Abstract is missing.
- LSTM-Based Reinforcement Q Learning Model for Non Intrusive Load MonitoringKalthoum Zaouali, Mohamed Lassaad Ammari, Ridha Bouallegue. 1-13 [doi]
- Machine Learning for Student QoE Prediction in Mobile Learning During COVID-19Besma Korchani, Kaouthar Sethom. 14-22 [doi]
- XceptionUnetV1: A Lightweight DCNN for Biomedical Image SegmentationMohammad Faiz Iqbal Faiz, Mohammad Zafar Iqbal. 23-32 [doi]
- A Proposed Intrusion Detection Method Based on Machine Learning Used for Internet of Things SystemsNeder Karmous, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, Neji Youssef. 33-45 [doi]
- Shape Trajectory Analysis Based on HOG Descriptor for Isolated Word Sign Language RecognitionSana Fakhfakh, Yousra Ben Jemaa. 46-54 [doi]
- How Australians Are Coping with the Longest Restrictions: An Exploratory Analysis of Emotion and Sentiment from TweetsKawser Irom Rushee, Md Shamsur Rahim, Andrew Levula, Mehregan Mahdavi. 55-68 [doi]
- COVID-19 Article Classification Using Word-Embedding and Extreme Learning Machine with Various KernelsSanidhya Vijayvargiya, Lov Kumar, Aruna Malapati, Lalita Bhanu Murthy Neti, Aneesh Krishna. 69-81 [doi]
- An Improved Ant Colony Optimization Based Parking Algorithm with Graph ColoringMarco Agizza, Walter Balzano, Silvia Stranieri. 82-94 [doi]
- A Review About Machine and Deep Learning Approaches for Intelligent User InterfacesAntonino Ferraro, Marco Giacalone. 95-103 [doi]
- A Survey on Neural Recommender Systems: Insights from a Bibliographic AnalysisFlora Amato, Francesco Di Cicco, Mattia Fonisto, Marco Giacalone. 104-114 [doi]
- Information Networking and e-Government in United Nations and EuropeAlfonso Marino, Paolo Pariso, Michele Picariello. 115-120 [doi]
- A Microservices Based Architecture for the Sentiment Analysis of TweetsBeniamino Di Martino, Vincenzo Bombace, Salvatore D'Angelo, Antonio Esposito 0001. 121-130 [doi]
- Container-Based Platform for Computational MedicineGennaro Junior Pezzullo, Beniamino Di Martino, Marian Bubak. 131-140 [doi]
- Digital Twins for Autonomic Cloud Application ManagementGeir Horn, Rudolf Schlatte, Einar Broch Johnsen. 141-152 [doi]
- Opportunities and Advantages of Cloud Migration of a Smart Restaurant SystemBeniamino Di Martino, Luigi Colucci Cante, Nicla Cerullo. 153-162 [doi]
- Analysis of Techniques for Mapping Convolutional Neural Networks onto Cloud Edge Architectures Using SplitFed Learning MethodBeniamino Di Martino, Mariangela Graziano, Luigi Colucci Cante, Datiana Cascone. 163-172 [doi]
- In-cloud Migration of a Custom and Automatic Booking SystemBeniamino Di Martino, Mariangela Graziano, Serena Angela Gracco. 173-182 [doi]
- Anomalous Witnesses and Registrations Detection in the Italian Justice System Based on Big Data and Machine Learning TechniquesBeniamino Di Martino, Salvatore D'Angelo, Antonio Esposito 0001, Pietro Lupi. 183-192 [doi]
- A NLP Framework to Generate Video from Positive Comments in YoutubeHamza Salem, Manuel Mazzara. 193-198 [doi]
- Smart Insole Monitoring System for Fall Detection and Bad Plantar PressureSalma Saidani, Rim Haddad, Ridha Bouallegue, Raed M. Shubair. 199-208 [doi]
- A Recommendation Method of Health Articles Based on Association Rules for Health Terms Appeared on Web Documents and Their Application SystemsTrinh Viet Thong, Kosuke Takano, Kin Fun Li. 209-219 [doi]
- A Voronoi Edge and CCM-Based SA Approach for Mesh Router Placement Optimization in WMNs: A Comparison Study for Different EdgesAoto Hirata, Tetsuya Oda, Nobuki Saito, Yuki Nagai, Tomoya Yasunaga, Kengo Katayama, Leonard Barolli. 220-231 [doi]
- Internet of Things (IoT) Enabled Smart Navigation Aid for Visually ImpairedMriyank Roy, Purav Shah. 232-244 [doi]
- Reasoning About Inter-procedural Security Requirements in IoT ApplicationsMattia Paccamiccio, Leonardo Mostarda. 245-254 [doi]
- Blockchain and IoT Integration for Pollutant Emission ControlStefano Bistarelli, Marco Marcozzi, Gianmarco Mazzante, Leonardo Mostarda, Alfredo Navarra, Davide Sestili. 255-264 [doi]
- Robot Based Computing System: An Educational ExperienceDiletta Cacciagrano, Rosario Culmone, Leonardo Mostarda, Alfredo Navarra, Emanuele Scala. 265-274 [doi]
- ARM vs FPGA: Comparative Analysis of Sorting AlgorithmsYomna Ben Jmaa, David Duvivier, Mohamed Abid. 275-287 [doi]
- A Review on Recent NDN FIB Implementations for High-Speed SwitchesEduardo Castilho Rosa, Flávio de Oliveira Silva. 288-300 [doi]
- Formal Specification of a Team Formation ProtocolRajdeep Niyogi. 301-313 [doi]
- Source Code Recommendation with Sequence Learning of Code FunctionsErika Saito, Kosuke Takano. 314-323 [doi]
- Two-Tier Trust Structure Model for Dynamic Supply Chain FormulationShigeaki Tanimoto, Yudai Watanabe, Hiroyuki Sato, Atsushi Kanai. 324-333 [doi]
- User Expectations When Augmented Reality Mediates Historical ArtifactsRayed A. Alakhtar, Sam Ferguson, Hada Alsobhi. 334-344 [doi]
- A Systematic Literature Review of Blockchain Technology for Identity ManagementMekhled Alharbi, Farookh Khadeer Hussain. 345-359 [doi]
- Performance Evaluation in 2D NoCs Using ANNPrachi Kale, Pallabi Hazarika, Sajal Jain, Biswajit Bhowmik. 360-369 [doi]
- Security, Power Consumption and Simulations in IoT Device Networks: A Systematic ReviewRoland Montalvan Pires Torres Filho, Luciana Pereira Oliveira, Leonardo Nunes Carneiro. 370-379 [doi]
- Real Time Self-developing Cybersecurity Function for 5GMaksim Iavich, Razvan Bocu, Avtandil Gagnidze. 380-387 [doi]
- Analysis of A-MPDU Aggregation Schemes for HT/VHT WLANsKaouther Mansour, Issam Jabri. 388-398 [doi]
- An Implementation of V2R Data Delivery Method Based on MQTT for Road Safety ApplicationAkira Sakuraba, Yoshitaka Shibata, Mamoru Ohara. 399-410 [doi]
- Smart Metering Architecture for Agriculture ApplicationsJuan Carlos Olivares Rojas, José Antonio Gutiérrez Gnecchi, Wuqiang Yang, Enrique Reyes-Archundia, Adriana Del Carmen Tellez Anguiano. 411-419 [doi]
- Apple Brand Texture Classification Using Neural Network ModelShigeru Kato, Renon Toyosaki, Fuga Kitano, Shunsaku Kume, Naoki Wada, Tomomichi Kagawa, Takanori Hino, Kazuki Shiogai, Yukinori Sato, Muneyuki Unehara, Hajime Nobuhara. 420-430 [doi]
- Adaptive Analysis of Electrocardiogram Prediction Using a Dynamic Cubic Neural UnitRicardo Rodríguez Jorge, Paola Huerta-Solis, Jirí Bíla, Jirí Skvor. 431-440 [doi]
- Evaluation of the Crack Severity in Squared Timber Using CNNShigeru Kato, Naoki Wada, Kazuki Shiogai, Takashi Tamaki. 441-447 [doi]
- Information Security Fatigue in Visually Impaired University StudentsMasataka Kakinouchi, Kazumasa Omote. 448-458 [doi]
- Privacy and Security Comparison of Web Browsers: A ReviewR. Madhusudhan, Saurabh V. Surashe. 459-470 [doi]
- Blockchain Search Using Searchable Encryption Based on Elliptic CurvesMarius Iulian Mihailescu, Stefania Loredana Nita. 471-481 [doi]
- Ensuring Data Integrity Using Digital Signature in an IoT EnvironmentNadia Kammoun, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. 482-491 [doi]
- Beaver Triple Generator from Multiplicatively Homomorphic Key Management ProtocolHuafei Zhu, Wee Keong Ng. 492-503 [doi]
- Highly Scalable Beaver Triple Generator from Additively Homomorphic EncryptionHuafei Zhu, Wee Keong Ng. 504-514 [doi]
- The Impact of the Blockchain Technology on the Smart Grid Customer Domain: Toward the Achievement of the Sustainable Development Goals (SDGs) of the United NationsOmid Ameri Sianaki, Sabeetha Peiris. 515-530 [doi]
- Analysis of Variants of KNN for Disease Risk PredictionArchita Negi, Farshid Hajati. 531-545 [doi]
- Covert Timing Channels Detection Based on Image Processing Using Deep LearningShorouq Al-Eidi, Omar M. Darwish, Yuanzhu Peter Chen, Mahmoud Elkhodr. 546-555 [doi]
- Internet of Things and Microservices in Supply Chain: Cybersecurity Challenges, and Research OpportunitiesBelal Alsinglawi, Lihong Zheng, Muhammad Ashad Kabir, Md Zahidul Islam 0001, Dave Swain, Will Swain. 556-566 [doi]
- An Architecture for Autonomous Proactive and Polymorphic Optimization of Cloud ApplicationsMarta Rózanska, Pawel Skrzypek, Katarzyna Materka, Geir Horn. 567-577 [doi]
- Fault Tolerance in Cloud: A Brief SurveyKamal K. Agarwal, Haribabu Kotakula. 578-589 [doi]
- Load Distribution for Mobile Edge Computing with Reliable Server PoolingThomas Dreibholz, Somnath Mazumdar. 590-601 [doi]
- A Survey on Advances in Vehicular Networks: Problems and Challenges of Architectures, Radio Technologies, Use Cases, Data Dissemination and SecurityErmioni Qafzezi, Kevin Bylykbashi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 602-613 [doi]
- Intelligent Blockchain-Enabled Applications for Sharing EconomyAlkhansaa A. Abuhashim. 614-623 [doi]
- Lessons Learned from Demonstrating Smart and Green Charging in an Urban Living LabShanshan Jiang, Marit K. Natvig, Svein O. Hallsteinsen, Karen Byskov Lindberg. 624-636 [doi]
- Assessment of Rail Service Capacity Under the Current Regulations Aimed at Ensuring Social Distancing Conditions Against the COVID-19 PandemicMarilisa Botte, Antonio Santonastaso, Luca D'Acierno. 637-646 [doi]
- A Floating Car Data Application to Estimate the Origin-Destination Car Trips Before and During the COVID-19 PandemicArmando Cartenì, Ilaria Henke, Assunta Errico, Luigi Di Francesco, Antonella Falanga, Mario Bellotti, Fabiola Filardo, Giuseppe Cutrupi. 647-656 [doi]
- Simulation and Evaluation of Charging Electric Vehicles in Smart Energy NeighborhoodsRocco Aversa, Dario Branco, Beniamino Di Martino, Luigi Iaiunese, Salvatore Venticinque. 657-665 [doi]