INTERNATIONAL JOURNAL

BlockChain
1-1.jpg

Unauthorized UAV Localization

1-2.jpg

Pure Wallet

5aa9850a-e3b3-4628-b482-0ec69caac229.pdf-0001.jpg

Block chain-based
Data Sharing Method Patent

블록4.jpg

Pure Wallet
Trademark Rights

Metaverse
5-1.jpg

Intelligent Transportation Systems

5-2.jpg

Artificial Intelligence

5-3.jpg

Applications and Limitations

a385768a-9903-4166-8e1e-18b9bd90c956.pdf-0001.jpg

Security in Metaverse

6dd12480-7ad8-4f53-ba81-cf351bc1d251.pdf-0001.jpg

Recognition Model

AI
2-1.jpg

Low-power and Lossy

2-2.jpg

Smart Health

2-3.jpg

Automatic Modulation Classification

2-4.jpg

Accurate LPI Radar
Waveform Recognition

2-5.jpg

MIMO-OFDM Modulation Classification

2-6.jpg

UAVs Detection and Identification

DDS
3-1.jpg

Dynamic Bloom Filters

3-2.jpg

Real-Time Monitoring Tool

dds3.png

Industrial Sensors and Controls
in Communication Networks

dds4.jpg

Basics and Application
of Real-time Middleware DDS

dds5.jpg

Industrial Network System:
From Firmware to IoT

dds6.jpg

Military Real-time Networks

Smart Factory
4-1.jpg

Adaptive LRFU Replacement Policy

4-2.jpg

optimizations
and
end-to-end delay in WSN

4-3.jpg

Dual Fieldbus Industrial IoT Networks

4-4.jpg

Faulty Node Detection

4-5.jpg

Fog Resource Adaptive Task Offloading

4-6.jpg

Parked Vehicle-assisted
Multi-access Edge Computing