Journal title
ISSN: 1999-5903    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 16 Part 3 Year 2024

40 articles in this issue 

Tenzin Norbu, Joo Yeon Park, Kok Wai Wong and Hui Cui

Blockchain technology has become significant for financial sectors, especially digital payment systems, offering enhanced security, transparency, and efficiency. However, there is limited research on the factors influencing user trust in and acceptance of... see more

Pags. 0 - 0  

Shui Jiang, Yanning Ge, Xu Yang, Wencheng Yang and Hui Cui

Reinforcement learning (RL) is pivotal in empowering Unmanned Aerial Vehicles (UAVs) to navigate and make decisions efficiently and intelligently within complex and dynamic surroundings. Despite its significance, RL is hampered by inherent limitations suc... see more

Pags. 0 - 0  

Joaquim Miguel, Pedro Mendonça, Agnelo Quelhas, João M. L. P. Caldeira and Vasco N. G. J. Soares

Hiking and cycling have become popular activities for promoting well-being and physical activity. Portugal has been investing in hiking and cycling trail infrastructures to boost sustainable tourism. However, the lack of reliable data on the use of these ... see more

Pags. 0 - 0  

Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo and Ignacio M. Llorente

The adoption of edge infrastructure in 5G environments stands out as a transformative technology aimed at meeting the increasing demands of latency-sensitive and data-intensive applications. This research paper presents a comprehensive study on the intell... see more

Pags. 0 - 0  

Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang

The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriched... see more

Pags. 0 - 0  

Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier

In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, syst... see more

Pags. 0 - 0  

Alfonso Quarati and Riccardo Albertoni

Linked Data (LD) principles, when applied to Open Government Data (OGD), aim to make government data accessible and interconnected, unlocking its full potential and facilitating widespread reuse. As a modular and scalable solution to fragmented government... see more

Pags. 0 - 0  

Muhammad Bin Saif, Sara Migliorini and Fausto Spoto

Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic a... see more

Pags. 0 - 0  

Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt

In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existing... see more

Pags. 0 - 0  

Mengchi Xing, Haojiang Deng and Rui Han

The 5G core network adopts a Control and User Plane Separation (CUPS) architecture to meet the challenges of low-latency business requirements. In this architecture, a balance between management costs and User Experience (UE) is achieved by moving User Pl... see more

Pags. 0 - 0  

Ying-Hsun Lai, Shin-Yeh Chen, Wen-Chi Chou, Hua-Yang Hsu and Han-Chieh Chao

Federated learning trains a neural network model using the client’s data to maintain the benefits of centralized model training while maintaining their privacy. However, if the client data are not independently and identically distributed (non-IID) becaus... see more

Pags. 0 - 0  

Yu Yao and Quan Qian

We develop the online process parameter design (OPPD) framework for efficiently handling streaming data collected from industrial automation equipment. This framework integrates online machine learning, concept drift detection and Bayesian optimization te... see more

Pags. 0 - 0  

Ziyad Almudayni, Ben Soh and Alice Li

The advent of the Internet of Things (IoT) has revolutionised our interaction with the environment, facilitating seamless connections among sensors, actuators, and humans. Efficient task scheduling stands as a cornerstone in maximising resource utilisatio... see more

Pags. 0 - 0  

Andreas Giannakoulopoulos, Minas Pergantis and Aristeidis Lamprogeorgos

The present study focuses on using qualitative and quantitative data to evaluate the functionality, user experience (UX), and aesthetic approach offered by an academic multi-site Web ecosystem consisting of multiple interconnected websites. Large entities... see more

Pags. 0 - 0  

Mauro Femminella and Gianluca Reali

The need for adaptivity and scalability in telecommunication systems has led to the introduction of a software-based approach to networking, in which network functions are virtualized and implemented in software modules, based on network function virtuali... see more

Pags. 0 - 0  

Heidi Toivonen and Francesco Lelli

This paper investigates how users of smart devices attribute agency both to themselves and to their devices. Statistical analyses, tag cloud analysis, and sentiment analysis were applied on survey data collected from 587 participants. As a result of a pre... see more

Pags. 0 - 0  

Mostafa El Debeiki, Saba Al-Rubaye, Adolfo Perrusquía, Christopher Conrad and Juan Alejandro Flores-Campos

The use of unmanned aerial vehicles (UAVs) is increasing in transportation applications due to their high versatility and maneuverability in complex environments. Search and rescue is one of the most challenging applications of UAVs due to the non-homogen... see more

Pags. 0 - 0  

Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici

The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of ... see more

Pags. 0 - 0  

Dominik Warch, Patrick Stellbauer and Pascal Neis

In the digital transformation era, video media libraries’ untapped potential is immense, restricted primarily by their non-machine-readable nature and basic search functionalities limited to standard metadata. This study presents a novel multimodal method... see more

Pags. 0 - 0  

Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran

The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks s... see more

Pags. 0 - 0  

Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber

The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, wh... see more

Pags. 0 - 0  

Håkon Harnes and Donn Morrison

WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption and is now natively supported by all... see more

Pags. 0 - 0  

Gulshan Saleem, Usama Ijaz Bajwa, Rana Hammad Raza and Fan Zhang

Surveillance video analytics encounters unprecedented challenges in 5G and IoT environments, including complex intra-class variations, short-term and long-term temporal dynamics, and variable video quality. This study introduces Edge-Enhanced TempoFuseNet... see more

Pags. 0 - 0  

Hanyue Xu, Kah Phooi Seng, Jeremy Smith and Li Minn Ang

In the context of smart cities, the integration of artificial intelligence (AI) and the Internet of Things (IoT) has led to the proliferation of AIoT systems, which handle vast amounts of data to enhance urban infrastructure and services. However, the col... see more

Pags. 0 - 0  

Yushan Li and Satoshi Fujita

This paper proposes a novel event-driven architecture for enhancing edge-based vehicular systems within smart transportation. Leveraging the inherent real-time, scalable, and fault-tolerant nature of the Elixir language, we present an innovative architect... see more

Pags. 0 - 0  

Haedam Kim, Suhyun Park, Hyemin Hong, Jieun Park and Seongmin Kim

As the size of the IoT solutions and services market proliferates, industrial fields utilizing IoT devices are also diversifying. However, the proliferation of IoT devices, often intertwined with users’ personal information and privacy, has led to a conti... see more

Pags. 0 - 0  

Mattia Pellegrino, Gianfranco Lombardo, George Adosoglou, Stefano Cagnoni, Panos M. Pardalos and Agostino Poggi

With the recent advances in machine learning (ML), several models have been successfully applied to financial and accounting data to predict the likelihood of companies’ bankruptcy. However, time series have received little attention in the literature, wi... see more

Pags. 0 - 0  

Mohammad Javad Salariseddigh, Ons Dabbabi, Christian Deppe and Holger Boche

Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considered... see more

Pags. 0 - 0  

Dimah Almani, Tim Muller, Xavier Carpent, Takahito Yoshizawa and Steven Furnell

This research investigates the deployment and effectiveness of the novel Pre-Signature scheme, developed to allow for up-to-date reputation being available in Vehicle-to-Vehicle (V2V) communications in rural landscapes, where the communications infrastruc... see more

Pags. 0 - 0  

Andry Alamsyah, Gede Natha Wijaya Kusuma and Dian Puteri Ramadhani

The future of the internet is moving toward decentralization, with decentralized networks and blockchain technology playing essential roles in different sectors. Decentralized networks offer equality, accessibility, and security at a societal level, while... see more

Pags. 0 - 0  

Feng Zhou, Shijing Hu, Xin Du, Xiaoli Wan and Jie Wu

In the current field of disease risk prediction research, there are many methods of using servers for centralized computing to train and infer prediction models. However, this centralized computing method increases storage space, the load on network bandw... see more

Pags. 0 - 0  

Konstantinos Psychogyios, Andreas Papadakis, Stavroula Bourou, Nikolaos Nikolaou, Apostolos Maniatis and Theodore Zahariadis

The advent of computer networks and the internet has drastically altered the means by which we share information and interact with each other. However, this technological advancement has also created opportunities for malevolent behavior, with individuals... see more

Pags. 0 - 0  

Adel Belkhiri and Michel Dagenais

The graphics processing unit (GPU) plays a crucial role in boosting application performance and enhancing computational tasks. Thanks to its parallel architecture and energy efficiency, the GPU has become essential in many computing scenarios. On the othe... see more

Pags. 0 - 0  

Emma Fitzgerald and Michal Pióro

Industry 4.0, with its focus on flexibility and customizability, is pushing in the direction of wireless communication in future smart factories, in particular, massive multiple-input-multiple-output (MIMO) and its future evolution of large intelligent su... see more

Pags. 0 - 0  

Mikael Sabuhi, Petr Musilek and Cor-Paul Bezemer

As the number of machine learning applications increases, growing concerns about data privacy expose the limitations of traditional cloud-based machine learning methods that rely on centralized data collection and processing. Federated learning emerges as... see more

Pags. 0 - 0  

Davy Preuveneers and Wouter Joosen

Ontologies have the potential to play an important role in the cybersecurity landscape as they are able to provide a structured and standardized way to semantically represent and organize knowledge about a domain of interest. They help in unambiguously mo... see more

Pags. 0 - 0  

Juliana Basulo-Ribeiro and Leonor Teixeira

With the advent of Industry 5.0 (I5.0), healthcare is undergoing a profound transformation, integrating human capabilities with advanced technologies to promote a patient-centered, efficient, and empathetic healthcare ecosystem. This study aims to examine... see more

Pags. 0 - 0  

Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed

With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Numer... see more

Pags. 0 - 0