Abstract is missing.
- Efficient Communication Protocol for Programmable MatterJean-Paul A. Yaacoub, Benoît Piranda, Frédéric Lassabe, Hassan N. Noura. 1-11 [doi]
- IoRT-Based Distributed Algorithm for Robust Team Formation and Its Application to Smart City OperationRajdeep Niyogi, Amar Nath. 12-23 [doi]
- A WSN and Vision Based Energy Efficient and Smart Surveillance System Using Computer Vision and AI at EdgeShreeram Hudda, K. Haribabu 0001, Rishabh Barnwal, Abhishek Khurana. 24-36 [doi]
- Mitigating Resource Depletion and Message Sequencing Attacks in SCADA SystemsNeminath Hubballi, Nisha Kumari Barsha. 37-47 [doi]
- API Descriptions for the Web of ThingsAimilios Tzavaras, Chrisa Tsinaraki, Euripides G. M. Petrakis. 48-58 [doi]
- SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep LearningLaxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, Ashutosh Bhatia, Kamlesh Tiwari. 59-72 [doi]
- A Vision Transformer Based Indoor Localization Using CSI Signals in IoT NetworksGaurav Prasad, Aditya Gupta, Avnish Aryan, Sudhir Kumar 0002. 73-83 [doi]
- Deep Reinforcement Learning for VNF Placement and Chaining of Cloud Network ServicesWided Khemili, Jalel Eddine Hajlaoui, Mohand Yazid Saidi, Mohamed-Nazih Omri, Ken Chen. 84-96 [doi]
- Optimising Water Quality Classification in Aquaculture Using a New Parameter Pre-selection ApproachMahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine, Lamia Romdhani, Ridha Bouallegue. 97-107 [doi]
- Topic Analysis of Japanese Sentences Using Sentence EmbeddingsKenshin Tsumuraya, Yonghui Huang, Minoru Uehara, Yoshihiro Adachi. 108-122 [doi]
- Performance Improvement of Semantic Search Using Sentence Embeddings by Dimensionality ReductionKenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi. 123-132 [doi]
- A Fuzzy-Based System for Assessment of Performance Error in VANETsErmioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli. 133-142 [doi]
- Carbon Credits Price Prediction Model (CCPPM)Inam Alanazi, Firas Al-Doghman, Abdulrahman Alsubhi, Farookh Hussain. 143-150 [doi]
- Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense StrategiesHaibo Zhang 0008, Kouichi Sakurai. 151-162 [doi]
- Framework for Cognitive Self-Healing of Real Broadband NetworksEnock Cabral Almeida Vieira, Paulo Carvalho, Flávio de Oliveira Silva 0001. 163-174 [doi]
- Honey Bee Inspired Routing Algorithm for Sparse Unstructured P2P NetworksAman Verma, Sanat Thakur, Ankush Kumar, Dharmendra Prasad Mahato. 175-186 [doi]
- Anomaly Detection in WBANs Using CNN-Autoencoders and LSTMsKartikeya Dubey, Chittaranjan Hota. 187-197 [doi]
- LLM-Based Agents Utilized in a Trustworthy Artificial Conscience Model for Controlling AI in Medical ApplicationsDavinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi. 198-209 [doi]
- Task Allocation Based on Simulated Annealing for Edge Industrial InternetVitor Gabriel Reis Lux Barboza, Janine Kniess. 210-221 [doi]
- Realtime BGP Anomaly Detection Using Graph Centrality FeaturesJanel Huang, Murugaraj Odiathevar, Alvin C. Valera, Jyoti Sahni, Marcus Frean, Winston K. G. Seah. 222-233 [doi]
- An Empirical Analysis on Leveraging User Reviews with NLP-Enhanced Word Embeddings for App Rating PredictionPratyush Mishra, Vikram Singh, Aneesh Krishna, Lov Kumar. 234-244 [doi]
- Hybrid Evolutionary Algorithm for the Overlap Constrained Resource Allocation Problem in Wireless NetworksYiting Wang, Yawen Li, Zequn Wei, Junqi Li. 245-256 [doi]
- An Efficient Method for Underwater Fish Detection Using a Transfer Learning TechniquesMahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine, Lamia Romdhani, Ridha Bouallegue. 257-267 [doi]
- Comparative Analysis of Data Preprocessing Methods in Machine Learning for Breast Cancer ClassificationTimothy Stockton, Brandon Peddle, Angelica Gaulin, Emma Wiechert, Wei Lu. 268-279 [doi]
- Hybrid Technical-Visual Features for Stock PredictionChih-Fong Tsai, Ya-Han Hu, Ming-Chang Wang, Kang Ernest Liu. 280-289 [doi]
- Intelligent Health Promotion: Machine Learning in the Prevention of Stress-Related DiseasesGabriel Fernandes Silva, Victor Ströele, Regina Braga 0001, Mario A. R. Dantas, Michael Bauer. 290-301 [doi]
- RsViT - A Scalable Vision Transformer Backbone for Diffusion ModelThanawin Sakpuaram, Chantana Chantrapornchai. 302-312 [doi]
- A Deep Neural Network (DNN) Based Contract Policy on Hyperledger Fabric for Secure Internet of Things (IoTs)Sabina Sapkota, Haojun Huang, Yining Hu, Farookh Hussain. 313-325 [doi]
- Enhancing Intrusion Detection System Using Machine Learning and Deep LearningR. Madhusudhan, Shubham Kumar Thakur, P. Pravisha. 326-337 [doi]
- Integration of Machine Learning with Quantum AnnealingHadi Salloum, Hamza Shafee Aldaghstany, Osama Orabi, Ahmad Haidar, Mohammad Reza Bahrami, Manuel Mazzara. 338-348 [doi]
- From Context to Forecast: Ontology-Based Data Integration and AI for Events PredictionJefferson Amará, Victor Ströele, Regina Braga 0001, José Maria N. David. 349-361 [doi]
- FEVER: Intelligent Behavioral Fingerprinting for Anomaly Detection in P4-Based Programmable NetworksMatheus Saueressig, Muriel Figueredo Franco, Eder J. Scheid, Alberto Huertas Celdrán, Gérôme Bovet, Burkhard Stiller, Lisandro Z. Granville. 362-373 [doi]
- Improved Purpose-Based Concurrency Control to Reduce the Electric Energy Consumption of a Server ClusterTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 374-384 [doi]
- Proposal for a Resource Allocation Model Aimed at Fog ComputingAndré Luiz Tinassi D'Amato, Mario A. R. Dantas. 385-396 [doi]
- Implementation of a Cloud Based Voice Recognition Motor Control System for Omnidirectional WheelchairKeita Matsuo, Leonard Barolli. 397-403 [doi]
- Towards Priority VM Placement in Fog NetworksAsma AlKhalaf, Farookh Khadeer Hussain. 404-414 [doi]
- A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud ComputingOmessead BenMarak, Anis Naanaa, Sadok Elasmi. 415-425 [doi]
- LoRa and Cloud-Based Multi-robot Pesticide Spraying for Precision AgricultureNirali Sanghvi, Rajdeep Niyogi. 426-436 [doi]
- DeFog: Adaptive Microservice Scheduling on Kubernetes Clusters in Cloud-Edge-Fog InfrastructuresAthanasios Prountzos, Euripides G. M. Petrakis. 437-448 [doi]
- Challenges, Novel Approaches and Next Generation Computing Architecture for Hyper-Distributed Platforms Towards Real Computing ContinuumFrancesco Lubrano, Giuseppe Caragnano, Alberto Scionti, Olivier Terzo. 449-459 [doi]