


default search action
ICACT 2018: Elysian Gangchon, Chuncheon, Korea
- 20th International Conference on Advanced Communication Technology, ICACT 2018, Elysian Gangchon, Chuncheon, Korea (South), February 11-14, 2018. IEEE 2018, ISBN 979-11-88428-01-4

- Dinh Van Dzung:

Tutorial: Smart cities activities in Vietnam and review of ICT enabling technologies. xxvii-xxix - Mikhail Buinevich

, Konstantin E. Izrailov, Andrei Vladyko
:
Metric of vulnerability at the base of the life cycle of software representations. 1-8 - Sunghyun Kim, Hyekyung Jwa, Jung-Mo Moon, Jeehyeon Na:

Achieving fair cell-edge performance: Low-complexity interference coordination in OFDMA networks. 6-11 - Chencong Wang, Zijun Wang, Yong Mao Huang:

Size-miniaturized half-mode substrate integrated waveguide bandpass filter incorporating E-shaped defected ground structure for wideband communication and radar applications. 12-16 - Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Young-Jin Kang, Hoon-Jae Lee:

Obstacles effects on signal attenuation in line of sight for different environments in V2V communication. 17-20 - Eun-Kyu Lee, Chae-Soo Kim, Jae-Joong Kim, Hyung Rim Choi:

A study on the fabrication and evaluation of the MEMS based FBAR filter for wireless systems. 21-24 - Chae Young Lee, Yeon Jun Lim, Taeseon Yoon:

Global optimization of neural network. 25-28 - Nicolas Bersano, Horacio Sanson:

Non-invasive blood pressure estimation from photoplethysmography signals using artificial neural networks. 29-35 - Deokkyu Jung, Jeong-Woo Son, Sun-Joong Kim:

Shot category detection based on object detection using convolutional neural networks. 36-39 - Chang Hoon Kim, Espoir K. Kabanga, Sin-Jae Kang:

Classifying malware using convolutional gated neural network. 40-44 - Lidan Shang, Qiushi Yang, Jianing Wang, Shubin Li, Weimin Lei:

Detection of rail surface defects based on CNN image recognition and classification. 45-51 - Hye-Jin S. Kim, Il-Kwon Jeong:

Multiple main user recognition. 59-62 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:

Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. 63-67 - Sami Abduljalil Abdulhak, Ala Abdulhakeem Abdulaziz

:
A systematic review of features identification and extraction for behavioral biometrie authentication in touchscreen mobile devices. 68-73 - Liu Yao, Shuai Xue:

Accelerate the paillier cryptosystem in CryptDB by Chinese Remainder Theorem. 74-77 - Bhuridech Sudsee, Chanwit Kaewkasi:

A productivity improvement of distributed software testing using checkpoint. 78-84 - Shuaizhi Guo, Linlin Zheng, Xi Jin:

Accelerating a radio astronomy correlator on FPGA. 85-89 - Jae-Woo Ahn, Jong-Beom Kim, Won-Suk Choi, Jong-Oh Kim, Seong Gon Choi:

Load distribution method using multicore based NIC for high-performance computing system. 90-93 - Joon Yeol Yoon, Won Seok Choi, Jong Oh Kim, Jae Woo Ahn, Jong-Beom Kim, Seong Gon Choi:

Design of multicore-based high performance load distribution system. 94-97 - Wah Ching Lee, Kim Fung Tsang:

Design of a 2.4 GHz high-performance mixer with current bleeding topology. 98-103 - Sheng Jiang, Francis C. M. Lau

:
An approach to evaluating the number of potential cycles in an all-one base matrix. 104-108 - Ealwan Lee:

Duality of I/Q imbalance in RF mixer: Application to the L1-norm based estimation and generalization to the SVD based model. 109-112 - Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam:

Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink. 113-119 - Na Wang, Ying Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang:

An algorithm to calculate phase and amplitude of tag on RFID protocol conformance test system. 120-126 - Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han:

General labelled data generator framework for network machine learning. 127-131 - Anh H. Dang, Wataru Kameyama:

SvgAI - Training artificial intelligent agent to use SVG editor. 132-138 - Satyabrata Aich, Ahmed Abdulhakim Al-Absi, Kueh Lee Hui, John Tark Lee, Mangal Sain

:
A classification approach with different feature sets to predict the quality of different types of wine using machine learning techniques. 139-143 - Siddhi Velankar, Sakshi Valecha, Shreya Maji:

Bitcoin price prediction using machine learning. 144-147 - Y. W. Luo, Y. Li, F. J. Han, S. B. Huang:

Grading image retrieval based on CNN deep features. 148-152 - Shou-Ching Hsiao, Da-Yu Kao:

The static analysis of WannaCry ransomware. 153-158 - Da-Yu Kao, Shou-Ching Hsiao:

The dynamic analysis of WannaCry ransomware. 159-166 - Woo-Jin Sung, Hyeong-Geun Ahn, Jong-Beom Kim, Seong-Gon Choi:

Protecting end-device from replay attack on LoRaWAN. 167-171 - Yogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young Ho Kim, Jeong Neyo Kim:

IoT security vulnerability: A case study of a Web camera. 172-177 - Fahimeh Farahnakian, Jukka Heikkonen:

A deep auto-encoder based approach for intrusion detection system. 178-183 - Yu Chen, Mingming Sun:

TSSA: A two step scheduling algorithm for the event-driven clusters. 184-189 - Ming-Shen Jian

, Yi-Chang Wang, Bo-Han Wu, Yu-En Cheng:
Hybrid cloud computing for user location-aware augmented reality construction. 190-194 - Jianghao Li, Zhiquan Bai, Haixia Zhang, Yingchao Yang, Shangqian Sun, Tao Han, Kyungsup Kwak:

Outage performance analysis of IHDAF cooperative based communication system. 195-200 - Ming-Shen Jian

, Hao-Yi Xu, Jenn-Feng Sheen, Yi-Ling Ye:
Cloud based agriculture safety inspection with multiple standard sources. 201-206 - Wenkang Chen:

Efficient partitioner for distributed OLTP DBMS. 207-210 - En-Chun Kuo, Ming-Sang Chang, Da-Yu Kao:

User-side evil twin attack detection using time-delay statistics of TCP connection termination. 211-216 - Hamim Md Adal

, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman:
Android based advanced attendance vigilance system using wireless network with fusion of bio-metric fingerprint authentication. 217-222 - Chun Yeow Yeoh, Abdullah bin Man, Qazi Mamoon Ashraf, Ahmad Kamsani Samingan:

Experimental assessment of battery lifetime for commercial off-the-shelf NB-IoT module. 223-228 - Chae-Eun Lee, Inn-chae Yeo, Inshil Doh:

Customized embedded system design for lower limb rehabilitation patients. 229-233 - Liu Liu, Ke Zhang, Cheng Tao, Kun Zhang, Ze Yuan, Jianhua Zhang:

Channel measurements and characterizations for automobile factory environments. 234-238 - Sergio Peñafiel

, Nelson Baloian
, José A. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh:
Associating risks of getting strokes with data from health checkup records using Dempster-Shafer Theory. 239-246 - Hyewon Song, Okgee Min:

Statistical traffic generation methods for urban traffic simulation. 247-250 - Xiaodong Liu, Jian Li:

ECPS: An application-specific VM scheduler basing on CPU pool mechanism for big data environment. 251-255 - Mohammad A. Almogbel, Anh H. Dang, Wataru Kameyama:

EEG-signals based cognitive workload detection of vehicle driver using deep learning. 256-259 - Taeho Jo

:
String Vector based KNN for text categorization. 260-265 - Mikhail Buinevich

, Konstantin E. Izrailov, Ekaterina Stolyarova, Andrei Vladyko
:
Combine method of forecasting VANET cybersecurity for application of high priority way. 266-271 - Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, Si Young Lee, Seong Gon Choi:

The real-time session inspection method using heartbeat signal. 272-276 - Xue Shuai, Liu Yao, Zhang Wang:

QAT: Evaluation of a dedicated hardware accelerator for high performance web service. 277-280 - Danjie Song, Chun Long, Wei Wan, Jing Zhao, Shaojie Wang:

A quantum secure direct communication protocol based on six-qubit cluster state. 281-287 - Jie Wu, Hongchun Li, Yi Xu, Jun Tian:

Joint optimal channel allocation, interface assignment and routing in multi-hop wireless networks. 288-293 - Youngbok Cho, Minkang Kim, Sunghee Woo:

Energy efficient IoT based on wireless sensor networks. 294-299 - Kyungbok Sung, Kyoungwook Min, Jeongdan Choi:

Driving information logger with in-vehicle communication for autonomous vehicle research. 300-302 - Rico Valentino, Woo-Sung Jung

, Young-Bae Ko:
Opportunistic computational offloading system for clusters of drones. 303-306 - Jin-Kyu Choi

, Kyongho Kim, Dohyun Kim, Hyunkyun Choi, Byungtae Jang:
Driver-adaptive vehicle interaction system for the advanced digital cockpit. 307-310 - Yingying Sun, Lijun Wang, Zhiquan Bai, Kyung Sup Kwak, Xuming Yao, Tao Han:

End to end performance analysis of relay cooperative communication based on parked cars. 311-317 - Na Zhang, Zhiquan Bai, Qi Zhang, Anyang Liu, Shangqian Sun, Kyungsup Kwak:

Cosine similarity based bit to symbol-and-antenna mapping in spatial modulation system. 318-322 - Tran Dinh Hieu

, Tran Trung Duy
, Seong Gon Choi:
Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper. 323-328 - Phuc Chau, Toan Duc Bui, Yongwoo Lee, Jitae Shin:

Practical incremental network coding for multimedia content delivery. 329-332 - Hyeong Ho Lee, Yun Chul Choi, Byung Jun Ahn, Jin Seek Choi

:
Protocols and use cases for media independent management in SDN-based wireless access networks. 333-339 - Jorge Quinteros, Nelson Baloian

, José A. Pino, Alvaro Riquelme, Sergio Peñafiel
, Horacio Sanson, Douglas Teoh:
Diagnostic test suggestion via Bayesian network of non-expert assisted knowledge base. 340-346 - Marcella Astrid, Seung-Ik Lee, Beom-Su Seo:

Rank selection of CP-decomposed convolutional layers with variational Bayesian matrix factorization. 347-350 - Bongjin Oh, Junhyeok Lee:

A case study on scene recognition using an ensemble convolution neural network. 351-353 - Ji Won Lee, Yoonhyung Kim, Minki Jeong, Changick Kim, Do-Won Nam, Jungsoo Lee, Sung-Won Moon, Wonyoung Yoo:

3D convolutional neural networks for soccer object motion recognition. 354-358 - Tai-Yeon Ku, Wan-Ki Park, Hoon Choi

:
Self-learning mechanism for prediction of energy consumption and generation. 359-362 - Da-Yu Kao, Yu-Siang Wang, Fu-Ching Tsai, Chien-Hung Chen:

Forensic analysis of network packets from penetration test toolkits. 363-368 - Jae Kyu Lee, Hyeon Yang, Kyeong Ho Park, Si Young Lee, Seong Gon Choi:

The flow-reduced malware detection system by controlling inactive/active timeout. 369-372 - MinKyu Kim, KiHwan Kim

, HoonJae Lee:
Development trend of insider anomaly detection system. 373-376 - SuMi Ryu, Young-Jin Kang, Hoonjae Lee:

A study on detection of anomaly behavior in automation industry. 377-380 - Dang-Hai Hoang, Ha Duong Nguyen:

A PCA-based method for IoT network traffic anomaly detection. 381-386 - Sabeen Javaid, Hammad Afzal

, Fahim Arif, Naima Iltaf:
Trust management for SOA based social WoT system. 387-392 - Sabeen Javaid, Ali Sufian, Saima Pervaiz, Mehak Tanveer:

Smart traffic management system using Internet of Things. 393-398 - James K. Tamgno, Ndeye Rokhaya Diallo, Claude Lishou:

IoT-based medical control system. 399-404 - Chalee Vorakulpipat, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Dang-Hai Hoang:

Recent challenges, trends, and concerns related to IoT security: An evolutionary study. 405-410 - Xudong Cheng, Yejun He:

Channel modeling and analysis of ULA massive MIMO systems. 411-416 - Kyusung Shim

, Tri Nhu Do
, Beongku An:
A physical layer security-based routing protocol in mobile ad-hoc wireless networks. 417-422 - Jung Hoon Kim, Minseo Kim, Taejun Yang, Insu Kim, Jun Seo, Summoo Kang:

Compressed QR code-based mobile voice guidance service for the visually disabled. 423-425 - Wuttipan Duangsri, Mongkol Somrobru, Nikorn Sutthisangiam:

Performance enhancement for co-channel interference cancellation with smart antenna and power adaptive in cooperative communication. 426-431 - Yendoutie Nakorgou, Antoine Gnansounou, Ahmed Dooguy Kora

, Mbemba Hydara:
Accurate radio coverage assessment methods: Investigation of mobile networks based on subscribers mobile phones. 432-437 - Taeho Jo

:
String vector based KNN for text categorization. 438-443 - WooHyun Park, KiNam Park:

Story creation and design algorithm in unity. 444-447 - Sasiwimon Tanphet, Paweena Wanchai:

Applying business intelligence technology for equipment maintenance and repair plan of telecommunications services provider. 448-453 - Abdulaziz Alsubaie, Mohammed Alaithan, Muath Boubaid, Noor Zaman

:
Making learning fun: Educational concepts & logics through game. 454-459 - Sung-Won Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim:

A comparative study on preprocessing methods for object tracking in sports events. 460-462 - Dana Yang, Inshil Doh, Kijoon Chae:

Secure medical image-sharing mechanism based on visual cryptography in EHR system. 463-467 - Sukritta Harnmetta, Sudsanguan Ngamsuriyaroj:

Classification of Exploit-Kit behaviors via machine learning approach. 468-473 - Shusmoy Kundu, Khandaker Annatoma Islam, Tania Tahmina Jui, Suzzana Rail, Md. Afzal Hossain, Ishraq Haider Chowdhury:

Cyber crime trend in Bangladesh, an analysis and ways out to combat the threat. 474-480 - Maria Almulhim, Noor Zaman

:
Proposing secure and lightweight authentication scheme for IoT based E-health applications. 481-487 - Jongkuk Lee, HeaSook Park:

Method of reliable MPTCP. 488-491 - Hai Nguyen Dinh, Sang-Il Kim, Hwa-Sung Kim:

Dynamic equilibrium capacity across multiple regions in NFV environment. 492-498 - Abdou Khadre Diop

, Serban Meza
, Mihaela Gordan, Aurel Vlaicu:
LDA based classification of video surveillance sequences using motion information. 499-502 - Zongyao Li:

HPSRouter: A high performance software router based on DPDK. 503-506 - Abdelhamied A. Ateya

, Ammar Muthanna
, Andrey Koucheryavy
:
5G framework based on multi-level edge computing with D2D enabled communication. 507-512 - Xuming Yao, Yingying Sun, Tao Han:

Study on energy consumption and coverage of hierarchical cooperative of small cell base stations in heterogeneous networks. 513-518 - Mbemba Hydara, Ahmed Dooguy Kora

, Antoine Gnansounou:
Global ranking of heterogeneous mobile network coverage. 519-526 - Jinhyung Oh, Jong Ho Kim, Young-Jun Chong:

Analysis of path loss about radio duct phenomenon with atmospheric refractive index information. 527-530 - Antoine Gnansounou, Samuel Ouya

, Raimy Abd. Toure:
Advanced LTE network deployment methodology: A case study for Dakar region. 531-536 - Joonmyun Cho, Yoon-Seop Chang, Sung-Ho Lee:

Theme-related keyword extraction from free text descriptions of image contents for tagging. 537-541 - Ishraq Haider Chowdhury, Afsana Abida, Md. Mehedi Hasan Muaz

:
Automated vehicle parking system and unauthorized parking detector. 542-545 - Mi-Seon Kang, Hyun-Woo Kang, Cheolhyo Lee, Kiyoung Moon:

The gesture recognition technology based on IMU sensor for personal active spinning. 546-552 - Sangkeun Yoo, Yong-Woon Kim, Hoon Choi

:
An assessment framework for smart manufacturing. 553-555 - Igor Kim, Jung-Sun Um, Seungkeun Park:

Implementation and performance evaluation of 256-QAM in vienna system level simulator. 556-559 - Mirsat Yesiltepe:

Web services for mobile devices from one server. 560-566 - Sang Kwon Kim, Deokkyu Jung, Sang-Yun Lee, Sun-Joong Kim:

A study on the establishment of open source website for open smart broadcast platform. 567-570 - Jeong-Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim:

Video scene title generation based on explicit and implicit relations among caption words. 571-573 - Fernando Wong, Horacio Sanson:

Force-directed Voronoi-based method for graph drawing in constrained boundaries. 574-581 - Donghwan Shin, Jonguk Choi:

Proposal of value-added service based on real-time automatic content recognition. 582-584 - Kyongho Cho, Taeseon Yoon, Sunghee Park, Dohyeon Park:

Using standardization for fair data evaluation. 585-589 - Yu-Ju Lee, Wen-Wei Liao

:
Ultimate performance of Wi-Fi access points with multiple interfaces: An application of software defined network. 590-594 - Byung-Yun Lee, Hea-Sook Park:

The architecture of multi media multi path system. 595-599 - Teerawut Banchuen, Kiattikun Kawila

, Kultida Rojviboonchai:
An SDN framework for video conference in inter-domain network. 600-605 - Dzung Van Dinh, Byeong-Nam Yoon, Hung Ngoc Le, Uy Quoc Nguyen, Khoa Dang Phan, Lam Dinh Pham

:
ICT enabling technologies for smart cities. 606-611 - Dongyang Wang, Qingping Shi:

UL coverage enhancement for massive machine type communication in 5G. 612-617 - Chang-Gyu Lim, Moonsub Song:

Design and implementation of optical transport network models with path computation. 618-621 - Law Foo Kui, M. Rakib Uddin:

Demonstration of digital optical D flip flop based on photonic micro-ring resonator. 622-624 - Seung-Woo Lee, In-Ki Hwang, Hun-Sik Kang:

Data alignment for multi-channel high-speed interfaces using PRBS patterns. 625-627 - Azruph Islam Badhon

, Homira Asima Prapty, Khairul Bin Amin, Md. Afzal Hossain:
Analysis of coupling coefficient and crosstalk in a homogenous multicore optical fiber. 628-633 - Pengfei Yang, Daolu Zha, Xi Jin:

A pipelined division for fixed operation using user-defined floating point. 634-637 - Satyabrata Aich, Kim Younga, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain

:
A nonlinear decision tree based classification approach to predict the Parkinson's disease using different feature sets of voice data. 638-642 - Kéba Gueye, Ngartabe Kag-Teube, Samuel Ouya

, Davy Edgard Moussavou:
Proposal for a universal access solution to care in rural areas: Case of Senegal. 643-646 - Shahab Rezaian, Harhodin Bin Salamat, Reza Malekzadeh, Rasimah Chemohd Yusoff, Najaf Zare:

Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses. 647-651 - Tae-Gyu Lee:

Sensing system and sensing method of passive patch interface for gathering bioinformation. 652-655 - Yoon-Seop Chang, Seong-Ho Lee, Joonmyun Cho:

Augmented reality services of photos and videos from filming sites using their shooting locations and attitudes. 656-660 - Wonjoo Park, Jeong-Woo Son, Sang-Yun Lee, Sun-Joong Kim:

Clip recommendation based on topic similarity. 661-663 - Seung-Hee Kim, Deokkyu Jung, Sang-Yun Lee, Sun-Joong Kim:

Scene-based metadata generation and open API provisioning method for smart broadcast service. 664-668 - Hayun Lee

, Gyeonghwan Hong
, Dongkun Shin:
Shareable camera framework for multiple computer vision applications. 669-674 - Jungsoo Lee, Ji Won Lee, Sung-Won Moon, Do-Won Nam, Wonyoung Yoo:

Basketball event recognition technique using Deterministic Finite Automata(DFA). 675-678 - Fu-Ching Tsai, En-Cih Chang, Da-Yu Kao:

WhatsApp network forensics: Discovering the communication payloads behind cybercriminals. 679-684 - Ngartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, Samuel Ouya

, Kéba Gueye:
Proposed solution for improving the reliability of HSS data by integrating a queue manager. 685-693 - Mamadou Alpha Barry, James K. Tamgno, Claude Lishou, Modou Bamba Cisse:

QoS impact on multimedia traffic load (IPTV, RoIP, VoIP) in best effort mode. 694-700 - Wook Hyun, Chang-Kyu Lee, ShinGak Kang, Juyoung Park:

Buffermap adaptation method for MP2P multimedia streaming protocol. 701-704 - Changkyu Lee, Wook Hyun, Shin-Gak Kang:

Method of managed content distribution for time-constrained distribution. 705-708 - Yueying Zhan, Liqian Wang, Shaojun Wu, Suzhi Cao, Jianhua He:

Dynamic bandwidth allocation for switching FCAE-1553 network in avionics system. 709-713 - James K. Tamgno, Imane S. O.-T. A. Alidou, Claude Lishou:

Optimization of HPSA+ capacity of mobile networks. 714-719 - Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang:

Study on multi-network traffic modeling in distribution communication network access service. 720-723 - Minjae Park, Hyunah Kim, Hyun Ahn

, Kwanghoon Pio Kim
:
A process-aware IoT application execution environment design. 724-727 - Minjae Park, Hyunah Kim, Hyun Ahn

, Kwanghoon Pio Kim
:
An IoT-aware workflow model designer for smart alarm service about companion animal health check. 728-731 - Khalifa Sylla

, Massamba Seck, Samuel Ouya
, Gervais Mendy
:
Impact of MSRP protocol integration in e-learning platforms of universities. 732-737 - Kokou Gaglo, Massamba Seck, Samuel Ouya

, Gervais Mendy
:
Proposal for an online practical work platform for improving the teaching of STEM. 738-743 - Byeongnam Yoon, Kwanghoon Pio Kim

, Dinh-Lam Pham, Pham Thanh Dat, Viet-Vu Vu
, Hong-Quan Do
, Nang-Toan Do:
Study of p-ICN defined performance measurement Enterprise Architecture. 744-748 - Chiyurl Yoon, Miyoung Huh, Shin-Gak Kang, Juyoung Park, Chang-Kyu Lee:

Implement smart farm with IoT technology. 749-752 - Mikhail Blinnikov, Rustam Pirmagomedov:

Wireless identifying system based on nano-tags. 753-757 - Malathi Balaji, Shafique Ahmad Chaudhry:

A cooperative trilateration technique for object localization. 758-763 - Olanrewaju Bola Wojuola:

Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system. 764-768 - Fei Ding, Ye Wang, En Tong, Zhiwen Pan, Xiaohu You:

A low-complexity practical energy saving algorithm for real dense wireless scenario. 985-991 - Shi Li, Inshil Doh, Kijoon Chae:

NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture. 992-998 - Muhammad Hanif

, Choonhwa Lee:
Capacity-aware key partitioning scheme for heterogeneous big data analytic engines. 999-1007 - Idriss Saleh Bachar, Ahmed Dooguy Kora

, Roger Marcelin Faye
, Christelle Aupetit-Berthelemot:
Radio access and transmission models for universal service. 1018-1024 - Yong Ju Lee, Kyung Ho Lee:

What are the optimum quasi-identifiers to re-identify medical records? 1025-1033 - Yuhui Song:

A cooperative spectrum sensing algorithm using leading eigenvector matching. 1034-1039 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:

Evolving neural network intrusion detection system for MCPS. 1040-1045 - Anna Yang, Sung Moon Chun, Jae-Gon Kim:

Detection and recognition of hand gesture for wearable applications in IoMT. 1046-1053 - Youngsam Kim, Soohyung Kim:

Design of aging-resistant Wi-Fi fingerprint-based localization system with continuous active learning. 1054-1059 - Jinhyung Oh, Young Jun Chong:

A detailed large-scale radio propagation characteristics: Approaches with time and spatial ratio. 1060-1066 - Youn-Geol Lee, Yoonlae Lee, Yeonyi Jang, Minjae Park:

A process-aware drone-equipped 3D engine and wireless control measurement platform for integrated management of SOC facilities. 1067-1072

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














