dblp: ICT Express, Volume 5 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



- > Home > Journals > ICT Express
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 5, Number 1, March 2019

Kais Mekki, Eddy Bajic
, Frédéric Chaxel, Fernand Meyer:
A comparative study of LPWAN technologies for large-scale IoT deployment. 1-7

V. A. Sankar Ponnapalli
, P. V. Y. Jayasree:
Thinning of Sierpinski fractal array antennas using bounded binary fractal-tapering techniques for space and advanced wireless applications. 8-11

Sayantan Chowdhury
:
Matching theory for cognitive radio networks: An overview. 12-15

Sandeep Gupta
, Attaullah Buriro
, Bruno Crispo
:
DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure. 16-20

Arun Kumar
, NandhaKumar P.
:
OFDM system with cyclostationary feature detection spectrum sensing. 21-25

R. Sreelakshmy
, G. Vairavel:
Novel cuff button antenna for dual-band applications. 26-30

Ahmed O. Abdul Salam, Ray E. Sheriff
, Saleh R. Al-Araji, Kahtan A. Mezher
, Qassim Nasir
:
Adaptive threshold and optimal frame duration for multi-taper spectrum sensing in cognitive radio. 31-36

Wencheng Yang, Song Wang
, Guanglou Zheng
, Craig Valli
:
Impact of feature proportion on matching performance of multi-biometric systems. 37-40

Imad A. Shaheen
, Abdelhalim Zekry
, Fatma A. Newagy
, Reem Ibrahim:
Performance evaluation of PAPR reduction in FBMC system using nonlinear companding transform. 41-46

Ryota Nishimura
, Daisuke Yamamoto, Takahiro Uchiya, Ichi Takumi:
MMDAE: Dialog scenario editor for MMDAgent on the web browser. 47-51

Phu Tran Tin
, Tran Trung Duy
:
Power allocation strategies for dual-hop relay protocols with best relay selection under constraint of intercept probability. 52-55

Bahram Hajimirzaei, Nima Jafari Navimipour
:
Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. 56-59

Gibum Kim, Hyuncheol Park, Wan Choi
:
MDS coded caching with MRT and its optimization. 60-64

Hieu Trung Tran
, Letizia Lo Presti:
Kalman filter-based ARAIM algorithm for integrity monitoring in urban environment. 65-71

Chuyen Khoa Huynh, Deok Won Yun, Joo Pyoung Choi, Won Cheol Lee:
Performance analysis for coexistence of LTE-LAA and Wi-Fi systems in the spatial, time, spectrum domain. 72-76
Volume 5, Number 2, June 2019

Dimitris Kanellopoulos
:
Congestion control for MANETs: An overview. 77-83

Hyeungill Lee, Jungwoo Lee
:
Scalable deep learning-based recommendation systems. 84-88

Hong-Bae Jeon, Bonhong Koo, Chan-Byoung Chae
, Sung-Ho Park, Hyungjoo Lee:
Game theory based hybrid frequency assignment with net filter discrimination constraints. 89-93

Nahumi Nugrahaningsih, Marco Porta:
Soft biometrics through hand gestures driven by visual stimuli. 94-99

Abbas Ali Sharifi:
Discrete Hartley matrix transform precoding-based OFDM system to reduce the high PAPR. 100-103

Sangmin Heo, Chanhong Kim, Nayoung Lee, Jungwoo Lee
:
Analog network coding using differential and double-differential modulation with relay selection. 104-109

Gobalakrishnan Natesan, Arun Chokkalingam
:
Task scheduling in heterogeneous cloud environment using mean grey wolf optimization algorithm. 110-114

Hyeondeog Seo, Hyowon Kim
, Jeongwan Kang, Incheol Jeong, Woogeun Ahn, Sunwoo Kim:
3D moving target tracking with measurement fusion of TDoA/FDoA/AoA. 115-119

Trung Kien Vu
, Manh Kha Hoang
, Hung Lan Le:
An EM algorithm for GMM parameter estimation in the presence of censored and dropped data with potential application for indoor positioning. 120-123

Akanksha Saini
, Enrique Festijo, Younchan Jung:
Proposing packet-key based end-to-end security architecture for the post-LTE networks. 124-130

MyungKeun Yoon
:
A constant-time chunking algorithm for packet-level deduplication. 131-135

Sanghyo Park
:
A sub-pixel motion estimation skipping method for fast HEVC encoding. 136-140

George Kousiouris
, Stylianos Tsarsitalidis, Evangelos Psomakelis
, Stavros Koloniaris, Cleopatra Bardaki, Konstantinos Tserpes
, Mara Nikolaidou, Dimosthenis Anagnostopoulos
:
A microservice-based framework for integrating IoT management platforms, semantic and AI services for supply chain management. 141-145

Konstantinos Tserpes
:
stream-MSA: A microservices' methodology for the creation of short, fast-paced, stream processing pipelines. 146-149

Manuel Peuster, Christian Dröge, Clemens Boos, Holger Karl:
Joint testing and profiling of microservice-based network services using TTCN-3. 150-153
Volume 5, Number 3, September 2019

Abdussalam Salama
, Reza Saatchi
:
Probabilistic classification of quality of service in wireless computer networks. 155-162

Insoo Sohn:
Robustness enhancement of complex networks via No-Regret learning. 163-166

Mayank Kumar Kundalwal
, Kakali Chatterjee, Ashish Singh
:
An improved privacy preservation technique in health-cloud. 167-172

Jihoon Lee
, Hae Chung:
Exact and approximate log-likelihood ratio of _M_-ary QAM with two-time dimensions. 173-177

Mehdi Hosseinzadeh Aghdam
, Abbas Ali Sharifi:
PAPR reduction in OFDM systems: An efficient PTS approach based on particle swarm optimization. 178-181

Alexander V. Spirov, Ekaterina M. Myasnikova:
Linguistic modelling of gene regulation: Translation from the language of experiments to the language of modelling. 182-186

R. I. Minu
, G. Nagarajan, T. Prem Jacob
, Albert Pravin:
BIP: A dimensionality reduction for image indexing. 187-191

Jun Zheng
, Sai Krishna Chigurupati:
M-Pattern: A novel scheme for improving the security of Android Pattern unlock against smudge attacks. 192-195

Gillyoung Jung, Yong Up Lee:
Uplink impact analysis from TPC downlink enhancements. 196-201

Abbas Ali Sharifi:
PAPR reduction of optical OFDM signals in visible light communications. 202-205

A. Dhanalakshmi
, G. Nagarajan, L. Balaji
:
SHVC performance enhancement using superior step search algorithm. 206-210

V. Kanimozhi
, T. Prem Jacob
:
Artificial Intelligence based Network Intrusion Detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. 211-214
Volume 5, Number 4, December 2019

Yongcheol Kim, Hojun Lee
, Jongmin Ahn, Jaehak Chung:
Selection of CDMA and OFDM using machine learning in underwater wireless networks. 215-218

Gábor Péter, Bálint Kiss, Viktor Tihanyi:
Vision and odometry based autonomous vehicle lane changing. 219-226

Masahiro Watanabe:
Realization of a multihop wireless controlled sensor and actuator network for cable installation. 227-234

Eunmi Chu, Jong Min Kim, Bang Chul Jung
:
Interference modeling and analysis in 3-dimensional directional UAV networks based on stochastic geometry. 235-239

Jeong Seon Yeom, Youngbin Kim, Bang Chul Jung
:
UAV-assisted cooperative downlink NOMA with virtual full-duplex operation. 240-244
Regular Papers

D. Damodaram, T. Venkateswarlu:
FPGA implementation of genetic algorithm to detect optimal user by cooperative spectrum sensing. 245-249

Arun Kumar Singh, Anushka Swarup, Ankush Agarwal, Dharmendra Singh:
Vision based rail track extraction and monitoring through drone imagery. 250-255

Arfan Ghani
:
Healthcare electronics - A step closer to future smart cities. 256-260

Satoshi Taroda, Ken Tezuka, Shoichi Higuchi, Chang-Jun Ahn, Kazuki Maruta
:
Transmit power imbalance reduction method and nonlinear companding transform for beamforming OFDM systems. 261-265

Srinivasan Ashok Kumar
, D. Chandramohan
:
Fault test analysis in transmission lines throughout interfering synchrophasor signals. 266-270

Takashi Akao, Koya Watanabe, Shun Kojima, Masato Katsuno, Kazuki Maruta
, Chang-Jun Ahn:
Reducing channel spatial correlation by rotating planar antenna array. 271-275

Koya Watanabe, Shun Kojima, Takashi Akao, Masato Katsuno, Kazuki Maruta
, Chang-Jun Ahn:
Modified pilot selection for channel estimation of systematic polar coded MIMO-OFDM. 276-279

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







