default search action
ICACT 2019: Pyeongchang, Korea
- 21st International Conference on Advanced Communication Technology, ICACT 2019, Pyeongchang, South Korea, February 17-20, 2019. IEEE 2019, ISBN 979-11-88428-02-1
- Anh H. Dang, Wataru Kameyama:
SvgAI - Training Methods Analysis of Artificial Intelligent Agent to use SVG Editor. 1-8 - Batzorig Bazargur, Otgonbayar Bataa, Uuganbayar Budjav, Gantuya Gantumur:
Analysis of Radio Communication Networks in Underground Mining for Emergencies. 1-5 - Mohammad A. Almogbel, Anh H. Dang, Wataru Kameyama:
Cognitive Workload Detection from Raw EEG-Signals of Vehicle Driver using Deep Learning. 1-6 - Haowei Yang, Jianlu Wang, Xiang Gao, Huibo Li, Duk Kyung Kim, Peng Gong:
A PDSI-based Online Fault Configuration Approach for Communication Network in Power Grid Simulation. 6-10 - Rui Xue, Yang Xiong, Qinglin Cheng:
A Novel Ranging Code based on improved Logistic Map Chaotic Sequences. 11-15 - Shuai Deng, Shuhui Yang, Minqiao Liu, Ziyuan Zhang, Li Lei:
A Novel Ultra-Wideband Antenna Operating in the frequency band of 2.5-40GHz. 16-20 - Syed Asad Ali, Gul Shahzad, Fahim Aziz Umrani:
End to End Latency incurred in Cooperative Communication System. 21-25 - Fatin Hamadah Rahman, Awangku Muhammad Iqbal Yura, S. H. Shah Newaz, Au Thien Wan, Md. Shamim Ahsan:
Street Parked Vehicles Based Vehicular Fog Computing: TCP Throughput Evaluation and Future Research Direction. 26-31 - Hongyuan Wang:
An External Data Integrity Tracking and Verification System for Universal Stream Computing System Framework. 32-37 - Fawaz AL-Hazemi, Alaelddin Fuad Yousif Mohammed, Lemi Isaac Yoseke Laku, Rayan Alanazi:
PUE or GPUE: A Carbon-Aware Metric for Data Centers. 38-41 - Yan Gao, Bin Zhang, Si Wang, Anxiang Ma:
DBN Based Cloud Service Response Time Prediction Method. 42-46 - Yan Gao, Bin Zhang, Mengzhu Lu, Anxiang Ma:
Game Based SBCA Cloud Resource Adjustment Method. 47-51 - Xiaoyong Zhang, Ruizhen Wu, Mingming Wang, Lin Wang:
A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash. 52-55 - Sabyasachi Chakraborty, Satyabrata Aich, Jong-Seong Sim, Hee-Cheol Kim:
A Blockchain based Credit Analysis Framework for Efficient Financial Systems. 56-60 - Da-Yu Kao, Ni-Chen Wu, Fuching Tsai:
The Governance of Digital Forensic Investigation in Law Enforcement Agencies. 61-65 - Seongho Hong, Heeyoul Kim:
Analysis of Bitcoin Exchange Using Relationship of Transactions and Addresses. 67-70 - Peipei Wang, Kun Meng, Shuqin Li:
An Efficiency Evaluation Model for Designing Optimal Scheduling Mechanisms in N+X Hybrid Blockchain. 71-76 - Namjun Cha, Hosoo Cho, Sangman Lee, Junseok Hwang:
Effect of AI Recommendation System on the Consumer Preference Structure in e-Commerce: Based on Two types of Preference. 77-80 - Li Yan, Namjun Cha, Hosoo Cho, Junseok Hwang:
Video Diffusion in User-generated Content Website: An empirical analysis of Bilibili. 81-84 - Yuta Nemoto, Vitaly Klyuev:
Technologies for Super Micro Websites: Itty.bitty vs. Docs365 Itty Bitty. 85-90 - Yu Long, Ryo Yamamoto, Taku Yamazaki, Yoshiaki Tanaka:
A Deep Learning Based Social-aware D2D Peer Discovery Mechanism. 91-97 - Saha Tanangsanakool, Pongsathorn Reangsuntea, Kazuo Mori, Pisit Boonsrimuang:
Channel Estimation and Equalization Methods for ZP-OFDM under Highly Mobile Environments. 102-106 - Tran Cong Hung, Dang Thi Ngoc, Phan Thi The, Le Ngoc Hieu, Luan N. T. Huynh, Le Dien Tam:
A Moving Direction Proposal to Save Energy Consumption for Mobile Sink in Wireless Sensor Network. 107-110 - Olanrewaju Bola Wojuola:
Cross-correlation index and multiple-access performance of even-degree Gold codes. 111-114 - Pitchaya Boontra, Tanairat Mata, Arif Dataesatu, Kazuo Mori, Pisit Boonsrimuang:
A PAPR Reduction for FBMC-OQAM Signals using ABC-OPTS Scheme. 115-119 - Seunghyun Jang, Sunwoo Kong, Hui Dong Lee, Jeehoon Park, Kwang Seon Kim, Kwang Chun Lee:
1.8V-to-1.0V CMOS 65 nm MIPI RFFE Interface Circuit for Millimeter-wave Beamforming Array. 120-123 - Nawsheen Promy, Sadman Islam:
A Smart Android Based Parking System to Reduce the Traffic Congestion of Dhaka City. 124-128 - Arbab Waheed Ahmad, Nasir Mehmood Bahadar:
Exploiting Heterogeneous Networks model for Cluster Formation and Power Allocation in Uplink NOMA. 129-133 - Suyeon Kim, Chang Su Lee, Hyun Kook Kahng:
New Function and Configuration of Future Network for Blockchain Platform Operation. 134-137 - Satyabrata Aich, Sabyasachi Chakraborty, Mangal Sain, Hyein Lee, Hee-Cheol Kim:
A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study. 138-141 - Minsung Son, Heeyoul Kim:
Blockchain-based secure firmware management system in IoT environment. 142-146 - Yu Nandar Aung, Thitinan Tantidham:
Ethereum-based Emergency Service for Smart Home System: Smart Contract Implementation. 147-152 - Yustus Eko Oktian, Elizabeth Nathania Witanto, Sandra Kumi, Sang-Gon Lee:
BlockSubPay - A Blockchain Framework for Subscription-Based Payment in Cloud Service. 153-158 - Qian Liu, Xiao Lin, Shengnan Yue, Weiqiang Sun, Weisheng Hu:
Design of a routing scheme for bulk data transfers in multi-domain SnF OCS networks. 159-163 - Kwihoon Kim, Yong-Geun Hong:
Autonomous network traffic control system based on intelligent edge computing. 164-167 - Marija Tutunovic, Pongpisit Wuttidittachotti:
Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja. 168-172 - Sang-Moon Shin, Hong-Beom Kim, Jae-Woo Kim:
Fabrication of 53 Gb/s Optical Transceiver over 40-km transmission with PAM4 modulation. 173-175 - Ming-Shen Jian, Yu-En Cheng, Chen-Han Shen:
Internet Of Things (IOT) Cybersecurity based on the Hybrid Cryptosystem. 176-181 - Kaihua Jiang, Hong Ni, Peng Sun, Rui Han:
An Improved Binary Grey Wolf Optimizer for Dependent Task Scheduling in Edge Computing. 182-186 - Minjae Byun, Yongjun Lee, Jin-Young Choi:
Risk and avoidance strategy for blocking mechanism of SDN-based security service. 187-190 - Ahmadhon Kamolov, Mohammed Abdulhakim Al-Absi, Hoon-Jae Lee, Suhyun Park:
Smart Flying Umbrella Drone on Internet of Things: AVUS. 191-195 - Jong-Beom Kim, Jae-Woo Ahn, Jong Oh Kim, Seong Gon Choi:
A Resource Saving MAC/IP Handling Method for Low-Power Wireless TCP Packet Network. 196-200 - Yao-Chung Chang, Yung-Chiao Chen, Tsung-Hau Chen, Jiann-Liang Chen, Shih-Ping Chiu, Wei-Hsiu Chang:
Software-Defined Dynamic Bandwidth Management. 201-205 - Zhenwei Zhang, Hua Qu, Jihong Zhao, Zhirong Luan:
Fairness based Power Allocation Optimization in Dense Full Duplex D2D Networks. 206-211 - Hyun-Woo Rhee, Minchul Kim, Jong-Bum You, Hyo-Hoon Park:
High-Speed Data Transmission with Beam-Steering using Silicon Optical Phased Array. 212-216 - Narantuya Erkhembaatar, Otgonbayar Bataa:
Determining ICT indicators using entropy theory. 217-221 - Tran Thi Thao Nguyen, Makoto Tsurita, Kyoshiro Sakamoto, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi:
High Precision Industrial Wireless LAN System with Asynchronous Communication. 222-227 - Ziyuan Zhang, Shuhui Yang, Minqiao Liu, Shuai Deng, Lei Li:
Design of an UWB Microstrip Antenna With DGS Based on Genetic Algorithm. 228-232 - Arif Dataesatu, Pornpawit Boonsrimuang, Kazuo Mori, Pisit Boonsrimuang:
Comparative analysis of radio propagation models for LTE network on the sky train. 233-238 - Kwi-Yil Gwak, Sangwoo Park, JooSeok Song:
Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET Environment. 239-248 - Azamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Young-Sil Lee, Hoon-Jae Lee:
Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey. 249-255 - Gweon-Do Jo, Young Ha Lee:
Performance Evaluation of Physical Random Access Channel in 5G New Radio. 256-259 - Sabyasachi Chakraborty, Satyabrata Aich, Hee-Cheol Kim:
A Secure Healthcare System Design Framework using Blockchain Technology. 260-264 - Sang-Oun Lee, Hyunseok Jung, Bosuk Han:
Security Assured Vehicle Data Collection Platform by Blockchain: Service Provider's Perspective. 265-268 - Seung Jae Pee, Eung Seon Kang, Jae Geun Song, Ju Wook Jang:
Online test and management system using blockchain network. 269-272 - Dinar Orazgaliyev, Yerbolat Lukpanov, Ikechi A. Ukaegbu, H. S. V. Sivanand Kumar Nunna:
Towards the Application of Blockchain technology for Smart Grids in Kazakhstan. 273-278 - Sanjar Ibrokhimov, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee, Mangal Sain:
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey. 279-284 - Seung Han Choi, Seok Bong Yoo, Deockgu Jee, Mikyong Han:
The Service Scenario of Road Environment Improvement Based on Crowd Sourcing for Smart City. 292-294 - Seonyong Jeong, Yongjae Lee, Seungwon Shin:
Network Virtualization System for Smart Grid Data Acquisition System. 295-298 - Yi-Wei Ma, Jin-Qiu Shi, Jiann-Liang Chen, Chia-Chi Hsu, Chen-Hao Chuang:
Integration Agricultural Knowledge and Internet of Things for Multi-Agent Deficit Irrigation Control. 299-304 - Chang-Su Lee, Sweung-Won Cheung, Seong-Soon Joo, Hyun-Kook Kahng:
Design and Implementation of Autonomous Collaboration System of Smart Things using accumulated Experience knowledge. 305-313 - Jae Kyu Lee, Jae-Woo Ahn, Jong Oh Kim, Seong Gon Choi:
The SPI Synchronization Method for Data Efficiency and Integrity between MCUs. 314-319 - Qi Meng, Peng Gong, Yu Liu, Huibo Li, Cheying Li, Dan Shan:
An Interactive Interface for Information Exchanging between QualNet and Virtual Machine for IP Based Network. 320-324 - Huibo Li, Peng Gong, Yu Liu, Guolin Li, Dan Shan:
PDSI-based Static Route Online Configuration Method for QualNet Simulator. 325-329 - Xiang Gao, Peng Gong, Yu Liu, Qi Meng, Cheying Li, Dan Shan:
An Interactive Interface of QualNet for DigSilent in Power Grid Simulation. 330-333 - JinHyuck Park, ChoonSung Nam, JangYeol Lee, Dong Ryeol Shin:
Analysis of Task Success Rate for Classifying 2D-Touch and 3D-Touch through Threshold. 334-338 - Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu:
Chinese Spam Data Filter Model in Mobile Internet. 339-343 - Kumar Sharshembiev, Seong-Moo Yoo, Yong-Kab Kim, Geun-Ho Jeong:
Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc Networks. 344-350 - Alberto Gallegos Ramonet, Taku Noguchi:
IEEE 802.15.4 Historical Evolution and Trends. 351-359 - Grigoriy Fokin:
Passive Geolocation with Unmanned Aerial Vehicles using TDOA-AOA Measurement Processing. 360-365 - Yao Zhang, Haotong Cao, Meng Zhou, Longxiang Yang:
Power Optimization for Energy Efficiency in Cell-Free Massive MIMO with ZF Receiver. 366-371 - Mai A. Abd El-Halim, Adel Mounir Sareh Said, Hadia M. El-Hennawy:
A New Statistical Received Signal Strength (RSS) Model Based Fingerprint Approach for WLAN Indoor Localization Application. 372-384 - WooHyun Park, DoJin Park, ByungJune Ahn, SeokHun Kang, HaengYeong Kim, RaeHyeon Kim, JaeHeum Na:
Interactive AI for Linguistic Education Built on VR Environment Using User Generated Contents. 385-389 - Ali Rehman Shinwari, Asadullah Jalali Balooch, Ala Abdulhakim Alariki, Sami Abduljalil Abdulhak Naji:
A Comparative Study of Face Recognition Algorithms under Facial Expression and Illumination. 390-394 - Jihyun Seo, Jaewon Sa, Younchang Choi, Yongwha Chung, Daihee Park, Hakjae Kim:
A YOLO-based Separation of Touching-Pigs for Smart Pig Farm Applications. 395-401 - Azamat Marlen, Askar Maxim, Ikechi A. Ukaegbu, H. S. V. S. Kumar Nunna:
Application of Big Data in Smart Grids: Energy Analytics. 402-407 - Okeke Stephen, Uchenna Joseph Maduh, Sanjar Ibrokhimov, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain:
A Multiple-Loss Dual-Output Convolutional Neural Network for Fashion Class Classification. 408-412 - Da-Yu Kao:
Cybercrime Countermeasure of Insider Threat Investigation. 413-418 - Abidah Mat Taib, Nor Arzami Othman, Ros Syamsul Hamid, Iman Hazwam Abd Halim:
A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes. 419-424 - Jinhong Yang, Chul-Soo Kim, Md Mehedi Hassan Onik:
Aggregated Risk Modelling of Personal Data Privacy in Internet of Things. 425-430 - Young-Jin Kang, Ki-Hwan Kim, Hoon-Jae Lee:
Proposal of PingPong-128 Countermeasure against Power Analysis Attack. 431-434 - Nam-Uk Kim, Tai-Myoung Chung:
An efficient MSD protection and authentication scheme for automotive ICT based emergency call system. 435-439 - Wook Hyun, Mi-Young Huh, Juyoung Park:
Implementation of greenhouse service control protocol using Python on Raspberry PI. 440-442 - Jae-Woo Ahn, Jong-Oh Kim, Seong-Gon Choi:
Implementation of Packet Queue with Two Dimensional Array on Embedded System. 443-446 - Sun Hwang, Jin-Chun Woo, Thomas Byeongnam Yoon:
Development of a General Reporting Program for Measurement Uncertainty. 447-452 - Shinyuk Kang, Ilwoo Lee:
Implementation of PV Monitoring System Using Python. 453-455 - Sunwon Kang, Namgi Kim, Byoung-Dai Lee:
Fine Dust Forecast Based on Recurrent Neural Networks. 456-459 - Hanxing Xue, Jiali You, Jinlin Wang:
Churn Resilience of Distributed Content Service System on Smart Terminals Network. 460-466 - Soonchul Jung, Taewon Choi, Yoon-Seok Choi, In-Su Jang, Jae Woo Kim, Jin-Seo Kim:
Multisensory Capture System for the Preservation of Traditional Painting. 467-470 - Heechang Chung, Dongil Kim, Soonghee Lee, Sokpal Cho:
Smart Farming Education Service based on u-learning environment. 471-474 - Youngil Jeon, Hyeongsook Park, Eunyoung Choi:
Synchronization and Cell Search Procedure in 3GPP 5G NR Systems. 475-478 - Tae-Gyu Lee:
Sensitive Network Architecture Algorithm based on LED Optical Wireless Communication. 479-482 - M. Ranjeeth, S. Anuradha:
Throughput Analysis in Cooperative Spectrum Sensing Network using an Improved Energy Detector. 483-487 - Han Qing, Siji Chen, Md Liton Ali, Bin Shen:
Signal Assemblage Based Wideband Spectrum Sensing for OFDM Cognitive Radios. 488-491 - Siji Chen, Bin Shen, Xin Wang, Hebiao Wu:
SVM and Decision Stumps Based Hybrid AdaBoost Classification Algorithm for Cognitive Radios. 492-497 - Olanrewaju Bola Wojuola:
Mathematical Model for Bit-error-rate of a Spread-Spectrum System. 498-502 - Yan-Ju Chen, Wen-Han Kuo, Sung-Yun Tsai, Jiann-Liang Chen, Yu-Hung Chen, Wei-Zhao Xu:
Artificial Intelligence Hybrid Learning Architecture for Malware Families Classification. 503-510 - Van-Sang Ha, Dang-Nhac Lu, Gyoo-Seok Choi, Ha-Nam Nguyen, Byeongnam Yoon:
Improving Credit Risk Prediction in Online Peer-to-Peer (P2P) Lending Using Feature selection with Deep learning. 511-515 - Hao Yang, Gengui Xie, Ying Qin, Song Peng:
Domain Specific NMT based on Knowledge Graph Embedding and Attention. 516-521 - Nawab Muhammad Faseeh Qureshi, Isma Farah Siddiqui, Asad Abbas, Ali Kashif Bashir, Kee-Hyun Choi, Jaehyoun Kim, Dong Ryeol Shin:
Dynamic Container-based Resource Management Framework of Spark Ecosystem. 522-526 - Aisultan Alimkhan, Adilkhan Makhambayev, Ikechi A. Ukaegbu:
The Fourth Industrial Revolution: Towards Energy 4.0 in Kazakhstan. 527-532 - Chi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao:
Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network. 533-538 - Sutthinee Pongsrisomchai, Sudsanguan Ngamsuriyaroj:
Automated IT Audit of Windows Server Access Control. 539-544 - Asanga Wanniarachchi, Chandana Gamage:
RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine Instructions. 545-551 - Da-Yu Kao, Yuanpei Chen, En-Cih Chang:
Event Observation of Date-time Stamps for ADS Reconstruction. 552-557 - Rui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:
A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path. 558-562 - Charoenchai Wongwatkit:
An Online Web-based Adaptive Tutoring System for University Exit Exam on IT Literacy. 563-568 - Masaaki Ida:
Consideration on the variation of financial data of institutions for canonical correlation analysis. 569-572 - Papiya Chatterjee, Deepanjali Mishra, Lili Kumari Padhi, Jyotirmayee Ojha, Ahmed Abdulhakim Al-Absi, Mangal Sain:
Digital Story-Telling: A Methodology of Web Based Learning of Teaching of Folklore Studies. 573-578 - Hind R'bigui, Chiwoon Cho:
Complex Control-Flow Constructs Detection from Process Related Data. 579-582 - Meng-Lun Hsueh, Huey-Dong Wu, Bing-Yuh Lu:
The Evaluation System for the Computer Simulation of the Crackles in Respirations. 583-588 - Hyun Wong Choi, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin:
Comparative Analysis of Electricity Consumption at Home through a Silhouette-score prospective. 589-591 - Wooyoung Kim, Wonwoong Cho, Jangho Choi, Jiyong Kim, Cheonbok Park, Jaegul Choo:
A Comparison of the Effects of Data Imputation Methods on Model Performance. 592-599 - Madina Kenzhina, Ileskhan Kalysh, Ikechi A. Ukaegbu, H. S. V. Sivanand Kumar Nunna:
Virtual Power Plant in Industry 4.0: The Strategic Planning of Emerging Virtual Power Plant in Kazakhstan. 600-605 - Sabit Shaiholla, Asset Bekov, Ikechi A. Ukaegbu:
Industry 4.0: Redefining Manufacturing in Kazakhstan. 606-609 - Da-Yu Kao:
ATM Heist Threats: A Proposed ICT Governance Strategy. 610-615 - Wangbong Lee, Taeheum Na, Jeongyun Kim:
How to Create a Network Slice? - A 5G Core Network Perspective. 616-619 - Weidong Feng, Yong Sun, Zheng Zhou, Peng Zhan, YaoYi Jiao:
Study on the Efficiency Evaluation System of Distribution Communication Collaboration Network. 620-623 - Li Jing, Jin Xia Shi, Shuai Li, Qiuyue Liao:
The Method of Health Management on Satellite Constellation Network. 624-630 - Jang-Ho Choi, Jiyong Kim, Jongho Won, Ok-Gee Min:
Modelling Chlorophyll-a Concentration using Deep Neural Networks considering Extreme Data Imbalance and Skewness. 631-634 - Md Mehedi Hassan Onik, Chul-Soo Kim, Jinhong Yang:
Personal Data Privacy Challenges of the Fourth Industrial Revolution. 635-638 - Hyun Wong Choi, Nawab Muhammad Faseeh Qureshi, Dong Ryeol Shin:
Analysis of Electricity Consumption at Home Using K-means Clustering Algorithm. 639-643 - Yun-Xia Liu, Yang Yang, Peng Jigang, Haowei Liu, Haipeng Ping, Zhang Heng:
TED: A Tetrominoes based edge descriptor. 644-647 - Yun-Xia Liu, Yang Yang, Aijun Shi, Jigang Peng, Haowei Liu:
Intelligent monitoring of indoor surveillance video based on deep learning. 648-653 - Navaporn Chockwanich, Vasaka Visoottiviseth:
Intrusion Detection by Deep Learning with TensorFlow. 654-659 - Hanji Shen, Chun Long, Wei Wan, Jun Li, Yakui Qin, Yuhao Fu, Xiaofan Song:
Log Layering Based on Natural Language Processing. 660-663 - Halit Alptekin, Can Yildizli, Erkay Savas, Albert Levi:
TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework. 664-671 - Sang-Oun Lee, H. J. Seo:
Conceptualizing the cyber incident & event statistics reporting standards. 672-675 - Kéba Gueye, Bessan Melckior Dégboé, Samuel Ouya, Ngartabe Kag-Teube:
Proposition of Health Care System Driven by IoT and KMS for Remote Monitoring of Patients in Rural Areas: Pediatric Case. 676-680 - Yoichi Saito, Vitaly Klyuev:
Classifying User Reviews at Sentence and Review Levels Utilizing Naïve Bayes. 681-685 - Byeongnam Yoon, Dinh-Lam Pham, Pham Hai Son, Pham Thanh Dat, Do Van Thien, Viet-Vu Vu, Hong-Quan Do, Nang-Toan Do:
A Study on EA based IT Governance. 686-691 - Dinh-Lam Pham, Hyun Ahn, Kwanghoon Pio Kim:
A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis. 692-696 - Lili Kumari Padhi, Deepanjali Mishra, Papiya Chatterjee, Jyotirmayee Ojha, Mangal Sain:
Strategies of Learning: A Methodology of Teaching Language Through Digitalisation. 697-702 - Sang-Chul Shin, Zafar Makhamadjanovich Rakhmatullayev:
Digital Transformation of the Public Service Delivery System in Uzbekistan. 703-709 - Seung-Jun Cha, Seung Hyup Jeon, Ramneek, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:
Space Sharing Effects on Manycore Systems. 710-713 - Kyong Hee Lee, Whui Kim, Hyun Kyun Choi, Byung-Tae Jang:
A Study on Feature Extraction Methods Used to Estimate a Driver's Level of Drowsiness. 710-713 - Sangha Choi, Wooshik Kim, Sugjoon Yoon:
Design of 3D Animation Builder with HLA Based Distributed Simulations. 718-721 - Jafrul Islam Sojol, Md. Hashmi Shihab, Tanvir Ahamed, Md. Abu Sayed Siam, Shahnewaz Siddique:
Nirob: A Next Generation Green Earth Technology Based Innovative System for Metropolitan Sound Pollution Management. 722-727 - Lemi Isaac Yoseke Laku, Alaelddin Fuad Yousif Mohammed, Fawaz AL-Hazemi, Chan-Hyun Youn:
Performance Evaluation of Apache Storm With Writing Scripts. 728-733 - Jafrul Islam Sojol, Md. Sakib Alam, Md. Nazmul Hossain, Tamanna Motahar:
Smart School Bus: Ensuring Safety On The Road For School Going Children. 734-739 - Bhuridech Sudsee, Chanwit Kaewkasi:
An Improvement of a Checkpoint-based Distributed Testing Technique on a Big Data Environment. 1081-1090 - Taeho Jo:
Improving K Nearest Neighbor into String Vector Version for Text Categorization. 1091-1097 - Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso:
Analyzing WannaCry Ransomware Considering the Weapons and Exploits. 1098-1107 - Da-Yu Kao, En-Cih Chang, Fu-Ching Tsai:
Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations. 1108-1115 - Satyabrata Aich, Hee-Cheol Kim, Kim Younga, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain:
A Supervised Machine Learning Approach using Different Feature Selection Techniques on Voice Datasets for Prediction of Parkinson's Disease. 1116-1121 - Satyabrata Aich, Ahmed Abdulhakim Al-Absi, Kueh Lee Hui, Mangal Sain:
Prediction of Quality for Different Type of Wine based on Different Feature Sets Using Supervised Machine Learning Techniques. 1122-1127 - Yoonlae Lee, Youn-Geol Lee, Hyunah Kim, Minjae Park:
A solar power generation facility state monitoring system using drone aerial photographing. 1128-1134 - Mangal Sain, Amlan Jyoti Chaudhray, Satyabrata Aich, Hoon-Jae Lee:
Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network. 1135-1142 - Dang-Hai Hoang, Ha Duong Nguyen:
Detecting Anomalous Network Traffic in IoT Networks. 1143-1152 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:
SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS. 1153-1158
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.