Abstract is missing.
- Mathematical modelling of the operation of a multistage flood control system using parallel computationsNikita Podgornov, Roman Davydov, Dmitry Zotov, Valery Antonov, Vladimir Maslikov, Elena Maslikova. [doi]
- SmartGate system: Automating the detection and control of COVID-19Mashael Khayyat, Raafat Munshi. [doi]
- IoT-Enabled Healthcare: Benefits, Issues and ChallengesBassam Al-Shargabi, Simak Abuarqoub. [doi]
- Predicting RNA secondary structure based on machine learning and genetic algorithmDuy Binh Doan, Minh Tuan Pham, Duc Long Dang. [doi]
- A Robust Double Layer Steganography Technique Based on DNA SequencesOmnia Abdullah Alharbi, Asia Othman Aljhadli, Azizah Abdul Manaf. [doi]
- Approach to combining different methods for detecting insidersMikhail V. Buinevich, Konstantin E. Izrailov, Igor V. Kotenko, Igor Ushakov, Dmitry Vlasov. [doi]
- A New distributed PKI for WSN-Based Application in Smart GridNouf Aljadani, Tahani Gazdar. [doi]
- Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial IntelligenceAfaf D. Althobiti, Rabab M. Almohayawi, Omaimah Bamsag. [doi]
- FlexNGIA - Towards the Cloudification of the InternetMohamed Faten Zhani. [doi]
- Improve the Firewall Accuracy By using Dynamic OntologyQossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, Othman Othman. [doi]
- Applying Multidimensional Scaling Method to Determine Spatial Coordinates of WSN NodesIlya Grishin, Van-Dai Pham, Darina Okuneva, Ruslan Kirichek, Lyudmila Myrova. [doi]
- A Salient Object Detection Technique Based on Color DivergenceSana Sahar Guia, Abdelkader Laouid, Reinhardt Euler, Mohammed Amine Yagoub, Ahcène Bounceur, Mohammad Hammoudeh. [doi]
- An Extended Benchmark System of Word Embedding Methods for Vulnerability DetectionHai Nguyen Ngoc, Hoang Nguyen Viet, Tetsutaro Uehara. [doi]
- Dynamic Flow Classification Model for Resource Distribution in SDN NetworksSamuel Muhizi, Mahmood Al-Bahri. [doi]
- HawkEye: a Visual Framework for Agile Cross-Validation of Deep Learning Approaches in Financial ForecastingSalvatore Carta, Sergio Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, Diego Reforgiato Recupero. [doi]
- A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart HomesHmdah Alsolami, Omaimah Bamasag, Asia Aljahdali. [doi]
- Multitask Aspect_Based Sentiment Analysis with Integrated Bidirectional LSTM & CNN ModelTrang Uyen Tran, Ha Hoang Thi Thanh, Phuong Hoai Dang, Michel Riveill. [doi]
- Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using ProbesNikita Shustov, Vasiliy Zelenov, Ruslan Kirichek. [doi]
- Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and BlockchainViet Tran, Mau Pham, Hoang Ho, Luan Nguyen. [doi]
- Modified Indexing Algorithm based on Priority Queue in Metric Space for MVP TreeVladimir Fomin, Igor Aleksandrov, Denis Gallyamov, Ruslan Kirichek. [doi]
- Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative GatewayAbdel-Nasser Ateeq, Israa Obaid, Othman Othman, Ahmed Awad. [doi]
- Software development for controlling a group of UAVsVladimir M. Vishnevsky, Andrey A. Larionov, Maxim Zvyagin, Truong Duy Dinh, Anton Ovchinnikov, Ruslan Kirichek. [doi]
- Cyberbullying detection based on word curve representations using B-spline interpolationHuu Tai Phung, Huynh Khanh Ly Dang, Minh Tuan Pham. [doi]
- Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud ComputingAlaa Alsaeedi, Omaimah Bamasag, Asmaa Munshi. [doi]
- Using mathematical forecasting methods to estimate the load on the computing power of the IoT networkAndrey Krasov, Igor Pestov, Artem M. Gelfand, Aleksey Kazantsev, Anna Polyanicheva. [doi]
- A New Blockchain-based Trust Management protocol For Vehicular ad hoc networksOhoud Alboqomi, Tahani Gazdar, Asmaa Munshi. [doi]
- Developing the Kemeny's Weighted Median for the Rank Aggregation ProblemSergey D. Dvoenko, Denis O. Pshenichny. [doi]
- Network Traffic Analysis for DDOS Attack DetectionAtheer Alharthi, Ala Eshmawi, Azzah Kabbas, Lobna Hsairi. [doi]
- An Experimental Study to Understand How Users Choose PasswordMaha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani. [doi]
- Multiple Level Action Embedding for Penetration TestingHoang Viet Nguyen, Hai Ngoc Nguyen, Tetsutaro Uehara. [doi]
- Reinforce Based Optimization in Wireless Communication Technologies and Routing Techniques Using Internet of Flying VehiclesInam Ullah Khan, Syeda Zillay Nain Zukhraf, Asrin Abdollahi, Shahbaz Ali Imran, Ijaz Mansoor Qureshi, Muhammad Adnan Aziz, Syed Bilal Hussian Shah. [doi]
- Unmanned Aerial Vehicles Routing Formation Using Fisheye State Routing for Flying Ad-hoc NetworksMuhammad Abul Hassan, Syed Irfan Ullah, Inam Ullah Khan, Syed Bilal Hussain Shah, Abdus Salam, Arbab Wajid Ullah Khan. [doi]
- Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National InfrastructureMohammad Hammoudeh. [doi]
- Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light ExtractionAndrei Filin, Inessa Gracheva, Andrey Kopylov. [doi]
- Increasing the noise immunity of m-ary radio communication system between motile objects in the microwave rangeIgor Zharikov, Varvara Fadeenko, Vadim Davydov, Anton Valov. [doi]
- Investigation of operating system security mechanisms for vulnerabilitiesAleksandr Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, Andrey Krasov. [doi]
- Methodology for testing LPWAN networks with mesh topologyYulia Avakyan, Ekaterina S. Kuznetsova, Ruslan Kirichek. [doi]
- Polygons characterizing the joint statistical properties of the input and output sequences of the binary shift registerSergey Yu. Melnikov, Konstantin E. Samouylov. [doi]
- Edge Computing Resource Allocation Orchestration System for Autonomous VehiclesAbdukodir Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, Ibrahim A. Elgendy, Ammar Muthanna. [doi]
- Enhancing Communication Efficiency in Mobile Networks Using Smartphone-Enabled Edge ComputingJuma Said Ally, Francis Aidan Ruambo. [doi]
- Reducing the Impact of Outliers on the One-Class Classification Decision RuleAleksandr O. Larin, Oleg Seredin, Andrey Kopylov. [doi]
- Human Face Recognition and Temperature Measurement Based on Deep Learning for Covid-19 Quarantine CheckpointVu-Anh-Quang Nguyen, Jongoh Park, Kyeongjin Joo, Thi Tra Vinh Tran, Trung Tin Tran, Joonhyeon Choi. [doi]
- Development of multifunctional system for controlling user access to the InternetArseniy D. Prosvirin, Vadim V. Davydov, Angelina V. Moroz. [doi]
- A Hybrid Wireless Mesh Network for Sensor and Actuator Management in Smart Sustainable CitiesVan-Dai Pham, Anton Ovchinnikov, Alina Zadorozhnaya, Ruslan Kirichek, Lyudmila Myrova. [doi]
- Canny edge detection towards deep learning Arabic document classificationTaghreed Alghamdi, Samia Snoussi, Lobna Hsairi. [doi]
- Network Coding for the Interaction of Unmanned Flying Platforms in Data Acquisition NetworksSergey Vladimirov, Ruslan Kirichek, Vladimir M. Vishnevsky. [doi]
- Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching NetworkAlexander Dagaev, Yuriy Borodyansky, Albina Pomogalova. [doi]
- Wireless Access Architecture: The Next 20+ YearsHalim Yanikomeroglu. [doi]
- Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database ModelIgor V. Kotenko, Andrey Krasov, Igor Ushakov, Konstantin E. Izrailov. [doi]
- A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction ProblemMostefa Kara, Abdelkader Laouid, Reinhardt Euler, Mohammed Amine Yagoub, Ahcène Bounceur, Mohammad Hammoudeh, Saci Medileh. [doi]
- Network DecentralizationAndrey Koucheryavy. [doi]
- Agent-Based DevOps of Software and Hardware Resources for Digital Twins of Infrastructural ObjectsRoman Kostromin, Alexander G. Feoktistov. [doi]
- Optimization of designs for fiber optic communication lineDenis Vasiliev, Igor Zharikov, Varvara Fadeenko, Illarion Fadeenko, Vadim Davydov. [doi]
- Security Challenges Posed by Quantum Computing on Emerging TechnologiesAbdelrahman Abuarqoub. [doi]
- On The Radon-Nikodym Machine Learning ParallelizationAlexander Bobyl, Vadim Davydov, Vladislav Malyshkin. [doi]
- An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA SequenceWala'a Al-Ahmadi, Asia Aljahdali, Asmaa Munsh. [doi]
- An integrated data collection and remote monitoring of power transmission grid using Internet of Things (IoT)Khoi Nguyen-Tan, Tien Tran Ho Thuy. [doi]