Content
September 2024, Volume 16, Issue 9
- 1-13 Decentralized Mechanism for Edge Node Allocation in Access Network: An Experimental Evaluation
by Jesus Calle-Cancho & Carlos Cañada & Rafael Pastor-Vargas & Mercedes E. Paoletti & Juan M. Haut - 1-15 Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey
by Elias Dritsas & Maria Trigka - 1-17 Privacy-Preserving Authentication Based on PUF for VANETs
by Lihui Li & Hanwen Deng & Zhongyi Zhai & Sheng-Lung Peng - 1-17 Traffic Classification in Software-Defined Networking Using Genetic Programming Tools
by Spiridoula V. Margariti & Ioannis G. Tsoulos & Evangelia Kiousi & Eleftherios Stergiou - 1-19 Workflow Trace Profiling and Execution Time Analysis in Quantitative Verification
by Guoxin Su & Li Liu - 1-19 Determinants to Adopt Industrial Internet of Things in Small and Medium-Sized Enterprises
by Abdullah Khanfor - 1-19 Industry 4.0 and Beyond: The Role of 5G, WiFi 7, and Time-Sensitive Networking (TSN) in Enabling Smart Manufacturing
by Jobish John & Md. Noor-A-Rahim & Aswathi Vijayan & H. Vincent Poor & Dirk Pesch - 1-20 Application of Fuzzy Logic for Horizontal Scaling in Kubernetes Environments within the Context of Edge Computing
by Sérgio N. Silva & Mateus A. S. de S. Goldbarg & Lucileide M. D. da Silva & Marcelo A. C. Fernandes - 1-20 A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs
by Haitham Y. Adarbah & Mehmet Sabir Kiraz & Suleyman Kardas & Ali H. Al-Bayatti & Hilal M. Y. Al-Bayatti - 1-20 Time-Efficient Neural-Network-Based Dynamic Area Optimization Algorithm for High-Altitude Platform Station Mobile Communications
by Wataru Takabatake & Yohei Shibata & Kenji Hoshino & Tomoaki Ohtsuki - 1-20 A Task Offloading and Resource Allocation Strategy Based on Multi-Agent Reinforcement Learning in Mobile Edge Computing
by Guiwen Jiang & Rongxi Huang & Zhiming Bao & Gaocai Wang - 1-20 Implementation of White-Hat Worms Using Mirai Source Code and Its Optimization through Parameter Tuning
by Yudai Yamamoto & Aoi Fukushima & Shingo Yamaguchi - 1-22 A Novel Framework for Cross-Cluster Scaling in Cloud-Native 5G NextGen Core
by Oana-Mihaela Dumitru-Guzu & Vlădeanu Călin & Robert Kooij - 1-22 Optimizing Network Performance: A Comparative Analysis of EIGRP, OSPF, and BGP in IPv6-Based Load-Sharing and Link-Failover Systems
by Kamal Shahid & Saleem Naseer Ahmad & Syed Tahir Hussain Rizvi - 1-24 Developing a Secure Service Ecosystem to Implement the Intelligent Edge Environment for Smart Cities
by Gayathri Karthick & Glenford Mapp - 1-24 A Micro-Segmentation Method Based on VLAN-VxLAN Mapping Technology
by Di Li & Zhibang Yang & Siyang Yu & Mingxing Duan & Shenghong Yang - 1-24 Enhancing Elderly Care through Low-Cost Wireless Sensor Networks and Artificial Intelligence: A Study on Vital Sign Monitoring and Sleep Improvement
by Carolina Del-Valle-Soto & Ramon A. Briseño & Ramiro Velázquez & Gabriel Guerra-Rosales & Santiago Perez-Ochoa & Isaac H. Preciado-Bazavilvazo & Paolo Visconti & José Varela-Aldás - 1-25 Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta & Floriano Scioscia & Giuseppe Loseto & Agnese Pinto & Corrado Fasciano & Giovanna Capurso & Eugenio Di Sciascio - 1-25 A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection
by Abdallah Moubayed - 1-25 Measuring the Effectiveness of Carbon-Aware AI Training Strategies in Cloud Instances: A Confirmation Study
by Roberto Vergallo & Luca Mainetti - 1-25 Parallel and Distributed Frugal Tracking of a Quantile
by Italo Epicoco & Marco Pulimeno & Massimo Cafaro - 1-26 Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things
by Abeer Almutairi & Xavier Carpent & Steven Furnell - 1-28 Edge Computing in Healthcare: Innovations, Opportunities, and Challenges
by Alexandru Rancea & Ionut Anghel & Tudor Cioara - 1-28 Alquist 5.0: Dialogue Trees Meet Generative Models, a Novel Approach for Enhancing SocialBot Conversations
by Ondrej Kobza & David Herel & Jan Cuhel & Tommaso Gargiani & Petr Marek & Jan Sedivy - 1-31 Efficient Data Exchange between WebAssembly Modules
by Lucas Silva & José Metrôlho & Fernando Ribeiro - 1-31 An Improved Routing Protocol for Optimum Quality of Service in Device-to-Device and Energy Efficiency in 5G/B5G
by Sanusi Mohammad Bunu & Omar Younis Alani & Mohammad Saraee - 1-32 Are Strong Baselines Enough? False News Detection with Machine Learning
by Lara Aslan & Michal Ptaszynski & Jukka Jauhiainen - 1-33 On the Fairness of Internet Congestion Control over WiFi with Deep Reinforcement Learning
by Shyam Kumar Shrestha & Shiva Raj Pokhrel & Jonathan Kua - 1-33 Artificial Intelligence to Reshape the Healthcare Ecosystem
by Gianluca Reali & Mauro Femminella - 1-34 Graph Attention Networks: A Comprehensive Review of Methods and Applications
by Aristidis G. Vrahatis & Konstantinos Lazaros & Sotiris Kotsiantis - 1-35 Vulnerability Detection and Classification of Ethereum Smart Contracts Using Deep Learning
by Raed M. Bani-Hani & Ahmed S. Shatnawi & Lana Al-Yahya - 1-40 A Review on Millimeter-Wave Hybrid Beamforming for Wireless Intelligent Transport Systems
by Waleed Shahjehan & Rajkumar Singh Rathore & Syed Waqar Shah & Mohammad Aljaidi & Ali Safaa Sadiq & Omprakash Kaiwartya
August 2024, Volume 16, Issue 9
- 1-14 AI Services-Oriented Dynamic Computing Resource Scheduling Algorithm Based on Distributed Data Parallelism in Edge Computing Network of Smart Grid
by Jing Zou & Peizhe Xin & Chang Wang & Heli Zhang & Lei Wei & Ying Wang - 1-15 Personalized Visualization of the Gestures of Parkinson’s Disease Patients with Virtual Reality
by Konstantinos Sakkas & Eirini Georgia Dimitriou & Niki Eleni Ntagka & Nikolaos Giannakeas & Konstantinos Kalafatakis & Alexandros T. Tzallas & Evripidis Glavas - 1-16 A Survey on Data Availability in Layer 2 Blockchain Rollups: Open Challenges and Future Improvements
by Muhammad Bin Saif & Sara Migliorini & Fausto Spoto - 1-18 Evaluation of a New-Concept Secure File Server Solution
by Gábor Arányi & Ágnes Vathy-Fogarassy & Veronika Szücs - 1-18 Predictive Maintenance Based on Identity Resolution and Transformers in IIoT
by Zhibo Qi & Lei Du & Ru Huo & Tao Huang - 1-19 PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA
by Parisa Mashreghi-Moghadam & Tarek Ould-Bachir & Yvon Savaria - 1-22 Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays
by Marco Grossi & Fabrizio Alfonsi & Marco Prandini & Alessandro Gabrielli - 1-23 The Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications
by Fabian Nunes & Patrício Domingues & Miguel Frade - 1-24 Improved Adaptive Backoff Algorithm for Optimal Channel Utilization in Large-Scale IEEE 802.15.4-Based Wireless Body Area Networks
by Mounib Khanafer & Mouhcine Guennoun & Mohammed El-Abd & Hussein T. Mouftah - 1-27 A Multiparty Quantum Private Equality Comparison Scheme Relying on | GHZ 3 〉 States
by Theodore Andronikos & Alla Sirokofskich - 1-29 User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou & Salma Sassi & Elie Chicha & Richard Chbeir & Jules Degila - 1-32 Artificial Intelligence Applications in Smart Healthcare: A Survey
by Xian Gao & Peixiong He & Yi Zhou & Xiao Qin - 1-33 CrossDeFi: A Novel Cross-Chain Communication Protocol
by Shezon Saleem Mohammed Abdul & Anup Shrestha & Jianming Yong
August 2024, Volume 16, Issue 8
- 1-12 Establishing a Model for the User Acceptance of Cybersecurity Training
by Wesam Fallatah & Joakim Kävrestad & Steven Furnell - 1-13 Dynamic Storage Optimization for Communication between AI Agents
by Andrei Tara & Hjalmar K. Turesson & Nicolae Natea - 1-15 Advanced Denoising and Meta-Learning Techniques for Enhancing Smart Health Monitoring Using Wearable Sensors
by Minyechil Alehegn Tefera & Amare Mulatie Dehnaw & Yibeltal Chanie Manie & Cheng-Kai Yao & Shegaw Demessie Bogale & Peng-Chun Peng - 1-16 Masketeer: An Ensemble-Based Pseudonymization Tool with Entity Recognition for German Unstructured Medical Free Text
by Martin Baumgartner & Karl Kreiner & Fabian Wiesmüller & Dieter Hayn & Christian Puelacher & Günter Schreier - 1-16 Cross-Domain Fake News Detection Using a Prompt-Based Approach
by Jawaher Alghamdi & Yuqing Lin & Suhuai Luo - 1-16 Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks
by Janith K. Dassanayake & Minxiao Wang & Muhammad Z. Hameed & Ning Yang - 1-16 Development of a Novel Open Control System Implementation Method under Industrial IoT
by Lisi Liu & Zijie Xu & Xiaobin Qu - 1-17 Dynamic Graph Representation Learning for Passenger Behavior Prediction
by Mingxuan Xie & Tao Zou & Junchen Ye & Bowen Du & Runhe Huang - 1-18 Leveraging Internet News-Based Data for Rockfall Hazard Susceptibility Assessment on Highways
by Kieu Anh Nguyen & Yi-Jia Jiang & Chiao-Shin Huang & Meng-Hsun Kuo & Walter Chen - 1-19 TRUST-ME : Trust-Based Resource Allocation and Server Selection in Multi-Access Edge Computing
by Sean Tsikteris & Aisha B Rahman & Md. Sadman Siraj & Eirini Eleni Tsiropoulou - 1-19 A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things
by Yunus Kareem & Djamel Djenouri & Essam Ghadafi - 1-19 An Innovative Recompression Scheme for VQ Index Tables
by Yijie Lin & Jui-Chuan Liu & Ching-Chun Chang & Chin-Chen Chang - 1-20 Explainable Artificial Intelligence Approach for Improving Head-Mounted Fault Display Systems
by Abdelaziz Bouzidi & Lala Rajaoarisoa & Luka Claeys - 1-20 A Microservice-Based Smart Agriculture System to Detect Animal Intrusion at the Edge
by Jinpeng Miao & Dasari Rajasekhar & Shivakant Mishra & Sanjeet Kumar Nayak & Ramanarayan Yadav - 1-21 Dynamic Fashion Video Synthesis from Static Imagery
by Tasin Islam & Alina Miron & Xiaohui Liu & Yongmin Li - 1-22 Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator
by Francesco Fiorini & Michele Pagano & Rosario Giuseppe Garroppo & Antonio Osele - 1-22 Blockchain Technology and Its Potential to Benefit Public Services Provision: A Short Survey
by Giorgio Piccardo & Lorenzo Conti & Alessio Martino - 1-22 Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
by Daniel Christian Lawo & Rana Abu Bakar & Abraham Cano Aguilera & Filippo Cugini & José Luis Imaña & Idelfonso Tafur Monroy & Juan Jose Vegas Olmos - 1-22 A Method to Optimize Deployment of Directional Sensors for Coverage Enhancement in the Sensing Layer of IoT
by Peng Wang & Yonghua Xiong - 1-23 Virtual Reality in the Classroom: Transforming the Teaching of Electrical Circuits in the Digital Age
by Diego Alejandro Albarracin-Acero & Fidel Alfonso Romero-Toledo & Claudia Esperanza Saavedra-Bautista & Edwan Anderson Ariza-Echeverri - 1-24 Machine Learning-Assisted Dynamic Proximity-Driven Sorting Algorithm for Supermarket Navigation Optimization: A Simulation-Based Validation
by Vincent Abella & Johnfil Initan & Jake Mark Perez & Philip Virgil Astillo & Luis Gerardo Cañete & Gaurav Choudhary - 1-24 Testing Stimulus Equivalence in Transformer-Based Agents
by Alexis Carrillo & Moisés Betancort - 1-25 Overlay and Virtual Private Networks Security Performances Analysis with Open Source Infrastructure Deployment
by Antonio Francesco Gentile & Davide Macrì & Emilio Greco & Peppino Fazio - 1-25 Multi-Class Intrusion Detection Based on Transformer for IoT Networks Using CIC-IoT-2023 Dataset
by Shu-Ming Tseng & Yan-Qi Wang & Yung-Chung Wang - 1-27 Beat the Heat: Syscall Attack Detection via Thermal Side Channel
by Teodora Vasilas & Claudiu Bacila & Remus Brad - 1-28 FIVADMI: A Framework for In-Vehicle Anomaly Detection by Monitoring and Isolation
by Khaled Mahbub & Antonio Nehme & Mohammad Patwary & Marc Lacoste & Sylvain Allio - 1-29 A Survey on the Use of Large Language Models (LLMs) in Fake News
by Eleftheria Papageorgiou & Christos Chronis & Iraklis Varlamis & Yassine Himeur - 1-33 Artificial Intelligence of Things as New Paradigm in Aviation Health Monitoring Systems
by Igor Kabashkin & Leonid Shoshin - 1-37 Early Ransomware Detection with Deep Learning Models
by Matan Davidian & Michael Kiperberg & Natalia Vanetik
July 2024, Volume 16, Issue 8
- 1-15 Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor
by Mohsin Khan & Håvard Dagenborg & Dag Johansen - 1-15 A Low-Complexity Solution for Optimizing Binary Intelligent Reflecting Surfaces towards Wireless Communication
by Santosh A. Janawade & Prabu Krishnan & Krishnamoorthy Kandasamy & Shashank S. Holla & Karthik Rao & Aditya Chandrasekar - 1-16 Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
by Naonobu Okazaki & Shotaro Usuzaki & Tsubasa Waki & Hyoga Kawagoe & Mirang Park & Hisaaki Yamaba & Kentaro Aburada - 1-16 Leveraging Medical Knowledge Graphs and Large Language Models for Enhanced Mental Disorder Information Extraction
by Chaelim Park & Hayoung Lee & Ok-ran Jeong - 1-17 Enhancing Recognition of Human–Object Interaction from Visual Data Using Egocentric Wearable Camera
by Danish Hamid & Muhammad Ehatisham Ul Haq & Amanullah Yasin & Fiza Murtaza & Muhammad Awais Azam - 1-17 A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments
by Noah Oghenefego Ogwara & Krassie Petrova & Mee Loong Yang & Stephen G. MacDonell - 1-18 Power-Efficient Resource Allocation for Active STAR-RIS-Aided SWIPT Communication Systems
by Chuanzhe Gao & Shidang Li & Yixuan Wu & Siyi Duan & Mingsheng Wei & Bencheng Yu - 1-18 Modeling Trust in IoT Systems for Drinking-Water Management
by Aicha Aiche & Pierre-Martin Tardif & Mohammed Erritali - 1-19 Software-Defined Named Data Networking in Literature: A Review
by Albatool Alhawas & Abdelfettah Belghith - 1-19 Energy Efficiency and Load Optimization in Heterogeneous Networks through Dynamic Sleep Strategies: A Constraint-Based Optimization Approach
by Amna Shabbir & Muhammad Faizan Shirazi & Safdar Rizvi & Sadique Ahmad & Abdelhamied A. Ateya - 1-19 Ontology in Hybrid Intelligence: A Concise Literature Review
by Salvatore Flavio Pileggi - 1-20 MIMA: Multi-Feature Interaction Meta-Path Aggregation Heterogeneous Graph Neural Network for Recommendations
by Yang Li & Shichao Yan & Fangtao Zhao & Yi Jiang & Shuai Chen & Lei Wang & Li Ma - 1-21 Empowering Clinical Engineering and Evidence-Based Maintenance with IoT and Indoor Navigation
by Alessio Luschi & Giovanni Luca Daino & Gianpaolo Ghisalberti & Vincenzo Mezzatesta & Ernesto Iadanza - 1-23 Towards Collaborative Edge Intelligence: Blockchain-Based Data Valuation and Scheduling for Improved Quality of Service
by Yao Du & Zehua Wang & Cyril Leung & Victor C. M. Leung - 1-31 A Novel Deep Learning Framework for Intrusion Detection Systems in Wireless Network
by Khoa Dinh Nguyen Dang & Peppino Fazio & Miroslav Voznak - 1-37 Active Queue Management in L4S with Asynchronous Advantage Actor-Critic: A FreeBSD Networking Stack Perspective
by Deol Satish & Jonathan Kua & Shiva Raj Pokhrel
June 2024, Volume 16, Issue 7
- 1-4 Edge Cloud Computing and Federated–Split Learning in Internet of Things
by Qiang Duan & Zhihui Lu - 1-14 Digital Transformation in the Construction Sector: Blockchain, BIM and SSI for a More Sustainable and Transparent System
by Luisanna Cocco & Roberto Tonelli - 1-16 INFLUTRUST : Trust-Based Influencer Marketing Campaigns in Online Social Networks
by Adedamola Adesokan & Aisha B Rahman & Eirini Eleni Tsiropoulou - 1-16 Exploring the Architectural Composition of Cyber Ranges: A Systematic Review
by Dionysios Stamatopoulos & Menelaos Katsantonis & Panagiotis Fouliras & Ioannis Mavridis - 1-17 Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation
by Bhavani Malisetty & Alfredo J. Perez - 1-18 Trusted Composition of Internet of Medical Things over Imperfect Networks
by Ehsan Ahmad & Brian Larson & Abdulbasid Banga - 1-19 Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics
by Pietro Ruiu & Salvatore Saiu & Enrico Grosso - 1-20 Differential Private Federated Learning in Geographically Distributed Public Administration Processes
by Mirwais Ahmadzai & Giang Nguyen - 1-20 Performance Impact of Nested Congestion Control on Transport-Layer Multipath Tunneling
by Marcus Pieska & Andreas Kassler & Anna Brunstrom & Veselin Rakocevic & Markus Amend - 1-21 Transforming Network Management: Intent-Based Flexible Control Empowered by Efficient Flow-Centric Visibility
by Aris Cahyadi Risdianto & Muhammad Usman & Muhammad Ahmad Rathore - 1-23 A Systematic Review and Comprehensive Analysis of Pioneering AI Chatbot Models from Education to Healthcare: ChatGPT, Bard, Llama, Ernie and Grok
by Ketmanto Wangsa & Shakir Karim & Ergun Gide & Mahmoud Elkhodr - 1-23 Combining Advanced Feature-Selection Methods to Uncover Atypical Energy-Consumption Patterns
by Lucas Henriques & Felipe Prata Lima & Cecilia Castro - 1-23 Smart Irrigation Systems from Cyber–Physical Perspective: State of Art and Future Directions
by Mian Qian & Cheng Qian & Guobin Xu & Pu Tian & Wei Yu - 1-27 Building Information Modeling and Digital Twins for Functional and Technical Design of Smart Buildings with Distributed IoT Networks—Review and New Challenges Discussion
by Gabriela Walczyk & Andrzej Ożadowicz - 1-33 Mapping How Artificial Intelligence Blends with Healthcare: Insights from a Bibliometric Analysis
by Loukas Triantafyllopoulos & Evgenia Paxinou & Georgios Feretzakis & Dimitris Kalles & Vassilios S. Verykios - 1-36 Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies
by José Cunha & Pedro Ferreira & Eva M. Castro & Paula Cristina Oliveira & Maria João Nicolau & Iván Núñez & Xosé Ramon Sousa & Carlos Serôdio
July 2024, Volume 16, Issue 7
- 1-15 Explainable Artificial Intelligence Methods to Enhance Transparency and Trust in Digital Deliberation Settings
by Ilias Siachos & Nikos Karacapilidis - 1-15 Intrusion Detection in IoT Using Deep Residual Networks with Attention Mechanisms
by Bo Cui & Yachao Chai & Zhen Yang & Keqin Li - 1-16 Software-Bus-Toolchain (SBT): Introducing a Versatile Method for Quickly Implementing (I)IoT-Scenarios
by Simon D. Duque Anton - 1-16 Enhancing Autonomous Driving Navigation Using Soft Actor-Critic
by Badr Ben Elallid & Nabil Benamar & Miloud Bagaa & Yassine Hadjadj-Aoul - 1-16 The Use of Virtual Reality in the Countries of the Central American Bank for Economic Integration (CABEI)
by Álvaro Antón-Sancho & Pablo Fernández-Arias & Edwan Anderson Ariza & Diego Vergara - 1-17 Evaluating Convolutional Neural Networks and Vision Transformers for Baby Cry Sound Analysis
by Samir A. Younis & Dalia Sobhy & Noha S. Tawfik - 1-17 Emotion Recognition from Videos Using Multimodal Large Language Models
by Lorenzo Vaiani & Luca Cagliero & Paolo Garza - 1-17 SD-GPSR: A Software-Defined Greedy Perimeter Stateless Routing Method Based on Geographic Location Information
by Shaopei Gao & Qiang Liu & Junjie Zeng & Li Li - 1-18 A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model
by Enbo Sun & Jiaxuan Han & Yiquan Li & Cheng Huang - 1-18 Optimizing Drone Energy Use for Emergency Communications in Disasters via Deep Reinforcement Learning
by Wen Qiu & Xun Shao & Hiroshi Masui & William Liu - 1-20 Dynamic SNR, Spectral Efficiency, and Rate Characterization in 5G/6G mmWave/sub-THz Systems with Macro- and Micro-Mobilities
by Darya Ostrikova & Elizaveta Golos & Vitalii Beschastnyi & Egor Machnev & Yuliya Gaidamaka & Konstantin Samouylov - 1-21 Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System
by Imen Ahmed & Mariem Turki & Mouna Baklouti & Bouthaina Dammak & Amnah Alshahrani - 1-22 Behind the Code: Identifying Zero-Day Exploits in WordPress
by Mohamed Azarudheen Mohamed Mohideen & Muhammad Shahroz Nadeem & James Hardy & Haider Ali & Umair Ullah Tariq & Fariza Sabrina & Muhammad Waqar & Salman Ahmed - 1-23 Watch the Skies: A Study on Drone Attack Vectors, Forensic Approaches, and Persisting Security Challenges
by Amr Adel & Tony Jan - 1-24 Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System
by Sara Lazzaro & Francesco Buccafurri - 1-25 Multi-Agent Dynamic Fog Service Placement Approach
by Nerijus Šatkauskas & Algimantas Venčkauskas - 1-27 Does Anyone Care about the Opinion of People on Participating in a “Social” Metaverse? A Review and a Draft Proposal for a Surveying Tool
by Stefano Mottura - 1-29 A Novel Hybrid Unsupervised Learning Approach for Enhanced Cybersecurity in the IoT
by Prabu Kaliyaperumal & Sudhakar Periyasamy & Manikandan Thirumalaisamy & Balamurugan Balusamy & Francesco Benedetto - 1-32 Human–AI Collaboration for Remote Sighted Assistance: Perspectives from the LLM Era
by Rui Yu & Sooyeon Lee & Jingyi Xie & Syed Masum Billah & John M. Carroll - 1-34 Microservice-Based Vehicular Network for Seamless and Ultra-Reliable Communications of Connected Vehicles
by Mira M. Zarie & Abdelhamied A. Ateya & Mohammed S. Sayed & Mohammed ElAffendi & Mohammad Mahmoud Abdellatif - 1-35 TWIN-ADAPT: Continuous Learning for Digital Twin-Enabled Online Anomaly Classification in IoT-Driven Smart Labs
by Ragini Gupta & Beitong Tian & Yaohui Wang & Klara Nahrstedt - 1-36 Blockchain Financial Statements: Innovating Financial Reporting, Accounting, and Liquidity Management
by Natalia Dashkevich & Steve Counsell & Giuseppe Destefanis - 1-44 NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization
by Oleksandr Kuznetsov & Emanuele Frontoni & Kateryna Kuznetsova & Ruslan Shevchuk & Mikolaj Karpinski
May 2024, Volume 16, Issue 6
- 1-14 Object and Event Detection Pipeline for Rink Hockey Games
by Jorge Miguel Lopes & Luis Paulo Mota & Samuel Marques Mota & José Manuel Torres & Rui Silva Moreira & Christophe Soares & Ivo Pereira & Feliz Ribeiro Gouveia & Pedro Sobral - 1-14 Research on Multi-Modal Pedestrian Detection and Tracking Algorithm Based on Deep Learning
by Rui Zhao & Jutao Hao & Huan Huo - 1-15 Tracing Student Activity Patterns in E-Learning Environments: Insights into Academic Performance
by Evgenia Paxinou & Georgios Feretzakis & Rozita Tsoni & Dimitrios Karapiperis & Dimitrios Kalles & Vassilios S. Verykios - 1-16 Urban Green Spaces and Mental Well-Being: A Systematic Review of Studies Comparing Virtual Reality versus Real Nature
by Liyuan Liang & Like Gobeawan & Siu-Kit Lau & Ervine Shengwei Lin & Kai Keng Ang - 1-16 Enhancing Sensor Data Imputation: OWA-Based Model Aggregation for Missing Values
by Muthana Al-Amidie & Laith Alzubaidi & Muhammad Aminul Islam & Derek T. Anderson - 1-16 Prophet–CEEMDAN–ARBiLSTM-Based Model for Short-Term Load Forecasting
by Jindong Yang & Xiran Zhang & Wenhao Chen & Fei Rong - 1-17 Enhanced Beacons Dynamic Transmission over TSCH
by Erik Ortiz Guerra & Mario Martínez Morfa & Carlos Manuel García Algora & Hector Cruz-Enriquez & Kris Steenhaut & Samuel Montejo-Sánchez - 1-19 Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids
by Fouzi Harrou & Benamar Bouyeddou & Abdelkader Dairi & Ying Sun - 1-19 Data Collection in Areas without Infrastructure Using LoRa Technology and a Quadrotor
by Josué I. Rojo-García & Sergio A. Vera-Chavarría & Yair Lozano-Hernández & Victor G. Sánchez-Meza & Jaime González-Sierra & Luz N. Oliva-Moreno - 1-19 Studying the Quality of Source Code Generated by Different AI Generative Engines: An Empirical Evaluation
by Davide Tosi - 1-19 GreenLab, an IoT-Based Small-Scale Smart Greenhouse
by Cristian Volosciuc & Răzvan Bogdan & Bianca Blajovan & Cristina Stângaciu & Marius Marcu - 1-20 MADDPG-Based Offloading Strategy for Timing-Dependent Tasks in Edge Computing
by Yuchen Wang & Zishan Huang & Zhongcheng Wei & Jijun Zhao - 1-20 Dynamic Spatial–Temporal Self-Attention Network for Traffic Flow Prediction
by Dong Wang & Hongji Yang & Hua Zhou - 1-21 Using ChatGPT in Software Requirements Engineering: A Comprehensive Review
by Nuno Marques & Rodrigo Rocha Silva & Jorge Bernardino - 1-21 Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks
by Ayman Khalil & Besma Zeddini - 1-21 HP-LSTM: Hawkes Process–LSTM-Based Detection of DDoS Attack for In-Vehicle Network
by Xingyu Li & Ruifeng Li & Yanchen Liu - 1-22 Harnessing the Cloud: A Novel Approach to Smart Solar Plant Monitoring
by Mohammad Imran Ali & Shahi Dost & Khurram Shehzad Khattak & Muhammad Imran Khan & Riaz Muhammad
June 2024, Volume 16, Issue 6
- 1-12 Adapting Self-Regulated Learning in an Age of Generative Artificial Intelligence Chatbots
by Joel Weijia Lai - 1-13 IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
by Umang Garg & Santosh Kumar & Aniket Mahanti - 1-14 Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-Group Partition and Closest Pair Prediction
by Xu Wang & Jui-Chuan Liu & Ching-Chun Chang & Chin-Chen Chang - 1-14 Improved Particle Filter in Machine Learning-Based BLE Fingerprinting Method to Reduce Indoor Location Estimation Errors
by Jingshi Qian & Jiahe Li & Nobuyoshi Komuro & Won-Suk Kim & Younghwan Yoo - 1-14 Discovery of Cloud Applications from Logs
by Ashot Harutyunyan & Arnak Poghosyan & Tigran Bunarjyan & Andranik Haroyan & Marine Harutyunyan & Lilit Harutyunyan & Nelson Baloian - 1-15 Metaverse and Fashion: An Analysis of Consumer Online Interest
by Carmen Ruiz Viñals & Marta Gil Ibáñez & José Luis Del Olmo Arriaga - 1-16 Enabling End-User Development in Smart Homes: A Machine Learning-Powered Digital Twin for Energy Efficient Management
by Luca Cotti & Davide Guizzardi & Barbara Rita Barricelli & Daniela Fogli - 1-17 The Use of Artificial Intelligence in eParticipation: Mapping Current Research
by Zisis Vasilakopoulos & Theocharis Tavantzis & Rafail Promikyridis & Efthimios Tambouris - 1-17 Learning Modality Consistency and Difference Information with Multitask Learning for Multimodal Sentiment Analysis
by Cheng Fang & Feifei Liang & Tianchi Li & Fangheng Guan - 1-17 Adaptive Framework for Maintenance Scheduling Based on Dynamic Preventive Intervals and Remaining Useful Life Estimation
by Pedro Nunes & Eugénio Rocha & José Santos - 1-18 In-Home Evaluation of the Neo Care Artificial Intelligence Sound-Based Fall Detection System
by Carol Maher & Kylie A. Dankiw & Ben Singh & Svetlana Bogomolova & Rachel G. Curtis - 1-18 Towards a New Business Model for Streaming Platforms Using Blockchain Technology
by Rendrikson Soares & André Araújo - 1-18 Optimizing Data Parallelism for FM-Based Short-Read Alignment on the Heterogeneous Non-Uniform Memory Access Architectures
by Shaolong Chen & Yunzi Dai & Liwei Liu & Xinting Yu - 1-19 Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models
by Héctor Orrillo & André Sabino & Mário Marques da Silva - 1-22 Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems
by Tahani Baabdullah & Amani Alzahrani & Danda B. Rawat & Chunmei Liu - 1-22 Implementation of Lightweight Machine Learning-Based Intrusion Detection System on IoT Devices of Smart Homes
by Abbas Javed & Amna Ehtsham & Muhammad Jawad & Muhammad Naeem Awais & Ayyaz-ul-Haq Qureshi & Hadi Larijani - 1-23 Usability Evaluation of Wearable Smartwatches Using Customized Heuristics and System Usability Scale Score
by Majed A. Alshamari & Maha M. Althobaiti - 1-25 Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction
by Wala Bagunaid & Naveen Chilamkurti & Ahmad Salehi Shahraki & Saeed Bamashmos - 1-29 Metric Space Indices for Dynamic Optimization in a Peer to Peer-Based Image Classification Crowdsourcing Platform
by Fernando Loor & Veronica Gil-Costa & Mauricio Marin - 1-29 Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks
by Wuzheng Tan & Shenglong Du & Jian Weng - 1-32 Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies
by Gabriel Arquelau Pimenta Rodrigues & André Luiz Marques Serrano & Guilherme Fay Vergara & Robson de Oliveira Albuquerque & Georges Daniel Amvame Nze - 1-32 Development of a Theoretical Model for Digital Risks Arising from the Implementation of Industry 4.0 (TMR-I4.0)
by Vitor Hugo dos Santos Filho & Luis Maurício Martins de Resende & Joseane Pontes - 1-40 Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks
by Jiayi Zhang & Abdelkader Ouda & Raafat Abu-Rukba
April 2024, Volume 16, Issue 5
- 1-13 Novel Approach towards a Fully Deep Learning-Based IoT Receiver Architecture: From Estimation to Decoding
by Matthew Boeding & Michael Hempel & Hamid Sharif - 1-15 Exploring Data Input Problems in Mixed Reality Environments: Proposal and Evaluation of Natural Interaction Techniques
by Jingzhe Zhang & Tiange Chen & Wenjie Gong & Jiayue Liu & Jiangjie Chen - 1-15 A Hybrid Multi-Agent Reinforcement Learning Approach for Spectrum Sharing in Vehicular Networks
by Mansoor Jamal & Zaib Ullah & Muddasar Naeem & Musarat Abbas & Antonio Coronato - 1-16 Effective Monoaural Speech Separation through Convolutional Top-Down Multi-View Network
by Aye Nyein Aung & Che-Wei Liao & Jeih-Weih Hung - 1-18 Median Absolute Deviation for BGP Anomaly Detection
by Maria Andrea Romo-Chavero & Jose Antonio Cantoral-Ceballos & Jesus Arturo Pérez-Díaz & Carlos Martinez-Cagnazzo - 1-19 Anticipating Job Market Demands—A Deep Learning Approach to Determining the Future Readiness of Professional Skills
by Albert Weichselbraun & Norman Süsstrunk & Roger Waldvogel & André Glatzl & Adrian M. P. Braşoveanu & Arno Scharl - 1-22 HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security
by Yazan Aref & Abdelkader Ouda - 1-22 A Blockchain-Based Real-Time Power Balancing Service for Trustless Renewable Energy Grids
by Andrea Calvagna & Giovanni Marotta & Giuseppe Pappalardo & Emiliano Tramontana - 1-23 A Novel Traffic Classification Approach by Employing Deep Learning on Software-Defined Networking
by Daniel Nuñez-Agurto & Walter Fuertes & Luis Marrone & Eduardo Benavides-Astudillo & Christian Coronel-Guerrero & Franklin Perez - 1-25 A New Generation of Collaborative Immersive Analytics on the Web: Open-Source Services to Capture, Process and Inspect Users’ Sessions in 3D Environments
by Bruno Fanini & Giorgio Gosti - 1-27 A Method for the Rapid Propagation of Emergency Event Notifications in a Long Vehicle Convoy
by John David Sprunger & Alvin Lim & David M. Bevly - 1-27 A Fair Crowd-Sourced Automotive Data Monetization Approach Using Substrate Hybrid Consensus Blockchain
by Cyril Naves Samuel & François Verdier & Severine Glock & Patricia Guitton-Ouhamou - 1-37 Design and Implementation of a Low-Cost, Linear Robotic Camera System, Targeting Greenhouse Plant Growth Monitoring
by Zacharias Kamarianakis & Spyros Perdikakis & Ioannis N. Daliakopoulos & Dimitrios M. Papadimitriou & Spyros Panagiotakis
May 2024, Volume 16, Issue 5
- 1-13 Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization
by Zhe Ma & Xuhesheng Chen & Tiejiang Sun & Xukang Wang & Ying Cheng Wu & Mengjie Zhou - 1-15 AI-Empowered Multimodal Hierarchical Graph-Based Learning for Situation Awareness on Enhancing Disaster Responses
by Jieli Chen & Kah Phooi Seng & Li Minn Ang & Jeremy Smith & Hanyue Xu - 1-15 SmartDED: A Blockchain- and Smart Contract-Based Digital Electronic Detonator Safety Supervision System
by Na Liu & Wei-Tek Tsai - 1-16 Optimization of Wheelchair Control via Multi-Modal Integration: Combining Webcam and EEG
by Lassaad Zaway & Nader Ben Amor & Jalel Ktari & Mohamed Jallouli & Larbi Chrifi Alaoui & Laurent Delahoche - 1-16 Blockchain and Smart Contracts for Digital Copyright Protection
by Franco Frattolillo - 1-17 Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications
by Tuan-Kiet Dang & Khai-Duy Nguyen & Binh Kieu-Do-Nguyen & Trong-Thuc Hoang & Cong-Kha Pham - 1-18 Optimizing Requirements Prioritization for IoT Applications Using Extended Analytical Hierarchical Process and an Advanced Grouping Framework
by Sarah Kaleem & Muhammad Asim & Mohammed El-Affendi & Muhammad Babar - 1-18 pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework
by Yu Zhang & Xiaowei Peng & Hequn Xian - 1-18 Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments
by Sonali Patwe & Sunil B. Mane - 1-18 MetaSSI: A Framework for Personal Data Protection, Enhanced Cybersecurity and Privacy in Metaverse Virtual Reality Platforms
by Faisal Fiaz & Syed Muhammad Sajjad & Zafar Iqbal & Muhammad Yousaf & Zia Muhammad - 1-19 BPET: A Unified Blockchain-Based Framework for Peer-to-Peer Energy Trading
by Caixiang Fan & Hamzeh Khazaei & Petr Musilek - 1-19 Chatbots in Airport Customer Service—Exploring Use Cases and Technology Acceptance
by Isabel Auer & Stephan Schlögl & Gundula Glowka - 1-20 Reconfigurable-Intelligent-Surface-Enhanced Dynamic Resource Allocation for the Social Internet of Electric Vehicle Charging Networks with Causal-Structure-Based Reinforcement Learning
by Yuzhu Zhang & Hao Xu - 1-20 Using Optimization Techniques in Grammatical Evolution
by Ioannis G. Tsoulos & Alexandros Tzallas & Evangelos Karvounis - 1-21 TQU-SLAM Benchmark Dataset for Comparative Study to Build Visual Odometry Based on Extracted Features from Feature Descriptors and Deep Learning
by Thi-Hao Nguyen & Van-Hung Le & Huu-Son Do & Trung-Hieu Te & Van-Nam Phan - 1-22 A Hybrid Semi-Automated Workflow for Systematic and Literature Review Processes with Large Language Model Analysis
by Anjia Ye & Ananda Maiti & Matthew Schmidt & Scott J. Pedersen