


default search action
11th CCWC 2021: Las Vegas, NV, USA
- 11th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2021, Las Vegas, NV, USA, January 27-30, 2021. IEEE 2021, ISBN 978-1-6654-1490-6
- Somboon Sukpancharoen
:
Application of Spotted Hyena Optimizer in Cogeneration Power Plant on Single and Multiple-Objective. 1-5 - Edder Sebastián Mendoza Garibay, Muhammad Sana Ullah
:
Removal of Wandering Baseline Artifact from Electrocardiogram Signals. 7-11 - Mohsen Babaeian, Mohammad Mozumdar:
Applying HRV Based Online Clustering Method to Identify Driver Drowsiness. 12-21 - Musbah Abdulgader, Fadel M. Lashhab
:
Energy-Efficient Thermal Comfort Control in Smart Buildings. 22-26 - Divya Pramasani Mohandoss, Yong Shi, Kun Suo:
Outlier Prediction Using Random Forest Classifier. 27-33 - Ahmad Tarraf
, Lars Hedrich:
Towards Compositional Abstraction of Analog Neuronal Networks. 34-37 - Christopher Neal, Hanane Dagdougui, Andrea Lodi, José M. Fernandez:
Reinforcement Learning Based Penetration Testing of a Microgrid Control Algorithm. 38-44 - George K. Sidiropoulos
, Athanasios G. Ouzounis, George A. Papakostas, Ilias T. Sarafis, Andreas Stamkos, George Solakis:
Texture Analysis for Machine Learning Based Marble Tiles Sorting. 45-51 - Anugrah Indah Lestari
, Mia Rizkinia, Dodi Sudiana:
Evaluation of Combining Optical and SAR Imagery for Burned Area Mapping using Machine Learning. 52-59 - Ahmed Emad, Fady Bassel, Mark Refaat, Mohamed Abdelhamed, Nada Shorim
, Ashraf AbdelRaouf:
Automatic Video summarization with Timestamps using natural language processing text fusion. 60-66 - Jaron Lin, Jordan Juliano
, Alex Erdogan, Kiran George:
Pulse Separation Using Time-Frequency Mask and Machine Learning. 67-72 - Saeid Samadidana:
Exploring the Effect of Noisy Environment on Distributed Problem Solving. 73-80 - Yong Shi, Kun Suo, Jameson Hodge, Divya Pramasani Mohandoss, Steven Kemp:
Towards Optimizing Task Scheduling Process in Cloud Environment. 81-87 - Shiyu Cheng, Xinguang Wang, Haoqi Zhang:
Application of Firefly Algorithm to UWB Indoor Positioning. 88-93 - Asimina Dimara
, Christos-Nikolaos Anagnostopoulos
, Stelios Krinidis
, Dimitrios Tzovaras
:
Benchmarking of Regression Algorithms for Simulating the Building's Energy. 94-100 - Matthew Immanuel Samson, David A. Calvert, Lana M. Trick:
Analysis of Distracted Driver Behaviour Using Self-Organizing Maps. 101-103 - Prasad S. P. Kavyashree, Mohamed El-Sharkawy:
Compressed MobileNet V3: A Light Weight Variant for Resource-Constrained Platforms. 104-107 - Guangxin Wang, Arash Abbasi, Huaping Liu
:
Dynamic Phase Calibration Method for CSI-based Indoor Positioning. 108-113 - Jan Luxemburk
, Karel Hynek, Tomás Cejka
:
Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set. 114-122 - Guangxin Wang, Arash Abbasi, Huaping Liu
:
WiFi-based Environment Adaptive Positioning with Transferable Fingerprint Features. 123-128 - Kalyan Sahu
, Yoonsuk Choi:
Sentiment Analysis of The United States Senate Twitter Feeds in Election Year 2020. 129-133 - Sowmya Sanagavarapu, Sashank Sridhar
, S. Chitrakala
:
News Categorization using Hybrid BiLSTM-ANN Model with Feature Engineering. 134-140 - Muthana Zouri, Alexander Ferworn:
An Ontology-Based Approach for Curriculum Mapping in Higher Education. 141-147 - Devharsh Trivedi
, Vaishnavi Gopalakrishnan:
MediCrawl - A Web Search Engine For Diseases. 148-157 - Gian Paolo Jesi, Elisabetta Gori, Andrea Zucchelli, Nicola Spazzoli, Gianluca Mazzini:
Monitoring People Moving during Covid-19 Pandemic in the Emilia-Romagna Region. 158-164 - Raoul R. Nigmatullin, Alexander Ivchenko, Semyon Dorokhin:
Accumulated Generalized Mean Value - a New Approach to Flow-Based Feature Generation for Encrypted Traffic Characterization. 165-169 - Alvee Morsele Kabir, Sharaban Tahura Nisa, Mohammad Monirujjaman Khan
:
A Virtual Reality (VR) Based Interactive and Educative Experience of Hajj and Umrah for the People of Bangladesh. 170-173 - Esra Çakir, H. Ziya Ulukan:
An Intuitionistic Fuzzy MCDM Approach Adapted to Minimum Spanning Tree Algorithm for Spreading Content on Social Media. 174-179 - Mohammad Mahabubul Hasan, Pritom Roy, Sabbir Sarkar, Mohammad Monirujjaman Khan
:
Stock Market PredictionWeb Service Using Deep Learning by LSTM. 180-183 - Konstantinos Tziridis
, Theofanis Kalampokas
, George A. Papakostas:
EEG Signal Analysis for Seizure Detection Using Recurrence Plots and Tchebichef Moments. 184-190 - Lauren J. Wong, Sean McPherson:
Explainable Neural Network-based Modulation Classification via Concept Bottleneck Models. 191-196 - Mario Fischer, Jürgen Wassner:
BinArray: A Scalable Hardware Accelerator for Binary Approximated CNNs. 197-205 - Paul Samuel Ignacio
:
Intrinsic Hierarchical Clustering Behavior Recovers Higher Dimensional Shape Information. 206-212 - Mohamed Yazid Zidani, Noureddine Brakta, Omar Bendjeghaba:
Dynamic Performance Improvement of DFIM based on Hybrid Computational Technique. 213-217 - Ashrf Althbiti, Rayan Alshamrani
, Tami Alghamdi, Stephen Lee, Xiaogang Ma:
Addressing Data Sparsity in Collaborative Filtering Based Recommender Systems Using Clustering and Artificial Neural Network. 218-227 - Shekhar Palit, Kevin A. Wortman:
Perfect Tabular Hashing in Pseudolinear Time. 228-232 - Cesar Martinez Melgoza, Henry Lin, Illianna Izabal, Ameya Govalkar
, Kayla Lee, Alex Erdogan, Kiran George:
Wavelet Analysis Using Hilbert Transform and Matching Algorithm for Radar Receiver System. 233-237 - Asimina Dimara
, Dimitrios Triantafyllidis
, Stelios Krinidis
, Konstantinos Kitsikoudis, Dimosthenis Ioannidis, Stavros Antipas, Dimitrios Tzovaras
:
District Energy Optimization Based on MLP Simulation. 238-244 - Rini Raju, Shova Bhandari, Sofia A. Mohamud, Ebrima N. Ceesay:
Transfer Learning Model for Disrupting Misinformation During a COVID-19 Pandemic. 245-250 - Sandeep Kumar, Koushik Biswas
, Ashish Kumar Pandey:
Track Prediction of Tropical Cyclones Using Long Short-Term Memory Network. 251-257 - Shahd Hesham, Rawan Khaled, Dalia Yasser, Samira Refaat
, Nada Shorim
, Fatma Helmy Ismail:
Monuments Recognition using Deep Learning VS Machine Learning. 258-263 - Sowmya Sanagavarapu, Sashank Sridhar
:
SDPredictNet-A Topology based SDN Neural Routing Framework with Traffic Prediction Analysis. 264-272 - Niko Anthony Simon, Cheol-Hong Min:
Row Detection Using a Machine Learning Approach for Autonomous Agriculture Vehicles. 273-276 - Amlan Ghosh, Abhirup Sinha
, Pritam Mondal, Anusree Roy, Pritilata Saha
:
Indian Premier League Player Selection Model Based on Indian Domestic League Performance. 277-282 - Nicholas Cochrane, Thomas Gomez, John Warmerdam, Moises Flores, Preston McCullough, Vincent Weinberger, Matin Pirouz:
Pattern Analysis for Transaction Fraud Detection. 283-289 - Emilee Klaas, Mehdi Roopaei:
Immersive Analytics Application in Smart Agriculture and Animal Behavior. 290-296 - Jasleen Dhillon, Nandana Priyanka Eluri, Damanpreet Kaur, Aafreen Chhipa, Ashwin Gadupudi
, Rajeswari Cherupulli Eravi, Matin Pirouz:
Analysis of Airbnb Prices using Machine Learning Techniques. 297-303 - Cristin Purnama Sari Kaunang, Fitria Amastini
, Rahmad Mahendra
:
Analyzing Stance and Topic of E-Cigarette Conversations on Twitter: Case Study in Indonesia. 304-310 - Masaru Todoriki, Masafumi Shingu, Shotaro Yano, Arseny Tolmachev, Tao Komikado, Koji Maruhashi:
Semi-Automatic Reliable Explanations for Prediction in Graphs. 311-320 - Israel Perez, Min Su, Leonardo Yoshida, Manali Ajudiya, Enrique Verduzco, Julian Sandoval, Ryan Perez, Matin Pirouz:
Determining Level of Service of California Highways. 321-328 - Sayan Ghose, Lawrence Pohlman:
Quasi-Monte Carlo Integration on the Unit Disk. 329-333 - Narek A. Hovhannisyan
:
On distributed forest decomposition of graphs with bounded arboricity. 334-340 - Sohini Roy, Arunabha Sen:
A Self-Updating K-Contingency List for Smart Grid System. 341-346 - Trung T. Pham:
Motion Detection with Segmentation of Optical Flows for Infrared Images. 347-354 - Mohammad Saber Gholami
, Hovhannes A. Harutyunyan:
A Broadcasting Heuristic for Hypercube of Trees. 355-361 - Nafiz Sadman
, Nishat Anjum, Kishor Datta Gupta
, M. A. Parvez Mahmud
:
Understanding the Pandemic Through Mining Covid News Using Natural Language Processing. 362-367 - Shoya Kobayashi, Tutomu Murase:
Performance Evaluation of Adaptive Beaconing for High-Speed Wireless LAN Communication With Running Vehicle APs. 368-372 - Aymen I. Zreikat
, Ersin Elbasi
:
Downlink Interoperability Model of LTE/Wi-Fi Integration/Coexistence With Performance Evaluation. 373-379 - Takumi Anjiki, Tutomu Murase:
Proposal of User Cooperative Mobility Control for Higher Throughput in Social Ad Hoc Networks With Dynamic Optimal Routing. 380-386 - Muhammad Ajmal Khan:
Secrecy Enhancement of a Cognitive Two-Way Relay Network with Coordinate Interleaving. 387-392 - Dauda Ayanda
, Peter O. Akuon
, Khadeejah A. Abdulsalam, Adefolarin Bolaji:
Performance Characterization of 64-APSK Mapping Schemes for Uncoded Space-Time Labeling Diversity in Rician Fading Channels. 393-398 - Ryota Miyazaki, Tutomu Murase:
Centralized Route Control for Expanding Coverage by Wireless LAN with Many Vehicle APs. 399-404 - Chenxu Wang, Yanxin Yao, Han Yao:
Video anomaly detection method based on future frame prediction and attention mechanism. 405-407 - Christina Varghese, Drashti Pathak, Aparna S. Varde:
SeVa: A Food Donation App for Smart Living. 408-413 - Fred Arineitwe, Jonathan Serugunda
, Dorothy Okello:
Development of the Protocol for Inter-Autonomous Systems Routing in Software Defined Networks. 414-422 - Jordan Juliano
, Jaron Lin, Alex Erdogan, Kiran George:
Radar Pulse on Pulse Identification Algorithm Hardware Acceleration Performance Analysis. 423-425 - Trevor Powers, Michael Novitzky, Christopher Korpela:
Improving Reward Functions in Robots Playing Capture the Flag Using Q-Learning. 426-431 - Annelise Trout, Xiang Cao:
Tradeoff and Solutions of Data Storage in Edge Computing. 432-438 - Putu Dela Apsari Mertadewi, Warih Puspitasari, Muhardi Saputra
:
Optimization of Event Management Activity in Public Health Services Using OpenERP with Quickstart Approach. 439-444 - Pavle Ivanovic, Christian Siemers:
Private Cloud Tuning for Efficient Inter-Server Simulation Execution. 445-450 - Lauren Courtney, Xiang Li, Rongzuo Xu, Joel Coffman:
Data Science Techniques to Detect Fraudulent Resource Consumption in the Cloud. 451-457 - Elisa Benetti, Gianluca Mazzini:
Business Continuity Implementation for Data Center Environments. 458-462 - Bingbing Zheng, Li Pan, Shijun Liu:
An Online Cost Optimization Algorithm for IaaS Instance Releasing in Cloud Environments. 463-469 - Enrica Salbaroli, Andrea Zucchelli, Gianluca Mazzini:
A Share Quota Manager for the Public Administrations. 470-474 - Tiffany Zhan:
Election Data Analysis From Clustering Welfare Data. 475-479 - Moises Levy, Anitha Sarah Subburaj:
Emerging Trends in Data Center Management Automation. 480-485 - Xingyu Chen, Zexi Xing, Bishwodeep Karki, Yimin Li, Zhengxin Chen:
Blockchain Simulation: A Web Application for IT Education. 486-491 - Muhammad Ali Arshad
, Zhiqiu Huang, Adnan Riaz
, Yasir Hussain:
Deep Learning-Based Resolution Prediction of Software Enhancement Reports. 492-499 - Swapna Gottipati, Kyong Jin Shim
, Hui Hian Teo, Karthik Nityan, Shreyansh Shivam:
Analyzing Tweets on New Norm: Work from Home during COVID-19 Outbreak. 500-507 - William Singleton, Mohamed El-Sharkawy:
Effect of Absolute Cosine Value Regularization on VGG-19. 508-516 - Saeed Ahmadian, Saba Ebrahimi, Heidar Malki:
Bayesian Time-Series Analysis to Predict Real-Time Smart Grid Energy Price Uncertainty. 517-523 - Priyank Kalgaonkar
, Mohamed El-Sharkawy:
CondenseNeXt: An Ultra-Efficient Deep Neural Network for Embedded Systems. 524-528 - Jamal Mahboob, Joel Coffman:
A Kubernetes CI/CD Pipeline with Asylo as a Trusted Execution Environment Abstraction Framework. 529-535 - Md. Redwanul Islam, Md. Ishtiaq Kadir, KaziAmena Nasrin, Samia Chowdhury, Tahia Tazin, Mohammad Monirujjaman Khan
:
Online Store for Local Small and Medium Business. 536-541 - Jacob Koch, Wei Hao:
An Empirical Study in Edge Computing Using AWS. 542-549 - Khondoker Aminuzzaman, Md. Junayed Miah, Md. Anisur Rahman, Mohammad Monirujjaman Khan
:
Development of Online Home Sharing Web Application. 550-553 - Osama Ahmed Khashan
:
Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing. 554-559 - Fu-Shiung Hsieh:
Effectiveness of Discrete Particle Swarm Optimization and Binary Differential Evolution for Process Formation. 560-564 - Abdulaziz A. Alsulami
, Saleh Zein-Sabatto:
Resilient Cyber-Security Approach For Aviation Cyber-Physical Systems Protection Against Sensor Spoofing Attacks. 565-571 - Lahiru Welagedara, Janani Harischandra
, Nuwan Jayawardene:
A Review on Edge Intelligence based Collaborative Learning Approaches. 572-577 - Yuan Xing, Yuchen Qian, Wei Shi, Xuejun Liu, Tianchi Zhao, Cristiano Tapparello
:
Deep Learning for Optimized Multiuser OFDMA Energy-efficient Wireless Transmission. 578-584 - Vedant Maniyar, Doina Bein, Marian Sorin Nistor, Stefan Pickl:
Drug Safety Intelligence and Automation. 585-590 - Naheem Olakunle Adesina, Ashok Srivastava, Md Azmot Ullah Khan:
Evaluating the Performances of Memristor, FinFET, and Graphene TFET in VLSI Circuit Design. 591-595 - Amean Al Safi
, Ali S. Al-Khayyat
, Zeyad Aklah
:
FPGA-Based Implementation of MSPWM Utilizing 6-Input LUT for Reference Signal Generation. 597-602 - Benjamin Gooder, Rasib Khan, Paul-Rus Adrian, Kokou Sossoe:
CSRaaS: Composite Service Rendezvous as a Service for IoT-Based Smart Environments. 603-609 - Benjamin Cisneros, Jiani Ye, Chol Hyun Park, Yoohwan Kim:
CoviReader: Using IOTA and QR Code Technology to Control Epidemic Diseases across the US. 610-618 - Kenza Finnaoui, El Hassan Megder, Ouafae Zerouali Ouariti:
Factors Enhancing the Use of Business Intelligence to Support Organizational Learning: A conceptual Model. 619-626 - Rana E. Ahmed
:
A Novel Multi-Hop Routing Protocol for D2D Communications in 5G. 627-630 - Saeed Ahmadian, Saba Ebrahimi, Heidar Malki:
Cyber-security Enhancement of Smart Grid's Substation Using Object's Distance Estimation in Surveillance Cameras. 631-636 - Arash Abbasi, Huaping Liu
:
Novel CNN and Hybrid CNN-LSTM Algorithms for UWB SNR Estimation. 637-641 - Biplab Thapa Magar, Subin Mali, Eman Abdelfattah:
App Success Classification Using Machine Learning Models. 642-647 - Josh Robinson, Scott Kuzdeba:
Novel device detection using RF fingerprints. 648-654 - Sudhir Rao Rupanagudi, Varsha G. Bhat, Bharath Kumar Revana, Jeevitha Gowda Chandramouli
, Sheetal Devegowda, Darshan G, Kaushik Kumaran, Niyatha Malepati, Laveena Manjunath, Shwetha N, Vaishnavi Ramsali, Vandana C. Shekar, Tarun M. V, Yamini Narayan, Sanjay S:
Optic Disk Extraction and Hard Exudate Identification in Fundus Images using Computer Vision and Machine Learning. 655-661 - Shreeja Dahal, Robert Schaeffer, Eman Abdelfattah:
Performance of Different Classification Models on National Coral Reef Monitoring Dataset. 662-666 - Fu-Shiung Hsieh:
Comparison of Two Differential Evolution Approaches for Combinatorial Double Auctions. 667-671 - Tiffany Zhan:
Data Mining of Twitter Retweets: A Visual and Practical Representation. 672-676 - Hani Qusa, Jumana Tarazi:
Cyber-Hero: A Gamification framework for Cyber Security Awareness for High Schools Students. 677-682 - Mowafak Hassan Abdul-Hussin
:
Petri Nets Modelling of Assembly Robots Coordination. 683-688 - Abu Asaduzzaman, Srinivas Jojigiri, Thushar Sabu, Sanath Tailam:
Studying Execution Time and Memory Transfer Time of Image Processing Using GPU Cards. 689-695 - Mowafak Hassan Abdul-Hussin
:
Design Minimum Monitors and Maximally Permissive Supervisors Models of FMS by S4PR-Nets. 696-701 - Deeksha Anniappa, Yoohwan Kim:
Security and Privacy Issues with Virtual Private Voice Assistants. 702-708 - Hitesh Tekchandani, Shrish Verma, Narendra D. Londhe
, Rajiv Ratan Jain, Avani Tiwari:
Severity Assessment of Cervical Lymph Nodes using Modified VGG-Net, and Squeeze and Excitation Concept. 709-714 - Saida Ishak Boushaki, Omar Bendjeghaba, Noureddine Brakta:
Accelerated Modified Sine Cosine Algorithm for Data Clustering. 715-720 - Arash Abbasi, Huaping Liu
:
Novel Cascade CNN Algorithm for UWB Signal Denoising, Compressing, and ToA Estimation. 721-725 - Sven Dominka, Sarah Tabrizi, Michael Mandl, Michael Dübner:
Automotive Feature Coordination based on a Machine-Learning Approach. 726-731 - James Stankowicz
, Scott Kuzdeba:
Unsupervised Emitter Clustering through Deep Manifold Learning. 732-737 - Mahidhar Puligunta, Hayssam El-Razouk:
Performance Analysis of Gaussian Normal Basis GF ($2^{m}$) Serial Multipliers and Inverters. 738-746 - Jason Brown
, Nawin Raj:
Predictive Tracking of a High Capability Malicious UAV. 747-752 - Ge Guo:
A Lightweight Countermeasure to DIS Attack in RPL Routing Protocol. 753-758 - Shahrear Iqbal:
A Study on UAV Operating System Security and Future Research Challenges. 759-765 - Jay Thom, Yash Shah, Shamik Sengupta:
Correlation of Cyber Threat Intelligence Data Across Global Honeypots. 766-772 - Chol Hyun Park, Yoohwan Kim, Ju-Yeon Jo:
A Secure Communication Method for CANBus. 773-778 - Arifur Rahman, Michael Whitlock, Eman Abdelfattah:
Effectiveness of Classifiers to Identify Hand Gestures with Motion Capture Coordinate Markers. 779-784 - Kevin A. Wortman, Nicholas Smith:
CombinoChord: A Guitar Chord Generator App. 785-789 - Abdullah Albadrani, Faisal Alghayadh, Mohamed A. Zohdy, Esam Aloufi, Richard Olawoyin:
Performance and Predicting of Inbound Logistics Processes Using Machine Learning. 790-795 - Kaitlyn Kukula, Denzel Farmer, Jesse Duran, Nishatul Majid, Christie Chatterley
, Jeff Jessing, Yiyan Li
:
Rapid Detection of Bacteria Using Raman Spectroscopy and Deep Learning. 796-799 - Ashish Semwal, Narendra D. Londhe
:
S-PANET: A Shallow Convolutional Neural Network for Pain Severity Assessment in Uncontrolled Environment. 800-806 - Bambang Susilo
, Riri Fitri Sari:
Intrusion Detection in Software Defined Network Using Deep Learning Approach. 807-812 - Ammar Jamil Odeh, Ismail Mohamed Keshta
, Eman Abdelfattah:
Machine LearningTechniquesfor Detection of Website Phishing: A Review for Promises and Challenges. 813-818 - Md Shafiqul Islam
, Md. Moklesur Rahman
, Md. Hafizur Rahman
, Md Robiul Hoque, Arman Kheirati Roonizi, Md. Aktaruzzaman
:
A deep learning-based multi-model ensemble method for eye state recognition from EEG. 819-824 - Patrick Loola Bokonda
, Khadija Ouazzani Touhami, Nissrine Souissi
:
Which Machine Learning method for outbreaks predictions? 825-828 - Agneyi Guha, Abhijit Dasgupta:
Consensus From Distributed Iterative Voting. 829-833 - Joel Varma Dirisam, Doina Bein, Abhishek Verma:
Predictive Analytics of Donors in crowdfunding platforms: A case study on Donorschoose.org. 834-838 - Chunyang Qi, Jie Huang, Xuejing Zhu, Xiaowen Wang:
MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNs. 839-845 - Chuck Easttom, Mo Adda:
Application of the Spectra of Graphs in Network Forensics. 846-852 - Xingwei Liang, Yoohwan Kim:
A Survey on Security Attacks and Solutions in the IoT Network. 853-859 - Chuck Easttom:
On the Use of the SSIM Algorithm for Detecting Intellectual Property Copying in Web Design. 860-864 - Ilker Özçelik
, Anthony Skjellum:
CryptoRevocate: A Cryptographic Accumulator based Distributed Certificate Revocation List. 865-872 - Ratik Ratnakar Shetty, Doina Bein, Marian Sorin Nistor, Stefan Pickl:
Semiotic Recognition System. 873-877 - Colin Jones, Michael Novitzky, Christopher Korpela:
AR/VR Tutorial System for Human-Robot Teaming. 878-882 - Curtis Manore
, Pratheek Manjunath, Dominic M. Larkin:
Performance of Single Board Computers for Vision Processing. 883-889 - You-Chiun Wang, Ren-Xuan Ye:
Credibility-Based Countermeasure Against Slow HTTP DoS Attacks by Using SDN. 890-895 - Marcelo Tsuguio Okano
, Henry de Castro Lobo dos Santos
, Edson Luiz Ursini
, William Honorato
, Rosinei Batista Ribeiro
:
Digital Transformation as an Agent of Change in a Pharmaceutical Industry from the Perspective of Dynamic Capabilities. 896-902 - Uma K. Kesava Pillai, Damian Valles
:
An Initial Deep CNN Design Approach for Identification of Vehicle Color and Type for Amber and Silver Alerts. 903-908 - Purvish Khalpada, Sanjay Garg
:
Simple Automated Narrative Generator (SANG). 909-915 - Arthi Akilandesvari Ramesh, Sai Pavani Nagisetti, Nikhil Sridhar, Kenytt Avery, Doina Bein:
Station-level Demand Prediction for Bike-Sharing System. 916-921 - Yashbir Singh
, S. Deepa, Wathiq Mansoor
, Weichih Hu:
Geometrical evaluation of the Scar in Left ventricle using TDA. 922-925 - Nusrat Jahan, Tasfiqul Ghani, Md. Rasheduzzaman, Yakut Marzan, Sadman Hossain Ridoy, Mohammad Monirujjaman Khan
:
Design and Feasibility Analysis of NSUGT A Machine Learning-Based Mobile Application for Education. 926-929 - Abdullah Mujawib Alashjaee
, Michael A. Haney:
Forensic Requirements Specification for Mobile Device Malware Forensic Models. 930-935 - Sujan Reddy A, Bhawana Rudra:
Evaluation of Recurrent Neural Networks for Detecting Injections in API Requests. 936-941 - Alexander Pagan, Khaled Elleithy
:
A Multi-Layered Defense Approach to Safeguard Against Ransomware. 942-947 - Muhammad Ajmal Khan:
Improving Physical Layer Security of Two-Way Cooperative DF System using Modulation Diversity. 948-953 - Srikanth Tadisetty, Kambiz Ghazinour:
Anonymous Prediction of Mental Illness in Social Media. 954-960 - Jahnavi Kachhia, Kiran George:
EEG-based Image Classification using Machine Learning Algorithms. 961-966 - Nafiz Sadman
, Md. Habibur Rahman, Sumaiya Tasneem, Mohd Ariful Haque, Kishor Datta Gupta
:
Recommend Speciality Doctor from Health Transcription: Ensemble Machine Learning Approach. 967-972 - Esraa Hassan, Habiba Tarek, Mai Hazem, Shaza Bahnacy, Lobna Shaheen, Walaa H. Elashmwai:
Medical Prescription Recognition using Machine Learning. 973-979 - Aya Tarek Elrefai, Mohamed H. Elgazzar, Aliaa N. Khodeir:
Using Artificial Intelligence In Enhancing Banking Services. 980-986 - Thomas Arciuolo, Khaled M. Elleithy
:
Parallel, True Random Number Generator (P-TRNG): Using Parallelism for Fast True Random Number Generation in Hardware. 987-992 - Kyle Moffitt, Umit Karabiyik
, Shinelle Hutchinson, Yung Han Yoon:
Discord Forensics: The Logs Keep Growing. 993-999 - Mohammed Aman Kareem, Shahab Tayeb:
ML-based NIDS to secure RPL from Routing Attacks. 1000-1006 - Kyle Moissinac, David Ramos, Giovanna Rendon, Abdelrahman Elleithy:
Wireless Encryption and WPA2 Weaknesses. 1007-1015 - Christos C. Constantinou, Erricos Michaelides, Ilias Alexopoulos
, Theofylaktos Pieri, Stelios Neophytou, Ioannis Kyriakides, Ehson Abdi, Jerald Reodica, Daniel R. Hayes:
Modeling the Operating Characteristics of IoT for Underwater Sound Classification. 1016-1022 - Jack McShane
, Mandy Douglas
, Kevin Meehan
:
Using a Raspberry Pi to prevent an intoxicated driver from operating a motor vehicle. 1023-1028 - Muhammad Sakib Khan Inan
, Rizwan Hasan
, Fahim Irfan Alam
:
A Hybrid Probabilistic Ensemble based Extreme Gradient Boosting Approach For Breast Cancer Diagnosis. 1029-1035 - Célio Carvalho
, Rui S. Moreira
, José Manuel Torres
:
Data Quality Visual Analysis (DQVA) A tool to process and pinspot raw data irregularities. 1036-1045 - Muhammad Sakib Khan Inan
, Rubaiath E. Ulfath
, Fahim Irfan Alam, Fateha Khanam Bappee, Rizwan Hasan
:
Improved Sampling and Feature Selection to Support Extreme Gradient Boosting For PCOS Diagnosis. 1046-1050 - Urmil Shah, Jonathan Wong, Kiran George:
Classifying Sound Sources Based On Directions Using Audio Visual Stimulus. 1051-1054 - Casimer M. DeCusatis, J. Bavaro, T. Cannistraci, B. Griffin, J. Jenkins, M. Ronan:
Red-blue team exercises for cybersecurity training during a pandemic. 1055-1060 - Sai Medury, Amani Altarawneh, Anthony Skjellum:
Design and Evaluation of Cascading Cuckoo Filters for Zero-False-Positive Membership Services. 1061-1065 - Salma Samy
, Mohamed Azab, Mohamed R. M. Rizk:
Towards a Secured Blockchain-based Smart Grid. 1066-1069 - Jongmin Kim:
Modeling the Tidal Locking Mechanism of the Moon in Function of Inverse-Square Law and Hooke's Law. 1070-1073 - Daniel Alvarez, Yoohwan Kim:
Survey of the Development of Quantum Cryptography and Its Applications. 1074-1080 - Fahad E. Salamh, Umit Karabiyik, Marcus K. Rogers
, Eric T. Matson:
Unmanned Aerial Vehicle Kill Chain: Purple Teaming Tactics. 1081-1087 - Uttam Kumar
, Adly T. Fam:
A Fast Stacker Based on Symmetric Stacking, Multiplexing, and Barrel-Shifting. 1088-1092 - Mohammad Monirujjaman Khan
, Nazifa Tasneem, Yakut Marzan:
'Fastest Finger First - Educational Quiz Buzzer' Using Arduino and Seven Segment Display for Easier Detection of Participants. 1093-1098 - Dara Nyknahad, Wolfgang Bein, Laxmi P. Gewali, Rojin Aslani
:
Multi-Objective Grid Scheduling for Battery Exchange Stations in Battery Consolidation Systems. 1099-1105 - Hailu Belay Kassa, Kevin T. Kornegay, Ebrima N. Ceesay:
Energy Efficient Smart Antenna Beamforming Algorithms for Next-Generation Networks. 1106-1113 - Robert Drehmel
, Markus Hefele:
Precision Power Measurements of FPGA-MPSoCs. 1114-1120 - Xuechen Xie, Yong Jin Daniel Kim:
Precoding for Multi-user MIMO Interference Channel: A Signal Set Separation Problem. 1121-1126 - Zhaohong Wang, Jing Guo:
Peer-to-Peer Assisted Off-Grid Message Dissemination in the Failure of Communication Infrastructures. 1127-1133 - Abdalafatah A. Almahi, Xiaoge Huang, Qianbin Chen:
Task Processing Energy Minimization Based on Hybrid Mode in D2D-Enabled Fog Network. 1134-1138 - Mohammed Rajhi, Hatim Madkhali, Ibrahim Daghriri:
Comparison and Analysis Performance in Topology-Based Routing Protocols in Vehicular Ad-hoc Network (VANET). 1139-1146 - Tasfiqul Ghani, Nusrat Jahan, Md. Rasheduzzaman, Yakut Marzan, Mohammad Monirujjaman Khan
:
Design and Feasibility Analysis of an Artificial Intelligence Based Mobile App for Emergency Ambulance. 1147-1150 - Fardeen Mahbub
, Rashedul Islam, Sayed Abdul Kadir Al-Nahiun, Shouherdho Banerjee Akash, Raja Rashidul Hasan
, Md. Abdur Rahman
:
A Single-Band 28.5GHz Rectangular Microstrip Patch Antenna for 5G Communications Technology. 1151-1156 - Zahraa Hammodi, Ahmed Al Hilli
, Mohanad Al-Ibadi:
Optimal Placement of Single Cluster Head in Wireless Sensor Networks via Clustering. 1157-1160 - Mohammad Rowshan
, Emanuele Viterbo, Rino Micheloni, Alessia Marelli:
Logarithmic Non-uniform Quantization for List Decoding of Polar Codes. 1161-1166 - Muhammad Ajmal Khan:
Improved and Efficient Dual-Hop Relaying System. 1173-1178 - Mohammad Rowshan
, Emanuele Viterbo:
Shifted Pruning for Path Recovery in List Decoding of Polar Codes. 1179-1184 - Fardeen Mahbub
, Shouherdho Banerjee Akash, Sayed Abdul Kadir Al-Nahiun, Rashedul Islam, Raja Rashidul Hasan
, Md. Abdur Rahman
:
Microstrip Patch Antenna for the Applications of WLAN Systems using S-Band. 1185-1189 - Hamed Vahdat-Nejad, Zahra Abbasi-Moud, Seyed Abolfazl Eslami, Wathiq Mansoor
:
Survey on Context-Aware Healthcare Systems. 1190-1196 - Ning Tang, Hao Hu, Feng Xu:
Personalized Safety Instruction Recommendation for construction workers Based on Apriori Algorithm. 1197-1203 - Mirza Mohd Shahriar Maswood, Uzzwal Kumar Dey, Sonia Akter, Md Ashif Uddin, Md. Mainul Islam Mamun, Shamima Sultana Sonia, Abdullah G. Alharbi
:
Improving System Performance in Indoor Environment by Designing Femtocell Considering Interference and Mobility Management. 1204-1209 - Felix Zhan:
COVID-19 Case Number Prediction Utilizing Dynamic Clustering With Polynomial Regression. 1210-1214 - Ruchi Bagwe, Rashika Natharani, Kiran George, Anand Panangadan:
Natural Language Controlled Real-Time Object Recognition Framework for Household Robot. 1215-1220 - Tiffany Zhan:
Classification Models of Text: A Comparative Study. 1221-1225 - Muath Obaidat, Nila Singh, George Vergara:
Artificial Intelligence Bias Minimization Via Random Sampling Technique of Adversary Data. 1226-1230 - Hani M. Alnami, Imad Mahgoub
, Hamzah Al Najada:
Highway Accident Severity Prediction for Optimal Resource Allocation of Emergency Vehicles and Personnel. 1231-1238 - Austin Hembree, Andrew Beggs, Tiffany Marshall, Ebrima N. Ceesay:
Decoding Linguistic Ambiguity in Times of Emergency based on Twitter Disaster Datasets. 1239-1244 - Md. Muhaimenur Rahman, Sarnali Basak
:
Identifying User Authentication and Most Frequently Used Region Based on Mouse Movement Data: A Machine Learning Approach. 1245-1250 - Kirandeep Kaur
, Ravibabu Mulaveesala
:
Statistical Post-processing Approaches for Active Infrared Thermography: A Comparative Study. 1251-1255 - Sergei Yelmanov, Yuriy Romanyshyn:
Image Enhancement by Recursive Correction of its Average Brightness. 1256-1262 - Umar Farooq, Amalia N. Miliou:
Channel Equalization for converged OFDM-Based 5G mm-wave A-RoF System at 60 GHz. 1263-1267 - Long Cheng, Yifan Wang, Ruogu Jin, Kangnan Dong, Zhaoqi Wu, Yuanchen Zhao:
Joint Activity Localization and Recognition with Ultra Wideband based on Machine Learning and Compressed Sensing. 1268-1273 - Miray Günay Bulut
, Furkan Nur Deniz:
Computation of Stabilizing Decentralized PI Controllers for Fractional Order TITO (FOTITO) Systems. 1274-1280 - Antonio Carlos Bento
, José Carmino Gomes, Ellen Martins Lopes da Silva, Marcelo Galdino:
An Applayed Survey with ESP8266 Lolin + Shield Base with Nextion Touchscreen Display. 1281-1286 - Abu Asaduzzaman, Abhignan Telakapalli, Fadi N. Sibai
:
Energy Consumption Analyses for Unmanned Aerial Systems used in Disaster Management. 1287-1293 - Fawaz F. Al-Bakri, Salwan Obaid Waheed Khafaji, Hasan H. Ali
, Laheeb Noori Muhi:
Adaptive Model Predictive Control for a TORA System under Initial Axial and angular Position Dispersions. 1294-1299 - Abdulbasit Alaribi, Abbas Elazhari
, Omar A. Zargelin:
PLC Based a Robust Solution for an Urban Area Water System Dilemma. 1300-1305 - Xiaoyuan Suo, Olga Glebova, David Liu
, Alina Lazar, Doina Bein:
A Survey of Teaching PDC Content in Undergraduate Curriculum. 1306-1312 - Gan Luo, Zhi-guo Zhang:
Partitioning Mesh for Workload Balance According to the Capability of Each Computing Node. 1313-1318 - Thye Way Phua, Panos Patros, Vimal Kumar
:
Towards Embedding Data Provenance in Files. 1319-1325 - Ryan Michaels, Md Khorrom Khan, Renée C. Bryce:
Test Suite Prioritization with Element and Event Sequences for Android Applications. 1326-1332 - T. H. Indiketiya
:
An Optimum Strategy to Control Peltier Device Cold Side Temperature. 1333-1338 - Yue Chen, Xing Cheng, Yanxin Yao, Bei Wan:
Short Interval Solar Power Prediction for Energy Harvesting with Low Computation Cost on Edge Computation Network. 1339-1342 - Shamganth Kumarapandian
, Qasim Zeeshan Ahmed
:
Performance analysis of double-threshold based multi-relay selection with differential modulation for cooperative D2D network. 1343-1346 - Junaidy B. Sanger, Lanny Sitanayah
, Imam Ahmad
:
A Sensor-based Garbage Gas Detection System. 1347-1353 - Fereshteh Atri Niasar, Mohammad Jalilvand Aghdam, Mohammad Nabipour, Amir Momen:
Mobility management in HetNets consider on QOS and improve Throughput. 1354-1359 - Hadeel S. Abed, Hikmat N. Abdullah
:
Modified Gram Schmidt Based Chaotic Matrix for Compressive Sensing in Cognitive Radio. 1360-1365 - Samia Achouch
, Lhoussaine Masmoudi
, Pierre Nonnon, Mourad Gharbi:
3D printed capacitive relative pressure sensor for use in a CAE environment. 1366-1369 - Sudarshan S. Chawathe:
Data Structures for Ordered Short Character-Sequences. 1370-1376 - Yash Verma, Shahab Tayeb:
Evaluation of Machine Learning Architectures in Healthcare. 1377-1382 - Washington Velasquez
, Luis Tobar-Andrade, Ivan Cedeno-Campoverde:
Monitoring and Data Processing Architecture using the FIWARE Platform for a Renewable Energy Systems. 1383-1387 - Kasra Goravanchi, Ju-Yeon Jo, Yoohwan Kim:
A Divide and Conquer method with Semi-Global Failover for Software Defined Networks. 1388-1397 - David Hughes, Hao Ji:
Enhancing Object Detection Using Synthetic Examples. 1398-1402 - Usman Ashraf, M. Tariq Iqbal:
An open source SCADA for a solar water pumping system designed for Pakistani Conditions. 1403-1408 - Minh Tri Tran
, Anna Kuwana, Haruo Kobayashi:
Study of Helix Functions and Multi-Source Rauch Filters. 1409-1416 - Mazen Gazzan, Abdullah Alqahtani, Frederick T. Sheldon:
Key Factors Influencing the Rise of Current Ransomware Attacks on Industrial Control Systems. 1417-1422 - Tao Yu, Shunya Imada, Kiyomichi Araki, Kei Sakaguchi:
Multi-UAV Full-Duplex Communication Systems for Joint Video Transmission and Flight Control. 1423-1428 - Elif Tasdemir, Christopher Lehmann, Frank H. P. Fitzek
:
Joint Application of Sliding Window and Full-Vector RLNC for Vehicular Platooning. 1429-1435 - Aybike Üstündag
, Çetin Gençer:
Designing the Clamp System with the Emergency Braking System in the trains by using PLC and SCADA. 1436-1441 - Mirza Mohd Shahriar Maswood, Uzzwal Kumar Dey, Md Ashif Uddin, Amit Kumar Ghosh, Md. Mainul Islam Mamun, Shamima Sultana Sonia, Abdullah G. Alharbi
:
A Novel Approach to Design the Cell of LTE Cellular Network to Improve the Call Quality and Coverage Area in Rural and Suburban Area. 1442-1447 - Pramod Muttigarahalli Shankarappa, Ambar Bajpai:
Automatic Traffic Density Control System with Wireless Speed Limit Notification. 1448-1452 - Muhammad I. Khalil:
Delay and Energy Balance for Unmanned Aerial Vehicle Networks. 1453-1458 - Riken Parekh, Urmil Shah, Kiran George:
Experimental Study on 3D Fractal Base Antennas Design for Efficient Wi-Fi Energy Harvesting. 1459-1463 - Jon Speer, Jukka K. Nurminen
:
Program Equivalence Checking for the Facilitation of Quantum Offloading. 1464-1470 - Maruli Tua Baja Sihotang, Muhammad Imam Nashiruddin
, Muhammad Ary Murti:
Planning for NB-IoT Smart City Network Deployment in Bandung Areas. 1471-1477 - Nathan Kuhlman, Cheol-Hong Min:
Analysis and Classification of Basketball Shooting Form Using Wearable Sensor Systems. 1478-1482 - Abdelrahamn Ashraf Mohamed, Marwan Mohamed Nagah, Mohamed Gamal Abdelmonem, Mohamed Yasser Ahmed, Mahmoud El-Sahhar, Fatma Helmy Ismail:
Face Liveness Detection Using a sequential CNN technique. 1483-1488 - Sven Dominka, Henrik Smith, Benjamin Hartmann:
Artificial Neural Networks for (Automotive) Embedded Control - A Comparative Study. 1489-1494 - Alex Eayrs, Cheol-Hong Min:
Detection of High Germ Spreading Activities. 1495-1500 - Pathan Faisal Khan, Kevin Meehan
:
Diabetes prognosis using white-box machine learning framework for interpretability of results. 1501-1506 - Shahrukh Khan Kasi, Saptarshi Das, Subir Biswas:
TCP Congestion Control with Multiagent Reinforcement and Transfer Learning. 1507-1513 - Weimin Deng, Da Xu, Yuhan Xu, Mengshi Li:
Detection and Classification of Power Quality Disturbances Using Variational Mode Decomposition and Convolutional Neural Networks. 1514-1518 - Yuelong Wu, Jintian Lu, Yunyi Zhang, Shuyuan Jin:
Vulnerability Detection in C/C++ Source Code With Graph Representation Learning. 1519-1524 - Jeffrey Hajewski, Suely Oliveira
, David E. Stewart
, Laura Weiler:
Exploring Trade-offs in Parallel Beam-ACO. 1525-1534 - Ahmed Samir, Fairuz Soufy, Omar Ehab, Sara Hassan, Lobna Shaheen, Ashraf AbdelRaouf, Nourhan Elsamanodie, Omar Eldemerdash
, Rawan AL-Kady
, Lamiaa N. Hammad, Mohamed H. Shahin:
A new approach for detection Alzheimer's Disease with machine learning using Whole Genomic and Single Nucleotide Polymorphism-Chip data. 1535-1540 - Jeffrey Hajewski, Suely Oliveira
:
Efficient Evolution of Variational Autoencoders. 1541-1550 - Indrajit Pandey, Atanu Panda, Parijat Bhowmick:
Kalman Filter and its Application on Tuning PI Controller Parameters. 1551-1556 - Mummadi Swathi
, Bhawana Rudra:
Implementation of Reversible Logic Gates with Quantum Gates. 1557-1563 - Casimer M. DeCusatis, Emily Mcgettrick:
Near term implementation of Shor's Algorithm using Qiskit. 1564-1568 - Mohammad Amzad Hossain
, Michael Schukat
, Enda Barrett:
A Reliable Energy and Spectral Efficient Spectrum Sensing Approach for Cognitive Radio Based IoT Networks. 1569-1576 - Sameer Chouksey, Hariram Selvamurugan Satheesh, Johan Åkerberg:
An Experimental Study of TSN-NonTSN Coexistence. 1577-1584 - Akhilesh S. P. Khope, Roger J. Helkey, Songtao Liu, Adel A. M. Saleh, Rod C. Alferness, John E. Bowers:
A Scalable Multicast Hybrid Broadband Crossbar Wavelength Selective Switch For Datacenters. 1585-1587 - Fredy Francis, Rathinam Manivasakan:
Noise Evolution and Analysis of long Repeated/Regenerated IMDD Links. 1588-1593

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.