Journal: ICT Express

Volume 6, Issue 4

263 -- 268Tabassum Lubna, Imtiaz Mahmud, You Ze Cho. D-LIA: Dynamic congestion control algorithm for MPTCP
269 -- 272Hao Wang. Trade-off queuing delay and link utilization for solving bufferbloat
273 -- 279Mostafa K. Ardakani, Seyed Mohammad Fatemi, Hamid-Reza Hamidi, Mojtaba Kamaliardakani. A hybrid adaptive approach to improve position tracking measurements
280 -- 286Quoc-Dung Ngo, Huy-Trung Nguyen, Van-Hoang Le, Doan-Hieu Nguyen. A survey of IoT malware and detection methods based on static features
287 -- 290Sohyun Joo, Tae-Yoon Kim, Taewon Song, Sangheon Pack. MU-MIMO enabled uplink OFDMA MAC protocol in dense IEEE 802.11ax WLANs
291 -- 299Md. Sajjad Hossain, Cosmas Ifeanyi Nwakanma, Jae-Min Lee, Dong Seong Kim. Edge computational task offloading scheme using reinforcement learning for IIoT scenario
300 -- 305Soumya S., Pramod K. V. Sentiment analysis of malayalam tweets using machine learning techniques
306 -- 311A. Dhanalakshmi, Nagarajan G.. Combined spatial temporal based In-loop filter for scalable extension of HEVC
312 -- 315Ibrahem Kandel, Mauro Castelli. The effect of batch size on the generalizability of the convolutional neural networks on a histopathology dataset
316 -- 319Mriganka Mandal. Cryptanalysis of RNZ, an identity-based fully anonymous broadcast encryption
320 -- 324Anji Reddy Vaka, Badal Soni, Sudheer Reddy K.. Breast cancer detection by leveraging Machine Learning
325 -- 331Ban Mohammed Khammas. Ransomware Detection using Random Forest Technique
332 -- 338Myuu Myuu Wai Yan. Accurate detecting concept drift in evolving data streams
339 -- 342Trung Hoai Tran. Hierarchical codebook using the last layer to improve the angular estimation in MIMO system
343 -- 347Imtiaz Mahmud, You Ze Cho. BBR Advanced (BBR-A) - Reduced retransmissions with improved fairness
348 -- 352Nguyen-Thi Huyen, Duong Duc Ha, Pham Thanh Hiep. Buried objects detection in heterogeneous environment using UWB systems combined with curve fitting method
353 -- 356Samuel Dayo Okegbile, Olabisi I. Ogunranti. Users emulation attack management in the massive internet of things enabled environment
357 -- 360Mohammad Aman Ullah, Syeda Maliha Marium, Shamim Ara Begum, Nibadita Saha Dipa. An algorithm and method for sentiment analysis using the text and emoticon
361 -- 367Nerella Sameera, M. Shashi. Deep transductive transfer learning framework for zero-day attack detection
368 -- 371Ghanbar Azarnia, Abbas Ali Sharifi, Hojjat Emami. Compressive sensing based PAPR reduction in OFDM systems: Modified orthogonal matching pursuit approach

Volume 6, Issue 3

151 -- 154Flávio S. Corrêa da Silva, Frederico P. Costa, Antonio F. Iemma. Practical considerations regarding classification learning for clinical diagnosis and therapy advice in oncology
155 -- 159Deepak K., Vignesh L. K. P, Chandrakala S.. Autocorrelation of gradients based violence detection in surveillance videos
160 -- 165Sotirios P. Sotiroudis, Sotirios K. Goudos, Katherine Siakavara. Deep learning for radio propagation: Using image-driven regression to estimate path loss in urban areas
166 -- 169Aman Malali, Srinidhi Hiriyannaiah, G. M. Siddesh, K. G. Srinivasa 0001, Sanjay N. T.. Supervised ECG wave segmentation using convolutional LSTM
170 -- 174Keerthana Rangasamy, Muhammad Amir As'ari, Nur Azmina Rahmad, Nurul Fathiah Ghazali. Hockey activity recognition using pre-trained deep learning model
175 -- 180Jin-A. Choi, Kiho Lim. Identifying machine learning techniques for classification of target advertising
181 -- 184Shahriar Kaisar. Developmental dyslexia detection using machine learning techniques : A survey
185 -- 194Brainvendra Widi Dionova, M. N. Mohammed, S. Al-Zubaidi, Eddy Yusuf. Environment indoor air quality assessment using fuzzy inference system
195 -- 199Kyoung-Son Jhang, Hansol Kang, Hyeokchan Kwon. CNN training for age group prediction in an illumination condition
200 -- 203Cheng-Yen Tang, Chien-Hung Liu, Woei-kae Chen, Shingchern D. You. Implementing action mask in proximal policy optimization (PPO) algorithm
204 -- 208Xiwei Wang, Minh Nguyen, Jonathan Carr, Longyin Cui, Kiho Lim. A group preference-based privacy-preserving POI recommender system
209 -- 213Yossawee Keaomanee, Apichat Heednacram, Prakarnkiat Youngkong. Implementation of four kriging models for depth inpainting
214 -- 219Erna Hikmawati, Nur Ulfa Maulidevi, Kridanto Surendro. Adaptive rule: A novel framework for recommender system
220 -- 228Nwamaka U. Okafor, Yahia Alghorani, Declan T. Delaney. Improving Data Quality of Low-cost IoT Sensors in Environmental Monitoring Networks Using Data Fusion and Machine Learning Approach
229 -- 237Amir Farzad, T. Aaron Gulliver. Unsupervised log message anomaly detection
238 -- 242Stefano Cagnoni, Lorenzo Cozzini, Gianfranco Lombardo, Monica Mordonini, Agostino Poggi, Michele Tomaiuolo. Emotion-based analysis of programming languages on Stack Overflow
243 -- 248Kristo Radion Purba, David Asirvatham, Raja Kumar Murugesan. An analysis and prediction model of outsiders percentage as a new popularity metric on Instagram
249 -- 252Kentaro Yonei, Kazuki Maruta, Chang-Jun Ahn. Frame splitting and data-aided decision direct channel estimation for OFDM in fast varying fading channels
253 -- 257Sarabjeet Kaur Kochhar, Uma Ojha. Index for objective measurement of a research paper based on sentiment analysis
258 -- 261Hojjat Emami, Abbas Ali Sharifi. An improved backtracking search optimization algorithm for cubic metric reduction of OFDM signals

Volume 6, Issue 2

67 -- 75Van-Sang Doan, Dong Seong Kim. DOA estimation of multiple non-coherent and coherent signals using element transposition of covariance matrix
76 -- 82Ario Yudo Husodo, Grafika Jati, Amarulla Octavian, Wisnu Jatmiko. Switching target communication strategy for optimizing multiple pursuer drones performance in immobilizing Kamikaze multiple evader drones
83 -- 86Sangku Lee, Janghyuk Youn, Bang Chul Jung. A cooperative phase-steering technique in spectrum sharing-based military mobile ad hoc networks
87 -- 92Chang-Seok You, Jeong Seon Yeom, Bang Chul Jung. Cooperative maximum-ratio transmission with multi-antenna relay nodes for tactical mobile ad-hoc networks
93 -- 97Shijie Zhang, Jong-Hyouk Lee. Analysis of the main consensus protocols of blockchain
98 -- 103Sydney Mambwe Kasongo, Yanxia Sun. A Deep Long Short-Term Memory based classifier for Wireless Intrusion Detection System
104 -- 108Lukman A. Olawoyin, Nasir Faruk, Abdulkarim A. Oloyede, Segun I. Popoola, Temitayo C. Adeniran, Nazmat Toyin Surajudeen-Bakinde, Abubakar Abdulkarim. Secure transmission in an unfriendly environment
109 -- 112Jae H. Jahng, Seung K. Park. Simulation-based prediction for 5G mobile adoption
113 -- 116Muhammad Tariq Mahmood, Usman Ali 0006, Young Kyu Choi. Single image defocus blur segmentation using Local Ternary Pattern
117 -- 120Jongtaek Oh, Minwoo Kim. Method to determine initial aiming azimuth accuracy using acceleration, gyroscope, and geomagnetic sensors
121 -- 124Yonten Jamtsho, Panomkhawn Riyamongkol, Rattapoom Waranusast. Real-time Bhutanese license plate localization using YOLO
125 -- 127Majd Latah, Levent Toker. Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach
128 -- 138Huy-Trung Nguyen, Quoc-Dung Ngo, Doan-Hieu Nguyen, Van-Hoang Le. PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms
139 -- 144Nirwan Ansari, Di Wu 0042, Xiang Sun 0001. FSO as backhaul and energizer for drone-assisted mobile access networks
145 -- 150Sara Kaviani, Insoo Sohn. Influence of random topology in artificial neural networks: A survey

Volume 6, Issue 1

1 -- 2Khasa Gillani, Jong-Hyouk Lee. Comparison of Linux virtual machines and containers for a service migration in 5G multi-access edge computing
3 -- 6SeungWon Lee, Yalei Zhang, Seokho Yoon, Iickho Song. Order statistics and recursive updating with aging factor for cooperative cognitive radio networks under SSDF attacks
7 -- 10Yee-Loo Foo. Operating white space devices in the DTV service area
11 -- 15Pham Thanh Hiep, Tran Manh Hoang. Non-orthogonal multiple access and beamforming for relay network with RF energy harvesting
16 -- 19Vinayakumar R., Soman K. P.. Siamese neural network architecture for homoglyph attacks detection
20 -- 22Swati Rawal, Sahadeo Padhye. Cryptanalysis of ID based Proxy-Blind signature scheme over lattice
23 -- 27Muhammad Usman Hadi, Pier Andrea Traverso, Giovanni Tartarini, Hyun Jung. Experimental characterization of Sigma Delta Radio over fiber system for 5G C-RAN downlink
28 -- 37Shehzad Muhammad Hanif, Muhammad Bilal 0001. Competitive residual neural network for image classification
38 -- 42Sheba Diamond Thabah, Prabir Saha. New design approaches of reversible BCD encoder using Peres and Feynman gates
43 -- 47Devrim Unal, Mohammad Hammoudeh, Mehmet Sabir Kiraz. Policy specification and verification for blockchain and smart contracts in 5G networks
48 -- 56Nirwan Ansari, Liang Zhang 0011. Flexible backhaul-aware DBS-aided HetNet with IBFD communications
57 -- 61Sangsung Park, Sunghae Jun. Technological cognitive diagnosis model for patent keyword analysis
62 -- 65Dongeun Suh, Seokwon Jang, Sol Han, Sangheon Pack, Xiaofei Wang 0001. Flexible sampling-based in-band network telemetry in programmable data plane