Abstract is missing.
- On Enhancing the Performance of Inter-Cloud Data TransfersJuan Pablo Contreras, Shikharesh Majumdar, Ali El-Haraki. 1-9 [doi]
- Clouds Coalition Mitigation for Business Process OutsourcingAmina Ahmed-Nacer, Mohammed Riyadh Abdmeziem, Claude Godart. 10-17 [doi]
- The learning costs of Federated Learning in constrained scenariosRafael Teixeira, Mário Antunes 0001, Diogo Gomes 0001, Rui L. Aguiar. 18-25 [doi]
- High Availabale Hadoop Deployment Modes with Enterprise-Level capabilitiesAbdellah Berkaoui, Youssef Gahi. 26-32 [doi]
- A Novel Approach to Measure and Predict Digital Health Data Protection Compliant (DPC)Davies C. Ogbodo, Irfan-Ullah Awan, Andrea J. Cullen. 33-39 [doi]
- Health Monitor: An IoMT Based Patient Health Monitoring System Using Blockchain and k-meansIkram El Asri, Meryeme Ayache, Soulaimane Oulad Belayachi, Hajar Laktaoui. 40-45 [doi]
- Classification of Covid-19 Chest X-Ray Patients using Artificial Neural NetworkZuraidi Saad, Wan Muhammad Aniq Wan Ismafariza, Nurul Hazwani Abd Halim. 46-51 [doi]
- Defense Guild: A Privacy-preserving Intrusion Detection System for Healthcare Data in CloudDerek Manwaring, Geetha Thamilarasu. 52-57 [doi]
- Semantic Evaluation of Privacy Policy Compliance in Medical ApplicationsCatarina Silva, João Paulo Barraca, Paulo Salvador 0001, Nelson Pacheco da Rocha. 58-64 [doi]
- Enhancing Ransomware Detection: A Registry Analysis-Based ApproachKhalid Zirari, Hamza Kamal Idrissi, Ahmed El-Yahyaoui, Hicham Bensaid, Abdeslam En-Nouaary. 65-70 [doi]
- Zero Trust Model Implementation Considerations in Financial Institutions: A Proposed FrameworkClement Daah, Amna Qureshi, Irfan Awan. 71-77 [doi]
- Hybrid Feature Selection (RFEMI) Techniques and Intrusion Detection Systems for Web Attacks Detection Using Supervised Machine Learning AlgorithmsIbrahim Abobaker. 78-86 [doi]
- Scheduling Critical Periodic Jobs with Partial Computations along with Gang JobsHelen D. Karatza. 87-94 [doi]
- A Cost-effective High-throughput Testbed for Supporting AI-enabled DevSecOps ServicesUlugbek Khamdamov, Muhammad Usman 0012, JongWon Kim. 95-102 [doi]
- A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User BehaviorsFaisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Raiful Hasan, Carlos E. Caicedo Bastidas. 103-108 [doi]
- An Updated Junction Tree-Based Routing for Underwater Acoustic NetworksTugçe Bilen. 109-113 [doi]
- Drone Edge Management System (DREMS): Sequencing Drone Takeoff and LandingLucas De Paula Soares, Fabíola Martins Campos de Oliveira, Carlos Alberto Kamienski, Luiz F. Bittencourt. 114-121 [doi]
- Tiny Machine Learning Virtualization for IoT and Edge Computing using the REXA VMStefan Bosse, Christoph Polle. 122-129 [doi]
- IoT Open Messaging Standards: Performance Comparison with MQTT and CoAP ProtocolsAvleen Malhi, Asad Javed, Narges Yousefnezhad, Kary Främling. 130-135 [doi]
- Architecture Design of an IoT-based Smart Parking SystemAqeel Ahlam-Rauf, Lillian Yee Kiaw Wang, Khee-Siang Bee, Wan-Ru Thang. 136-141 [doi]
- Towards IoT Ambient Intelligence for Industry 4.0Marisa Catalan, Mohamad Hjeij, Aleix Boixader, Percy Bonett, Mario Montagud, Josep Escrig, Josep Brugués, Toni Adame, Carlos Labella, Iván Huerta, Miguel Urias. 142-148 [doi]
- Digital Platform Concepts for manufacturing Companies - A ReviewMarcel Rojahn, Norbert Gronau. 149-158 [doi]
- Self-sovereign Identity-based Access Control Management in Forestry 4.0Yongli Mou, Jiahang Chen, Zhenghao Zhang, Jürgen Roßmann, Stefan Decker. 159-166 [doi]
- Anomaly Detection for Industrial Sensors Using TransformersMotie Yassine, Flaus Théo. 167-174 [doi]
- Greenhouse Monitoring System for Chili Plant via IoT Cloud on Ubidots PlatformZainal Hisham Che Soh, Muhammad Syamim Mohamad Pandi, Aini Hafizah Mohd Saod, Siti Azura Ramlan, Nur Athiqah Harron, Mohd Hanapiah Abdullah. 175-180 [doi]
- Development of a low-cost Internet of Things architecture for energy and environment monitoring in a University CampusAbdessamad Rhesri, Rachid Bennani, Yann Ben Maissa, Imad Hajjaji, Ahmed Tamtaoui, Hamza Dahmouni. 181-185 [doi]
- New Solution based on Fuzzy System to Optimize Energy Efficiency in IoT Devices to Remote Monitoring of Chronic DiseasesWesley Geraldo Sampaio Da Nóbrega, José Valdemir Reis Júnior. 186-192 [doi]
- Smart Query Sampling with Feature Coverage and Unsupervised Machine LearningJerry Tang, Ryan Druckman, Louis Magarshack, Nate McNamara, Jim Ahn, Jiaqi Yan. 193-198 [doi]
- Techniques for Moment Retrievals and Filtering from Large Volumes of Multimodal DataAzhar Talha Syed, Shikharesh Majumdar. 199-206 [doi]
- Integrated Machine Learning Concept with XG Booster and Random Forest Framework for Predicting Purchase Behaviour by Online Customers in e-Commerce Social NetworksRaja Sekhar Avula, Ergun Gide, Indra Seher. 207-216 [doi]
- Online Continual Learning Data Quality Framework for Entity ResolutionWidad Elouataoui, Saida El Mendili, Youssef Gahi. 217-222 [doi]
- Exploring the Impact of Artificial Intelligence on User Satisfaction in Australian Cloud-based Payments: Insights from Financial Service ProvidersDomingos Mondego, Ergun Gide, Jahan Hassan, Ayub Bokani. 223-229 [doi]
- The Role of Service Quality and Security in Driving Satisfaction with Cloud-Based Payment Systems in Australia: A Merchant PerspectiveDomingos Mondego, Ergun Gide, Jahan Hassan, Ayub Bokani. 230-235 [doi]
- Performance Evaluation of Orange Pi 4 in SHA256 Computation for Blockchain MiningBensalah Mouad, Hair Abdellatif. 236-241 [doi]
- A Runtime Trust Evaluation Mechanism in the Service Mesh ArchitectureRami Alboqmi, Sharmin Jahan, Rose F. Gamble. 242-249 [doi]
- A Multi-Agent Reinforcement Learning Approach for Congestion Control in network based-SDNKaoutar Boussaoud, Meryeme Ayache, Abdeslam En-Nouaary. 250-255 [doi]
- Using Miniature Setups and Partial Streams for Scalable Remote LabsA. Das, K. S. Viswanadh, Rishabh Agrawal, Akshit Gureja, Nitin Nilesh, Sachin Chaudhari. 256-263 [doi]
- Condition Monitoring and Remaining Useful Life Prediction for Tool Wear in CNC MachinesPerin Ünal, Seyithan Temel, Emre Ummak, Ahmet Murat Özbayoglu. 264-269 [doi]
- A Novel and Adaptive Evaluation Mechanism for Deep Learning Models in Medical Imaging and Disease RecognitionZainab Loukil, Qublai Khan Ali Mirza, Will Sayers. 270-277 [doi]
- Emergency Care Patient Prediction using Electronic Health Records (EHR) Data: An End-to-End Machine Learning PipelineMaruful Abedin Sumon, Tor A. Kwemebe, Venkata K. Melapu, Md Mohiuddin Hasan. 278-282 [doi]
- Influence of Various ML-Based Binary Classifiers on the Performance on Handwritten Digit RecognitionM. Farhan Shahid, Nayyer Aafaq, Syed Khurram Mahmud, Syed M. Kazam Abbas Kazmi. 283-291 [doi]
- Open-source Hardware FPGA Platforms for IoT: Paradigms, opportunities and open issuesOussama El Allam, Abdelhakim Alali, Mohamed Sadik, Hasna Elmaaradi. 292-297 [doi]
- Ensuring Privacy and Security of IoT Networks Utilizing Blockchain and Federated LearningMd. Mamunur Rashid, Piljoo Choi, Suk Hwan Lee, Jan Platos, Young Huh, Ki-Ryong Kwon. 298-305 [doi]
- Developing Real-Time Services with High Performance and Cloud Security Enabled Framework via Adjusted TLS v1.3 for On-Demand HIPA Activity CalculationsMei-Chih Chang, Vadim Talanov, Jochem Snuverink, Daniela Kiselev. 306-311 [doi]
- Enhancement of Big Data Security in Cloud Computing Using RSA AlgorithmAbel Yeboah-Ofori, Iman Darvishi, Azeez Sakirudeen Opeyemi. 312-319 [doi]
- Threat Intelligence Sharing Component in the Service Mesh ArchitectureRami Alboqmi, Sharmin Jahan, Rose F. Gamble. 320-327 [doi]
- Cross-Evaluation of Deep Learning-based Network Intrusion Detection SystemsCiro Guida, Alfredo Nascita, Antonio Montieri, Antonio Pescapè. 328-335 [doi]
- Evaluating IP Blacklists EffectivenessLuca Deri, Francesco Fusco. 336-343 [doi]
- Blockchain Security Encryption to Preserve Data Privacy and Integrity in Cloud EnvironmentAbel Yeboah-Ofori, Sayed Kashif Sadat, Iman Darvishi. 344-351 [doi]
- Automatic and Realistic Traffic Generation In A Cyber RangeRaphaël Rouquette, Simon Beau, Muhammad Mudassar Yamin, Mohib Ullah, Basel Katt. 352-358 [doi]
- Data Driven Skill Assessment for Cybersecurity ExercisesSaif Hassan, Sarang Shaikh, Muhammad Mudassar Yamin, Basel Katt, Ali Shariq Imran, Mohib Ullah. 359-366 [doi]
- Plan, Prepare and Respond: A Holistic Cyber Security Risk Management PlatformDharani Goli, Hamad Al-Mohannadi, Mohammad Shah. 367-374 [doi]
- Decoding Cyber Incident Reporting Requirements: A Cross-Regulatory ExaminationAngelica Marotta, Stuart E. Madnick. 375-381 [doi]
- Investigating the Challenges Companies in Rwanda Face when Implementing Zero-Trust NetworkPatrick Mutabazi, Emmanuel Ndashimye, Jema David Ndibwile. 382-392 [doi]
- Date Fruit Classification System using Deep Transfer LearningZainab Abuowda, Shorouk Ramadan, Nour Salam, Abdalla Gad, Jawad Yousaf, Taimur Hassan, Mohammed Ghazal, Eqab R. F. Almajali. 393-398 [doi]
- Mobile-based Gamification of Community Exercise Initiatives using Location ServicesAbdalla Abdelkhalek, Maha Yaghi, Marah Talal Alhalabi, Abdalla Gad, Jawad Yousaf, Taimur Hassan, Mohammed Ghazal. 399-403 [doi]
- AI-Based Mobile Paper Grading: Trends and ChallengesAmmar Muhammad Naeem, Abdalla Gad, Marah Talal Alhalabi, Maha Yaghi, Adel Khelifi, Mohammed Ghazal. 404-409 [doi]
- Automated Computer Vision-based Detection of Solar Panel Defects Using a Thermal Camera Mobile ApplicationHassan Hajjdiab, Gasm ELbary Mohamed, Salim Alzaabi, Marah Talal Alhalabi, Abdalla Gad, Maha Yaghi, Mohammad Alkhedher, Mohammed Ghazal. 410-415 [doi]
- Employing Machine Learning Algorithms to Detect Stress with a Specific Emphasis on Commuting MethodsMhd Saeed Sharif, Madhav Raj Theeng Tamang, Cynthia H. Y. Fu, Wael Elmedany. 416-421 [doi]
- The Effectiveness of DKIM and SPF in Strengthening Email SecurityMohamed Sami Ragheb, Wael Elmedany, Mhd Saeed Sharif. 422-426 [doi]