Abstract is missing.
- Next Generation Mobile Sensors: Review Regarding the Significance of Deep Learning and Privacy Techniques for Data-Driven Soft SensorsRazvan Bocu, Dorin Bocu. 1-11 [doi]
- Simulation Modeling of Human Aortic Valve Blood FlowIlya Kudrenok, Maxim Davidov, Manuel Mazzara. 12-27 [doi]
- An Integrated System for Vibration Suppression Using Fuzzy Control and 2D-LiDARMasahiro Niihara, Yuma Yamashita, Chihiro Yukawa, Kyouhei Toyosima, Yuki Nagai, Tetsuya Oda, Leonard Barolli. 28-35 [doi]
- Prediction in Smart Environments and Administration: Systematic Literature ReviewMohamed Krichene, Nesrine Khabou, Ismael Bouassida Rodriguez. 36-47 [doi]
- Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement LearningSuleiman Abahussein, Tianqing Zhu, Dayong Ye, Zishuo Cheng, Wanlei Zhou 0001. 48-59 [doi]
- Enhanced Machine Learning-Based SDN Controller Framework for Securing IoT NetworksNeder Karmous, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, Neji Youssef. 60-69 [doi]
- Sustainment of Military Operations by 5G and Cloud/Edge TechnologiesSouradip Saha, Warren Low, Beniamino Di Martino. 70-79 [doi]
- Federated Learning of Predictive Models from Real Data on Diabetic PatientsGennaro Junior Pezzullo, Antonio Esposito 0001, Beniamino Di Martino. 80-89 [doi]
- Design of a Process and a Container-Based Cloud Architecture for the Automatic Generation of Storyline VisualizationsEmilio Di Giacomo, Beniamino Di Martino, Walter Didimo, Antonio Esposito 0001, Giuseppe Liotta, Fabrizio Montecchiani. 90-99 [doi]
- Cycle Detection and Clustering for Cyber Physical SystemsGabriel Iuhasz, Silviu Panica, Alecsandru Duma. 100-114 [doi]
- Cloud Computing and Critical Infrastructure ResilienceOronzo Mazzeo, Antonella Longo, Marco Zappatore. 115-126 [doi]
- Towards a Parallel Graph Approach to Drug DiscoveryDario Branco, Beniamino Di Martino, Sandro Cosconati, Dieter Kranzlmüller, Salvatore D'Angelo. 127-135 [doi]
- Experiences in Architectural Design and Deployment of eHealth and Environmental Applications for Cloud-Edge ContinuumAtakan Aral, Antonio Esposito 0001, Andrey Nagiyev, Siegfried Benkner, Beniamino Di Martino, Mario A. Bochicchio. 136-145 [doi]
- Programming Paradigms for the Cloud ContinuumGeir Horn, Beniamino Di Martino, Salvatore D'Angelo, Antonio Esposito 0001. 146-156 [doi]
- Worker-to-Task Skill-Based AssignmentVlad Rochian, Cosmin Bonchis, Ionut Tepeneu. 157-168 [doi]
- Prototype for Controlled Use of Social Media to Reduce DepressionFurqan Haider, Hamna Aslam, Rabab Marouf, Manuel Mazzara. 169-180 [doi]
- Why Zero Trust Framework Adoption has Emerged During and After Covid-19 PandemicAbeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He, Mohrah Saad Alayan. 181-192 [doi]
- An Interoperable Microservices Architecture for Healthcare Data ExchangeAllender V. de Alencar, Marcus M. Bezerra, Dalton Cézane Gomes Valadares, Danilo F. S. Santos, Angelo Perkusich. 193-205 [doi]
- D-insta: A Decentralized Image Sharing PlatformYadagiri Shiva Sai Sashank, Ankit Agrawal 0003, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari. 206-217 [doi]
- Ramification of Sentiments on Robot-Based Smart Agriculture: An Analysis Using Real-Time TweetsTajinder Singh, Amar Nath, Rajdeep Niyogi. 218-227 [doi]
- The Digital Humanities Trend in Chinese Film History: A Case Study of Filmmaker LvbanZitong Zhu. 228-240 [doi]
- A Tool for Creation of Virtual Exhibits Presented as IIIF Collections by Intelligent AgentsDario Branco, Rocco Aversa, Salvatore Venticinque. 241-250 [doi]
- Recommender Systems in the Museum Sector: An OverviewAlba Amato. 251-260 [doi]
- Towards the Enrichment of IIIF Framework with Semantically Annotated and Geo-Located imagesAlba Amato, Giuseppe Cirillo. 261-270 [doi]
- Comparison of ML Solutions for HRIR Individualization Design in Binaural AudioSimone Angelucci, Claudia Rinaldi, Fabio Franchi, Fabio Graziosi. 271-278 [doi]
- Performance Analysis of a BESU Permissioned BlockchainLeonardo Mostarda, Andrea Pinna 0002, Davide Sestili, Roberto Tonelli. 279-291 [doi]
- AI-Powered Drone to Address Smart City Security IssuesRamiz Salama, Fadi M. Al-Turjman, Rosario Culmone. 292-300 [doi]
- Range Proofs with Constant Size and Trustless SetupEmanuele Scala, Leonardo Mostarda. 301-310 [doi]
- Sensorless Predictive Maintenance: An Example on a 'Not 4.0' Coffee Machine Production ProcessDiletta Cacciagrano, Flavio Corradini, Marco Piangerelli. 311-320 [doi]
- Attendance System via Internet of Things, Blockchain and Artificial Intelligence Technology: Literature ReviewSarumi Usman Abidemi, Auwalu Saleh Mubarak, Olukayode Akanni, Zubaida Sa'id Ameen, Diletta Cacciagrano, Fadi M. Al-Turjman. 321-330 [doi]
- An Overview and Current Status of Blockchains PerformanceHamza Salem, Manuel Mazzara, Siham Maher Hattab. 331-339 [doi]
- AgriBIoT: A Blockchain-Based IoT Architecture for Crop InsuranceOumayma Jouini, Kaouthar Sethom. 340-350 [doi]
- Distribution of the Training Data Over the Shortest Path Between the ServersIbrahim Dahaoui, Mohamed Mosbah 0001, Akka Zemmari. 351-356 [doi]
- A Decentralized Architecture for Electric Vehicle Charging PlatformMarlon Rodrigues Martin, Fabiano Hessel. 357-369 [doi]
- Services and Operations of Electric Vehicle System by Virtual Power Plant in Rural AreaYoshitaka Shibata, Masahiro Ueda, Akiko Ueda. 370-375 [doi]
- A Triangulation Based Water Level Measuring System for a Water Reservoir TankYuki Nagai, Tetsuya Oda, Kyohei Toyoshima, Chihiro Yukawa, Kei Tabuchi, Tomoaki Matsui, Leonard Barolli. 376-383 [doi]
- A System Architecture for Heterogeneous Time- Sensitive Networking Based on SDNHongrui Nie. 384-395 [doi]
- A Parking System Based on Priority SchemeWalter Balzano, Antonio Lanuto, Erasmo Prosciutto, Biagio Scotto di Covella, Silvia Stranieri. 396-405 [doi]
- DTAG: A Dynamic Threshold-Based Anti-packet Generation Method for Vehicular DTNShota Uchimura, Masaya Azuma, Makoto Ikeda, Leonard Barolli. 406-414 [doi]
- Optimal and Suboptimal Routing Protocols for WSNRahil Bensaid, Adel Ben Mnaouer, Hatem Boujemaa. 415-426 [doi]
- CL-DECCM-SA: A Cluster-based Delaunay Edge and Simulated Annealing Approach for Optimization of Mesh Routers Placement in WMNsAoto Hirata, Yuki Nagai, Kyohei Toyoshima, Chihiro Yukawa, Tetsuya Oda, Leonard Barolli. 427-434 [doi]
- An Analytical Queuing Model Based on SDN for IoT Traffic in 5GAliyu Lawal Aliyu, Jim Diockou. 435-445 [doi]
- An Expert Survey for the Evaluation of 5G Adoption in BangladeshMd. Zahirul Islam, Md. Abdur Rahim, Md. Salahuddin, Syed Md. Galib, Rahamatullah Khondoker. 446-457 [doi]
- Optical Advanced Hybrid Phase Shift Approach for RF Beamforming and 5G Wideband RadarYosra Bouchoucha, Dorsaf Omri, Taoufik Aguili. 458-470 [doi]
- Quo Vadis, Web Authentication? - An Empirical Analysis of Login Methods on the InternetAndreas Grüner, Alexander Mühle, Nils Rümmler, Adnan Kadric, Christoph Meinel. 471-479 [doi]
- Device Tracking Threats in 5G NetworkMaksim Iavich, Giorgi Akhalaia, Razvan Bocu. 480-489 [doi]
- Trusted and only Trusted. That is the Access! - Improving Access Control Allowing only Trusted Execution Environment ApplicationsDalton Cézane Gomes Valadares, Alvaro Sobrinho, Newton Carlos Will, Kyller Costa Gorgônio, Angelo Perkusich. 490-503 [doi]
- A Survey of Intrusion Detection-Based Trust Management Approaches in IoT NetworksMeriem Soula, Bacem Mbarek, Aref Meddeb, Tomás Pitner. 504-517 [doi]
- Context-Aware Security in the Internet of Things: A ReviewEverton de Matos, Eduardo Viegas, Ramão Tiago Tiburski, Fabiano Hessel. 518-531 [doi]
- Cybersecurity Attacks and Vulnerabilities During COVID-19Sharmin Akter Mim, Roksana Rahman, Md. Rashid Al Asif, Khondokar Fida Hasan, Rahamatullah Khondoker. 532-545 [doi]
- Identifying Fake News in the Russian-Ukrainian Conflict Using Machine LearningOmar Darwish 0001, Yahya M. Tashtoush, Majdi Maabreh, Rana Al-essa, Ruba Aln'uman, Ammar Alqublan, Munther Abualkibash, Mahmoud Elkhodr. 546-557 [doi]
- Challenges of Managing an IoT-Based Biophilic Services in Green CitiesFarhad Daneshgar, Rahim Foroughi, Nava Tavakoli-Mehr, Atefa Youhangi. 558-564 [doi]
- Control and Diagnosis of Brain Tumors Using Deep Neural NetworksAlireza Izadi, Farshid Hajati, Roohollah Barzamini, Negar Janpors, Babak Farjad, Sahar Barzamini. 565-572 [doi]
- Co-evolution Genetic Algorithm Approximation Technique for ROM-Less Digital SynthesizersSoheila Gheisari, Alireza Rezaee, Farshid Hajati. 573-584 [doi]
- Application of Generalized Deduplication Techniques in Edge Computing EnvironmentsRyu Watanabe, Ayumu Kubota, Jun Kurihara. 585-596 [doi]
- On the Realization of Cloud-RAN on Mobile Edge ComputingAndrés F. Ocampo, Haakon Bryhni. 597-608 [doi]
- TEATOM: A True Zero Touch Intent Based Multi-cloud FrameworkB. Ramesh Ramanathan, P. Preethika. 609-618 [doi]
- Utility Function Creator for Cloud Application OptimizationMarta Rózanska, Kyriakos Kritikos, Jan Marchel, Damian Folga, Geir Horn. 619-630 [doi]
- A Review of Monitoring Probes for Cloud Computing ContinuumYiannis Verginadis. 631-643 [doi]
- Multi Languages Pattern Matching-Based Scraping of News and Articles WebsitesHamza Salem, Manuel Mazzara. 644-648 [doi]
- Decoding COVID-19 Vaccine Hesitancy Using Multiple Regression Analysis with Socioeconomic ValuesWei Lu 0018, Ling Xue, Bria Shorten. 649-659 [doi]
- Video Indexing for Live Nature Camera on Digital EarthHiroki Mimura, Masaya Tahara, Kosuke Takano, Nobuya Watanabe, Kin Fun Li. 660-667 [doi]
- Sports Data Mining for Cricket Match PredictionAntony Anuraj, Gurtej S. Boparai, Carson K. Leung, Evan W. R. Madill, Darshan A. Pandhi, Ayush Dilipkumar Patel, Ronak K. Vyas. 668-680 [doi]