


default search action
12th CCWC 2022: Las Vegas, NV, USA
- 12th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2022, Las Vegas, NV, USA, January 26-29, 2022. IEEE 2022, ISBN 978-1-6654-8303-2

- Fu-Shiung Hsieh:

Robust Supervisory Control for Cyber-Physical Systems based on Discrete Timed Petri nets. 1-6 - Mustafa Al-Fayoumi

, Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Tareq AlHajahjeh
, Rana Abdulraheem:
Email phishing detection based on naïve Bayes, Random Forests, and SVM classifications: A comparative study. 7-11 - Albert H. Carlson, Shivanjali Khare, Indira Kalyan Dutta, Bhaskar Ghosh, Michael W. Totaro:

Space Selection and Abstraction in Set Theoretic Estimation. 12-20 - Brendan P. Beauchamp, Samhita Rhodes, Nabeeh Kandalaft:

Coherence of Hand Muscles During Activities of Daily Living. 21-24 - Md. Rasel Hossain, Md. Mahbubur Rahman

, Mohammad Rezaul Karim, Md. Jaki Al Amin, Chinmay Bepery:
Determination of 3D Coordinates of Objects from Image with Deep Learning Model. 25-30 - Md. Julhas Hossain

, Md. Amdadul Bari, Mohammad Monirujjaman Khan:
Development of an IoT Based Health Monitoring System for e-Health. 31-37 - Aubee T. Mahusay, Senen D. Fenomeno:

Electricity Consumption Prediction Model for Southern Luzon State University-Main Campus Using Artificial Neural Network. 38-44 - David Shilane:

Automated Feature Reduction in Machine Learning. 45-49 - Dalton Hensley, Heba Elgazzar

:
Classification of Stroke Victims through Supervised Machine Learning Algorithms and Ensemble Learning. 58-64 - Ammar Jamil Odeh, Ismail Mohamed Keshta, Abobakr Aboshgifa, Eman Abdelfattah:

Privacy and Security in Mobile Health Technologies: Challenges and Concerns. 65-71 - Jay Thom, Nathan Thom, Shamik Sengupta, Emily M. Hand:

Smart Recon: Network Traffic Fingerprinting for IoT Device Identification. 72-79 - Masoud Malekzadeh, Parisa Hajibabaee, Maryam Heidari, Brett Berlin:

Review of Deep Learning Methods for Automated Sleep Staging. 80-86 - Estephanos Jebessa, Kidus Olana, Kidus Getachew, Stuart Isteefanos, Tauheed Khan Mohd:

Analysis of Reinforcement Learning in Autonomous Vehicles. 87-91 - Parisa Hajibabaee, Masoud Malekzadeh, Mohsen Ahmadi, Maryam Heidari, Armin Esmaeilzadeh, Reyhaneh Abdolazimi, James H. Jones Jr.:

Offensive Language Detection on Social Media Based on Text Classification. 92-98 - Adedayo Aribisala, Mohammad S. Khan

, Ghaith Husari:
Feed-Forward Intrusion Detection and Classification on a Smart Grid Network. 99-105 - Nicholas Lee, Dal Hyung Kim:

Real-Time Motion Tracking System and Data Analytics for Live Insects Using Three-Wheeled Servosphere System. 106-111 - Reyhaneh Abdolazimi, Maryam Heidari, Armin Esmaeilzadeh, Hassan Naderi

:
MapReduce Preprocess of Big Graphs for Rapid Connected Components Detection. 112-118 - Raj Mani Shukla, John Cartlidge

:
Challenges Faced by Industries and Their Potential Solutions in Deploying Machine Learning Applications. 119-124 - Jueyang Wang, Shuzhen Li, Edward Agyemang-Duah, Xingyu Feng, Chun Xu, Yuao Ji, Junqiang Liu:

Fine-Grained Chinese Named Entity Recognition Based on MacBERT-Attn-BiLSTM-CRF Model. 125-131 - Rossian V. Perea

, Enrique D. Festijo:
Analysis of the use of Analytics Platform for the Commercial Value of Mud crab Production using Non-parametric Model. 132-137 - Bhargavi Krishnamurthy, Sajjan G. Shiva:

Scalable Hindsight Experience Replay based Q-learning Framework with Explainability for Big Data Applications in Fog Computing. 138-144 - Sashank Sridhar, Sowmya Sanagavarapu:

Interrelating N-gram based Protein Sequences using LSTMs with Parallel Capsule Routing. 145-151 - Yanjun Hu, Xinyi Ju, Zhousheng Ye, Sulaiman Khan, Chengwu Yuan, Qiran Lai, Junqiang Liu:

Early Rumor Detection based on Data Augmentation and Pre-training Transformer. 152-158 - Yashbir Singh

, William Jons, Joseph D. Sobek, John E. Eaton, Bradley J. Erickson, Barrett J. Anderies, Jaidip Jagtap
:
Betti-Number Based Machine-Learning Classifier Frame-work for Predicting the Hepatic Decompensation in Patients with Primary Sclerosing Cholangitis. 159-162 - Shailesh S. Rajput, Yoonsuk Choi:

Handwritten Digit Recognition using Convolution Neural Networks. 163-168 - Dipu Chandra Malo, Md. Mustafizur Rahman, Jahin Mahbub, Mohammad Monirujjaman Khan:

Skin Cancer Detection using Convolutional Neural Network. 169-176 - Yuan Xing

, Charles Carlson, Holly Yuan:
Optimize Path Planning for UAV COVID-19 Test Kits Delivery System by Hybrid Reinforcement Learning. 177-183 - Hiroshi Aoki, Takashi Ozu, Akio Hasegawa, Hiroyuki Yokoyama:

A Study on Application Category Estimation Method Based on Burst Characteristics of Communication. 184-190 - Ricardo Manzano S., Nishith Goel, Marzia Zaman, Rohit Joshi, Kshirasagar Naik:

Design of a Machine Learning Based Intrusion Detection Framework and Methodology for IoT Networks. 191-198 - Özge Yücel Kasap, Duygu Cakir:

Analysis of Transfer Learning Models for Face Mask Detection. 199-202 - Mohammad Sadman Tahsin, Md Jobayer

, Md. Borhan Uddin Antor, Maidul Islam, Fatima Fairuz Raisa, Md. Al Hasan Shaikat
:
Predictive Analysis & Brief Study of Early-Stage Diabetes Using Multiple Classifier Models. 203-207 - Ghilas Aissou, Selma Benouadah, Hassan El Alami, Naima Kaabouch:

Instance-based Supervised Machine Learning Models for Detecting GPS Spoofing Attacks on UAS. 208-214 - Mina Esmail Zadeh Nojoo Kambar

, Armin Esmaeilzadeh, Yoohwan Kim, Kazem Taghva
:
A Survey on Mobile Malware Detection Methods using Machine Learning. 215-221 - Victor Corja, Austin Ryan Crow, Nannan Liu, Ebrima Ceesay:

Bimodal Key Data and Semantic Analysis. 222-228 - Akmal Benhawan, Sureena Matayong

, Chidchanok Choksuchat:
Forecasting Water Inflow for Bang Lang Dam. 229-233 - Aya A. Mostafa

, Sameh A. Salem, Amr E. Mohamed:
The Effect of Singular-Vectors Feature Selection (SVFS) Based Hyper Dimentionality Framework in Ligand-Based Virtual Screening. 234-240 - Sudarshan S. Chawathe:

Predicting Bicycle Package Delivery Demand Using Historical Spatiotemporal Data. 241-247 - Elisa Benetti, Matteo Fracassetti, Gianluca Mazzini:

Case study for Data Center Distributed Monitoring. 248-253 - Ida Sèmévo Tognisse, Jules Degila, Ahmed Dooguy Kora

:
Solutions for Closing Usage Gap in Rural Areas in West Africa. 254-259 - Kevin Matthe Caramancion

:
The Role of User's Native Language in Mis/Disinformation Detection: The Case of English. 260-265 - Mahamat Saleh Adoum Sanoussi

, Xiaohua Chen, George Kofi Agordzo
, Mahamed Lamine Guindo
, Abdullah M. M. A. Al Omari, Boukhari Mahamat Issa:
Detection of Hate Speech Texts Using Machine Learning Algorithm. 266-273 - Armin Esmaeilzadeh, Maryam Heidari, Reyhaneh Abdolazimi, Parisa Hajibabaee, Masoud Malekzadeh:

Efficient Large Scale NLP Feature Engineering with Apache Spark. 274-280 - Tanzir Ul Islam

, Reza Ghasemi, Noman Mohammed:
Privacy-Preserving Federated Learning Model for Healthcare Data. 281-287 - Renato R. Maaliw

, Karen Anne C. Quing, Ace C. Lagman
, Bernard Haber Ugalde, Melvin A. Ballera, Michael Angelo D. Ligayo:
Employability Prediction of Engineering Graduates Using Ensemble Classification Modeling. 288-294 - Dipta Voumick, Sreyasi Sen, Nusher Jamil Kazi, Homaira Islam Parisa, Mohammad Monirujjaman Khan, Priyanka Dixit:

Development A Web Application for Lawyer and Client Virtual Communication. 295-301 - Giang Nguyen Thi Phuong

, Do Thi Bich Tram, Le Thi Anh Hang, LeThi My Nhien, Nguyen Binh Phuong Duy
:
Factors Affecting Vietnamese People's Intention to Buy Health Care Products Online During COVID-19. 302-309 - Aydan Gasimova

, Tala Talaei Khoei, Naima Kaabouch:
A Comparative Analysis of the Ensemble Models for Detecting GPS Spoofing attacks on UAVs. 310-315 - Mohammad Masum, Md. Jobair Hossain Faruk

, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan:
Ransomware Classification and Detection With Machine Learning Algorithms. 316-322 - Abhigya Pote Shrestha, Chen-Hsiang Yu:

ECG Data Analysis with IoT and Machine Learning. 323-327 - Hadjar Ould Slimane, Selma Benouadah, Tala Talaei Khoei, Naima Kaabouch:

A Light Boosting-based ML Model for Detecting Deceptive Jamming Attacks on UAVs. 328-333 - Teckchai Tiong

, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago:
Autonomous Valet Parking with Asynchronous Advantage Actor-Critic Proximal Policy Optimization. 334-340 - Mohammad Rezaul Karim Sujon, Md. Rasel Hossain

, Md. Jaki Al Amin, Chinmay Bepery, Md. Mahbubur Rahman
:
Real-time face mask detection for COVID-19 prevention. 341-346 - Mohd. Istiaq Hossain Junaid, Faisal Hossain, Udyan Saha Upal, Anjana Tameem, Abul Kashim, Ahmed Fahmin

:
Bangla Food Review Sentimental Analysis using Machine Learning. 347-353 - Rana Abdulraheem, Ammar Jamil Odeh, Mustafa Al-Fayoumi

, Ismail Keshta:
Efficient Email phishing detection using Machine learning. 354-358 - Dmitry Prokhorenkov:

Alternative Methodology and Framework for Assessing Differential Privacy Constraints and Consequences From a GDPR Perspective. 359-364 - Akihiko Ushiroyama, Minoru Watanabe, Nobuya Watanabe, Akira Nagoya:

Convolutional neural network implementations using Vitis AI. 365-371 - Saad Abouzahir

, Mohamed Sadik
, Essaid Sabir
:
Lightweight Computer Vision System for Automated Weed Mapping. 372-376 - Tenzin Sherpa, Eman Abdelfattah, Kristin Miyamoto, Tiffany La Torre:

U.S. Wildfire Risks and Prevention. 377-384 - Nguyen Binh Phuong Duy

, Giang Nguyen Thi Phuong
:
Contactless Payments through E-wallets on Mobile Devices in the Context of Covid 19 at VietNam. 385-392 - Giang Nguyen Thi Phuong

, Danh Thi Ngoc Anh, Truong Minh Tuan:
Sentiment Analysis High_School' Feedback for Predicting Career Possibilities. 393-398 - Khan Md. Hasib

, Farhana Rahman, Rashik Hasnat, Md. Golam Rabiul Alam:
A Machine Learning and Explainable AI Approach for Predicting Secondary School Student Performance. 399-405 - Kingsley Udeh, David W. Wanik, Diego Cerrai

, Derek Aguiar
, Emmanouil N. Anagnostou:
Autoregressive Modeling of Utility Customer Outages with Deep Neural Networks. 406-414 - Xiaomei Pi, Xianghong Lin:

An FPGA-based Piecewise Linear Spiking Neuron for Simulating Bursting Behavior. 415-420 - Prithwineel Paul, Soumadip Ghosh:

On Label Languages of Homogeneous Variant of SNPSSP (HSNPSSP). 421-427 - Md Amit Khan, Nafiz Sadman, Kishor Datta Gupta

, Jesan Ahammed Ovi:
Interpretable Learning Model for Lower Dimensional Feature Space: A Case study with Brown Spot Detection in Rice Leaf. 428-434 - Christopher G. Estonilo, Enrique D. Festijo:

Evaluation of the Deep Learning-Based m-Health Application Using Mobile App Development and Assessment Guide. 435-440 - Mohammad Affan Khalil, Maria Ramirez, Kiran George:

Using EEG and fNIRS Signals as Polygraph. 441-445 - Tanvir Anjum, Tanzil Ebad Chowdhury, Shadman Sakib

, Shafkat Kibria:
Performance Analysis of Convolutional Neural Network Architectures for the Identification of COVID-19 from Chest X-ray Images. 446-452 - Georgios Symeonidis

, Evangelos Nerantzis
, Apostolos Kazakis, George A. Papakostas:
MLOps - Definitions, Tools and Challenges. 453-460 - Ria Rahmawati, Rachmadita Andreswari, Rokhman Fauzi

:
Analysis and Exploratory of Lecture Preparation Process to Improve the Conformance using Process Mining. 461-466 - Swetha Gottipati, Debashis Guha:

Analysing Tweets on COVID-19 Vaccine: A Text Mining Approach. 467-474 - Brian Song, Jeongkyu Lee:

Detection of Northern Corn Leaf Blight Disease in Real Environment Using Optimized YOLOv3. 475-480 - Shereen Ismail

, Diana Dawoud, Hassan Reza:
A Lightweight Multilayer Machine Learning Detection System for Cyber-attacks in WSN. 481-486 - Md Khorrom Khan, Renée C. Bryce:

Android GUI Test Generation with SARSA. 487-493 - Epie F. Custodio

, Alexander A. Hernandez
:
Performance Analysis of Deep Learning Architectures in Classifying Calamansi (Citrofortunella microcarpa). 494-500 - Zhaoxu Li, Sheng Liu, Jue Bai, Chenglei Peng, Yang Li, Sidan Du:

A Novel Skeleton-based Model with Spine for 3D Human Pose Estimation. 501-506 - Yuan Xing

, Riley Young, Giaolong Nguyen, Maxwell Lefebvre, Tianchi Zhao, Haowen Pan:
Optimize Mobile Wireless Power Transfer by Finite State Machine Reinforcement Learning. 507-512 - Chunlan Gao, Yanqing Zhang, Dan Lo, Yong Shi, Jian Huang:

Improving the Machine Learning Prediction Accuracy with Clustering Discretization. 513-517 - Karthik Sivarama Krishnan

, Koushik Sivarama Krishnan
:
Benchmarking Conventional Vision Models on Neuromorphic Fall Detection and Action Recognition Dataset. 518-523 - Shereen Ismail

, Diana W. Dawoud:
Software Development Models for IoT. 524-530 - Levent Dane, Deniz Gurkan:

Measuring Consistency Metric for Web Applications. 531-537 - Nazifa Tasneem

, Md Anik Hasan, Yakut Marzan, Mohammad Monirujjaman Khan:
My Diary: A Web Application to Accumulate Necessary Files. 538-544 - Francis Liri, Abel Desoto, Wendy Catalan, Kiran George, Kenneth Faller, Julia Drouin:

Monitoring Audio Training Learning Outcomes with EEG Data. 545-551 - Abhishek Das, J. Tarun Gupta, N. Sanketh Reddy, Phalachandra Hallymysore:

Optimizing constraint driven container orchestration policies in a cloud environment. 552-560 - Ajan Ahmed, Mohammad Monirujjaman Khan:

Development of Smart Telemedicine System. 561-567 - Md Ashif Uddin, Uzzwal Kumar Dey, Shamama Ahmed Tonima, Toriqul Islam Tusher:

An IoT-Based Cloud Solution for Intelligent Integrated Rice-Fish Farming Using Wireless Sensor Networks and Sensing Meteorological Parameters. 568-573 - Nahid Ameer Makhdoomi, Teddy Surya Gunawan, Nur Hanani Idris, Othman Omran Khalifa

, Rajandra Kumar Karupiah, Arif Bramantoro
, Farah Diyana Abdul Rahman, Zamzuri Zakaria:
Development of Scoliotic Spine Severity Detection using Deep Learning Algorithms. 574-579 - Ellen Ketola, Christopher Lloyd, Dylan Shuhart, Josiah Schmidt, Raigan Morenz, Abul Khondker, Masudul Haider Imtiaz:

Lessons Learned from the Initial Development of a Brain Controlled Assistive Device. 580-585 - Silafu Yiliyaer, Yoohwan Kim:

Secure Access Service Edge: A Zero Trust Based Framework For Accessing Data Securely. 586-591 - Tyler Gizinski, Xiang Cao:

Design, Implementation and Performance of an Edge Computing Prototype Using Raspberry Pis. 592-601 - Xiang Cao:

Goals and Solutions of Data Allocation in Data Center. 602-607 - Sakik Al Sajid, Syeda Natasha Nafreen, Al Amin Sogah, Md Ferdous Alam, Mohammad Monirujjaman Khan:

Cloud-Based Produce Market for Independent Farmers, Grocers, and Retailers. 608-612 - Amit Bhatia, Josh Robinson, Joseph M. Carmack, Scott Kuzdeba:

FPGA Implementation of Radio Frequency Neural Networks. 613-618 - Sotirios Ch. Diamantas, Prithviraj Dasgupta:

Optical Flow-Based Place Recognition: Bridging the Gap Between Simulation and Real-World Experiments. 619-624 - Amin Sahba, Ramin Sahba:

An Intelligent System for Safely Managing Traffic Flow of Connected Autonomous Vehicles at Multilane Intersections in Smart Cities. 625-631 - Abhigna L. Shastry, Devika S. Nair, B. Prathima, C. P. Ramya, Phalachandra Hallymysore:

Approaches for migrating non cloud-native applications to the cloud. 632-638 - Guillermo Sanchez-Guzman

, Washington Velasquez
, Manuel S. Alvarez-Alvarado:
Modeling a simulated Forest to get Burning Times of Tree Species using a Digital Twin. 639-643 - Chuck Easttom, Izzat Alsmadi:

A Comparitive Study of Machine Learning Algorithms for Identifying Mental States from EEG Recordings. 644-648 - Kavyashree Puttananjegowda, Majdi M. Ababneh, Sylvia Thomas:

The Design of High Efficiency Voltage Mode Integrated Converter for Glucose Monitoring Systems. 649-653 - Chuck Easttom:

NTRU and LASH for a Quantum Resistant Blockchain. 654-658 - Fariz Ardin Adhiyaksa, Moh. Muzayyin Amrulloh

, Tanzilal Mustaqim, Hilya Tsaniya
, Hudan Studiawan
, Ary Mazharuddin Shiddiqi
:
Reversible Audio Data Hiding using Samples Greatest Common Factor and Audio Interpolation. 659-666 - Singam Bhargav Ram

, Vanga Odelu
:
Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover. 667-672 - Ajan Ahmed, Mohammad Monirujjaman Khan, Rajesh Dey

, Ipseeta Nanda
:
Smart Helmet with Rear View and Accident Detection System for Increased Safety. 673-678 - Rizuwana Parween, Tan Yeh Wen, Mohan Rajesh Elara:

Modelling and Analysis of a Vertical Wall Robot for Ceiling Inspection. 679-687 - Rizuwana Parween, Povendhan Arthanaripalayam Palanisamy, Tan Yeh Wen, Dylan Ng Terntzer, Mohan Rajesh Elara:

Estimation of Sloshing Motion in a Wheel-based Drain Inspection Robot. 688-693 - Blas Molina Calatayud, Liam Meany:

A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices. 694-701 - Ben Lupton, Mackenzie Zappe, Jay Thom, Shamik Sengupta, Dave Feil-Seifer

:
Analysis and Prevention of Security Vulnerabilities in a Smart City. 702-708 - Thomas F. Watson, Kutub Thakur, Md Liakat Ali:

The Impact of Purchasing Cyber Insurance on the Enhancement of Operational Cyber Risk Mitigation of U.S. Banks - A Case Study. 709-715 - Mohamed ElBeltagy, Wassim Alexan

, Abdelrahman Elkhamry, Mohamed Moustafa
, Hisham H. Hussein
:
Image Encryption Through Rössler System, PRNG S-Box and Recamán's Sequence. 716-722 - Lamara Ferreira

, Marcelo Tsuguio Okano
, Fernanda Aguiar, Henry de Castro Lobo dos Santos
, Edson Luiz Ursini
:
A panorama of the implementation of the General Law for the Protection of Personal Data (LGPD) in Brazil: an exploratory survey. 723-729 - Mahbub Ul Alam, Muhammad Abul Kalam Azad

, Md. Showkat Ali:
Best Practices to Secure API Implementations in Core Banking System (CBS) in Banks. 730-735 - Abrarul Hassan Rahat, Mamunur Rashid Rumon, Tassnim Jaman Joti, Humayra Tasnin, Tania Akter, Arif Shakil, Md. Iqbal Hossain:

Blockchain Based Secured Multipurpose Identity (SMID) Management System for Smart Cities. 737-744 - Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:

Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files. 745-751 - Junyan Liang, Yoohwan Kim:

Evolution of Firewalls: Toward Securer Network Using Next Generation Firewall. 752-759 - Casimer M. DeCusatis, Patrick Peko, Jordan Irving, Maxwell Teache, Christopher Laibach, Jason Hodge:

A Framework for Open Source Intelligence Penetration Testing of Virtual Health Care Systems. 760-764 - Casimer M. DeCusatis, Brian Gormanly

, Erin Alvarico, Omar Dirahoui, J. McDonough, B. Sprague, M. Maloney, D. Avitable, B. Mah:
A Cybersecurity Awareness Escape Room using Gamification Design Principles. 765-770 - Muhammad Ajmal Khan, Firas Hassan, Rhys Davies:

Physical Layer Security Improvement of Dual-Hop Dual-Relay Network Using Signal Space Diversity. 771-775 - Mathew David Salcedo, Mehdi Abid, Yoohwan Kim, Ju-Yeon Jo:

Evil-Twin Browsers: Using Open-Source Code to Clone Browsers for Malicious Purposes. 776-784 - Ki Chan

, Yoohwan Kim, Ju-Yeon Jo:
DER Communication Networks and Their Security Issues. 785-790 - Samuel Black

, Yoohwan Kim:
An Overview on Detection and Prevention of Application Layer DDoS Attacks. 791-800 - Aliyu Tanko Ali, Damas P. Gruska

:
States of Attack Under Incomplete Information. 801-807 - Oleksii Podoliaka, Virginia Mushkatblat, Adam Kaplan:

Privacy Attacks Based on Correlation of Dataset Identifiers: Assessing the Risk. 808-815 - Zuhair Alqarni:

Improved Control Strategy for 4 WD Electric Vehicle Using Direct Torque Control Technique with Space Vector Modulation. 816-822 - Raihana Yarzada, Divya Singh, Hussain Al-Asaad:

A Brief Survey of Fault Tolerant Techniques for Field Programmable Gate Arrays. 823-828 - Teckchai Tiong

, Kiing-Ing Wong, Wei Kitt Wong, Ing Ming Chew:
Technoeconomic Analysis for Microgrid Renewable Energy with Battery and Hydrogen Storage. 829-835 - Utpal Kumar Dey, Robert Akl, Robin Chataut

:
Throughput Improvement in Vehicular Communication by Using Low Density Parity Check (LDPC) Code. 836-843 - Omar Almesbahi

, Abdullah Alqadhi
, Mahmood Almesbahi
:
Achieving High Gain Performance for 5G Millimeter-Wave Transmission with Large Communication Transmission Loss. 844-850 - Irene L. Balmes, Riva Mae P. Alejandro, Jose Miguel L. Gamo, Angelu Merry T. Ilagan:

PARADA: Parking Space Rental and Leasing Application System. 851-856 - Md. Abdul Kader Jilani, Md. Arman Hossain, Farzana Yeasmin Lamia, Md. Afzalur Rahman

, Adiba Haque Sharker, Md. Rezwanul Ahsan:
Design of 2*1 Patch Array Antenna for 5G Communications Systems using mm-wave Frequency Band. 857-862 - Aymen I. Zreikat

:
Load balancing call admission control algorithm (CACA) based on soft-handover in 5G Networks. 863-869 - Sandhya Hizrian Sabila, I Wayan Mustika, Selo Sulistyo:

Design and Implementation of Mobile Applications for Military Personnel Based on SIP (Session Initiation Protocol). 870-875 - Putri Rahmawati

, Muhammad Imam Nashiruddin, Ahmad Tri Hanuranto
, Akhmad Akhmad:
Assessing 3.5 GHz Frequency for 5G New Radio (NR) Implementation in Indonesia's Urban Area. 876-882 - Muhammad Adam Nugraha, Muhammad Imam Nashiruddin, Ahmad Tri Hanuranto

, Akhmad Akhmad:
Simulation of 5G Dense-Urban Deployment at 3.5 GHz Frequency: A Case Study of Central Jakarta. 883-888 - Randy Verdecia-Peña

, José I. Alonso:
Simulation and Experimental Study of a Power Amplifier Behaviour to Enhance Relay Node Co-operative SDR Platform: Performance Analysis. 889-894 - Chol Hyun Park, Phillipe Austria

, Yoohwan Kim, Ju-Yeon Jo:
MPTCP Performance Simulation in Multiple LEO Satellite Environment. 895-899 - Ruizhe Ma, Chong Tan, Hong Liu, Min Zheng:

Message Parsing Based on Structure Description in IoT for Electric Power and Energy Systems. 900-906 - Ambar Prajapati:

Reliable Multicast of Dynamic Content Streams from AMQP to NORM Protocol-based Systems. 907-914 - Christopher Martin, Yanyan Li:

A Scalable Self-Learning Chatbot for Classroom. 915-921 - Nobuo Suzuki, Tatsuya Yoshioka, Akio Hasegawa, Hiroyuki Yokoyama, Toshiyuki Maeyama:

Implementation and evaluation of spectrum sharing technology using smart contracts. 922-928 - Richard Kyung, Daniel Seungmin Lee:

Study on the Nano-plasmonics and Plasmonic Materials to Improve Photon Absorption in Optical Devices. 929-932 - Matineh Ghafoorian Eshghi, Zahra Amiri, Morteza Modarresi Asem:

An Investigation of Clinical Laser Applications in Dentistry; a Review and Outlook. 933-942 - Muhammad Ajmal Khan, Rhys Davies, Firas Hassan:

Securing Wireless Signals using Artificial Phase Noise. 943-947 - Mohammad Rahman, Laurent Njilla, Swastik Brahma:

Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans. 948-952 - Pravir Malik

:
The Role of a Light-Based Quantum Computational Model in the Creation of an Oscillating Universe. 953-959 - Great Allan Ong

, Melvin A. Ballera:
A Multi-level Morphological and Stochastic Tagalog Stemming Template. 960-965 - Ricky Djamaluddin, Yudi Priyadi

, Eko Darwiyanto:
User-Centered Design to Improve Personal Development In Comic Application. 966-973 - Muhammad Irsyad Sabiqun Bil Khairat, Yudi Priyadi

, Monterico Adrian:
Usability Measurement in User Interface Design Using Heuristic Evaluation & Severity Rating (Case Study: Mobile TA Application based on MVVM). 974-979 - Haiying Ren, Xinxuan Huang, Xiaoyong Tang:

An Interference Elimination Algorithm for Group Brain-Computer Interface System. 980-982 - Yixin Wang, Xiao Ma:

Rate-Configurable SC-LDGM Codes Concatenated with Zipper Codes for Optical Communication. 983-987 - You-Chiun Wang, Li-Chia Yen:

Collaborative Route Management to Mitigate Congestion in Multi-Domain Networks Using SDN. 988-994 - Gieorgi Zakurdaev, Mohammed Ismail, Chung-Horng Lung:

Dynamic On-Demand Virtual Extensible LAN Tunnels via Software-Defined Wide Area Networks. 995-1000 - Mummadi Swathi

, Bhawana Rudra:
Novel Encoding method for Quantum Error Correction. 1001-1005 - Saqer Alhloul, Uri Rogers:

An Empirical Model for 1-D Molecular Communication Diffusive Channels Under Reflecting and Absorbing Boundary Conditions. 1006-1010 - Hasna Hanifah Suranto, Titiek Suryani:

Performance Analysis of Filter Bank Multicarrier with Doppler Effect in Vehicle to Vehicle Communication Channel. 1011-1017 - Sergei Yelmanov, Yuriy Romanyshyn:

Assessing the Information Capacity of Image Based on the Theory of Contrast. 1018-1023 - Maria Ramirez, Shima Kaheh, Mohammad Affan Khalil, Kiran George:

Application of Convolutional Neural Network for Classification of Consumer Preference from Hybrid EEG and FNIRS Signals. 1024-1028 - Peter Stubberud:

Digital IIR Filter Design Using a Differential Evolution Algorithm with Polar Coordinates. 1029-1035 - Sofyan Prasetyo, Titiek Suryani:

Implementation of Predistorter for HPA Nonlinearity Mitigation on OQAM FBMC System. 1036-1042 - Ajan Ahmed, H. M. Arifur Rahman, Mohammad Monirujjaman Khan:

Design and Analysis of a Compact Wideband V-Band and W-Band Antenna for Healthcare Applications. 1043-1048 - Stephen Ogbikaya, M. Tariq Iqbal:

Design and sizing of a microgrid system for a University community in Nigeria. 1049-1054 - Kareem Al-Nabulsi, Fadi Odeh, Mohammad Kanaan, Ammar Odeh:

Commiteam: Committee Management System. 1055-1058 - Sheikh Usman Uddin, Tariq Iqbal:

Design and Economic Analysis of Solar Powered Drinking Water Reverse Osmosis Desalination System for a Community in Pakistan. 1059-1064 - Phillipe Austria

, Chol Hyun Park, Ju-Yeon Jo, Yoohwan Kim, Rahul Sundaresan, Khanh D. Pham:
BBR Congestion Control Analysis with Multipath TCP (MPTCP) and Asymmetrical Latency Subflow. 1065-1069 - Amirhossein Jahanfar, M. Tariq Iqbal:

A Comparative Study of Solar Water Pump Storage Systems. 1070-1075 - Adnan Sarwar, M. Tariq Iqbal:

Design and Optimization of Solar PV system for a Fish Farm in Pakistan. 1076-1081 - Tao Yu, Kento Kajiwara, Kiyomichi Araki, Kei Sakaguchi:

Spectrum Sharing between Directional-Antenna-Equipped UAV System and Terrestrial Systems. 1082-1086 - Zengmao Chen, Xianwu Zhao, Li Lu, Rongchen Sun, Zhiguo Sun:

Frequency Hopping Acquisition Based on Variable Forgetting Factor Recursive Least Squares Algorithm. 1087-1091 - Tao Yu, Kiyomichi Araki, Kei Sakaguchi:

Ground Experiment of Full-Duplex Multi-UAV System Enabled by Directional Antennas. 1092-1097 - Tetsuki Taniguchi, Takeo Fujii:

Power Control in Local 5G/Beyond Systems Utilizing Spectrum Database and Monte Carlo Stochastic Programming. 1098-1104 - Mobasshir Mahbub, Raed M. Shubair, Bobby Barua:

Joint Analysis of Success and Outage Probability in 5G Multi-Tier Heterogeneous Network. 1105-1111 - Ahmed Hassebo:

The Road to 6G, Vision, Drivers, Trends, and Challenges. 1112-1116 - A. F. M. Shahen Shah

:
A Survey From 1G to 5G Including the Advent of 6G: Architectures, Multiple Access Techniques, and Emerging Technologies. 1117-1123 - Sana Rekik, Nouha Baccour, Mohamed Jmaiel:

Limitations of static autonomous scheduling for TSCH protocol and advances in adaptive scheduling. 1124-1129 - Haytham Elmiligi, Sherif Saad:

Predicting the Outcome of Soccer Matches Using Machine Learning and Statistical Analysis. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














