


default search action
ICACT 2023: Pyeongchang, Korea
- 25th International Conference on Advanced Communication Technology, ICACT 2023, Pyeongchang, Korea, Republic of, February 19-22, 2023. IEEE 2023, ISBN 979-11-88428-10-6

- Yafei Hou, Kazuto Yano, Narisato Suga, Satoshi Denno, Toshikazu Sakano:

MUSIC Spectrum Based Interference Detection and Localization for mmWave RIS-MIMO System. 1-6 - G. Dhivya, K. Hariharan, P. Poonguzhali, M. Vaibhav, S. Lokeshwar, Sayantani Bhattacharya:

ILLUMINATE - VIsibLe Light CommUnication enabled SMart Indoor lightiNg And control SysTEm. 1-7 - Takayuki Matsumuro

, Kazuto Yano, Toshikazu Sakano:
Proactive Rank Adaptation Method Using Probabilistic Interference Arrival Information. 1-4 - Yuanyuan Ma, Zhiquan Bai, Bangwei He, Jinqiu Zhao, Abeer Mohamed, Ke Pang, Kyung Sup Kwak:

Enhanced Deep Residual Shrinkage Network Based Channel Estimation in RIS Communication System. 18-22 - Bing-Yuh Lu

, Jixin Liu, Zhongyong Wang, Hongmei Li, Juhui He, Xing Wen, Peixin Chen, Jingquan Chen, Weijun Lai, Cancheng Huang:
Smart Mirror Activated by User's Face Recognition with Simulation of Artificial Intelligence Classifier. 23-27 - Phuc Hao Do

, Duc Tran Le
, Vladimir M. Vishnevsky, Aleksandr Berezkin, Ruslan Kirichek:
A Horizontal Federated-Learning Model for Detecting Abnormal Traffic Generated by Malware in IoT Networks. 28-36 - Shixin Cheng, Jinzhe Zhang, Liping Han:

A Terminal Trust Assessment Method Based on Consensus Trust Aggregation. 37-42 - Muhammad Aidiel Rachman Putra

, Tohari Ahmad
, Dandy Pramana Hostiadi
:
Dimensional Feature Reduction for Detecting Botnet Activities. 43-48 - Juhui He, Xing Wen, Jiiapei Cai, Bing-Yuh Lu

, Hongjie Zheng, Xiaokang Cheng, Yiheng Chen:
Fuzzy PID Controlled Temperature in Phototherapy Incubator for Infant Jaundice Treatment: A Simulation. 49-53 - Bangwei He, Zhiquan Bai, Yuanyuan Ma, Hao Xu, Abeer Mohamed, Yingchao Yang, Kyung Sup Kwak:

Denoising CNN Based Channel Estimation for Vehicular OTFS Communication System. 54-58 - Viet-Thang Vu

, Thanh Quyen Bui Thi, Hong-Seng Gan, Viet-Vu Vu, Do Manh Quang
, Vu Thanh Duc, Dinh-Lam Pham:
Activation functions for deep learning: an application for rare attack detection in wireless local area network (WLAN). 59-64 - Sabyasachi Chakraborty, Kyung Yul Ohm, Hyojin Jeon, Dong Hyun Kim, Hyoung Jae Jin:

Intent Classification of Users Conversation using BERT for Conversational Dialogue System. 65-69 - Jeng-Kuang Hwang, Chien-Min Chen:

Development of Cost-Effective Wi-Fi 6 SISO/MIMO Vector Signal Generator and Analyzer. 70-73 - Cheng-Feng Li, Jeng-Kuang Hwang, Chingwo Ma:

NB-IoT NTN Band-Edge Attenuation/EVM Tradeoff with Real-System Verification. 74-78 - Yuhui Li, Yu Wang, Yue Li, Bin Shen:

Multi-User Dynamic Spectrum Access Based on LRQ Deep Reinforcement Learning Network. 79-84 - Yuya Takahashi, Tetsushi Ikegami:

Large MIMO Channel Estimation Study Based on Independent Component Analysis. 85-88 - Dhivya G, Hariharan K., Sayantani Bhattacharya, P. Poonguzhali, M. Vaibhav, S. Lokeshwar:

NLoS-VICINITY: A Non-Line of Sight Approach for Visible LIght Communication based INdoor PosITioning SYstem. 89-95 - Lan-Huong Nguyen

, Van-Linh Nguyen
, Yu-Hao Liu:
Tracking Risks from Multi-path TDoA-based Localization in Wireless Communications. 96-101 - Yuxiao Xia, Tao Zhao, Yanli Lv, Yunzhao Li, Ruxia Yang:

Hierarchical DP-K Anonymous Data Publishing Model Based on Binary Tree. 102-110 - Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao, Jian-Fu Qiu:

Intrusion Detection System for AI Box Based on Machine Learning. 111-116 - Jiann-Liang Chen, Jian-Chang Hsu, Candra Ahmadi

, Bagus Tri Atmaja
, Chia-Chi Lin, Siao-He Wang, Shu-Yu Lin:
Development of Security Target for Router Based on ENISA Common Criteria Framework. 117-121 - Sio Kei Im, Ka-Hou Chan

:
Distributed Spatial Transformer for Object Tracking in Multi-Camera. 122-125 - Viet-Vu Vu, Byeongnam Yoon, Dinh-Lam Pham, Hong-Quan Do

, Hai-Minh Nguyen, Tran-Chung Dao, Thi-Hai-Yen Nguyen, Doan-Vinh Tran, Thi-Huong-Ly Nguyen, Viet-Thang Vu
:
Density peak clustering evaluation. 126-129 - Yuyang Liu

, Junruo Gao, Zefang Zhao, Haibo Wu, Zhaojuan Yue, Jun Li:
Evolving Interest for Information Diffusion Prediction on Social Network. 130-136 - Dinh-Lam Pham, Byeongnam Yoon, Viet-Vu Vu, Joo-Chang Kim, Sang-Eun Ahn, Jeong-Hyun Chang, Hyun Yoo, Kyonghee Sun, Kyoung-Sook Kim, Kwanghoon Pio Kim:

A Deep Learning-Based Real-Time Video Object Contextualizing and Archiving System. 137-144 - Xin Mi, Huaiwen He:

Multi-Agent Deep Reinforcement Learning for D2D-assisted MEC system with Energy Harvesting. 145-153 - Yi Feng, Ning Ge, Tao Xiang:

A Density-Based RSU Deployment and Optimization Heuristic Method for Vehicular Networks. 154-157 - Robin Chataut

, Robert Akl, Utpal Kumar Dey:
An Adaptive User Scheduling Algorithm for 6G Massive MIMO Systems. 158-163 - Yong Zhang, Hao Zhang, Yan Li, Yong Zhang, Siyu Yuan:

Joint Resource Allocation and Task Offloading for Hybrid NOMA-assisted MEC Network with Network Slicing. 164-170 - Seokjoon Hong, Daniel Kim, Junhyeong Moon, Kyungrak Lee, Inwhee Joe:

5G NR based initial access procedure simulation environment implementation including system information using ns-3 simulator. 171-173 - Yuki Ishida, Masaki Hanada, Atsushi Waseda, Moo Wan Kim:

Analysis of DNS Graph of Phishing Websites Using Digital Certificates. 174-179 - Jackson Barreto

, Hugo Almeida
, Pedro Pinto
:
An Overview of HTTPS and DNSSEC Services Adoption in Higher Education Institutions in Brazil. 180-185 - Chia-Wei Tsou, Yi-Wei Ma, Yi-Hao Tu

, Jiann-Liang Chen:
Security Assist Mechanisms for Industrial Control Systems with Authentication. 186-188 - Man-Ling Liao, Chiao-Lin Yu, Yi-Cheng Lai, Shih-Ping Chiu, Jiann-Liang Chen:

An Intelligent Cyber Threat Classification System. 189-194 - Siti Agustini, Wirawan, Gamantyo Hendrantoro:

Lightweight Group Key Establishment for Reducing Memory Overhead. 195-200 - Soohyun Shin

, Hyo-Sik Yang:
Estimation of Power Generation and Consumption based on eXplainable Artificial Intelligence. 201-205 - Akwi Helene Fomude, Chaoyu Yang, George Kofi Agordzo, Appiah Vincentia Serwah, Linda Abangbila:

AI Model to Improve HR Decision-Making with Machine Learning Predictions Algorithm. 206-212 - Hao Yang, Min Zhang, Shimin Tao, Miaomiao Ma, Ying Qin:

Chinese ASR and NER Improvement Based on Whisper Fine-Tuning. 213-217 - Sanjoy Basak

, Sreeraj Rajendran, Sofie Pollin, Bart Scheers:
Autoencoder based framework for drone RF signal classification and novelty detection. 218-225 - Lizi Hu, Yuhao Chai, Qin Li, Weiyuan Li, Yong Zhang:

Multi-source DNN task offloading strategy based on in-network computing. 226-231 - Weiqiang Xue, Zhijie Han, Xiaoyu Du:

Review of New Data Center Network Structure. 232-235 - Shengli Ding, Xiaomin Ma:

Bayesian Constrained Optimization of IEEE 802.11 VANET for Safety Applications. 236-242 - Shakil Ahmed

:
Study of Cluster-Based D2D Communication in Next Generation Mobile Network for the Post-Disaster Response. 243-248 - Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang, Jiann-Liang Chen:

An Intelligence Defense System with SNORT Rules. 249-254 - Satyanarayana N., Chitresh G.:

A Blockchain based Security Information and Event Monitoring Framework. 255-261 - Ahyun Song, Euiseong Seo, Heeyoul Kim:

Analysis of Olympus DAO: a popular DeFi model. 262-266 - Masaaki Ida:

Development of Indicator with Interactive Visualization System. 267-271 - Dongkoo Shon, Jeongsik Kim, Tae Hyun Yoon, Woo-Sung Jung

, Dae-Seung Yoo:
A Study of AI-based Harbor Surveillance System. 272-276 - Jikai Yang, Zhiquan Bai, Jiacheng Hu, Yingchao Yang, Zhaoxia Xian, Xinhong Hao, Kyung Sup Kwak:

Time-frequency Analysis and Convolutional Neural Network Based Fuze Jamming Signal Recognition. 277-282 - Hao Yang, Min Zhang, Shimin Tao, Miaomiao Ma, Ying Qin, Daimeng Wei:

TeacherSim: Cross-lingual Machine Translation Evaluation with Monolingual Embedding as Teacher. 283-287 - Nianqi Tang

, Yunghsiang S. Han, Hao Ren:
On Concatenated Coding Scheme for High-Speed Ethernet. 288-291 - Nahar Sultana, Farhana Huq, Md. Abdur Razzaque, Md. Mustafizur Rahman:

QoS-aware Resource Allocation for Healthcare Data Transmission using D2D Communication in NB-IoT. 292-297 - Yutaka Naito, Takumi Uemura, Takashige Hoshiai:

A Study on Connectivity Evaluation Among Peer Groups in Pure P2P Networks. 298-302 - Mingyao Zhao, Zhijie Han, Xiaoyu Du:

A Survey of Data Center Network Topology Structure. 303-309 - Sang-Yun Lee, Ho-Hyun Cho:

Damage Detection and Safety Diagnosis for Immovable Cultural Assets Using Deep Learning Framework. 310-313 - Jiuyi Chen, Ling Chen, Zhibin Yu:

Accelerating path tracing rendering with Multi-GPU in Blender cycles. 314-318 - Wook Hyun:

Study on standardization for Interoperable Metaverse. 319-322 - Gowoon Kang

, Joowon Park
, Soohyun Shin
, Hyo-Sik Yang:
DC Nanogrid using IEC 61850. 323-327 - Ali Athar

, Shah Mahsoom Ali, Md Ariful Islam Mozumder
, Sikandar Ali
, Hee-Cheol Kim:
Applications and Possible Challenges of Healthcare Metaverse. 328-332 - Fan Liu, Suriya Priya R. Asaithambi, Ramanathan Venkatraman:

Hybrid Personalized Book Recommender System Based on Big Data Framework. 333-340 - Jiseon Moon, Sang-il Ahn, Min Gyu Joo, Hyoung Won Baac, Jitae Shin:

Multi-Modal Deep Learning for the Thickness Prediction of Blood Clot. 341-344 - Xiaotian Wang, Letian Zhao, Wei Wu, Xi Jin:

Dynamic Neural Network Accelerator for Multispectral detection Based on FPGA. 345-350 - Ying-Jhen Su, Zhen-Kai Wu, You-Jia Su, Yu-Shan Lin, Yao-Chung Chang:

Graphed-based K-Means and Shortest Distance Tree for the Construction of Elderly Safe Corridor Accident and Prevention Platform. 351-357 - Farhana Huq, Nahar Sultana, Md. Abdur Razzaque:

Quality of Service Aware Order Allocation for Inter-Regional Online Food Delivery Systems. 358-364 - Stevan Del Arisandi, Nungki Selviandro, Kusuma Ayu Laksitowening, Dana Sulistiyo Kusumo:

Performance Analysis of Virtual Learning System: A Case Study of ANGKASA. 365-370 - Feixi Tang, Haowei Yang, Huibo Li, Zhixuan Feng, Peng Gong:

A Design of Data Interaction Interface Based on DDS for UAV-Borne SAR Distributed Simulation. 371-376 - Dana Sulistiyo Kusumo, Dita Noviyanti, Arfive Gandhi

, Ichwanul Muslim Karo Karo
, Su-Cheng Haw
, Palanichamy Naveen:
Redesign of Indonesia E-commerce Online Review using User Information Behavior and Build-Learn-Measure Approaches. 377-381 - Mahdi Daghmehchi Firoozjaei, MinChang Kim, Dima Alhadidi:

Time-Series Load Data Analysis for User Power Profiling. 382-387 - Shah Mahsoom Ali, Satyabrata Aich, Ali Athar

, Hee-Cheol Kim:
Medical Education, Training and Treatment Using XR in Healthcare. 388-393 - Gardner Mwansa

, Ntima Mabanza:
Review of Internet of Things security protocols - A Bibliometric Analysis. 394-400 - Dang Sao Cao, Dinh Tam Nguyen, Xuan Chinh Nguyen, Van Thuyet Tran, Hai Binh Nguyen, Khac Thuan Lang, Van Tuan Nguyen, Ngoc Lam Dao, Thanh-Tu Pham, Ngoc Son Cao, Dinh Hung Chu, Phi Hung Nguyen, Cong Dan Pham, Duc Hai Nguyen:

Elastic Auto-Scaling Architecture in Telco Cloud. 401-406 - Md Ariful Islam Mozumder

, Tagne Poupi Theodore Armand
, Ali Athar
, Hee-Cheol Kim:
The metaverse applications for the finance industry, its challenges, and an approach for the metaverse finance industry. 407-410 - Qiang Wu, Kouichi Hamada, Masayuki Arai:

SCN-SAM: A Modified Self-Cure Network for Facial Expression Recognition Under Face Masks. 411-416 - Jinming Che, Jian Cao, Shuo Feng, Jue Chen, Yuan Wang:

Linear Leakage: Better Robustness for Spiking Neural Network. 417-423 - Dahyun Kim, Yong-Ju Lee:

Improving Embodied Instruction Following with Deterministic Methods. 424-428 - Ming-Shen Jian, Yu-Zhi Luo, Peng-Wen Wang, Ting-Yu Lai:

Cloud and Edge Computing Based Movable 3D Dynamic Image Recognition and Analysis Layer System for Remote Biological Laboratory. 429-436 - Muhammad Mohsan Sheeraz

, Md Ariful Islam Mozumder
, Muhammad Omair Khan, Muhammad Usama Abid, Moon-Il Joo, Hee-Cheol Kim:
Blockchain System for Trustless Healthcare Data Sharing with Hyperledger Fabric in Action. 437-440 - Atiqur Rahman

, Azruph Islam Badhon
:
Simulation of Stator Current Signal Fault Characteristics of Induction Motor based on ANSYS. 441-447 - Shuang Xue, Huawei Liang, Qizhe Wu, Xi Jin:

Scheduling Memory Access Optimization for HBM Based on CLOS. 448-453 - Junqi Bao

, Yunchu Yang, Yapeng Wang, Xu Yang, Zhenyu Du:
Path Planning for Cellular-connected UAV using Heuristic Algorithm and Reinforcement Learning. 454-459 - Yeonjun Choi, Sung-Hoon Kim, Hongkyw Choi, Seongwon Jung:

Field Testing of HEVC based Terrestrial UHD 3D Broadcast in ATSC 3.0. 460-464

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














