default search action
10th FiCloud 2023: Marrakesh, Morocco
- Irfan Awan, Muhammad Younas, Markus Aleksy:
10th International Conference on Future Internet of Things and Cloud, FiCloud 2023, Marrakesh, Morocco, August 14-16, 2023. IEEE 2023, ISBN 979-8-3503-1635-3 - Juan Pablo Contreras, Shikharesh Majumdar, Ali El-Haraki:
On Enhancing the Performance of Inter-Cloud Data Transfers. 1-9 - Amina Ahmed Nacer, Mohammed Riyadh Abdmeziem, Claude Godart:
Clouds Coalition Mitigation for Business Process Outsourcing. 10-17 - Rafael Teixeira, Mário Antunes, Diogo Gomes, Rui L. Aguiar:
The learning costs of Federated Learning in constrained scenarios. 18-25 - Abdellah Berkaoui, Youssef Gahi:
High Availabale Hadoop Deployment Modes with Enterprise-Level capabilities. 26-32 - Davies C. Ogbodo, Irfan-Ullah Awan, Andrea J. Cullen:
A Novel Approach to Measure and Predict Digital Health Data Protection Compliant (DPC). 33-39 - Ikram El Asri, Meryeme Ayache, Soulaimane Oulad Belayachi, Hajar Laktaoui:
Health Monitor: An IoMT Based Patient Health Monitoring System Using Blockchain and k-means. 40-45 - Zuraidi Saad, Wan Muhammad Aniq Wan Ismafariza, Nurul Hazwani Abd Halim:
Classification of Covid-19 Chest X-Ray Patients using Artificial Neural Network. 46-51 - Derek Manwaring, Geetha Thamilarasu:
Defense Guild: A Privacy-preserving Intrusion Detection System for Healthcare Data in Cloud. 52-57 - Catarina Silva, João Paulo Barraca, Paulo Salvador, Nelson Pacheco da Rocha:
Semantic Evaluation of Privacy Policy Compliance in Medical Applications. 58-64 - Khalid Zirari, Hamza Kamal Idrissi, Ahmed El-Yahyaoui, Hicham Bensaid, Abdeslam En-Nouaary:
Enhancing Ransomware Detection: A Registry Analysis-Based Approach. 65-70 - Clement Daah, Amna Qureshi, Irfan Awan:
Zero Trust Model Implementation Considerations in Financial Institutions: A Proposed Framework. 71-77 - Ibrahim Abobaker:
Hybrid Feature Selection (RFEMI) Techniques and Intrusion Detection Systems for Web Attacks Detection Using Supervised Machine Learning Algorithms. 78-86 - Helen D. Karatza:
Scheduling Critical Periodic Jobs with Partial Computations along with Gang Jobs. 87-94 - Ulugbek Khamdamov, Muhammad Usman, JongWon Kim:
A Cost-effective High-throughput Testbed for Supporting AI-enabled DevSecOps Services. 95-102 - Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Raiful Hasan, Carlos E. Caicedo Bastidas:
A Deep Dive into the Google Cluster Workload Traces: Analyzing the Application Failure Characteristics and User Behaviors. 103-108 - Tugçe Bilen:
An Updated Junction Tree-Based Routing for Underwater Acoustic Networks. 109-113 - Lucas De Paula Soares, Fabíola Martins Campos de Oliveira, Carlos Alberto Kamienski, Luiz F. Bittencourt:
Drone Edge Management System (DREMS): Sequencing Drone Takeoff and Landing. 114-121 - Stefan Bosse, Christoph Polle:
Tiny Machine Learning Virtualization for IoT and Edge Computing using the REXA VM. 122-129 - Avleen Malhi, Asad Javed, Narges Yousefnezhad, Kary Främling:
IoT Open Messaging Standards: Performance Comparison with MQTT and CoAP Protocols. 130-135 - Aqeel Ahlam-Rauf, Lillian Yee Kiaw Wang, Khee-Siang Bee, Wan-Ru Thang:
Architecture Design of an IoT-based Smart Parking System. 136-141 - Marisa Catalan, Mohamad Hjeij, Aleix Boixader, Percy Bonett, Mario Montagud, Josep Escrig, Josep Brugués, Toni Adame, Carlos Labella, Iván Huerta, Miguel Urias:
Towards IoT Ambient Intelligence for Industry 4.0. 142-148 - Marcel Rojahn, Norbert Gronau:
Digital Platform Concepts for manufacturing Companies - A Review. 149-158 - Yongli Mou, Jiahang Chen, Zhenghao Zhang, Jürgen Roßmann, Stefan Decker:
Self-sovereign Identity-based Access Control Management in Forestry 4.0. 159-166 - Motie Yassine, Flaus Théo:
Anomaly Detection for Industrial Sensors Using Transformers. 167-174 - Zainal Hisham Che Soh, Muhammad Syamim Mohamad Pandi, Aini Hafizah Mohd Saod, Siti Azura Ramlan, Nur Athiqah Harron, Mohd Hanapiah Abdullah:
Greenhouse Monitoring System for Chili Plant via IoT Cloud on Ubidots Platform. 175-180 - Abdessamad Rhesri, Rachid Bennani, Yann Ben Maissa, Imad Hajjaji, Ahmed Tamtaoui, Hamza Dahmouni:
Development of a low-cost Internet of Things architecture for energy and environment monitoring in a University Campus. 181-185 - Wesley Geraldo Sampaio Da Nóbrega, José Valdemir Reis Júnior:
New Solution based on Fuzzy System to Optimize Energy Efficiency in IoT Devices to Remote Monitoring of Chronic Diseases. 186-192 - Jerry Tang, Ryan Druckman, Louis Magarshack, Nate McNamara, Jim Ahn, Jiaqi Yan:
Smart Query Sampling with Feature Coverage and Unsupervised Machine Learning. 193-198 - Azhar Talha Syed, Shikharesh Majumdar:
Techniques for Moment Retrievals and Filtering from Large Volumes of Multimodal Data. 199-206 - Raja Sekhar Avula, Ergun Gide, Indra Seher:
Integrated Machine Learning Concept with XG Booster and Random Forest Framework for Predicting Purchase Behaviour by Online Customers in e-Commerce Social Networks. 207-216 - Widad Elouataoui, Saida El Mendili, Youssef Gahi:
Online Continual Learning Data Quality Framework for Entity Resolution. 217-222 - Domingos Mondego, Ergun Gide, Jahan Hassan, Ayub Bokani:
Exploring the Impact of Artificial Intelligence on User Satisfaction in Australian Cloud-based Payments: Insights from Financial Service Providers. 223-229 - Domingos Mondego, Ergun Gide, Jahan Hassan, Ayub Bokani:
The Role of Service Quality and Security in Driving Satisfaction with Cloud-Based Payment Systems in Australia: A Merchant Perspective. 230-235 - Bensalah Mouad, Hair Abdellatif:
Performance Evaluation of Orange Pi 4 in SHA256 Computation for Blockchain Mining. 236-241 - Rami Alboqmi, Sharmin Jahan, Rose F. Gamble:
A Runtime Trust Evaluation Mechanism in the Service Mesh Architecture. 242-249 - Kaoutar Boussaoud, Meryeme Ayache, Abdeslam En-Nouaary:
A Multi-Agent Reinforcement Learning Approach for Congestion Control in network based-SDN. 250-255 - A. Das, K. S. Viswanadh, Rishabh Agrawal, Akshit Gureja, Nitin Nilesh, Sachin Chaudhari:
Using Miniature Setups and Partial Streams for Scalable Remote Labs. 256-263 - Perin Ünal, Seyithan Temel, Emre Ummak, Ahmet Murat Özbayoglu:
Condition Monitoring and Remaining Useful Life Prediction for Tool Wear in CNC Machines. 264-269 - Zainab Loukil, Qublai Khan Ali Mirza, Will Sayers:
A Novel and Adaptive Evaluation Mechanism for Deep Learning Models in Medical Imaging and Disease Recognition. 270-277 - Maruful Abedin Sumon, Tor A. Kwembe, Venkata K. Melapu, Md Mohiuddin Hasan:
Emergency Care Patient Prediction using Electronic Health Records (EHR) Data: An End-to-End Machine Learning Pipeline. 278-282 - M. Farhan Shahid, Nayyer Aafaq, Syed Khurram Mahmud, Syed M. Kazam Abbas Kazmi:
Influence of Various ML-Based Binary Classifiers on the Performance on Handwritten Digit Recognition. 283-291 - Oussama El Allam, Abdelhakim Alali, Mohamed Sadik, Hasna Elmaaradi:
Open-source Hardware FPGA Platforms for IoT: Paradigms, opportunities and open issues. 292-297 - Md. Mamunur Rashid, Piljoo Choi, Suk-Hwan Lee, Jan Platos, Young Huh, Ki-Ryong Kwon:
Ensuring Privacy and Security of IoT Networks Utilizing Blockchain and Federated Learning. 298-305 - Mei-Chih Chang, Vadim Talanov, Jochem Snuverink, Daniela Kiselev:
Developing Real-Time Services with High Performance and Cloud Security Enabled Framework via Adjusted TLS v1.3 for On-Demand HIPA Activity Calculations. 306-311 - Abel Yeboah-Ofori, Iman Darvishi, Azeez Sakirudeen Opeyemi:
Enhancement of Big Data Security in Cloud Computing Using RSA Algorithm. 312-319 - Rami Alboqmi, Sharmin Jahan, Rose F. Gamble:
Threat Intelligence Sharing Component in the Service Mesh Architecture. 320-327 - Ciro Guida, Alfredo Nascita, Antonio Montieri, Antonio Pescapè:
Cross-Evaluation of Deep Learning-based Network Intrusion Detection Systems. 328-335 - Luca Deri, Francesco Fusco:
Evaluating IP Blacklists Effectiveness. 336-343 - Abel Yeboah-Ofori, Sayed Kashif Sadat, Iman Darvishi:
Blockchain Security Encryption to Preserve Data Privacy and Integrity in Cloud Environment. 344-351 - Raphaël Rouquette, Simon Beau, Muhammad Mudassar Yamin, Mohib Ullah, Basel Katt:
Automatic and Realistic Traffic Generation In A Cyber Range. 352-358 - Saif Hassan, Sarang Shaikh, Muhammad Mudassar Yamin, Basel Katt, Ali Shariq Imran, Mohib Ullah:
Data Driven Skill Assessment for Cybersecurity Exercises. 359-366 - Dharani Goli, Hamad Al-Mohannadi, Mohammad Shah:
Plan, Prepare and Respond: A Holistic Cyber Security Risk Management Platform. 367-374 - Angelica Marotta, Stuart E. Madnick:
Decoding Cyber Incident Reporting Requirements: A Cross-Regulatory Examination. 375-381 - Patrick Mutabazi, Emmanuel Ndashimye, Jema David Ndibwile:
Investigating the Challenges Companies in Rwanda Face when Implementing Zero-Trust Network. 382-392 - Zainab Abuowda, Shorouk Ramadan, Nour Salam, Abdalla Gad, Jawad Yousaf, Taimur Hassan, Mohammed Ghazal, Eqab R. F. Almajali:
Date Fruit Classification System using Deep Transfer Learning. 393-398 - Abdalla Abdelkhalek, Maha Yaghi, Marah Talal Alhalabi, Abdalla Gad, Jawad Yousaf, Taimur Hassan, Mohammed Ghazal:
Mobile-based Gamification of Community Exercise Initiatives using Location Services. 399-403 - Ammar Muhammad Naeem, Abdalla Gad, Marah Talal Alhalabi, Maha Yaghi, Adel Khelifi, Mohammed Ghazal:
AI-Based Mobile Paper Grading: Trends and Challenges. 404-409 - Hassan Hajjdiab, Gasm ELbary Mohamed, Salim Alzaabi, Marah Talal Alhalabi, Abdalla Gad, Maha Yaghi, Mohammad Alkhedher, Mohammed Ghazal:
Automated Computer Vision-based Detection of Solar Panel Defects Using a Thermal Camera Mobile Application. 410-415 - Mhd Saeed Sharif, Madhav Raj Theeng Tamang, Cynthia H. Y. Fu, Wael Elmedany:
Employing Machine Learning Algorithms to Detect Stress with a Specific Emphasis on Commuting Methods. 416-421 - Mohamed Sami Ragheb, Wael Elmedany, Mhd Saeed Sharif:
The Effectiveness of DKIM and SPF in Strengthening Email Security. 422-426
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.