Content
September 2022, Volume 14, Issue 10
- 1-16 Modelling Analysis of a Novel Frameless Slotted-ALOHA Protocol Based on the Number of Detectable Conflicting Users
by Sa Yang & Suoping Li & Nana Yang & Ying Lin - 1-17 Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden
by Francesco Pirotti & Marco Piragnolo & Marika D’Agostini & Raffaele Cavalli - 1-18 Automated Penetration Testing Framework for Smart-Home-Based IoT Devices
by Rohit Akhilesh & Oliver Bills & Naveen Chilamkurti & Mohammad Jabed Morshed Chowdhury - 1-20 Author Identification from Literary Articles with Visual Features: A Case Study with Bangla Documents
by Ankita Dhar & Himadri Mukherjee & Shibaprasad Sen & Md Obaidullah Sk & Amitabha Biswas & Teresa Gonçalves & Kaushik Roy - 1-20 The Combined Use of UAV-Based RGB and DEM Images for the Detection and Delineation of Orange Tree Crowns with Mask R-CNN: An Approach of Labeling and Unified Framework
by Felipe Lucena & Fabio Marcelo Breunig & Hermann Kux - 1-20 ReFuse: Generating Imperviousness Maps from Multi-Spectral Sentinel-2 Satellite Imagery
by Giovanni Giacco & Stefano Marrone & Giuliano Langella & Carlo Sansone - 1-20 Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
by Anna Kurtukova & Aleksandr Romanov & Alexander Shelupanov & Anastasia Fedotova - 1-21 Modeling and Validating a News Recommender Algorithm in a Mainstream Medium-Sized News Organization: An Experimental Approach
by Paschalia (Lia) Spyridou & Constantinos Djouvas & Dimitra Milioni - 1-23 Cloud-Native Observability: The Many-Faceted Benefits of Structured and Unified Logging—A Multi-Case Study
by Nane Kratzke - 1-24 FakeNewsLab: Experimental Study on Biases and Pitfalls Preventing Us from Distinguishing True from False News
by Giancarlo Ruffo & Alfonso Semeraro - 1-27 Analysis and Correlation between a Non-Invasive Sensor Network System in the Room and the Improvement of Sleep Quality
by Eduardo Morales-Vizcarra & Carolina Del-Valle-Soto & Paolo Visconti & Fabiola Cortes-Chavez - 1-36 An Enhanced ELECTRE II Method for Multi-Attribute Ontology Ranking with Z-Numbers and Probabilistic Linguistic Term Set
by Ameeth Sooklall & Jean Vincent Fonou-Dombeu
August 2022, Volume 14, Issue 9
- 1-11 Artificial Intelligence in Adaptive and Intelligent Educational System: A Review
by Jingwen Dong & Siti Nurulain Mohd Rum & Khairul Azhar Kasmiran & Teh Noranis Mohd Aris & Raihani Mohamed - 1-12 A Fairness Index Based on Rate Variance for Downlink Non-Orthogonal Multiple Access System
by Jie Yang & Jiajia Zhu & Ziyu Pan - 1-14 Design Technology and AI-Based Decision Making Model for Digital Twin Engineering
by Ekaterina V. Orlova - 1-15 Smart Classroom Teaching Strategy to Enhance Higher Order Thinking Skills (HOTS)—An Agile Approach for Education 4.0
by Sitalakshmi Venkatraman & Fahri Benli & Ye Wei & Fiona Wahr - 1-15 Use of Data Augmentation Techniques in Detection of Antisocial Behavior Using Deep Learning Methods
by Viera Maslej-Krešňáková & Martin Sarnovský & Júlia Jacková - 1-16 A Novel Machine Learning Prediction Model for Aerosol Transport in Upper 17-Generations of the Human Respiratory Tract
by Mohammad S. Islam & Shahid Husain & Jawed Mustafa & Yuantong Gu - 1-16 Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression
by Urmila Pilania & Rohit Tanwar & Mazdak Zamani & Azizah Abdul Manaf - 1-17 Translating Speech to Indian Sign Language Using Natural Language Processing
by Purushottam Sharma & Devesh Tulsian & Chaman Verma & Pratibha Sharma & Nancy Nancy - 1-17 Facial Expression Recognition Using Dual Path Feature Fusion and Stacked Attention
by Hongtao Zhu & Huahu Xu & Xiaojin Ma & Minjie Bian - 1-18 Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media
by Katerina Vgena & Angeliki Kitsiou & Christos Kalloniatis & Stefanos Gritzalis - 1-18 Intelligent Reflecting Surface-Aided Device-to-Device Communication: A Deep Reinforcement Learning Approach
by Ajmery Sultana & Xavier Fernando - 1-19 Leveraging Explainable AI to Support Cryptocurrency Investors
by Jacopo Fior & Luca Cagliero & Paolo Garza - 1-20 Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture
by Rajasekhar Chaganti & Vijayakumar Varadarajan & Venkata Subbarao Gorantla & Thippa Reddy Gadekallu & Vinayakumar Ravi - 1-22 Federated Learning and Its Role in the Privacy Preservation of IoT Devices
by Tanweer Alam & Ruchi Gupta - 1-23 Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach
by Mst. Shapna Akter & Hossain Shahriar & Reaz Chowdhury & M. R. C. Mahdy - 1-23 A Game-Theoretic Rent-Seeking Framework for Improving Multipath TCP Performance
by Shiva Raj Pokhrel & Carey Williamson - 1-31 Mathematical and Machine Learning Models for Groundwater Level Changes: A Systematic Review and Bibliographic Analysis
by Stephen Afrifa & Tao Zhang & Peter Appiahene & Vijayakumar Varadarajan
September 2022, Volume 14, Issue 9
- 1-15 Trade-offs between Risk and Operational Cost in SDN Failure Recovery Plan
by Saeed A. Astaneh & Shahram Shah Heydari & Sara Taghavi Motlagh & Alireza Izaddoost - 1-17 Low Power Blockchained E-Vote Platform for University Environment
by Faten Chaabane & Jalel Ktari & Tarek Frikha & Habib Hamam - 1-18 Retrieving Adversarial Cliques in Cognitive Communities: A New Conceptual Framework for Scientific Knowledge Graphs
by Renaud Fabre & Otmane Azeroual & Patrice Bellot & Joachim Schöpfel & Daniel Egret - 1-18 Assistance System for the Teaching of Natural Numbers to Preschool Children with the Use of Artificial Intelligence Algorithms
by William Villegas-Ch. & Angel Jaramillo-Alcázar & Aracely Mera-Navarrete - 1-18 Joint Scalable Video Coding and Transcoding Solutions for Fog-Computing-Assisted DASH Video Applications
by Majd Nafeh & Arash Bozorgchenani & Daniele Tarchi - 1-21 An Efficient Blockchain Transaction Retrieval System
by Hangwei Feng & Jinlin Wang & Yang Li - 1-27 A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment
by Antonio Francesco Gentile & Davide Macrì & Floriano De Rango & Mauro Tropea & Emilio Greco - 1-30 Approaches and Challenges in Internet of Robotic Things
by Aqsa Sayeed & Chaman Verma & Neerendra Kumar & Neha Koul & Zoltán Illés
August 2022, Volume 14, Issue 8
- 1-17 A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems
by Padmalochan Panda & Alekha Kumar Mishra & Deepak Puthal - 1-18 Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
by Ahmed Latif Yaser & Hamdy M. Mousa & Mahmoud Hussein - 1-20 A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees
by Francesco Buccafurri & Vincenzo De Angelis & Sara Lazzaro - 1-23 On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information
by Georgios Kallitsis & Vasileios Karyotis & Symeon Papavassiliou - 1-23 Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks
by Gianfranco Lombardo & Mattia Pellegrino & George Adosoglou & Stefano Cagnoni & Panos M. Pardalos & Agostino Poggi - 1-27 Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks
by Usman Ali & Giuseppe Caso & Luca De Nardis & Konstantinos Kousias & Mohammad Rajiullah & Özgü Alay & Marco Neri & Anna Brunstrom & Maria-Gabriella Di Benedetto
July 2022, Volume 14, Issue 8
- 1-11 A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
by Muhsen Alkhalidy & Atalla Fahed Al-Serhan & Ayoub Alsarhan & Bashar Igried - 1-14 Digital Qualitative and Quantitative Analysis of Arabic Textbooks
by Francesca Fallucchi & Bouchra Ghattas & Riem Spielhaus & Ernesto William De Luca - 1-15 Detection of Obfuscated Malicious JavaScript Code
by Ammar Alazab & Ansam Khraisat & Moutaz Alazab & Sarabjot Singh - 1-15 Automatic Detection of Sensitive Data Using Transformer- Based Classifiers
by Michael Petrolini & Stefano Cagnoni & Monica Mordonini - 1-16 Analysis and Visualization of New Energy Vehicle Battery Data
by Wenbo Ren & Xinran Bian & Jiayuan Gong & Anqing Chen & Ming Li & Zhuofei Xia & Jingnan Wang - 1-17 Understanding Learners’ Perception of MOOCs Based on Review Data Analysis Using Deep Learning and Sentiment Analysis
by Xieling Chen & Fu Lee Wang & Gary Cheng & Man-Kong Chow & Haoran Xie - 1-17 Research on Urban Traffic Incident Detection Based on Vehicle Cameras
by Zhuofei Xia & Jiayuan Gong & Hailong Yu & Wenbo Ren & Jingnan Wang - 1-18 Augmenting Industrial Control Rooms with Multimodal Collaborative Interaction Techniques
by Jessica Rubart & Valentin Grimm & Jonas Potthast - 1-18 CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning
by Jimmy Moedjahedy & Arief Setyanto & Fawaz Khaled Alarfaj & Mohammed Alreshoodi - 1-18 Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET
by Siti-Aisyah Zali & Shahbe Mat-Desa & Zarina Che-Embi & Wan-Noorshahida Mohd-Isa - 1-18 Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
by Despoina Chochtoula & Aristidis Ilias & Yannis C. Stamatiou & Christos Makris - 1-18 A CSI Fingerprint Method for Indoor Pseudolite Positioning Based on RT-ANN
by Yaning Li & Hongsheng Li & Baoguo Yu & Jun Li - 1-19 Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development
by Marco Ferretti & Ugo Fiore & Francesca Perla & Marcello Risitano & Salvatore Scognamiglio - 1-19 Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning
by Zhiqiang Dai & Gaochao Xu & Ziqi Liu & Jiaqi Ge & Wei Wang - 1-19 Microblog Sentiment Analysis Based on Dynamic Character-Level and Word-Level Features and Multi-Head Self-Attention Pooling
by Shangyi Yan & Jingya Wang & Zhiqiang Song - 1-20 Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
by Fazal Raheman & Tejas Bhagat & Brecht Vermeulen & Peter Van Daele - 1-21 Seeing through Wavy Water–Air Interface: A Restoration Model for Instantaneous Images Distorted by Surface Waves
by Bijian Jian & Chunbo Ma & Dejian Zhu & Yixiao Sun & Jun Ao - 1-23 Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks
by Sisay Tadesse Arzo & Zeinab Akhavan & Mona Esmaeili & Michael Devetsikiotis & Fabrizio Granelli - 1-23 Hybrid Sensing Platform for IoT-Based Precision Agriculture
by Hamid Bagha & Ali Yavari & Dimitrios Georgakopoulos - 1-26 Exploring Distributed Deep Learning Inference Using Raspberry Pi Spark Cluster
by Nicholas James & Lee-Yeng Ong & Meng-Chew Leow - 1-28 An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services
by Farhad Ahamed & Farnaz Farid & Basem Suleiman & Zohaib Jan & Luay A. Wahsheh & Seyed Shahrestani - 1-35 A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform
by Esad Kadusic & Natasa Zivic & Christoph Ruland & Narcisa Hadzajlic
July 2022, Volume 14, Issue 7
- 1-11 Zero-Inflated Patent Data Analysis Using Generating Synthetic Samples
by Daiho Uhm & Sunghae Jun - 1-15 Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art
by Alexandros Kouretsis & Iraklis Varlamis & Laida Limniati & Minas Pergantis & Andreas Giannakoulopoulos - 1-15 N-Trans: Parallel Detection Algorithm for DGA Domain Names
by Cheng Yang & Tianliang Lu & Shangyi Yan & Jianling Zhang & Xingzhan Yu - 1-15 Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-COVID-19 Time
by Marcin Wątorek & Jarosław Kwapień & Stanisław Drożdż - 1-18 Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites
by Hengfei Cheng & Zhaobin Xu & Xiaoxu Guo & Jia Yang & Kedi Xu & Shuqin Liu & Zhonghe Jin & Xiaojun Jin - 1-21 Intuitively Searching for the Rare Colors from Digital Artwork Collections by Text Description: A Case Demonstration of Japanese Ukiyo-e Print Retrieval
by Kangying Li & Jiayun Wang & Biligsaikhan Batjargal & Akira Maeda - 1-23 Analytical Modeling and Empirical Analysis of Binary Options Strategies
by Gurdal Ertek & Aysha Al-Kaabi & Aktham Issa Maghyereh - 1-24 Blockchain for Doping Control Applications in Sports: A Conceptual Approach
by Flavio Pinto & Yogachandran Rahulamathavan & James Skinner - 1-24 Enhanced Geographic Routing with One- and Two-Hop Movement Information in Opportunistic Ad Hoc Networks
by Mohd-Yaseen Mir & Hengbing Zhu & Chih-Lin Hu - 1-26 A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks
by Thiago C. Jesus & Daniel G. Costa & Paulo Portugal & Francisco Vasques - 1-48 Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
by Yehia Ibrahim Alzoubi & Ahmad Al-Ahmad & Hasan Kahtan & Ashraf Jaradat
June 2022, Volume 14, Issue 7
- 1-10 Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding
by Ranjan Satapathy & Shweta Rajesh Pardeshi & Erik Cambria - 1-12 A Public Infrastructure for a Trusted Wireless World
by Renee Carnley & Sikha Bagui - 1-13 First Steps of Asthma Management with a Personalized Ontology Model
by Hicham Ajami & Hamid Mcheick & Catherine Laprise - 1-13 Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors
by Minwoo Park & Euichul Lee - 1-14 Designing an Interactive Communication Assistance System for Hearing-Impaired College Students Based on Gesture Recognition and Representation
by Yancong Zhu & Juan Zhang & Zhaoxi Zhang & Gina Clepper & Jingpeng Jia & Wei Liu - 1-16 Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis
by Thanassis Mpimis & Theodore T. Kapsis & Athanasios D. Panagopoulos & Vassilis Gikas - 1-16 Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices
by Khadijeh Alibabaei & Eduardo Assunção & Pedro D. Gaspar & Vasco N. G. J. Soares & João M. L. P. Caldeira - 1-17 Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization
by Abdulrahman K. Alnaim - 1-18 Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments
by Anastasia Kondratyeva & Daria Ivanova & Vyacheslav Begishev & Ekaterina Markova & Evgeni Mokrov & Yuliya Gaidamaka & Konstantin Samouylov - 1-18 A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language
by Yousif A. Alhaj & Abdelghani Dahou & Mohammed A. A. Al-qaness & Laith Abualigah & Aaqif Afzaal Abbasi & Nasser Ahmed Obad Almaweri & Mohamed Abd Elaziz & Robertas Damaševičius - 1-18 Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments
by Luís Gameiro & Carlos Senna & Miguel Luís - 1-19 Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
by Zubair Baig & Naeem Syed & Nazeeruddin Mohammad - 1-21 Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective
by Yingxun Wang & Hushairi Zen & Mohamad Faizrizwan Mohd Sabri & Xiang Wang & Lee Chin Kho - 1-21 Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction
by Aristeidis Lamprogeorgos & Minas Pergantis & Michail Panagopoulos & Andreas Giannakoulopoulos - 1-24 Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems
by Martina Pappalardo & Antonio Virdis & Enzo Mingozzi - 1-31 Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions
by Salahadin Seid Musa & Marco Zennaro & Mulugeta Libsie & Ermanno Pietrosemoli
May 2022, Volume 14, Issue 6
- 1-13 Time Series Prediction of Sea Surface Temperature Based on an Adaptive Graph Learning Neural Model
by Tingting Wang & Zhuolin Li & Xiulin Geng & Baogang Jin & Lingyu Xu - 1-14 Fraud Detection Using Neural Networks: A Case Study of Income Tax
by Belle Fille Murorunkwere & Origene Tuyishimire & Dominique Haughton & Joseph Nzabanita - 1-15 What Is Coming across the Horizon and How Can We Handle It? Bitcoin Scenarios as a Starting Point for Rigorous and Relevant Research
by Horst Treiblmaier - 1-16 An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters
by Guangwei Fan & Chuanzhen Sheng & Baoguo Yu & Lu Huang & Qiang Rong - 1-17 Analysis of Electric Vehicles with an Economic Perspective for the Future Electric Market
by Sofana Reka S & Prakash Venugopal & Ravi V & Hassan Haes Alhelou & Amer Al-Hinai & Pierluigi Siano - 1-18 Detection of Students’ Problems in Distance Education Using Topic Modeling and Machine Learning
by Huda Alhazmi - 1-19 Quantum Key Distribution in Kubernetes Clusters
by Ignazio Pedone & Antonio Lioy - 1-19 Optimization of the System of Allocation of Overdue Loans in a Sub-Saharan Africa Microfinance Institution
by Andreia Araújo & Filipe Portela & Filipe Alvelos & Saulo Ruiz - 1-20 The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers
by Samer Khamaiseh & Abdullah Al-Alaj & Mohammad Adnan & Hakam W. Alomari - 1-20 Optimal Proactive Caching for Multi-View Streaming Mobile Augmented Reality
by Zhaohui Huang & Vasilis Friderikos - 1-20 Data Anonymization: An Experimental Evaluation Using Open-Source Tools
by Joana Tomás & Deolinda Rasteiro & Jorge Bernardino - 1-28 On End-to-End Intelligent Automation of 6G Networks
by Abdallah Moubayed & Abdallah Shami & Anwer Al-Dulaimi - 1-32 Charting Past, Present, and Future Research in the Semantic Web and Interoperability
by Abderahman Rejeb & John G. Keogh & Wayne Martindale & Damion Dooley & Edward Smart & Steven Simske & Samuel Fosso Wamba & John G. Breslin & Kosala Yapa Bandara & Subhasis Thakur & Kelly Liu & Bridgette Crowley & Sowmya Desaraju & Angela Ospina & Horia Bradau
June 2022, Volume 14, Issue 6
- 1-12 IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials
by Nikos Fotiou & Vasilios A. Siris & George Xylomenos & George C. Polyzos - 1-12 Evaluation of Online Teaching Quality Based on Facial Expression Recognition
by Changbo Hou & Jiajun Ai & Yun Lin & Chenyang Guan & Jiawen Li & Wenyu Zhu - 1-13 An Indoor Smart Parking Algorithm Based on Fingerprinting
by Silvia Stranieri - 1-13 6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap
by Chiara Suraci & Sara Pizzi & Federico Montori & Marco Di Felice & Giuseppe Araniti - 1-15 Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers
by Vincenza Carchiolo & Marco Grassia & Michele Malgeri & Giuseppe Mangioni - 1-16 EBBA: An Enhanced Binary Bat Algorithm Integrated with Chaos Theory and Lévy Flight for Feature Selection
by Jinghui Feng & Haopeng Kuang & Lihua Zhang - 1-20 A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network
by Kavitha Rani Balmuri & Srinivas Konda & Wen-Cheng Lai & Parameshachari Bidare Divakarachari & Kavitha Malali Vishveshwarappa Gowda & Hemalatha Kivudujogappa Lingappa - 1-21 Toward Semi-Supervised Graphical Object Detection in Document Images
by Goutham Kallempudi & Khurram Azeem Hashmi & Alain Pagani & Marcus Liwicki & Didier Stricker & Muhammad Zeshan Afzal - 1-21 High-Frequency Direction Forecasting of the Futures Market Using a Machine-Learning-Based Method
by Shangkun Deng & Yingke Zhu & Xiaoru Huang & Shuangyang Duan & Zhe Fu - 1-22 Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia
by Nayomi Kankanamge & Tan Yigitcanlar & Ashantha Goonetilleke - 1-22 An In-Depth Review on Blockchain Simulators for IoT Environments
by Jason Zheng & Chidinma Dike & Stefan Pancari & Yi Wang & George C. Giakos & Wafa Elmannai & Bingyang Wei - 1-23 A Multi-View Framework to Detect Redundant Activity Labels for More Representative Event Logs in Process Mining
by Qifan Chen & Yang Lu & Charmaine S. Tam & Simon K. Poon - 1-23 Multilayer Backbones for Internet of Battlefield Things
by Evangelia Fragkou & Dimitrios Papakostas & Theodoros Kasidakis & Dimitrios Katsaros - 1-27 Investigating the Country of Origin and the Role of the .eu TLD in External Trade of European Union Member States
by Andreas Giannakoulopoulos & Minas Pergantis & Laida Limniati & Alexandros Kouretsis - 1-27 A BLE-Connected Piezoresistive and Inertial Chest Band for Remote Monitoring of the Respiratory Activity by an Android Application: Hardware Design and Software Optimization
by Roberto De Fazio & Massimo De Vittorio & Paolo Visconti - 1-33 Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage
by Furkan Paligu & Cihan Varol - 1-38 Overview of Blockchain Oracle Research
by Giulio Caldarelli
May 2022, Volume 14, Issue 5
- 1-2 Editorial for the Special Issue on Blockchain: Applications, Challenges, and Solutions
by Ahad ZareRavasan & Taha Mansouri & Michal Krčál & Saeed Rouhani - 1-13 Tell Me More: Automating Emojis Classification for Better Accessibility and Emotional Context Recognition
by Muhammad Atif & Valentina Franzoni - 1-14 Distributed Bandwidth Allocation Strategy for QoE Fairness of Multiple Video Streams in Bottleneck Links
by Yazhi Liu & Dongyu Wei & Chunyang Zhang & Wei Li - 1-15 Low-Complexity GSM Detection Based on Maximum Ratio Combining
by Xinhe Zhang & Wenbo Lv & Haoran Tan - 1-16 Enhancing Short-Term Sales Prediction with Microblogs: A Case Study of the Movie Box Office
by Jie Zhao & Fangwei Xiong & Peiquan Jin - 1-16 Missing Data Imputation in the Internet of Things Sensor Networks
by Benjamin Agbo & Hussain Al-Aqrabi & Richard Hill & Tariq Alsboui - 1-18 A Review of Blockchain Technology Applications in Ambient Assisted Living
by Alexandru-Ioan Florea & Ionut Anghel & Tudor Cioara - 1-19 Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
by Karam Eddine Bilami & Pascal LORENZ - 1-20 Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
by Mauro Tropea & Mattia Giovanni Spina & Floriano De Rango & Antonio Francesco Gentile - 1-20 Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks
by Roseline Oluwaseun Ogundokun & Sanjay Misra & Mychal Douglas & Robertas Damaševičius & Rytis Maskeliūnas - 1-21 Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment
by Siti Fatimah Abdul Razak & Sumendra Yogarayan & Mohd Fikri Azli Abdullah & Afizan Azman - 1-21 QoE Models for Adaptive Streaming: A Comprehensive Evaluation
by Duc Nguyen & Nam Pham Ngoc & Truong Cong Thang - 1-22 Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments
by Bert Cox & Chesney Buyle & Daan Delabie & Lieven De Strycker & Liesbet Van der Perre - 1-24 Adaptive User Profiling in E-Commerce and Administration of Public Services
by Kleanthis G. Gatziolis & Nikolaos D. Tselikas & Ioannis D. Moscholios - 1-24 A Versatile MANET Experimentation Platform and Its Evaluation through Experiments on the Performance of Routing Protocols under Diverse Conditions
by Ioannis Manolopoulos & Dimitrios Loukatos & Kimon Kontovasilis - 1-24 Quality-of-Service-Linked Privileged Content-Caching Mechanism for Named Data Networks
by Shrisha H. S. & Uma Boregowda - 1-26 MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation
by Olga Papadopoulou & Themistoklis Makedas & Lazaros Apostolidis & Francesco Poldi & Symeon Papadopoulos & Ioannis Kompatsiaris - 1-28 A Survey on Memory Subsystems for Deep Neural Network Accelerators
by Arghavan Asad & Rupinder Kaur & Farah Mohammadi - 1-32 A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems
by Sonya Leech & Jonathan Dunne & David Malone
April 2022, Volume 14, Issue 5
- 1-13 Enriching Artificial Intelligence Explanations with Knowledge Fragments
by Jože Rožanec & Elena Trajkova & Inna Novalija & Patrik Zajec & Klemen Kenda & Blaž Fortuna & Dunja Mladenić - 1-14 Bringing Digital Innovation Strategies and Entrepreneurship: The Business Model Canvas in Open Data Ecosystem and Startups
by Maria Kamariotou & Fotis Kitsios - 1-16 On the Use of the Multi-Agent Environment for Mobility Applications
by Mahdi Zargayouna - 1-16 A Bidirectional Trust Model for Service Delegation in Social Internet of Things
by Lijun Wei & Yuhan Yang & Jing Wu & Chengnian Long & Yi-Bing Lin - 1-16 Co-Simulation of Multiple Vehicle Routing Problem Models
by Sana Sahar Guia & Abdelkader Laouid & Mohammad Hammoudeh & Ahcène Bounceur & Mai Alfawair & Amna Eleyan - 1-17 Channel Characterization and SC-FDM Modulation for PLC in High-Voltage Power Lines
by Jose Alberto Del Puerto-Flores & José Luis Naredo & Fernando Peña-Campos & Carolina Del-Valle-Soto & Leonardo J. Valdivia & Ramón Parra-Michel - 1-18 A Fairness-Aware Peer-to-Peer Decentralized Learning Framework with Heterogeneous Devices
by Zheyi Chen & Weixian Liao & Pu Tian & Qianlong Wang & Wei Yu - 1-19 Fast Library Recommendation in Software Dependency Graphs with Symmetric Partially Absorbing Random Walks
by Emmanouil Krasanakis & Andreas Symeonidis - 1-19 Blockchain Technology Applied in IoV Demand Response Management: A Systematic Literature Review
by Evgenia Kapassa & Marinos Themistocleous - 1-20 Deterring Deepfake Attacks with an Electrical Network Frequency Fingerprints Approach
by Deeraj Nagothu & Ronghua Xu & Yu Chen & Erik Blasch & Alexander Aved - 1-20 ReSQoV: A Scalable Resource Allocation Model for QoS-Satisfied Cloud Services
by Hassan Mahmood Khan & Fang-Fang Chua & Timothy Tzen Vun Yap - 1-20 A System Proposal for Information Management in Building Sector Based on BIM, SSI, IoT and Blockchain
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-21 The Whole Is Greater than the Sum of the Parts: A Multilayer Approach on Criminal Networks
by Annamaria Ficara & Giacomo Fiumara & Salvatore Catanese & Pasquale De Meo & Xiaoyang Liu - 1-22 Virtual Power Plant Optimization in Smart Grids: A Narrative Review
by Bianca Goia & Tudor Cioara & Ionut Anghel - 1-24 An ICN-Based IPFS High-Availability Architecture
by Ruibin Zeng & Jiali You & Yang Li & Rui Han - 1-24 Building Semantic Knowledge Graphs from (Semi-)Structured Data: A Review
by Vetle Ryen & Ahmet Soylu & Dumitru Roman - 1-26 Clinical Trial Classification of SNS24 Calls with Neural Networks
by Hua Yang & Teresa Gonçalves & Paulo Quaresma & Renata Vieira & Rute Veladas & Cátia Sousa Pinto & João Oliveira & Maria Cortes Ferreira & Jéssica Morais & Ana Raquel Pereira & Nuno Fernandes & Carolina Gonçalves - 1-27 A Review of Digital Era Governance Research in the First Two Decades: A Bibliometric Study
by Dejan Ravšelj & Lan Umek & Ljupčo Todorovski & Aleksander Aristovnik - 1-28 Measuring Ethical Values with AI for Better Teamwork
by Erkin Altuntas & Peter A. Gloor & Pascal Budner
April 2022, Volume 14, Issue 4
- 1-11 A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid
by Zhihao Wang & Ru Huo & Shuo Wang - 1-14 Creating Honeypots to Prevent Online Child Exploitation
by Joel Scanlan & Paul A. Watters & Jeremy Prichard & Charlotte Hunn & Caroline Spiranovic & Richard Wortley - 1-19 Interoperable Data Analytics Reference Architectures Empowering Digital-Twin-Aided Manufacturing
by Attila Csaba Marosi & Márk Emodi & Ákos Hajnal & Róbert Lovas & Tamás Kiss & Valerie Poser & Jibinraj Antony & Simon Bergweiler & Hamed Hamzeh & James Deslauriers & József Kovács - 1-19 Ransomware-Resilient Self-Healing XML Documents
by Mahmoud Al-Dwairi & Ahmed S. Shatnawi & Osama Al-Khaleel & Basheer Al-Duwairi - 1-20 Multi-Layer Feature Fusion-Based Community Evolution Prediction
by Zhao Wang & Qingguo Xu & Weimin Li - 1-22 HealthFetch: An Influence-Based, Context-Aware Prefetch Scheme in Citizen-Centered Health Storage Clouds
by Chrysostomos Symvoulidis & George Marinos & Athanasios Kiourtis & Argyro Mavrogiorgou & Dimosthenis Kyriazis - 1-28 ML-Based 5G Network Slicing Security: A Comprehensive Survey
by Ramraj Dangi & Akshay Jadhav & Gaurav Choudhary & Nicola Dragoni & Manas Kumar Mishra & Praveen Lalwani - 1-32 Future Wireless Networking Experiments Escaping Simulations
by Sachin Sharma & Saish Urumkar & Gianluca Fontanesi & Byrav Ramamurthy & Avishek Nag - 1-35 From 5G to 6G—Challenges, Technologies, and Applications
by Ahmed I. Salameh & Mohamed El Tarhuni - 1-46 Deep Learning for Vulnerability and Attack Detection on Web Applications: A Systematic Literature Review
by Rokia Lamrani Alaoui & El Habib Nfaoui
March 2022, Volume 14, Issue 4
- 1-3 Special Issue “Natural Language Engineering: Methods, Tasks and Applications”
by Massimo Esposito & Giovanni Luca Masala & Aniello Minutolo & Marco Pota - 1-14 Decorrelation-Based Deep Learning for Bias Mitigation
by Pranita Patil & Kevin Purcell - 1-15 A Dynamic Cache Allocation Mechanism (DCAM) for Reliable Multicast in Information-Centric Networking
by Yingjie Duan & Hong Ni & Xiaoyong Zhu - 1-16 Predicting Dog Emotions Based on Posture Analysis Using DeepLabCut
by Kim Ferres & Timo Schloesser & Peter A. Gloor - 1-16 Deep Regression Neural Networks for Proportion Judgment
by Mario Milicevic & Vedran Batos & Adriana Lipovac & Zeljka Car - 1-16 Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network
by Subhra Sankha Sarma & Ranjay Hazra & Peter Han Joo Chong - 1-16 Evaluation of Contextual and Game-Based Training for Phishing Detection
by Joakim Kävrestad & Allex Hagberg & Marcus Nohlberg & Jana Rambusch & Robert Roos & Steven Furnell - 1-17 Using Satellite Imagery to Improve Local Pollution Models for High-Voltage Transmission Lines and Insulators
by Peter Krammer & Marcel Kvassay & Ján Mojžiš & Martin Kenyeres & Miloš Očkay & Ladislav Hluchý & Ľuboš Pavlov & Ľuboš Skurčák - 1-17 Detecting IoT Attacks Using an Ensemble Machine Learning Model
by Vikas Tomer & Sachin Sharma - 1-17 Cross-Domain Transfer Learning Prediction of COVID-19 Popular Topics Based on Knowledge Graph
by Xiaolin Chen & Qixing Qu & Chengxi Wei & Shudong Chen - 1-18 Adaptative Perturbation Patterns: Realistic Adversarial Learning for Robust Intrusion Detection
by João Vitorino & Nuno Oliveira & Isabel Praça - 1-22 Location Transparency Call (LTC) System: An Intelligent Phone Dialing System Based on the Phone of Things (PoT) Architecture
by Haytham Khalil & Khalid Elgazzar - 1-24 Bitcoin as a Safe Haven during COVID-19 Disease
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-25 TalkRoBots: A Middleware for Robotic Systems in Industry 4.0
by Marwane Ayaida & Nadhir Messai & Frederic Valentin & Dimitri Marcheras - 1-28 A Multi-Service Adaptive Semi-Persistent LTE Uplink Scheduler for Low Power M2M Devices
by Nusrat Afrin & Jason Brown & Jamil Y. Khan
March 2022, Volume 14, Issue 3
- 1-14 Neural Network-Based Price Tag Data Analysis
by Pavel Laptev & Sergey Litovkin & Sergey Davydenko & Anton Konev & Evgeny Kostyuchenko & Alexander Shelupanov - 1-14 CPU-GPU-Memory DVFS for Power-Efficient MPSoC in Mobile Cyber Physical Systems
by Somdip Dey & Samuel Isuwa & Suman Saha & Amit Kumar Singh & Klaus McDonald-Maier - 1-15 Weighted-CAPIC Caching Algorithm for Priority Traffic in Named Data Network
by Leanna Vidya Yovita & Nana Rachmana Syambas & Ian Joseph Matheus Edward - 1-16 Time Series Surface Temperature Prediction Based on Cyclic Evolutionary Network Model for Complex Sea Area
by Jiahao Shi & Jie Yu & Jinkun Yang & Lingyu Xu & Huan Xu - 1-17 Deep Anomaly Detection Based on Variational Deviation Network
by Junwen Lu & Jinhui Wang & Xiaojun Wei & Keshou Wu & Guanfeng Liu - 1-17 Unsupervised Anomaly Detection and Segmentation on Dirty Datasets
by Jiahao Guo & Xiaohuo Yu & Lu Wang - 1-18 Addressing Syntax-Based Semantic Complementation: Incorporating Entity and Soft Dependency Constraints into Metonymy Resolution
by Siyuan Du & Hao Wang - 1-19 Survey on Videos Data Augmentation for Deep Learning Models
by Nino Cauli & Diego Reforgiato Recupero - 1-19 A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation
by Tianyuan Zhang & Sérgio Moro & Ricardo F. Ramos - 1-20 A Density-Based Random Forest for Imbalanced Data Classification
by Jia Dong & Quan Qian - 1-20 The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase
by Chia-Ping Tsai & Che-Wei Chang & Hung-Chang Hsiao & Haiying Shen - 1-21 Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
by Emtethal K. Alamri & Abdullah M. Alnajim & Suliman A. Alsuhibany - 1-22 Bot-Based Emergency Software Applications for Natural Disaster Situations
by Gabriel Ovando-Leon & Luis Veas-Castillo & Veronica Gil-Costa & Mauricio Marin