default search action
11th UEMCON 2020: New York City, NY, USA
- 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2020, New York City, NY, USA, October 28-31, 2020. IEEE 2020, ISBN 978-1-7281-9656-5
- Shahid Al Noor, Yasser Karim, Md. Mahmud Hossain, Ragib Hasan:
CrowdPick: A Generic Framework for Delivering Service Specific Crowd Infrastructure. 1-7 - Mohamed Sofiane Batta, Zibouda Aliouat, Hakim Mabed, Saad Harous:
LTEOC: Long Term Energy Optimization Clustering For Dynamic IoT Networks. 8-14 - Russell Skaggs-Schellenberg, Daniel Wright, Nan Wang:
Development and Implementation of S-MAC based RPL Protocol to Increase Energy Efficiency for the TelosB. 15-20 - Michael Stepzinski, Shamik Sengupta:
Cybersecurity analysis in Dedicated Short-Range Communications in vehicular networks. 21-27 - Subhrajit Majumder, Deepthi Chandrika Mandava, Junghwan Kim, Ahmad Y. Javaid:
Multimedia Transmission for V2X Communication over Legacy LTE-A Network Infrastructure - A Performance Evaluation. 28-34 - Wei Pang, Yufeng Li, Shengli Lu:
8-bit Convolutional Neural Network Accelerator for Face Recognition. 35-39 - Tian Lan, Yuxin Qian, Wenxin Tai, Boce Chu, Qiao Liu:
Deep Attractor with Convolutional Network for Monaural Speech Separation. 40-44 - T. A. Wanigaaratchi, V. G. T. N. Vidanagama:
Anomaly Detection and Identification Using Visual Techniques in Streaming Video. 45-51 - Stafford Hutchins, Earl E. Swartzlander Jr.:
A Bfloat16 Fused Multiplier-Adder. 52-55 - Suhana Ambol, Sherif Rashad:
Continuous Authentication of Smartphone Users using Machine Learning. 56-62 - Gregory Larrick, Yun Tian, Uri Rogers, Halim Acosta, Fangyang Shen:
Interactive Visualization of 3D Terrain Data Stored in the Cloud. 63-70 - Bohui Wang, Hui Li, Yan Zhao, Xin Yang, Huajun Ma, Xin Xie, Kaixuan Xing:
A Data Structure for Efficient File Deduplication in Cloud Storage. 71-77 - Siddartha Mootha, Sashank Sridhar, Rahul Seetharaman, S. Chitrakala:
Stock Price Prediction using Bi-Directional LSTM based Sequence to Sequence Modeling and Multitask Learning. 78-86 - Nisha Thorakkattu Madathil, Saad Harous:
Central versus Distributed Statistical Computing Algorithms-A Comparison. 87-92 - Patrick Adjei, Nittin S. Sethi, Camila P. E. de Souza, Miriam A. M. Capretz:
Energy Disaggregation using Multilabel Binarization and Gaussian Naive Bayes Classifier. 93-100 - Yevgeniy Byeloborodov, Sherif Rashad:
Design of Machine Learning Algorithms for Behavioral Prediction of Objects for Self-Driving Cars. 101-105 - Shafinaz Islam, Damian Valles, Michael R. J. Forstner:
Performance Analysis and Evaluation of LSTM and GRU Architectures for Houston toad and Crawfish frog Call Detection. 106-111 - Purvesh Sharma, Damian Valles:
Backbone Neural Network Design of Single Shot Detector from RGB-D Images for Object Detection. 112-117 - Ruchi Bagwe, Kiran George:
Automatic Numerical Question Answering on Table using BERT-GNN. 118-124 - Jahnavi Kachhia, Rashika Natharani, Kiran George:
Deep Learning Enhanced BCI Technology for 3D Printing. 125-130 - Ahmed E. Elshafey, Soumaia Ahmed Al Ayyat, Sherif Gamal Aly:
OPSCAN: Density-based Spatial Clustering in Opportunistic Networks. 131-136 - Utpal Kumar Dey, Robert Akl, Robin Chataut, Mohammadreza Robaei:
Modified PHY Layer for High Performance V2X Communication using 5G NR. 137-142 - Omar Alruwaili, Ivica Kostanic, Ali Al-Sabbagh, Hamad Almohamedh:
IoT Based: Air Quality Index and Traffic Volume Correlation. 143-147 - Moises Levy:
A Novel Framework for Data Center Risk Assessment. 148-154 - Md. Monowar Anjum, Noman Mohammed:
PAARS: Privacy Aware Access Regulation System. 155-161 - Michal Aibin:
LSTM for Cloud Data Centers Resource Allocation in Software-Defined Optical Networks. 162-167 - Ziyin Zhang, Wei Hao:
A New Caching Algorithm for Boosting Edge Computing Performance. 168-175 - Yuanyuan Yang, Hui Li, Xiangdong Cheng, Xin Yang, Yaoguang Huo:
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service. 176-182 - Ayad N. Bihnam, Xian Liu:
Performance Analysis of Cloud Radio Access Networks with Nakagami-m Fading Channel. 183-188 - Jeremy Lytle, Devon Santillo, Kristiina Valter Mai, Jeremy Wright:
Remote monitoring of evapotranspiration from green roof systems. 189-194 - Tapan Kumar, Pradyumn Sharma, Nupur Prakash:
Comparison of Machine learning models for Parkinson's Disease prediction. 195-199 - Paul Gorday, Nurgün Erdöl, Hanqi Zhuang:
A Noncoherent Incremental Learning Demodulator. 200-206 - Olusola Tolulope Odeyomi:
Mitigating Jamming Attacks in Uncoordinated Frequency Hopping Using Multi-Armed Bandit. 207-212 - Sinead V. Fernandes, Muhammad Sana Ullah:
Phychoacoustic Masking of Delta and Time -Difference Cepstrum Features for Deception Detection. 213-217 - Michal Aibin, Stephen Cheng, David Xiao, Aldrich Huang:
Optimization of Regenerator Placement in Optical Networks Using Deep Tensor Neural Network. 218-225 - Raghu Nandan Avula, Cliff C. Zou:
Performance Evaluation of TPC-C Benchmark on Various Cloud Providers. 226-233 - Jingang Liu, Chunhe Xia, Haihua Yan, Jie Sun:
A Feasible Chinese Text Data Preprocessing Strategy. 234-239 - Jean E. Piou:
Computation of Posterior Cramer-Rao Bounds for Deep Learning Networks. 240-244 - Kyle Spurlock, Heba Elgazzar:
Predicting COVID-19 Infection Groups using Social Networks and Machine Learning Algorithms. 245-251 - Randy Krauss, Matthew Vaysfeld, Murad Arslaner, Gregg Vesonder:
Streamlining Smart Cities to Create Safer Spaces. 252-257 - Justina Celentano, Eman Abdelfattah:
Analyzing Gun Violence in the United States. 258-261 - Salam Ismaeel, Mirza Kamaludeen, Ali Miri:
Secure Digital Service as a Utility and the Unit of Measure. 262-267 - Abhishek Shivanna, Sujan Ray, Khaldoon Alshouiliy, Dharma P. Agrawal:
Detection of Fraudulence in Credit Card Transactions using Machine Learning on Azure ML. 268-273 - Julie E. McKenna, Tyler R. Hopkins, Lucas T. Lavallee, Douglas E. Dow:
Knee Injury Diagnostic Device. 274-279 - Jiadao Zou, Qingxue Zhang, Kyle Frick:
Intelligent Mobile Electrocardiogram Monitor-empowered Personalized Cardiac Big Data. 280-284 - Michael Guarino, Pablo Rivas, Casimer M. DeCusatis:
Towards Adversarially Robust DDoS-Attack Classification. 285-291 - Lanier A. Watkins, Yue Yu, Sifan Li, William H. Robinson, Aviel D. Rubin:
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks. 292-297 - Lama A. Alqahtani, Hanadi M. Alotaibi, Irfan Ullah Khan, Nida Aslam:
Automated prediction of Heart disease using optimized machine learning techniques. 298-302 - Lanier A. Watkins, Kevin D. Fairbanks, Chengyu Li, Mengdi Yang, William H. Robinson, Aviel D. Rubin:
A Black Box Approach to Inferring, Characterizing, and Breaking Native Device Tracking Autonomy. 303-308 - Kishor Datta Gupta, Dipankar Dasgupta, Zahid Akhtar:
Adversarial Input Detection Using Image Processing Techniques (IPT). 309-315 - Madhuri Gurunathrao Desai, Yong Shi, Kun Suo:
IoT Bonet and Network Intrusion Detection using Dimensionality Reduction and Supervised Machine Learning. 316-322 - Sivaselvan N, Vivekananda Bhat K., Muttukrishnan Rajarajan:
Blockchain-based Scheme for Authentication and Capability-based Access Control in IoT Environment. 323-330 - Sarra Hammoudi, Abdelhak Bentaleb, Saad Harous, Zibouda Aliouat:
Scheduling in IEEE 802.15.4e Time Slotted Channel Hopping: A Survey. 331-336 - Jaimie Kelley, Caileigh Marshall:
Extending Conductive Thread Use to Unintended Microcontrollers. 337-342 - Stelios Neophytou, Pavlos Tsiantis, Ilias Alexopoulos, Ioannis Kyriakides, Camille de Veyrac, Ehson Abdi, Daniel R. Hayes:
Agile Edge Classification of Ocean Sounds. 343-348 - Qian Liu, Manfred Hauswirth:
A Provenance Meta Learning Framework for Missing Data Handling Methods Selection. 349-358 - Abdulrahman Aldhaheri, Je Lee, Khaled Almgren:
An Event Detection Platform to Detect Gender Using Deep Learning. 359-363 - Sudarshan S. Chawathe:
Analyzing Auction Data for Anomalous Bidding. 364-370 - Christine F. Reilly, Matthew Clark:
Moving Recursion Out of the RDBMS for Transactional Graph Workloads. 371-376 - Shaimaa Ezz-ElDin, Omar Nabil, Hussam Murad, Farah Adel, Ahmed AbdEl-Jalil, Khaled Salah, Ayub Khan:
MINI-SSD: A Fast Object Detection Framework in Autonomous Driving. 377-380 - Kemal Uçak, Gülay Öke Günel:
Adaptive Sliding Mode Control based on SVR. 381-386 - Jordan Fernandes, Jack Li, Keye Li, Joseph Mirabile, Gregg Vesonder:
Exploring a Plugin-Based System for Crowd and Pathogen Simulation in Unity. 387-392 - Dennis Hou, Raymond Hou, Janpu Hou:
Interpretable Saab Subspace Network for COVID-19 Lung Ultrasound Screening. 393-398 - Indira Kalyan Dutta, Bhaskar Ghosh, Albert H. Carlson, Michael W. Totaro, Magdy A. Bayoumi:
Generative Adversarial Networks in Security: A Survey. 399-405 - Yash Shah, Shamik Sengupta:
A survey on Classification of Cyber-attacks on IoT and IIoT devices. 406-413 - Sudarshan S. Chawathe:
Estimating Predicate Selectivities in a NoSQL Database Service. 414-420 - M. Tealab, Ahmed Hassebo, A. Dabour, M. AbdelAziz:
Smart Cities Digital transformation and 5G - ICT Architecture. 421-425 - Golam Kayas, Md. Mahmud Hossain, Jamie Payton, S. M. Riazul Islam:
VSDM: A Virtual Service Device Management Scheme for UPnP-Based IoT Networks. 426-433 - Alice Tolio, Davide Boem, Thomas Marchioro, Leonardo Badia:
A Bayesian Game Framework for a Semi-Supervised Allocation of the Spreading Factors in LoRa Networks. 434-439 - Minh Tri Tran, Anna Kuwana, Haruo Kobayashi:
Ringing Test for Third-Order Ladder Low-Pass Filters. 440-446 - Stephen Hopkins, Ezhil Kalaimannan, Caroline Sangeetha John:
Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation System. 447-454 - Amina Shrestha, Rhishav Mahaju, Sandun S. Kuruppu:
Feedback Path Delay Effect on Stability of Controlled PMSMs. 455-460 - Murad Mehrab Abrar, Raian Islam, Md. Abid Hasan Shanto:
An Autonomous Delivery Robot to Prevent the Spread of Coronavirus in Product Delivery System. 461-466 - Antonio Ornatelli, Andrea Tortorelli, Alessandro Giuseppi:
Iterative MPC for Energy Management and Load Balancing in 5G Heterogeneous Networks. 467-471 - Giovanni Perin, David Nophut, Leonardo Badia, Frank H. P. Fitzek:
Maximizing Airtime Efficiency for Reliable Broadcast Streams in WMNs with Multi-Armed Bandits. 472-478 - Gianmarco Baldini, Raimondo Giuliani, Monica Gemo:
Mitigation of Odometer Fraud for In-Vehicle Security Using the Discrete Hartley Transform. 479-485 - Brook W. Abegaz, Naxi Shah:
Sensors based Lane Keeping and Cruise Control of Self Driving Vehicles. 486-491 - Almon Chai, Evon Wan Ting Lim, Phei-Chin Lim:
Optimized Approach to Improve Classification of Wrist Movements via Electromyography Signals. 492-495 - Lynda Farinella, Eric Fernandes, Nathan Michener, Marco Polimeni, Gregg Vesonder:
Identification of Food Waste through Object Recognition. 496-499 - Aaron Hunter, Konstantin Boyarinov:
On the Development of Tools for Modelling Dynamic Beliefs Based on Past Data. 500-505 - Yash Parikh, Eman Abdelfattah:
Clustering Algorithms and RFM Analysis Performed on Retail Transactions. 506-511 - Elon Litman:
Computer-aided Ischemic Stroke Classification from EEG Data Using a Single-tiered Spiking Neural Network Framework. 512-516 - Shreehar Joshi, Eman Abdelfattah:
Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks. 517-521 - Carl Haberfeld, Alaa F. Sheta, Md. Shafaeat Hossain, Hamza Turabieh, Salim Surani:
SAS Mobile Application for Diagnosis of Obstructive Sleep Apnea Utilizing Machine Learning Models. 522-529 - Alexey Lagunov, Sergey Zabolotniy:
Mobile Natural Gas Concentration Intelligence Device Study for the Arctic. 530-535 - Colin Galen, Robert Steele:
Performance Maintenance Over Time of Random Forest-based Malware Detection Models. 536-541 - Maryam Heidari, James H. Jones:
Using BERT to Extract Topic-Independent Sentiment Features for Social Media Bot Detection. 542-547 - Logan Eisenbeiser:
Latent Walking Techniques for Conditioning GAN-Generated Music. 548-553 - Qi Wang, Xianping Wang:
Deep Convolutional Neural Network for Decoding EMG for Human Computer Interaction. 554-557 - Qi Wang, Xianping Wang:
EMG-based Hand Gesture Recognition by Deep Time-frequency Learning for Assisted Living & Rehabilitation. 558-561 - Hong Tien Vu, Quang Minh Dinh, Dai-Duong Nguyen, Minh Thuy Le:
Simple Dual Band Rectifier Based on Diplexer for Ambient RF Energy Harvesting Application. 562-565 - Hong Yu, Joushua Lorrain, Fanming Liu, Cory Lo:
Cross-platform for the development environment of smart home system. 566-569 - Vamshi Manthena, Sandeep Miryala, Grzegorz Deptuch, Gabriella Carini:
A 1.2-V 6-GHz Dual-Path Charge-Pump PLL Frequency Synthesizer for Quantum Control and Readout in CMOS 65-nm Process. 570-576 - Zhankun Luo, Yaan Zhang, Lizhe Tan:
Multi-level Random Sample Consensus Method for Improving Structured Light Vision Systems. 577-582 - Nafiz Sadman, Md. Manjurul Ahsan, M. A. Parvez Mahmud:
ADCR: An Adaptive TOOL to select "Appropriate Developer for Code Review" based on Code Context. 583-591 - Fu-Shiung Hsieh:
A Particle Swarm Optimization Algorithm to Meet Trust Requirements in Ridesharing Systems. 592-595 - Narayana Darapaneni, Amitavo Basu, Sanket Savla, Raamanathan Gururajan, Najmus Saquib, Sudarshan Singhavi, Aishwarya Kale, Pratik Bid, Anwesh Reddy Paduri:
Automated Portfolio Rebalancing using Q-learning. 596-602 - Pangao Du, Xianghong Lin, Xiaomei Pi, Xiangwen Wang:
An Unsupervised Learning Algorithm for Deep Recurrent Spiking Neural Networks. 603-607 - Jordan Juliano, Jaron Lin, Alex Erdogan, Kiran George:
Radar Pulse on Pulse Identification Parallel FFT and Power Envelope Algorithm. 609-613 - Sai G. Pavan, Binsu J. Kailath:
Reusable Spiking Neural Network Architecture. 614-620 - Xianghong Lin, Han Lu, Xiaomei Pi, Xiangwen Wang:
An FPGA-based Implementation Method for Quadratic Spiking Neuron Model. 621-627 - Aristide T.-J. Akem, Edwin Mugume:
A Machine Learning Approach to Temporal Traffic-Aware Energy-Efficient Cellular Networks. 628-634 - Shrikant S. Jadhav, Clay Gloster, Jannatun Naher, Christopher C. Doss, Youngsoo Kim:
An FPGA-based Optimized Memory Controller for Accessing Multiple Memories. 635-642 - Bhaskar Ghosh, Indira Kalyan Dutta, Albert H. Carlson, Michael W. Totaro, Magdy A. Bayoumi:
An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes. 643-648 - Narayana Darapaneni, Deepali Nikam, Anagha Lomate, Vaibhav Kherde, Swanand Katdare, Anwesh Reddy Paduri, Kameswara Rao, Anima Shukla:
Coronavirus Outburst Prediction in India using SEIRD, Logistic Regression and ARIMA Model. 649-655 - Zihan Xu, Li Jiang, Yiduo Liang, Yong Jia, Guolong Cui, Longfei Tan:
Three-Dimensional Down-View Imaging Based on MIMO Through-Wall-Radar. 656-661 - Khaled Elleithy, Thomas Arciuolo, Akram Abu-aisheh:
Implementation and Performance Evaluation of Overlay End System Multicast (ESM) for Stable and Fast Streaming of Multimedia Applications over Satellite Networks. 662-667 - Narayana Darapaneni, Rahul Choubey, Pratik Salvi, Ankur Pathak, Sajal Suryavanshi, Anwesh Reddy Paduri:
Facial Expression Recognition and Recommendations Using Deep Neural Network with Transfer Learning. 668-673 - Omar A. Zargelin, Fadel M. Lashhab, Walid K. Hasan:
Localization Methods based on Error Analysis and Modeling in One Dimension. 674-683 - Jiali Li, Rex Li, Michael B. Rahaim:
Design and Implementation of a Heterogeneous Multi-Hop OWC/RF Relay Architecture for Opportunistic Ultra-Dense Wireless Networks. 684-689 - Omar A. Zargelin, Fadel M. Lashhab, Walid K. Hasan:
Localization Methods based on Error Analysis and Modeling in Two Dimensions. 690-699 - Ryoko Nino, Takayuki Nishio, Tutomu Murase:
IEEE 802.11ad Communication Quality Measurement in In-vehicle Wireless Communication with Real Machines. 700-706 - Christopher Arnold, Jason Brown:
Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV Swarm. 707-712 - Daniel DeBruno, Kyle Moissinac, Joseph Severt, Abdelrahman Elleithy:
Radio-Factor Authentication: Identity Management over the 900MHz Band. 713-719 - Md Shohel Khan, Ajoy Das, Md. Shohrab Hossain, Husnu S. Narman:
Prediction of Dengue Infected Areas using A Novel Blockchain based Crowdsourcing Framework. 720-726 - Hosam Alamleh, Ali Abdullah S. AlQahtani:
Enforcing Location-based Access Policies Using the Existing IEEE 802.11 Infrastructure. 727-731 - Baker Al Smadi, Manki Min:
A Critical review of Credit Card Fraud Detection Techniques. 732-736 - Oguz Ülgen, Serhat Erküçük, Tunçer Baykas:
Non-Orthogonal Multiple Access for Terahertz Communication Networks. 737-742 - Zubaidah Al-Mashhadani, Balasubramaniyan Chandrasekaran:
Autonomous Ripeness Detection Using Image Processing for an Agricultural Robotic System. 743-748 - Manas Abhilash Gundapuneni, Anzum Bano, Navjot Singh:
Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing. 749-755 - Joseph Finkelstein, In Cheol Jeong:
Towards Contactless Monitoring of Blood Pressure at Rest and During Exercise Using Infrared Imaging. 756-758 - William Barnhart, Zhi Tian:
The Capacity of Multi-user Private Information Retrieval for Computationally Limited Databases. 759-763 - Ilker Kara, Murat Aydos:
Cyber Fraud: Detection and Analysis of the Crypto-Ransomware. 764-769 - Azhar Hasan Nsaif Drebee, Ahmet E. Topcu, Yasamin Alagrash:
Healthcare Security Based on Blockchain within Multi-parameter Chaotic Map. 770-778 - Md. Turab Hossain, Md. Shohrab Hossain, Husnu S. Narman:
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring. 779-785 - Adam Asadoorian, Melvin Alberto, Md Liakat Ali:
Creating and Using Secure Software. 786-792 - Abena Primo:
A Comparison of Blockchain-Based Wireless Sensor Network Protocols. 793-799 - Narayana Darapaneni, Kiran Mogeraya, Shubham Mandal, Ashwin Narayanan, Prasanna Siva, Anwesh Reddy Paduri, Faisal Khan, Praful Mohan Agadi:
Computer Vision based License Plate Detection for Automated Vehicle Parking Management System. 800-805 - Kristen Tan, Karun Sekhar, Jenna Wong, Jarod Holgado, Michael Ameer, Gregg Vesonder:
Alexa Eldercare Toolbox: A Smarthome Solution for the Elderly. 806-812 - Hadi Alasti:
An Efficient Accelerated Learning Algorithm For Tracking Of Unknown, Spatially Correlated Signals In Ad-Hoc Wireless Sensor Networks. 813-819 - Eunseo Lee, Gregg Vesonder, Elijah Wendel:
Eldercare Robotics - Alexa. 820-825 - Soo-Yeon Ji, Bong-Keun Jeong, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong:
Estimating Attack Risk of Network Activities in Temporal Domain: A Wavelet Transform Approach. 826-832 - M. A. Majid:
The largest QWI in the InGaP/InAlGaP laser structure using high compressive strain at elevated temperatures. 833-836 - Faisal Alghayadh, Debatosh Debnath:
Performance Evaluation of Machine Learning for Prediction of Network Traffic in a Smart Home. 837-842 - Maha Rita Arabia-Obedoza, Gloria Rodriguez, Amber Johnston, Fatima Salahdine, Naima Kaabouch:
Social Engineering Attacks A Reconnaissance Synthesis Analysis. 843-848 - Frederik Valocký, Martin Puchalik, Milos Orgon:
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line. 849-854 - Nader Nagui, Omneya Attallah, Mohamed Saad Zaghloul, Iman Morsi:
Smart Real-Time Autonomous Navigation System using integration of MEMS-based Low-Cost IMU/GPS. 855-861 - Leonardo Badia, Nunzio Borra:
Crowdsensing Strategies Inspired by Choir Management Analyzed via Game Theory. 862-868 - Narayana Darapaneni, Christopher Bellarmine, Anwesh Reddy Paduri, Sujana Entoori, Abir Kumar, S. V. Vybhav, Koushik Mondal:
Movie Success Prediction Using ML. 869-874 - Siwei Zhao, Sanyami Shah, Kishan Patel, Nickyta Patel, Vachana Shetty, Michal Aibin:
Adaptive Modulation Regenerator and Distance Aware Algorithm for Dynamic Routing in Elastic Optical Networks. 875-880 - Narayana Darapaneni, Amol Kobal, Rohit Chaoji, Rajiv Tiwari, Suman Saurav, Anwesh Reddy Paduri:
Effects of Lockdown and Post Lockdown on Covid19 cases across India using Supervised Learning Techniques. 881-887 - Bijal Patel, Haiyang Ji, Swati Nayak, Ting Ding, Yue Pan, Michal Aibin:
On Efficient Candidate Path Selection for Dynamic Routing in Elastic Optical Networks. 889-894 - Narayana Darapaneni, Deepak Reddy, Anwesh Reddy Paduri, Pooja Acharya, H. S. Nithin:
Forecasting of COVID-19 in India Using ARIMA Model. 894-899 - Naheem Olakunle Adesina, Ashok Srivastava:
A 250 MHz-to-1.6 GHz Phase Locked Loop Design in Hybrid FinFET-Memristor Technology. 901-906 - Brett Wiens, Daniel C. Lee:
Optimal Labeling with Cyclic Gray Codes for Generalized 16PAM Constellations. 906-912 - Nourhan Muhammed, Nour Hussein, Khaled Salah, Ayub Khan:
Assertion and Coverage Driven Test Generation Tool for RTL Designs. 913-916 - Takumi Shiohara, Tutomu Murase:
QoS Control for Mission-critical Communication on Vehicles with IEEE802.11 Wireless LAN under Dynamic Interference. 917-922 - Edder Sebastian Mendoza Garibay, Muhammad Sana Ullah:
Analysis and Synthesis of Respiratory Rate for Male Patients. 923-927 - William F. Chabala, Ismail Jouny:
Comparison of Convolutional Neural Network Architectures on Dermastopic Imagery. 928-931 - Djamila Mechta, Saad Harous:
HC-LEACH: Huffman Coding-based energy-efficient LEACH protocol for WSN. 932-938 - Islam Amine Bouchedjera, Lemia Louail, Zibouda Aliouat, Saad Harous:
DCCORONA: Distributed Cluster-based Coordinate and Routing System for Nanonetworks. 939-945 - Jaron Lin, Jordan Juliano, Alex Erdogan, Kiran George:
Pulse Separation Using Independent Component Analysis. 946-950 - Ahmed Hassebo, Mohamed A. Ali:
Robust Cellular connectivity-Based Smart LED Street Lighting System: A Platform For Innovative Mission Critical Smart City IoT Applications. 951-957 - Devaj Parikh, Kiran George:
Conceptual Neuroadaptive Brain Computer Interface for Autonomous Control of Automobile Brakes. 958-961
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.