


default search action
ICT Express, Volume 7
Volume 7, Number 1, March 2021
- Won Joon Yun, Soyi Jung

, Joongheon Kim
, Jae-Hyun Kim:
Distributed deep reinforcement learning for autonomous aerial eVTOL mobility in drone taxi applications. 1-4 - Jaemin Jeong

, Ji-Ho Cho
, Jeong-Gun Lee
:
Filter combination learning for CNN model compression. 5-9 - Jinho Kang

, Wan Choi
:
Coordinated regularized zero-forcing beamforming with channel statistics based adaptive feedback for cooperative massive MIMO networks. 10-14 - Carla E. Garcia

, Mario R. Camana
, Insoo Koo:
Machine learning-based scheme for multi-class fault detection in turbine engine disks. 15-22 - Hongrok Choi

, Sangwon Seo
, Daeyoung Jung
, Sangheon Pack
, Min Wook Kang, Yun Won Chung, Hyungjun Joo, Kyungran Kang:
Design and implementation of integrated tactical mobility testbed. 23-27 - Seonyong Kim, Girim Kwon

, Hyuncheol Park:
High-resolution multi-beam tracking with low overhead for mmWave beamforming system. 28-35 - Dongjun Park

, GyuSang Kim
, Donghoe Heo
, Suhri Kim
, HeeSeok Kim
, Seokhie Hong:
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures. 36-40 - Eunkyung Kim

, Heesoo Lee:
Low-latency random access in wireless networks. 41-48 - Hoang Thi Huong Giang

, Pham-Duy Thanh
, Insoo Koo:
Deep Q-learning-based resource allocation for solar-powered users in cognitive radio networks. 49-59 - Seung-Eun Hong:

On the effect of shadowing correlation and pilot assignment on hybrid precoding performance for cell-free mmWave massive MIMO UDN system. 60-70 - Young-Suk Yoon

, Sangwon Hwang
, Dogyoon Lee
, Sangyoun Lee
, Jae-Won Suh, Sung-Uk Jung:
3D mesh transformation preprocessing system in the real space for augmented reality services. 71-75
- Om Pal, Bashir Alam

, Vinay Thakur, Surendra Singh:
Key management for blockchain technology. 76-80 - Sydney Mambwe Kasongo, Yanxia Sun

:
A Deep Gated Recurrent Unit based model for wireless intrusion detection system. 81-87 - Yasser Albagory

:
An efficient sweeping beamforming technique for low-altitude platform-to-sensor communications. 88-93 - Kwi Seob Um, Seo Weon Heo:

Adaptively extendable multi-stage spiking neural network. 94-98 - Satish Kumar Satti

, K. Suganya Devi, Prasenjit Dhar
, P. Srinivasan:
A machine learning approach for detecting and tracking road boundary lanes. 99-103 - Yonten Jamtsho

, Panomkhawn Riyamongkol
, Rattapoom Waranusast:
Real-time license plate detection for non-helmeted motorcyclist using YOLO. 104-109 - N. Bhushana Samyuel, Benjamin A. Shimray

:
Securing IoT device communication against network flow attacks with Recursive Internetworking Architecture (RINA). 110-114 - Haythem Bany Salameh, Haneen Khasawneh:

Routing in cognitive radio networks with full-duplex capability under dynamically varying spectrum availability. 115-120 - Seoung-Ho Choi, Seoung Yeon Jo, Sung Hoon Jung:

Component based comparative analysis of each module in image captioning. 121-125
Volume 7, Number 2, June 2021
- Madhusanka Liyanage

, Pawani Porambage, Aaron Yi Ding
, Anshuman Kalla
:
Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G. 127-137 - Barbara Attanasio

, Aurelio La Corte, Marialisa Scatà
:
Evolutionary dynamics of MEC's organization in a 6G scenario through EGT and temporal multiplex social network. 138-142 - Anupriya, Anita Singhrova

:
Enhanced whale optimization based traffic forecasting for SDMN based traffic. 143-151 - Cosmas Ifeanyi Nwakanma

, Jae-Woo Kim, Jae-Min Lee, Dong-Seong Kim
:
Edge AI prospect using the NeuroEdge computing system: Introducing a novel neuromorphic technology. 152-157 - Asif Ali Laghari

, Mureed Ali Laghari:
Quality of experience assessment of calling services in social network. 158-161 - H. Sabireen

, Neelanarayanan Venkataraman
:
A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. 162-176 - Pushparaj Nimbalkar, Deepak Kshirsagar:

Feature selection for intrusion detection system in Internet-of-Things (IoT). 177-181 - Aishwarya D.

, R. I. Minu
:
Edge computing based surveillance framework for real time activity recognition. 182-186 - Kyeong-Rok Kim

, Soyi Jung
, Jae-Hyun Kim
:
Adaptive speckle filtering for real-time computing in low earth orbit satellite synthetic aperture radar. 187-190 - Young-Min Kim

, Hee-Jun Ahn, Yeon-Soo Kim, Sung-Su Park, Een-Kee Hong
:
Performance evaluation of the effect of traffic decentralization with mobile edge computing. 191-195 - Haemin Lee, Soyi Jung

, Joongheon Kim
:
Truthful electric vehicle charging via neural-architectural Myerson auction. 196-199
- Philemon Nthenge Kasyoka, Michael W. Kimwele, Angolo Shem Mbandu:

Cryptanalysis of a Pairing-free Certificateless Signcryption scheme. 200-204 - Md. Mahiuddin:

Development of an OADM to reduce the incoherent crosstalk in WDM system. 205-209 - N. Muraleedharan

, Janet Barnabas
:
A deep learning based HTTP slow DoS classification approach using flow data. 210-214 - Karma Wangchuk

, Panomkhawn Riyamongkol
, Rattapoom Waranusast:
Real-time Bhutanese Sign Language digits recognition system using Convolutional Neural Network. 215-220 - Jeong Wook Won, Jae-Min Ahn:

3GPP URLLC patent analysis. 221-228 - Julien Polge

, Jérémy Robert, Yves Le Traon
:
Permissioned blockchain frameworks in the industry: A comparison. 229-233 - Priyanka Mishra

, Mehboob ul-Amin
:
Performance evaluation for low complexity cascaded Sphere Decoders using K best detection algorithm. 234-238 - Omid Sharifi-Tehrani

, Mohammad Farzan Sabahi, Meysam R. Danaee:
GNSS jamming detection of UAV ground control station using random matrix theory. 239-243 - Yushan Siriwardhana

, Gürkan Gür
, Mika Ylianttila, Madhusanka Liyanage
:
The role of 5G for digital healthcare against COVID-19 pandemic: Opportunities and challenges. 244-252 - Muhammad Usman Hadi

:
Mitigation of nonlinearities in analog radio over fiber links using machine learning approach. 253-258 - Somayeh Sobati Moghadam

, Amjad Fayoumi, Peyman Vafadoost:
Pavan: A privacy-preserving system for DB-as-a-Service. 259-264 - Sara Kaviani, Insoo Sohn:

Study of scale-free structures in feed-forward neural networks against backdoor attacks. 265-268
Volume 7, Number 3, September 2021
- Kommu Narendra

, G. Aghila:
Fortis-ámyna-smart contract model for cross border financial transactions. 269-273 - Mohamed Allouche, Mihai Mitrea

, Alexandre C. Moreaux
, Sang-Kyun Kim:
Automatic Smart Contract generation for Internet of Media Things. 274-277 - Jaeseung Lee

, Byungheon Lee, Jaeyoung Jung, Hojun Shim, Hwangnam Kim
:
DQ: Two approaches to measure the degree of decentralization of blockchain. 278-282 - Swathi P.

, M. Venkatesan:
Scalability improvement and analysis of permissioned-blockchain. 283-289 - Kenji Saito

, Satoki Watanabe
:
Lightweight selective disclosure for verifiable documents on blockchain. 290-294 - Ray-I Chang, Lien-Chen Wei, Chia-Hui Wang

, Yu-Kai Tseng:
Blockchain for bounded-error-pruned content protection. 295-299 - Chun-Wei Tsai, Yi-Ping Chen, Tzu-Chieh Tang, Yu-Chen Luo:

An efficient parallel machine learning-based blockchain framework. 300-307 - Eugenio Balistri, Francesco Casellato, Carlo Giannelli

, Cesare Stefanelli:
BlockHealth: Blockchain-based secure and peer-to-peer health information sharing with data protection and right to be forgotten. 308-315 - Soonhwa Sung

:
A new key protocol design for cryptocurrency wallet. 316-321 - Youn Kyu Lee, Jongwook Jeong

:
Securing biometric authentication system using blockchain. 322-326 - Igboanusi Ikechi Saviour, Kevin Putra Dirgantoro, Jae-Min Lee, Dong-Seong Kim

:
Blockchain side implementation of Pure Wallet (PW): An offline transaction architecture. 327-334
- Pankaj Nanglia, Sumit Kumar

, Aparna N. Mahajan, Paramjit Singh, Davinder S. Rathee
:
A hybrid algorithm for lung cancer classification using SVM and Neural Networks. 335-341 - Esra'a Alshdaifat, Malak Al-hassan

, Ahmad A. Al-Oqaily:
Effective heterogeneous ensemble classification: An alternative approach for selecting base classifiers. 342-349 - S. Nirmalraj

, G. Nagarajan:
Fusion of visible and infrared image via compressive sensing using convolutional sparse representation. 350-354 - Hafizur Rahman

, Md. Iftekhar Hussain:
A light-weight dynamic ontology for Internet of Things using machine learning technique. 355-360 - Sudhanshu Arya

, Yeon Ho Chung
, Wan-Young Chung, Jong-Jin Kim, Nam-Ho Kim
:
Transmit power optimization over low-power Poisson channel in multiuser MISO indoor optical communications. 361-365 - V. Kanimozhi

, T. Prem Jacob:
Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. 366-370 - Deepak Kshirsagar, Sandeep Kumar

:
An efficient feature reduction method for the detection of DoS attack. 371-375 - Zhiwei Yan, Jong-Hyouk Lee

:
BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain. 376-379 - Woong Cho:

Energy allocation in dual-hop communication system: Comparative study. 380-383 - Irfan Syamsuddin, Irmawati

, Syafaruddin:
An experimental study of RyO Kit for Covid-19 information sharing in rural islands of Indonesia. 384-391 - Pankaj Singh

, Sung-Yoon Jung
:
Data decoding based on iterative spectral image reconstruction for display field communications. 392-397 - Dohyun Kim

, Daeyoung Park
:
Learning-based accelerated sparse signal recovery algorithms. 398-401
Volume 7, Number 4, December 2021
- Zhiyuan Shen

, Yitao Wei:
A high-precision feature extraction network of fatigue speech from air traffic controller radiotelephony based on improved deep learning. 403-413 - Syed Ali Raza Zaidi:

Nearest neighbour methods and their applications in design of 5G & beyond wireless networks. 414-420 - Jothi Letchumy Mahendra Kumar, Mamunur Rashid

, Rabiu Muazu Musa
, Mohd Azraai Mohd Razman
, Norizam Sulaiman
, Rozita Jailani, Anwar P. P. Abdul Majeed
:
The classification of EEG-based wink signals: A CWT-Transfer Learning pipeline. 421-425 - T. Shanmuganantham, K. Bharath Kumar, Srinivasan Ashok Kumar

:
Analysis of tree-shaped slotted impedance matching antenna for 60 GHz femtocell applications. 426-431 - Jobeda Jamal Khanam

, Simon Y. Foo
:
A comparison of machine learning algorithms for diabetes prediction. 432-439 - Sreeraj Madhavankutty, Jestin Joy

:
A machine learning based framework for assisting pathologists in grading and counting of breast cancer cells. 440-444 - Shuoyan Zhang, Kohei Inoue, Kenji Hara:

A convergence proof for local mode filtering. 445-448 - Joelma C. C. e Silva, Flavio S. C. da Silva:

Contextual analysis of pedestrian mobility in transport terminals. 449-452 - Yushi Shirato, Masahiro Muraguchi:

Side information-free low computational complexity TDSS-SLM transmission system. 453-459 - Ting Ding

, Yongjun Zhao, Lei Zhang:
Hybrid precoding for mmWave massive MU-MIMO systems with overlapped subarray: A modified GLRAM approach. 460-467 - Juan M. Gutiérrez Cárdenas

, Zenghui Wang
:
One-class models for validation of miRNAs and ERBB2 gene interactions based on sequence features for breast cancer scenarios. 468-474 - Nobuyoshi Komuro

, Hiromasa Habuchi:
Nonorthogonal CSK/SS ALOHA system under MANET environment. 475-480 - Nicola Capodieci

, Roberto Cavicchioli, Filippo Muzzini
, Leonard Montagna
:
Improving emergency response in the era of ADAS vehicles in the Smart City. 481-486 - Prakasam Periasamy

, Muthusamy Madheswaran, Sujith K. P., Md Shohel Sayeed:
An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices. 487-492 - Angela Caliwag

, Wansu Lim
:
Optimal least square vector autoregressive moving average for battery state of charge estimation and forecasting. 493-496 - Ilaiah Kavati, A. Mallikarjuna Reddy

, Erukala Suresh Babu
, K. Sudheer Reddy
, Ramalingaswamy Cheruku
:
Design of a fingerprint template protection scheme using elliptical structures. 497-500 - Jeong-Hyun Park, Jae-Gon Lee

:
Low-profile high efficiency transmitarray antenna using optimized phase compensation surface (PCS) and PEC sidewalls. 501-506 - Umer Ashraf, Gh. Rasool Begh

:
Error analysis of selection combining over α-μ fading with symmetric alpha-stable noise. 507-511 - T. Thilagam, R. Aruna:

Intrusion detection for network based cloud computing by custom RC-NN and optimization. 512-520 - Ni Putu Sutramiani

, Nanik Suciati
, Daniel Siahaan
:
MAT-AGCA: Multi Augmentation Technique on small dataset for Balinese character recognition using Convolutional Neural Network. 521-529 - Hyunwoo Cho, Hong-Yeop Song

, Jae-Min Ahn, Deok Won Lim
:
Some new RS-coded orthogonal modulation schemes for future GNSS. 530-534 - Jessnor Arif Mat-Jizat, Anwar P. P. Abdul Majeed

, Ahmad Fakhri Ab. Nasir
, Zahari Taha, Edmund Yuen
:
Evaluation of the machine learning classifier in wafer defects classification. 535-539 - Doan Tan Anh Nguyen

, Jingon Joung
, Xin Kang
:
Universal gated recurrent unit-based 3D localization method for ultra-wideband systems. 540-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














