Content
October 2023, Volume 15, Issue 10
- 1-22 kClusterHub: An AutoML-Driven Tool for Effortless Partition-Based Clustering over Varied Data Types
by Konstantinos Gratsos & Stefanos Ougiaroglou & Dionisis Margaris - 1-22 Blockchain Technology for Secure Communication and Formation Control in Smart Drone Swarms
by Athanasios Koulianos & Antonios Litke - 1-23 End-to-End Service Availability in Heterogeneous Multi-Tier Cloud–Fog–Edge Networks
by Igor Kabashkin - 1-26 Fluent but Not Factual: A Comparative Analysis of ChatGPT and Other AI Chatbots’ Proficiency and Originality in Scientific Writing for Humanities
by Edisa Lozić & Benjamin Štular - 1-28 A Graph DB-Based Solution for Semantic Technologies in the Future Internet
by Stefano Ferilli & Eleonora Bernasconi & Davide Di Pierro & Domenico Redavid - 1-29 Machine Learning: Models, Challenges, and Research Directions
by Tala Talaei Khoei & Naima Kaabouch - 1-29 Oceania’s 5G Multi-Tier Fixed Wireless Access Link’s Long-Term Resilience and Feasibility Analysis
by Satyanand Singh & Joanna Rosak-Szyrocka & István Drotár & Xavier Fernando - 1-31 Towards an Optimal Cloud-Based Resource Management Framework for Next-Generation Internet with Multi-Slice Capabilities
by Salman Ali AlQahtani - 1-37 Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks
by Šarūnas Grigaliūnas & Michael Schmidt & Rasa Brūzgienė & Panayiota Smyrli & Vladislav Bidikov - 1-46 A Comprehensive Analysis and Investigation of the Public Discourse on Twitter about Exoskeletons from 2017 to 2023
by Nirmalya Thakur & Kesha A. Patel & Audrey Poon & Rishika Shah & Nazif Azizi & Changhee Han
August 2023, Volume 15, Issue 9
- 1-15 Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges
by Peng Zhang & Maged N. Kamel Boulos - 1-15 Short-Term Mobile Network Traffic Forecasting Using Seasonal ARIMA and Holt-Winters Models
by Irina Kochetkova & Anna Kushchazli & Sofia Burtseva & Andrey Gorshenin - 1-16 Digital Twin Applications in Manufacturing Industry: A Case Study from a German Multi-National
by Martin Wynn & Jose Irizar - 1-16 3D Visualization in Digital Medicine Using XR Technology
by Miklos Vincze & Bela Molnar & Miklos Kozlovszky - 1-16 Enhancing E-Learning with Blockchain: Characteristics, Projects, and Emerging Trends
by Mahmoud Bidry & Abdellah Ouaguid & Mohamed Hanine - 1-17 E-SAWM: A Semantic Analysis-Based ODF Watermarking Algorithm for Edge Cloud Scenarios
by Lijun Zu & Hongyi Li & Liang Zhang & Zhihui Lu & Jiawei Ye & Xiaoxia Zhao & Shijing Hu - 1-17 Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing
by Vyas O’Neill & Ben Soh - 1-19 Autism Screening in Toddlers and Adults Using Deep Learning and Fair AI Techniques
by Ishaani Priyadarshini - 1-21 Prospects of Cybersecurity in Smart Cities
by Fernando Almeida - 1-24 A Novel SDWSN-Based Testbed for IoT Smart Applications
by Duaa Zuhair Al-Hamid & Pejman A. Karegar & Peter Han Joo Chong - 1-31 Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security
by Carolina Del-Valle-Soto & Ramon A. Briseño & Leonardo J. Valdivia & Ramiro Velázquez & Juan Arturo Nolazco-Flores - 1-35 3D Path Planning Algorithms in UAV-Enabled Communications Systems: A Mapping Study
by Jorge Carvajal-Rodriguez & Marco Morales & Christian Tipantuña
September 2023, Volume 15, Issue 9
- 1-2 Advances Techniques in Computer Vision and Multimedia
by Yang Wang - 1-2 Editorial for the Special Issue on “Software Engineering and Data Science”, Volume II
by Davide Tosi - 1-16 FREDY: Federated Resilience Enhanced with Differential Privacy
by Zacharias Anastasakis & Terpsichori-Helen Velivassaki & Artemis Voulkidis & Stavroula Bourou & Konstantinos Psychogyios & Dimitrios Skias & Theodore Zahariadis - 1-17 Entering the Metaverse from the JVM: The State of the Art, Challenges, and Research Areas of JVM-Based Web 3.0 Tools and Libraries
by Vlad Bucur & Liviu-Cristian Miclea - 1-17 On Evaluating IoT Data Trust via Machine Learning
by Timothy Tadj & Reza Arablouei & Volkan Dedeoglu - 1-18 Precoding for RIS-Assisted Multi-User MIMO-DQSM Transmission Systems
by Francisco R. Castillo-Soria & J. Alberto Del Puerto-Flores & Cesar A. Azurdia-Meza & Vinoth Babu Kumaravelu & Jorge Simón & Carlos A. Gutierrez - 1-18 Application of ChatGPT-Based Digital Human in Animation Creation
by Chong Lan & Yongsheng Wang & Chengze Wang & Shirong Song & Zheng Gong - 1-19 Explainable Lightweight Block Attention Module Framework for Network-Based IoT Attack Detection
by Furkat Safarov & Mainak Basak & Rashid Nasimov & Akmalbek Abdusalomov & Young Im Cho - 1-19 A Hybrid Neural Ordinary Differential Equation Based Digital Twin Modeling and Online Diagnosis for an Industrial Cooling Fan
by Chao-Chung Peng & Yi-Ho Chen - 1-19 Internet of Robotic Things (IoRT) and Metaheuristic Optimization Techniques Applied for Wheel-Legged Robot
by Mateusz Malarczyk & Grzegorz Kaczmarczyk & Jaroslaw Szrek & Marcin Kaminski - 1-19 An Automatic Transformer from Sequential to Parallel Java Code
by Alessandro Midolo & Emiliano Tramontana - 1-19 Force-Based Self-Organizing MANET/FANET with a UAV Swarm
by Fabrice Saffre & Hanno Hildmann & Antti Anttonen - 1-20 Intelligent Unsupervised Network Traffic Classification Method Using Adversarial Training and Deep Clustering for Secure Internet of Things
by Weijie Zhang & Lanping Zhang & Xixi Zhang & Yu Wang & Pengfei Liu & Guan Gui - 1-21 Hospital Readmission and Length-of-Stay Prediction Using an Optimized Hybrid Deep Model
by Alireza Tavakolian & Alireza Rezaee & Farshid Hajati & Shahadat Uddin - 1-21 Technical, Qualitative and Energy Analysis of Wireless Control Modules for Distributed Smart Home Systems
by Andrzej Ożadowicz - 1-22 FLAME-VQA: A Fuzzy Logic-Based Model for High Frame Rate Video Quality Assessment
by Štefica Mrvelj & Marko Matulin - 1-22 Prototyping a Hyperledger Fabric-Based Security Architecture for IoMT-Based Health Monitoring Systems
by Filippos Pelekoudas-Oikonomou & José C. Ribeiro & Georgios Mantas & Georgia Sakellari & Jonathan Gonzalez - 1-23 Proof of Flow: A Design Pattern for the Green Energy Market
by Valerio Mandarino & Giuseppe Pappalardo & Emiliano Tramontana - 1-23 Evaluation of Blockchain Networks’ Scalability Limitations in Low-Powered Internet of Things (IoT) Sensor Networks
by Kithmini Godewatte Arachchige & Philip Branch & Jason But - 1-24 Wireless Energy Harvesting for Internet-of-Things Devices Using Directional Antennas
by Hsiao-Ching Chang & Hsing-Tsung Lin & Pi-Chung Wang - 1-25 Exploring Homomorphic Encryption and Differential Privacy Techniques towards Secure Federated Learning Paradigm
by Rezak Aziz & Soumya Banerjee & Samia Bouzefrane & Thinh Le Vinh - 1-27 FL-LoRaMAC: A Novel Framework for Enabling On-Device Learning for LoRa-Based IoT Applications
by Shobhit Aggarwal & Asis Nasipuri - 1-27 Automatic Short Text Summarization Techniques in Social Media Platforms
by Fahd A. Ghanem & M. C. Padma & Ramez Alkhatib - 1-28 Analysis of Program Representations Based on Abstract Syntax Trees and Higher-Order Markov Chains for Source Code Classification Task
by Artyom V. Gorchakov & Liliya A. Demidova & Peter N. Sovietov
July 2023, Volume 15, Issue 8
- 1-13 Virtual Grid-Based Routing for Query-Driven Wireless Sensor Networks
by Shushant Kumar Jain & Rinkoo Bhatia & Neeraj Shrivastava & Sharad Salunke & Mohammad Farukh Hashmi & Neeraj Dhanraj Bokde - 1-14 An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things
by Zainab Jamroz & Insaf Ullah & Bilal Hassan & Noor Ul Amin & Muhammad Asghar Khan & Pascal Lorenz & Nisreen Innab - 1-18 RIS-Assisted Fixed NOMA: Outage Probability Analysis and Transmit Power Optimization
by Vinoth Babu Kumaravelu & Agbotiname Lucky Imoize & Francisco R. Castillo Soria & Periyakarupan Gurusamy Sivabalan Velmurugan & Sundarrajan Jayaraman Thiruvengadam & Dinh-Thuan Do & Arthi Murugadass - 1-18 A Novel Approach for Fraud Detection in Blockchain-Based Healthcare Networks Using Machine Learning
by Mohammed A. Mohammed & Manel Boujelben & Mohamed Abid - 1-19 A Comparative Analysis of High Availability for Linux Container Infrastructures
by Marek Šimon & Ladislav Huraj & Nicolas Búčik - 1-20 Intelligent Caching with Graph Neural Network-Based Deep Reinforcement Learning on SDN-Based ICN
by Jiacheng Hou & Tianhao Tao & Haoye Lu & Amiya Nayak - 1-25 The mPOC Framework: An Autonomous Outbreak Prediction and Monitoring Platform Based on Wearable IoMT Approach
by Sasan Adibi - 1-26 Towards Efficient Resource Allocation for Federated Learning in Virtualized Managed Environments
by Fotis Nikolaidis & Moysis Symeonides & Demetris Trihinas - 1-27 Features and Scope of Regulatory Technologies: Challenges and Opportunities with Industrial Internet of Things
by Jinying Li & Ananda Maiti & Jiangang Fei - 1-30 Task Allocation Methods and Optimization Techniques in Edge Computing: A Systematic Review of the Literature
by Vasilios Patsias & Petros Amanatidis & Dimitris Karampatzakis & Thomas Lagkas & Kalliopi Michalakopoulou & Alexandros Nikitas - 1-31 The Meta-Metaverse: Ideation and Future Directions
by Mohammad (Behdad) Jamshidi & Arash Dehghaniyan Serej & Alireza Jamshidi & Omid Moztarzadeh - 1-31 A Review of ARIMA vs. Machine Learning Approaches for Time Series Forecasting in Data Driven Networks
by Vaia I. Kontopoulou & Athanasios D. Panagopoulos & Ioannis Kakkos & George K. Matsopoulos - 1-60 The Power of Generative AI: A Review of Requirements, Models, Input–Output Formats, Evaluation Metrics, and Challenges
by Ajay Bandi & Pydi Venkata Satya Ramesh Adapa & Yudu Eswar Vinay Pratap Kumar Kuchi
August 2023, Volume 15, Issue 8
- 1-7 Special Issue on Security and Privacy in Blockchains and the IoT Volume II
by Christoph Stach & Clémentine Gritti - 1-14 Mapping EEG Alpha Activity: Assessing Concentration Levels during Player Experience in Virtual Reality Video Games
by Jesus GomezRomero-Borquez & J. Alberto Del Puerto-Flores & Carolina Del-Valle-Soto - 1-14 Correlation Analysis Model of Environment Parameters Using IoT Framework in a Biogas Energy Generation Context
by Angelique Mukasine & Louis Sibomana & Kayalvizhi Jayavel & Kizito Nkurikiyeyezu & Eric Hitimana - 1-16 An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks
by Asad Iqbal & Muhammad Zubair & Muhammad Asghar Khan & Insaf Ullah & Ghani Ur-Rehman & Alexey V. Shvetsov & Fazal Noor - 1-16 LoRa Communication Using TVWS Frequencies: Range and Data Rate
by Anjali R. Askhedkar & Bharat S. Chaudhari & Maha Abdelhaq & Raed Alsaqour & Rashid Saeed & Marco Zennaro - 1-16 An Efficient Adaptive Data-Link-Layer Architecture for LoRa Networks
by Micael Coutinho & Jose A. Afonso & Sérgio F. Lopes - 1-16 An Improved Deep Learning Model for DDoS Detection Based on Hybrid Stacked Autoencoder and Checkpoint Network
by Amthal K. Mousa & Mohammed Najm Abdullah - 1-17 A Survey on Pump and Dump Detection in the Cryptocurrency Market Using Machine Learning
by Mohammad Javad Rajaei & Qusay H. Mahmoud - 1-19 Applying Machine Learning in Cloud Service Price Prediction: The Case of Amazon IaaS
by George Fragiadakis & Evangelia Filiopoulou & Christos Michalakelis & Thomas Kamalakis & Mara Nikolaidou - 1-19 Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms
by Ugochukwu Onyekachi Obonna & Felix Kelechi Opara & Christian Chidiebere Mbaocha & Jude-Kennedy Chibuzo Obichere & Isdore Onyema Akwukwaegbu & Miriam Mmesoma Amaefule & Cosmas Ifeanyi Nwakanma - 1-19 Intelligent Transmit Antenna Selection Schemes for High-Rate Fully Generalized Spatial Modulation
by Hindavi Kishor Jadhav & Vinoth Babu Kumaravelu & Arthi Murugadass & Agbotiname Lucky Imoize & Poongundran Selvaprabhu & Arunkumar Chandrasekhar - 1-20 Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps
by Mishall Al-Zubaidie & Ghanima Sabr Shyaa - 1-21 Enhancing Network Security: A Machine Learning-Based Approach for Detecting and Mitigating Krack and Kr00k Attacks in IEEE 802.11
by Zaher Salah & Esraa Abu Elsoud - 1-21 Quantum Machine Learning for Security Assessment in the Internet of Medical Things (IoMT)
by Anand Singh Rajawat & S. B. Goyal & Pradeep Bedi & Tony Jan & Md Whaiduzzaman & Mukesh Prasad - 1-22 Real-World Implementation and Integration of an Automatic Scoring System for Workplace Safety Courses in Italian
by Nicola Arici & Alfonso Emilio Gerevini & Matteo Olivato & Luca Putelli & Luca Sigalini & Ivan Serina - 1-24 Cluster-Based Data Aggregation in Flying Sensor Networks Enabled Internet of Things
by Abdu Salam & Qaisar Javaid & Masood Ahmad & Ishtiaq Wahid & Muhammad Yeasir Arafat - 1-28 Efficient Integration of Heterogeneous Mobility-Pollution Big Data for Joint Analytics at Scale with QoS Guarantees
by Isam Mashhour Al Jawarneh & Luca Foschini & Paolo Bellavista - 1-28 A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M
by Luis F. Gonzalez & Ivan Vidal & Francisco Valera & Raul Martin & Dulce Artalejo - 1-38 SEDIA: A Platform for Semantically Enriched IoT Data Integration and Development of Smart City Applications
by Dimitrios Lymperis & Christos Goumopoulos - 1-77 An Overview of WebAssembly for IoT: Background, Tools, State-of-the-Art, Challenges, and Future Directions
by Partha Pratim Ray
June 2023, Volume 15, Issue 7
- 1-3 Developments of Computer Vision and Image Processing: Methodologies and Applications
by Manuel J. C. S. Reis - 1-16 Heart DT: Monitoring and Preventing Cardiac Pathologies Using AI and IoT Sensors
by Roberta Avanzato & Francesco Beritelli & Alfio Lombardo & Carmelo Ricci - 1-18 Bus Travel Time Prediction Based on the Similarity in Drivers’ Driving Styles
by Zhenzhong Yin & Bin Zhang - 1-18 Exploiting Misconfiguration Vulnerabilities in Microsoft’s Azure Active Directory for Privilege Escalation Attacks
by Ibrahim Bu Haimed & Marwan Albahar & Ali Alzubaidi - 1-18 Synonyms, Antonyms and Factual Knowledge in BERT Heads
by Lorenzo Serina & Luca Putelli & Alfonso Emilio Gerevini & Ivan Serina - 1-20 Investigation on Self-Admitted Technical Debt in Open-Source Blockchain Projects
by Andrea Pinna & Maria Ilaria Lunesu & Stefano Orrù & Roberto Tonelli - 1-23 Cache-Enabled Adaptive Video Streaming: A QoE-Based Evaluation Study
by Eirini Liotou & Dionysis Xenakis & Vasiliki Georgara & Georgios Kourouniotis & Lazaros Merakos - 1-26 KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments
by Giorgio Dell’Immagine & Jacopo Soldani & Antonio Brogi - 1-27 A New AI-Based Semantic Cyber Intelligence Agent
by Fahim Sufi - 1-29 Artificial Intelligence in Virtual Telemedicine Triage: A Respiratory Infection Diagnosis Tool with Electronic Measuring Device
by Naythan Villafuerte & Santiago Manzano & Paulina Ayala & Marcelo V. García - 1-31 Hybridizing Fuzzy String Matching and Machine Learning for Improved Ontology Alignment
by Mohammed Suleiman Mohammed Rudwan & Jean Vincent Fonou-Dombeu - 1-34 An Ontology for Spatio-Temporal Media Management and an Interactive Application
by Takuro Sone & Shin Kato & Ray Atarashi & Jin Nakazato & Manabu Tsukada & Hiroshi Esaki - 1-38 Secure Partitioning of Cloud Applications, with Cost Look-Ahead
by Alessandro Bocci & Stefano Forti & Roberto Guanciale & Gian-Luigi Ferrari & Antonio Brogi
July 2023, Volume 15, Issue 7
- 1-13 Optimization of the Decision Criterion for Increasing the Bandwidth Utilization by Means of the Novel Effective DBA Algorithm in NG-PON2 Networks
by Rastislav Róka - 1-16 Assisting Drivers at Stop Signs in a Connected Vehicle Environment
by Maram Bani Younes - 1-16 An IoT System and MODIS Images Enable Smart Environmental Management for Mekong Delta
by Vu Hien Phan & Danh Phan Hong Pham & Tran Vu Pham & Kashif Naseer Qureshi & Cuong Pham-Quoc - 1-16 A Carrying Method for 5G Network Slicing in Smart Grid Communication Services Based on Neural Network
by Yang Hu & Liangliang Gong & Xinyang Li & Hui Li & Ruoxin Zhang & Rentao Gu - 1-17 Analysis of ICS and SCADA Systems Attacks Using Honeypots
by Mohamed Mesbah & Mahmoud Said Elsayed & Anca Delia Jurcut & Marianne Azer - 1-17 Machine Learning for Network Intrusion Detection—A Comparative Study
by Mustafa Al Lail & Alejandro Garcia & Saul Olivo - 1-18 Intelligent Video Streaming at Network Edge: An Attention-Based Multiagent Reinforcement Learning Solution
by Xiangdong Tang & Fei Chen & Yunlong He - 1-18 Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22
by Sikha S. Bagui & Dustin Mink & Subhash C. Bagui & Michael Plain & Jadarius Hill & Marshall Elam - 1-19 An Accurate Platform for Investigating TCP Performance in Wi-Fi Networks
by Shunji Aoyagi & Yuki Horie & Do Thi Thu Hien & Thanh Duc Ngo & Duy-Dinh Le & Kien Nguyen & Hiroo Sekiya - 1-20 Acoustic TDOA Measurement and Accurate Indoor Positioning for Smartphone
by Bingbing Cheng & Jiao Wu - 1-21 Enhancing Collaborative Filtering-Based Recommender System Using Sentiment Analysis
by Ikram Karabila & Nossayba Darraz & Anas El-Ansari & Nabil Alami & Mostafa El Mallahi - 1-21 Unveiling the Landscape of Operating System Vulnerabilities
by Manish Bhurtel & Danda B. Rawat - 1-27 Beyond the Semantic Web: Towards an Implicit Pragmatic Web and a Web of Social Representations
by Yannis Haralambous & Philippe Lenca - 1-28 A Cyber-Physical System for Wildfire Detection and Firefighting
by Pietro Battistoni & Andrea Antonio Cantone & Gerardo Martino & Valerio Passamano & Marco Romano & Monica Sebillo & Giuliana Vitiello - 1-42 Self-Healing in Cyber–Physical Systems Using Machine Learning: A Critical Analysis of Theories and Tools
by Obinna Johnphill & Ali Safaa Sadiq & Feras Al-Obeidat & Haider Al-Khateeb & Mohammed Adam Taheir & Omprakash Kaiwartya & Mohammed Ali
May 2023, Volume 15, Issue 6
- 1-13 Feature Construction Using Persistence Landscapes for Clustering Noisy IoT Time Series
by Renjie Chen & Nalini Ravishanker - 1-14 Research and Design of a Decentralized Edge-Computing-Assisted LoRa Gateway
by Han Gao & Zhangqin Huang & Xiaobo Zhang & Huapeng Yang - 1-16 Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches
by Abdul Majeed & Abdullah M. Alnajim & Athar Waseem & Aleem Khaliq & Aqdas Naveed & Shabana Habib & Muhammad Islam & Sheroz Khan - 1-17 Digital Art and the Metaverse: Benefits and Challenges
by William Hurst & Orestis Spyrou & Bedir Tekinerdogan & Caspar Krampe - 1-17 In-Depth Co-Design of Mental Health Monitoring Technologies by People with Lived Experience
by Bronwin Patrickson & Mike Musker & Dan Thorpe & Yasmin van Kasteren & Niranjan Bidargaddi & The Consumer and Carer Advisory Group (CCAG) - 1-18 PUE Attack Detection by Using DNN and Entropy in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz & Gustavo Chica Pedraza & Rafael Cubillos-Sánchez & Alexander Aponte-Moreno & Mónica Espinosa Buitrago - 1-19 Elastic Stack and GRAPHYP Knowledge Graph of Web Usage: A Win–Win Workflow for Semantic Interoperability in Decision Making
by Otmane Azeroual & Renaud Fabre & Uta Störl & Ruidong Qi - 1-19 Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions
by Muneerah Al Asqah & Tarek Moulahi - 1-20 Task Automation Intelligent Agents: A Review
by Abdul Wali & Saipunidzam Mahamad & Suziah Sulaiman - 1-21 How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
by Yiming Zhu & Dehua Zhou & Yuan Li & Beibei Song & Chuansheng Wang - 1-23 From NFT 1.0 to NFT 2.0: A Review of the Evolution of Non-Fungible Tokens
by Barbara Guidi & Andrea Michienzi - 1-24 ChatGPT and Open-AI Models: A Preliminary Review
by Konstantinos I. Roumeliotis & Nikolaos D. Tselikas - 1-24 Deep Neural Networks for Spatial-Temporal Cyber-Physical Systems: A Survey
by Abubakar Ahmad Musa & Adamu Hussaini & Weixian Liao & Fan Liang & Wei Yu - 1-24 Avoiding Detection by Hostile Nodes in Airborne Tactical Networks
by Dragos Ilie & Håkan Grahn & Lars Lundberg & Alexander Westerhagen & Bo Granbom & Anders Höök - 1-26 Synchronizing Many Filesystems in Near Linear Time
by Elod P. Csirmaz & Laszlo Csirmaz - 1-28 Methods of Annotating and Identifying Metaphors in the Field of Natural Language Processing
by Martina Ptiček & Jasminka Dobša - 1-45 Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
by Shereen Ismail & Diana W. Dawoud & Hassan Reza
June 2023, Volume 15, Issue 6
- 1-15 Mitigating Technological Anxiety through the Application of Natural Interaction in Mixed Reality Systems
by Yiming Sun & Tatsuo Nakajima - 1-16 Research on Blockchain Data Availability and Storage Scalability
by Honghao Si & Baoning Niu - 1-17 RSSI and Device Pose Fusion for Fingerprinting-Based Indoor Smartphone Localization Systems
by Imran Moez Khan & Andrew Thompson & Akram Al-Hourani & Kandeepan Sithamparanathan & Wayne S. T. Rowe - 1-19 A DQN-Based Multi-Objective Participant Selection for Efficient Federated Learning
by Tongyang Xu & Yuan Liu & Zhaotai Ma & Yiqiang Huang & Peng Liu - 1-19 BERT4Loc: BERT for Location—POI Recommender System
by Syed Raza Bashir & Shaina Raza & Vojislav B. Misic - 1-19 Dual-Channel Feature Enhanced Collaborative Filtering Recommendation Algorithm
by Yuanyou Ou & Baoning Niu - 1-19 Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow
by Kai Lehniger & Peter Langendörfer - 1-19 Optimal Meshing Degree Performance Analysis in a mmWave FWA 5G Network Deployment
by Iffat Gheyas & Alessandro Raschella & Michael Mackay - 1-21 Neural Network Exploration for Keyword Spotting on Edge Devices
by Jacob Bushur & Chao Chen - 1-22 Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware
by Jinting Zhu & Julian Jang-Jaccard & Amardeep Singh & Paul A. Watters & Seyit Camtepe - 1-25 A Blockchain Self-Sovereign Identity for Open Banking Secured by the Customer’s Banking Cards
by Khaled A. M. Ahmed & Sabry F. Saraya & John F. Wanis & Amr M. T. Ali-Eldin - 1-27 S2NetM: A Semantic Social Network of Things Middleware for Developing Smart and Collaborative IoT-Based Solutions
by Antonios Pliatsios & Dimitrios Lymperis & Christos Goumopoulos - 1-29 Anomaly Detection for Hydraulic Power Units—A Case Study
by Paweł Fic & Adam Czornik & Piotr Rosikowski - 1-29 Searching Online for Art and Culture: User Behavior Analysis
by Minas Pergantis & Iraklis Varlamis & Nikolaos Grigorios Kanellopoulos & Andreas Giannakoulopoulos - 1-30 Enhancing IoT Device Security through Network Attack Data Analysis Using Machine Learning Algorithms
by Ashish Koirala & Rabindra Bista & Joao C. Ferreira - 1-35 2D Semantic Segmentation: Recent Developments and Future Directions
by Yu Guo & Guigen Nie & Wenliang Gao & Mi Liao
May 2023, Volume 15, Issue 5
- 1-14 Blockchain-Enabled NextGen Service Architecture for Mobile Internet Offload
by Raman Singh & Zeeshan Pervez & Hitesh Tewari - 1-14 Securing UAV Flying Base Station for Mobile Networking: A Review
by Sang-Yoon Chang & Kyungmin Park & Jonghyun Kim & Jinoh Kim - 1-14 A Hybrid Text Generation-Based Query Expansion Method for Open-Domain Question Answering
by Wenhao Zhu & Xiaoyu Zhang & Qiuhong Zhai & Chenyun Liu - 1-16 Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by Yufeng Li & Mengxiao Liu & Chenhong Cao & Jiangtao Li - 1-17 Blockchain Solution for Buildings’ Multi-Energy Flexibility Trading Using Multi-Token Standards
by Oana Marin & Tudor Cioara & Ionut Anghel - 1-17 Efficient Mobile Sink Routing in Wireless Sensor Networks Using Bipartite Graphs
by Anas Abu Taleb & Qasem Abu Al-Haija & Ammar Odeh - 1-18 Predicting Football Team Performance with Explainable AI: Leveraging SHAP to Identify Key Team-Level Performance Metrics
by Serafeim Moustakidis & Spyridon Plakias & Christos Kokkotis & Themistoklis Tsatalas & Dimitrios Tsaopoulos - 1-19 Deep Reinforcement Learning-Based Video Offloading and Resource Allocation in NOMA-Enabled Networks
by Siyu Gao & Yuchen Wang & Nan Feng & Zhongcheng Wei & Jijun Zhao - 1-20 Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA
by Khai-Minh Ma & Duc-Hung Le & Cong-Kha Pham & Trong-Thuc Hoang - 1-24 Distributed Average Consensus Algorithms in d-Regular Bipartite Graphs: Comparative Study
by Martin Kenyeres & Jozef Kenyeres - 1-27 Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection
by Dominic Lightbody & Duc-Minh Ngo & Andriy Temko & Colin C. Murphy & Emanuel Popovici - 1-28 Survey of Distributed and Decentralized IoT Securities: Approaches Using Deep Learning and Blockchain Technology
by Ayodeji Falayi & Qianlong Wang & Weixian Liao & Wei Yu - 1-32 5G-MEC Testbeds for V2X Applications
by Prachi V. Wadatkar & Rosario G. Garroppo & Gianfranco Nencioni - 1-35 Optimizing the Quality of Service of Mobile Broadband Networks for a Dense Urban Environment
by Agbotiname Lucky Imoize & Friday Udeji & Joseph Isabona & Cheng-Chi Lee - 1-47 A Review on Deep-Learning-Based Cyberbullying Detection
by Md. Tarek Hasan & Md. Al Emran Hossain & Md. Saddam Hossain Mukta & Arifa Akter & Mohiuddin Ahmed & Salekul Islam
April 2023, Volume 15, Issue 5
- 1-10 Theory and Applications of Web 3.0 in the Media Sector
by Charalampos A. Dimoulas & Andreas Veglis - 1-13 System Performance Analysis of Sensor Networks for RF Energy Harvesting and Information Transmission
by Kuncheng Lei & Zhenrong Zhang - 1-15 Watermarking Protocols: A Short Guide for Beginners
by Franco Frattolillo - 1-15 Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks
by Fahad M. Alotaibi & Vassilios G. Vassilakis - 1-16 A Context-Aware Edge Computing Framework for Smart Internet of Things
by Abdelkarim Ben Sada & Abdenacer Naouri & Amar Khelloufi & Sahraoui Dhelim & Huansheng Ning - 1-16 Domain Adaptation Speech-to-Text for Low-Resource European Portuguese Using Deep Learning
by Eduardo Medeiros & Leonel Corado & Luís Rato & Paulo Quaresma & Pedro Salgueiro - 1-17 A Reverse Shortest Path Tree-Based Multicast Joining Node Selection Method
by Zhenyu Tian & Jiali You & Linlin Hu - 1-17 NDN-BDA: A Blockchain-Based Decentralized Data Authentication Mechanism for Vehicular Named Data Networking
by Ahmed Benmoussa & Chaker Abdelaziz Kerrache & Carlos T. Calafate & Nasreddine Lagraa - 1-17 Benchmarking Change Detector Algorithms from Different Concept Drift Perspectives
by Guilherme Yukio Sakurai & Jessica Fernandes Lopes & Bruno Bogaz Zarpelão & Sylvio Barbon Junior - 1-17 A Distributed Sensor System Based on Cloud-Edge-End Network for Industrial Internet of Things
by Mian Wang & Cong’an Xu & Yun Lin & Zhiyi Lu & Jinlong Sun & Guan Gui - 1-19 Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems
by Nuwan Weerasinghe & Muhammad Arslan Usman & Chaminda Hewage & Eckhard Pfluegel & Christos Politis - 1-20 Chinese Short-Text Sentiment Prediction: A Study of Progressive Prediction Techniques and Attentional Fine-Tuning
by Jinlong Wang & Dong Cui & Qiang Zhang - 1-20 Mobile Application for Real-Time Food Plan Management for Alzheimer Patients through Design-Based Research
by Rui P. Duarte & Carlos A. S. Cunha & Valter N. N. Alves - 1-23 Analysis of Digital Information in Storage Devices Using Supervised and Unsupervised Natural Language Processing Techniques
by Luis Alberto Martínez Hernández & Ana Lucila Sandoval Orozco & Luis Javier García Villalba - 1-24 Blockchain-Based Loyalty Management System
by André F. Santos & José Marinho & Jorge Bernardino - 1-25 The Future of the Human–Machine Interface (HMI) in Society 5.0
by Dimitris Mourtzis & John Angelopoulos & Nikos Panopoulos - 1-26 Machine Failure Prediction Using Survival Analysis
by Dimitris Papathanasiou & Konstantinos Demertzis & Nikos Tziritas - 1-27 Extending Learning and Collaboration in Quantum Information with Internet Support: A Future Perspective on Research Education beyond Boundaries, Limitations, and Frontiers
by Francisco Delgado - 1-28 Future Internet Architectures on an Emerging Scale—A Systematic Review
by Sarfaraz Ahmed Mohammed & Anca L. Ralescu - 1-31 Online Privacy Fatigue: A Scoping Review and Research Agenda
by Karl van der Schyff & Greg Foster & Karen Renaud & Stephen Flowerday
March 2023, Volume 15, Issue 4
- 1-13 View Synthesis with Scene Recognition for Cross-View Image Localization
by Uddom Lee & Peng Jiang & Hongyi Wu & Chunsheng Xin - 1-14 A Novel Multi-Cell Interference-Aware Cooperative QoS-Based NOMA Group D2D System
by Muhammad Amish Hasan & Tanveer Ahmad & Asim Anwar & Salman Siddiq & Abdul Malik & Waseem Nazar & Imran Razzaq - 1-14 A Network Intrusion Detection Method Incorporating Bayesian Attack Graph and Incremental Learning Part
by Kongpei Wu & Huiqin Qu & Conggui Huang - 1-14 Effective IoT Congestion Control Algorithm
by Husam H. Hasan & Zainab T. Alisa - 1-14 Contrastive Refinement for Dense Retrieval Inference in the Open-Domain Question Answering Task
by Qiuhong Zhai & Wenhao Zhu & Xiaoyu Zhang & Chenyun Liu - 1-16 A Deep Learning Approach to Detect Failures in Bridges Based on the Coherence of Signals
by Francesco Morgan Bono & Luca Radicioni & Simone Cinquemani & Lorenzo Benedetti & Gabriele Cazzulani & Claudio Somaschini & Marco Belloli - 1-17 Banging Interaction: A Ubimus-Design Strategy for the Musical Internet
by Damián Keller & Azeema Yaseen & Joseph Timoney & Sutirtha Chakraborty & Victor Lazzarini - 1-17 A Comparative Study of Single and Multi-Stage Forecasting Algorithms for the Prediction of Electricity Consumption Using a UK-National Health Service (NHS) Hospital Dataset
by Ahmad Taha & Basel Barakat & Mohammad M. A. Taha & Mahmoud A. Shawky & Chun Sing Lai & Sajjad Hussain & Muhammad Zainul Abideen & Qammer H. Abbasi - 1-18 A Replica-Selection Algorithm Based on Transmission Completion Time Estimation in ICN
by Zhiyuan Wang & Hong Ni & Rui Han - 1-18 Insights into How Vietnamese Retailers Utilize Social Media to Facilitate Knowledge Creation through the Process of Value Co-Creation
by Peter R. J. Trim & Yang-Im Lee & An Vu - 1-18 Influential Factors in the Design and Development of a Sustainable Web3/Metaverse and Its Applications
by Reza Aria & Norm Archer & Moein Khanlari & Bharat Shah - 1-18 Study of Coded ALOHA with Multi-User Detection under Heavy-Tailed and Correlated Arrivals
by María E. Sousa-Vieira & Manuel Fernández-Veiga - 1-18 SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
by Yuting Guan & Junjiang He & Tao Li & Hui Zhao & Baoqiang Ma - 1-18 Performance Evaluation of a Lane Correction Module Stress Test: A Field Test of Tesla Model 3
by Jonathan Lancelot & Bhaskar P. Rimal & Edward M. Dennis - 1-20 A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm
by Jiaqi Zhao & Ming Xu & Yunzhi Chen & Guoliang Xu - 1-21 Addressing ZSM Security Issues with Blockchain Technology
by Michael Xevgenis & Dimitrios G. Kogias & Panagiotis A. Karkazis & Helen C. Leligou - 1-23 Developing a Virtual World for an Open-House Event: A Metaverse Approach
by Keattikorn Samarnggoon & Supara Grudpan & Noppon Wongta & Konlawat Klaynak - 1-23 Transforming IoT Events to Meaningful Business Events on the Edge: Implementation for Smart Farming Application
by Dimitris Gkoulis & Cleopatra Bardaki & George Kousiouris & Mara Nikolaidou - 1-24 Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks
by Sikha Bagui & Dustin Mink & Subhash Bagui & Sakthivel Subramaniam & Daniel Wallace - 1-27 PVPBC: Privacy and Verifiability Preserving E-Voting Based on Permissioned Blockchain
by Muntadher Sallal & Ruairí de Fréin & Ali Malik - 1-31 A Highly Interactive Honeypot-Based Approach to Network Threat Management
by Xingyuan Yang & Jie Yuan & Hao Yang & Ya Kong & Hao Zhang & Jinyu Zhao
April 2023, Volume 15, Issue 4
- 1-2 Distributed Systems for Emerging Computing: Platform and Application
by Xu Wang & Bin Shi & Yili Fang - 1-12 Emerging Technologies and Their Link to Digital Competence in Teaching
by Miguel Ángel García-Delgado & Sonia Rodríguez-Cano & Vanesa Delgado-Benito & María Lozano-Álvarez