


default search action
ICACT 2019: Pyeongchang, Korea
- 21st International Conference on Advanced Communication Technology, ICACT 2019, Pyeongchang, South Korea, February 17-20, 2019. IEEE 2019, ISBN 979-11-88428-02-1

- Anh H. Dang, Wataru Kameyama:

SvgAI - Training Methods Analysis of Artificial Intelligent Agent to use SVG Editor. 1-8 - Batzorig Bazargur, Otgonbayar Bataa, Uuganbayar Budjav

, Gantuya Gantumur:
Analysis of Radio Communication Networks in Underground Mining for Emergencies. 1-5 - Mohammad A. Almogbel, Anh H. Dang, Wataru Kameyama:

Cognitive Workload Detection from Raw EEG-Signals of Vehicle Driver using Deep Learning. 1-6 - Haowei Yang, Jianlu Wang, Xiang Gao, Huibo Li, Duk Kyung Kim, Peng Gong:

A PDSI-based Online Fault Configuration Approach for Communication Network in Power Grid Simulation. 6-10 - Rui Xue, Yang Xiong, Qinglin Cheng:

A Novel Ranging Code based on improved Logistic Map Chaotic Sequences. 11-15 - Shuai Deng, Shuhui Yang, Minqiao Liu, Ziyuan Zhang, Li Lei:

A Novel Ultra-Wideband Antenna Operating in the frequency band of 2.5-40GHz. 16-20 - Syed Asad Ali

, Gul Shahzad, Fahim Aziz Umrani:
End to End Latency incurred in Cooperative Communication System. 21-25 - Fatin Hamadah Rahman, Awangku Muhammad Iqbal Yura, S. H. Shah Newaz

, Au Thien Wan, Md. Shamim Ahsan
:
Street Parked Vehicles Based Vehicular Fog Computing: TCP Throughput Evaluation and Future Research Direction. 26-31 - Hongyuan Wang:

An External Data Integrity Tracking and Verification System for Universal Stream Computing System Framework. 32-37 - Fawaz AL-Hazemi

, Alaelddin Fuad Yousif Mohammed
, Lemi Isaac Yoseke Laku, Rayan Alanazi:
PUE or GPUE: A Carbon-Aware Metric for Data Centers. 38-41 - Yan Gao, Bin Zhang, Si Wang, Anxiang Ma:

DBN Based Cloud Service Response Time Prediction Method. 42-46 - Yan Gao, Bin Zhang, Mengzhu Lu, Anxiang Ma:

Game Based SBCA Cloud Resource Adjustment Method. 47-51 - Xiaoyong Zhang, Ruizhen Wu, Mingming Wang, Lin Wang:

A High-Performance Parallel Computation Hardware Architecture in ASIC of SHA-256 Hash. 52-55 - Sabyasachi Chakraborty, Satyabrata Aich, Jong-Seong Sim, Hee-Cheol Kim:

A Blockchain based Credit Analysis Framework for Efficient Financial Systems. 56-60 - Da-Yu Kao, Ni-Chen Wu, Fuching Tsai:

The Governance of Digital Forensic Investigation in Law Enforcement Agencies. 61-65 - Seongho Hong, Heeyoul Kim:

Analysis of Bitcoin Exchange Using Relationship of Transactions and Addresses. 67-70 - Peipei Wang, Kun Meng, Shuqin Li:

An Efficiency Evaluation Model for Designing Optimal Scheduling Mechanisms in N+X Hybrid Blockchain. 71-76 - Namjun Cha

, Hosoo Cho, Sangman Lee, Junseok Hwang:
Effect of AI Recommendation System on the Consumer Preference Structure in e-Commerce: Based on Two types of Preference. 77-80 - Li Yan, Namjun Cha

, Hosoo Cho, Junseok Hwang:
Video Diffusion in User-generated Content Website: An empirical analysis of Bilibili. 81-84 - Yuta Nemoto

, Vitaly Klyuev:
Technologies for Super Micro Websites: Itty.bitty vs. Docs365 Itty Bitty. 85-90 - Yu Long, Ryo Yamamoto

, Taku Yamazaki, Yoshiaki Tanaka:
A Deep Learning Based Social-aware D2D Peer Discovery Mechanism. 91-97 - Saha Tanangsanakool, Pongsathorn Reangsuntea, Kazuo Mori, Pisit Boonsrimuang

:
Channel Estimation and Equalization Methods for ZP-OFDM under Highly Mobile Environments. 102-106 - Tran Cong Hung, Dang Thi Ngoc, Phan Thi The, Le Ngoc Hieu

, Luan N. T. Huynh, Le Dien Tam:
A Moving Direction Proposal to Save Energy Consumption for Mobile Sink in Wireless Sensor Network. 107-110 - Olanrewaju Bola Wojuola:

Cross-correlation index and multiple-access performance of even-degree Gold codes. 111-114 - Pitchaya Boontra, Tanairat Mata

, Arif Dataesatu, Kazuo Mori, Pisit Boonsrimuang
:
A PAPR Reduction for FBMC-OQAM Signals using ABC-OPTS Scheme. 115-119 - Seunghyun Jang, Sunwoo Kong, Hui Dong Lee, Jeehoon Park, Kwang Seon Kim, Kwang Chun Lee:

1.8V-to-1.0V CMOS 65 nm MIPI RFFE Interface Circuit for Millimeter-wave Beamforming Array. 120-123 - Nawsheen Promy, Sadman Islam:

A Smart Android Based Parking System to Reduce the Traffic Congestion of Dhaka City. 124-128 - Arbab Waheed Ahmad

, Nasir Mehmood Bahadar:
Exploiting Heterogeneous Networks model for Cluster Formation and Power Allocation in Uplink NOMA. 129-133 - Suyeon Kim, Chang Su Lee, Hyun Kook Kahng:

New Function and Configuration of Future Network for Blockchain Platform Operation. 134-137 - Satyabrata Aich, Sabyasachi Chakraborty, Mangal Sain, Hyein Lee, Hee-Cheol Kim:

A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study. 138-141 - Minsung Son, Heeyoul Kim:

Blockchain-based secure firmware management system in IoT environment. 142-146 - Yu Nandar Aung, Thitinan Tantidham

:
Ethereum-based Emergency Service for Smart Home System: Smart Contract Implementation. 147-152 - Yustus Eko Oktian

, Elizabeth Nathania Witanto
, Sandra Kumi, Sang-Gon Lee:
BlockSubPay - A Blockchain Framework for Subscription-Based Payment in Cloud Service. 153-158 - Qian Liu, Xiao Lin, Shengnan Yue, Weiqiang Sun, Weisheng Hu:

Design of a routing scheme for bulk data transfers in multi-domain SnF OCS networks. 159-163 - Kwihoon Kim, Yong-Geun Hong:

Autonomous network traffic control system based on intelligent edge computing. 164-167 - Marija Tutunovic, Pongpisit Wuttidittachotti

:
Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja. 168-172 - Sang-Moon Shin, Hong-Beom Kim, Jae-Woo Kim:

Fabrication of 53 Gb/s Optical Transceiver over 40-km transmission with PAM4 modulation. 173-175 - Ming-Shen Jian

, Yu-En Cheng, Chen-Han Shen:
Internet Of Things (IOT) Cybersecurity based on the Hybrid Cryptosystem. 176-181 - Kaihua Jiang, Hong Ni, Peng Sun, Rui Han:

An Improved Binary Grey Wolf Optimizer for Dependent Task Scheduling in Edge Computing. 182-186 - Minjae Byun, Yongjun Lee, Jin-Young Choi

:
Risk and avoidance strategy for blocking mechanism of SDN-based security service. 187-190 - Ahmadhon Kamolov, Mohammed Abdulhakim Al-Absi, Hoon-Jae Lee, Suhyun Park:

Smart Flying Umbrella Drone on Internet of Things: AVUS. 191-195 - Jong-Beom Kim, Jae-Woo Ahn, Jong Oh Kim, Seong Gon Choi:

A Resource Saving MAC/IP Handling Method for Low-Power Wireless TCP Packet Network. 196-200 - Yao-Chung Chang, Yung-Chiao Chen, Tsung-Hau Chen, Jiann-Liang Chen, Shih-Ping Chiu, Wei-Hsiu Chang:

Software-Defined Dynamic Bandwidth Management. 201-205 - Zhenwei Zhang

, Hua Qu, Jihong Zhao, Zhirong Luan:
Fairness based Power Allocation Optimization in Dense Full Duplex D2D Networks. 206-211 - Hyun-Woo Rhee, Minchul Kim, Jong-Bum You

, Hyo-Hoon Park:
High-Speed Data Transmission with Beam-Steering using Silicon Optical Phased Array. 212-216 - Narantuya Erkhembaatar

, Otgonbayar Bataa:
Determining ICT indicators using entropy theory. 217-221 - Tran Thi Thao Nguyen

, Makoto Tsurita, Kyoshiro Sakamoto, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi:
High Precision Industrial Wireless LAN System with Asynchronous Communication. 222-227 - Ziyuan Zhang, Shuhui Yang, Minqiao Liu, Shuai Deng, Lei Li:

Design of an UWB Microstrip Antenna With DGS Based on Genetic Algorithm. 228-232 - Arif Dataesatu, Pornpawit Boonsrimuang, Kazuo Mori, Pisit Boonsrimuang

:
Comparative analysis of radio propagation models for LTE network on the sky train. 233-238 - Kwi-Yil Gwak, Sangwoo Park, JooSeok Song:

Performance Evaluation: Two Flood-Cancellation Methods of the Blocking Expanding Ring Searches on the AODV/WiFi MANET Environment. 239-248 - Azamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Young-Sil Lee, Hoon-Jae Lee:

Security Challenge and Issue of Mobile Banking in Republic of Uzbekistan: A State of Art Survey. 249-255 - Gweon-Do Jo, Young Ha Lee:

Performance Evaluation of Physical Random Access Channel in 5G New Radio. 256-259 - Sabyasachi Chakraborty, Satyabrata Aich, Hee-Cheol Kim:

A Secure Healthcare System Design Framework using Blockchain Technology. 260-264 - Sang-Oun Lee, Hyunseok Jung, Bosuk Han:

Security Assured Vehicle Data Collection Platform by Blockchain: Service Provider's Perspective. 265-268 - Seung Jae Pee, Eung Seon Kang, Jae Geun Song, Ju Wook Jang:

Online test and management system using blockchain network. 269-272 - Dinar Orazgaliyev, Yerbolat Lukpanov, Ikechi A. Ukaegbu, H. S. V. Sivanand Kumar Nunna

:
Towards the Application of Blockchain technology for Smart Grids in Kazakhstan. 273-278 - Sanjar Ibrokhimov

, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee, Mangal Sain:
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey. 279-284 - Seung Han Choi, Seok Bong Yoo, Deockgu Jee, Mikyong Han:

The Service Scenario of Road Environment Improvement Based on Crowd Sourcing for Smart City. 292-294 - Seonyong Jeong, Yongjae Lee, Seungwon Shin:

Network Virtualization System for Smart Grid Data Acquisition System. 295-298 - Yi-Wei Ma, Jin-Qiu Shi, Jiann-Liang Chen, Chia-Chi Hsu, Chen-Hao Chuang:

Integration Agricultural Knowledge and Internet of Things for Multi-Agent Deficit Irrigation Control. 299-304 - Chang-Su Lee, Sweung-Won Cheung, Seong-Soon Joo, Hyun-Kook Kahng:

Design and Implementation of Autonomous Collaboration System of Smart Things using accumulated Experience knowledge. 305-313 - Jae Kyu Lee, Jae-Woo Ahn, Jong Oh Kim, Seong Gon Choi:

The SPI Synchronization Method for Data Efficiency and Integrity between MCUs. 314-319 - Qi Meng, Peng Gong, Yu Liu, Huibo Li, Cheying Li, Dan Shan:

An Interactive Interface for Information Exchanging between QualNet and Virtual Machine for IP Based Network. 320-324 - Huibo Li, Peng Gong, Yu Liu, Guolin Li, Dan Shan:

PDSI-based Static Route Online Configuration Method for QualNet Simulator. 325-329 - Xiang Gao, Peng Gong, Yu Liu, Qi Meng, Cheying Li, Dan Shan:

An Interactive Interface of QualNet for DigSilent in Power Grid Simulation. 330-333 - JinHyuck Park, ChoonSung Nam, JangYeol Lee, Dong Ryeol Shin:

Analysis of Task Success Rate for Classifying 2D-Touch and 3D-Touch through Threshold. 334-338 - Yitao Yang, Runqiu Hu

, Guozi Sun, Chengyan Qiu:
Chinese Spam Data Filter Model in Mobile Internet. 339-343 - Kumar Sharshembiev, Seong-Moo Yoo, Yong-Kab Kim, Geun-Ho Jeong:

Optimal Threshold Analysis for Triggering Fail-Safe Mechanism in Vehicular Ad Hoc Networks. 344-350 - Alberto Gallegos Ramonet

, Taku Noguchi
:
IEEE 802.15.4 Historical Evolution and Trends. 351-359 - Grigoriy Fokin

:
Passive Geolocation with Unmanned Aerial Vehicles using TDOA-AOA Measurement Processing. 360-365 - Yao Zhang, Haotong Cao, Meng Zhou, Longxiang Yang:

Power Optimization for Energy Efficiency in Cell-Free Massive MIMO with ZF Receiver. 366-371 - Mai A. Abd El-Halim, Adel Mounir Sareh Said

, Hadia M. El-Hennawy
:
A New Statistical Received Signal Strength (RSS) Model Based Fingerprint Approach for WLAN Indoor Localization Application. 372-384 - WooHyun Park, DoJin Park, ByungJune Ahn, SeokHun Kang, HaengYeong Kim, RaeHyeon Kim, JaeHeum Na:

Interactive AI for Linguistic Education Built on VR Environment Using User Generated Contents. 385-389 - Ali Rehman Shinwari, Asadullah Jalali Balooch, Ala Abdulhakim Alariki

, Sami Abduljalil Abdulhak Naji:
A Comparative Study of Face Recognition Algorithms under Facial Expression and Illumination. 390-394 - Jihyun Seo, Jaewon Sa, Younchang Choi, Yongwha Chung, Daihee Park, Hakjae Kim:

A YOLO-based Separation of Touching-Pigs for Smart Pig Farm Applications. 395-401 - Azamat Marlen, Askar Maxim, Ikechi A. Ukaegbu, H. S. V. S. Kumar Nunna

:
Application of Big Data in Smart Grids: Energy Analytics. 402-407 - Okeke Stephen, Uchenna Joseph Maduh, Sanjar Ibrokhimov

, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain:
A Multiple-Loss Dual-Output Convolutional Neural Network for Fashion Class Classification. 408-412 - Da-Yu Kao:

Cybercrime Countermeasure of Insider Threat Investigation. 413-418 - Abidah Mat Taib, Nor Arzami Othman, Ros Syamsul Hamid, Iman Hazwam Abd Halim:

A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes. 419-424 - Jinhong Yang, Chul-Soo Kim, Md Mehedi Hassan Onik

:
Aggregated Risk Modelling of Personal Data Privacy in Internet of Things. 425-430 - Young-Jin Kang, Ki-Hwan Kim

, Hoon-Jae Lee:
Proposal of PingPong-128 Countermeasure against Power Analysis Attack. 431-434 - Nam-Uk Kim, Tai-Myoung Chung:

An efficient MSD protection and authentication scheme for automotive ICT based emergency call system. 435-439 - Wook Hyun, Mi-Young Huh, Juyoung Park:

Implementation of greenhouse service control protocol using Python on Raspberry PI. 440-442 - Jae-Woo Ahn, Jong-Oh Kim, Seong-Gon Choi:

Implementation of Packet Queue with Two Dimensional Array on Embedded System. 443-446 - Sun Hwang, Jin-Chun Woo, Thomas Byeongnam Yoon:

Development of a General Reporting Program for Measurement Uncertainty. 447-452 - Shinyuk Kang, Ilwoo Lee:

Implementation of PV Monitoring System Using Python. 453-455 - Sunwon Kang, Namgi Kim, Byoung-Dai Lee:

Fine Dust Forecast Based on Recurrent Neural Networks. 456-459 - Hanxing Xue, Jiali You, Jinlin Wang

:
Churn Resilience of Distributed Content Service System on Smart Terminals Network. 460-466 - Soonchul Jung

, Taewon Choi, Yoon-Seok Choi, In-Su Jang, Jae Woo Kim, Jin-Seo Kim:
Multisensory Capture System for the Preservation of Traditional Painting. 467-470 - Heechang Chung, Dongil Kim, Soonghee Lee, Sokpal Cho:

Smart Farming Education Service based on u-learning environment. 471-474 - Youngil Jeon, Hyeongsook Park, Eunyoung Choi:

Synchronization and Cell Search Procedure in 3GPP 5G NR Systems. 475-478 - Tae-Gyu Lee:

Sensitive Network Architecture Algorithm based on LED Optical Wireless Communication. 479-482 - M. Ranjeeth

, S. Anuradha:
Throughput Analysis in Cooperative Spectrum Sensing Network using an Improved Energy Detector. 483-487 - Han Qing, Siji Chen, Md Liton Ali, Bin Shen:

Signal Assemblage Based Wideband Spectrum Sensing for OFDM Cognitive Radios. 488-491 - Siji Chen, Bin Shen, Xin Wang, Hebiao Wu:

SVM and Decision Stumps Based Hybrid AdaBoost Classification Algorithm for Cognitive Radios. 492-497 - Olanrewaju Bola Wojuola:

Mathematical Model for Bit-error-rate of a Spread-Spectrum System. 498-502 - Yan-Ju Chen, Wen-Han Kuo, Sung-Yun Tsai, Jiann-Liang Chen, Yu-Hung Chen, Wei-Zhao Xu:

Artificial Intelligence Hybrid Learning Architecture for Malware Families Classification. 503-510 - Van-Sang Ha

, Dang-Nhac Lu
, Gyoo-Seok Choi, Ha-Nam Nguyen
, Byeongnam Yoon:
Improving Credit Risk Prediction in Online Peer-to-Peer (P2P) Lending Using Feature selection with Deep learning. 511-515 - Hao Yang, Gengui Xie, Ying Qin, Song Peng:

Domain Specific NMT based on Knowledge Graph Embedding and Attention. 516-521 - Nawab Muhammad Faseeh Qureshi

, Isma Farah Siddiqui
, Asad Abbas, Ali Kashif Bashir
, Kee-Hyun Choi, Jaehyoun Kim, Dong Ryeol Shin:
Dynamic Container-based Resource Management Framework of Spark Ecosystem. 522-526 - Aisultan Alimkhan, Adilkhan Makhambayev, Ikechi A. Ukaegbu:

The Fourth Industrial Revolution: Towards Energy 4.0 in Kazakhstan. 527-532 - Chi-Kuan Chiu, Te-En Wei, Hsiao-Hsien Chang, Ching-Hao Mao:

Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network. 533-538 - Sutthinee Pongsrisomchai, Sudsanguan Ngamsuriyaroj:

Automated IT Audit of Windows Server Access Control. 539-544 - Asanga Wanniarachchi, Chandana Gamage:

RECSRF: Novel Technique to Evaluate Program Security using Dynamic Disassembly of Machine Instructions. 545-551 - Da-Yu Kao, Yuanpei Chen, En-Cih Chang:

Event Observation of Date-time Stamps for ADS Reconstruction. 552-557 - Rui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:

A Conservation Genetic Algorithm for Optimization of the E-commerce Logistics Distribution Path. 558-562 - Charoenchai Wongwatkit

:
An Online Web-based Adaptive Tutoring System for University Exit Exam on IT Literacy. 563-568 - Masaaki Ida:

Consideration on the variation of financial data of institutions for canonical correlation analysis. 569-572 - Papiya Chatterjee, Deepanjali Mishra

, Lili Kumari Padhi, Jyotirmayee Ojha, Ahmed Abdulhakim Al-Absi, Mangal Sain:
Digital Story-Telling: A Methodology of Web Based Learning of Teaching of Folklore Studies. 573-578 - Hind R'bigui

, Chiwoon Cho
:
Complex Control-Flow Constructs Detection from Process Related Data. 579-582 - Meng-Lun Hsueh, Huey-Dong Wu

, Bing-Yuh Lu
:
The Evaluation System for the Computer Simulation of the Crackles in Respirations. 583-588 - Hyun Wong Choi, Nawab Muhammad Faseeh Qureshi

, Dong Ryeol Shin:
Comparative Analysis of Electricity Consumption at Home through a Silhouette-score prospective. 589-591 - Wooyoung Kim, Wonwoong Cho, Jangho Choi, Jiyong Kim, Cheonbok Park, Jaegul Choo

:
A Comparison of the Effects of Data Imputation Methods on Model Performance. 592-599 - Madina Kenzhina, Ileskhan Kalysh, Ikechi A. Ukaegbu, H. S. V. Sivanand Kumar Nunna

:
Virtual Power Plant in Industry 4.0: The Strategic Planning of Emerging Virtual Power Plant in Kazakhstan. 600-605 - Sabit Shaiholla

, Asset Bekov, Ikechi A. Ukaegbu:
Industry 4.0: Redefining Manufacturing in Kazakhstan. 606-609 - Da-Yu Kao:

ATM Heist Threats: A Proposed ICT Governance Strategy. 610-615 - Wangbong Lee, Taeheum Na, Jeongyun Kim:

How to Create a Network Slice? - A 5G Core Network Perspective. 616-619 - Weidong Feng, Yong Sun, Zheng Zhou, Peng Zhan, YaoYi Jiao:

Study on the Efficiency Evaluation System of Distribution Communication Collaboration Network. 620-623 - Li Jing, Jin Xia Shi, Shuai Li, Qiuyue Liao:

The Method of Health Management on Satellite Constellation Network. 624-630 - Jang-Ho Choi, Jiyong Kim, Jongho Won, Ok-Gee Min:

Modelling Chlorophyll-a Concentration using Deep Neural Networks considering Extreme Data Imbalance and Skewness. 631-634 - Md Mehedi Hassan Onik

, Chul-Soo Kim, Jinhong Yang:
Personal Data Privacy Challenges of the Fourth Industrial Revolution. 635-638 - Hyun Wong Choi, Nawab Muhammad Faseeh Qureshi

, Dong Ryeol Shin:
Analysis of Electricity Consumption at Home Using K-means Clustering Algorithm. 639-643 - Yun-Xia Liu, Yang Yang, Jigang Peng, Haowei Liu, Haipeng Ping, Heng Zhang:

TED: A Tetrominoes based edge descriptor. 644-647 - Yun-Xia Liu, Yang Yang, Aijun Shi, Jigang Peng, Haowei Liu:

Intelligent monitoring of indoor surveillance video based on deep learning. 648-653 - Navaporn Chockwanich, Vasaka Visoottiviseth:

Intrusion Detection by Deep Learning with TensorFlow. 654-659 - Hanji Shen, Chun Long, Wei Wan, Jun Li, Yakui Qin, Yuhao Fu, Xiaofan Song:

Log Layering Based on Natural Language Processing. 660-663 - Halit Alptekin

, Can Yildizli, Erkay Savas, Albert Levi
:
TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework. 664-671 - Sang-Oun Lee, H. J. Seo:

Conceptualizing the cyber incident & event statistics reporting standards. 672-675 - Kéba Gueye, Bessan Melckior Dégboé

, Samuel Ouya
, Ngartabe Kag-Teube:
Proposition of Health Care System Driven by IoT and KMS for Remote Monitoring of Patients in Rural Areas: Pediatric Case. 676-680 - Yoichi Saito, Vitaly Klyuev:

Classifying User Reviews at Sentence and Review Levels Utilizing Naïve Bayes. 681-685 - Byeongnam Yoon, Dinh-Lam Pham

, Pham Hai Son, Pham Thanh Dat
, Do Van Thien, Viet-Vu Vu
, Hong-Quan Do
, Nang-Toan Do:
A Study on EA based IT Governance. 686-691 - Dinh-Lam Pham

, Hyun Ahn, Kwanghoon Pio Kim
:
A Temporal Work Transference Event Log Trace Classification Algorithm and Its Experimental Analysis. 692-696 - Lili Kumari Padhi, Deepanjali Mishra

, Papiya Chatterjee, Jyotirmayee Ojha, Mangal Sain:
Strategies of Learning: A Methodology of Teaching Language Through Digitalisation. 697-702 - Sang-Chul Shin, Zafar Makhamadjanovich Rakhmatullayev:

Digital Transformation of the Public Service Delivery System in Uzbekistan. 703-709 - Seung-Jun Cha, Seung Hyup Jeon, Ramneek, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:

Space Sharing Effects on Manycore Systems. 710-713 - Kyong Hee Lee, Whui Kim, Hyun Kyun Choi, Byung-Tae Jang:

A Study on Feature Extraction Methods Used to Estimate a Driver's Level of Drowsiness. 710-713 - Sangha Choi, Wooshik Kim, Sugjoon Yoon:

Design of 3D Animation Builder with HLA Based Distributed Simulations. 718-721 - Jafrul Islam Sojol, Md. Hashmi Shihab, Tanvir Ahamed, Md. Abu Sayed Siam, Shahnewaz Siddique:

Nirob: A Next Generation Green Earth Technology Based Innovative System for Metropolitan Sound Pollution Management. 722-727 - Lemi Isaac Yoseke Laku, Alaelddin Fuad Yousif Mohammed

, Fawaz AL-Hazemi
, Chan-Hyun Youn:
Performance Evaluation of Apache Storm With Writing Scripts. 728-733 - Jafrul Islam Sojol, Md. Sakib Alam, Md. Nazmul Hossain

, Tamanna Motahar:
Smart School Bus: Ensuring Safety On The Road For School Going Children. 734-739 - Bhuridech Sudsee, Chanwit Kaewkasi:

An Improvement of a Checkpoint-based Distributed Testing Technique on a Big Data Environment. 1081-1090 - Taeho Jo

:
Improving K Nearest Neighbor into String Vector Version for Text Categorization. 1091-1097 - Da-Yu Kao, Shou-Ching Hsiao, Raylin Tso:

Analyzing WannaCry Ransomware Considering the Weapons and Exploits. 1098-1107 - Da-Yu Kao, En-Cih Chang, Fu-Ching Tsai:

Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations. 1108-1115 - Satyabrata Aich, Hee-Cheol Kim, Kim Younga, Kueh Lee Hui, Ahmed Abdulhakim Al-Absi, Mangal Sain:

A Supervised Machine Learning Approach using Different Feature Selection Techniques on Voice Datasets for Prediction of Parkinson's Disease. 1116-1121 - Satyabrata Aich, Ahmed Abdulhakim Al-Absi, Kueh Lee Hui, Mangal Sain:

Prediction of Quality for Different Type of Wine based on Different Feature Sets Using Supervised Machine Learning Techniques. 1122-1127 - Yoonlae Lee, Youn-Geol Lee, Hyunah Kim, Minjae Park:

A solar power generation facility state monitoring system using drone aerial photographing. 1128-1134 - Mangal Sain, Amlan Jyoti Chaudhray, Satyabrata Aich, Hoon-Jae Lee:

Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network. 1135-1142 - Dang-Hai Hoang, Ha Duong Nguyen:

Detecting Anomalous Network Traffic in IoT Networks. 1143-1152 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:

SEFL: Selective Ensemble Fuzzy Learner for Cognitive Detection of Bio-Modality Spoofing in MCPS. 1153-1158

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














