Journal title
ISSN: 1999-5903    frecuency : 4   format : Electrónica

Issues

      see all issue


Skip Navigation Links.

Volume 13 Part 11 Year 2021

32 articles in this issue 

Kunlin Liu, Ping Wang, Wenbo Zhou, Zhenyu Zhang, Yanhao Ge, Honggu Liu, Weiming Zhang and Nenghai Yu

Deepfake aims to swap a face of an image with someone else’s likeness in a reasonable manner. Existing methods usually perform deepfake frame by frame, thus ignoring video consistency and producing incoherent results. To address such a problem, we propose... see more

Pags. 0 - 0  

Dmitrii Gavra, Ksenia Namyatova and Lidia Vitkova

This paper examines the problem of social media special operations and especially induced support in social media during political election campaigns. The theoretical background of the paper is based on the study fake activity in social networks during pr... see more

Pags. 0 - 0  

Franco Bagnoli, Guido de Bonfioli Cavalcabo’, Banedetto Casu and Andrea Guazzini

We investigate the problem of the formation of communities of users that selectively exchange messages among them in a simulated environment. This closed community can be seen as the prototype of the bubble effect, i.e., the isolation of individuals from ... see more

Pags. 0 - 0  

Ivan Blekanov, Svetlana S. Bodrunova and Askar Akhmetov

The community-based structure of communication on social networking sites has long been a focus of scholarly attention. However, the problem of discovery and description of hidden communities, including defining the proper level of user aggregation, remai... see more

Pags. 0 - 0  

Jianhua Liu and Zibo Wu

The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effici... see more

Pags. 0 - 0  

Elisabeth Vogel, Zoya Dyka, Dan Klann and Peter Langendörfer

Resilience is a feature that is gaining more and more attention in computer science and computer engineering. However, the definition of resilience for the cyber landscape, especially embedded systems, is not yet clear. This paper discusses definitions pr... see more

Pags. 0 - 0  

Kiomi Matsumoto-Royo, Maria Soledad Ramírez-Montoya and Paulette Conget

Education 4.0 prepares new generations to develop the skills required to perform in a technological, dynamic, and unpredictable world. The main barrier to implementing Education 4.0 in schools is that teachers have not been trained for it. Given the advan... see more

Pags. 0 - 0  

Qian Qu, Ronghua Xu, Yu Chen, Erik Blasch and Alexander Aved

Blockchain technology has been recognized as a promising solution to enhance the security and privacy of Internet of Things (IoT) and Edge Computing scenarios. Taking advantage of the Proof-of-Work (PoW) consensus protocol, which solves a computation inte... see more

Pags. 0 - 0  

Jing Mei, Huahu Xu, Yang Li, Minjie Bian and Yuzhe Huang

RGB–IR cross modality person re-identification (RGB–IR Re-ID) is an important task for video surveillance in poorly illuminated or dark environments. In addition to the common challenge of Re-ID, the large cross-modality variations between RGB and IR imag... see more

Pags. 0 - 0  

Xingyuan Chen, Huahu Xu, Yang Li and Minjie Bian

Person re-identification (Re-ID) has attracted attention due to its wide range of applications. Most recent studies have focused on the extraction of deep features, while ignoring color features that can remain stable, even for illumination variations and... see more

Pags. 0 - 0  

Li Fan, Wei Li and Xiaohui Cui

Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the im... see more

Pags. 0 - 0  

Lopamudra Hota, Biraja Prasad Nayak, Arun Kumar, G. G. Md. Nawaz Ali and Peter Han Joo Chong

Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely de... see more

Pags. 0 - 0  

Andrea Guazzini, Maria Fiorenza, Gabriele Panerai and Mirko Duradoni

Together with vaccines, contact tracing systems (CTS) have proved to be one of the best strategies to deal with the current COVID-19 pandemic. However, the adoption of such systems has been quite limited in EU countries, and Italy was no exception. The pr... see more

Pags. 0 - 0  

Nur Arifin Akbar, Amgad Muneer, Narmine ElHakim and Suliman Mohamed Fati

Blockchain technology is a sustainable technology that offers a high level of security for many industrial applications. Blockchain has numerous benefits, such as decentralisation, immutability and tamper-proofing. Blockchain is composed of two processes,... see more

Pags. 0 - 0  

Qigang Zhu, Yifan Liu, Ming Liu, Shuaishuai Zhang, Guangyang Chen and Hao Meng

For large and medium-sized cities, the planning and development of urban road networks may not keep pace with the growth of urban vehicles, resulting in traffic congestion on urban roads during peak hours. Take Jinan, a mid-sized city in China’s Shandong ... see more

Pags. 0 - 0  

Michael Alicea and Izzat Alsmadi

Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is ... see more

Pags. 0 - 0  

Laura Icela González-Pérez, María Soledad Ramírez-Montoya and Francisco José García-Peñalvo

User experience with intuitive and flexible digital platforms can be enjoyable and satisfying. A strategy to deliver such an experience is to place the users at the center of the design process and analyze their beliefs and perceptions to add appropriate ... see more

Pags. 0 - 0  

Ryan Suttle, Scott Hogan, Rachel Aumaugher, Matthew Spradling, Zak Merrigan and Jeremy Straub

Fake news is prevalent in society. A variety of methods have been used in an attempt to mitigate the spread of misinformation and fake news ranging from using machine learning to detect fake news to paying fact checkers to manually fact check media to ens... see more

Pags. 0 - 0  

Pedro R. Miranda, Daniel Pestana, João D. Lopes, Rui Policarpo Duarte, Mário P. Véstias, Horácio C. Neto and José T. de Sousa

Object detection is an important task for many applications, like transportation, security, and medical applications. Many of these applications are needed on edge devices to make local decisions. Therefore, it is necessary to provide low-cost, fast solut... see more

Pags. 0 - 0  

Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi and Mohamad Afendee Mohamed

Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access... see more

Pags. 0 - 0  

Ghazal Faraj and András Micsik

In order to unify access to multiple heterogeneous sources of cultural heritage data, many datasets were mapped to the CIDOC-CRM ontology. CIDOC-CRM provides a formal structure and definitions for most cultural heritage concepts and their relationships. T... see more

Pags. 0 - 0  

Louiza Hamada, Pascal Lorenz and Marc Gilg

Although visible light communication (VLC) channels are more secure than radio frequency channels, the broadcast nature of VLC links renders them open to eavesdropping. As a result, VLC networks must provide security in order to safeguard the user’s data ... see more

Pags. 0 - 0  

Sevgi Arca and Rattikorn Hewett

Advancements in smart technology, wearable and mobile devices, and Internet of Things, have made smart health an integral part of modern living to better individual healthcare and well-being. By enhancing self-monitoring, data collection and sharing among... see more

Pags. 0 - 0  

Seid Muhie Yimam, Abinew Ali Ayele, Gopalakrishnan Venkatesh, Ibrahim Gashaw and Chris Biemann

The availability of different pre-trained semantic models has enabled the quick development of machine learning components for downstream applications. However, even if texts are abundant for low-resource languages, there are very few semantic models publ... see more

Pags. 0 - 0  

Malik Qasaimeh, Raad S. Al-Qassas and Mohammad Ababneh

IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characteristics are their limited resources and computing capabilities, which pose critical challenges to the reliability and security of their applications. Encry... see more

Pags. 0 - 0  

Andrii Shalaginov and Muhammad Ajmal Azad

In recent years, the Internet of Things (IoT) devices have become an inseparable part of our lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring regular automation and intelligent sensing to a new level thus improvi... see more

Pags. 0 - 0  

Artur Felipe da Silva Veloso, José Valdemir Reis Júnior, Ricardo de Andrade Lira Rabelo and Jocines Dela-flora Silveira

Seeking to solve problems in the power electric system (PES) related to exacerbated and uncontrolled energy consumption by final consumers such as residences, condominiums, public buildings and industries, electric power companies (EPC) are increasingly s... see more

Pags. 0 - 0  

Rhodney Simões, Kelvin Dias and Ricardo Martins

The expected huge amount of connected cars and applications with varying Quality of Service (QoS) demands still depend on agile/flexible networking infrastructure to deal with dynamic service requests to the control plane, which may become a bottleneck fo... see more

Pags. 0 - 0  

Theodoros Oikonomidis, Konstantinos Fouskas and Maro Vlachopoulou

The spread of coronavirus disease (COVID-19) has triggered a series of responses worldwide ranging from traveling restrictions and shelter-in-place orders to lockdowns, contact tracing, social distancing, and other mitigation measures. To assist with cont... see more

Pags. 0 - 0  

Yun Peng and Jianmei Wang

This study aims to explore the time series context and sentiment polarity features of rumors’ life cycles, and how to use them to optimize the CNN model parameters and improve the classification effect. The proposed model is a convolutional neural network... see more

Pags. 0 - 0