Journal: ICT Express

Volume 4, Issue 4

175 -- 180Een-Kee Hong, Jung-Yeon Baek, Ye-Ok Jang, Jeehyeon Na, Kyung-Sook Kim. QoS-guaranteed scheduling for small cell networks
181 -- 185Emtithal Ahmed, Ryuji Kohno. Error control coding and decoding with medical QoS constraints for WBAN end-to-end connection via UMTS channel
186 -- 193Seong-Jin Park, Byung-Mok Kim, Eun-Soo Kim. Single-shot digital holographic microscopy based on computational telecentricity using a single-arm off-axis interferometer
194 -- 198Vivekanand Jha, Nupur Prakash, Sweta Sagar. Wearable anger-monitoring system
199 -- 202Negar Dordaie, Nima Jafari Navimipour. A hybrid particle swarm optimization and hill climbing algorithm for task scheduling in the cloud environments
203 -- 208Udit Narayana Kar, Debarshi Kumar Sanyal. An overview of device-to-device communication in cellular networks
209 -- 215Hayder A. A. Al-Kashoash, Fadoua Hassen, Harith Kharrufa, Andrew H. Kemp 0001. Analytical modelling of congestion for 6LoWPAN networks
216 -- 220Shayhan Ameen Chowdhury, Mir Md. Saki Kowsar, Kaushik Deb. Human detection utilizing adaptive background mixture models and improved histogram of oriented gradients
221 -- 227Shihan Bao, Waleed Hathal, Haitham S. Cruickshank, Zhili Sun, Phillip Asuquo, Ao Lei. A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters
228 -- 233Alex Mouapi, Nadir Hakem, Gilles Y. Delisle. A new approach to design of RF energy harvesting system to enslave wireless sensor networks
234 -- 238Yiqiao Wei, Seung-Hoon Hwang. Investigation of spectrum values in rural environments
239 -- 242Alaa Mohasseb, Mohamed Bader-El-Den, Mihaela Cocea. Classification of factoid questions intent using grammatical features
243 -- 246Swapna G., Vinayakumar R., Soman K. P.. Diabetes detection using deep learning algorithms
247 -- 254Shallu Sharma, Rajesh Mehra. Breast cancer histology images classification: Training from scratch or transfer learning?
255 -- 258Vinayakumar R., Soman K. P.. DeepMalNet: Evaluating shallow and deep networks for static PE malware detection

Volume 4, Issue 3

119 -- 123Shun-Ping Chung, Yu-Ju Lu, Yu-Chen Lai. Cloud computing with single server threshold and double congestion thresholds
124 -- 129Prabhsimran Singh, Ravinder Singh Sawhney, Karanjeet Singh Kahlon. Sentiment analysis of demonetization of 500 & 1000 rupee banknotes by Indian government
130 -- 133Byung-Seok Kang, Hyunseung Choo. An experimental study of a reliable IoT gateway
134 -- 137Hengjun Yu, Kohei Inoue, Kenji Hara, Kiichi Urahama. Saturation improvement in hue-preserving color image enhancement without gamut problem
138 -- 143Yazan M. Allawi, Geun Young Kim, Jungbum Cho, Ahmad G. Reza, Yongsoo Na, June-Koo Kevin Rhee. Optimal dynamic subcarrier allocation for dual-band OFDMA-PON supporting integrated fronthaul and backhaul in 5G networks
144 -- 148Xin-Yu Shih, Hong-Ru Chou. Reconfigurable VLSI design of a changeable hybrid-radix FFT hardware architecture with 2D-FIFO storing structure for 3GPP LTE systems
149 -- 153Md. Noor-A.-Rahim, Yong Liang Guan 0001. Impact of estimation error on two-way relaying with relay antenna selection
154 -- 159Lokanadham Naidu Vadlamudi, Rama Prasad V. Vaddella, Vasumathi Devara. Robust image hashing using SIFT feature points and DWT approximation coefficients
160 -- 164Raghavendra Pal, Arun Prakash, Rajeev Tripathi, Dhananjay Singh. Analytical model for clustered vehicular ad hoc network analysis
165 -- 170Adarsh Patel, Praveen Kaushik. Applicability of adaptive clear channel assessment mode-1 range in intelligent transportation systems devices
171 -- 174Vinodh Kumar Minchula, G. Sasibhushana Rao. SVD-based IWFA for next generation wireless MIMO communication

Volume 4, Issue 2

55 -- 62Jaya Gera, Harmeet Kaur. A novel framework to improve the performance of crowdfunding platforms
63 -- 68Mohamed Farouk, Alistair Sutherland. Principal component pyramids for manifold learning in hand shape recognition
69 -- 74Gayathri R., V. Uma. Ontology based knowledge representation technique, domain modeling languages and planners for robotic path planning: A survey
75 -- 80Sota Sawaguchi, Hiroaki Nishi. Slightly-slacked dropout for improving neural network learning on FPGA
81 -- 86Elia Erwani Hassan, Titik Khawa Abdul Rahman, Nazrulazhar Bahaman, Zuhaina Zakaria, Mohd Hanif Jifri. Load margin expansion for sustainable power system operation
87 -- 90Gianmaria Tarantino, Stefania Monica, Federico Bergenti. A probabilistic matrix factorization algorithm for approximation of sparse matrices in natural language processing
91 -- 94Jongtaek Oh, Jisu Kim. Adaptive K-nearest neighbour algorithm for WiFi fingerprint positioning
95 -- 99Alex Shenfield, David Day, Aladdin Ayesh. Intelligent intrusion detection systems using artificial neural networks
100 -- 106David Balderas Silva, Pedro Ponce Cruz, Arturo Molina GutiƩrrez. Are the long-short term memory and convolution neural networks really based on biological systems?
107 -- 111Junaid Ahmed Zubairi, Sahar Idwan. Smart algorithms for patient assignment in disasters
112 -- 117Hee Min Choi, Jae-Gwan Choi, Eun-Soo Kim. Off-axis multi-projection integral imaging with calibrated elemental image arrays based on pixel-position mapping

Volume 4, Issue 1

1 -- 5Junsik Kim, Jaehyun Park 0003. FPGA-based network intrusion detection for IEC 61850-based industrial network
6 -- 13Nirmalya Kar, Kaushik Mandal, Baby Bhattacharya. Improved chaos-based video steganography using DNA alphabets
14 -- 18Aaron Zimba, ZhaoShun Wang, Hongsong Chen. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems
19 -- 23Subhrajyoti Deb, Bubu Bhuyan. Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices
24 -- 29Yuichi Nakamura, Keiya Harada, Hiroaki Nishi. A privacy-preserving sharing method of electricity usage using self-organizing map
30 -- 34Shama Naz Islam, Md. Apel Mahmud, Aman Maung Than Oo. Impact of optimal false data injection attacks on local energy trading in a residential microgrid
35 -- 41Daisuke Mashima, Aidana Serikova, Yao Cheng, Binbin Chen. Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing
42 -- 45Leandros A. Maglaras, Ki-Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, Tiago J. Cruz. Cyber security of critical infrastructures
46 -- 50A. Ilavendhan, K. Saruladha. Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs
51 -- 54Mikael Asplund. Automatically proving the correctness of vehicle coordination