Content
May 2024, Volume 16, Issue 6
- 1-16 Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature
by Liyuan Liang & Like Gobeawan & Siu-Kit Lau & Ervine Shengwei Lin & Kai Keng Ang - 1-16 Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values
by Muthana Al-Amidie & Laith Alzubaidi & Muhammad Aminul Islam & Derek T. Anderson - 1-16 Prophet–CEEMDAN–ARBiLSTM-Based Model for Short-Term Load Forecasting
by Jindong Yang & Xiran Zhang & Wenhao Chen & Fei Rong - 1-17 Enhanced Beacons Dynamic Transmission over TSCH
by Erik Ortiz Guerra & Mario Martínez Morfa & Carlos Manuel García Algora & Hector Cruz-Enriquez & Kris Steenhaut & Samuel Montejo-Sánchez - 1-19 Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids
by Fouzi Harrou & Benamar Bouyeddou & Abdelkader Dairi & Ying Sun - 1-19 Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor
by Josué I. Rojo-García & Sergio A. Vera-Chavarría & Yair Lozano-Hernández & Victor G. Sánchez-Meza & Jaime González-Sierra & Luz N. Oliva-Moreno - 1-19 Studying the Quality of Source Code Generated by Different AI Generative Engines: An Empirical Evaluation
by Davide Tosi - 1-19 GreenLab, an IoT-Based Small-Scale Smart Greenhouse
by Cristian Volosciuc & Răzvan Bogdan & Bianca Blajovan & Cristina Stângaciu & Marius Marcu - 1-20 MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing
by Yuchen Wang & Zishan Huang & Zhongcheng Wei & Jijun Zhao - 1-20 Dynamic Spatial–Temporal Self-Attention Network for Traffic Flow Prediction
by Dong Wang & Hongji Yang & Hua Zhou - 1-21 Using ChatGPT in Software Requirements Engineering: A Comprehensive Review
by Nuno Marques & Rodrigo Rocha Silva & Jorge Bernardino - 1-21 Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks
by Ayman Khalil & Besma Zeddini - 1-21 HP-LSTM: Hawkes Process–LSTM-Based Detection of DDoS Attack for In-Vehicle Network
by Xingyu Li & Ruifeng Li & Yanchen Liu - 1-22 Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring
by Mohammad Imran Ali & Shahi Dost & Khurram Shehzad Khattak & Muhammad Imran Khan & Riaz Muhammad
June 2024, Volume 16, Issue 6
- 1-12 Adapting Self-Regulated Learning in an Age of Generative Artificial Intelligence Chatbots
by Joel Weijia Lai - 1-13 IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
by Umang Garg & Santosh Kumar & Aniket Mahanti - 1-14 Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction
by Xu Wang & Jui-Chuan Liu & Ching-Chun Chang & Chin-Chen Chang - 1-14 Improved Particle Filter in Machine Learning-Based BLE Fingerprinting Method to Reduce Indoor Location Estimation Errors
by Jingshi Qian & Jiahe Li & Nobuyoshi Komuro & Won-Suk Kim & Younghwan Yoo - 1-14 Discovery of Cloud Applications from Logs
by Ashot Harutyunyan & Arnak Poghosyan & Tigran Bunarjyan & Andranik Haroyan & Marine Harutyunyan & Lilit Harutyunyan & Nelson Baloian - 1-15 Metaverse and Fashion: An Analysis of Consumer Online Interest
by Carmen Ruiz Viñals & Marta Gil Ibáñez & José Luis Del Olmo Arriaga - 1-16 Enabling End-User Development in Smart Homes: A Machine Learning-Powered Digital Twin for Energy Efficient Management
by Luca Cotti & Davide Guizzardi & Barbara Rita Barricelli & Daniela Fogli - 1-17 The Use of Artificial Intelligence in eParticipation: Mapping Current Research
by Zisis Vasilakopoulos & Theocharis Tavantzis & Rafail Promikyridis & Efthimios Tambouris - 1-17 Learning Modality Consistency and Difference Information with Multitask Learning for Multimodal Sentiment Analysis
by Cheng Fang & Feifei Liang & Tianchi Li & Fangheng Guan - 1-17 Adaptive Framework for Maintenance Scheduling Based on Dynamic Preventive Intervals and Remaining Useful Life Estimation
by Pedro Nunes & Eugénio Rocha & José Santos - 1-18 In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System
by Carol Maher & Kylie A. Dankiw & Ben Singh & Svetlana Bogomolova & Rachel G. Curtis - 1-18 Towards a New Business Model for Streaming Platforms Using Blockchain Technology
by Rendrikson Soares & André Araújo - 1-18 Optimizing Data Parallelism for FM-Based Short-Read Alignment on the Heterogeneous Non-Uniform Memory Access Architectures
by Shaolong Chen & Yunzi Dai & Liwei Liu & Xinting Yu - 1-19 Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models
by Héctor Orrillo & André Sabino & Mário Marques da Silva - 1-22 Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems
by Tahani Baabdullah & Amani Alzahrani & Danda B. Rawat & Chunmei Liu - 1-22 Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes
by Abbas Javed & Amna Ehtsham & Muhammad Jawad & Muhammad Naeem Awais & Ayyaz-ul-Haq Qureshi & Hadi Larijani - 1-23 Usability Evaluation of Wearable Smartwatches Using Customized Heuristics and System Usability Scale Score
by Majed A. Alshamari & Maha M. Althobaiti - 1-25 Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction
by Wala Bagunaid & Naveen Chilamkurti & Ahmad Salehi Shahraki & Saeed Bamashmos - 1-29 Metric Space Indices for Dynamic Optimization in a Peer to Peer-Based Image Classification Crowdsourcing Platform
by Fernando Loor & Veronica Gil-Costa & Mauricio Marin - 1-29 Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks
by Wuzheng Tan & Shenglong Du & Jian Weng - 1-32 Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies
by Gabriel Arquelau Pimenta Rodrigues & André Luiz Marques Serrano & Guilherme Fay Vergara & Robson de Oliveira Albuquerque & Georges Daniel Amvame Nze - 1-32 Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0)
by Vitor Hugo dos Santos Filho & Luis Maurício Martins de Resende & Joseane Pontes - 1-40 Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks
by Jiayi Zhang & Abdelkader Ouda & Raafat Abu-Rukba
April 2024, Volume 16, Issue 5
- 1-13 Novel Approach towards a Fully Deep Learning-Based IoT Receiver Architecture: From Estimation to Decoding
by Matthew Boeding & Michael Hempel & Hamid Sharif - 1-15 Exploring Data Input Problems in Mixed Reality Environments: Proposal and Evaluation of Natural Interaction Techniques
by Jingzhe Zhang & Tiange Chen & Wenjie Gong & Jiayue Liu & Jiangjie Chen - 1-15 A Hybrid Multi-Agent Reinforcement Learning Approach for Spectrum Sharing in Vehicular Networks
by Mansoor Jamal & Zaib Ullah & Muddasar Naeem & Musarat Abbas & Antonio Coronato - 1-16 Effective Monoaural Speech Separation through Convolutional Top-Down Multi-View Network
by Aye Nyein Aung & Che-Wei Liao & Jeih-Weih Hung - 1-18 Median Absolute Deviation for BGP Anomaly Detection
by Maria Andrea Romo-Chavero & Jose Antonio Cantoral-Ceballos & Jesus Arturo Pérez-Díaz & Carlos Martinez-Cagnazzo - 1-19 Anticipating Job Market Demands—A Deep Learning Approach to Determining the Future Readiness of Professional Skills
by Albert Weichselbraun & Norman Süsstrunk & Roger Waldvogel & André Glatzl & Adrian M. P. Braşoveanu & Arno Scharl - 1-22 HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security
by Yazan Aref & Abdelkader Ouda - 1-22 A Blockchain-Based Real-Time Power Balancing Service for Trustless Renewable Energy Grids
by Andrea Calvagna & Giovanni Marotta & Giuseppe Pappalardo & Emiliano Tramontana - 1-23 A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking
by Daniel Nuñez-Agurto & Walter Fuertes & Luis Marrone & Eduardo Benavides-Astudillo & Christian Coronel-Guerrero & Franklin Perez - 1-25 A New Generation of Collaborative Immersive Analytics on the Web: Open-Source Services to Capture, Process and Inspect Users’ Sessions in 3D Environments
by Bruno Fanini & Giorgio Gosti - 1-27 A Method for the Rapid Propagation of Emergency Event Notifications in a Long Vehicle Convoy
by John David Sprunger & Alvin Lim & David M. Bevly - 1-27 A Fair Crowd-Sourced Automotive Data Monetization Approach Using Substrate Hybrid Consensus Blockchain
by Cyril Naves Samuel & François Verdier & Severine Glock & Patricia Guitton-Ouhamou - 1-37 Design and Implementation of a Low-Cost, Linear Robotic Camera System, Targeting Greenhouse Plant Growth Monitoring
by Zacharias Kamarianakis & Spyros Perdikakis & Ioannis N. Daliakopoulos & Dimitrios M. Papadimitriou & Spyros Panagiotakis
May 2024, Volume 16, Issue 5
- 1-13 Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization
by Zhe Ma & Xuhesheng Chen & Tiejiang Sun & Xukang Wang & Ying Cheng Wu & Mengjie Zhou - 1-15 AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses
by Jieli Chen & Kah Phooi Seng & Li Minn Ang & Jeremy Smith & Hanyue Xu - 1-15 SmartDED: A Blockchain- and Smart Contract-Based Digital Electronic Detonator Safety Supervision System
by Na Liu & Wei-Tek Tsai - 1-16 Optimization of Wheelchair Control via Multi-Modal Integration: Combining Webcam and EEG
by Lassaad Zaway & Nader Ben Amor & Jalel Ktari & Mohamed Jallouli & Larbi Chrifi Alaoui & Laurent Delahoche - 1-16 Blockchain and Smart Contracts for Digital Copyright Protection
by Franco Frattolillo - 1-17 Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications
by Tuan-Kiet Dang & Khai-Duy Nguyen & Binh Kieu-Do-Nguyen & Trong-Thuc Hoang & Cong-Kha Pham - 1-18 Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework
by Sarah Kaleem & Muhammad Asim & Mohammed El-Affendi & Muhammad Babar - 1-18 pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework
by Yu Zhang & Xiaowei Peng & Hequn Xian - 1-18 Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments
by Sonali Patwe & Sunil B. Mane - 1-18 MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms
by Faisal Fiaz & Syed Muhammad Sajjad & Zafar Iqbal & Muhammad Yousaf & Zia Muhammad - 1-19 BPET: A Unified Blockchain-Based Framework for Peer-to-Peer Energy Trading
by Caixiang Fan & Hamzeh Khazaei & Petr Musilek - 1-19 Chatbots in Airport Customer Service—Exploring Use Cases and Technology Acceptance
by Isabel Auer & Stephan Schlögl & Gundula Glowka - 1-20 Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning
by Yuzhu Zhang & Hao Xu - 1-20 Using Optimization Techniques in Grammatical Evolution
by Ioannis G. Tsoulos & Alexandros Tzallas & Evangelos Karvounis - 1-21 TQU-SLAM Benchmark Dataset for Comparative Study to Build Visual Odometry Based on Extracted Features from Feature Descriptors and Deep Learning
by Thi-Hao Nguyen & Van-Hung Le & Huu-Son Do & Trung-Hieu Te & Van-Nam Phan - 1-22 A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis
by Anjia Ye & Ananda Maiti & Matthew Schmidt & Scott J. Pedersen - 1-23 Indoor Infrastructure Maintenance Framework Using Networked Sensors, Robots, and Augmented Reality Human Interface
by Alireza Fath & Nicholas Hanna & Yi Liu & Scott Tanch & Tian Xia & Dryver Huston - 1-24 Enhanced Multi-Task Traffic Forecasting in Beyond 5G Networks: Leveraging Transformer Technology and Multi-Source Data Fusion
by Ibrahim Althamary & Rubbens Boisguene & Chih-Wei Huang - 1-25 Teamwork Conflict Management Training and Conflict Resolution Practice via Large Language Models
by Sakhi Aggrawal & Alejandra J. Magana - 1-27 Validation of Value-Driven Token Economy: Focus on Blockchain Content Platform
by Young Sook Kim & Seng-Phil Hong & Marko Majer - 1-29 Machine Learning Strategies for Reconfigurable Intelligent Surface-Assisted Communication Systems—A Review
by Roilhi F. Ibarra-Hernández & Francisco R. Castillo-Soria & Carlos A. Gutiérrez & Abel García-Barrientos & Luis Alberto Vásquez-Toledo & J. Alberto Del-Puerto-Flores - 1-30 Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection
by Muhammad Imran & Annalisa Appice & Donato Malerba
March 2024, Volume 16, Issue 4
- 1-14 Exploring Universal Filtered Multi Carrier Waveform for Last Meter Connectivity in 6G: A Street-Lighting-Driven Approach with Enhanced Simulator for IoT Application Dimensioning
by Véronique Georlette & Anne-Carole Honfoga & Michel Dossou & Véronique Moeyaert - 1-16 MOLM: Alleviating Congestion through Multi-Objective Simulated Annealing-Based Load Balancing Routing in LEO Satellite Networks
by Yihu Zhou & Haiming Chen & Zhibin Dou - 1-16 Continuous Space Wireless Communication Tower Placement by Hybrid Simulated Annealing
by Maolin Tang & Wei Li - 1-17 Implementing Federated Governance in Data Mesh Architecture
by Anton Dolhopolov & Arnaud Castelltort & Anne Laurent - 1-17 Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking
by Manar Aldaoud & Dawood Al-Abri & Medhat Awadalla & Firdous Kausar - 1-17 Multi-Agent Deep Reinforcement Learning-Based Fine-Grained Traffic Scheduling in Data Center Networks
by Huiting Wang & Yazhi Liu & Wei Li & Zhigang Yang - 1-18 A Novel Edge Platform Streamlining Connectivity between Modern Edge Devices and the Cloud
by Anderson Carvalho & Daniel Riordan & Joseph Walsh - 1-19 Performance Evaluation of Graph Neural Network-Based RouteNet Model with Attention Mechanism
by Binita Kusum Dhamala & Babu R. Dawadi & Pietro Manzoni & Baikuntha Kumar Acharya - 1-20 A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions
by Arpad Takacs & Tamas Haidegger - 1-20 Research on Blockchain Transaction Privacy Protection Methods Based on Deep Learning
by Jun Li & Chenyang Zhang & Jianyi Zhang & Yanhua Shao - 1-23 NeXtFusion: Attention-Based Camera-Radar Fusion Network for Improved Three-Dimensional Object Detection and Tracking
by Priyank Kalgaonkar & Mohamed El-Sharkawy - 1-29 Optimizing Hybrid V2X Communication: An Intelligent Technology Selection Algorithm Using 5G, C-V2X PC5 and DSRC
by Ihtisham Khalid & Vasilis Maglogiannis & Dries Naudts & Adnan Shahid & Ingrid Moerman - 1-36 Cloud Security Using Fine-Grained Efficient Information Flow Tracking
by Fahad Alqahtani & Mohammed Almutairi & Frederick T. Sheldon
April 2024, Volume 16, Issue 4
- 1-1 Correction: Li et al. A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation. Future Internet 2023, 15 , 395
by Zuopeng Li & Hengshuai Ju & Zepeng Ren - 1-13 Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation
by Bowen Liu & Qiang Tang - 1-17 SDN-Based Secure Common Emergency Service for Railway and Road Co-Existence Scenarios
by Radheshyam Singh & Leo Mendiboure & José Soler & Michael Stübert Berger & Tidiane Sylla & Marion Berbineau & Lars Dittmann - 1-17 Multi-WiIR: Multi-User Identity Legitimacy Authentication Based on WiFi Device
by Zhongcheng Wei & Yanhu Dong - 1-17 SUDC: Synchronous Update with the Division and Combination of SRv6 Policy
by Yuze Liu & Weihong Wu & Ying Wang & Jiang Liu & Fan Yang - 1-18 Perspectives of Young Digital Natives on Digital Marketing: Exploring Annoyance and Effectiveness with Eye-Tracking Analysis
by Stefanos Balaskas & Georgia Kotsari & Maria Rigou - 1-18 Polling Mechanisms for Industrial IoT Applications in Long-Range Wide-Area Networks
by David Todoli-Ferrandis & Javier Silvestre-Blanes & Víctor Sempere-Payá & Salvador Santonja-Climent - 1-19 Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks
by Wei Li & Mengzhen Ren & Yazhi Liu & Chenyu Li & Hui Qian & Zhenyou Zhang - 1-19 Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems
by Yuning Jiang & Wei Wang & Jianguo Ding & Xin Lu & Yanguo Jing - 1-20 Task Allocation of Heterogeneous Multi-Unmanned Systems Based on Improved Sheep Flock Optimization Algorithm
by Haibo Liu & Yang Liao & Changting Shi & Jing Shen - 1-20 SeedChain: A Secure and Transparent Blockchain-Driven Framework to Revolutionize the Seed Supply Chain
by Rohit Ahuja & Sahil Chugh & Raman Singh - 1-20 Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains
by Stanly Wilson & Kwabena Adu-Duodu & Yinhao Li & Ringo Sham & Mohammed Almubarak & Yingli Wang & Ellis Solaiman & Charith Perera & Rajiv Ranjan & Omer Rana - 1-20 A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions
by Md Motiur Rahman & Deepti Gupta & Smriti Bhatt & Shiva Shokouhmand & Miad Faezipour - 1-21 Metaverse Meets Smart Cities—Applications, Benefits, and Challenges
by Florian Maier & Markus Weinberger - 1-21 All about Delay-Tolerant Networking (DTN) Contributions to Future Internet
by Georgios Koukis & Konstantina Safouri & Vassilis Tsaoussidis - 1-21 Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN
by Bing Zhang & Hui Li & Shuai Zhang & Jing Sun & Ning Wei & Wenhong Xu & Huan Wang - 1-22 A Microservices-Based Control Plane for Time-Sensitive Networking
by Anna Agustí-Torra & Marc Ferré-Mancebo & Gabriel David Orozco-Urrutia & David Rincón-Rivera & David Remondo - 1-22 Research on Secure Community Opportunity Network Based on Trust Model
by Bing Su & Jiwu Liang - 1-23 Minimum-Cost-Based Neighbour Node Discovery Scheme for Fault Tolerance under IoT-Fog Networks
by Premalatha Baskar & Prakasam Periasamy - 1-23 Edge Federated Optimization for Heterogeneous Data
by Hsin-Tung Lin & Chih-Yu Wen - 1-24 Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing
by Yazhi Liu & Pengfei Zhong & Zhigang Yang & Wei Li & Siwei Li - 1-29 SRv6-Based Edge Service Continuity in 5G Mobile Networks
by Laura Lemmi & Carlo Puliafito & Antonio Virdis & Enzo Mingozzi - 1-30 A Survey on Energy-Aware Security Mechanisms for the Internet of Things
by Peixiong He & Yi Zhou & Xiao Qin - 1-31 From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks
by Vyron Kampourakis & Georgios Michail Makrakis & Constantinos Kolias
February 2024, Volume 16, Issue 3
- 1-4 The Electronic Medical Record—A New Look at the Challenges and Opportunities
by Reeva Lederman & Esther Brainin & Ofir Ben-Assuli - 1-15 A Lightweight Neural Network Model for Disease Risk Prediction in Edge Intelligent Computing Architecture
by Feng Zhou & Shijing Hu & Xin Du & Xiaoli Wan & Jie Wu - 1-16 Deep Learning for Intrusion Detection Systems (IDSs) in Time Series Data
by Konstantinos Psychogyios & Andreas Papadakis & Stavroula Bourou & Nikolaos Nikolaou & Apostolos Maniatis & Theodore Zahariadis - 1-17 A Transferable Deep Learning Framework for Improving the Accuracy of Internet of Things Intrusion Detection
by Haedam Kim & Suhyun Park & Hyemin Hong & Jieun Park & Seongmin Kim - 1-17 Edge-Enhanced TempoFuseNet: A Two-Stream Framework for Intelligent Multiclass Video Anomaly Recognition in 5G and IoT Environments
by Gulshan Saleem & Usama Ijaz Bajwa & Rana Hammad Raza & Fan Zhang - 1-18 Analyzing GPU Performance in Virtualized Environments: A Case Study
by Adel Belkhiri & Michel Dagenais - 1-19 Micro-FL: A Fault-Tolerant Scalable Microservice-Based Platform for Federated Learning
by Mikael Sabuhi & Petr Musilek & Cor-Paul Bezemer - 1-19 Multi-Level Split Federated Learning for Large-Scale AIoT System Based on Smart Cities
by Hanyue Xu & Kah Phooi Seng & Jeremy Smith & Li Minn Ang - 1-19 Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
by Hadeel Alrubayyi & Moudy Sharaf Alshareef & Zunaira Nadeem & Ahmed M. Abdelmoniem & Mona Jaber - 1-20 Scheduling of Industrial Control Traffic for Dynamic RAN Slicing with Distributed Massive MIMO
by Emma Fitzgerald & Michał Pióro - 1-20 A Multi-Head LSTM Architecture for Bankruptcy Prediction with Time Series Accounting Data
by Mattia Pellegrino & Gianfranco Lombardo & George Adosoglou & Stefano Cagnoni & Panos M. Pardalos & Agostino Poggi - 1-22 SoK: Analysis Techniques for WebAssembly
by Håkon Harnes & Donn Morrison - 1-23 An Ontology-Based Cybersecurity Framework for AI-Enabled Systems and Applications
by Davy Preuveneers & Wouter Joosen - 1-23 A Synergistic Elixir-EDA-MQTT Framework for Advanced Smart Transportation Systems
by Yushan Li & Satoshi Fujita - 1-25 Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments
by Dimah Almani & Tim Muller & Xavier Carpent & Takahito Yoshizawa & Steven Furnell - 1-26 The Future of Healthcare with Industry 5.0: Preliminary Interview-Based Qualitative Analysis
by Juliana Basulo-Ribeiro & Leonor Teixeira - 1-29 A Review on Decentralized Finance Ecosystems
by Andry Alamsyah & Gede Natha Wijaya Kusuma & Dian Puteri Ramadhani - 1-38 A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
by Paul Scalise & Matthew Boeding & Michael Hempel & Hamid Sharif & Joseph Delloiacovo & John Reed - 1-45 Deterministic K-Identification for Future Communication Networks: The Binary Symmetric Channel Results
by Mohammad Javad Salariseddigh & Ons Dabbabi & Christian Deppe & Holger Boche
March 2024, Volume 16, Issue 3
- 1-2 Edge and Fog Computing for the Internet of Things
by Alessandro Pozzebon - 1-13 IMBA: IoT-Mist Bat-Inspired Algorithm for Optimising Resource Allocation in IoT Networks
by Ziyad Almudayni & Ben Soh & Alice Li - 1-13 Personalized Federated Learning with Adaptive Feature Extraction and Category Prediction in Non-IID Datasets
by Ying-Hsun Lai & Shin-Yeh Chen & Wen-Chi Chou & Hua-Yang Hsu & Han-Chieh Chao - 1-13 Efficient and Secure Distributed Data Storage and Retrieval Using Interplanetary File System and Blockchain
by Muhammad Bin Saif & Sara Migliorini & Fausto Spoto - 1-15 Advanced Techniques for Geospatial Referencing in Online Media Repositories
by Dominik Warch & Patrick Stellbauer & Pascal Neis - 1-16 Application Scenarios of Digital Twins for Smart Crop Farming through Cloud–Fog–Edge Infrastructure
by Yogeswaranathan Kalyani & Liam Vorster & Rebecca Whetton & Rem Collier - 1-17 An Advanced Path Planning and UAV Relay System: Enhancing Connectivity in Rural Environments
by Mostafa El Debeiki & Saba Al-Rubaye & Adolfo Perrusquía & Christopher Conrad & Juan Alejandro Flores-Campos - 1-17 Dynamic Industrial Optimization: A Framework Integrates Online Machine Learning for Processing Parameters Design
by Yu Yao & Quan Qian - 1-18 UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning
by Shui Jiang & Yanning Ge & Xu Yang & Wencheng Yang & Hui Cui - 1-19 A Method for 5G–ICN Seamless Mobility Support Based on Router Buffered Data
by Mengchi Xing & Haojiang Deng & Rui Han - 1-20 Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks
by Ancilon Leuch Alencar & Marcelo Dornbusch Lopes & Anita Maria da Rocha Fernandes & Julio Cesar Santos dos Anjos & Juan Francisco De Paz Santana & Valderi Reis Quietinho Leithardt - 1-21 User Experience, Functionality and Aesthetics Evaluation in an Academic Multi-Site Web Ecosystem
by Andreas Giannakoulopoulos & Minas Pergantis & Aristeidis Lamprogeorgos - 1-21 Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review
by Tenzin Norbu & Joo Yeon Park & Kok Wai Wong & Hui Cui - 1-23 The Varieties of Agency in Human–Smart Device Relationships: The Four Agency Profiles
by Heidi Toivonen & Francesco Lelli - 1-24 UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment
by Lijun Zu & Wenyu Qi & Hongyi Li & Xiaohua Men & Zhihui Lu & Jiawei Ye & Liang Zhang - 1-25 Towards a Hybrid Security Framework for Phishing Awareness Education and Defense
by Peter K. K. Loh & Aloysius Z. Y. Lee & Vivek Balachandran - 1-27 Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies
by Mauro Femminella & Gianluca Reali - 1-30 Linked Open Government Data: Still a Viable Option for Sharing and Integrating Public Data?
by Alfonso Quarati & Riccardo Albertoni - 1-31 Intelligent Resource Orchestration for 5G Edge Infrastructures
by Rafael Moreno-Vozmediano & Rubén S. Montero & Eduardo Huedo & Ignacio M. Llorente - 1-32 Using Computer Vision to Collect Information on Cycling and Hiking Trails Users
by Joaquim Miguel & Pedro Mendonça & Agnelo Quelhas & João M. L. P. Caldeira & Vasco N. G. J. Soares - 1-38 Dragon_Pi: IoT Side-Channel Power Data Intrusion Detection Dataset and Unsupervised Convolutional Autoencoder for Intrusion Detection
by Dominic Lightbody & Duc-Minh Ngo & Andriy Temko & Colin C. Murphy & Emanuel Popovici
January 2024, Volume 16, Issue 2
- 1-14 Refined Semi-Supervised Modulation Classification: Integrating Consistency Regularization and Pseudo-Labeling Techniques
by Min Ma & Shanrong Liu & Shufei Wang & Shengnan Shi - 1-14 Computer Vision and Machine Learning-Based Predictive Analysis for Urban Agricultural Systems
by Arturs Kempelis & Inese Polaka & Andrejs Romanovs & Antons Patlins - 1-14 Enhancing Smart City Safety and Utilizing AI Expert Systems for Violence Detection
by Pradeep Kumar & Guo-Liang Shih & Bo-Lin Guo & Siva Kumar Nagi & Yibeltal Chanie Manie & Cheng-Kai Yao & Michael Augustine Arockiyadoss & Peng-Chun Peng - 1-15 DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control
by Shiva Raj Pokhrel & Jonathan Kua & Deol Satish & Sebnem Ozer & Jeff Howe & Anwar Walid - 1-17 A Spectral Gap-Based Topology Control Algorithm for Wireless Backhaul Networks
by Sergio Jesús González-Ambriz & Rolando Menchaca-Méndez & Sergio Alejandro Pinacho-Castellanos & Mario Eduardo Rivero-Ángeles - 1-18 Context-Aware Behavioral Tips to Improve Sleep Quality via Machine Learning and Large Language Models
by Erica Corda & Silvia M. Massa & Daniele Riboni - 1-19 A New Dynamic Game-Based Pricing Model for Cloud Environment
by Hamid Saadatfar & Hamid Gholampour Ahangar & Javad Hassannataj Joloudari - 1-22 Synchronization of Separate Sensors’ Data Transferred through a Local Wi-Fi Network: A Use Case of Human-Gait Monitoring
by Viktor Masalskyi & Dominykas Čičiurėnas & Andrius Dzedzickis & Urtė Prentice & Gediminas Braziulis & Vytautas Bučinskas - 1-23 Volumetric Techniques for Product Routing and Loading Optimisation in Industry 4.0: A Review
by Ricardo Lopes & Marcello Trovati & Ella Pereira - 1-23 Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning
by Marcin Aftowicz & Ievgen Kabin & Zoya Dyka & Peter Langendörfer - 1-28 Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks
by Azizah Assiri & Hassen Sallay - 1-29 TinyML Algorithms for Big Data Management in Large-Scale IoT Systems
by Aristeidis Karras & Anastasios Giannaros & Christos Karras & Leonidas Theodorakopoulos & Constantinos S. Mammassis & George A. Krimpas & Spyros Sioutas - 1-31 Beyond Lexical Boundaries: LLM-Generated Text Detection for Romanian Digital Libraries
by Melania Nitu & Mihai Dascalu - 1-44 Enhancing Urban Resilience: Smart City Data Analyses, Forecasts, and Digital Twin Techniques at the Neighborhood Level
by Andreas F. Gkontzis & Sotiris Kotsiantis & Georgios Feretzakis & Vassilios S. Verykios - 1-57 A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
by Mahmud Hossain & Golam Kayas & Ragib Hasan & Anthony Skjellum & Shahid Noor & S. M. Riazul Islam
February 2024, Volume 16, Issue 2
- 1-3 Modern Trends in Multi-Agent Systems
by Martin Kenyeres & Ivana Budinská & Ladislav Hluchý & Agostino Poggi - 1-4 State-of-the-Art Future Internet Technology in Italy 2022–2023
by Massimo Cafaro & Italo Epicoco & Marco Pulimeno - 1-15 Optimizing Session-Aware Recommenders: A Deep Dive into GRU-Based Latent Interaction Integration
by Ming-Yen Lin & Ping-Chun Wu & Sue-Chen Hsueh - 1-15 Online Optimization of Pickup and Delivery Problem Considering Feasibility
by Ryo Matsuoka & Koichi Kobayashi & Yuh Yamashita - 1-16 CROWDMATCH: Optimizing Crowdsourcing Matching through the Integration of Matching Theory and Coalition Games
by Adedamola Adesokan & Rowan Kinney & Eirini Eleni Tsiropoulou - 1-16 Digital-Twin-Based Monitoring System for Slab Production Process
by Tianjie Fu & Peiyu Li & Chenke Shi & Youzhu Liu - 1-16 Merging Ontologies and Data from Electronic Health Records
by Salvatore Calcagno & Andrea Calvagna & Emiliano Tramontana & Gabriella Verga - 1-17 Automated Identification of Sensitive Financial Data Based on the Topic Analysis
by Meng Li & Jiqiang Liu & Yeping Yang - 1-18 The Microverse: A Task-Oriented Edge-Scale Metaverse
by Qian Qu & Mohsen Hatami & Ronghua Xu & Deeraj Nagothu & Yu Chen & Xiaohua Li & Erik Blasch & Erika Ardiles-Cruz & Genshe Chen - 1-18 IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings
by Paolo Bellavista & Giuseppe Di Modica - 1-20 Speech Inpainting Based on Multi-Layer Long Short-Term Memory Networks
by Haohan Shi & Xiyu Shi & Safak Dogan - 1-21 Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT
by Muhammad Nafees Ulfat Khan & Weiping Cao & Zhiling Tang & Ata Ullah & Wanghua Pan - 1-22 A QoS-Aware IoT Edge Network for Mobile Telemedicine Enabling In-Transit Monitoring of Emergency Patients
by Adwitiya Mukhopadhyay & Aryadevi Remanidevi Devidas & Venkat P. Rangan & Maneesha Vinodini Ramesh - 1-24 A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability
by Ayman Khalil & Besma Zeddini - 1-24 Enhancing Energy Efficiency in IoT-NDN via Parameter Optimization
by Dennis Papenfuß & Bennet Gerlach & Stefan Fischer & Mohamed Ahmed Hail - 1-26 Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs
by Mohammed Bellaj & Najib Naja & Abdellah Jamali
January 2024, Volume 16, Issue 1
- 1-13 Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection
by Chinyang Henry Tseng & Woei-Jiunn Tsaur & Yueh-Mao Shen - 1-14 Future Sustainable Internet Energy-Defined Networking
by Alex Galis - 1-16 A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things
by Muhammad Sher Ramzan & Anees Asghar & Ata Ullah & Fawaz Alsolami & Iftikhar Ahmad - 1-17 Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing
by Chen Zhang & Celimuge Wu & Min Lin & Yangfei Lin & William Liu - 1-18 Digital Communication and Social Organizations: An Evaluation of the Communication Strategies of the Most-Valued NGOs Worldwide
by Andrea Moreno-Cabanillas & Elizabet Castillero-Ostio & Antonio Castillo-Esparcia - 1-18 Investigation of Phishing Susceptibility with Explainable Artificial Intelligence
by Zhengyang Fan & Wanru Li & Kathryn Blackmond Laskey & Kuo-Chu Chang - 1-19 A Comprehensive Study and Analysis of the Third Generation Partnership Project’s 5G New Radio for Vehicle-to-Everything Communication
by G. G. Md. Nawaz Ali & Mohammad Nazmus Sadat & Md Suruz Miah & Sameer Ahmed Sharief & Yun Wang - 1-20 Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT
by Lidong Liu & Shidang Li & Mingsheng Wei & Jinsong Xu & Bencheng Yu - 1-20 Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space–Air–Ground Integrated Network
by Xu Feng & Mengyang He & Lei Zhuang & Yanrui Song & Rumeng Peng - 1-20 An Imbalanced Sequence Feature Extraction Approach for the Detection of LTE-R Cells with Degraded Communication Performance
by Jiantao Qu & Chunyu Qi & He Meng - 1-20 An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering
by Jui-Chuan Liu & Heng-Xiao Chi & Ching-Chun Chang & Chin-Chen Chang - 1-23 Clustering on the Chicago Array of Things: Spotting Anomalies in the Internet of Things Records
by Kyle DeMedeiros & Chan Young Koh & Abdeltawab Hendawi - 1-27 Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures
by Spyridon Daousis & Nikolaos Peladarinos & Vasileios Cheimaras & Panagiotis Papageorgas & Dimitrios D. Piromalis & Radu Adrian Munteanu - 1-31 A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness
by Mahmoud Elkhodr & Samiya Khan & Ergun Gide - 1-31 Cross-Layer Methods for Ad Hoc Networks—Review and Classification
by Valeriy Ivanov & Maxim Tereshonok - 1-34 Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security
by Sana Rasheed & Soulla Louca - 1-42 A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
by Hassan Khazane & Mohammed Ridouani & Fatima Salahdine & Naima Kaabouch
December 2023, Volume 16, Issue 1
- 1-14 Design and Implementation of a Digital Twin System for Log Rotary Cutting Optimization
by Yadi Zhao & Lei Yan & Jian Wu & Ximing Song