


default search action
Future Internet, Volume 14
Volume 14, Number 1, January 2022
- Dennis Przytarski, Christoph Stach
, Clémentine Gritti
, Bernhard Mitschang:
Query Processing in Blockchain Systems: Current State and Future Challenges. 1 - Nuria Rodriguez-Diaz, Decky Aspandi
, Federico M. Sukno
, Xavier Binefa
:
Machine Learning-Based Lie Detector Applied to a Novel Annotated Game Dataset. 2 - Luiz Henrique A. Salazar
, Valderi R. Q. Leithardt
, Wemerson Delcio Parreira
, Anita Maria da Rocha Fernandes
, Jorge Luis Victória Barbosa
, Sérgio Duarte Correia
:
Application of Machine Learning Techniques to Predict a Patient's No-Show in the Healthcare Sector. 3 - Anastasia Mikhailovna Fedotova, Aleksandr Romanov
, Anna V. Kurtukova, Alexander A. Shelupanov:
Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection. 4 - Peter A. Gloor
, Andrea Fronzetti Colladon
, Erkin Altuntas, Cengiz Cetinkaya, Maximilian F. Kaiser
, Lukas Ripperger, Tim Schaefer
:
Your Face Mirrors Your Deepest Beliefs - Predicting Personality and Morals through Facial Emotion Recognition. 5 - Tolijan Trajanovski
, Ning Zhang:
An Automated Behaviour-Based Clustering of IoT Botnets. 6 - Jin Wang, Jun Luo
:
No Perfect Outdoors: Towards a Deep Profiling of GNSS-Based Location Contexts. 7 - Ihar Volkau
, Abdul Mujeeb, Wenting Dai
, Marius Erdt, Alexei Sourin:
The Impact of a Number of Samples on Unsupervised Feature Extraction, Based on Deep Learning for Detection Defects in Printed Circuit Boards. 8 - Faheem Ahmed Malik
, Laurent N. Dala, Krishna Busawon:
Real-Time Nanoscopic Rider Safety System for Smart and Green Mobility Based upon Varied Infrastructure Parameters. 9 - Leonardo Ranaldi
, Francesca Fallucchi
, Fabio Massimo Zanzotto
:
Dis-Cover AI Minds to Preserve Human Knowledge. 10 - Yunusa Simpa Abdulsalam
, Mustapha Hedabou
:
Security and Privacy in Cloud Computing: Technical Review. 11 - Mazen Alowish, Yoshiaki Shiraishi
, Masami Mohri, Masakatu Morii:
Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV. 12 - Artem Volkov
, Vadim Kovalenko, Ibrahim A. Elgendy
, Ammar Muthanna
, Andrey Koucheryavy:
DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework. 13 - Junyan Han
, Huili Shi
, Longfei Chen
, Hao Li, Xiaoyuan Wang
:
The Car-Following Model and Its Applications in the V2X Environment: A Historical Review. 14 - Shengguo Ge
, Siti Nurulain Mohd Rum
:
Key Points' Location in Infrared Images of the Human Body Based on Mscf-ResNet. 15 - Chandrashekar Jatoth
, Rishabh Jain, Ugo Fiore
, Subrahmanyam Chatharasupalli:
Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning. 16 - Shuailong Li
, Wei Zhang, Yuquan Leng
, Xiaohui Wang:
The Important Role of Global State for Multi-Agent Reinforcement Learning. 17 - Shoujiang Dang
, Rui Han:
An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane. 18 - Zineddine Kouahla
, Ala-Eddine Benrazek
, Mohamed Amine Ferrag
, Brahim Farou
, Hamid Seridi, Muhammet Kurulay
, Adeel Anjum
, Alia Asheralieva
:
A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues. 19 - Tan Nghia Duong
, Nguyen Nam Doan
, Truong Giang Do
, Tran Manh Hoang
, Duc Minh Nguyen, Quang Hieu Dang:
Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization. 20 - Weiwei Zhang, Xin Ma, Yuzhao Zhang, Ming Ji, Chenghui Zhen:
SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios. 21 - Pedro Ponce
, Omar Mata
, Esteban Pérez, Juan Roberto López Gutiérrez
, Arturo Molina
, Troy McDaniel
:
S4 Features and Artificial Intelligence for Designing a Robot against COVID-19 - Robocov. 22 - Laécio Rodrigues, Joel J. P. C. Rodrigues
, Antônio de Barros Serra, Francisco Airton Silva:
A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing. 23 - Hui Yan
, Chaoyuan Cui:
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events. 24 - Gianfranco Lombardo
, Michele Tomaiuolo
, Monica Mordonini
, Gaia Codeluppi
, Agostino Poggi
:
Mobility in Unsupervised Word Embeddings for Knowledge Extraction - The Scholars' Trajectories across Research Topics. 25 - Michail Niarchos
, Marina Eirini Stamatiadou
, Charalampos Dimoulas
, Andreas A. Veglis
, Andreas L. Symeonidis
:
A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services. 26 - Junda Li
, Chunxu Zhang, Bo Yang:
Global Contextual Dependency Network for Object Detection. 27 - Yelena Trofimova
, Pavel Tvrdík
:
Enhancing Reactive Ad Hoc Routing Protocols with Trust. 28 - Leonardo Alberro
, Alberto Castro
, Eduardo Grampín
:
Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review. 29
Volume 14, Number 2, February 2022
- Youpeng Tu
, Haiming Chen
, Linjie Yan
, Xinyan Zhou
:
Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT. 30 - Darius Kianersi, Suraj Uppalapati, Anirudh Bansal
, Jeremy Straub:
Evaluation of a Reputation Management Technique for Autonomous Vehicles. 31 - Jiagang Song
, Jiayu Song, Xinpan Yuan
, Xiao He, Xinghui Zhu:
Graph Representation-Based Deep Multi-View Semantic Similarity Learning Model for Recommendation. 32 - Tianchi Zhou, Peng Sun, Rui Han:
An Active Path-Associated Cache Scheme for Mobile Scenes. 33 - Michael Mackay
, Alessandro Raschellà
, Ogeen H. Toma:
Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment. 34 - Saleh M. Altowaijri
:
Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks. 35 - Andreas Giannakoulopoulos
, Minas Pergantis
, Nikos Konstantinou, Alexandros Kouretsis, Aristeidis Lamprogeorgos, Iraklis Varlamis
:
Estimation on the Importance of Semantic Web Integration for Art and Culture Related Online Media Outlets. 36 - Xiu Fang, Suxin Si, Guohao Sun, Quan Z. Sheng
, Wenjun Wu, Kang Wang, Hang Lv:
Selecting Workers Wisely for Crowdsourcing When Copiers and Domain Experts Co-exist. 37 - Yingjie Duan
, Hong Ni, Xiaoyong Zhu, Xu Wang:
A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking. 38 - Meng Wu
, Tingting Jiang, Chenyang Bu
, Bin Zhu:
Coarse-to-Fine Entity Alignment for Chinese Heterogeneous Encyclopedia Knowledge Base. 39 - Cunwei Yang
, Weiqing Wang
, Fengying Li
, Degang Yang
:
An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces. 40 - Jialin Shi, Chenyi Guo, Ji Wu:
A Hybrid Robust-Learning Architecture for Medical Image Segmentation with Noisy Labels. 41 - Rashmi Munjal, William Liu, Xue Jun Li
, Jairo A. Gutiérrez
, Peter Han Joo Chong
:
Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities. 42 - Liewu Cai
, Lei Zhu
, Hongyan Zhang, Xinghui Zhu:
DA-GAN: Dual Attention Generative Adversarial Network for Cross-Modal Retrieval. 43 - Ons Aouedi
, Kandaraj Piamrat, Benoît Parrein
:
Intelligent Traffic Management in Next-Generation Networks. 44 - Grigorios Kakkavas
, Vasileios Karyotis
, Symeon Papavassiliou
:
Topology Inference and Link Parameter Estimation Based on End-to-End Measurements. 45 - Haoxuan Qiu, Yanhui Du, Tianliang Lu:
The Framework of Cross-Domain and Model Adversarial Attack against Deepfake. 46 - Huanliang Xiong, Muxi Chen
, Canghai Wu, Yingding Zhao, Wenlong Yi
:
Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms. 47 - Abdelkader Tayeb Herouala
, Chaker Abdelaziz Kerrache
, Benameur Ziani, Carlos T. Calafate
, Nasreddine Lagraa, Abdou El Karim Tahari:
Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method. 48 - Kenneth Li-Minn Ang, Jasmine Kah-Phooi Seng, Ericmoore Ngharamike
:
Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications. 49 - Yaojie Zhang, Huahu Xu, Junsheng Xiao, Minjie Bian:
JoSDW: Combating Noisy Labels by Dynamic Weight. 50 - Helmer Augusto de Souza Mourão
, Horacio A. B. Fernandes de Oliveira:
Indoor Localization System Using Fingerprinting and Novelty Detection for Evaluation of Confidence. 51 - Souad Marir
, Faiza Belala
, Nabil Hameurlain
:
A Strategy-Based Formal Approach for Fog Systems Analysis. 52 - Future Internet Editorial Office:
Acknowledgment to Reviewers of Future Internet in 2021. 53 - Ning Chen, Yu Chen
:
Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service. 54 - Khumbelo Muthavhine, Mbuyu Sumbwanyambe
:
Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm. 55 - Venushini Rajendran
, R. Kanesaraj Ramasamy
, Wan Noorshahida Mohd Isa
:
Improved Eagle Strategy Algorithm for Dynamic Web Service Composition in the IoT: A Conceptual Approach. 56 - Cristian D'Ortona, Daniele Tarchi
, Carla Raffaelli
:
Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios. 57 - Tanmaya Mahapatra
, Syeeda Nilofer Banoo:
Flow-Based Programming for Machine Learning. 58 - Haruna Umar Adoga
, Dimitrios P. Pezaros
:
Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges. 59 - Zhixi Hu, Yi Zhu
, Xiaoying Chen, Yu Zhao
:
Safety Verification of Driving Resource Occupancy Rules Based on Functional Language. 60 - Dania Marabissi
, Lorenzo Mucchi
, Andrea Stomaci
:
IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning. 61 - Matteo Zubani, Luca Sigalini, Ivan Serina
, Luca Putelli
, Alfonso Emilio Gerevini
, Mattia Chiari
:
A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform. 62 - Fernando Almeida
, Jorge Simões
, Sérgio Lopes
:
Exploring the Benefits of Combining DevOps and Agile. 63 - Cheng Qian
, Xing Liu, Colin Ripley
, Mian Qian
, Fan Liang, Wei Yu
:
Digital Twin - Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. 64 - Martin Fraga, Matias J. Micheletto
, Andrés Llinás, Rodrigo M. Santos
, Paula Zabala
:
Flow Scheduling in Data Center Networks with Time and Energy Constraints: A Software-Defined Network Approach. 65 - Akrivi Krouska
, Katerina Kabassi, Christos Troussas
, Cleo Sgouropoulou:
Personalizing Environmental Awareness through Smartphones Using AHP and PROMETHEE II. 66 - Madushi H. Pathmaperuma, Yogachandran Rahulamathavan, Safak Dogan
, Ahmet M. Kondoz:
CNN for User Activity Detection Using Encrypted In-App Mobile Data. 67
Volume 14, Number 3, March 2022
- Jiaqi Li
, Jiali You, Haojiang Deng:
Adjacency-Information-Entropy-Based Cooperative Name Resolution Approach in ICN. 68 - Ivan S. Blekanov
, Nikita Tarasov
, Svetlana S. Bodrunova
:
Transformer-Based Abstractive Summarization for Reddit and Twitter: Single Posts vs. Comment Pools in Three Languages. 69 - Iraklis Varlamis
, Dimitrios Michail
, Foteini Glykou, Panagiotis Tsantilas:
A Survey on the Use of Graph Convolutional Networks for Combating Fake News. 70 - Thanh-Nam Tran
, Van-Cuu Ho, Thoai Phu Vo, Tran Ngo Nhu Khanh
, Miroslav Voznák
:
Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks. 71 - Diogo Teixeira
, Silvestre Malta
, Pedro Pinto
:
A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning. 72 - Mohd Hirzi Adnan
, Zuriati Ahmad Zukarnain, Nur Ziadah Harun
:
Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions. 73 - Jacqueline Zonichenn Reis
, Rodrigo Franco Gonçalves
, Márcia Terra da Silva
, Nikolai Kazantsev:
Business Models for the Internet of Services: State of the Art and Research Agenda. 74 - Nikolaos Vryzas
, Anastasia Katsaounidou
, Lazaros Vrysis
, Rigas Kotsakis, Charalampos Dimoulas
:
A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing. 75 - Diogo E. Moreira da Silva
, Eduardo José Solteiro Pires
, Arsénio Reis
, Paulo B. de Moura Oliveira
, João Barroso
:
Forecasting Students Dropout: A UTAD University Study. 76 - Yurika Pant Khanal, Abeer Alsadoon
, Khurram Shahzad
, Ahmad Baheej Al-Khalil, Penatiyana W. C. Prasad
, Sabih ur Rehman
, Rafiqul Islam
:
Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function. 77 - Domenico Lembo, Valerio Santarelli, Domenico Fabio Savo
, Giuseppe De Giacomo:
Graphol: A Graphical Language for Ontology Modeling Equivalent to OWL 2. 78 - Hossam Fraihat, Amneh A. Almbaideen, Abdullah I. Al-Odienat
, Bassam Al-Naami
, Roberto de Fazio
, Paolo Visconti
:
Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan. 79 - Junwen Lu, Jinhui Wang, Xiaojun Wei, Keshou Wu, Guanfeng Liu:
Deep Anomaly Detection Based on Variational Deviation Network. 80 - Gabriel Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa, Mauricio Marín
:
Bot-Based Emergency Software Applications for Natural Disaster Situations. 81 - Emtethal K. Alamri
, Abdullah M. Alnajim
, Suliman A. Alsuhibany
:
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks. 82 - Mattia Pellegrino
, Gianfranco Lombardo
, Stefano Cagnoni
, Agostino Poggi
:
High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation. 83 - Leanna Vidya Yovita
, Nana Rachmana Syambas
, Ian Joseph Matheus Edward:
Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network. 84 - Siyuan Du, Hao Wang:
Addressing Syntax-Based Semantic Complementation: Incorporating Entity and Soft Dependency Constraints into Metonymy Resolution. 85 - Jiahao Guo, Xiaohuo Yu, Lu Wang:
Unsupervised Anomaly Detection and Segmentation on Dirty Datasets. 86 - Ioannis Kosmopoulos, Emmanouil Skondras, Angelos Michalas, Emmanouel T. Michailidis
, Dimitrios D. Vergados:
Handover Management in 5G Vehicular Networks. 87 - Pavel Laptev
, Sergey Litovkin
, Sergey Davydenko
, Anton Konev
, Evgeny Kostyuchenko
, Alexander A. Shelupanov:
Neural Network-Based Price Tag Data Analysis. 88 - Victor Chang
, Lewis Golightly
, Paolo Modesti
, Qianwen Ariel Xu
, Le Minh Thao Doan
, Karl Hall
, Sreeja Boddu, Anna Kobusinska
:
A Survey on Intrusion Detection Systems for Fog and Cloud Computing. 89 - Jia Dong, Quan Qian
:
A Density-Based Random Forest for Imbalanced Data Classification. 90 - Somdip Dey
, Samuel Isuwa
, Suman Saha, Amit Kumar Singh, Klaus D. McDonald-Maier
:
CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems. 91 - Chia-Ping Tsai, Che-Wei Chang
, Hung-Chang Hsiao, Haiying Shen:
The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase. 92 - Nino Cauli
, Diego Reforgiato Recupero
:
Survey on Videos Data Augmentation for Deep Learning Models. 93 - Tianyuan Zhang
, Sérgio Moro
, Ricardo F. Ramos
:
A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation. 94 - Andreas G. Papidas, George C. Polyzos
:
Self-Organizing Networks for 5G and Beyond: A View from the Top. 95 - Jiahao Shi, Jie Yu, Jinkun Yang, Lingyu Xu, Huan Xu:
Time Series Surface Temperature Prediction Based on Cyclic Evolutionary Network Model for Complex Sea Area. 96
Volume 14, Number 4, April 2022
- Kim Ferres, Timo Schloesser
, Peter A. Gloor
:
Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut. 97 - Luisanna Cocco
, Roberto Tonelli, Michele Marchesi:
Bitcoin as a Safe Haven during COVID-19 Disease. 98 - Peter Krammer, Marcel Kvassay
, Ján Mojzis
, Martin Kenyeres
, Milos Ockay
, Ladislav Hluchý
, Lubos Pavlov, Lubos Skurcák:
Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators. 99 - Mario Milicevic
, Vedran Batos, Adriana Lipovac
, Zeljka Car:
Deep Regression Neural Networks for Proportion Judgment. 100 - Subhra Sankha Sarma
, Ranjay Hazra
, Peter Han Joo Chong
:
Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network. 101 - Vikas Tomer, Sachin Sharma
:
Detecting IoT Attacks Using an Ensemble Machine Learning Model. 102 - Xiaolin Chen
, Qixing Qu
, Chengxi Wei, Shudong Chen:
Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph. 103 - Joakim Kävrestad
, Allex Hagberg, Marcus Nohlberg
, Jana Rambusch, Robert Roos, Steven Furnell
:
Evaluation of Contextual and Game-Based Training for Phishing Detection. 104 - Yingjie Duan
, Hong Ni, Xiaoyong Zhu:
A Dynamic Cache Allocation Mechanism (DCAM) for Reliable Multicast in Information-Centric Networking. 105 - Massimo Esposito
, Giovanni Luca Masala
, Aniello Minutolo
, Marco Pota
:
Special Issue "Natural Language Engineering: Methods, Tasks and Applications". 106 - Nusrat Afrin
, Jason Brown
, Jamil Y. Khan
:
A Multi-Service Adaptive Semi-Persistent LTE Uplink Scheduler for Low Power M2M Devices. 107 - João Vitorino
, Nuno Oliveira
, Isabel Praça
:
Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection. 108 - Marwane Ayaida
, Nadhir Messai
, Frédéric Valentin, Dimitri Marcheras:
TalkRoBots: A Middleware for Robotic Systems in Industry 4.0. 109 - Pranita Patil
, Kevin Purcell
:
Decorrelation-Based Deep Learning for Bias Mitigation. 110 - Haytham Khalil
, Khalid Elgazzar
:
Location Transparency Call (LTC) System: An Intelligent Phone Dialing System Based on the Phone of Things (PoT) Architecture. 111 - Chrysostomos Symvoulidis
, George Marinos, Athanasios Kiourtis
, Argyro Mavrogiorgou, Dimosthenis Kyriazis
:
HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds. 112 - Zhao Wang, Qingguo Xu, Weimin Li:
Multi-Layer Feature Fusion-Based Community Evolution Prediction. 113 - Attila Csaba Marosi, Márk Emodi, Ákos Hajnal, Róbert Lovas
, Tamás Kiss
, Valerie Poser, Jibinraj Antony
, Simon Bergweiler
, Hamed Hamzeh
, James Deslauriers
, József Kovács
:
Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing. 114 - Mahmoud Al-Dwairi, Ahmed S. Shatnawi
, Osama Daifallah Al-Khaleel, Basheer Al-Duwairi:
Ransomware-Resilient Self-Healing XML Documents. 115 - Ramraj Dangi
, Akshay Jadhav
, Gaurav Choudhary
, Nicola Dragoni
, Manas Kumar Mishra
, Praveen Lalwani:
ML-Based 5G Network Slicing Security: A Comprehensive Survey. 116 - Ahmed I. Salameh
, Mohamed G. El-Tarhuni
:
From 5G to 6G - Challenges, Technologies, and Applications. 117 - Rokia Lamrani Alaoui
, El Habib Nfaoui
:
Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review. 118 - Zhihao Wang
, Ru Huo, Shuo Wang:
A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid. 119 - Sachin Sharma
, Saish Urumkar
, Gianluca Fontanesi
, Byrav Ramamurthy, Avishek Nag
:
Future Wireless Networking Experiments Escaping Simulations. 120 - Joel Scanlan
, Paul A. Watters
, Jeremy Prichard
, Charlotte Hunn, Caroline Spiranovic, Richard Wortley
:
Creating Honeypots to Prevent Online Child Exploitation. 121
Volume 14, Number 5, May 2022
- Ruibin Zeng, Jiali You, Yang Li, Rui Han:
An ICN-Based IPFS High-Availability Architecture. 122 - Annamaria Ficara
, Giacomo Fiumara
, Salvatore Catanese, Pasquale De Meo, Xiaoyang Liu
:
The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks. 123 - Emmanouil Krasanakis
, Andreas L. Symeonidis
:
Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks. 124 - Deeraj Nagothu
, Ronghua Xu
, Yu Chen
, Erik Blasch
, Alexander J. Aved:
Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach. 125 - Dejan Ravselj
, Lan Umek
, Ljupco Todorovski
, Aleksander Aristovnik
:
A Review of Digital Era Governance Research in the First Two Decades: A Bibliometric Study. 126 - Maria Kamariotou
, Fotis Kitsios
:
Bringing Digital Innovation Strategies and Entrepreneurship: The Business Model Canvas in Open Data Ecosystem and Startups. 127 - Bianca Goia, Tudor Cioara, Ionut Anghel
:
Virtual Power Plant Optimization in Smart Grids: A Narrative Review. 128 - Vetle Ryen, Ahmet Soylu, Dumitru Roman:
Building Semantic Knowledge Graphs from (Semi-)Structured Data: A Review. 129 - Hua Yang
, Teresa Gonçalves
, Paulo Quaresma
, Renata Vieira
, Rute Veladas, Cátia Sousa Pinto, João Oliveira, Maria Cortes Ferreira, Jéssica Morais, Ana Raquel Pereira, Nuno Fernandes, Carolina Gonçalves:
Clinical Trial Classification of SNS24 Calls with Neural Networks. 130 - Hassan Mahmood Khan
, Fang-Fang Chua
, Timothy Tzen Vun Yap
:
ReSQoV: A Scalable Resource Allocation Model for QoS-Satisfied Cloud Services. 131 - Mahdi Zargayouna
:
On the Use of the Multi-Agent Environment for Mobility Applications. 132 - Erkin Altuntas, Peter A. Gloor
, Pascal Budner:
Measuring Ethical Values with AI for Better Teamwork. 133 - Joze M. Rozanec
, Elena Trajkova
, Inna Novalija
, Patrik Zajec
, Klemen Kenda
, Blaz Fortuna
, Dunja Mladenic
:
Enriching Artificial Intelligence Explanations with Knowledge Fragments. 134 - Lijun Wei
, Yuhan Yang, Jing Wu
, Chengnian Long
, Yi-Bing Lin
:
A Bidirectional Trust Model for Service Delegation in Social Internet of Things. 135 - Evgenia Kapassa
, Marinos Themistocleous
:
Blockchain Technology Applied in IoV Demand Response Management: A Systematic Literature Review. 136 - Sana Sahar Guia
, Abdelkader Laouid
, Mohammad Hammoudeh
, Ahcène Bounceur
, Mai Alfawair
, Amna Eleyan
:
Co-Simulation of Multiple Vehicle Routing Problem Models. 137 - Zheyi Chen, Weixian Liao
, Pu Tian
, Qianlong Wang
, Wei Yu
:
A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices. 138 - Jose Alberto Del Puerto-Flores
, José Luis Naredo, Fernando Peña-Campos, Carolina Del-Valle-Soto
, Leonardo J. Valdivia
, Ramón Parra-Michel:
Channel Characterization and SC-FDM Modulation for PLC in High-Voltage Power Lines. 139 - Luisanna Cocco
, Roberto Tonelli, Michele Marchesi:
A System Proposal for Information Management in Building Sector Based on BIM, SSI, IoT and Blockchain. 140 - Jie Zhao
, Fangwei Xiong, Peiquan Jin
:
Enhancing Short-Term Sales Prediction with Microblogs: A Case Study of the Movie Box Office. 141 - Muhammad Atif
, Valentina Franzoni
:
Tell Me More: Automating Emojis Classification for Better Accessibility and Emotional Context Recognition. 142 - Benjamin Agbo, Hussain Al-Aqrabi
, Richard Hill
, Tariq A. A. Alsboui
:
Missing Data Imputation in the Internet of Things Sensor Networks. 143 - Kleanthis G. Gatziolis, Nikolaos D. Tselikas, Ioannis D. Moscholios
:
Adaptive User Profiling in E-Commerce and Administration of Public Services. 144 - Mauro Tropea
, Mattia Giovanni Spina, Floriano De Rango
, Antonio Francesco Gentile
:
Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer. 145 - Arghavan Asad, Rupinder Kaur
, Farah Mohammadi:
A Survey on Memory Subsystems for Deep Neural Network Accelerators. 146 - Olga Papadopoulou
, Themistoklis Makedas
, Lazaros Apostolidis
, Francesco Poldi
, Symeon Papadopoulos
, Ioannis Kompatsiaris
:
MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation. 147 - Siti Fatimah Abdul Razak
, Sumendra Yogarayan
, Mohd Fikri Azli Abdullah
, Afizan Azman:
Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment. 148 - Sonya Leech
, Jonathan Dunne, David Malone:
A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems. 149 - Alexandru-Ioan Florea, Ionut Anghel
, Tudor Cioara:
A Review of Blockchain Technology Applications in Ambient Assisted Living. 150 - Duc V. Nguyen
, Nam Pham Ngoc, Truong Cong Thang:
QoE Models for Adaptive Streaming: A Comprehensive Evaluation. 151 - Yazhi Liu, Dongyu Wei
, Chunyang Zhang, Wei Li:
Distributed Bandwidth Allocation Strategy for QoE Fairness of Multiple Video Streams in Bottleneck Links. 152 - Roseline Oluwaseun Ogundokun
, Sanjay Misra
, Mychal Douglas, Robertas Damasevicius
, Rytis Maskeliunas
:
Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks. 153 - Ioannis Manolopoulos, Dimitrios Loukatos
, Kimon P. Kontovasilis:
A Versatile MANET Experimentation Platform and Its Evaluation through Experiments on the Performance of Routing Protocols under Diverse Conditions. 154 - Ahad Zareravasan
, Taha Mansouri
, Michal Krcál
, Saeed Rouhani:
Editorial for the Special Issue on Blockchain: Applications, Challenges, and Solutions. 155 - Bert Cox
, Chesney Buyle
, Daan Delabie
, Lieven De Strycker
, Liesbet Van der Perre
:
Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments. 156 - Shrisha H. S.
, Uma Boregowda:
Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks. 157 - Karam Eddine Bilami
, Pascal Lorenz
:
Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks. 158 - Xinhe Zhang, Wenbo Lv, Haoran Tan:
Low-Complexity GSM Detection Based on Maximum Ratio Combining. 159
Volume 14, Number 6, June 2022
- Ignazio Pedone
, Antonio Lioy
:
Quantum Key Distribution in Kubernetes Clusters. 160 - Abderahman Rejeb, John G. Keogh
, Wayne Martindale
, Damion M. Dooley
, Edward Smart
, Steven Simske
, Samuel Fosso Wamba, John G. Breslin
, Kosala Yapa Bandara, Subhasis Thakur, Kelly Liu
, Bridgette Crowley, Sowmya Desaraju, Angela Ospina, Horia Bradau:
Charting Past, Present, and Future Research in the Semantic Web and Interoperability. 161 - Horst Treiblmaier
:
What Is Coming across the Horizon and How Can We Handle It? Bitcoin Scenarios as a Starting Point for Rigorous and Relevant Research. 162 - Andreia Araújo
, Filipe Portela
, Filipe Pereira Alvelos
, Saulo Ruiz:
Optimization of the System of Allocation of Overdue Loans in a Sub-Saharan Africa Microfinance Institution. 163 - Samer Khamaiseh
, Abdullah S. Al-Alaj
, Mohammad Adnan, Hakam W. Alomari
:
The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers. 164 - Abdallah Moubayed
, Abdallah Shami
, Anwer Al-Dulaimi
:
On End-to-End Intelligent Automation of 6G Networks. 165 - Zhaohui Huang, Vasilis Friderikos:
Optimal Proactive Caching for Multi-View Streaming Mobile Augmented Reality. 166 - Joana Tomás, Deolinda Dias Rasteiro
, Jorge Bernardino
:
Data Anonymization: An Experimental Evaluation Using Open-Source Tools. 167 - Belle Fille Murorunkwere
, Origene Tuyishimire
, Dominique Haughton, Joseph Nzabanita
:
Fraud Detection Using Neural Networks: A Case Study of Income Tax. 168 - Guangwei Fan, Chuanzhen Sheng, Baoguo Yu, Lu Huang
, Qiang Rong:
An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters. 169 - Huda Alhazmi:
Detection of Students' Problems in Distance Education Using Topic Modeling and Machine Learning. 170 - Tingting Wang, Zhuolin Li
, Xiulin Geng, Baogang Jin, Lingyu Xu:
Time Series Prediction of Sea Surface Temperature Based on an Adaptive Graph Learning Neural Model. 171 - S. Sofana Reka
, Prakash Venugopal
, Ravi V
, Hassan Haes Alhelou
, Amer Al-Hinai
, Pierluigi Siano
:
Analysis of Electric Vehicles with an Economic Perspective for the Future Electric Market. 172 - Nikos Fotiou
, Vasilios A. Siris, George Xylomenos, George C. Polyzos
:
IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials. 173 - Andreas Giannakoulopoulos
, Minas Pergantis
, Laida Limniati, Alexandros Kouretsis:
Investigating the Country of Origin and the Role of the .eu TLD in External Trade of European Union Member States. 174 - Giulio Caldarelli
:
Overview of Blockchain Oracle Research. 175 - Goutham Kallempudi
, Khurram Azeem Hashmi
, Alain Pagani, Marcus Liwicki
, Didier Stricker
, Muhammad Zeshan Afzal
:
Toward Semi-Supervised Graphical Object Detection in Document Images. 176 - Changbo Hou
, Jiajun Ai, Yun Lin
, Chenyang Guan, Jiawen Li, Wenyu Zhu:
Evaluation of Online Teaching Quality Based on Facial Expression Recognition. 177 - Jinghui Feng, Haopeng Kuang
, Lihua Zhang:
EBBA: An Enhanced Binary Bat Algorithm Integrated with Chaos Theory and Lévy Flight for Feature Selection. 178 - Nayomi Kankanamge
, Tan Yigitcanlar
, Ashantha Goonetilleke
:
Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia. 179 - Shangkun Deng, Yingke Zhu
, Xiaoru Huang, Shuangyang Duan, Zhe Fu:
High-Frequency Direction Forecasting of the Futures Market Using a Machine-Learning-Based Method. 180 - Qifan Chen
, Yang Lu
, Charmaine S. Tam, Simon K. Poon
:
A Multi-View Framework to Detect Redundant Activity Labels for More Representative Event Logs in Process Mining. 181 - Jason Zheng, Chidinma Dike, Stefan Pancari, Yi Wang, George C. Giakos, Wafa Elmannai
, Bingyang Wei:
An In-Depth Review on Blockchain Simulators for IoT Environments. 182 - Roberto de Fazio
, Massimo de Vittorio, Paolo Visconti
:
A BLE-Connected Piezoresistive and Inertial Chest Band for Remote Monitoring of the Respiratory Activity by an Android Application: Hardware Design and Software Optimization. 183 - Kavitha Rani Balmuri
, Srinivas Konda
, Wen-Cheng Lai
, Parameshachari Bidare Divakarachari
, Kavitha Malali Vishveshwarappa Gowda, Hemalatha Kivudujogappa Lingappa:
A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network. 184 - Silvia Stranieri
:
An Indoor Smart Parking Algorithm Based on Fingerprinting. 185 - Evangelia Fragkou
, Dimitrios Papakostas
, Theodoros Kasidakis, Dimitrios Katsaros:
Multilayer Backbones for Internet of Battlefield Things. 186 - Vincenza Carchiolo
, Marco Grassia
, Michele Malgeri
, Giuseppe Mangioni
:
Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers. 187 - Furkan Paligu
, Cihan Varol
:
Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage. 188 - Chiara Suraci
, Sara Pizzi
, Federico Montori, Marco Di Felice, Giuseppe Araniti
:
6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap. 189
Volume 14, Number 7, July 2022
- Hicham Ajami, Hamid Mcheick
, Catherine Laprise:
First Steps of Asthma Management with a Personalized Ontology Model. 190 - Ranjan Satapathy, Shweta Pardeshi, Erik Cambria
:
Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding. 191 - Salahadin Seid Musa
, Marco Zennaro
, Mulugeta Libsie
, Ermanno Pietrosemoli
:
Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions. 192 - Anastasia Kondratyeva, Daria Ivanova
, Vyacheslav Begishev
, Ekaterina V. Markova
, Evgeniy Mokrov
, Yuliya Gaidamaka
, Konstantin E. Samouylov
:
Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments. 193 - Yousif A. Alhaj
, Abdelghani Dahou
, Mohammed Abdulaziz Aide Al-qaness
, Laith Abualigah
, Aaqif Afzaal Abbasi
, Nasser Ahmed Obad Almaweri, Mohamed Abd Elaziz
, Robertas Damasevicius
:
A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language. 194 - Thanassis Mpimis
, Theodore T. Kapsis, Athanasios D. Panagopoulos
, Vassilis Gikas:
Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis. 195 - Luís Gameiro, Carlos R. Senna
, Miguel Luís
:
Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments. 196 - Martina Pappalardo
, Antonio Virdis
, Enzo Mingozzi
:
Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems. 197 - Yancong Zhu, Juan Zhang, Zhaoxi Zhang, Gina Clepper, Jingpeng Jia, Wei Liu
:
Designing an Interactive Communication Assistance System for Hearing-Impaired College Students Based on Gesture Recognition and Representation. 198 - Khadijeh Alibabaei
, Eduardo Assunção
, Pedro Dinis Gaspar
, Vasco N. G. J. Soares
, João M. L. P. Caldeira
:
Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices. 199 - Renee Carnley, Sikha Bagui
:
A Public Infrastructure for a Trusted Wireless World. 200 - Abdulrahman Khalid Alnaim
:
Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization. 201 - Yingxun Wang, Hushairi Zen, Mohamad Faizrizwan Mohd Sabri
, Xiang Wang, Lee Chin Kho:
Towards Strengthening the Resilience of IoV Networks - A Trust Management Perspective. 202 - Minwoo Park, Eui Chul Lee
:
Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors. 203 - Aristeidis Lamprogeorgos, Minas Pergantis
, Michail Panagopoulos
, Andreas Giannakoulopoulos
:
Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction. 204 - Zubair A. Baig
, Naeem Syed
, Nazeeruddin Mohammad
:
Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning. 205 - Alexandros Kouretsis, Iraklis Varlamis
, Laida Limniati, Minas Pergantis
, Andreas Giannakoulopoulos
:
Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art. 206 - Hengfei Cheng, Zhaobin Xu, Xiaoxu Guo, Jia Yang, Kedi Xu, Shuqin Liu, Zhonghe Jin, Xiaojun Jin
:
Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites. 207 - Gürdal Ertek
, Aysha Al-Kaabi, Aktham Issa Maghyereh
:
Analytical Modeling and Empirical Analysis of Binary Options Strategies. 208 - Cheng Yang, Tianliang Lu, Shangyi Yan, Jianling Zhang, Xingzhan Yu:
N-Trans: Parallel Detection Algorithm for DGA Domain Names. 209 - Flavio Pinto
, Yogachandran Rahulamathavan, James Skinner
:
Blockchain for Doping Control Applications in Sports: A Conceptual Approach. 210 - Daiho Uhm, Sunghae Jun
:
Zero-Inflated Patent Data Analysis Using Generating Synthetic Samples. 211 - Kangying Li
, Jiayun Wang, Biligsaikhan Batjargal
, Akira Maeda
:
Intuitively Searching for the Rare Colors from Digital Artwork Collections by Text Description: A Case Demonstration of Japanese Ukiyo-e Print Retrieval. 212 - Thiago C. Jesus
, Daniel G. Costa
, Paulo Portugal
, Francisco Vasques
:
A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks. 213 - Mohd Yaseen Mir
, Hengbing Zhu, Chih-Lin Hu:
Enhanced Geographic Routing with One- and Two-Hop Movement Information in Opportunistic Ad Hoc Networks. 214 - Marcin Watorek
, Jaroslaw Kwapien
, Stanislaw Drozdz
:
Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-COVID-19 Time. 215 - Yehia Ibrahim Alzoubi
, Ahmad Salah Al-Ahmad
, Hasan Kahtan
, Ashraf Jaradat
:
Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges. 216
Volume 14, Number 8, August 2022
- Ammar Alazab
, Ansam Khraisat, Moutaz Alazab
, Sarabjot Singh
:
Detection of Obfuscated Malicious JavaScript Code. 217 - Xieling Chen
, Fu Lee Wang
, Gary Cheng
, Man-Kong Chow, Haoran Xie
:
Understanding Learners' Perception of MOOCs Based on Review Data Analysis Using Deep Learning and Sentiment Analysis. 218 - Esad Kadusic
, Natasa Zivic
, Christoph Ruland, Narcisa Hadzajlic
:
A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform. 219 - Nicholas James
, Lee-Yeng Ong
, Meng Chew Leow
:
Exploring Distributed Deep Learning Inference Using Raspberry Pi Spark Cluster. 220 - Marco Ferretti, Ugo Fiore, Francesca Perla, Marcello Risitano
, Salvatore Scognamiglio
:
Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development. 221 - Farhad Ahamed
, Farnaz Farid
, Basem Suleiman
, Zohaib Jan
, Luay A. Wahsheh, Seyed A. Shahrestani:
An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services. 222 - Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan
, Bashar Igried
:
A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior. 223 - Jessica Rubart
, Valentin Grimm
, Jonas Potthast
:
Augmenting Industrial Control Rooms with Multimodal Collaborative Interaction Techniques. 224 - Wenbo Ren
, Xinran Bian
, Jiayuan Gong
, Anqing Chen, Ming Li, Zhuofei Xia, Jingnan Wang:
Analysis and Visualization of New Energy Vehicle Battery Data. 225 - Zhiqiang Dai, Gaochao Xu, Ziqi Liu, Jiaqi Ge, Wei Wang:
Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning. 226 - Zhuofei Xia, Jiayuan Gong
, Hailong Yu, Wenbo Ren
, Jingnan Wang:
Research on Urban Traffic Incident Detection Based on Vehicle Cameras. 227 - Michael Petrolini
, Stefano Cagnoni
, Monica Mordonini
:
Automatic Detection of Sensitive Data Using Transformer- Based Classifiers. 228 - Jimmy Moedjahedy
, Arief Setyanto
, Fawaz Khaled Alarfaj
, Mohammed Alreshoodi
:
CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning. 229 - Sisay Tadesse Arzo
, Zeinab Akhavan
, Mona Esmaeili
, Michael Devetsikiotis, Fabrizio Granelli
:
Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks. 230 - Siti-Aisyah Zali, Shahbe Mat Desa
, Zarina Che Embi
, Wan Noorshahida Mohd Isa
:
Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET. 231 - Despoina Chochtoula, Aristidis Ilias, Yannis C. Stamatiou, Christos Makris
:
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol. 232 - Hamid Bagha, Ali Yavari
, Dimitrios Georgakopoulos
:
Hybrid Sensing Platform for IoT-Based Precision Agriculture. 233 - Shangyi Yan, Jingya Wang, Zhiqiang Song:
Microblog Sentiment Analysis Based on Dynamic Character-Level and Word-Level Features and Multi-Head Self-Attention Pooling. 234 - Yaning Li, Hongsheng Li, Baoguo Yu, Jun Li:
A CSI Fingerprint Method for Indoor Pseudolite Positioning Based on RT-ANN. 235 - Bijian Jian, Chunbo Ma, Dejian Zhu, Yixiao Sun, Jun Ao:
Seeing through Wavy Water-Air Interface: A Restoration Model for Instantaneous Images Distorted by Surface Waves. 236 - Francesca Fallucchi
, Bouchra Ghattas, Riem Spielhaus, Ernesto William De Luca:
Digital Qualitative and Quantitative Analysis of Arabic Textbooks. 237 - Fazal Raheman
, Tejas Bhagat, Brecht Vermeulen, Peter Van Daele:
Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis. 238 - Usman Ali
, Giuseppe Caso
, Luca De Nardis
, Konstantinos Kousias
, Mohammad Rajiullah
, Özgü Alay
, Marco Neri
, Anna Brunström
, Maria-Gabriella Di Benedetto
:
Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks. 239 - Ahmed Latif Yaser
, Hamdy M. Mousa, Mahmoud Hussein
:
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder. 240 - Padmalochan Panda, Alekha Kumar Mishra
, Deepak Puthal
:
A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems. 241 - Georgios Kallitsis
, Vasileios Karyotis
, Symeon Papavassiliou
:
On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information. 242 - Francesco Buccafurri
, Vincenzo De Angelis
, Sara Lazzaro
:
A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees. 243 - Gianfranco Lombardo
, Mattia Pellegrino
, George Adosoglou, Stefano Cagnoni
, Panos M. Pardalos, Agostino Poggi
:
Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks. 244
Volume 14, Number 9, September 2022
- Jingwen Dong
, Siti Nurulain Mohd Rum
, Khairul Azhar Kasmiran, Teh Noranis Mohd Aris, Raihani Mohamed
:
Artificial Intelligence in Adaptive and Intelligent Educational System: A Review. 245 - Tanweer Alam
, Ruchi Gupta:
Federated Learning and Its Role in the Privacy Preservation of IoT Devices. 246 - Mohammad S. Islam
, Shahid Husain, Jawed Mustafa
, Yuantong Gu
:
A Novel Machine Learning Prediction Model for Aerosol Transport in Upper 17-Generations of the Human Respiratory Tract. 247 - Ekaterina V. Orlova
:
Design Technology and AI-Based Decision Making Model for Digital Twin Engineering. 248 - Katerina Vgena
, Angeliki Kitsiou, Christos Kalloniatis
, Stefanos Gritzalis
:
Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media. 249 - Rajasekhar Chaganti
, Vijayakumar Varadarajan
, Venkata Subbarao Gorantla, Thippa Reddy Gadekallu
, Vinayakumar Ravi
:
Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture. 250 - Jacopo Fior
, Luca Cagliero
, Paolo Garza
:
Leveraging Explainable AI to Support Cryptocurrency Investors. 251 - Mst. Shapna Akter, Hossain Shahriar, Reaz Chowdhury, M. R. C. Mahdy:
Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach. 252 - Purushottam Sharma
, Devesh Tulsian, Chaman Verma
, Pratibha Sharma, Nancy Nancy
:
Translating Speech to Indian Sign Language Using Natural Language Processing. 253 - Urmila Pilania, Rohit Tanwar
, Mazdak Zamani
, Azizah Abdul Manaf:
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. 254 - Sitalakshmi Venkatraman
, Fahri Benli
, Ye Wei, Fiona Wahr:
Smart Classroom Teaching Strategy to Enhance Higher Order Thinking Skills (HOTS) - An Agile Approach for Education 4.0. 255 - Ajmery Sultana
, Xavier Fernando
:
Intelligent Reflecting Surface-Aided Device-to-Device Communication: A Deep Reinforcement Learning Approach. 256 - Shiva Raj Pokhrel
, Carey Williamson:
A Game-Theoretic Rent-Seeking Framework for Improving Multipath TCP Performance. 257 - Hongtao Zhu
, Huahu Xu, Xiaojin Ma, Minjie Bian:
Facial Expression Recognition Using Dual Path Feature Fusion and Stacked Attention. 258 - Stephen Afrifa
, Tao Zhang, Peter Appiahene
, Vijayakumar Varadarajan
:
Mathematical and Machine Learning Models for Groundwater Level Changes: A Systematic Review and Bibliographic Analysis. 259 - Viera Maslej-Kresnáková
, Martin Sarnovsky
, Júlia Jacková:
Use of Data Augmentation Techniques in Detection of Antisocial Behavior Using Deep Learning Methods. 260 - Jie Yang, Jiajia Zhu, Ziyu Pan:
A Fairness Index Based on Rate Variance for Downlink Non-Orthogonal Multiple Access System. 261 - Renaud Fabre
, Otmane Azeroual
, Patrice Bellot
, Joachim Schöpfel
, Daniel Egret
:
Retrieving Adversarial Cliques in Cognitive Communities: A New Conceptual Framework for Scientific Knowledge Graphs. 262 - Saeed A. Astaneh, Shahram Shah-Heydari
, Sara Taghavi Motlagh, Alireza Izaddoost:
Trade-offs between Risk and Operational Cost in SDN Failure Recovery Plan. 263 - Antonio Francesco Gentile
, Davide Macrì
, Floriano De Rango
, Mauro Tropea
, Emilio Greco:
A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment. 264 - Aqsa Sayeed
, Chaman Verma
, Neerendra Kumar
, Neha Koul
, Zoltán Illés:
Approaches and Challenges in Internet of Robotic Things. 265 - William Eduardo Villegas-Ch.
, Angel Jaramillo-Alcázar
, Aracely Mera-Navarrete:
Assistance System for the Teaching of Natural Numbers to Preschool Children with the Use of Artificial Intelligence Algorithms. 266 - Hangwei Feng
, Jinlin Wang, Yang Li:
An Efficient Blockchain Transaction Retrieval System. 267 - Majd Nafeh
, Arash Bozorgchenani
, Daniele Tarchi
:
Joint Scalable Video Coding and Transcoding Solutions for Fog-Computing-Assisted DASH Video Applications. 268 - Faten Chaabane, Jalel Ktari
, Tarek Frikha
, Habib Hamam
:
Low Power Blockchained E-Vote Platform for University Environment. 269
Volume 14, Number 10, October 2022
- Eduardo Morales-Vizcarra
, Carolina Del-Valle-Soto
, Paolo Visconti
, Fabiola Cortes-Chavez
:
Analysis and Correlation between a Non-Invasive Sensor Network System in the Room and the Improvement of Sleep Quality. 270 - Ameeth Sooklall
, Jean Vincent Fonou Dombeu
:
An Enhanced ELECTRE II Method for Multi-Attribute Ontology Ranking with Z-Numbers and Probabilistic Linguistic Term Set. 271 - Ankita Dhar
, Himadri Mukherjee
, Shibaprasad Sen
, Sk Md Obaidullah
, Amitabha Biswas, Teresa Gonçalves
, Kaushik Roy:
Author Identification from Literary Articles with Visual Features: A Case Study with Bangla Documents. 272 - Xingjian Xu
, Lijun Sun, Fanjun Meng:
Distributed Big Data Storage Infrastructure for Biomedical Research Featuring High-Performance and Rich-Features. 273 - Nane Kratzke
:
Cloud-Native Observability: The Many-Faceted Benefits of Structured and Unified Logging - A Multi-Case Study. 274 - Felipe Rafael de Sá Menezes Lucena, Fábio Marcelo Breunig
, Hermann Kux:
The Combined Use of UAV-Based RGB and DEM Images for the Detection and Delineation of Orange Tree Crowns with Mask R-CNN: An Approach of Labeling and Unified Framework. 275 - Rohit Akhilesh, Oliver Bills, Naveen K. Chilamkurti
, Mohammad Jabed Morshed Chowdhury:
Automated Penetration Testing Framework for Smart-Home-Based IoT Devices. 276 - Ramya Krishna Manugunta, Rytis Maskeliunas
, Robertas Damasevicius
:
Deep Learning Based Semantic Image Segmentation Methods for Classification of Web Page Imagery. 277 - Giovanni Luca Giacco
, Stefano Marrone
, Giuliano Langella
, Carlo Sansone
:
ReFuse: Generating Imperviousness Maps from Multi-Spectral Sentinel-2 Satellite Imagery. 278 - Sa Yang, Suoping Li
, Nana Yang
, Ying Lin:
Modelling Analysis of a Novel Frameless Slotted-ALOHA Protocol Based on the Number of Detectable Conflicting Users. 279 - Francesco Pirotti
, Marco Piragnolo
, Marika D'Agostini
, Raffaele Cavalli
:
Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden. 280 - Hamza Mohammed Ridha Al-Khafaji
:
Improving Quality Indicators of the Cloud-Based IoT Networks Using an Improved Form of Seagull Optimization Algorithm. 281 - Tamas Pflanzner
, Hamza Baniata
, Attila Kertész
:
Latency Analysis of Blockchain-Based SSI Applications. 282 - Giancarlo Ruffo
, Alfonso Semeraro
:
FakeNewsLab: Experimental Study on Biases and Pitfalls Preventing Us from Distinguishing True from False News. 283 - Paschalia-Lia Spyridou
, Constantinos Djouvas
, Dimitra Milioni
:
Modeling and Validating a News Recommender Algorithm in a Mainstream Medium-Sized News Organization: An Experimental Approach. 284 - Pablo Iglesias-Sanuy
, José Carlos López-Ardao
, Miguel Rodríguez-Pérez
, Sergio Herrería-Alonso
, Andrés Suárez-González
, Raúl Fernando Rodríguez Rubio
:
An Efficient Location-Based Forwarding Strategy for Named Data Networking and LEO Satellite Communications. 285 - Anargyros J. Roumeliotis
, Christos N. Efrem, Athanasios D. Panagopoulos
:
Minimization of nth Order Rate Matching in Satellite Networks with One to Many Pairings. 286 - Anna V. Kurtukova
, Aleksandr Romanov
, Alexander A. Shelupanov, Anastasia Mikhailovna Fedotova:
Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network. 287 - John M. Carroll
, Fanlu Gui, Srishti Gupta, Tiffany Knearem:
Playful Meaning-Making as Prosocial Fun. 288 - Dawei Wei, Feifei Shi, Sahraoui Dhelim
:
A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period. 289 - Gengxian Li, Chundong Wang, Huaibin Wang:
Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches. 290 - Stefan Claus, Massimo Stella
:
Natural Language Processing and Cognitive Networks Identify UK Insurers' Trends in Investor Day Transcripts. 291 - Leonardo Alberro
, Felipe Velázquez, Sara Azpiroz, Eduardo Grampín
, Matias Richart
:
Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach. 292 - Erfan Mozaffari Ahrar, Fabrice Theoleyre
, Michael Menth
:
A Survey of Wi-Fi 6: Technologies, Advances, and Challenges. 293 - Taghreed Alghamdi, Sifatul Mostafi, Ghadeer Abdelkader, Khalid Elgazzar
:
A Comparative Study on Traffic Modeling Techniques for Predicting and Simulating Traffic Behavior. 294 - Liudmyla Matviichuk
, Stefano Ferilli
, Nataliia Hnedko:
Study of the Organization and Implementation of E-Learning in Wartime Inside Ukraine. 295 - Kirill Chemrov
, Dmitry Bankov
, Evgeny M. Khorov
, Andrey I. Lyakhov
:
Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks. 296 - Maytham N. Meqdad
, Seifedine Kadry
, Hafiz Tayyab Rauf
:
Improved Dragonfly Optimization Algorithm for Detecting IoT Outlier Sensors. 297 - Ronaldo Serrano
, Ckristian Duran
, Marco Sarmiento
, Tuan-Kiet Dang
, Trong-Thuc Hoang
, Cong-Kha Pham
:
A Unified PUF and Crypto Core Exploiting the Metastability in Latches. 298 - Yves Adou
, Ekaterina V. Markova
, Yuliya Gaidamaka
:
Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework. 299 - Ján Mojzis
, Peter Krammer, Marcel Kvassay
, Lenka Skovajsová, Ladislav Hluchý
:
Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages. 300 - Amit Sagu
, Nasib Singh Gill
, Preeti Gulia
, Jyotir Moy Chatterjee
, Ishaani Priyadarshini:
A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment. 301
Volume 14, Number 11, November 2022
- Christoph Stach
, Clémentine Gritti
, Julia Bräcker
, Michael Behringer
, Bernhard Mitschang
:
Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects. 302 - William Eduardo Villegas-Ch.
, Santiago Criollo-C
, Walter Gaibor-Naranjo, Xavier Palacios-Pacheco:
Analysis of Data from Surveys for the Identification of the Factors That Influence the Migration of Small Companies to eCommerce. 303 - Ariel Vieira de Oliveira, Márcia Cristina Schiavi Dazzi, Anita Maria da Rocha Fernandes
, Rudimar Luís Scaranto Dazzi, Paulo Ferreira
, Valderi Reis Quietinho Leithardt
:
Decision Support Using Machine Learning Indication for Financial Investment. 304 - Rasheed Gbenga Jimoh, Olayinka Olufunmilayo Olusanya, Joseph Bamidele Awotunde
, Agbotiname Lucky Imoize
, Cheng-Chi Lee
:
Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases. 305 - Davide Tosi
:
Editorial for the Special Issue on "Software Engineering and Data Science". 306 - Qi Qian, Liang Shu
, Yuxiang Leng, Zhizhou Bao:
LoRaWAN Network Downlink Routing Control Strategy Based on the SDN Framework and Improved ARIMA Model. 307 - Obaid Rafiq Jan
, Hudyjaya Siswoyo Jo
, Riady Siswoyo Jo
, Jonathan Kua
:
Real-Time Flood Monitoring with Computer Vision through Edge Computing-Based Internet of Things. 308 - Faycal Bouhafs, Alessandro Raschellà
, Michael Mackay
, Frank T. H. den Hartog:
A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G. 309 - Markus Weinberger
:
What Is Metaverse? - A Definition Based on Qualitative Meta-Synthesis. 310 - Shota Toriyama, Shoma Hasegawa, Jens Kirchner
, Georg Fischer
, Daisuke Anzai
:
Ambient Environmental Parameter Estimation for Reliable Diffusive Molecular Communications. 311 - Kerima Saleh Abakar
, Ismail Bennis
, Abdelhafid Abouaissa
, Pascal Lorenz
:
A Multi-Gateway Behaviour Study for Traffic-Oriented LoRaWAN Deployment. 312 - Angela M. Vargas-Arcila
, Julian Andres Caicedo-Muñoz
, Felipe Estrada Solano
, Carlos Andres Gonzalez-Amarillo
, Armando Ordóñez
, José L. Arciniegas
:
EduTVA: Metadata Schema for Educational Audiovisual Contents in Digital Television Environments. 313 - Sreejith Alathur
, Naganna Chetty
, Rajesh R. Pai, Vishal Kumar
, Sahraoui Dhelim
:
Hate and False Metaphors: Implications to Emerging E-Participation Environment. 314 - Jane Henriksen-Bulmer
, Cagatay Yucel
, Shamal Faily
, Ioannis Chalkias
:
Privacy Goals for the Data Lifecycle. 315 - Tianyu Bai, Song Fu, Qing Yang:
Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing. 316 - Christoph Stach
:
Special Issue on Security and Privacy in Blockchains and the IoT. 317 - Leonilde Rocha Varela
, Goran D. Putnik:
Collaborative and Intelligent Networks and Decision Systems and Services for Supporting Engineering and Production Management. 318 - Yousef-Awwad Daraghmi
, Mamoun Abu Helou
, Eman Yasser Daraghmi
, Waheeb Abu-ulbeh:
IoT-Based System for Improving Vehicular Safety by Continuous Traffic Violation Monitoring. 319 - Matthew Spradling
, Jeremy Straub:
Evaluation of the Factors That Impact the Perception of Online Content Trustworthiness by Income, Political Affiliation and Online Usage Time. 320 - Iikka Paajala, Jesse Nyyssölä, Juho Mattila, Pasi Karppinen
:
Users' Perceptions of Key Blockchain Features in Games. 321 - Khalid Alsubhi, Bander A. Alzahrani
, Nikos Fotiou
, Aiiad Albeshri
, Mohammed Alreshoodi
:
Reliable Application Layer Routing Using Decentralized Identifiers. 322 - Eduardo Assunção
, Pedro Dinis Gaspar
, Khadijeh Alibabaei
, Maria P. Simões
, Hugo Proença
, Vasco N. G. J. Soares
, João M. L. P. Caldeira
:
Real-Time Image Detection for Edge Devices: A Peach Fruit Detection Application. 323 - Xiaoting Xu
, Tin Lai
, Sayka Jahan, Farnaz Farid
, Abubakar Bello:
A Machine Learning Predictive Model to Detect Water Quality and Pollution. 324 - Yiyi Zhang, Tatsuo Nakajima:
Exploring the Design of a Mixed-Reality 3D Minimap to Enhance Pedestrian Satisfaction in Urban Exploratory Navigation. 325 - Yujian Zhang
, Daifu Liu
:
Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network. 326 - Roger C. Brackin, Michael Jackson
, Andrew Leyshon
, Jeremy G. Morley
, Sarah Jewitt
:
Generating Indicators of Disruptive Innovation Using Big Data. 327 - Angeliki Kitsiou, Charikleia Despotidi, Christos Kalloniatis
, Stefanos Gritzalis
:
The Role of Users' Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study. 328 - Beatriz Villarejo-Carballido
, Cristina M. Pulido
, Santiago Tejedor
:
Key Competences for Lifelong Learning through the "Animal Crossing: New Horizons" Video Game. 329 - Yue Su
, Kien Nguyen
, Hiroo Sekiya
:
A Comparison of Blockchain Recovery Time in Static and Mobile IoT-Blockchain Networks. 330 - Yuefeng Cen
, Mingxing Luo, Gang Cen, Cheng Zhao
, Zhigang Cheng:
Financial Market Correlation Analysis and Stock Selection Application Based on TCN-Deep Clustering. 331 - Xinlu Li
, Yuanyuan Lei, Shengwei Ji
:
BERT- and BiLSTM-Based Sentiment Analysis of Online Chinese Buzzwords. 332 - Husam Suleiman
:
A Cost-Aware Framework for QoS-Based and Energy-Efficient Scheduling in Cloud-Fog Computing. 333 - Svetlana S. Bodrunova
:
Editorial for the Special Issue "Selected Papers from the 9th Annual Conference 'Comparative Media Studies in Today's World' (CMSTW'2021)". 334 - Fazal Raheman
:
The Future of Cybersecurity in the Age of Quantum Computers. 335 - Fabian Honecker
, Julian Dreyer
, Ralf Tönjes
:
Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures. 336 - Iwona Grobelna
:
Internet of Things and Cyber-Physical Systems. 337 - Muhammad Asad, Muhammad Aslam, Syeda Fizzah Jilani, Saima Shaukat, Manabu Tsukada:
SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems. 338 - Ahmad S. Alsadeh
, Nasri Yatim
, Yousef Hassouneh
:
A Dynamic Federated Identity Management Using OpenID Connect. 339 - Sanjiban Sekhar Roy
, Ali Ismail Awad
, Lamesgen Adugnaw Amare, Mabrie Tesfaye Erkihun, Mohd Anas
:
Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models. 340 - Gousia Habib
, Sparsh Sharma, Sara Ibrahim, Imtiaz Ahmed
, Shaima Qureshi, Malik Ishfaq
:
Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. 341 - Michael Mackay
:
Editorial for the Special Issue on 5G-Enabling Technologies and Wireless Networking. 342 - Efthimis Kotenidis
, Nikolaos Vryzas
, Andreas A. Veglis
, Charalampos Dimoulas
:
Integrating Chatbot Media Automations in Professional Journalism: An Evaluation Framework. 343 - Elöd Csirmaz
, László Csirmaz
:
Data Synchronization: A Complete Theoretical Solution for Filesystems. 344 - Nikita Polyakov
, Anna A. Platonova
:
Assessing Latency of Packet Delivery in the 5G 3GPP Integrated Access and Backhaul Architecture with Half-Duplex Constraints. 345
Volume 14, Number 12, December 2022
- Nane Kratzke
:
Cloud-Native Applications and Services. 346 - Bohao Tang
, Lihua Cai, Shuai Yang, Jiaxing Xu, Yi Yu:
Evolutionary Computation for Sparse Synthesis Optimization of CCAAs: An Enhanced Whale Optimization Algorithm Method. 347 - Jorge Visca
, Javier Baliosian:
rl4dtn: Q-Learning for Opportunistic Networks. 348 - Wendou Yan
, Xiuying Wang, Shoubiao Tan
:
YOLO-DFAN: Effective High-Altitude Safety Belt Detection Network. 349 - Olga Papadopoulou
, Evangelia Kartsounidou
, Symeon Papadopoulos
:
COVID-Related Misinformation Migration to BitChute and Odysee. 350 - Sampada Tavse
, Varadarajan Vijayakumar
, Mrinal Rahul Bachute
, Shilpa Gite, Ketan Kotecha
:
A Systematic Literature Review on Applications of GAN-Synthesized Images for Brain MRI. 351 - Rung-Ching Chen
, William Eric Manongga, Christine Dewi
:
Recursive Feature Elimination for Improving Learning Points on Hand-Sign Recognition. 352 - Zhiyang Sun
, Hui Ruan
, Yixin Cao, Yang Chen
, Xin Wang:
Analysis and Prediction of the IPv6 Traffic over Campus Networks in Shanghai. 353 - Ronghua Xu
, Yu Chen
, Genshe Chen
, Erik Blasch
:
SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network. 354 - Priyank Kalgaonkar
, Mohamed El-Sharkawy
:
NextDet: Efficient Sparse-to-Dense Object Detection with Attentive Feature Aggregation. 355 - Magdalena Osial
, Agnieszka Pregowska
:
The Application of Artificial Intelligence in Magnetic Hyperthermia Based Research. 356 - Alessio Bottrighi
, Marco Guazzone
, Giorgio Leonardi, Stefania Montani
, Manuel Striani
, Paolo Terenziani:
Integrating ISA and Part-of Domain Knowledge into Process Model Discovery. 357 - Nikola Andelic
, Sandi Baressi Segota
, Ivan Lorencin
, Matko Glucina
:
Detection of Malicious Websites Using Symbolic Classifier. 358 - Alexander V. Yakunin, Svetlana S. Bodrunova
:
Cumulative Impact of Testing Factors in Usability Tests for Human-Centered Web Design. 359 - Pedro Rodrigues
, Filipe Freitas
, José Simão
:
QuickFaaS: Providing Portability and Interoperability between FaaS Platforms. 360 - Anselmo Luiz Éden Battisti
, Evandro Luiz Cardoso Macedo
, Marina Ivanov Pereira Josué
, Hugo Barbalho
, Flávia Coimbra Delicato
, Débora Christina Muchaluat-Saade
, Paulo F. Pires
, Douglas Paulo de Mattos
, Ana Cristina Bernardo de Oliveira:
A Novel Strategy for VNF Placement in Edge Computing Environments. 361 - Razvan Florea
, Mitica Craus
:
A Game-Theoretic Approach for Network Security Using Honeypots. 362 - Nikolaos Schizas
, Aristeidis Karras
, Christos N. Karras
, Spyros Sioutas
:
TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review. 363 - João da Mata Libório Filho
, Cesar A. V. Melo
, Marcos Silva
:
Internet Video Delivery Improved by Super-Resolution with GAN. 364 - Ashraf A. Taha, Hagar O. Abouroumia, Shimaa A. Mohamed, Lamiaa A. Amar
:
Enhancing the Lifetime and Energy Efficiency of Wireless Sensor Networks Using Aquila Optimizer Algorithm. 365 - Vasileios Cheimaras
, Athanasios Trigkas
, Panagiotis Papageorgas
, Dimitrios D. Piromalis
, Emmanouil Sofianopoulos:
A Low-Cost Open-Source Architecture for a Digital Signage Emergency Evacuation System for Cruise Ships, Based on IoT and LTE/4G Technologies. 366 - Celeste Campos-Castillo, Noelle Chesley, Onur Asan
:
Professionals as Change Agents or Instruments of Reproduction? Medical Residents' Reasoning for Not Sharing the Electronic Health Record Screen with Patients. 367 - Pejman Goudarzi
, Mehdi Hosseinpour, Roham Goudarzi, Jaime Lloret
:
Holistic Utility Satisfaction in Cloud Data Centre Network Using Reinforcement Learning. 368 - Surjit Singh
, Pawan Kumar, Srete Nikolovski
:
LSSDNF: A Lightweight Secure Software Defined Network Framework for Future Internet in 5G-6G. 369 - Ivan Miguel Pires
:
Smart Objects and Technologies for Social Good. 370 - Krishnamurthy V. Vemuru
:
Implementation of the Canny Edge Detector Using a Spiking Neural Network. 371 - Weizhi Meng
, Thanassis Giannetsos
, Christian Damsgaard Jensen:
Information and Future Internet Security, Trust and Privacy. 372 - Okiemute Roberts Omasheye, Samuel Azi, Joseph Isabona
, Agbotiname Lucky Imoize
, Chun-Ta Li
, Cheng-Chi Lee
:
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks. 373 - David Pérez-Jorge
, María Carmen Martínez-Murciano
:
Gamification with Scratch or App Inventor in Higher Education: A Systematic Review. 374 - Tony Gwyn
, Kaushik Roy:
Examining Gender Bias of Convolutional Neural Networks via Facial Recognition. 375 - Yinglin Wang, Xinyu Xu:
ERGCN: Enhanced Relational Graph Convolution Network, an Optimization for Entity Prediction Tasks on Temporal Knowledge Graphs. 376 - Ahmed Abbas Mohsin Al-Saedi
, Veselka Boeva
, Emiliano Casalicchio
:
FedCO: Communication-Efficient Federated Learning via Clustering Optimization. 377 - Nico Surantha
, Noffal A. Putra
:
Integrated SDN-NFV 5G Network Performance and Management-Complexity Evaluation. 378 - Kelvin O. O. Anoh, Chan Hwang See
, Yousif A. Dama
, Raed A. Abd-Alhameed
, Simeon Keates:
6G Wireless Communication Systems: Applications, Opportunities and Challenges. 379 - Jen-Li Chung, Lee-Yeng Ong
, Meng Chew Leow
:
Comparative Analysis of Skeleton-Based Human Pose Estimation. 380 - Michele Fiorentino
, Marina Ricci
, Alessandro Evangelista
, Vito Modesto Manghisi
, Antonio Emmanuele Uva:
A Multi-Sensory In-Store Virtual Reality Customer Journey for Retailing: A Field Study in a Furniture Flagship Store. 381 - Uttam Ghosh
, Deepak K. Tosh
, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir
, Al-Sakib Khan Pathan
, Zhaolong Ning:
Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains. 382 - Tajana Ban Kirigin
, Sanda Bujacic
, Benedikt Perak
:
Graph-Based Taxonomic Semantic Class Labeling. 383 - Jingyuan Hu, Zhouwang Yang:
Single-Shot Global and Local Context Refinement Neural Network for Head Detection. 384

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.