV, USA, January 6-8, 2020. IEEE 2020, ISBN 978-1-7281-3783-4
- Daniel Brown, Yong Shi:
A Distributed Density-Grid Clustering Algorithm for Multi-Dimensional Data. 1-8 - Eric B. Olsen:
Continuous Error Detection and Correction of Arithmetic in a Complement RRNS. 9-17 - Henry K. Griffith, Samantha Aziz, Oleg Komogortsev:
Prediction of Oblique Saccade Trajectories Using Learned Velocity Profile Parameter Mappings. 18-24 - Quazi Mamun, Muhammad Arif Khan:
A Group Mutual Exclusion protocol for the Use Case of IoT-Blockchain Integration In Work-Safe Scenario. 25-30 - Coleman Nugent, Kevin A. Wortman:
Crumple Trees. 31-37 - Arialdis Japa, Yong Shi:
Parallelizing the Bounded K-Nearest Neighbors Algorithm for Distributed Computing Systems. 38-45 - Duc Manh Doan, Dong Hyun Jeong, Soo-Yeon Ji:
Designing a Feature Selection Technique for Analyzing Mixed Data. 46-52 - Jeffrey Hajewski, Suely Oliveira:
A Scalable System for Neural Architecture Search. 53-60 - Dennis Hou, Tuo Liu, Xiaobin Zhang, Yuxi Wang, Yen-Ting Pan, Janpu Hou:
DFB Laser Chip Defect Detection Based on Successive Subspace Learning. 61-64 - Htet Myet Lynn, Taekeun Hong, Hyoungju Kim, Sung Hwan Kim, Pankoo Kim:
A Wavelet Compression based Multi-resolution Bidirectional LSTM Network for Electrocardiogram Biometric Classification in constructing Biometric Ontology. 65-70 - Jeffrey Hajewski, Suely Oliveira:
An Evolutionary Approach to Variational Autoencoders. 71-77 - Dennis Hou, Raymond Hou, Janpu Hou:
On-device Training for Breast Ultrasound Image Classification. 78-82 - Robin Chataut, Robert Akl, Mohammadreza Robaei:
Accelerated and Preconditioned Refinement of Gauss-Seidel Method for Uplink Signal Detection in 5G Massive MIMO Systems. 83-89 - Tadilo Endeshaw Bogale:
Adaptive Beamforming and Modulation Design for 5G V2I Networks. 90-96 - Vanya Cherneva, Jerry L. Trahan:
Grouping Proofs for Dynamic Groups of RFID Tags: A Secure and Scalable Protocol. 97-103 - Gregg Willcox, Louis B. Rosenberg, Colin Domnauer:
Analysis of Human Behaviors in Real-Time Swarms. 104-109 - Utpal Kumar Dey, Robert Akl, Robin Chataut:
High Throughput Vehicular Communication Using Spatial Multiplexing MIMO. 110-115 - Ahmed Hindy, Udar Mittal, Tyler Brown:
CSI Feedback Overhead Reduction for 5G Massive MIMO Systems. 116-120 - Esra Çakir, H. Ziya Ulukan:
A Fuzzy Linguistic Programming for Sustainable Ecotourism Activities. 121-126 - Aditi Singh, Tamseel Mahmood Syed, Laurie L. Joiner:
Dynamic Constellation Mapping and SER Performance for Asynchronized PNC Using QPSK. 127-133 - Patrick Hovsepian, Yun Tian:
Energy Consumption Analysis of Scheduling Algorithms for Cloud Computing Systems. 134-141 - Levent Dane, Deniz Gurkan:
NetForager: Geographically-Distributed Network Performance Monitoring of Web Applications. 142-149 - Mark Allison:
A Resilient Cooperative Localization Strategy for Autonomous Underwater Vehicles in Swarms. 150-156 - Josh Robinson, Scott Kuzdeba, James Stankowicz, Joseph M. Carmack:
Dilated Causal Convolutional Model For RF Fingerprinting. 157-162 - Hayden Melton:
A Simple Model for Reasoning about Limits on Coupling in Object-Oriented Software. 163-168 - Jason Porter, Emad Albassam:
A Decentralized Approach to Architecture-Based Self-Protecting Software Systems. 169-175 - Hayden Melton:
The Paradoxical Effects of Jitter on Fairness in Financial Exchanges: Engineering Implications. 176-181 - Yujing Wang, Qinyang Bao:
Adapting a Container Infrastructure for Autonomous Vehicle Development. 182-187 - Isabel H. J. Song, Wanzin Yazar, Austin Tsang:
The self- upgrading mobile application for the automatic malaria detection. 188-193 - Simon Shim, Pradnyesh Patil, Rajiv Ramesh Yadav, Anurag Shinde, Venkatesh Devale:
DeeperCoder: Code Generation Using Machine Learning. 194-199 - Wajdi Bazuhair, Wonjun Lee:
Detecting Malign Encrypted Network Traffic Using Perlin Noise and Convolutional Neural Network. 200-206 - Fletcher Trueblood, Sumanjit Gill, Robert Wong, Shahab Tayeb, Matin Pirouz:
A Data-Centric Approach to Taming the Message Dissemination in the Internet of Vehicles. 207-214 - Ruchi Bagwe, Jahnavi Kachhia, Alex Erdogan, Kiran George:
Automated Radar Signal Analysis Based on Deep Learning. 215-221 - Andrew Brim:
Deep Reinforcement Learning Pairs Trading with a Double Deep Q-Network. 222-227 - Dulana Rupanetti, Kundan Nepal, Hassan A. Salamy, Cheol-Hong Min:
Cost-Effective, Re-Configurable Cluster Approach for Resource Constricted FPGA Based Machine Learning and AI Applications. 228-233 - Debjyoti Sinha, Mohamed El-Sharkawy:
Ultra-thin MobileNet. 234-240 - Alex Hoffman, Eric Becerril-Blas, Kevin Moreno, Yoohwan Kim:
Decentralized Security Bounty Management on Blockchain and IPFS. 241-247 - Zuhair Alqarni, Johnson A. Asumadu:
Synchronized Power Injection From PVA To Grid With Reduced THD And Dc Voltage Ripple Using PID Controller for Dc Grid Applications. 248-256 - Zuhair Alqarni, Johnson A. Asumadu, Ibrahim Alsaduni:
Optimal Power Sharing of Renewable Sources and Backup Power Supply Maintenance During Grid Power Failure. 257-261 - Ericsson Marin, Mohammed Almukaynizi, Paulo Shakarian:
Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction. 262-268 - Anudeep Bonasu, K. N. S. Reshma, M. Maria Dominic Savio, Nan Wang:
Area and Energy Efficient Radiation Hardened Gain Cell Memory. 269-274 - Abdullah Alqahtani, Mazen Gazzan, Frederick T. Sheldon:
A proposed Crypto-Ransomware Early Detection(CRED) Model using an Integrated Deep Learning and Vector Space Model Approach. 275-279 - Farah B. Jaradat, Damian Valles:
A Victims Detection Approach for Burning Building Sites Using Convolutional Neural Networks. 280-286 - Maneesh Ayi, Mohamed El-Sharkawy:
RMNv2: Reduced Mobilenet V2 for CIFAR10. 287-292 - Uri Rogers, Yun Tian, Saqer Alhloul:
Simulation of Surface Reflections and Shadowing in Molecular Communication Systems. 293-299 - Geovanni Hernandez, Damian Valles, David C. Wierschem, Rachel M. Koldenhoven, George Koutitas, Francis A. Méndez Mediavilla, Semih Aslan, Jesús A. Jiménez:
Machine Learning Techniques for Motion Analysis of Fatigue from Manual Material Handling Operations Using 3D Motion Capture Data. 300-305 - Alex Sumarsono:
Application of RXD Algorithm to Word Vector Representation for Keyword Identification. 306-310 - Purvesh Sharma, Damian Valles:
Deep Convolutional Neural Network Design Approach for 3D Object Detection for Robotic Grasping. 311-316 - Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control. 317-323 - Shekhar Singh, Fatma Nasoz:
Facial Expression Recognition with Convolutional Neural Networks. 324-328 - Ibraheem Saleh, Hao Ji:
Network Traffic Images: A Deep Learning Approach to the Challenge of Internet Traffic Classification. 329-334 - Farhan Sadique, Raghav Kaul, Shahriar Badsha, Shamik Sengupta:
An Automated Framework for Real-time Phishing URL Detection. 335-341 - Anuja P. Parameshwaran, Heta P. Desai, Michael Weeks, Rajshekhar Sunderraman:
Unravelling of Convolutional Neural Networks through Bharatanatyam Mudra Classification with Limited Data. 342-347 - Sajjad Nassirpour, Alireza Vahid:
Throughput, Delay, and Complexity Tradeoffs in Interference Channels. 348-354 - Hosam Alamleh, Ali Abdullah S. AlQahtani:
Two Methods for Authentication Using Variable Transmission Power Patterns. 355-358 - Daniel Lee, Isabella Quan, Chris Wu, Jason Wu, Dan E. Tamir, Naphtali Rishe:
Optimizing B-Spline Surface Reconstruction for Sharp Feature Preservation. 359-364 - Jannatun Naher, Clay Gloster, Christopher C. Doss, Shrikant S. Jadhav:
Using Machine Learning to Estimate Utilization and Throughput for OpenCL-Based Matrix-Vector Multiplication (MVM). 365-372 - Alex Erdogan, Jaron Lin, Jordan Juliano, Kiran George:
Pulse on Pulse Deinterleaving Radar Algorithm. 373-377 - Jason Kreitz, Moonyoung Lee, Hyun SubPark, Paul Y. Oh, Jun-Ho Oh:
Implementing ROS Communications for Sensor Integration with the RB5 Collaborative Robot. 378-383 - Faisal Alghayadh, Debatosh Debnath:
HID-SMART: Hybrid Intrusion Detection Model for Smart Home. 384-389 - Hakduran Koc, Mounika Garlapati, Pranitha P. Madupu:
Data Compression and Re-computation Based Performance Improvement in Multi-Core Architectures. 390-395 - Hossein Khosravi, Mahdi Sheikhi, Abolfazl Bijari, Nabeeh Kandalaft:
3.5-9 GHz Ultra-Wideband LNA With Variable Gain and Noise Cancellation for Wireless Communication. 396-401 - Pratik Shrestha, Binayak Subedi, Megan Girard, Chirag Parikh, Nabeeh Kandalaft:
Wireless Communication Between FPGA and Microcontroller. 402-405 - Elena I. Riekhakaynen:
Corpora of Russian Spontaneous Speech as a Tool for Modelling Natural Speech Production and Recognition. 406-411 - Chuck Easttom, Sudip Thapa, Justin Lawson:
A Comparative Study of Machine Learning Algorithms for Use in Breast Cancer Studies. 412-416 - Haifeng Wang, Haili Zhang:
AIOPS Prediction for Hard Drive Failures Based on Stacking Ensemble Model. 417-423 - Chuck Easttom:
On the Application of Algebraic Graph Theory to Modeling Network Intrusions. 424-430 - Chuck Easttom:
On the Application of the Complexity Zeta Function to Modelling Complexity and Emergence in Neuro-Engineering. 431-436 - Steve Chan, Parnmook Nopphawan:
Monitoring and Alarm System Timing Analysis for an Interconnecting Grid. 437-443 - Nima Ghafoorianfar, Mehdi Roopaei:
Environmental Perception in Autonomous Vehicles Using Edge Level Situational Awareness. 444-448 - Steve Chan, Marco Zennaro, Ermanno Pietrosemoli, Marco Rainone, Ika Oktavianti, Parnmook Nopphawan:
The Blindspot of Electromagnetic Interference Affecting Sensitive Medical Devices at Hospitals and Healthcare Facilities. 449-457 - Mehrdad Harifi-Mood, Abolfazl Bijari, Hossein Alizadeh, Nabeeh Kandalaft:
A New Highly Power-Efficient Inverse Class-D PA for NB-IoT Applications. 458-462 - Salman Zandian, Hossein Khosravi, Abolfazl Bijari, Nabeeh Kandalaft:
Design of A 2-3 GHz Down-Conversion Active Mixer With Improved Linearity. 463-468 - Jonas Wagner, Mehdi Roopaei:
Edge Based Decision Making In Disaster Response Systems. 469-473 - Saurabh Ravindra Desai, Debjyoti Sinha, Mohamed El-Sharkawy:
Image Classification on NXP i.MX RT1060 using Ultra-thin MobileNet DNN. 474-480 - Jacob Coleman, Farah I. Kandah, Brennan Huber:
Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS). 481-487 - David Zaldivar, Lo'ai Ali Tawalbeh, Fadi Muheidat:
Investigating the Security Threats on Networked Medical Devices. 488-493 - Adrian Cartagena, Gerald Rimmer, Thomas van Dalsen, Lanier A. Watkins, William H. Robinson, Aviel D. Rubin:
Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners. 494-499 - Xin Pei, Xuefeng Li, Xiaochuan Wu, Liang Sun, Yixin Cao:
UDPP: Blockchain based Open Platform as a Privacy Enabler. 500-505 - Xin Pei, Xiaochuan Wu, Liang Sun:
Practical Data Sharing at Untrusted Stores. 506-510 - Shafinaz Islam, Damian Valles:
Houston Toad and Other Chorusing Amphibian Species Call Detection Using Deep Learning Architectures. 511-516 - David Johnson, Damian Valles:
A Non-Linear GPU Performance Modeling Approach and Consolidated Linear Hardware Model Performance Evaluation of the LEAP Cluster. 517-523 - Sudarshan S. Chawathe:
Rice Disease Detection by Image Analysis. 524-530 - Sepehr Saadatmand, Mohammadamir Kavousi, Sima Azizi:
The Voltage Regulation of Boost Converters Using Dual Heuristic Programming. 531-536 - Sazida B. Islam, Damian Valles:
Identification of Wild Species in Texas from Camera-trap Images using Deep Neural Network for Conservation Monitoring. 537-542 - Sudarshan S. Chawathe:
Topic Analysis of Climate-Change News. 543-549 - Ariel Y. Ramos Ruiz, Balasubramaniyan Chandrasekaran:
A Robotic Control System Using Robot Operating System and MATLAB for Sensor Fusion and Human-Robot Interaction. 550-555 - Sepehr Saadatmand, Sima Azizi, Mohammadamir Kavousi, Donald Wunsch:
Autonomous Control of a Line Follower Robot Using a Q-Learning Controller. 556-561 - Monika Roopak, Gui Yun Tian, Jonathon A. Chambers:
An Intrusion Detection System Against DDoS Attacks in IoT Networks. 562-567 - Luis J. Figueroa Rivera, Balasubramaniyan Chandrasekaran:
ROS-MATLAB Interface and Setup for a Fault Tolerant Robotic System Using Human Robot Interaction. 568-575 - James Andrews, Mihir Lad, Balasubramaniyan Chandrasekaran:
A Robotic System for Elderly Care and Monitoring using Human Robot Interaction. 576-579 - Evangelos A. Yfantis, William Culbreth:
A Data Driven PID Control System. 580-585 - Farah I. Kandah, Ilker Özçelik, Brennan Huber:
MARS: Machine learning based Adaptable and Robust Network Management for Software-defined Networks. 586-591 - Meghashree Hulkood Sreekanta, Abhishek Sarode, Kiran George:
Error Detection using Augmented Reality in the Subtractive Manufacturing Process. 592-597 - Ryan Michaels, David Adamo, Renée C. Bryce:
Combinatorial-Based Event Sequences for Reduction of Android Test Suites. 598-605 - Don Lahiru Nirmal Hettiarachchi, Venkata Salini Priyamvada Davuluru, Eric J. Balster:
Integer vs. Floating-Point Processing on Modern FPGA Technology. 606-612 - Laik Ruetten, Paulo Alexandre Regis, David Feil-Seifer, Shamik Sengupta:
Area-Optimized UAV Swarm Network for Search and Rescue Operations. 613-618 - Dara Nyknahad, Rojin Aslani, Wolfgang W. Bein, Laxmi P. Gewali:
Zoning Effect on the Capacity and Placement Planning for Battery Exchange Stations in Battery Consolidation Systems. 619-625 - Rasha Gargees, Grant J. Scott:
Multi-Stage Distributed Computing for Big Data: Evaluating Connective Topologies. 626-633 - Qian Li, Jie Huang, Hongming Zhu, Qin Liu:
Prediction of Cancer Drug Effectiveness Based on Multi-Fusion Deep Learning Model. 634-639 - Kalyan Sahu, Yu Bai, Yoonsuk Choi:
Supervised Sentiment Analysis of Twitter Handle of President Trump with Data Visualization Technique. 640-646 - Vinay Khedekar, Yun Tian:
Multi-Tenant Big Data Analytics on AWS Cloud Platform. 647-653 - Abdullah Alhujaylan, Leslie Carr, Matthew Ryan:
An Investigation of Factors Influencing Private Technology Organizations' Intention to Adopt Open Government Data in Saudi Arabia. 654-661 - Shirin Nasr Esfahani, Venkatesan Muthukumar, Emma E. Regentova, Kazem Taghva, Mohamed B. Trabia:
Complex Food Recognition using Hyper-Spectral Imagery. 662-667 - Surya Kollazhi Manghat, Mohamed El-Sharkawy:
A Multi Sensor Real-time Tracking with LiDAR and Camera. 668-672 - Mehdi Mafi, Walter Izquierdo, Malek Adjouadi:
High Impulse Noise Intensity Removal in Natural Images Using Convolutional Neural Network. 673-677 - S. M. Azharul Karim, Nitin Ranjan, Darshit Shah:
A Scalable Approach to Time Series Anomaly Detection & Failure Analysis for Industrial Systems. 678-683 - Jeffrey S. Chavis, Anna L. Buczak, Aviel D. Rubin, Lanier A. Watkins:
Connected Home Automated Security Monitor (CHASM): Protecting IoT Through Application of Machine Learning. 684-690 - Ravi Teja N. V. S. Chappa, Mohamed El-Sharkawy:
Squeeze-and-Excitation SqueezeNext: An Efficient DNN for Hardware Deployment. 691-697 - Paul Gorday, Nurgün Erdöl, Hanqi Zhuang:
GFSK Demodulation Using Learned Sequence Correlation. 698-704 - Siying Chen, Bhaskar Krishnamachari:
Differential Pricing of 5G Network Slices for Heterogeneous Customers. 705-711 - Mansour Alshaikh, Mohamed A. Zohdy, Richard Olawoyin, Debatosh Debnath, Zahraddeen Gwarzo, Jalal S. Alowibdi:
Social Network Analysis and Mining: Privacy and Security on Twitter. 712-718 - Pravir Malik:
Light-Based Interpretation of Quanta and its Implications on Quantum Computing. 719-726 - Amani Altarawneh, Tom Herschberg, Sai Medury, Farah I. Kandah, Anthony Skjellum:
Buterin's Scalability Trilemma viewed through a State-change-based Classification for Common Consensus Algorithms. 727-736 - Manasa Mainampati, Balasubramaniyan Chandrasekarar:
Evolution of Machine Learning Algorithms on Autonomous Robots. 737-741 - Yali Ji, Ruowei Gui, Xiaolin Gui, Dong Liao, Xinyang Lin:
Location Privacy Protection in Online Query based-on Privacy Region Replacement. 742-747 - Khalid Albulayhi, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon:
Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. 748-755 - Pengyu Zhang, Zhuoran Su, Zehua Dong, Kaveh Pahlavan:
Complex Motion Detection Based on Channel State Information and LSTM-RNN. 756-760 - Bryson Lingenfelter, Iman Vakilinia, Shamik Sengupta:
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. 761-767 - Saifuddin Mahmud, Xiangxu Lin, Jong-Hoon Kim:
Interface for Human Machine Interaction for assistant devices: A Review. 768-773 - Mustafa Aydin, Ismail Butun, Kemal Bicakci, Nazife Baykal:
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs. 774-779 - Niyazi K. Uluaydin, Osman Cerezci, Selim S. Seker:
Can Mobile Phone Usage Affect Hypothalamus-Pituitary-Adrenal Axis Response? 780-783 - Eriko Enomoto, Takahiro Kohno, Jun Yamada, Masayuki Shimojo, Shigeki Matsuo, Umamaheswari Rajagopalan, So Yoon Lee, Xiaobin Zhang, Yoshikazu Koike, Hideki Yokoi, Hiroyuki Nishikawa, Sumito Nagasawa, Nobuyuki Futai:
Optical Communication and Positioning Method of Underwater Observation Apparatus for Environmental Monitor. 784-788 - Alberto Gallegos Ramonet, Taku Noguchi:
Node Replacement Method for Disaster Resilient Wireless Sensor Networks. 789-795 - Shota Sakakura, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori:
Optimal Contention Window Based on Performance Analysis for Full Duplex WLANs. 796-802 - Fateh Elsherif, Edwin K. P. Chong:
Risk-Averse Traffic Allocation for Multi-RAT Connectivity in HetNets. 803-811 - Artiom Basulto-Lantsova, José Alfredo Padilla-Medina, Francisco Javier Pérez-Pinal, Alejandro Israel Barranco Gutiérrez:
Performance comparative of OpenCV Template Matching method on Jetson TX2 and Jetson Nano developer kits. 812-816 - Atif Naseer, Mohammed K. Nour, Basem Y. Alkazemi:
Towards Deep Learning based Traffic Accident Analysis. 817-820 - Xiaohao Zhang, Yunjie Li, Gang Chen:
NVMe-over-RPMsg: A Virtual Storage Device Model Applied to Heterogeneous Multi-Core SoCs. 821-826 - Ahmed Alzahmi, Mohammed Alswat, Chung-Ching Lin:
Energy Efficient 5Gb/s/pin Baseband Transceiver for 3D Memory Interface. 827-829 - SungJin Yu, JoonYoung Lee, MyeongHyun Kim, YoungHo Park:
A Secure Biometric Based User Authentication Protocol in Wireless Sensor Networks. 830-834 - Osman Cerezci, Selim S. Seker, Niyazi K. Uluaydin:
Theoretical and Experimental Study of GSM Frequencies in the Offices. 835-838 - William Brooks, Dominic M. Larkin, Christopher M. Korpela:
Robotics Technology Kernel for Radiation Sensing and Site Exploitation. 839-844 - Phuoc Hung Pham, Javed I. Khan:
A Bayesian based Model to Credential Learners' Content Skill Assessment. 845-851 - Anurag Thantharate, Rahul Arun Paropkari, Vijay Walunj, Cory C. Beard, Poonam Kankariya:
Secure5G: A Deep Learning Framework Towards a Secure Network Slicing in 5G and Beyond. 852-857 - Hasan Tariq, Abderrazak Abdaoui, Farid Touati, Mohammed Abdulla E. Al-Hitmi, Damiano Crescini, Adel Ben Mnaouer:
Design and Implementation of Cadastral Geo-spatial IoT Network Gateway Analyzer for Urban Scale Infrastructure Health Monitoring. 858-863 - Franz G. Aletsee, Sören Kohnert, Reinhard Stolle:
Extension of the Statistical MIMO Model by Alias as an Independent Subchannel. 864-868 - Mengyuan Sun, Runhua Guo, Jinhui Zhu, Wenhui Fan:
Roadway Crack Segmentation Based on an Encoder-decoder Deep Network with Multi-scale Convolutional Blocks. 869-874 - Yuusaku Kamura:
Applying k-means Method to the Modified Bottleneck Assignment Problem in Vector Case. 875-880 - Jeanette Hariharan, Yiannis Ampatzidis, Jaafar Abdulridha:
The Basis for Development of a Foundational Biomarker Reflectance Signature Database System for Plant Cell Identification, Disease Detection, and Classification Purposes. 881-887 - Stefan Resmerita, Anton Poelzleitner, Stefan Lukesch:
Modeling and Simulation of Software Execution Time in Embedded Systems. 888-894 - Fouad Kharroubi, Yassine El Kati, Shu-Lin Wang, Mohammed El Jourmi, Hassan Ouahmane:
A New Maximum Weight Submatrix Solver Tool for Identifying Mutated Driver Pathways in Cancer using Python. 895-900 - Kayla Chisholm, Chris Yakopcic, Md. Shahanur Alam, Tarek M. Taha:
Multilayer Perceptron Algorithms for Network Intrusion Detection on Portable Low Power Hardware. 901-906 - Abdelkader Aljerme, Huaping Liu:
A Time-varying Neural-network-based ARX Model of the Traffic in Mobile Networks. 907-912 - Urmil Shah, Brandon Hoang, Ryan Villanueva, Kiran George:
Focus Detection Using Spatial Release From Masking. 913-917 - Fausto Vega, Eric Hwang, Luke Park, Brandon Chan, Paul Y. Oh:
Service Robot Navigation and Computer Vision Application in a Banquet Hall Setting. 918-923 - Fahad Alhussein, Huaping Liu:
A CCRW receiver with a single window of variable width for mitigation of multipath and ambiguity in GNSS with MBOC signals. 924-931 - Leonardo Georgescu, Dylan Wallace, Daniel Kyong, Alex Chun, Kathy Chun, Paul Y. Oh:
The Future of Work: Towards Service Robot Control through Brain-Computer Interface. 932-937 - Anish Prasad Shrestha, S. M. Riazul Islam, Kyung Sup Kwak:
Ticket-Based Authentication for Securing Internet of Things. 938-941 - Akshay Dave, Mirue Kang, Jihyun Hwang, Mia Lorenzo, Paul Y. Oh:
Towards Smart Classroom: Affordable and Simple Approach to Dynamic Projection Mapping for Education. 942-947 - Xiangxu Lin, Saifuddin Mahmud, Ethan Jones, Alfred Shaker, Alena Miskinis, Shadi Kanan, Jong-Hoon Kim:
Virtual Reality-Based Musical Therapy for Mental Health Management. 948-952 - Yuxing Mao, Shenghong Hu, Zhengyu He:
Image Stitching Using Green Coordinates and Robust Elastic Warping. 953-957 - Kishor Datta Gupta, Md Lutfar Rahman, Dipankar Dasgupta, Subash Poudyal:
Shamir's Secret Sharing for Authentication without Reconstructing Password. 958-963 - Md. Ali Azam, Shawon Dey, Hans D. Mittelmann, Shankarachary Ragi:
Average Consensus-Based Data Fusion in Networked Sensor Systems for Target Tracking. 964-969 - Nemesio A. Macabale, Alexander N. Villasoto, Jerome D. Rivera, Aliyah C. Ventanilla, Miguel Paulo P. Talplacido, Angeliko L. Sevilla, Jerome O. Garcia:
CRADLE: Cross-Layer Design for Load-Aware Routing in IEEE 802.11-based Wireless Mesh and Sensor Networks. 970-974 - Kelly Brady, Seung Moon, Tuan Nguyen, Joel Coffman:
Docker Container Security in Cloud Computing. 975-980 - Russell Skaggs-Schellenberg, Nan Wang, Daniel Wright:
Performance Evaluation and Analysis of Proactive and Reactive MANET Protocols at Varied Speeds. 981-985 - Josué Martínez-Martínez, Carmen Carvajal-Jiménez, Diego A. Aponte-Roa:
A Secured IoT Scheme for Microgrids Monitoring. 986-990 - Bhagyashree Shirke, Jonathan Wong, Jonathan Clyde Libut, Kiran George, Sang June Oh:
Brain-IoT based Emotion Recognition System. 991-995 - Roberto Valentini, Piergiuseppe Di Marco, Roberto Alesii, Fortunato Santucci:
Exploiting Capture Diversity in Distributed Passive RFID Systems. 996-1000 - Nicholas Lower, Felix Zhan:
A Study of Ensemble Methods for Cyber Security. 1001-1009 - Youness Arjoune, Saleh Faruque:
Smart Jamming Attacks in 5G New Radio: A Review. 1010-1015 - Dorothy Hua, Julia Gao, Roger Mayo, Albert Smedley, Piyush Puranik, Justin Zhan:
Segregating Hazardous Waste Using Deep Neural Networks in Real-Time Video. 1016-1022 - Youness Arjoune, Saleh Faruque:
Artificial Intelligence for 5G Wireless Systems: Opportunities, Challenges, and Future Research Direction. 1023-1028 - Lian Yang, Xiong Li, Huan Li:
Hardware Trojan Detection Method Based on Time Feature of Chip Temperature. 1029-1032 - Hadi Salman, Justin Zhan:
Similarity Metric for Millions of Unlabeled Face Images. 1033-1040 - Tiffany Zhan, Felix Zhan, Vince Choi, Justin Zhan, Sarah Deniz, Adrian Ng, Patricio Gonzalez, Ivy Whaley, Dennis Garcia, Sam Vinh, Jeremy Eddy:
Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic Diseases. 1041-1048 - Felix Zhan, Yuria Mann, Nicholas Lower, Haemin Choi:
Healthcare Yelp: Health Care Services Prediction. 1049-1057 - Mingke Xu, Fan Zhang, Samee U. Khan:
Improve Accuracy of Speech Emotion Recognition with Attention Head Fusion. 1058-1064 - Kathirvel Nallappan, Yang Cao, Guofu Xu, Hichem Guerboukha, Chahé Nerguizian, Maksim Skorobogatiy:
Increasing Reliability of Terahertz Communication Links Using Onboard Fiber Connectivity. 1065-1070 - David Penn, Vinitha Hannah Subburaj, Anitha Sarah Subburaj, Mark Harral:
A Predictive Tool For Grid Data Analysis Using Machine Learning Algorithms. 1071-1077
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.