Content
March 2024, Volume 16, Issue 3
- 1-16 Application Scenarios of Digital Twins for Smart Crop Farming through Cloud–Fog–Edge Infrastructure
by Yogeswaranathan Kalyani & Liam Vorster & Rebecca Whetton & Rem Collier - 1-17 An Advanced Path Planning and UAV Relay System: Enhancing Connectivity in Rural Environments
by Mostafa El Debeiki & Saba Al-Rubaye & Adolfo Perrusquía & Christopher Conrad & Juan Alejandro Flores-Campos - 1-17 Dynamic Industrial Optimization: A Framework Integrates Online Machine Learning for Processing Parameters Design
by Yu Yao & Quan Qian - 1-18 UAV Control Method Combining Reptile Meta-Reinforcement Learning and Generative Adversarial Imitation Learning
by Shui Jiang & Yanning Ge & Xu Yang & Wencheng Yang & Hui Cui - 1-19 A Method for 5G–ICN Seamless Mobility Support Based on Router Buffered Data
by Mengchi Xing & Haojiang Deng & Rui Han - 1-20 Detection of Forged Images Using a Combination of Passive Methods Based on Neural Networks
by Ancilon Leuch Alencar & Marcelo Dornbusch Lopes & Anita Maria da Rocha Fernandes & Julio Cesar Santos dos Anjos & Juan Francisco De Paz Santana & Valderi Reis Quietinho Leithardt - 1-21 User Experience, Functionality and Aesthetics Evaluation in an Academic Multi-Site Web Ecosystem
by Andreas Giannakoulopoulos & Minas Pergantis & Aristeidis Lamprogeorgos - 1-21 Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic Review
by Tenzin Norbu & Joo Yeon Park & Kok Wai Wong & Hui Cui - 1-23 The Varieties of Agency in Human–Smart Device Relationships: The Four Agency Profiles
by Heidi Toivonen & Francesco Lelli - 1-24 UP-SDCG: A Method of Sensitive Data Classification for Collaborative Edge Computing in Financial Cloud Environment
by Lijun Zu & Wenyu Qi & Hongyi Li & Xiaohua Men & Zhihui Lu & Jiawei Ye & Liang Zhang - 1-25 Towards a Hybrid Security Framework for Phishing Awareness Education and Defense
by Peter K. K. Loh & Aloysius Z. Y. Lee & Vivek Balachandran - 1-27 Implementing Internet of Things Service Platforms with Network Function Virtualization Serverless Technologies
by Mauro Femminella & Gianluca Reali - 1-30 Linked Open Government Data: Still a Viable Option for Sharing and Integrating Public Data?
by Alfonso Quarati & Riccardo Albertoni - 1-31 Intelligent Resource Orchestration for 5G Edge Infrastructures
by Rafael Moreno-Vozmediano & Rubén S. Montero & Eduardo Huedo & Ignacio M. Llorente - 1-32 Using Computer Vision to Collect Information on Cycling and Hiking Trails Users
by Joaquim Miguel & Pedro Mendonça & Agnelo Quelhas & João M. L. P. Caldeira & Vasco N. G. J. Soares - 1-38 Dragon_Pi: IoT Side-Channel Power Data Intrusion Detection Dataset and Unsupervised Convolutional Autoencoder for Intrusion Detection
by Dominic Lightbody & Duc-Minh Ngo & Andriy Temko & Colin C. Murphy & Emanuel Popovici
January 2024, Volume 16, Issue 2
- 1-14 Refined Semi-Supervised Modulation Classification: Integrating Consistency Regularization and Pseudo-Labeling Techniques
by Min Ma & Shanrong Liu & Shufei Wang & Shengnan Shi - 1-14 Computer Vision and Machine Learning-Based Predictive Analysis for Urban Agricultural Systems
by Arturs Kempelis & Inese Polaka & Andrejs Romanovs & Antons Patlins - 1-14 Enhancing Smart City Safety and Utilizing AI Expert Systems for Violence Detection
by Pradeep Kumar & Guo-Liang Shih & Bo-Lin Guo & Siva Kumar Nagi & Yibeltal Chanie Manie & Cheng-Kai Yao & Michael Augustine Arockiyadoss & Peng-Chun Peng - 1-15 DDPG-MPCC: An Experience Driven Multipath Performance Oriented Congestion Control
by Shiva Raj Pokhrel & Jonathan Kua & Deol Satish & Sebnem Ozer & Jeff Howe & Anwar Walid - 1-17 A Spectral Gap-Based Topology Control Algorithm for Wireless Backhaul Networks
by Sergio Jesús González-Ambriz & Rolando Menchaca-Méndez & Sergio Alejandro Pinacho-Castellanos & Mario Eduardo Rivero-Ángeles - 1-18 Context-Aware Behavioral Tips to Improve Sleep Quality via Machine Learning and Large Language Models
by Erica Corda & Silvia M. Massa & Daniele Riboni - 1-19 A New Dynamic Game-Based Pricing Model for Cloud Environment
by Hamid Saadatfar & Hamid Gholampour Ahangar & Javad Hassannataj Joloudari - 1-22 Synchronization of Separate Sensors’ Data Transferred through a Local Wi-Fi Network: A Use Case of Human-Gait Monitoring
by Viktor Masalskyi & Dominykas Čičiurėnas & Andrius Dzedzickis & Urtė Prentice & Gediminas Braziulis & Vytautas Bučinskas - 1-23 Volumetric Techniques for Product Routing and Loading Optimisation in Industry 4.0: A Review
by Ricardo Lopes & Marcello Trovati & Ella Pereira - 1-23 Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning
by Marcin Aftowicz & Ievgen Kabin & Zoya Dyka & Peter Langendörfer - 1-28 Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks
by Azizah Assiri & Hassen Sallay - 1-29 TinyML Algorithms for Big Data Management in Large-Scale IoT Systems
by Aristeidis Karras & Anastasios Giannaros & Christos Karras & Leonidas Theodorakopoulos & Constantinos S. Mammassis & George A. Krimpas & Spyros Sioutas - 1-31 Beyond Lexical Boundaries: LLM-Generated Text Detection for Romanian Digital Libraries
by Melania Nitu & Mihai Dascalu - 1-44 Enhancing Urban Resilience: Smart City Data Analyses, Forecasts, and Digital Twin Techniques at the Neighborhood Level
by Andreas F. Gkontzis & Sotiris Kotsiantis & Georgios Feretzakis & Vassilios S. Verykios - 1-57 A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives
by Mahmud Hossain & Golam Kayas & Ragib Hasan & Anthony Skjellum & Shahid Noor & S. M. Riazul Islam
February 2024, Volume 16, Issue 2
- 1-3 Modern Trends in Multi-Agent Systems
by Martin Kenyeres & Ivana Budinská & Ladislav Hluchý & Agostino Poggi - 1-4 State-of-the-Art Future Internet Technology in Italy 2022–2023
by Massimo Cafaro & Italo Epicoco & Marco Pulimeno - 1-15 Optimizing Session-Aware Recommenders: A Deep Dive into GRU-Based Latent Interaction Integration
by Ming-Yen Lin & Ping-Chun Wu & Sue-Chen Hsueh - 1-15 Online Optimization of Pickup and Delivery Problem Considering Feasibility
by Ryo Matsuoka & Koichi Kobayashi & Yuh Yamashita - 1-16 CROWDMATCH: Optimizing Crowdsourcing Matching through the Integration of Matching Theory and Coalition Games
by Adedamola Adesokan & Rowan Kinney & Eirini Eleni Tsiropoulou - 1-16 Digital-Twin-Based Monitoring System for Slab Production Process
by Tianjie Fu & Peiyu Li & Chenke Shi & Youzhu Liu - 1-16 Merging Ontologies and Data from Electronic Health Records
by Salvatore Calcagno & Andrea Calvagna & Emiliano Tramontana & Gabriella Verga - 1-17 Automated Identification of Sensitive Financial Data Based on the Topic Analysis
by Meng Li & Jiqiang Liu & Yeping Yang - 1-18 The Microverse: A Task-Oriented Edge-Scale Metaverse
by Qian Qu & Mohsen Hatami & Ronghua Xu & Deeraj Nagothu & Yu Chen & Xiaohua Li & Erik Blasch & Erika Ardiles-Cruz & Genshe Chen - 1-18 IoTwins: Implementing Distributed and Hybrid Digital Twins in Industrial Manufacturing and Facility Management Settings
by Paolo Bellavista & Giuseppe Di Modica - 1-20 Speech Inpainting Based on Multi-Layer Long Short-Term Memory Networks
by Haohan Shi & Xiyu Shi & Safak Dogan - 1-21 Energy-Efficient De-Duplication Mechanism for Healthcare Data Aggregation in IoT
by Muhammad Nafees Ulfat Khan & Weiping Cao & Zhiling Tang & Ata Ullah & Wanghua Pan - 1-22 A QoS-Aware IoT Edge Network for Mobile Telemedicine Enabling In-Transit Monitoring of Emergency Patients
by Adwitiya Mukhopadhyay & Aryadevi Remanidevi Devidas & Venkat P. Rangan & Maneesha Vinodini Ramesh - 1-24 A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability
by Ayman Khalil & Besma Zeddini - 1-24 Enhancing Energy Efficiency in IoT-NDN via Parameter Optimization
by Dennis Papenfuß & Bennet Gerlach & Stefan Fischer & Mohamed Ahmed Hail - 1-26 Distributed Mobility Management Support for Low-Latency Data Delivery in Named Data Networking for UAVs
by Mohammed Bellaj & Najib Naja & Abdellah Jamali
January 2024, Volume 16, Issue 1
- 1-13 Classification Tendency Difference Index Model for Feature Selection and Extraction in Wireless Intrusion Detection
by Chinyang Henry Tseng & Woei-Jiunn Tsaur & Yueh-Mao Shen - 1-14 Future Sustainable Internet Energy-Defined Networking
by Alex Galis - 1-16 A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things
by Muhammad Sher Ramzan & Anees Asghar & Ata Ullah & Fawaz Alsolami & Iftikhar Ahmad - 1-17 Proximal Policy Optimization for Efficient D2D-Assisted Computation Offloading and Resource Allocation in Multi-Access Edge Computing
by Chen Zhang & Celimuge Wu & Min Lin & Yangfei Lin & William Liu - 1-18 Digital Communication and Social Organizations: An Evaluation of the Communication Strategies of the Most-Valued NGOs Worldwide
by Andrea Moreno-Cabanillas & Elizabet Castillero-Ostio & Antonio Castillo-Esparcia - 1-18 Investigation of Phishing Susceptibility with Explainable Artificial Intelligence
by Zhengyang Fan & Wanru Li & Kathryn Blackmond Laskey & Kuo-Chu Chang - 1-19 A Comprehensive Study and Analysis of the Third Generation Partnership Project’s 5G New Radio for Vehicle-to-Everything Communication
by G. G. Md. Nawaz Ali & Mohammad Nazmus Sadat & Md Suruz Miah & Sameer Ahmed Sharief & Yun Wang - 1-20 Joint Beam-Forming Optimization for Active-RIS-Assisted Internet-of-Things Networks with SWIPT
by Lidong Liu & Shidang Li & Mingsheng Wei & Jinsong Xu & Bencheng Yu - 1-20 Service Function Chain Deployment Algorithm Based on Deep Reinforcement Learning in Space–Air–Ground Integrated Network
by Xu Feng & Mengyang He & Lei Zhuang & Yanrui Song & Rumeng Peng - 1-20 An Imbalanced Sequence Feature Extraction Approach for the Detection of LTE-R Cells with Degraded Communication Performance
by Jiantao Qu & Chunyu Qi & He Meng - 1-20 An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering
by Jui-Chuan Liu & Heng-Xiao Chi & Ching-Chun Chang & Chin-Chen Chang - 1-23 Clustering on the Chicago Array of Things: Spotting Anomalies in the Internet of Things Records
by Kyle DeMedeiros & Chan Young Koh & Abdeltawab Hendawi - 1-27 Overview of Protocols and Standards for Wireless Sensor Networks in Critical Infrastructures
by Spyridon Daousis & Nikolaos Peladarinos & Vasileios Cheimaras & Panagiotis Papageorgas & Dimitrios D. Piromalis & Radu Adrian Munteanu - 1-31 A Novel Semantic IoT Middleware for Secure Data Management: Blockchain and AI-Driven Context Awareness
by Mahmoud Elkhodr & Samiya Khan & Ergun Gide - 1-31 Cross-Layer Methods for Ad Hoc Networks—Review and Classification
by Valeriy Ivanov & Maxim Tereshonok - 1-34 Blockchain-Based Implementation of National Census as a Supplementary Instrument for Enhanced Transparency, Accountability, Privacy, and Security
by Sana Rasheed & Soulla Louca - 1-42 A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
by Hassan Khazane & Mohammed Ridouani & Fatima Salahdine & Naima Kaabouch
December 2023, Volume 16, Issue 1
- 1-14 Design and Implementation of a Digital Twin System for Log Rotary Cutting Optimization
by Yadi Zhao & Lei Yan & Jian Wu & Ximing Song - 1-15 Automotive Cybersecurity Application Based on CARDIAN
by Emanuele Santonicola & Ennio Andrea Adinolfi & Simone Coppola & Francesco Pascale - 1-17 Latent Autoregressive Student- t Prior Process Models to Assess Impact of Interventions in Time Series
by Patrick Toman & Nalini Ravishanker & Nathan Lally & Sanguthevar Rajasekaran - 1-18 Integrating Knowledge Graphs into Distribution Grid Decision Support Systems
by Yashar Kor & Liang Tan & Petr Musilek & Marek Z. Reformat - 1-18 Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol
by Nasour Bagheri & Ygal Bendavid & Masoumeh Safkhani & Samad Rostampour - 1-18 Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism
by Qiang Liu & Rui Han & Yang Li - 1-19 Development of an Assessment Scale for Measurement of Usability and User Experience Characteristics of Bing Chat Conversational AI
by Goran Bubaš & Antonela Čižmešija & Andreja Kovačić - 1-20 Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures
by Herve M. Kabamba & Matthew Khouzam & Michel R. Dagenais - 1-21 Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation
by Xiu Li & Aron Henriksson & Martin Duneld & Jalal Nouri & Yongchao Wu - 1-22 An Analysis of Methods and Metrics for Task Scheduling in Fog Computing
by Javid Misirli & Emiliano Casalicchio - 1-23 Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing
by Irina Kochetkova & Kseniia Leonteva & Ibram Ghebrial & Anastasiya Vlaskina & Sofia Burtseva & Anna Kushchazli & Konstantin Samouylov - 1-24 A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions
by Filippo Dolente & Rosario Giuseppe Garroppo & Michele Pagano - 1-24 Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments
by Mizuki Asano & Takumi Miyoshi & Taku Yamazaki - 1-26 1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing
by Omar Serghini & Hayat Semlali & Asmaa Maali & Abdelilah Ghammaz & Salvatore Serrano - 1-27 Resource Indexing and Querying in Large Connected Environments
by Fouad Achkouty & Richard Chbeir & Laurent Gallon & Elio Mansour & Antonio Corral - 1-28 The Future of Flying Base Stations: Empirical and Numerical Investigations of mmWave-Enabled UAVs
by Ryunosuke Masaoka & Gia Khanh Tran & Jin Nakazato & Kei Sakaguchi - 1-33 TDLearning: Trusted Distributed Collaborative Learning Based on Blockchain Smart Contracts
by Jing Liu & Xuesong Hai & Keqin Li - 1-39 Investigating the Key Aspects of a Smart City through Topic Modeling and Thematic Analysis
by Anestis Kousis & Christos Tjortjis
November 2023, Volume 15, Issue 12
- 1-15 Enhancements in BlenderBot 3: Expanding Beyond a Singular Model Governance and Boosting Generational Performance
by Ondrej Kobza & David Herel & Jan Cuhel & Tommaso Gargiani & Jan Pichl & Petr Marek & Jakub Konrad & Jan Sedivy - 1-15 Knowledge Distillation-Based GPS Spoofing Detection for Small UAV
by Yingying Ren & Ryan D. Restivo & Wenkai Tan & Jian Wang & Yongxin Liu & Bin Jiang & Huihui Wang & Houbing Song - 1-16 Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare
by Zeeshan Ashraf & Zahid Mahmood & Muddesar Iqbal - 1-16 Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography
by Youcef Fouzar & Ahmed Lakhssassi & Ramakrishna Mundugar - 1-17 Diff-SwinT: An Integrated Framework of Diffusion Model and Swin Transformer for Radar Jamming Recognition
by Minghui Sha & Dewu Wang & Fei Meng & Wenyan Wang & Yu Han - 1-19 IoT-Based Object-Detection System to Safeguard Endangered Animals and Bolster Agricultural Farm Security
by Mohaimenul Azam Khan Raiaan & Nur Mohammad Fahad & Shovan Chowdhury & Debopom Sutradhar & Saadman Sakib Mihad & Md. Motaharul Islam - 1-19 The Multiband over Spatial Division Multiplexing Sliceable Transceiver for Future Optical Networks
by Laia Nadal & Mumtaz Ali & Francisco Javier Vílchez & Josep Maria Fàbrega & Michela Svaluto Moreolo - 1-20 User Association Performance Trade-Offs in Integrated RF/mmWave/THz Communications
by Noha Hassan & Xavier Fernando & Isaac Woungang & Alagan Anpalagan - 1-20 Extended Reality (XR) Engines for Developing Gamified Apps and Serious Games: A Scoping Review
by Humberto Marín-Vega & Giner Alor-Hernández & Maritza Bustos-López & Ignacio López-Martínez & Norma Leticia Hernández-Chaparro - 1-20 A Transmission Rate Control Method for Active Congestion Reduction Based on Network Node Bandwidth Allocation
by Hongyu Liu & Hong Ni & Rui Han - 1-21 Statistical Model Checking in Process Mining: A Comprehensive Approach to Analyse Stochastic Processes
by Fawad Ali Mangi & Guoxin Su & Minjie Zhang - 1-22 ICN-Based Enhanced Content Delivery for CDN
by Lei Gao & Xiaoyong Zhu - 1-25 Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions
by Abubakar Ahmad Musa & Adamu Hussaini & Cheng Qian & Yifan Guo & Wei Yu - 1-26 Protecting Hybrid ITS Networks: A Comprehensive Security Approach
by Ricardo Severino & José Simão & Nuno Datia & António Serrador - 1-27 Review of Blockchain Tokens Creation and Valuation
by Oana Marin & Tudor Cioara & Liana Toderean & Dan Mitrea & Ionut Anghel - 1-27 A Survey on IoT-Edge-Cloud Continuum Systems: Status, Challenges, Use Cases, and Open Issues
by Panagiotis Gkonis & Anastasios Giannopoulos & Panagiotis Trakadas & Xavi Masip-Bruin & Francesco D’Andria - 1-29 An Artificial Neural Network Autoencoder for Insider Cyber Security Threat Detection
by Karthikeyan Saminathan & Sai Tharun Reddy Mulka & Sangeetha Damodharan & Rajagopal Maheswar & Josip Lorincz - 1-33 Empowering Digital Twin for Future Networks with Graph Neural Networks: Overview, Enabling Technologies, Challenges, and Opportunities
by Duc-Thinh Ngo & Ons Aouedi & Kandaraj Piamrat & Thomas Hassan & Philippe Raipin-Parvédy - 1-36 A Structured Narrative Prompt for Prompting Narratives from Large Language Models: Sentiment Assessment of ChatGPT-Generated Narratives and Real Tweets
by Christopher J. Lynch & Erik J. Jensen & Virginia Zamponi & Kevin O’Brien & Erika Frydenlund & Ross Gore - 1-45 A Comprehensive Survey Exploring the Multifaceted Interplay between Mobile Edge Computing and Vehicular Networks
by Ali Pashazadeh & Giovanni Nardini & Giovanni Stea
December 2023, Volume 15, Issue 12
- 1-5 Recent Advances in Information-Centric Networks (ICNs)
by José Carlos López-Ardao & Miguel Rodríguez-Pérez & Sergio Herrería-Alonso - 1-13 Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution
by Evangelos D. Spyrou & Ioannis Tsoulos & Chrysostomos Stylios - 1-17 Addressing the Gaps of IoU Loss in 3D Object Detection with IIoU
by Niranjan Ravi & Mohamed El-Sharkawy - 1-19 Envisioning Digital Practices in the Metaverse: A Methodological Perspective
by Luca Sabatucci & Agnese Augello & Giuseppe Caggianese & Luigi Gallo - 1-20 Decentralized Storage with Access Control and Data Persistence for e-Book Stores
by Keigo Ogata & Satoshi Fujita - 1-21 A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation
by Zuopeng Li & Hengshuai Ju & Zepeng Ren - 1-22 PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc
by Javier Gomez & Jose Jaime Camacho-Escoto & Luis Orozco-Barbosa & Diego Rodriguez-Torres - 1-22 A Survey on Blockchain-Based Federated Learning
by Lang Wu & Weijian Ruan & Jinhui Hu & Yaobin He - 1-22 Energy Consumption Reduction in Wireless Sensor Network-Based Water Pipeline Monitoring Systems via Energy Conservation Techniques
by Valery Nkemeni & Fabien Mieyeville & Pierre Tsafack - 1-22 Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
by James Msughter Adeke & Guangjie Liu & Junjie Zhao & Nannan Wu & Hafsat Muhammad Bashir - 1-28 Blockchain in Agriculture to Ensure Trust, Effectiveness, and Traceability from Farm Fields to Groceries
by Arvind Panwar & Manju Khari & Sanjay Misra & Urvashi Sugandh - 1-28 HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference
by Duy Tung Khanh Nguyen & Dung Hoang Duong & Willy Susilo & Yang-Wai Chow & The Anh Ta - 1-31 Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks
by Aldo Hernandez-Suarez & Gabriel Sanchez-Perez & Linda Karina Toscano-Medina & Hector Manuel Perez-Meana & Jose Portillo-Portillo & Jesus Olivares-Mercado - 1-36 Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research
by Thiago Poleto & Thyago Celso Cavalcante Nepomuceno & Victor Diogho Heuer de Carvalho & Ligiane Cristina Braga de Oliveira Friaes & Rodrigo Cleiton Paiva de Oliveira & Ciro José Jardim Figueiredo - 1-43 Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions
by Shrouk A. Ali & Shaimaa Ahmed Elsaid & Abdelhamied A. Ateya & Mohammed ElAffendi & Ahmed A. Abd El-Latif - 1-54 Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions
by Jadil Alsamiri & Khalid Alsubhi
November 2023, Volume 15, Issue 11
- 1-12 Generating Synthetic Resume Data with Large Language Models for Enhanced Job Description Classification
by Panagiotis Skondras & Panagiotis Zervas & Giannis Tzimas - 1-17 Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks
by Rao Muzamal Liaqat & Philip Branch & Jason But - 1-19 Implementation of In-Band Full-Duplex Using Software Defined Radio with Adaptive Filter-Based Self-Interference Cancellation
by Wei-Shun Liao & Ou Zhao & Keren Li & Hikaru Kawasaki & Takeshi Matsumura - 1-19 Sentiment Analysis of Chinese Product Reviews Based on Fusion of DUAL-Channel BiLSTM and Self-Attention
by Ye Yuan & Wang Wang & Guangze Wen & Zikun Zheng & Zhemin Zhuang - 1-19 GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs
by Giacomo Gori & Lorenzo Rinieri & Amir Al Sadi & Andrea Melis & Franco Callegati & Marco Prandini - 1-19 Maximizing UAV Coverage in Maritime Wireless Networks: A Multiagent Reinforcement Learning Approach
by Qianqian Wu & Qiang Liu & Zefan Wu & Jiye Zhang - 1-20 An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts
by Nigang Sun & Chenyang Zhu & Yuanyi Zhang & Yining Liu - 1-20 Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing
by Afzal Badshah & Ghani Ur Rehman & Haleem Farman & Anwar Ghani & Shahid Sultan & Muhammad Zubair & Moustafa M. Nasralla - 1-25 Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications
by Sapdo Utomo & Adarsh Rouniyar & Hsiu-Chun Hsu & Pao-Ann Hsiung - 1-32 Performance of Path Loss Models over Mid-Band and High-Band Channels for 5G Communication Networks: A Review
by Farouq E. Shaibu & Elizabeth N. Onwuka & Nathaniel Salawu & Stephen S. Oyewobi & Karim Djouani & Adnan M. Abu-Mahfouz - 1-34 Edge AI for Early Detection of Chronic Diseases and the Spread of Infectious Diseases: Opportunities, Challenges, and Future Directions
by Elarbi Badidi - 1-35 Assessing Interactive Web-Based Systems Using Behavioral Measurement Techniques
by Thanaa Saad AlSalem & Majed Aadi AlShamari
October 2023, Volume 15, Issue 11
- 1-12 Improving the Efficiency of Modern Warehouses Using Smart Battery Placement
by Nikolaos Baras & Antonios Chatzisavvas & Dimitris Ziouzios & Ioannis Vanidis & Minas Dasygenis - 1-15 Latency-Aware Semi-Synchronous Client Selection and Model Aggregation for Wireless Federated Learning
by Liangkun Yu & Xiang Sun & Rana Albelaihi & Chen Yi - 1-16 New RFI Model for Behavioral Audience Segmentation in Wi-Fi Advertising System
by Shueh-Ting Lim & Lee-Yeng Ong & Meng-Chew Leow - 1-16 A Systematic Literature Review on Authentication and Threat Challenges on RFID Based NFC Applications
by Ismail El Gaabouri & Mohamed Senhadji & Mostafa Belkasmi & Brahim El Bhiri - 1-23 A Finite State Automaton for Green Data Validation in a Real-World Smart Manufacturing Environment with Special Regard to Time-Outs and Overtaking
by Simon Paasche & Sven Groppe - 1-23 Managing Access to Confidential Documents: A Case Study of an Email Security Tool
by Elham Al Qahtani & Yousra Javed & Sarah Tabassum & Lipsarani Sahoo & Mohamed Shehab - 1-23 Task Scheduling for Federated Learning in Edge Cloud Computing Environments by Using Adaptive-Greedy Dingo Optimization Algorithm and Binary Salp Swarm Algorithm
by Weihong Cai & Fengxi Duan - 1-23 Implementation and Evaluation of a Federated Learning Framework on Raspberry PI Platforms for IoT 6G Applications
by Lorenzo Ridolfi & David Naseh & Swapnil Sadashiv Shinde & Daniele Tarchi - 1-28 Digital Management of Competencies in Web 3.0: The C-Box ® Approach
by Alberto Francia & Stefano Mariani & Giuseppe Adduce & Sandro Vecchiarelli & Franco Zambonelli - 1-29 Business Intelligence through Machine Learning from Satellite Remote Sensing Data
by Christos Kyriakos & Manolis Vavalis - 1-30 Reinforcement Learning vs. Computational Intelligence: Comparing Service Management Approaches for the Cloud Continuum
by Filippo Poltronieri & Cesare Stefanelli & Mauro Tortonesi & Mattia Zaccarini - 1-32 The 6G Ecosystem as Support for IoE and Private Networks: Vision, Requirements, and Challenges
by Carlos Serôdio & José Cunha & Guillermo Candela & Santiago Rodriguez & Xosé Ramón Sousa & Frederico Branco - 1-44 An Overview of Current Challenges and Emerging Technologies to Facilitate Increased Energy Efficiency, Safety, and Sustainability of Railway Transport
by Zdenko Kljaić & Danijel Pavković & Mihael Cipek & Maja Trstenjak & Tomislav Josip Mlinarić & Mladen Nikšić
September 2023, Volume 15, Issue 10
- 1-13 Modeling 3D NAND Flash with Nonparametric Inference on Regression Coefficients for Reliable Solid-State Storage
by Michela Borghesi & Cristian Zambelli & Rino Micheloni & Stefano Bonnini - 1-13 Temporal-Guided Knowledge Graph-Enhanced Graph Convolutional Network for Personalized Movie Recommendation Systems
by Chin-Yi Chen & Jih-Jeng Huang - 1-14 Exploring the Factors Affecting Countries’ Adoption of Blockchain-Enabled Central Bank Digital Currencies
by Medina Ayta Mohammed & Carmen De-Pablos-Heredero & José Luis Montes Botella - 1-15 MSEN: A Multi-Scale Evolutionary Network for Modeling the Evolution of Temporal Knowledge Graphs
by Yong Yu & Shudong Chen & Rong Du & Da Tong & Hao Xu & Shuai Chen - 1-18 An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction
by Mazen Gazzan & Frederick T. Sheldon - 1-18 Investigating IPTV Malware in the Wild
by Adam Lockett & Ioannis Chalkias & Cagatay Yucel & Jane Henriksen-Bulmer & Vasilis Katos - 1-19 Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks
by Dechuan Chen & Jin Li & Jianwei Hu & Xingang Zhang & Shuai Zhang - 1-25 Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review
by Pavlos Cheimonidis & Konstantinos Rantos - 1-26 Application of an Effective Hierarchical Deep-Learning-Based Object Detection Model Integrated with Image-Processing Techniques for Detecting Speed Limit Signs, Rockfalls, Potholes, and Car Crashes
by Yao-Liang Chung - 1-27 A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection
by Zoltán Szabó & Vilmos Bilicki
October 2023, Volume 15, Issue 10
- 1-12 Challenges of Network Forensic Investigation in Fog and Edge Computing
by Daniel Spiekermann & Jörg Keller - 1-15 Financial Data Quality Evaluation Method Based on Multiple Linear Regression
by Meng Li & Jiqiang Liu & Yeping Yang - 1-15 Reinforcement Learning Approach for Adaptive C-V2X Resource Management
by Teguh Indra Bayu & Yung-Fa Huang & Jeang-Kuo Chen - 1-16 Comparison of Supervised Learning Algorithms on a 5G Dataset Reduced via Principal Component Analysis (PCA)
by Joan D. Gonzalez-Franco & Jorge E. Preciado-Velasco & Jose E. Lozano-Rizk & Raul Rivera-Rodriguez & Jorge Torres-Rodriguez & Miguel A. Alonso-Arevalo - 1-17 Evaluating MPTCP Congestion Control Algorithms: Implications for Streaming in Open Internet
by Łukasz Piotr Łuczak & Przemysław Ignaciuk & Michał Morawski - 1-18 Data-Driven Safe Deliveries: The Synergy of IoT and Machine Learning in Shared Mobility
by Fatema Elwy & Raafat Aburukba & A. R. Al-Ali & Ahmad Al Nabulsi & Alaa Tarek & Ameen Ayub & Mariam Elsayeh - 1-20 Flying Watchdog-Based Guard Patrol with Check Point Data Verification
by Endrowednes Kuantama & Avishkar Seth & Alice James & Yihao Zhang - 1-21 A Personalized Ontology Recommendation System to Effectively Support Ontology Development by Reuse
by Marwa Abdelreheim & Taysir Hassan A. Soliman & Friederike Klan - 1-21 Edge-Computing-Based People-Counting System for Elevators Using MobileNet–Single-Stage Object Detection
by Tsu-Chuan Shen & Edward T.-H. Chu - 1-22 kClusterHub: An AutoML-Driven Tool for Effortless Partition-Based Clustering over Varied Data Types
by Konstantinos Gratsos & Stefanos Ougiaroglou & Dionisis Margaris - 1-22 Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms
by Athanasios Koulianos & Antonios Litke - 1-23 End-to-End Service Availability in Heterogeneous Multi-Tier Cloud–Fog–Edge Networks
by Igor Kabashkin - 1-26 Fluent but Not Factual: A Comparative Analysis of ChatGPT and Other AI Chatbots’ Proficiency and Originality in Scientific Writing for Humanities
by Edisa Lozić & Benjamin Štular - 1-28 A Graph DB-Based Solution for Semantic Technologies in the Future Internet
by Stefano Ferilli & Eleonora Bernasconi & Davide Di Pierro & Domenico Redavid - 1-29 Machine Learning: Models, Challenges, and Research Directions
by Tala Talaei Khoei & Naima Kaabouch - 1-29 Oceania’s 5G Multi-Tier Fixed Wireless Access Link’s Long-Term Resilience and Feasibility Analysis
by Satyanand Singh & Joanna Rosak-Szyrocka & István Drotár & Xavier Fernando - 1-31 Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities
by Salman Ali AlQahtani - 1-37 Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks
by Šarūnas Grigaliūnas & Michael Schmidt & Rasa Brūzgienė & Panayiota Smyrli & Vladislav Bidikov - 1-46 A Comprehensive Analysis and Investigation of the Public Discourse on Twitter about Exoskeletons from 2017 to 2023
by Nirmalya Thakur & Kesha A. Patel & Audrey Poon & Rishika Shah & Nazif Azizi & Changhee Han
August 2023, Volume 15, Issue 9
- 1-15 Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges
by Peng Zhang & Maged N. Kamel Boulos - 1-15 Short-Term Mobile Network Traffic Forecasting Using Seasonal ARIMA and Holt-Winters Models
by Irina Kochetkova & Anna Kushchazli & Sofia Burtseva & Andrey Gorshenin - 1-16 Digital Twin Applications in Manufacturing Industry: A Case Study from a German Multi-National
by Martin Wynn & Jose Irizar - 1-16 3D Visualization in Digital Medicine Using XR Technology
by Miklos Vincze & Bela Molnar & Miklos Kozlovszky - 1-16 Enhancing E-Learning with Blockchain: Characteristics, Projects, and Emerging Trends
by Mahmoud Bidry & Abdellah Ouaguid & Mohamed Hanine - 1-17 E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios
by Lijun Zu & Hongyi Li & Liang Zhang & Zhihui Lu & Jiawei Ye & Xiaoxia Zhao & Shijing Hu - 1-17 Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing
by Vyas O’Neill & Ben Soh - 1-19 Autism Screening in Toddlers and Adults Using Deep Learning and Fair AI Techniques
by Ishaani Priyadarshini - 1-21 Prospects of Cybersecurity in Smart Cities
by Fernando Almeida - 1-24 A Novel SDWSN-Based Testbed for IoT Smart Applications
by Duaa Zuhair Al-Hamid & Pejman A. Karegar & Peter Han Joo Chong - 1-31 Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security
by Carolina Del-Valle-Soto & Ramon A. Briseño & Leonardo J. Valdivia & Ramiro Velázquez & Juan Arturo Nolazco-Flores - 1-35 3D Path Planning Algorithms in UAV-Enabled Communications Systems: A Mapping Study
by Jorge Carvajal-Rodriguez & Marco Morales & Christian Tipantuña
September 2023, Volume 15, Issue 9
- 1-2 Advances Techniques in Computer Vision and Multimedia
by Yang Wang - 1-2 Editorial for the Special Issue on “Software Engineering and Data Science”, Volume II
by Davide Tosi - 1-16 FREDY: Federated Resilience Enhanced with Differential Privacy
by Zacharias Anastasakis & Terpsichori-Helen Velivassaki & Artemis Voulkidis & Stavroula Bourou & Konstantinos Psychogyios & Dimitrios Skias & Theodore Zahariadis - 1-17 Entering the Metaverse from the JVM: The State of the Art, Challenges, and Research Areas of JVM-Based Web 3.0 Tools and Libraries
by Vlad Bucur & Liviu-Cristian Miclea - 1-17 On Evaluating IoT Data Trust via Machine Learning
by Timothy Tadj & Reza Arablouei & Volkan Dedeoglu - 1-18 Precoding for RIS-Assisted Multi-User MIMO-DQSM Transmission Systems
by Francisco R. Castillo-Soria & J. Alberto Del Puerto-Flores & Cesar A. Azurdia-Meza & Vinoth Babu Kumaravelu & Jorge Simón & Carlos A. Gutierrez - 1-18 Application of ChatGPT-Based Digital Human in Animation Creation
by Chong Lan & Yongsheng Wang & Chengze Wang & Shirong Song & Zheng Gong - 1-19 Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection
by Furkat Safarov & Mainak Basak & Rashid Nasimov & Akmalbek Abdusalomov & Young Im Cho - 1-19 A Hybrid Neural Ordinary Differential Equation Based Digital Twin Modeling and Online Diagnosis for an Industrial Cooling Fan
by Chao-Chung Peng & Yi-Ho Chen - 1-19 Internet of Robotic Things (IoRT) and Metaheuristic Optimization Techniques Applied for Wheel-Legged Robot
by Mateusz Malarczyk & Grzegorz Kaczmarczyk & Jaroslaw Szrek & Marcin Kaminski - 1-19 An Automatic Transformer from Sequential to Parallel Java Code
by Alessandro Midolo & Emiliano Tramontana - 1-19 Force-Based Self-Organizing MANET/FANET with a UAV Swarm
by Fabrice Saffre & Hanno Hildmann & Antti Anttonen - 1-20 Intelligent Unsupervised Network Traffic Classification Method Using Adversarial Training and Deep Clustering for Secure Internet of Things
by Weijie Zhang & Lanping Zhang & Xixi Zhang & Yu Wang & Pengfei Liu & Guan Gui