Abstract is missing.
- UbiSecE: UbiLab's Secure Cloud Environment for Public Health Research in Microsoft AzurePedro Augusto Miranda, Jasleen Kaur, Plinio Pelegrini Morita. 1-4 [doi]
- Clinically Prioritized Data Visualization in Remote Patient MonitoringTeena Arora, Venki Balasubramanian, Andrew Stranieri, Arun Neupane. 5-12 [doi]
- Food Nutrient Extraction Based on Image Recognition and Entity ExtractionHanzhong Gao, Yanjun Liu, Jingjuan Li, Jianwei Gao. 13-19 [doi]
- Design & Development of Misinformation Analysis System for Government Prevention of Public Health CrisesIrfhana Zakir Hussain, Jasleen Kaur, Matheus Lotto, Zahid A. Butt, Plinio P. Morita. 20-23 [doi]
- Actigraphy-Based Algorithm for Spinal Range of Motion Assessment for Axial Spondyloarthritis PatientsSydney Peters, Tiancheng He, Yunzhao Xing, Rameez Chatni, In-Ho Song, Michelle Crouthamel, Nancy Curran, Dan Webster, Matthew Czech, Jie Shen. 24-29 [doi]
- Reinforcement Learning Based Routing For Deadline-Driven Wireless CommunicationKiril Danilchenko, Gil Kedar, Michael Segal 0001. 30-35 [doi]
- A novel FRTS/FCTS-based MAC Protocol for In-band Full-duplex Wireless Ad-hoc NetworksMd. Abubakar Siddik, Tawsif Shahriar, SM Zuhair Zawhar Zaki, Monirul Haque Imon, Ashikur Rahman, Raqeebir Rab, Abderrahmane Leshob. 36-42 [doi]
- A Review of AI-based MANET Routing ProtocolsFatemeh Safari, Izabela Savic, Herb Kunze, Jason Ernst, Daniel Gillis. 43-50 [doi]
- Chained estimation for data reduction-driven routing in wireless sensor networksBrandon Foubert, Christian Salim, Nathalie Mitton. 51-56 [doi]
- Robotaxis as Computing Clusters: A Stochastic Modeling ApproachChinh Tran, Mustafa Mehmet-Ali. 57-62 [doi]
- Support Vector Machine for Color Classification of RNAOlivia Jeanne, Carolina Del Real Mata, Tamer AbdElFatah, Mahsa Jalali, Haleema Khan, Sara Mahshid. 63-67 [doi]
- Accuracy and precision of smartwatch for patient monitoring in Out-of-Hospital environmentKaio Jia Bin, Lucas Ramos De Pretto, Fábio Beltrame Sanchez, Linamara Rizzo Battistella. 68-71 [doi]
- Plug-and-play Text-based Emotion Recognition for Chatbots as Virtual Companions for Older PeopleLukas Große Westermann, Patric Eberle, Guang Lu. 72-77 [doi]
- Area Under Time Series Transformation for Home Appliance ClassificationLeo Ogrizek, Blaz Bertalanic, Mihael Mohorcic, Carolina Fortuna. 78-83 [doi]
- ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection SystemsOlivier Lourme, Gilles Grimaud, Michaël Hauspie. 84-91 [doi]
- SoD-MQTT: A SDN-Based Real-Time Distributed MQTT BrokerTidiane Sylla, Radheshyam Singh, Léo Mendiboure, Michael Stübert Berger, Marion Berbineau, Lars Dittmann. 92-97 [doi]
- A Computation Offloading Framework for Android Devices in a Mobile CloudVlad-Florin Ilie, Mihail-Andrei Banica, Radu-Ioan Ciobanu, Ciprian Dobre. 98-103 [doi]
- Energy-Efficient Scheduling and Resource Allocation for Power-limited Cognitive IoT DevicesKang Wang, Peiran Wu, Minghua Xia. 104-109 [doi]
- A Wearable Auricular Laser Acupuncture Device with IoT Sensors for Personalized Wellness EnhancementWenrui Lin, Guann-Pyng Li. 110-115 [doi]
- End-to-End 5G Priority Scheduling Strategy for a WBAN Health Monitoring SystemSaadi Boudjit, Marwen Abdennebi, Audace Manirabona, Nawel Zangar. 116-122 [doi]
- Predictive Treatment of Third Molars Using Panoramic Radiographs and Machine LearningHéctor Aravena, Miguel Arredondo, Carlos Fuentes, Carla Taramasco, Diego Alcocer, Gustavo Gatica. 123-128 [doi]
- Smartphone Camera as a Diagnostic tool for Detection of Pulse Rate and Blood Oxygen ConcentrationPanayiotis Antoniou, Marios Nestoros, Anastasis C. Polycarpou. 129-134 [doi]
- Deep learning assisted quality ranking for list decoding of videos subject to transmission errorsAlexis Guichemerre, Stéphane Coulombe, Anthony Trioux, François-Xavier Coudoux, Patrick Corlay. 135-142 [doi]
- Learning to Detect Wireless Spectrum Occupancy Using Clustering ApproachesGregor Cerar, Blaz Bertalanic, Mihael Mohorcic, Carolina Fortuna. 143-148 [doi]
- Optimal D2D Learning-Based Neighbor Selection in mmWave Networks using Gittins IndicesVamshi Vijay Krishna J, V. Mahendran, Venkataramana Badarla. 149-154 [doi]
- Optimized Resource and Deep Learning Model Allocation in O-RAN ArchitectureAhmed Makhlouf, Alaa Awad Abdellatif, Ahmed Badawy, Amr Mohamed 0001. 155-160 [doi]
- Evaluating Machine Learning Techniques for Predicting Link Instability in Wireless Networks to Support Live Video StreamingSharon Choy, Bernard Wong 0001. 161-168 [doi]
- A Novel Single Grant-Based Uplink Scheme for High Throughput and Reliable Low Latency CommunicationSnigdhaswin Kar, Prabodh Mishra, Kuang-Ching Wang. 169-174 [doi]
- Analysing and Learning Low-Latency Network Coding SchemesVincent Latzko, Christian Vielhaus, Mahshid Mehrabi, Frank H. P. Fitzek. 175-180 [doi]
- Soft-Output PAC Decoder for Uplink Sparse Code Multiple Access SystemTatiana Rykova, Baris Göktepe, Thomas Schierl, Cornelius Hellge. 181-187 [doi]
- Interest-based Routing in Opportunistic Networks: Evaluating IRP against SCORPDaniela Córdova-Pintado, Adrián Sánchez-Carmona, Ramon Martí. 188-193 [doi]
- Design of Multilevel Coding for Clipped and Filtered OFDM With Clipping Noise CancellationDaichi Muramatsu, Hideki Ochiai. 194-199 [doi]
- Latency and Power Consumption in 2.4GHz IoT Wireless Mesh Nodes: An Experimental Evaluation of Bluetooth Mesh and Wirepas MeshSilvano Cortesi, Christian Vogt 0002, Elio Reinschmidt, Michele Magno. 200-205 [doi]
- Helium-based IoT Devices: Threat Analysis and Internet-scale ExploitationsVeronica Rammouz, Joseph Khoury, Ðorde Klisura, Morteza Safaei Pour, Mostafa Safaei Pour, Claude Fachkha, Elias Bou-Harb. 206-211 [doi]
- Physical-layer Authentication with Watermarked Preamble for Internet of ThingsYuqi Leng, Ruiqi Zhang, Wenkun Wen, Peiran Wu, Minghua Xia. 212-217 [doi]
- Lightweight synchronization to NB-IoT enabled LEO Satellites through Doppler predictionZheng Zhou, Nicola Accettura, Raoul Prévost, Pascal Berthou. 218-223 [doi]
- Entropy and Divergence-based DDoS Attack Detection System in IoT NetworksMakhduma Saiyed, Irfan S. Al-Anbagi. 224-230 [doi]
- A Soft Voting Classification Model for Network Traffic Prediction in VANET/V2XParvin Ahmadi Doval Amiri, Samuel Pierre. 231-236 [doi]
- Wi-Fi Multi-Path Parameter Estimation for Sub-7 GHz Sensing: A Comparative StudyFrancesca Meneghello, Alejandro Blanco, Antonio Cusano, Joerg Widmer, Michele Rossi. 237-242 [doi]
- A Versatile Machine Learning-Based Vehicle-to-Vehicle Connectivity ModelAshraf A. Tahat, Talal A. Edwan, Motaz-Bellah Dababseh, Mohammed Nidal, Mohammed Rumman, Alaa Arabiat. 243-248 [doi]
- Whose Data are Reliable: Sensor Declared Data ReliabilitySakib Shahriar Shafin, Gour C. Karmakar, Iven Mareels, Venki Balasubramanian, Ramachandra Rao Kolluri. 249-254 [doi]
- Enhancing Video Streaming Quality of Service with Software-Defined Networking and Network Slicing: A Scalable AV1 ApproachSina Keshvadi, Yogesh Sharma. 255-260 [doi]
- Multi-Agent Q-Learning for Drone Base StationsSalim Janji, Adrian Kliks. 261-266 [doi]
- Density-Aware Reinforcement Learning to Optimise Energy Efficiency in UAV-Assisted NetworksBabatunji Omoniwa, Boris Galkin, Ivana Dusparic. 267-273 [doi]
- Energy-Efficient Task Offloading and Trajectory Design for UAV-based MEC SystemsMohamed El-Emary, Ali Ranjha, Diala Naboulsi, Razvan Stanica. 274-279 [doi]
- Quality of Service Evaluation and Forecast for EV Charging Based on Real-World DataRibal Atallah, Nassr Al-Dahabreh, Mohammad Ali Sayed, Khaled Sarieddine, Mohamed Kadry Elhattab, Maurice Khabbaz, Chadi Assi. 280-285 [doi]
- Sec-PUF: Securing UAV Swarms Communication with Lightweight Physical Unclonable FunctionsWassila Lalouani. 286-291 [doi]
- Security Implications of a Satellite Communication Device on Wireless Networks Using PentestingJordan Gurren, Avanthika Vineetha Harish, Kimberly Tam, Kevin D. Jones. 292-298 [doi]
- Multivariate Polynomial Public Key Digital Signature Algorithm: Semi-covariance Analysis and Performance Test over 5G NetworksAtinderpal Singh Lakhan, Mohammed Abuibaid, Jun Steed Huang, Mostafa Taha, Zhehan Wang. 299-305 [doi]
- Privacy vs Utility analysis when applying Differential Privacy on Machine Learning ClassifiersMathuranthagaa Selvarathnam, Roshan G. Ragel, Constantino Carlos Reyes-Aldasoro, Muttukrishnan Rajarajan. 306-311 [doi]
- Practical Trustworthiness Model for DNN in Dedicated 6G ApplicationAnouar Nechi, Ahmed Mahmoudi, Christoph Herold, Daniel Widmer, Thomas Kürner, Mladen Berekovic, Saleh Mulhem. 312-317 [doi]
- Outage Performance of IRS-Assisted Underwater Optical Wireless Communication Systems over Combined Channel ModelVu Tuan Lam, Do Trung Anh, Nguyen Van Thang, Tien Dang Sy, Dang The Ngoc. 318-323 [doi]
- Lightweight Group Pre-Handover Authentication Scheme for Aviation 5G Air-To-Ground NetworksGege Tian, Tao Shang, Qianyun Zhang, Kaiquan Cai, Liang Zhao. 324-329 [doi]
- Improving the performance of OLSRouting using PHY-IP information for realistic V2V/MANETsYann Maret, Mohsin Raza, Franck Legendre, Nik Bessis, Jean-Frédéric Wagen. 330-337 [doi]
- dRG-MEC: Decentralized Reinforced Green Offloading for MEC-enabled Cloud NetworkAsad Aftab, Semeen Rehman. 338-343 [doi]
- Deep Learning Assisted Channel Estimation for Cell-Free Distributed MIMO NetworksImtiaz Ahmed 0001, Md. Zoheb Hasan, Ahmed Rubaai, Kamrul Hasan, Cong Pu, Jeffrey H. Reed. 344-349 [doi]
- A Low Complexity Approximation of Gradient Descent for Learning over Single and Multi-Agent SystemsMohammad H. Nassralla, Naeem Akl, Amr Mohamed 0001, Zaher Dawy. 350-355 [doi]
- Performance of IEEE802.11bd for Legacy and NGV Devices with Channel Bonding and No FallbackFarzaneh Abdolahi, Jelena V. Misic, Vojislav B. Misic. 356-361 [doi]
- 5G Mobile Network Signal Strength Interpolation Using Machine Learning GAN AlgorithmManar Zaboub, Marius Corici, Thomas Magedanz. 362-368 [doi]
- Communication-Efficient ∆-Stepping for Distributed Computing SystemsHaomeng Zhang, Junfei Xie, Xinyu Zhang. 369-374 [doi]
- Everyone can slice LoRaWANThibaut Bellanger, Alexandre Guitton, Razvan Stanica, Fabrice Valois. 375-380 [doi]
- IP/MPLS and MPLS/TP Teleprotection Latencies over High Voltage Power LinesKinan Ghanem, Stephen Ugwuanyi, James Irvine 0001. 381-386 [doi]
- Sensor-based Wastewater Monitoring Framework to Detect COVID-19Lutful Karim, Nour Hossain, Nargis Khan, Mohammad Shorfuzzaman, Jalal Almhana, Nidal Nasser. 387-392 [doi]
- Evaluating Energy Consumption and Maximum Communication Distance for SX1280 LoRa Transceiver at 2.4 GHz towards Adaptive NetworksAlonso Llap, Moises Nunez. 393-398 [doi]
- Fine Time Measurement based Time Synchronization for Multi-AP Wireless Industrial EnvironmentsSugandh Huthanahally Mohan, Rute C. Sofia. 399-404 [doi]
- Platoon-Local Dynamic Map: Micro cloud support for platooning cooperative perceptionCarlos Mateo Risma Carletti, Claudio Casetti, Jérôme Härri, Fulvio Risso. 405-410 [doi]
- Analyzing Inter-Vehicle Collision Predictions during Emergency Braking with Automated VehiclesJoseba Gorospe, Shahriar Hasan, Mir Riyanul Islam, Arrate Alonso Gómez, Svetlana Girs, Elisabeth Uhlemann. 411-418 [doi]
- Comparing different GPS solutions for the Cooperative Awareness Messages DistributionCarlo Augusto Grazia, Martin Klapez, Maurizio Casoni. 419-424 [doi]
- Semantically Optimized End-to-End Learning for Positional Telemetry in Vehicular ScenariosNeelabhro Roy, Seyed Samie Mostafavi, James Gross. 425-430 [doi]
- Bringing Connected Vehicle Communications (V2X) to Shared SpectrumJon M. Peha. 431-437 [doi]
- RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking AdversaryDonald R. Reising, Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, T. Daniel Loveless. 438-444 [doi]
- Keep your Enemies closer: On the minimal Distance of Adversaries when using Channel-based Key Extraction in SISO 6G SystemsFelix Klement, Shoya Takebuchi, Tolga Arul, Stefan Katzenbeisser 0001. 445-451 [doi]
- Analyzing the Feasibility of Privacy-Respecting Automated Tracking of Devices Fleeing a BurglaryBen Swierzy, Markus Krämer, Daniel Vogel 0004, Daniel Meyer, Michael Meier 0001. 452-459 [doi]
- Sabotage-proof Messenger Discovery for Protesters based on Brownian motion and Erasure CodingChunchao Liang, Wen Cheng, Todd Dotter, Zachary Parkhurst. 460-465 [doi]
- Residual Service Time Optimization for legacy Wireless-TSN end nodesPablo Avila-Campos, Jetmir Haxhibeqiri, Merkebu Girmay, Ingrid Moerman, Jeroen Hoebeke. 466-471 [doi]
- Low Complexity HARQ Algorithm for a Polar Code DecoderJanak Sodha. 472-475 [doi]
- Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABEMohammed B. M. Kamel, Janneke Van Oosterhout, Péter Ligeti, Christoph Reich. 476-480 [doi]
- Recommending Similar Devices in Close Proximity for Network Security ManagementVladimír Boucek, Martin Husák. 481-484 [doi]
- Reduced Complexity Group-based Precoding for Downlink Cell-free Massive MIMOMariam Mussbah, Stefan Schwarz, Markus Rupp. 485-488 [doi]
- Exploring the Potential of Residual Networks for Efficient Sub-Nyquist Spectrum SensingHem Regmi, Sanjib Sur. 489-492 [doi]