


default search action
ICACT 2020: Pyeongchang, Korea
- 22nd International Conference on Advanced Communication Technology, ICACT 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020. IEEE 2020, ISBN 979-11-88428-04-5

- Grigoriy Fokin

:
Passive Geolocation with Unmanned Aerial Vehicles using AOA Measurement Processing. 1-5 - Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:

Comparison between DSRC and other Short Range Wireless Communication Technologies. 1-5 - Hamaciré El Hadj Kalil, Ahmed Dooguy Kora

, Selma Boumerdassi
:
Security in VANETs: Lightweight Protocol for Group-of-Vehicles Masters (LPGVM). 6-11 - Saha Tanangsanakool, Pongsathorn Reangsuntea, Kazuo Mori, Pisit Boonsrimuang

:
Low Complexity Equalization Method for ZP-OFDM under Highly Mobile Environments. 12-17 - Xin Wang, Tingqiu Yan, Narayan Nath, Bin Shen:

Primary User Transmit Mode Classification Based Spectrum Sensing in Cognitive Radio Network. 18-23 - Le The Dung

, Hoa T. K. Tran, Seong-Gon Choi:
Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading Environment. 24-28 - Nguyen Viet Ha, Le Van Hau, Masato Tsuru:

Dynamic ACK skipping in TCP with Network Coding for Power Line Communication Networks. 29-34 - Keiya Harada, Henri-Pierre Charles

, Hiroaki Nishi
:
Precision variable anonymization method supporting transprecision computing. 35-42 - Jinsuk Baek, Munene W. Kanampiu, Byeong Hyun Ko:

A Set Notation Configuration CoAP Scheme for Internet of Things. 43-47 - Seonyong Jeong, Seungwon Shin:

Efficient Network Administration for Smart Grid Data Center. 48-51 - Chaehong Chung, Jaehoon Paul Jeong:

A Design of IoT Device Configuration Translator for Intent-Based IoT-Cloud Services. 52-56 - Md. Masud Rana, Md Walid Hasan, Ahmed Abdelhadi:

Diseases Detection from Electroencephalogram Signals Using Support Vector Machine. 57-61 - Jinbeom Seo, Youngbok Cho:

Medical Image Sharing System using Hyperledger Fabric Blockchain. 62-64 - Tinthid Jaikla, Sasakorn Pichetjamroen, Chalee Vorakulpipat, Achara Pichetjamroen:

A Secure Four-factor Attendance System for Smartphone Device. 65-68 - Alireza Ghobadi

, Hamidreza Alvandi:
Image Color Watermarking within Past Seven Years. 69-75 - Zhao Xiang, Rafat Hamood Othman Saweed, Ayaz Muhammad, Dal-Hwan Yoon:

Low Temperature Fluidity and Performance Evaluation for Sensor Unified Fuel Heater. 76-80 - WooHyun Park:

A Study on Analytical Visualization of Deep Web. 81-83 - Md. Moklesur Rahman

, Md Shafiqul Islam
, Mir Kanon Ara Jannat
, Md. Hafizur Rahman
, Md. Arifuzzaman, Roberto Sassi, Md. Aktaruzzaman
:
EyeNet: An Improved Eye States Classification System using Convolutional Neural Network. 84-90 - Victor Khaustov, Maxim Mozgovoy:

Learning Believable Player Movement Patterns from Human Data in a Soccer Game. 91-93 - Seungjae Shin, Hongseok Jeon, Chunglae Cho, Seunghyun Yoon, Taeyeon Kim:

User Mobility Synthesis based on Generative Adversarial Networks: A Survey. 94-103 - Li Cho

, Meng-Fan Chuang, Sheng-Hsiang Fu, Chau-Yun Hsu:
BER Reduction for PSK-Based MM-OFDM-BIM with Two-Level Symbol Power. 104-108 - Geng Zhang, Yanan Wang, Yang Wang, Huixia Ding, Weidong Wang, Zhiquan Bai:

Power Allocation for Multi-Relay AF Cooperative System with Maximum System Capacity. 109-113 - Xiang Gao, Xiaopeng Yan, Zhiquan Bai:

Spatial Modulation Based Color-Intensity Shift Keying in VLC System. 114-118 - Yanan Wang, Geng Zhang, Yang Wang, Huixia Ding, Weidong Wang, Siqi Li:

A Collaborative Simulation Architecture for Influence Evaluation of Communication Network Faults on Power Grid System. 119-124 - Xuebing Bai, Meng Zhou, Xu Qiao, Yao Zhang, Longxiang Yang:

Uplink Performance Analysis of Cell-Free MIMO with Low-Resolution ADCs and ZF Receiver. 125-129 - Yong Hee Park, Su Ho Lee, Seong Gon Choi:

ESS SoC Optimization System Using EV Control. 130-134 - Nawsheen Promy, Tashfiq Rahman, Sadman Islam, Saqlain Mahmud Khan:

Automated smart box to alleviate unfair means in public examination in the context of Bangladesh. 135-138 - Heechang Chung, Dongil Kim, Kyoung-Sook Jung, Byeong-Beom Kang, Sokpal Cho, Soonghee Lee:

Study on Service model of the Agriculture Information based Convergence Service. 139-141 - Md. Masud Rana, Ahmed Abdelhadi:

Day-Ahead Electricity Market State-Space Model and Its Power Production, Demand and Price Forecasting Algorithm Using H-infinity Filter. 142-146 - Jun Guo, Xiaoyu Zhang, Zhiyuan Gao, Ligeng Wang, Wenyu Li, Hangmin Chi:

Highway Traffic Flow Status Recognition Method Based on Deep Neural Network. 147-154 - Wang-You Tsai, Tzu-Chuan Chou, Jiann-Liang Chen, Yi-Wei Ma, Chen-Jui Huang:

Blockchain as a Platform for Secure Cloud Computing Services. 155-158 - Dana Yang, Sol Jeon, Inshil Doh, Kijoon Chae:

Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security. 159-165 - Nakhoon Choi

, Heeyoul Kim:
Hybrid Blockchain-based Unification ID in Smart Environment. 166-170 - Minjae Byun, Yongjun Lee, Jin-Young Choi

:
Analysis of software weakness detection of CBMC based on CWE. 171-175 - Gang Zhao, Bingbing Di, Hui He:

Design and Implementation of the Digital Education Transaction Subject Two-factor Identity Authentication System Based on Blockchain. 176-180 - Dongseop Lee, Hyunjin Kim, Jaecheol Ryou:

Evasion Attack in Show and Tell Model. 181-184 - Hao Yang, Ying Qin, Yao Deng, Minghan Wang:

NMT Enhancement based on Knowledge Graph Mining with Pre-trained Language Model. 185-189 - Nyamsuren Purevsuren

, Zolzaya Dashdorj, Tamir Khujuu, Erdenekhuu Norinpel
:
Selection and Optimization Model of Key Performance Indicators. 190-196 - Sabyasachi Chakraborty, Satyabrata Aich, Avinash Kumar, Sobhangi Sarkar, Jong-Seong Sim, Hee-Cheol Kim:

Detection of cancerous tissue in histopathological images using Dual-Channel Residual Convolutional Neural Networks (DCRCNN). 197-202 - Ji Won Lee, Do-Won Nam, Jungsoo Lee, Sung-Won Moon, Arum Oh, Wonyoung Yoo:

A Study on the Composition of Image-Based Ship-type/class Identification System. 203-206 - Amna Javed Tiwana

, Muhammad Zeeshan
:
Parametric Analysis of FBMC/OQAM under SUI Fading Channel Models. 207-211 - Azka Zaheer, Muhammad Zeeshan

, Muhammad Waqas:
Multiband Multi-rate Narrowband Software Defined Radio waveform based on CPM. 212-216 - Atef H. Bondok

, Wonseok Lee, Taejoon Kim:
Efficient Scheduling for VANET Considering Renewable Energy. 217-221 - Brice A. Elono Ongbwa, Ahmed D. Kora

, Thierry J. Fotso Wabo:
Improvement of Special Drive Test Route (SDTR) Reliability for Indoor Radio Frequency Coverage Assessment in 3G/4G Mobile Networks. 222-227 - Yoonji Kim, Geunbae Kim, Dongweon Yoon:

Estimation of Convolutional Interleaver in a Non-cooperative Context. 228-230 - Ditthawat Songratthaset, Suwat Pattaramalai:

Orthogonal Polynomials Based Complex Gaussian Processes of Nonlinear Power Amplifier for 5G Wireless Communication Systems. 231-236 - Chang-Su Lee, Dong-Hee Jung:

Design and implementation of real-time information sharing system of IoT using distributed social network. 237-244 - Ruslan Kirichek, Truong Duy Dinh

, Van-Dai Pham
, Maxim Zakharov
, Duc Tran Le
, Andrey Koucheryavy:
Positioning Methods Based on Flying Network for Emergencies. 245-250 - Ruslan Kirichek, Vladimir M. Vishnevsky

, Van-Dai Pham
, Andrey Koucheryavy:
Analytic Model of a Mesh Topology based on LoRa Technology. 251-255 - Da-Yu Kao, Yun-Ya Chen, Fuching Tsai:

Hacking Tool Identification in Penetration Testing. 256-261 - Da-Yu Kao, Ting-Chi Wang, Fu-Ching Tsai:

Forensic Artifacts of Network Traffic on WeChat Calls. 262-267 - Hyunho Kim, HoonJae Lee, Hyotaek Lim:

Performance of Packet Analysis between Observer and WireShark. 268-271 - Md. Masud Rana, Tamanna Akter, Ahmed Abdelhadi:

Variable Step Size-Least Mean Squared Algorithm for ECG Signal Denoising Considering Baseline Wander Noise and Cyber Attacks. 272-275 - Gyuseong Lee, Minsung Son, Nakhoon Choi

, Seongho Hong, Heeyoul Kim:
Blockchain based Removable Storage Device Log Management System. 276-279 - Thaweerath Phisannupawong, Patcharin Kamsing

, Peerapong Tortceka, Soemsak Yooyen:
Vision-based attitude estimation for spacecraft docking operation through deep learning algorithm. 280-284 - Veranika Mikhailava

, Evgeny Pyshkin, Vitaly Klyuev:
Aesthetic Evaluation of Food Plate Images using Deep Learning. 285-289 - Patcharin Kamsing

, Peerapong Torteeka, Soemsak Yooyen, Siriporn Yenpiem, Daniel Delahaye, Philippe Notry, Thaweerath Phisannupawong, Sittiporn Channumsin:
Aircraft trajectory recognition via statistical analysis clustering for Suvarnabhumi International Airport. 290-297 - Sabyasachi Chakraborty, Satyabrata Aich, Jong-Seong Sim, Eunyoung Han, Jinse Park, Hee-Cheol Kim:

Parkinson's Disease Detection from Spiral and Wave Drawings using Convolutional Neural Networks: A Multistage Classifier Approach. 298-303 - Yue Ma, Bo Peng, Mingjun Ma, Yifei Wang, Ding Xiao:

Traffic Prediction on Communication Network based on Spatial-Temporal Information. 304-309 - Kyung-Yul Cheon, Hyeyeon Kwon, Igor Kim, Seungkeun Park, Jun Kyun Choi:

Mobile Traffic Assessment for 4G Network: Virtual Sample Region Approach. 310-313 - Aseer Ahmad Ansari, Sabyasachi Chakraborty, Satyabrata Aich, Beom Su Kim, Hee-Cheol Kim:

Optimization of Healthcare Network for improved service delivery. 314-318 - Rui Teng, Kazuto Yano, Yoshinori Suzuki:

Identification of IoT Network Type Based on The Response Delay Property. 319-324 - Lili Zhao, Ming Ni, Xiaodan Cui, Weidong Wang, Jinfeng Zhang:

The Research of Scheduling Algorithm Based on Time-Triggered Ethernet. 325-329 - Xuan Hu, Jie Liu, Yichen Wang:

Researches on Software Requirements Elicitation Approach of the Aviation Electronics Systems based on Multi-ontology. 330-335 - Xuan Hu, Jie Liu, Bo Wu:

The Orthogonal Defect Classification-based Software Error Pattern Ontology Construction Researches. 336-341 - Md. Masud Rana, Al Mohaiminul Alam Mehedie, Ahmed Abdelhadi:

Optimal Image Watermark Technique Using Singular Value Decomposition with PCA. 342-347 - Yanying Yang, Xianwei Xu:

A Underwater Image Enhanced Algorithm combined MSR and Channel Energy. 348-349 - Igor Kim, Jung-Sun Um, Seungkeun Park:

Implementation of SDR-based 5G NR Cell Search Equipment. 350-353 - Latyr Ndiaye, Kéba Gueye, Bessan Melckior Dégboé

, Samuel Ouya
:
Proposal of an IVR Solution and Granting of Credit With Asterisk's AGI and a Flask RESTFul Framework in an IMS Network: Case of an Advertisement. 354-360 - Da-Yu Kao, Fang-Yu Lu, Fu-Ching Tsai:

Tool Mark Identification of Skype Traffic. 361-366 - Therdpong Daengsi, Phisit Pornpongtechavanich

, Pongpisit Wuttidittachotti
:
A Proposed Audiovisual Quality Assessment Model Associated with Multiplayer Online Battle Arena Game: A Pilot Study with ROV. 367-371 - Ming-Shen Jian

, Wei-Cheng Hong, Sheng-Che Tsai, Yu-Wei Chen, Chih-Ling Fan:
Based on Automatic Correlation Keyword Grouping and Combination Based Deep Information Search Corresponding to Specific Language Big Data - Case of Leisure Recreation. 372-377 - Mamadou Alpha Barry, James K. Tamgno, Claude Lishou:

Influence of quality service in IP/MPLS network load with IPTV and VoD services. 378-385 - Mamadou Alpha Barry, James K. Tamgno, Claude Lishou, Ismaël Habou Dere:

Modeling and Simulation of Multicast IPTV and VoD Streams for a Multiservice IP Network. 386-395 - Wasinee Noonpakdee:

The Adoption of Artificial Intelligence for Financial Investment Service. 396-400 - Zhongtao Chen, De Meng, Yufan Zhang, Tinglin Xin, Ding Xiao:

Electricity Theft Detection Using Deep Bidirectional Recurrent Neural Network. 401-406 - Anooksha Yogesh Rathod, Shubham Pandya, Nishant Doshi

:
IoT and Modern Marketing: Its Social Implications. 407-413 - Kwihoon Kim, Yong-Geun Hong:

Industrial General Reinforcement Learning Control Framework System based on Intelligent Edge. 414-418 - Jie Wang, Xi Jin, Wei Wu:

TB-DNN: A Thin Binarized Deep Neural Network with High Accuracy. 419-424 - M. Rakib Uddin, Law Foo Kui, Rafidah Petra

, Zainidi Hamid, Nazri Ahmad, Nurazmina Lingas:
2 to 4 Digital Optical Line Decoder based on Photonic Micro-Ring Resonators. 425-429 - Saïdou Conombo, Mamadou Diallo Diouf, Samuel Ouya

, Ahmed D. Kora
:
Radio Signal Generation over Fiber by Optical Injection Locking. 430-436 - A. T. C. Chen, M. Rakib Uddin, Law Foo Kui, Nurazmina Lingas:

Dimension Dependent Silicon Photonics Rib Waveguide Characterisation. 437-441 - Tserenlkham Batdorj

, Ganbold Shagdar
, Buyankhishig Zundui:
An enhanced DWBA algorithm in WDM-TDM PON networks. 442-447 - Sercan Aygun

, Lida Kouhalvandi, Ece Olcay Günes
, Serdar Özoguz
:
Inspecting Distortion in the Power Amplifiers with the aid of Neural Networks. 448-453 - Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, Seong Jong Choi, Seung-Hee Oh, Yong-Tae Lee:

A Study for Image Expression of Emergency Alert. 454-456 - Ruihong Xu, Zide She, JinPeng Chen, Bing-Yuh Lu

, Ruilong Huang, XiWu Li:
Preliminary Study of the Voice-controlled Electric Heat Radiator. 457-460 - Bing-Yuh Lu

, Mei Liu, Meng-Lun Hsueh, Pao-An Lin, XiWu Li, Huey-Dong Wu
:
Preliminary Study on Production of Coarse and Fine Crackles in Respiration Using a Model of Communication Theory. 461-464 - Siraj Un Muneer, Muhammad Nadeem, Bakhtiar Kasi, Mir Hamayoun Yousaf:

Evaluating the Effectiveness of Notations for Designing Security Aspects. 465-471 - Yujian Gong, Wei Xi, Hui Han, Jiawei Yan:

Research on A Reliable Method of Receiving Data Based on Zero-Copy Non-Drop Packet Network Card. 472-477 - Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, Seong Jong Choi, Seung-Hee Oh, Yong-Tae Lee:

Interface Design between Mobile Communication Service Provider and National Alert Originator in Korea. 478-480 - Khasanboy Kodirov, Khusanboy Kodirov, Young Sil Lee:

Implementation of web application based on Augmentative and Alternative Communication (AAC) method for People with Hearing and Speech Impairment. 481-484 - Purit Phan-Udom, Vasaka Visoottiviseth, Ryousei Takano:

Intercontinental Disk-to-Disk Data Transfer Experiment with a Lightweight DTN Software Stack. 485-490 - Rhaed Khiati, Muhammad Hanif

, Choonhwa Lee:
Adapting distributed stream processing technologies for the automation of modern health care systems. 491-496 - Jihao Zhang, Huibo Li, Dan Shan, Duk Kyung Kim, Xiaopeng Yan, Peng Gong:

A Dynamical Network Fault Setting approach for Joint Power Grid Simulation. 497-502 - Wenwei Liao

, Eric J. Hackathorn, Suefen Wang:
A Study of Applying a 3D Instructional Software of Popular Science (Science On a Sphere Explorer) in Earth Science Education of an Elementary School. 503-506 - Prachaya Daruthep, Nikorn Sutthisangiam:

Development of Automated Processing for High-Definition Mapping System. 507-510 - Fu-Ching Tsai, Ming-Chun Hsu, Da-Yu Kao:

Exponential Random Graph Modeling of Co-Offender Drug Crimes. 511-516 - Pakizah Saqib, Usman Qamar

, Reda Ayesha Khan, Andleeb Aslam:
MF-GARF: Hybridizing Multiple Filters and GA Wrapper for Feature Selection of Microarray Cancer Datasets. 517-524 - Andleeb Aslam, Usman Qamar

, Pakizah Saqib, Reda Ayesha Khan, Aiman Qadeer:
A Novel Framework For Sentiment Analysis Using Deep Learning. 525-529 - Mary Wu:

An Efficient hole Recovery Method in Wireless Sensor Networks. 530-535 - Moon-Il Joo, Jong-Seong Sim, Tae-Gyu Lee:

Disconnected operation method for recovering bioinformation in a digital patch system. 536-540 - Md. Masud Rana, Nazia Halim, Md Mostafizur Rahamna, Ahmed Abdelhadi:

Position and Velocity Estimations of 2D-Moving Object Using Kalman Filter: Literature Review. 541-544 - Md. Masud Rana, Reshma Khanom, Md. Mostafizur Rahman, Ahmed Abdelhadi:

Design and Analysis of Effective Vivaldi Antennas for Brain Tumor Detections: Ku Frequency Band. 545-548 - Arif Dataesatu, Pornpawit Boonsrimuang, Kazuo Mori, Pisit Boonsrimuang

:
Energy Efficiency Enhancement in 5G Heterogeneous Cellular Networks Using System Throughput Based Sleep Control Scheme. 549-553 - Deepanjali Mishra

, Chen Hong, Kueh Lee Hui, Ahmed Al-Absi, Mangal Sain:
Cyber security in Research and Academics due to Social Media. 554-558 - Junhyuk Park

, Wonyong Yoon:
SDN-based heterogeneous network architecture with Multi-Controllers. 559-561 - Shujun Han, Jun Li, Qian Dong, Yuxiang Ma, Liujing Song:

Service-aware Based Virtual Network Functions Deployment Scheme in Edge Computing. 562-565 - Samba Diouf, Kéba Gueye, Samuel Ouya

, Gervais Mendy
:
Proposal for a solution to improve access to mathematics and philosophy education in Senegal thanks to SDN and IPTV. 566-570 - Aleena Ahmad, Usman Qamar

, Muhammad Summair Raza:
Computationally Efficient Approximation Algorithm of Dominance Based Rough Set Approach. 571-576 - Ju Jinquan, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:

Analysis and Protection of Computer Network Security Issues. 577-580 - Jang-Hyeon Jeong, Si Young Lee, Gyung Ho Park, Seong Gon Choi:

Rule conversion mechanism between NIDPS engines. 581-584 - Kuang-Yao Lin, Wei-Ren Huang:

Using Federated Learning on Malware Classification. 585-589 - Chin-Wei Chen, Ching-Hung Su, Kun-Wei Lee, Ping-Hao Bair:

Malware Family Classification using Active Learning by Learning. 590-595 - Matasem Saleh

, N. Z. Jhanjhi
, Azween B. Abdullah
, Fatima-tuz-Zahra:
Proposing a Privacy Protection Model in Case of Civilian Drone. 596-602 - Khalifa Sylla, Ndeye Massata Ndiaye

, Samuel Ouya
, Gervais Mendy
:
Towards the use of a contact center for the socialization and capacity reinforcement of learners of African digital universities. 603-607 - Edgard Ndassimba

, Ghislain Mervyl S. J. Kossingou, Nadege Gladys Ndassimba, Kéba Gueye, Samuel Ouya
:
The Impact of Using TVWS in the Field of Health in Countries in Conflict: The Case of Central African Republic. 608-613 - Nadege Gladys Ndassimba, Ghislain Mervyl S. J. Kossingou, Edgard Ndassimba

, Kéba Gueye, Samuel Ouya
:
The Impact of Zeroconf on the Education System of the Countries in Conflict: The Case of the Central African Republic. 614-619 - Maxim Zakharov

, Ammar Muthanna, Ruslan Kirichek, Andrey Koucheryavy:
Real-time Molecular Analysis Methods Based on Cloud Computing. 620-623 - Andleeb Aslam, Usman Qamar

, Reda Ayesha Khan, Pakizah Saqib:
Improving K-Mean Method by Finding Initial Centroid Points. 624-627 - Eun Sun Chae, Dong-Seok Kang, Jong Yik Si, Sangoh Yun, Pilwoon Jung, Soyoung Park, Haewon Lee, Kyoungjin Choi:

Automating Public Administration in the Digital Age. 628-631 - Sang-Chul Shin, Jin-Won Ho, Vyacheslav Yuryevich Pak:

Digital Transformation through e-Government Innovation in Uzbekistan. 632-639 - Dinh-Lam Pham

, Hyun Ahn, Kyoung-Sook Kim, Kwanghoon Pio Kim
:
Represent The Discovered Proportional Information Control Net Using Extended XPDL Format. 640-643 - Hong-Quan Do

, Tuan-Hiep Le, Byeongnam Yoon:
Dynamic Weighted Hybrid Recommender Systems. 644-650 - Seong-Hun Ham, Dinh-Lam Pham

, Kyoung-Sook Kim, Kwanghoon Pio Kim
:
Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing Frameworks. 651-657 - Da-Yu Kao, Ni-Chen Wu, Fuching Tsai:

A Triage Triangle Strategy for Law Enforcement to Reduce Digital Forensic Backlogs. 1173-1179 - Dzung Van Dinh, Byeong-Nam Yoon, Hung Ngoc Le, Uy Quoc Nguyen, Khoa Dang Phan, Lam Dinh Pham:

ICT Enabling Technologies for Smart Cities. 1180-1192 - Alberto Gallegos Ramonet

, Taku Noguchi
:
IEEE 802.15.4 Now and Then: Evolution of the LR-WPAN Standard. 1198-1210 - Azamjon Abdullaev, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Mangal Sain, Hoon-Jae Lee:

Classify and Analyze the Security Issues and Challenges in Mobile banking in Uzbekistan. 1211-1217 - Da-Yu Kao:

Using the Actionable Intelligence Approach for the DPI of Cybercrime Insider Investigation. 1218-1224 - Rui Fu, Mohammed Abdulhakim Al-Absi, Ahmed Abdulhakim Al-Absi, Hoon-Jae Lee:

Conservation Genetic Algorithm to Solve the E-commerce Environment Logistics Distribution Path Optimization Problem. 1225-1231 - Da-Yu Kao:

Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes. 1232-1241 - Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang:

A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC. 1242-1247 - Anh H. Dang, Wataru Kameyama:

Robust Semantic Segmentation for Street Fashion Photos. 1248-1257 - Tae-Gyu Lee:

Wearable Passive biosensing interface method for gathering bioinformation. 1258-1264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














