Author | Title | Year / issue / article number |
Pal Varga | Signal processing, MIMO and 5G business opportunities – hear the latest in Infocommunications | 2020_3_0 |
Andrei A. Kalshchikov, Vitaly V. Shtykov and Sergey M. Smolskiy | The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion | 2020_3_1 |
Chaofu Jing, Zhongqiang Luo, Yan Chen, and Xingzhong Xiong | Blind anti-collision methods for RFID system: a comparative analysis | 2020_3_2 |
Dániel Szántó, Attila Zoltán Jenei, Miklós Gábriel Tulics and Klára Vicsi | Developing a Noise Awareness Rising Web Application within the “Protect your Ears” Project | 2020_3_3 |
János Ladvánszky | Detection of 2x2 MIMO signals | 2020_3_4 |
Gábor Soós, Dániel Ficzere, Tamás Seres, Sándor Veress and István Németh | Business opportunities and evaluation of non-public 5G cellular networks – a survey | 2020_3_5 |
Botond Tamás Csathó, Bálint Péter Horváth and Péter Horváth | Modeling the near-field of extremely large aperture arrays in massive MIMO systems | 2020_3_6 |
László Jereb | Special Issue on Quality Achievements at BME-VIK with Student Contributions in EFOP-3.6.2-16-013 – Guest Editorial | 2020_2_0 |
Csaba Simon, Markosz Maliosz, Miklós Máté, Dávid Balla and Kristóf Torma | Sidecar based resource estimation method for virtualized environments | 2020_2_1 |
Ádám Marosits, Ágoston Schranz and Eszter Udvary | Amplified spontaneous emission based quantum random number generator | 2020_2_2 |
David Kobor and Eszter Udvary | Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation | 2020_2_3 |
Gergő Ládi, Levente Buttyán and Tamás Holczer | GrAMeFFSI: Graph Analysis Based Message Format and Field Semantics Inference For Binary Protocols, Using Recorded Network Traffic | 2020_2_4 |
Dávid Papp, Zsolt Knoll and Gábor Szűcs | Graph construction with condition-based weights for spectral clustering of hierarchical datasets | 2020_2_5 |
Csongor Pilinszki-Nagy and Bálint Gyires-Tóth | Performance Analysis of Sparse Matrix Representation in Hierarchical Temporal Memory for Sequence Modeling | 2020_2_6 |
István Fábián and Gábor György Gulyás | De-anonymizing Facial Recognition Embeddings | 2020_2_7 |
Levente Alekszejenkó and Tadeusz Dobrowiecki | Adapting IT Algorithms and Protocols to an Intelligent Urban Traffic Control | 2020_2_8 |
Dóra Varnyú and László Szirmay-Kalos | Comparison of Non-Linear Filtering Methods for Positron Emission Tomography | 2020_2_9 |
Péter Baranyi | Special Issue on Cognitive Infocommunications Theory and Applications – Guest Editorial | |
Carl Vogel and Anna Esposito | Interaction Analysis and Cognitive Infocommunications | 2020_1_1 |
Nelson Mauro Maldonato, Benedetta Muzii, Mario Bottone, Raffaele Sperandeo, Donatella Di Corrado, Grazia Isabella Continisio, Teresa Rea, Anna Esposito | Unitas Multiplex. Biological architectures of consciousness | 2020_1_2 |
Masakazu Kanazawa, Atsushi Ito, Kazuyuki Yamasawa, Takehiko Kasahara, Yuya Kiryu and Fubito Toyama | Method to Predict Confidential Words in Japanese Judicial Precedents Using Neural Networks With Part-of-Speech Tags | 2020_1_3 |
Tibor Ujbányi, Attila Kővári, Gergely Sziládi and József Katona | Examination of the eye-hand coordination related to computer mouse movement | 2020_1_4 |
Emőke Kiss, Marianna Zichar, István Fazekas, Gergő Karancsi and Dániel Balla | Categorization and geovisualization of climate change strategies using an open-access WebGIS tool | 2020_1_5 |
Mohammad Moghadasi and Gabor Fazekas | Multiple sclerosis Lesion Detection via Machine Learning Algorithm based on converting 3D to 2D MRI images | 2020_1_6 |
Roman N. Ipanov | Phase-Code Shift Keyed Probing Signals with Discrete Linear Frequency Modulation and Zero Autocorrelation Zone | 2020_1_7 |
Balazs Solymos and Laszlo Bacsardi | Real-time Processing System for a Quantum Random Number Generator | 2020_1_8 |
Vaclav (Vashek) Matyas, Pavol Zajac, Jan Hajny and Marek Sys | Special Issue on Cryptology – Guest Editorial | 2019_4_0 |
Michal Andrzejczak and Wladyslaw Dudzic | SAT Attacks on ARX Ciphers with Automated Equations Generation | 2019_4_1 |
Mithilesh Kumar, Havard Raddum, and Srimathi Varadharajan | Reducing Lattice Enumeration Search Trees | 2019_4_2 |
Pawel Augustynowicz and Krzysztof Kanciak | The search of square m-sequences with maximum period via GPU and CPU | 2019_4_3 |
Pavol Zajac, and Peter Spacek | A New Type of Signature Scheme Derived from a MRHS Representation of a Symmetric Cipher | 2019_4_4 |
Ádám Vécsi, Attila Bagossy, and Attila Pethő | Cross-platform Identity-based Cryptography using WebAssembly | 2019_4_5 |
Zakir Hussain, Asim ur Rehman Khan, Haider Mehdi and Aamir Ali | Performance Analysis of Communication System with Fluctuating Beckmann Fading | 2019_4_6 |
Sara El Gaily and Sándor Imre | Quantum Optimization of Resource Distribution Management for Multi-Task, Multi-Subtasks | 2019_4_7 |
Pal Varga | Indexing current advances with DOI – at the Infocommunications Journal | 2019_3_1 |
Gábor Fodor, László Pap and Miklós Telek | Recent Advances in Acquiring Channel State Information in Cellular MIMO Systems | 2019_3_2 |
Cebrail ÇiFTLiKLi, Musaab AL-OBAIDI, Mohammed FADHIL and Wael AL-OBAIDI | Cooperative OSIC System to Exploit the Leakage Power of MU-MIMO Beamforming based on Maximum SLR for 5G | 2019_3_3 |
Roman N. Ipanov | Polyphase Radar Signals with ZACZ Based on p-Pairs D-Code Sequences and Their Compression Algorithm | 2019_3_4 |
Dmitrii I. Popov and Sergey M. Smolskiy | Synthesis and Analysis Non-recursive Rejection Filters Transient Mode | 2019_3_5 |
Aymen Hasan Alawadi, Maiass Zaher and Sándor Molnár | Methods for Predicting Behavior of Elephant Flows in Data Center Networks | 2019_3_6 |
Yuancheng Li, Guixian Wu and Xiaohan Wang | Deep Web Data Source Classification Based on Text Feature Extension and Extraction | 2019_3_7 |
Pal Varga | Impactful Surveys for the 70th Anniversary of HTE | 2019_2_0 |
Dorottya Papp, Kristóf Tamás and Levente Buttyán | IoT Hacking – A Primer | 2019_2_1 |
Laszlo Gyongyosi, Laszlo Bacsardi and Sandor Imre | A Survey on Quantum Key Distribution | 2019_2_2 |
Eszter Udvary | Visible Light Communication Survey | 2019_2_3 |
Sándor Rácz, Géza Szabó and József Pető | Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks | 2019_2_4 |
Zoltán Jakó, Ádám Knapp and Nadim El Sayed | Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication | 2019_2_5 |
Gazi Zahirul Islam and Mohammod Abul Kashem | An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax | 2019_2_6 |
Máté Nagy, János Tapolcai and Gábor Rétvári | R3D3: A Doubly Opportunistic Data Structure for Compressing and Indexing Massive Data | 2019_2_7 |
Pál Varga | Infocommunications Journal: over 10 years – HTE: over Seven Decades | 2019_1_0 |
Ani Bicaku, Christoph Schmittner, Patrick Rottmann, Markus Tauber and Jerker Delsing | Security Safety and Organizational Standard Compliance in Cyber Physical Systems | 2019_1_1 |
Dimitris Kanellopoulos | Inter-destination Multimedia Synchronization: A Contemporary Survey | 2019_1_2 |
Cebrail Çiflikli and Musaab Alobaidi | Combining Alamouti Scheme with Block Diagonalization Beamforming precoding for 5G Technology over Rician Channel | 2019_1_3 |
Gang Qiao, Zeeshan Babar, Lu Ma and Xue Li | Cost Function based Soft Feedback Iterative Channel Estimation in OFDM Underwater Acoustic Communication | 2019_1_4 |
Zhongqiang Luo, Wei Zhang, Lidong Zhu and Chengjie Li | Minimum BER Criterion Based Robust Blind Separation for MIMO Systems | 2019_1_5 |
Sergey Smolskiy and Alexander Bortsov | Opto-Electronic Oscillator with Mach-Zender Modulator | 2019_1_6 |
Roland Szabo and Aurel Gontean | Sun Tracker Robotic Arm Optical Distance Measurement Evaluation at Different Positions Using Six Sigma Tools | 2019_1_7 |
Eszter Udvary | Selected papers of the CSNDSP 2018 conference | 2018_4_0 |
Tongyang Xu, Hedaia Ghannam and Izzat Darwazeh | Practical Evaluations of SEFDM: Timing Offset and Multipath Impairments | 2018_4_1 |
Husam Al-Amaireh and Zsolt Kollár | Overview and Complexity Evaluation of FBMC Transmitter Architectures | 2018_4_2 |
Róbert Horváth, Jean-François Roux, Julien Poëtte and Béatrice Cabon | Optoelectronic mixer with a photoconductive switch for 1550 nm wavelengths | 2018_4_3 |
Yahiea Al Naiemy, Taha Elwi, Lajos Nagy and Thomas Zwick | A Systematic Analysis and Design of a High Gain Microstrip Antenna based on a Single EBG Layer | 2018_4_4 |
Balázs Matolcsy and Attila Zólomy | Overcoming the Realization Problems of Wideband Matching Circuits | 2018_4_5 |
József Varga, Attila Hilt, József Bíró, Csaba Rotter and Gábor Járó | Reducing operational costs of ultra-reliable low latency services in 5G | 2018_4_6 |
László Bacsárdi and Kálmán Kovács | Featured papers of the H-SPACE 2018 conference | 2018_3_0 |
Bernard Adjei-Frimpong and László Csurgai-Horváth | Using Radio Wave Satellite Propagation Measurements for Rain Intensity Estimation | 2018_3_1 |
Andrea Farkasvölgyi and István Frigyes | Optical transfer in space communication | 2018_3_2 |
Máté Galambos and László Bacsárdi | Comparing Calculated and Measured Losses in a Satellite-Earth Quantum Channel | 2018_3_3 |
Dániel Péter Kun, Erika Baksáné Varga and Zsolt Tóth | Ontology based Indoor Navigation Service for the ILONA System | 2018_3_4 |
Miklós Gábriel Tulics and Klára Vicsi | Automatic classification possibilities of the voices of children with dysphonia | 2018_3_5 |
Hum Nath Parajuli and Eszter Udvary | Wired-Wireless Converged Passive Optical Network with 4-PAM and Multi-sub-bands FBMC | 2018_2_1 |
Gábor Szabó and Eszter Udvary | Advanced Approximation of Channel Quality in a VLC CDM System | 2018_2_2 |
Gábor Lencse and Youki Kadobayashi | Methodology for DNS Cache Poisoning Vulnerability Analysis of DNS64 Implementations | 2018_2_3 |
Tomáš Huszaník, Ján Turán and Ľuboš Ovseník | Demonstration of Multimode Optical Fiber Communication System using 1300 nm Directly Modulated VCSEL for Gigabit Ethernet | 2018_2_4 |
Ferenc Nandor Janky and Pal Varga | Time Synchronization Solution for FPGA-based Distributed Network Monitoring | 2018_1_1 |
Devender Kumar, Satish Chand and Bijendra Kumar | Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme | 2018_1_2 |
Marton Szabo, David Haja and Mark Szalay | Cost-Efficient Resource Allocation Method for Heterogeneous Cloud Environments | 2018_1_3 |
Tamas Bisztray and Laszlo Bacsardi | The Evolution of Free-Space Quantum Key Distribution | 2018_1_4 |