


default search action
ICACT 2022: Pyeongchang, Korea
- 24th International Conference on Advanced Communication Technology, ICACT 2022, Pyeongchang, Korea, February 13-16, 2022. IEEE 2022, ISBN 979-11-88428-08-3

- Rui Teng, Kazuto Yano, Yoshinori Suzuki:

Estimation of Network Type Based on The Response Delay Property. 1-6 - Jong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko:

A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks. 1-5 - Yosuke Higasa, Kazutoshi Yoshii, Megumi Saito, Jiang Liu, Shigeru Shimamoto, Takuya Okura, Naoko Yoshimura, Amane Miura, Hiroyuki Tsuji, Morio Toyoshima:

Performance Analysis of DSSS-PDMA with SIC in GEO Satellite-Terrestrial Uplink Networks. 1-6 - Mykola Servetnyk, Wei-Han Hsiao, Alisher Mukashev:

Performance Evaluation of Polarization Effects on 5G Clustered Delay Line Channels. 1-6 - Samin Sadri, Aamir Shahzad, Kaiwen Zhang:

Blockchain Traceability in Healthcare: Blood Donation Supply Chain. 1-8 - Ming-Shen Jian

, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Wen-Hsiang Hsieh:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 1-8 - Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:

A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. 1-8 - Mi Tian, Mihai Sima, Michael McGuire:

Fixed-Point Arithmetic for Implementing Massive MIMO Systems. 1-11 - Kosei Ono, Kazutoshi Yoshii, Megumi Saito, Zhenni Pan, Jiang Liu, Shigeru Shimamoto:

Performance Analysis of Intelligent Reflecting Surface-Assisted Orbital Angular Momentum-Based Communication Systems. 7-12 - Edgard Ndassimba

, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Feasibility of interconnecting the University of Bangui and peripheral areas via the TVWS for e-learning in the context of COVID-19. 7-13 - Noha H. Khattab

, Samy S. Soliman, M. Saeed Darweesh
, Amr A. El-Sherif:
Relay Selection in NOMA-Based Diamond Relaying Networks. 13-19 - Ibrahima Gueye, Idy Diop, Ibra Dioum

, Khadidiatou Wane Keita, Papis Ndiaye, Moussa Diallo, Sidi Mohamed Farssi:
Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes. 14-22 - Nemesio A. Macabale:

On the Stability of Load Adaptive Routing Over Wireless Community Mesh and Sensor Networks. 21-26 - Mohammadreza Robaei, Robert Akl, Robin Chataut

, Utpal Kumar Dey:
Adaptive Millimeter-Wave Channel Estimation and Tracking. 23-28 - Boryau Hsupeng, Kun-Wei Lee, Te-En Wei, Shih-Hao Wang:

Explainable Malware Detection Using Predefined Network Flow. 27-33 - Shixin Liao, Yueying Zhan, Ziyuan Shi, Lei Yang:

A High Throughput and Flexible Rate 5G NR LDPC Encoder on a Single GPU. 29-34 - Sheng-Xiang Lin, Zong-Jyun Li, Tzu-Yang Chen, Dong-Jie Wu:

Attack Tactic Labeling for Cyber Threat Hunting. 34-39 - Shan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai:

The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network. 35-41 - Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura:

Collusion Resistant Watermarking for Deep Learning Models Protection. 40-43 - Fatou Ndiaye Mbodji, Gervais Mendy, Ahmath Bamba Mbacke

, Samuel Ouya:
Incentive and Playful Strategy for a Participative Model of Learning and Experimenting Blockchain. 42-47 - Haolin Zou, Zhongyong Wang, Pao-An Lin, Weilong Zhan, Peixin Chen, Yuxin Li, Yuyang Chen, Zide She, Juhui He, Bing-Yuh Lu

:
PID Control Aided Thermal Comfortable of the User's Temperature Tracing Movable Electrical Heating Radiator. 44-48 - Woong-Sub Park, Hyuk Lee, Jin-Young Choi

:
Formal Modeling of Smart Contract-based Trading System. 48-52 - Seokbeom Oh, Soojeong Lee, Yong-Geun Hong, Gyuyeol Kong, Hyun-Kook Kahng:

Performance Evaluation of Partial Offloading under Various Scenarios in Mobile Edge Computing. 49-52 - Hyeonah Jung, Hyungjoon Koo

, Jaehoon Paul Jeong:
IoTivity Packet Parser for Encrypted Messages in Internet of Things. 53-57 - Jinsuk Baek, Munene W. Kanampiu:

A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. 53-57 - Jun Guo, Xinwei Liu, Chen Liu, Zixuan Zhao, Bin Zhang:

An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time Constraints. 58-62 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:

A Framework of Large-Scale Virtual City Simulation with Land-Use Model. 58-61 - Heechang Chung, Dongil Kim, Sokpal Cho:

A Study on the Service model of risk mitigation on livestock pandemic based on Networks. 62-65 - Charnon Poolsin, Nattakit Sa-Ngiam, Nikorn Sutthisangiam:

Development of Centimeter Level Positioning Mobile Based Application. 63-67 - Navin Dookeram, Zahira Hosein, Patrick Hosein:

A Recommender System for the Upselling of Telecommunications Products. 66-72 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:

A Study on the Population Distribution Prediction in Large City using Agent-Based Simulation. 68-71 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:

Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee. 72-76 - Yong Hee Park, Won Seok Choi, Seong Gon Choi:

The Method of Learning Personal Preference with Reinforcement Learning. 73-77 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:

Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption Optimization. 77-80 - Mei Liu, Ankang Lin, Rushan Wu, Sen Liu, Gaowei Lei, Junzhi Lu, Man Xie, Pao-An Lin, Junbai Wu, Bing-Yuh Lu

:
Preliminary Study of Cloud Aided Monitoring of Basic Physiological Signals. 78-82 - Seung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:

OS noise Analysis on Azalea-unikernel. 81-84 - Tran Cong Hung, Tran Duy Tien, Le Ngoc Hieu

:
A Proposed Load Balancer Using Naïve Bayes to Enhance Response Time on Cloud Computing. 82-90 - Jingwei Li, Yibo Lyu, Xu Li, Tianxiang Wang, Xiaowen Dong:

Reservoir Computing Based Equalization for Radio over Fiber System. 85-90 - Seongho Yoon

, Miyoung Kang:
DDoS attacks detection in the cloud using K-medoids algorithm. 91-94 - Mi Tian, Mihai Sima, Michael McGuire:

Massive MIMO in Fixed-Point Arithmetic. 91-95 - Zhen-Yuan Pan, Jiann-Liang Chen, Yao-Chung Chang:

Low-Latency Computation Offloading based on 5G Edge Computing Systems. 95-100 - Yoshimi Fujii, Tetsuya Iye, Kensuke Tsuda, Akihiro Tanibayashi:

A 28 GHz Beamforming Technique for 5G Advanced Communication Systems. 96-99 - Tetsuya Iye, Kensuke Tsuda, Yoshimi Fujii:

An Experimental Study of 28 GHz Analog Beamforming with a Uniform Linear Array. 100-103 - Dan Meng, Yonghang Yan

, Lun Xia, Zhijia Li, Xuewen Xia, Chen Chen:
A Novel Gateway Deployment Solution for MANETs Interconnecting with Internet. 101-105 - Yasuaki Ohira, Takahiro Matsumoto, Hideyuki Torii, Yuta Ida:

Construction of Optical ZCZ Sequence Set with the Zero-Correlation Zone 2z Suitable for PPM-OCDMA System. 106-111 - Satyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim:

Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies. 109-112 - Guangjin Fang, Bin Shen, Hong Zhang, Taiping Cui:

Dynamic spectrum access based on double deep Q-network and convolution neural network. 112-116 - Tae-Shin Kang, Moon-Il Joo, Beom-Soo Kim, Tae-Gyu Lee:

Blockchain-based Lightweight Transaction Process Modeling and Development. 113-118 - Ming-Shen Jian

, Jian-Ting Guo, Hung-Jen Chen, Yu-Zhi Luo, Yu-Chen Lai:
Cloud Blockchain Based Multiple Inspection Information Exchanging for Agriculture and Food Safety. 117-124 - Mohamad Arsalan Sheikh, Faryal Khattak, Gul Zameen Khan, Farookh Khadeer Hussain:

Secured Land Title Transfer System in Australia using VPN based Blockchain Network. 125-131 - Xiaojun Hou, Heng Wu, Ting Peng, Xiaoling Wang, Taoyan Zhou, Kesheng Yang:

IoT based Construction Site Monitoring System for Highway Engineering. 127-131 - Mohamad Arsalan Sheikh, Gul Zameen Khan, Farookh Khadeer Hussain:

Systematic Analysis of DDoS Attacks in Blockchain. 132-137 - Yuma Narita, Shan Lu, Hiroshi Kamabe:

Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. 132-136 - Lae Yeop Lee, Seong Gon Choi:

Energy Loss Minimization Modelling for Given Energy Path in Vehicular Energy Network. 137-140 - Jong-Hoon Lee, Seongho Yoon

, Hyuk Lee:
SWC-based Smart Contract Development Guide Research. 138-141 - Sung-Chan Nam, Hong-Beom Choi, Young-Bae Ko:

On Mitigation of Ranging Errors for Through-the-Body NLOS Conditions using Convolutional Neural Networks. 141-144 - Aekyung Moon, Juyoung Park, Yun Jeong Song:

Prediction of Compression Ratio for Transform-based Lossy Compression in Time-series Datasets. 142-146 - Hong Jun Choi, Hyuk Lee, Jin-Young Choi:

Is a False Positive really False Positive? 145-149 - Taku Noguchi

, Masato Nakagawa, Masami Yoshida, Alberto Gallegos Ramonet
:
A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT. 147-153 - Beom-Jun Cho, Ki Bong Kwon, Hyun Chul Kim, Sungboo Kang:

A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the Public. 150-154 - Hye Young An, Won Seok Choi, Seong Gon Choi:

Real-Time Path Planning for Trajectory Control in Autonomous Driving. 154-159 - Seung-Hee Oh, Woo-Sug Jung, Yong-Tae Lee, Kyung-Seok Kim:

Disaster Warning and Alerting Integrated Systems Based on CAP profile. 155-159 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:

A Study on Estimation of Retransmission Rate of Background Traffic for Various Scan Rates with Scan Response Delay. 160-165 - Yong Hee Park, Seong Gon Choi:

Reinforcement Learning base DR Method for ESS SoC Optimization and Users Satisfaction. 160-166 - Huijie Zhu, Wei Xu, Yalou Sang, Zhiqiang Yao, Limei Liu, Moses Chukwuka Okonkw:

Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation. 166-171 - Yong Hee Park, Won Seok Choi, Ji-Yong Oh, Cheol-Jin Park, Seong Gon Choi:

Implementation of Dynamic HSV Adjusting Method for Lane Detection. 167-171 - Saad Allawi Nsaif, Sang Yoon Park, Jong Myung Rhee:

SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks. 172-175 - Lae Yeop Lee, Won Seok Choi, Seong Gon Choi:

Investment Cost Minimization of Autonomous-Electric Vehicles based on Queueing Model. 172-178 - Masahiro Kawano, Yuhei Nagao, Leonardo Lanante, Masayuki Kurosaki, Hiroshi Ochi:

Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its Implementation. 176-181 - Shuto Takahashi, Masami Yoshida, Alberto Gallegos Ramonet

, Taku Noguchi
:
Shadowing-Fading-based Intersection Geographic Opportunistic Routing Protocol for Urban VANETs. 179-184 - Hanji Shen, Jun Li, Wei Wan, Chun Long, Jingdeng Zhou, Yuhao Fu, Xiaofan Song:

Tamper Detection Based on Webpage Change Features. 182-186 - Zhijia Li

, Yonghang Yan
, Xuewen Xia, Lun Xia, Dan Meng, Chen Chen:
A Survey of Coverage Issues in UAV networks. 185-190 - Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo

, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng:
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 187-193 - Xuewen Xia, Yonghang Yan

, Zhijia Li
, Dan Meng, Lun Xia, Chen Chen:
A Survey of UAV Clustering Algorithm. 191-196 - Zengguang Liu, XiaoChun Yin, Ruiping Yang, Anming Dong:

Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method. 194-199 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:

Beamforming Design of the Wireless Power Transfer System into Multiple IoT Sensors. 197-200 - Jang-Hyeon Jeong, Jong-Beom Kim, Seong Gon Choi:

Zero-Day Attack Packet Highlighting System. 200-204 - Lun Xia, Yonghang Yan

, Dan Meng, Zhijia Li, Xuewen Xia, Chen Chen:
An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov model. 201-206 - Sunghyun Yoon, Mun-Hwan Choi, Juyoung Park:

Implementation of Smart Farm Devices using Open Source Software. 205-209 - Hanji Shen, Jun Li, Xiang Fu:

BiLSTM-Ridge Regression Meta Learning Model for Few-Shot Logs Classification. 207-211 - Matasem Saleh

, N. Z. Jhanjhi
, Azween B. Abdullah, Raazia Saher
:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. 210-219 - Zijiao Zhou, Haowei Yang, Huibo Li, Jihao Zhang, Siqi Li, Xiang Gao, Peng Gong:

A Dynamic Cyber-attack Approach for Real-time Hardware-in-the-loop Simulation of Power Grid. 212-217 - Kyeong Tae Kim, Jae-Deok Lim, Jeong-Nyeo Kim:

An IoT Device-trusted Remote Attestation Framework. 218-223 - Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:

Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. 220-225 - Rui Wang

, Yonghang Yan
:
A Survey of Secure Boot Schemes for Embedded Devices. 224-227 - Heechang Chung, Dongil Kim, Sokpal Cho:

A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysis. 226-229 - Rui Wang

, Yonghang Yan
:
A Novel Trusted Boot Model for Embedded Smart Device without TPM. 228-233 - Warunyu Hematulin, Patcharin Kamsing, Peerapong Torteeka, Thanaporn Somjit, Thaweerath Phisannupawong, Tanatthep Jarawan:

Cooperative Motion Planning for Multiple UAVs via the Bézier Curve Guided Line of Sight Techniques. 230-236 - Dinh-Lam Pham

, Viet-Vu Vu, Byeongnam Yoon, Kyoungsook Kim, Kwanghoon Pio Kim:
A Conceptual Architecture for Deep-learning-based Video-Objects Retrieving System. 234-238 - Md. Masud Rana, Narendra Dahotre:

Bayesian Network and Semidefinite Programming Based Wireless Power Transfer Manufacturing System State Estimation and Regulation. 237-241 - Matasem Saleh

, NZ Jhanjhi
, Azween B. Abdullah, Raazia Saher
:
IoTES (A Machine learning model) Design dependent encryption selection for IoT devices. 239-246 - Tanatthep Jarawan, Patcharin Kamsing, Peerapong Torteeka, Shariff Manuthasna, Warunyu Hematulin, Tachodom Chooraks, Thaweerath Phisannupawong, Sitthirak Sangkarak, Sookaseam Mungkhud, Thanaporn Somjit:

Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithm. 242-247 - Juyong Park, Seokju Oh, Jongpil Jeong:

A Defect Detection Model for Casting Product using Wavelet Transform Denoise and Xception. 247-251 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:

An efficient & Cost-Effective EPON-Based Next Generation 5G Mobile Backhaul RAN Architecture. 248-253 - Minjae Park, Sohyang Park, Thanh-Hai Nguyen

, Dinh-Lam Pham
, Dongkeun Oh, Kyoung-Sook Kim, In-Kyoo Chun, Kwanghoon Pio Kim
:
A Time-Series Process Event Log Preprocessing Approach for Data-Intensive and Predictive Operationalization of Smart Factories. 252-255 - Gyeoul Lee, Jonghoon Lee, Youngsoo Kim

, Jong-Geun Park:
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset. 254-258 - Md Ariful Islam Mozumder, Muhammad Mohsan Sheeraz

, Ali Athar
, Satyabrata Aich, Hee-Cheol Kim:
Overview: Technology Roadmap of the Future Trend of Metaverse based on IoT, Blockchain, AI Technique, and Medical Domain Metaverse Activity. 256-261 - Yafei Hou, Shun Kawasaki, Satoshi Denno:

Busy/Idle Duration Prediction for Video and Audio WLAN Traffics Using Autoregressive Predictor with Data Categorization. 259-264 - Chih-Hung Chen, Yiwei Ma, Ying-Hsun Lai

, Wen-Tsung Chang, Shun-Ching Yang:
Analyzing Disinformation with the Active Propagation Strategy. 262-266 - Kazuto Yano, Eiji Nii, Kenta Suzuki, Koji Yamamoto:

Timestamp Synchronization of Received Frames among Multiple Wireless LAN Nodes for Robust Access Point Coordination. 265-270 - Yiran Li, Gentaro Konishi, Megumi Saito, Shigeru Shimamoto:

An Efficient Topology-based Optimization Method of Broadband Absorbing Material. 267-271 - Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:

APT attack response system through AM-HIDS. 271-274 - Minh Chau Nguyen, Hee-Sun Won, Siwoon Son, Yerin Woo, Hyeonjae Jeong:

Metadata Management and Harvesting System in Smart Open Data As a Service. 272-275 - Jutiphat Chatsomsanga, Chawalit Benjangkaprasert:

Malware Developing Guide: Encryption and Decryption. 275-278 - Jong Jin Cho, Miyoung Kang:

Threat Modeling Analysis on FireStormcx's Webcam System. 276-281 - Babu Kaji Baniya

:
Intrusion Representation and Classification using Learning Algorithm. 279-284 - Dana Sulistiyo Kusumo, Nungki Selviandro, Kusuma Ayu Laksitowening, Veronikha Effendy, Monterico Adrian:

An Initial Usability Testing for Improving Acceptance Criteria in A Scrum Project: An Angkasa LMS case study. 282-287 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:

Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). 285-291 - Muhammad Fasih, Hyeonho Yoon, Namhyun Kwan, Junhyeong Kim, Jinhyeong Yoon, Rabiul Islam Sikder, Hamza Kurt, Hyo-Hoon Park:

Optical Sideband Modulation in Silicon Photonics Platform Using Mach-Zehnder Interferometers. 288-292 - James Kin Wah Lan, Frankie Kin Wah Lee:

Drone Forensics: A Case Study on DJI Mavic Air 2. 291-296 - Rabiul Islam Sikder, Muhammad Fasih, Zunnoor Fayyaz Awan, Hyeonho Yoon, Hyo-Hoon Park, Hamza Kurt:

Different Multi-layer Photonic Configurations for Light Filtering in Optical Communications. 293-296 - Yanjun Liang, Hongxi Yin, Lianyou Jing, Xiuyang Ji, Jianying Wang:

Performance Analysis of Relay-Aided NOMA in Underwater Optical Wireless Communication System under Ocean Turbulence. 297-302 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, So-Hyun Park, Il-Gu Lee:

Study on Systematic Ransomware Detection Techniques. 297-301 - YuXin Li, JinPeng Chen, Bing-Yuh Lu

, Xin Li, CanJie Yao, LinShu Zheng, Xin Bai, WanQin Jiang:
Wireless Voice-controlled Movable Electrical Heating Radiator. 302-305 - Hyun-Woo Rhee, Jong-Bum You, Jae-Yong Kim, Hyeonho Yoon, Hyo-Hoon Park:

8K Video Data Transmission through Optical Phased Array Packaged by Direct Optical Wire Bonding. 303-306 - Ali Hassan, Shahram Shah-Heydari:

TCP Congestion Avoidance in Data Centres using Reinforcement Learning. 306-311 - Yoshi Michael Cho, Hiroyuki Imada, Naoto Kawamura, Hyunho Kang, Keiichi Iwamura:

Print to Scan Resistant Watermarking based on Green Noise Diffusion Method using Machine Learning. 307-312 - Shubham Jain, Amy de Buitléir, Enda Fallon

:
An Extensible Parsing Pipeline for Unstructured Data Processing. 312-318 - Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang:

The Impact of the Practical Security Test during the Software Development Lifecycle. 313-316 - Nay Myat Min, Vasaka Visoottiviseth, Songpon Teerakanok, Nariyoshi Yamai:

OWASP IoT Top 10 based Attack Dataset for Machine Learning. 317-322 - Jun Guo, Heyan Gao, Zeyu Yan, Jiahui Cao, Zhenbo Fu:

Vehicle Detection Counting Algorithm Based on Background Subtraction Algorithm and SORT. 319-325 - Chun Long, Jianping Xiao, Jinxia Wei, Jing Zhao, Wei Wan, Guanyao Du:

Autoencoder ensembles for network intrusion detection. 323-333 - Yoshiaki Taniguchi, Hiroto Masuda:

A Conversion System Based on Acoustic Communication for Using Bluetooth Low Energy Sensors Underwater. 326-329 - Hui Zhang, Lingli Zhang, Yonghang Yan

, Linlin Ci:
A Review of Gateway Load Balancing Methods in Connecting MANET into Internet. 330-335 - Sufang Zhou, Mingzhe Liao, Baojun Qiao, Xiaobo Yang:

A Survey of Security Aggregation. 334-340 - Hui Zhang, Lingli Zhang, Yonghang Yan

, Linlin Ci:
A Survey of Multipath Load Balancing Based on Network Stochastic Model in MANET. 336-341 - Faryal Nosheen, Usman Qamar, Muhammad Summair Raza:

A Heuristic Approach to Dynamically Update Approximations of Dominance Based Rough Set Theory. 341-346 - Baiyou Qiao, Zhongqiang Wu, Zhong Tang, Gang Wu

:
Sea Surface Temperature Prediction Approach Based on 3D CNN and LSTM with Attention Mechanism. 342-347 - Jaegyeong Cha, Juyong Park, Jongpil Jeong:

A Novel Defect Classification Scheme Based on Convolutional Autoencoder with Skip Connection in Semiconductor Manufacturing. 347-352 - Jun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang:

Vision Detection System Based on Mixed Recognition of Gesture and Speech. 348-353 - Hong-Quan Do

, T. H.-An Nguyen, Quoc-Anh Nguyen, Trung-Hieu Nguyen, Viet-Vu Vu, Cuong Le:
A Fast Clustering-based Recommender System for Big Data. 353-359 - Kokou Gaglo, Bessan Melckior Dégboé, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:

Proposal of conversational chatbots for educational remediation in the context of covid-19. 354-358 - Vu-Tuan Dang, Hong-Quan Do

, Viet-Vu Vu, Byeongnam Yoon:
Facial Expression Recognition: A Survey and its Applications. 359-367 - M. T. Nguyen, A. T. Nguyen, Van-Dung Hoang

, D. D. Lam:
A feature extraction method for automatic identification of flying targets from radar data. 360-364 - Viet-Vu Vu, Byeongnam Yoon, Hong-Quan Do

, Hai-Minh Nguyen, Tran-Chung Dao, Cong-Mau Tran, Doan-Vinh Tran:
An empirical study for density peak clustering. 365-369 - Ali Hussain

, Ikromjanov Kobiljon Komil Ugli, Beom Su Kim, Minji Kim, Harin Ryu, Satyabrata Aich, Hee-Cheol Kim:
Detection of Different stages of COPD Patients Using Machine Learning Techniques. 368-372 - James Kouawa Tamgno, Emile Kone Araba, Zacharia Damoue, Claude Lishou:

Optimization Of Eigrp Dynamic Routing Protocol Based On Artificial Intelligence Algorithm. 370-379 - Jong-Sung Kim:

DNN-based Human Activity Recognition by Learning Initial Motion Data for Virtual Multi-Sports. 373-375 - Ming-Shen Jian

, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Mu-Xuan Yu:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 376-381 - Mariella Rivas, Richard Roach, Patrick Hosein:

Premium Rate Services Fraud Detection. 380-386 - Nadege Gladys Ndassimba, Edgard Ndassimba

, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Digital elementary school solution with moodlebox in a conflict zone: the case of the Central African Republic. 382-386 - Yong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi:

Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers. 387-392 - Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti:

Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. 387-391 - Oumayma Mejri, Dana Yang, Inshil Doh:

Cloud Security Issues and Log-based Proactive Strategy. 392-397 - Yusei Katsura

, Pranpariya Sakarin, Nariyoshi Yamai, Hiroyuki Kimiyama, Vasaka Visoottiviseth:
Quick Blocking Operation of Firewall System Cooperating with IDS and SDN. 393-398 - A. T. C. Chen, M. Rakib Uddin:

SOI Rib Waveguide Physical Dimension Dependent Micro Ring Resonator Characterization. 398-401 - Javier Hernandez Fernandez

, Luis Lacasa, Aymen Omri, Alfredo Sanz, Munther E. Koborsi:
Ergodic Capacity Analysis of OFDM-based NB-PLC Systems. 399-405 - A. T. C. Chen, M. Rakib Uddin:

Transverse Electric (TE) and Transverse Magnetic (TM) Modes Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide. 402-406 - Nishat I. Mowla, Joakim Rosell, Arash Vahidi:

Dynamic Voting based Explainable Intrusion Detection System for In-vehicle Network. 406-411 - Nurazmina Lingas, M. Rakib Uddin:

Sleep Mode on Delay Sensitive Traffic on Optical Network Unit. 407-410 - Rachata Maneekut, Daniel J. Elson

, Yuta Wakayama, Shohei Beppu, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani:
Demonstration of Hybrid Probabilistic Geometric Shaping 64QAM Optical Fiber Transmission Using Optimized Constellation for MAP Detection with Hard Decision Decoding. 411-414 - Shiang-Jiun Chen, Yu-Chun Pan, Yi-Wei Ma, Cheng-Mou Chiang, Chi-Chin Tsai:

Trustworthy Software Development - practical view of security processes through MVP methodology. 412-416 - Kwihoon Kim, Se Won Oh

:
Edge Computing System applying Integrated Object Recognition based on Deep Learning. 415-419 - Chih-Ting Shen, Yu-Yi Xiao, Yi-Wei Ma, Jiann-Liang Chen, Cheng-Mou Chiang, Shiang-Jiun Chen, Yu-Chuan Pan:

Security Threat Analysis and Treatment Strategy for ORAN. 417-422 - Ikromjanov Kobiljon Komil Ugli, Ali Hussain

, Beom Su Kim, Satyabrata Aich, Hee-Cheol Kim:
A Transfer Learning Approach for Identification of Distracted Driving. 420-423 - Toru Taya, Masaki Hanada, Yoichi Murakami, Atsushi Waseda, Yuki Ishida, Takao Mimura, Moo Wan Kim, Eiji Nunohiro:

An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and Responses. 423-430 - Chun-Hee Lee, Jeong-Woo Lee, Yung-Joon Jung, Il-Yeon Cho:

Relocation Framework to Improve the Usage Efficiency of Bicycle-sharing Systems. 424-428 - Yafei Hou, Kazuto Yano, Norisato Suga, Julian L. Webber, Eiji Nii, Toshihide Higashimori, Satoshi Denno, Yoshinori Suzuki:

A Study of Throughput Prediction using Convolutional Neural Network over Factory Environment. 429-434 - Hye-Yeon Shim, Tae-Rim Park, Il-Gu Lee:

Performance Evaluation of Fully Homomorphic Encryption for End-to-End Cryptographic Communication in Multihop Networks. 431-434 - Limin Su, Chao-Jen Huang, Mei Liu, Bing-Yuh Lu

, Jidong Che, Ximiao Wang, Jiqi Feng, Changyong Li, Youhong Feng, Yueliu Mo:
Robot for Ball Fetch-and-Carry with Computer Vision in Deep Learning. 435-438 - Zakaria Sawadogo

, Gervais Mendy, Jean Marie Dembele
, Samuel Ouya:
Android malware detection: Investigating the impact of imbalanced data-sets on the performance of machine learning models. 435-441 - Farrukh Hamza, Qian Sun, Abdunnaser Erwemi, Jin Haeng Lee, Ashfak Ahmed Chowdhury, Quyen Vu Nguyen:

Oilonomics: Making sense of the impact of hydrocarbon production on socio-economics. 439-445 - Viet-Vu Vu, Byeongnam Yoon, Cuong Le, Hong-Quan Do

, Hai-Minh Nguyen, Chung Tran, Viet-Thang Vu
, Cong-Mau Tran, Doan-Vinh Tran, Tien-Dung Duong:
Active learning for density peak clustering. 442-446 - WooHyun Park:

The Comparison For Epidemiological Investigation Of Corona Virus-19 Pandemic. 446-448 - Viet-Vu Vu, Byeongnam Yoon, Hong-Quan Do

, Hai-Minh Nguyen, Tran-Chung Dao, Cong-Mau Tran, Doan-Vinh Tran, Thi-Nhuong Phi, Viet-Thang Vu
, Tien-Dung Duong:
Active constraints selection based on density peak. 447-452 - Chi-Cheng Yang, En-Tien Ma, Da-Yu Kao:

Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement. 449-454 - Hong-Lam Le

, Duc-Nhan Nguyen, Thi-Thu-Trang Ngo, Ha-Nam Nguyen:
Applying PSO to improve the pedestrian fall detection rate using wearable sensor data. 453-458 - Nguyen Minh Tri, Masahiro Shibata, Masato Tsuru, Akira Kawaguchi:

Locating High-loss Links for OpenFlow Networks by Multiple Hosts to Probe Packets. 455-460 - Meng Liu, Ying Lin, Qingdong Zhu, Junxin Wang, Yi Yang, Chao Gu, Wenbing Zhu, Wenjie Zheng, Demeng Bai, Jiafeng Qin, Jian Wang, Fengda Zhang, Zhuangzhuang Li:

Recognition of Transformer High Frequency Partial Discharge Based on Time Domain Feature. 459-463 - Nada Alzaben, Daniel W. Engels:

End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection Algorithm. 461-467 - James Kouawa Tamgno, Zacharia Damoue, Samuel Ouya, Ahmed D. Kora:

Domain Recognition By Border Observation In Dimension 1 & 2. 464-468 - Jiecong Tang, Shipeng Wang, Tao Bai, Songfeng Lu, Jing Xiong:

Intelligent ATM replenishment optimization based on hybrid genetic algorithm. 469-475 - Gede Agung Ary Wisudiawan

, Angelina Prima Kurniati
:
Process Mining on Learning Activities in a Learning Management System. 476-482 - Salsabilla Rinaldi, Arfive Gandhi

, Nungki Selviandro:
Usability Evaluation and Recommendation of User Interface Design for e-HAC Application by Using User-Centered Design Method. 483-490 - A. A. Gede Yudhi Paramartha, Ketut Agus Seputra

, Fauzan Azima, Dio Pramudia Putra, Eva Dwi, Kadek Yota Ernanda Aryanto
:
Usability Evaluation of an Interactive Educational Mobile Application. 491-495 - Chih-Chien Hu, Ming-Hsien Chen, Imam Yuadi, Nian-Shing Chen:

The effects of constructing robot-based storytelling system on college students' computational thinking skill and technology comprehension. 496-500 - Dinh Tam Nguyen, Ngoc Lam Dao, Van Thuyet Tran, Khac Thuan Lang, Thanh-Tu Pham, Phi Hung Nguyen, Cong Dan Pham, Tuan Anh Pham, Duc Hai Nguyen, Huu-Thanh Nguyen

:
Enhancing CNF performance for 5G core network using SR-IOV in Kubernetes. 501-506 - Nguyen Duc Hoang, Do Nang Toan, Nguyen Tuan Minh:

A technique to improve the displaying quality of skin deformation caused by external force. 507-512 - Mose Gu, Jinyong Kim, Yunbo Shim, Jaehoon Paul Jeong:

SNS Influencer Marketing Platform for Market Advertisement of Small-Sized Business Runners. 513-517 - Miyoung Kang, Jong Jin Cho:

Verification Framework for Software-Defined Networking. 518-523 - Ming-Shen Jian

, Wei-Sin Wu, Yi-Hsuan Lin, Xin-Mei Wu, Peng-Wen Wang:
Multi-Objective Optimization Based on Adaptive Evolution Algorithm for Disassembly Line Network Problems. 524-533 - Tran Thanh Phuong, Lam Thanh Hien, Do Nang Toan, Ngo Duc Vinh:

An Eye Blink detection technique in video surveillance based on Eye Aspect Ratio. 534-538 - Xinyan Cao, Guang Chen, Yaxin Zhao, Wei Ren, Jian Cao:

Design and Implementation of a Real-time Target Detection and Tracking System. 539-543 - Zakaria Sawadogo

, Gervais Mendy, Jean Marie Dembele, Samuel Ouya:
Android Malware Classification: Updating Features Through Incremental Learning Approach(UFILA). 544-550 - James Kouawa Tamgno, Boudal Niang

, Mamadou Alpha Barry, Samuel Ouya:
Domain Identification By Frontier Observation In Cylindrical And Spherical Reference Frame. 551-556 - Xuan Hu, Jie Liu:

Requirements Knowledge Model Construction and Requirements Elicitation Method of Avionics Systems Software based on Multi-ontology. 1265-1279 - Van-Dai Pham, Victor Kisel, Ruslan Kirichek, Andrey Koucheryavy, Alexander Shestakov:

Evaluation of A Mesh Network based on LoRa Technology. 1280-1285 - Xuan Hu, Jie Liu:

Orthogonal Defect Classification-based Ontology Construction and Application of Software-hardware Integrated Error Pattern of Software-intensive Systems. 1286-1298 - Truong Duy Dinh, Vladimir M. Vishnevsky

, Van-Dai Pham, Duc Tran Le
, Ruslan Kirichek, Andrey Koucheryavy:
Determination of Subscribers Coordinates using Flying Network for Emergencies. 1309-1318 - Deepanjali Mishra, Mangal Sain:

Role of Teachers in Developing Learning Pedagogy. 1315-1321 - Deepanjali Mishra, Mangal Sain:

Web based Learning: A Methodology to Teach Literature in a Classroom. 1329-1335 - Xiaochun Yin, Zengguang Liu, Deyong Liu, Zhenge Liu:

Early Detection of LDDoS Attacks in IoT Utilizing Locality Sensitive Incremental TSVM Method. 1336-1344 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:

A Novel Fully Distributed EPON-Based 5G RAN Architecture Modeling with Handover Analysis. 1364-1373 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:

A Method for Controlling Scan Rate Based on Estimated Retransmission Rate of Background Traffic. 1374-1384 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, Il-Gu Lee:

Ransomware Detection Using Open-source Tools. 1385-1391 - A. T. C. Chen, R. Petra, K. S. K. Yeo, M. Rakib Uddin:

Dimension Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide in Transverse Mode. 1392-1398 - Mary Wu:

An Efficient hole Recovery Method in Wireless Sensor Networks. 1399-1404 - Nada Alzaben, Daniel W. Engels:

End-to-End Routing Algorithm Based on Max-Flow Min-Cut in SDN Controllers. 1405-1413

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














