


default search action
ICT Express, Volume 7
Volume 7, Number 1, March 2021
- Won Joon Yun, Soyi Jung
, Joongheon Kim, Jae-Hyun Kim:
Distributed deep reinforcement learning for autonomous aerial eVTOL mobility in drone taxi applications. 1-4 - Jaemin Jeong
, Ji-Ho Cho
, Jeong-Gun Lee
:
Filter combination learning for CNN model compression. 5-9 - Jinho Kang
, Wan Choi
:
Coordinated regularized zero-forcing beamforming with channel statistics based adaptive feedback for cooperative massive MIMO networks. 10-14 - Carla E. Garcia
, Mario R. Camana
, Insoo Koo:
Machine learning-based scheme for multi-class fault detection in turbine engine disks. 15-22 - Hongrok Choi
, Sangwon Seo
, Daeyoung Jung
, Sangheon Pack
, Min Wook Kang, Yun Won Chung, Hyungjun Joo, Kyungran Kang:
Design and implementation of integrated tactical mobility testbed. 23-27 - Seonyong Kim, Girim Kwon
, Hyuncheol Park:
High-resolution multi-beam tracking with low overhead for mmWave beamforming system. 28-35 - Dongjun Park
, GyuSang Kim
, Donghoe Heo
, Suhri Kim
, HeeSeok Kim
, Seokhie Hong:
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures. 36-40 - Eunkyung Kim
, Heesoo Lee:
Low-latency random access in wireless networks. 41-48 - Hoang Thi Huong Giang
, Pham-Duy Thanh
, Insoo Koo:
Deep Q-learning-based resource allocation for solar-powered users in cognitive radio networks. 49-59 - Seung-Eun Hong:
On the effect of shadowing correlation and pilot assignment on hybrid precoding performance for cell-free mmWave massive MIMO UDN system. 60-70 - Young-Suk Yoon
, Sangwon Hwang
, Dogyoon Lee
, Sangyoun Lee
, Jae-Won Suh, Sung-Uk Jung:
3D mesh transformation preprocessing system in the real space for augmented reality services. 71-75
- Om Pal, Bashir Alam
, Vinay Thakur, Surendra Singh:
Key management for blockchain technology. 76-80 - Sydney Mambwe Kasongo, Yanxia Sun
:
A Deep Gated Recurrent Unit based model for wireless intrusion detection system. 81-87 - Yasser Albagory
:
An efficient sweeping beamforming technique for low-altitude platform-to-sensor communications. 88-93 - Kwi Seob Um, Seo Weon Heo:
Adaptively extendable multi-stage spiking neural network. 94-98 - Satish Kumar Satti
, K. Suganya Devi, Prasenjit Dhar
, P. Srinivasan:
A machine learning approach for detecting and tracking road boundary lanes. 99-103 - Yonten Jamtsho
, Panomkhawn Riyamongkol
, Rattapoom Waranusast:
Real-time license plate detection for non-helmeted motorcyclist using YOLO. 104-109 - N. Bhushana Samyuel, Benjamin A. Shimray
:
Securing IoT device communication against network flow attacks with Recursive Internetworking Architecture (RINA). 110-114 - Haythem Bany Salameh, Haneen Khasawneh:
Routing in cognitive radio networks with full-duplex capability under dynamically varying spectrum availability. 115-120 - Seoung-Ho Choi, Seoung Yeon Jo, Sung Hoon Jung:
Component based comparative analysis of each module in image captioning. 121-125
Volume 7, Number 2, June 2021
- Madhusanka Liyanage
, Pawani Porambage, Aaron Yi Ding
, Anshuman Kalla
:
Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G. 127-137 - Barbara Attanasio
, Aurelio La Corte, Marialisa Scatà
:
Evolutionary dynamics of MEC's organization in a 6G scenario through EGT and temporal multiplex social network. 138-142 - Anupriya, Anita Singhrova
:
Enhanced whale optimization based traffic forecasting for SDMN based traffic. 143-151 - Cosmas Ifeanyi Nwakanma
, Jae-Woo Kim, Jae-Min Lee, Dong-Seong Kim
:
Edge AI prospect using the NeuroEdge computing system: Introducing a novel neuromorphic technology. 152-157 - Asif Ali Laghari
, Mureed Ali Laghari:
Quality of experience assessment of calling services in social network. 158-161 - H. Sabireen
, Neelanarayanan Venkataraman
:
A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. 162-176 - Pushparaj Nimbalkar, Deepak Kshirsagar:
Feature selection for intrusion detection system in Internet-of-Things (IoT). 177-181 - Aishwarya D.
, R. I. Minu
:
Edge computing based surveillance framework for real time activity recognition. 182-186 - Kyeong-Rok Kim
, Soyi Jung
, Jae-Hyun Kim
:
Adaptive speckle filtering for real-time computing in low earth orbit satellite synthetic aperture radar. 187-190 - Young-Min Kim
, Hee-Jun Ahn, Yeon-Soo Kim, Sung-Su Park, Een-Kee Hong
:
Performance evaluation of the effect of traffic decentralization with mobile edge computing. 191-195 - Haemin Lee, Soyi Jung
, Joongheon Kim:
Truthful electric vehicle charging via neural-architectural Myerson auction. 196-199
- Philemon Nthenge Kasyoka, Michael W. Kimwele, Angolo Shem Mbandu:
Cryptanalysis of a Pairing-free Certificateless Signcryption scheme. 200-204 - Md. Mahiuddin:
Development of an OADM to reduce the incoherent crosstalk in WDM system. 205-209 - N. Muraleedharan
, Janet Barnabas
:
A deep learning based HTTP slow DoS classification approach using flow data. 210-214 - Karma Wangchuk
, Panomkhawn Riyamongkol
, Rattapoom Waranusast:
Real-time Bhutanese Sign Language digits recognition system using Convolutional Neural Network. 215-220 - Jeong Wook Won, Jae-Min Ahn:
3GPP URLLC patent analysis. 221-228 - Julien Polge
, Jérémy Robert, Yves Le Traon
:
Permissioned blockchain frameworks in the industry: A comparison. 229-233 - Priyanka Mishra
, Mehboob ul-Amin
:
Performance evaluation for low complexity cascaded Sphere Decoders using K best detection algorithm. 234-238 - Omid Sharifi-Tehrani
, Mohammad Farzan Sabahi, Meysam R. Danaee:
GNSS jamming detection of UAV ground control station using random matrix theory. 239-243 - Yushan Siriwardhana
, Gürkan Gür
, Mika Ylianttila, Madhusanka Liyanage
:
The role of 5G for digital healthcare against COVID-19 pandemic: Opportunities and challenges. 244-252 - Muhammad Usman Hadi
:
Mitigation of nonlinearities in analog radio over fiber links using machine learning approach. 253-258 - Somayeh Sobati Moghadam, Amjad Fayoumi, Peyman Vafadoost:
Pavan: A privacy-preserving system for DB-as-a-Service. 259-264 - Sara Kaviani, Insoo Sohn:
Study of scale-free structures in feed-forward neural networks against backdoor attacks. 265-268
Volume 7, Number 3, September 2021
- Kommu Narendra
, G. Aghila:
Fortis-ámyna-smart contract model for cross border financial transactions. 269-273 - Mohamed Allouche, Mihai Mitrea
, Alexandre C. Moreaux
, Sang-Kyun Kim:
Automatic Smart Contract generation for Internet of Media Things. 274-277 - Jaeseung Lee
, Byungheon Lee, Jaeyoung Jung, Hojun Shim, Hwangnam Kim
:
DQ: Two approaches to measure the degree of decentralization of blockchain. 278-282 - Swathi P.
, M. Venkatesan:
Scalability improvement and analysis of permissioned-blockchain. 283-289 - Kenji Saito
, Satoki Watanabe
:
Lightweight selective disclosure for verifiable documents on blockchain. 290-294 - Ray-I Chang, Lien-Chen Wei, Chia-Hui Wang
, Yu-Kai Tseng:
Blockchain for bounded-error-pruned content protection. 295-299 - Chun-Wei Tsai, Yi-Ping Chen, Tzu-Chieh Tang, Yu-Chen Luo:
An efficient parallel machine learning-based blockchain framework. 300-307 - Eugenio Balistri, Francesco Casellato, Carlo Giannelli
, Cesare Stefanelli:
BlockHealth: Blockchain-based secure and peer-to-peer health information sharing with data protection and right to be forgotten. 308-315 - Soonhwa Sung
:
A new key protocol design for cryptocurrency wallet. 316-321 - Youn Kyu Lee, Jongwook Jeong
:
Securing biometric authentication system using blockchain. 322-326 - Igboanusi Ikechi Saviour, Kevin Putra Dirgantoro, Jae-Min Lee, Dong-Seong Kim
:
Blockchain side implementation of Pure Wallet (PW): An offline transaction architecture. 327-334
- Pankaj Nanglia, Sumit Kumar
, Aparna N. Mahajan, Paramjit Singh, Davinder S. Rathee:
A hybrid algorithm for lung cancer classification using SVM and Neural Networks. 335-341 - Esra'a Alshdaifat, Malak Al-hassan
, Ahmad A. Al-Oqaily:
Effective heterogeneous ensemble classification: An alternative approach for selecting base classifiers. 342-349 - S. Nirmalraj
, G. Nagarajan:
Fusion of visible and infrared image via compressive sensing using convolutional sparse representation. 350-354 - Hafizur Rahman
, Md. Iftekhar Hussain:
A light-weight dynamic ontology for Internet of Things using machine learning technique. 355-360 - Sudhanshu Arya
, Yeon Ho Chung
, Wan-Young Chung, Jong-Jin Kim, Nam-Ho Kim
:
Transmit power optimization over low-power Poisson channel in multiuser MISO indoor optical communications. 361-365 - V. Kanimozhi
, T. Prem Jacob:
Artificial Intelligence outflanks all other machine learning classifiers in Network Intrusion Detection System on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. 366-370 - Deepak Kshirsagar, Sandeep Kumar
:
An efficient feature reduction method for the detection of DoS attack. 371-375 - Zhiwei Yan, Jong-Hyouk Lee
:
BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain. 376-379 - Woong Cho:
Energy allocation in dual-hop communication system: Comparative study. 380-383 - Irfan Syamsuddin, Irmawati
, Syafaruddin:
An experimental study of RyO Kit for Covid-19 information sharing in rural islands of Indonesia. 384-391 - Pankaj Singh
, Sung-Yoon Jung
:
Data decoding based on iterative spectral image reconstruction for display field communications. 392-397 - Dohyun Kim
, Daeyoung Park
:
Learning-based accelerated sparse signal recovery algorithms. 398-401
Volume 7, Number 4, December 2021
- Zhiyuan Shen
, Yitao Wei:
A high-precision feature extraction network of fatigue speech from air traffic controller radiotelephony based on improved deep learning. 403-413 - Syed Ali Raza Zaidi:
Nearest neighbour methods and their applications in design of 5G & beyond wireless networks. 414-420 - Jothi Letchumy Mahendra Kumar, Mamunur Rashid
, Rabiu Muazu Musa
, Mohd Azraai Mohd Razman
, Norizam Sulaiman
, Rozita Jailani, Anwar P. P. Abdul Majeed
:
The classification of EEG-based wink signals: A CWT-Transfer Learning pipeline. 421-425 - T. Shanmuganantham, K. Bharath Kumar, Srinivasan Ashok Kumar
:
Analysis of tree-shaped slotted impedance matching antenna for 60 GHz femtocell applications. 426-431 - Jobeda Jamal Khanam, Simon Y. Foo
:
A comparison of machine learning algorithms for diabetes prediction. 432-439 - Sreeraj Madhavankutty, Jestin Joy
:
A machine learning based framework for assisting pathologists in grading and counting of breast cancer cells. 440-444 - Shuoyan Zhang, Kohei Inoue, Kenji Hara:
A convergence proof for local mode filtering. 445-448 - Joelma C. C. e Silva, Flavio S. C. da Silva:
Contextual analysis of pedestrian mobility in transport terminals. 449-452 - Yushi Shirato, Masahiro Muraguchi:
Side information-free low computational complexity TDSS-SLM transmission system. 453-459 - Ting Ding
, Yongjun Zhao, Lei Zhang:
Hybrid precoding for mmWave massive MU-MIMO systems with overlapped subarray: A modified GLRAM approach. 460-467 - Juan M. Gutiérrez Cárdenas
, Zenghui Wang
:
One-class models for validation of miRNAs and ERBB2 gene interactions based on sequence features for breast cancer scenarios. 468-474 - Nobuyoshi Komuro
, Hiromasa Habuchi:
Nonorthogonal CSK/SS ALOHA system under MANET environment. 475-480 - Nicola Capodieci
, Roberto Cavicchioli, Filippo Muzzini
, Leonard Montagna
:
Improving emergency response in the era of ADAS vehicles in the Smart City. 481-486 - Prakasam Periasamy
, Muthusamy Madheswaran, Sujith K. P., Md Shohel Sayeed:
An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices. 487-492 - Angela Caliwag
, Wansu Lim
:
Optimal least square vector autoregressive moving average for battery state of charge estimation and forecasting. 493-496 - Ilaiah Kavati, A. Mallikarjuna Reddy
, Erukala Suresh Babu
, K. Sudheer Reddy
, Ramalingaswamy Cheruku
:
Design of a fingerprint template protection scheme using elliptical structures. 497-500 - Jeong-Hyun Park, Jae-Gon Lee
:
Low-profile high efficiency transmitarray antenna using optimized phase compensation surface (PCS) and PEC sidewalls. 501-506 - Umer Ashraf, Gh. Rasool Begh
:
Error analysis of selection combining over α-μ fading with symmetric alpha-stable noise. 507-511 - T. Thilagam, R. Aruna:
Intrusion detection for network based cloud computing by custom RC-NN and optimization. 512-520 - Ni Putu Sutramiani
, Nanik Suciati
, Daniel Siahaan
:
MAT-AGCA: Multi Augmentation Technique on small dataset for Balinese character recognition using Convolutional Neural Network. 521-529 - Hyunwoo Cho, Hong-Yeop Song
, Jae-Min Ahn, Deok Won Lim
:
Some new RS-coded orthogonal modulation schemes for future GNSS. 530-534 - Jessnor Arif Mat-Jizat, Anwar P. P. Abdul Majeed
, Ahmad Fakhri Ab. Nasir
, Zahari Taha, Edmund Yuen
:
Evaluation of the machine learning classifier in wafer defects classification. 535-539 - Doan Tan Anh Nguyen
, Jingon Joung
, Xin Kang
:
Universal gated recurrent unit-based 3D localization method for ultra-wideband systems. 540-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.