


default search action
UEMCON 2016: New York City, NY, USA
- 7th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2016, New York City, NY, USA, October 20-22, 2016. IEEE 2016, ISBN 978-1-5090-1496-5

- Walisa Romsaiyud:

Expectation-maximization algorithm for topic modeling on big data streams. 1-7 - Abhriya Roy, Ronit Ray, Saptarshi De, Shalini Guha, Sukalyan Goswami, Ratan Kumar Basak, Bipasha Mukhopadhyay, Souvik Chatterjee, Amrin Zaman, Sucheta Nag:

RASS - A concurrency based bitwise symmetric key cryptographic algorithm. 1-6 - Hussein A. Al-Barazanchi, Hussam Qassim, Abhishek Verma

:
Novel CNN architecture with residual learning and deep supervision for large-scale scene image categorization. 1-7 - Cristian Fosalau, Cristian Zet, Daniel Petrisor:

Implementation of a landslide monitoring system as a wireless sensor network. 1-6 - Sarra Hammoudi, Abdelhafid Benaouda, Saad Harous

, Zibouda Aliouat
:
Load balancing in the cloud using specialization. 1-7 - Octavio Castillo Reyes

, Josep de la Puente
, José María Cela
:
Improving edge finite element assembly for geophysical electromagnetic modelling on shared-memory architectures. 1-6 - Muhammad Fahim Uddin:

A framework to identify educational relevance in social networking posts. 1-8 - Anirudh Paranjothi

, Mohammad S. Khan
, Mais Nijim, Rajab Challoo:
MAvanet: Message authentication in VANET using social networks. 1-8 - Mrinal Kanti Sarkar

, Sanjay Kumar:
A framework to ensure data storage security in cloud computing. 1-4 - Aritra Roy, Supriyo Mahanta, Mallika Tripathy, Sagarika Ghosh

, Sauvik Bal
:
Health condition identification of affected people in post disaster area using DTN. 1-3 - Ahmed Adel, Khaled Salah:

Model order reduction using genetic algorithm. 1-6 - Daniel Petrisor, Cristian Zet, Cristian Fosalau:

Optimized data flow management in event driven wireless sensor networks: A case study on landslide surveillance. 1-7 - Ratan Kumar Basak, Bipasha Mukhopadhyay, Souvik Chatterjee, Sukalyan Goswami, Amrin Zaman, Ronit Ray, Abhriya Roy, Shalini Guha, Saptarshi De, Sucheta Nag:

Hindu Arabic character recognition using mathematical morphology. 1-5 - Wondimu K. Zegeye, Seifemichael B. Amsalu

, Yacob Astatke, Farzad Moazzami:
WiFi RSS fingerprinting indoor localization for mobile devices. 1-6 - S. Das, Sohini Mukherjee, Souvik Chatterjee, H. K. Chatterjee:

Noise elimination and ECG R peak detection using wavelet transform. 1-5 - Mohsen Riahi Manesh, Naima Kaabouch, Hector Reyes, Wen-Chen Hu:

A Bayesian model of the aggregate interference power in cognitive radio networks. 1-7 - Atreyee Kar, Kathakali Sur, Suman Godara, Santanu Basak, Dipta Mukherjee, Aninda Sankar Sukla, Rupayan Das, Ritwika Choudhury:

Secuirity in cloud storage: An enhanced technique of data storage in cloud using RNS. 1-4 - Amean Al Safi

, Lalith Narasimhan, Bradley J. Bazuin:
Design and implementation of prototype potable base station for catastrophic situation. 1-6 - Mohsen Riahi Manesh, Md. Shakib Apu, Naima Kaabouch, Wen-Chen Hu:

Performance evaluation of spectrum sensing techniques for cognitive radio systems. 1-7 - Kevin Bouchard, Ramin Ramezani, Arjun

, Arash Naeim:
Evaluation of Bluetooth beacons behavior. 1-3 - William Contreras, Sotirios G. Ziavras:

Wireless sensor network-based infrastructure damage detection constrained by energy consumption. 1-7 - Xinyu Li

, Yanyi Zhang, Mengzhu Li, Shuhong Chen, Farneth R. Austin, Ivan Marsic, Randall S. Burd:
Online process phase detection using multimodal deep learning. 1-7 - Abel Diatta, Ibrahima Niang, Mandicou Ba

:
Cost analysis in FMIPv6 and FPMIPv6-based on HP2P-SIP networks. 1-7 - Abu Asaduzzaman, Shanta Mazumder, Sergio Salinas:

An auspicious secure processing technique for near field communication systems. 1-6 - J. Gope, Snigdha Chowdhury, K. S. Ghosal, Koustuv Sarkar, M. Pal, S. Bhadra:

JSM gate - A new proposition in spin based reversible logic circuitry. 1-4 - Abhijit Kundu, Ritika Misra, Atreyee Kar, Sagarika Debchoudhury, Shilpa Pareek, Somen Nayak

, Ratul Dey:
On demand secure routing protocol using Convex-Hull & K-mean approach in MANET. 1-5 - Ryoichi Shinkuma

, Yuki Goto:
Wireless multihop networks formed by unmanned aerial vehicles with separable access points and replaceable batteries. 1-6 - Soumen Banerjee

, Subhajit Chatterjee, Twinkle Mohanty, Sreshtha Ray, Tishya Sarma Sarkar, Malay Gangopadhyaya:
A compact dual-band half-mode SIW based semi-circular antenna. 1-3 - Xiaojing Zhang, Xuemei Li, Wei Yang, Ruoqiao Li:

FPGA-based color space conversion system design and implementation. 1-4 - Kieran Fraser, Bilal Yousuf

, Owen Conlan
:
A context-aware, info-bead and fuzzy inference approach to notification management. 1-7 - Soheli Farhana

, Mohd Fauzan Noordin:
Technology and performance: Carbon nanotube (CNT) field effect transistor (FET) in VLSI circuit design. 1-4 - Amean Al Safi

, Bradley J. Bazuin:
FPGA based implementation of BPSK and QPSK modulators using address reverse accumulators. 1-6 - Kevin Bouchard, Mahir Rafi Eusufzai, Ramin Ramezani, Arash Naeim:

Generalizable spatial feature for human positioning based on Bluetooth beacons. 1-5 - Sucheta Nag, Shubhabrata Kundu, Diptonil Sinha, Simantadeep RoyChowdhury, Preetam Mukherjee, Utpal Goswami, Rajiv Ganguly:

A comparative-techno economic feasibility study between roof-top and building integrated photovoltaic technology for development of green campus. 1-6 - Yong Shi, Wanqing You, Kai Qian, Prabir Bhattacharya, Ying Qian:

A hybrid analysis for mobile security threat detection. 1-7 - Djamila Mechta, Saad Harous

:
Improving LEACH-C using sink mobility. 1-6 - Stephanie Valencia

, Megan V. Smith, Adham Atyabi
, Frederick Shic
:
Mobile ascertainment of smoking status through breath: A machine learning approach. 1-7 - Mahssa Abdolahi

, Bozena Kaminska, Omid Akhavan, Samereh Talebi, Mahmood Ghoranneviss, Zeinab Arab:
Role of cooling rate in selective synthesis of graphene and carbon nanotube on Fe foil using hot filament chemical vapor deposition. 1-5 - James B. Fraley, James Cannady:

Enhanced detection of advanced malicious software. 1-6 - Sreerama Krishna Sama, Mahshid Rahnamay-Naeini:

A study on compression-based sequential prediction methods for occupancy prediction in smart homes. 1-8 - Kevin Bouchard, Ramin Ramezani, Arash Naeim:

Features based proximity localization with Bluetooth emitters. 1-5 - Jonathan Ross Tew, Lydia Ray:

ADDSMART: Address digitization and smart mailbox with RFID technology. 1-6 - Ikram Ilyas, Shuva Paul, Akhlaqur Rahman

, Ripan Kumar Kundu:
Comparative evaluation of cyclostationary detection based cognitive spectrum sensing. 1-7 - Satoshi Kodama

, Rei Nakagawa, Toshimitsu Tanouchi, Shinya Kameyama:
Management system by using embedded packet for hierarchical local area network. 1-4 - J. Gope, S. Chowdhury, M. Panda, Nabarun Bhattacharyya

, S. Bhadra:
JMS hybrid single electron model and its simulation using MATLAB. 1-3 - SeongSoo Park:

A development of UHF RFID device for mobile IoT service. 1-7 - Khaled Khalifa, Khaled Salah:

An RTL power optimization technique based on System Verilog assertions. 1-4 - Fang Liu, Yi Chen, Wing Shing Wong:

An asynchronous load balancing scheme for multi-server systems. 1-7 - Ritesh Shreevastav, Ricardo Simon Carbajo:

Dynamic RLC mode based upon link adaptation to reduce latency and improve throughput in cellular networks. 1-6 - Jayanta Gope, Sanjay Bhadra, S. Chanda, Subir Kumar Sarkar, S. Pal, A. Rai:

Modelling of single electron ternary flip-flop using SIMON. 1-9 - J. Gope, B. Kar, M. Panda, W. Akhtar, S. Bhadra, A. Roy, S. Saha, R. Bhattacharya:

JBWM-μP learner - An ICT based initiative for μP learning. 1-6 - Sushma Adepu, Rachel F. Adler

:
A comparison of performance and preference on mobile devices vs. desktop computers. 1-7 - Admir Horta, Eric Gernux, Matt Couceiro, Dieter Haemmerich, Mohamed Almekkawy

:
Body temperature control circuit. 1-4 - Ibrahim Nadir, Wondimu K. Zegeye, Farzad Moazzami, Yacob Astatke:

Establishing symmetric pairwise-keys using public-key cryptography in Wireless Sensor Networks (WSN). 1-6 - Osamah Ali Abdullah

, Ikhlas Abdel-Qader
, Bradley J. Bazuin:
Fingerprint-based technique for indoor positioning system via machine learning and convex optimization. 1-6 - Dibyendu Bikash Seal, Sujay Saha, Mayukh Chatterjee, Prokriti Mukherjee, Aradhita Mukherjee, Bipasha Mukhopadhyay, Sohini Mukherjee:

Gene - Gene Interaction: A clustering, correlation & entropy based approach. 1-6 - John Morrison:

Context integrity measurement architecture: A privacy-preserving strategy for the era of ubiquitous computing. 1-10 - Li Dang, Jaerock Kwon

:
Design of a new cost-effective head for a low-cost humanoid robot. 1-7 - JonPaul Canclini, James McMasters, James Shey, T. Owens Walker, Ryan N. Rakvic, Hau T. Ngo, Kevin D. Fairbanks:

Inferring read and write operations of solid-state drives based on energy consumption. 1-6 - Hussein Al-Moukhles

, Ali K. Jaber, Ikhlas Abdel-Qader
:
Impact of APs selection scheme on compressive sensing-fingerprinting based IPS performance. 1-7 - Elizabeth Williams, Jeff Gray

, Brandon Dixon:
Evaluating GeoContext: A system for creating geographical topics from a social media stream. 1-7 - Young-Ho Suh, Sang Keun Rhee, Kang-Woo Lee:

Tracking semantic relations among spatial objects for situation-aware interactive environments. 1-5 - Lívia Gregorin, Eduardo Oliveira Freire, Elyson Carvalho

, Lucas Molina, Sidney Givigi
:
Evolutionary robotics applied to the multi-robot worst-case pursuit-evasion problem. 1-7 - Hamzah Al Najada, Imad Mahgoub

:
Autonomous vehicles safe-optimal trajectory selection based on big data analysis and predefined user preferences. 1-6 - Aliva M. Pradhan, Aparna S. Varde:

Ontology based meta knowledge extraction with Semantic Web tools for ubiquitous computing. 1-6 - Seifemichael B. Amsalu

, Wondimu K. Zegeye, Dereje Hailemariam, Yacob Astatke, Farzad Moazzami:
Energy efficient Grid Clustering Hierarchy (GCH) routing protocol for wireless sensor networks. 1-6 - Shahed K. Mohammed, Farah Deeba

, Francis M. Bui
, Khan A. Wahid:
Feature selection using modified ant colony optimization for wireless capsule endoscopy. 1-4 - Eun Joo Kim, Jong Arm Jun, Naesoo Kim:

The method of controlling traffic paths in IoT-based software defined network. 1-4 - Kennedy A. Aganah, Benozir Ahmed, Aleck W. Leedy:

Single-phase multilevel inverter topology for distributed DC sources. 1-6 - Istiaque Maruf Ahmad, Abdullah Eroglu, Carlos A. Pomalaza-Raez

, Ming Li:
Simulation and modeling technique for EMI measurement of the ECM motors in HVAC systems. 1-6 - Nazimuddin Sheikh, Kanyasree Mustafi, Indraneel Mukhopadhyay

:
A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence. 1-9 - Muhammad Asif Khan

, Wael Chérif, Fethi Filali
:
Group owner election in Wi-Fi direct. 1-9 - Saleh M. Alnaeli, Melissa Sarnowski, Md Sayedul Aman, Kumar Yelamarthi

, Ahmed Abdelgawad, Haowen Jiang:
On the evolution of mobile computing software systems and C/C++ vulnerable code: Empirical investigation. 1-7 - Ying Zhao, Charles C. Zhou:

System self-awareness towards deep learning and discovering high-value information. 1-8 - Sourav Chakraborty, Hitesh Laware, David Castanon, Seyed Reza Zekavat:

High precision localization for autonomous vehicles via multiple sensors, data fusion and novel wireless technologies. 1-9 - Ratan Kumar Basak, Bipasha Mukhopadhyay, Souvik Chatterjee, Sukalyan Goswami, Amrin Zaman, Ronit Ray, Abhriya Roy, Shalini Guha, Saptarshi De, Riddhi Dutta:

Segmentation-based image compression. 1-6 - Mohammad Shekaramiz, Todd K. Moon, Jacob H. Gunther:

AMP-B-SBL: An algorithm for clustered sparse signals using approximate message passing. 1-5 - Alain Edwards, Imad Mahgoub

, Monika Rathod:
Investigation of RFID based localization for SmartDrive vehicular network testbed. 1-6 - Nagaraja Revanna, Earl E. Swartzlander Jr.:

Arithmetic circuit design with memristor based high fan-out logic gates. 1-6 - Elnaz Limouchi, Imad Mahgoub

:
Intelligent hybrid adaptive broadcast for VANET. 1-7 - Taif Alobaidi

, Ahmed Aldhahab
, Wasfy B. Mikhael:
Employing vector quantization in a transform domain for face recognition. 1-4 - Byunghun Song, Junho Shin, Seung-Hoon La, Jongpil Jeong

:
On minimizing signaling costs for PMIPv6-based distributed dynamic mobility management. 1-7 - Caslav Stefanovic

, Stefan Panic
, Marko Antonic, Srdjan Jovkovic, Dusan Stefanovic, Mihajlo C. Stefanovic:
Second order statistics of SC macrodiversity system in the presence of gamma shadowed nLoS short term fading and CCI. 1-7 - Adnan Quadri, Mohsen Riahi Manesh, Naima Kaabouch:

Denoising signals in cognitive radio systems using an evolutionary algorithm based adaptive filter. 1-6 - Tudor Boran, John Voss, Md. Shafaeat Hossain:

Authorship categorization of public domain literature. 1-7 - Haider Hashim, Ikhlas Abdel-Qader

:
Generalized solutions for THD investigation in cascaded multicell multilevel converters modulated with selective harmonic elimination PWM switching method. 1-7 - M. Zefree Lazarus

, Supratim Gupta:
A low rank model based improved eye detection under spectacles. 1-6 - Nuray Baltaci Akhuseyinoglu

, Kamil Akhuseyinoglu
:
AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadata. 1-7 - Khin Thida San, Eun Young Lee, Yoon Seok Chang:

The delivery assignment solution for swarms of UAVs dealing with multi-dimensional chromosome representation of genetic algorithm. 1-7 - Reza Soltani, Uyen Trang Nguyen, Yang Yang, Mohammad Reza Faghani, Alaa Yagoub, Aijun An

:
A new algorithm for money laundering detection based on structural similarity. 1-7 - Saptarshi Rudra, Soham Mitra, Soumyajit Das, Abhisek Roy, Shibasis Guha, Dibyendu Bikash Seal, Sohini Mukherjee, Souvik Chatterjee:

Gender classification system from offline survey data using neural networks. 1-5 - Muhammad Aurangzeb, Jinquan Zhao, Irfan Jamil

, Muhammad Fahad Ali:
Case study of development boost converter with coupled inductors for PV system applications. 1-6 - Upal Mahbub, Rama Chellappa:

PATH: Person authentication using trace histories. 1-8 - Muhammad Adnan, Muhammad Afzal

:
A novel approach to super quality software development using workflows. 1-3 - Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:

Bayesian compressive sensing with circulant matrix for spectrum sensing in cognitive radio networks. 1-6 - Jigar Jadav, Charles C. Tappert, Michael Kollmer, Andrew M. Burke, Pratik Dhiman:

Using text analysis on web filter data to explore K-12 student learning behavior. 1-5 - Wang Liu, Yanlin Ren, David He, Liyan Qiao:

Development of universal FMC carrier card based on PXI Express. 1-6 - Navya Nizamkari:

Mining typos in text. 1-2 - Shopan Dey

, Ayon Roy, Sandip Das
:
Home automation using Internet of Thing. 1-6 - Joseph Finkelstein, In Cheol Jeong:

Using CART for advanced prediction of asthma attacks based on telemonitoring data. 1-5 - Alireza Moghaddam, Uyen Trang Nguyen:

Evaluation of channel switching overhead for multicast communications in wireless mesh networks. 1-7 - B. A. Alassane, Karim Konaté:

An analytical jitter model in IMS network. 1-4 - Cristian Zet, Cristian Fosalau, Daniel Petrisor, Ionel Hogas:

Study of the power consumtion of a landslide sensor node. 1-5 - Shaantam Chawla:

The autonomous pill dispenser: Mechanizing the delivery of tablet medication. 1-4 - Jung-In Choi

, Hwan-Seung Yong:
Real-time intragroup familiarity analysis model using beacon based on proximity. 1-5 - Chiradeep Mukherjee

, Sayak Pramanik
, Dipayan Singha Roy, Souvik Mondal, Aritro Sinha, Arnab Guha Roy, Subham Bid, Shirsha Chakraborty:
Layered T methodology in QCA: NAND/NOR based circuit designing approach. 1-6 - Elizabeth Williams, Jeffrey G. Gray

, Edwin J. Morris, Ben Bradshaw, Keegan Williams, Brandon Dixon:
A comparison of two methods for the topical clustering of social media posts. 1-7 - Sandip Das

, Moitrayee Chakraborty:
ASK and PPM modulation based FSO system under varying weather conditions. 1-7 - Daiki Ito, Masami Mohri, Yoshiaki Shiraishi, Masakatu Morii:

Cloud storage with key-value stores over content-centric networking architecture. 1-6 - Rupayan Das, Sauvik Bal

, Soumajit Das, Mrinal Kanti Sarkar
, Debdeep Majumder, Anirban Chakraborty, Koushik Majumder
:
Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5. 1-9 - Xuewei Piao, Lei Huang, Kaiqi Yuan, Jie Yuan, Kai Lei

:
The real implementation of NDN forwarding strategy on Android smartphone. 1-6 - Phillip G. Bradford, Venkatesh Choppella:

Fast point-to-point Dyck constrained shortest paths on a DAG (Extended abstract). 1-7 - J. Gope, B. Kar, M. Panda, S. Bhadra, S. Saha, R. Bhattacharya, S. Biswas:

A strategic frame work for designing MATLAB based single spin logic tool for inclusion in SIMSCAPE. 1-3 - Farhad Akhoundi, Saeed Sharifi-Malvajerdi, Omid Poursaeed

, Jawad A. Salehi:
Analytical studies of fragmented-spectrum multi-level OFDM-CDMA technique in cognitive radio networks. 1-6 - Hector Reyes, Sriram Subramaniam, Naima Kaabouch, Wen-Chen Hu:

A Bayesian inference method for estimating the channel occupancy. 1-6 - Dibyendu Bikash Seal, Sujay Saha, Prokriti Mukherjee, Mayukh Chatterjee, Aradhita Mukherjee, Kashi Nath Dey:

Gene ranking: An entropy & decision tree based approach. 1-5 - Rohan Raj Gupta, Gaurav Mishra, Subham Katara, Arpit Agarwal, Mrinal Kanti Sarkar

, Rupayan Das, Sanjay Kumar:
Data storage security in cloud computing using container clustering. 1-7 - Xiang Zhang, Lirui Gong, Yunbo Xun, Xuewei Piao, Kai Lei:

Centaur: A evolutionary design of hybrid NDN/IP transport architecture for streaming application. 1-7 - Zsolt Ori, Ilona Ori:

Canonical representation of the human energy metabolism of lean mass, fat mass, and insulin resistance. 1-8 - Hitoshi Oi

:
Power optimization and service level agreement trade-off in SPECjbb2015. 1-6 - Murong Lin, Quanmin Ye, Yinghua Ye:

Graph theory based mobile network insight analysis framework. 1-7 - Vikas S. Shah

:
Ubiquitous operational governance framework: Managing consumer mobile commerce active index. 1-8 - H. Srikanth Kamath

, Humdard Singh, Aayush Khanna:
Transmit receive chain in LTE. 1-7 - Osamah Ali Abdullah

, Ikhlas Abdel-Qader
, Bradley J. Bazuin:
K-means-Jensen-Shannon divergence for a WLAN indoor positioning system. 1-5 - Soumen Banerjee

, Kyamelia Roy, Twinkle Mohanty, Sreshtha Ray, Tishya Sarma Sarkar, Malay Gangopadhyaya:
Quarter-mode SIW based compact triangular antenna for 2.5 GHz cellular spectrum. 1-4 - Surajit Sur

, Rabel Guharoy, Arindam Haider, Subhojit Dutta, Shayan Rakshit, Afaq Ahmed
, Mayank Srivastava:
Green energy harvesting using nantenna: An energy harvesting approach based on nantenna. 1-2 - Md Sayedul Aman, Haowen Jiang, Cuyler Quint, Kumar Yelamarthi

, Ahmed Abdelgawad:
Reliability evaluation of iBeacon for micro-localization. 1-5 - Hussein Moosavi, Francis Minhthang Bui

:
Optimal beamforming-based power control in wireless body area networks. 1-5 - Gautam Thakur:

Incremental bit rates in FDD networks for LTE advanced over LTE. 1-7 - Shankhadip Kundu, Rajdeep Kundu, Shubhabrata Kundu, Anubhab Bhattachaijee, Sayantan Gupta, Souvik Ghosh, Indranil Basu:

Quantum computation: From Church-Turing thesis to Qubits. 1-5 - Ameena Badarudeen, K. Gopakumar:

Wideband spectrum sensing using Multi Stage Weiner Filter. 1-5 - Junsheng Mu, Xiaojun Jing, Hai Huang, Ning Gao:

A noise reduction method based on subspace approach for speech communication. 1-7 - Abdullah Alhumaidi Alotaibi, Marios C. Angelides:

Wireless femtocell coverage on the go: A case in the Kingdom of Saudi Arabia. 1-7 - Hajar Barani, Ahmad Golmohammadi, Hong Huang, Satyajayant Misra:

Analysis of the throughput capacity and delay in a wireless sensor network with multiple sinks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














