Content
March 2022, Volume 14, Issue 3
- 1-19 Survey on Videos Data Augmentation for Deep Learning Models
by Nino Cauli & Diego Reforgiato Recupero - 1-19 A Data-Driven Approach to Improve Customer Churn Prediction Based on Telecom Customer Segmentation
by Tianyuan Zhang & Sérgio Moro & Ricardo F. Ramos - 1-20 A Density-Based Random Forest for Imbalanced Data Classification
by Jia Dong & Quan Qian - 1-20 The Time Machine in Columnar NoSQL Databases: The Case of Apache HBase
by Chia-Ping Tsai & Che-Wei Chang & Hung-Chang Hsiao & Haiying Shen - 1-21 Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
by Emtethal K. Alamri & Abdullah M. Alnajim & Suliman A. Alsuhibany - 1-22 Bot-Based Emergency Software Applications for Natural Disaster Situations
by Gabriel Ovando-Leon & Luis Veas-Castillo & Veronica Gil-Costa & Mauricio Marin - 1-23 High-Performance Computing and ABMS for High-Resolution COVID-19 Spreading Simulation
by Mattia Pellegrino & Gianfranco Lombardo & Stefano Cagnoni & Agostino Poggi - 1-24 Solar Radiation Forecasting by Pearson Correlation Using LSTM Neural Network and ANFIS Method: Application in the West-Central Jordan
by Hossam Fraihat & Amneh A. Almbaideen & Abdullah Al-Odienat & Bassam Al-Naami & Roberto De Fazio & Paolo Visconti - 1-27 A Survey on Intrusion Detection Systems for Fog and Cloud Computing
by Victor Chang & Lewis Golightly & Paolo Modesti & Qianwen Ariel Xu & Le Minh Thao Doan & Karl Hall & Sreeja Boddu & Anna Kobusińska - 1-30 Self-Organizing Networks for 5G and Beyond: A View from the Top
by Andreas G. Papidas & George C. Polyzos - 1-42 Handover Management in 5G Vehicular Networks
by Ioannis Kosmopoulos & Emmanouil Skondras & Angelos Michalas & Emmanouel T. Michailidis & Dimitrios D. Vergados
February 2022, Volume 14, Issue 3
- 1-14 Forecasting Students Dropout: A UTAD University Study
by Diogo E. Moreira da Silva & Eduardo J. Solteiro Pires & Arsénio Reis & Paulo B. de Moura Oliveira & João Barroso - 1-17 A Vote-Based Architecture to Generate Classified Datasets and Improve Performance of Intrusion Detection Systems Based on Supervised Learning
by Diogo Teixeira & Silvestre Malta & Pedro Pinto - 1-17 A Prototype Web Application to Support Human-Centered Audiovisual Content Authentication and Crowdsourcing
by Nikolaos Vryzas & Anastasia Katsaounidou & Lazaros Vrysis & Rigas Kotsakis & Charalampos Dimoulas - 1-17 Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function
by Yurika Pant Khanal & Abeer Alsadoon & Khurram Shahzad & Ahmad B. Al-Khalil & Penatiyana W. C. Prasad & Sabih Ur Rehman & Rafiqul Islam - 1-18 Business Models for the Internet of Services: State of the Art and Research Agenda
by Jacqueline Zonichenn Reis & Rodrigo Franco Gonçalves & Marcia Terra da Silva & Nikolai Kazantsev - 1-19 A Survey on the Use of Graph Convolutional Networks for Combating Fake News
by Iraklis Varlamis & Dimitrios Michail & Foteini Glykou & Panagiotis Tsantilas - 1-22 Adjacency-Information-Entropy-Based Cooperative Name Resolution Approach in ICN
by Jiaqi Li & Jiali You & Haojiang Deng - 1-22 Design of Relay Switching to Combat an Eavesdropper in IoT-NOMA Wireless Networks
by Thanh-Nam Tran & Van-Cuu Ho & Thoai Phu Vo & Khanh Ngo Nhu Tran & Miroslav Voznak - 1-25 Transformer-Based Abstractive Summarization for Reddit and Twitter: Single Posts vs. Comment Pools in Three Languages
by Ivan S. Blekanov & Nikita Tarasov & Svetlana S. Bodrunova - 1-28 Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions
by Mohd Hirzi Adnan & Zuriati Ahmad Zukarnain & Nur Ziadah Harun - 1-29 Graphol : A Graphical Language for Ontology Modeling Equivalent to OWL 2
by Domenico Lembo & Valerio Santarelli & Domenico Fabio Savo & Giuseppe De Giacomo
January 2022, Volume 14, Issue 2
- 1-13 A Hybrid Robust-Learning Architecture for Medical Image Segmentation with Noisy Labels
by Jialin Shi & Chenyi Guo & Ji Wu - 1-14 Controlling the Trade-Off between Resource Efficiency and User Satisfaction in NDNs Based on Naïve Bayes Data Classification and Lagrange Method
by Abdelkader Tayeb Herouala & Chaker Abdelaziz Kerrache & Benameur Ziani & Carlos T. Calafate & Nasreddine Lagraa & Abdou el Karim Tahari - 1-16 Modelling and Analysis of Performance Characteristics in a 60 Ghz 802.11ad Wireless Mesh Backhaul Network for an Urban 5G Deployment
by Michael Mackay & Alessandro Raschella & Ogeen Toma - 1-16 Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks
by Saleh M. Altowaijri - 1-16 The Framework of Cross-Domain and Model Adversarial Attack against Deepfake
by Haoxuan Qiu & Yanhui Du & Tianliang Lu - 1-17 Graph Representation-Based Deep Multi-View Semantic Similarity Learning Model for Recommendation
by Jiagang Song & Jiayu Song & Xinpan Yuan & Xiao He & Xinghui Zhu - 1-17 Topology Inference and Link Parameter Estimation Based on End-to-End Measurements
by Grigorios Kakkavas & Vasileios Karyotis & Symeon Papavassiliou - 1-18 An Active Path-Associated Cache Scheme for Mobile Scenes
by Tianchi Zhou & Peng Sun & Rui Han - 1-18 A Single-Rate Multicast Congestion Control (SRMCC) Mechanism in Information-Centric Networking
by Yingjie Duan & Hong Ni & Xiaoyong Zhu & Xu Wang - 1-19 Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT
by Youpeng Tu & Haiming Chen & Linjie Yan & Xinyan Zhou - 1-19 Coarse-to-Fine Entity Alignment for Chinese Heterogeneous Encyclopedia Knowledge Base
by Meng Wu & Tingting Jiang & Chenyang Bu & Bin Zhu - 1-19 An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces
by Cunwei Yang & Weiqing Wang & Fengying Li & Degang Yang - 1-21 Evaluation of a Reputation Management Technique for Autonomous Vehicles
by Darius Kianersi & Suraj Uppalapati & Anirudh Bansal & Jeremy Straub - 1-22 Selecting Workers Wisely for Crowdsourcing When Copiers and Domain Experts Co-exist
by Xiu Fang & Suxin Si & Guohao Sun & Quan Z. Sheng & Wenjun Wu & Kang Wang & Hang Lv - 1-23 DA-GAN: Dual Attention Generative Adversarial Network for Cross-Modal Retrieval
by Liewu Cai & Lei Zhu & Hongyan Zhang & Xinghui Zhu - 1-24 Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms
by Huanliang Xiong & Muxi Chen & Canghai Wu & Yingding Zhao & Wenlong Yi - 1-28 Estimation on the Importance of Semantic Web Integration for Art and Culture Related Online Media Outlets
by Andreas Giannakoulopoulos & Minas Pergantis & Nikos Konstantinou & Alexandros Kouretsis & Aristeidis Lamprogeorgos & Iraklis Varlamis - 1-29 Multi-Attribute Decision Making for Energy-Efficient Public Transport Network Selection in Smart Cities
by Rashmi Munjal & William Liu & Xuejun Li & Jairo Gutierrez & Peter Han Joo Chong - 1-35 Intelligent Traffic Management in Next-Generation Networks
by Ons Aouedi & Kandaraj Piamrat & Benoît Parrein - 1-50 Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications
by Kenneth Li Minn Ang & Jasmine Kah Phooi Seng & Ericmoore Ngharamike
February 2022, Volume 14, Issue 2
- 1-6 Acknowledgment to Reviewers of Future Internet in 2021
by Future Internet Editorial Office - 1-14 Improved Eagle Strategy Algorithm for Dynamic Web Service Composition in the IoT: A Conceptual Approach
by Venushini Rajendran & R Kanesaraj Ramasamy & Wan-Noorshahida Mohd-Isa - 1-14 Exploring the Benefits of Combining DevOps and Agile
by Fernando Almeida & Jorge Simões & Sérgio Lopes - 1-15 Safety Verification of Driving Resource Occupancy Rules Based on Functional Language
by Zhixi Hu & Yi Zhu & Xiaoying Chen & Yu Zhao - 1-16 JoSDW: Combating Noisy Labels by Dynamic Weight
by Yaojie Zhang & Huahu Xu & Junsheng Xiao & Minjie Bian - 1-16 Personalizing Environmental Awareness through Smartphones Using AHP and PROMETHEE II
by Akrivi Krouska & Katerina Kabassi & Christos Troussas & Cleo Sgouropoulou - 1-17 Indoor Localization System Using Fingerprinting and Novelty Detection for Evaluation of Confidence
by Helmer Augusto de Souza Mourão & Horácio Antonio Braga Fernandes de Oliveira - 1-18 CNN for User Activity Detection Using Encrypted In-App Mobile Data
by Madushi H. Pathmaperuma & Yogachandran Rahulamathavan & Safak Dogan & Ahmet Kondoz - 1-20 A Performance Comparison of Different Cloud-Based Natural Language Understanding Services for an Italian e-Learning Platform
by Matteo Zubani & Luca Sigalini & Ivan Serina & Luca Putelli & Alfonso E. Gerevini & Mattia Chiari - 1-21 IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning
by Dania Marabissi & Lorenzo Mucchi & Andrea Stomaci - 1-22 Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service
by Ning Chen & Yu Chen - 1-22 Open-Source MQTT-Based End-to-End IoT System for Smart City Scenarios
by Cristian D’Ortona & Daniele Tarchi & Carla Raffaelli - 1-23 Flow-Based Programming for Machine Learning
by Tanmaya Mahapatra & Syeeda Nilofer Banoo - 1-25 A Strategy-Based Formal Approach for Fog Systems Analysis
by Souad Marir & Faiza Belala & Nabil Hameurlain - 1-25 Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions
by Cheng Qian & Xing Liu & Colin Ripley & Mian Qian & Fan Liang & Wei Yu - 1-26 Flow Scheduling in Data Center Networks with Time and Energy Constraints: A Software-Defined Network Approach
by Martin Fraga & Matías Micheletto & Andrés Llinás & Rodrigo Santos & Paula Zabala - 1-32 Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm
by Khumbelo Muthavhine & Mbuyu Sumbwanyambe - 1-39 Network Function Virtualization and Service Function Chaining Frameworks: A Comprehensive Review of Requirements, Objectives, Implementations, and Open Research Challenges
by Haruna Umar Adoga & Dimitrios P. Pezaros
January 2022, Volume 14, Issue 1
- 1-10 Global Contextual Dependency Network for Object Detection
by Junda Li & Chunxu Zhang & Bo Yang - 1-12 CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
by Hui Yan & Chaoyuan Cui - 1-14 SMYOLO: Lightweight Pedestrian Target Detection Algorithm in Low-Altitude Scenarios
by Weiwei Zhang & Xin Ma & Yuzhao Zhang & Ming Ji & Chenghui Zhen - 1-18 A Queueing-Based Model Performance Evaluation for Internet of People Supported by Fog Computing
by Laécio Rodrigues & Joel J. P. C. Rodrigues & Antonio de Barros Serra & Francisco Airton Silva - 1-19 Utilizing Half Convolutional Autoencoder to Generate User and Item Vectors for Initialization in Matrix Factorization
by Tan Nghia Duong & Nguyen Nam Doan & Truong Giang Do & Manh Hoang Tran & Duc Minh Nguyen & Quang Hieu Dang - 1-19 A Semantic Preprocessing Framework for Breaking News Detection to Support Future Drone Journalism Services
by Michail Niarchos & Marina Eirini Stamatiadou & Charalampos Dimoulas & Andreas Veglis & Andreas Symeonidis - 1-20 Enhancing Reactive Ad Hoc Routing Protocols with Trust
by Yelena Trofimova & Pavel Tvrdík - 1-21 Mobility in Unsupervised Word Embeddings for Knowledge Extraction—The Scholars’ Trajectories across Research Topics
by Gianfranco Lombardo & Michele Tomaiuolo & Monica Mordonini & Gaia Codeluppi & Agostino Poggi - 1-22 S4 Features and Artificial Intelligence for Designing a Robot against COVID-19—Robocov
by Pedro Ponce & Omar Mata & Esteban Perez & Juan Roberto Lopez & Arturo Molina & Troy McDaniel - 1-22 Experimentation Environments for Data Center Routing Protocols: A Comprehensive Review
by Leonardo Alberro & Alberto Castro & Eduardo Grampin
December 2021, Volume 14, Issue 1
- 1-9 The Important Role of Global State for Multi-Agent Reinforcement Learning
by Shuailong Li & Wei Zhang & Yuquan Leng & Xiaohui Wang - 1-12 Real-Time Nanoscopic Rider Safety System for Smart and Green Mobility Based upon Varied Infrastructure Parameters
by Faheem Ahmed Malik & Laurent Dala & Krishna Busawon - 1-12 Improved Classification of Blockchain Transactions Using Feature Engineering and Ensemble Learning
by Chandrashekar Jatoth & Rishabh Jain & Ugo Fiore & Subrahmanyam Chatharasupalli - 1-14 Key Points’ Location in Infrared Images of the Human Body Based on Mscf-ResNet
by Shengguo Ge & Siti Nurulain Mohd Rum - 1-15 Dis-Cover AI Minds to Preserve Human Knowledge
by Leonardo Ranaldi & Francesca Fallucchi & Fabio Massimo Zanzotto - 1-17 An Automated Behaviour-Based Clustering of IoT Botnets
by Tolijan Trajanovski & Ning Zhang - 1-17 The Impact of a Number of Samples on Unsupervised Feature Extraction, Based on Deep Learning for Detection Defects in Printed Circuit Boards
by Ihar Volkau & Abdul Mujeeb & Wenting Dai & Marius Erdt & Alexei Sourin - 1-18 Machine Learning-Based Lie Detector Applied to a Novel Annotated Game Dataset
by Nuria Rodriguez-Diaz & Decky Aspandi & Federico M. Sukno & Xavier Binefa - 1-18 Your Face Mirrors Your Deepest Beliefs—Predicting Personality and Morals through Facial Emotion Recognition
by Peter A. Gloor & Andrea Fronzetti Colladon & Erkin Altuntas & Cengiz Cetinkaya & Maximilian F. Kaiser & Lukas Ripperger & Tim Schaefer - 1-19 No Perfect Outdoors: Towards a Deep Profiling of GNSS-Based Location Contexts
by Jin Wang & Jun Luo - 1-19 DD-FoG: Intelligent Distributed Dynamic FoG Computing Framework
by Volkov Artem & Kovalenko Vadim & Ibrahim A. Elgendy & Ammar Muthanna & Andrey Koucheryavy - 1-19 An In-Network Cooperative Storage Schema Based on Neighbor Offloading in a Programmable Data Plane
by Shoujiang Dang & Rui Han - 1-21 Application of Machine Learning Techniques to Predict a Patient’s No-Show in the Healthcare Sector
by Luiz Henrique A. Salazar & Valderi R. Q. Leithardt & Wemerson Delcio Parreira & Anita M. da Rocha Fernandes & Jorge Luis Victória Barbosa & Sérgio Duarte Correia - 1-24 Authorship Attribution of Social Media and Literary Russian-Language Texts Using Machine Learning Methods and Feature Selection
by Anastasia Fedotova & Aleksandr Romanov & Anna Kurtukova & Alexander Shelupanov - 1-27 Security and Privacy in Cloud Computing: Technical Review
by Yunusa Simpa Abdulsalam & Mustapha Hedabou - 1-29 Three Layered Architecture for Driver Behavior Analysis and Personalized Assistance with Alert Message Dissemination in 5G Envisioned Fog-IoCV
by Mazen Alowish & Yoshiaki Shiraishi & Masami Mohri & Masakatu Morii - 1-31 Query Processing in Blockchain Systems: Current State and Future Challenges
by Dennis Przytarski & Christoph Stach & Clémentine Gritti & Bernhard Mitschang - 1-34 The Car-Following Model and Its Applications in the V2X Environment: A Historical Review
by Junyan Han & Huili Shi & Longfei Chen & Hao Li & Xiaoyuan Wang - 1-44 A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues
by Zineddine Kouahla & Ala-Eddine Benrazek & Mohamed Amine Ferrag & Brahim Farou & Hamid Seridi & Muhammet Kurulay & Adeel Anjum & Alia Asheralieva
November 2021, Volume 13, Issue 12
- 1-14 Time Optimization of Unmanned Aerial Vehicles Using an Augmented Path
by Abdul Quadir Md & Divyank Agrawal & Monark Mehta & Arun Kumar Sivaraman & Kong Fah Tee - 1-16 Adaptive Multi-Grained Buffer Management for Database Systems
by Xiaoliang Wang & Peiquan Jin - 1-16 An Advanced Deep Learning Approach for Multi-Object Counting in Urban Vehicular Environments
by Ahmed Dirir & Henry Ignatious & Hesham Elsayed & Manzoor Khan & Mohammed Adib & Anas Mahmoud & Moatasem Al-Gunaid - 1-18 Improving the Robustness of Model Compression by On-Manifold Adversarial Training
by Junhyung Kwon & Sangkyun Lee - 1-18 DNS Firewall Based on Machine Learning
by Claudio Marques & Silvestre Malta & João Magalhães - 1-19 Blockchain and Self Sovereign Identity to Support Quality in the Food Supply Chain
by Luisanna Cocco & Roberto Tonelli & Michele Marchesi - 1-19 Machine Learning Algorithm for Delay Prediction in IoT and Tactile Internet
by Ali R. Abdellah & Omar Abdulkareem Mahmood & Ruslan Kirichek & Alexander Paramonov & Andrey Koucheryavy - 1-19 Context-Induced Activity Monitoring for On-Demand Things-of-Interest Recommendation in an Ambient Intelligent Environment
by May Altulyan & Lina Yao & Chaoran Huang & Xianzhi Wang & Salil S. Kanhere - 1-19 An Efficient Deep Convolutional Neural Network Approach for Object Detection and Recognition Using a Multi-Scale Anchor Box in Real-Time
by Vijayakumar Varadarajan & Dweepna Garg & Ketan Kotecha - 1-19 SASLedger: A Secured, Accelerated Scalable Storage Solution for Distributed Ledger Systems
by Haoli Sun & Bingfeng Pi & Jun Sun & Takeshi Miyamae & Masanobu Morinaga - 1-22 Ontologies in Cloud Computing—Review and Future Directions
by JohnBosco Agbaegbu & Oluwasefunmi Tale Arogundade & Sanjay Misra & Robertas Damaševičius - 1-31 A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
by Guma Ali & Mussa Ally Dida & Anael Elikana Sam
December 2021, Volume 13, Issue 12
- 1-12 Phubber’s Emotional Activations: The Association between PANAS and Phubbing Behavior
by Andrea Guazzini & Tommaso Raimondi & Benedetta Biagini & Franco Bagnoli & Mirko Duradoni - 1-12 An Experimental Performance Evaluation of Cloud-API-Based Applications
by Yara Abuzrieq & Amro Al-Said Ahmad & Maram Bani Younes - 1-15 The Machine-to-Everything (M2X) Economy: Business Enactments, Collaborations, and e-Governance
by Benjamin Leiding & Priyanka Sharma & Alexander Norta - 1-15 Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network
by Dmitry Baranov & Alexandr Terekhin & Dmitry Bragin & Anton Konev - 1-16 Proposal and Investigation of a Convolutional and LSTM Neural Network for the Cost-Aware Resource Prediction in Softwarized Networks
by Vincenzo Eramo & Francesco Valente & Tiziana Catena & Francesco Giacinto Lavacca - 1-16 Fog-Based CDN Framework for Minimizing Latency of Web Services Using Fog-Based HTTP Browser
by Ahmed H. Ibrahim & Zaki T. Fayed & Hossam M. Faheem - 1-19 Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle
by Pranav Gangwani & Alexander Perez-Pons & Tushar Bhardwaj & Himanshu Upadhyay & Santosh Joshi & Leonel Lagos - 1-21 Reconstruction of a 3D Human Foot Shape Model Based on a Video Stream Using Photogrammetry and Deep Neural Networks
by Lev Shilov & Semen Shanshin & Aleksandr Romanov & Anastasia Fedotova & Anna Kurtukova & Evgeny Kostyuchenko & Ivan Sidorov - 1-22 Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark
by Rasheed Ahmad & Izzat Alsmadi & Wasim Alhamdani & Lo’ai Tawalbeh - 1-24 FlockAI: A Testing Suite for ML-Driven Drone Applications
by Demetris Trihinas & Michalis Agathocleous & Karlen Avogian & Ioannis Katakis - 1-32 Blockchain Application in Internet of Vehicles: Challenges, Contributions and Current Limitations
by Evgenia Kapassa & Marinos Themistocleous & Klitos Christodoulou & Elias Iosif
October 2021, Volume 13, Issue 11
- 1-11 Security Challenges for Light Emitting Systems
by Louiza Hamada & Pascal Lorenz & Marc Gilg - 1-14 COVIDNet: Implementing Parallel Architecture on Sound and Image for High Efficacy
by Manickam Murugappan & John Victor Joshua Thomas & Ugo Fiore & Yesudas Bevish Jinila & Subhashini Radhakrishnan - 1-14 Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications
by Andrii Shalaginov & Muhammad Ajmal Azad - 1-15 Representing and Validating Cultural Heritage Knowledge Graphs in CIDOC-CRM Ontology
by Ghazal Faraj & András Micsik - 1-18 Rumor Detection Based on Attention CNN and Time Series of Context Information
by Yun Peng & Jianmei Wang - 1-18 Introducing Various Semantic Models for Amharic: Experimentation and Evaluation with Multiple Tasks and Datasets
by Seid Muhie Yimam & Abinew Ali Ayele & Gopalakrishnan Venkatesh & Ibrahim Gashaw & Chris Biemann - 1-18 Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption
by Siti Dhalila Mohd Satar & Masnida Hussin & Zurina Mohd Hanapi & Mohamad Afendee Mohamed - 1-20 A Multidimensional Analysis of Released COVID-19 Location-Based Mobile Applications
by Theodoros Oikonomidis & Konstantinos Fouskas & Maro Vlachopoulou - 1-20 Analytics on Anonymity for Privacy Retention in Smart Health Data
by Sevgi Arca & Rattikorn Hewett - 1-20 Configurable Hardware Core for IoT Object Detection
by Pedro R. Miranda & Daniel Pestana & João D. Lopes & Rui Policarpo Duarte & Mário P. Véstias & Horácio C. Neto & José T. de Sousa - 1-21 Software Design and Experimental Evaluation of a Reduced AES for IoT Applications
by Malik Qasaimeh & Raad S. Al-Qassas & Mohammad Ababneh - 1-24 Dynamic Allocation of SDN Controllers in NFV-Based MEC for the Internet of Vehicles
by Rhodney Simões & Kelvin Dias & Ricardo Martins - 1-28 Online Service Function Chain Deployment for Live-Streaming in Virtualized Content Delivery Networks: A Deep Reinforcement Learning Approach
by Jesús Fernando Cevallos Moreno & Rebecca Sattler & Raúl P. Caulier Cisterna & Lorenzo Ricciardi Celsi & Aminael Sánchez Rodríguez & Massimo Mecella - 1-39 University Community Members’ Perceptions of Labels for Online Media
by Ryan Suttle & Scott Hogan & Rachel Aumaugher & Matthew Spradling & Zak Merrigan & Jeremy Straub - 1-45 HyDSMaaS: A Hybrid Communication Infrastructure with LoRaWAN and LoraMesh for the Demand Side Management as a Service
by Artur Felipe da Silva Veloso & José Valdemir Reis Júnior & Ricardo de Andrade Lira Rabelo & Jocines Dela-flora Silveira
November 2021, Volume 13, Issue 11
- 1-11 Community Formation as a Byproduct of a Recommendation System: A Simulation Model for Bubble Formation in Social Media
by Franco Bagnoli & Guido de Bonfioli Cavalcabo’ & Banedetto Casu & Andrea Guazzini - 1-12 Person Re-Identification by Low-Dimensional Features and Metric Learning
by Xingyuan Chen & Huahu Xu & Yang Li & Minjie Bian - 1-13 Detection of Induced Activity in Social Networks: Model and Methodology
by Dmitrii Gavra & Ksenia Namyatova & Lidia Vitkova - 1-14 Deepfake-Image Anti-Forensics with Adversarial Examples Attacks
by Li Fan & Wei Li & Xiaohui Cui - 1-14 Face Swapping Consistency Transfer with Neural Identity Carrier
by Kunlin Liu & Ping Wang & Wenbo Zhou & Zhenyu Zhang & Yanhao Ge & Honggu Liu & Weiming Zhang & Nenghai Yu - 1-15 Misconfiguration in Firewalls and Network Access Controls: Literature Review
by Michael Alicea & Izzat Alsmadi - 1-17 Intelligent Planning and Research on Urban Traffic Congestion
by Qigang Zhu & Yifan Liu & Ming Liu & Shuaishuai Zhang & Guangyang Chen & Hao Meng - 1-17 MFCNet: Mining Features Context Network for RGB–IR Person Re-Identification
by Jing Mei & Huahu Xu & Yang Li & Minjie Bian & Yuzhe Huang - 1-17 Enable Fair Proof-of-Work (PoW) Consensus for Blockchains in IoT by Miner Twins (MinT)
by Qian Qu & Ronghua Xu & Yu Chen & Erik Blasch & Alexander Aved - 1-17 Opportunities to Develop Lifelong Learning Tendencies in Practice-Based Teacher Education: Getting Ready for Education 4.0
by Kiomi Matsumoto-Royo & Maria Soledad Ramírez-Montoya & Paulette Conget - 1-17 Detection of Hidden Communities in Twitter Discussions of Varying Volumes
by Ivan Blekanov & Svetlana S. Bodrunova & Askar Akhmetov - 1-18 Resilience in the Cyberworld: Definitions, Features and Models
by Elisabeth Vogel & Zoya Dyka & Dan Klann & Peter Langendörfer - 1-19 Improving Institutional Repositories through User-Centered Design: Indicators from a Focus Group
by Laura Icela González-Pérez & María Soledad Ramírez-Montoya & Francisco José García-Peñalvo - 1-20 Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses
by Nur Arifin Akbar & Amgad Muneer & Narmine ElHakim & Suliman Mohamed Fati - 1-20 What Went Wrong? Predictors of Contact Tracing Adoption in Italy during COVID-19 Pandemic
by Andrea Guazzini & Maria Fiorenza & Gabriele Panerai & Mirko Duradoni - 1-22 PECSA: Practical Edge Computing Service Architecture Applicable to Adaptive IoT-Based Applications
by Jianhua Liu & Zibo Wu - 1-45 An Analysis on Contemporary MAC Layer Protocols in Vehicular Networks: State-of-the-Art and Future Directions
by Lopamudra Hota & Biraja Prasad Nayak & Arun Kumar & G. G. Md. Nawaz Ali & Peter Han Joo Chong
September 2021, Volume 13, Issue 10
- 1-10 Smart Cities in Russia: Current Situation and Insights for Future Development
by Artem Yuloskov & Mohammad Reza Bahrami & Manuel Mazzara & Iouri Kotorov - 1-11 Automated Business Goal Extraction from E-mail Repositories to Bootstrap Business Understanding
by Marco Spruit & Marcin Kais & Vincent Menger - 1-13 Emotion Recognition in Horses with Convolutional Neural Networks
by Luis A. Corujo & Emily Kieson & Timo Schloesser & Peter A. Gloor - 1-14 OLP—A RESTful Open Low-Code Platform
by Mauro A. A. da Cruz & Heitor T. L. de Paula & Bruno P. G. Caputo & Samuel B. Mafra & Pascal Lorenz & Joel J. P. C. Rodrigues - 1-14 Fine-Scale Population Estimation Based on Building Classifications: A Case Study in Wuhan
by Shunli Wang & Rui Li & Jie Jiang & Yao Meng - 1-15 A Retrospective Analysis of the COVID-19 Infodemic in Saudi Arabia
by Ashwag Alasmari & Aseel Addawood & Mariam Nouh & Wajanat Rayes & Areej Al-Wabil - 1-16 Healthchain: A Privacy Protection System for Medical Data Based on Blockchain
by Baocheng Wang & Zetao Li - 1-17 Isolated Sandbox Environment Architecture for Running Cognitive Psychological Experiments in Web Platforms
by Evgeny Nikulchev & Dmitry Ilin & Pavel Kolyasnikov & Shamil Magomedov & Anna Alexeenko & Alexander N. Kosenkov & Andrey Sokolov & Artem Malykh & Victoria Ismatullina & Sergey Malykh - 1-18 Use of Machine Learning Methods for Indoor Temperature Forecasting
by Lara Ramadan & Isam Shahrour & Hussein Mroueh & Fadi Hage Chehade - 1-20 Machine Learning in Detecting COVID-19 Misinformation on Twitter
by Mohammed N. Alenezi & Zainab M. Alqenaei - 1-22 School Culture and Digital Technologies: Educational Practices at Universities within the Context of the COVID-19 Pandemic
by Noé Abraham González-Nieto & Caridad García-Hernández & Margarita Espinosa-Meneses - 1-24 Exploring Time-Series Forecasting Models for Dynamic Pricing in Digital Signage Advertising
by Yee-Fan Tan & Lee-Yeng Ong & Meng-Chew Leow & Yee-Xian Goh - 1-24 EconLedger: A Proof-of-ENF Consensus Based Lightweight Distributed Ledger for IoVT Networks
by Ronghua Xu & Deeraj Nagothu & Yu Chen - 1-24 Designing a Collaborative Virtual Conference Application: Challenges, Requirements and Guidelines
by Teo Rhun Ming & Noris Mohd Norowi & Rahmita Wirza & Azrina Kamaruddin
October 2021, Volume 13, Issue 10
- 1-14 An Intelligent TCP Congestion Control Method Based on Deep Q Network
by Yinfeng Wang & Longxiang Wang & Xiaoshe Dong - 1-16 On Predicting Ticket Reopening for Improving Customer Service in 5G Fiber Optic Networks
by Lorenzo Ricciardi Celsi & Andrea Caliciotti & Matteo D'Onorio & Eugenio Scocchi & Nour Alhuda Sulieman & Massimo Villari - 1-17 A Dynamic Service Reconfiguration Method for Satellite–Terrestrial Integrated Networks
by Wenxin Qiao & Hao Lu & Yu Lu & Lijie Meng & Yicen Liu - 1-18 The Ideas of Sustainable and Green Marketing Based on the Internet of Everything—The Case of the Dairy Industry
by Hamed Nozari & Agnieszka Szmelter-Jarosz & Javid Ghahremani-Nahr - 1-19 Authentication and Billing for Dynamic Wireless EV Charging in an Internet of Electric Vehicles
by Eiman ElGhanam & Ibtihal Ahmed & Mohamed Hassan & Ahmed Osman - 1-19 An SDN-Enabled Architecture for IT/OT Converged Networks: A Proposal and Qualitative Analysis under DDoS Attacks
by Luca Foschini & Valentina Mignardi & Rebecca Montanari & Domenico Scotece - 1-19 A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist
by Jia Shi & Xuewen Zeng & Yang Li - 1-19 A Systematic Literature Review of Industry 4.0 Technologies within Medical Device Manufacturing
by Tuuli Katarina Lepasepp & William Hurst - 1-20 VIS-HAPT: A Methodology Proposal to Develop Visuo-Haptic Environments in Education 4.0
by Julieta Noguez & Luis Neri & Víctor Robledo-Rella & Rosa María Guadalupe García-Castelán & Andres Gonzalez-Nucamendi & David Escobar-Castillejos & Arturo Molina - 1-20 Mobile App Start-Up Prediction Based on Federated Learning and Attributed Heterogeneous Network Embedding
by Shaoyong Li & Liang Lv & Xiaoya Li & Zhaoyun Ding - 1-20 Cost and Time Economical Planning Algorithm for Scientific Workflows in Cloud Computing
by Jabanjalin Hilda & Srimathi Chandrasekaran - 1-21 Underwater Target Recognition Based on Multi-Decision LOFAR Spectrum Enhancement: A Deep-Learning Approach
by Jie Chen & Bing Han & Xufeng Ma & Jian Zhang
September 2021, Volume 13, Issue 9
- 1-3 Wireless Internet, Multimedia, and Artificial Intelligence: New Applications and Infrastructures
by Roberto Saia & Salvatore Carta & Olaf Bergmann - 1-13 Reader–Tag Commands via Modulation Cutoff Intervals in RFID Systems
by Abdallah Y. Alma’aitah & Mohammad A. Massad - 1-13 Preference for Number of Friends in Online Social Networks
by Fanhui Meng & Haoming Sun & Jiarong Xie & Chengjun Wang & Jiajing Wu & Yanqing Hu - 1-15 WATS-SMS: A T5-Based French Wikipedia Abstractive Text Summarizer for SMS
by Jean Louis Ebongue Kedieng Fendji & Désiré Manuel Taira & Marcellin Atemkeng & Adam Musa Ali - 1-16 Real-Time Power Electronics Laboratory to Strengthen Distance Learning Engineering Education on Smart Grids and Microgrids
by Juan Roberto López Gutiérrez & Pedro Ponce & Arturo Molina - 1-19 A Study of Gender Bias in Face Presentation Attack and Its Mitigation
by Norah Alshareef & Xiaohong Yuan & Kaushik Roy & Mustafa Atay - 1-22 A Review on Clustering Techniques: Creating Better User Experience for Online Roadshow
by Zhou-Yi Lim & Lee-Yeng Ong & Meng-Chew Leow - 1-24 Spectrum Demand Forecasting for IoT Services
by Daniel Jaramillo-Ramirez & Manuel Perez - 1-25 User Authentication Based on Handwriting Analysis of Pen-Tablet Sensor Data Using Optimal Feature Selection Model
by Nasima Begum & Md Azim Hossain Akash & Sayma Rahman & Jungpil Shin & Md Rashedul Islam & Md Ezharul Islam - 1-26 A Fusion-Based Hybrid-Feature Approach for Recognition of Unconstrained Offline Handwritten Hindi Characters
by Danveer Rajpal & Akhil Ranjan Garg & Om Prakash Mahela & Hassan Haes Alhelou & Pierluigi Siano - 1-28 Exploring Variability of Visual Accessibility Options in Operating Systems
by Austin Waffo Kouhoué & Yoann Bonavero & Thomas Bouétou Bouétou & Marianne Huchard
August 2021, Volume 13, Issue 9
- 1-10 Stiffness Analysis to Predict the Spread Out of Fake Information
by Raffaele D’Ambrosio & Giuseppe Giordano & Serena Mottola & Beatrice Paternoster - 1-12 The Role of Verbal Aggression in Cyberbullying Perpetration and Victimization by Middle School Students
by Jen Eden & Anthony J. Roberto - 1-12 Network Theory and Switching Behaviors: A User Guide for Analyzing Electronic Records Databases
by Giorgio Gronchi & Marco Raglianti & Fabio Giovannelli - 1-13 Trend Prediction of Event Popularity from Microblogs
by Xujian Zhao & Wei Li - 1-13 Globally Scheduling Volunteer Computing
by David P. Anderson - 1-16 A BIM-Based Smart System for Fire Evacuation
by Rania Wehbe & Isam Shahrour - 1-17 Improving RE-SWOT Analysis with Sentiment Classification: A Case Study of Travel Agencies
by Shu-Fen Tu & Ching-Sheng Hsu & Yu-Tzu Lu - 1-17 Megalos: A Scalable Architecture for the Virtualization of Large Network Scenarios
by Mariano Scazzariello & Lorenzo Ariemma & Giuseppe Di Battista & Maurizio Patrignani - 1-18 Spatiotemporal Traffic Prediction Using Hierarchical Bayesian Modeling
by Taghreed Alghamdi & Khalid Elgazzar & Taysseer Sharaf - 1-21 YouTube Videos in the Virtual Flipped Classroom Model Using Brain Signals and Facial Expressions
by María Artemisa Sangermán Jiménez & Pedro Ponce & Esteban Vázquez-Cano
July 2021, Volume 13, Issue 8
- 1-13 Towards the Quantum Internet: Satellite Control Plane Architectures and Protocol Design
by Francesco Chiti & Romano Fantacci & Roberto Picchi & Laura Pierucci - 1-14 Education 4.0: Teaching the Basics of KNN, LDA and Simple Perceptron Algorithms for Binary Classification Problems
by Diego Lopez-Bernal & David Balderas & Pedro Ponce & Arturo Molina - 1-14 Movement Analysis for Neurological and Musculoskeletal Disorders Using Graph Convolutional Neural Network
by Ibsa K. Jalata & Thanh-Dat Truong & Jessica L. Allen & Han-Seok Seo & Khoa Luu - 1-14 The Effects of Non-Directional Online Behavior on Students’ Learning Performance: A User Profile Based Analysis Method
by Kun Liang & Jingjing Liu & Yiying Zhang - 1-15 Vision System Experimentation in Furniture Industrial Environment
by Gurbaksh Bhullar & Simon Osborne & María José Núñez Ariño & Juan Del Agua Navarro & Fernando Gigante Valencia - 1-16 Improving Human Ground Control Performance in Unmanned Aerial Systems
by Marianna Di Gregorio & Marco Romano & Monica Sebillo & Giuliana Vitiello & Angela Vozella - 1-16 Digital Manufacturing Challenges Education—SmartLab Concept as a Concrete Example in Tackling These Challenges
by Maarit Tihinen & Ari Pikkarainen & Jukka Joutsenvaara