Abstract is missing.
- Adaptive Parent Change and Cell Usage Aware Objective Function for RPL in 6TiSCH NetworkDzaky Zakiyal Fawwaz, Sang-Hwa Chung. 1-6 [doi]
- A Study of Communication Quality Estimation Methods for LTE Using Communication Indexces Considering Time VariabilityKeisuke Kikuchi, Takeo Fujii. 1-6 [doi]
- Dynamic Network Slicing Control Framework in AI-Native Hierarchical Open-RAN ArchitectureJongwon Han, Minhyun Kim, Jung-Mo Moon, Jeongho Kwak. 7-10 [doi]
- Temporal Adaptive Clustering for Heterogeneous Clients in Federated LearningSyed Saqib Ali, Ajit Kumar 0001, Mazhar Ali, Ankit Kumar Singh, Bong Jun Choi 0001. 11-16 [doi]
- SRT-based cooperative video transmission protocol for inspection of small diameter sewer pipes using multiple drifting wireless camerasYuto Shimizu, Thanh V. Pham, Susumu Ishihara. 17-22 [doi]
- RIVER: A Bio Inspired Routing Protocol For High Data Rate Wireless Sensor NetworksV. Geetha, Priya Malik, Sowmya Kamath S.. 23-28 [doi]
- Model Creation Method for Anomaly Detection in Refrigeration and Air Conditioning SystemsToshiaki Hirata, Yusuke Kuriyama, Takashi Hinohara, Sumiei Takahashi, Kenichi Yoshida, Toshiro Ogasawara, Masaaki Go. 29-34 [doi]
- Stationary Human Detection Method by 2D-LiDARsHaruki Mochizuki, Takuya Watanabe, Masayuki Horii, Yoshiaki Terashima, Ryozo Kiyohara. 35-38 [doi]
- Enhanced GraphSAGE for Multi-Class Intrusion DetectionHong-Dang Le, Minho Park 0001. 39-41 [doi]
- Synergistic Formulaic Alpha Generation for Quantitative Trading based on Reinforcement LearningHong-Gi Shin, Sukhyun Jeong, Eui-Yeon Kim, Sungho Hong, Young-Jin Cho, Yong-Hoon Choi. 42-46 [doi]
- D-ACO/GA - A bio-inspired strategy for feature selection in anomaly traffic detection in smart Internet of Things environmentsAnt. Helder G. L. Júnior, Joaquim Celestino Jr., Gustavo Campos. 47-52 [doi]
- Internet of Things Empowerment: Enhancing Healthcare Access for Deaf PatientsZerihun Huruy Negash, Tho Minh Duong, Biruk Abrhame, Sungoh Kwon. 53-56 [doi]
- GNN-based Ethereum Smart Contract Multi-Label Vulnerability DetectionYoo-Young Cheong, La Yeon Choi, Jihwan Shin, Taekyung Kim, Jinhyun Ahn, Dong-Hyuk Im. 57-61 [doi]
- A Visual-Identification based Forwarding Strategy with Road Junction in Vehicular Named Data NetworkingMinh Quan Ngo, Satoshi Ohzahata, Ryo Yamamoto. 62-67 [doi]
- Joint Power control and Resource sharing for 5G-V2X communication in Cellular NetworksJaved Akhter, Ranjay Hazra, Mansi Rastogi. 68-73 [doi]
- Indoor Wireless Environment Visualization for Smart FactoriesHayato Mukasa, Koshiro Aruga, Takeo Fujii, Koichi Adachi. 74-77 [doi]
- Enhance the multipath connection using AF XDP socketsBa Que Le, Mathias Santos de Brito, Elena-Ramona Modroiu, Marius Corici, Thomas Magedanz. 78-83 [doi]
- Simplifying Network Orchestration using Conversational AIDeven Panchal, Prafulla Verma, Isilay Baran, Dan Musgrove, David Lu. 84-89 [doi]
- Investigation of Serverless Consumption and Performance in Multi-Access Edge ComputingKien Nguyen, Frank Loh, Kiem Nguyen, Chau Nguyen, Nguyen Huu Thanh 0001, Tobias Hoßfeld. 90-95 [doi]
- Social Network Science Approaches for Disease Named Entity Recognition and ExtractionSarvesh Joshi, Sowmya Kamath S. 96-101 [doi]
- Precipitation Nowcasting with Graph Neural Network and Gated Recurrent UnitsSoobin Park, Yoonhyuk Choi, Chong-kwon Kim. 102-107 [doi]
- Index Modulated Spectral Efficient Frequency Division Multiplexing Assisted by Lower Order ModulationsMuhammad Sajid Sarwar, Soo Young Shin. 108-113 [doi]
- GRadient sharing A3C for Adaptive Bitrate (GRAAB): A DRL Based Approach for Adaptive Video StreamingMandan Naresh, Paresh Saxena, Manik Gupta. 114-119 [doi]
- A Simple Performance Model of IEEE 802.11 WLAN with Arbitrary Buffer Size and Traffic LoadShinnazar Seytnazarov, Dong Geun Jeong, Wha Sook Jeon. 120-125 [doi]
- Vertical Handover Algorithm in OpenAirInterface and Neural Network for 4G and 5G Base StationsMla Vilakazi, Thomas O. Olwal, Luzango Pangani Mfupe, Albert A. Lysko. 126-131 [doi]
- Resource control of access networks responding to a dynamic change in application requirementsSeiji Kozaki, Hiroshi Mineno, Yuta Tachikawa, Ryo Murakami, Yuuki Hatanaka, Tetsuya Yokotani, Takeshi Suehiro, Kenichi Nakura, Satoshi Shirai. 132-137 [doi]
- Enhancing Energy Efficiency in Underlay Cellular Networks: Leveraging Deep Learning for Full-Duplex SWIPT-based D2D CommunicationsKimchheang Chhea, Sothearath Meng, Jung-Ryun Lee. 138-6 [doi]
- Carrier Sensing Transmission Technique Study for Performance Improvement in Optical Data Center NetworksPeristera A. Baziana. 144-149 [doi]
- Design and Implementation of an active safety system for Vehicular Ad-Hoc Networks(VANETs)Halimjon Hujamatov, Debasis Das 0001, Amir Lazarev, Ernazar Reypnazarov, Doston Khasaniv, Ankur Nahar. 150-155 [doi]
- Proactive Network Traffic Prediction using Generative Adversarial NetworkGyurin Byun, Van Vi Vo, Syed M. Raza, Duc Tai Le, Huigyu Yang, Hyunseung Choo. 156-159 [doi]
- Highly Isolated Y-shape Two-Port THz Antenna Based on Hybrid Decoupling StructurePraveen Kumar, Tanweer Ali, Manohara Pai M. M.. 160-164 [doi]
- Research Reviews on Network-based Congestion ControlYeunwoong Kyung, Jaewook Lee 0002, Seokwon Jang, Haneul Ko, Seungmin Oh, Jaehwan Lee, Youngjun Kim. 165-167 [doi]
- In-Orbit Aggregator-Empowered Federated Learning Framework for Satellite and Terrestrial-Integrated NetworksHongrok Choi, Hochan Lee, Dongkyun Ryoo, Heewon Kim, Haneul Ko, Sangheon Pack. 168-172 [doi]
- Decentralized and Versatile Edge Encoding Methods for Task-Oriented Communication SystemsHoon Lee, Seung Wook Kim. 173-175 [doi]
- Development on Open-RAN Simulator with 5G-LENAJaewook Lee, Soojung Jung, Seung-Eun Hong, Hoon Lee. 176-178 [doi]
- Reviews on UAV-Enabled Wireless Communication Networks with AI-Driven ManagementYoungjun Kim, Seungmin Oh, Jaehwan Lee, Taekook Kim, Yeunwoong Kyung. 179-181 [doi]
- Improving the Multimodal Classification Performance of Spiking Neural Networks Through Hyper-Parameter OptimizationJinseon Park, Choong Seon Hong. 182-186 [doi]
- Dissecting Mixed-Sample Data Augmentation Models via Neural-concept AssociationSoyoun Won, Sung-Ho Bae, Seong-Tae Kim. 187-190 [doi]
- An Empirical Design and Implementation of Job Scheduling Enhancement for Kubernetes ClustersVan-Binh Duong, Duong Phung-Ha, Jangwon Lee, Younghan Kim 0002. 191-196 [doi]
- Efficient Adaptive Batching of DNN Inference Services for Improved LatencyOsama Khan, Junyeol Yu, Yeonjae Kim, Euiseong Seo. 197-200 [doi]
- VPP-based Hybrid Connectivity Technology to Support Large-scale Metaverse ServicesJian Jeong, Gyulim Oh, Sumin Son, Eui-nam Huh. 201-204 [doi]
- Analysis of Byzantine Fault Tolerant Consensus AlgorithmsMingyu Jo, Donghyeon Kim, Sangoh Park. 205-207 [doi]
- Salinity Prediction Of Raw Water Using Deep Learning Based Time Series ModelDuc-Tam Huynh, Trong-Hop Do. 208-213 [doi]
- A Survey on Semantic Communications System Based on Multi-modal DataThwe Thwe Win, Dongwook Won, Quang Tuan Do, Junsuk Oh, Thi-Thu-Hien Pham, Jeongyeup Paek, Sungrae Cho. 214-217 [doi]
- Accelerating Federated Learning at Programmable User Plane Function via In-Network AggregationChanbin Bae, Hochan Lee, Sangheon Pack, Youngmin Ji. 218-220 [doi]
- Predicting Channel Quality Indicators through Deep Learning: A Location-Aware Approach Utilizing Limited Network ParametersHarun Ur Rashid, Seong-Ho Jeong. 221-226 [doi]
- In-network congestion control toward enhanced network resource utilizationMitsuhiro Watanabe, Go Hasegawa. 227-232 [doi]
- Intelligent Data Forwarding Scheme for LoRa based Fog Enabled Smart AgricultureMayank Vyas, Garv Anand, Sanjeet Kumar Nayak, Ramanarayan Yadav. 233-238 [doi]
- Proximal Policy Optimization for Energy-Efficient MEC Systems with STAR-RIS AssistancePyae Sone Aung, Sun-Moo Kang, Choong Seon Hong. 239-244 [doi]
- Reinforcement Learning for Joint Transmit-Sleep Scheduling in Energy-harvesting Wireless Sensor NetworksHrishikesh Dutta, Amit Kumar Bhuyan, Subir Biswas. 245-250 [doi]
- Integrating Netfilter into SRv6 Routing Infrastructure of Linux as an SR-Aware Network FunctionKaito Sawada, Ryo Nakamura, Keisuke Uehara. 251-256 [doi]
- Advanced Trajectory Privacy Protection with Attention Mechanism and Auxiliary Classifier Generative Adversarial NetworksJihwan Shin, Yeji Song, Yoo-Young Cheong, Jinhyun Ahn, Taewhi Lee, Dong-Hyuk Im. 257-261 [doi]
- Load Distribution and Service Time Analysis of a Vehicular Edge Computing SystemThone Thone Win Maw, Hoon Choi. 262-267 [doi]
- Strategic Predictions and Explanations By Machine Learning : The Prediction Model of Credit Default Swaps for the Telecommunication Service SectorCaesar Wu, Jian Li, Jingjing Xu, Pascal Bouvry. 268-273 [doi]
- Odd-Order Variable-Bandwidth Digital Filter Using Lp-Norm-Error MinimizationTian-Bo Deng. 274-278 [doi]
- Reinforcement Learning Aided Secure UAV Communications against Roaming AdversariesGongchao Su, Mingjun Dai, Bin Chen, Xiaohui Lin 0001. 279-283 [doi]
- Survey on Cell-Free Massive MIMO with Limited FronthaulChihyun Song, Jaemin Kim, Jeongyeup Paek, Jung-Hyok Kwon, Sungrae Cho. 284-286 [doi]
- A Review on Research Trends of Optimization for Client Selection in Federated LearningJaemin Kim, Chihyun Song, Jeongyeup Paek, Jung-Hyok Kwon, Sungrae Cho. 287-289 [doi]
- Optimal Resource Allocation for NOMA-Assisted Backscatter Communication in 6G Internet of Vehicles NetworksVan-Dat Tuong, Dongwan Kim, Eui Jik Kim, Jeongyeup Paek, Sungrae Cho. 290-294 [doi]
- DRL-Enabled RSMA-Assisted Task Offloading in Multi-Server Edge ComputingTri-Hai Nguyen, Heejae Park, Mucheol Kim, Laihyuk Park. 295-298 [doi]
- New RSA-Based Public Key Encryption with Authorized Equality TestChanhyeok Park, Seongbong Choi, Yongseok Son, Jeongyeup Paek, Sungrae Cho, Hyung Tae Lee. 299-304 [doi]
- AI-Generated Bidding for Immersive AIGC Services in Mobile Edge-Empowered MetaverseZi Qin Liew, Minrui Xu, Wei Yang Bryan Lim, Dusit Niyato, Dong In Kim. 305-309 [doi]
- Cloud5GC : Design and implementation of scalable and stateless mobile core system on public cloudKunio Akashi, Seiichi Yamamoto, Haruki Sakurai, Koki Ito, Tomohiro Ishihara, Takuji Iimura, Yuji Sekiya, Hiroki Watanabe, Keiichi Shima, Katsuhiro Horiba. 310-315 [doi]
- Accelerating Contextualization in AI Large Language Models Using Vector DatabasesRaad Bin Tareaf, Mohammed AbuJarour, Tom Engelman, Philipp Liermann, Jesse Klotz. 316-321 [doi]
- Revolutionizing Credit Risk: A Deep Dive into Gradient-Boosting Techniques in AI-Driven FinanceRaad Bin Tareaf, Mohammed AbuJarour, Fabian Zinn. 322-327 [doi]
- Private Blockchain Interoperability: a Case Study of Interoperable Verification for Professional Assessment CertificationThada Jaipradite, Narongrit Waraporn, Pichet Limvachiranan. 328-333 [doi]
- Performance Analysis of Full Duplex Wireless Network with Interference - A More Realistic ModelGeorgino Da Silva Baltazar, José Marcos Câmara Brito. 334-339 [doi]
- Performance of Self-Interference Canceller in SDRBased Full-Duplex SystemTakumi Yasaka, Kazuma Matsushima, Fuahi Hatsuku, Satoshi Suyama, Hiroyuki Otsuka. 340-344 [doi]
- Communication Multiplexing of Server with QUIC and SDN in Multihomed NetworksTomoya Kawana, Rei Nakagawa, Nariyoshi Yamai. 345-350 [doi]
- Design and Implementation of Persuasive Public Wi-Fi to Derive Prosocial Network UsageNaoki Eguchi, Hyuckjin Choi, Yugo Nakamura, Shogo Fukushima, Yutaka Arakawa. 351-356 [doi]
- Throughput performance of local 5G downlink in SU-MIMO under outdoor environmentsHiroki Urasawa, Hayato Soya, Kazuhiro Yamaguchi, Hideaki Matsue. 357-362 [doi]
- A Game Engine-Based Visualizer for ns-3 SimulationsHyeokjae Lee, Woochan Yoon, Hyogon Kim. 363-366 [doi]
- Buffer Architecture Study for Effective Service of Time-Sensitive Traffic in Intra-rack Optical Data Center NetworksDavid Georgantas, Peristera A. Baziana. 367-372 [doi]
- Network State Estimation by Spectral Analysis of Passively Measured TCP FlowsKenta Murayama, Yasuo Okabe. 373-378 [doi]
- CPCache: Cooperative Popularity based Caching for Named Data NetworksNeminath Hubballi, Pankaj Chaudhary. 379-384 [doi]
- BalanceNet Orchestrator: A KQV-based Dynamic Task Allocation for Distributed Deep LearningTeh-Jen Sun, Thien-Thu Ngo, Eui-nam Huh. 385-390 [doi]
- Privacy-preserving Revocation of Verifiable Credentials with Verifiable Random FunctionsAthanasia Maria Papathanasiou, George C. Polyzos. 391-394 [doi]
- Graph Embedding for Graph Neural Network in Intrusion Detection SystemDinh-Hau Tran, Minho Park. 395-397 [doi]
- Global Model Privacy Protection Mechanism in Federated LearningAjit Kumar, Bong Jun Choi 0001. 398-402 [doi]
- Cost-efficient Blockchain-based e-KYC Platform using Biometric verificationSahil Bhatia, Lokendra Vishwakarma, Debasis Das 0001. 403-408 [doi]
- Differentially-Private Data Aggregation over Encrypted Location Data for Range Counting QueryTaisho Sasada, Nesrine Kaaniche, Maryline Laurent, Yuzo Taenaka, Youki Kadobayashi. 409-414 [doi]
- Glimpse: A Multimodal-based Transforming Image Collection with Vector DatabaseHuu-Tuong Ho, Minh-Tien Pham, Quang-Duong Tran, Quang-Huy Pham, Luong Vuong Nguyen. 415-420 [doi]
- A Review on FSO/RF based Satellite-Aerial-Ground Communication SystemsAyalneh Bitew Wondmagen, Demeke Shumeye Lakew, Anh-Tien Tran, Jeongyeup Paek, Sungrae Cho. 421-425 [doi]
- NOMA-Enhanced Intelligent Semantic Communication Networks using Deep Reinforcement LearningThanh Phung Truong, Donghyeon Hur, Junsuk Oh, Donghyun Lee, Dongwook Won, Jeongyeup Paek, Sungrae Cho. 426-428 [doi]
- Enhancing Wireless Data Transmission: A GAN-based Approach for Time Series Data RestorationDaejin Han, Woongsoo Na. 429-433 [doi]
- Effect of Aggressive Evacuation Behavior Associated with Information-Sharing Using a DTN on Evacuation TimeHikaru Naito, Mineo Takai, Susumu Ishihara. 434-439 [doi]
- Trajectory-Aware UAV-Enabled WPT Networks Based Grid World DRL ApproachSengly Muy, Vitou That, Jung-Ryun Lee. 440-445 [doi]
- Network Coding in TDMA-based Scheduling for Fluctuating Linear Wireless Sensor NetworksNguyen Viet Ha 0002, Tran Thi Thao Nguyen, Nguyen Truong Giang, Masato Tsuru. 446-451 [doi]
- Digital Twins for Autonomous Driving: A Comprehensive Implementation and DemonstrationKui Wang, Tao Yu, Zongdian Li, Kei Sakaguchi, Omar Hashash, Walid Saad. 452-457 [doi]
- Characteristics of LoRaWAN with Energy Detection Based Carrier SenseShusuke Narieda, Takeo Fujii. 458-462 [doi]
- Trusted Access Mechanism of Field Device in Industrial Edge Computing EnvironmentTao Yu, Min Wei, Feng Xiao, Haoyue Yang. 463-468 [doi]
- Revisiting Secure Multi-Server Oblivious RAMsChaewon Kwak, Kangmo Ahn, Changhee Hahn, Dongyoung Koo, Junbeom Hur. 469-472 [doi]
- Cross-Layer Authentication and Physical Layer Authentication in Internet-of-Things: A Systematic Literature ReviewMahsa Mohaghegh, Vicky Ngo. 473-477 [doi]
- ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's SignificanceBaraq Ghaleb, Ahmed Al-Dubai 0001, Imed Romdhani, Jawad Ahmad 0001, Talal Aldhaheri, Sonali Kulkarni. 478-483 [doi]
- Dynamic VLAN Assignment for Local Users Under External IdP Management in RADIUS-Based Wi-Fi RoamingYasuo Okabe, Motonori Nakamura, Hideaki Goto. 484-489 [doi]
- A Comparative Approach to Detecting COVID-19 Fake News through Machine Learning ModelsZyad Al-Azazi, Ramzi A. Haraty. 490-495 [doi]
- Efficient and Effective INR: A Dive into Levels-of-Experts (LoE) and Sine ActivationMd. Atikuzzaman, Sung-Ho Bae. 496-499 [doi]
- MERSA: Multimodal Emotion Recognition with Self-Align EmbeddingQuan Bao Le, Kiet Tuan Trinh, Nguyen Dinh Hung Son, Phuong-Nam Tran 0001, Cuong Tuan Nguyen, Duc Ngoc Minh Dang. 500-505 [doi]
- Backdoor Trigger Detection Using Adversarial Perturbation for Deep-learning Phishing DetectorKoko Nishiura, Tomotaka Kimura, Jun Cheng 0001. 506-508 [doi]
- DGA-based Intrusion Detection System using Federated Learning Method on Edge DevicesNguyen Ngoc Minh, Pham Trung Hieu, Vu Hai, Nguyen Huu Thanh. 509-514 [doi]
- Location as a service with a MEC architectureChristopher Schahn, Jorin Kouril, Bernd Schäufele, Ilja Radusch. 515-520 [doi]
- Locker-Scale Positioning and Dynamic Access Key Management for IoT-based Smart Delivery ServicesWoojin Park, Hye Young An, Soochang Park, Euisin Lee. 521-525 [doi]
- Voice Over LoRa™Francis Kagai, Philip Branch, Jason But, Rebecca Allen. 526-531 [doi]
- Life Cycle Automation of IoT Services over Multiple Edge CloudsMafeni Vitumbiko, Younghan Kim. 532-536 [doi]
- Access control of IoT devices based on smart contracts and double-layer channelsHélio Salomao Pesanhane, Fernando Luiz Koch, Carlos Becker Westphall. 537-542 [doi]
- Fast and Efficient Vehicle-to-Vehicle Message Dissemination Protocol under MobilityWoongsoo Kim, Junhong Min, Sungrae Cho, Jeongyeup Paek. 543-545 [doi]
- Real-time E-Commerce Comment Classification Using Big Data ProcessingBinh-Hau Tran, Trong-Hop Do. 546-549 [doi]
- Terahertz time-domain spectroscopy system for deflected and reflected metasurfaceJunho Ryeom, Geunchang Choi. 550-552 [doi]
- Autoencoder-based Data Compression Model Experiment for Semantic CommunicationJinyoung Oh, Yunkyung Choi, Chanyoung Oh, Woongsoo Na. 553-556 [doi]
- A Miniaturized Dual-Band Antenna for 5G mm-Wave ApplicationsDaud Khan, Ashfaq Ahmad 0003, Jawad Ali, Yun Hwang Lee, Dong-You Choi. 557-559 [doi]
- An Experimental Evaluation of Air-to-Air MIMO Transmission in Wireless LAN Relay Systems Using DronesShion Kawabe, Hiraku Okada, Chedlia Ben Naila, Masaaki Katayama. 560-564 [doi]
- Investigation on Information Set Optimization of Neural Network Decoders Suitable for Polar and Convolutional Polar CodesYuto Nakamura, Satoshi Suyama, Satoshi Nagata, Nobuhiko Miki. 565-570 [doi]
- Producer Mobility Support in 5G-ICNMin Wook Kang, Yun Won Chung. 577-580 [doi]
- Minimum Steiner Tree Approximation for Extracting Unknown Information via Avoiding High-Centrality NodesRintaro Nishiyama, Andrew Shin, Naoki Matsumoto, Kunitake Kaneko. 581-586 [doi]
- DRL-Based Distributed Joint Serving and Charging Scheduling for UAV SwarmHsiao-Chi Chen, Li-Hsing Yen. 587-592 [doi]
- Digital Twin-Based Transfer Learning for Collaborative Robot Systems: A Proof of ConceptSupat Roongpraiwan, Zongdian Li, Mohsen Pourghasemian, Haris Gacanin, Kei Sakaguchi. 593-598 [doi]
- A Study on Flight Route Optimization of UAV Air Base StationYujie Li, Sang-Chul Kim. 599-602 [doi]
- An Efficient Content Retrieval and Content Placement Approach for Named Data NetworksMatta Krishna Kumari, Nikhil Tripathi. 603-608 [doi]
- Implications of Object-Based Audio Personalisation Controls For Dialogue Intelligibility and Broadcast LoudnessZeeshan Khattak, Waqas ur Rahman, Ian Williams. 609-613 [doi]
- Logical Space Composition of IoT for a Scalable and Adaptable Smart EnvironmentHye Young An, Woojin Park, Soochang Park, Euisin Lee. 614-618 [doi]
- Dynamic Resource Allocation for Streaming Services using Deep Reinforcement Learning: User-Centric Approach to Mobile UsageHa Eun Song, Yu Min Park, Choong Seon Hong. 619-624 [doi]
- Comparative performance study of DBN, LSTM, CNN and SAE models for wind speed and direction forecastingRégis Donald Hontinfinde, K. B. Audace Didavi, Mahugnon Géraud Azehoun Pazou, Faith Y. P. J. Houessou, Christian Djidjoho Akowanou, Macaire B. Agbomahena. 625-630 [doi]
- On Using Genetic Algorithm for Optimal Controller Placement in Software-Defined NetworksEmmanuel Asamoah, Ampratwum Isaac Ampratwum, Amiya Nayak. 631-636 [doi]
- Analysis of Deep Neural Network based Road Distance EstimationJinsoo Moon, Sanghwan Lee. 637-640 [doi]
- Building a 5G Core Network Testbed: Open-Source Solutions, Lessons Learned, and Research DirectionsLinh-An Phan, Dirk Pesch, Utz Roedig, Cormac J. Sreenan. 641-646 [doi]
- Novel Multi-Layer Ensemble Algorithm for Fall Detection using wrist-worn devicesPurab Nandi, K. R. Anupama, Arav Jain, Siddharth Paliwal, OM Tayal, Himanish Agarwal. 647-652 [doi]
- Mobility-aware Service Migration in MEC SystemTuan Phong Tran, Myungsik Yoo. 653-656 [doi]
- Perceptual Image Encryption: A Communication PerspectiveIjaz Ahmad 0002, Seokjoo Shin. 657-660 [doi]
- A Secure and Energy-Efficient Cross-Layer Framework for Internet of ThingsRashid Mustafa, Nurul I Sarkar, Mahsa Mohaaghegh, Shahbaz Pervez. 661-666 [doi]
- Implementation of Digital Twinning of Multiple Sensors on a Cloudlet System built using Qualcomm Snapdragon 410cManoj Subhash Kakade, Anupama Karuppiah, Swarnab Garang, Gaurav Basu, Aryan Bhosale, Ansh Bansal. 667-672 [doi]
- A Study on Non-Orthogonal Multiple Access with Stored Device-to-Device Communication in Cellular SystemsMasahiro Mizuno, Osamu Takyu. 673-677 [doi]
- DevoX: Deep Voice Detection MLOps Framework for Crime Prevention in the Core-Edge CloudYuri Seo, Hyeon-ki Jo, Seol Roh, Teh-Jen Sun, Seung-Woo Jeong, HakHo Kim, Thien-Thu Ngo, Eui-nam Huh. 678-682 [doi]
- Reinforcement Learning based Matching for Decentralized Task Offloading in Fog Computing NetworksHoa Tran-Dang, Dong-Seong Kim 0002. 683-688 [doi]
- Evaluation of Transmission Performance for Streaming CGH Video based on Computer Holography and Electro-HolographyKazuhiro Yamaguchi, Misato Onishi, Yuji Sakamoto. 689-694 [doi]
- ESSDet: Enhancing Spatial Shape for 3-D Object DetectionHiep Anh Hoang, Myungsik Yoo. 695-698 [doi]
- A Novel Approach for Energy-Efficient Communication in a Constrained IoT EnvironmentShreeram Hudda, Kotakula Haribabu, Rishabh Barnwal. 699-704 [doi]
- A Plug&Play Scheme of GPIO Sensors/Actuators in Linux PlatformsChi-Hwa Song, Ji-Hoon Kyung, Seongbae Eun. 705-707 [doi]
- A K-means Clustering Based Under-Sampling Method for Imbalanced Dataset ClassificationChih-Ming Huang, Chuan-Sheng Hung, Yao-Yuan Hsu, You-Cheng Zheng, Cheng-Han Yu, Chun-Hung Richard Lin, Shi-Huang Chen. 708-713 [doi]
- An Intent-Driven Management Automation for 5G Mobile NetworksYoseop Ahn, Jaehoon Paul Jeong. 714-719 [doi]
- Using Artificial Intelligence (AI) for Monitoring and Diagnosing Electric Motor Faults Based on Vibration SignalsVan Nam Pham, Quang-Huy Do Ba, Duc-Anh Tran Le, Quang Minh Nguyen, Thanh-Lam Bui, Alberto Ernesto Coboi. 720-725 [doi]
- Multi-UAVs Strategies for Ad Hoc Network with Multi-Agent Reinforcement LearningGeorge Karimata, Jin Nakazato, Gia Khanh Tran, Katsuya Suto, Manabu Tsukada, Hiroshi Esaki. 726-729 [doi]
- Improving BERT-based FAQ Retrieval System using Query, Question and Answer SimultaneouslyHyunsoo Cho, Jiwon Choi, Changju Noh, Kwang-Hyun Park. 730-734 [doi]
- A Multi-Feature-Based Multi-Task Loss Approach for Enhanced Monocular Depth EstimationYeaShuan Huang, Yuxiang Chen, Chang-Wu Yu. 735-739 [doi]
- An Energy Efficient Data Transmission Approach in Smart IoT SystemsShreeram Hudda, K. Haribabu 0001, Vikas Balani. 740-745 [doi]
- Optimization of Player-Combinations in Multiplayer GamesKuka Toda, Shuta Inoue, Yoshito Tobe. 746-750 [doi]
- Optimization of End-to-End Throughput on Piggyback Network with drone-to-drone millimeter-wave communicationsTatsuya Aida, So Hasegawa, Maki Arai, Ryosuke Isogai, Yozo Shoji, Mikio Hasegawa. 751-755 [doi]
- ProAdaFS: Probabilistic and Adaptive Feature Selection in Deep Recommendation SystemsHyston Kayange, Jonghyeok Mun, YoHan Park, Jongsun Choi, Jaeyoung Choi. 756-761 [doi]
- Personalized Federated Learning via Deviation Tracking Representation LearningJaewon Jang, Bongjun Choi. 762-766 [doi]
- Fuzzy Logic and AI-Powered, SDR Relay for Secure and Efficient Cooperative Radio CommunicationSrikar Bhamidipati, Sainath Bitragunta, Ashuthosh Bhatia. 767-772 [doi]
- Accelerating Convolutional Neural Network Inference in Split Computing: An In-Network Computing ApproachHochan Lee, Haneul Ko, Chanbin Bae, Sangheon Pack. 773-776 [doi]
- Exploring the Diversity of Multiple Job Deployments over GPUs for Efficient Resource SharingTheodora Adufu, Jiwon Ha, Yoonhee Kim. 777-782 [doi]
- Real-World Antivirus Evaluation Methodology: Applying Modern Criteria for Assessing Antivirus FunctionalityYoungrak Ryu, Kangsik Shin, Jeongho Lee, Dong-Jae Jung, Ho Mook Cho. 783-788 [doi]
- Role of Quality Assurance in Low-Code/No-Code ProjectsD. I. De Silva, R. Shangavie, R. A. A. L. Ranathunga. 789-794 [doi]
- Malicious URL and Intrusion Detection using Machine LearningAmr Hamza, Farah Hammam, Medhat Abouzeid, Mohammad Arsalan Ahmed, Salam Dhou, Fadi A. Aloul. 795-800 [doi]
- Stress Detection at Workplace by Multimodal AnalysisSnigdha Mondal, Arush Tripathi, Debasis Das 0001. 801-806 [doi]
- Cyber Attack Defense: DID-based Email Security SystemHan-Su Oh, Ki-Hyung Kim. 807-811 [doi]
- An Analysis of Licensed Shared Access Use in Brazil - Advantages and ChallengesNicole Souza, José Marcos Câmara Brito. 812-817 [doi]
- Unidirectional Communication Model for Hyper-Low Latency in 6G NetworksHaydar Çukurtepe. 818-823 [doi]