Content
May 2021, Volume 13, Issue 5
- 1-19 User Acceptance of Smart Watch for Medical Purposes: An Empirical Study
by Rana Saeed Al-Maroof & Khadija Alhumaid & Ahmad Qasim Alhamad & Ahmad Aburayya & Said Salloum - 1-19 Research on Task-Oriented Computation Offloading Decision in Space-Air-Ground Integrated Network
by Jun Liu & Xiaohui Lian & Chang Liu - 1-19 Hashtag Recommendation Methods for Twitter and Sina Weibo: A Review
by Areej Alsini & Du Q. Huynh & Amitava Datta - 1-19 A Hierarchical Cache Size Allocation Scheme Based on Content Dissemination in Information-Centric Networks
by Hongyu Liu & Rui Han - 1-20 Trust, but Verify: Informed Consent, AI Technologies, and Public Health Emergencies
by Brian Pickering - 1-22 Comparative Study of Distributed Consensus Gossip Algorithms for Network Size Estimation in Multi-Agent Systems
by Martin Kenyeres & Jozef Kenyeres - 1-23 Exploiting Machine Learning for Improving In-Memory Execution of Data-Intensive Workflows on Parallel Machines
by Riccardo Cantini & Fabrizio Marozzo & Alessio Orsino & Domenico Talia & Paolo Trunfio - 1-24 Generating Synthetic Training Data for Supervised De-Identification of Electronic Health Records
by Claudia Alessandra Libbi & Jan Trienes & Dolf Trieschnigg & Christin Seifert - 1-28 A Digital Currency Architecture for Privacy and Owner-Custodianship
by Geoffrey Goodell & Hazem Danny Al-Nakib & Paolo Tasca
April 2021, Volume 13, Issue 5
- 1-12 How Schools Affected the COVID-19 Pandemic in Italy: Data Analysis for Lombardy Region, Campania Region, and Emilia Region
by Davide Tosi & Alessandro Siro Campi - 1-12 Reviewing Stranger on the Internet: The Role of Identifiability through “Reputation” in Online Decision Making
by Mirko Duradoni & Stefania Collodi & Serena Coppolino Perfumi & Andrea Guazzini - 1-14 Deep Learning-Based Classification of Fine Hand Movements from Low Frequency EEG
by Giulia Bressan & Giulia Cisotto & Gernot R. Müller-Putz & Selina Christin Wriessnegger - 1-14 A Pattern Mining Method for Teaching Practices
by Bernhard Standl & Nadine Schlomske-Bodenstein - 1-15 Remote Monitoring Model for the Preoperative Prehabilitation Program of Patients Requiring Abdominal Surgery
by Khalid Al-Naime & Adnan Al-Anbuky & Grant Mawston - 1-15 Mutual Influence of Users Credibility and News Spreading in Online Social Networks
by Vincenza Carchiolo & Alessandro Longheu & Michele Malgeri & Giuseppe Mangioni & Marialaura Previti - 1-15 Dynamic Control Architecture Based on Software Defined Networking for the Internet of Things
by Michele Bonanni & Francesco Chiti & Romano Fantacci & Laura Pierucci - 1-15 A Framework for Mobile-Assisted Formative Assessment to Promote Students’ Self-Determination
by Stavros A. Nikou & Anastasios A. Economides - 1-16 Analysis and Prediction of “AI + Education” Attention Based on Baidu Index—Taking Guizhou Province as an Example
by Yulin Zhao & Junke Li & Jiang-E Wang - 1-17 The Social and Transfer Massive Open Online Course: Post-Digital Learning
by José Javier Hueso-Romero & Javier Gil-Quintana & Helen Hasbun & Sara Osuna-Acedo - 1-18 Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks
by Abdulsalam O. Alzahrani & Mohammed J. F. Alenazi - 1-22 Experimental Evaluation of a LoRa Wildlife Monitoring Network in a Forest Vegetation Area
by Mike Oluwatayo Ojo & Davide Adami & Stefano Giordano - 1-23 Survey on Intelligence Edge Computing in 6G: Characteristics, Challenges, Potential Use Cases, and Market Drivers
by Ahmed Al-Ansi & Abdullah M. Al-Ansi & Ammar Muthanna & Ibrahim A. Elgendy & Andrey Koucheryavy - 1-24 IoT Technologies during and Beyond COVID-19: A Comprehensive Review
by Mohamed Yousif & Chaminda Hewage & Liqaa Nawaf - 1-24 Exploring the Roles of Local Mobility Patterns, Socioeconomic Conditions, and Lockdown Policies in Shaping the Patterns of COVID-19 Spread
by Mauricio Herrera & Alex Godoy-Faúndez - 1-25 Collecting a Large Scale Dataset for Classifying Fake News Tweets Using Weak Supervision
by Stefan Helmstetter & Heiko Paulheim - 1-29 H2O: Secure Interactions in IoT via Behavioral Fingerprinting
by Marco Ferretti & Serena Nicolazzo & Antonino Nocera - 1-45 Inferring Urban Social Networks from Publicly Available Data
by Stefano Guarino & Enrico Mastrostefano & Massimo Bernaschi & Alessandro Celestini & Marco Cianfriglia & Davide Torre & Lena Rebecca Zastrow
March 2021, Volume 13, Issue 4
- 1-12 Simulating and Evaluating a Real-World ElasticSearch System Using the RECAP DES Simulator
by Malika Bendechache & Sergej Svorobej & Patricia Takako Endo & Adrian Mihai & Theo Lynn - 1-13 Performance Analysis of Internet of Things Interactions via Simulation-Based Queueing Models
by Georgios Bouloukakis & Ioannis Moscholios & Nikolaos Georgantas & Valérie Issarny - 1-17 Research on the Impacts of Generalized Preceding Vehicle Information on Traffic Flow in V2X Environment
by Xiaoyuan Wang & Junyan Han & Chenglin Bai & Huili Shi & Jinglei Zhang & Gang Wang - 1-18 A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems
by Sanaa Kaddoura & Ramzi A. Haraty & Karam Al Kontar & Omar Alfandi - 1-21 Overlapping Community Detection of Bipartite Networks Based on a Novel Community Density
by Yubo Peng & Bofeng Zhang & Furong Chang - 1-26 Toward Blockchain-Enabled Supply Chain Anti-Counterfeiting and Traceability
by Neo C. K. Yiu - 1-31 Two-Layer Network Caching for Different Service Requirements
by Gianluca Reali & Mauro Femminella - 1-33 Decentralizing Supply Chain Anti-Counterfeiting and Traceability Systems Using Blockchain Technology
by Neo C. K. Yiu
April 2021, Volume 13, Issue 4
- 1-15 Implementation of a Virtual Assistant for the Academic Management of a University with the Use of Artificial Intelligence
by William Villegas-Ch & Joselin García-Ortiz & Karen Mullo-Ca & Santiago Sánchez-Viteri & Milton Roman-Cañizares - 1-15 Pervasive Intelligent Models to Predict the Outcome of COVID-19 Patients
by Ana Teresa Ferreira & Carlos Fernandes & José Vieira & Filipe Portela - 1-16 Blockchain Applications in Agribusiness: A Systematic Review
by Geneci da Silva Ribeiro Rocha & Letícia de Oliveira & Edson Talamini - 1-16 Linking Phubbing Behavior to Self-Reported Attentional Failures and Media Multitasking
by Kayla S. Sansevere & Nathan Ward - 1-17 Characterization of the Teaching Profile within the Framework of Education 4.0
by María Soledad Ramírez-Montoya & María Isabel Loaiza-Aguirre & Alexandra Zúñiga-Ojeda & May Portuguez-Castro - 1-18 ICT in Rural Areas from the Perspective of Dairy Farming: A Systematic Review
by Alba Vázquez-López & Martín Barrasa-Rioja & Manuel Marey-Perez - 1-19 iCaps-Dfake: An Integrated Capsule-Based Model for Deepfake Image and Video Detection
by Samar Samir Khalil & Sherin M. Youssef & Sherine Nagy Saleh - 1-19 Differentiated Teaching Based on Standardized Metrics Integrating Fuzzy Logic Type 2 Detection Theory: High School Case—PrepaTec, Mexico
by María Artemisa Sangermán Jiménez & Pedro Ponce - 1-20 Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning
by Haokun Fang & Quan Qian - 1-21 Coronary Centerline Extraction from CCTA Using 3D-UNet
by Alexandru Dorobanțiu & Valentin Ogrean & Remus Brad - 1-22 Security Challenges of Location Privacy in VANETs and State-of-the-Art Solutions: A Survey
by Shawal Khan & Ishita Sharma & Mazzamal Aslam & Muhammad Zahid Khan & Shahzad Khan - 1-23 Site Experience Enhancement and Perspective in Cultural Heritage Fruition—A Survey on New Technologies and Methodologies Based on a “Four-Pillars” Approach
by Agnese Augello & Ignazio Infantino & Giovanni Pilato & Gianpaolo Vitale
February 2021, Volume 13, Issue 3
- 1-13 A Cloud-Based Data Collaborative to Combat the COVID-19 Pandemic and to Solve Major Technology Challenges
by Max Cappellari & John Belstner & Bryan Rodriguez & Jeff Sedayao - 1-18 Investigation of Degradation and Upgradation Models for Flexible Unit Systems: A Systematic Literature Review
by Thirupathi Samala & Vijaya Kumar Manupati & Maria Leonilde R. Varela & Goran Putnik - 1-18 Learning How to Separate Fake from Real News: Scalable Digital Tutorials Promoting Students’ Civic Online Reasoning
by Carl-Anton Werner Axelsson & Mona Guath & Thomas Nygren - 1-22 Online Professional Learning in Response to COVID-19—Towards Robust Evaluation
by Alireza Ahadi & Matt Bower & Abhay Singh & Michael Garrett - 1-22 Adapting Data-Driven Research to the Fields of Social Sciences and the Humanities
by Albert Weichselbraun & Philipp Kuntschik & Vincenzo Francolino & Mirco Saner & Urs Dahinden & Vinzenz Wyss - 1-32 Distributed Ledger Technology Review and Decentralized Applications Development Guidelines
by Claudia Antal & Tudor Cioara & Ionut Anghel & Marcel Antal & Ioan Salomie - 1-35 A Multi-Tier Security Analysis of Official Car Management Apps for Android
by Efstratios Chatzoglou & Georgios Kambourakis & Vasileios Kouliaridis
March 2021, Volume 13, Issue 3
- 1-12 Data Protection Impact Assessment (DPIA) for Cloud-Based Health Organizations
by Dimitra Georgiou & Costas Lambrinoudakis - 1-13 Transfer Learning for Multi-Premise Entailment with Relationship Processing Module
by Pin Wu & Rukang Zhu & Zhidan Lei - 1-13 The Role of Mobile Application Acceptance in Shaping E-Customer Service
by Laith T. Khrais & Abdullah M. Alghamdi - 1-13 An Adaptive Throughput-First Packet Scheduling Algorithm for DPDK-Based Packet Processing Systems
by Chuanhong Li & Lei Song & Xuewen Zeng - 1-14 Deep Model Poisoning Attack on Federated Learning
by Xingchen Zhou & Ming Xu & Yiming Wu & Ning Zheng - 1-14 Dirichlet Process Prior for Student’s t Graph Variational Autoencoders
by Yuexuan Zhao & Jing Huang - 1-14 RecPOID: POI Recommendation with Friendship Aware and Deep CNN
by Sadaf Safavi & Mehrdad Jalali - 1-15 Person Re-Identification Based on Attention Mechanism and Context Information Fusion
by Shengbo Chen & Hongchang Zhang & Zhou Lei - 1-16 A Classification Method for Academic Resources Based on a Graph Attention Network
by Jie Yu & Yaliu Li & Chenle Pan & Junwei Wang - 1-17 Effects of Transport Network Slicing on 5G Applications
by Yi-Bing Lin & Chien-Chao Tseng & Ming-Hung Wang - 1-17 Vehicular Communication Management Framework: A Flexible Hybrid Connectivity Platform for CCAM Services
by Dries Naudts & Vasilis Maglogiannis & Seilendria Hadiwardoyo & Daniel van den Akker & Simon Vanneste & Siegfried Mercelis & Peter Hellinckx & Bart Lannoo & Johann Marquez-Barja & Ingrid Moerman - 1-18 Estimating PQoS of Video Conferencing on Wi-Fi Networks Using Machine Learning
by Maghsoud Morshedi & Josef Noll - 1-18 A Web Interface for Analyzing Hate Speech
by Lazaros Vrysis & Nikolaos Vryzas & Rigas Kotsakis & Theodora Saridou & Maria Matsiola & Andreas Veglis & Carlos Arcila-Calderón & Charalampos Dimoulas - 1-19 Implementation of IoT Framework with Data Analysis Using Deep Learning Methods for Occupancy Prediction in a Building
by Eric Hitimana & Gaurav Bajpai & Richard Musabe & Louis Sibomana & Jayavel Kayalvizhi - 1-20 Realistic Aspects of Simulation Models for Fake News Epidemics over Social Networks
by Quintino Francesco Lotito & Davide Zanella & Paolo Casari - 1-21 The Effect of Thickness-Based Dynamic Matching Mechanism on a Hyperledger Fabric-Based TimeBank System
by Jhan-Jia Lin & Yu-Tse Lee & Ja-Ling Wu - 1-23 Joint Offloading and Energy Harvesting Design in Multiple Time Blocks for FDMA Based Wireless Powered MEC
by Zhiyan Yu & Gaochao Xu & Yang Li & Peng Liu & Long Li - 1-24 Investigating and Modeling of Cooperative Vehicle-to-Vehicle Safety Stopping Distance
by Steven Knowles Flanagan & Zuoyin Tang & Jianhua He & Irfan Yusoff - 1-24 Characterization of the Digital Identity of Chilean University Students Considering Their Personal Learning Environments
by Marisol Hernández-Orellana & Adolfina Pérez-Garcias & Ángel Roco-Videla - 1-25 Virtual Network Function Embedding under Nodal Outage Using Deep Q-Learning
by Swarna Bindu Chetty & Hamed Ahmadi & Sachin Sharma & Avishek Nag
February 2021, Volume 13, Issue 2
- 1-11 Collaborative Filtering Based on a Variational Gaussian Mixture Model
by FengLei Yang & Fei Liu & ShanShan Liu - 1-13 An Accelerating Approach for Blockchain Information Transmission Based on NDN
by Zhi-Peng Yang & Lu Hua & Ning-Jie Gao & Ru Huo & Jiang Liu & Tao Huang - 1-13 Load Balancing Oriented Predictive Routing Algorithm for Data Center Networks
by Yazhi Liu & Jiye Zhang & Wei Li & Qianqian Wu & Pengmiao Li - 1-14 Research Professors’ Self-Assessment of Competencies
by Gabriela Torres Delgado & Neil Hernández-Gress - 1-15 Interpretable Variational Graph Autoencoder with Noninformative Prior
by Lili Sun & Xueyan Liu & Min Zhao & Bo Yang - 1-16 Adaptive Weighted Multi-Level Fusion of Multi-Scale Features: A New Approach to Pedestrian Detection
by Yao Xu & Qin Yu - 1-16 A Sign of Things to Come: Predicting the Perception of Above-the-Fold Time in Web Browsing
by Hamed Z. Jahromi & Declan Delaney & Andrew Hines - 1-16 Assessing Digital Transformation in Universities
by Guillermo Rodríguez-Abitia & Graciela Bribiesca-Correa - 1-17 Dashboard COMPRIME_COMPRI_MOv: Multiscalar Spatio-Temporal Monitoring of the COVID-19 Pandemic in Portugal
by Nuno Marques da Costa & Nelson Mileu & André Alves - 1-17 ARIBC: Online Reporting Based on Identity-Based Cryptography
by Athanasios Goudosis & Sokratis Katsikas - 1-18 Video Captioning Based on Channel Soft Attention and Semantic Reconstructor
by Zhou Lei & Yiyong Huang - 1-19 An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion
by Tianfang Sun & Pin Yang & Mengming Li & Shan Liao - 1-19 Semantic Task Planning for Service Robots in Open Worlds
by Guowei Cui & Wei Shuai & Xiaoping Chen - 1-20 Intelligent and Autonomous Management in Cloud-Native Future Networks—A Survey on Related Standards from an Architectural Perspective
by Qiang Duan - 1-21 Blockchain-Enabled Edge Intelligence for IoT: Background, Emerging Trends and Open Issues
by Yao Du & Zehua Wang & Victor C. M. Leung - 1-22 Digital Communication Tools and Knowledge Creation Processes for Enriched Intellectual Outcome—Experience of Short-Term E-Learning Courses during Pandemic
by Nadezhda N. Pokrovskaia & Veronika L. Leontyeva & Marianna Yu. Ababkova & Lucio Cappelli & Fabrizio D’Ascenzo - 1-24 Use of Social Media Data in Disaster Management: A Survey
by Jedsada Phengsuwan & Tejal Shah & Nipun Balan Thekkummal & Zhenyu Wen & Rui Sun & Divya Pullarkatt & Hemalatha Thirugnanam & Maneesha Vinodini Ramesh & Graham Morgan & Philip James & Rajiv Ranjan - 1-28 Digital Regulation of Intellectual Capital for Open Innovation: Industries’ Expert Assessments of Tacit Knowledge for Controlling and Networking Outcome
by Nadezhda N. Pokrovskaia & Olga N. Korableva & Lucio Cappelli & Denis A. Fedorov - 1-40 A Systematic Review of Cybersecurity Risks in Higher Education
by Joachim Bjørge Ulven & Gaute Wangen
January 2021, Volume 13, Issue 2
- 1-7 Acknowledgment to Reviewers of Future Internet in 2020
by Future Internet Editorial Office - 1-14 A Lightweight Blockchain-Based IoT Identity Management Approach
by Mohammed Amine Bouras & Qinghua Lu & Sahraoui Dhelim & Huansheng Ning - 1-17 Language Bias in the Google Scholar Ranking Algorithm
by Cristòfol Rovira & Lluís Codina & Carlos Lopezosa - 1-17 Technology Enhanced Learning Using Humanoid Robots
by Diego Reforgiato Recupero - 1-17 Council Press Offices as Sources of Political Information: Between Journalism for Accountability and Propaganda
by Vanessa Rodríguez-Breijo & Núria Simelio & Pedro Molina-Rodríguez-Navas - 1-17 High Performance Graph Data Imputation on Multiple GPUs
by Chao Zhou & Tao Zhang - 1-19 The Learning to Learn Competence in Early Childhood Preservice Teachers: An Outdoor and e/m-Learning Experience in the Museum
by Daniel Abril-López & Hortensia Morón-Monge & María del Carmen Morón-Monge & María Dolores López Carrillo - 1-19 Experiment Information System Based on an Online Virtual Laboratory
by Chuanyan Hao & Anqi Zheng & Yuqi Wang & Bo Jiang - 1-21 A Middleware-Based Approach for Multi-Scale Mobility Simulation
by Xavier Boulet & Mahdi Zargayouna & Gérard Scemama & Fabien Leurent - 1-24 Teaching Physics for Computer Science Students in Higher Education During the COVID-19 Pandemic: A Fully Internet-Supported Course
by Francisco Delgado - 1-25 Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks
by Angeliki Kitsiou & Eleni Tzortzaki & Christos Kalloniatis & Stefanos Gritzalis - 1-27 Integrative Factors of E-Health Laboratory Adoption: A Case of Indonesia
by Dwiza Riana & Achmad Nizar Hidayanto & Sri Hadianti & Darmawan Napitupulu - 1-27 Cooperation in Social Dilemmas: A Group Game Model with Double-Layer Networks
by Dongwei Guo & Mengmeng Fu & Hai Li - 1-32 How Dramatic Events Can Affect Emotionality in Social Posting: The Impact of COVID-19 on Reddit
by Valerio Basile & Francesco Cauteruccio & Giorgio Terracina - 1-34 A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly
by Dimitrios Papamartzivanos & Sofia Anna Menesidou & Panagiotis Gouvas & Thanassis Giannetsos
January 2021, Volume 13, Issue 1
- 1-10 Knowledge-Graph-Based Drug Repositioning against COVID-19 by Graph Convolutional Network with Attention Mechanism
by Mingxuan Che & Kui Yao & Chao Che & Zhangwei Cao & Fanchen Kong - 1-10 A Classifier to Detect Informational vs. Non-Informational Heart Attack Tweets
by Ola Karajeh & Dirar Darweesh & Omar Darwish & Noor Abu-El-Rub & Belal Alsinglawi & Nasser Alsaedi - 1-12 Path Segmentation-Based Hybrid Caching in Information-Centric Networks
by Wei Li & Peng Sun & Rui Han - 1-13 Drug Repurposing for Parkinson’s Disease by Integrating Knowledge Graph Completion Model and Knowledge Fusion of Medical Literature
by Xiaolin Zhang & Chao Che - 1-13 E-Mail Network Patterns and Body Language Predict Risk-Taking Attitude
by Jiachen Sun & Peter Gloor - 1-15 Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East
by Yousra Javed & Elham Al Qahtani & Mohamed Shehab - 1-15 Cyberbullying Analysis in Intercultural Educational Environments Using Binary Logistic Regressions
by José Manuel Ortiz-Marcos & María Tomé-Fernández & Christian Fernández-Leyva - 1-18 The Effects of the Content Elements of Online Banner Ads on Visual Attention: Evidence from An-Eye-Tracking Study
by Serhat Peker & Gonca Gokce Menekse Dalveren & Yavuz İnal - 1-20 Using Machine Learning for Web Page Classification in Search Engine Optimization
by Goran Matošević & Jasminka Dobša & Dunja Mladenić - 1-21 What Makes a UI Simple? Difficulty and Complexity in Tasks Engaging Visual-Spatial Working Memory
by Maxim Bakaev & Olga Razumnikova - 1-23 Design and Implementation of Virtual Security Function Based on Multiple Enclaves
by Juan Wang & Yang Yu & Yi Li & Chengyang Fan & Shirong Hao - 1-23 The Perceived Impact of Social Networking Sites and Apps on the Social Capital of Saudi Postgraduate Students: A Case Study
by Abdulelah A. Alghamdi & Margaret Plunkett - 1-26 Evaluation of Digital Piracy by Youths
by Łukasz Tomczyk
December 2020, Volume 13, Issue 1
- 1-11 A Data Augmentation Approach to Distracted Driving Detection
by Jing Wang & ZhongCheng Wu & Fang Li & Jun Zhang - 1-13 Evaluation of Deep Convolutional Generative Adversarial Networks for Data Augmentation of Chest X-ray Images
by Sagar Kora Venu & Sridhar Ravula - 1-16 Authorship Identification of a Russian-Language Text Using Support Vector Machine and Deep Neural Networks
by Aleksandr Romanov & Anna Kurtukova & Alexander Shelupanov & Anastasia Fedotova & Valery Goncharov - 1-21 Commonly Used External TAM Variables in e-Learning, Agriculture and Virtual Reality Applications
by Ivonne Angelica Castiblanco Jimenez & Laura Cristina Cepeda García & Maria Grazia Violante & Federica Marcolin & Enrico Vezzetti - 1-23 SIoT: A New Strategy to Improve the Network Lifetime with an Efficient Search Process
by Abderrahim Zannou & Abdelhak Boulaalam & El Habib Nfaoui - 1-24 Architecture for Enabling Edge Inference via Model Transfer from Cloud Domain in a Kubernetes Environment
by Pekka Pääkkönen & Daniel Pakkala & Jussi Kiljander & Roope Sarala - 1-24 An Unsupervised Behavioral Modeling and Alerting System Based on Passive Sensing for Elderly Care
by Rui Hu & Bruno Michel & Dario Russo & Niccolò Mora & Guido Matrella & Paolo Ciampolini & Francesca Cocchi & Enrico Montanari & Stefano Nunziata & Thomas Brunschwiler - 1-38 Tourist Recommender Systems Based on Emotion Recognition—A Scientometric Review
by Luz Santamaria-Granados & Juan Francisco Mendoza-Moreno & Gustavo Ramirez-Gonzalez
December 2020, Volume 12, Issue 12
- 1-10 Interactions between Virtual Spaces and Schools: A Collective Case Study
by Juan Miguel Martínez Martínez & Antonio Tudela Sancho - 1-11 A Model for Creating Interactive eBooks for eLearning
by Antonio Sarasa-Cabezuelo - 1-11 IgA Nephropathy Prediction in Children with Machine Learning Algorithms
by Ping Zhang & Rongqin Wang & Nianfeng Shi - 1-12 Pat-in-the-Loop : Declarative Knowledge for Controlling Neural Networks
by Dario Onorati & Pierfrancesco Tommasino & Leonardo Ranaldi & Francesca Fallucchi & Fabio Massimo Zanzotto - 1-14 Role of Artificial Intelligence in Shaping Consumer Demand in E-Commerce
by Laith T. Khrais - 1-14 An Analysis Method for Interpretability of CNN Text Classification Model
by Peng Ce & Bao Tie - 1-15 Before and after the Quarantine: An Approximate Study on the Psychological Impact of COVID-19 on the Italian Population during the Lockdown Period
by Lorena Marotta & Andrea Pesce & Andrea Guazzini - 1-16 Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias
by David Harborth & Sebastian Pape - 1-17 Malware Classification Based on Shallow Neural Network
by Pin Yang & Huiyu Zhou & Yue Zhu & Liang Liu & Lei Zhang - 1-17 Comparing Blockchain Standards and Recommendations
by Lukas König & Yuliia Korobeinikova & Simon Tjoa & Peter Kieseberg - 1-17 Smart Site Diversity for a High Throughput Satellite System with Software-Defined Networking and a Virtual Network Function
by Gandhimathi Velusamy & Ricardo Lent - 1-17 Proposal for a System Model for Offline Seismic Event Detection in Colombia
by Julián Miranda & Angélica Flórez & Gustavo Ospina & Ciro Gamboa & Carlos Flórez & Miguel Altuve - 1-18 Jointly Optimize the Residual Energy of Multiple Mobile Devices in the MEC–WPT System
by Long Li & Gaochao Xu & Peng Liu & Yang Li & Jiaqi Ge - 1-18 EmuCD: An Emulator for Content Dissemination Protocols in Vehicular Networks
by Ricardo Chaves & Carlos Senna & Miguel Luís & Susana Sargento & André Moreira & Diogo Recharte & Ricardo Matos - 1-20 A Bayesian Approach Based on Bayes Minimum Risk Decision for Reliability Assessment of Web Service Composition
by Yang Song & Yawen Wang & Dahai Jin - 1-20 Challenges and Possibilities of ICT-Mediated Assessment in Virtual Teaching and Learning Processes
by Esperanza Milena Torres-Madroñero & Maria C. Torres-Madroñero & Luz Dary Ruiz Botero - 1-21 Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process
by Muhammad Atiq Ur Rehman Tariq & Cheuk Yin Wai & Nitin Muttil - 1-22 Performance Analysis of Cache Based on Popularity and Class in Named Data Network
by Leanna Vidya Yovita & Nana Rachmana Syambas & Ian Joseph Matheus Edward & Noriaki Kamiyama - 1-23 Predictive Maintenance (PdM) Structure Using Internet of Things (IoT) for Mechanical Equipment Used into Hospitals in Rwanda
by Irene Niyonambaza & Marco Zennaro & Alfred Uwitonze
November 2020, Volume 12, Issue 12
- 1-13 About Rule-Based Systems: Single Database Queries for Decision Making
by Piotr Artiemjew & Lada Rudikova & Oleg Myslivets - 1-13 Predicting Activities of Daily Living with Spatio-Temporal Information
by Sook-Ling Chua & Lee Kien Foo & Hans W. Guesgen - 1-13 Keeping Models Consistent between Pretraining and Translation for Low-Resource Neural Machine Translation
by Wenbo Zhang & Xiao Li & Yating Yang & Rui Dong & Gongxu Luo - 1-15 An Extended Car-Following Model Considering Generalized Preceding Vehicles in V2X Environment
by Junyan Han & Jinglei Zhang & Xiaoyuan Wang & Yaqi Liu & Quanzheng Wang & Fusheng Zhong - 1-16 A Review on Blockchain for the Internet of Medical Things: Definitions, Challenges, Applications, and Vision
by Gioele Bigini & Valerio Freschi & Emanuele Lattanzi - 1-17 User Acceptance of Information Feed Advertising: A Hybrid Method Based on SEM and QCA
by Jie Zhao & Can Yan - 1-22 Citizen Science on Twitter: Using Data Analytics to Understand Conversations and Networks
by Suvodeep Mazumdar & Dhavalkumar Thakker - 1-24 Complex Cognitive Systems and Their Unconscious. Related Inspired Conjectures for Artificial Intelligence
by Gianfranco Minati - 1-40 Risk Perceptions on Social Media Use in Norway
by Philip Nyblom & Gaute Wangen & Vasileios Gkioulos
November 2020, Volume 12, Issue 11
- 1-13 Proposal and Investigation of an Artificial Intelligence (AI)-Based Cloud Resource Allocation Algorithm in Network Function Virtualization Architectures
by Vincenzo Eramo & Francesco Giacinto Lavacca & Tiziana Catena & Paul Jaime Perez Salazar - 1-13 Geospatial Assessment of the Territorial Road Network by Fractal Method
by Mikolaj Karpinski & Svitlana Kuznichenko & Nadiia Kazakova & Oleksii Fraze-Frazenko & Daniel Jancarczyk - 1-13 Portfolio Learning Based on Deep Learning
by Wei Pan & Jide Li & Xiaoqiang Li - 1-14 High Throughput Data Relay in UAV Wireless Networks
by Fenyu Jiang & Chris Phillips - 1-14 Homogeneous Data Normalization and Deep Learning: A Case Study in Human Activity Classification
by Ivan Miguel Pires & Faisal Hussain & Nuno M. Garcia & Petre Lameski & Eftim Zdravevski - 1-14 AT-Text: Assembling Text Components for Efficient Dense Scene Text Detection
by Haiyan Li & Hongtao Lu - 1-15 An Organized Repository of Ethereum Smart Contracts’ Source Codes and Metrics
by Giuseppe Antonio Pierro & Roberto Tonelli & Michele Marchesi - 1-15 Digital Competence and Gender: Teachers in Training. A Case Study
by Mario Grande-de-Prado & Ruth Cañón & Sheila García-Martín & Isabel Cantón - 1-17 On the Modeling of Automotive Security: A Survey of Methods and Perspectives
by Jingjing Hao & Guangsheng Han - 1-18 A Probabilistic VDTN Routing Scheme Based on Hybrid Swarm-Based Approach
by Youcef Azzoug & Abdelmadjid Boukra & Vasco N. G. J. Soares - 1-18 Failure Mode and Effect Analysis for Cyber-Physical Systems
by João Oliveira & Gonçalo Carvalho & Bruno Cabral & Jorge Bernardino - 1-20 An Interoperable UMLS Terminology Service Using FHIR
by Rishi Saripalle & Mehdi Sookhak & Mahboobeh Haghparast - 1-21 ndnIoT-FC: IoT Devices as First-Class Traffic in Name Data Networks
by Luís Gameiro & Carlos Senna & Miguel Luís - 1-23 An Internet of Things (IoT) Acceptance Model. Assessing Consumer’s Behavior toward IoT Products and Applications
by Maria Tsourela & Dafni-Maria Nerantzaki - 1-23 E-Marketplace as a Tool for the Revitalization of Portuguese Craft Industry: The Design Process in the Development of an Online Platform
by Nuno Martins & Daniel Brandão & Heitor Alvelos & Sara Silva - 1-28 Pulverization in Cyber-Physical Systems: Engineering the Self-Organizing Logic Separated from Deployment
by Roberto Casadei & Danilo Pianini & Andrea Placuzzi & Mirko Viroli & Danny Weyns - 1-30 Monitoring and Support for Elderly People Using LoRa Communication Technologies: IoT Concepts and Applications
by José Paulo Lousado & Sandra Antunes
October 2020, Volume 12, Issue 11
- 1-11 Learning a Hierarchical Global Attention for Image Classification
by Kerang Cao & Jingyu Gao & Kwang-nam Choi & Lini Duan - 1-12 Paranoid Transformer: Reading Narrative of Madness as Computational Approach to Creativity
by Yana Agafonova & Alexey Tikhonov & Ivan P. Yamshchikov - 1-16 Digital Irrigated Agriculture: Towards a Framework for Comprehensive Analysis of Decision Processes under Uncertainty
by Francesco Cavazza & Francesco Galioto & Meri Raggi & Davide Viaggi - 1-17 Browser Forensic Investigations of WhatsApp Web Utilizing IndexedDB Persistent Storage
by Furkan Paligu & Cihan Varol - 1-18 From Mirrors to Free-Space Optical Communication—Historical Aspects in Data Transmission
by Magdalena Garlinska & Agnieszka Pregowska & Karol Masztalerz & Magdalena Osial - 1-18 A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus
by Vitor Nazário Coelho & Rodolfo Pereira Araújo & Haroldo Gambini Santos & Wang Yong Qiang & Igor Machado Coelho - 1-18 An Analysis of the Supply of Open Government Data
by Alan Ponce & Raul Alberto Ponce Rodriguez - 1-18 An Improved Deep Belief Network Prediction Model Based on Knowledge Transfer
by Yue Zhang & Fangai Liu - 1-19 Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset
by Ahmed Mahfouz & Abdullah Abuhussein & Deepak Venugopal & Sajjan Shiva - 1-20 A Knowledge-Driven Multimedia Retrieval System Based on Semantics and Deep Features
by Antonio Maria Rinaldi & Cristiano Russo & Cristian Tommasino - 1-20 A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter
by Amgad Muneer & Suliman Mohamed Fati - 1-28 Fog Computing for Smart Cities’ Big Data Management and Analytics: A Review
by Elarbi Badidi & Zineb Mahrez & Essaid Sabir - 1-50 Password Managers—It’s All about Trust and Transparency
by Fahad Alodhyani & George Theodorakopoulos & Philipp Reinecke
September 2020, Volume 12, Issue 10
- 1-15 Digital Twin Conceptual Model within the Context of Internet of Things
by A. R. Al-Ali & Ragini Gupta & Tasneem Zaman Batool & Taha Landolsi & Fadi Aloul & Ahmad Al Nabulsi - 1-16 The Value of Simple Heuristics for Virtualized Network Function Placement
by Zahra Jahedi & Thomas Kunz - 1-16 An Internet of Things Model for Improving Process Management on University Campus
by William Villegas-Ch & Xavier Palacios-Pacheco & Milton Román-Cañizares - 1-16 Tourist Behaviour Analysis Based on Digital Pattern of Life—An Approach and Case Study
by Sergei Mikhailov & Alexey Kashevnik - 1-16 Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems
by Niraj Thapa & Zhipeng Liu & Dukka B. KC & Balakrishna Gokaraju & Kaushik Roy - 1-17 A Survey of Defensive Measures for Digital Persecution in the Global South
by Louis Edward Papa & Thaier Hayajneh - 1-27 Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures
by Guma Ali & Mussa Ally Dida & Anael Elikana Sam - 1-28 Policy-Engineering Optimization with Visual Representation and Separation-of-Duty Constraints in Attribute-Based Access Control
by Wei Sun & Hui Su & Huacheng Xie - 1-37 Phishing Attacks Survey: Types, Vectors, and Technical Approaches
by Rana Alabdan
October 2020, Volume 12, Issue 10
- 1-10 An Approach to Changing Competence Assessment for Human Resources in Expert Networks
by Mikhail Petrov - 1-13 Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User
by Xin Song & Lin Xia & Siyang Xu & Yue Wang