default search action
ICT Express, Volume 6
Volume 6, Number 1, March 2020
- Khasa Gillani, Jong-Hyouk Lee:
Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing. 1-2 - Seungwon Lee, Yalei Zhang, Seokho Yoon, Iickho Song:
Order statistics and recursive updating with aging factor for cooperative cognitive radio networks under SSDF attacks. 3-6 - Yee-Loo Foo:
Operating white space devices in the DTV service area. 7-10 - Pham Thanh Hiep, Tran Manh Hoang:
Non-orthogonal multiple access and beamforming for relay network with RF energy harvesting. 11-15 - Vinayakumar R., Soman K. P.:
Siamese neural network architecture for homoglyph attacks detection. 16-19 - Swati Rawal, Sahadeo Padhye:
Cryptanalysis of ID based Proxy-Blind signature scheme over lattice. 20-22 - Muhammad Usman Hadi, Pier Andrea Traverso, Giovanni Tartarini, Hyun Jung:
Experimental characterization of Sigma Delta Radio over fiber system for 5G C-RAN downlink. 23-27 - Shehzad Muhammad Hanif, Muhammad Bilal:
Competitive residual neural network for image classification. 28-37 - Sheba Diamond Thabah, Prabir Saha:
New design approaches of reversible BCD encoder using Peres and Feynman gates. 38-42 - Devrim Unal, Mohammad Hammoudeh, Mehmet Sabir Kiraz:
Policy specification and verification for blockchain and smart contracts in 5G networks. 43-47 - Nirwan Ansari, Liang Zhang:
Flexible backhaul-aware DBS-aided HetNet with IBFD communications. 48-56 - Sangsung Park, Sunghae Jun:
Technological cognitive diagnosis model for patent keyword analysis. 57-61 - Dongeun Suh, Seokwon Jang, Sol Han, Sangheon Pack, Xiaofei Wang:
Flexible sampling-based in-band network telemetry in programmable data plane. 62-65
Volume 6, Number 2, June 2020
- Van-Sang Doan, Dong-Seong Kim:
DOA estimation of multiple non-coherent and coherent signals using element transposition of covariance matrix. 67-75 - Ario Yudo Husodo, Grafika Jati, Amarulla Octavian, Wisnu Jatmiko:
Switching target communication strategy for optimizing multiple pursuer drones performance in immobilizing Kamikaze multiple evader drones. 76-82 - Sangku Lee, Janghyuk Youn, Bang Chul Jung:
A cooperative phase-steering technique in spectrum sharing-based military mobile ad hoc networks. 83-86 - Chang Seok You, Jeong Seon Yeom, Bang Chul Jung:
Cooperative maximum-ratio transmission with multi-antenna relay nodes for tactical mobile ad-hoc networks. 87-92
- Shijie Zhang, Jong-Hyouk Lee:
Analysis of the main consensus protocols of blockchain. 93-97 - Sydney Mambwe Kasongo, Yanxia Sun:
A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System. 98-103 - Lukman Abiodun Olawoyin, Nasir Faruk, Abdulkarim Ayopo Oloyede, Segun I. Popoola, Temitayo C. Adeniran, Nazmat Toyin Surajudeen-Bakinde, Abubakar Abdulkarim:
Secure transmission in an unfriendly environment. 104-108 - Jae-Hyouk Jahng, Seung Keun Park:
Simulation-based prediction for 5G mobile adoption. 109-112 - Muhammad Tariq Mahmood, Usman Ali, Young-Kyu Choi:
Single image defocus blur segmentation using Local Ternary Pattern. 113-116 - Jongtaek Oh, Minwoo Kim:
Method to determine initial aiming azimuth accuracy using acceleration, gyroscope, and geomagnetic sensors. 117-120 - Yonten Jamtsho, Panomkhawn Riyamongkol, Rattapoom Waranusast:
Real-time Bhutanese license plate localization using YOLO. 121-124 - Majd Latah, Levent Toker:
Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach. 125-127 - Huy-Trung Nguyen, Quoc-Dung Ngo, Doan-Hieu Nguyen, Van-Hoang Le:
PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms. 128-138 - Nirwan Ansari, Di Wu, Xiang Sun:
FSO as backhaul and energizer for drone-assisted mobile access networks. 139-144 - Sara Kaviani, Insoo Sohn:
Influence of random topology in artificial neural networks: A survey. 145-150
Volume 6, Number 3, September 2020
- Flávio S. Corrêa da Silva, Frederico P. Costa, Antonio F. Iemma:
Practical considerations regarding classification learning for clinical diagnosis and therapy advice in oncology. 151-154 - K. Deepak, L. K. P. Vignesh, S. Chandrakala:
Autocorrelation of gradients based violence detection in surveillance videos. 155-159 - Sotirios P. Sotiroudis, Sotirios K. Goudos, Katherine Siakavara:
Deep learning for radio propagation: Using image-driven regression to estimate path loss in urban areas. 160-165 - Aman Malali, Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa, Sanjay N. T.:
Supervised ECG wave segmentation using convolutional LSTM. 166-169 - Keerthana Rangasamy, Muhammad Amir As'ari, Nur Azmina Rahmad, Nurul Fathiah Ghazali:
Hockey activity recognition using pre-trained deep learning model. 170-174 - Jin-A. Choi, Kiho Lim:
Identifying machine learning techniques for classification of target advertising. 175-180 - Shahriar Kaisar:
Developmental dyslexia detection using machine learning techniques : A survey. 181-184 - Brainvendra Widi Dionova, M. N. Mohammed, S. Al-Zubaidi, Eddy Yusuf:
Environment indoor air quality assessment using fuzzy inference system. 185-194 - Kyoung Son Jhang, Hansol Kang, Hyeokchan Kwon:
CNN training for age group prediction in an illumination condition. 195-199 - Cheng-Yen Tang, Chien-Hung Liu, Woei-Kae Chen, Shingchern D. You:
Implementing action mask in proximal policy optimization (PPO) algorithm. 200-203 - Xiwei Wang, Minh Nguyen, Jonathan Carr, Longyin Cui, Kiho Lim:
A group preference-based privacy-preserving POI recommender system. 204-208 - Yossawee Keaomanee, Apichat Heednacram, Prakarnkiat Youngkong:
Implementation of four kriging models for depth inpainting. 209-213 - Erna Hikmawati, Nur Ulfa Maulidevi, Kridanto Surendro:
Adaptive rule: A novel framework for recommender system. 214-219 - Nwamaka U. Okafor, Yahia Alghorani, Declan T. Delaney:
Improving Data Quality of Low-cost IoT Sensors in Environmental Monitoring Networks Using Data Fusion and Machine Learning Approach. 220-228 - Amir Farzad, T. Aaron Gulliver:
Unsupervised log message anomaly detection. 229-237 - Stefano Cagnoni, Lorenzo Cozzini, Gianfranco Lombardo, Monica Mordonini, Agostino Poggi, Michele Tomaiuolo:
Emotion-based analysis of programming languages on Stack Overflow. 238-242 - Kristo Radion Purba, David Asirvatham, Raja Kumar Murugesan:
An analysis and prediction model of outsiders percentage as a new popularity metric on Instagram. 243-248
- Kentaro Yonei, Kazuki Maruta, Chang-Jun Ahn:
Frame splitting and data-aided decision direct channel estimation for OFDM in fast varying fading channels. 249-252 - Sarabjeet Kaur Kochhar, Uma Ojha:
Index for objective measurement of a research paper based on sentiment analysis. 253-257 - Hojjat Emami, Abbas Ali Sharifi:
An improved backtracking search optimization algorithm for cubic metric reduction of OFDM signals. 258-261
Volume 6, Number 4, December 2020
- Tabassum Lubna, Imtiaz Mahmud, You-Ze Cho:
D-LIA: Dynamic congestion control algorithm for MPTCP. 263-268 - Hao Wang:
Trade-off queuing delay and link utilization for solving bufferbloat. 269-272 - Mostafa K. Ardakani, Seyed Mohammad Fatemi, Hamid-Reza Hamidi, Mojtaba Kamaliardakani:
A hybrid adaptive approach to improve position tracking measurements. 273-279 - Quoc-Dung Ngo, Huy-Trung Nguyen, Van-Hoang Le, Doan-Hieu Nguyen:
A survey of IoT malware and detection methods based on static features. 280-286 - Sohyun Joo, Tae-Yoon Kim, Taewon Song, Sangheon Pack:
MU-MIMO enabled uplink OFDMA MAC protocol in dense IEEE 802.11ax WLANs. 287-290 - Md. Sajjad Hossain, Cosmas Ifeanyi Nwakanma, Jae-Min Lee, Dong-Seong Kim:
Edge computational task offloading scheme using reinforcement learning for IIoT scenario. 291-299 - Soumya S., Pramod K. V:
Sentiment analysis of malayalam tweets using machine learning techniques. 300-305 - A. Dhanalakshmi, G. Nagarajan:
Combined spatial temporal based In-loop filter for scalable extension of HEVC. 306-311 - Ibrahem Kandel, Mauro Castelli:
The effect of batch size on the generalizability of the convolutional neural networks on a histopathology dataset. 312-315 - Mriganka Mandal:
Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption. 316-319 - Anji Reddy Vaka, Badal Soni, Sudheer Reddy K.:
Breast cancer detection by leveraging Machine Learning. 320-324 - Ban Mohammed Khammas:
Ransomware Detection using Random Forest Technique. 325-331 - Myuu Myuu Wai Yan:
Accurate detecting concept drift in evolving data streams. 332-338 - Trung Hoai Tran:
Hierarchical codebook using the last layer to improve the angular estimation in MIMO system. 339-342 - Imtiaz Mahmud, You-Ze Cho:
BBR Advanced (BBR-A) - Reduced retransmissions with improved fairness. 343-347 - Nguyen Thi Huyen, Duong Duc Ha, Pham Thanh Hiep:
Buried objects detection in heterogeneous environment using UWB systems combined with curve fitting method. 348-352 - Samuel Dayo Okegbile, Olabisi I. Ogunranti:
Users emulation attack management in the massive internet of things enabled environment. 353-356 - Mohammad Aman Ullah, Syeda Maliha Marium, Shamim Ara Begum, Nibadita Saha Dipa:
An algorithm and method for sentiment analysis using the text and emoticon. 357-360 - Nerella Sameera, M. Shashi:
Deep transductive transfer learning framework for zero-day attack detection. 361-367 - Ghanbar Azarnia, Abbas Ali Sharifi, Hojjat Emami:
Compressive sensing based PAPR reduction in OFDM systems: Modified orthogonal matching pursuit approach. 368-371
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.