nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Cloud-IOT Based Decision Support System for Potato Pest Prevention
|
Foughali, Karim |
|
|
160 |
C |
p. 616-623 |
artikel |
2 |
A Comparative Study of Predictive Approaches for Load Forecasting in Smart Buildings
|
Hadri, S. |
|
|
160 |
C |
p. 173-180 |
artikel |
3 |
A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency
|
Sönmez, Ferda Özdemir |
|
|
160 |
C |
p. 181-188 |
artikel |
4 |
Affiliated Workshops
|
|
|
|
160 |
C |
p. 432 |
artikel |
5 |
A GraphQL approach to Healthcare Information Exchange with HL7 FHIR
|
Mukhiya, Suresh Kumar |
|
|
160 |
C |
p. 338-345 |
artikel |
6 |
An Agent-based Approach to Physical Rehabilitation of Patients affected by Neurological Diseases
|
Vallejo, D. |
|
|
160 |
C |
p. 346-353 |
artikel |
7 |
Analysis of Creative Industries Activities in Europеan Union Countries
|
Dronyuk, Ivanna |
|
|
160 |
C |
p. 479-484 |
artikel |
8 |
Analysis of robust weed detection techniques based on the Internet of Things (IoT)
|
Dankhara, Fenil |
|
|
160 |
C |
p. 696-701 |
artikel |
9 |
Analytical service for processing behavioral, psychological and communicative features in the online communication
|
Fedushko, Solomiia |
|
|
160 |
C |
p. 509-514 |
artikel |
10 |
An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations
|
Kovalchuk, Anatoliy |
|
|
160 |
C |
p. 491-496 |
artikel |
11 |
An Architecture for Providing Data Usage and Access Control in Data Sharing Ecosystems
|
Munoz-Arcentales, Andres |
|
|
160 |
C |
p. 590-597 |
artikel |
12 |
An Efficient Image Encryption Scheme using Projective Transformations
|
Kovalchuk, Anatoliy |
|
|
160 |
C |
p. 584-589 |
artikel |
13 |
An Enhancement of Greedy Perimeter Stateless Routing Protocol in VANET
|
Houmer, Meriem |
|
|
160 |
C |
p. 101-108 |
artikel |
14 |
An Extended-Input GRNN and its Application
|
Izonin, Ivan |
|
|
160 |
C |
p. 578-583 |
artikel |
15 |
A novel approach for improving MPLS VPN security by adopting the software defined network paradigm
|
Bensalah, Faycal |
|
|
160 |
C |
p. 831-836 |
artikel |
16 |
Anticipatory Session Management and User Plane Function Placement for AI-Driven Beyond 5G Networks
|
Peters, Sebastian |
|
|
160 |
C |
p. 214-223 |
artikel |
17 |
A Platform of Services to Support Community-Dwelling Older Adults Integrating FHIR and Complex Security Mechanisms
|
Rosa, Marco |
|
|
160 |
C |
p. 314-321 |
artikel |
18 |
Application of Integrated Building Information Modeling, IoT and Blockchain Technologies in System Design of a Smart Building
|
Lokshina, Izabella V. |
|
|
160 |
C |
p. 497-502 |
artikel |
19 |
Application Partitioning for Offloading in Mobile Pervasive Environments
|
Jungum, Nevin Vunka |
|
|
160 |
C |
p. 206-213 |
artikel |
20 |
A Review of Smart Parking Using Internet of Things (IoT)
|
Rupani, Sahil |
|
|
160 |
C |
p. 706-711 |
artikel |
21 |
A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy
|
Gahi, Youssef |
|
|
160 |
C |
p. 811-818 |
artikel |
22 |
Asistranto: An Assistive Educational Platform for Promotion of Interest in Autistic Children
|
Lima, Roceli Pereira |
|
|
160 |
C |
p. 385-393 |
artikel |
23 |
As They Like It - Outcome Of A User-Centric Design Approach For An Online Health- And Well-Being Service Platform For Transition-Agers
|
Kaimer, Fabian |
|
|
160 |
C |
p. 445-450 |
artikel |
24 |
A Survey of Smart City infrastructure via Case study on New York
|
Shah, Jigar |
|
|
160 |
C |
p. 702-705 |
artikel |
25 |
A Survey on Blockchain Technology and its Proposed Solutions
|
Dave, Dharmin |
|
|
160 |
C |
p. 740-745 |
artikel |
26 |
A Systematic Review of Smart Cities’ Applications to Support Active Ageing
|
Rocha, Nelson |
|
|
160 |
C |
p. 306-313 |
artikel |
27 |
Ateb-Gabor Filtering Method in Fingerprint Recognition
|
Nazarkevych, Mariya |
|
|
160 |
C |
p. 30-37 |
artikel |
28 |
Automatically detect diagnostic patterns based on clinical notes through Text Mining
|
Ribeiro, João |
|
|
160 |
C |
p. 684-689 |
artikel |
29 |
Bayesian Classifier Applied to Higher Education Dropout
|
Viloria, Amelec |
|
|
160 |
C |
p. 573-577 |
artikel |
30 |
Benchmarking Business Analytics Techniques in Big Data
|
Oliveira, Catia |
|
|
160 |
C |
p. 690-695 |
artikel |
31 |
Big Data analysis in development of personalized medical system
|
Shakhovska, Natalia |
|
|
160 |
C |
p. 229-234 |
artikel |
32 |
Big Data Aplication for Selecting Theses Topics
|
Silva, Jesus |
|
|
160 |
C |
p. 538-542 |
artikel |
33 |
Big Data Processing Technologies in Distributed Information Systems
|
Shakhovska, Nataliya |
|
|
160 |
C |
p. 561-566 |
artikel |
34 |
Characterizing Instructional Leader Interactions in a Social Learning Management System using Social Network Analysis
|
Llantos, Orven E. |
|
|
160 |
C |
p. 149-156 |
artikel |
35 |
Clustering of Top 50 Latin American Universities in SIR, QS, ARWU, and Webometrics Rankings
|
Torres-Samuel, Maritza |
|
|
160 |
C |
p. 467-472 |
artikel |
36 |
Comparative Study of Ontologies Based ISO 27000 Series Security Standards
|
Meriah, Ines |
|
|
160 |
C |
p. 85-92 |
artikel |
37 |
COMPETENCY QUESTIONS FOR BIOMEDICAL ONTOLOGY REUSE
|
Azzi, Sabrina |
|
|
160 |
C |
p. 362-368 |
artikel |
38 |
Contents
|
|
|
|
160 |
C |
p. iii-x |
artikel |
39 |
Context-aware Gossip in Ad hoc Vehicular Networks
|
Bennakhi, Ahmad |
|
|
160 |
C |
p. 157-164 |
artikel |
40 |
Conversational Agent in mHealth to empower people managing the Parkinson’s Disease
|
Macedo, Patrícia |
|
|
160 |
C |
p. 402-408 |
artikel |
41 |
Convolutional Neural Network Biometric Cryptosystem for the Protection of the Blockchain’s Private Key
|
Albakri, Alfaisal |
|
|
160 |
C |
p. 235-240 |
artikel |
42 |
Correlation Analysis as a Thyroid Gland, Adrenal Glands, and Liver Relationship Tool for Correcting Hypothyroidism with Organic and Inorganic Iodine
|
Ryabukha, Olha |
|
|
160 |
C |
p. 598-603 |
artikel |
43 |
Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation
|
Marouf, Ibrahim |
|
|
160 |
C |
p. 549-554 |
artikel |
44 |
Data-driven prediction system for an environmental smartification approach to child fall accident prevention in a daily living space
|
Nose, Tsubasa |
|
|
160 |
C |
p. 126-133 |
artikel |
45 |
Data exchanges based on blockchain in m-Health applications
|
Clim, Antonio |
|
|
160 |
C |
p. 281-288 |
artikel |
46 |
Detection of Timestamps Tampering in NTFS using Machine Learning
|
Mohamed, Alji |
|
|
160 |
C |
p. 778-784 |
artikel |
47 |
Determinants of Pro-Environmental Activity-Travel Behavior Using GPS-Based Application and SEM Approach
|
Adnan, Muhammad |
|
|
160 |
C |
p. 109-117 |
artikel |
48 |
Development of a Computer Player for Seejeh (A.K.A Seega, Siga, Kharbga) Board Game with Deep Reinforcement Learning
|
Aljaafreh, Ahmad |
|
|
160 |
C |
p. 241-247 |
artikel |
49 |
Device to Guide Hand Rehabilitation Routines Based on Pressure Signals
|
Solís-Peña, M. |
|
|
160 |
C |
p. 659-664 |
artikel |
50 |
Distributed Trust & Reputation Models using Blockchain Technologies for Tourism Crowdsourcing Platforms
|
Veloso, Bruno |
|
|
160 |
C |
p. 457-460 |
artikel |
51 |
Efficiently Predicting Frequent Patterns over Uncertain Data Streams
|
Liu, Chuan-Ming |
|
|
160 |
C |
p. 15-22 |
artikel |
52 |
Energy-efficient Sensor-based EEG Features’ Extraction for Epilepsy Detection
|
Alhassan, Sarah |
|
|
160 |
C |
p. 273-280 |
artikel |
53 |
Environment Influence on Organizational Development
|
Poplavska, Zhanna |
|
|
160 |
C |
p. 485-490 |
artikel |
54 |
Evaluating the spasticity level during the rehabilitation process: a survey of traditional methods and a new trend
|
Marques, Isabela A. |
|
|
160 |
C |
p. 647-652 |
artikel |
55 |
Evaluating the Usability and Usefulness of a Mobile Application for Training Visual Mnemonic Techniques in Participants with Subjective Cognitive Decline: An Exploratory Pilot Study
|
Hermes, Sebastian |
|
|
160 |
C |
p. 439-444 |
artikel |
56 |
Evaluation of Task Workload and Intrinsic Motivation in a Virtual Reality Simulator of Electric-Powered Wheelchairs
|
Rivera-Flor, Hamilton |
|
|
160 |
C |
p. 641-646 |
artikel |
57 |
Exploiting stack-based buffer overflow using modern day techniques
|
Nicula, Ștefan |
|
|
160 |
C |
p. 9-14 |
artikel |
58 |
Factorial Analysis in the Intellectual capital’s dimensions on micro, small, and medium-sized export enterprises
|
Castillo, Adalberto Escobar |
|
|
160 |
C |
p. 567-572 |
artikel |
59 |
FMD and Mastitis Disease Detection in Cows Using Internet of Things (IOT)
|
Vyas, Shivank |
|
|
160 |
C |
p. 728-733 |
artikel |
60 |
Fog IoT for Health: A new Architecture for Patients and Elderly Monitoring.
|
Debauche, Olivier |
|
|
160 |
C |
p. 289-297 |
artikel |
61 |
Formal Verification of Confidentiality in DNSSEC and E-DNSSEC Protocols using pi-calculus and ProVerif
|
Chetioui, Kaouthar |
|
|
160 |
C |
p. 752-757 |
artikel |
62 |
Fuzzy Approach for Locating Sensors in Industrial Internet of Things
|
Hamdi, Sarah El |
|
|
160 |
C |
p. 772-777 |
artikel |
63 |
Fuzzy Single-commodity model in Wireless Sensor Networks
|
Oudani, Mustapha |
|
|
160 |
C |
p. 797-802 |
artikel |
64 |
Generative Adversarial Network (GANs) based training set enhancement for Stomach Adenocarcinoma Computed Tomography (CT) scan
|
Sharma, Paawan |
|
|
160 |
C |
p. 377-384 |
artikel |
65 |
Grey Wolf Algorithm based Energy-Efficient Data Transmission in Internet of Things
|
Manshahia, Mukhdeep Singh |
|
|
160 |
C |
p. 604-609 |
artikel |
66 |
Implementing Hy-IDS, Mobiles Agents and Virtual Firewall to Enhance the Security in IaaS Cloud
|
Toumi, Hicham |
|
|
160 |
C |
p. 819-824 |
artikel |
67 |
Information Protection Service using Topological Image Coverage
|
Kovalchuk, Anatoliy |
|
|
160 |
C |
p. 503-508 |
artikel |
68 |
Inline detection of Denial of Service Attacks in Software Defined Networking using the Hotelling Chart
|
Bensalah, Faycal |
|
|
160 |
C |
p. 785-790 |
artikel |
69 |
Integration Between ATIoT Architecture and Wearable Device Applied to Assistive Technologies
|
Guimarães Jr, Carlos Solon Soares |
|
|
160 |
C |
p. 653-658 |
artikel |
70 |
Intellectual Property and Static and Dynamic Proximity in Colombian Museum Networks: A Representation by Iconography of Correlations
|
Lis-Gutiérrez, Jenny Paola |
|
|
160 |
C |
p. 555-560 |
artikel |
71 |
IoT-Based Home and Community Energy Management System in Jordan
|
Al-Oudat, Naeem |
|
|
160 |
C |
p. 142-148 |
artikel |
72 |
JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
|
Ouairy, Léopold |
|
|
160 |
C |
p. 70-76 |
artikel |
73 |
Keynote I
|
|
|
|
160 |
C |
p. 6 |
artikel |
74 |
Keynote II
|
|
|
|
160 |
C |
p. 7 |
artikel |
75 |
Learning Style Preferences of College Students Using Big Data
|
Viloria, Amelec |
|
|
160 |
C |
p. 461-466 |
artikel |
76 |
Manifesto for Improved Foundations of Relational Model
|
Litwin, Witold |
|
|
160 |
C |
p. 624-628 |
artikel |
77 |
Medical card data imputation and patient psychological and behavioral profile construction
|
Fedushko, Solomiia |
|
|
160 |
C |
p. 354-361 |
artikel |
78 |
Method for Behavior Normalization to Enable Comparative Understanding of Interactions of Elderly Persons with Consumer Products using a Behavior Video Database
|
Hirano, Kei |
|
|
160 |
C |
p. 409-416 |
artikel |
79 |
Method for Estimating Height in People using Multivariable Statistics
|
Viloria, Amelec |
|
|
160 |
C |
p. 224-228 |
artikel |
80 |
Mixture Structural Equation Models for Classifying University Student Dropout in Latin America
|
Viloria, Amelec |
|
|
160 |
C |
p. 629-634 |
artikel |
81 |
Mobile AdHoc networks for Intelligent Transportation System: Comparative Analysis of the Routing protocols
|
Zemrane, Hamza |
|
|
160 |
C |
p. 758-765 |
artikel |
82 |
Model and Simulation of a Distribution Logistic System for Learning
|
Silva, Jesus |
|
|
160 |
C |
p. 635-640 |
artikel |
83 |
Model and Simulation of Structural Equations for Determining the Student Satisfaction
|
Viloria, Amelec |
|
|
160 |
C |
p. 527-531 |
artikel |
84 |
Modeling and Graph Analysis for Enhancing Resilience in Smart Homes
|
Modarresi, Amir |
|
|
160 |
C |
p. 197-205 |
artikel |
85 |
Neural controller for smart house security subsystem
|
Teslyuk, Vasyl |
|
|
160 |
C |
p. 394-401 |
artikel |
86 |
New context-based node acceptance CBNA framework for MitM detection in SDN Architecture
|
Sebbar, Anass |
|
|
160 |
C |
p. 825-830 |
artikel |
87 |
NSGA-II based Joint Topology and Routing Optimization of Mesh Networks with Flying Access Points
|
Sabino, Sérgio |
|
|
160 |
C |
p. 165-172 |
artikel |
88 |
Obturator ring fracture detection using anteroposterior view x-ray
|
Damien, Pascal |
|
|
160 |
C |
p. 369-376 |
artikel |
89 |
Open Communication Protocols for Building Automation Systems
|
Lohia, Karan |
|
|
160 |
C |
p. 723-727 |
artikel |
90 |
Optimal placement of Charging Stations for Electric Vehicles in large-scale Transportation Networks
|
Fredriksson, Henrik |
|
|
160 |
C |
p. 77-84 |
artikel |
91 |
Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit
|
Asad, Mohammad M. |
|
|
160 |
C |
p. 543-548 |
artikel |
92 |
Personalized Micro-Service Recommendation System for Online News
|
Asenova, Marchela |
|
|
160 |
C |
p. 610-615 |
artikel |
93 |
Platform to Support the Codification of Clinical Information According to the International Classification of Functioning, Disability and Health
|
Mendes, Ana |
|
|
160 |
C |
p. 298-305 |
artikel |
94 |
Predicting Lung Healthiness Risk Scores to Identify Probability of an Asthma Attack
|
Do, Quan |
|
|
160 |
C |
p. 424-431 |
artikel |
95 |
Preface
|
|
|
|
160 |
C |
p. 1-3 |
artikel |
96 |
Preface
|
|
|
|
160 |
C |
p. 4-5 |
artikel |
97 |
Prevention-oriented ECG Teleconsulting That Involves Consumer Wearables: Exploration of Service Adoption Patterns and Institutional Impact
|
Dolezel, Michal |
|
|
160 |
C |
p. 417-423 |
artikel |
98 |
Proceeding
|
|
|
|
160 |
C |
p. 8 |
artikel |
99 |
Protection of Images based on Fractal Geometry
|
Dronyuk, Ivanna |
|
|
160 |
C |
p. 515-520 |
artikel |
100 |
Pso Based Intrusion Detection: A Pre-Implementation Discussion
|
Bekri, Mohamed El |
|
|
160 |
C |
p. 837-842 |
artikel |
101 |
Quantum Computers for Optimization the Performance
|
Abdullah, Radhwan Mohamed |
|
|
160 |
C |
p. 54-60 |
artikel |
102 |
Recovery of Incomplete IoT Sensed Data using High-Performance Extended-Input Neural-Like Structure
|
Izonin, Ivan |
|
|
160 |
C |
p. 521-526 |
artikel |
103 |
Risk Analysis of Using Big Data in Computer Sciences
|
Silva, Jesus |
|
|
160 |
C |
p. 532-537 |
artikel |
104 |
Robust Hybrid-Security Protocol for HealthCare Systems
|
Albarki, Ibrahim |
|
|
160 |
C |
p. 843-848 |
artikel |
105 |
Secure Tilted-Rectangular-Shaped Request Zone Location-Aided Routing Protocol (STRS-RZLAR) for Vehicular Ad Hoc Networks
|
Saleh, Ma’en |
|
|
160 |
C |
p. 248-253 |
artikel |
106 |
Security and Privacy Issues in Cloud, Fog and Edge Computing
|
Parikh, Shalin |
|
|
160 |
C |
p. 734-739 |
artikel |
107 |
Semantic analysis for information and communication threats detection of online service users
|
Fedushko, Solomiia |
|
|
160 |
C |
p. 254-259 |
artikel |
108 |
Semantic Interpretation of the map with Diabetes-Related Websites
|
Shi, Hongyi |
|
|
160 |
C |
p. 330-337 |
artikel |
109 |
Signaling Game-Inspired Model for Ubiquitous Security in VANETs
|
Mabrouk, Abdelfettah |
|
|
160 |
C |
p. 791-796 |
artikel |
110 |
SmartCGMS as an Environment for an Insulin-Pump Development with FDA-Accepted In-Silico Pre-Clinical Trials
|
Ubl, Martin |
|
|
160 |
C |
p. 322-329 |
artikel |
111 |
Smart cities-A case study of Porto and Ahmedabad
|
Solanki, Aniket Singh |
|
|
160 |
C |
p. 718-722 |
artikel |
112 |
Smart Contracts and Internet of Things: A Qualitative Content Analysis using the Technology-Organization-Environment Framework to Identify Key-Determinants
|
Schmitt, Gregor |
|
|
160 |
C |
p. 189-196 |
artikel |
113 |
Smart Farming using IoT, a solution for optimally monitoring farming conditions
|
Doshi, Jash |
|
|
160 |
C |
p. 746-751 |
artikel |
114 |
Smart Home Is Not Smart Enough to Protect You - Protocols, Challenges and Open Issues
|
Yassein, Muneer Bani |
|
|
160 |
C |
p. 134-141 |
artikel |
115 |
Smart logistics: Study of the application of blockchain technology
|
Issaoui, Yassine |
|
|
160 |
C |
p. 266-271 |
artikel |
116 |
Study of Named Entity Recognition methods in biomedical field
|
Śniegula, Anna |
|
|
160 |
C |
p. 260-265 |
artikel |
117 |
The COVCRAV project: Architecture and design of a cooperative V2V crash avoidance system
|
Outay, Fatma |
|
|
160 |
C |
p. 473-478 |
artikel |
118 |
The Effect of Cybersickness of an Immersive Wheelchair Simulator
|
Salgado, Débora P. |
|
|
160 |
C |
p. 665-670 |
artikel |
119 |
The Impact of Big Data Quality on Sentiment Analysis Approaches
|
Alaoui, Imane El |
|
|
160 |
C |
p. 803-810 |
artikel |
120 |
The Nonparametric Method for Differentiation of Phonostatistical Structures of Authorial Style
|
Khomytska, Iryna |
|
|
160 |
C |
p. 38-45 |
artikel |
121 |
The Raising Role of Virtual Reality in Accessibility Systems
|
Teófilo, Mauro R.S. |
|
|
160 |
C |
p. 671-677 |
artikel |
122 |
The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare
|
|
|
|
160 |
C |
p. 272 |
artikel |
123 |
Towards PWA in Healthcare
|
Rêgo, Felipe |
|
|
160 |
C |
p. 678-683 |
artikel |
124 |
Trackify: A Robust System For Preserving Money Transactions
|
Mohamed, Kareem |
|
|
160 |
C |
p. 118-125 |
artikel |
125 |
Unique Message Authentication Security Approach based Controller Area Network (CAN) for Anti-lock Braking System (ABS) in Vehicle Network
|
Ishak, Mohamad Khairi |
|
|
160 |
C |
p. 93-100 |
artikel |
126 |
University Clusters from SIR IBER Indicators of Innovation Factor 2016-2019
|
Vasquez-Stanescu, Carmen |
|
|
160 |
C |
p. 451-456 |
artikel |
127 |
Unmanned Aerial Vehicle in the Machine Learning Environment
|
Khan, Asharul Islam |
|
|
160 |
C |
p. 46-53 |
artikel |
128 |
User-oriented cache deletion algorithm in a delayed update-tolerant web cache server for supporting a non-formal education
|
Kurashita, Yudai |
|
|
160 |
C |
p. 61-69 |
artikel |
129 |
Validation of SDN policies: a property-based testing perspective
|
Castro, Laura M. |
|
|
160 |
C |
p. 23-29 |
artikel |
130 |
Voice-Controlled Autonomous Vehicle Using IoT
|
Sachdev, Sumeet |
|
|
160 |
C |
p. 712-717 |
artikel |
131 |
Wavelength Assignment Vs. Wavelength Converter Placement in Wavelength-Routed Optical WDM Networks
|
Zakouni, Amiyne |
|
|
160 |
C |
p. 766-771 |
artikel |
132 |
Why do I feel younger? – A critical view on cognitive age and IT adoption
|
Haug, Maximilian |
|
|
160 |
C |
p. 433-438 |
artikel |