Content
March 2023, Volume 15, Issue 3
- 1-20 Complex Queries for Querying Linked Data
by Hasna Boumechaal & Zizette Boufaida - 1-20 Indoor Occupancy Sensing via Networked Nodes (2012–2022): A Review
by Muhammad Emad-Ud-Din & Ya Wang - 1-21 DataStream XES Extension: Embedding IoT Sensor Data into Extensible Event Stream Logs
by Juergen Mangler & Joscha Grüger & Lukas Malburg & Matthias Ehrendorfer & Yannis Bertrand & Janik-Vasily Benzin & Stefanie Rinderle-Ma & Estefania Serral Asensio & Ralph Bergmann - 1-22 A Novel Hybrid Edge Detection and LBP Code-Based Robust Image Steganography Method
by Habiba Sultana & A. H. M. Kamal & Gahangir Hossain & Muhammad Ashad Kabir - 1-22 CvAMoS—Event Abstraction Using Contextual Information
by Gemma Di Federico & Andrea Burattin - 1-25 Dealing with Deadlocks in Industrial Multi Agent Systems
by František Čapkovič - 1-26 Creation, Analysis and Evaluation of AnnoMI, a Dataset of Expert-Annotated Counselling Dialogues
by Zixiu Wu & Simone Balloccu & Vivek Kumar & Rim Helaoui & Diego Reforgiato Recupero & Daniele Riboni - 1-26 A Petri Net Model for Cognitive Radio Internet of Things Networks Exploiting GSM Bands
by Salvatore Serrano & Marco Scarpa
February 2023, Volume 15, Issue 2
- 1-3 Cognitive Software Defined Networking and Network Function Virtualization and Applications
by Sachin Sharma & Avishek Nag - 1-14 A Simple Model of Knowledge Scaffolding Applied to Wikipedia Growth
by Franco Bagnoli & Guido de Bonfioli Cavalcabo’ - 1-15 Perception of the Use of Virtual Reality Didactic Tools among Faculty in Mexico
by Álvaro Antón-Sancho & Pablo Fernández-Arias & Diego Vergara - 1-16 Designing for the Metaverse: A Multidisciplinary Laboratory in the Industrial Design Program
by Marina Ricci & Alessandra Scarcelli & Michele Fiorentino - 1-16 A Novel Multipath Transmission Scheme for Information-Centric Networking
by Yong Xu & Hong Ni & Xiaoyong Zhu - 1-17 Collaborative Storage and Resolution Method between Layers in Hierarchical ICN Name Resolution Systems
by Yanxia Li & Yang Li - 1-17 Research Trends of the Internet of Things in Relation to Business Model Innovation: Results from Co-Word and Content Analyses
by Atik Kulakli & Cenk Lacin Arikan - 1-17 Diabetes Monitoring System in Smart Health Cities Based on Big Data Intelligence
by Shadi AlZu’bi & Mohammad Elbes & Ala Mughaid & Noor Bdair & Laith Abualigah & Agostino Forestiero & Raed Abu Zitar - 1-19 Multi-Scale Audio Spectrogram Transformer for Classroom Teaching Interaction Recognition
by Fan Liu & Jiandong Fang - 1-19 Development of a Vision-Based Unmanned Ground Vehicle for Mapping and Tennis Ball Collection: A Fuzzy Logic Approach
by Masoud Latifinavid & Aydin Azizi - 1-20 Significance of Cross-Correlated QoS Configurations for Validating the Subjective and Objective QoE of Cloud Gaming Applications
by Nafi Ahmad & Abdul Wahab & John Schormans & Ali Adib Arnab - 1-20 RingFFL: A Ring-Architecture-Based Fair Federated Learning Framework
by Lu Han & Xiaohong Huang & Dandan Li & Yong Zhang - 1-20 I4.0I: A New Way to Rank How Involved a Company Is in the Industry 4.0 Era
by Vitória Francesca Biasibetti Zilli & Cesar David Paredes Crovato & Rodrigo da Rosa Righi & Rodrigo Ivan Goytia Mejia & Giovani Pesenti & Dhananjay Singh - 1-21 Disruptive Technologies for Parliaments: A Literature Review
by Dimitris Koryzis & Dionisis Margaris & Costas Vassilakis & Konstantinos Kotis & Dimitris Spiliotopoulos - 1-21 Im2Graph: A Weakly Supervised Approach for Generating Holistic Scene Graphs from Regional Dependencies
by Swarnendu Ghosh & Teresa Gonçalves & Nibaran Das - 1-23 Optimal Pricing in a Rented 5G Infrastructure Scenario with Sticky Customers
by Marta Flamini & Maurizio Naldi - 1-24 Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
by Sheeraz Ahmed & Zahoor Ali Khan & Syed Muhammad Mohsin & Shahid Latif & Sheraz Aslam & Hana Mujlid & Muhammad Adil & Zeeshan Najam - 1-27 An Efficient Model-Based Clustering via Joint Multiple Sink Placement for WSNs
by Soukaina Bouarourou & Abderrahim Zannou & El Habib Nfaoui & Abdelhak Boulaalam - 1-27 On the Use of Knowledge Transfer Techniques for Biomedical Named Entity Recognition
by Tahir Mehmood & Ivan Serina & Alberto Lavelli & Luca Putelli & Alfonso Gerevini - 1-31 Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations
by Eddy Truyen & Hongjie Xie & Wouter Joosen - 1-31 An Interactive Method for Detection of Process Activity Executions from IoT Data
by Ronny Seiger & Marco Franceschetti & Barbara Weber - 1-37 Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
by Tehseen Mazhar & Hafiz Muhammad Irfan & Sunawar Khan & Inayatul Haq & Inam Ullah & Muhammad Iqbal & Habib Hamam - 1-49 Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration
by Christoph Stach
January 2023, Volume 15, Issue 2
- 1-9 Acknowledgment to the Reviewers of Future Internet in 2022
by Future Internet Editorial Office - 1-10 Vision, Enabling Technologies, and Scenarios for a 6G-Enabled Internet of Verticals (6G-IoV)
by Maziar Nekovee & Ferheen Ayaz - 1-12 Performance Assessment and Comparison of Deployment Options for 5G Millimeter Wave Systems
by Evgeni Mokrov & Konstantin Samouylov - 1-13 Forest Fire Detection and Notification Method Based on AI and IoT Approaches
by Kuldoshbay Avazov & An Eui Hyun & Alabdulwahab Abrar Sami S & Azizbek Khaitov & Akmalbek Bobomirzaevich Abdusalomov & Young Im Cho - 1-14 Attention-Enriched Mini-BERT Fake News Analyzer Using the Arabic Language
by Husam M. Alawadh & Amerah Alabrah & Talha Meraj & Hafiz Tayyab Rauf - 1-16 The Energy Efficiency of Heterogeneous Cellular Networks Based on the Poisson Hole Process
by Yonghong Chen & Lei Xun & Shibing Zhang - 1-17 Redundancy Mitigation Mechanism for Collective Perception in Connected and Autonomous Vehicles
by Wellington Lobato & Paulo Mendes & Denis Rosário & Eduardo Cerqueira & Leandro A. Villas - 1-17 Digitalization of Distribution Transformer Failure Probability Using Weibull Approach towards Digital Transformation of Power Distribution Systems
by A. M. Sakura R. H. Attanayake & R. M. Chandima Ratnayake - 1-17 Smart Embedded System for Skin Cancer Classification
by Pedro F. Durães & Mário P. Véstias - 1-18 The Cloud-to-Edge-to-IoT Continuum as an Enabler for Search and Rescue Operations
by Leonardo Militano & Adriana Arteaga & Giovanni Toffetti & Nathalie Mitton - 1-19 Application-Aware Network Traffic Management in MEC-Integrated Industrial Environments
by Paolo Bellavista & Mattia Fogli & Carlo Giannelli & Cesare Stefanelli - 1-20 Prediction of Energy Production Level in Large PV Plants through AUTO-Encoder Based Neural-Network (AUTO-NN) with Restricted Boltzmann Feature Extraction
by Ganapathy Ramesh & Jaganathan Logeshwaran & Thangavel Kiruthiga & Jaime Lloret - 1-20 Optimal Mobility-Aware Wireless Edge Cloud Support for the Metaverse
by Zhaohui Huang & Vasilis Friderikos - 1-20 Electric Drive with an Adaptive Controller and Wireless Communication System
by Mateusz Malarczyk & Mateusz Zychlewicz & Radoslaw Stanislawski & Marcin Kaminski - 1-20 A Digital Twin Framework Embedded with POD and Neural Network for Flow Field Monitoring of Push-Plate Kiln
by Pin Wu & Lulu Ji & Wenyan Yuan & Zhitao Liu & Tiantian Tang - 1-20 Envisioning Architecture of Metaverse Intensive Learning Experience (MiLEx): Career Readiness in the 21st Century and Collective Intelligence Development Scenario
by Eman AbuKhousa & Mohamed Sami El-Tahawy & Yacine Atif - 1-21 An Optimized Planning Tool for Microwave Terrestrial and Satellite Link Design
by Eduardo Ferreira & Pedro Sebastião & Francisco Cercas & Carlos Sá Costa & Américo Correia - 1-22 Engineering Resource-Efficient Data Management for Smart Cities with Apache Kafka
by Theofanis P. Raptis & Claudio Cicconetti & Manolis Falelakis & Grigorios Kalogiannis & Tassos Kanellos & Tomás Pariente Lobo - 1-24 A TOSCA-Based Conceptual Architecture to Support the Federation of Heterogeneous MSaaS Infrastructures
by Paolo Bocciarelli & Andrea D’Ambrogio - 1-28 A Model Based Framework for IoT-Aware Business Process Management
by Paolo Bocciarelli & Andrea D’Ambrogio & Tommaso Panetti - 1-29 Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
by Mohammed El-hajj & Hussien Mousawi & Ahmad Fadlallah - 1-32 From Service Composition to Mashup Editor: A Multiperspective Taxonomy
by Abderrahmane Maaradji & Hakim Hacid & Assia Soukane - 1-34 Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
by Afnan Alotaibi & Murad A. Rassam
January 2023, Volume 15, Issue 1
- 1-12 Adapting Recommendations on Environmental Education Programs
by Katerina Kabassi & Anastasia Papadaki & Athanasios Botonis - 1-13 A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
by Qiang Li - 1-14 Blockchain, Quo Vadis? Recent Changes in Perspectives on the Application of Technology in Agribusiness
by Geneci da Silva Ribeiro Rocha & Diego Durante Mühl & Hermenegildo Almeida Chingamba & Letícia de Oliveira & Edson Talamini - 1-15 Time Segmentation-Based Hybrid Caching in 5G-ICN Bearer Network
by Ke Zhao & Rui Han & Xu Wang - 1-15 Abstracting Data in Distributed Ledger Systems for Higher Level Analytics and Visualizations
by Leny Vinceslas & Safak Dogan & Srikumar Sundareshwar & Ahmet M. Kondoz - 1-16 Product Evaluation Prediction Model Based on Multi-Level Deep Feature Fusion
by Qingyan Zhou & Hao Li & Youhua Zhang & Junhong Zheng - 1-19 Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
by Brent Pethers & Abubakar Bello - 1-19 Deep Reinforcement Learning Evolution Algorithm for Dynamic Antenna Control in Multi-Cell Configuration HAPS System
by Siyuan Yang & Mondher Bouazizi & Tomoaki Ohtsuki & Yohei Shibata & Wataru Takabatake & Kenji Hoshino & Atsushi Nagate - 1-21 Transfer Functions and Linear Distortions in Ultra-Wideband Channels Faded by Rain in GeoSurf Satellite Constellations
by Emilio Matricciani & Carlo Riva - 1-21 Image of a City through Big Data Analytics: Colombo from the Lens of Geo-Coded Social Media Data
by Sandulika Abesinghe & Nayomi Kankanamge & Tan Yigitcanlar & Surabhi Pancholi - 1-21 Cost-Profiling Microservice Applications Using an APM Stack
by Sjouke de Vries & Frank Blaauw & Vasilios Andrikopoulos - 1-21 Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking
by Neamah S. Radam & Sufyan T. Faraj Al-Janabi & Khalid Sh. Jasim - 1-25 Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation
by Teresa Gonçalves & Rute Veladas & Hua Yang & Renata Vieira & Paulo Quaresma & Paulo Infante & Cátia Sousa Pinto & João Oliveira & Maria Cortes Ferreira & Jéssica Morais & Ana Raquel Pereira & Nuno Fernandes & Carolina Gonçalves - 1-27 Redactable Blockchain: Comprehensive Review, Mechanisms, Challenges, Open Issues and Future Research Directions
by Shams Mhmood Abd Ali & Mohd Najwadi Yusoff & Hasan Falah Hasan - 1-27 A Multi-Agent Approach to Binary Classification Using Swarm Intelligence
by Sean Grimes & David E. Breen
December 2022, Volume 15, Issue 1
- 1-3 VR, AR, and 3-D User Interfaces for Measurement and Control
by Annalisa Liccardo & Francesco Bonavolontà - 1-11 Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market
by Bashar Igried & Atalla Fahed Al-Serhan & Ayoub Alsarhan & Mohammad Aljaidi & Amjad Aldweesh - 1-12 Narrowband Internet-of-Things to Enhance the Vehicular Communications Performance
by Qadri Hamarsheh & Omar Daoud & Mohammed Baniyounis & Ahlam Damati - 1-13 BART-IT: An Efficient Sequence-to-Sequence Model for Italian Text Summarization
by Moreno La Quatra & Luca Cagliero - 1-15 Statistical Model of Accurately Estimating Service Delay Behavior in Saturated IEEE 802.11 Networks Based on 2-D Markov Chain
by Qian Yang & Suoping Li & Hongli Li & Weiru Chen - 1-18 Teachers’ Views on Integrating Augmented Reality in Education: Needs, Opportunities, Challenges and Recommendations
by Maria Perifanou & Anastasios A. Economides & Stavros A. Nikou - 1-19 Ethereum-Based Information System for Digital Higher Education Registry and Verification of Student Achievement Documents
by Yerlan Kistaubayev & Galimkair Mutanov & Madina Mansurova & Zhanna Saxenbayeva & Yassynzhan Shakan - 1-19 An Analysis of ML-Based Outlier Detection from Mobile Phone Trajectories
by Francisco Melo Pereira & Rute C. Sofia - 1-19 Drifting Streaming Peaks-Over-Threshold-Enhanced Self-Evolving Neural Networks for Short-Term Wind Farm Generation Forecast
by Yunchuan Liu & Amir Ghasemkhani & Lei Yang - 1-19 A GIS-Based Hot and Cold Spots Detection Method by Extracting Emotions from Social Streams
by Barbara Cardone & Ferdinando Di Martino & Vittorio Miraglia - 1-20 HH-NIDS: Heterogeneous Hardware-Based Network Intrusion Detection Framework for IoT Security
by Duc-Minh Ngo & Dominic Lightbody & Andriy Temko & Cuong Pham-Quoc & Ngoc-Thinh Tran & Colin C. Murphy & Emanuel Popovici - 1-20 A Cross-Platform Personalized Recommender System for Connecting E-Commerce and Social Network
by Jiaxu Zhao & Binting Su & Xuli Rao & Zhide Chen - 1-20 A Novel NODE Approach Combined with LSTM for Short-Term Electricity Load Forecasting
by Songtao Huang & Jun Shen & Qingquan Lv & Qingguo Zhou & Binbin Yong - 1-21 Logically-Centralized SDN-Based NDN Strategies for Wireless Mesh Smart-City Networks
by Sarantis Kalafatidis & Sotiris Skaperas & Vassilis Demiroglou & Lefteris Mamatas & Vassilis Tsaoussidis - 1-21 The Emerging Technologies of Digital Payments and Associated Challenges: A Systematic Literature Review
by Khando Khando & M. Sirajul Islam & Shang Gao - 1-23 Using Social Media & Sentiment Analysis to Make Investment Decisions
by Ben Hasselgren & Christos Chrysoulas & Nikolaos Pitropakis & William J. Buchanan - 1-23 NewSQL Databases Assessment: CockroachDB, MariaDB Xpand, and VoltDB
by Eduardo Pina & Filipe Sá & Jorge Bernardino - 1-24 Evaluating the Perceived Quality of Mobile Banking Applications in Croatia: An Empirical Study
by Tihomir Orehovački & Luka Blašković & Matej Kurevija - 1-24 Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service
by Jinze Du & Chengtai Gao & Tao Feng - 1-25 Pedestrian Simulation with Reinforcement Learning: A Curriculum-Based Approach
by Giuseppe Vizzari & Thomas Cecconello - 1-26 Utility of Sharing Economy Principles in the Development of Applications Dedicated to Construction Cost Estimation
by Adrian Sfichi & Eduard Zadobrischi & Narcisa Sfichi & Marian Bădeliță & Mihai Medrihan - 1-26 SmartGroup: A Tool for Small-Group Learning Activities
by Haining Zhu & Na Li & Nitish Kumar Rai & John M. Carroll - 1-35 Review on Semantic Modeling and Simulation of Cybersecurity and Interoperability on the Internet of Underwater Things
by Konstantinos Kotis & Stavros Stavrinos & Christos Kalloniatis - 1-42 Human–Machine Interaction through Advanced Haptic Sensors: A Piezoelectric Sensory Glove with Edge Machine Learning for Gesture and Object Recognition
by Roberto De Fazio & Vincenzo Mariano Mastronardi & Matteo Petruzzi & Massimo De Vittorio & Paolo Visconti
December 2022, Volume 14, Issue 12
- 1-2 Information and Future Internet Security, Trust and Privacy
by Weizhi Meng & Thanassis Giannetsos & Christian D. Jensen - 1-2 Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains
by Uttam Ghosh & Deepak Tosh & Nawab Muhammad Faseeh Qureshi & Ali Kashif Bashir & Al-Sakib Khan Pathan & Zhaolong Ning - 1-3 Smart Objects and Technologies for Social Good
by Ivan Miguel Pires - 1-4 6G Wireless Communication Systems: Applications, Opportunities and Challenges
by Kelvin Anoh & Chan Hwang See & Yousef Dama & Raed A. Abd-Alhameed & Simeon Keates - 1-12 Implementation of the Canny Edge Detector Using a Spiking Neural Network
by Krishnamurthy V. Vemuru - 1-12 ERGCN: Enhanced Relational Graph Convolution Network, an Optimization for Entity Prediction Tasks on Temporal Knowledge Graphs
by Yinglin Wang & Xinyu Xu - 1-12 A Multi-Sensory In-Store Virtual Reality Customer Journey for Retailing: A Field Study in a Furniture Flagship Store
by Michele Fiorentino & Marina Ricci & Alessandro Evangelista & Vito Modesto Manghisi & Antonio Emmanuele Uva - 1-14 Professionals as Change Agents or Instruments of Reproduction? Medical Residents’ Reasoning for Not Sharing the Electronic Health Record Screen with Patients
by Celeste Campos-Castillo & Noelle Chesley & Onur Asan - 1-15 Single-Shot Global and Local Context Refinement Neural Network for Head Detection
by Jingyuan Hu & Zhouwang Yang - 1-16 Gamification with Scratch or App Inventor in Higher Education: A Systematic Review
by David Pérez-Jorge & María Carmen Martínez-Murciano - 1-17 Enhancing the Lifetime and Energy Efficiency of Wireless Sensor Networks Using Aquila Optimizer Algorithm
by Ashraf A. Taha & Hagar O. Abouroumia & Shimaa A. Mohamed & Lamiaa A. Amar - 1-18 A Low-Cost Open-Source Architecture for a Digital Signage Emergency Evacuation System for Cruise Ships, Based on IoT and LTE/4G Technologies
by Vasileios Cheimaras & Athanasios Trigkas & Panagiotis Papageorgas & Dimitrios Piromalis & Emmanouil Sofianopoulos - 1-18 Examining Gender Bias of Convolutional Neural Networks via Facial Recognition
by Tony Gwyn & Kaushik Roy - 1-19 LSSDNF: A Lightweight Secure Software Defined Network Framework for Future Internet in 5G–6G
by Surjit Singh & Vivek Mehla & Srete Nikolovski - 1-19 Comparative Analysis of Skeleton-Based Human Pose Estimation
by Jen-Li Chung & Lee-Yeng Ong & Meng-Chew Leow - 1-21 Holistic Utility Satisfaction in Cloud Data Centre Network Using Reinforcement Learning
by Pejman Goudarzi & Mehdi Hosseinpour & Roham Goudarzi & Jaime Lloret - 1-22 Integrated SDN-NFV 5G Network Performance and Management-Complexity Evaluation
by Nico Surantha & Noffal A. Putra - 1-22 Graph-Based Taxonomic Semantic Class Labeling
by Tajana Ban Kirigin & Sanda Bujačić Babić & Benedikt Perak - 1-23 Internet Video Delivery Improved by Super-Resolution with GAN
by Joao da Mata Liborio & Cesar Melo & Marcos Silva - 1-26 Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks
by Okiemute Roberts Omasheye & Samuel Azi & Joseph Isabona & Agbotiname Lucky Imoize & Chun-Ta Li & Cheng-Chi Lee - 1-27 FedCO: Communication-Efficient Federated Learning via Clustering Optimization
by Ahmed A. Al-Saedi & Veselka Boeva & Emiliano Casalicchio - 1-45 TinyML for Ultra-Low Power AI and Large Scale IoT Deployments: A Systematic Review
by Nikolaos Schizas & Aristeidis Karras & Christos Karras & Spyros Sioutas
November 2022, Volume 14, Issue 12
- 1-2 Cloud-Native Applications and Services
by Nane Kratzke - 1-12 YOLO-DFAN: Effective High-Altitude Safety Belt Detection Network
by Wendou Yan & Xiuying Wang & Shoubiao Tan - 1-15 Evolutionary Computation for Sparse Synthesis Optimization of CCAAs: An Enhanced Whale Optimization Algorithm Method
by Bohao Tang & Lihua Cai & Shuai Yang & Jiaxing Xu & Yi Yu - 1-15 A Game-Theoretic Approach for Network Security Using Honeypots
by Răzvan Florea & Mitică Craus - 1-16 NextDet: Efficient Sparse-to-Dense Object Detection with Attentive Feature Aggregation
by Priyank Kalgaonkar & Mohamed El-Sharkawy - 1-17 rl4dtn: Q-Learning for Opportunistic Networks
by Jorge Visca & Javier Baliosian - 1-17 The Application of Artificial Intelligence in Magnetic Hyperthermia Based Research
by Magdalena Osial & Agnieszka Pregowska - 1-18 Recursive Feature Elimination for Improving Learning Points on Hand-Sign Recognition
by Rung-Ching Chen & William Eric Manongga & Christine Dewi - 1-18 Analysis and Prediction of the IPv6 Traffic over Campus Networks in Shanghai
by Zhiyang Sun & Hui Ruan & Yixin Cao & Yang Chen & Xin Wang - 1-18 SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network
by Ronghua Xu & Yu Chen & Genshe Chen & Erik Blasch - 1-20 A Novel Strategy for VNF Placement in Edge Computing Environments
by Anselmo Luiz Éden Battisti & Evandro Luiz Cardoso Macedo & Marina Ivanov Pereira Josué & Hugo Barbalho & Flávia C. Delicato & Débora Christina Muchaluat-Saade & Paulo F. Pires & Douglas Paulo de Mattos & Ana Cristina Bernardo de Oliveira - 1-22 COVID-Related Misinformation Migration to BitChute and Odysee
by Olga Papadopoulou & Evangelia Kartsounidou & Symeon Papadopoulos - 1-26 Cumulative Impact of Testing Factors in Usability Tests for Human-Centered Web Design
by Alexander V. Yakunin & Svetlana S. Bodrunova - 1-29 Integrating ISA and Part-of Domain Knowledge into Process Model Discovery
by Alessio Bottrighi & Marco Guazzone & Giorgio Leonardi & Stefania Montani & Manuel Striani & Paolo Terenziani - 1-29 QuickFaaS: Providing Portability and Interoperability between FaaS Platforms
by Pedro Rodrigues & Filipe Freitas & José Simão - 1-30 Detection of Malicious Websites Using Symbolic Classifier
by Nikola Anđelić & Sandi Baressi Šegota & Ivan Lorencin & Matko Glučina - 1-33 A Systematic Literature Review on Applications of GAN-Synthesized Images for Brain MRI
by Sampada Tavse & Vijayakumar Varadarajan & Mrinal Bachute & Shilpa Gite & Ketan Kotecha
October 2022, Volume 14, Issue 11
- 1-2 Editorial for the Special Issue on “Software Engineering and Data Science”
by Davide Tosi - 1-10 Hate and False Metaphors: Implications to Emerging E-Participation Environment
by Sreejith Alathur & Naganna Chetty & Rajesh R. Pai & Vishal Kumar & Sahraoui Dhelim - 1-13 A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G
by Faycal Bouhafs & Alessandro Raschellà & Michael Mackay & Frank den Hartog - 1-15 Ambient Environmental Parameter Estimation for Reliable Diffusive Molecular Communications
by Shota Toriyama & Shoma Hasegawa & Jens Kirchner & Georg Fischer & Daisuke Anzai - 1-15 A Multi-Gateway Behaviour Study for Traffic-Oriented LoRaWAN Deployment
by Kerima Saleh Abakar & Ismail Bennis & Abdelhafid Abouaissa & Pascal Lorenz - 1-16 What Is Metaverse?—A Definition Based on Qualitative Meta-Synthesis
by Markus Weinberger - 1-17 Decision Support Using Machine Learning Indication for Financial Investment
by Ariel Vieira de Oliveira & Márcia Cristina Schiavi Dazzi & Anita Maria da Rocha Fernandes & Rudimar Luis Scaranto Dazzi & Paulo Ferreira & Valderi Reis Quietinho Leithardt - 1-17 Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing
by Tianyu Bai & Song Fu & Qing Yang - 1-19 Real-Time Flood Monitoring with Computer Vision through Edge Computing-Based Internet of Things
by Obaid Rafiq Jan & Hudyjaya Siswoyo Jo & Riady Siswoyo Jo & Jonathan Kua - 1-21 Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases
by Rasheed Gbenga Jimoh & Olayinka Olufunmilayo Olusanya & Joseph Bamidele Awotunde & Agbotiname Lucky Imoize & Cheng-Chi Lee - 1-21 LoRaWAN Network Downlink Routing Control Strategy Based on the SDN Framework and Improved ARIMA Model
by Qi Qian & Liang Shu & Yuxiang Leng & Zhizhou Bao - 1-21 EduTVA: Metadata Schema for Educational Audiovisual Contents in Digital Television Environments
by Angela M. Vargas-Arcila & Julian A. Caicedo-Muñoz & Felipe Estrada-Solano & Carlos González-Amarillo & Armando Ordonez & Jose L. Arciniegas - 1-22 Analysis of Data from Surveys for the Identification of the Factors That Influence the Migration of Small Companies to eCommerce
by William Villegas-Ch. & Santiago Criollo-C & Walter Gaibor-Naranjo & Xavier Palacios-Pacheco - 1-25 Privacy Goals for the Data Lifecycle
by Jane Henriksen-Bulmer & Cagatay Yucel & Shamal Faily & Ioannis Chalkias - 1-43 Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects
by Christoph Stach & Clémentine Gritti & Julia Bräcker & Michael Behringer & Bernhard Mitschang
November 2022, Volume 14, Issue 11
- 1-2 Internet of Things and Cyber–Physical Systems
by Iwona Grobelna - 1-2 Editorial for the Special Issue on 5G Enabling Technologies and Wireless Networking
by Michael Mackay - 1-3 Editorial for the Special Issue “Selected Papers from the 9th Annual Conference ‘Comparative Media Studies in Today’s World’ (CMSTW’2021)”
by Svetlana S. Bodrunova - 1-4 Special Issue on Security and Privacy in Blockchains and the IoT
by Christoph Stach - 1-6 Collaborative and Intelligent Networks and Decision Systems and Services for Supporting Engineering and Production Management
by Leonilde Varela & Goran D. Putnik - 1-12 Real-Time Image Detection for Edge Devices: A Peach Fruit Detection Application
by Eduardo Assunção & Pedro D. Gaspar & Khadijeh Alibabaei & Maria P. Simões & Hugo Proença & Vasco N. G. J. Soares & João M. L. P. Caldeira - 1-12 Key Competences for Lifelong Learning through the “Animal Crossing: New Horizons” Video Game
by Beatriz Villarejo-Carballido & Cristina M. Pulido & Santiago Tejedor - 1-12 The Future of Cybersecurity in the Age of Quantum Computers
by Fazal Raheman - 1-14 A Machine Learning Predictive Model to Detect Water Quality and Pollution
by Xiaoting Xu & Tin Lai & Sayka Jahan & Farnaz Farid & Abubakar Bello - 1-14 Financial Market Correlation Analysis and Stock Selection Application Based on TCN-Deep Clustering
by Yuefeng Cen & Mingxing Luo & Gang Cen & Cheng Zhao & Zhigang Cheng - 1-15 BERT- and BiLSTM-Based Sentiment Analysis of Online Chinese Buzzwords
by Xinlu Li & Yuanyuan Lei & Shengwei Ji - 1-15 Multimodel Phishing URL Detection Using LSTM, Bidirectional LSTM, and GRU Models
by Sanjiban Sekhar Roy & Ali Ismail Awad & Lamesgen Adugnaw Amare & Mabrie Tesfaye Erkihun & Mohd Anas - 1-16 Users’ Perceptions of Key Blockchain Features in Games
by Iikka Paajala & Jesse Nyyssölä & Juho Mattila & Pasi Karppinen - 1-16 Reliable Application Layer Routing Using Decentralized Identifiers
by Khalid Alsubhi & Bander Alzahrani & Nikos Fotiou & Aiiad Albeshri & Mohammed Alreshoodi - 1-16 SHFL: K-Anonymity-Based Secure Hierarchical Federated Learning Framework for Smart Healthcare Systems
by Muhammad Asad & Muhammad Aslam & Syeda Fizzah Jilani & Saima Shaukat & Manabu Tsukada - 1-17 IoT-Based System for Improving Vehicular Safety by Continuous Traffic Violation Monitoring
by Yousef-Awwad Daraghmi & Mamoun Abu Helou & Eman-Yasser Daraghmi & Waheeb Abu-ulbeh - 1-18 Comparison of Distributed Tamper-Proof Storage Methods for Public Key Infrastructures
by Fabian Honecker & Julian Dreyer & Ralf Tönjes - 1-19 A Dynamic Federated Identity Management Using OpenID Connect
by Ahmad Alsadeh & Nasri Yatim & Yousef Hassouneh - 1-19 Assessing Latency of Packet Delivery in the 5G 3GPP Integrated Access and Backhaul Architecture with Half-Duplex Constraints
by Nikita Polyakov & Anna Platonova - 1-20 A Comparison of Blockchain Recovery Time in Static and Mobile IoT-Blockchain Networks
by Yue Su & Kien Nguyen & Hiroo Sekiya - 1-21 Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network
by Yujian Zhang & Daifu Liu - 1-21 A Cost-Aware Framework for QoS-Based and Energy-Efficient Scheduling in Cloud–Fog Computing
by Husam Suleiman - 1-21 Data Synchronization: A Complete Theoretical Solution for Filesystems
by Elod P. Csirmaz & Laszlo Csirmaz - 1-22 Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing
by Gousia Habib & Sparsh Sharma & Sara Ibrahim & Imtiaz Ahmad & Shaima Qureshi & Malik Ishfaq - 1-23 Integrating Chatbot Media Automations in Professional Journalism: An Evaluation Framework
by Efthimis Kotenidis & Nikolaos Vryzas & Andreas Veglis & Charalampos Dimoulas - 1-24 Exploring the Design of a Mixed-Reality 3D Minimap to Enhance Pedestrian Satisfaction in Urban Exploratory Navigation
by Yiyi Zhang & Tatsuo Nakajima - 1-24 Generating Indicators of Disruptive Innovation Using Big Data
by Roger C. Brackin & Michael J. Jackson & Andrew Leyshon & Jeremy G. Morley & Sarah Jewitt - 1-31 The Role of Users’ Demographic and Social Attributes for Accepting Biometric Systems: A Greek Case Study
by Angeliki Kitsiou & Charikleia Despotidi & Christos Kalloniatis & Stefanos Gritzalis - 1-55 Evaluation of the Factors That Impact the Perception of Online Content Trustworthiness by Income, Political Affiliation and Online Usage Time
by Matthew Spradling & Jeremy Straub
October 2022, Volume 14, Issue 10
- 1-12 A Unified PUF and Crypto Core Exploiting the Metastability in Latches
by Ronaldo Serrano & Ckristian Duran & Marco Sarmiento & Tuan-Kiet Dang & Trong-Thuc Hoang & Cong-Kha Pham - 1-14 Smart Preliminary Channel Access to Support Real-Time Traffic in Wi-Fi Networks
by Kirill Chemrov & Dmitry Bankov & Evgeny Khorov & Andrey Lyakhov - 1-15 A Hybrid Deep Learning Model with Self-Improved Optimization Algorithm for Detection of Security Attacks in IoT Environment
by Amit Sagu & Nasib Singh Gill & Preeti Gulia & Jyotir Moy Chatterjee & Ishaani Priyadarshini - 1-16 A Self-Supervised Learning Model for Unknown Internet Traffic Identification Based on Surge Period
by Dawei Wei & Feifei Shi & Sahraoui Dhelim - 1-16 Improved Dragonfly Optimization Algorithm for Detecting IoT Outlier Sensors
by Maytham N. Meqdad & Seifedine Kadry & Hafiz Tayyab Rauf - 1-16 Modeling and Analyzing Preemption-Based Service Prioritization in 5G Networks Slicing Framework
by Yves Adou & Ekaterina Markova & Yuliya Gaidamaka - 1-18 Natural Language Processing and Cognitive Networks Identify UK Insurers’ Trends in Investor Day Transcripts
by Stefan Claus & Massimo Stella - 1-20 Study of the Organization and Implementation of E-Learning in Wartime Inside Ukraine
by Liudmyla Matviichuk & Stefano Ferilli & Nataliia Hnedko - 1-21 A Comparative Study on Traffic Modeling Techniques for Predicting and Simulating Traffic Behavior
by Taghreed Alghamdi & Sifatul Mostafi & Ghadeer Abdelkader & Khalid Elgazzar - 1-23 Towards Reliable Baselines for Document-Level Sentiment Analysis in the Czech and Slovak Languages
by Ján Mojžiš & Peter Krammer & Marcel Kvassay & Lenka Skovajsová & Ladislav Hluchý - 1-28 Experimenting with Routing Protocols in the Data Center: An ns-3 Simulation Approach
by Leonardo Alberro & Felipe Velázquez & Sara Azpiroz & Eduardo Grampin & Matías Richart - 1-34 Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches
by Gengxian Li & Chundong Wang & Huaibin Wang - 1-52 A Survey of Wi-Fi 6: Technologies, Advances, and Challenges
by Erfan Mozaffariahrar & Fabrice Theoleyre & Michael Menth
September 2022, Volume 14, Issue 10
- 1-11 Minimization of n th Order Rate Matching in Satellite Networks with One to Many Pairings
by Anargyros J. Roumeliotis & Christos N. Efrem & Athanasios D. Panagopoulos - 1-12 An Efficient Location-Based Forwarding Strategy for Named Data Networking and LEO Satellite Communications
by Pablo Iglesias-Sanuy & José Carlos López-Ardao & Miguel Rodríguez-Pérez & Sergio Herrería-Alonso & Andrés Suárez-González & Raúl F. Rodríguez-Rubio - 1-13 Distributed Big Data Storage Infrastructure for Biomedical Research Featuring High-Performance and Rich-Features
by Xingjian Xu & Lijun Sun & Fanjun Meng - 1-13 Improving Quality Indicators of the Cloud-Based IoT Networks Using an Improved Form of Seagull Optimization Algorithm
by Hamza Mohammed Ridha Al-Khafaji - 1-13 Latency Analysis of Blockchain-Based SSI Applications
by Tamas Pflanzner & Hamza Baniata & Attila Kertesz - 1-13 Playful Meaning-Making as Prosocial Fun
by John M. Carroll & Fanlu Gui & Srishti Gupta & Tiffany Knearem - 1-14 Deep Learning Based Semantic Image Segmentation Methods for Classification of Web Page Imagery
by Ramya Krishna Manugunta & Rytis Maskeliūnas & Robertas Damaševičius - 1-16 Modelling Analysis of a Novel Frameless Slotted-ALOHA Protocol Based on the Number of Detectable Conflicting Users
by Sa Yang & Suoping Li & Nana Yang & Ying Lin - 1-17 Information Technologies for Real-Time Mapping of Human Well-Being Indicators in an Urban Historical Garden
by Francesco Pirotti & Marco Piragnolo & Marika D’Agostini & Raffaele Cavalli