Abstract is missing.
- An Approach for Mitigating Disruptions on Resources' Consumption CyclesZakaria Maamar, Fatma Masmoudi, Ejub Kajan. 1-12 [doi]
- Text Detection and Recognition Using Augmented Reality and Deep LearningImene Ouali, Mohamed Ben Halima, Ali Wali. 13-23 [doi]
- An Energy Consumption Model of Servers to Make Virtual Machines MigrateDilawaer Duolikun, Tomoya Enokido, Leonard Barolli, Makoto Takizawa 0001. 24-36 [doi]
- Development of a Blockchain-Based Ad Listing ApplicationHamza Salem, Manuel Mazzara, Hadi Saleh, Rami Husami, Siham Maher Hattab. 37-45 [doi]
- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online CoursesCarlo Blundo, Giuseppe Fenza, Graziano Fuccio, Vincenzo Loia, Francesco Orciuoli. 46-55 [doi]
- Enhanced Autonomous Driving Through Improved 3D Objects DetectionRazvan Bocu, Maksim Iavich. 56-66 [doi]
- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission ChannelMayssa Ghribi, Aref Meddeb. 67-78 [doi]
- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT NetworksMayssa Ghribi, Aref Meddeb. 79-90 [doi]
- A Dynamic ID Assignment Approach for Modular RobotsJoseph Assaker, Abdallah Makhoul, Julien Bourgeois, Benoît Piranda, Jacques Demerjian. 91-104 [doi]
- Open-Source Publish-Subscribe Systems: A Comparative StudyApostolos Lazidis, Euripides G. M. Petrakis, Spyridon Chouliaras, Stelios Sotiriadis. 105-115 [doi]
- Conceptual Foundations of Code Rationalization Through a Case Study in HaskellRazvan Bocu, Dorin Bocu. 116-128 [doi]
- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based SystemsTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 129-139 [doi]
- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social MediaFarzad Nourmohammadzadeh Motlagh, Anne V. D. M. Kayem, Christoph Meinel. 140-151 [doi]
- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex NetworksBader Alwasel. 152-166 [doi]
- Resource Authorization Methods for Edge ComputingRyu Watanabe, Ayumu Kubota, Jun Kurihara. 167-179 [doi]
- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer TrafficVanice Canuto Cunha, Damien Magoni, Pedro R. M. Inácio, Mário M. Freire. 180-193 [doi]
- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile NetworksKhaled Abid, Hicham Lakhlef, Abdelmadjid Bouabdallah. 194-204 [doi]
- Automatic Monitoring System for Security Using IoT Devices and Smart ContractsKotono Iwata, Kazumasa Omote. 205-216 [doi]
- A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packetMinh Duc Nguyen, Masaya Azuma, Shota Uchimura, Makoto Ikeda, Leonard Barolli. 217-225 [doi]
- Chaotic-Maps Based Access Authentication Protocol for Remote Communication Using Space Information NetworksSusmita Mandal, S. S. Sravan, Lakshmi Ramesh. 226-237 [doi]
- Sensor Placement Strategy for SHM: Application of the Great Mosque of SfaxWael Doghri, Ahlem Saddoud, Lamia Chaari Fourati. 238-248 [doi]
- A Comparative Analysis of Machine Learning Algorithms for Distributed Intrusion Detection in IoT NetworksMoroni N. Vieira, Luciana P. Oliveira, Leonardo Carneiro. 249-258 [doi]
- Message Delivery of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant NetworksKoichiro Sugihara, Naohiro Hayashibara. 259-270 [doi]
- Towards Efficient Selective In-Band Network Telemetry Report Using SmartNICsRonaldo Canofre, Ariel G. de Castro, Arthur Francisco Lorenzon, Fábio Diniz Rossi, Marcelo Caggiani Luizelli. 271-284 [doi]
- Energy Consumption of the Information Flow Control in the IoT: Simulation EvaluationShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 285-296 [doi]
- Artificial Intelligence Based Approach for Fault and Anomaly Detection Within UAVsFadhila Tlili, Samiha Ayed, Lamia Chaari, Bassem Ouni. 297-308 [doi]
- Composition and Polymorphism Support in the OpenAPI OntologyFotios Bouraimis, Nikolaos Mainas, Euripides G. M. Petrakis. 309-320 [doi]
- Improved Road State Sensing System and Its Data Analysis for Snow CountryYoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Yoshiya Saito. 321-329 [doi]
- Multi-agent Q-learning Based Navigation in an Unknown EnvironmentAmar Nath, Rajdeep Niyogi, Tajinder Singh, Virendra Kumar. 330-340 [doi]
- Improving Urban Mobility with Vehicular Routing: A Parallel ApproachFillipe Almeida Paz, Filipe Nascimento Almeida, Rúbens de Souza Matos Júnior, Itauan Silva Eduão Ferreira, Ricardo Jose Paiva de Britto Salgueiro. 341-352 [doi]
- How to Automatically Prove a Time Series Convergence to the Gumbel Distribution?Amal Mateur, Nesrine Khabou, Ismael Bouassida Rodriguez. 353-363 [doi]
- A Machine Learning-Based Model for Predicting the Risk of Cardiovascular DiseaseChiu-Han Hsiao, Po-Chun Yu, Chia-Ying Hsieh, Bing-Zi Zhong, Yu-Ling Tsai, Hao-Min Cheng, Wei-Lun Chang, Frank Yeong-Sung Lin, Yennun Huang. 364-374 [doi]
- A Federated Learning-Based Precision Prediction Model for External Elastic Membrane and Lumen Boundary Segmentation in Intravascular Ultrasound ImagesChiu-Han Hsiao, Tsung-Yu Peng, Wei-Chieh Huang, Hsin-I Teng, Tse-Min Lu, Frank Yeong-Sung Lin, Yennun Huang. 375-386 [doi]
- POTENT - Decentralized Platoon Management with Heapify for Future Vehicular NetworksArunima Sharma, Dhwani Agrawal, Nandini Roy, Sunita Bhichar, Ramesh Babu Battula. 387-398 [doi]
- Web Service Anti-patterns Prediction Using LSTM with Varying Embedding SizesSahithi Tummalapalli, Lov Kumar, Lalita Bhanu Murthy Neti. 399-410 [doi]
- Federated Learning with Blockchain Approach for Trust Management in IoVAchref Haddaji, Samiha Ayed, Lamia Chaari. 411-423 [doi]
- Detection of Distributed Denial of Service Attacks Using Entropy on Sliding Window with Dynamic ThresholdShail Saharan, Vishal Gupta, Nisarg Vora, Mohul Maheshwari. 424-434 [doi]
- A Detection Mechanism for Cache Pollution Attack in Named Data Network ArchitectureAbdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler. 435-446 [doi]
- Prevention of DDoS Attacks with Reliable-Dynamic Path IdentifiersVishal Gupta, Shail Saharan, Sreetam Parida. 447-458 [doi]
- Bitcoin's Blockchain Data Analytics: A Graph Theoretic PerspectiveAman Sharma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari. 459-470 [doi]
- Whole-Body Exposure to Far-Field Using Infinite Cylindrical Model for 5G FR1 FrequenciesAymen Ben Saada, Sofiane Ben Mbarek, Fethi Choubani. 471-478 [doi]
- Analysis of an Ethereum Private Blockchain Network Hosted by Virtual Machines Against Internal DoS AttacksJoao Henrique Faes Battisti, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers, Nelson M. Gonzalez. 479-490 [doi]
- A Machine Learning Approach for a Robust Irrigation Prediction via Regression and Feature SelectionEmna Ben Abdallah 0002, Rima Grati, Malek Fredj, Khouloud Boukadi. 491-502 [doi]
- An Energy Efficient Scheme Using Heuristic Algorithms for 5G H-CRANHasna Fourati, Rihab Maaloul, Lamia Chaari, Mohamed Jmaiel. 503-515 [doi]
- A Multi-agent Based Framework for RDF Stream ProcessingWafaa Mebrek, Amel Bouzeghoub. 516-528 [doi]
- VINEVI: A Virtualized Network Vision Architecture for Smart Monitoring of Heterogeneous Applications and InfrastructuresRodrigo Moreira, Hugo Gustavo Valin Oliveira da Cunha, Larissa F. Rodrigues Moreira, Flávio de Oliveira Silva. 529-541 [doi]
- Parallel IFFT/FFT for MIMO-OFDM LTE on NoC-Based FPGAKais Jallouli, Azer Hasnaoui, Jean-Philippe Diguet, Alireza Monemi, Salem Hasnaoui. 542-553 [doi]
- Software-Defined Overlay Network Implementation and Its Use for Interoperable Mission Network in Military CommunicationsShuraia Khan, Farookh Khadeer Hussain. 554-565 [doi]
- Fault Tolerant Multiple Dominating Set Constructions for Wireless Ad-hoc NetworksKhaleda Akther Papry, Ashikur Rahman. 566-578 [doi]
- Forecasting the Number of Firemen Interventions Using Exponential Smoothing Methods: A Case StudyRoxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul. 579-589 [doi]
- Mechanisms to Avoid the Unavailability of Points of Presence: A Systematic ReviewMaria Camila Lijó, Luciana Pereira Oliveira. 590-601 [doi]
- A Provably Secure User Authentication Scheme Over Unreliable NetworksToan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Anh Duy Tran. 602-613 [doi]
- Event-Triggered Based Distributed Agreement Algorithm to Ensure the Cohort StabilityImen Zidi, Abir Ben Ali, Farouk Kamoun. 614-626 [doi]
- Game Theory-Based Energy Efficient Routing in Opportunistic NetworksJagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang. 627-639 [doi]
- Accurate Modelling of A-MPDU Aggregation Technique with Markovian Techniques and M/M/1/k QueuesKaouther Mansour, Issam Jabri. 640-650 [doi]
- A Fuzzy-Based Scheme for Slice Priority Assessment in 5G Wireless NetworksPhudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 651-661 [doi]
- Applying Machine Learning and Dynamic Resource Allocation Techniques in Fifth Generation NetworksChristos John Bouras, Evangelos Michos, Ioannis Prokopiou. 662-673 [doi]
- Mesh Routers Placement by WMN-PSODGA Simulation System: Effect of Number of Mesh Routers Considering Stadium Distribution and RDVM MethodAdmir Barolli, Kevin Bylykbashi, Shinji Sakamoto, Elis Kulla, Leonard Barolli. 674-685 [doi]