default search action
ICACT 2023: Pyeongchang, Korea
- 25th International Conference on Advanced Communication Technology, ICACT 2023, Pyeongchang, Korea, Republic of, February 19-22, 2023. IEEE 2023, ISBN 979-11-88428-10-6
- Yafei Hou, Kazuto Yano, Narisato Suga, Satoshi Denno, Toshikazu Sakano:
MUSIC Spectrum Based Interference Detection and Localization for mmWave RIS-MIMO System. 1-6 - G. Dhivya, K. Hariharan, P. Poonguzhali, M. Vaibhav, S. Lokeshwar, Sayantani Bhattacharya:
ILLUMINATE - VIsibLe Light CommUnication enabled SMart Indoor lightiNg And control SysTEm. 1-7 - Takayuki Matsumuro, Kazuto Yano, Toshikazu Sakano:
Proactive Rank Adaptation Method Using Probabilistic Interference Arrival Information. 1-4 - Yuanyuan Ma, Zhiquan Bai, Bangwei He, Jinqiu Zhao, Abeer Mohamed, Ke Pang, Kyung Sup Kwak:
Enhanced Deep Residual Shrinkage Network Based Channel Estimation in RIS Communication System. 18-22 - Bing-Yuh Lu, Jixin Liu, Zhongyong Wang, Hongmei Li, Juhui He, Xing Wen, Peixin Chen, Jingquan Chen, Weijun Lai, Cancheng Huang:
Smart Mirror Activated by User's Face Recognition with Simulation of Artificial Intelligence Classifier. 23-27 - Phuc Hao Do, Duc Tran Le, Vladimir M. Vishnevsky, Aleksandr Berezkin, Ruslan Kirichek:
A Horizontal Federated-Learning Model for Detecting Abnormal Traffic Generated by Malware in IoT Networks. 28-36 - Shixin Cheng, Jinzhe Zhang, Liping Han:
A Terminal Trust Assessment Method Based on Consensus Trust Aggregation. 37-42 - Muhammad Aidiel Rachman Putra, Tohari Ahmad, Dandy Pramana Hostiadi:
Dimensional Feature Reduction for Detecting Botnet Activities. 43-48 - Juhui He, Xing Wen, Jiiapei Cai, Bing-Yuh Lu, Hongjie Zheng, Xiaokang Cheng, Yiheng Chen:
Fuzzy PID Controlled Temperature in Phototherapy Incubator for Infant Jaundice Treatment: A Simulation. 49-53 - Bangwei He, Zhiquan Bai, Yuanyuan Ma, Hao Xu, Abeer Mohamed, Yingchao Yang, Kyung Sup Kwak:
Denoising CNN Based Channel Estimation for Vehicular OTFS Communication System. 54-58 - Viet-Thang Vu, Thanh Quyen Bui Thi, Hong-Seng Gan, Viet-Vu Vu, Do Manh Quang, Vu Thanh Duc, Dinh-Lam Pham:
Activation functions for deep learning: an application for rare attack detection in wireless local area network (WLAN). 59-64 - Sabyasachi Chakraborty, Kyung Yul Ohm, Hyojin Jeon, Dong Hyun Kim, Hyoung Jae Jin:
Intent Classification of Users Conversation using BERT for Conversational Dialogue System. 65-69 - Jeng-Kuang Hwang, Chien-Min Chen:
Development of Cost-Effective Wi-Fi 6 SISO/MIMO Vector Signal Generator and Analyzer. 70-73 - Cheng-Feng Li, Jeng-Kuang Hwang, Chingwo Ma:
NB-IoT NTN Band-Edge Attenuation/EVM Tradeoff with Real-System Verification. 74-78 - Yuhui Li, Yu Wang, Yue Li, Bin Shen:
Multi-User Dynamic Spectrum Access Based on LRQ Deep Reinforcement Learning Network. 79-84 - Yuya Takahashi, Tetsushi Ikegami:
Large MIMO Channel Estimation Study Based on Independent Component Analysis. 85-88 - Dhivya G, Hariharan K., Sayantani Bhattacharya, P. Poonguzhali, M. Vaibhav, S. Lokeshwar:
NLoS-VICINITY: A Non-Line of Sight Approach for Visible LIght Communication based INdoor PosITioning SYstem. 89-95 - Lan-Huong Nguyen, Van-Linh Nguyen, Yu-Hao Liu:
Tracking Risks from Multi-path TDoA-based Localization in Wireless Communications. 96-101 - Yuxiao Xia, Tao Zhao, Yanli Lv, Yunzhao Li, Ruxia Yang:
Hierarchical DP-K Anonymous Data Publishing Model Based on Binary Tree. 102-110 - Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao, Jian-Fu Qiu:
Intrusion Detection System for AI Box Based on Machine Learning. 111-116 - Jiann-Liang Chen, Jian-Chang Hsu, Candra Ahmadi, Bagus Tri Atmaja, Chia-Chi Lin, Siao-He Wang, Shu-Yu Lin:
Development of Security Target for Router Based on ENISA Common Criteria Framework. 117-121 - Sio Kei Im, Ka-Hou Chan:
Distributed Spatial Transformer for Object Tracking in Multi-Camera. 122-125 - Viet-Vu Vu, Byeongnam Yoon, Dinh-Lam Pham, Hong-Quan Do, Hai-Minh Nguyen, Tran-Chung Dao, Thi-Hai-Yen Nguyen, Doan-Vinh Tran, Thi-Huong-Ly Nguyen, Viet-Thang Vu:
Density peak clustering evaluation. 126-129 - Yuyang Liu, Junruo Gao, Zefang Zhao, Haibo Wu, Zhaojuan Yue, Jun Li:
Evolving Interest for Information Diffusion Prediction on Social Network. 130-136 - Dinh-Lam Pham, Byeongnam Yoon, Viet-Vu Vu, Joo-Chang Kim, Sang-Eun Ahn, Jeong-Hyun Chang, Hyun Yoo, Kyonghee Sun, Kyong-Sook Kim, Kwanghoon Pio Kim:
A Deep Learning-Based Real-Time Video Object Contextualizing and Archiving System. 137-144 - Xin Mi, Huaiwen He:
Multi-Agent Deep Reinforcement Learning for D2D-assisted MEC system with Energy Harvesting. 145-153 - Yi Feng, Ning Ge, Tao Xiang:
A Density-Based RSU Deployment and Optimization Heuristic Method for Vehicular Networks. 154-157 - Robin Chataut, Robert Akl, Utpal Kumar Dey:
An Adaptive User Scheduling Algorithm for 6G Massive MIMO Systems. 158-163 - Yong Zhang, Hao Zhang, Yan Li, Yong Zhang, Siyu Yuan:
Joint Resource Allocation and Task Offloading for Hybrid NOMA-assisted MEC Network with Network Slicing. 164-170 - Seokjoon Hong, Daniel Kim, Junhyeong Moon, Kyungrak Lee, Inwhee Joe:
5G NR based initial access procedure simulation environment implementation including system information using ns-3 simulator. 171-173 - Yuki Ishida, Masaki Hanada, Atsushi Waseda, Moo Wan Kim:
Analysis of DNS Graph of Phishing Websites Using Digital Certificates. 174-179 - Jackson Barreto, Hugo Almeida, Pedro Pinto:
An Overview of HTTPS and DNSSEC Services Adoption in Higher Education Institutions in Brazil. 180-185 - Chia-Wei Tsou, Yi-Wei Ma, Yi-Hao Tu, Jiann-Liang Chen:
Security Assist Mechanisms for Industrial Control Systems with Authentication. 186-188 - Man-Ling Liao, Chiao-Lin Yu, Yi-Cheng Lai, Shih-Ping Chiu, Jiann-Liang Chen:
An Intelligent Cyber Threat Classification System. 189-194 - Siti Agustini, Wirawan, Gamantyo Hendrantoro:
Lightweight Group Key Establishment for Reducing Memory Overhead. 195-200 - Soohyun Shin, Hyo-Sik Yang:
Estimation of Power Generation and Consumption based on eXplainable Artificial Intelligence. 201-205 - Akwi Helene Fomude, Chaoyu Yang, George Kofi Agordzo, Appiah Vincentia Serwah, Linda Abangbila:
AI Model to Improve HR Decision-Making with Machine Learning Predictions Algorithm. 206-212 - Hao Yang, Min Zhang, Shimin Tao, Miaomiao Ma, Ying Qin:
Chinese ASR and NER Improvement Based on Whisper Fine-Tuning. 213-217 - Sanjoy Basak, Sreeraj Rajendran, Sofie Pollin, Bart Scheers:
Autoencoder based framework for drone RF signal classification and novelty detection. 218-225 - Lizi Hu, Yuhao Chai, Qin Li, Weiyuan Li, Yong Zhang:
Multi-source DNN task offloading strategy based on in-network computing. 226-231 - Weiqiang Xue, Zhijie Han, Xiaoyu Du:
Review of New Data Center Network Structure. 232-235 - Shengli Ding, Xiaomin Ma:
Bayesian Constrained Optimization of IEEE 802.11 VANET for Safety Applications. 236-242 - Shakil Ahmed:
Study of Cluster-Based D2D Communication in Next Generation Mobile Network for the Post-Disaster Response. 243-248 - Yi-Cheng Lai, Chiao-Lin Yu, Man-Ling Liao, Yu-Shan Lin, Yao-Chung Chang, Jiann-Liang Chen:
An Intelligence Defense System with SNORT Rules. 249-254 - Satyanarayana N., Chitresh G.:
A Blockchain based Security Information and Event Monitoring Framework. 255-261 - Ahyun Song, Euiseong Seo, Heeyoul Kim:
Analysis of Olympus DAO: a popular DeFi model. 262-266 - Masaaki Ida:
Development of Indicator with Interactive Visualization System. 267-271 - Dongkoo Shon, Jeongsik Kim, Tae Hyun Yoon, Woo-Sung Jung, Dae-Seung Yoo:
A Study of AI-based Harbor Surveillance System. 272-276 - Jikai Yang, Zhiquan Bai, Jiacheng Hu, Yingchao Yang, Zhaoxia Xian, Xinhong Hao, Kyung Sup Kwak:
Time-frequency Analysis and Convolutional Neural Network Based Fuze Jamming Signal Recognition. 277-282 - Hao Yang, Min Zhang, Shimin Tao, Miaomiao Ma, Ying Qin, Daimeng Wei:
TeacherSim: Cross-lingual Machine Translation Evaluation with Monolingual Embedding as Teacher. 283-287 - Nianqi Tang, Yunghsiang S. Han, Hao Ren:
On Concatenated Coding Scheme for High-Speed Ethernet. 288-291 - Nahar Sultana, Farhana Huq, Md. Abdur Razzaque, Md. Mustafizur Rahman:
QoS-aware Resource Allocation for Healthcare Data Transmission using D2D Communication in NB-IoT. 292-297 - Yutaka Naito, Takumi Uemura, Takashige Hoshiai:
A Study on Connectivity Evaluation Among Peer Groups in Pure P2P Networks. 298-302 - Mingyao Zhao, Zhijie Han, Xiaoyu Du:
A Survey of Data Center Network Topology Structure. 303-309 - Sang-Yun Lee, Ho-Hyun Cho:
Damage Detection and Safety Diagnosis for Immovable Cultural Assets Using Deep Learning Framework. 310-313 - Jiuyi Chen, Ling Chen, Zhibin Yu:
Accelerating path tracing rendering with Multi-GPU in Blender cycles. 314-318 - Wook Hyun:
Study on standardization for Interoperable Metaverse. 319-322 - Gowoon Kang, Joowon Park, Soohyun Shin, Hyo-Sik Yang:
DC Nanogrid using IEC 61850. 323-327 - Ali Athar, Shah Mahsoom Ali, Md Ariful Islam Mozumder, Sikandar Ali, Hee-Cheol Kim:
Applications and Possible Challenges of Healthcare Metaverse. 328-332 - Fan Liu, Suriya Priya R. Asaithambi, Ramanathan Venkatraman:
Hybrid Personalized Book Recommender System Based on Big Data Framework. 333-340 - Jiseon Moon, Sang-il Ahn, Min Gyu Joo, Hyoung Won Baac, Jitae Shin:
Multi-Modal Deep Learning for the Thickness Prediction of Blood Clot. 341-344 - Xiaotian Wang, Letian Zhao, Wei Wu, Xi Jin:
Dynamic Neural Network Accelerator for Multispectral detection Based on FPGA. 345-350 - Ying-Jhen Su, Zhen-Kai Wu, You-Jia Su, Yu-Shan Lin, Yao-Chung Chang:
Graphed-based K-Means and Shortest Distance Tree for the Construction of Elderly Safe Corridor Accident and Prevention Platform. 351-357 - Farhana Huq, Nahar Sultana, Md. Abdur Razzaque:
Quality of Service Aware Order Allocation for Inter-Regional Online Food Delivery Systems. 358-364 - Stevan Del Arisandi, Nungki Selviandro, Kusuma Ayu Laksitowening, Dana Sulistiyo Kusumo:
Performance Analysis of Virtual Learning System: A Case Study of ANGKASA. 365-370 - Feixi Tang, Haowei Yang, Huibo Li, Zhixuan Feng, Peng Gong:
A Design of Data Interaction Interface Based on DDS for UAV-Borne SAR Distributed Simulation. 371-376 - Dana Sulistiyo Kusumo, Dita Noviyanti, Arfive Gandhi, Ichwanul Muslim Karo Karo, Su-Cheng Haw, Palanichamy Naveen:
Redesign of Indonesia E-commerce Online Review using User Information Behavior and Build-Learn-Measure Approaches. 377-381 - Mahdi Daghmehchi Firoozjaei, MinChang Kim, Dima Alhadidi:
Time-Series Load Data Analysis for User Power Profiling. 382-387 - Shah Mahsoom Ali, Satyabrata Aich, Ali Athar, Hee-Cheol Kim:
Medical Education, Training and Treatment Using XR in Healthcare. 388-393 - Gardner Mwansa, Ntima Mabanza:
Review of Internet of Things security protocols - A Bibliometric Analysis. 394-400 - Dang Sao Cao, Dinh Tam Nguyen, Xuan Chinh Nguyen, Van Thuyet Tran, Hai Binh Nguyen, Khac Thuan Lang, Van Tuan Nguyen, Ngoc Lam Dao, Thanh-Tu Pham, Ngoc Son Cao, Dinh Hung Chu, Phi Hung Nguyen, Cong Dan Pham, Duc Hai Nguyen:
Elastic Auto-Scaling Architecture in Telco Cloud. 401-406 - Md Ariful Islam Mozumder, Tagne Poupi Theodore Armand, Ali Athar, Hee-Cheol Kim:
The metaverse applications for the finance industry, its challenges, and an approach for the metaverse finance industry. 407-410 - Qiang Wu, Kouichi Hamada, Masayuki Arai:
SCN-SAM: A Modified Self-Cure Network for Facial Expression Recognition Under Face Masks. 411-416 - Jinming Che, Jian Cao, Shuo Feng, Jue Chen, Yuan Wang:
Linear Leakage: Better Robustness for Spiking Neural Network. 417-423 - Dahyun Kim, Yong-Ju Lee:
Improving Embodied Instruction Following with Deterministic Methods. 424-428 - Ming-Shen Jian, Yu-Zhi Luo, Peng-Wen Wang, Ting-Yu Lai:
Cloud and Edge Computing Based Movable 3D Dynamic Image Recognition and Analysis Layer System for Remote Biological Laboratory. 429-436 - Muhammad Mohsan Sheeraz, Md Ariful Islam Mozumder, Muhammad Omair Khan, Muhammad Usama Abid, Moon-Il Joo, Hee-Cheol Kim:
Blockchain System for Trustless Healthcare Data Sharing with Hyperledger Fabric in Action. 437-440 - Atiqur Rahman, Azruph Islam Badhon:
Simulation of Stator Current Signal Fault Characteristics of Induction Motor based on ANSYS. 441-447 - Shuang Xue, Huawei Liang, Qizhe Wu, Xi Jin:
Scheduling Memory Access Optimization for HBM Based on CLOS. 448-453 - Junqi Bao, Yunchu Yang, Yapeng Wang, Xu Yang, Zhenyu Du:
Path Planning for Cellular-connected UAV using Heuristic Algorithm and Reinforcement Learning. 454-459 - Yeonjun Choi, Sung-Hoon Kim, Hongkyw Choi, Seongwon Jung:
Field Testing of HEVC based Terrestrial UHD 3D Broadcast in ATSC 3.0. 460-464
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.