


Остановите войну!
for scientists:
10th UEMCON 2019: New York City, NY, USA
- 10th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2019, New York City, NY, USA, October 10-12, 2019. IEEE 2019, ISBN 978-1-7281-3885-5
- Cullen D. Johnson, Brian H. Curtin, Nikhil Shyamkumar, Rachelle H. David, Emmet D. Dunham, Preston C. Haney, Harry L. Moore, Thomas A. Babbitt, Suzanne J. Matthews
:
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security. 1-7 - Rafael Lopez, Christian DeGuzman, Abdelrahman Elleithy:
Use of Sensor Node Networks for Car Security. 8-14 - Sara Steinel, Justin Chudley, Ryan Mendoza, Abdelrahman Elleithy:
Location Tracking of Mobile Objects and the Privacy Tradeoff. 15-22 - Leo Kobayashi, Mukul Rocque, Haibo Wang, Geoffrey A. Capraro M. D. MPH, Carlin C. Chuck Scb, Chris K. Kim, Katherine Luchette, B. S. Alana Oster, Derek Merck, Ihor Kirenko, Kees van Zon, Marek Bartula:
Pilot Study of Emergency Department Patient Vital Signs Acquisition Using Experimental Video Photoplethysmography and Passive Infrared Thermography Devices. 23-32 - Milankumar Patel, Siddhartha Bhattacharyya, Ali Alfageeh:
Formal Trust Architecture for Assuring Trusted Interactions in the Internet of Things. 33-39 - Milos Pilipovic, Dragan Samardzija:
Optimized Wireless Connectivity for Cyber-Physical Systems with Publisher/Subscriber Architecture. 40-49 - Mark Caswell, Yao Liang:
Simulation of Transitional and Bursty Wireless Visual Sensor Networks. 50-56 - Brandan Quinn, Eman Abdelfattah:
Machine Learning Meteorologist Can Predict Rain. 57-62 - Andrew Brandon, Melanie Seekins, Joshua Beulah Vedhavalli, Samuel Chelliah, John Haller:
Network Data Analysis to Support Risk Management in an IoT Environment. 63-68 - Yash Parikh, Eman Abdelfattah:
Comparison of Machine Learning Models to Predict Twitter Buzz. 69-73 - Ross Arnold
, Kevin Carey, Benjamin Abruzzo, Christopher M. Korpela:
What is A Robot Swarm: A Definition for Swarming Robotics. 74-81 - Brian H. Curtin, Suzanne J. Matthews
:
Deep Learning for Inexpensive Image Classification of Wildlife on the Raspberry Pi. 82-87 - Jiong Si, Evangelos A. Yfantis, Sarah L. Harris:
A SS-CNN on an FPGA for Handwritten Digit Recognition. 88-93 - Vanesa Getseva, Salil Maharjan, Eman Abdelfattah:
Performance of Classification Models on Various Types of Character Data. 94-98 - Amartya Hatua, Trung T. Nguyen
, Andrew H. Sung:
Goal-Oriented Conversational System Using Transfer Learning and Attention Mechanism. 99-104 - Lidong Wang, Randy Jones:
Big Data Analytics in Cybersecurity: Network Data and Intrusion Prediction. 105-111 - Shireesha Chandra, Aparna S. Varde, Jiayin Wang:
A Hive and SQL Case Study in Cloud Data Analytics. 112-118 - Jackie Leung, Min Chen:
Image Recognition with MapReduce Based Convolutional Neural Networks. 119-125 - Yaobin Qin, Brandon Hoffmann, Yuwei Wang, David J. Lilja:
Exploring A Forecasting Structure for the Capacity Usage in Backup Storage Systems. 126-134 - Resham Jhangiani, Doina Bein, Abhishek Verma:
Machine Learning Pipeline for Fraud Detection and Prevention in E-Commerce Transactions. 135-140 - Raghu Nandan Avula, Cliff C. Zou:
Improving Rider Safety Using QR Code & Fingerprint Biometrics. 141-144 - Chuck Easttom, Nagi Mei:
Mitigating Implanted Medical Device Cybersecurity Risks. 145-148 - Paul K. Mandal, Abhishek Verma:
Novel Hash-Based Radix Sorting Algorithm. 149-153 - Muath Obaidat, Matluba Khodjaeva, Suhaib Obeidat, Douglas Salane, Jennifer Holst:
Security Architecture Framework for Internet of Things (IoT). 154-157 - Ali Alqahtani, Mohamed A. Zohdy, Subramaniam Ganesan, Richard Olawoyin:
A Novel Phase Tracking in ZigBee Receiver Using Extended Kalman Filtering over AWGN Channel. 158-162 - Caileigh Marshall, Jaimie Kelley, Cynthia Turnbull:
Improv Performance with Wi-Fi Enabled Costume Lights. 163-168 - Ankit Roy:
Deep Convolutional Neural Networks for Breast Cancer Detection. 169-171 - Mohammadreza Robaei, Robert Akl:
Time-Variant Broadband mmWave Channel Estimation Based on Compressed Sensing. 172-178 - William Shue, Nischal Paudyal, Mahmoud Rabiah, Douglas E. Dow, Mehmet Ergezer, Mira Yun:
A Thermally Regulated Footwear & Alerting System. 179-182 - Agnelo Rocha da Silva, Ruzbeh Akbar, Richard H. Chen, Kazem Bakian-Dogaheh, Negar Golestani, Mahta Moghaddam, Dara Entekhabi:
Duty-Cycled, Sub-GHz Wake-up Radio with -95dBm Sensitivity and Addressing Capability for Environmental Monitoring Applications. 183-191 - Bulent Ayhan, Chiman Kwan
:
A New Approach to Change Detection Using Heterogeneous Images. 192-197 - Luis Camal, Anup Kirtane, Teresa Blanco
, Roberto Casas, Federico Rossano
, Baris Aksanli:
A Wearable Device Network to Track Animal Behavior and Relationships in the Wild. 198-202 - Amin Sahba, Ramin Sahba, Paul Rad, Mo M. Jamshidi:
Optimized IoT Based Decision Making For Autonomous Vehicles In Intersections. 203-206 - Waleed Aldosari
, Mohamed A. Zohdy, Richard Olawoyin:
Tracking the Mobile Jammer in Wireless Sensor Networks Using Extended Kalman Filter. 207-212 - Joong-Lyul Lee, Stephen C. Kerns, Sangjin Hong:
A Secure IoT-Fog-Cloud Framework Using Blockchain Based on DAT for Mobile IoT. 213-218 - Jim A. Scheibmeir, Yashwant K. Malaiya:
Quality Model for Testing Augmented Reality Applications. 219-226 - Drashti Pathak, Aparna S. Varde, Clement Alo, Felix Oteng:
Ubiquitous Access for Local Water Management Through HCI Based App Development. 227-233 - Sudarshan S. Chawathe:
Data Modeling for a NoSQL Database Service. 234-240 - David William Honorio Araujo da Silva
, Carlos Paz de Araujo, C. Edward Chow, Bryan Sosa Barillas:
A New Approach Towards Fully Homomorphic Encryption Over Geometric Algebra. 241-249 - Andrew Camphouse, Lucien Ngalamou:
Securing a Connected Home. 250-256 - Kevin B. Hall, Lucien Ngalamou:
Securing Wireless Scada Systems in Rural American Power Grids. 257-262 - Mark E. Royer, Sudarshan S. Chawathe:
Trusted Remote Function Interface. 263-269 - Thu Vo, Chetan Jaiswal:
AdRemover: The Improved Machine Learning Approach for Blocking Ads. 270-275 - Meizhu He, Leon Wu:
SIPSA: Secure IoT Protocol-Based Smart Adapter for Communicating and Optimizing Building Energy Management with Smart Grid. 276-279 - Debjyoti Sinha, Mohamed El-Sharkawy:
Thin MobileNet: An Enhanced MobileNet Architecture. 280-285 - Md Reshad Ul Hoque, Roland Burks, Chiman Kwan
, Jiang Li:
Deep Learning for Remote Sensing Image Super-Resolution. 286-292 - Ahmed Aly, Gianluca Guadagni
, Joanne B. Dugan:
Derivative-Free Optimization of Neural Networks using Local Search. 293-299 - Yash Parikh, Eman Abdelfattah:
Machine Learning Models to Predict Multiclass Protein Classifications. 300-304 - Trung T. Nguyen
, Amartya Hatua, Andrew H. Sung:
Cumulative Training and Transfer Learning for Multi-Robots Collision-Free Navigation Problems. 305-311 - Durga Sundaram, Abhishek Sarode, Kiran George:
Vision-Based Trainable Robotic Arm for Individuals with Motor Disability. 312-315 - Bulent Ayhan, Chiman Kwan
:
New Results in Change Detection Using Optical and Multispectral Images. 316-321 - Safia Rahmat, Quamar Niyaz, Akshay Mathur, Weiqing Sun, Ahmad Y. Javaid:
Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems. 322-328 - Mehdi Karimibiuki, Michal Aibin
, Yuyu Lai, Raziq Khan, Ryan Norfield, Aaron Hunter:
Drones' Face off: Authentication by Machine Learning in Autonomous IoT Systems. 329-333 - Bulent Ayhan, Chiman Kwan
:
Practical Considerations in Unsupervised Change Detection Using SAR Images. 334-339 - Mahssa Abdolahi, Hao Jiang, Bozena Kaminska:
Robust data retrieval from high-security structural colour QR codes via histogram equalization and decorrelation stretching. 340-346 - Hafiz Mohammd Junaid Khan, Quamar Niyaz, Vijay K. Devabhaktuni, Site Guo, Umair Shaikh:
Identifying Generic Features for Malicious URL Detection System. 347-352 - Sandun S. Kuruppu, Alexander Shibilski:
Clock Variation Impact on Digital Control System Performance. 353-358 - Jordan Fernandes, Keye Li, Joey Mirabile, Gregg Vesonder:
Application of Robot Operating System in Robot Flocks. 359-363 - Amina Shrestha, Rhishav Mahaju, Sandun S. Kuruppu:
On Stability of Current Controlled Drives with Delay in Feedback Path. 364-370 - Brad Wheeler, Andrew Ng, Brian G. Kilberg, Filip Maksimovic, Kristofer S. J. Pister:
A Low-Power Optical Receiver for Contact-free Programming and 3D Localization of Autonomous Microsystems. 371-376 - Kiavash Fathi, Mehdi Mahdavi
:
Control System Response Improvement via Denoising Using Deep Neural Networks. 377-382 - Kervins Nicolas, Yi Wang:
A novel double spending attack countermeasure in blockchain. 383-388 - Vanessa DeFreese, Tyler Wright, Ivy Robalino, Gregg Vesonder:
Robotic Solutions for Eldercare. 389-394 - Badar Almarri, Sanguthevar Rajasekaran, Chun-Hsi Huang:
Unsupervised Similarity-based Sensor Selection for Time Series Data. 395-400 - Pablo Rivas, Casimer DeCusatis, Matthew Oakley, Alex Antaki, Nicholas Blaskey, Steven LaFalce, Stephen Stone:
Machine Learning for DDoS Attack Classification Using Hive Plots. 401-407 - Khalid Hamad Motleb Alnafisah:
An algorithmic Solution in Data Visualization for the "Hair Ball" Problem. 408-418 - Josef Ur, Mathew Craner, Rehab El Hajj:
What Makes a National Football League Team Successful? an Analysis of Play by Play Data. 419-425 - Jordan Hewko, Robert Sullivan, Shaun Reige, Mohamad El-Hajj:
Data Mining in The NBA: An Applied Approach. 426-432 - Mihaela Dimovska
, Travis Johnston, Catherine D. Schuman
, J. Parker Mitchell, Thomas E. Potok:
Multi-Objective Optimization for Size and Resilience of Spiking Neural Networks. 433-439 - Azkario Rizky Pratama
, Alexander Lazovik, Marco Aiello:
Office Multi-Occupancy Detection using BLE Beacons and Power Meters. 440-448 - Chiman Kwan
, Jerry Yang, Bryan Chou:
Change Detection Using Original and Fused Landsat and Worldview Images. 449-454 - Mikeera Brown, Shawnoah Pollock, Wafa Elmannai, Michael Joseph, Khaled Elleithy
:
Vulnerability Analysis and Modeling. 455-461 - Peter Stubberud:
The Design of Digital IIR Filters Using a Differential Evolution Optimization Algorithm with Taguchi Crossover. 462-468 - Chiman Kwan
, David Gribben, Trac D. Tran:
Multiple Human Objects Tracking and Classification Directly in Compressive Measurement Domain for Long Range Infrared Videos. 469-475 - Md Inzamam Ul Haque
, Damian Valles
:
Facial Expression Recognition Using DCNN and Development of an iOS App for Children with ASD to Enhance Communication Abilities. 476-482 - Michael Joseph, Khaled Elleithy
, Mohamed Mohamed:
A new Quantum Processor Architecture. 483-487 - Chiman Kwan
, David Gribben, Trac D. Tran:
Tracking and Classification of Multiple Human Objects Directly in Compressive Measurement Domain for Low Quality Optical Videos. 488-494 - Jarrett B. Knox, Eric M. Pereira, Anthony Sousa, Douglas E. Dow:
Activity Monitoring System to Support Elderly Independent Living. 495-498 - Kingsley Udeh, David W. Wanik, Nick Bassill, Emmanouil N. Anagnostou:
Time Series Modeling of Storm Outages with Weather Mesonet Data for Emergency Preparedness and Response. 499-505 - Kenshi Saho
, Kazuki Uemura, Masahiro Fujimoto, Michito Matsumoto:
Micro-Doppler Radar Measurement of Sit-to-Stand-to-Sit Movement for Evaluation of High-level Instrumental Activities of Daily Living. 506-510 - Ramin Sahba, Amin Sahba, Mo M. Jamshidi, Paul Rad:
3D Object Detection Based on LiDAR Data. 511-514 - Ibrahim Alrashdi, Ali Alqazzaz
, Raed Alharthi
, Esam Aloufi, Mohamed A. Zohdy, Ming Hua:
FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities. 515-522 - Zuhair Alqarni, Johnson A. Asumadu:
Battery Charging Application Thorough PVA and MPPT Controller with Voltage Regulation. 523-527 - Matthew Regueiro, Bhagyashree Shirke, Mandy Chiu, Nicholas Capobianco, Kiran George:
Electroencephalographic (EEG) Analysis of Individuals Experiencing Acute Mental Stress. 528-534 - Sudarshan S. Chawathe:
Using Historical Data to Predict Parking Occupancy. 534-540 - Oluwaseyi Ajayi, Obinna Igbe, Tarek N. Saadawi:
Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution. 541-549 - Alyssa Donawa, Inema Orukari, Corey E. Baker
:
Scaling Blockchains to Support Electronic Health Records for Hospital Systems. 550-556 - Sree Bala Shruthi Bhamidi, Mohamed El-Sharkawy:
Residual Capsule Network. 557-560 - S. Sareh Ahmadi, Sherif Rashad, Heba Elgazzar:
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users. 561-567 - Sara Hebal, Djamila Mechta, Saad Harous:
ACO-based Distributed Energy Routing Protocol In Smart Grid. 568-571 - Mark E. Royer, Sudarshan S. Chawathe:
Unformatted, Certified Scientific Objects. 572-577 - Brody E. Nagy, Sean A. Demers, Douglas E. Dow:
Automated Well Water Contamination Tester and Web Service. 578-584 - Joseph Russell, Jeroen Bergmann
:
Probabilistic sensor design for healthcare technology. 585-590 - Hy Do, Vu Truong, Kiran George, Bhagyashree Shirke:
EEG-Based Biometrics Utilizing Image Recognition for Patient Identification. 591-595 - Miguel F. Villegas, Juan Carlos Torres Munoz, Abdulrahman M. R. Alrashidi, Douglas E. Dow:
Tabletop Human Computer Interface to Assist Elderly with Tasks of Daily Living. 596-599 - Niranjan Ravi, Mohamed El-Sharkawy:
Integration of UAVs with Real Time Operating Systems using UAVCAN. 600-605 - Paul L. Kaprielian, Thach Pham, Alex Young, Douglas E. Dow, Scott A. Grenquist, Bruce M. Decker:
Winter Cabin Water Tap Monitor and Release System to Reduce Risk of Freezing. 606-609 - Christina Berke, Elizabeth Fassman-Beck, Jack Li, Gregg Vesonder:
Towards Better Management of Combined Sewage Systems. 610-613 - Izbaila Imtiaz, Imran Ahmed, Misbah Ahmad, Kaleem Ullah, Awais Adnan, Maaz Ahmad:
Segmentation of Skin Lesion Using Harris Corner Detection and Region Growing. 614-619 - Anil R. Patel, Ashish Patel:
Comparative Analysis of Stereo Matching Algorithms. 620-626 - Misbah Ahmad, Imran Ahmed, Awais Adnan:
Overhead View Person Detection Using YOLO. 627-633 - Walid Abdel Gelil, Thomas Kunz:
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs). 640-646 - Muhammet Ali Karabulut
, A. F. M. Shahen Shah
, Haci Ilhan:
Performance of the CR-MAC with Channel Fading and Capture Effect under Practical Traffic Scenarios for VANETs. 647-652 - Ali Alfageeh, Siddhartha Bhattacharyya, Samuel Perl, Milankumar Patel:
Assurance for CyberSecurity with Assume-Guarantee Reasoning. 653-659 - Roland Burks, Kazi Aminul Islam, Yan Lu, Jiang Li:
Data Augmentation with Generative Models for Improved Malware Detection: A Comparative Study. 660-665 - Soo-Yeon Ji, Charles A. Kamhoua, Nandi Leslie, Dong Hyun Jeong
:
An Effective Approach to Classify Abnormal Network Traffic Activities using Wavelet Transform. 666-672 - Shajina Anand, Gunasekaran Raja
, Aishwarya Ganapathisubramaniyan:
AECC: An Enhanced Public Key Cryptosystem for User Defined Messages. 673-678 - Xin-Wen Wu, Waleed Farag, Sanwar Ali, Siddhivinayak Kulkarni:
An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices. 679-685 - Mamadou I. Wade, Mohamed F. Chouikha, Tepper Gill, Wayne Patterson, Talitha M. Washington, Jianchao Zeng:
Distributed Image Encryption Based On a Homomorphic Cryptographic Approach. 686-696 - Yi Huang, Jayanta Debnath, Michaela Iorga, Anup Kumar, Bin Xie:
CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management. 697-707 - Avimita Chatterjee:
Formulating Support for Superpages to reduce the number of TLB Faults in Contiguous Virtual Memory Space. 708-715 - Alaa T. Al Ghazo
, Ratnesh Kumar:
Identification of Critical-Attacks Set in an Attack-Graph. 716-722 - Rajiv Bagai, Seth Layton, Srikanth Gampa, Kavitha Chandrashekar:
Maximum Diversity in Web Application User Action Privacy. 723-729 - Chuck Easttom, Willie Sanders:
On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. 730-735 - Dat Tran, Chetan Jaiswal:
PDFPhantom: Exploiting PDF Attacks Against Academic Conferences' Paper Submission Process with Counterattack. 736-743 - Adrian Jaesim, Adel Aldalbahi
, Nazli Siasi, Diogo Oliveira, Nasir Ghani:
Dual-Beam Analog Beamforming for mmWave Communications. 744-748 - Anurag Thantharate, Cory C. Beard, Sreekar Marupaduga:
An Approach to Optimize Device Power Performance Towards Energy Efficient Next Generation 5G Networks. 749-754 - Akira Kawai, Shinichi Taniguchi, Hui Li LI, Shizue Izumi:
A Physical Strength Measurement and Analysis System for Elderly People Using Motion Sensors. 755-761 - Anurag Thantharate, Rahul Arun Paropkari, Vijay Walunj, Cory C. Beard:
DeepSlice: A Deep Learning Approach towards an Efficient and Reliable Network Slicing in 5G Networks. 762-767 - Mohamed Sofiane Batta, Zibouda Aliouat, Saad Harous:
A Distributed Weight-Based TDMA Scheduling Algorithm for Latency Improvement in IoT. 768-774 - Jay Ashok Shah, Dushyant Dubaria:
NetDevOps: A New Era Towards Networking & DevOps. 775-779