


default search action
ICACT 2021: Pyeongchang, Korea
- 23rd International Conference on Advanced Communication Technology, ICACT 2021, Pyeongchang, South Korea, February 7-10, 2021. IEEE 2021, ISBN 979-11-88428-06-9

- Mykola Servetnyk, Wei-Han Hsiao, Alisher Mukashev:

Performance Evaluation of Polarization Effects on 5G Clustered Delay Line Channels. 1-6 - Edgard Ndassimba

, Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Feasibility of interconnecting the University of Bangui and peripheral areas via the TVWS for e-learning in the context of COVID-19. 7-13 - Ibrahima Gueye, Idy Diop, Ibra Dioum

, Khadidiatou Wane Keita, Papis Ndiaye, Moussa Diallo, Sidi Mohamed Farssi:
Performance Analysis of Mixed MIMO RF/FSO DF Relaying Based on Globally Coupled Low Density Parity Check (GC-LDPC) Codes. 14-22 - Mohammadreza Robaei, Robert Akl, Robin Chataut

, Utpal Kumar Dey:
Adaptive Millimeter-Wave Channel Estimation and Tracking. 23-28 - Shixin Liao, Yueying Zhan, Ziyuan Shi, Lei Yang:

A High Throughput and Flexible Rate 5G NR LDPC Encoder on a Single GPU. 29-34 - Shan-Wen Chen, Kuan-Po Liu, Fu-Ching Tsai:

The Visualized Analysis of Bitcoin Change Wallets in the Coin Flow Network. 35-41 - Fatou Ndiaye Mbodji, Gervais Mendy, Ahmath Bamba Mbacke

, Samuel Ouya:
Incentive and Playful Strategy for a Participative Model of Learning and Experimenting Blockchain. 42-47 - Woong-Sub Park, Hyuk Lee, Jin-Young Choi

:
Formal Modeling of Smart Contract-based Trading System. 48-52 - Jinsuk Baek, Munene W. Kanampiu:

A Strategic Sensor Placement for a Smart Farm Water Sprinkler System: A Computational Model. 53-57 - Jun Guo, Xinwei Liu, Chen Liu, Zixuan Zhao, Bin Zhang:

An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time Constraints. 58-62 - Charnon Poolsin, Nattakit Sa-Ngiam, Nikorn Sutthisangiam:

Development of Centimeter Level Positioning Mobile Based Application. 63-67 - Bumho Kim, Chang-Gyu Lim, Seong-Ho Lee, Yung-Joon Jung:

A Study on the Population Distribution Prediction in Large City using Agent-Based Simulation. 68-71 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:

Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee. 72-76 - Jun Guo, Yi Li, Chen Liu, Zixuan Zhao, Bin Zhang:

Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption Optimization. 77-80 - Seung-Jun Cha, Seung-Hyub Jeon, Yeon Jeong Jeong, Jin-Mee Kim, Sungin Jung:

OS noise Analysis on Azalea-unikernel. 81-84 - Jingwei Li

, Yibo Lyu, Xu Li, Tianxiang Wang, Xiaowen Dong:
Reservoir Computing Based Equalization for Radio over Fiber System. 85-90 - Mi Tian, Mihai Sima, Michael McGuire:

Massive MIMO in Fixed-Point Arithmetic. 91-95 - Yoshimi Fujii, Tetsuya Iye, Kensuke Tsuda, Akihiro Tanibayashi:

A 28 GHz Beamforming Technique for 5G Advanced Communication Systems. 96-99 - Tetsuya Iye, Kensuke Tsuda, Yoshimi Fujii:

An Experimental Study of 28 GHz Analog Beamforming with a Uniform Linear Array. 100-103 - Jong-Young Choi, Jiwoong Park, Sung-Hwa Lim, Young-Bae Ko:

A RSSI-Based Mesh Routing Protocol based IEEE 802.11p/WAVE for Smart Pole Networks. 104-108 - Satyabrata Aich, Nday Kabulo Sinai, Saurabh Kumar, Mohammed Ali

, Yu Ran Choi, Moon-Il Joo, Hee-Cheol Kim:
Protecting Personal Healthcare Record Using Blockchain & Federated Learning Technologies. 109-112 - Tae-Shin Kang

, Moon-Il Joo, Beom-Soo Kim, Tae-Gyu Lee:
Blockchain-based Lightweight Transaction Process Modeling and Development. 113-118 - Samin Sadri, Aamir Shahzad, Kaiwen Zhang:

Blockchain Traceability in Healthcare: Blood Donation Supply Chain. 119-126 - Xiaojun Hou, Heng Wu, Ting Peng, Xiaoling Wang, Taoyan Zhou, Kesheng Yang:

IoT based Construction Site Monitoring System for Highway Engineering. 127-131 - Yuma Narita, Shan Lu, Hiroshi Kamabe:

Accuracy Evaluation of Indoor Positioning by Received Signal Strength using Deep Learning. 132-136 - Lae Yeop Lee, Seong Gon Choi:

Energy Loss Minimization Modelling for Given Energy Path in Vehicular Energy Network. 137-140 - Sung-Chan Nam, Hong-Beom Choi, Young-Bae Ko:

On Mitigation of Ranging Errors for Through-the-Body NLOS Conditions using Convolutional Neural Networks. 141-144 - Hong Jun Choi, Hyuk Lee, Jin-Young Choi:

Is a False Positive really False Positive? 145-149 - Beom-Jun Cho, Ki Bong Kwon, Hyun Chul Kim, Sungboo Kang:

A Study on Multi-media Disaster Information Contents to provide Disaster Alert Service to the Public. 150-154 - Seung-Hee Oh, Woo-Sug Jung, Yong-Tae Lee, Kyung-Seok Kim:

Disaster Warning and Alerting Integrated Systems Based on CAP profile. 155-159 - Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki:

A Study on Estimation of Retransmission Rate of Background Traffic for Various Scan Rates with Scan Response Delay. 160-165 - Huijie Zhu

, Wei Xu, Yalou Sang, Zhiqiang Yao, Limei Liu, Moses Chukwuka Okonkw
:
Mobile Communication Signal Selection Algorithm for Signal of Opportunity Navigation. 166-171 - Saad Allawi Nsaif, Sang Yoon Park, Jong Myung Rhee:

SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks. 172-175 - Masahiro Kawano, Yuhei Nagao, Leonardo Lanante, Masayuki Kurosaki, Hiroshi Ochi:

Cooperative MIMO Applied Null Beamforming to Self in Full-Duplex Wireless Communication System and Its Implementation. 176-181 - Hanji Shen, Jun Li, Wei Wan, Chun Long, Jingdeng Zhou, Yuhao Fu, Xiaofan Song:

Tamper Detection Based on Webpage Change Features. 182-186 - Hannah A. S. Adjei, Tan Shunhua, George Kofi Agordzo

, Yangyang Li, Gregory Peprah, Emmanuel S. A. Gyarteng
:
SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 187-193 - Zengguang Liu, XiaoChun Yin, Ruiping Yang, Anming Dong:

Early Detection of LDDoS Attacks in IOT Utilizing Locality Sensitive Incremental TSVM Method. 194-199 - Jang-Hyeon Jeong, Jong-Beom Kim, Seong Gon Choi:

Zero-Day Attack Packet Highlighting System. 200-204 - Sunghyun Yoon, Mun-Hwan Choi, Juyoung Park:

Implementation of Smart Farm Devices using Open Source Software. 205-209 - Matasem Saleh

, N. Z. Jhanjhi
, Azween B. Abdullah, Raazia Saher
:
Proposing Encryption Selection Model for IoT Devices Based on IoT Device Design. 210-219 - Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:

Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. 220-225 - Heechang Chung, Dongil Kim, Sokpal Cho:

A Study on the Cultivation Plan Service at the Preliminary production phase based on bigdata analysis. 226-229 - Warunyu Hematulin, Patcharin Kamsing, Peerapong Torteeka, Thanaporn Somjit, Thaweerath Phisannupawong, Tanatthep Jarawan:

Cooperative Motion Planning for Multiple UAVs via the Bézier Curve Guided Line of Sight Techniques. 230-236 - Md. Masud Rana, Narendra Dahotre:

Bayesian Network and Semidefinite Programming Based Wireless Power Transfer Manufacturing System State Estimation and Regulation. 237-241 - Tanatthep Jarawan, Patcharin Kamsing, Peerapong Tortceka, Shariff Manuthasna, Warunyu Hematulin, Tachodom Chooraks, Thaweerath Phisannupawong, Sitthirak Sanzkarak, Sookaseam Munakhud, Thananorn Somjit:

Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithm. 242-247 - Syed Rashid Zaidi, Ajaz Sana, Shahab Hussain:

An efficient & Cost-Effective EPON-Based Next Generation 5G Mobile Backhaul RAN Architecture. 248-253 - Gyeoul Lee, Jonghoon Lee, Youngsoo Kim

, Jong-Geun Park:
Network Flow Data Re-collecting Approach Using 5G Testbed for Labeled Dataset. 254-258 - Yafei Hou, Shun Kawasaki, Satoshi Denno:

Busy/Idle Duration Prediction for Video and Audio WLAN Traffics Using Autoregressive Predictor with Data Categorization. 259-264 - Kazuto Yano, Eiji Nii, Kenta Suzuki, Koji Yamamoto

:
Timestamp Synchronization of Received Frames among Multiple Wireless LAN Nodes for Robust Access Point Coordination. 265-270 - Seoung-Pyo Hong, Chae-Ho Lim, Hoon-Jae Lee:

APT attack response system through AM-HIDS. 271-274 - Jutiphat Chatsomsanga, Chawalit Benjangkaprasert:

Malware Developing Guide: Encryption and Decryption. 275-278 - Babu Kaji Baniya:

Intrusion Representation and Classification using Learning Algorithm. 279-284 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Shazwani Salleh, Nur Farahin Jamaludin, Nurul Syazwani Kamarulzaman, Madihah Zulfa Mohamad:

Lightweight Denial of Service (DOS) Detection System Algorithm (LIDSA). 285-291 - James Kin Wah Lan, Frankie Kin Wah Lee:

Drone Forensics: A Case Study on DJI Mavic Air 2. 291-296 - Sun-Jin Lee, Hye-Yeon Shim, Yu-Rim Lee, Tae-Rim Park, So-Hyun Park, Il-Gu Lee:

Study on Systematic Ransomware Detection Techniques. 297-301 - YuXin Li, JinPeng Chen, Bing-Yuh Lu

, Xin Li, CanJie Yao, LinShu Zheng, Xin Bai, WanQin Jiang:
Wireless Voice-controlled Movable Electrical Heating Radiator. 302-305 - Ali Hassan, Shahram Shah-Heydari:

TCP Congestion Avoidance in Data Centres using Reinforcement Learning. 306-311 - Shubham Jain

, Amy de Buitléir, Enda Fallon
:
An Extensible Parsing Pipeline for Unstructured Data Processing. 312-318 - Jun Guo, Heyan Gao, Zeyu Yan, Jiahui Cao, Zhenbo Fu:

Vehicle Detection Counting Algorithm Based on Background Subtraction Algorithm and SORT. 319-325 - Yoshiaki Taniguchi

, Hiroto Masuda:
A Conversion System Based on Acoustic Communication for Using Bluetooth Low Energy Sensors Underwater. 326-329 - Hui Zhang, Lingli Zhang, Yonghang Yan

, Linlin Ci:
A Review of Gateway Load Balancing Methods in Connecting MANET into Internet. 330-335 - Hui Zhang, Lingli Zhang, Yonghang Yan

, Linlin Ci:
A Survey of Multipath Load Balancing Based on Network Stochastic Model in MANET. 336-341 - Baiyou Qiao, Zhongqiang Wu, Zhong Tang, Gang Wu

:
Sea Surface Temperature Prediction Approach Based on 3D CNN and LSTM with Attention Mechanism. 342-347 - Jun Guo, Jingjing Hu, Yuhua Lai, Kaikai An, Zhengxiao Zhang:

Vision Detection System Based on Mixed Recognition of Gesture and Speech. 348-353 - Kokou Gaglo, Bessan Melckior Dégboé

, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Proposal of conversational chatbots for educational remediation in the context of covid-19. 354-358 - Vu-Tuan Dang, Hong-Quan Do

, Viet-Vu Vu
, Byeongnam Yoon:
Facial Expression Recognition: A Survey and its Applications. 359-367 - Ali Hussain

, Ikromjanov Kobiljon Komil Ugli, Beom Su Kim, Minji Kim, Harin Ryu, Satyabrata Aich, Hee-Cheol Kim:
Detection of Different stages of COPD Patients Using Machine Learning Techniques. 368-372 - Jong-Sung Kim:

DNN-based Human Activity Recognition by Learning Initial Motion Data for Virtual Multi-Sports. 373-375 - Ming-Shen Jian

, Rong-Bin Deng, Chen-Wei Fang, Hua-Yu Wu, Mu-Xuan Yu:
Automatic Vocabulary Grouping and Deep Combination for News Credibility and Reliability Evaluation Corresponding to Specific Language. 376-381 - Nadege Gladys Ndassimba, Edgard Ndassimba

, Ghislain Mervyl S. J. Kossingou, Samuel Ouya:
Digital elementary school solution with moodlebox in a conflict zone: the case of the Central African Republic. 382-386 - Rattanachai Wongwatkit, Montree Raktham, Thanadet Phawananthaphuti:

Intelligent Blacklist Security System for Protecting Spammer in Corporate Email Solution: A Case of Corporate Email Service Provider in Thailand. 387-391 - Oumayma Mejri, Dana Yang, Inshil Doh:

Cloud Security Issues and Log-based Proactive Strategy. 392-397 - A. T. C. Chen, M. Rakib Uddin:

SOI Rib Waveguide Physical Dimension Dependent Micro Ring Resonator Characterization. 398-401 - A. T. C. Chen, M. Rakib Uddin:

Transverse Electric (TE) and Transverse Magnetic (TM) Modes Dependent Effective Index Analysis for a Nano-scale Silicon Waveguide. 402-406 - Nurazmina Lingas, M. Rakib Uddin:

Sleep Mode on Delay Sensitive Traffic on Optical Network Unit. 407-410 - Rachata Maneekut, Daniel J. Elson

, Yuta Wakayama, Shohei Beppu, Hidenori Takahashi, Noboru Yoshikane, Takehiro Tsuritani:
Demonstration of Hybrid Probabilistic Geometric Shaping 64QAM Optical Fiber Transmission Using Optimized Constellation for MAP Detection with Hard Decision Decoding. 411-414 - Kwihoon Kim, Se Won Oh

:
Edge Computing System applying Integrated Object Recognition based on Deep Learning. 415-419 - Ikromjanov Kobiljon Komil Ugli, Ali Hussain

, Beom Su Kim, Satyabrata Aich, Hee-Cheol Kim:
A Transfer Learning Approach for Identification of Distracted Driving. 420-423 - Chun-Hee Lee, Jeong-Woo Lee, Yung-Joon Jung, Il-Yeon Cho:

Relocation Framework to Improve the Usage Efficiency of Bicycle-sharing Systems. 424-428 - Yafei Hou, Kazuto Yano, Norisato Suga, Julian L. Webber, Eiji Nii, Toshihide Higashimori, Satoshi Denno, Yoshinori Suzuki:

A Study of Throughput Prediction using Convolutional Neural Network over Factory Environment. 429-434 - Limin Su, Chao-Jen Huang, Mei Liu, Bing-Yuh Lu

, Jidong Che, Ximiao Wang, Jiqi Feng, Changyong Li, Youhong Feng, Yueliu Mo:
Robot for Ball Fetch-and-Carry with Computer Vision in Deep Learning. 435-438 - Farrukh Hamza, Qian Sun, Abdunnaser Erwemi, Jin Haeng Lee, Ashfak Ahmed Chowdhury, Quyen Vu Nguyen:

Oilonomics: Making sense of the impact of hydrocarbon production on socio-economics. 439-445 - WooHyun Park:

The Comparison For Epidemiological Investigation Of Corona Virus-19 Pandemic. 446-448 - Chi-Cheng Yang, En-Tien Ma, Da-Yu Kao:

Sexual Offenses against Children: Social Learning Theory and Dark Web Reinforcement. 449-454 - Nguyen Minh Tri

, Masahiro Shibata, Masato Tsuru, Akira Kawaguchi:
Locating High-loss Links for OpenFlow Networks by Multiple Hosts to Probe Packets. 455-460 - Nada Alzaben, Daniel W. Engels:

End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection Algorithm. 461-467 - Xuan Hu, Jie Liu:

Requirements Knowledge Model Construction and Requirements Elicitation Method of Avionics Systems Software based on Multi-ontology. 1265-1279 - Van-Dai Pham, Victor Kisel, Ruslan Kirichek, Andrey Koucheryavy, Alexander Shestakov:

Evaluation of A Mesh Network based on LoRa Technology. 1280-1285 - Xuan Hu, Jie Liu:

Orthogonal Defect Classification-based Ontology Construction and Application of Software-hardware Integrated Error Pattern of Software-intensive Systems. 1286-1298 - Rui Teng, Kazuto Yano, Yoshinori Suzuki:

Estimation of Network Type Based on The Response Delay Property. 1299-1304 - Truong Duy Dinh, Vladimir M. Vishnevsky

, Van-Dai Pham, Duc Tran Le
, Ruslan Kirichek, Andrey Koucheryavy:
Determination of Subscribers Coordinates using Flying Network for Emergencies. 1309-1318 - Deepanjali Mishra

, Mangal Sain:
Role of Teachers in Developing Learning Pedagogy. 1315-1321 - Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:

A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. 1322-1329 - Deepanjali Mishra

, Mangal Sain:
Web based Learning: A Methodology to Teach Literature in a Classroom. 1329-1335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














