default search action
12th CCWC 2022: Las Vegas, NV, USA
- 12th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2022, Las Vegas, NV, USA, January 26-29, 2022. IEEE 2022, ISBN 978-1-6654-8303-2
- Fu-Shiung Hsieh:
Robust Supervisory Control for Cyber-Physical Systems based on Discrete Timed Petri nets. 1-6 - Mustafa Al-Fayoumi, Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Tareq AlHajahjeh, Rana Abdulraheem:
Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study. 7-11 - Albert H. Carlson, Shivanjali Khare, Indira Kalyan Dutta, Bhaskar Ghosh, Michael W. Totaro:
Space Selection and Abstraction in Set Theoretic Estimation. 12-20 - Brendan P. Beauchamp, Samhita Rhodes, Nabeeh Kandalaft:
Coherence of Hand Muscles During Activities of Daily Living. 21-24 - Md. Rasel Hossain, Md. Mahbubur Rahman, Mohammad Rezaul Karim, Md. Jaki Al Amin, Chinmay Bepery:
Determination of 3D Coordinates of Objects from Image with Deep Learning Model. 25-30 - Md. Julhas Hossain, Md. Amdadul Bari, Mohammad Monirujjaman Khan:
Development of an IoT Based Health Monitoring System for e-Health. 31-37 - Aubee T. Mahusay, Senen D. Fenomeno:
Electricity Consumption Prediction Model for Southern Luzon State University-Main Campus Using Artificial Neural Network. 38-44 - David Shilane:
Automated Feature Reduction in Machine Learning. 45-49 - Dalton Hensley, Heba Elgazzar:
Classification of Stroke Victims through Supervised Machine Learning Algorithms and Ensemble Learning. 58-64 - Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Eman Abdelfattah:
Privacy and Security in Mobile Health Technologies: Challenges and Concerns. 65-71 - Jay Thom, Nathan Thom, Shamik Sengupta, Emily M. Hand:
Smart Recon: Network Traffic Fingerprinting for IoT Device Identification. 72-79 - Masoud Malekzadeh, Parisa Hajibabaee, Maryam Heidari, Brett Berlin:
Review of Deep Learning Methods for Automated Sleep Staging. 80-86 - Estephanos Jebessa, Kidus Olana, Kidus Getachew, Stuart Isteefanos, Tauheed Khan Mohd:
Analysis of Reinforcement Learning in Autonomous Vehicles. 87-91 - Parisa Hajibabaee, Masoud Malekzadeh, Mohsen Ahmadi, Maryam Heidari, Armin Esmaeilzadeh, Reyhaneh Abdolazimi, James H. Jones Jr.:
Offensive Language Detection on Social Media Based on Text Classification. 92-98 - Adedayo Aribisala, Mohammad S. Khan, Ghaith Husari:
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network. 99-105 - Nicholas Lee, Dal Hyung Kim:
Real-Time Motion Tracking System and Data Analytics for Live Insects Using Three-Wheeled Servosphere System. 106-111 - Reyhaneh Abdolazimi, Maryam Heidari, Armin Esmaeilzadeh, Hassan Naderi:
MapReduce Preprocess of Big Graphs for Rapid Connected Components Detection. 112-118 - Raj Mani Shukla, John Cartlidge:
Challenges Faced by Industries and Their Potential Solutions in Deploying Machine Learning Applications. 119-124 - Jueyang Wang, Shuzhen Li, Edward Agyemang-Duah, Xingyu Feng, Chun Xu, Yuao Ji, Junqiang Liu:
Fine-Grained Chinese Named Entity Recognition Based on MacBERT-Attn-BiLSTM-CRF Model. 125-131 - Rossian V. Perea, Enrique D. Festijo:
Analysis of the use of Analytics Platform for the Commercial Value of Mud crab Production using Non-parametric Model. 132-137 - Bhargavi Krishnamurthy, Sajjan G. Shiva:
Scalable Hindsight Experience Replay based Q-learning Framework with Explainability for Big Data Applications in Fog Computing. 138-144 - Sashank Sridhar, Sowmya Sanagavarapu:
Interrelating N-gram based Protein Sequences using LSTMs with Parallel Capsule Routing. 145-151 - Yanjun Hu, Xinyi Ju, Zhousheng Ye, Sulaiman Khan, Chengwu Yuan, Qiran Lai, Junqiang Liu:
Early Rumor Detection based on Data Augmentation and Pre-training Transformer. 152-158 - Yashbir Singh, William Jons, Joseph D. Sobek, John E. Eaton, Bradley J. Erickson, Barrett J. Anderies, Jaidip Jagtap:
Betti-Number Based Machine-Learning Classifier Frame-work for Predicting the Hepatic Decompensation in Patients with Primary Sclerosing Cholangitis. 159-162 - Shailesh S. Rajput, Yoonsuk Choi:
Handwritten Digit Recognition using Convolution Neural Networks. 163-168 - Dipu Chandra Malo, Md. Mustafizur Rahman, Jahin Mahbub, Mohammad Monirujjaman Khan:
Skin Cancer Detection using Convolutional Neural Network. 169-176 - Yuan Xing, Charles Carlson, Holly Yuan:
Optimize Path Planning for UAV COVID-19 Test Kits Delivery System by Hybrid Reinforcement Learning. 177-183 - Hiroshi Aoki, Takashi Ozu, Akio Hasegawa, Hiroyuki Yokoyama:
A Study on Application Category Estimation Method Based on Burst Characteristics of Communication. 184-190 - Ricardo Manzano S., Nishith Goel, Marzia Zaman, Rohit Joshi, Kshirasagar Naik:
Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks. 191-198 - Özge Yücel Kasap, Duygu Cakir:
Analysis of Transfer Learning Models for Face Mask Detection. 199-202 - Mohammad Sadman Tahsin, Md Jobayer, Md. Borhan Uddin Antor, Maidul Islam, Fatima Fairuz Raisa, Md. Al Hasan Shaikat:
Predictive Analysis & Brief Study of Early-Stage Diabetes Using Multiple Classifier Models. 203-207 - Ghilas Aissou, Selma Benouadah, Hassan El Alami, Naima Kaabouch:
Instance-based Supervised Machine Learning Models for Detecting GPS Spoofing Attacks on UAS. 208-214 - Mina Esmail Zadeh Nojoo Kambar, Armin Esmaeilzadeh, Yoohwan Kim, Kazem Taghva:
A Survey on Mobile Malware Detection Methods using Machine Learning. 215-221 - Victor Corja, Austin Ryan Crow, Nannan Liu, Ebrima Ceesay:
Bimodal Key Data and Semantic Analysis. 222-228 - Akmal Benhawan, Sureena Matayong, Chidchanok Choksuchat:
Forecasting Water Inflow for Bang Lang Dam. 229-233 - Aya A. Mostafa, Sameh A. Salem, Amr E. Mohamed:
The Effect of Singular-Vectors Feature Selection (SVFS) Based Hyper Dimentionality Framework in Ligand-Based Virtual Screening. 234-240 - Sudarshan S. Chawathe:
Predicting Bicycle Package Delivery Demand Using Historical Spatiotemporal Data. 241-247 - Elisa Benetti, Matteo Fracassetti, Gianluca Mazzini:
Case study for Data Center Distributed Monitoring. 248-253 - Ida Sèmévo Tognisse, Jules Degila, Ahmed Dooguy Kora:
Solutions for Closing Usage Gap in Rural Areas in West Africa. 254-259 - Kevin Matthe Caramancion:
The Role of User's Native Language in Mis/Disinformation Detection: The Case of English. 260-265 - Mahamat Saleh Adoum Sanoussi, Xiaohua Chen, George Kofi Agordzo, Mahamed Lamine Guindo, Abdullah M. M. A. Al Omari, Boukhari Mahamat Issa:
Detection of Hate Speech Texts Using Machine Learning Algorithm. 266-273 - Armin Esmaeilzadeh, Maryam Heidari, Reyhaneh Abdolazimi, Parisa Hajibabaee, Masoud Malekzadeh:
Efficient Large Scale NLP Feature Engineering with Apache Spark. 274-280 - Tanzir Ul Islam, Reza Ghasemi, Noman Mohammed:
Privacy-Preserving Federated Learning Model for Healthcare Data. 281-287 - Renato R. Maaliw, Karen Anne C. Quing, Ace C. Lagman, Bernard Haber Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo:
Employability Prediction of Engineering Graduates Using Ensemble Classification Modeling. 288-294 - Dipta Voumick, Sreyasi Sen, Nusher Jamil Kazi, Homaira Islam Parisa, Mohammad Monirujjaman Khan, Priyanka Dixit:
Development A Web Application for Lawyer and Client Virtual Communication. 295-301 - Giang Nguyen Thi Phuong, Do Thi Bich Tram, Le Thi Anh Hang, LeThi My Nhien, Nguyen Binh Phuong Duy:
Factors Affecting Vietnamese People's Intention to Buy Health Care Products Online During COVID-19. 302-309 - Aydan Gasimova, Tala Talaei Khoei, Naima Kaabouch:
A Comparative Analysis of the Ensemble Models for Detecting GPS Spoofing attacks on UAVs. 310-315 - Mohammad Masum, Md. Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. 316-322 - Abhigya Pote Shrestha, Chen-Hsiang Yu:
ECG Data Analysis with IoT and Machine Learning. 323-327 - Hadjar Ould Slimane, Selma Benouadah, Tala Talaei Khoei, Naima Kaabouch:
A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVs. 328-333 - Teckchai Tiong, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago:
Autonomous Valet Parking with Asynchronous Advantage Actor-Critic Proximal Policy Optimization. 334-340 - Mohammad Rezaul Karim Sujon, Md. Rasel Hossain, Md. Jaki Al Amin, Chinmay Bepery, Md. Mahbubur Rahman:
Real-time face mask detection for COVID-19 prevention. 341-346 - Mohd. Istiaq Hossain Junaid, Faisal Hossain, Udyan Saha Upal, Anjana Tameem, Abul Kashim, Ahmed Fahmin:
Bangla Food Review Sentimental Analysis using Machine Learning. 347-353 - Rana Abdulraheem, Ammar Jamil Odeh, Mustafa Al-Fayoumi, Ismail Keshta:
Efficient Email phishing detection using Machine learning. 354-358 - Dmitry Prokhorenkov:
Alternative Methodology and Framework for Assessing Differential Privacy Constraints and Consequences From a GDPR Perspective. 359-364 - Akihiko Ushiroyama, Minoru Watanabe, Nobuya Watanabe, Akira Nagoya:
Convolutional neural network implementations using Vitis AI. 365-371 - Saad Abouzahir, Mohamed Sadik, Essaid Sabir:
Lightweight Computer Vision System for Automated Weed Mapping. 372-376 - Tenzin Sherpa, Eman Abdelfattah, Kristin Miyamoto, Tiffany La Torre:
U.S. Wildfire Risks and Prevention. 377-384 - Nguyen Binh Phuong Duy, Giang Nguyen Thi Phuong:
Contactless Payments through E-wallets on Mobile Devices in the Context of Covid 19 at VietNam. 385-392 - Giang Nguyen Thi Phuong, Danh Thi Ngoc Anh, Truong Minh Tuan:
Sentiment Analysis High_School' Feedback for Predicting Career Possibilities. 393-398 - Khan Md. Hasib, Farhana Rahman, Rashik Hasnat, Md. Golam Rabiul Alam:
A Machine Learning and Explainable AI Approach for Predicting Secondary School Student Performance. 399-405 - Kingsley Udeh, David W. Wanik, Diego Cerrai, Derek Aguiar, Emmanouil N. Anagnostou:
Autoregressive Modeling of Utility Customer Outages with Deep Neural Networks. 406-414 - Xiaomei Pi, Xianghong Lin:
An FPGA-based Piecewise Linear Spiking Neuron for Simulating Bursting Behavior. 415-420 - Prithwineel Paul, Soumadip Ghosh:
On Label Languages of Homogeneous Variant of SNPSSP (HSNPSSP). 421-427 - Md Amit Khan, Nafiz Sadman, Kishor Datta Gupta, Jesan Ahammed Ovi:
Interpretable Learning Model for Lower Dimensional Feature Space: A Case study with Brown Spot Detection in Rice Leaf. 428-434 - Christopher G. Estonilo, Enrique D. Festijo:
Evaluation of the Deep Learning-Based m-Health Application Using Mobile App Development and Assessment Guide. 435-440 - Mohammad Affan Khalil, Maria Ramirez, Kiran George:
Using EEG and fNIRS Signals as Polygraph. 441-445 - Tanvir Anjum, Tanzil Ebad Chowdhury, Shadman Sakib, Shafkat Kibria:
Performance Analysis of Convolutional Neural Network Architectures for the Identification of COVID-19 from Chest X-ray Images. 446-452 - Georgios Symeonidis, Evangelos Nerantzis, Apostolos Kazakis, George A. Papakostas:
MLOps - Definitions, Tools and Challenges. 453-460 - Ria Rahmawati, Rachmadita Andreswari, Rokhman Fauzi:
Analysis and Exploratory of Lecture Preparation Process to Improve the Conformance using Process Mining. 461-466 - Swetha Gottipati, Debashis Guha:
Analysing Tweets on COVID-19 Vaccine: A Text Mining Approach. 467-474 - Brian Song, Jeongkyu Lee:
Detection of Northern Corn Leaf Blight Disease in Real Environment Using Optimized YOLOv3. 475-480 - Shereen Ismail, Diana Dawoud, Hassan Reza:
A Lightweight Multilayer Machine Learning Detection System for Cyber-attacks in WSN. 481-486 - Md Khorrom Khan, Renée C. Bryce:
Android GUI Test Generation with SARSA. 487-493 - Epie F. Custodio, Alexander A. Hernandez:
Performance Analysis of Deep Learning Architectures in Classifying Calamansi (Citrofortunella microcarpa). 494-500 - Zhaoxu Li, Sheng Liu, Jue Bai, Chenglei Peng, Yang Li, Sidan Du:
A Novel Skeleton-based Model with Spine for 3D Human Pose Estimation. 501-506 - Yuan Xing, Riley Young, Giaolong Nguyen, Maxwell Lefebvre, Tianchi Zhao, Haowen Pan:
Optimize Mobile Wireless Power Transfer by Finite State Machine Reinforcement Learning. 507-512 - Chunlan Gao, Yanqing Zhang, Dan Lo, Yong Shi, Jian Huang:
Improving the Machine Learning Prediction Accuracy with Clustering Discretization. 513-517 - Karthik Sivarama Krishnan, Koushik Sivarama Krishnan:
Benchmarking Conventional Vision Models on Neuromorphic Fall Detection and Action Recognition Dataset. 518-523 - Shereen Ismail, Diana W. Dawoud:
Software Development Models for IoT. 524-530 - Levent Dane, Deniz Gurkan:
Measuring Consistency Metric for Web Applications. 531-537 - Nazifa Tasneem, Md Anik Hasan, Yakut Marzan, Mohammad Monirujjaman Khan:
My Diary: A Web Application to Accumulate Necessary Files. 538-544 - Francis Liri, Abel Desoto, Wendy Catalan, Kiran George, Kenneth Faller, Julia Drouin:
Monitoring Audio Training Learning Outcomes with EEG Data. 545-551 - Abhishek Das, J. Tarun Gupta, N. Sanketh Reddy, Phalachandra Hallymysore:
Optimizing constraint driven container orchestration policies in a cloud environment. 552-560 - Ajan Ahmed, Mohammad Monirujjaman Khan:
Development of Smart Telemedicine System. 561-567 - Md Ashif Uddin, Uzzwal Kumar Dey, Shamama Ahmed Tonima, Toriqul Islam Tusher:
An IoT-Based Cloud Solution for Intelligent Integrated Rice-Fish Farming Using Wireless Sensor Networks and Sensing Meteorological Parameters. 568-573 - Nahid Ameer Makhdoomi, Teddy Surya Gunawan, Nur Hanani Idris, Othman Omran Khalifa, Rajandra Kumar Karupiah, Arif Bramantoro, Farah Diyana Abdul Rahman, Zamzuri Zakaria:
Development of Scoliotic Spine Severity Detection using Deep Learning Algorithms. 574-579 - Ellen Ketola, Christopher Lloyd, Dylan Shuhart, Josiah Schmidt, Raigan Morenz, Abul Khondker, Masudul H. Imtiaz:
Lessons Learned from the Initial Development of a Brain Controlled Assistive Device. 580-585 - Silafu Yiliyaer, Yoohwan Kim:
Secure Access Service Edge: A Zero Trust Based Framework For Accessing Data Securely. 586-591 - Tyler Gizinski, Xiang Cao:
Design, Implementation and Performance of an Edge Computing Prototype Using Raspberry Pis. 592-601 - Xiang Cao:
Goals and Solutions of Data Allocation in Data Center. 602-607 - Sakik Al Sajid, Syeda Natasha Nafreen, Al Amin Sogah, Md Ferdous Alam, Mohammad Monirujjaman Khan:
Cloud-Based Produce Market for Independent Farmers, Grocers, and Retailers. 608-612 - Amit Bhatia, Josh Robinson, Joseph M. Carmack, Scott Kuzdeba:
FPGA Implementation of Radio Frequency Neural Networks. 613-618 - Sotirios Ch. Diamantas, Prithviraj Dasgupta:
Optical Flow-Based Place Recognition: Bridging the Gap Between Simulation and Real-World Experiments. 619-624 - Amin Sahba, Ramin Sahba:
An Intelligent System for Safely Managing Traffic Flow of Connected Autonomous Vehicles at Multilane Intersections in Smart Cities. 625-631 - Abhigna L. Shastry, Devika S. Nair, B. Prathima, C. P. Ramya, Phalachandra Hallymysore:
Approaches for migrating non cloud-native applications to the cloud. 632-638 - Guillermo Sanchez-Guzman, Washington Velasquez, Manuel S. Alvarez-Alvarado:
Modeling a simulated Forest to get Burning Times of Tree Species using a Digital Twin. 639-643 - Chuck Easttom, Izzat Alsmadi:
A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings. 644-648 - Kavyashree Puttananjegowda, Majdi M. Ababneh, Sylvia Thomas:
The Design of High Efficiency Voltage Mode Integrated Converter for Glucose Monitoring Systems. 649-653 - Chuck Easttom:
NTRU and LASH for a Quantum Resistant Blockchain. 654-658 - Fariz Ardin Adhiyaksa, Moh. Muzayyin Amrulloh, Tanzilal Mustaqim, Hilya Tsaniya, Hudan Studiawan, Ary Mazharuddin Shiddiqi:
Reversible Audio Data Hiding using Samples Greatest Common Factor and Audio Interpolation. 659-666 - Singam Bhargav Ram, Vanga Odelu:
Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover. 667-672 - Ajan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey, Ipseeta Nanda:
Smart Helmet with Rear View and Accident Detection System for Increased Safety. 673-678 - Rizuwana Parween, Tan Yeh Wen, Mohan Rajesh Elara:
Modelling and Analysis of a Vertical Wall Robot for Ceiling Inspection. 679-687 - Rizuwana Parween, Povendhan Arthanaripalayam Palanisamy, Tan Yeh Wen, Dylan Ng Terntzer, Mohan Rajesh Elara:
Estimation of Sloshing Motion in a Wheel-based Drain Inspection Robot. 688-693 - Blas Molina Calatayud, Liam Meany:
A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices. 694-701 - Ben Lupton, Mackenzie Zappe, Jay Thom, Shamik Sengupta, Dave Feil-Seifer:
Analysis and Prevention of Security Vulnerabilities in a Smart City. 702-708 - Thomas F. Watson, Kutub Thakur, Md Liakat Ali:
The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study. 709-715 - Mohamed ElBeltagy, Wassim Alexan, Abdelrahman Elkhamry, Mohamed Moustafa, Hisham H. Hussein:
Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence. 716-722 - Lamara Ferreira, Marcelo Tsuguio Okano, Fernanda Aguiar, Henry de Castro Lobo dos Santos, Edson Luiz Ursini:
A panorama of the implementation of the General Law for the Protection of Personal Data (LGPD) in Brazil: an exploratory survey. 723-729 - Mahbub Ul Alam, Muhammad Abul Kalam Azad, Md. Showkat Ali:
Best Practices to Secure API Implementations in Core Banking System (CBS) in Banks. 730-735 - Abrarul Hassan Rahat, Mamunur Rashid Rumon, Tassnim Jaman Joti, Humayra Tasnin, Tania Akter, Arif Shakil, Md. Iqbal Hossain:
Blockchain Based Secured Multipurpose Identity (SMID) Management System for Smart Cities. 737-744 - Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files. 745-751 - Junyan Liang, Yoohwan Kim:
Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. 752-759 - Casimer M. DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge:
A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems. 760-764 - Casimer M. DeCusatis, Brian Gormanly, Erin Alvarico, Omar Dirahoui, J. McDonough, B. Sprague, M. Maloney, D. Avitable, B. Mah:
A Cybersecurity Awareness Escape Room using Gamification Design Principles. 765-770 - Muhammad Ajmal Khan, Firas Hassan, Rhys Davies:
Physical Layer Security Improvement of Dual-Hop Dual-Relay Network Using Signal Space Diversity. 771-775 - Mathew David Salcedo, Mehdi Abid, Yoohwan Kim, Ju-Yeon Jo:
Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes. 776-784 - Ki Chan, Yoohwan Kim, Ju-Yeon Jo:
DER Communication Networks and Their Security Issues. 785-790 - Samuel Black, Yoohwan Kim:
An Overview on Detection and Prevention of Application Layer DDoS Attacks. 791-800 - Aliyu Tanko Ali, Damas P. Gruska:
States of Attack Under Incomplete Information. 801-807 - Oleksii Podoliaka, Virginia Mushkatblat, Adam Kaplan:
Privacy Attacks Based on Correlation of Dataset Identifiers: Assessing the Risk. 808-815 - Zuhair Alqarni:
Improved Control Strategy for 4 WD Electric Vehicle Using Direct Torque Control Technique with Space Vector Modulation. 816-822 - Raihana Yarzada, Divya Singh, Hussain Al-Asaad:
A Brief Survey of Fault Tolerant Techniques for Field Programmable Gate Arrays. 823-828 - Teckchai Tiong, Kiing-Ing Wong, Wei Kitt Wong, Ing Ming Chew:
Technoeconomic Analysis for Microgrid Renewable Energy with Battery and Hydrogen Storage. 829-835 - Utpal Kumar Dey, Robert Akl, Robin Chataut:
Throughput Improvement in Vehicular Communication by Using Low Density Parity Check (LDPC) Code. 836-843 - Omar Almesbahi, Abdullah Alqadhi, Mahmood Almesbahi:
Achieving High Gain Performance for 5G Millimeter-Wave Transmission with Large Communication Transmission Loss. 844-850 - Irene L. Balmes, Riva Mae P. Alejandro, Jose Miguel L. Gamo, Angelu Merry T. Ilagan:
PARADA: Parking Space Rental and Leasing Application System. 851-856 - Md. Abdul Kader Jilani, Md. Arman Hossain, Farzana Yeasmin Lamia, Md. Afzalur Rahman, Adiba Haque Sharker, Md. Rezwanul Ahsan:
Design of 2*1 Patch Array Antenna for 5G Communications Systems using mm-wave Frequency Band. 857-862 - Aymen I. Zreikat:
Load balancing call admission control algorithm (CACA) based on soft-handover in 5G Networks. 863-869 - Sandhya Hizrian Sabila, I Wayan Mustika, Selo Sulistyo:
Design and Implementation of Mobile Applications for Military Personnel Based on SIP (Session Initiation Protocol). 870-875 - Putri Rahmawati, Muhammad Imam Nashiruddin, Ahmad Tri Hanuranto, Akhmad Akhmad:
Assessing 3.5 GHz Frequency for 5G New Radio (NR) Implementation in Indonesia's Urban Area. 876-882 - Muhammad Adam Nugraha, Muhammad Imam Nashiruddin, Ahmad Tri Hanuranto, Akhmad Akhmad:
Simulation of 5G Dense-Urban Deployment at 3.5 GHz Frequency: A Case Study of Central Jakarta. 883-888 - Randy Verdecia-Peña, José I. Alonso:
Simulation and Experimental Study of a Power Amplifier Behaviour to Enhance Relay Node Co-operative SDR Platform: Performance Analysis. 889-894 - Chol Hyun Park, Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo:
MPTCP Performance Simulation in Multiple LEO Satellite Environment. 895-899 - Ruizhe Ma, Chong Tan, Hong Liu, Min Zheng:
Message Parsing Based on Structure Description in IoT for Electric Power and Energy Systems. 900-906 - Ambar Prajapati:
Reliable Multicast of Dynamic Content Streams from AMQP to NORM Protocol-based Systems. 907-914 - Christopher Martin, Yanyan Li:
A Scalable Self-Learning Chatbot for Classroom. 915-921 - Nobuo Suzuki, Tatsuya Yoshioka, Akio Hasegawa, Hiroyuki Yokoyama, Toshiyuki Maeyama:
Implementation and evaluation of spectrum sharing technology using smart contracts. 922-928 - Richard Kyung, Daniel Seungmin Lee:
Study on the Nano-plasmonics and Plasmonic Materials to Improve Photon Absorption in Optical Devices. 929-932 - Matineh Ghafoorian Eshghi, Zahra Amiri, Morteza Modarresi Asem:
An Investigation of Clinical Laser Applications in Dentistry; a Review and Outlook. 933-942 - Muhammad Ajmal Khan, Rhys Davies, Firas Hassan:
Securing Wireless Signals using Artificial Phase Noise. 943-947 - Mohammad Rahman, Laurent Njilla, Swastik Brahma:
Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans. 948-952 - Pravir Malik:
The Role of a Light-Based Quantum Computational Model in the Creation of an Oscillating Universe. 953-959 - Great Allan Ong, Melvin A. Ballera:
A Multi-level Morphological and Stochastic Tagalog Stemming Template. 960-965 - Ricky Djamaluddin, Yudi Priyadi, Eko Darwiyanto:
User-Centered Design to Improve Personal Development In Comic Application. 966-973 - Muhammad Irsyad Sabiqun Bil Khairat, Yudi Priyadi, Monterico Adrian:
Usability Measurement in User Interface Design Using Heuristic Evaluation & Severity Rating (Case Study: Mobile TA Application based on MVVM). 974-979 - Haiying Ren, Xinxuan Huang, Xiaoyong Tang:
An Interference Elimination Algorithm for Group Brain-Computer Interface System. 980-982 - Yixin Wang, Xiao Ma:
Rate-Configurable SC-LDGM Codes Concatenated with Zipper Codes for Optical Communication. 983-987 - You-Chiun Wang, Li-Chia Yen:
Collaborative Route Management to Mitigate Congestion in Multi-Domain Networks Using SDN. 988-994 - Gieorgi Zakurdaev, Mohammed Ismail, Chung-Horng Lung:
Dynamic On-Demand Virtual Extensible LAN Tunnels via Software-Defined Wide Area Networks. 995-1000 - Mummadi Swathi, Bhawana Rudra:
Novel Encoding method for Quantum Error Correction. 1001-1005 - Saqer Alhloul, Uri Rogers:
An Empirical Model for 1-D Molecular Communication Diffusive Channels Under Reflecting and Absorbing Boundary Conditions. 1006-1010 - Hasna Hanifah Suranto, Titiek Suryani:
Performance Analysis of Filter Bank Multicarrier with Doppler Effect in Vehicle to Vehicle Communication Channel. 1011-1017 - Sergei Yelmanov, Yuriy Romanyshyn:
Assessing the Information Capacity of Image Based on the Theory of Contrast. 1018-1023 - Maria Ramirez, Shima Kaheh, Mohammad Affan Khalil, Kiran George:
Application of Convolutional Neural Network for Classification of Consumer Preference from Hybrid EEG and FNIRS Signals. 1024-1028 - Peter Stubberud:
Digital IIR Filter Design Using a Differential Evolution Algorithm with Polar Coordinates. 1029-1035 - Sofyan Prasetyo, Titiek Suryani:
Implementation of Predistorter for HPA Nonlinearity Mitigation on OQAM FBMC System. 1036-1042 - Ajan Ahmed, H. M. Arifur Rahman, Mohammad Monirujjaman Khan:
Design and Analysis of a Compact Wideband V-Band and W-Band Antenna for Healthcare Applications. 1043-1048 - Stephen Ogbikaya, M. Tariq Iqbal:
Design and sizing of a microgrid system for a University community in Nigeria. 1049-1054 - Kareem Al-Nabulsi, Fadi Odeh, Mohammad Kanaan, Ammar Odeh:
Commiteam: Committee Management System. 1055-1058 - Sheikh Usman Uddin, Tariq Iqbal:
Design and Economic Analysis of Solar Powered Drinking Water Reverse Osmosis Desalination System for a Community in Pakistan. 1059-1064 - Phillipe Austria, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, Khanh D. Pham:
BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow. 1065-1069 - Amirhossein Jahanfar, M. Tariq Iqbal:
A Comparative Study of Solar Water Pump Storage Systems. 1070-1075 - Adnan Sarwar, M. Tariq Iqbal:
Design and Optimization of Solar PV system for a Fish Farm in Pakistan. 1076-1081 - Tao Yu, Kento Kajiwara, Kiyomichi Araki, Kei Sakaguchi:
Spectrum Sharing between Directional-Antenna-Equipped UAV System and Terrestrial Systems. 1082-1086 - Zengmao Chen, Xianwu Zhao, Li Lu, Rongchen Sun, Zhiguo Sun:
Frequency Hopping Acquisition Based on Variable Forgetting Factor Recursive Least Squares Algorithm. 1087-1091 - Tao Yu, Kiyomichi Araki, Kei Sakaguchi:
Ground Experiment of Full-Duplex Multi-UAV System Enabled by Directional Antennas. 1092-1097 - Tetsuki Taniguchi, Takeo Fujii:
Power Control in Local 5G/Beyond Systems Utilizing Spectrum Database and Monte Carlo Stochastic Programming. 1098-1104 - Mobasshir Mahbub, Raed M. Shubair, Bobby Barua:
Joint Analysis of Success and Outage Probability in 5G Multi-Tier Heterogeneous Network. 1105-1111 - Ahmed Hassebo:
The Road to 6G, Vision, Drivers, Trends, and Challenges. 1112-1116 - A. F. M. Shahen Shah:
A Survey From 1G to 5G Including the Advent of 6G: Architectures, Multiple Access Techniques, and Emerging Technologies. 1117-1123 - Sana Rekik, Nouha Baccour, Mohamed Jmaiel:
Limitations of static autonomous scheduling for TSCH protocol and advances in adaptive scheduling. 1124-1129 - Haytham Elmiligi, Sherif Saad:
Predicting the Outcome of Soccer Matches Using Machine Learning and Statistical Analysis. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.