default search action
ICACT 2021: Pyeongchang, Korea
- 23rd International Conference on Advanced Communication Technology, ICACT 2021, Pyeongchang, South Korea, February 7-10, 2021. IEEE 2021, ISBN 979-11-88428-06-9
- Mykola Servetnyk, Wei-Han Hsiao, Alisher Mukashev:
Performance Evaluation of Polarization Effects on 5G Clustered Delay Line Channels. 1-6 - Edgard Ndassimba, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Feasibility of interconnecting the University of Bangui and peripheral areas via the TVWS for e-learning in the context of COVID-19. 7-13 - Ibrahima Gueye, Idy Diop, Ibra Dioum, Khadidiatou Wane Keita, Papis Ndiaye, Moussa Diallo, Sidi Mohamed Farssi:
Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes. 14-22 - Mohammadreza Robaei, Robert Akl, Robin Chataut, Utpal Kumar Dey:
Adaptive Millimeter-Wave Channel Estimation and Tracking. 23-28 - Shixin Liao, Yueying Zhan, Ziyuan Shi, Lei Yang:
A High Throughput and Flexible Rate 5G NR LDPC Encoder on a Single GPU. 29-34 - Shan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai:
The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network. 35-41 - Fatou Ndiaye Mbodji, Gervais Mendy, Ahmath Bamba Mbacke, Samuel Ouya:
Incentive and Playful Strategy for a Participative Model of Learning and Experimenting Blockchain. 42-47 - Woong-Sub Park, Hyuk Lee, Jin-Young Choi:
Formal Modeling of Smart Contract-based Trading System. 48-52 - Jinsuk Baek, Munene W. Kanampiu:
A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. 53-57 - Jun Guo, Xinwei Liu, Chen Liu, Zixuan Zhao, Bin Zhang:
An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time Constraints. 58-62 - Charnon Poolsin, Nattakit Sa-Ngiam, Nikorn Sutthisangiam:
Development of Centimeter Level Positioning Mobile Based Application. 63-67 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:
A Study on the Population Distribution Prediction in Large City using Agent-Based Simulation. 68-71 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:
Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee. 72-76 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:
Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption Optimization. 77-80 - Seung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:
OS noise Analysis on Azalea-unikernel. 81-84 - Jingwei Li, Yibo Lyu, Xu Li, Tianxiang Wang, Xiaowen Dong:
Reservoir Computing Based Equalization for Radio over Fiber System. 85-90 - Mi Tian, Mihai Sima, Michael McGuire:
Massive MIMO in Fixed-Point Arithmetic. 91-95 - Yoshimi Fujii, Tetsuya Iye, Kensuke Tsuda, Akihiro Tanibayashi:
A 28 GHz Beamforming Technique for 5G Advanced Communication Systems. 96-99 - Tetsuya Iye, Kensuke Tsuda, Yoshimi Fujii:
An Experimental Study of 28 GHz Analog Beamforming with a Uniform Linear Array. 100-103 - Jong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko:
A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks. 104-108 - Satyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim:
Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies. 109-112 - Tae-Shin Kang, Moon-Il Joo, Beom-Soo Kim, Tae-Gyu Lee:
Blockchain-based Lightweight Transaction Process Modeling and Development. 113-118 - Samin Sadri, Aamir Shahzad, Kaiwen Zhang:
Blockchain Traceability in Healthcare: Blood Donation Supply Chain. 119-126 - Xiaojun Hou, Heng Wu, Ting Peng, Xiaoling Wang, Taoyan Zhou, Kesheng Yang:
IoT based Construction Site Monitoring System for Highway Engineering. 127-131 - Yuma Narita, Shan Lu, Hiroshi Kamabe:
Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. 132-136 - Lae Yeop Lee, Seong Gon Choi:
Energy Loss Minimization Modelling for Given Energy Path in Vehicular Energy Network. 137-140 - Sung-Chan Nam, Hong-Beom Choi, Young-Bae Ko:
On Mitigation of Ranging Errors for Through-the-Body NLOS Conditions using Convolutional Neural Networks. 141-144 - Hong Jun Choi, Hyuk Lee, Jin-Young Choi:
Is a False Positive really False Positive? 145-149 - Beom-Jun Cho, Ki Bong Kwon, Hyun Chul Kim, Sungboo Kang:
A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the Public. 150-154 - Seung-Hee Oh, Woo-Sug Jung, Yong-Tae Lee, Kyung-Seok Kim:
Disaster Warning and Alerting Integrated Systems Based on CAP profile. 155-159 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:
A Study on Estimation of Retransmission Rate of Background Traffic for Various Scan Rates with Scan Response Delay. 160-165 - Huijie Zhu, Wei Xu, Yalou Sang, Zhiqiang Yao, Limei Liu, Moses Chukwuka Okonkw:
Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation. 166-171 - Saad Allawi Nsaif, Sang Yoon Park, Jong Myung Rhee:
SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks. 172-175 - Masahiro Kawano, Yuhei Nagao, Leonardo Lanante, Masayuki Kurosaki, Hiroshi Ochi:
Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its Implementation. 176-181 - Hanji Shen, Jun Li, Wei Wan, Chun Long, Jingdeng Zhou, Yuhao Fu, Xiaofan Song:
Tamper Detection Based on Webpage Change Features. 182-186 - Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng:
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 187-193 - Zengguang Liu, XiaoChun Yin, Ruiping Yang, Anming Dong:
Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method. 194-199 - Jang-Hyeon Jeong, Jong-Beom Kim, Seong Gon Choi:
Zero-Day Attack Packet Highlighting System. 200-204 - Sunghyun Yoon, Mun-Hwan Choi, Juyoung Park:
Implementation of Smart Farm Devices using Open Source Software. 205-209 - Matasem Saleh, N. Z. Jhanjhi, Azween B. Abdullah, Raazia Saher:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. 210-219 - Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:
Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. 220-225 - Heechang Chung, Dongil Kim, Sokpal Cho:
A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysis. 226-229 - Warunyu Hematulin, Patcharin Kamsing, Peerapong Torteeka, Thanaporn Somjit, Thaweerath Phisannupawong, Tanatthep Jarawan:
Cooperative Motion Planning for Multiple UAVs via the Bézier Curve Guided Line of Sight Techniques. 230-236 - Md. Masud Rana, Narendra Dahotre:
Bayesian Network and Semidefinite Programming Based Wireless Power Transfer Manufacturing System State Estimation and Regulation. 237-241 - Tanatthep Jarawan, Patcharin Kamsing, Peerapong Tortceka, Shariff Manuthasna, Warunyu Hematulin, Tachodom Chooraks, Thaweerath Phisannupawong, Sitthirak Sanzkarak, Sookaseam Munakhud, Thananorn Somjit:
Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithm. 242-247 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:
An efficient & Cost-Effective EPON-Based Next Generation 5G Mobile Backhaul RAN Architecture. 248-253 - Gyeoul Lee, Jonghoon Lee, Youngsoo Kim, Jong-Geun Park:
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset. 254-258 - Yafei Hou, Shun Kawasaki, Satoshi Denno:
Busy/Idle Duration Prediction for Video and Audio WLAN Traffics Using Autoregressive Predictor with Data Categorization. 259-264 - Kazuto Yano, Eiji Nii, Kenta Suzuki, Koji Yamamoto:
Timestamp Synchronization of Received Frames among Multiple Wireless LAN Nodes for Robust Access Point Coordination. 265-270 - Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:
APT attack response system through AM-HIDS. 271-274 - Jutiphat Chatsomsanga, Chawalit Benjangkaprasert:
Malware Developing Guide: Encryption and Decryption. 275-278 - Babu Kaji Baniya:
Intrusion Representation and Classification using Learning Algorithm. 279-284 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:
Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). 285-291 - James Kin Wah Lan, Frankie Kin Wah Lee:
Drone Forensics: A Case Study on DJI Mavic Air 2. 291-296 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, So-Hyun Park, Il-Gu Lee:
Study on Systematic Ransomware Detection Techniques. 297-301 - YuXin Li, JinPeng Chen, Bing-Yuh Lu, Xin Li, CanJie Yao, LinShu Zheng, Xin Bai, WanQin Jiang:
Wireless Voice-controlled Movable Electrical Heating Radiator. 302-305 - Ali Hassan, Shahram Shah-Heydari:
TCP Congestion Avoidance in Data Centres using Reinforcement Learning. 306-311 - Shubham Jain, Amy de Buitléir, Enda Fallon:
An Extensible Parsing Pipeline for Unstructured Data Processing. 312-318 - Jun Guo, Heyan Gao, Zeyu Yan, Jiahui Cao, Zhenbo Fu:
Vehicle Detection Counting Algorithm Based on Background Subtraction Algorithm and SORT. 319-325 - Yoshiaki Taniguchi, Hiroto Masuda:
A Conversion System Based on Acoustic Communication for Using Bluetooth Low Energy Sensors Underwater. 326-329 - Hui Zhang, Lingli Zhang, Yonghang Yan, Linlin Ci:
A Review of Gateway Load Balancing Methods in Connecting MANET into Internet. 330-335 - Hui Zhang, Lingli Zhang, Yonghang Yan, Linlin Ci:
A Survey of Multipath Load Balancing Based on Network Stochastic Model in MANET. 336-341 - Baiyou Qiao, Zhongqiang Wu, Zhong Tang, Gang Wu:
Sea Surface Temperature Prediction Approach Based on 3D CNN and LSTM with Attention Mechanism. 342-347 - Jun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang:
Vision Detection System Based on Mixed Recognition of Gesture and Speech. 348-353 - Kokou Gaglo, Bessan Melckior Dégboé, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Proposal of conversational chatbots for educational remediation in the context of covid-19. 354-358 - Vu-Tuan Dang, Hong-Quan Do, Viet-Vu Vu, Byeongnam Yoon:
Facial Expression Recognition: A Survey and its Applications. 359-367 - Ali Hussain, Ikromjanov Kobiljon Komil Ugli, Beom Su Kim, Minji Kim, Harin Ryu, Satyabrata Aich, Hee-Cheol Kim:
Detection of Different stages of COPD Patients Using Machine Learning Techniques. 368-372 - Jong-Sung Kim:
DNN-based Human Activity Recognition by Learning Initial Motion Data for Virtual Multi-Sports. 373-375 - Ming-Shen Jian, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Mu-Xuan Yu:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 376-381 - Nadege Gladys Ndassimba, Edgard Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Digital elementary school solution with moodlebox in a conflict zone: the case of the Central African Republic. 382-386 - Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti:
Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. 387-391 - Oumayma Mejri, Dana Yang, Inshil Doh:
Cloud Security Issues and Log-based Proactive Strategy. 392-397 - A. T. C. Chen, M. Rakib Uddin:
SOI Rib Waveguide Physical Dimension Dependent Micro Ring Resonator Characterization. 398-401 - A. T. C. Chen, M. Rakib Uddin:
Transverse Electric (TE) and Transverse Magnetic (TM) Modes Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide. 402-406 - Nurazmina Lingas, M. Rakib Uddin:
Sleep Mode on Delay Sensitive Traffic on Optical Network Unit. 407-410 - Rachata Maneekut, Daniel J. Elson, Yuta Wakayama, Shohei Beppu, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani:
Demonstration of Hybrid Probabilistic Geometric Shaping 64QAM Optical Fiber Transmission Using Optimized Constellation for MAP Detection with Hard Decision Decoding. 411-414 - Kwihoon Kim, Se Won Oh:
Edge Computing System applying Integrated Object Recognition based on Deep Learning. 415-419 - Ikromjanov Kobiljon Komil Ugli, Ali Hussain, Beom Su Kim, Satyabrata Aich, Hee-Cheol Kim:
A Transfer Learning Approach for Identification of Distracted Driving. 420-423 - Chun-Hee Lee, Jeong-Woo Lee, Yung-Joon Jung, Il-Yeon Cho:
Relocation Framework to Improve the Usage Efficiency of Bicycle-sharing Systems. 424-428 - Yafei Hou, Kazuto Yano, Norisato Suga, Julian L. Webber, Eiji Nii, Toshihide Higashimori, Satoshi Denno, Yoshinori Suzuki:
A Study of Throughput Prediction using Convolutional Neural Network over Factory Environment. 429-434 - Limin Su, Chao-Jen Huang, Mei Liu, Bing-Yuh Lu, Jidong Che, Ximiao Wang, Jiqi Feng, Changyong Li, Youhong Feng, Yueliu Mo:
Robot for Ball Fetch-and-Carry with Computer Vision in Deep Learning. 435-438 - Farrukh Hamza, Qian Sun, Abdunnaser Erwemi, Jin Haeng Lee, Ashfak Ahmed Chowdhury, Quyen Vu Nguyen:
Oilonomics: Making sense of the impact of hydrocarbon production on socio-economics. 439-445 - WooHyun Park:
The Comparison For Epidemiological Investigation Of Corona Virus-19 Pandemic. 446-448 - Chi-Cheng Yang, En-Tien Ma, Da-Yu Kao:
Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement. 449-454 - Nguyen Minh Tri, Masahiro Shibata, Masato Tsuru, Akira Kawaguchi:
Locating High-loss Links for OpenFlow Networks by Multiple Hosts to Probe Packets. 455-460 - Nada Alzaben, Daniel W. Engels:
End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection Algorithm. 461-467 - Xuan Hu, Jie Liu:
Requirements Knowledge Model Construction and Requirements Elicitation Method of Avionics Systems Software based on Multi-ontology. 1265-1279 - Van-Dai Pham, Victor Kisel, Ruslan Kirichek, Andrey Koucheryavy, Alexander Shestakov:
Evaluation of A Mesh Network based on LoRa Technology. 1280-1285 - Xuan Hu, Jie Liu:
Orthogonal Defect Classification-based Ontology Construction and Application of Software-hardware Integrated Error Pattern of Software-intensive Systems. 1286-1298 - Rui Teng, Kazuto Yano, Yoshinori Suzuki:
Estimation of Network Type Based on The Response Delay Property. 1299-1304 - Truong Duy Dinh, Vladimir M. Vishnevsky, Van-Dai Pham, Duc Tran Le, Ruslan Kirichek, Andrey Koucheryavy:
Determination of Subscribers Coordinates using Flying Network for Emergencies. 1309-1318 - Deepanjali Mishra, Mangal Sain:
Role of Teachers in Developing Learning Pedagogy. 1315-1321 - Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:
A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. 1322-1329 - Deepanjali Mishra, Mangal Sain:
Web based Learning: A Methodology to Teach Literature in a Classroom. 1329-1335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.