Content
July 2023, Volume 15, Issue 7
- 1-21 Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis
by Ikram Karabila & Nossayba Darraz & Anas El-Ansari & Nabil Alami & Mostafa El Mallahi - 1-21 Unveiling the Landscape of Operating System Vulnerabilities
by Manish Bhurtel & Danda B. Rawat - 1-27 Beyond the Semantic Web: Towards an Implicit Pragmatic Web and a Web of Social Representations
by Yannis Haralambous & Philippe Lenca - 1-28 A Cyber-Physical System for Wildfire Detection and Firefighting
by Pietro Battistoni & Andrea Antonio Cantone & Gerardo Martino & Valerio Passamano & Marco Romano & Monica Sebillo & Giuliana Vitiello - 1-42 Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools
by Obinna Johnphill & Ali Safaa Sadiq & Feras Al-Obeidat & Haider Al-Khateeb & Mohammed Adam Taheir & Omprakash Kaiwartya & Mohammed Ali
May 2023, Volume 15, Issue 6
- 1-13 Feature Construction Using Persistence Landscapes for Clustering Noisy IoT Time Series
by Renjie Chen & Nalini Ravishanker - 1-14 Research and Design of a Decentralized Edge-Computing-Assisted LoRa Gateway
by Han Gao & Zhangqin Huang & Xiaobo Zhang & Huapeng Yang - 1-16 Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches
by Abdul Majeed & Abdullah M. Alnajim & Athar Waseem & Aleem Khaliq & Aqdas Naveed & Shabana Habib & Muhammad Islam & Sheroz Khan - 1-17 Digital Art and the Metaverse: Benefits and Challenges
by William Hurst & Orestis Spyrou & Bedir Tekinerdogan & Caspar Krampe - 1-17 In-Depth Co-Design of Mental Health Monitoring Technologies by People with Lived Experience
by Bronwin Patrickson & Mike Musker & Dan Thorpe & Yasmin van Kasteren & Niranjan Bidargaddi & The Consumer and Carer Advisory Group (CCAG) - 1-18 PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz & Gustavo Chica Pedraza & Rafael Cubillos-Sánchez & Alexander Aponte-Moreno & Mónica Espinosa Buitrago - 1-19 Elastic Stack and GRAPHYP Knowledge Graph of Web Usage: A Win–Win Workflow for Semantic Interoperability in Decision Making
by Otmane Azeroual & Renaud Fabre & Uta Störl & Ruidong Qi - 1-19 Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions
by Muneerah Al Asqah & Tarek Moulahi - 1-20 Task Automation Intelligent Agents: A Review
by Abdul Wali & Saipunidzam Mahamad & Suziah Sulaiman - 1-21 How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
by Yiming Zhu & Dehua Zhou & Yuan Li & Beibei Song & Chuansheng Wang - 1-23 From NFT 1.0 to NFT 2.0: A Review of the Evolution of Non-Fungible Tokens
by Barbara Guidi & Andrea Michienzi - 1-24 ChatGPT and Open-AI Models: A Preliminary Review
by Konstantinos I. Roumeliotis & Nikolaos D. Tselikas - 1-24 Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey
by Abubakar Ahmad Musa & Adamu Hussaini & Weixian Liao & Fan Liang & Wei Yu - 1-24 Avoiding Detection by Hostile Nodes in Airborne Tactical Networks
by Dragos Ilie & Håkan Grahn & Lars Lundberg & Alexander Westerhagen & Bo Granbom & Anders Höök - 1-26 Synchronizing Many Filesystems in Near Linear Time
by Elod P. Csirmaz & Laszlo Csirmaz - 1-28 Methods of Annotating and Identifying Metaphors in the Field of Natural Language Processing
by Martina Ptiček & Jasminka Dobša - 1-45 Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
by Shereen Ismail & Diana W. Dawoud & Hassan Reza
June 2023, Volume 15, Issue 6
- 1-15 Mitigating Technological Anxiety through the Application of Natural Interaction in Mixed Reality Systems
by Yiming Sun & Tatsuo Nakajima - 1-16 Research on Blockchain Data Availability and Storage Scalability
by Honghao Si & Baoning Niu - 1-17 RSSI and Device Pose Fusion for Fingerprinting-Based Indoor Smartphone Localization Systems
by Imran Moez Khan & Andrew Thompson & Akram Al-Hourani & Kandeepan Sithamparanathan & Wayne S. T. Rowe - 1-19 A DQN-Based Multi-Objective Participant Selection for Efficient Federated Learning
by Tongyang Xu & Yuan Liu & Zhaotai Ma & Yiqiang Huang & Peng Liu - 1-19 BERT4Loc: BERT for Location—POI Recommender System
by Syed Raza Bashir & Shaina Raza & Vojislav B. Misic - 1-19 Dual-Channel Feature Enhanced Collaborative Filtering Recommendation Algorithm
by Yuanyou Ou & Baoning Niu - 1-19 Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow
by Kai Lehniger & Peter Langendörfer - 1-19 Optimal Meshing Degree Performance Analysis in a mmWave FWA 5G Network Deployment
by Iffat Gheyas & Alessandro Raschella & Michael Mackay - 1-21 Neural Network Exploration for Keyword Spotting on Edge Devices
by Jacob Bushur & Chao Chen - 1-22 Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware
by Jinting Zhu & Julian Jang-Jaccard & Amardeep Singh & Paul A. Watters & Seyit Camtepe - 1-25 A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards
by Khaled A. M. Ahmed & Sabry F. Saraya & John F. Wanis & Amr M. T. Ali-Eldin - 1-27 S2NetM: A Semantic Social Network of Things Middleware for Developing Smart and Collaborative IoT-Based Solutions
by Antonios Pliatsios & Dimitrios Lymperis & Christos Goumopoulos - 1-29 Anomaly Detection for Hydraulic Power Units—A Case Study
by Paweł Fic & Adam Czornik & Piotr Rosikowski - 1-29 Searching Online for Art and Culture: User Behavior Analysis
by Minas Pergantis & Iraklis Varlamis & Nikolaos Grigorios Kanellopoulos & Andreas Giannakoulopoulos - 1-30 Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms
by Ashish Koirala & Rabindra Bista & Joao C. Ferreira - 1-35 2D Semantic Segmentation: Recent Developments and Future Directions
by Yu Guo & Guigen Nie & Wenliang Gao & Mi Liao
May 2023, Volume 15, Issue 5
- 1-14 Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload
by Raman Singh & Zeeshan Pervez & Hitesh Tewari - 1-14 Securing UAV Flying Base Station for Mobile Networking: A Review
by Sang-Yoon Chang & Kyungmin Park & Jonghyun Kim & Jinoh Kim - 1-14 A Hybrid Text Generation-Based Query Expansion Method for Open-Domain Question Answering
by Wenhao Zhu & Xiaoyu Zhang & Qiuhong Zhai & Chenyun Liu - 1-16 Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by Yufeng Li & Mengxiao Liu & Chenhong Cao & Jiangtao Li - 1-17 Blockchain Solution for Buildings’ Multi-Energy Flexibility Trading Using Multi-Token Standards
by Oana Marin & Tudor Cioara & Ionut Anghel - 1-17 Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs
by Anas Abu Taleb & Qasem Abu Al-Haija & Ammar Odeh - 1-18 Predicting Football Team Performance with Explainable AI: Leveraging SHAP to Identify Key Team-Level Performance Metrics
by Serafeim Moustakidis & Spyridon Plakias & Christos Kokkotis & Themistoklis Tsatalas & Dimitrios Tsaopoulos - 1-19 Deep Reinforcement Learning-Based Video Offloading and Resource Allocation in NOMA-Enabled Networks
by Siyu Gao & Yuchen Wang & Nan Feng & Zhongcheng Wei & Jijun Zhao - 1-20 Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA
by Khai-Minh Ma & Duc-Hung Le & Cong-Kha Pham & Trong-Thuc Hoang - 1-24 Distributed Average Consensus Algorithms in d-Regular Bipartite Graphs: Comparative Study
by Martin Kenyeres & Jozef Kenyeres - 1-27 Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection
by Dominic Lightbody & Duc-Minh Ngo & Andriy Temko & Colin C. Murphy & Emanuel Popovici - 1-28 Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology
by Ayodeji Falayi & Qianlong Wang & Weixian Liao & Wei Yu - 1-32 5G-MEC Testbeds for V2X Applications
by Prachi V. Wadatkar & Rosario G. Garroppo & Gianfranco Nencioni - 1-35 Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment
by Agbotiname Lucky Imoize & Friday Udeji & Joseph Isabona & Cheng-Chi Lee - 1-47 A Review on Deep-Learning-Based Cyberbullying Detection
by Md. Tarek Hasan & Md. Al Emran Hossain & Md. Saddam Hossain Mukta & Arifa Akter & Mohiuddin Ahmed & Salekul Islam
April 2023, Volume 15, Issue 5
- 1-10 Theory and Applications of Web 3.0 in the Media Sector
by Charalampos A. Dimoulas & Andreas Veglis - 1-13 System Performance Analysis of Sensor Networks for RF Energy Harvesting and Information Transmission
by Kuncheng Lei & Zhenrong Zhang - 1-15 Watermarking Protocols: A Short Guide for Beginners
by Franco Frattolillo - 1-15 Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks
by Fahad M. Alotaibi & Vassilios G. Vassilakis - 1-16 A Context-Aware Edge Computing Framework for Smart Internet of Things
by Abdelkarim Ben Sada & Abdenacer Naouri & Amar Khelloufi & Sahraoui Dhelim & Huansheng Ning - 1-16 Domain Adaptation Speech-to-Text for Low-Resource European Portuguese Using Deep Learning
by Eduardo Medeiros & Leonel Corado & Luís Rato & Paulo Quaresma & Pedro Salgueiro - 1-17 A Reverse Shortest Path Tree-Based Multicast Joining Node Selection Method
by Zhenyu Tian & Jiali You & Linlin Hu - 1-17 NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data Networking
by Ahmed Benmoussa & Chaker Abdelaziz Kerrache & Carlos T. Calafate & Nasreddine Lagraa - 1-17 Benchmarking Change Detector Algorithms from Different Concept Drift Perspectives
by Guilherme Yukio Sakurai & Jessica Fernandes Lopes & Bruno Bogaz Zarpelão & Sylvio Barbon Junior - 1-17 A Distributed Sensor System Based on Cloud-Edge-End Network for Industrial Internet of Things
by Mian Wang & Cong’an Xu & Yun Lin & Zhiyi Lu & Jinlong Sun & Guan Gui - 1-19 Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
by Nuwan Weerasinghe & Muhammad Arslan Usman & Chaminda Hewage & Eckhard Pfluegel & Christos Politis - 1-20 Chinese Short-Text Sentiment Prediction: A Study of Progressive Prediction Techniques and Attentional Fine-Tuning
by Jinlong Wang & Dong Cui & Qiang Zhang - 1-20 Mobile Application for Real-Time Food Plan Management for Alzheimer Patients through Design-Based Research
by Rui P. Duarte & Carlos A. S. Cunha & Valter N. N. Alves - 1-23 Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques
by Luis Alberto Martínez Hernández & Ana Lucila Sandoval Orozco & Luis Javier García Villalba - 1-24 Blockchain-Based Loyalty Management System
by André F. Santos & José Marinho & Jorge Bernardino - 1-25 The Future of the Human–Machine Interface (HMI) in Society 5.0
by Dimitris Mourtzis & John Angelopoulos & Nikos Panopoulos - 1-26 Machine Failure Prediction Using Survival Analysis
by Dimitris Papathanasiou & Konstantinos Demertzis & Nikos Tziritas - 1-27 Extending Learning and Collaboration in Quantum Information with Internet Support: A Future Perspective on Research Education beyond Boundaries, Limitations, and Frontiers
by Francisco Delgado - 1-28 Future Internet Architectures on an Emerging Scale—A Systematic Review
by Sarfaraz Ahmed Mohammed & Anca L. Ralescu - 1-31 Online Privacy Fatigue: A Scoping Review and Research Agenda
by Karl van der Schyff & Greg Foster & Karen Renaud & Stephen Flowerday
March 2023, Volume 15, Issue 4
- 1-13 View Synthesis with Scene Recognition for Cross-View Image Localization
by Uddom Lee & Peng Jiang & Hongyi Wu & Chunsheng Xin - 1-14 A Novel Multi-Cell Interference-Aware Cooperative QoS-Based NOMA Group D2D System
by Muhammad Amish Hasan & Tanveer Ahmad & Asim Anwar & Salman Siddiq & Abdul Malik & Waseem Nazar & Imran Razzaq - 1-14 A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part
by Kongpei Wu & Huiqin Qu & Conggui Huang - 1-14 Effective IoT Congestion Control Algorithm
by Husam H. Hasan & Zainab T. Alisa - 1-14 Contrastive Refinement for Dense Retrieval Inference in the Open-Domain Question Answering Task
by Qiuhong Zhai & Wenhao Zhu & Xiaoyu Zhang & Chenyun Liu - 1-16 A Deep Learning Approach to Detect Failures in Bridges Based on the Coherence of Signals
by Francesco Morgan Bono & Luca Radicioni & Simone Cinquemani & Lorenzo Benedetti & Gabriele Cazzulani & Claudio Somaschini & Marco Belloli - 1-17 Banging Interaction: A Ubimus-Design Strategy for the Musical Internet
by Damián Keller & Azeema Yaseen & Joseph Timoney & Sutirtha Chakraborty & Victor Lazzarini - 1-17 A Comparative Study of Single and Multi-Stage Forecasting Algorithms for the Prediction of Electricity Consumption Using a UK-National Health Service (NHS) Hospital Dataset
by Ahmad Taha & Basel Barakat & Mohammad M. A. Taha & Mahmoud A. Shawky & Chun Sing Lai & Sajjad Hussain & Muhammad Zainul Abideen & Qammer H. Abbasi - 1-18 A Replica-Selection Algorithm Based on Transmission Completion Time Estimation in ICN
by Zhiyuan Wang & Hong Ni & Rui Han - 1-18 Insights into How Vietnamese Retailers Utilize Social Media to Facilitate Knowledge Creation through the Process of Value Co-Creation
by Peter R. J. Trim & Yang-Im Lee & An Vu - 1-18 Influential Factors in the Design and Development of a Sustainable Web3/Metaverse and Its Applications
by Reza Aria & Norm Archer & Moein Khanlari & Bharat Shah - 1-18 Study of Coded ALOHA with Multi-User Detection under Heavy-Tailed and Correlated Arrivals
by María E. Sousa-Vieira & Manuel Fernández-Veiga - 1-18 SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
by Yuting Guan & Junjiang He & Tao Li & Hui Zhao & Baoqiang Ma - 1-18 Performance Evaluation of a Lane Correction Module Stress Test: A Field Test of Tesla Model 3
by Jonathan Lancelot & Bhaskar P. Rimal & Edward M. Dennis - 1-20 A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm
by Jiaqi Zhao & Ming Xu & Yunzhi Chen & Guoliang Xu - 1-21 Addressing ZSM Security Issues with Blockchain Technology
by Michael Xevgenis & Dimitrios G. Kogias & Panagiotis A. Karkazis & Helen C. Leligou - 1-23 Developing a Virtual World for an Open-House Event: A Metaverse Approach
by Keattikorn Samarnggoon & Supara Grudpan & Noppon Wongta & Konlawat Klaynak - 1-23 Transforming IoT Events to Meaningful Business Events on the Edge: Implementation for Smart Farming Application
by Dimitris Gkoulis & Cleopatra Bardaki & George Kousiouris & Mara Nikolaidou - 1-24 Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks
by Sikha Bagui & Dustin Mink & Subhash Bagui & Sakthivel Subramaniam & Daniel Wallace - 1-27 PVPBC: Privacy and Verifiability Preserving E-Voting Based on Permissioned Blockchain
by Muntadher Sallal & Ruairí de Fréin & Ali Malik - 1-31 A Highly Interactive Honeypot-Based Approach to Network Threat Management
by Xingyuan Yang & Jie Yuan & Hao Yang & Ya Kong & Hao Zhang & Jinyu Zhao
April 2023, Volume 15, Issue 4
- 1-2 Distributed Systems for Emerging Computing: Platform and Application
by Xu Wang & Bin Shi & Yili Fang - 1-12 Emerging Technologies and Their Link to Digital Competence in Teaching
by Miguel Ángel García-Delgado & Sonia Rodríguez-Cano & Vanesa Delgado-Benito & María Lozano-Álvarez - 1-13 Applying Patient Segmentation Using Primary Care Electronic Medical Records to Develop a Virtual Peer-to-Peer Intervention for Patients with Type 2 Diabetes
by Alessia Paglialonga & Rebecca Theal & Bruce Knox & Robert Kyba & David Barber & Aziz Guergachi & Karim Keshavjee - 1-15 Future of Drug Discovery: The Synergy of Edge Computing, Internet of Medical Things, and Deep Learning
by Mohammad (Behdad) Jamshidi & Omid Moztarzadeh & Alireza Jamshidi & Ahmed Abdelgawad & Ayman S. El-Baz & Lukas Hauer - 1-17 Implementing GDPR-Compliant Surveys Using Blockchain
by Ricardo Martins Gonçalves & Miguel Mira da Silva & Paulo Rupino da Cunha - 1-18 Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems
by Mazen Gazzan & Frederick T. Sheldon - 1-18 A Multipath Data-Scheduling Strategy Based on Path Correlation for Information-Centric Networking
by Yong Xu & Hong Ni & Xiaoyong Zhu - 1-19 Consumer’s Attitude towards Display Google Ads
by Mohammad Al Khasawneh & Abdel-Aziz Ahmad Sharabati & Shafig Al-Haddad & Rania Al-Daher & Sarah Hammouri & Sima Shaqman - 1-19 Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions
by Beibei Song & Dehua Zhou & Jiahe Wu & Xiaowei Yuan & Yiming Zhu & Chuansheng Wang - 1-20 A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure
by Soumya Prakash Otta & Subhrakanta Panda & Maanak Gupta & Chittaranjan Hota - 1-21 Target-Oriented Data Annotation for Emotion and Sentiment Analysis in Tourism Related Social Media Data
by Alireza Alaei & Ying Wang & Vinh Bui & Bela Stantic - 1-24 A Multiverse Graph to Help Scientific Reasoning from Web Usage: Interpretable Patterns of Assessor Shifts in GRAPHYP
by Renaud Fabre & Otmane Azeroual & Joachim Schöpfel & Patrice Bellot & Daniel Egret - 1-29 Post-Digital Learning for Rural Development: A Case Study of Open Biotec MOOCs in Colombia
by Carlos Ocampo-López & Oscar Muñoz-Blandón & Leidy Rendón-Castrillón & Margarita Ramírez-Carmona - 1-32 Towards a Reference Architecture for Cargo Ports
by Virginia M. Romero & Eduardo B. Fernandez
February 2023, Volume 15, Issue 3
- 1-13 Data Protection and Multi-Database Data-Driven Models
by Lili Jiang & Vicenç Torra - 1-15 Blockchain-Enabled Chebyshev Polynomial-Based Group Authentication for Secure Communication in an Internet of Things Network
by Raman Singh & Sean Sturley & Hitesh Tewari - 1-16 When Operation Technology Meets Information Technology: Challenges and Opportunities
by Davide Berardi & Franco Callegati & Andrea Giovine & Andrea Melis & Marco Prandini & Lorenzo Rinieri - 1-17 Machine Learning for Data Center Optimizations: Feature Selection Using Shapley Additive exPlanation (SHAP)
by Yibrah Gebreyesus & Damian Dalton & Sebastian Nixon & Davide De Chiara & Marta Chinnici - 1-17 Scope and Accuracy of Analytic and Approximate Results for FIFO, Clock-Based and LRU Caching Performance
by Gerhard Hasslinger & Konstantinos Ntougias & Frank Hasslinger & Oliver Hohlfeld - 1-17 A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks
by Jingsha He & Yue Li & Nafei Zhu - 1-20 Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms
by Denis Rangelov & Philipp Lämmel & Lisa Brunzel & Stephan Borgert & Paul Darius & Nikolay Tcholtchev & Michell Boerger - 1-21 Integrating a Blockchain-Based Governance Framework for Responsible AI
by Rameez Asif & Syed Raheel Hassan & Gerard Parr - 1-22 Fast Way to Predict Parking Lots Availability: For Shared Parking Lots Based on Dynamic Parking Fee System
by Sheng-Ming Wang & Wei-Min Cheng - 1-23 A Mobile-Based System for Detecting Ginger Leaf Disorders Using Deep Learning
by Hamna Waheed & Waseem Akram & Saif ul Islam & Abdul Hadi & Jalil Boudjadar & Noureen Zafar - 1-23 HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain
by Leina Abdelgalil & Mohamed Mejri - 1-23 A Vulnerability Assessment Approach for Transportation Networks Subjected to Cyber–Physical Attacks
by Konstantinos Ntafloukas & Liliana Pasquale & Beatriz Martinez-Pastor & Daniel P. McCrum - 1-33 Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme
by Oluwakemi Christiana Abikoye & Esau Taiwo Oladipupo & Agbotiname Lucky Imoize & Joseph Bamidele Awotunde & Cheng-Chi Lee & Chun-Ta Li - 1-34 BPMNE4IoT: A Framework for Modeling, Executing and Monitoring IoT-Driven Processes
by Yusuf Kirikkayis & Florian Gallik & Michael Winter & Manfred Reichert - 1-36 Quantum Computing for Healthcare: A Review
by Raihan Ur Rasool & Hafiz Farooq Ahmad & Wajid Rafique & Adnan Qayyum & Junaid Qadir & Zahid Anwar
March 2023, Volume 15, Issue 3
- 1-13 A Descriptive Study of Webpage Designs for Posting Privacy Policies for Different-Sized US Hospitals to Create an Assessment Framework
by Karen Schnell & Kaushik Roy & Madhuri Siddula - 1-14 Optimizing Task Execution: The Impact of Dynamic Time Quantum and Priorities on Round Robin Scheduling
by Mansoor Iqbal & Zahid Ullah & Izaz Ahmad Khan & Sheraz Aslam & Haris Shaheer & Mujtaba Humayon & Muhammad Asjad Salahuddin & Adeel Mehmood - 1-15 Beamforming Based on a SSS Angle Estimation Algorithm for 5G NR Networks
by Daniel Andrade & Roberto Magueta & Adão Silva & Paulo Marques - 1-15 Co-Design, Development, and Evaluation of a Health Monitoring Tool Using Smartwatch Data: A Proof-of-Concept Study
by Ruhi Kiran Bajaj & Rebecca Mary Meiring & Fernando Beltran - 1-16 Relational Action Bank with Semantic–Visual Attention for Few-Shot Action Recognition
by Haoming Liang & Jinze Du & Hongchen Zhang & Bing Han & Yan Ma - 1-16 Utilizing Random Forest with iForest-Based Outlier Detection and SMOTE to Detect Movement and Direction of RFID Tags
by Ganjar Alfian & Muhammad Syafrudin & Norma Latif Fitriyani & Sahirul Alam & Dinar Nugroho Pratomo & Lukman Subekti & Muhammad Qois Huzyan Octava & Ninis Dyah Yulianingsih & Fransiskus Tatas Dwi Atmaji & Filip Benes - 1-17 Research on Spaceborne Target Detection Based on Yolov5 and Image Compression
by Qi Shi & Daheng Wang & Wen Chen & Jinpei Yu & Weiting Zhou & Jun Zou & Guangzu Liu - 1-18 IoT-Portrait: Automatically Identifying IoT Devices via Transformer with Incremental Learning
by Juan Wang & Jing Zhong & Jiangqi Li - 1-18 Artificial-Intelligence-Based Charger Deployment in Wireless Rechargeable Sensor Networks
by Hsin-Hung Cho & Wei-Che Chien & Fan-Hsun Tseng & Han-Chieh Chao - 1-20 Complex Queries for Querying Linked Data
by Hasna Boumechaal & Zizette Boufaida - 1-20 Indoor Occupancy Sensing via Networked Nodes (2012–2022): A Review
by Muhammad Emad-Ud-Din & Ya Wang - 1-21 DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs
by Juergen Mangler & Joscha Grüger & Lukas Malburg & Matthias Ehrendorfer & Yannis Bertrand & Janik-Vasily Benzin & Stefanie Rinderle-Ma & Estefania Serral Asensio & Ralph Bergmann - 1-22 A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method
by Habiba Sultana & A. H. M. Kamal & Gahangir Hossain & Muhammad Ashad Kabir - 1-22 CvAMoS—Event Abstraction Using Contextual Information
by Gemma Di Federico & Andrea Burattin - 1-25 Dealing with Deadlocks in Industrial Multi Agent Systems
by František Čapkovič - 1-26 Creation, Analysis and Evaluation of AnnoMI, a Dataset of Expert-Annotated Counselling Dialogues
by Zixiu Wu & Simone Balloccu & Vivek Kumar & Rim Helaoui & Diego Reforgiato Recupero & Daniele Riboni - 1-26 A Petri Net Model for Cognitive Radio Internet of Things Networks Exploiting GSM Bands
by Salvatore Serrano & Marco Scarpa
February 2023, Volume 15, Issue 2
- 1-3 Cognitive Software Defined Networking and Network Function Virtualization and Applications
by Sachin Sharma & Avishek Nag - 1-14 A Simple Model of Knowledge Scaffolding Applied to Wikipedia Growth
by Franco Bagnoli & Guido de Bonfioli Cavalcabo’ - 1-15 Perception of the Use of Virtual Reality Didactic Tools among Faculty in Mexico
by Álvaro Antón-Sancho & Pablo Fernández-Arias & Diego Vergara - 1-16 Designing for the Metaverse: A Multidisciplinary Laboratory in the Industrial Design Program
by Marina Ricci & Alessandra Scarcelli & Michele Fiorentino - 1-16 A Novel Multipath Transmission Scheme for Information-Centric Networking
by Yong Xu & Hong Ni & Xiaoyong Zhu - 1-17 Collaborative Storage and Resolution Method between Layers in Hierarchical ICN Name Resolution Systems
by Yanxia Li & Yang Li - 1-17 Research Trends of the Internet of Things in Relation to Business Model Innovation: Results from Co-Word and Content Analyses
by Atik Kulakli & Cenk Lacin Arikan - 1-17 Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence
by Shadi AlZu’bi & Mohammad Elbes & Ala Mughaid & Noor Bdair & Laith Abualigah & Agostino Forestiero & Raed Abu Zitar - 1-19 Multi-Scale Audio Spectrogram Transformer for Classroom Teaching Interaction Recognition
by Fan Liu & Jiandong Fang - 1-19 Development of a Vision-Based Unmanned Ground Vehicle for Mapping and Tennis Ball Collection: A Fuzzy Logic Approach
by Masoud Latifinavid & Aydin Azizi - 1-20 Significance of Cross-Correlated QoS Configurations for Validating the Subjective and Objective QoE of Cloud Gaming Applications
by Nafi Ahmad & Abdul Wahab & John Schormans & Ali Adib Arnab - 1-20 RingFFL: A Ring-Architecture-Based Fair Federated Learning Framework
by Lu Han & Xiaohong Huang & Dandan Li & Yong Zhang - 1-20 I4.0I: A New Way to Rank How Involved a Company Is in the Industry 4.0 Era
by Vitória Francesca Biasibetti Zilli & Cesar David Paredes Crovato & Rodrigo da Rosa Righi & Rodrigo Ivan Goytia Mejia & Giovani Pesenti & Dhananjay Singh - 1-21 Disruptive Technologies for Parliaments: A Literature Review
by Dimitris Koryzis & Dionisis Margaris & Costas Vassilakis & Konstantinos Kotis & Dimitris Spiliotopoulos - 1-21 Im2Graph: A Weakly Supervised Approach for Generating Holistic Scene Graphs from Regional Dependencies
by Swarnendu Ghosh & Teresa Gonçalves & Nibaran Das - 1-23 Optimal Pricing in a Rented 5G Infrastructure Scenario with Sticky Customers
by Marta Flamini & Maurizio Naldi - 1-24 Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
by Sheeraz Ahmed & Zahoor Ali Khan & Syed Muhammad Mohsin & Shahid Latif & Sheraz Aslam & Hana Mujlid & Muhammad Adil & Zeeshan Najam - 1-27 An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs
by Soukaina Bouarourou & Abderrahim Zannou & El Habib Nfaoui & Abdelhak Boulaalam - 1-27 On the Use of Knowledge Transfer Techniques for Biomedical Named Entity Recognition
by Tahir Mehmood & Ivan Serina & Alberto Lavelli & Luca Putelli & Alfonso Gerevini - 1-31 Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations
by Eddy Truyen & Hongjie Xie & Wouter Joosen - 1-31 An Interactive Method for Detection of Process Activity Executions from IoT Data
by Ronny Seiger & Marco Franceschetti & Barbara Weber - 1-37 Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
by Tehseen Mazhar & Hafiz Muhammad Irfan & Sunawar Khan & Inayatul Haq & Inam Ullah & Muhammad Iqbal & Habib Hamam - 1-49 Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration
by Christoph Stach
January 2023, Volume 15, Issue 2
- 1-9 Acknowledgment to the Reviewers of Future Internet in 2022
by Future Internet Editorial Office - 1-10 Vision, Enabling Technologies, and Scenarios for a 6G-Enabled Internet of Verticals (6G-IoV)
by Maziar Nekovee & Ferheen Ayaz - 1-12 Performance Assessment and Comparison of Deployment Options for 5G Millimeter Wave Systems
by Evgeni Mokrov & Konstantin Samouylov - 1-13 Forest Fire Detection and Notification Method Based on AI and IoT Approaches
by Kuldoshbay Avazov & An Eui Hyun & Alabdulwahab Abrar Sami S & Azizbek Khaitov & Akmalbek Bobomirzaevich Abdusalomov & Young Im Cho - 1-14 Attention-Enriched Mini-BERT Fake News Analyzer Using the Arabic Language
by Husam M. Alawadh & Amerah Alabrah & Talha Meraj & Hafiz Tayyab Rauf - 1-16 The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process
by Yonghong Chen & Lei Xun & Shibing Zhang - 1-17 Redundancy Mitigation Mechanism for Collective Perception in Connected and Autonomous Vehicles
by Wellington Lobato & Paulo Mendes & Denis Rosário & Eduardo Cerqueira & Leandro A. Villas - 1-17 Digitalization of Distribution Transformer Failure Probability Using Weibull Approach towards Digital Transformation of Power Distribution Systems
by A. M. Sakura R. H. Attanayake & R. M. Chandima Ratnayake - 1-17 Smart Embedded System for Skin Cancer Classification
by Pedro F. Durães & Mário P. Véstias - 1-18 The Cloud-to-Edge-to-IoT Continuum as an Enabler for Search and Rescue Operations
by Leonardo Militano & Adriana Arteaga & Giovanni Toffetti & Nathalie Mitton - 1-19 Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments
by Paolo Bellavista & Mattia Fogli & Carlo Giannelli & Cesare Stefanelli - 1-20 Prediction of Energy Production Level in Large PV Plants through AUTO-Encoder Based Neural-Network (AUTO-NN) with Restricted Boltzmann Feature Extraction
by Ganapathy Ramesh & Jaganathan Logeshwaran & Thangavel Kiruthiga & Jaime Lloret - 1-20 Optimal Mobility-Aware Wireless Edge Cloud Support for the Metaverse
by Zhaohui Huang & Vasilis Friderikos - 1-20 Electric Drive with an Adaptive Controller and Wireless Communication System
by Mateusz Malarczyk & Mateusz Zychlewicz & Radoslaw Stanislawski & Marcin Kaminski - 1-20 A Digital Twin Framework Embedded with POD and Neural Network for Flow Field Monitoring of Push-Plate Kiln
by Pin Wu & Lulu Ji & Wenyan Yuan & Zhitao Liu & Tiantian Tang - 1-20 Envisioning Architecture of Metaverse Intensive Learning Experience (MiLEx): Career Readiness in the 21st Century and Collective Intelligence Development Scenario
by Eman AbuKhousa & Mohamed Sami El-Tahawy & Yacine Atif - 1-21 An Optimized Planning Tool for Microwave Terrestrial and Satellite Link Design
by Eduardo Ferreira & Pedro Sebastião & Francisco Cercas & Carlos Sá Costa & Américo Correia - 1-22 Engineering Resource-Efficient Data Management for Smart Cities with Apache Kafka
by Theofanis P. Raptis & Claudio Cicconetti & Manolis Falelakis & Grigorios Kalogiannis & Tassos Kanellos & Tomás Pariente Lobo - 1-24 A TOSCA-Based Conceptual Architecture to Support the Federation of Heterogeneous MSaaS Infrastructures
by Paolo Bocciarelli & Andrea D’Ambrogio - 1-28 A Model Based Framework for IoT-Aware Business Process Management
by Paolo Bocciarelli & Andrea D’Ambrogio & Tommaso Panetti - 1-29 Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
by Mohammed El-hajj & Hussien Mousawi & Ahmad Fadlallah - 1-32 From Service Composition to Mashup Editor: A Multiperspective Taxonomy
by Abderrahmane Maaradji & Hakim Hacid & Assia Soukane - 1-34 Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
by Afnan Alotaibi & Murad A. Rassam
January 2023, Volume 15, Issue 1
- 1-12 Adapting Recommendations on Environmental Education Programs
by Katerina Kabassi & Anastasia Papadaki & Athanasios Botonis - 1-13 A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
by Qiang Li - 1-14 Blockchain, Quo Vadis? Recent Changes in Perspectives on the Application of Technology in Agribusiness
by Geneci da Silva Ribeiro Rocha & Diego Durante Mühl & Hermenegildo Almeida Chingamba & Letícia de Oliveira & Edson Talamini - 1-15 Time Segmentation-Based Hybrid Caching in 5G-ICN Bearer Network
by Ke Zhao & Rui Han & Xu Wang - 1-15 Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations
by Leny Vinceslas & Safak Dogan & Srikumar Sundareshwar & Ahmet M. Kondoz - 1-16 Product Evaluation Prediction Model Based on Multi-Level Deep Feature Fusion
by Qingyan Zhou & Hao Li & Youhua Zhang & Junhong Zheng - 1-19 Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
by Brent Pethers & Abubakar Bello - 1-19 Deep Reinforcement Learning Evolution Algorithm for Dynamic Antenna Control in Multi-Cell Configuration HAPS System
by Siyuan Yang & Mondher Bouazizi & Tomoaki Ohtsuki & Yohei Shibata & Wataru Takabatake & Kenji Hoshino & Atsushi Nagate - 1-21 Transfer Functions and Linear Distortions in Ultra-Wideband Channels Faded by Rain in GeoSurf Satellite Constellations
by Emilio Matricciani & Carlo Riva - 1-21 Image of a City through Big Data Analytics: Colombo from the Lens of Geo-Coded Social Media Data
by Sandulika Abesinghe & Nayomi Kankanamge & Tan Yigitcanlar & Surabhi Pancholi - 1-21 Cost-Profiling Microservice Applications Using an APM Stack
by Sjouke de Vries & Frank Blaauw & Vasilios Andrikopoulos - 1-21 Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking
by Neamah S. Radam & Sufyan T. Faraj Al-Janabi & Khalid Sh. Jasim