default search action
13th CCWC 2023: Las Vegas, NV, USA
- 13th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2023, Las Vegas, NV, USA, March 8-11, 2023. IEEE 2023, ISBN 979-8-3503-3286-5
- David Shilane:
A Coding Translation to Increase the Efficiency of Programmatic Data Analyses. 1-4 - Takako Hoshiyama:
MGM for Aggregated General Distribution Queuing System in discrete time. 5-8 - Ismail Jouny:
Radar Target Identification Using Multiclass Sparse Centroids. 9-13 - Dale H. Mugler:
Parallel Computing of the FFT and of Spectral Filtering with Few to No Complex-Valued Operations. 14-21 - Georgia Tzitziou, Asimina Dimara, Alexios Papaioannou, Stelios Krinidis, Christos-Nikolaos Anagnostopoulos, Dimosthenis Ioannidis, Dimitrios Tzovaras:
Is the residential sector ready for prescriptive maintenance? A short analysis. 22-28 - Redha M. Radaydeh:
Distributed D2D Resource Allocation for Reducing Interference in Ultra-Dense Networks With Generic Imperfection. 29-34 - Seshariana Rahma Melati, Leanna Vidya Yovita, Ratna Mayasari:
Performance analysis of self-learning forwarding algorithms for Vehicle-to-Vehicle networks on Named Data Networking (NDN). 35-40 - Lohith Kumar, Debajit Choudhury, Anwesh Reddy Paduri, Senthil Kumar, Devashis Sahoo, Jalaja Murthy, Narayana Darapaneni:
Electric Vehicle (EV) Preventive Diagnostic System: Solution for Thermal Management of Battery packs using AIOT. 41-46 - Ashish Jain, Sakthivel Durairaj, Anwesh Reddy Paduri, Praveen Krishnan, Pramod Chalaiah, Jaideep Chanda, Narayana Darapaneni:
Career Support Platform for Older Adults Powered by AI. 47-53 - Prithwineel Paul, Soumadip Ghosh, Arpita Mandal:
Watson-Crick grammar and its label languages. 54-60 - Mohammad Safayet Hossain, Marwan A. Simaan:
Investigating the Performance of Steepest Descent, Newton-Raphson, and Fletcher-Reeves Approaches in Unconstrained Minimization Problems. 61-68 - Sudiksha Das:
A Smart Solution to Identify an Efficient Delivery Route Involving Several Destinations and Drivers. 69-73 - Youxuan Zhong, Chun Yuan, Yi Zou, Heng Yao:
Face Recognition Based on Point Cloud Data Captured by Low-cost mmWave Radar Sensors. 74-83 - Teckchai Tiong, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago:
Autonomous Vehicle Driving Path Control with Deep Reinforcement Learning. 84-92 - Teckchai Tiong, Ismail Saad, Kenneth Tze Kin Teo, Herwansyah Bin Lago:
Process Proportional-Integral PI Control with Deep Reinforcement Learning. 93-101 - Minh Nguyen, Tauheed Khan Mohd:
Reinforcement Learning for a Raspberry Pi Smart Car for Lane Detection Using OpenCV. 102-107 - Shabbab Algamdi, Abdullah Albanyan, Stephanie Ludi:
Investigating The Usability Issues In Mobile Applications Reviews Using A Deep Learning Model. 108-113 - Samih Fadli, Bharat S. Rawal:
Hybrid Quantum-Classical Machine Learning for Near Real-time Space to Ground Communication of ISS Lightning Imaging Sensor Data. 114-122 - Raghubir Singh, Neeraj Kumar:
Optimizing Edge-Cloud Synergy for Big Data Analytics. 123-128 - Kevin Matthe Caramancion:
The Link Between a User's Religion and Mis/Disinformation Vulnerability. 129-133 - William Downing, Dalton Harvey, Dennis Wagura, Yong Shi:
Blockchain Development in Colab: An Ethereum-Based Bicycle Registry System. 134-139 - Qi Zhang, James Brokaw:
Multi-Source Pandemic Data Visualization and Synchronization for Information Extraction. 140-146 - Ankur Chattopadhyay, Nahom Beyene, Shohel Rana:
Analyzing Multimodal Datasets for Detecting Online COVID Misinformation: A Preliminary Survey Study. 147-153 - Javier de la Cruz, Janson Law, Nii-Kwame Oteng-Quarshie, Kiran George:
EEG and fNIRS Analysis to Determine Acute Stress Resulting From Reaction Time Tests. 154-159 - Austin Nguyen, Rong Jin:
Using Reinforcement Learning to Train Generative Adversarial Networks for Image Generation. 160-167 - Renato R. Maaliw, Zoren P. Mabunga, Maria Rossana D. de Veluz, Alvin Sarraga Alon, Ace C. Lagman, Manuel Bautista Garcia, Luisito Lolong Lacatan, Rhowel M. Dellosa:
An Enhanced Segmentation and Deep Learning Architecture for Early Diabetic Retinopathy Detection. 168-175 - Paul Whitten, Francis G. Wolff, Christos A. Papachristou:
Explainable Neural Network Recognition of Handwritten Characters. 176-182 - Otman Hijazi, Kawtar Tikito, Khadija Ouazzani Touhami:
A systematic review on artificial intelligence models applied to prediction in finance. 183-188 - Mohammad Affan Khalil, Johnny Can, Kiran George:
Deep Learning Applications in Brain Computer Interface Based Lie Detection. 189-192 - Kazi Atique Moula Nabil, Md. Ariful Islam, Abdullah Al Noman, Mohammad Monirujjaman Khan:
Development of A Smart Non-Invasive Glucose Monitoring System With SpO2 and BPM for Diabetic Patient. 193-197 - Habeeb Shittu, Mahmoud Nabil:
Smart Supply Chain Management with Attribute-Based Encryption Access Control. 198-204 - Dinah Wobuyaga, Sisay T. Arzo, Harsh Kumar, Fabrizio Granelli, Michael Devetsikiotis:
Latency and Reliability Aware SDN Controller: A Role Delegation Function as a Service. 205-211 - Zuhair Alqarni:
Higher Order Sliding Mode Control for Speed Control of BLDC Motor. 212-217 - Noureddine Chabini, Rachid Beguenane:
FPGA-Based Digital FIR Filters With Small Coefficients and Large Data Input. 218-221 - Md. Jalal Uddin Chowdhury, Ashab Hussan, Dewan Ashraful Islam Hridoy, Abu Sayed Sikder:
Incorporating an Integrated Software System for Stroke Prediction using Machine Learning Algorithms and Artificial Neural Network. 222-228 - Justin M. Bui, Glauco A. Amigo, Robert J. Marks II:
Generatively Augmented Neural Network Watchdog for Image Classification Networks. 229-237 - Cesar Martinez Melgoza, Kiran George, Jake Miho:
Sensor Tracking System using Radar and Object Detection. 238-241 - Cesar Martinez Melgoza, Kiran George, Jake Miho:
Image Segmentation and Anomaly Detection using Doppler Data from Coffee-Can Radar. 242-245 - Hilmi Aziz Bukhori, Rinaldi Munir:
Inductive Link Prediction Banking Fraud Detection System Using Homogeneous Graph-Based Machine Learning Model. 246-251 - Heng-Chih Huang, Chun-Hung Richard Lin, JainShing Liu:
Camera with Artificial Intelligence of Things (AIoT) Technology for Wildlife Camera Trap System. 252-258 - Min Zou, Yoichi Kageyama:
Road Curb Detection Based on a Deep Learning Framework. 259-262 - Moses Njovana:
Design of an Automated, Digital Water Tank Heating System. 263-267 - Richard Kyung, Ian Huh Choi:
Metal-Organic Frameworks and Porphyrins for Water Filtration Using Density Functional Theory. 268-273 - Alejandro Cabrera, Austin Rider, Jennifer Xiong, Hayssam El-Razouk:
Implementing Privacy on Public Digital Displays Using Smart Glasses. 274-279 - Seung-Rae Kim, Richard Kyung:
Study on Modified Public Key Cryptosystem Based on ElGamal and Cramer-Shoup Cryptosystems. 280-284 - Briana Fiore, Kenneth Ha, Loc Huynh, Jared Falcon, Robinson Vendiola, Yanyan Li:
Security Analysis of Ransomware: A Deep Dive into WannaCry and Locky. 285-294 - Dabeeruddin Syed, Abdullah Hussein Al-Ghushami, Ameema Zainab, Shafii Muhammad Abdulhamid, Mohammed Salem Daen A Al-Kuwari:
Information Security using GNU Privacy Guard. 295-300 - Mohammad Reza Ghavidel Aghdam, Reza Abdolee, Behzad Mozaffari Tazehkand, Azadeh Abedi Jirdehi:
Out-of-Band Analysis of GFDM Systems Based on Different Self-Interference Types. 301-305 - You-Chiun Wang, Kingjade Yu:
Adaptive Token Circulation to Avoid Malicious UEs Hoarding Tokens and Assure D2D Relay Efficiency. 306-312 - Ali Abdullah S. AlQahtani, Thamraa Alshayeb:
Zero-Effort Two-Factor Authentication Using Wi-Fi Radio Wave Transmission and Machine Learning. 313-318 - Ali Abdullah S. AlQahtani, Hosam Alamleh:
Optimizing Smart Home Performance and User Convenience with RSSI-based Proximity Detection. 319-325 - Mann Patel, Heba Elgazzar:
Classification of Road Objects Using Convolutional Neural Networks. 326-332 - Ge Guo, Xuefeng Pan, He Liu, Fen Li, Lang Pei, Kewei Hu:
An IoT Intrusion Detection System Based on TON IoT Network Dataset. 333-338 - Alexander Lektorov, Eman Abdelfattah, Shreehar Joshi:
Airbnb Rental Price Prediction Using Machine Learning Models. 339-344 - Eleftherios Batzolis, Eleni Vrochidou, George A. Papakostas:
Machine Learning in Embedded Systems: Limitations, Solutions and Future Challenges. 345-350 - Edward Y. Chang:
Prompting Large Language Models With the Socratic Method. 351-360 - Maram Alsharif, Danda B. Rawat:
Machine Learning Enabled Intrusion Detection for Edge Devices in the Internet of Things. 361-367 - Aakriti Bajracharya, Barron Harvey, Danda B. Rawat:
Recent Advances in Cybersecurity and Fraud Detection in Financial Services: A Survey. 368-374 - Ismail Yesir, Danda B. Rawat:
Recent Advances in Artificial Intelligence Enabled Tutoring Systems: A Survey. 375-381 - Daniel Alonso, Eduardo Alonso, Damian Valles:
Classification Challenges and Analysis of Traffic Patterns for Highly Congested Areas in Central Texas. 382-388 - Curtis Rookard, Anahita Khojandi:
Applying Deep Reinforcement Learning for Detection of Internet-of- Things Cyber Attacks. 389-395 - Hephzibah Rajan, John Burns, Chetan Jaiswal:
IoT Security: AI Blockchaining Solutions and Practices. 396-401 - Barathwaja Subash Chandar, Prashanth Rajagopalan, Prakash Ranganathan:
Short-Term AQI Forecasts using Machine/Deep Learning Models for San Francisco, CA. 402-411 - Sudarshan S. Chawathe:
Pragmatic Domestic Electrical Load Disaggregation. 412-418 - Matthew Horvath, Michael Bowers, Shadi Alawneh:
Canny Edge Detection on GPU using CUDA. 419-425 - Md. Nasimuzzaman, Ahmed Nur Merag, Sumya Afroj, Md. Mustakin Alam, Md. Humaion Kabir Mehedi, Annajiat Alim Rasel:
Consumer review Analysis using NLP and Data Mining. 426-430 - Safwan Shaheer, Ishmam Hossain, Sudipta Nandi Sarna, Md. Humaion Kabir Mehedi, Annajiat Alim Rasel:
Evaluating Question generation models using QA systems and Semantic Textual Similarity. 431-435 - Nafisa Nawer, Md. Shakiful Islam Khan, Md. Mustakin Alam, Md. Humaion Kabir Mehedi, Annajiat Alim Rasel:
Transformation of Visual Information into Bangla Textual Representation. 436-441 - John Eagan, Marc Herdman, Christian Vaughn, Nathaniel Bean, Sarah Kern, Matin Pirouz:
An Efficient Parallel Divide-and-Conquer Algorithm for Generalized Matrix Multiplication. 442-449 - Oluwaseun Adegbehingbe, James H. Jones:
Assessing the Impact of Matched Fragments' Relative Locations on Application Artifact Inference. 450-457 - Md. Atiqur Rahman, Sanjid Islam Chowdhury, Sadid Rafan, Nahian Jannat, Tahsin Aziz:
Informational Query Detection on Social Media Posts in Bengali Language Using Machine Learning And Transfer Learning Techniques. 458-464 - Asai Asaithambi, V. Thamilarasi:
Classification of Lung Chest X-Ray Images Using Deep Learning with Efficient Optimizers. 465-469 - Arisoa S. Randrianasolo:
Predicting EURO Games Using an Ensemble Technique Involving Genetic Algorithms and Machine Learning. 470-475 - Arbnor Imeri, Ondrej Rysavý:
Deep learning for predictive alerting and cyber-attack mitigation. 476-481 - Ammar Raneez, Torin Wirasingha:
A Review On Breaking the Limits of Time Series Forecasting Algorithms. 482-488 - Aditi Singh:
A Comparison Study on AI Language Detector. 489-493 - Abu Kamruzzaman, Kutub Thakur, Sadia Ismat, Md Liakat Ali, Kevin Huang, Hasnain Nizam Thakur:
Social Engineering Incidents and Preventions. 494-498 - Md Liakat Ali, Sadia Ismat, Kutub Thakur, Abu Kamruzzaman, Zijie Lue, Hasnain Nizam Thakur:
Network Packet Sniffing and Defense. 499-503 - Louis B. Rosenberg:
The Metaverse and Conversational AI as a Threat Vector for Targeted Influence. 504-510 - Lidong Wang, Reed L. Mosher, Patti Duett, Terril C. Falls:
Data Analytics of Network Intrusion Based on Deep Neural Networks with Weights Initialized by Stacked Autoencoders and Deep Belief Networks. 511-515 - Kamil Jerábek, Ondrej Rysavý, Ivana Burgetova:
Analysis of Well-Known DNS over HTTPS Resolvers. 516-524 - Marcial Tienteu, Edmund Smith, Edgar Mateos Santillan, Kevin T. Kornegay, Paige Harvey, Otily Toutsop, Tsion Yimer, Vinton Morris, Ketchiozo Wandji:
Template Attack Against AES in Counter Mode With Unknown Initial Counter. 525-533 - Devharsh Trivedi, Vaishnavi Gopalakrishnan, Dharati Dholariya:
MediSearch: Advanced Medical Web Search Engine. 534-540 - Washington Velasquez, Romulo J. Coronel, Anghelo A. Loayza, Vladimir Sanchez Padilla, Margarita Filian-Gomez:
Mobile App for the information management of pre-existing diseases towards preventing COVID-19 severity. 541-546 - Dupri Grimes, Damian Valles:
Performance Analysis of TensorFlow2 Object Detection API Models for Engineering Site Surveillance Applications. 547-552 - Sabhasachi Saha, Damian Valles:
Forecast Analysis of Visibility for Airport Operations with Deep Learning Techniques. 553-558 - Mushfiqur Rashid Khan, Farhan Fuad, Md. Adnan Ibrahim:
A Gradient Boosting Classifier to Predict Electric Power Consumption by Nuclear Power Plant. 559-565 - Alex Sumarsono, Zachary Masters:
Application of LSTM Auto Encoder in Hardware Trojan Detection. 566-571 - Casimer M. DeCusatis, C. Danyluk, D. MacCarthy, J. Shapiro, N. Regan:
Red Team Ethical Physical Penetration Testing Simulations using Open Source Intelligence. 572-578 - Andrea Barnett, Jing Guo:
Spectral Clustering of Virus Spread through Computer Network. 579-584 - Amber Hankins, Tapadhir Das, Shamik Sengupta, David Feil-Seifer:
Eyes on the Road: A Survey on Cyber Attacks and Defense Solutions for Vehicular Ad-Hoc Networks. 585-592 - Horatiu Lupsan, Remaz Ahmed, Yong Shi:
Cybersecurity in Malware Research. 593-597 - Cole Mckee, Kelsie Edie, Adam Duby:
Activity-Attack Graphs for Intelligence-Informed Threat COA Development. 598-604 - Smit Chandrakant Nayak, Vaibhavi Tiwari, Bharath K. Samanthula:
Review of Ransomware Attacks and a Data Recovery Framework using Autopsy Digital Forensics Platform. 605-611 - Ahmed A. Bahjat, Jim Jones:
File Allocation Chronology and its Impact on Digital Forensics. 612-618 - Washington Velasquez, Melanie Ruiz-Pena, Guillermo Merizalde, Danny Torres, Manuel S. Alvarez-Alvarado:
Automation of Buildings using Sign Interpretation Language to include People with Hearing Disabilities. 619-623 - Niloy Farhan, Ishrat Tasnim Awishi, Md. Humaion Kabir Mehedi, Md. Mustakin Alam, Annajiat Alim Rasel:
Ensemble of Gated Recurrent Unit and Convolutional Neural Network for Sarcasm Detection in Bangla. 624-629 - Md. Humaion Kabir Mehedi, Irfana Arafin, Murad Hasan, Farhin Rahman, Rufaida Tasin, Annajiat Alim Rasel:
A Transfer Learning Approach For Efficient Classification of Waste Materials. 636-640 - Yuan Xing, Abhishek Verma:
Optimize Path Planning for Drone-based Wireless Power Transfer System by Categorized Reinforcement Learning. 641-646 - Razib Hayat Khan, Jonayet Miah, Md Minhazur Rahman, Maliha Tayaba:
A Comparative Study of Machine Learning Algorithms for Detecting Breast Cancer. 647-652 - Mykola Korablyov, Sergey Lutskyy, Ihor Ivanisenko, Oleksandr Fomichov:
System-information rationing of digital twins accuracy. 653-660 - Brett Wiens, Daniel C. Lee:
PAM Constellations Minimizing Symbol-error Probability with Constrained Peak-to-average Power Ratios. 661-667 - Chetan Fadnis, Sonali Chouhan:
Bounds on Pairwise Error Probability for LDPC coded CF-mMIMO System. 668-673 - Nada El-Maradny, Heba A. Shaban, Nour El-Din El-Madany:
Effect of Node Position and Human Activity on BER Performance and Data Throughput in Off-Body Medical Body Area Networks. 674-677 - Ehsan Ashoori, Sylmarie Dávila-Montero, Andrew J. Mason:
Analyzing Affect During Virtual Meetings to Improve Quality of Interaction. 678-681 - Moftah Ali, Raveendra K. Rao, Vijay Parsa:
PAPR Reduction Techniques for MC-CDMA System. 682-689 - Onyinyechukwu Chidolue, Tariq Iqbal:
System Monitoring and Data logging using PLX-DAQ for Solar-Powered Oil Well Pumping. 690-694 - Sandra Nguyen, Doina Bein:
Data Science Analysis of Malicious Advertisements and Threat Detection Automation for Cybersecurity Progress. 695-704 - Rakibul Alam Nahin, Md. Tahmidul Islam, Abrar Kabir, Sadiya Afrin, Imtiaz Ahmed Chowdhury, Rafeed Rahman, Md. Golam Rabiul Alam:
Electroencephalogram-based Emotion Recognition with Hybrid Graph Convolutional Network Model. 705-711 - Shumon Alam, Yasin Alam, Suxia Cui, Cajetan M. Akujuobi:
Unsupervised Network Intrusion Detection Using Convolutional Neural Networks. 712-717 - Nidhi Shah, Kanika Sood, Jayraj Arora:
Speech emotion recognition for psychotherapy: an analysis of traditional machine learning and deep learning techniques. 718-723 - Anna Chiu, Kanika Sood, Ariadne Rincon, Davina Doran:
Detecting Hate Speech on Social Media with Respect to Adolescent Vulnerability. 724-728 - Washington Velasquez, Guillermo Sanchez-Guzman, Freddy Jijon-Veliz, Manuel S. Alvarez-Alvarado:
Wildfire Time Estimation using a Machine Learning Algorithms Interaction Mechanism for Endemic Tree Species Recognition. 729-733 - Lambert Igene, Anika Alim, Masudul H. Imtiaz, Stephanie Schuckers:
A Machine Learning Model for Early Prediction of Parkinson's Disease from Wearable Sensors. 734-737 - Uma Chinta, Jugal Kalita, Adham Atyabi:
Soft Voting Strategy for Multi-Modal Emotion Recognition Using Deep-learning- Facial Images and EEG. 738-745 - Uma Chinta, Adham Atyabi:
A Framework Pipeline to Address Imbalanced Class Distribution Problem in Real-world Datasets. 746-753