


default search action
ICT Express, Volume 6
Volume 6, Number 1, March 2020
- Khasa Gillani

, Jong-Hyouk Lee:
Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing. 1-2 - Seungwon Lee, Yalei Zhang, Seokho Yoon, Iickho Song

:
Order statistics and recursive updating with aging factor for cooperative cognitive radio networks under SSDF attacks. 3-6 - Yee-Loo Foo

:
Operating white space devices in the DTV service area. 7-10 - Pham Thanh Hiep

, Tran Manh Hoang
:
Non-orthogonal multiple access and beamforming for relay network with RF energy harvesting. 11-15 - Vinayakumar R.

, Soman K. P.:
Siamese neural network architecture for homoglyph attacks detection. 16-19 - Swati Rawal, Sahadeo Padhye

:
Cryptanalysis of ID based Proxy-Blind signature scheme over lattice. 20-22 - Muhammad Usman Hadi

, Pier Andrea Traverso
, Giovanni Tartarini, Hyun Jung:
Experimental characterization of Sigma Delta Radio over fiber system for 5G C-RAN downlink. 23-27 - Shehzad Muhammad Hanif

, Muhammad Bilal
:
Competitive residual neural network for image classification. 28-37 - Sheba Diamond Thabah, Prabir Saha

:
New design approaches of reversible BCD encoder using Peres and Feynman gates. 38-42 - Devrim Unal

, Mohammad Hammoudeh
, Mehmet Sabir Kiraz
:
Policy specification and verification for blockchain and smart contracts in 5G networks. 43-47 - Nirwan Ansari

, Liang Zhang
:
Flexible backhaul-aware DBS-aided HetNet with IBFD communications. 48-56 - Sangsung Park, Sunghae Jun:

Technological cognitive diagnosis model for patent keyword analysis. 57-61 - Dongeun Suh, Seokwon Jang, Sol Han, Sangheon Pack, Xiaofei Wang:

Flexible sampling-based in-band network telemetry in programmable data plane. 62-65
Volume 6, Number 2, June 2020
- Van-Sang Doan

, Dong-Seong Kim
:
DOA estimation of multiple non-coherent and coherent signals using element transposition of covariance matrix. 67-75 - Ario Yudo Husodo

, Grafika Jati, Amarulla Octavian, Wisnu Jatmiko:
Switching target communication strategy for optimizing multiple pursuer drones performance in immobilizing Kamikaze multiple evader drones. 76-82 - Sangku Lee, Janghyuk Youn, Bang Chul Jung:

A cooperative phase-steering technique in spectrum sharing-based military mobile ad hoc networks. 83-86 - Chang Seok You, Jeong Seon Yeom, Bang Chul Jung:

Cooperative maximum-ratio transmission with multi-antenna relay nodes for tactical mobile ad-hoc networks. 87-92
- Shijie Zhang, Jong-Hyouk Lee:

Analysis of the main consensus protocols of blockchain. 93-97 - Sydney Mambwe Kasongo, Yanxia Sun

:
A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System. 98-103 - Lukman Abiodun Olawoyin

, Nasir Faruk, Abdulkarim Ayopo Oloyede
, Segun I. Popoola, Temitayo C. Adeniran
, Nazmat Toyin Surajudeen-Bakinde, Abubakar Abdulkarim
:
Secure transmission in an unfriendly environment. 104-108 - Jae-Hyouk Jahng, Seung Keun Park:

Simulation-based prediction for 5G mobile adoption. 109-112 - Muhammad Tariq Mahmood

, Usman Ali
, Young-Kyu Choi:
Single image defocus blur segmentation using Local Ternary Pattern. 113-116 - Jongtaek Oh

, Minwoo Kim:
Method to determine initial aiming azimuth accuracy using acceleration, gyroscope, and geomagnetic sensors. 117-120 - Yonten Jamtsho

, Panomkhawn Riyamongkol
, Rattapoom Waranusast:
Real-time Bhutanese license plate localization using YOLO. 121-124 - Majd Latah

, Levent Toker:
Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach. 125-127 - Huy-Trung Nguyen

, Quoc-Dung Ngo, Doan-Hieu Nguyen, Van-Hoang Le
:
PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms. 128-138 - Nirwan Ansari

, Di Wu
, Xiang Sun:
FSO as backhaul and energizer for drone-assisted mobile access networks. 139-144 - Sara Kaviani, Insoo Sohn:

Influence of random topology in artificial neural networks: A survey. 145-150
Volume 6, Number 3, September 2020
- Flávio S. Corrêa da Silva, Frederico P. Costa, Antonio F. Iemma:

Practical considerations regarding classification learning for clinical diagnosis and therapy advice in oncology. 151-154 - K. Deepak, L. K. P. Vignesh, S. Chandrakala

:
Autocorrelation of gradients based violence detection in surveillance videos. 155-159 - Sotirios P. Sotiroudis

, Sotirios K. Goudos
, Katherine Siakavara:
Deep learning for radio propagation: Using image-driven regression to estimate path loss in urban areas. 160-165 - Aman Malali, Srinidhi Hiriyannaiah

, G. M. Siddesh, K. G. Srinivasa
, Sanjay N. T.:
Supervised ECG wave segmentation using convolutional LSTM. 166-169 - Keerthana Rangasamy, Muhammad Amir As'ari, Nur Azmina Rahmad

, Nurul Fathiah Ghazali
:
Hockey activity recognition using pre-trained deep learning model. 170-174 - Jin-A. Choi

, Kiho Lim:
Identifying machine learning techniques for classification of target advertising. 175-180 - Shahriar Kaisar

:
Developmental dyslexia detection using machine learning techniques : A survey. 181-184 - Brainvendra Widi Dionova

, M. N. Mohammed, Salah Al-Zubaidi
, Eddy Yusuf
:
Environment indoor air quality assessment using fuzzy inference system. 185-194 - Kyoung Son Jhang, Hansol Kang, Hyeokchan Kwon:

CNN training for age group prediction in an illumination condition. 195-199 - Cheng-Yen Tang, Chien-Hung Liu, Woei-Kae Chen, Shingchern D. You

:
Implementing action mask in proximal policy optimization (PPO) algorithm. 200-203 - Xiwei Wang, Minh Nguyen, Jonathan Carr, Longyin Cui, Kiho Lim:

A group preference-based privacy-preserving POI recommender system. 204-208 - Yossawee Keaomanee, Apichat Heednacram, Prakarnkiat Youngkong:

Implementation of four kriging models for depth inpainting. 209-213 - Erna Hikmawati, Nur Ulfa Maulidevi

, Kridanto Surendro
:
Adaptive rule: A novel framework for recommender system. 214-219 - Nwamaka U. Okafor, Yahia Alghorani, Declan T. Delaney:

Improving Data Quality of Low-cost IoT Sensors in Environmental Monitoring Networks Using Data Fusion and Machine Learning Approach. 220-228 - Amir Farzad

, T. Aaron Gulliver
:
Unsupervised log message anomaly detection. 229-237 - Stefano Cagnoni

, Lorenzo Cozzini, Gianfranco Lombardo, Monica Mordonini, Agostino Poggi, Michele Tomaiuolo:
Emotion-based analysis of programming languages on Stack Overflow. 238-242 - Kristo Radion Purba, David Asirvatham

, Raja Kumar Murugesan
:
An analysis and prediction model of outsiders percentage as a new popularity metric on Instagram. 243-248
- Kentaro Yonei, Kazuki Maruta

, Chang-Jun Ahn:
Frame splitting and data-aided decision direct channel estimation for OFDM in fast varying fading channels. 249-252 - Sarabjeet Kaur Kochhar

, Uma Ojha:
Index for objective measurement of a research paper based on sentiment analysis. 253-257 - Hojjat Emami

, Abbas Ali Sharifi:
An improved backtracking search optimization algorithm for cubic metric reduction of OFDM signals. 258-261
Volume 6, Number 4, December 2020
- Tabassum Lubna, Imtiaz Mahmud, You-Ze Cho:

D-LIA: Dynamic congestion control algorithm for MPTCP. 263-268 - Hao Wang

:
Trade-off queuing delay and link utilization for solving bufferbloat. 269-272 - Mostafa K. Ardakani, Seyed Mohammad Fatemi, Hamid-Reza Hamidi

, Mojtaba Kamaliardakani
:
A hybrid adaptive approach to improve position tracking measurements. 273-279 - Quoc-Dung Ngo, Huy-Trung Nguyen

, Van-Hoang Le
, Doan-Hieu Nguyen:
A survey of IoT malware and detection methods based on static features. 280-286 - Sohyun Joo, Tae-Yoon Kim, Taewon Song

, Sangheon Pack:
MU-MIMO enabled uplink OFDMA MAC protocol in dense IEEE 802.11ax WLANs. 287-290 - Md. Sajjad Hossain

, Cosmas Ifeanyi Nwakanma
, Jae-Min Lee, Dong-Seong Kim
:
Edge computational task offloading scheme using reinforcement learning for IIoT scenario. 291-299 - Soumya S., Pramod K. V:

Sentiment analysis of malayalam tweets using machine learning techniques. 300-305 - A. Dhanalakshmi

, G. Nagarajan
:
Combined spatial temporal based In-loop filter for scalable extension of HEVC. 306-311 - Ibrahem Kandel

, Mauro Castelli
:
The effect of batch size on the generalizability of the convolutional neural networks on a histopathology dataset. 312-315 - Mriganka Mandal

:
Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption. 316-319 - Anji Reddy Vaka

, Badal Soni
, Sudheer Reddy K.
:
Breast cancer detection by leveraging Machine Learning. 320-324 - Ban Mohammed Khammas:

Ransomware Detection using Random Forest Technique. 325-331 - Myuu Myuu Wai Yan:

Accurate detecting concept drift in evolving data streams. 332-338 - Trung Hoai Tran:

Hierarchical codebook using the last layer to improve the angular estimation in MIMO system. 339-342 - Imtiaz Mahmud, You-Ze Cho:

BBR Advanced (BBR-A) - Reduced retransmissions with improved fairness. 343-347 - Nguyen Thi Huyen

, Duong Duc Ha
, Pham Thanh Hiep
:
Buried objects detection in heterogeneous environment using UWB systems combined with curve fitting method. 348-352 - Samuel Dayo Okegbile

, Olabisi I. Ogunranti:
Users emulation attack management in the massive internet of things enabled environment. 353-356 - Mohammad Aman Ullah

, Syeda Maliha Marium, Shamim Ara Begum, Nibadita Saha Dipa:
An algorithm and method for sentiment analysis using the text and emoticon. 357-360 - Nerella Sameera, M. Shashi:

Deep transductive transfer learning framework for zero-day attack detection. 361-367 - Ghanbar Azarnia

, Abbas Ali Sharifi, Hojjat Emami
:
Compressive sensing based PAPR reduction in OFDM systems: Modified orthogonal matching pursuit approach. 368-371

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














