Digital Library

Vol. 44, No. 8, Aug. 2019



Distributed Beamforming Based on One-bit Feedback in Interference Channel

Yong-Gi Hong  Jonghyeok Lee  Jaehyun Park
Vol. 44, No. 8, pp. 1460-1466, Aug. 2019
10.7840/kics.2019.44.8.1460

Polar Multilevel On-Off Keying in NOMA

Kyuhyuk Chung
Vol. 44, No. 8, pp. 1467-1472, Aug. 2019
10.7840/kics.2019.44.8.1467

How can Perfect SIC NOMA Be Implemented?

Kyuhyuk Chung
Vol. 44, No. 8, pp. 1473-1477, Aug. 2019
10.7840/kics.2019.44.8.1473

Analysis the Effect of MCS Level on Full Duplex WLAN Performance

Jin-Ki Kim  Jae-Hyun Kim
Vol. 44, No. 8, pp. 1486-1492, Aug. 2019
10.7840/kics.2019.44.8.1486

Q-learning Based Downlink MIMO-NOMA Scheme for Vehicle Networks

Jaehee Lee  Giwook Choi  Jaewoo So
Vol. 44, No. 8, pp. 1493-1503, Aug. 2019
10.7840/kics.2019.44.8.1493

Indoor Localization Using Magnetic Field Strength Pattern

Min-gyu Kang  Yeong-jun Im  Soo-jung Hur  Yong-wan Park
Vol. 44, No. 8, pp. 1510-1519, Aug. 2019
10.7840/kics.2019.44.8.1510

State Inference Method through Reverse Engineering for Network Protocols

Tack-hyun Jung  Won-jong Song  Kee-cheon Kim
Vol. 44, No. 8, pp. 1535-1546, Aug. 2019
10.7840/kics.2019.44.8.1535

Dietary Habits Improvement Based on Artificial Intelligence

Youngjun Kim  En Han  Hyekyoung Hwang  Yeongsang An  Jitae Shin

Vol. 44, No. 8, pp. 1576-1587, Aug. 2019
10.7840/kics.2019.44.8.1576

Blockchain Network Configuration for Smart Contract in EV Charging Infrastructure

Chan-Guk Jang  Okyeon Yi
Vol. 44, No. 8, pp. 1597-1604, Aug. 2019
10.7840/kics.2019.44.8.1597

Cryptojacking Attack Using Pastejacking and Defense Method

DongHyun Ko  Seok-Hwan Choi  Seonjin Hwang  Yoon-Ho Choi
Vol. 44, No. 8, pp. 1623-1631, Aug. 2019
10.7840/kics.2019.44.8.1623