Abstract is missing.
- Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-AnchorKeith Mayes. 1-8 [doi]
- Quantitative Study on Impact of Node Selfishness on Performance of MANETsAxida Shan, Xiumei Fan, Xinghui Zhang. 9-14 [doi]
- Analysis on the Usage of Topic Model with Background Knowledge inside Discussion Activity in Industrial Engineering ContextMuhammad Luthfi, Satoshi Goto, Osamu Ytshi. 15-22 [doi]
- NetCruiser: Localize Network Failures by Learning from Latency DataHaoshi Ren, Lihai Nie, Hongyun Gao, Laiping Zhao, Jianchao Diao. 23-30 [doi]
- A Novel Diagnostic Algorithm for Heart Disease in ECG Monitoring SystemZhengyang Gu, Kehua Jiang, Qi Zhou. 31-37 [doi]
- Accurate Underwater Localization Through Phase DifferenceQinghua Luo, Chunyu, Xiaozhen Yan, Cong Hu, Chuntao Wang, Jinfeng Ding. 38-42 [doi]
- Dynamic Probabilistic Model Checking for Sensor Validation in Industry 4.0 ApplicationsXin Xin, Sye Loong Keoh, Michele Sevegnani, Martin Saerbeck. 43-50 [doi]
- New Method of MSCA for Edge ComputingDe-gan Zhang, Haoli Zhu, Ting Zhang 0009, Jia-Xu Wang. 51-57 [doi]
- Energy Efficient Resource Allocation and Computation Offloading Strategy in a UAV-enabled Secure Edge-Cloud Computing SystemUmar Ajaib Khan, Waqas Khalid, Saifullah Saifullah. 58-63 [doi]
- Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and securitySabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini. 64-71 [doi]
- An access selection mechanism in 5G network slicingYangguang Lu, Xin Chen, Ranran Xi, Ying Chen. 72-78 [doi]
- Deep Reinforcement Learning for Pre-caching and Task Allocation in Internet of VehiclesTeng Ma, Xin Chen, Zhuo Ma, Ying Chen. 79-85 [doi]
- Research on Computing Task Allocation Method Based on Multi-UAVs CollaborationHe Dong, Nan Wu, Guangsheng Feng, Xinying Gao. 86-93 [doi]
- Research of edge caching strategy based on collaboration mechanismHaiyan Lan, Shangyuan Wu. 94-101 [doi]
- New Method of Traffic Flow Forecasting Based on QPSO Strategy for Internet of VehiclesDe-gan Zhang, Jing-yu Du, Ting Zhang 0009, Hong-rui Fan. 102-108 [doi]
- Sharing Economy: Implementing Decentralized Privacy-Preserving Parking SystemNejc Rozman, Marko Corn, Janez Diaci. 109-116 [doi]
- IoT Enabled Smart Security Framework for 3D Printed Smart HomeZhihan Xu, Shuja Ansari, Amir M. Abdulghani, Muhammad Ali Imran, Qammer H. Abbasi. 117-123 [doi]
- RFBBR: A Rtt Faireness Awared Algorithm Based on BBRWeifeng Sun, MingHan Jia, Guanghao Zhang, Zun Wang. 124-131 [doi]
- Dynamic and Accurate Force Feedback for Electromagnetic Haptic DisplayXiaosa Li, Zhiyong Yuan, Jianhui Zhao, Xiangyun Liao. 132-139 [doi]
- Theoretical Modelling of Smart Meter Privacy Protection with Multi-meter Energy RoutingCankut Ergen, Burhan Gulbahar. 140-146 [doi]
- Analysis on Caching Strategy for Device-to-Device Communication with Multiple HelpersHui Song, Qunying Wu, Zhikai Liu, Feng Ke, Daru Pan, Xian Zhou. 147-153 [doi]
- A Hybrid Approach for Intrusive Appliance Load Monitoring in Smart HomeVanh Khuyen Nguyen, Minh-Hieu Phan, Wei Emma Zhang, Quan Z. Sheng, Trung Duc Vo. 154-160 [doi]
- A New Link Prediction in Directed Networks Based on Attributes FusionZhicheng Li, Lixin Ji, Shuxin Liu, Jinsong Li. 161-167 [doi]
- Scatter Balance based Semi-supervised Dimensional ReductionRui Yang, Xiangzhu Meng, Lin Feng 0001. 168-175 [doi]
- A Discover of Class and Image Level Variance Between Different Pruning Methods on Convolutional Neural NetworksShihong Gao. 176-182 [doi]
- Link Prediction Based on Information Preference Connection for Directed NetworkXuelei Zhao, Xinsheng Ji, Shuxin Liu, Zanyuan He. 183-189 [doi]
- Efficient Privacy-Preserving Electronic Voting Scheme Based on BlockchainZe Xu, Sanxing Cao. 190-196 [doi]
- Intelligent Instruction-Based IoT Framework for Smart Home Applications using Speech RecognitionYao Ge, Shuja Ansari, Amir M. Abdulghani, Muhammad Ali Imran, Qammer H. Abbasi. 197-204 [doi]
- On Threat Analysis of IoT-Based Systems: A SurveyWenbing Zhao 0001, Shunkun Yang, Xiong Luo. 205-212 [doi]
- A Blockchain-based Approach for Assessing Compliance with SLA-guaranteed IoT ServicesAli Alzubaidi, Karan Mitra, Pankesh Patel, Ellis Solaiman. 213-220 [doi]
- TFBO: A Trusted Framework based on Blockchain for Outsourcing Data EntryFengqi Li, Chunli Shang, Lupeng Zhang, Jing Liu. 221-227 [doi]
- Shortest Path Based Trained Indoor Smart Jacket Navigation System for Visually Impaired PersonMunmun Biswas, Tanni Dhoom, Refat Khan Pathan, Monisha Sen Chaiti. 228-235 [doi]
- Compact Fault Dictionaries for Efficient Sensor Fault Diagnosis in IoT-enabled CPSsStavros A. Viktoros, Maria K. Michael, Marios M. Polycarpou. 236-243 [doi]
- Characteristic Analysis and Test of Mixed Pulley Sound Signal Based on Hidden Markov ModelGengzhe Zheng, Liming Wu, Feiyang Song, Xinying He, Gengxuan Lin, Danfeng Jiang. 244-248 [doi]
- Supply Chain Financial Model Innovation Based on Block-chain Drive and Construction of Cloud Computing Credit SystemYifei Yao, Liangyong Chu, Linyun Shan, Qihui Lei. 249-255 [doi]
- An In-class Teaching Comprehensive Evaluation Model Based on Statistical Modelling and Ensemble LearningLudi Bai, Zehui Yu, Shifeng Zhang, Kangying Hu, Zhan Chen, Junqi Guo. 256-260 [doi]
- In-depth Real-World Evaluation of NB-IoT Module Energy ConsumptionMilan Lukic, Srdjan Sobot, Ivan Mezei, Dejan Vukobratovic, Dragan Danilovic. 261-265 [doi]
- NOMA-based Slotted p-Persistent CSMA with Multipacket Reception from Power DomainTingyu Qi, Youzheng Wang. 266-269 [doi]
- IoT Based Smart Farming: Are the LPWAN Technologies Suitable for Remote Communication?Nahina Islam, Biplob Ray, Faezeh Pasandideh. 270-276 [doi]
- Multisize plate detection algorithm based on improved Mask RCNNFeiyang Song, Liming Wu, Gengzhe Zheng, Xinying He, Guanchu Wu, Yang Zhong. 277-281 [doi]
- Hierarchical Formal Modeling of Internet of Things System Oriented to User BehaviorLei Yu, Yang Lu, Benhong Zhang, Lei Shi, Fangliang Huang, Ya Li, Yulian Shen. 282-289 [doi]
- Learning IoT: Basic Experiments of Home Automation using ESP8266, Arduino and XBeeAnnisa Sarah, Theresia Ghozali, Geraldo Giano, Melisa Mulyadi, Sandra Octaviani, Alfin Hikmaturokhman. 290-294 [doi]
- The DevOps Reference Architecture Evaluation : A Design Science Research Case StudyGeorges Bou Ghantous, Asif Gill. 295-299 [doi]
- Illegal Constructions Detection in Remote Sensing Images based on Multi-scale Semantic SegmentationChen Chen 0006, Jiaxuan Deng, Ning Lv. 300-303 [doi]
- Wireless Signal Based Elderly Fall Detection Using XGboost AlgorithmJuan Wen, Zhiyong Yang, Lei Jin. 304-308 [doi]
- XuperChain: A blockchain system that supports smart contracts parallelizationXiao Wei, Junyi Sun, Zheng Qi, Chen Fu. 309-313 [doi]
- Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and BlockchainBatnyam Enkhtaivan, Akiko Inoue. 314-318 [doi]
- Research of Power Energy Management Control Strategy with IOT in NZEBQingguang Yu, Zhicheng Jiang, Yuming Liu, Gaoxiang Long. 319-322 [doi]
- Analysis of Resource Allocation Overheads in Vehicle Ad Hoc Network Considering CSIMin Ao, Xin Zhang. 323-327 [doi]
- Research on Artificial Fish Swarm Clustering Algorithm in Urban Internet of VehiclesFengxin Cheng, Caixing Shao. 328-332 [doi]
- Fork Probability Analysis of PoUW Consensus MechanismZhijie Ma, Qinglin Zhao, Jianwen Yuan, Xiaobo Zhou, Li Feng 0001. 333-337 [doi]
- A Cyber-Physical System Approach for Predictive MaintenanceKoonlachat Meesublak, Tosapol Klinsukont. 337-341 [doi]
- A low power circuit for medical drip infusion monitoring systemShaojun Jiang, Yilin He. 342-345 [doi]
- An Intelligent Topology Optimization Strategy Toward the Robust Onion-like StructureQianzhen Sun, Tie Qiu, He Guo 0001. 346-347 [doi]
- A Blockchain-Indexed Storage supporting Scalable Data Integrity in Supply Chain TraceabilityShi-Syun Kuo, Wei-Tsung Su. 348-349 [doi]
- A Correlation Analysis of Indoor and Outdoor Air Quality using IoT sensorsJaeWon Moon, Seungwoo Keum, Sung Soon Park. 350-351 [doi]
- Design and development of a 3D Printed IoT portable Pillbox for continuous medication adherenceDimitrios Karagiannis, Konstantina S. Nikita. 352-353 [doi]
- An Automatic Key-update Mechanism for M2M Communication and IoT Security EnhancementWen-Chung Tsai, Tzu-Hsuan Tsai, Guang-Hao Xiao, Te-Jen Wang, Yu-Ruei Lian, Song-Hao Huang. 354-355 [doi]
- Development of IoT Edge Hub for Wireless Sensor Networks based on Docker ContainerNatapon Tansangworn. 356-357 [doi]