Content
January 2023, Volume 15, Issue 1
- 1-25 Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation
by Teresa Gonçalves & Rute Veladas & Hua Yang & Renata Vieira & Paulo Quaresma & Paulo Infante & Cátia Sousa Pinto & João Oliveira & Maria Cortes Ferreira & Jéssica Morais & Ana Raquel Pereira & Nuno Fernandes & Carolina Gonçalves - 1-27 Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions
by Shams Mhmood Abd Ali & Mohd Najwadi Yusoff & Hasan Falah Hasan - 1-27 A Multi-Agent Approach to Binary Classification Using Swarm Intelligence
by Sean Grimes & David E. Breen
December 2022, Volume 15, Issue 1
- 1-3 VR, AR, and 3-D User Interfaces for Measurement and Control
by Annalisa Liccardo & Francesco Bonavolontà - 1-11 Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market
by Bashar Igried & Atalla Fahed Al-Serhan & Ayoub Alsarhan & Mohammad Aljaidi & Amjad Aldweesh - 1-12 Narrowband Internet-of-Things to Enhance the Vehicular Communications Performance
by Qadri Hamarsheh & Omar Daoud & Mohammed Baniyounis & Ahlam Damati - 1-13 BART-IT: An Efficient Sequence-to-Sequence Model for Italian Text Summarization
by Moreno La Quatra & Luca Cagliero - 1-15 Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain
by Qian Yang & Suoping Li & Hongli Li & Weiru Chen - 1-18 Teachers’ Views on Integrating Augmented Reality in Education: Needs, Opportunities, Challenges and Recommendations
by Maria Perifanou & Anastasios A. Economides & Stavros A. Nikou - 1-19 Ethereum-Based Information System for Digital Higher Education Registry and Verification of Student Achievement Documents
by Yerlan Kistaubayev & Galimkair Mutanov & Madina Mansurova & Zhanna Saxenbayeva & Yassynzhan Shakan - 1-19 An Analysis of ML-Based Outlier Detection from Mobile Phone Trajectories
by Francisco Melo Pereira & Rute C. Sofia - 1-19 Drifting Streaming Peaks-Over-Threshold-Enhanced Self-Evolving Neural Networks for Short-Term Wind Farm Generation Forecast
by Yunchuan Liu & Amir Ghasemkhani & Lei Yang - 1-19 A GIS-Based Hot and Cold Spots Detection Method by Extracting Emotions from Social Streams
by Barbara Cardone & Ferdinando Di Martino & Vittorio Miraglia - 1-20 HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security
by Duc-Minh Ngo & Dominic Lightbody & Andriy Temko & Cuong Pham-Quoc & Ngoc-Thinh Tran & Colin C. Murphy & Emanuel Popovici - 1-20 A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network
by Jiaxu Zhao & Binting Su & Xuli Rao & Zhide Chen - 1-20 A Novel NODE Approach Combined with LSTM for Short-Term Electricity Load Forecasting
by Songtao Huang & Jun Shen & Qingquan Lv & Qingguo Zhou & Binbin Yong - 1-21 Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks
by Sarantis Kalafatidis & Sotiris Skaperas & Vassilis Demiroglou & Lefteris Mamatas & Vassilis Tsaoussidis - 1-21 The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review
by Khando Khando & M. Sirajul Islam & Shang Gao - 1-23 Using Social Media & Sentiment Analysis to Make Investment Decisions
by Ben Hasselgren & Christos Chrysoulas & Nikolaos Pitropakis & William J. Buchanan - 1-23 NewSQL Databases Assessment: CockroachDB, MariaDB Xpand, and VoltDB
by Eduardo Pina & Filipe Sá & Jorge Bernardino - 1-24 Evaluating the Perceived Quality of Mobile Banking Applications in Croatia: An Empirical Study
by Tihomir Orehovački & Luka Blašković & Matej Kurevija - 1-24 Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service
by Jinze Du & Chengtai Gao & Tao Feng - 1-25 Pedestrian Simulation with Reinforcement Learning: A Curriculum-Based Approach
by Giuseppe Vizzari & Thomas Cecconello - 1-26 Utility of Sharing Economy Principles in the Development of Applications Dedicated to Construction Cost Estimation
by Adrian Sfichi & Eduard Zadobrischi & Narcisa Sfichi & Marian Bădeliță & Mihai Medrihan - 1-26 SmartGroup: A Tool for Small-Group Learning Activities
by Haining Zhu & Na Li & Nitish Kumar Rai & John M. Carroll - 1-35 Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things
by Konstantinos Kotis & Stavros Stavrinos & Christos Kalloniatis - 1-42 Human–Machine Interaction through Advanced Haptic Sensors: A Piezoelectric Sensory Glove with Edge Machine Learning for Gesture and Object Recognition
by Roberto De Fazio & Vincenzo Mariano Mastronardi & Matteo Petruzzi & Massimo De Vittorio & Paolo Visconti
December 2022, Volume 14, Issue 12
- 1-2 Information and Future Internet Security, Trust and Privacy
by Weizhi Meng & Thanassis Giannetsos & Christian D. Jensen - 1-2 Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains
by Uttam Ghosh & Deepak Tosh & Nawab Muhammad Faseeh Qureshi & Ali Kashif Bashir & Al-Sakib Khan Pathan & Zhaolong Ning - 1-3 Smart Objects and Technologies for Social Good
by Ivan Miguel Pires - 1-4 6G Wireless Communication Systems: Applications, Opportunities and Challenges
by Kelvin Anoh & Chan Hwang See & Yousef Dama & Raed A. Abd-Alhameed & Simeon Keates - 1-12 Implementation of the Canny Edge Detector Using a Spiking Neural Network
by Krishnamurthy V. Vemuru - 1-12 ERGCN: Enhanced Relational Graph Convolution Network, an Optimization for Entity Prediction Tasks on Temporal Knowledge Graphs
by Yinglin Wang & Xinyu Xu - 1-12 A Multi-Sensory In-Store Virtual Reality Customer Journey for Retailing: A Field Study in a Furniture Flagship Store
by Michele Fiorentino & Marina Ricci & Alessandro Evangelista & Vito Modesto Manghisi & Antonio Emmanuele Uva - 1-14 Professionals as Change Agents or Instruments of Reproduction? Medical Residents’ Reasoning for Not Sharing the Electronic Health Record Screen with Patients
by Celeste Campos-Castillo & Noelle Chesley & Onur Asan - 1-15 Single-Shot Global and Local Context Refinement Neural Network for Head Detection
by Jingyuan Hu & Zhouwang Yang - 1-16 Gamification with Scratch or App Inventor in Higher Education: A Systematic Review
by David Pérez-Jorge & María Carmen Martínez-Murciano - 1-17 Enhancing the Lifetime and Energy Efficiency of Wireless Sensor Networks Using Aquila Optimizer Algorithm
by Ashraf A. Taha & Hagar O. Abouroumia & Shimaa A. Mohamed & Lamiaa A. Amar - 1-18 A Low-Cost Open-Source Architecture for a Digital Signage Emergency Evacuation System for Cruise Ships, Based on IoT and LTE/4G Technologies
by Vasileios Cheimaras & Athanasios Trigkas & Panagiotis Papageorgas & Dimitrios Piromalis & Emmanouil Sofianopoulos - 1-18 Examining Gender Bias of Convolutional Neural Networks via Facial Recognition
by Tony Gwyn & Kaushik Roy - 1-19 LSSDNF: A Lightweight Secure Software Defined Network Framework for Future Internet in 5G–6G
by Surjit Singh & Vivek Mehla & Srete Nikolovski - 1-19 Comparative Analysis of Skeleton-Based Human Pose Estimation
by Jen-Li Chung & Lee-Yeng Ong & Meng-Chew Leow - 1-21 Holistic Utility Satisfaction in Cloud Data Centre Network Using Reinforcement Learning
by Pejman Goudarzi & Mehdi Hosseinpour & Roham Goudarzi & Jaime Lloret - 1-22 Integrated SDN-NFV 5G Network Performance and Management-Complexity Evaluation
by Nico Surantha & Noffal A. Putra - 1-22 Graph-Based Taxonomic Semantic Class Labeling
by Tajana Ban Kirigin & Sanda Bujačić Babić & Benedikt Perak - 1-23 Internet Video Delivery Improved by Super-Resolution with GAN
by Joao da Mata Liborio & Cesar Melo & Marcos Silva - 1-26 Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks
by Okiemute Roberts Omasheye & Samuel Azi & Joseph Isabona & Agbotiname Lucky Imoize & Chun-Ta Li & Cheng-Chi Lee - 1-27 FedCO: Communication-Efficient Federated Learning via Clustering Optimization
by Ahmed A. Al-Saedi & Veselka Boeva & Emiliano Casalicchio - 1-45 TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review
by Nikolaos Schizas & Aristeidis Karras & Christos Karras & Spyros Sioutas
November 2022, Volume 14, Issue 12
- 1-2 Cloud-Native Applications and Services
by Nane Kratzke - 1-12 YOLO-DFAN: Effective High-Altitude Safety Belt Detection Network
by Wendou Yan & Xiuying Wang & Shoubiao Tan - 1-15 Evolutionary Computation for Sparse Synthesis Optimization of CCAAs: An Enhanced Whale Optimization Algorithm Method
by Bohao Tang & Lihua Cai & Shuai Yang & Jiaxing Xu & Yi Yu - 1-15 A Game-Theoretic Approach for Network Security Using Honeypots
by Răzvan Florea & Mitică Craus - 1-16 NextDet: Efficient Sparse-to-Dense Object Detection with Attentive Feature Aggregation
by Priyank Kalgaonkar & Mohamed El-Sharkawy - 1-17 rl4dtn: Q-Learning for Opportunistic Networks
by Jorge Visca & Javier Baliosian - 1-17 The Application of Artificial Intelligence in Magnetic Hyperthermia Based Research
by Magdalena Osial & Agnieszka Pregowska - 1-18 Recursive Feature Elimination for Improving Learning Points on Hand-Sign Recognition
by Rung-Ching Chen & William Eric Manongga & Christine Dewi - 1-18 Analysis and Prediction of the IPv6 Traffic over Campus Networks in Shanghai
by Zhiyang Sun & Hui Ruan & Yixin Cao & Yang Chen & Xin Wang - 1-18 SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network
by Ronghua Xu & Yu Chen & Genshe Chen & Erik Blasch - 1-20 A Novel Strategy for VNF Placement in Edge Computing Environments
by Anselmo Luiz Éden Battisti & Evandro Luiz Cardoso Macedo & Marina Ivanov Pereira Josué & Hugo Barbalho & Flávia C. Delicato & Débora Christina Muchaluat-Saade & Paulo F. Pires & Douglas Paulo de Mattos & Ana Cristina Bernardo de Oliveira - 1-22 COVID-Related Misinformation Migration to BitChute and Odysee
by Olga Papadopoulou & Evangelia Kartsounidou & Symeon Papadopoulos - 1-26 Cumulative Impact of Testing Factors in Usability Tests for Human-Centered Web Design
by Alexander V. Yakunin & Svetlana S. Bodrunova - 1-29 Integrating ISA and Part-of Domain Knowledge into Process Model Discovery
by Alessio Bottrighi & Marco Guazzone & Giorgio Leonardi & Stefania Montani & Manuel Striani & Paolo Terenziani - 1-29 QuickFaaS: Providing Portability and Interoperability between FaaS Platforms
by Pedro Rodrigues & Filipe Freitas & José Simão - 1-30 Detection of Malicious Websites Using Symbolic Classifier
by Nikola Anđelić & Sandi Baressi Šegota & Ivan Lorencin & Matko Glučina - 1-33 A Systematic Literature Review on Applications of GAN-Synthesized Images for Brain MRI
by Sampada Tavse & Vijayakumar Varadarajan & Mrinal Bachute & Shilpa Gite & Ketan Kotecha
October 2022, Volume 14, Issue 11
- 1-2 Editorial for the Special Issue on “Software Engineering and Data Science”
by Davide Tosi - 1-10 Hate and False Metaphors: Implications to Emerging E-Participation Environment
by Sreejith Alathur & Naganna Chetty & Rajesh R. Pai & Vishal Kumar & Sahraoui Dhelim - 1-13 A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G
by Faycal Bouhafs & Alessandro Raschellà & Michael Mackay & Frank den Hartog - 1-15 Ambient Environmental Parameter Estimation for Reliable Diffusive Molecular Communications
by Shota Toriyama & Shoma Hasegawa & Jens Kirchner & Georg Fischer & Daisuke Anzai - 1-15 A Multi-Gateway Behaviour Study for Traffic-Oriented LoRaWAN Deployment
by Kerima Saleh Abakar & Ismail Bennis & Abdelhafid Abouaissa & Pascal Lorenz - 1-16 What Is Metaverse?—A Definition Based on Qualitative Meta-Synthesis
by Markus Weinberger - 1-17 Decision Support Using Machine Learning Indication for Financial Investment
by Ariel Vieira de Oliveira & Márcia Cristina Schiavi Dazzi & Anita Maria da Rocha Fernandes & Rudimar Luis Scaranto Dazzi & Paulo Ferreira & Valderi Reis Quietinho Leithardt - 1-17 Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing
by Tianyu Bai & Song Fu & Qing Yang - 1-19 Real-Time Flood Monitoring with Computer Vision through Edge Computing-Based Internet of Things
by Obaid Rafiq Jan & Hudyjaya Siswoyo Jo & Riady Siswoyo Jo & Jonathan Kua - 1-21 Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
by Rasheed Gbenga Jimoh & Olayinka Olufunmilayo Olusanya & Joseph Bamidele Awotunde & Agbotiname Lucky Imoize & Cheng-Chi Lee - 1-21 LoRaWAN Network Downlink Routing Control Strategy Based on the SDN Framework and Improved ARIMA Model
by Qi Qian & Liang Shu & Yuxiang Leng & Zhizhou Bao - 1-21 EduTVA: Metadata Schema for Educational Audiovisual Contents in Digital Television Environments
by Angela M. Vargas-Arcila & Julian A. Caicedo-Muñoz & Felipe Estrada-Solano & Carlos González-Amarillo & Armando Ordonez & Jose L. Arciniegas - 1-22 Analysis of Data from Surveys for the Identification of the Factors That Influence the Migration of Small Companies to eCommerce
by William Villegas-Ch. & Santiago Criollo-C & Walter Gaibor-Naranjo & Xavier Palacios-Pacheco - 1-25 Privacy Goals for the Data Lifecycle
by Jane Henriksen-Bulmer & Cagatay Yucel & Shamal Faily & Ioannis Chalkias - 1-43 Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects
by Christoph Stach & Clémentine Gritti & Julia Bräcker & Michael Behringer & Bernhard Mitschang
November 2022, Volume 14, Issue 11
- 1-2 Internet of Things and Cyber–Physical Systems
by Iwona Grobelna - 1-2 Editorial for the Special Issue on 5G Enabling Technologies and Wireless Networking
by Michael Mackay - 1-3 Editorial for the Special Issue “Selected Papers from the 9th Annual Conference ‘Comparative Media Studies in Today’s World’ (CMSTW’2021)”
by Svetlana S. Bodrunova - 1-4 Special Issue on Security and Privacy in Blockchains and the IoT
by Christoph Stach - 1-6 Collaborative and Intelligent Networks and Decision Systems and Services for Supporting Engineering and Production Management
by Leonilde Varela & Goran D. Putnik - 1-12 Real-Time Image Detection for Edge Devices: A Peach Fruit Detection Application
by Eduardo Assunção & Pedro D. Gaspar & Khadijeh Alibabaei & Maria P. Simões & Hugo Proença & Vasco N. G. J. Soares & João M. L. P. Caldeira - 1-12 Key Competences for Lifelong Learning through the “Animal Crossing: New Horizons” Video Game
by Beatriz Villarejo-Carballido & Cristina M. Pulido & Santiago Tejedor - 1-12 The Future of Cybersecurity in the Age of Quantum Computers
by Fazal Raheman - 1-14 A Machine Learning Predictive Model to Detect Water Quality and Pollution
by Xiaoting Xu & Tin Lai & Sayka Jahan & Farnaz Farid & Abubakar Bello - 1-14 Financial Market Correlation Analysis and Stock Selection Application Based on TCN-Deep Clustering
by Yuefeng Cen & Mingxing Luo & Gang Cen & Cheng Zhao & Zhigang Cheng - 1-15 BERT- and BiLSTM-Based Sentiment Analysis of Online Chinese Buzzwords
by Xinlu Li & Yuanyuan Lei & Shengwei Ji - 1-15 Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models
by Sanjiban Sekhar Roy & Ali Ismail Awad & Lamesgen Adugnaw Amare & Mabrie Tesfaye Erkihun & Mohd Anas - 1-16 Users’ Perceptions of Key Blockchain Features in Games
by Iikka Paajala & Jesse Nyyssölä & Juho Mattila & Pasi Karppinen - 1-16 Reliable Application Layer Routing Using Decentralized Identifiers
by Khalid Alsubhi & Bander Alzahrani & Nikos Fotiou & Aiiad Albeshri & Mohammed Alreshoodi - 1-16 SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems
by Muhammad Asad & Muhammad Aslam & Syeda Fizzah Jilani & Saima Shaukat & Manabu Tsukada - 1-17 IoT-Based System for Improving Vehicular Safety by Continuous Traffic Violation Monitoring
by Yousef-Awwad Daraghmi & Mamoun Abu Helou & Eman-Yasser Daraghmi & Waheeb Abu-ulbeh - 1-18 Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures
by Fabian Honecker & Julian Dreyer & Ralf Tönjes - 1-19 A Dynamic Federated Identity Management Using OpenID Connect
by Ahmad Alsadeh & Nasri Yatim & Yousef Hassouneh - 1-19 Assessing Latency of Packet Delivery in the 5G 3GPP Integrated Access and Backhaul Architecture with Half-Duplex Constraints
by Nikita Polyakov & Anna Platonova - 1-20 A Comparison of Blockchain Recovery Time in Static and Mobile IoT-Blockchain Networks
by Yue Su & Kien Nguyen & Hiroo Sekiya - 1-21 Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network
by Yujian Zhang & Daifu Liu - 1-21 A Cost-Aware Framework for QoS-Based and Energy-Efficient Scheduling in Cloud–Fog Computing
by Husam Suleiman - 1-21 Data Synchronization: A Complete Theoretical Solution for Filesystems
by Elod P. Csirmaz & Laszlo Csirmaz - 1-22 Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing
by Gousia Habib & Sparsh Sharma & Sara Ibrahim & Imtiaz Ahmad & Shaima Qureshi & Malik Ishfaq - 1-23 Integrating Chatbot Media Automations in Professional Journalism: An Evaluation Framework
by Efthimis Kotenidis & Nikolaos Vryzas & Andreas Veglis & Charalampos Dimoulas - 1-24 Exploring the Design of a Mixed-Reality 3D Minimap to Enhance Pedestrian Satisfaction in Urban Exploratory Navigation
by Yiyi Zhang & Tatsuo Nakajima - 1-24 Generating Indicators of Disruptive Innovation Using Big Data
by Roger C. Brackin & Michael J. Jackson & Andrew Leyshon & Jeremy G. Morley & Sarah Jewitt - 1-31 The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
by Angeliki Kitsiou & Charikleia Despotidi & Christos Kalloniatis & Stefanos Gritzalis - 1-55 Evaluation of the Factors That Impact the Perception of Online Content Trustworthiness by Income, Political Affiliation and Online Usage Time
by Matthew Spradling & Jeremy Straub
October 2022, Volume 14, Issue 10
- 1-12 A Unified PUF and Crypto Core Exploiting the Metastability in Latches
by Ronaldo Serrano & Ckristian Duran & Marco Sarmiento & Tuan-Kiet Dang & Trong-Thuc Hoang & Cong-Kha Pham - 1-14 Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks
by Kirill Chemrov & Dmitry Bankov & Evgeny Khorov & Andrey Lyakhov - 1-15 A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
by Amit Sagu & Nasib Singh Gill & Preeti Gulia & Jyotir Moy Chatterjee & Ishaani Priyadarshini - 1-16 A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period
by Dawei Wei & Feifei Shi & Sahraoui Dhelim - 1-16 Improved Dragonfly Optimization Algorithm for Detecting IoT Outlier Sensors
by Maytham N. Meqdad & Seifedine Kadry & Hafiz Tayyab Rauf - 1-16 Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework
by Yves Adou & Ekaterina Markova & Yuliya Gaidamaka - 1-18 Natural Language Processing and Cognitive Networks Identify UK Insurers’ Trends in Investor Day Transcripts
by Stefan Claus & Massimo Stella - 1-20 Study of the Organization and Implementation of E-Learning in Wartime Inside Ukraine
by Liudmyla Matviichuk & Stefano Ferilli & Nataliia Hnedko - 1-21 A Comparative Study on Traffic Modeling Techniques for Predicting and Simulating Traffic Behavior
by Taghreed Alghamdi & Sifatul Mostafi & Ghadeer Abdelkader & Khalid Elgazzar - 1-23 Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages
by Ján Mojžiš & Peter Krammer & Marcel Kvassay & Lenka Skovajsová & Ladislav Hluchý - 1-28 Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach
by Leonardo Alberro & Felipe Velázquez & Sara Azpiroz & Eduardo Grampin & Matías Richart - 1-34 Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches
by Gengxian Li & Chundong Wang & Huaibin Wang - 1-52 A Survey of Wi-Fi 6: Technologies, Advances, and Challenges
by Erfan Mozaffariahrar & Fabrice Theoleyre & Michael Menth
September 2022, Volume 14, Issue 10
- 1-11 Minimization of n th Order Rate Matching in Satellite Networks with One to Many Pairings
by Anargyros J. Roumeliotis & Christos N. Efrem & Athanasios D. Panagopoulos - 1-12 An Efficient Location-Based Forwarding Strategy for Named Data Networking and LEO Satellite Communications
by Pablo Iglesias-Sanuy & José Carlos López-Ardao & Miguel Rodríguez-Pérez & Sergio Herrería-Alonso & Andrés Suárez-González & Raúl F. Rodríguez-Rubio - 1-13 Distributed Big Data Storage Infrastructure for Biomedical Research Featuring High-Performance and Rich-Features
by Xingjian Xu & Lijun Sun & Fanjun Meng - 1-13 Improving Quality Indicators of the Cloud-Based IoT Networks Using an Improved Form of Seagull Optimization Algorithm
by Hamza Mohammed Ridha Al-Khafaji - 1-13 Latency Analysis of Blockchain-Based SSI Applications
by Tamas Pflanzner & Hamza Baniata & Attila Kertesz - 1-13 Playful Meaning-Making as Prosocial Fun
by John M. Carroll & Fanlu Gui & Srishti Gupta & Tiffany Knearem - 1-14 Deep Learning Based Semantic Image Segmentation Methods for Classification of Web Page Imagery
by Ramya Krishna Manugunta & Rytis Maskeliūnas & Robertas Damaševičius - 1-16 Modelling Analysis of a Novel Frameless Slotted-ALOHA Protocol Based on the Number of Detectable Conflicting Users
by Sa Yang & Suoping Li & Nana Yang & Ying Lin - 1-17 Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden
by Francesco Pirotti & Marco Piragnolo & Marika D’Agostini & Raffaele Cavalli - 1-18 Automated Penetration Testing Framework for Smart-Home-Based IoT Devices
by Rohit Akhilesh & Oliver Bills & Naveen Chilamkurti & Mohammad Jabed Morshed Chowdhury - 1-20 Author Identification from Literary Articles with Visual Features: A Case Study with Bangla Documents
by Ankita Dhar & Himadri Mukherjee & Shibaprasad Sen & Md Obaidullah Sk & Amitabha Biswas & Teresa Gonçalves & Kaushik Roy - 1-20 The Combined Use of UAV-Based RGB and DEM Images for the Detection and Delineation of Orange Tree Crowns with Mask R-CNN: An Approach of Labeling and Unified Framework
by Felipe Lucena & Fabio Marcelo Breunig & Hermann Kux - 1-20 ReFuse: Generating Imperviousness Maps from Multi-Spectral Sentinel-2 Satellite Imagery
by Giovanni Giacco & Stefano Marrone & Giuliano Langella & Carlo Sansone - 1-20 Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
by Anna Kurtukova & Aleksandr Romanov & Alexander Shelupanov & Anastasia Fedotova - 1-21 Modeling and Validating a News Recommender Algorithm in a Mainstream Medium-Sized News Organization: An Experimental Approach
by Paschalia (Lia) Spyridou & Constantinos Djouvas & Dimitra Milioni - 1-23 Cloud-Native Observability: The Many-Faceted Benefits of Structured and Unified Logging—A Multi-Case Study
by Nane Kratzke - 1-24 FakeNewsLab: Experimental Study on Biases and Pitfalls Preventing Us from Distinguishing True from False News
by Giancarlo Ruffo & Alfonso Semeraro - 1-27 Analysis and Correlation between a Non-Invasive Sensor Network System in the Room and the Improvement of Sleep Quality
by Eduardo Morales-Vizcarra & Carolina Del-Valle-Soto & Paolo Visconti & Fabiola Cortes-Chavez - 1-36 An Enhanced ELECTRE II Method for Multi-Attribute Ontology Ranking with Z-Numbers and Probabilistic Linguistic Term Set
by Ameeth Sooklall & Jean Vincent Fonou-Dombeu
August 2022, Volume 14, Issue 9
- 1-11 Artificial Intelligence in Adaptive and Intelligent Educational System: A Review
by Jingwen Dong & Siti Nurulain Mohd Rum & Khairul Azhar Kasmiran & Teh Noranis Mohd Aris & Raihani Mohamed - 1-12 A Fairness Index Based on Rate Variance for Downlink Non-Orthogonal Multiple Access System
by Jie Yang & Jiajia Zhu & Ziyu Pan - 1-14 Design Technology and AI-Based Decision Making Model for Digital Twin Engineering
by Ekaterina V. Orlova - 1-15 Smart Classroom Teaching Strategy to Enhance Higher Order Thinking Skills (HOTS)—An Agile Approach for Education 4.0
by Sitalakshmi Venkatraman & Fahri Benli & Ye Wei & Fiona Wahr - 1-15 Use of Data Augmentation Techniques in Detection of Antisocial Behavior Using Deep Learning Methods
by Viera Maslej-Krešňáková & Martin Sarnovský & Júlia Jacková - 1-16 A Novel Machine Learning Prediction Model for Aerosol Transport in Upper 17-Generations of the Human Respiratory Tract
by Mohammad S. Islam & Shahid Husain & Jawed Mustafa & Yuantong Gu - 1-16 Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression
by Urmila Pilania & Rohit Tanwar & Mazdak Zamani & Azizah Abdul Manaf - 1-17 Translating Speech to Indian Sign Language Using Natural Language Processing
by Purushottam Sharma & Devesh Tulsian & Chaman Verma & Pratibha Sharma & Nancy Nancy - 1-17 Facial Expression Recognition Using Dual Path Feature Fusion and Stacked Attention
by Hongtao Zhu & Huahu Xu & Xiaojin Ma & Minjie Bian - 1-18 Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media
by Katerina Vgena & Angeliki Kitsiou & Christos Kalloniatis & Stefanos Gritzalis - 1-18 Intelligent Reflecting Surface-Aided Device-to-Device Communication: A Deep Reinforcement Learning Approach
by Ajmery Sultana & Xavier Fernando - 1-19 Leveraging Explainable AI to Support Cryptocurrency Investors
by Jacopo Fior & Luca Cagliero & Paolo Garza - 1-20 Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture
by Rajasekhar Chaganti & Vijayakumar Varadarajan & Venkata Subbarao Gorantla & Thippa Reddy Gadekallu & Vinayakumar Ravi - 1-22 Federated Learning and Its Role in the Privacy Preservation of IoT Devices
by Tanweer Alam & Ruchi Gupta - 1-23 Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach
by Mst. Shapna Akter & Hossain Shahriar & Reaz Chowdhury & M. R. C. Mahdy - 1-23 A Game-Theoretic Rent-Seeking Framework for Improving Multipath TCP Performance
by Shiva Raj Pokhrel & Carey Williamson - 1-31 Mathematical and Machine Learning Models for Groundwater Level Changes: A Systematic Review and Bibliographic Analysis
by Stephen Afrifa & Tao Zhang & Peter Appiahene & Vijayakumar Varadarajan
September 2022, Volume 14, Issue 9
- 1-15 Trade-offs between Risk and Operational Cost in SDN Failure Recovery Plan
by Saeed A. Astaneh & Shahram Shah Heydari & Sara Taghavi Motlagh & Alireza Izaddoost - 1-17 Low Power Blockchained E-Vote Platform for University Environment
by Faten Chaabane & Jalel Ktari & Tarek Frikha & Habib Hamam - 1-18 Retrieving Adversarial Cliques in Cognitive Communities: A New Conceptual Framework for Scientific Knowledge Graphs
by Renaud Fabre & Otmane Azeroual & Patrice Bellot & Joachim Schöpfel & Daniel Egret - 1-18 Assistance System for the Teaching of Natural Numbers to Preschool Children with the Use of Artificial Intelligence Algorithms
by William Villegas-Ch. & Angel Jaramillo-Alcázar & Aracely Mera-Navarrete - 1-18 Joint Scalable Video Coding and Transcoding Solutions for Fog-Computing-Assisted DASH Video Applications
by Majd Nafeh & Arash Bozorgchenani & Daniele Tarchi - 1-21 An Efficient Blockchain Transaction Retrieval System
by Hangwei Feng & Jinlin Wang & Yang Li - 1-27 A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment
by Antonio Francesco Gentile & Davide Macrì & Floriano De Rango & Mauro Tropea & Emilio Greco - 1-30 Approaches and Challenges in Internet of Robotic Things
by Aqsa Sayeed & Chaman Verma & Neerendra Kumar & Neha Koul & Zoltán Illés
August 2022, Volume 14, Issue 8
- 1-17 A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems
by Padmalochan Panda & Alekha Kumar Mishra & Deepak Puthal - 1-18 Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
by Ahmed Latif Yaser & Hamdy M. Mousa & Mahmoud Hussein - 1-20 A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees
by Francesco Buccafurri & Vincenzo De Angelis & Sara Lazzaro - 1-23 On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information
by Georgios Kallitsis & Vasileios Karyotis & Symeon Papavassiliou - 1-23 Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks
by Gianfranco Lombardo & Mattia Pellegrino & George Adosoglou & Stefano Cagnoni & Panos M. Pardalos & Agostino Poggi - 1-27 Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks
by Usman Ali & Giuseppe Caso & Luca De Nardis & Konstantinos Kousias & Mohammad Rajiullah & Özgü Alay & Marco Neri & Anna Brunstrom & Maria-Gabriella Di Benedetto
July 2022, Volume 14, Issue 8
- 1-11 A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
by Muhsen Alkhalidy & Atalla Fahed Al-Serhan & Ayoub Alsarhan & Bashar Igried - 1-14 Digital Qualitative and Quantitative Analysis of Arabic Textbooks
by Francesca Fallucchi & Bouchra Ghattas & Riem Spielhaus & Ernesto William De Luca - 1-15 Detection of Obfuscated Malicious JavaScript Code
by Ammar Alazab & Ansam Khraisat & Moutaz Alazab & Sarabjot Singh - 1-15 Automatic Detection of Sensitive Data Using Transformer- Based Classifiers
by Michael Petrolini & Stefano Cagnoni & Monica Mordonini - 1-16 Analysis and Visualization of New Energy Vehicle Battery Data
by Wenbo Ren & Xinran Bian & Jiayuan Gong & Anqing Chen & Ming Li & Zhuofei Xia & Jingnan Wang - 1-17 Understanding Learners’ Perception of MOOCs Based on Review Data Analysis Using Deep Learning and Sentiment Analysis
by Xieling Chen & Fu Lee Wang & Gary Cheng & Man-Kong Chow & Haoran Xie - 1-17 Research on Urban Traffic Incident Detection Based on Vehicle Cameras
by Zhuofei Xia & Jiayuan Gong & Hailong Yu & Wenbo Ren & Jingnan Wang - 1-18 Augmenting Industrial Control Rooms with Multimodal Collaborative Interaction Techniques
by Jessica Rubart & Valentin Grimm & Jonas Potthast - 1-18 CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning
by Jimmy Moedjahedy & Arief Setyanto & Fawaz Khaled Alarfaj & Mohammed Alreshoodi - 1-18 Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET
by Siti-Aisyah Zali & Shahbe Mat-Desa & Zarina Che-Embi & Wan-Noorshahida Mohd-Isa - 1-18 Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
by Despoina Chochtoula & Aristidis Ilias & Yannis C. Stamatiou & Christos Makris - 1-18 A CSI Fingerprint Method for Indoor Pseudolite Positioning Based on RT-ANN
by Yaning Li & Hongsheng Li & Baoguo Yu & Jun Li - 1-19 Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development
by Marco Ferretti & Ugo Fiore & Francesca Perla & Marcello Risitano & Salvatore Scognamiglio - 1-19 Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning
by Zhiqiang Dai & Gaochao Xu & Ziqi Liu & Jiaqi Ge & Wei Wang - 1-19 Microblog Sentiment Analysis Based on Dynamic Character-Level and Word-Level Features and Multi-Head Self-Attention Pooling
by Shangyi Yan & Jingya Wang & Zhiqiang Song - 1-20 Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
by Fazal Raheman & Tejas Bhagat & Brecht Vermeulen & Peter Van Daele - 1-21 Seeing through Wavy Water–Air Interface: A Restoration Model for Instantaneous Images Distorted by Surface Waves
by Bijian Jian & Chunbo Ma & Dejian Zhu & Yixiao Sun & Jun Ao - 1-23 Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks
by Sisay Tadesse Arzo & Zeinab Akhavan & Mona Esmaeili & Michael Devetsikiotis & Fabrizio Granelli - 1-23 Hybrid Sensing Platform for IoT-Based Precision Agriculture
by Hamid Bagha & Ali Yavari & Dimitrios Georgakopoulos - 1-26 Exploring Distributed Deep Learning Inference Using Raspberry Pi Spark Cluster
by Nicholas James & Lee-Yeng Ong & Meng-Chew Leow - 1-28 An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services
by Farhad Ahamed & Farnaz Farid & Basem Suleiman & Zohaib Jan & Luay A. Wahsheh & Seyed Shahrestani - 1-35 A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform
by Esad Kadusic & Natasa Zivic & Christoph Ruland & Narcisa Hadzajlic
July 2022, Volume 14, Issue 7
- 1-11 Zero-Inflated Patent Data Analysis Using Generating Synthetic Samples
by Daiho Uhm & Sunghae Jun