default search action
ICACT 2018: Elysian Gangchon, Chuncheon, Korea
- 20th International Conference on Advanced Communication Technology, ICACT 2018, Elysian Gangchon, Chuncheon, Korea (South), February 11-14, 2018. IEEE 2018, ISBN 979-11-88428-01-4
- Dinh Van Dzung:
Tutorial: Smart cities activities in Vietnam and review of ICT enabling technologies. xxvii-xxix - Mikhail Buinevich, Konstantin E. Izrailov, Andrei Vladyko:
Metric of vulnerability at the base of the life cycle of software representations. 1-8 - Sunghyun Kim, Hyekyung Jwa, Jung-Mo Moon, Jeehyeon Na:
Achieving fair cell-edge performance: Low-complexity interference coordination in OFDMA networks. 6-11 - Chencong Wang, Zijun Wang, Yong Mao Huang:
Size-miniaturized half-mode substrate integrated waveguide bandpass filter incorporating E-shaped defected ground structure for wideband communication and radar applications. 12-16 - Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Young-Jin Kang, Hoon-Jae Lee:
Obstacles effects on signal attenuation in line of sight for different environments in V2V communication. 17-20 - Eun-Kyu Lee, Chae-Soo Kim, Jae-Joong Kim, Hyung Rim Choi:
A study on the fabrication and evaluation of the MEMS based FBAR filter for wireless systems. 21-24 - Chae Young Lee, Yeon Jun Lim, Taeseon Yoon:
Global optimization of neural network. 25-28 - Nicolas Bersano, Horacio Sanson:
Non-invasive blood pressure estimation from photoplethysmography signals using artificial neural networks. 29-35 - Deokkyu Jung, Jeong-Woo Son, Sun-Joong Kim:
Shot category detection based on object detection using convolutional neural networks. 36-39 - Chang Hoon Kim, Espoir K. Kabanga, Sin-Jae Kang:
Classifying malware using convolutional gated neural network. 40-44 - Lidan Shang, Qiushi Yang, Jianing Wang, Shubin Li, Weimin Lei:
Detection of rail surface defects based on CNN image recognition and classification. 45-51 - Hye-Jin S. Kim, Il-Kwon Jeong:
Multiple main user recognition. 59-62 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. 63-67 - Sami Abduljalil Abdulhak, Ala Abdulhakeem Abdulaziz:
A systematic review of features identification and extraction for behavioral biometrie authentication in touchscreen mobile devices. 68-73 - Liu Yao, Shuai Xue:
Accelerate the paillier cryptosystem in CryptDB by Chinese Remainder Theorem. 74-77 - Bhuridech Sudsee, Chanwit Kaewkasi:
A productivity improvement of distributed software testing using checkpoint. 78-84 - Shuaizhi Guo, Linlin Zheng, Xi Jin:
Accelerating a radio astronomy correlator on FPGA. 85-89 - Jae-Woo Ahn, Jong-Beom Kim, Won-Suk Choi, Jong-Oh Kim, Seong Gon Choi:
Load distribution method using multicore based NIC for high-performance computing system. 90-93 - Joon Yeol Yoon, Won Seok Choi, Jong Oh Kim, Jae Woo Ahn, Jong-Beom Kim, Seong Gon Choi:
Design of multicore-based high performance load distribution system. 94-97 - Wah Ching Lee, Kim Fung Tsang:
Design of a 2.4 GHz high-performance mixer with current bleeding topology. 98-103 - Sheng Jiang, Francis C. M. Lau:
An approach to evaluating the number of potential cycles in an all-one base matrix. 104-108 - Ealwan Lee:
Duality of I/Q imbalance in RF mixer: Application to the L1-norm based estimation and generalization to the SVD based model. 109-112 - Phan Thi The, Vu Nhu Manh, Tran Cong Hung, Le Dien Tam:
Improving network lifetime in wireless sensor network using fuzzy logic based clustering combined with mobile sink. 113-119 - Na Wang, Ying Xu, Yajun Zhang, Meng Liu, Daxue Shen, Hongjun Wang:
An algorithm to calculate phase and amplitude of tag on RFID protocol conformance test system. 120-126 - Kwihoon Kim, Yong-Geun Hong, Youn-Hee Han:
General labelled data generator framework for network machine learning. 127-131 - Anh H. Dang, Wataru Kameyama:
SvgAI - Training artificial intelligent agent to use SVG editor. 132-138 - Satyabrata Aich, Ahmed Abdulhakim Al-Absi, Kueh Lee Hui, John Tark Lee, Mangal Sain:
A classification approach with different feature sets to predict the quality of different types of wine using machine learning techniques. 139-143 - Siddhi Velankar, Sakshi Valecha, Shreya Maji:
Bitcoin price prediction using machine learning. 144-147 - Y. W. Luo, Y. Li, F. J. Han, S. B. Huang:
Grading image retrieval based on CNN deep features. 148-152 - Shou-Ching Hsiao, Da-Yu Kao:
The static analysis of WannaCry ransomware. 153-158 - Da-Yu Kao, Shou-Ching Hsiao:
The dynamic analysis of WannaCry ransomware. 159-166 - Woo-Jin Sung, Hyeong-Geun Ahn, Jong-Beom Kim, Seong-Gon Choi:
Protecting end-device from replay attack on LoRaWAN. 167-171 - Yogeesh Seralathan, Tae Tom Oh, Suyash Jadhav, Jonathan Myers, Jaehoon Paul Jeong, Young Ho Kim, Jeong Neyo Kim:
IoT security vulnerability: A case study of a Web camera. 172-177 - Fahimeh Farahnakian, Jukka Heikkonen:
A deep auto-encoder based approach for intrusion detection system. 178-183 - Yu Chen, Mingming Sun:
TSSA: A two step scheduling algorithm for the event-driven clusters. 184-189 - Ming-Shen Jian, Yi-Chang Wang, Bo-Han Wu, Yu-En Cheng:
Hybrid cloud computing for user location-aware augmented reality construction. 190-194 - Jianghao Li, Zhiquan Bai, Haixia Zhang, Yingchao Yang, Shangqian Sun, Tao Han, Kyungsup Kwak:
Outage performance analysis of IHDAF cooperative based communication system. 195-200 - Ming-Shen Jian, Hao-Yi Xu, Jenn-Feng Sheen, Yi-Ling Ye:
Cloud based agriculture safety inspection with multiple standard sources. 201-206 - Wenkang Chen:
Efficient partitioner for distributed OLTP DBMS. 207-210 - En-Chun Kuo, Ming-Sang Chang, Da-Yu Kao:
User-side evil twin attack detection using time-delay statistics of TCP connection termination. 211-216 - Hamim Md Adal, Nawsheen Promy, Sanjana Srabanti, Mahbubur Rahman:
Android based advanced attendance vigilance system using wireless network with fusion of bio-metric fingerprint authentication. 217-222 - Chun Yeow Yeoh, Abdullah bin Man, Qazi Mamoon Ashraf, Ahmad Kamsani Samingan:
Experimental assessment of battery lifetime for commercial off-the-shelf NB-IoT module. 223-228 - Chae-Eun Lee, Inn-chae Yeo, Inshil Doh:
Customized embedded system design for lower limb rehabilitation patients. 229-233 - Liu Liu, Ke Zhang, Cheng Tao, Kun Zhang, Ze Yuan, Jianhua Zhang:
Channel measurements and characterizations for automobile factory environments. 234-238 - Sergio Peñafiel, Nelson Baloian, José A. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh:
Associating risks of getting strokes with data from health checkup records using Dempster-Shafer Theory. 239-246 - Hyewon Song, Okgee Min:
Statistical traffic generation methods for urban traffic simulation. 247-250 - Xiaodong Liu, Jian Li:
ECPS: An application-specific VM scheduler basing on CPU pool mechanism for big data environment. 251-255 - Mohammad A. Almogbel, Anh H. Dang, Wataru Kameyama:
EEG-signals based cognitive workload detection of vehicle driver using deep learning. 256-259 - Taeho Jo:
String Vector based KNN for text categorization. 260-265 - Mikhail Buinevich, Konstantin E. Izrailov, Ekaterina Stolyarova, Andrei Vladyko:
Combine method of forecasting VANET cybersecurity for application of high priority way. 266-271 - Jong-Beom Kim, Hyeon Yang, Kyeong Ho Park, Si Young Lee, Seong Gon Choi:
The real-time session inspection method using heartbeat signal. 272-276 - Xue Shuai, Liu Yao, Zhang Wang:
QAT: Evaluation of a dedicated hardware accelerator for high performance web service. 277-280 - Danjie Song, Chun Long, Wei Wan, Jing Zhao, Shaojie Wang:
A quantum secure direct communication protocol based on six-qubit cluster state. 281-287 - Jie Wu, Hongchun Li, Yi Xu, Jun Tian:
Joint optimal channel allocation, interface assignment and routing in multi-hop wireless networks. 288-293 - Youngbok Cho, Minkang Kim, Sunghee Woo:
Energy efficient IoT based on wireless sensor networks. 294-299 - Kyungbok Sung, Kyoungwook Min, Jeongdan Choi:
Driving information logger with in-vehicle communication for autonomous vehicle research. 300-302 - Rico Valentino, Woo-Sung Jung, Young-Bae Ko:
Opportunistic computational offloading system for clusters of drones. 303-306 - Jin-Kyu Choi, Kyongho Kim, Dohyun Kim, Hyunkyun Choi, Byungtae Jang:
Driver-adaptive vehicle interaction system for the advanced digital cockpit. 307-310 - Yingying Sun, Lijun Wang, Zhiquan Bai, Kyung Sup Kwak, Xuming Yao, Tao Han:
End to end performance analysis of relay cooperative communication based on parked cars. 311-317 - Na Zhang, Zhiquan Bai, Qi Zhang, Anyang Liu, Shangqian Sun, Kyungsup Kwak:
Cosine similarity based bit to symbol-and-antenna mapping in spatial modulation system. 318-322 - Tran Dinh Hieu, Tran Trung Duy, Seong Gon Choi:
Performance enhancement for harvest-to-transmit cognitive multi-hop networks with best path selection method under presence of eavesdropper. 323-328 - Phuc Chau, Toan Duc Bui, Yongwoo Lee, Jitae Shin:
Practical incremental network coding for multimedia content delivery. 329-332 - Hyeong Ho Lee, Yun Chul Choi, Byung Jun Ahn, Jin Seek Choi:
Protocols and use cases for media independent management in SDN-based wireless access networks. 333-339 - Jorge Quinteros, Nelson Baloian, José A. Pino, Alvaro Riquelme, Sergio Peñafiel, Horacio Sanson, Douglas Teoh:
Diagnostic test suggestion via Bayesian network of non-expert assisted knowledge base. 340-346 - Marcella Astrid, Seung-Ik Lee, Beom-Su Seo:
Rank selection of CP-decomposed convolutional layers with variational Bayesian matrix factorization. 347-350 - Bongjin Oh, Junhyeok Lee:
A case study on scene recognition using an ensemble convolution neural network. 351-353 - Ji Won Lee, Yoonhyung Kim, Minki Jeong, Changick Kim, Do-Won Nam, Jungsoo Lee, Sung-Won Moon, Wonyoung Yoo:
3D convolutional neural networks for soccer object motion recognition. 354-358 - Tai-Yeon Ku, Wan-Ki Park, Hoon Choi:
Self-learning mechanism for prediction of energy consumption and generation. 359-362 - Da-Yu Kao, Yu-Siang Wang, Fu-Ching Tsai, Chien-Hung Chen:
Forensic analysis of network packets from penetration test toolkits. 363-368 - Jae Kyu Lee, Hyeon Yang, Kyeong Ho Park, Si Young Lee, Seong Gon Choi:
The flow-reduced malware detection system by controlling inactive/active timeout. 369-372 - MinKyu Kim, KiHwan Kim, HoonJae Lee:
Development trend of insider anomaly detection system. 373-376 - SuMi Ryu, Young-Jin Kang, Hoonjae Lee:
A study on detection of anomaly behavior in automation industry. 377-380 - Dang-Hai Hoang, Ha Duong Nguyen:
A PCA-based method for IoT network traffic anomaly detection. 381-386 - Sabeen Javaid, Hammad Afzal, Fahim Arif, Naima Iltaf:
Trust management for SOA based social WoT system. 387-392 - Sabeen Javaid, Ali Sufian, Saima Pervaiz, Mehak Tanveer:
Smart traffic management system using Internet of Things. 393-398 - James K. Tamgno, Ndeye Rokhaya Diallo, Claude Lishou:
IoT-based medical control system. 399-404 - Chalee Vorakulpipat, Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Dang-Hai Hoang:
Recent challenges, trends, and concerns related to IoT security: An evolutionary study. 405-410 - Xudong Cheng, Yejun He:
Channel modeling and analysis of ULA massive MIMO systems. 411-416 - Kyusung Shim, Tri Nhu Do, Beongku An:
A physical layer security-based routing protocol in mobile ad-hoc wireless networks. 417-422 - Jung Hoon Kim, Minseo Kim, Taejun Yang, Insu Kim, Jun Seo, Summoo Kang:
Compressed QR code-based mobile voice guidance service for the visually disabled. 423-425 - Wuttipan Duangsri, Mongkol Somrobru, Nikorn Sutthisangiam:
Performance enhancement for co-channel interference cancellation with smart antenna and power adaptive in cooperative communication. 426-431 - Yendoutie Nakorgou, Antoine Gnansounou, Ahmed Dooguy Kora, Mbemba Hydara:
Accurate radio coverage assessment methods: Investigation of mobile networks based on subscribers mobile phones. 432-437 - Taeho Jo:
String vector based KNN for text categorization. 438-443 - WooHyun Park, KiNam Park:
Story creation and design algorithm in unity. 444-447 - Sasiwimon Tanphet, Paweena Wanchai:
Applying business intelligence technology for equipment maintenance and repair plan of telecommunications services provider. 448-453 - Abdulaziz Alsubaie, Mohammed Alaithan, Muath Boubaid, Noor Zaman:
Making learning fun: Educational concepts & logics through game. 454-459 - Sung-Won Moon, Ji Won Lee, Do-Won Nam, Wonyoung Yoo, Wonjun Kim:
A comparative study on preprocessing methods for object tracking in sports events. 460-462 - Dana Yang, Inshil Doh, Kijoon Chae:
Secure medical image-sharing mechanism based on visual cryptography in EHR system. 463-467 - Sukritta Harnmetta, Sudsanguan Ngamsuriyaroj:
Classification of Exploit-Kit behaviors via machine learning approach. 468-473 - Shusmoy Kundu, Khandaker Annatoma Islam, Tania Tahmina Jui, Suzzana Rail, Md. Afzal Hossain, Ishraq Haider Chowdhury:
Cyber crime trend in Bangladesh, an analysis and ways out to combat the threat. 474-480 - Maria Almulhim, Noor Zaman:
Proposing secure and lightweight authentication scheme for IoT based E-health applications. 481-487 - Jongkuk Lee, HeaSook Park:
Method of reliable MPTCP. 488-491 - Hai Nguyen Dinh, Sang-Il Kim, Hwa-Sung Kim:
Dynamic equilibrium capacity across multiple regions in NFV environment. 492-498 - Abdou Khadre Diop, Serban Meza, Mihaela Gordan, Aurel Vlaicu:
LDA based classification of video surveillance sequences using motion information. 499-502 - Zongyao Li:
HPSRouter: A high performance software router based on DPDK. 503-506 - Abdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy:
5G framework based on multi-level edge computing with D2D enabled communication. 507-512 - Xuming Yao, Yingying Sun, Tao Han:
Study on energy consumption and coverage of hierarchical cooperative of small cell base stations in heterogeneous networks. 513-518 - Mbemba Hydara, Ahmed Dooguy Kora, Antoine Gnansounou:
Global ranking of heterogeneous mobile network coverage. 519-526 - Jinhyung Oh, Jong Ho Kim, Young-Jun Chong:
Analysis of path loss about radio duct phenomenon with atmospheric refractive index information. 527-530 - Antoine Gnansounou, Samuel Ouya, Raimy Abd. Toure:
Advanced LTE network deployment methodology: A case study for Dakar region. 531-536 - Joonmyun Cho, Yoon-Seop Chang, Sung-Ho Lee:
Theme-related keyword extraction from free text descriptions of image contents for tagging. 537-541 - Ishraq Haider Chowdhury, Afsana Abida, Md. Mehedi Hasan Muaz:
Automated vehicle parking system and unauthorized parking detector. 542-545 - Mi-Seon Kang, Hyun-Woo Kang, Cheolhyo Lee, Kiyoung Moon:
The gesture recognition technology based on IMU sensor for personal active spinning. 546-552 - Sangkeun Yoo, Yong-Woon Kim, Hoon Choi:
An assessment framework for smart manufacturing. 553-555 - Igor Kim, Jung-Sun Um, Seungkeun Park:
Implementation and performance evaluation of 256-QAM in vienna system level simulator. 556-559 - Mirsat Yesiltepe:
Web services for mobile devices from one server. 560-566 - Sang Kwon Kim, Deokkyu Jung, Sang-Yun Lee, Sun-Joong Kim:
A study on the establishment of open source website for open smart broadcast platform. 567-570 - Jeong-Woo Son, Wonjoo Park, Sang-Yun Lee, Sun-Joong Kim:
Video scene title generation based on explicit and implicit relations among caption words. 571-573 - Fernando Wong, Horacio Sanson:
Force-directed Voronoi-based method for graph drawing in constrained boundaries. 574-581 - Donghwan Shin, Jonguk Choi:
Proposal of value-added service based on real-time automatic content recognition. 582-584 - Kyongho Cho, Taeseon Yoon, Sunghee Park, Dohyeon Park:
Using standardization for fair data evaluation. 585-589 - Yu-Ju Lee, Wen-Wei Liao:
Ultimate performance of Wi-Fi access points with multiple interfaces: An application of software defined network. 590-594 - Byung-Yun Lee, Hea-Sook Park:
The architecture of multi media multi path system. 595-599 - Teerawut Banchuen, Kiattikun Kawila, Kultida Rojviboonchai:
An SDN framework for video conference in inter-domain network. 600-605 - Dzung Van Dinh, Byeong-Nam Yoon, Hung Ngoc Le, Uy Quoc Nguyen, Khoa Dang Phan, Lam Dinh Pham:
ICT enabling technologies for smart cities. 606-611 - Dongyang Wang, Qingping Shi:
UL coverage enhancement for massive machine type communication in 5G. 612-617 - Chang-Gyu Lim, Moonsub Song:
Design and implementation of optical transport network models with path computation. 618-621 - Law Foo Kui, M. Rakib Uddin:
Demonstration of digital optical D flip flop based on photonic micro-ring resonator. 622-624 - Seung-Woo Lee, In-Ki Hwang, Hun-Sik Kang:
Data alignment for multi-channel high-speed interfaces using PRBS patterns. 625-627 - Azruph Islam Badhon, Homira Asima Prapty, Khairul Bin Amin, Md. Afzal Hossain:
Analysis of coupling coefficient and crosstalk in a homogenous multicore optical fiber. 628-633 - Pengfei Yang, Daolu Zha, Xi Jin:
A pipelined division for fixed operation using user-defined floating point. 634-637 - Satyabrata Aich, Kim Younga, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain:
A nonlinear decision tree based classification approach to predict the Parkinson's disease using different feature sets of voice data. 638-642 - Kéba Gueye, Ngartabe Kag-Teube, Samuel Ouya, Davy Edgard Moussavou:
Proposal for a universal access solution to care in rural areas: Case of Senegal. 643-646 - Shahab Rezaian, Harhodin Bin Salamat, Reza Malekzadeh, Rasimah Chemohd Yusoff, Najaf Zare:
Factors affecting the successful implementation of hospital information system: A preliminary pilot study of Iranian nurses. 647-651 - Tae-Gyu Lee:
Sensing system and sensing method of passive patch interface for gathering bioinformation. 652-655 - Yoon-Seop Chang, Seong-Ho Lee, Joonmyun Cho:
Augmented reality services of photos and videos from filming sites using their shooting locations and attitudes. 656-660 - Wonjoo Park, Jeong-Woo Son, Sang-Yun Lee, Sun-Joong Kim:
Clip recommendation based on topic similarity. 661-663 - Seung-Hee Kim, Deokkyu Jung, Sang-Yun Lee, Sun-Joong Kim:
Scene-based metadata generation and open API provisioning method for smart broadcast service. 664-668 - Hayun Lee, Gyeonghwan Hong, Dongkun Shin:
Shareable camera framework for multiple computer vision applications. 669-674 - Jungsoo Lee, Ji Won Lee, Sung-Won Moon, Do-Won Nam, Wonyoung Yoo:
Basketball event recognition technique using Deterministic Finite Automata(DFA). 675-678 - Fu-Ching Tsai, En-Cih Chang, Da-Yu Kao:
WhatsApp network forensics: Discovering the communication payloads behind cybercriminals. 679-684 - Ngartabe Kag-Teube, Yvan Paillard Kalia-Sya Dodoagnen, Samuel Ouya, Kéba Gueye:
Proposed solution for improving the reliability of HSS data by integrating a queue manager. 685-693 - Mamadou Alpha Barry, James K. Tamgno, Claude Lishou, Modou Bamba Cisse:
QoS impact on multimedia traffic load (IPTV, RoIP, VoIP) in best effort mode. 694-700 - Wook Hyun, Chang-Kyu Lee, ShinGak Kang, Juyoung Park:
Buffermap adaptation method for MP2P multimedia streaming protocol. 701-704 - Changkyu Lee, Wook Hyun, Shin-Gak Kang:
Method of managed content distribution for time-constrained distribution. 705-708 - Yueying Zhan, Liqian Wang, Shaojun Wu, Suzhi Cao, Jianhua He:
Dynamic bandwidth allocation for switching FCAE-1553 network in avionics system. 709-713 - James K. Tamgno, Imane S. O.-T. A. Alidou, Claude Lishou:
Optimization of HPSA+ capacity of mobile networks. 714-719 - Weidong Feng, Yong Sun, Zheng Zhou, Qiang Rao, Di Chen, Linhui Yang, Yawei Wang:
Study on multi-network traffic modeling in distribution communication network access service. 720-723 - Minjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim:
A process-aware IoT application execution environment design. 724-727 - Minjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim:
An IoT-aware workflow model designer for smart alarm service about companion animal health check. 728-731 - Khalifa Sylla, Massamba Seck, Samuel Ouya, Gervais Mendy:
Impact of MSRP protocol integration in e-learning platforms of universities. 732-737 - Kokou Gaglo, Massamba Seck, Samuel Ouya, Gervais Mendy:
Proposal for an online practical work platform for improving the teaching of STEM. 738-743 - Byeongnam Yoon, Kwanghoon Pio Kim, Dinh-Lam Pham, Pham Thanh Dat, Viet-Vu Vu, Hong-Quan Do, Nang-Toan Do:
Study of p-ICN defined performance measurement Enterprise Architecture. 744-748 - Chiyurl Yoon, Miyoung Huh, Shin-Gak Kang, Juyoung Park, Chang-Kyu Lee:
Implement smart farm with IoT technology. 749-752 - Mikhail Blinnikov, Rustam Pirmagomedov:
Wireless identifying system based on nano-tags. 753-757 - Malathi Balaji, Shafique Ahmad Chaudhry:
A cooperative trilateration technique for object localization. 758-763 - Olanrewaju Bola Wojuola:
Cross-correlation index and multiple-access performance of Gold codes in a spread-spectrum system. 764-768 - Fei Ding, Ye Wang, En Tong, Zhiwen Pan, Xiaohu You:
A low-complexity practical energy saving algorithm for real dense wireless scenario. 985-991 - Shi Li, Inshil Doh, Kijoon Chae:
NRIT: Non-redundant indirect trust search algorithm for a cross-domain based CDNi-P2P architecture. 992-998 - Muhammad Hanif, Choonhwa Lee:
Capacity-aware key partitioning scheme for heterogeneous big data analytic engines. 999-1007 - Idriss Saleh Bachar, Ahmed Dooguy Kora, Roger Marcelin Faye, Christelle Aupetit-Berthelemot:
Radio access and transmission models for universal service. 1018-1024 - Yong Ju Lee, Kyung Ho Lee:
What are the optimum quasi-identifiers to re-identify medical records? 1025-1033 - Yuhui Song:
A cooperative spectrum sensing algorithm using leading eigenvector matching. 1034-1039 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Evolving neural network intrusion detection system for MCPS. 1040-1045 - Anna Yang, Sung Moon Chun, Jae-Gon Kim:
Detection and recognition of hand gesture for wearable applications in IoMT. 1046-1053 - Youngsam Kim, Soohyung Kim:
Design of aging-resistant Wi-Fi fingerprint-based localization system with continuous active learning. 1054-1059 - Jinhyung Oh, Young Jun Chong:
A detailed large-scale radio propagation characteristics: Approaches with time and spatial ratio. 1060-1066 - Youn-Geol Lee, Yoonlae Lee, Yeonyi Jang, Minjae Park:
A process-aware drone-equipped 3D engine and wireless control measurement platform for integrated management of SOC facilities. 1067-1072
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.