Abstract is missing.
- A Security System Using Deep Learning Approach for Internet of Vehicles (IoV)Sachin Sharma, Kamal Kumar Ghanshala, Seshadri Mohan. 1-5 [doi]
- Search and Rescue Operations with Mesh Networked RobotsTristan Brodeur, Paulo Alexandre Regis, David Feil-Seifer, Shamik Sengupta. 6-12 [doi]
- Implementation of the WAVE 1609.2 Security Services Standard and Encountered Issues and ChallengesChad Mandy, Imad Mahgoub. 13-18 [doi]
- An IEEE1451.7 Based WSN Design for V2I Localization Services in Smart CitiesMelvin Hayes, Tamer Omar. 19-25 [doi]
- Vulnerabilities and Attacks Analysis for Military and Commercial IoT DronesRalph Restituyo, Thaier Hayajneh. 26-32 [doi]
- Huber Fitting based ADMM Detection for Uplink 5G Massive MIMO SystemsRobin Chataut, Robert Akl. 33-37 [doi]
- Adaptive Optimal Output Regulation of Continuous-Time Linear Systems via Internal Model PrincipleYiyang Liu, Weinan Gao. 38-43 [doi]
- Automated Speech Emotion Recognition on Smart PhonesHumaid Alshamsi, Veton Kepuska, Hazza Alshamsi, Hongying Meng. 44-50 [doi]
- Compressive Vehicle Tracking Using Deep LearningChiman Kwan, Bryan Chou, Adam Echavarren, Bence Budavari, Jiang Li, Trac D. Tran. 51-56 [doi]
- Sentiment Analysis of Twitter Data with Hybrid Learning for Recommender ApplicationsKetaki Gandhe, Aparna S. Varde, Xu Du. 57-63 [doi]
- Large-Scale Evolutionary Optimization Using Multi-Layer Differential EvolutionTarik Eltaeib, Ausif Mahmood. 64-69 [doi]
- Increasing Accuracy of Hand-Motion Based Continuous Authentication SystemsAnshu Bhattarai, Ambareen Siraj. 70-76 [doi]
- Human Activity and Posture Classification Using Wearable Accelerometer DataKevin Wunderlich, Eman Abdelfattah. 77-81 [doi]
- Programmable Errorless Face-Name Association Device with Real-Time ProcessingSamuel Sisson, Kiran George. 82-88 [doi]
- Curating Research Data - Cyber security perspective from a nascent Brain Machine Interface LaboratoryJason M. Pittman, Garima Bajwa, Joshua Joseph, Nicholas Keller. 89-94 [doi]
- STEM Projects using Green Healthcare, Green IT, and Climate ChangeJohn Lamb, Sanjeev Kumar V. Marimekala. 95-101 [doi]
- The Tiny Java Library for Maintaining Model ProvenanceMark E. Royer, Sudarshan S. Chawathe. 102-108 [doi]
- HDFJavaIO: A Java library for reading and writing Octave HDF filesMark E. Royer, Sudarshan S. Chawathe. 109-115 [doi]
- On Seamless Hole-free Virtual Emotion Barrier in IoT-enabled Smart CitiesHyunbum Kim, Kiho Lim. 116-121 [doi]
- Fast Suboptimal Multi-Layer Detection Scheme for Demodulation in Diffusion-Based Molecular CommunicationsMohammed S. Alzaidi, Walid K. M. Ahmed, Victor B. Lawrence. 122-127 [doi]
- Medical Device Security in the IoT AgeJon B. Martinez. 128-134 [doi]
- A Framework to Identify Security and Privacy Issues of Smart Home DevicesJoel Varghese, Thaier Hayajneh. 135-143 [doi]
- Asymptotic Transient Solutions of Fluid Queues Fed By A Single ON-OFF SourceY. Shao, J. Bai, N. Liu, K. Wang, A. D. Clark. 144-151 [doi]
- An Improved Accuracy Model Employing an e-Navigation SystemCaspar K. Lebekwe, Abid Yahya, Ivan Astin. 152-158 [doi]
- An Approximation Mechanism for Elastic IoT Application DeploymentChuan Pham, Kim Khoa Nguyen, Mohamed Cheriet. 159-165 [doi]
- A Virtualized Network Function for Advanced Network Flow Logging in Microsoft Azure Distributed SystemHossam Fattah. 166-172 [doi]
- SDN-Ready WAN networks: Segment Routing in MPLS-Based EnvironmentsGustavo D. Salazar Ch., Edison F. Naranjo, Luis Marrone. 173-178 [doi]
- Outage Probability and Ergodic Capacity Analysis in Cloud Radio Access Network with Nakagami-n FadingAyad N. Bihnam, Bilal Al-Doori. 179-184 [doi]
- A Survey of DevOps tools for NetworkingJay Shah, Dushyant Dubaria, John Widhalm. 185-188 [doi]
- Research into Making Healthcare Green with Cloud, Green IT, and Data Science to Reduce Healthcare Costs and Combat Climate ChangeNina S. Godbole, John Lamb. 189-195 [doi]
- Field Agronomic Condition Test (F.A.C.T.) Environmental sensing: The Future of Agricultural and Conservation IOTWill Krause, Austin Jarrett, Jacob Bertish, Chetan Jaiswal. 196-202 [doi]
- TruParking: Smart Parking and the Internet of ThingsJacob Bertish, Austin Jarrett, William Krause, Chetan Jaiswal. 203-209 [doi]
- Adaptive QoS-Based Resource Management Framework for IoT/Edge ComputingTom Springer, Erik Linstead. 210-217 [doi]
- Implementation of Searchable Encryption System with Dedicated Hardware and its EvaluationMasaya Yoshikawa, Yoshiya Ikezaki, Yusuke Nozaki. 218-221 [doi]
- Implementing a Mobile Identity Application in a Ubiquitous Computing EnvironmentChristopher R. Byrnes, Tyler V. Rimaldi. 222-228 [doi]
- Towards DoS/DDoS Attack Detection Using Artificial Neural NetworksOsman Ali, Paul Cotae. 229-234 [doi]
- A Statistical Analysis of Electronic Instant Messaging Consequences in NetworksAtah Abdi. 235-240 [doi]
- Smart City Software Revolution - Blackboard Systems for Smart City SolutionsWenkang Su, David Lehman, Gregg Vesonder. 241-244 [doi]
- Automation of RF Characterization Process for the Development of Feedforward AGC of Software Defined RadioMuhammad Zeeshan, Adeel Asim, Usman Ahmed, Muhammad Waqas Khan, Naeem Amjad, Waqar Ahmed. 245-248 [doi]
- Incorporating Advancements In Voting Strategies: A SurveyVarsha Poddar, Sayan Mondal, Neelava Dutta, Hrishab Dey. 249-254 [doi]
- New Compact Deep Learning Model for Skin Cancer RecognitionPhillip Ly, Doina Bein, Abhishek Verma. 255-261 [doi]
- Indoor Localization Using Bluetooth-LE BeaconsSudarshan S. Chawathe. 262-268 [doi]
- Improving Secrecy Capacity and Energy Efficiency of Wireless Cognitive Radio Networks with Cooperative Relaying and JammingShamsad Parvin, Hong Huang, Ali Alshehri. 269-275 [doi]
- Sensor Cooperation and Decision Fusion to Improve Detection in Cognitive Radio Spectrum Sensingzafar iqbal, Saeid Nooshabadi, Khaled Jadi, Ahmad Ghasemi. 276-281 [doi]
- Using LZMA Compression for Spectrum Sensing with SDR SamplesAndré R. Rosete, Kenneth R. Baker, Yao Ma. 282-287 [doi]
- Triple band V-slotted Pentagonal Microstrip Patch AntennaMurari Shaw, Subham Kundu, Tithi Ghosh, Subhayan Das, Sannoy Mitra, Malay Gangopadhyay. 288-290 [doi]
- PCL-Based Autonomous Wheelchair Navigation in Unmapped Indoor EnvironmentsVed Contractor, Harkishan Singh Grewal, Neha Thotappala Jayaprakash, Aaron Matthews, Kiran George. 291-296 [doi]
- Insider Threat Detection using an Artificial Immune system AlgorithmObinna Igbe, Tarek N. Saadawi. 297-302 [doi]
- A Hybrid Uplink Scheduling Approach for Supporting Mission-Critical Smart Grid applications in Commercial 4G Cellular NetworksAhmed Hassebo, Alfred Rezk, Mohamed A. Ali. 303-308 [doi]
- A Decentralized Mobile Computing Network for Multi-Robot Systems OperationsJabez Leong Kit, David Mateo, Roland Bouffanais. 309-314 [doi]
- Non-fragile Synchronization of Markovian Jumping Complex Dynamical Networks with Random Coupling and Time-Varying DelaysFehrs Adu Gyamfi, Yuhua Cheng, Chun Yin, Shouming Zhong. 315-321 [doi]
- An Ontology-Based IoT Communication Data Reduction MethodYunkang Xu, Tomoji Kishi. 321-325 [doi]
- Slot Reallocation for Ground Delay ProgramsYin Sheng, Haibin Zhu, Guan Wang. 322-327 [doi]
- Design and Implementation of Intelligent Logistics Distribution System for the Real-world ProblemTaoyu Ye, Defu Zhang, Zhenfeng Lei, Sifan Cai, Jianzhen Li, Anwar-ul-Haq. 328-334 [doi]
- Implementation of a BJT based jerk circuit: route to chaos with multiple attractorsFariha Ghaffar, Sajid Iqbal, Umer Shahid, Muhammad Abdullah. 335-339 [doi]
- Clock Variation Impact on Digital Filter PerformanceSandun S. Kuruppu, Alexander Shibilski. 340-344 [doi]
- Design of Measurement and Control System in Marine Electric PropulsionBei Chen, Wenlun Cao, Yuyao He, Zhenhong Jiao, Hong Li, Chongwu Wang. 344-347 [doi]
- Multi-Agent Approach to Analyzing Kinetics of a Multi-Actuated OmniDirectional Mobile Robot for Control System DevelopmentJennifer R. Field, Mishah U. Salman. 348-354 [doi]
- Non-Intrusive Activity Detection and Prediction in Smart Residential SpacesAniruddha Patel, Chinmay Prabhudesai, Baris Aksanli. 355-361 [doi]
- Micro Wind Turbine Control System with Fail-Safe Shutdown CapabilityXavier Collazo Fernandez, Javier Sánchez Navarro, Luis C. Rendon Estrada, Jeffrey Borres Martinez, Diego A. Aponte-Roa. 362-367 [doi]
- Building Towards "Invisible Cloak": Robust Physical Adversarial Attack on YOLO Object DetectorDarren Yu Yang, Jay Xiong, Xincheng Li, Xu Yan, John Raiti, Yuntao Wang, Huaqiang Wu, Zhenyu Zhong. 368-374 [doi]
- A Reference Model for Big Data AnalyticsGrace Park, Vijayan Sugumaran, Sooyong Park. 382-391 [doi]
- Information Systems: An Agent for Growth in Rural Small and Medium EnterprisesLethamaga Tladi, Ray Kekwaletswe. 392-399 [doi]
- Causes of Success in the La Liga and How to Predict themDaniel Klivansky, Mohamad El Hajj. 400-407 [doi]
- Improved Method for Solving Aerodynamic Problems Using Numerical and Computational SimulationsRichard Kyung, Jae Hyuk Song, Remy Wu. 408-411 [doi]
- Smart Cross-Platform Binary Visualisation ToolBee Lee Ong, Chai Kiat Yeo. 412-417 [doi]
- An Electronic Instrument for Measurement of the Charge and Energy of Cosmic-Rays in High-Altitude BalloonsWookwon Lee, Nicholas B. Conklin. 418-423 [doi]
- Low SWaP, In-Situ Data Logger for Strain Measurement of Paddlefish Rostrums in MotionClayton R. Thurmer, Jason D. Ray, Jordan D. Klein, Steven L. Bunkley, Anton Netchaev, Reena R. Patel, Guillermo A. Riveros, Edward J. Perkins, Jan Jeffery Hoover. 424-428 [doi]
- A Novel Fault Self-Detectable Universal Quantum Reversible Circuits Array DesignPeiqiao Wu, Ruoqi Wei, Khaled M. Elleithy. 429-437 [doi]
- Combining Satellite Images with Feature Indices for Improved Change DetectionDaniel Pérez, Yan Lu, Chiman Kwan, Yuzhong Shen, Krzysztof Koperski, Jiang Li. 438-444 [doi]
- Iris Print Biometric Identification Using Perceptual Image Hashing AlgorithmsThomas Arciuolo, Muhammad Wasimuddin, Sushant Singh, Khaled Elleithy. 445-450 [doi]
- Comparative Performance Analysis of Beam Sweeping Using a Deep Neural Net and Random Starting Point in mmWave 5G New RadioAsim Mazin, Mohamed Elkourdi, Richard D. Gitlin. 451-456 [doi]
- Probabilistic Blockchains: A Blockchain Paradigm for Collaborative Decision-MakingTara Salman, Raj Jain, Lav Gupta. 457-465 [doi]
- Machine Learning to Identify Android MalwareGeran Tam, Aaron Hunter. 466-470 [doi]
- Applying Machine Learning Models to Identify Forest CoverPeter Johnson, Eman Abdelfattah. 471-474 [doi]
- LBSNN: Neural Networks-based Moving SinkDjamila Mechta, Saad Harous. 475-481 [doi]
- Perpetual Flight for UAV Drone Swarms Using Continuous Energy ReplenishmentAndrew Boggio-Dandry, Tolga Soyata. 478-484 [doi]
- Testing Autonomous Path Planning Algorithms and Setup for Robotic Vehicle NavigationSasha Pietrzik, Balasubramaniyan Chandrasekaran. 485-488 [doi]
- Gaming the Gamer: Adversarial Fingerprinting of Gaming Apps using Smartphone AccelerometersRichard Matovu, Abdul Serwadda. 489-496 [doi]
- Optimal Trajectory Planning for Multiple Waypoint Path Planning using Tabu SearchKarthika Balan, Chaomin Luo. 497-501 [doi]
- Simulation and Analysis of DDoS Attack on Connected Autonomous Vehicular Network using OMNET++Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, Ahmad Y. Javaid. 502-508 [doi]
- Cross-layer Multi-hop Broadcast based on Adaptive Neuro-Fuzzy Inference System in VANETsElnaz Limouchi, Imad Mahgoub. 509-515 [doi]
- Cyber Diode: Animated 2D Barcodes as a Mobile and Robust Data DiodeChristopher Geiger. 516-519 [doi]
- Fuzzy Logic-based Evolutionary Approach for Load Balancing in Large-Scale Wireless Sensor NetworksYoucef Touati. 520-525 [doi]
- Security in Wireless Sensor Network and IoT: An Elliptic Curves Cryptosystem based ApproachE. H. Teguig, Y. Touati. 526-530 [doi]
- Performance Modeling and Analysis of Wireless Multi-hop Hierarchical Ad Hoc NetworkWenting Mu, Xu Li 0007, Ying Liu 0023, Wenjun Huang. 531-536 [doi]
- A Neural Network Approach for Indoor Fingerprinting-Based LocalizationRayana H. Jaafar, Samer S. Saab. 537-542 [doi]
- Morph-a-Dope: Using Pupil Manipulation to Spoof Eye Movement BiometricsIsaac Griswold-Steiner, Zakery Fyke, Mushfique Ahmed, Abdul Serwadda. 543-552 [doi]
- Mars Surface Mineral Abundance Estimation Using THEMIS and TES ImagesChiman Kwan, Christopher Haberle, Adam Echavarren, Bulent Ayhan, Bryan Chou, Bence Budavari, Scott Dickenshied. 553-558 [doi]
- Perceptually Lossless Compression for Mastcam ImagesChiman Kwan, Jude Larkin. 559-565 [doi]
- Enhancing Stereo Image Formation and Depth Map Estimation for Mastcam ImagesChiman Kwan, Bryan Chou, Bulent Ayhan. 566-572 [doi]
- Stereo Image and Depth Map Generation for Images with Different Views and ResolutionsChiman Kwan, Bryan Chou, Bulent Ayhan. 573-579 [doi]
- Automatic Food-Intake Monitoring System for Persons Living with Alzheimer's-Vision-Based Embedded SystemAmer Kais Obaid, Ikhlas Abdel-Qader, Maureen Mickus. 580-584 [doi]
- Integrating YOLO Object Detection with Augmented Reality for iOS AppsSagar Mahurkar. 585-589 [doi]
- A Novel Reversible Four Bit One's Complement Quantum Gate (OCQG-4B)Thomas Arciuolo, Muhammad Wasimuddin, Sushant Singh, Khaled Elleithy. 590-597 [doi]
- Simulation and Analysis of Quality of Service (QoS) of Voice over IP (VoIP) through Local Area NetworksFekadu Yihunie, Eman Abdelfattah. 598-602 [doi]
- Distribution Model for OpenFlow-Based NetworksAbdulrahman Almohaimeed, Abu Asaduzzaman. 603-608 [doi]
- Locating and Disregarding the Information from Compromised Sensors in a WSNzafar iqbal, Saeid Nooshabadi, Heung-No Lee. 609-613 [doi]
- An Efficient Weight-Based Clustering Algorithm using Mobility Report for IoVOussama Senouci, Saad Harous, Zibouda Aliouat. 614-620 [doi]
- An Unsupervised Channel-Selection Method for SSVEP-based BCI SystemsEthan Webster, Hadi Habibzadeh, James J. S. Norton, Theresa M. Vaughan, Tolga Soyata. 626-632 [doi]
- Flexible FSK Learning DemodulatorPaul Gorday, Nurgün Erdöl, Hanqi Zhuang. 633-639 [doi]
- Design of a VOIP Services Portfolio for Small Businesses Based on Free Download Software ToolsMiguel Molina, Angelo Vera, Carolina Molina, Priscila Garzon. 640-644 [doi]
- A New Power Analysis Attack and a Countermeasure in Embedded SystemsFangming Chai, Kyoung-Don Kang. 645-652 [doi]
- Activity Learning and Recognition Using Margin Setting Algorithm in Smart HomesOgbonna Michael Igwe, Yi Wang, George C. Giakos. 653-658 [doi]
- Seagrass Propeller Scar Detection using Deep Convolutional Neural NetworkMd Reshad Ul Hoque, Kazi Aminul Islam, Daniel Pérez, Victoria Hill, Blake Schaeffer, Richard Zimmerman, Jiang Li. 659-665 [doi]
- Deep Learning with Synthetic Hyperspectral Images for Improved Soil Detection in Multispectral ImageryYan Lu, Daniel Pérez, Minh Dao, Chiman Kwan, Jiang Li. 666-672 [doi]
- Enhancing the Ensemble of Exemplar-SVMs for Binary Classification Using Concurrent Selection and Ensemble LearningYaobin Qin, Bingzhe Li, David J. Lilja. 673-682 [doi]
- Anomaly Generation Using Generative Adversarial Networks in Host-Based Intrusion DetectionMilad Salem, Shayan Taheri, Jiann-shiun Yuan. 683-687 [doi]
- Analysis and Detection of Outliers due to Data Falsification Attacks in Vehicular Traffic Prediction ApplicationRaj Mani Shukla, Shamik Sengupta. 688-694 [doi]
- Low-Cost Device Prototype for Automatic Medical Diagnosis Using Deep Learning MethodsNeil Deshmukh. 695-699 [doi]
- Trainable Robotic Arm for Disability AssistanceAdam Zaheer, Durga Sundaram, Kiran George. 700-704 [doi]
- Sip-and-Puff Autonomous Wheelchair for Individuals with Severe DisabilitiesHarkishan Singh Grewal, Aaron Matthews, Richard Tea, Ved Contractor, Kiran George. 705-710 [doi]
- Channel Capacity in a Dynamic Random Waypoint Mobility ModelFaeik T. Al Rabee, Ashraf Al-Rimawi, Richard D. Gitlin. 711-715 [doi]
- Sliding Mode Control with Dirty Derivatives Filter for Rigid Robot ManipulatorsRayana H. Jaafar, Samer S. Saab. 716-720 [doi]
- Prediction of air leakage in heat exchangers for automotive applications using artificial neural networksKatarzyna Peta, Jan Zurek. 721-725 [doi]
- A Survey of Privilege Escalation Detection in AndroidShinelle Hutchinson, Cihan Varol. 726-731 [doi]
- Deep Learning based Offline Signature VerificationMadasu Hanmandlu, A. Bhanu Sronothara, Shantaram Vasikarla. 732-737 [doi]
- Study on the Biochemical Nanoparticles for Bioimaging and Molecular Diagnostics of Alzheimer's DiseaseAmanda Kyung, Mia Moon, Yoon Jeong Kwon. 738-741 [doi]
- Effects of K-space Spatial Low-pass Filtering on Bio-imaging AnalysisAndrew Kyung, Yoon JinMika Kwon, Lauren Chung. 742-745 [doi]
- Robust Background Subtraction Based Person's Counting From Overhead ViewMisbah Ahmad, Imran Ahmed, Kaleem Ullah, Iqbal Khan, Awais Adnan. 746-752 [doi]
- On Measuring the Complexity of Musical RhythmGodfried T. Toussaint, Konstantinos Trochidis. 753-757 [doi]
- RGB-D Model Based Human Detection and Tracking Using 3D CCTVJunchul Chun, Seohee Park. 758-762 [doi]
- Augmenting Stochastic Local Search with HeuristicsRamoni O. Lasisi, Robert DuPont. 763-768 [doi]
- Encryption and Decryption of Mobile Security Using AES and GOST AlgorithmsMuhammad Ilyas, Talha Naqash, Sajjad Hussain Shah. 769-772 [doi]
- Potential effect of suboptimal racial and ethnic categorization on benefits of precision medicineFrederick Zhang, Joseph Finkelstein. 773-778 [doi]
- A New Differential Oscillator with T-type FeedbackMehdi Azadmehr, Aaron Schreyer-Miller, Igor Paprotny, Yngvar Berg. 779-782 [doi]
- A GPU accelerated parallel heuristic for the 2D knapsack problem with rectangular piecesMohammad Harun Rashid. 783-787 [doi]
- Design and Construction of an Obstacle Avoiding Robot Based on Arduino Platform and Programming TooMiguel Molina, Angelo Vera, Carolina Molina, Priscila Garzon. 788-791 [doi]
- Enhancing IEEE 802.11i Standard using Quantum CryptograpMichael Gonzales, Paul Duncan, Kerssy Fermin, Roshad A. Guerrier, Abdelrahman Elleithy. 792-795 [doi]
- Advanced Security Methods for Dummy Location-Based ServicAnthony Cafaro, Joseph Candela, Nestor Lewis, Xavier Yaurimo, Abdelrahman Elleithy. 796-799 [doi]
- Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID SysteRania Baashirah, Abdelshakour Abuzneid, Akhil Tammineedi, Maneesha Mathew, Neelam Bandaru, Pulkit Delair. 800-805 [doi]
- BID: Blockchaining for IoT DevicesMatthew Frederick, Chetan Jaiswal. 806-811 [doi]
- Quality of Service Analysis of VoIP ServicesAbdullah Alhayajneh, Alessandro N. Baccarini, Thaier Hayajneh. 812-818 [doi]
- A Survey of Technologies Utilized in the Treatment and Diagnosis of Attention Deficit Hyperactivity DisorderLauren E. Johnson, James M. Conrad. 819-824 [doi]
- Age Upon Decisions with General ArrivalsYunquan Dong, Pingyi Fan. 825-829 [doi]
- Hexagonal Meshed Rectangular Reflectarray Antenna in Ku Band for Satellite CommunicationPranav Srinivasan, Laxman Sethuraman, Rahul Bhaskaran, H. Umma Habiba. 830-835 [doi]
- Evacuation Assisting Strategies in Vehicular Ad Hoc NetworksCong Pu. 836-841 [doi]
- Performance Analysis of DS-CDMA and MC-CDMA SystemsYoonill Lee. 842-846 [doi]
- Automated Structured Threat Information Expression (STIX) Document Generation with Privacy PreservationFarhan Sadique, Sui Cheung, Iman Vakilinia, Shahriar Badsha, Shamik Sengupta. 847-853 [doi]
- Tracking Area Update Procedure Unnecessary in 5G: Improving User Experience and Offloading Signaling OverheadAlaa A. R. Alsaeedy, Edwin K. P. Chong. 854-860 [doi]
- Concerns and Security for Hashing PasswordsJonathan Herrera, Md Liakat Ali. 861-865 [doi]
- Development of Web-based Automated System for Cyber Analytic ApplicationsAthira Pillai, James Schnebly, Shamik Sengupta. 866-871 [doi]
- Towards A Smart Hospital: Automated Non-Invasive Patient's Discomfort Detection in Ward Using Overhead CameraIqbal Khan, Imran Ahmed, Misbah Ahmad, Kaleem Ullah. 872-878 [doi]
- Exploiting Behavioral Differences to Detect Fake NeWeiling Chen, Chenyan Yang, Gibson Cheng, Yan Zhang, Chai Kiat Yeo, Chiew Tong Lau, Bu-Sung Lee. 879-884 [doi]
- Deep Learning of Electrocardiography Dynamics for Biometric Human Identification in era of IoTQingxue Zhang. 885-888 [doi]
- Verifying of LTE Received Power Measurements in an Android AppHazza Al-Shamisi, Humaid Al-Shamsi, Ivica Kostanic, Josko Zec. 889-894 [doi]
- Digital VHF/UHF Antenna Selector Implemented in Software Defined RadioAaron E. Cohen, Aylin Uyar, Samantha Paralikas, David A. Heide. 895-900 [doi]
- Neural Encoder-Decoder based Urdu Conversational AgentMehreen Alam. 901-905 [doi]
- A Comparative Analysis of Properties that May be Used for Malware DetectionJimmy Hua, Aaron Hunter. 906-910 [doi]
- Cost-constrained Handoff in Next Generation Heterogeneous Wireless NetworksMd. Salik Parwez, Habeeb Olufowobi. 911-916 [doi]
- Automated Dye-Sensitized Solar Cell Manufacturing System with IoT MonitoringAdam Zaheer, Kiran George. 917-921 [doi]
- Classifying Self-Care Activities of Children and Youths with DisabilitiesSudarshan S. Chawathe. 922-928 [doi]
- Biomedical Data Reduction with Sub-Nyquist Sampling and Wavelet DecompositionXiaonan Chen, Ismail Jouny. 929-933 [doi]
- Cloud based telemedicine in Neurology Clinics: A new horizonLokesh S. Ramamoorthi, Saurabh Shukla. 934-938 [doi]
- Computational 3D Imaging of Tissues Using Single Frequency Microwave DataReza K. Amineh, Maryam Ravan. 939-944 [doi]
- ReGene: Blockchain backup of genome data and restoration of pre-engineered expressed phenotypeS. Mason Dambrot. 945-950 [doi]
- SmartEye: An Accurate Infrared Eye Tracking System for SmartphonesBraiden Brousseau, Jonathan Rose, Moshe Eizenman. 951-959 [doi]
- Towards Cost Effective Smarter CitiesGabrielle Padriga, Daniel Shapiro, Gregg Vesonder. 960-963 [doi]
- Crowdfunding the Insurance of a Cyber-Product Using BlockchainIman Vakilinia, Shahriar Badsha, Shamik Sengupta. 964-970 [doi]
- Classification and Regression Decision Tree: A Mining Technique for Students' Insights on the University Services with Text AnalysisMaryli F. Rosas, Shaneth C. Ambat, Alejandro D. Magnaye, John Renbert F. Rosas. 971-976 [doi]
- Predicting Congestion Level in Wireless Networks Using an Integrated Approach of Supervised and Unsupervised LearningAlisha Thapaliya, James Schnebly, Shamik Sengupta. 977-982 [doi]
- Merkle-Tree Based Approach for Ensuring Integrity of Electronic Medical RecordsBrihat Sharma, Chandra N. Sekharan, Fanyu Zuo. 983-987 [doi]
- A Review: Ubiquitous Healthcare Monitoring with Mobile PhoneMuhammad Uzair, Muazzam A. Khan, Shaiza Mann, Muhammad Imran. 988-996 [doi]
- Step Length and Step Width Estimation using Wearable SensorsSteven Diaz Hernandez, Shawn Disdier, Miguel A. Labrador. 997-1001 [doi]
- Scalable Smart Home Interface using Occipitalis sEMG Detection and ClassificationBrian Luu, Bradley Hansberger, Mandy Chiu, Vinay Kumar Karigar Shivappa, Kiran George. 1002-1008 [doi]
- Acute Stress Detection and Analysis Using Resonant Field Imaging (RFI) TechniqueRakesh Raveendra, Matthew Regueiro, Kiran George. 1009-1016 [doi]
- Mobile Robot-based Exergames for Navigation Training and Vestibular RehabilitationFabrizio Lamberti, Alberto Cannavò, Paolo Pirone, Carla Montuschi, Roberto Albera. 1017-1024 [doi]
- A Verifiable (n, n) Secret Image Sharing Scheme Using XOR OperationsArup Kumar Chattopadhyay, Debalina Ghosh, Paramita Maitra, Amitava Nag, Himadri Nath Saha. 1025-1031 [doi]
- Mobile Switch Control Using Auditory and Haptic Steady State Response in Ear-EEGMandy Chiu, Hemamalini Murthy, Kiran George. 1032-1037 [doi]
- Electromagnetic Absorption Comparison of Dipole and Microstrip Patch Antenna in the Human HeadSikder Sunbeam Islam, Arnab Chowdhury, Nissan Paul, Shafait Ahmed. 1038-1041 [doi]
- *Rugui Yao, Yuxin Zhang, Pengfei Jiang, Lukun Yao, Xiaoya Zuo. 1042-1046 [doi]
- Performance Evaluation of TSCH in Industrial WSNSeema Kharb, Anita Singhrova. 1047-1054 [doi]
- Real-time Activity and Fall Risk Detection for Aging Population Using Deep LearningQingxue Zhang, Shuang Zhu. 1055-1059 [doi]
- Study on the Economic Indicator Forecasts Using Computational StatisticsAndrew Kyung, Chanyeol Kim. 1060-1066 [doi]
- A low cost autonomous multipurpose vehicle for advanced roboticsSandipan Chakraborty, Shouvik Mukherjee, Tamaghna Nag, Bipasha Biswas, Barnamoy Garang, Annesha Nayak. 1067-1078 [doi]
- Smart Motorcycle Vest Using Arduino and Vibration Sensing ModuleHimadri Nath Saha, Tanishq Banerjee, Suvrojit Kumar Saha, Arjun Dutta, Shuvam Ghosal, Ranit Bandyopadhyay, Ayush Das, Niloy Chakravorty, Anirup Roy, Soham Pandit, Sushovan Biswas. 1079-1085 [doi]
- Teleoperated Rover for the Standoff Ultracompact micro-Raman Spectroscopy InstrumentJoe Cloud, Daniel Kolano, Arthur Bradley. 1086-1087 [doi]
- Data capturing and modeling by speech recognition: Roles demonstrated by artificial intelligence, A surveyVarsha Poddar, Bhagyashree Chatterjee, Didhiti Nandi, Biswarup Ghosh, Sayan Mondal. 1088-1092 [doi]