ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.04.002
Jasiya Fairiz Raisa , Md. Sazzadur Rahman , Imtiaz Mahmud , M. Shamim Kaiser , Dong Seog Han
{"title":"Transition toward Healthcare 5.0: Impact of COVID-19 in the healthcare industry","authors":"Jasiya Fairiz Raisa , Md. Sazzadur Rahman , Imtiaz Mahmud , M. Shamim Kaiser , Dong Seog Han","doi":"10.1016/j.icte.2025.04.002","DOIUrl":"10.1016/j.icte.2025.04.002","url":null,"abstract":"<div><div>The COVID-19 pandemic has prompted healthcare advancements, enhanced security and efficiency, and reduced disease transmission. The industry rapidly addresses technological gaps and growing service demands. The pandemic has driven a pivotal shift from Healthcare 4.0 to Healthcare 5.0. Healthcare 4.0 emphasizes technology-centered care, whereas Healthcare 5.0 prioritizes patient-centric, personalized, and participatory approaches. This review assesses COVID-19’s impact on this transition, comparing pre-pandemic and pandemic literature. It examines how digital tools enable healthcare providers to deliver patient-centered and personalized care, fostering a shift from Healthcare 4.0 to Healthcare 5.0.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 371-389"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.02.004
Igbafe Orikumhi , Nakyung Lee , Jungsook Bae , Sunwoo Kim
{"title":"A selective update sensing approach for UAV-ISAC enabled relaying network","authors":"Igbafe Orikumhi , Nakyung Lee , Jungsook Bae , Sunwoo Kim","doi":"10.1016/j.icte.2025.02.004","DOIUrl":"10.1016/j.icte.2025.02.004","url":null,"abstract":"<div><div>This paper proposes a selective sensing information update scheme for communication between a base station (BS) and multiple unmanned aerial vehicles (UAVs) in a relaying network. The UAVs, equipped with integrated sensing and communication (ISAC) capabilities, utilize environmental sensing measurements to facilitate communication in blockage-prone scenarios, such as disaster recovery and remote connectivity. Specifically, user parameters are estimated from the sensing measurements at the UAVs. Given the non-linear relationship between the sensing measurements and the communication parameters, we propose a two-stage design approach. In the first stage, the measurements are transformed into a range-and-angle-based model to determine the optimal beam between the UAVs and multiple mobile user equipment (UEs). In the second stage, a selective update mechanism, guided by a predictive rate criterion, is used to optimize the frequency of sensing information updates between the BS and the UAVs. Simulation results demonstrate the superiority of the proposed method and show an improvement in the system throughput compared to baseline schemes, while significantly reducing sensing overhead.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 481-485"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.03.004
Joeun Kim , Youngil Jeon , Junhwan Lee , Moon-Sik Lee , Taesoo Kwon
{"title":"Joint scheduling and resource allocation based on reinforcement learning in integrated access and backhaul networks","authors":"Joeun Kim , Youngil Jeon , Junhwan Lee , Moon-Sik Lee , Taesoo Kwon","doi":"10.1016/j.icte.2025.03.004","DOIUrl":"10.1016/j.icte.2025.03.004","url":null,"abstract":"<div><div>In recent wireless networks, the integrated access and backhaul (IAB) network provides a cost-effective solution to enhance network performance and has emerged as a key technology not only for beyond 5G but also for 6G. Because of the inherent nature of IAB, access and backhaul links share the same resource pool causing cross-link interference. To address this challenge, this paper investigates an algorithm based on reinforcement learning (RL) for joint scheduling and resource allocation (RA) problem, aiming to mitigate interference and enhance user data rates. However, the scale of this joint problem is too large to solve using RL alone. Therefore, this paper proposes decomposing the joint problem into virtual scheduling and RL-based RA (RL-RA), and then solving them collaboratively. Simulation results also show that the proposed algorithm significantly improves performance and can be applied comprehensively to various duplex modes, including half and full duplex types, and different frequency bands, such as sub-6GHz and mmWave.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 536-541"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.03.009
Yunus Emre Ekici , Teoman Karadağ , Ozan Akdağ , Ahmet Arif Aydin , Hüseyin Ozan Tekin
{"title":"Enhancing electric vehicle range through real-time failure prediction and optimization: Introduction to DHBA-FPM model with an artificial intelligence approach","authors":"Yunus Emre Ekici , Teoman Karadağ , Ozan Akdağ , Ahmet Arif Aydin , Hüseyin Ozan Tekin","doi":"10.1016/j.icte.2025.03.009","DOIUrl":"10.1016/j.icte.2025.03.009","url":null,"abstract":"<div><div>Electrical and mechanical failures in electric vehicles (EVs) during passenger operation cause significant operational losses and elevated energy consumption, amplifying range anxiety. To address this issue, we utilized 250,000 rows of real-time data from electric trolleybuses operating in Türkiye to develop a robust artificial intelligence (AI)-based optimization model for failure mitigation. Initially, Tri layered Neural Network (TNN) was employed to create a predictive function for electrical and mechanical failures, followed by comparative analyses across six optimization algorithms widely adopted in failure prediction studies. Among these, the Developed Honey Badger Algorithm with AI Approach (DHBA) emerged as the most effective, achieving a predictive accuracy improvement of 15 % over the standard Honey Badger Algorithm (HBA). The DHBA incorporates a Dynamic Fitness-Distance Balance (DFDB) mechanism and a novel spiral motion feature to enhance search precision, leading to the DHBA-FPM (Developed-Honey Badger Algorithm - Failure Prediction Model). The final DHBA-FPM model was applied to the 10 highest-density bus routes in Türkiye to predict and optimize failures. Results indicate that applying the DHBA-FPM model across these routes yielded a 3.96 % average range increase in EVs, extending the total range by approximately 79,200 km annually. It can be concluded that the model could prevent the release of 238.7 tons/year of CO<sub>2</sub>, NO, and NO<sub>2</sub> emissions through its potential to improve both the operational efficiency and sustainability of EVs in public transit networks.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 547-558"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.03.005
Woong-Shin Kwak, Jae-Won Kim
{"title":"Design of LDPC code for uncorrelated Rayleigh fading channel using modified outage probability","authors":"Woong-Shin Kwak, Jae-Won Kim","doi":"10.1016/j.icte.2025.03.005","DOIUrl":"10.1016/j.icte.2025.03.005","url":null,"abstract":"<div><div>In this paper, we propose a new design metric called modified outage probability (MOP) for protograph-based low-density parity-check (LDPC) codes over the uncorrelated Rayleigh fading channel. In contrast to the conventional threshold metric, the MOP predicts the frame error rate (FER) performance accurately over the fading channel. Based on MOPs, we optimize protograph-based LDPC codes while considering the trade-off between accuracy and computational complexity. It is shown that the optimized LDPC codes outperform the conventional threshold-based LDPC codes at the FER of <span><math><mrow><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>4</mn></mrow></msup></mrow></math></span> for the both medium and high code-rate regions.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 442-447"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.04.005
Haoyang Qi , Xin Song , Yuqi Zhang , Lanfeng Li , Zhiao Cao
{"title":"Muloc: Multi-scale combination mask indoor localization network for WiFi based on channel state information","authors":"Haoyang Qi , Xin Song , Yuqi Zhang , Lanfeng Li , Zhiao Cao","doi":"10.1016/j.icte.2025.04.005","DOIUrl":"10.1016/j.icte.2025.04.005","url":null,"abstract":"<div><div>With the popularization of sensor technology, researchers extract Channel State Information (CSI) from WiFi, which reflects the movement of family members by observing changes in signal transmission in residences. However, WiFi signals are still affected by multipath effects in residences. Therefore, we construct a multi-scale CSI combination mask matrix between adjacent scales based on the ternary closure. Next, we propose a competitive localization network based on aggregated affinity propagation algorithm. Experiments have been conducted to demonstrate that the proposed algorithm achieves significant improvement compared to other classical algorithms in the indoor environment.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 529-535"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.01.010
Yi-Hao Tu, Yi-Wei Ma
{"title":"A comprehensive multi-agent deep reinforcement learning framework with adaptive interaction strategies for contention window optimization in IEEE 802.11 Wireless LANs","authors":"Yi-Hao Tu, Yi-Wei Ma","doi":"10.1016/j.icte.2025.01.010","DOIUrl":"10.1016/j.icte.2025.01.010","url":null,"abstract":"<div><div>This study introduces the Multi-Agent, Multi-Parameter, Interaction-Driven Contention Window Optimization (M2I-CWO) algorithm, a novel Multi-Agent Deep Reinforcement Learning (MADRL) framework designed to optimize multiple CW parameters in IEEE 802.11 Wireless LANs. Unlike single-parameter or specialized multi-agent methods, M2I-CWO employs a Dueling-DQN architecture and an Adaptive Interaction Reward Function—spanning independent, cooperative, competitive, and mixed modes—and accommodates Hierarchical Multi-Agent System (HMAS) or Federated RL (FRL) for further scalability. First, multiple CW parameters are simultaneously adjusted to enhance collision management. Second, M2I-CWO consistently achieves throughput improvements in both static and dynamic scenarios. Extensive results confirm M2I-CWO's superiority in efficiency and adaptability.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 473-480"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.04.011
Heecheol Yang
{"title":"Deep learning-based channel prediction for TDD MIMO systems with imperfect channel reciprocity","authors":"Heecheol Yang","doi":"10.1016/j.icte.2025.04.011","DOIUrl":"10.1016/j.icte.2025.04.011","url":null,"abstract":"<div><div>In wireless communication systems, accurate channel state information plays a fundamental role in achieving optimal transmission efficiency at the base station (BS). We introduce a deep learning-based channel prediction designed to address the challenges posed by imperfect channel reciprocity in time-division duplex multiple-input multiple-output systems. We propose two models that not only facilitate accurate channel prediction but also perform channel calibration that can alleviate the impact of imperfect channel reciprocity between BS and users. We evaluate the performance through the simulations in line-of-sight and non-line-of-sight scenarios, demonstrating efficacy in enhancing the accuracy of predicted future downlink channels.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 590-596"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2025-06-01DOI: 10.1016/j.icte.2025.03.003
Naor Zohar
{"title":"To associate or not to associate? A user-based threshold scheme for 5G and beyond networks","authors":"Naor Zohar","doi":"10.1016/j.icte.2025.03.003","DOIUrl":"10.1016/j.icte.2025.03.003","url":null,"abstract":"<div><div>Traditionally, User-cell Association (UA) schemes for cellular networks are based solely on the quality and strength of the received signal. This mechanism may not always be adequate for the complex nature of fifth generation and beyond (B5G) networks, and may lead to load biasing. Additional parameters, such as the load on the neighboring cells, the needs of the user equipment (UE), and the UE mobility should be considered as well. The realization that relying solely on the signal strength and quality for UA may violate load balancing has been recognized for a long time. However, the approach taken was to balance the load by a network-dependent mechanism. Yet, the UA mechanism remains based on the best-received signal. The underlying assumption that all the users have the same needs remains. Load-aware UA was considered only upon mobility-driven handover to small cells. This study suggests a UE-based threshold scheme for load-aware UA that is suitable for B5G networks. Since the optimal UA problem is known to be NP-hard, we suggest a heuristic mechanism, that is sufficiently simple and reliable to be implemented in practice, yet sufficiently efficient to significantly outperform the existing UA mechanism. Simulation results demonstrated that the suggested UA scheme can potentially reduce the required network bandwidth resources by up to 25%<!--> <!-->and significantly reduce the service blocking probability and the average waiting time for service.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 390-401"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-enabled KYC integration for CLV optimization with robust M-Estimation and IRLS method","authors":"Marischa Elveny , Mahyuddin K.M. Nasution , Fanindia Purnamasari , Tengku Siti Meriam Tengku Wook","doi":"10.1016/j.icte.2025.03.006","DOIUrl":"10.1016/j.icte.2025.03.006","url":null,"abstract":"<div><div>This research introduces an innovative approach in implementing Know Your Customer (KYC) on blockchain technology as a means of using data, hybrid robust m-estimation, and the iteratively reweighted less squares (IRLS) method to optimize CLV data. This approach aims to improve the accuracy and reliability of CLV predictions by ensuring the security and reliability of customer data. This tool can help companies manage and increase CLV more effectively, meeting data security and compliance standards. The R-squared validation test results are close to 1, so the model can explain data variations well. RMSE and MSE have small values, so the model has good performance in predicting the target value. With these achievements, this approach contributes to the development of better marketing strategies and business decisions in an increasingly complex and rapidly changing digital environment.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 402-410"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}