


Остановите войну!
for scientists:


default search action
ICACT 2022: Pyeongchang, Korea
- 24th International Conference on Advanced Communication Technology, ICACT 2022, Pyeongchang, Korea, February 13-16, 2022. IEEE 2022, ISBN 979-11-88428-08-3
- Rui Teng, Kazuto Yano, Yoshinori Suzuki:
Estimation of Network Type Based on The Response Delay Property. 1-6 - Jong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko:
A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks. 1-5 - Yosuke Higasa, Kazutoshi Yoshii, Megumi Saito, Jiang Liu, Shigeru Shimamoto, Takuya Okura, Naoko Yoshimura, Amane Miura, Hiroyuki Tsuji, Morio Toyoshima:
Performance Analysis of DSSS-PDMA with SIC in GEO Satellite-Terrestrial Uplink Networks. 1-6 - Mykola Servetnyk, Wei-Han Hsiao, Alisher Mukashev:
Performance Evaluation of Polarization Effects on 5G Clustered Delay Line Channels. 1-6 - Samin Sadri, Aamir Shahzad, Kaiwen Zhang:
Blockchain Traceability in Healthcare: Blood Donation Supply Chain. 1-8 - Ming-Shen Jian
, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Wen-Hsiang Hsieh:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 1-8 - Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:
A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. 1-8 - Mi Tian, Mihai Sima, Michael McGuire:
Fixed-Point Arithmetic for Implementing Massive MIMO Systems. 1-11 - Kosei Ono, Kazutoshi Yoshii, Megumi Saito, Zhenni Pan, Jiang Liu, Shigeru Shimamoto:
Performance Analysis of Intelligent Reflecting Surface-Assisted Orbital Angular Momentum-Based Communication Systems. 7-12 - Edgard Ndassimba, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Feasibility of interconnecting the University of Bangui and peripheral areas via the TVWS for e-learning in the context of COVID-19. 7-13 - Noha H. Khattab
, Samy S. Soliman, M. Saeed Darweesh
, Amr A. El-Sherif:
Relay Selection in NOMA-Based Diamond Relaying Networks. 13-19 - Ibrahima Gueye, Idy Diop, Ibra Dioum, Khadidiatou Wane Keita, Papis Ndiaye, Moussa Diallo, Sidi Mohamed Farssi:
Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes. 14-22 - Nemesio A. Macabale:
On the Stability of Load Adaptive Routing Over Wireless Community Mesh and Sensor Networks. 21-26 - Mohammadreza Robaei, Robert Akl, Robin Chataut
, Utpal Kumar Dey:
Adaptive Millimeter-Wave Channel Estimation and Tracking. 23-28 - Boryau Hsupeng, Kun-Wei Lee, Te-En Wei, Shih-Hao Wang:
Explainable Malware Detection Using Predefined Network Flow. 27-33 - Shixin Liao, Yueying Zhan, Ziyuan Shi, Lei Yang:
A High Throughput and Flexible Rate 5G NR LDPC Encoder on a Single GPU. 29-34 - Sheng-Xiang Lin, Zong-Jyun Li, Tzu-Yang Chen, Dong-Jie Wu:
Attack Tactic Labeling for Cyber Threat Hunting. 34-39 - Shan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai:
The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network. 35-41 - Sayoko Kakikura, Hyunho Kang, Keiichi Iwamura:
Collusion Resistant Watermarking for Deep Learning Models Protection. 40-43 - Fatou Ndiaye Mbodji, Gervais Mendy, Ahmath Bamba Mbacke, Samuel Ouya:
Incentive and Playful Strategy for a Participative Model of Learning and Experimenting Blockchain. 42-47 - Haolin Zou, Zhongyong Wang, Pao-An Lin, Weilong Zhan, Peixin Chen, Yuxin Li, Yuyang Chen, Zide She, Juhui He, Bing-Yuh Lu:
PID Control Aided Thermal Comfortable of the User's Temperature Tracing Movable Electrical Heating Radiator. 44-48 - Woong-Sub Park, Hyuk Lee, Jin-Young Choi:
Formal Modeling of Smart Contract-based Trading System. 48-52 - Seokbeom Oh, Soojeong Lee, Yong-Geun Hong, Gyuyeol Kong, Hyun-Kook Kahng:
Performance Evaluation of Partial Offloading under Various Scenarios in Mobile Edge Computing. 49-52 - Hyeonah Jung, Hyungjoon Koo
, Jaehoon Paul Jeong:
IoTivity Packet Parser for Encrypted Messages in Internet of Things. 53-57 - Jinsuk Baek, Munene W. Kanampiu:
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. 53-57 - Jun Guo, Xinwei Liu, Chen Liu, Zixuan Zhao, Bin Zhang:
An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time Constraints. 58-62 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:
A Framework of Large-Scale Virtual City Simulation with Land-Use Model. 58-61 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Service model of risk mitigation on livestock pandemic based on Networks. 62-65 - Charnon Poolsin, Nattakit Sa-Ngiam, Nikorn Sutthisangiam:
Development of Centimeter Level Positioning Mobile Based Application. 63-67 - Navin Dookeram, Zahira Hosein, Patrick Hosein:
A Recommender System for the Upselling of Telecommunications Products. 66-72 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:
A Study on the Population Distribution Prediction in Large City using Agent-Based Simulation. 68-71 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:
Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee. 72-76 - Yong Hee Park, Won Seok Choi, Seong Gon Choi:
The Method of Learning Personal Preference with Reinforcement Learning. 73-77 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:
Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption Optimization. 77-80 - Mei Liu, Ankang Lin, Rushan Wu, Sen Liu, Gaowei Lei, Junzhi Lu, Man Xie, Pao-An Lin, Junbai Wu, Bing-Yuh Lu:
Preliminary Study of Cloud Aided Monitoring of Basic Physiological Signals. 78-82 - Seung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:
OS noise Analysis on Azalea-unikernel. 81-84 - Tran Cong Hung, Tran Duy Tien, Le Ngoc Hieu
:
A Proposed Load Balancer Using Naïve Bayes to Enhance Response Time on Cloud Computing. 82-90 - Jingwei Li, Yibo Lyu, Xu Li, Tianxiang Wang, Xiaowen Dong:
Reservoir Computing Based Equalization for Radio over Fiber System. 85-90 - Seongho Yoon, Miyoung Kang:
DDoS attacks detection in the cloud using K-medoids algorithm. 91-94 - Mi Tian, Mihai Sima, Michael McGuire:
Massive MIMO in Fixed-Point Arithmetic. 91-95 - Zhen-Yuan Pan, Jiann-Liang Chen, Yao-Chung Chang:
Low-Latency Computation Offloading based on 5G Edge Computing Systems. 95-100 - Yoshimi Fujii, Tetsuya Iye, Kensuke Tsuda, Akihiro Tanibayashi:
A 28 GHz Beamforming Technique for 5G Advanced Communication Systems. 96-99 - Tetsuya Iye, Kensuke Tsuda, Yoshimi Fujii:
An Experimental Study of 28 GHz Analog Beamforming with a Uniform Linear Array. 100-103 - Dan Meng, Yonghang Yan
, Lun Xia, Zhijia Li, Xuewen Xia, Chen Chen:
A Novel Gateway Deployment Solution for MANETs Interconnecting with Internet. 101-105 - Yasuaki Ohira, Takahiro Matsumoto, Hideyuki Torii, Yuta Ida:
Construction of Optical ZCZ Sequence Set with the Zero-Correlation Zone 2z Suitable for PPM-OCDMA System. 106-111 - Satyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim:
Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies. 109-112 - Guangjin Fang, Bin Shen, Hong Zhang, Taiping Cui:
Dynamic spectrum access based on double deep Q-network and convolution neural network. 112-116 - Tae-Shin Kang, Moon-Il Joo, Beom-Soo Kim, Tae-Gyu Lee:
Blockchain-based Lightweight Transaction Process Modeling and Development. 113-118 - Ming-Shen Jian
, Jian-Ting Guo, Hung-Jen Chen, Yu-Zhi Luo, Yu-Chen Lai:
Cloud Blockchain Based Multiple Inspection Information Exchanging for Agriculture and Food Safety. 117-124 - Mohamad Arsalan Sheikh, Faryal Khattak, Gul Zameen Khan, Farookh Khadeer Hussain:
Secured Land Title Transfer System in Australia using VPN based Blockchain Network. 125-131 - Xiaojun Hou, Heng Wu, Ting Peng, Xiaoling Wang, Taoyan Zhou, Kesheng Yang:
IoT based Construction Site Monitoring System for Highway Engineering. 127-131 - Mohamad Arsalan Sheikh, Gul Zameen Khan, Farookh Khadeer Hussain:
Systematic Analysis of DDoS Attacks in Blockchain. 132-137 - Yuma Narita, Shan Lu, Hiroshi Kamabe:
Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. 132-136 - Lae Yeop Lee, Seong Gon Choi:
Energy Loss Minimization Modelling for Given Energy Path in Vehicular Energy Network. 137-140 - Jong-Hoon Lee, Seongho Yoon, Hyuk Lee:
SWC-based Smart Contract Development Guide Research. 138-141 - Sung-Chan Nam, Hong-Beom Choi, Young-Bae Ko:
On Mitigation of Ranging Errors for Through-the-Body NLOS Conditions using Convolutional Neural Networks. 141-144 - Aekyung Moon, Juyoung Park, Yun Jeong Song:
Prediction of Compression Ratio for Transform-based Lossy Compression in Time-series Datasets. 142-146 - Hong Jun Choi, Hyuk Lee, Jin-Young Choi:
Is a False Positive really False Positive? 145-149 - Taku Noguchi
, Masato Nakagawa, Masami Yoshida, Alberto Gallegos Ramonet
:
A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT. 147-153 - Beom-Jun Cho, Ki Bong Kwon, Hyun Chul Kim, Sungboo Kang:
A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the Public. 150-154 - Hye Young An, Won Seok Choi, Seong Gon Choi:
Real-Time Path Planning for Trajectory Control in Autonomous Driving. 154-159 - Seung-Hee Oh, Woo-Sug Jung, Yong-Tae Lee, Kyung-Seok Kim:
Disaster Warning and Alerting Integrated Systems Based on CAP profile. 155-159 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:
A Study on Estimation of Retransmission Rate of Background Traffic for Various Scan Rates with Scan Response Delay. 160-165 - Yong Hee Park, Seong Gon Choi:
Reinforcement Learning base DR Method for ESS SoC Optimization and Users Satisfaction. 160-166 - Huijie Zhu, Wei Xu, Yalou Sang, Zhiqiang Yao, Limei Liu, Moses Chukwuka Okonkw:
Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation. 166-171 - Yong Hee Park, Won Seok Choi, Ji-Yong Oh, Cheol-Jin Park, Seong Gon Choi:
Implementation of Dynamic HSV Adjusting Method for Lane Detection. 167-171 - Saad Allawi Nsaif, Sang Yoon Park, Jong Myung Rhee:
SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks. 172-175 - Lae Yeop Lee, Won Seok Choi, Seong Gon Choi:
Investment Cost Minimization of Autonomous-Electric Vehicles based on Queueing Model. 172-178 - Masahiro Kawano, Yuhei Nagao, Leonardo Lanante, Masayuki Kurosaki, Hiroshi Ochi:
Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its Implementation. 176-181 - Shuto Takahashi, Masami Yoshida, Alberto Gallegos Ramonet
, Taku Noguchi
:
Shadowing-Fading-based Intersection Geographic Opportunistic Routing Protocol for Urban VANETs. 179-184 - Hanji Shen, Jun Li, Wei Wan, Chun Long, Jingdeng Zhou, Yuhao Fu, Xiaofan Song:
Tamper Detection Based on Webpage Change Features. 182-186 - Zhijia Li, Yonghang Yan
, Xuewen Xia, Lun Xia, Dan Meng, Chen Chen:
A Survey of Coverage Issues in UAV networks. 185-190 - Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo
, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng:
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 187-193 - Xuewen Xia, Yonghang Yan
, Zhijia Li, Dan Meng, Lun Xia, Chen Chen:
A Survey of UAV Clustering Algorithm. 191-196 - Zengguang Liu, XiaoChun Yin, Ruiping Yang, Anming Dong:
Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method. 194-199 - Changyoung An, Hyeong Min Kwon, Heung-Gyoon Ryu:
Beamforming Design of the Wireless Power Transfer System into Multiple IoT Sensors. 197-200 - Jang-Hyeon Jeong, Jong-Beom Kim, Seong Gon Choi:
Zero-Day Attack Packet Highlighting System. 200-204 - Lun Xia, Yonghang Yan
, Dan Meng, Zhijia Li, Xuewen Xia, Chen Chen:
An analytical model of MANET single-path and multi-path load balancing routing protocol based on Markov model. 201-206 - Sunghyun Yoon, Mun-Hwan Choi, Juyoung Park:
Implementation of Smart Farm Devices using Open Source Software. 205-209 - Hanji Shen, Jun Li, Xiang Fu:
BiLSTM-Ridge Regression Meta Learning Model for Few-Shot Logs Classification. 207-211 - Matasem Saleh, N. Z. Jhanjhi
, Azween B. Abdullah, Raazia Saher
:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. 210-219 - Zijiao Zhou, Haowei Yang, Huibo Li, Jihao Zhang, Siqi Li, Xiang Gao, Peng Gong:
A Dynamic Cyber-attack Approach for Real-time Hardware-in-the-loop Simulation of Power Grid. 212-217 - Kyeong Tae Kim, Jae-Deok Lim, Jeong-Nyeo Kim:
An IoT Device-trusted Remote Attestation Framework. 218-223 - Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:
Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. 220-225 - Rui Wang, Yonghang Yan
:
A Survey of Secure Boot Schemes for Embedded Devices. 224-227 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysis. 226-229 - Rui Wang, Yonghang Yan
:
A Novel Trusted Boot Model for Embedded Smart Device without TPM. 228-233 - Warunyu Hematulin, Patcharin Kamsing, Peerapong Torteeka, Thanaporn Somjit, Thaweerath Phisannupawong, Tanatthep Jarawan:
Cooperative Motion Planning for Multiple UAVs via the Bézier Curve Guided Line of Sight Techniques. 230-236 - Dinh-Lam Pham, Viet-Vu Vu, Byeongnam Yoon, Kyoungsook Kim, Kwanghoon Pio Kim:
A Conceptual Architecture for Deep-learning-based Video-Objects Retrieving System. 234-238 - Md. Masud Rana, Narendra Dahotre:
Bayesian Network and Semidefinite Programming Based Wireless Power Transfer Manufacturing System State Estimation and Regulation. 237-241 - Matasem Saleh
, NZ Jhanjhi
, Azween B. Abdullah, Raazia Saher
:
IoTES (A Machine learning model) Design dependent encryption selection for IoT devices. 239-246 - Tanatthep Jarawan, Patcharin Kamsing, Peerapong Torteeka, Shariff Manuthasna, Warunyu Hematulin, Tachodom Chooraks, Thaweerath Phisannupawong, Sitthirak Sangkarak, Sookaseam Mungkhud, Thanaporn Somjit:
Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithm. 242-247 - Juyong Park, Seokju Oh, Jongpil Jeong:
A Defect Detection Model for Casting Product using Wavelet Transform Denoise and Xception. 247-251 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:
An efficient & Cost-Effective EPON-Based Next Generation 5G Mobile Backhaul RAN Architecture. 248-253 - Minjae Park, Sohyang Park, Thanh-Hai Nguyen, Dinh-Lam Pham, Dongkeun Oh, Kyoung-Sook Kim, In-Kyoo Chun, Kwanghoon Pio Kim:
A Time-Series Process Event Log Preprocessing Approach for Data-Intensive and Predictive Operationalization of Smart Factories. 252-255 - Gyeoul Lee, Jonghoon Lee, Youngsoo Kim, Jong-Geun Park:
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset. 254-258 - Md Ariful Islam Mozumder, Muhammad Mohsan Sheeraz, Ali Athar
, Satyabrata Aich, Hee-Cheol Kim:
Overview: Technology Roadmap of the Future Trend of Metaverse based on IoT, Blockchain, AI Technique, and Medical Domain Metaverse Activity. 256-261 - Yafei Hou, Shun Kawasaki, Satoshi Denno:
Busy/Idle Duration Prediction for Video and Audio WLAN Traffics Using Autoregressive Predictor with Data Categorization. 259-264 - Chih-Hung Chen, Yiwei Ma, Ying-Hsun Lai, Wen-Tsung Chang, Shun-Ching Yang:
Analyzing Disinformation with the Active Propagation Strategy. 262-266 - Kazuto Yano, Eiji Nii, Kenta Suzuki, Koji Yamamoto:
Timestamp Synchronization of Received Frames among Multiple Wireless LAN Nodes for Robust Access Point Coordination. 265-270 - Yiran Li, Gentaro Konishi, Megumi Saito, Shigeru Shimamoto:
An Efficient Topology-based Optimization Method of Broadband Absorbing Material. 267-271 - Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:
APT attack response system through AM-HIDS. 271-274 - Minh Chau Nguyen, Hee-Sun Won, Siwoon Son, Yerin Woo, Hyeonjae Jeong:
Metadata Management and Harvesting System in Smart Open Data As a Service. 272-275 - Jutiphat Chatsomsanga, Chawalit Benjangkaprasert:
Malware Developing Guide: Encryption and Decryption. 275-278 - Jong Jin Cho, Miyoung Kang:
Threat Modeling Analysis on FireStormcx's Webcam System. 276-281 - Babu Kaji Baniya:
Intrusion Representation and Classification using Learning Algorithm. 279-284 - Dana Sulistiyo Kusumo, Nungki Selviandro, Kusuma Ayu Laksitowening, Veronikha Effendy, Monterico Adrian:
An Initial Usability Testing for Improving Acceptance Criteria in A Scrum Project: An Angkasa LMS case study. 282-287 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:
Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). 285-291 - Muhammad Fasih, Hyeonho Yoon, Namhyun Kwan, Junhyeong Kim, Jinhyeong Yoon, Rabiul Islam Sikder, Hamza Kurt, Hyo-Hoon Park:
Optical Sideband Modulation in Silicon Photonics Platform Using Mach-Zehnder Interferometers. 288-292 - James Kin Wah Lan, Frankie Kin Wah Lee:
Drone Forensics: A Case Study on DJI Mavic Air 2. 291-296 - Rabiul Islam Sikder, Muhammad Fasih, Zunnoor Fayyaz Awan, Hyeonho Yoon, Hyo-Hoon Park, Hamza Kurt:
Different Multi-layer Photonic Configurations for Light Filtering in Optical Communications. 293-296 - Yanjun Liang, Hongxi Yin, Lianyou Jing, Xiuyang Ji, Jianying Wang:
Performance Analysis of Relay-Aided NOMA in Underwater Optical Wireless Communication System under Ocean Turbulence. 297-302 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, So-Hyun Park, Il-Gu Lee:
Study on Systematic Ransomware Detection Techniques. 297-301 - YuXin Li, JinPeng Chen, Bing-Yuh Lu, Xin Li, CanJie Yao, LinShu Zheng, Xin Bai, WanQin Jiang:
Wireless Voice-controlled Movable Electrical Heating Radiator. 302-305 - Hyun-Woo Rhee, Jong-Bum You, Jae-Yong Kim, Hyeonho Yoon, Hyo-Hoon Park:
8K Video Data Transmission through Optical Phased Array Packaged by Direct Optical Wire Bonding. 303-306 - Ali Hassan, Shahram Shah-Heydari:
TCP Congestion Avoidance in Data Centres using Reinforcement Learning. 306-311