default search action
ICACT 2022: Pyeongchang, Korea
- 24th International Conference on Advanced Communication Technology, ICACT 2022, Pyeongchang, Korea, February 13-16, 2022. IEEE 2022, ISBN 979-11-88428-08-3
- Rui Teng, Kazuto Yano, Yoshinori Suzuki:
Estimation of Network Type Based on The Response Delay Property. 1-6 - Jong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko:
A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks. 1-5 - Yosuke Higasa, Kazutoshi Yoshii, Megumi Saito, Jiang Liu, Shigeru Shimamoto, Takuya Okura, Naoko Yoshimura, Amane Miura, Hiroyuki Tsuji, Morio Toyoshima:
Performance Analysis of DSSS-PDMA with SIC in GEO Satellite-Terrestrial Uplink Networks. 1-6 - Mykola Servetnyk, Wei-Han Hsiao, Alisher Mukashev:
Performance Evaluation of Polarization Effects on 5G Clustered Delay Line Channels. 1-6 - Samin Sadri, Aamir Shahzad, Kaiwen Zhang:
Blockchain Traceability in Healthcare: Blood Donation Supply Chain. 1-8 - Ming-Shen Jian, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Wen-Hsiang Hsieh:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 1-8 - Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:
A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. 1-8 - Mi Tian, Mihai Sima, Michael McGuire:
Fixed-Point Arithmetic for Implementing Massive MIMO Systems. 1-11 - Kosei Ono, Kazutoshi Yoshii, Megumi Saito, Zhenni Pan, Jiang Liu, Shigeru Shimamoto:
Performance Analysis of Intelligent Reflecting Surface-Assisted Orbital Angular Momentum-Based Communication Systems. 7-12 - Edgard Ndassimba, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Feasibility of interconnecting the University of Bangui and peripheral areas via the TVWS for e-learning in the context of COVID-19. 7-13 - Noha H. Khattab, Samy S. Soliman, M. Saeed Darweesh, Amr A. El-Sherif:
Relay Selection in NOMA-Based Diamond Relaying Networks. 13-19 - Ibrahima Gueye, Idy Diop, Ibra Dioum, Khadidiatou Wane Keita, Papis Ndiaye, Moussa Diallo, Sidi Mohamed Farssi:
Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes. 14-22 - Nemesio A. Macabale:
On the Stability of Load Adaptive Routing Over Wireless Community Mesh and Sensor Networks. 21-26 - Mohammadreza Robaei, Robert Akl, Robin Chataut, Utpal Kumar Dey:
Adaptive Millimeter-Wave Channel Estimation and Tracking. 23-28 - Boryau Hsupeng, Kun-Wei Lee, Te-En Wei, Shih-Hao Wang:
Explainable Malware Detection Using Predefined Network Flow. 27-33 - Shixin Liao, Yueying Zhan, Ziyuan Shi, Lei Yang:
A High Throughput and Flexible Rate 5G NR LDPC Encoder on a Single GPU. 29-34 - Sheng-Xiang Lin, Zong-Jyun Li, Tzu-Yang Chen, Dong-Jie Wu:
Attack Tactic Labeling for Cyber Threat Hunting. 34-39 - Shan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai:
The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network. 35-41 - Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura:
Collusion Resistant Watermarking for Deep Learning Models Protection. 40-43 - Fatou Ndiaye Mbodji, Gervais Mendy, Ahmath Bamba Mbacke, Samuel Ouya:
Incentive and Playful Strategy for a Participative Model of Learning and Experimenting Blockchain. 42-47 - Haolin Zou, Zhongyong Wang, Pao-An Lin, Weilong Zhan, Peixin Chen, Yuxin Li, Yuyang Chen, Zide She, Juhui He, Bing-Yuh Lu:
PID Control Aided Thermal Comfortable of the User's Temperature Tracing Movable Electrical Heating Radiator. 44-48 - Woong-Sub Park, Hyuk Lee, Jin-Young Choi:
Formal Modeling of Smart Contract-based Trading System. 48-52 - Seokbeom Oh, Soojeong Lee, Yong-Geun Hong, Gyuyeol Kong, Hyun-Kook Kahng:
Performance Evaluation of Partial Offloading under Various Scenarios in Mobile Edge Computing. 49-52 - Hyeonah Jung, Hyungjoon Koo, Jaehoon Paul Jeong:
IoTivity Packet Parser for Encrypted Messages in Internet of Things. 53-57 - Jinsuk Baek, Munene W. Kanampiu:
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. 53-57 - Jun Guo, Xinwei Liu, Chen Liu, Zixuan Zhao, Bin Zhang:
An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time Constraints. 58-62 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:
A Framework of Large-Scale Virtual City Simulation with Land-Use Model. 58-61 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Service model of risk mitigation on livestock pandemic based on Networks. 62-65 - Charnon Poolsin, Nattakit Sa-Ngiam, Nikorn Sutthisangiam:
Development of Centimeter Level Positioning Mobile Based Application. 63-67 - Navin Dookeram, Zahira Hosein, Patrick Hosein:
A Recommender System for the Upselling of Telecommunications Products. 66-72 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:
A Study on the Population Distribution Prediction in Large City using Agent-Based Simulation. 68-71 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:
Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee. 72-76 - Yong Hee Park, Won Seok Choi, Seong Gon Choi:
The Method of Learning Personal Preference with Reinforcement Learning. 73-77 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:
Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption Optimization. 77-80 - Mei Liu, Ankang Lin, Rushan Wu, Sen Liu, Gaowei Lei, Junzhi Lu, Man Xie, Pao-An Lin, Junbai Wu, Bing-Yuh Lu:
Preliminary Study of Cloud Aided Monitoring of Basic Physiological Signals. 78-82 - Seung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:
OS noise Analysis on Azalea-unikernel. 81-84 - Tran Cong Hung, Tran Duy Tien, Le Ngoc Hieu:
A Proposed Load Balancer Using Naïve Bayes to Enhance Response Time on Cloud Computing. 82-90 - Jingwei Li, Yibo Lyu, Xu Li, Tianxiang Wang, Xiaowen Dong:
Reservoir Computing Based Equalization for Radio over Fiber System. 85-90 - Seongho Yoon, Miyoung Kang:
DDoS attacks detection in the cloud using K-medoids algorithm. 91-94 - Mi Tian, Mihai Sima, Michael McGuire:
Massive MIMO in Fixed-Point Arithmetic. 91-95 - Zhen-Yuan Pan, Jiann-Liang Chen, Yao-Chung Chang:
Low-Latency Computation Offloading based on 5G Edge Computing Systems. 95-100 - Yoshimi Fujii, Tetsuya Iye, Kensuke Tsuda, Akihiro Tanibayashi:
A 28 GHz Beamforming Technique for 5G Advanced Communication Systems. 96-99 - Tetsuya Iye, Kensuke Tsuda, Yoshimi Fujii:
An Experimental Study of 28 GHz Analog Beamforming with a Uniform Linear Array. 100-103 - Dan Meng, Yonghang Yan, Lun Xia, Zhijia Li, Xuewen Xia, Chen Chen:
A Novel Gateway Deployment Solution for MANETs Interconnecting with Internet. 101-105 - Yasuaki Ohira, Takahiro Matsumoto, Hideyuki Torii, Yuta Ida:
Construction of Optical ZCZ Sequence Set with the Zero-Correlation Zone 2z Suitable for PPM-OCDMA System. 106-111 - Satyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim:
Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies. 109-112 - Guangjin Fang, Bin Shen, Hong Zhang, Taiping Cui:
Dynamic spectrum access based on double deep Q-network and convolution neural network. 112-116 - Tae-Shin Kang, Moon-Il Joo, Beom-Soo Kim, Tae-Gyu Lee:
Blockchain-based Lightweight Transaction Process Modeling and Development. 113-118 - Ming-Shen Jian, Jian-Ting Guo, Hung-Jen Chen, Yu-Zhi Luo, Yu-Chen Lai:
Cloud Blockchain Based Multiple Inspection Information Exchanging for Agriculture and Food Safety. 117-124 - Mohamad Arsalan Sheikh, Faryal Khattak, Gul Zameen Khan, Farookh Khadeer Hussain:
Secured Land Title Transfer System in Australia using VPN based Blockchain Network. 125-131 - Xiaojun Hou, Heng Wu, Ting Peng, Xiaoling Wang, Taoyan Zhou, Kesheng Yang:
IoT based Construction Site Monitoring System for Highway Engineering. 127-131 - Mohamad Arsalan Sheikh, Gul Zameen Khan, Farookh Khadeer Hussain:
Systematic Analysis of DDoS Attacks in Blockchain. 132-137 - Yuma Narita, Shan Lu, Hiroshi Kamabe:
Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. 132-136 - Lae Yeop Lee, Seong Gon Choi:
Energy Loss Minimization Modelling for Given Energy Path in Vehicular Energy Network. 137-140 - Jong-Hoon Lee, Seongho Yoon, Hyuk Lee:
SWC-based Smart Contract Development Guide Research. 138-141 - Sung-Chan Nam, Hong-Beom Choi, Young-Bae Ko:
On Mitigation of Ranging Errors for Through-the-Body NLOS Conditions using Convolutional Neural Networks. 141-144 - Aekyung Moon, Juyoung Park, Yun Jeong Song:
Prediction of Compression Ratio for Transform-based Lossy Compression in Time-series Datasets. 142-146 - Hong Jun Choi, Hyuk Lee, Jin-Young Choi:
Is a False Positive really False Positive? 145-149 - Taku Noguchi, Masato Nakagawa, Masami Yoshida, Alberto Gallegos Ramonet:
A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT. 147-153 - Beom-Jun Cho, Ki Bong Kwon, Hyun Chul Kim, Sungboo Kang:
A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the Public. 150-154 - Hye Young An, Won Seok Choi, Seong Gon Choi:
Real-Time Path Planning for Trajectory Control in Autonomous Driving. 154-159 - Seung-Hee Oh, Woo-Sug Jung, Yong-Tae Lee, Kyung-Seok Kim:
Disaster Warning and Alerting Integrated Systems Based on CAP profile. 155-159 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:
A Study on Estimation of Retransmission Rate of Background Traffic for Various Scan Rates with Scan Response Delay. 160-165 - Yong Hee Park, Seong Gon Choi:
Reinforcement Learning base DR Method for ESS SoC Optimization and Users Satisfaction. 160-166 - Huijie Zhu, Wei Xu, Yalou Sang, Zhiqiang Yao, Limei Liu, Moses Chukwuka Okonkw:
Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation. 166-171 - Yong Hee Park, Won Seok Choi, Ji-Yong Oh, Cheol-Jin Park, Seong Gon Choi:
Implementation of Dynamic HSV Adjusting Method for Lane Detection. 167-171 - Saad Allawi Nsaif, Sang Yoon Park, Jong Myung Rhee:
SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks. 172-175 - Lae Yeop Lee, Won Seok Choi, Seong Gon Choi:
Investment Cost Minimization of Autonomous-Electric Vehicles based on Queueing Model. 172-178 - Masahiro Kawano, Yuhei Nagao, Leonardo Lanante, Masayuki Kurosaki, Hiroshi Ochi:
Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its Implementation. 176-181 - Shuto Takahashi, Masami Yoshida, Alberto Gallegos Ramonet, Taku Noguchi:
Shadowing-Fading-based Intersection Geographic Opportunistic Routing Protocol for Urban VANETs. 179-184 - Hanji Shen, Jun Li, Wei Wan, Chun Long, Jingdeng Zhou, Yuhao Fu, Xiaofan Song:
Tamper Detection Based on Webpage Change Features. 182-186 - Zhijia Li, Yonghang Yan, Xuewen Xia, Lun Xia, Dan Meng, Chen Chen:
A Survey of Coverage Issues in UAV networks. 185-190 - Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng:
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 187-193 - Xuewen Xia, Yonghang Yan, Zhijia Li, Dan Meng, Lun Xia, Chen Chen:
A Survey of UAV Clustering Algorithm. 191-196 - Zengguang Liu, XiaoChun Yin, Ruiping Yang, Anming Dong:
Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method. 194-199 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:
Beamforming Design of the Wireless Power Transfer System into Multiple IoT Sensors. 197-200 - Jang-Hyeon Jeong, Jong-Beom Kim, Seong Gon Choi:
Zero-Day Attack Packet Highlighting System. 200-204 - Lun Xia, Yonghang Yan, Dan Meng, Zhijia Li, Xuewen Xia, Chen Chen:
An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov model. 201-206 - Sunghyun Yoon, Mun-Hwan Choi, Juyoung Park:
Implementation of Smart Farm Devices using Open Source Software. 205-209 - Hanji Shen, Jun Li, Xiang Fu:
BiLSTM-Ridge Regression Meta Learning Model for Few-Shot Logs Classification. 207-211 - Matasem Saleh, N. Z. Jhanjhi, Azween B. Abdullah, Raazia Saher:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. 210-219 - Zijiao Zhou, Haowei Yang, Huibo Li, Jihao Zhang, Siqi Li, Xiang Gao, Peng Gong:
A Dynamic Cyber-attack Approach for Real-time Hardware-in-the-loop Simulation of Power Grid. 212-217 - Kyeong Tae Kim, Jae-Deok Lim, Jeong-Nyeo Kim:
An IoT Device-trusted Remote Attestation Framework. 218-223 - Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:
Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. 220-225 - Rui Wang, Yonghang Yan:
A Survey of Secure Boot Schemes for Embedded Devices. 224-227 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysis. 226-229 - Rui Wang, Yonghang Yan:
A Novel Trusted Boot Model for Embedded Smart Device without TPM. 228-233 - Warunyu Hematulin, Patcharin Kamsing, Peerapong Torteeka, Thanaporn Somjit, Thaweerath Phisannupawong, Tanatthep Jarawan:
Cooperative Motion Planning for Multiple UAVs via the Bézier Curve Guided Line of Sight Techniques. 230-236 - Dinh-Lam Pham, Viet-Vu Vu, Byeongnam Yoon, Kyoungsook Kim, Kwanghoon Pio Kim:
A Conceptual Architecture for Deep-learning-based Video-Objects Retrieving System. 234-238 - Md. Masud Rana, Narendra Dahotre:
Bayesian Network and Semidefinite Programming Based Wireless Power Transfer Manufacturing System State Estimation and Regulation. 237-241 - Matasem Saleh, NZ Jhanjhi, Azween B. Abdullah, Raazia Saher:
IoTES (A Machine learning model) Design dependent encryption selection for IoT devices. 239-246 - Tanatthep Jarawan, Patcharin Kamsing, Peerapong Torteeka, Shariff Manuthasna, Warunyu Hematulin, Tachodom Chooraks, Thaweerath Phisannupawong, Sitthirak Sangkarak, Sookaseam Mungkhud, Thanaporn Somjit:
Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithm. 242-247 - Juyong Park, Seokju Oh, Jongpil Jeong:
A Defect Detection Model for Casting Product using Wavelet Transform Denoise and Xception. 247-251 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:
An efficient & Cost-Effective EPON-Based Next Generation 5G Mobile Backhaul RAN Architecture. 248-253 - Minjae Park, Sohyang Park, Thanh-Hai Nguyen, Dinh-Lam Pham, Dongkeun Oh, Kyoung-Sook Kim, In-Kyoo Chun, Kwanghoon Pio Kim:
A Time-Series Process Event Log Preprocessing Approach for Data-Intensive and Predictive Operationalization of Smart Factories. 252-255 - Gyeoul Lee, Jonghoon Lee, Youngsoo Kim, Jong-Geun Park:
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset. 254-258 - Md Ariful Islam Mozumder, Muhammad Mohsan Sheeraz, Ali Athar, Satyabrata Aich, Hee-Cheol Kim:
Overview: Technology Roadmap of the Future Trend of Metaverse based on IoT, Blockchain, AI Technique, and Medical Domain Metaverse Activity. 256-261 - Yafei Hou, Shun Kawasaki, Satoshi Denno:
Busy/Idle Duration Prediction for Video and Audio WLAN Traffics Using Autoregressive Predictor with Data Categorization. 259-264 - Chih-Hung Chen, Yiwei Ma, Ying-Hsun Lai, Wen-Tsung Chang, Shun-Ching Yang:
Analyzing Disinformation with the Active Propagation Strategy. 262-266 - Kazuto Yano, Eiji Nii, Kenta Suzuki, Koji Yamamoto:
Timestamp Synchronization of Received Frames among Multiple Wireless LAN Nodes for Robust Access Point Coordination. 265-270 - Yiran Li, Gentaro Konishi, Megumi Saito, Shigeru Shimamoto:
An Efficient Topology-based Optimization Method of Broadband Absorbing Material. 267-271 - Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:
APT attack response system through AM-HIDS. 271-274 - Minh Chau Nguyen, Hee-Sun Won, Siwoon Son, Yerin Woo, Hyeonjae Jeong:
Metadata Management and Harvesting System in Smart Open Data As a Service. 272-275 - Jutiphat Chatsomsanga, Chawalit Benjangkaprasert:
Malware Developing Guide: Encryption and Decryption. 275-278 - Jong Jin Cho, Miyoung Kang:
Threat Modeling Analysis on FireStormcx's Webcam System. 276-281 - Babu Kaji Baniya:
Intrusion Representation and Classification using Learning Algorithm. 279-284 - Dana Sulistiyo Kusumo, Nungki Selviandro, Kusuma Ayu Laksitowening, Veronikha Effendy, Monterico Adrian:
An Initial Usability Testing for Improving Acceptance Criteria in A Scrum Project: An Angkasa LMS case study. 282-287 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:
Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). 285-291 - Muhammad Fasih, Hyeonho Yoon, Namhyun Kwan, Junhyeong Kim, Jinhyeong Yoon, Rabiul Islam Sikder, Hamza Kurt, Hyo-Hoon Park:
Optical Sideband Modulation in Silicon Photonics Platform Using Mach-Zehnder Interferometers. 288-292 - James Kin Wah Lan, Frankie Kin Wah Lee:
Drone Forensics: A Case Study on DJI Mavic Air 2. 291-296 - Rabiul Islam Sikder, Muhammad Fasih, Zunnoor Fayyaz Awan, Hyeonho Yoon, Hyo-Hoon Park, Hamza Kurt:
Different Multi-layer Photonic Configurations for Light Filtering in Optical Communications. 293-296 - Yanjun Liang, Hongxi Yin, Lianyou Jing, Xiuyang Ji, Jianying Wang:
Performance Analysis of Relay-Aided NOMA in Underwater Optical Wireless Communication System under Ocean Turbulence. 297-302 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, So-Hyun Park, Il-Gu Lee:
Study on Systematic Ransomware Detection Techniques. 297-301 - YuXin Li, JinPeng Chen, Bing-Yuh Lu, Xin Li, CanJie Yao, LinShu Zheng, Xin Bai, WanQin Jiang:
Wireless Voice-controlled Movable Electrical Heating Radiator. 302-305 - Hyun-Woo Rhee, Jong-Bum You, Jae-Yong Kim, Hyeonho Yoon, Hyo-Hoon Park:
8K Video Data Transmission through Optical Phased Array Packaged by Direct Optical Wire Bonding. 303-306 - Ali Hassan, Shahram Shah-Heydari:
TCP Congestion Avoidance in Data Centres using Reinforcement Learning. 306-311 - Yoshi Michael Cho, Hiroyuki Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura:
Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning. 307-312 - Shubham Jain, Amy de Buitléir, Enda Fallon:
An Extensible Parsing Pipeline for Unstructured Data Processing. 312-318 - Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang:
The Impact of the Practical Security Test during the Software Development Lifecycle. 313-316 - Nay Myat Min, Vasaka Visoottiviseth, Songpon Teerakanok, Nariyoshi Yamai:
OWASP IoT Top 10 based Attack Dataset for Machine Learning. 317-322 - Jun Guo, Heyan Gao, Zeyu Yan, Jiahui Cao, Zhenbo Fu:
Vehicle Detection Counting Algorithm Based on Background Subtraction Algorithm and SORT. 319-325 - Chun Long, Jianping Xiao, Jinxia Wei, Jing Zhao, Wei Wan, Guanyao Du:
Autoencoder ensembles for network intrusion detection. 323-333 - Yoshiaki Taniguchi, Hiroto Masuda:
A Conversion System Based on Acoustic Communication for Using Bluetooth Low Energy Sensors Underwater. 326-329 - Hui Zhang, Lingli Zhang, Yonghang Yan, Linlin Ci:
A Review of Gateway Load Balancing Methods in Connecting MANET into Internet. 330-335 - Sufang Zhou, Mingzhe Liao, Baojun Qiao, Xiaobo Yang:
A Survey of Security Aggregation. 334-340 - Hui Zhang, Lingli Zhang, Yonghang Yan, Linlin Ci:
A Survey of Multipath Load Balancing Based on Network Stochastic Model in MANET. 336-341 - Faryal Nosheen, Usman Qamar, Muhammad Summair Raza:
A Heuristic Approach to Dynamically Update Approximations of Dominance Based Rough Set Theory. 341-346 - Baiyou Qiao, Zhongqiang Wu, Zhong Tang, Gang Wu:
Sea Surface Temperature Prediction Approach Based on 3D CNN and LSTM with Attention Mechanism. 342-347 - Jaegyeong Cha, Juyong Park, Jongpil Jeong:
A Novel Defect Classification Scheme Based on Convolutional Autoencoder with Skip Connection in Semiconductor Manufacturing. 347-352 - Jun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang:
Vision Detection System Based on Mixed Recognition of Gesture and Speech. 348-353 - Hong-Quan Do, T. H.-An Nguyen, Quoc-Anh Nguyen, Trung-Hieu Nguyen, Viet-Vu Vu, Cuong Le:
A Fast Clustering-based Recommender System for Big Data. 353-359 - Kokou Gaglo, Bessan Melckior Dégboé, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Proposal of conversational chatbots for educational remediation in the context of covid-19. 354-358 - Vu-Tuan Dang, Hong-Quan Do, Viet-Vu Vu, Byeongnam Yoon:
Facial Expression Recognition: A Survey and its Applications. 359-367 - M. T. Nguyen, A. T. Nguyen, Van-Dung Hoang, D. D. Lam:
A feature extraction method for automatic identification of flying targets from radar data. 360-364 - Viet-Vu Vu, Byeongnam Yoon, Hong-Quan Do, Hai-Minh Nguyen, Tran-Chung Dao, Cong-Mau Tran, Doan-Vinh Tran:
An empirical study for density peak clustering. 365-369 - Ali Hussain, Ikromjanov Kobiljon Komil Ugli, Beom Su Kim, Minji Kim, Harin Ryu, Satyabrata Aich, Hee-Cheol Kim:
Detection of Different stages of COPD Patients Using Machine Learning Techniques. 368-372 - James Kouawa Tamgno, Emile Kone Araba, Zacharia Damoue, Claude Lishou:
Optimization Of Eigrp Dynamic Routing Protocol Based On Artificial Intelligence Algorithm. 370-379 - Jong-Sung Kim:
DNN-based Human Activity Recognition by Learning Initial Motion Data for Virtual Multi-Sports. 373-375 - Ming-Shen Jian, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Mu-Xuan Yu:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 376-381 - Mariella Rivas, Richard Roach, Patrick Hosein:
Premium Rate Services Fraud Detection. 380-386 - Nadege Gladys Ndassimba, Edgard Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Digital elementary school solution with moodlebox in a conflict zone: the case of the Central African Republic. 382-386 - Yong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi:
Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers. 387-392 - Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti:
Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. 387-391 - Oumayma Mejri, Dana Yang, Inshil Doh:
Cloud Security Issues and Log-based Proactive Strategy. 392-397 - Yusei Katsura, Pranpariya Sakarin, Nariyoshi Yamai, Hiroyuki Kimiyama, Vasaka Visoottiviseth:
Quick Blocking Operation of Firewall System Cooperating with IDS and SDN. 393-398 - A. T. C. Chen, M. Rakib Uddin:
SOI Rib Waveguide Physical Dimension Dependent Micro Ring Resonator Characterization. 398-401 - Javier Hernandez Fernandez, Luis Lacasa, Aymen Omri, Alfredo Sanz, Munther E. Koborsi:
Ergodic Capacity Analysis of OFDM-based NB-PLC Systems. 399-405 - A. T. C. Chen, M. Rakib Uddin:
Transverse Electric (TE) and Transverse Magnetic (TM) Modes Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide. 402-406 - Nishat I. Mowla, Joakim Rosell, Arash Vahidi:
Dynamic Voting based Explainable Intrusion Detection System for In-vehicle Network. 406-411 - Nurazmina Lingas, M. Rakib Uddin:
Sleep Mode on Delay Sensitive Traffic on Optical Network Unit. 407-410 - Rachata Maneekut, Daniel J. Elson, Yuta Wakayama, Shohei Beppu, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani:
Demonstration of Hybrid Probabilistic Geometric Shaping 64QAM Optical Fiber Transmission Using Optimized Constellation for MAP Detection with Hard Decision Decoding. 411-414 - Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang, Chi-Chin Tsai:
Trustworthy Software Development - practical view of security processes through MVP methodology. 412-416 - Kwihoon Kim, Se Won Oh:
Edge Computing System applying Integrated Object Recognition based on Deep Learning. 415-419 - Chih-Ting Shen, Yu-Yi Xiao, Yi-Wei Ma, Jiann-Liang Chen, Cheng-Mou Chiang, Shiang-Jiun Chen, Yu-Chuan Pan:
Security Threat Analysis and Treatment Strategy for ORAN. 417-422 - Ikromjanov Kobiljon Komil Ugli, Ali Hussain, Beom Su Kim, Satyabrata Aich, Hee-Cheol Kim:
A Transfer Learning Approach for Identification of Distracted Driving. 420-423 - Toru Taya, Masaki Hanada, Yoichi Murakami, Atsushi Waseda, Yuki Ishida, Takao Mimura, Moo Wan Kim, Eiji Nunohiro:
An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and Responses. 423-430 - Chun-Hee Lee, Jeong-Woo Lee, Yung-Joon Jung, Il-Yeon Cho:
Relocation Framework to Improve the Usage Efficiency of Bicycle-sharing Systems. 424-428 - Yafei Hou, Kazuto Yano, Norisato Suga, Julian L. Webber, Eiji Nii, Toshihide Higashimori, Satoshi Denno, Yoshinori Suzuki:
A Study of Throughput Prediction using Convolutional Neural Network over Factory Environment. 429-434 - Hye-Yeon Shim, Tae-Rim Park, Il-Gu Lee:
Performance Evaluation of Fully Homomorphic Encryption for End-to-End Cryptographic Communication in Multihop Networks. 431-434 - Limin Su, Chao-Jen Huang, Mei Liu, Bing-Yuh Lu, Jidong Che, Ximiao Wang, Jiqi Feng, Changyong Li, Youhong Feng, Yueliu Mo:
Robot for Ball Fetch-and-Carry with Computer Vision in Deep Learning. 435-438 - Zakaria Sawadogo, Gervais Mendy, Jean Marie Dembele, Samuel Ouya:
Android malware detection: Investigating the impact of imbalanced data-sets on the performance of machine learning models. 435-441 - Farrukh Hamza, Qian Sun, Abdunnaser Erwemi, Jin Haeng Lee, Ashfak Ahmed Chowdhury, Quyen Vu Nguyen:
Oilonomics: Making sense of the impact of hydrocarbon production on socio-economics. 439-445 - Viet-Vu Vu, Byeongnam Yoon, Cuong Le, Hong-Quan Do, Hai-Minh Nguyen, Chung Tran, Viet-Thang Vu, Cong-Mau Tran, Doan-Vinh Tran, Tien-Dung Duong:
Active learning for density peak clustering. 442-446 - WooHyun Park:
The Comparison For Epidemiological Investigation Of Corona Virus-19 Pandemic. 446-448 - Viet-Vu Vu, Byeongnam Yoon, Hong-Quan Do, Hai-Minh Nguyen, Tran-Chung Dao, Cong-Mau Tran, Doan-Vinh Tran, Thi-Nhuong Phi, Viet-Thang Vu, Tien-Dung Duong:
Active constraints selection based on density peak. 447-452 - Chi-Cheng Yang, En-Tien Ma, Da-Yu Kao:
Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement. 449-454 - Hong-Lam Le, Duc-Nhan Nguyen, Thi-Thu-Trang Ngo, Ha-Nam Nguyen:
Applying PSO to improve the pedestrian fall detection rate using wearable sensor data. 453-458 - Nguyen Minh Tri, Masahiro Shibata, Masato Tsuru, Akira Kawaguchi:
Locating High-loss Links for OpenFlow Networks by Multiple Hosts to Probe Packets. 455-460 - Meng Liu, Ying Lin, Qingdong Zhu, Junxin Wang, Yi Yang, Chao Gu, Wenbing Zhu, Wenjie Zheng, Demeng Bai, Jiafeng Qin, Jian Wang, Fengda Zhang, Zhuangzhuang Li:
Recognition of Transformer High Frequency Partial Discharge Based on Time Domain Feature. 459-463 - Nada Alzaben, Daniel W. Engels:
End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection Algorithm. 461-467 - James Kouawa Tamgno, Zacharia Damoue, Samuel Ouya, Ahmed D. Kora:
Domain Recognition By Border Observation In Dimension 1 & 2. 464-468 - Jiecong Tang, Shipeng Wang, Tao Bai, Songfeng Lu, Jing Xiong:
Intelligent ATM replenishment optimization based on hybrid genetic algorithm. 469-475 - Gede Agung Ary Wisudiawan, Angelina Prima Kurniati:
Process Mining on Learning Activities in a Learning Management System. 476-482 - Salsabilla Rinaldi, Arfive Gandhi, Nungki Selviandro:
Usability Evaluation and Recommendation of User Interface Design for e-HAC Application by Using User-Centered Design Method. 483-490 - A. A. Gede Yudhi Paramartha, Ketut Agus Seputra, Fauzan Azima, Dio Pramudia Putra, Eva Dwi, Kadek Yota Ernanda Aryanto:
Usability Evaluation of an Interactive Educational Mobile Application. 491-495 - Chih-Chien Hu, Ming-Hsien Chen, Imam Yuadi, Nian-Shing Chen:
The effects of constructing robot-based storytelling system on college students' computational thinking skill and technology comprehension. 496-500 - Dinh Tam Nguyen, Ngoc Lam Dao, Van Thuyet Tran, Khac Thuan Lang, Thanh-Tu Pham, Phi Hung Nguyen, Cong Dan Pham, Tuan Anh Pham, Duc Hai Nguyen, Huu-Thanh Nguyen:
Enhancing CNF performance for 5G core network using SR-IOV in Kubernetes. 501-506 - Nguyen Duc Hoang, Do Nang Toan, Nguyen Tuan Minh:
A technique to improve the displaying quality of skin deformation caused by external force. 507-512 - Mose Gu, Jinyong Kim, Yunbo Shim, Jaehoon Paul Jeong:
SNS Influencer Marketing Platform for Market Advertisement of Small-Sized Business Runners. 513-517 - Miyoung Kang, Jong Jin Cho:
Verification Framework for Software-Defined Networking. 518-523 - Ming-Shen Jian, Wei-Sin Wu, Yi-Hsuan Lin, Xin-Mei Wu, Peng-Wen Wang:
Multi-Objective Optimization Based on Adaptive Evolution Algorithm for Disassembly Line Network Problems. 524-533 - Tran Thanh Phuong, Lam Thanh Hien, Do Nang Toan, Ngo Duc Vinh:
An Eye Blink detection technique in video surveillance based on Eye Aspect Ratio. 534-538 - Xinyan Cao, Guang Chen, Yaxin Zhao, Wei Ren, Jian Cao:
Design and Implementation of a Real-time Target Detection and Tracking System. 539-543 - Zakaria Sawadogo, Gervais Mendy, Jean Marie Dembele, Samuel Ouya:
Android Malware Classification: Updating Features Through Incremental Learning Approach(UFILA). 544-550 - James Kouawa Tamgno, Boudal Niang, Mamadou Alpha Barry, Samuel Ouya:
Domain Identification By Frontier Observation In Cylindrical And Spherical Reference Frame. 551-556 - Xuan Hu, Jie Liu:
Requirements Knowledge Model Construction and Requirements Elicitation Method of Avionics Systems Software based on Multi-ontology. 1265-1279 - Van-Dai Pham, Victor Kisel, Ruslan Kirichek, Andrey Koucheryavy, Alexander Shestakov:
Evaluation of A Mesh Network based on LoRa Technology. 1280-1285 - Xuan Hu, Jie Liu:
Orthogonal Defect Classification-based Ontology Construction and Application of Software-hardware Integrated Error Pattern of Software-intensive Systems. 1286-1298 - Truong Duy Dinh, Vladimir M. Vishnevsky, Van-Dai Pham, Duc Tran Le, Ruslan Kirichek, Andrey Koucheryavy:
Determination of Subscribers Coordinates using Flying Network for Emergencies. 1309-1318 - Deepanjali Mishra, Mangal Sain:
Role of Teachers in Developing Learning Pedagogy. 1315-1321 - Deepanjali Mishra, Mangal Sain:
Web based Learning: A Methodology to Teach Literature in a Classroom. 1329-1335 - Xiaochun Yin, Zengguang Liu, Deyong Liu, Zhenge Liu:
Early Detection of LDDoS Attacks in IoT Utilizing Locality Sensitive Incremental TSVM Method. 1336-1344 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:
A Novel Fully Distributed EPON-Based 5G RAN Architecture Modeling with Handover Analysis. 1364-1373 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:
A Method for Controlling Scan Rate Based on Estimated Retransmission Rate of Background Traffic. 1374-1384 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, Il-Gu Lee:
Ransomware Detection Using Open-source Tools. 1385-1391 - A. T. C. Chen, R. Petra, K. S. K. Yeo, M. Rakib Uddin:
Dimension Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide in Transverse Mode. 1392-1398 - Mary Wu:
An Efficient hole Recovery Method in Wireless Sensor Networks. 1399-1404 - Nada Alzaben, Daniel W. Engels:
End-to-End Routing Algorithm Based on Max-Flow Min-Cut in SDN Controllers. 1405-1413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.