Content
October 2022, Volume 14, Issue 11
- 1-13 A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G
by Faycal Bouhafs & Alessandro Raschellà & Michael Mackay & Frank den Hartog - 1-15 Ambient Environmental Parameter Estimation for Reliable Diffusive Molecular Communications
by Shota Toriyama & Shoma Hasegawa & Jens Kirchner & Georg Fischer & Daisuke Anzai - 1-15 A Multi-Gateway Behaviour Study for Traffic-Oriented LoRaWAN Deployment
by Kerima Saleh Abakar & Ismail Bennis & Abdelhafid Abouaissa & Pascal Lorenz - 1-16 What Is Metaverse?—A Definition Based on Qualitative Meta-Synthesis
by Markus Weinberger - 1-17 Decision Support Using Machine Learning Indication for Financial Investment
by Ariel Vieira de Oliveira & Márcia Cristina Schiavi Dazzi & Anita Maria da Rocha Fernandes & Rudimar Luis Scaranto Dazzi & Paulo Ferreira & Valderi Reis Quietinho Leithardt - 1-17 Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing
by Tianyu Bai & Song Fu & Qing Yang - 1-19 Real-Time Flood Monitoring with Computer Vision through Edge Computing-Based Internet of Things
by Obaid Rafiq Jan & Hudyjaya Siswoyo Jo & Riady Siswoyo Jo & Jonathan Kua - 1-21 Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
by Rasheed Gbenga Jimoh & Olayinka Olufunmilayo Olusanya & Joseph Bamidele Awotunde & Agbotiname Lucky Imoize & Cheng-Chi Lee - 1-21 LoRaWAN Network Downlink Routing Control Strategy Based on the SDN Framework and Improved ARIMA Model
by Qi Qian & Liang Shu & Yuxiang Leng & Zhizhou Bao - 1-21 EduTVA: Metadata Schema for Educational Audiovisual Contents in Digital Television Environments
by Angela M. Vargas-Arcila & Julian A. Caicedo-Muñoz & Felipe Estrada-Solano & Carlos González-Amarillo & Armando Ordonez & Jose L. Arciniegas - 1-22 Analysis of Data from Surveys for the Identification of the Factors That Influence the Migration of Small Companies to eCommerce
by William Villegas-Ch. & Santiago Criollo-C & Walter Gaibor-Naranjo & Xavier Palacios-Pacheco - 1-25 Privacy Goals for the Data Lifecycle
by Jane Henriksen-Bulmer & Cagatay Yucel & Shamal Faily & Ioannis Chalkias - 1-43 Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects
by Christoph Stach & Clémentine Gritti & Julia Bräcker & Michael Behringer & Bernhard Mitschang
November 2022, Volume 14, Issue 11
- 1-2 Internet of Things and Cyber–Physical Systems
by Iwona Grobelna - 1-2 Editorial for the Special Issue on 5G Enabling Technologies and Wireless Networking
by Michael Mackay - 1-3 Editorial for the Special Issue “Selected Papers from the 9th Annual Conference ‘Comparative Media Studies in Today’s World’ (CMSTW’2021)”
by Svetlana S. Bodrunova - 1-4 Special Issue on Security and Privacy in Blockchains and the IoT
by Christoph Stach - 1-6 Collaborative and Intelligent Networks and Decision Systems and Services for Supporting Engineering and Production Management
by Leonilde Varela & Goran D. Putnik - 1-12 Real-Time Image Detection for Edge Devices: A Peach Fruit Detection Application
by Eduardo Assunção & Pedro D. Gaspar & Khadijeh Alibabaei & Maria P. Simões & Hugo Proença & Vasco N. G. J. Soares & João M. L. P. Caldeira - 1-12 Key Competences for Lifelong Learning through the “Animal Crossing: New Horizons” Video Game
by Beatriz Villarejo-Carballido & Cristina M. Pulido & Santiago Tejedor - 1-12 The Future of Cybersecurity in the Age of Quantum Computers
by Fazal Raheman - 1-14 A Machine Learning Predictive Model to Detect Water Quality and Pollution
by Xiaoting Xu & Tin Lai & Sayka Jahan & Farnaz Farid & Abubakar Bello - 1-14 Financial Market Correlation Analysis and Stock Selection Application Based on TCN-Deep Clustering
by Yuefeng Cen & Mingxing Luo & Gang Cen & Cheng Zhao & Zhigang Cheng - 1-15 BERT- and BiLSTM-Based Sentiment Analysis of Online Chinese Buzzwords
by Xinlu Li & Yuanyuan Lei & Shengwei Ji - 1-15 Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models
by Sanjiban Sekhar Roy & Ali Ismail Awad & Lamesgen Adugnaw Amare & Mabrie Tesfaye Erkihun & Mohd Anas - 1-16 Users’ Perceptions of Key Blockchain Features in Games
by Iikka Paajala & Jesse Nyyssölä & Juho Mattila & Pasi Karppinen - 1-16 Reliable Application Layer Routing Using Decentralized Identifiers
by Khalid Alsubhi & Bander Alzahrani & Nikos Fotiou & Aiiad Albeshri & Mohammed Alreshoodi - 1-16 SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems
by Muhammad Asad & Muhammad Aslam & Syeda Fizzah Jilani & Saima Shaukat & Manabu Tsukada - 1-17 IoT-Based System for Improving Vehicular Safety by Continuous Traffic Violation Monitoring
by Yousef-Awwad Daraghmi & Mamoun Abu Helou & Eman-Yasser Daraghmi & Waheeb Abu-ulbeh - 1-18 Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures
by Fabian Honecker & Julian Dreyer & Ralf Tönjes - 1-19 A Dynamic Federated Identity Management Using OpenID Connect
by Ahmad Alsadeh & Nasri Yatim & Yousef Hassouneh - 1-19 Assessing Latency of Packet Delivery in the 5G 3GPP Integrated Access and Backhaul Architecture with Half-Duplex Constraints
by Nikita Polyakov & Anna Platonova - 1-20 A Comparison of Blockchain Recovery Time in Static and Mobile IoT-Blockchain Networks
by Yue Su & Kien Nguyen & Hiroo Sekiya - 1-21 Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network
by Yujian Zhang & Daifu Liu - 1-21 A Cost-Aware Framework for QoS-Based and Energy-Efficient Scheduling in Cloud–Fog Computing
by Husam Suleiman - 1-21 Data Synchronization: A Complete Theoretical Solution for Filesystems
by Elod P. Csirmaz & Laszlo Csirmaz - 1-22 Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing
by Gousia Habib & Sparsh Sharma & Sara Ibrahim & Imtiaz Ahmad & Shaima Qureshi & Malik Ishfaq - 1-23 Integrating Chatbot Media Automations in Professional Journalism: An Evaluation Framework
by Efthimis Kotenidis & Nikolaos Vryzas & Andreas Veglis & Charalampos Dimoulas - 1-24 Exploring the Design of a Mixed-Reality 3D Minimap to Enhance Pedestrian Satisfaction in Urban Exploratory Navigation
by Yiyi Zhang & Tatsuo Nakajima - 1-24 Generating Indicators of Disruptive Innovation Using Big Data
by Roger C. Brackin & Michael J. Jackson & Andrew Leyshon & Jeremy G. Morley & Sarah Jewitt - 1-31 The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
by Angeliki Kitsiou & Charikleia Despotidi & Christos Kalloniatis & Stefanos Gritzalis - 1-55 Evaluation of the Factors That Impact the Perception of Online Content Trustworthiness by Income, Political Affiliation and Online Usage Time
by Matthew Spradling & Jeremy Straub
October 2022, Volume 14, Issue 10
- 1-12 A Unified PUF and Crypto Core Exploiting the Metastability in Latches
by Ronaldo Serrano & Ckristian Duran & Marco Sarmiento & Tuan-Kiet Dang & Trong-Thuc Hoang & Cong-Kha Pham - 1-14 Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks
by Kirill Chemrov & Dmitry Bankov & Evgeny Khorov & Andrey Lyakhov - 1-15 A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
by Amit Sagu & Nasib Singh Gill & Preeti Gulia & Jyotir Moy Chatterjee & Ishaani Priyadarshini - 1-16 A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period
by Dawei Wei & Feifei Shi & Sahraoui Dhelim - 1-16 Improved Dragonfly Optimization Algorithm for Detecting IoT Outlier Sensors
by Maytham N. Meqdad & Seifedine Kadry & Hafiz Tayyab Rauf - 1-16 Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework
by Yves Adou & Ekaterina Markova & Yuliya Gaidamaka - 1-18 Natural Language Processing and Cognitive Networks Identify UK Insurers’ Trends in Investor Day Transcripts
by Stefan Claus & Massimo Stella - 1-20 Study of the Organization and Implementation of E-Learning in Wartime Inside Ukraine
by Liudmyla Matviichuk & Stefano Ferilli & Nataliia Hnedko - 1-21 A Comparative Study on Traffic Modeling Techniques for Predicting and Simulating Traffic Behavior
by Taghreed Alghamdi & Sifatul Mostafi & Ghadeer Abdelkader & Khalid Elgazzar - 1-23 Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages
by Ján Mojžiš & Peter Krammer & Marcel Kvassay & Lenka Skovajsová & Ladislav Hluchý - 1-28 Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach
by Leonardo Alberro & Felipe Velázquez & Sara Azpiroz & Eduardo Grampin & Matías Richart - 1-34 Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches
by Gengxian Li & Chundong Wang & Huaibin Wang - 1-52 A Survey of Wi-Fi 6: Technologies, Advances, and Challenges
by Erfan Mozaffariahrar & Fabrice Theoleyre & Michael Menth
September 2022, Volume 14, Issue 10
- 1-11 Minimization of n th Order Rate Matching in Satellite Networks with One to Many Pairings
by Anargyros J. Roumeliotis & Christos N. Efrem & Athanasios D. Panagopoulos - 1-12 An Efficient Location-Based Forwarding Strategy for Named Data Networking and LEO Satellite Communications
by Pablo Iglesias-Sanuy & José Carlos López-Ardao & Miguel Rodríguez-Pérez & Sergio Herrería-Alonso & Andrés Suárez-González & Raúl F. Rodríguez-Rubio - 1-13 Distributed Big Data Storage Infrastructure for Biomedical Research Featuring High-Performance and Rich-Features
by Xingjian Xu & Lijun Sun & Fanjun Meng - 1-13 Improving Quality Indicators of the Cloud-Based IoT Networks Using an Improved Form of Seagull Optimization Algorithm
by Hamza Mohammed Ridha Al-Khafaji - 1-13 Latency Analysis of Blockchain-Based SSI Applications
by Tamas Pflanzner & Hamza Baniata & Attila Kertesz - 1-13 Playful Meaning-Making as Prosocial Fun
by John M. Carroll & Fanlu Gui & Srishti Gupta & Tiffany Knearem - 1-14 Deep Learning Based Semantic Image Segmentation Methods for Classification of Web Page Imagery
by Ramya Krishna Manugunta & Rytis Maskeliūnas & Robertas Damaševičius - 1-16 Modelling Analysis of a Novel Frameless Slotted-ALOHA Protocol Based on the Number of Detectable Conflicting Users
by Sa Yang & Suoping Li & Nana Yang & Ying Lin - 1-17 Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden
by Francesco Pirotti & Marco Piragnolo & Marika D’Agostini & Raffaele Cavalli - 1-18 Automated Penetration Testing Framework for Smart-Home-Based IoT Devices
by Rohit Akhilesh & Oliver Bills & Naveen Chilamkurti & Mohammad Jabed Morshed Chowdhury - 1-20 Author Identification from Literary Articles with Visual Features: A Case Study with Bangla Documents
by Ankita Dhar & Himadri Mukherjee & Shibaprasad Sen & Md Obaidullah Sk & Amitabha Biswas & Teresa Gonçalves & Kaushik Roy - 1-20 The Combined Use of UAV-Based RGB and DEM Images for the Detection and Delineation of Orange Tree Crowns with Mask R-CNN: An Approach of Labeling and Unified Framework
by Felipe Lucena & Fabio Marcelo Breunig & Hermann Kux - 1-20 ReFuse: Generating Imperviousness Maps from Multi-Spectral Sentinel-2 Satellite Imagery
by Giovanni Giacco & Stefano Marrone & Giuliano Langella & Carlo Sansone - 1-20 Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
by Anna Kurtukova & Aleksandr Romanov & Alexander Shelupanov & Anastasia Fedotova - 1-21 Modeling and Validating a News Recommender Algorithm in a Mainstream Medium-Sized News Organization: An Experimental Approach
by Paschalia (Lia) Spyridou & Constantinos Djouvas & Dimitra Milioni - 1-23 Cloud-Native Observability: The Many-Faceted Benefits of Structured and Unified Logging—A Multi-Case Study
by Nane Kratzke - 1-24 FakeNewsLab: Experimental Study on Biases and Pitfalls Preventing Us from Distinguishing True from False News
by Giancarlo Ruffo & Alfonso Semeraro - 1-27 Analysis and Correlation between a Non-Invasive Sensor Network System in the Room and the Improvement of Sleep Quality
by Eduardo Morales-Vizcarra & Carolina Del-Valle-Soto & Paolo Visconti & Fabiola Cortes-Chavez - 1-36 An Enhanced ELECTRE II Method for Multi-Attribute Ontology Ranking with Z-Numbers and Probabilistic Linguistic Term Set
by Ameeth Sooklall & Jean Vincent Fonou-Dombeu
August 2022, Volume 14, Issue 9
- 1-11 Artificial Intelligence in Adaptive and Intelligent Educational System: A Review
by Jingwen Dong & Siti Nurulain Mohd Rum & Khairul Azhar Kasmiran & Teh Noranis Mohd Aris & Raihani Mohamed - 1-12 A Fairness Index Based on Rate Variance for Downlink Non-Orthogonal Multiple Access System
by Jie Yang & Jiajia Zhu & Ziyu Pan - 1-14 Design Technology and AI-Based Decision Making Model for Digital Twin Engineering
by Ekaterina V. Orlova - 1-15 Smart Classroom Teaching Strategy to Enhance Higher Order Thinking Skills (HOTS)—An Agile Approach for Education 4.0
by Sitalakshmi Venkatraman & Fahri Benli & Ye Wei & Fiona Wahr - 1-15 Use of Data Augmentation Techniques in Detection of Antisocial Behavior Using Deep Learning Methods
by Viera Maslej-Krešňáková & Martin Sarnovský & Júlia Jacková - 1-16 A Novel Machine Learning Prediction Model for Aerosol Transport in Upper 17-Generations of the Human Respiratory Tract
by Mohammad S. Islam & Shahid Husain & Jawed Mustafa & Yuantong Gu - 1-16 Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression
by Urmila Pilania & Rohit Tanwar & Mazdak Zamani & Azizah Abdul Manaf - 1-17 Translating Speech to Indian Sign Language Using Natural Language Processing
by Purushottam Sharma & Devesh Tulsian & Chaman Verma & Pratibha Sharma & Nancy Nancy - 1-17 Facial Expression Recognition Using Dual Path Feature Fusion and Stacked Attention
by Hongtao Zhu & Huahu Xu & Xiaojin Ma & Minjie Bian - 1-18 Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media
by Katerina Vgena & Angeliki Kitsiou & Christos Kalloniatis & Stefanos Gritzalis - 1-18 Intelligent Reflecting Surface-Aided Device-to-Device Communication: A Deep Reinforcement Learning Approach
by Ajmery Sultana & Xavier Fernando - 1-19 Leveraging Explainable AI to Support Cryptocurrency Investors
by Jacopo Fior & Luca Cagliero & Paolo Garza - 1-20 Blockchain-Based Cloud-Enabled Security Monitoring Using Internet of Things in Smart Agriculture
by Rajasekhar Chaganti & Vijayakumar Varadarajan & Venkata Subbarao Gorantla & Thippa Reddy Gadekallu & Vinayakumar Ravi - 1-22 Federated Learning and Its Role in the Privacy Preservation of IoT Devices
by Tanweer Alam & Ruchi Gupta - 1-23 Forecasting the Risk Factor of Frontier Markets: A Novel Stacking Ensemble of Neural Network Approach
by Mst. Shapna Akter & Hossain Shahriar & Reaz Chowdhury & M. R. C. Mahdy - 1-23 A Game-Theoretic Rent-Seeking Framework for Improving Multipath TCP Performance
by Shiva Raj Pokhrel & Carey Williamson - 1-31 Mathematical and Machine Learning Models for Groundwater Level Changes: A Systematic Review and Bibliographic Analysis
by Stephen Afrifa & Tao Zhang & Peter Appiahene & Vijayakumar Varadarajan
September 2022, Volume 14, Issue 9
- 1-15 Trade-offs between Risk and Operational Cost in SDN Failure Recovery Plan
by Saeed A. Astaneh & Shahram Shah Heydari & Sara Taghavi Motlagh & Alireza Izaddoost - 1-17 Low Power Blockchained E-Vote Platform for University Environment
by Faten Chaabane & Jalel Ktari & Tarek Frikha & Habib Hamam - 1-18 Retrieving Adversarial Cliques in Cognitive Communities: A New Conceptual Framework for Scientific Knowledge Graphs
by Renaud Fabre & Otmane Azeroual & Patrice Bellot & Joachim Schöpfel & Daniel Egret - 1-18 Assistance System for the Teaching of Natural Numbers to Preschool Children with the Use of Artificial Intelligence Algorithms
by William Villegas-Ch. & Angel Jaramillo-Alcázar & Aracely Mera-Navarrete - 1-18 Joint Scalable Video Coding and Transcoding Solutions for Fog-Computing-Assisted DASH Video Applications
by Majd Nafeh & Arash Bozorgchenani & Daniele Tarchi - 1-21 An Efficient Blockchain Transaction Retrieval System
by Hangwei Feng & Jinlin Wang & Yang Li - 1-27 A VPN Performances Analysis of Constrained Hardware Open Source Infrastructure Deploy in IoT Environment
by Antonio Francesco Gentile & Davide Macrì & Floriano De Rango & Mauro Tropea & Emilio Greco - 1-30 Approaches and Challenges in Internet of Robotic Things
by Aqsa Sayeed & Chaman Verma & Neerendra Kumar & Neha Koul & Zoltán Illés
August 2022, Volume 14, Issue 8
- 1-17 A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems
by Padmalochan Panda & Alekha Kumar Mishra & Deepak Puthal - 1-18 Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
by Ahmed Latif Yaser & Hamdy M. Mousa & Mahmoud Hussein - 1-20 A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees
by Francesco Buccafurri & Vincenzo De Angelis & Sara Lazzaro - 1-23 On the Potential of Enhancing Delay-Tolerant Routing Protocols via Age of Information
by Georgios Kallitsis & Vasileios Karyotis & Symeon Papavassiliou - 1-23 Machine Learning for Bankruptcy Prediction in the American Stock Market: Dataset and Benchmarks
by Gianfranco Lombardo & Mattia Pellegrino & George Adosoglou & Stefano Cagnoni & Panos M. Pardalos & Agostino Poggi - 1-27 Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks
by Usman Ali & Giuseppe Caso & Luca De Nardis & Konstantinos Kousias & Mohammad Rajiullah & Özgü Alay & Marco Neri & Anna Brunstrom & Maria-Gabriella Di Benedetto
July 2022, Volume 14, Issue 8
- 1-11 A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
by Muhsen Alkhalidy & Atalla Fahed Al-Serhan & Ayoub Alsarhan & Bashar Igried - 1-14 Digital Qualitative and Quantitative Analysis of Arabic Textbooks
by Francesca Fallucchi & Bouchra Ghattas & Riem Spielhaus & Ernesto William De Luca - 1-15 Detection of Obfuscated Malicious JavaScript Code
by Ammar Alazab & Ansam Khraisat & Moutaz Alazab & Sarabjot Singh - 1-15 Automatic Detection of Sensitive Data Using Transformer- Based Classifiers
by Michael Petrolini & Stefano Cagnoni & Monica Mordonini - 1-16 Analysis and Visualization of New Energy Vehicle Battery Data
by Wenbo Ren & Xinran Bian & Jiayuan Gong & Anqing Chen & Ming Li & Zhuofei Xia & Jingnan Wang - 1-17 Understanding Learners’ Perception of MOOCs Based on Review Data Analysis Using Deep Learning and Sentiment Analysis
by Xieling Chen & Fu Lee Wang & Gary Cheng & Man-Kong Chow & Haoran Xie - 1-17 Research on Urban Traffic Incident Detection Based on Vehicle Cameras
by Zhuofei Xia & Jiayuan Gong & Hailong Yu & Wenbo Ren & Jingnan Wang - 1-18 Augmenting Industrial Control Rooms with Multimodal Collaborative Interaction Techniques
by Jessica Rubart & Valentin Grimm & Jonas Potthast - 1-18 CCrFS: Combine Correlation Features Selection for Detecting Phishing Websites Using Machine Learning
by Jimmy Moedjahedy & Arief Setyanto & Fawaz Khaled Alarfaj & Mohammed Alreshoodi - 1-18 Post-Processing for Shadow Detection in Drone-Acquired Images Using U-NET
by Siti-Aisyah Zali & Shahbe Mat-Desa & Zarina Che-Embi & Wan-Noorshahida Mohd-Isa - 1-18 Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
by Despoina Chochtoula & Aristidis Ilias & Yannis C. Stamatiou & Christos Makris - 1-18 A CSI Fingerprint Method for Indoor Pseudolite Positioning Based on RT-ANN
by Yaning Li & Hongsheng Li & Baoguo Yu & Jun Li - 1-19 Deep Learning Forecasting for Supporting Terminal Operators in Port Business Development
by Marco Ferretti & Ugo Fiore & Francesca Perla & Marcello Risitano & Salvatore Scognamiglio - 1-19 Energy Saving Strategy of UAV in MEC Based on Deep Reinforcement Learning
by Zhiqiang Dai & Gaochao Xu & Ziqi Liu & Jiaqi Ge & Wei Wang - 1-19 Microblog Sentiment Analysis Based on Dynamic Character-Level and Word-Level Features and Multi-Head Self-Attention Pooling
by Shangyi Yan & Jingya Wang & Zhiqiang Song - 1-20 Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
by Fazal Raheman & Tejas Bhagat & Brecht Vermeulen & Peter Van Daele - 1-21 Seeing through Wavy Water–Air Interface: A Restoration Model for Instantaneous Images Distorted by Surface Waves
by Bijian Jian & Chunbo Ma & Dejian Zhu & Yixiao Sun & Jun Ao - 1-23 Multi-Agent-Based Traffic Prediction and Traffic Classification for Autonomic Network Management Systems for Future Networks
by Sisay Tadesse Arzo & Zeinab Akhavan & Mona Esmaeili & Michael Devetsikiotis & Fabrizio Granelli - 1-23 Hybrid Sensing Platform for IoT-Based Precision Agriculture
by Hamid Bagha & Ali Yavari & Dimitrios Georgakopoulos - 1-26 Exploring Distributed Deep Learning Inference Using Raspberry Pi Spark Cluster
by Nicholas James & Lee-Yeng Ong & Meng-Chew Leow - 1-28 An Intelligent Multimodal Biometric Authentication Model for Personalised Healthcare Services
by Farhad Ahamed & Farnaz Farid & Basem Suleiman & Zohaib Jan & Luay A. Wahsheh & Seyed Shahrestani - 1-35 A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform
by Esad Kadusic & Natasa Zivic & Christoph Ruland & Narcisa Hadzajlic
July 2022, Volume 14, Issue 7
- 1-11 Zero-Inflated Patent Data Analysis Using Generating Synthetic Samples
by Daiho Uhm & Sunghae Jun - 1-15 Mapping Art to a Knowledge Graph: Using Data for Exploring the Relations among Visual Objects in Renaissance Art
by Alexandros Kouretsis & Iraklis Varlamis & Laida Limniati & Minas Pergantis & Andreas Giannakoulopoulos - 1-15 N-Trans: Parallel Detection Algorithm for DGA Domain Names
by Cheng Yang & Tianliang Lu & Shangyi Yan & Jianling Zhang & Xingzhan Yu - 1-15 Multifractal Cross-Correlations of Bitcoin and Ether Trading Characteristics in the Post-COVID-19 Time
by Marcin Wątorek & Jarosław Kwapień & Stanisław Drożdż - 1-18 Research on Routing Equalization Algorithm of Inter-Satellite Partition for Low-Orbit Micro-Satellites
by Hengfei Cheng & Zhaobin Xu & Xiaoxu Guo & Jia Yang & Kedi Xu & Shuqin Liu & Zhonghe Jin & Xiaojun Jin - 1-21 Intuitively Searching for the Rare Colors from Digital Artwork Collections by Text Description: A Case Demonstration of Japanese Ukiyo-e Print Retrieval
by Kangying Li & Jiayun Wang & Biligsaikhan Batjargal & Akira Maeda - 1-23 Analytical Modeling and Empirical Analysis of Binary Options Strategies
by Gurdal Ertek & Aysha Al-Kaabi & Aktham Issa Maghyereh - 1-24 Blockchain for Doping Control Applications in Sports: A Conceptual Approach
by Flavio Pinto & Yogachandran Rahulamathavan & James Skinner - 1-24 Enhanced Geographic Routing with One- and Two-Hop Movement Information in Opportunistic Ad Hoc Networks
by Mohd-Yaseen Mir & Hengbing Zhu & Chih-Lin Hu - 1-26 A Survey on Monitoring Quality Assessment for Wireless Visual Sensor Networks
by Thiago C. Jesus & Daniel G. Costa & Paulo Portugal & Francisco Vasques - 1-48 Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
by Yehia Ibrahim Alzoubi & Ahmad Al-Ahmad & Hasan Kahtan & Ashraf Jaradat
June 2022, Volume 14, Issue 7
- 1-10 Polarity and Subjectivity Detection with Multitask Learning and BERT Embedding
by Ranjan Satapathy & Shweta Rajesh Pardeshi & Erik Cambria - 1-12 A Public Infrastructure for a Trusted Wireless World
by Renee Carnley & Sikha Bagui - 1-13 First Steps of Asthma Management with a Personalized Ontology Model
by Hicham Ajami & Hamid Mcheick & Catherine Laprise - 1-13 Correlation between Human Emotion and Temporal·Spatial Contexts by Analyzing Environmental Factors
by Minwoo Park & Euichul Lee - 1-14 Designing an Interactive Communication Assistance System for Hearing-Impaired College Students Based on Gesture Recognition and Representation
by Yancong Zhu & Juan Zhang & Zhaoxi Zhang & Gina Clepper & Jingpeng Jia & Wei Liu - 1-16 Cooperative D-GNSS Aided with Multi Attribute Decision Making Module: A Rigorous Comparative Analysis
by Thanassis Mpimis & Theodore T. Kapsis & Athanasios D. Panagopoulos & Vassilis Gikas - 1-16 Real-Time Detection of Vine Trunk for Robot Localization Using Deep Learning Models Developed for Edge TPU Devices
by Khadijeh Alibabaei & Eduardo Assunção & Pedro D. Gaspar & Vasco N. G. J. Soares & João M. L. P. Caldeira - 1-17 Misuse Patterns from the Threat of Modification of Non-Control Data in Network Function Virtualization
by Abdulrahman K. Alnaim - 1-18 Characterization of Dynamic Blockage Probability in Industrial Millimeter Wave 5G Deployments
by Anastasia Kondratyeva & Daria Ivanova & Vyacheslav Begishev & Ekaterina Markova & Evgeni Mokrov & Yuliya Gaidamaka & Konstantin Samouylov - 1-18 A Novel Text Classification Technique Using Improved Particle Swarm Optimization: A Case Study of Arabic Language
by Yousif A. Alhaj & Abdelghani Dahou & Mohammed A. A. Al-qaness & Laith Abualigah & Aaqif Afzaal Abbasi & Nasser Ahmed Obad Almaweri & Mohamed Abd Elaziz & Robertas Damaševičius - 1-18 Insights from the Experimentation of Named Data Networks in Mobile Wireless Environments
by Luís Gameiro & Carlos Senna & Miguel Luís - 1-19 Securing the Smart City Airspace: Drone Cyber Attack Detection through Machine Learning
by Zubair Baig & Naeem Syed & Nazeeruddin Mohammad - 1-21 Towards Strengthening the Resilience of IoV Networks—A Trust Management Perspective
by Yingxun Wang & Hushairi Zen & Mohamad Faizrizwan Mohd Sabri & Xiang Wang & Lee Chin Kho - 1-21 Aesthetic Trends and Semantic Web Adoption of Media Outlets Identified through Automated Archival Data Extraction
by Aristeidis Lamprogeorgos & Minas Pergantis & Michail Panagopoulos & Andreas Giannakoulopoulos - 1-24 Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems
by Martina Pappalardo & Antonio Virdis & Enzo Mingozzi - 1-31 Convergence of Information-Centric Networks and Edge Intelligence for IoV: Challenges and Future Directions
by Salahadin Seid Musa & Marco Zennaro & Mulugeta Libsie & Ermanno Pietrosemoli
May 2022, Volume 14, Issue 6
- 1-13 Time Series Prediction of Sea Surface Temperature Based on an Adaptive Graph Learning Neural Model
by Tingting Wang & Zhuolin Li & Xiulin Geng & Baogang Jin & Lingyu Xu - 1-14 Fraud Detection Using Neural Networks: A Case Study of Income Tax
by Belle Fille Murorunkwere & Origene Tuyishimire & Dominique Haughton & Joseph Nzabanita - 1-15 What Is Coming across the Horizon and How Can We Handle It? Bitcoin Scenarios as a Starting Point for Rigorous and Relevant Research
by Horst Treiblmaier - 1-16 An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters
by Guangwei Fan & Chuanzhen Sheng & Baoguo Yu & Lu Huang & Qiang Rong - 1-17 Analysis of Electric Vehicles with an Economic Perspective for the Future Electric Market
by Sofana Reka S & Prakash Venugopal & Ravi V & Hassan Haes Alhelou & Amer Al-Hinai & Pierluigi Siano - 1-18 Detection of Students’ Problems in Distance Education Using Topic Modeling and Machine Learning
by Huda Alhazmi - 1-19 Quantum Key Distribution in Kubernetes Clusters
by Ignazio Pedone & Antonio Lioy - 1-19 Optimization of the System of Allocation of Overdue Loans in a Sub-Saharan Africa Microfinance Institution
by Andreia Araújo & Filipe Portela & Filipe Alvelos & Saulo Ruiz - 1-20 The Robustness of Detecting Known and Unknown DDoS Saturation Attacks in SDN via the Integration of Supervised and Semi-Supervised Classifiers
by Samer Khamaiseh & Abdullah Al-Alaj & Mohammad Adnan & Hakam W. Alomari - 1-20 Optimal Proactive Caching for Multi-View Streaming Mobile Augmented Reality
by Zhaohui Huang & Vasilis Friderikos - 1-20 Data Anonymization: An Experimental Evaluation Using Open-Source Tools
by Joana Tomás & Deolinda Rasteiro & Jorge Bernardino - 1-28 On End-to-End Intelligent Automation of 6G Networks
by Abdallah Moubayed & Abdallah Shami & Anwer Al-Dulaimi - 1-32 Charting Past, Present, and Future Research in the Semantic Web and Interoperability
by Abderahman Rejeb & John G. Keogh & Wayne Martindale & Damion Dooley & Edward Smart & Steven Simske & Samuel Fosso Wamba & John G. Breslin & Kosala Yapa Bandara & Subhasis Thakur & Kelly Liu & Bridgette Crowley & Sowmya Desaraju & Angela Ospina & Horia Bradau
June 2022, Volume 14, Issue 6
- 1-12 IoT Group Membership Management Using Decentralized Identifiers and Verifiable Credentials
by Nikos Fotiou & Vasilios A. Siris & George Xylomenos & George C. Polyzos - 1-12 Evaluation of Online Teaching Quality Based on Facial Expression Recognition
by Changbo Hou & Jiajun Ai & Yun Lin & Chenyang Guan & Jiawen Li & Wenyu Zhu - 1-13 An Indoor Smart Parking Algorithm Based on Fingerprinting
by Silvia Stranieri - 1-13 6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap
by Chiara Suraci & Sara Pizzi & Federico Montori & Marco Di Felice & Giuseppe Araniti - 1-15 Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers
by Vincenza Carchiolo & Marco Grassia & Michele Malgeri & Giuseppe Mangioni - 1-16 EBBA: An Enhanced Binary Bat Algorithm Integrated with Chaos Theory and Lévy Flight for Feature Selection
by Jinghui Feng & Haopeng Kuang & Lihua Zhang - 1-20 A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network
by Kavitha Rani Balmuri & Srinivas Konda & Wen-Cheng Lai & Parameshachari Bidare Divakarachari & Kavitha Malali Vishveshwarappa Gowda & Hemalatha Kivudujogappa Lingappa - 1-21 Toward Semi-Supervised Graphical Object Detection in Document Images
by Goutham Kallempudi & Khurram Azeem Hashmi & Alain Pagani & Marcus Liwicki & Didier Stricker & Muhammad Zeshan Afzal - 1-21 High-Frequency Direction Forecasting of the Futures Market Using a Machine-Learning-Based Method
by Shangkun Deng & Yingke Zhu & Xiaoru Huang & Shuangyang Duan & Zhe Fu - 1-22 Gamifying Community Education for Enhanced Disaster Resilience: An Effectiveness Testing Study from Australia
by Nayomi Kankanamge & Tan Yigitcanlar & Ashantha Goonetilleke - 1-22 An In-Depth Review on Blockchain Simulators for IoT Environments
by Jason Zheng & Chidinma Dike & Stefan Pancari & Yi Wang & George C. Giakos & Wafa Elmannai & Bingyang Wei - 1-23 A Multi-View Framework to Detect Redundant Activity Labels for More Representative Event Logs in Process Mining
by Qifan Chen & Yang Lu & Charmaine S. Tam & Simon K. Poon - 1-23 Multilayer Backbones for Internet of Battlefield Things
by Evangelia Fragkou & Dimitrios Papakostas & Theodoros Kasidakis & Dimitrios Katsaros - 1-27 Investigating the Country of Origin and the Role of the .eu TLD in External Trade of European Union Member States
by Andreas Giannakoulopoulos & Minas Pergantis & Laida Limniati & Alexandros Kouretsis - 1-27 A BLE-Connected Piezoresistive and Inertial Chest Band for Remote Monitoring of the Respiratory Activity by an Android Application: Hardware Design and Software Optimization
by Roberto De Fazio & Massimo De Vittorio & Paolo Visconti - 1-33 Browser Forensic Investigations of Instagram Utilizing IndexedDB Persistent Storage
by Furkan Paligu & Cihan Varol - 1-38 Overview of Blockchain Oracle Research
by Giulio Caldarelli
May 2022, Volume 14, Issue 5
- 1-2 Editorial for the Special Issue on Blockchain: Applications, Challenges, and Solutions
by Ahad ZareRavasan & Taha Mansouri & Michal Krčál & Saeed Rouhani - 1-13 Tell Me More: Automating Emojis Classification for Better Accessibility and Emotional Context Recognition
by Muhammad Atif & Valentina Franzoni - 1-14 Distributed Bandwidth Allocation Strategy for QoE Fairness of Multiple Video Streams in Bottleneck Links
by Yazhi Liu & Dongyu Wei & Chunyang Zhang & Wei Li - 1-15 Low-Complexity GSM Detection Based on Maximum Ratio Combining
by Xinhe Zhang & Wenbo Lv & Haoran Tan - 1-16 Enhancing Short-Term Sales Prediction with Microblogs: A Case Study of the Movie Box Office
by Jie Zhao & Fangwei Xiong & Peiquan Jin - 1-16 Missing Data Imputation in the Internet of Things Sensor Networks
by Benjamin Agbo & Hussain Al-Aqrabi & Richard Hill & Tariq Alsboui - 1-18 A Review of Blockchain Technology Applications in Ambient Assisted Living
by Alexandru-Ioan Florea & Ionut Anghel & Tudor Cioara - 1-19 Lightweight Blockchain-Based Scheme to Secure Wireless M2M Area Networks
by Karam Eddine Bilami & Pascal LORENZ - 1-20 Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
by Mauro Tropea & Mattia Giovanni Spina & Floriano De Rango & Antonio Francesco Gentile - 1-20 Medical Internet-of-Things Based Breast Cancer Diagnosis Using Hyperparameter-Optimized Neural Networks
by Roseline Oluwaseun Ogundokun & Sanjay Misra & Mychal Douglas & Robertas Damaševičius & Rytis Maskeliūnas - 1-21 Modeling User Acceptance of In-Vehicle Applications for Safer Road Environment
by Siti Fatimah Abdul Razak & Sumendra Yogarayan & Mohd Fikri Azli Abdullah & Afizan Azman - 1-21 QoE Models for Adaptive Streaming: A Comprehensive Evaluation
by Duc Nguyen & Nam Pham Ngoc & Truong Cong Thang - 1-22 Positioning Energy-Neutral Devices: Technological Status and Hybrid RF-Acoustic Experiments
by Bert Cox & Chesney Buyle & Daan Delabie & Lieven De Strycker & Liesbet Van der Perre