


default search action
ICT Express, Volume 4
Volume 4, Number 1, March 2018
- Junsik Kim, Jaehyun Park:

FPGA-based network intrusion detection for IEC 61850-based industrial network. 1-5 - Nirmalya Kar

, Kaushik Mandal, Baby Bhattacharya
:
Improved chaos-based video steganography using DNA alphabets. 6-13 - Aaron Zimba

, Zhaoshun Wang, Hongsong Chen
:
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems. 14-18 - Subhrajyoti Deb

, Bubu Bhuyan:
Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices. 19-23 - Yuichi Nakamura

, Keiya Harada, Hiroaki Nishi
:
A privacy-preserving sharing method of electricity usage using self-organizing map. 24-29 - Shama Naz Islam

, Md. Apel Mahmud
, Aman Maung Than Oo
:
Impact of optimal false data injection attacks on local energy trading in a residential microgrid. 30-34 - Daisuke Mashima

, Aidana Serikova
, Yao Cheng, Binbin Chen
:
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. 35-41 - Leandros A. Maglaras

, Ki-Hyung Kim, Helge Janicke
, Mohamed Amine Ferrag
, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz
:
Cyber security of critical infrastructures. 42-45
- A. Ilavendhan

, K. Saruladha:
Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. 46-50 - Mikael Asplund:

Automatically proving the correctness of vehicle coordination. 51-54
Volume 4, Number 2, June 2018
- Jaya Gera

, Harmeet Kaur
:
A novel framework to improve the performance of crowdfunding platforms. 55-62 - Mohamed Farouk, Alistair Sutherland:

Principal component pyramids for manifold learning in hand shape recognition. 63-68 - Gayathri R., V. Uma

:
Ontology based knowledge representation technique, domain modeling languages and planners for robotic path planning: A survey. 69-74 - Sota Sawaguchi, Hiroaki Nishi

:
Slightly-slacked dropout for improving neural network learning on FPGA. 75-80 - Elia Erwani Hassan, Titik Khawa Abdul Rahman, Nazrulazhar Bahaman

, Zuhaina Zakaria, Mohd Hanif Jifri:
Load margin expansion for sustainable power system operation. 81-86 - Gianmaria Tarantino, Stefania Monica, Federico Bergenti:

A probabilistic matrix factorization algorithm for approximation of sparse matrices in natural language processing. 87-90 - Jongtaek Oh

, Jisu Kim:
Adaptive K-nearest neighbour algorithm for WiFi fingerprint positioning. 91-94 - Alex Shenfield

, David Day, Aladdin Ayesh
:
Intelligent intrusion detection systems using artificial neural networks. 95-99 - David Balderas Silva

, Pedro Ponce-Cruz, Arturo Molina Gutiérrez
:
Are the long-short term memory and convolution neural networks really based on biological systems? 100-106
- Junaid Ahmed Zubairi, Sahar Idwan

:
Smart algorithms for patient assignment in disasters. 107-111 - Hee-Min Choi, Jae-Gwan Choi, Eun-Soo Kim:

Off-axis multi-projection integral imaging with calibrated elemental image arrays based on pixel-position mapping. 112-117
Volume 4, Number 3, September 2018
- Shun-Ping Chung, Yu-Ju Lu, Yu-Chen Lai:

Cloud computing with single server threshold and double congestion thresholds. 119-123 - Prabhsimran Singh, Ravinder Singh Sawhney, Karanjeet Singh Kahlon:

Sentiment analysis of demonetization of 500 & 1000 rupee banknotes by Indian government. 124-129 - Byung-Seok Kang

, Hyunseung Choo:
An experimental study of a reliable IoT gateway. 130-133 - Hengjun Yu, Kohei Inoue, Kenji Hara, Kiichi Urahama:

Saturation improvement in hue-preserving color image enhancement without gamut problem. 134-137 - Yazan M. Allawi

, Geun Young Kim, Jungbum Cho, Ahmed Galib Reza
, Yongsoo Na, June-Koo Kevin Rhee:
Optimal dynamic subcarrier allocation for dual-band OFDMA-PON supporting integrated fronthaul and backhaul in 5G networks. 138-143 - Xin-Yu Shih

, Hong-Ru Chou:
Reconfigurable VLSI design of a changeable hybrid-radix FFT hardware architecture with 2D-FIFO storing structure for 3GPP LTE systems. 144-148 - Md. Noor-A-Rahim

, Yong Liang Guan:
Impact of estimation error on two-way relaying with relay antenna selection. 149-153 - Lokanadham Naidu Vadlamudi

, Rama Prasad V. Vaddella, Vasumathi Devara:
Robust image hashing using SIFT feature points and DWT approximation coefficients. 154-159 - Raghavendra Pal

, Arun Prakash
, Rajeev Tripathi
, Dhananjay Singh
:
Analytical model for clustered vehicular ad hoc network analysis. 160-164 - Adarsh Patel

, Praveen Kaushik
:
Applicability of adaptive clear channel assessment mode-1 range in intelligent transportation systems devices. 165-170 - Vinodh Kumar Minchula

, G. Sasibhushana Rao:
SVD-based IWFA for next generation wireless MIMO communication. 171-174
Volume 4, Number 4, December 2018
- Een-Kee Hong

, Jung-Yeon Baek, Ye-Ok Jang, Jeehyeon Na, Kyung-Sook Kim:
QoS-guaranteed scheduling for small cell networks. 175-180 - Emtithal Ahmed

, Ryuji Kohno:
Error control coding and decoding with medical QoS constraints for WBAN end-to-end connection via UMTS channel. 181-185 - Seong-Jin Park, Byung-Mok Kim, Eun-Soo Kim:

Single-shot digital holographic microscopy based on computational telecentricity using a single-arm off-axis interferometer. 186-193 - Vivekanand Jha

, Nupur Prakash, Sweta Sagar
:
Wearable anger-monitoring system. 194-198 - Negar Dordaie, Nima Jafari Navimipour

:
A hybrid particle swarm optimization and hill climbing algorithm for task scheduling in the cloud environments. 199-202 - Udit Narayana Kar, Debarshi Kumar Sanyal

:
An overview of device-to-device communication in cellular networks. 203-208 - Hayder A. A. Al-Kashoash

, Fadoua Hassen, Harith Kharrufa
, Andrew H. Kemp:
Analytical modelling of congestion for 6LoWPAN networks. 209-215 - Shayhan Ameen Chowdhury

, Mir Md. Saki Kowsar, Kaushik Deb:
Human detection utilizing adaptive background mixture models and improved histogram of oriented gradients. 216-220 - Shihan Bao, Waleed Hathal, Haitham S. Cruickshank, Zhili Sun

, Philip Michael Asuquo
, Ao Lei:
A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters. 221-227 - Alex Mouapi

, Nadir Hakem, Gilles Y. Delisle:
A new approach to design of RF energy harvesting system to enslave wireless sensor networks. 228-233 - Yiqiao Wei, Seung-Hoon Hwang:

Investigation of spectrum values in rural environments. 234-238
- Alaa Mohasseb

, Mohamed Bader-El-Den, Mihaela Cocea:
Classification of factoid questions intent using grammatical features. 239-242 - Swapna G.

, Vinayakumar R.
, Soman K. P.:
Diabetes detection using deep learning algorithms. 243-246 - Shallu Sharma

, Rajesh Mehra
:
Breast cancer histology images classification: Training from scratch or transfer learning? 247-254 - Vinayakumar R.

, Soman K. P.:
DeepMalNet: Evaluating shallow and deep networks for static PE malware detection. 255-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














