Abstract is missing.
- Impact of Multi-Layer Recurrent Neural Networks in the Congestion Analysis of TeraHertz B5G/6G MAC MechanismDjamila Talbi, Zoltán Gál. 1-6 [doi]
- ML-based Video Streaming QoE Modeling with E2E and Link MetricsLei Wang, Adam Durning, Declan T. Delaney. 1-8 [doi]
- Review of Least Action Principle in Electromagnetics: Part II: Derivation of Maxwell's EquationsDragan Poljak. 1-5 [doi]
- Design and Evaluation of a Cross-Layer MPTCP Path Manager for Vehicular NetworksVadym S. Hapanchak, António D. Costa. 1-6 [doi]
- Analyses of Recent Advances on Machine Learning-based Trust Management for Mobile IoT ApplicationsHiba Souissi, Michaël Mahamat, Ghada Jaber, Hicham Lakhlef, Abdelmadjid Bouabdallah. 1-6 [doi]
- Network Sanity Checks Through GraphsGian Paolo Jesi, Andrea Odorizzi, Gianluca Mazzini. 1-6 [doi]
- Individual Olive Tree Detection in RGB ImagesIvana Marin, Sven Gotovac, Vladan Papic. 1-6 [doi]
- Let's Read: Analysing S/MIME Certificate Vendors' Efficiency and PrivacyTobias Mueller, Max Hartenstein. 1-6 [doi]
- Generative Recurrent Network For Design SARS-CoV-2 Main Protease InhibitorAdham Khaled, Zeinab Abd El Haliem. 1-6 [doi]
- Comparison of Machine Learning Models for Predicting Indoor Materials from Channel Impulse ResponseTeodora Kocevska, Tomaz Javornik, Ales Svigelj, Ke Guan, Aleksandra Rashkovska, Andrej Hrovat. 1-6 [doi]
- Performance Comparison of Generic and Quantized Fully Connected and Convolutional Neural Networks for Real- Time Signal/Background ClassificationArijana Burazin Misura, Josip Music, Julije Ozegovic, Damir Lelas. 1-6 [doi]
- Analytical Traffic Model for a Multidomain IMS/NGN Network Including Service and Transport StratumSylwester Kaczmarek, Maciej Sac, Michal Cieslinski. 1-6 [doi]
- Securing IoT Services Based on Security Requirement CategoriesKarlo Slovenec, Marin Vukovic, Denis Salopek, Miljenko Mikuc. 1-6 [doi]
- PWU: Pre- Wakeup for CPU Idle to Reduce Latency and Power ConsumptionKei Fujimoto, Hikaru Harasawa, Ko Natori, Ikuo Otani, Shogo Saito, Akinori Shiraga. 1-6 [doi]
- Predicting Vulnerabilities in Web Applications Based on Website Security ModelIvan Kovacevic, Mihael Marovic, Stjepan Gros, Marin Vukovic. 1-6 [doi]
- Performance Comparison of Technological Solutions for Spark Applications in AWSRiccardo Lancellotti, Stefano Rossi, Giuseppe Calogero Miano, Fabio Miselli. 1-6 [doi]
- Energy-Efficient and Context-aware Trajectory Planning for Mobile Data Collection in IoT using Deep Reinforcement LearningSana Benhamaid, Hicham Lakhlef, Abdelmadjid Bouabdallah. 1-6 [doi]
- SWAP: Secure Warning Messages Authentication and Propagation in Internet of VehiclesAlessandro Brighente, Mauro Conti, Harsha Vasudev. 1-6 [doi]
- On Queueing Models for the Performance Analysis of a Vehicular Ad Hoc NetworkIrene P. Keramidi, Dimitris Uzunidis, Ioannis D. Moscholios, Panagiotis G. Sarigiannidis, Michael D. Logothetis. 1-6 [doi]
- NetApps Approach for Accelerating Vertical Adoption of 5G Networks: A UAV CaseIgnacio Martinez-Alpiste, Gelayol Golcarenarenji, Dimitrios Klonidis, Jose M. Alcaraz Calero, Qi Wang. 1-6 [doi]
- Employing a Seq2Seq Model for Spelling Correction in Albanian LanguageEvis Trandafili, Alba Haveriku, Antea Bendo. 1-6 [doi]
- Teaching & Learning Analytics for Data-Based Optimization of Teaching and Learning Processes in Courses with Blended LearningLars Mehnen, Birgit Pohn, Matthias Blaickner, Thomas Mandl 0004, Isabel Dregely. 1-5 [doi]
- An Efficient Federated Identity Management Protocol For Heterogeneous Fog computing ArchitectureYoucef Imine, Antoine Gallais, Yacine Challal. 1-6 [doi]
- A Hybrid Deep Learning Technique for Sentiment Analysis in E-Learning Platform with Natural Language ProcessingJay Krishna Das, Anupam Das 0007, Joann Rosak-Szyrocka. 1-7 [doi]
- Modelling Assessment Rubrics through Bayesian Networks: a Pragmatic ApproachFrancesca Mangili, Giorgia Adorni, Alberto Piatti, Claudio Bonesana, Alessandro Antonucci 0001. 1-6 [doi]
- Use of Facial Expressions to Improve the Social Acceptance of Level 4 and 5 Automated Driving System Equipped VehiclesAntonio Costantino Marceddu, Jacopo Sini, Bartolomeo Montrucchio, Massimo Violante. 1-3 [doi]
- Improving Classification Results in Network Data Analysis using Interpretability MethodsDomazoj Begusic, Luke Frederick Walker, Sanja Krznaric, Damir Pintar. 1-6 [doi]
- QoS Resource Reservation Mechanisms for Switched Optical NetworksSylwester Kaczmarek, Magdalena Mlynarczuk, Arkadiusz Dumin. 1-6 [doi]
- Method of 5G TDD Midhaul Multiplexing Gain Estimation based on System-Level Traffic MeasurementsDominik Dulas, Katarzyna Maraj-Zygmat, Krzysztof Walkowiak. 1-6 [doi]
- User Experience and Multimodal Usability of Navigation Systems - Evaluation of Effectiveness and EfficiencyLumbardha Hasimi, Aneta Poniszewska-Maranda. 1-6 [doi]
- Neural Network-based End-effector Force Estimation for Mobile Manipulator on Simulated Uneven SurfacesStanko Kruzic, Josip Music, Ivo Stancic, Vladan Papic. 1-6 [doi]
- Topology Optimization of an Assembled 3D Printed RobotIvan Chavdarov, Bozhidar Naydenov, Kaloyan Yovchev, Lyubomira Miteva. 1-6 [doi]
- Cost Effective Smart Parking System on CampusDaniel Baqaeen, Rachel Liang, Magdalene Piotrowski, Andrew Jung. 1-6 [doi]
- Application of E-Learning in Theoretical Part of the Subject InformaticsBosko Lisnic, Ani Grubisic, Sasa Mladenovic. 1-6 [doi]
- Determining the ABEP under the Influence of K -µ Fading and CCI with SC combining at L-branch Receiver Using Moment Generating FunctionDragana Krstic, Suad Suljovic, Nenad Petrovic, Sinisa Minic, Zoran Popovic. 1-5 [doi]
- Performance of a Wireless OCDMA Network for Baby Bed Monitoring in a Nursery ContextAmina Bousssebt, Stephanie Sahuguede, Anne Julien-Vergonjanne, Sébastien Reynaud. 1-6 [doi]
- Base Systems for Docker Containers - Security AnalysisArkadiusz Maruszczak, Michal Walkowski, Slawomir Sujecki. 1-5 [doi]
- Fast and Accurate Song Recognition: an Approach Based on Multi-Index HashingSalvatore Serrano, Marco Scarpa. 1-6 [doi]
- Design and Implementation of a Software Vulnerabilities and Application Research ToolElisa Benetti, Andrea Zucchelli, Gianluca Mazzini. 1-5 [doi]
- Estimating the Block-Diagonal Idiosyncratic Covariance in High-Dimensional Factor ModelsLucija Zignic, Stjepan Begusic, Zvonko Kostanjcar. 1-6 [doi]
- Data Structures Analysis for Text Processing in the Framework of NLP Classification in PolishUrszula Krzeszewska, Aneta Poniszewska-Maranda. 1-6 [doi]
- Long-term Parameters Monitoring of the IDQ Clavis 3 QKD SystemOndrej Klicnik, Adrian Tomasov, Petr Munster, Tomás Horváth, Jan Hajny. 1-4 [doi]
- Experimental Demonstration of Hybrid Photonics-BasedARoF System for 5G and B5G NetworksArmands Ostrovskis, Toms Salgals, Kristaps Rubuls, Laura Skladova, Vjaceslavs Bobrovs, Sandis Spolitis. 1-5 [doi]
- Empirically Derived Use Cases for Software AnalyticsThiago Rique, Emanuel Dantas, Mirko Barbosa Perkusich, Kyller Costa Gorgônio, Hyggo Oliveira de Almeida, Angelo Perkusich. 1-6 [doi]
- Microservice Performance in Container- and Function-as-a-Service ArchitecturesClaudia Canali, Riccardo Lancellotti, Pietro Pedroni. 1-6 [doi]
- Adaptive Weights-based Dynamic Resource Provisioning in Space Division Multiplexed-Elastic Optical Networks (SDM-EONs)Anjali Sharma, Baljinder Singh Heera, Varsha Lohani, Yatindra Nath Singh. 1-6 [doi]
- Sector-Beam Antenna Array for 77 GHz Automotive RADAR SystemsSourour Abdellaoui, Saber Dakhli, Jean-Marie Floc'h, Mimoun Hamdi. 1-5 [doi]
- Autonomy for Ships: System Thinking and EngineeringKjeld Dittmann. 1-6 [doi]
- Analysis of SAR in a Simplified Body Model due to a Short Dipole Antenna RadiationAnna Susnjara, Dragan Poljak, Ivan Matic. 1-5 [doi]
- VR Training for Laboratory EnvironmentsJosef Wermann, Birgit Pohn. 1-6 [doi]
- An Approach based on vSDN to Optimize Power ConsumptionEuclides Carlos Pinto Neto, Gustavo Callou. 1-6 [doi]
- Telecom Fraud Detection with Machine Learning on Imbalanced DatasetIvan Krasic, Stipe Celar. 1-6 [doi]
- On 5G Radiated Field Measurement/Calculation Procedures and Exposure Compliance LimitsMarin Galic, Miroslav Crnolatec, Dragan Poljak. 1-6 [doi]
- Variable Selection for the Prediction of TSS, pH and TA of Intact Berries of Thompson Seedless Grapes from their NIS ReflectionChrysanthi Chariskou, Christos Bazinas, Andries J. Daniels, Umezuruike L. Opara, Hélène H. Nieuwoudt, Vassilis G. Kaburlasos. 1-5 [doi]
- Review of Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT NetworksZouhair Chiba, Noreddine Abghour, Khalid Moussaid, Oumaima Lifandali, Rachid Kinta. 1-6 [doi]
- Vehicle Distance Estimation Based on Stereo Camera System with Implementation on a Real ADAS BoardMarko Miljkovic, Mario Vranjes, David Mijic, Miodrag Dukic. 1-6 [doi]
- ATMAS: Airplane Trajectory Missing Alarm System based on Deep LearningQiaoqiao Zhu, Zexin Wu, Jie Nie. 1-4 [doi]
- Radio Environment Map and Deep Q-Learning for 5G Dynamic Point BlankingMarcin Hoffmann, Pawel Kryszkiewicz. 1-3 [doi]
- Selecting an Optimal Cluster Head using PSO Algorithm in WSNsDheyab Salman Ibrahim, Saad Talib Hasson, Princy A. Johnson. 1-4 [doi]
- Siamese Network for Content-Based Image Retrieval: Detection of Alzheimer's Disease from neuroimaging dataIvana Marin, Tea Marasovic, Sven Gotovac. 1-6 [doi]
- Classification Algorithms for Analyzing Parkinson's Disease PatientOsiris Escamilla-Luna, Miguel A. Wister, Jose Hemandez-Torruco. 1-6 [doi]
- Distance Based Server Selection in 5G NetworksÅke Arvidsson. 1-6 [doi]
- Detection of Tennis Strokes using Wearable SensorOmar Hazem, Ahmed F. Al-Sadek. 1-6 [doi]
- Predicting Programming Success: How Intermittent Knowledge Assessments, Individual Psychometrics, and Resting-State EEG Predict Python Programming and Debugging SkillsChu-Hsuan Kuo, Malayka Mottarella, Theodros Haile, Chantel S. Prat. 1-6 [doi]
- AI Application in Next Generation Programmable NetworksMateusz Rasmus, Zbigniew Kopertowski, Stanislaw Kozdrowski. 1-3 [doi]
- Twin Delayed DDPG based Dynamic Power Allocation for Internet of Robotic ThingsHomayun Kabir, Mau-Luen Tham, Yoong Choon Chang. 1-6 [doi]
- Analysis of the Textual Information Extracted from News PortalsPetra Lovric, Linda Vickovic, Hrvoje Karna. 1-6 [doi]
- Using Moodle Test Scores to Predict Success in an Online CourseDorotea Bertovic, Marina Mravak, Kristina Nikolov, Nikolina Vidovic. 1-7 [doi]
- Review of Least Action Principle in Electromagnetics: Part III: ApplicationsDragan Poljak. 1-6 [doi]
- Subjective Assessment of the Quality of Video Sequences by the Young ViewersStefan Brachmanski, Janusz Klink. 1-6 [doi]
- Machine Learning-based Model for Defining Circuit-level Parameters of VCSELIhtesham Khan, Lorenzo Tunesi, Muhammad Umar Masood, Enrico Ghillino, Vittorio Curri, Andrea Carena, Paolo Bardella. 1-6 [doi]
- Augmented Reality Based Sensor Data Visualization for Plant Growth MonitoringEla Drutter, Mario Milicevic, Ana Kuzmanic Skelin, Mirjana Bonkovic. 1-7 [doi]
- Behavior Exploration of Humanoid Robot NAO and Comparative Interaction Study of Autistic Children with the Robot and HumanMirajul Mohin, Sourav Deb, Saifuddin Md. Tareeq. 1-5 [doi]
- Predicting Students'Final Exam Grades Based on Learning Material Usage extracted from Moodle LogsSuzana Marija Dunatov, Kristian Kasalo, Anamaria Lovrincevic, Jelena Maljkovic, Antonela Prnjak. 1-6 [doi]
- Cooling Power Consumption Dependency Simulation for Real-World Data Center DataJana Backhus, Yasutaka Kono. 1-6 [doi]
- Review of Least Action Principle in Electromagnetics Part I: Derivation of Continuity Equation and Lorentz ForceDragan Poliak. 1-6 [doi]
- Ethernet Communication over IP Transport for Industrial and Private Cellular NetworkVikramajeet Khatri, Mehrnoosh Monshizadeh, Kari Tiirikainen. 1-6 [doi]
- An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEMMohamed Hadded, Gaspard Lauras, Jérôme Letailleur, Yohann Petiot, Anouk Dubois. 1-6 [doi]
- Indoor Positioning: Comparing Different Techniques and Choosing the Best One for a User Authentication Real ScenarioJoaquín Pérez Balbela, Aruna Prem Bianzino. 1-6 [doi]
- Identifying Low-Resource Languages in Speech Recordings through Deep LearningKleona Binjaku, Joan Janku, Elinda Kajo Meçe. 1-6 [doi]
- Determination of Video Service Quality in an IP Environment with the Use of Different Software Tools: A Comparison StudyTadeus Uhl, Christian Hoppe, Janusz Henryk Klink. 1-6 [doi]
- Adaptive Multi-Connectivity Activation for Throughput Enhancement in 5G and Beyond Non-Terrestrial NetworksMikko Majamaa, Henrik Martikainen, Lauri Sormunen, Jani Puttonen. 1-5 [doi]
- Blockchain Redaction in Self-Sovereign IdentitySeila Becirovic, Spela Cucko, Muhamed Turkanovic, Haris Supic, Sasa Mrdovic. 1-6 [doi]
- LoRa-based System for IoT Applications via HAPS in Remote AreasGiovanni Giambene, Karthik Korre. 1-6 [doi]
- The Solution for Creating a 2D Top-View Map of the Pedestrian Positions Around the VehicleNemanja Avramovic, Mario Vranjes, Zeljko Lukac, Jelena Kovacevic. 1-6 [doi]
- Design of Pattern-Reconfigurable Six-Elements Dipole Array for 5G Compact Base StationMohamed Khammeri, Saber Dakhli, Jean-Marie Floc'h, Feten Slimeni. 1-6 [doi]
- Stochastic-Deterministic Electromagnetic Modeling of Human Head Exposure to Microsoft HoloLensAnte Lojic Kapetanovic, Anna Susnjara, Dragan Poljak, Mladen Russo. 1-5 [doi]
- Networking Analysis of Photonics Integrated Multiband WSS Based ROADM ArchitectureMuhammad Umar Masood, Ihtesham Khan, Lorenzo Tunesi, Bruno Correia, Rasoul Sadeghi, Enrico Ghillino, Paolo Bardella, Andrea Carena, Vittorio Curri. 1-6 [doi]
- Cloud-based Spectrum Access Control System for Dense IoT NetworksCezary Adamczyk, Adam Samorzewski, Mateusz Grzyb, Adrian Kliks. 1-6 [doi]
- An Impact of the Encoding Bitrate on the Quality of Streamed Video Presented on Screens of Different ResolutionsJanusz Klink, Stefan Brachmanski. 1-6 [doi]
- Machine Learning Application to Transmission Quality Assessment in Optical NetworksStanislaw Kozdrowski, Pawel Cichosz, Slawomir Sujecki. 1-3 [doi]
- LogStack: A Smart Logging Stack Approach for IoT Devices based NDN (IoT-NDN)Mohamed Ahmed M. Hail, Leon Dietrich, Stefan Fischer. 1-6 [doi]
- Quality of Service Evaluation over a 496 km Quantum Key Distribution NetworkMiryeong Park, Kyungwoon Lee, Kanghee Seol, Minsoo Lee, Hyungsoo Kim. 1-3 [doi]
- Empirical Assessment on Interactive Detection of Code SmellsDanyllo Albuquerque, Everton Guimarães, Alexandre Braga Gomes, Mirko Barbosa Perkusich, Hyggo Oliveira de Almeida, Angelo Perkusich. 1-6 [doi]
- All-to-All Personalized Communication on Fat-Trees Using Latin SquaresDaniele Izzi, Annalisa Massini. 1-6 [doi]
- A Comparative Study of Vegetation Attenuation at Millimeter Waves BandwidthKrzysztof Cichon, Maciej Nikiforuk. 1-6 [doi]
- Blind Channels Responses Estimation by Constrained ClusteringMichel Terré, Luc Féty, Thierry Horsin. 1-6 [doi]
- IEEE 802.1X Virtual Network Function Development for NG-PON ArchitectureIgor Virgílio Araújo, Solange Rito Lima, André Domingos Brízido. 1-6 [doi]
- Performance Analysis for Next Generation CD and CDC based Technology Optical NetworksStanislaw Kozdrowski, Maria Konieczka, Alicja Poturala, Slawomir Sujecki. 1-3 [doi]
- Performance Evaluation for End-to-End Slice Management in 5G/B5G Cellular NetworksNoor Abdalkarem Mohammedali, Triantafyllos Kanakis, Ali Al-Sherbaz, Michael Opoku Agyeman. 1-6 [doi]
- Septum Feed Design for Right and Left Circular PolarisationMaja Skiljo, Zoran Blazevic, Dragan Poljak. 1-6 [doi]
- Performance Assessments for SDN Control Plane into Distinct Network TopologiesPantelimon-Teodor Tivig, Eugen Borcoci, Marius Vochin. 1-6 [doi]