


default search action
ICACT 2024: Pyeong Chang, Republic of Korea
- 26th International Conference on Advanced Communications Technology, ICACT 2024, Pyeong Chang, Republic of Korea, February 4-7, 2024. IEEE 2024, ISBN 979-11-88428-12-0

- Hao Xu, Zhiquan Bai, Jinqiu Zhao, Dejie Ma, Bangwei He, Kyung Sup Kwak:

Optimization of Downlink Power Allocation in NOMA-OTFS Based Cross-Domain Vehicular Networks. 1-6 - Yuan Sun, Zhiquan Bai, Jinqiu Zhao, Dejie Ma, Zhaoxia Xian, Kyung Sup Kwak:

Deep Reinforcement Learning Based Beamforming in RIS-Assisted MIMO System Under Hardware Loss. 1-6 - Wenyi Li, Peng Gong, Weidong Wang, Yu Liu, Jianfeng Li, Xiang Gao:

Design of Communication Countermeasure Simulation Model and Data Interaction Interface for Battlefield Network Based on QualNet. 1-8 - Di Zhou, Zhiquan Bai, Jinqiu Zhao, Zeyu Liu, Dejie Ma, Kyung Sup Kwak:

QPSO-Based Beamforming in Dual RIS-Assisted Uplink Anti-Jamming Communication System. 1-6 - Refik Çaglar Kizilirmak, Israel Ehile Ehile, Bekzat Kabdrashev, Sergey Khvan:

Enhancing Inter-Satellite Data Relay in Dynamic Space Communication. 1-5 - Hoon-Min Park, Hyun-Min Jung, Dae-Hee Lee, Tae-Yeung Lim, Myung-Ki Jang, Chi-Young Jang, Guk-Gyo Youm, Keun-Yong Youn, Dal-Hwan Yoon, Min-Ki Jung, Min-Su Jeon, Hwi-Chan Oh, Chan-Hyouk Jeon, Jong-Geun Kim, Hyun-Ah Son:

Implementation of IoT-Based Control System for Maintenance Operation of Long-Distance Air Pollution Prevention Device RTO. 1-5 - Artem Volkov

, Varvara Mineeva
, Ammar Muthanna, Andrey Koucheryavy:
Traffic Type Recognition in 6G Software-Defined Networking for Telepresence Services. 1-6 - Ruofei Ding, Pucheng Huang, Shumin Chen, Jiale Zhang, Jingxiu Huang, Yunxiang Zheng:

An Enhanced Topic Modeling Method in Educational Domain by Integrating LDA with Semantic. 1-6 - Christian Y. Sy

, Lany L. Maceda, Thelma D. Palaoag, Mideth B. Abisado:
Transforming Education Policy: Evaluating UAQTE Program Implementation Through LDA, BoW and TF-IDF Techniques. 1-7 - Sheng Jiang, Francis C. M. Lau:

Decoding Convolutional Hadamard Codes and Turbo Hadamard Codes using Recurrent Neural Networks. 1-5 - Hieu Nguyen, Ilkyeun Ra:

Location Based Data-Centric Forwarding for Mobile Ad-Hoc Networks. 1-4 - V. Harish, R. Swathi, N. Satyanarayana:

A Reference Implementation of Blockchain Interoperability Architecture Framework. 1-6 - Ming-An Chung, Shang-Jui Huang, Yu-Hsun Chen:

Broadband On-Chip Antenna Array Design in CMOS Technology for D-Band Application. 1-4 - Xiang Dong, Maokai Lai, Hui Liang, Peng Wu, Chaoxia Wang, Ting Peng:

Computer Vision-Based Structural Deformation Monitoring System on Android Smartphones: Design and Implementation. 1-6 - Maisam Ali, Muhammad Yaseen

, Sikandar Ali
, Hee-Cheol Kim:
Machine Learning Based Techniques for the Prediction of Axillary Lymph Node Metastases in Early Breast Cancer. 1-5 - Ming-An Chung, Kai-Xiang Chen, Kuo-Chun Tseng:

Design of Ka-Band Chip Antenna Based on Slot Antenna. 1-4 - Thi My Truong, Won Seok Choi, Jang-Hyeon Jeong, Seong Gon Choi:

The Development of a New System for Generating Training Data of AI-Based Anomaly Detection. 1-4 - Juno Choi, Muralidharan Rajendran

, Yong Cheol Suh:
Explainable Rip Current Detection and Visualization with XAI EigenCAM. 1-6 - Pin-Shan Lin, Yi-Cheng Lai, Man-Ling Liao, Shih-Ping Chiu, Jiann-Liang Chen:

Hybrid Clustering Mechanisms for High-Efficiency Intrusion Prevention. 1-6 - Yao-Chung Chang, Yu-Shan Lin, Jeu-Jiun Hu:

Physics-Informed Neural Networks for Solving Blood Flows. 1-4 - Shah Muhammad Imtiyaj Uddin, Md Ariful Isalm Mojumder, Rashedul Islam Sumon, Joo Mon-il, Hee-Cheol Kim:

Leveraging Deep Learning for Automated Analysis of Colorectal Cancer Histology Images to Elevate Diagnosis Precision. 1-6 - Hye-Jin Kim, Hyonyoung Han, Ji Yeon Son:

Anomaly Detection During Additive Processes for DLP 3D Printing. 1-3 - Hyeoksoo Lee, Youngki Jo, Jongpil Jeong:

Multivariate PCA-Based Composite Criteria Evaluation Method for Anomaly Detection in Manufacturing Data. 1-9 - Jeeho Kim, Jin-Chun Woo, Young Sunwoo:

A Study on Real-Time Evaluation of Uncertainty of PM-10 Concentration Determined by Tele-Measuring Instrument. 1-7 - Tieyan Chao, Hui Liang, Yuwei Ge, Kai Hou, Xiang Dong, Ting Peng:

An IoT-Based Early Warning System for Settlement Monitoring Using Differential Pressure Static Level. 1-5 - Ruilong Huang, Huifang Deng, Ruei-Yuan Wang, Bing-Yuh Lu

, Hongwei Ren, Yiheng Chen, Jianwen Ye, Jinhui Chen, Yingbo Jia, Leyang Lang:
Evaluation System for Dancing Enlightenment Posture Training Using the Skeleton Tracking of Microsoft Common Objects in Context. 1-5 - Jennifer L. Llovido, Michael Angelo D. Brogada, Floradel S. Relucio

, Lea D. Austero
, Lany L. Maceda, Mideth B. Abisado:
BOSESKO: Designing A Synoptic Multi-Platform Digital System for Citizen Participation. 1-8 - Muhammad Yaseen

, Maisam Ali, Sikander Ali, Ali Hussain, Ali Athar
, Hee-Cheol Kim:
Deep Learning Based Cervical Spine Bones Detection: A Case Study Using YOLO. 1-5 - Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja

, Jiann-Liang Chen, Jian-Chang Hsu:
Router Penetration Testing Based on CEM Vulnerability Assessment Criteria. 1-6 - Vatcharavaree Wongsuna, Sudsanguan Ngamsuriyaroj:

Security Analysis of Android Applications for Hotel and Flight Booking Applications. 1-6 - Ming-An Chung, Ming-Chun Hsieh, Kuo-Chun Tseng:

Chip Antenna with Vivaldi-Like Structure for W-Band Design. 5-8 - Juinn-Horng Deng, Xiang-He Huang, Chung-Lien Ho, Yu-Chien Wu:

Design of Calibration Algorithms for Fully-Activated Millimeter-Wave Phased Array Antennas. 13-18 - Tin-Yu Wu, Yi-Kai Chen, Fu Jie Tey:

The Seamless Connection Between Underwater and Terrestrial Communication for 6G. 19-22 - Hyekyoung Hwang, Jitae Shin:

Test Case Prioritization with Z-Score Based Neuron Coverage. 23-28 - Woo-Hyeon Kim, Joo-Chang Kim:

Search and Recommendation Systems with Metadata Extensions. 38-42 - Liujing Song, Zefang Zhao, Yuxiang Ma, Yuyang Liu, Jun Li:

Utterance-Level Incongruity Learning Network for Multimodal Sarcasm Detection. 43-49 - Nattagit Jiteurtragool:

Generalized Parabola Chaotic map for Pseudorandom Random Number Generator. 53-56 - Narantuya Erkhembaatar

, Otgonbayar Bataa:
A Study on the Evaluation of the ICT Development Indexes and Some Results. 84-88 - Ramesh Amugothu

, Damera Vakula:
A Compact Dual-Band Metamaterial Absorber Using Square Split Rings for C-Band and X-Band Sensors Applications. 100-103 - Hyeonguk Jang, Jae-Jin Lee, Kyuseung Han:

Optimizing Implementation of SNN for Embedded System. 104-106 - Bor-Yao Tseng, Hung-Tse Chiang, Jiann-Liang Chen, Han-Chuan Hsieh:

Pitching-Motion: Pose-Based Pitch Trajectory Overlay System. 116-121 - Suya Li, Ying Cao, Xin Xie:

A Review of Detection-Related Multiple Object Tracking in Recent Times. 122-130 - Babu Kaji Baniya

, Thomas Rush:
Intelligent Anomaly Detection System Based on Ensemble and Deep Learning. 137-142 - Yao-Chung Chang, Yu-Shan Lin, Arun Kumar Sangaiah, Hsin-Te Wu:

A Private Blockchain System based on Zero Trust Architecture. 143-146 - Ahyun Song, Euiseong Seo, Heeyoul Kim:

Novel Design of Blockchain based IIoT Framework for Smart Factory. 147-151 - Hui-Yu Huang, Ming-Hsun Tsai, Ming-Shen Jian

:
Multiple Merged Structures Based on Image Recognition for Converting Application of Natural Language Artificial Intelligence Service. 158-162 - Ming-Shen Jian

, Cheng-He Wang, Wei-Siou Wu, Tzu-Wei Huang:
Pipeline Based Genetic Algorithm for Patient Scheduling in Hospital Outpatient Department and Laboratory. 163-167 - Ekaterina Kuzmina, Meriem Tefikova, Artem Volkov

, Ammar Muthanna, Abdelhamied A. Ateya, Andrey Koucheryavy:
Microservice-Based Fog Testbed for 6G Applications. 174-182 - Ekaterina Kuzmina, Meriem Tefikova, Artem Volkov

, Ammar Muthanna, Andrey Koucheryavy:
Migration Routing Algorithm for Microservice Based Fog Computing System. 183-186 - Dejie Ma, Zhiquan Bai, Jinqiu Zhao, Hao Xu, Zeyu Liu, Di Zhou, Mingyan Jiang, Kyung Sup Kwak:

Dual-RIS Assisted 3D Positioning and Beamforming Design in ISAC System. 187-192 - John Raymund B. Baragas, Lea D. Austero

, Jennifer L. Llovido, Lany L. Maceda, Mideth B. Abisado:
Leveraging Machine Learning to Uncover Key Factors Influencing Satisfaction Among Free Tertiary Education Recipients in the Philippines. 206-210 - Sikandar Ali

, Samman Fatima, Ali Hussain, Maisam Ali, Muhammad Yaseen
, Tagne Poupi Theodore Armand, Hee-Cheol Kim:
Classifying Gastric Cancer Carcinoma Stages with Deep Semantic Features and GLCM Texture Features. 211-215 - Kouayep Sonia Carole, Tagne Poupi Theodore Armand, Hee-Cheol Kim:

Enhanced Experiences: Benefits of AI-Powered Recommendation Systems. 216-220 - Youngchul Kim, Soo-Cheol Oh, Sangmin Lee, Ki-Sung Jin, Gyuil Cha:

Evaluation of $\vert\mathrm{Y} >$ Magic State Distillation Circuit. 221-225 - Abdul Mateen, Khawaja Tahir Mahmood, Seung Yeob Nam:

DB Workload Management Through Characterization and Idleness Detection. 226-231 - Ngoc Tien Nguyen

, Thanh Son Pham, Van Duong Nguyen, Cong Dan Pham, Duc Hai Nguyen:
Micro-Services Internal Load Balancing for Ultra Reliable Low Latency 5G Online Charging System. 232-240 - Jennifer L. Llovido, Michael Angelo D. Brogada, Lany L. Maceda, Mideth B. Abisado:

AppTest: Assessing the Usability and Performance Efficiency of BOSESKO for Digital Participation. 241-247 - Xiaoling Niu, Lingling Yang, Kailing Liu, Zhaowei Liu:

Research on the Transformation Path of DevOps in the Digital Era. 248-251 - Narantuya Vandantseren, Chuluunbandi Naimannaran, Tuyatsetseg Badarch, Erdenebayar Lhamjav, Otgonbayar Bataa:

An Efficient Resource Allocation Algorithm for Traffic of Content Streaming in Non-Standalone OFDM Based 5G NR. 252-262 - Mounika Neelam, Anuradha Sundru:

Performance Evaluation of UAV-Based NOMA for 5G and Beyond. 281-285 - Kounen Fathima, Ali Athar

, Hee-Cheol Kim:
Multi-Class Document Classification using LayoutLMv1 and V2. 286-289 - Md Ariful Islam Mozumder, Rashedul Islam Sumon, Ziaullah Khan, Shah Muhammad Imtiyaj Uddin, Muhammad Omair Khan, Hee-Cheol Kim:

AI-Based Logistics System Overview and a Workflow for Digital Freight Forwarding in Logistics. 295-299 - Tagne Poupi Theodore Armand, Kouayep Sonia Carole, Subrata Bhattacharjee, Md Ariful Islam Mozumder, Austin Oguejiofor Amaechi, Hee-Cheol Kim:

The Benefits of Integrating AI, IoT, and Blockchain in Healthcare Supply Chain Management: A Multi-Dimensional Analysis with Case Study. 300-304 - Hao Yang, Min Zhang, Shimin Tao, Minghan Wang, Daimeng Wei, Yanfei Jiang:

Knowledge-Prompted Estimator: A Novel Approach to Explainable Machine Translation Assessment. 305-310 - Birahim Babou, Khalifa Sylla, Mouhamadou Yaya Sow, Samuel Ouya:

Integration of a Chatbot to Facilitate Access to Educational Content in Digital Universities. 311-314 - Tae-Gyu Lee:

A Test Method for the Convergence of the Metaverse and Blockchain. 321-326 - Guanhua Zhu, Xiaoling Xu, Qing Zhong, Bing-Yuh Lu

, Yushen Lu, Guangming Xu, Yumeng Zhou, Ziyi Jiang, Kai Sun, Minhao Wang:
Time-frequency Analysis for Validating Prognostics Algorithms of Rolling Element Bearings. 327-331 - Abubakar Abdulkarim, Israel Ehile Ehile, Refik Çaglar Kizilirmak:

Utilizing Machine Learning for Sensor Fault Detection in Wireless Sensor Networks. 343-349 - Won Seok Choi, Sang Ju Lee, Jong Oh Kim, Seong Gon Choi:

Multicore Packet Distribution Method Using Multicore Network Interface Card Based on Tile-gx72 Network Processor. 350-353 - A. S. Ismail

, Ammar Hawbani, Xingfu Wang, Samah Abdel Aziz, Liang Zhao, Nasir Saeed:
Flexible Localization Method with Motion Estimation for Underwater Wireless Sensor Networks. 354-359 - Tianzhu Hu, Xiaofeng Jiang, Tianze Zhu, Xin Sun, Haomin Chen, Jian Yang

:
A Reliable Routing Method for Remote Entanglement Distribution under Limited Resources. 360-364 - Shwetha H. M., Subramanian Anuradha:

Energy Efficiency Analysis of Novel Index Modulation-Based Non-Orthogonal Multiple Access (IMNOMA) System for 5G Networks. 365-368 - Yong Hee Park, Min Gu Kang, Jang-Hyeon Jeong, Seong Gon Choi:

The Data Alignment Method Between GPS and IMU Based on ICP for Indoor Positioning. 369-372 - Minhwa Hong, Heonjong Yoo, Seonggon Choi:

Incorporation of Waypoint Following Logic into ROS Publish and Subscribe Mechanism. 373-375 - Wei Cheng, Yuxing Pan, Zhi Ma, Yincai Cai, Yuan Li, Ting Peng:

Tunnel Construction Site Monitoring and Digital Twin System. 389-394 - Jiwen Zhang, Kai Yuan, Jianjun Mao, Yincai Cai, Dongfeng Lei, Jinyang Deng, Ting Peng:

Research on LSTM-based Model for Predicting Deformation of Tunnel Section During Construction Period. 395-401 - Tagne Poupi Theodore Armand, Subrata Bhattacharjee, Hyun-Joong Kim, Ali Hussain, Sikandar Ali

, Heung-Kook Choi, Hee-Cheol Kim:
Vision Transformer-based Model for Gastric Cancer Detection and Classification using Weakly Annotated Histopathological Images. 413-418 - Tagne Poupi Theodore Armand, Subrata Bhattacharjee, Hee-Cheol Kim:

Overview of the Potentials of Multiple Instance Learning in Cancer Diagnosis: Applications, Challenges, and Future Directions. 419-425 - Robin Chataut

, Robert Akl:
An Adaptive User Scheduling Algorithm for 6G Massive MIMO Systems. 1475-1482 - N. Satyanarayana:

A Blockchain-Based Security Assessment Framework. 1483-1493 - Phuc Hao Do

, Duc Tran Le
, Vladimir M. Vishnevsky, Aleksandr Berezkin, Ruslan Kirichek:
A Horizontal Federated Learning Approach to IoT Malware Traffic Detection: An Empirical Evaluation with N-BaIoT Dataset. 1494-1506 - Sang-Yun Lee, Daekyeom Lee

:
A Deep Learning Framework for Cultural Heritage Damage Detection for Preservation; Based on the Case of Heunginjimun and Yeongnamnu in South Korea. 1507-1513 - Akihiro Takai, Yusei Katsura

, Nariyoshi Yamai, Rei Nakagawa, Vasaka Visoottiviseth:
Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead. 1514-1520 - Yutaka Naito, Takumi Uemura, Takashige Hoshiai:

A Study on Connectivity Evaluation Among Peer Groups in Pure P2P Networks. 1514-1520 - Yuki Ishida

, Masaki Hanada, Atsushi Waseda, Moo Wan Kim:
Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses. 1521-1533

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














