


default search action
ICT Express, Volume 4
Volume 4, Number 1, March 2018
- Junsik Kim, Jaehyun Park:
FPGA-based network intrusion detection for IEC 61850-based industrial network. 1-5 - Nirmalya Kar
, Kaushik Mandal, Baby Bhattacharya
:
Improved chaos-based video steganography using DNA alphabets. 6-13 - Aaron Zimba
, Zhaoshun Wang, Hongsong Chen
:
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems. 14-18 - Subhrajyoti Deb
, Bubu Bhuyan:
Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices. 19-23 - Yuichi Nakamura
, Keiya Harada, Hiroaki Nishi
:
A privacy-preserving sharing method of electricity usage using self-organizing map. 24-29 - Shama Naz Islam
, Md. Apel Mahmud
, Aman Maung Than Oo
:
Impact of optimal false data injection attacks on local energy trading in a residential microgrid. 30-34 - Daisuke Mashima
, Aidana Serikova
, Yao Cheng, Binbin Chen
:
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. 35-41 - Leandros A. Maglaras
, Ki-Hyung Kim, Helge Janicke
, Mohamed Amine Ferrag
, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz
:
Cyber security of critical infrastructures. 42-45
- A. Ilavendhan
, K. Saruladha:
Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs. 46-50 - Mikael Asplund:
Automatically proving the correctness of vehicle coordination. 51-54
Volume 4, Number 2, June 2018
- Jaya Gera
, Harmeet Kaur
:
A novel framework to improve the performance of crowdfunding platforms. 55-62 - Mohamed Farouk, Alistair Sutherland:
Principal component pyramids for manifold learning in hand shape recognition. 63-68 - Gayathri R., V. Uma
:
Ontology based knowledge representation technique, domain modeling languages and planners for robotic path planning: A survey. 69-74 - Sota Sawaguchi, Hiroaki Nishi
:
Slightly-slacked dropout for improving neural network learning on FPGA. 75-80 - Elia Erwani Hassan, Titik Khawa Abdul Rahman, Nazrulazhar Bahaman
, Zuhaina Zakaria, Mohd Hanif Jifri:
Load margin expansion for sustainable power system operation. 81-86 - Gianmaria Tarantino, Stefania Monica, Federico Bergenti:
A probabilistic matrix factorization algorithm for approximation of sparse matrices in natural language processing. 87-90 - Jongtaek Oh
, Jisu Kim:
Adaptive K-nearest neighbour algorithm for WiFi fingerprint positioning. 91-94 - Alex Shenfield
, David Day, Aladdin Ayesh
:
Intelligent intrusion detection systems using artificial neural networks. 95-99 - David Balderas Silva
, Pedro Ponce-Cruz, Arturo Molina Gutiérrez
:
Are the long-short term memory and convolution neural networks really based on biological systems? 100-106
- Junaid Ahmed Zubairi, Sahar Idwan
:
Smart algorithms for patient assignment in disasters. 107-111 - Hee-Min Choi, Jae-Gwan Choi, Eun-Soo Kim:
Off-axis multi-projection integral imaging with calibrated elemental image arrays based on pixel-position mapping. 112-117
Volume 4, Number 3, September 2018
- Shun-Ping Chung, Yu-Ju Lu, Yu-Chen Lai:
Cloud computing with single server threshold and double congestion thresholds. 119-123 - Prabhsimran Singh, Ravinder Singh Sawhney, Karanjeet Singh Kahlon:
Sentiment analysis of demonetization of 500 & 1000 rupee banknotes by Indian government. 124-129 - Byung-Seok Kang
, Hyunseung Choo:
An experimental study of a reliable IoT gateway. 130-133 - Hengjun Yu, Kohei Inoue, Kenji Hara, Kiichi Urahama:
Saturation improvement in hue-preserving color image enhancement without gamut problem. 134-137 - Yazan M. Allawi
, Geun Young Kim, Jungbum Cho, Ahmed Galib Reza
, Yongsoo Na, June-Koo Kevin Rhee:
Optimal dynamic subcarrier allocation for dual-band OFDMA-PON supporting integrated fronthaul and backhaul in 5G networks. 138-143 - Xin-Yu Shih
, Hong-Ru Chou:
Reconfigurable VLSI design of a changeable hybrid-radix FFT hardware architecture with 2D-FIFO storing structure for 3GPP LTE systems. 144-148 - Md. Noor-A-Rahim
, Yong Liang Guan:
Impact of estimation error on two-way relaying with relay antenna selection. 149-153 - Lokanadham Naidu Vadlamudi
, Rama Prasad V. Vaddella, Vasumathi Devara:
Robust image hashing using SIFT feature points and DWT approximation coefficients. 154-159 - Raghavendra Pal
, Arun Prakash
, Rajeev Tripathi
, Dhananjay Singh
:
Analytical model for clustered vehicular ad hoc network analysis. 160-164 - Adarsh Patel
, Praveen Kaushik
:
Applicability of adaptive clear channel assessment mode-1 range in intelligent transportation systems devices. 165-170 - Vinodh Kumar Minchula
, G. Sasibhushana Rao:
SVD-based IWFA for next generation wireless MIMO communication. 171-174
Volume 4, Number 4, December 2018
- Een-Kee Hong
, Jung-Yeon Baek, Ye-Ok Jang, Jeehyeon Na, Kyung-Sook Kim:
QoS-guaranteed scheduling for small cell networks. 175-180 - Emtithal Ahmed
, Ryuji Kohno:
Error control coding and decoding with medical QoS constraints for WBAN end-to-end connection via UMTS channel. 181-185 - Seong-Jin Park, Byung-Mok Kim, Eun-Soo Kim:
Single-shot digital holographic microscopy based on computational telecentricity using a single-arm off-axis interferometer. 186-193 - Vivekanand Jha
, Nupur Prakash, Sweta Sagar
:
Wearable anger-monitoring system. 194-198 - Negar Dordaie, Nima Jafari Navimipour
:
A hybrid particle swarm optimization and hill climbing algorithm for task scheduling in the cloud environments. 199-202 - Udit Narayana Kar, Debarshi Kumar Sanyal
:
An overview of device-to-device communication in cellular networks. 203-208 - Hayder A. A. Al-Kashoash
, Fadoua Hassen, Harith Kharrufa
, Andrew H. Kemp:
Analytical modelling of congestion for 6LoWPAN networks. 209-215 - Shayhan Ameen Chowdhury
, Mir Md. Saki Kowsar, Kaushik Deb:
Human detection utilizing adaptive background mixture models and improved histogram of oriented gradients. 216-220 - Shihan Bao, Waleed Hathal, Haitham S. Cruickshank, Zhili Sun
, Philip Michael Asuquo
, Ao Lei:
A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters. 221-227 - Alex Mouapi
, Nadir Hakem, Gilles Y. Delisle:
A new approach to design of RF energy harvesting system to enslave wireless sensor networks. 228-233 - Yiqiao Wei, Seung-Hoon Hwang:
Investigation of spectrum values in rural environments. 234-238
- Alaa Mohasseb
, Mohamed Bader-El-Den, Mihaela Cocea:
Classification of factoid questions intent using grammatical features. 239-242 - Swapna G.
, Vinayakumar R.
, Soman K. P.:
Diabetes detection using deep learning algorithms. 243-246 - Shallu Sharma
, Rajesh Mehra
:
Breast cancer histology images classification: Training from scratch or transfer learning? 247-254 - Vinayakumar R.
, Soman K. P.:
DeepMalNet: Evaluating shallow and deep networks for static PE malware detection. 255-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.