Abstract is missing.
- SVFF: An Automated Framework for SR-IOV Virtual Function Management in FPGA Accelerated Virtualized EnvironmentsStefano Cirici, Michele Paolino, Daniel Raho. 1-6 [doi]
- Scheduling Delay-Sensitive Bag-of-Task Jobs with Imprecise Computations on Distributed ResourcesHelen D. Karatza. 1-6 [doi]
- Lightweight Hash Function based on Fermat Number Transform (FNT)Yousuf Al-Aali, Said Boussakta. 1-6 [doi]
- Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)Joelle Kabdjou, Elie Tagne-Fute, Danda B. Rawat, Jaime C. Acosta, Charles A. Kamhoua. 1-7 [doi]
- Evaluation of Machine Learning Prediction Models for Wifi based Indoor Positioning SystemRebeca Estrada, Nelson Vera, Xavier Aizaga. 1-7 [doi]
- On Implementation of Sparse Finite Impulse Response Secondary Path for Active Noise ControlXinnian Guo, Ziyang Kang, Yang Shen, Yingna Su, Hongyan Ding, Lizhe Tan. 1-5 [doi]
- A reparameterization and monitoring platform for energy efficient GPS trackers in behavioural analysis of wildlifeMarialaura Tamburello, Giuseppe Caruso, Davide Adami, Stefano Giordano. 1-6 [doi]
- Design an Adaptive Virtual Reality Game to Promote Elderly HealthHsiao-Hui Li, Jian-Jie Lian, Yuan-Hsun Liao. 1-7 [doi]
- Blockchain model based on human DNA to modify blocks in P2P networksJulio Cesar Gancino Vargas, Segundo Moises Toapanta Toapanta, Yngrid Josefina Melo Quintana, Danny Santiago Páez Oscullo. 1-7 [doi]
- Multi-frame Correlated Representation Network for Video Super-ResolutionShuo Jin, Meiqin Liu, Yu Guo 0001, Chao Yao, Mohammad S. Obaidat. 1-7 [doi]
- High Layer Coding for Video TransmissionSergei Semenov, Sha Hu, Kuangda Tian. 1-6 [doi]
- DeltaBin: An Efficient Binary Data Format for Low Power IoT DevicesNeda Maleki, Arslan Musaddiq, David Mozart, Tobias Olsson, Mustafa Omareen, Fredrik Ahlgren. 1-5 [doi]
- Identification of Damaged Date Palm Tree in a Farm using IoT-based Thermal Image AnalysisAdnan Nadeem, Muhammad Ashraf, Amir Mehmood, Muhammad Shoaib Siddiqui, Hani Almoamari, Qammer H. Abbasi. 1-7 [doi]
- Mission-level URLLC under variable Rician channel conditionsYasantha Samarawickrama, Álvaro Augusto M. de Medeiros, Victor Cionca. 1-6 [doi]
- A Study on the Efficiency of Intrusion Detection Systems in IoT NetworksShokoufeh Seifi, Ronald Beaubrun, Martine Bellaïche, Talal Halabi. 1-8 [doi]
- Proposal for a security model applying artificial intelligence for administrative management in a higher education institutionSegundo Moisés Toapanta Toapanta, Rodrigo Humberto Del Pozo Durango, Eriannys Zharayth Gómez Díaz, Jose Antonio Orizaga Trejo, Luis Enrique Mafla Gallegos, Ma. Roció Maciel Arellano, Oscar Marcelo Zambrano Vizuete, María Mercedes Baño Hifóng. 1-5 [doi]
- A Transfer Learning Based CSI Indoor Localization Using GASF Image ConstructionXuewen Xiao, Jun Yan. 1-7 [doi]
- CASE: Channel Allocation for optimized Spectral Efficiency using deep neural network in underlay cognitive radiosKaran Gupta, Sanjay Kumar Dhurandher. 1-6 [doi]
- Spreading Factor Recovery in LoRa Using Machine LearningAhlam Alshukaili, Khairi A. Hamdi. 1-7 [doi]
- A Survey of DDoS Attacks Detection Schemes in SDN EnvironmentSurabhi Gusain Rawat, Mohammad S. Obaidat, Sumit Pundir, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh, Kuei-Fang Hsiao. 1-6 [doi]
- Leveraging Unstructured Data to Improve Customer Engagement and Revenue in Financial Institutions: A Deep Reinforcement Learning Approach to Personalized Transaction RecommendationsShubham Jain, Enda Fallon. 1-8 [doi]
- Automatic Recognition for LPI Radar Waveform Using Sequence-based Deep Learning ModelDongeun Lee 0005, Yoonji Kim, Dongho Seo, Wonjin Lee, Dongweon Yoon. 1-4 [doi]
- Deep Neural Network for User Attribute Recognition in Metaverse Hand ImagesOscal T.-C. Chen, Li-Cheng Yan. 1-6 [doi]
- Balancing reliability and energy efficiency in LoRa networks using reinforcement learningAnastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios Papadimitriou 0001. 1-6 [doi]
- An Efficient Anonymous Authentication Technique for TMIS under the Smart Home EnvironmentChandrashekhar Meshram, Mohammad S. Obaidat, Balqies Sadoun, Parkash Tambare, Agbotiname Lucky Imoize. 1-6 [doi]
- DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-ExtractorLayeba Faheem, Soumya Mukherjee, Mohammad S. Obaidat, Arup Kumar Pal, SK Hafizul Islam, Balqies Sadoun. 1-8 [doi]
- Two-step Random Access with Collision Resolution Queueing for Cellular IoT networksMaria Iloridou, Petros Nicopolitidis, Georgios Papadimitriou 0001. 1-5 [doi]
- Majority Voting-based Consensus Mechanism for UAVs Decision Making in BattlefieldRiya Kakkar, Rajesh Gupta 0007, Mohammad S. Obaidiat, Nilesh Kumar Jadav, Sudeep Tanwar. 1-5 [doi]
- A CSI Amplitude-phase Information Based Graph Construction for GNN LocalizationXueting Tang, Jun Yan. 1-7 [doi]
- Deep Learning Polar Convolutional Parallel Concatenated (DL-PCPC) Channel Decoding for 6G CommunicationsAya Kh. Ahmed, Hamed S. Al-Raweshidy. 1-5 [doi]
- MACsec and AES-GCM Hardware Architecture with Frame Preemption Support for Transport Security in Time Sensitive NetworkingDaniel Dik, Iacob Larsen, Michael Stübert Berger. 1-7 [doi]
- Lifetime estimation and reparameterization of GPS devices for tracking applicationsMarialaura Tamburello, Giuseppe Caruso, Davide Adami, Stefano Giordano, Mike Oluwatayo Ojo. 1-6 [doi]
- Profit aware Resource Allocation in Fog Computing: A Stackelberg Game ApproachAkshita Doad, Nitin Gupta 0006, Mohammad S. Obaidat, Kuldeep Singh Jadon, Piyush Rawat, Kuei-Fang Hsiao. 1-8 [doi]