Abstract is missing.
- Infrared Image Fault Identification of Power Equipment Based on Residual NetworkFangrong Zhou, Yi Ma, Yutang Ma, Hao Pan. 3-13 [doi]
- Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole InternetKazuya Odagiri, Shogo Shimizu, Naohiro Ishii. 14-23 [doi]
- Educational Microclimate Mesonet System DesignJames Robertson, Jianhua Yang, W. Scott Gunter, Peter Keres, Thomas Wingate, Anthony Obando. 24-33 [doi]
- A Machine to Machine Framework for the Charging of Electric Autonomous VehiclesZiyad Elbanna, Ilya Afanasyev, Luiz Jonatã Pires de Araújo, Rasheed Hussain, Mansur Khazeev, Joseph Lamptey, Manuel Mazzara, Swati Megha, Diksha Moolchandani, Dragos Strugar. 34-45 [doi]
- Atomicity in the Internet of Transactional Things (Io2T)Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, Maj Alshibly. 46-55 [doi]
- Intrusion Detection Based on Cluster Analysis and Nonsymmetric AutoencoderJunke Nie, Xu an Wang, Yang Su, Bo Wang. 56-64 [doi]
- A Taxonomy of Trust Models for Attribute Assurance in Identity ManagementAndreas Grüner, Alexander Mühle, Michael Meinig, Christoph Meinel. 65-76 [doi]
- Design and Development of a New Tea-Making EcosystemQian Du, Bo Zhang, Jiuru Wang, Wenyin Zhang, Weifa Liu. 77-82 [doi]
- SDN-Based Replication Management Framework for CCN NetworksAmna Fekih, Sonia Gaied Fantar, Habib Youssef. 83-99 [doi]
- ConForm: In-Band Control Flows Self-establishment with Integrated Topology Discovery to SDN-Based NetworksMarcelo Silva Freitas, Pedro Frosi Rosa, Flávio de Oliveira Silva. 100-109 [doi]
- Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data SetsOlli Väänänen, Mikhail Zolotukhin, Timo Hämäläinen 0002. 110-121 [doi]
- Community Detection Based on Social Influence in Large Scale NetworksFarhan Amin, Jin-Ghoo Choi, Gyu Sang Choi. 122-137 [doi]
- Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud ComputingKaiyang Zhao, Xu an Wang, Yao Liu, Jiasen Liu, Songyin Zhao. 138-148 [doi]
- Toward Enforcing Security in Smart Homes Using a Trust-Based SchemeBacem Mbarek, Nafaâ Jabeur, Tomás Pitner. 149-158 [doi]
- A Survey on Vehicular Fog Computing: Motivation, Architectures, Taxonomy, and IssuesTesnim Mekki, Issam Jabri, Lamia Chaari, Abderrezak Rachedi. 159-168 [doi]
- Design of an Ontology-Oriented Hand Rehabilitation Service Platform for Rheumatoid Arthritis PatientsHao-Hsiang Ku. 169-177 [doi]
- Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics FrameworkRaj Sanjay Shah, Ashutosh Bhatia. 178-189 [doi]
- Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDNSandhya Rathee, K. Haribabu, Parth Patel, Ashutosh Bhatia, Ujjwal Gandhi. 190-200 [doi]
- Deployment of NRF in the Docker and Kubernetes - Based NFV PlatformDi Huang, Zhan Xu, Zhigang Tian. 201-213 [doi]
- Textual Statistics and Named Entity Recognition Applied to Game of Thrones NovelsAnnibale Elia, Alessandro Maisto, Giandomenico Martorelli, Serena Pelosi, Pierluigi Vitale. 214-222 [doi]
- A Review Towards the Development of Ontology Based Identity and Access Management MetamodelKamrun Nahar, Asif Qumer Gill. 223-232 [doi]
- Toward Scalable Blockchain for Data Management in VANETsEl-hacen Diallo, Khaldoun Al Agha, Omar Dib, Alexandre Laubé, Hafedh Mohamed-Babou. 233-244 [doi]
- A New SDN Architecture Based on Trust Management and Access Control for IoTNadia Kammoun, Ryma Abassi, Sihem Guemara El Fatmi, Mohamed Mosbah. 245-254 [doi]
- Efficient Method for Link Protection Under Multiple Constraints Using ZDDMasataka Akasaka, Hiroyoshi Miwa. 255-264 [doi]
- Blockchain in WSNs, VANets, IoTs and Healthcare: A SurveyFatima Tariq, Maria Anwar, Abdul Rehman Janjua, Muhammad Haseeb Khan, Asad Ullah Khan, Nadeem Javaid. 267-279 [doi]
- A Constructive Review Regarding the Significance of 5G Networks for the Internet of ThingsRazvan Bocu. 280-298 [doi]
- Routing Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor NetworkRahma Gantassi, Bechir Ben Gouissem, Jalel Ben Othmen. 299-309 [doi]
- Efficient Mechanism of eNB Bandwidth in D2D Communication in 5GEirini Barri, Christos Bouras. 310-319 [doi]
- A Blockchain Based Distributed Vehicular Network Architecture for Smart CitiesMubariz Rehman, Zahoor Ali Khan, Muhammad Umar Javed, Muhammad Zohaib Iftikhar, Usman Majeed, Imam Bux, Nadeem Javaid. 320-331 [doi]
- Performance Evaluation of a Message Relaying Method with Enhanced Dynamic Timer in Vehicular DTNMakoto Ikeda, Shogo Nakasaki, Yoshiki Tada, Leonard Barolli. 332-340 [doi]
- Indoor Mobile Localization Using Wireless Sensor Networks (WSNs)M. Hamza Bin Waheed, Rao Naveed Bin Rais, Hassan Khan, Mukhtiar Bano, Syed Sherjeel A. Gilani. 341-351 [doi]
- Performance Evaluation of Routing Protocols for Vehicular AD-HOC Networks Using NS2/SUMODardouri Soumaya, Samia Dardouri, Ridha Bouallegue. 352-365 [doi]
- SDNHybridMesh: A Hybrid Routing Architecture for SDN Based Wireless Mesh NetworksMukhtiar Bano, Rao Naveed Bin Rais, Syed Sherjeel A. Gilani, Amir Qayyum. 366-375 [doi]
- DSSS Transmission Technique to Joint Radar Sensing and Wireless Communications in V2V SystemKhaoula Ammar, Oussama Ben Haj Belkacem, Ridha Bouallegue. 376-385 [doi]
- Classification of Web Applications Using AiFlow FeaturesNathanael Mercaldo, Wei Lu. 389-399 [doi]
- Proximity-Based Context Information Retrieval for Bluetooth Enabled DevicesSergey Koziakov, Manuel Mazzara. 400-409 [doi]
- Cybersecurity Text Data Classification and Optimization for CTI SystemsAriel Rodríguez, Koji Okamura. 410-419 [doi]
- LG-Starship: A Framework for Text AnalysisAlessandro Maisto. 420-428 [doi]
- Shilling Attacks Detection in Collaborative Recommender System: Challenges and PromiseReda A. Zayed, Lamiaa Fattouh Ibrahim, Hesham A. Hefny, Hesham A. Salman. 429-439 [doi]
- A Face and Posture Recognition Model Using CNN for Adapting Different Resolution ImagesHiroakik Fuma, Kosuke Takano. 440-446 [doi]
- Factors for Academic Performance PredictionLinlin Zhang, Kin Fun Li. 447-457 [doi]
- Infrared Image Fault Identification Method Based on YOLO Target Detection AlgorithmFangrong Zhou, Yi Ma, Yutang Ma, Hao Pan. 461-470 [doi]
- Electricity Load and Price Forecasting Using Machine Learning Algorithms in Smart Grid: A SurveyArooj Arif, Nadeem Javaid, Mubbashra Anwar, Afrah Naeem, Hira Gul, Sahiba Fareed. 471-483 [doi]
- Recurrent Neural Networks Analysis Application Effect of Economy Sentiment on Car ManufacturingSeyed M.-H. Mansourbeigi. 484-493 [doi]
- Person Re-identification Based on Camera Style AdaptationTong Zhang, Caiquan Xiong. 494-503 [doi]
- A Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent SystemSeiji Ohara, Admir Barolli, Phudit Ampririt, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 504-515 [doi]
- An Automatic Software Quality and Function Assurance Case Study for AgileWei Hsu, Jung-Shan Lin, Yi-Chi Chen, Chun-Yen Wang, Chun-Tuan Huang. 519-525 [doi]
- Your Neighbor Knows What You're Doing: Defending Smart Home IoT Device Traffic from Privacy LAN AttacksKiana Dziubinski, Masaki Bandai. 526-534 [doi]
- Tile Quality Selection Method in 360-Degree Tile-Based Video StreamingArisa Sekine, Masaki Bandai. 535-544 [doi]
- DDoS Attacks in Experimental LTE NetworksJan Feng, Bing-Kai Hong, Shin-Ming Cheng. 545-553 [doi]
- Hash Flow: An Access Control Mechanism for Software Defined NetworkShih-Hao Chang, Yan Pei, Ping-Tsai Chung. 554-565 [doi]
- Method by Protection to Reduce Probability of Cascade FailureYuma Morino, Hiroyoshi Miwa. 566-575 [doi]
- Proposal of a Self-help Support System in a Mega DisasterYudai Taniguchi, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata. 579-586 [doi]
- Road State Information Platform for Automotive EV in Snow CountryYoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Yoshiya Saito, Jun Hakura. 587-594 [doi]
- Social Experimental Evaluation of Road State Information System in Snow CountryAkira Sakuraba, Yoshitaka Shibata, Goshi Sato, Noriki Uchida, Toshihiro Tamura. 595-604 [doi]
- Static Body Detecting Methods by Locational and Rotational Sensors on Smartphone for DTN Based Disaster Information SystemNoriki Uchida, Misaki Fukumoto, Tomoyuki Ishida, Yoshitaka Shibata. 605-613 [doi]
- Research on EVM-Based Smart Contract Runtime Self-protection Technology FrameworkWenchuan Yang, Jing Peng. 617-627 [doi]
- Document Business Process Model Extension for Modeling Secure Ubiquitous DocumentsMaroua Nouioua, Adel Alti, Belhassen Zouari. 628-639 [doi]
- A Semantic Model Toward Smart IoT Device ManagementFrançois Aïssaoui, Samuel Berlemont, Marc Douet, Emna Mezghani. 640-650 [doi]
- A Comparison Study of Control Devices for an Omnidirectional WheelchairKenshiro Mitsugi, Keita Matsuo, Leonard Barolli. 651-661 [doi]
- Implementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing TechniquesYiyi Wang, Koji Okamura. 662-670 [doi]
- IoT Enabled E-Business via Blockchain Technology Using Ethereum PlatformFaisal Shehzad, Nadeem Javaid, Usman Farooq, Hamza Tariq, Israr Ahmad, Sadia Jabeen. 671-683 [doi]
- 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack ClassesMarta Catillo, Massimiliano Rak, Umberto Villano. 687-696 [doi]
- Digital Divide vs e-Government: Analyzing Italian Public ServiceAlfonso Marino, Paolo Pariso. 697-708 [doi]
- An Ontology for OASIS TOSCABeniamino Di Martino, Antonio Esposito, Stefania Nacchia, Salvatore Augusto Maisto, Uwe Breitenbücher. 709-719 [doi]
- Unconventional Usage of a Web-Based Survey: Gathering Quality Data for Green Awareness in LawmakingGiuseppe Ferretti, Gianluigi Renzi. 720-729 [doi]
- A Security-Oriented Architecture for Federated Learning in Cloud EnvironmentsFiammetta Marulli, Emanuele Bellini 0001, Stefano Marrone 0001. 730-741 [doi]
- Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached CommunicationMotoharu Takahashi, Masaki Narita, Toshimitsu Inomata, Eiji Sugino. 745-755 [doi]
- On Security Information Interaction Model of Smart Grid Emergency SystemLinhua Ding, Jiuru Wang, Yingkui Li, Wenyin Zhang. 756-765 [doi]
- An Enhanced Blockchain-Based Data Management Scheme for MicrogridsBacem Mbarek, Stanislav Chren, Bruno Rossi 0001, Tomás Pitner. 766-775 [doi]
- Colluding Android Apps Detection via Model CheckingRosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone. 776-786 [doi]
- A Survey of Blockchain-Based Solutions for Energy IndustrySwati Megha, Joseph Lamptey, Hamza Mohamed Salem, Manuel Mazzara. 787-797 [doi]
- A2ISDIoT: Artificial Intelligent Intrusion Detection System for Software Defined IoT NetworksHadda Ben Elhadj, Rihab Jmal, Hajer Chelligue, Lamia Chaari Fourati. 798-809 [doi]
- A Searchable Encryption Scheme Based on Elliptic CurvesStefania Loredana Nita, Marius Iulian Mihailescu. 810-821 [doi]
- Control of DoS Attacks During Merging Process Over the Internet of ThingsAlbandari Alsumayt. 822-833 [doi]
- Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMGHisaaki Yamaba, Yuki Nagatomo, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki. 834-844 [doi]
- Comparing API Call Sequence Algorithms for Malware DetectionMassimo Ficco. 847-856 [doi]
- Towards a SIP-based DDoS Attack to the 4G NetworkNicola Cibin, Meriem Guerar, Alessio Merlo, Mauro Migliardi, Luca Verderame. 857-866 [doi]
- AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT EcosystemsLuca Verderame, Davide Caputo, Mauro Migliardi, Alessio Merlo. 867-876 [doi]
- ÂB: An Energy Aware Communications Protocol (EACP) for the Internet of Things (IoT)Navid Shaghaghi, Zach Cameron, Nicholas Kniveton, Jesse Mayer, Will Tuttle, Peter Ferguson. 877-889 [doi]
- Towards the Use of Generative Adversarial Neural Networks to Attack Online ResourcesLelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, Antonella Santone. 890-901 [doi]
- Network Lifetime Efficiency Based on Equal and Unequal Size Clustering StrategiesZaib Ullah, Roberto Gagliardi, Orhan Gemikonakli, Fadi Al-Turjman. 905-916 [doi]
- Unequal Rotating Energy Efficient Clustering for Heterogeneous Devices (UREECHD)Matteo Micheletti, Roberto Gagliardi, Fausto Marcantoni, Alessandro Aloisio. 917-925 [doi]
- On Building Networks with Limited Stretch FactorSerafino Cicerone. 926-936 [doi]
- Coverage Subject to a Budget on Multi-Interface Networks with Bounded Carving-WidthAlessandro Aloisio. 937-946 [doi]
- Optimal Cluster Head Rotation for Heterogeneous WSNsRenato De Leone, Leonardo Mostarda. 947-955 [doi]
- Predicting Probability of Default Under IFRS 9 Through Data Mining TechniquesFabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone. 959-969 [doi]
- Analysis of Data for SCAN ProjectAlessandra Amato, Marco Giacalone. 970-977 [doi]
- Data Management in the European Project SCANAlessandra Amato, Marco Giacalone. 978-983 [doi]
- Representing Knowledge on the European Small Claims ProcedureAntonino Ferraro, Marco Giacalone. 984-992 [doi]
- Quality Control in the Process of Data ExtractionAlessandra Amato, Marco Giacalone. 993-1002 [doi]
- A Smart ChatBot for Specialist DomainsRoberto Canonico, Giovanni Cozzolino, Antonino Ferraro, Vincenzo Moscato, Antonio Picariello, Fabio Raimondo Sorrentino, Giancarlo Sperlì. 1003-1010 [doi]
- Experiencing Museums A Qualitative and Quantitative Description About Igers' Narration of an Exhibit SpaceFrancesca Esposito, Mariacristina Falco, Pierluigi Vitale. 1011-1018 [doi]
- Smart Destination-Based Parking for the Optimization of Waiting TimeMarco Balzano, Walter Balzano, Loredana Sorrentino, Silvia Stranieri. 1019-1027 [doi]
- Lectures Retrieval: Improving Students' E-learning Process with a Search Engine Based on ASR ModelWalter Balzano, Chiara Pellecchia, Marco Balzano. 1028-1034 [doi]
- Survey of Educational Cyber RangesOmar M. Darwish, Christopher M. Stone, Ola Karajeh, Belal Alsinglawi. 1037-1045 [doi]
- Efficient App Based Smart Door Lock System Using BluetoothAnderson B. de Lima, Bibek Gurung, Sardar M. Farhad. 1046-1055 [doi]
- Reliable and Convenient Smart Light Control System Using Mobile AppHamza Malik, Sabin Sapkota, Sardar M. Farhad. 1056-1064 [doi]
- A Survey on Privacy and Security in Mobile Cloud ComputingAnju Rana, Farshid Hajati. 1065-1076 [doi]
- Prevention of Cross-Site Scripting Attacks in Web ApplicationsMahmoud Elkhodr, Jay K. Patel, Mehregan Mahdavi, Ergun Gide. 1077-1086 [doi]
- Detection and Mitigation of LFA Attack in SDN-IoT NetworkAlaa M. Allakany, Geeta Yadav, Kolin Paul, Koji Okamura. 1087-1096 [doi]
- A Survey on VANETs Routing Protocols for IoT Intelligent Transportation SystemsMaede Fotros, Javad Rezazadeh, Omid Ameri Sianaki. 1097-1115 [doi]
- A Security and Privacy-Preserving Path for Enhancing Information Systems that Manage Cross-Cloud ApplicationsYiannis Verginadis, Ioannis Patiniotakis, Marcin Prusinski, Marta Rózanska, Sebastian Schork, Gregoris Mentzas. 1119-1132 [doi]
- A Context-Aware Security Model for a Combination of Attribute-Based Access Control and Attribute-Based Encryption in the Healthcare DomainEvgenia Psarra, Yiannis Verginadis, Ioannis Patiniotakis, Dimitris Apostolou, Gregoris Mentzas. 1133-1142 [doi]
- Flexible 4G/5G Testbed Setup for Mobile Edge Computing Using OpenAirInterface and Open Source MANOThomas Dreibholz. 1143-1153 [doi]
- Spreading the Heat: Multi-cloud Controller for Failover and Cross-Site OffloadingSimon Kollberg, Ewnetu Bayuh Lakew, Petter Svärd, Erik Elmroth, Johan Tordsson. 1154-1164 [doi]
- Short-Term Load Forecasting Using EEMD-DAE with Enhanced CNN in Smart GridAfrah Naeem, Hira Gul, Arooj Arif, Sahiba Fareed, Mubbashra Anwar, Nadeem Javaid. 1167-1180 [doi]
- Short Term Electricity Price Forecasting Through Convolutional Neural Network (CNN)Zahoor Ali Khan, Sahiba Fareed, Mubbashra Anwar, Afrah Naeem, Hira Gul, Arooj Arif, Nadeem Javaid. 1181-1188 [doi]
- Big Data Based Electricity Price Forecasting Using Enhanced Convolutional Neural Network in the Smart GridMuhammad Adil, Nadeem Javaid, Nazia Daood, Muhammad Asim, Irfan Ullah, Muhammad Bilal. 1189-1201 [doi]
- Personalized Recommendation Algorithm Based on User Preference and User ProfileLei Zhou, Caiquan Xiong, Na Deng, Li Shen. 1202-1211 [doi]
- Electricity Price Forecasting Based on Enhanced Convolutional Neural Network in Smart GridNazia Daood, Zahoor Ali Khan, Ashraf Ullah, Muhammad Jaffar Khan, Muhammad Adil, Nadeem Javaid. 1212-1226 [doi]
- Research on Friend Recommendation Based on Topic Model and Association RulesXi Chen, Caiquan Xiong, Na Deng. 1227-1236 [doi]
- Citrus Brand Classification by CNN Considering Load and SoundShigeru Kato, Tomomichi Kagawa, Naoki Wada, Takanori Hino, Hajime Nobuhara. 1239-1249 [doi]
- Design of Optimal PI Controllers Using the Chemical Reaction Optimization Algorithm for Indirect Power Control of a DFIG Model with MPPTCuong Nguyen Cong, Ricardo Rodríguez Jorge, Nghien Nguyen Ba, Chuong Trinh Trong, Nghia Nguyen Anh. 1250-1260 [doi]
- Intelligent HTTP Request Distribution Strategies in One and Two-Layer Architectures of Cloud-Based Web SystemsKrzysztof Zatwarnicki. 1261-1273 [doi]
- Classification of Skin Lesions Shape Asymmetry Using Machine Learning MethodsPiotr Milczarski, Zofia Stawska. 1274-1286 [doi]
- Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with AutismAgnieszka Landowska, Ben Robins. 1287-1297 [doi]
- Prediction of Load Time for Different Agent Locations and BrowsersJolanta Wrzuszczak-Noga, Leszek Borzemski. 1298-1307 [doi]
- Rough Set Theory for Optimization of Packet Management Mechanism in IP RoutersJolanta Mizera-Pietraszko, Jolanta Tancula, Ireneusz Jozwiak. 1308-1320 [doi]
- Android Hook Detection Based on Machine Learning and Dynamic AnalysisMichal Szczepanik, Ireneusz J. Józwiak, Piotr P. Józwiak, Michal Kedziora, Jolanta Mizera-Pietraszko. 1321-1329 [doi]
- A New Region Growing Medical Image Segmentation Algorithm Based on Interval Type-2 Fuzzy SetsMartin Tabakov, Bartosz Jablonski. 1330-1340 [doi]
- GreenCharge Simulation ToolRocco Aversa, Dario Branco, Beniamino Di Martino, Salvatore Venticinque. 1343-1351 [doi]
- Infrastructure Access Policies to Promote Sustainable Driving Behaviours in Railway ContextsMarilisa Botte, Ilaria Tufano, Luca D'Acierno. 1352-1361 [doi]
- The Effects of Accessibility on the Location of Manufacturing Companies: The Italian Case StudyMariano Gallo, Mario Marinelli, Ivan Cavaiuolo. 1362-1372 [doi]
- An Event-Driven Multi Agent System for Scalable Traffic OptimizationGeir Horn, Tomasz Przezdziek, Monika Büscher, Salvatore Venticinque, Rocco Aversa, Beniamino Di Martino, Antonio Esposito, Pawel Skrzypek, Mark Leznik. 1373-1382 [doi]
- Towards E-mobility: Strengths and Weaknesses of Electric VehiclesArmando Cartenì, Ilaria Henke, Clorinda Molitierno, Assunta Errico. 1383-1393 [doi]
- Stakeholder Motivation Analysis for Smart and Green Charging for Electric MobilityMarit K. Natvig, Shanshan Jiang, Svein O. Hallsteinsen. 1394-1407 [doi]
- Simulation Experiments for an Approximate Definition of the Macroscopic Fundamental DiagramLuigi Pariota, Luca Di Costanzo, Francesco Spera, Gennaro Nicola Bifulco. 1408-1417 [doi]
- Behavioral Clustering: A New Approach for Traffic Congestion EvaluationWalter Balzano, Aniello Murano, Loredana Sorrentino, Silvia Stranieri. 1418-1427 [doi]