Search Results - "2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"

Refine Results
  1. 1

    SDN-based Port Hopping Technique for Mitigating Network Attacks by Anajemba, Joseph Henry, Ababneh, Nedal, Hamid, Yasir, Chowhan, Atif, Obinna, Otuu, Vajzovic, Emir

    “…Software Defined-Network (SDN) scheme has recently proven to be efficient in resisting different attack vectors which plague the Internet of Things (IoT) and…”
    Get full text
    Conference Proceeding
  2. 2

    Design of a 3D Printed Humanoid Robotic Hand by Chavdarov, Ivan, Georgiev, Ivaylo, Naydenov, Bozhidar, Nikolov, Valentin

    “…The article presents the design of an innovative 3D printed humanoid hand. It has five degrees of freedom. The fingers are designed on a modular basis, so that…”
    Get full text
    Conference Proceeding
  3. 3

    An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge Computing by Bibi, Somia, Titouna, Chafiq, Titouna, Faiza, Nait-Abdesselam, Farid

    “…Outlier detection in sensor data has recently gained significant recognition, particularly with the proliferation of wireless sensor networks (WSNs) and the…”
    Get full text
    Conference Proceeding
  4. 4

    An Overview of Machine Learning-Enabled Network Softwarization for the Internet of Things by Zormati, Mohamed Ali, Lakhlef, Hicham

    “…The Internet of Things (IoT) has evolved from a novel technology to an integral part of our everyday lives. It encompasses a multitude of heterogeneous devices…”
    Get full text
    Conference Proceeding
  5. 5

    Empirical Comparison of Face Verification Algorithms from UAVs by Diez-Tomillo, Julio, Alcaraz-Calero, Jose M., Wang, Qi

    “…Face verification use cases have recently gained momentum in the increasingly digitalised society, and thus the need arises significantly to integrate this…”
    Get full text
    Conference Proceeding
  6. 6

    Learning-Based Infrastructure To Vehicle Link Quality Estimation by Chakroun, Raoua, Villemur, Thierry, Nougnanke, Benoit

    “…Timely and up-to-date information about road link quality is essential for the efficient and reliable dissemination of urgent messages in dynamic vehicular…”
    Get full text
    Conference Proceeding
  7. 7

    Analysis of Student Behaviour on Large Learning Management Systems by Mehnen, Lars, Mandl, Thomas, Pohn, Birgit, Blaickner, Matthias, Dregely, Isabel

    “…This paper presents a comprehensive analysis of student behaviour on Moodle, a widely used Learning Management System (LMS), in a large university setting with…”
    Get full text
    Conference Proceeding
  8. 8

    Wideband Spectrum Sensing Utilizing Cumulative Distribution Function and Machine Learning by Nikonowicz, Jakub, Jessa, Mieczyslaw

    “…Blind spectrum sensing (BSS) is a valuable technique for identifying unknown signals in scenarios where prior knowledge is limited. However, traditional…”
    Get full text
    Conference Proceeding
  9. 9

    EEG Signal Analysis Approaches for Epileptic Seizure Event Prediction Using Deep Learning by Samara, Chrisa, Vrochidou, Eleni, Papakostas, George A.

    “…Epilepsy is classified as one of the three most prevalent neurological disorders, alongside strokes and migraines. It is characterized by the occurrence of…”
    Get full text
    Conference Proceeding
  10. 10

    A Strategy to Improvise Coin-age Selection in the Proof of Stake Consensus Algorithm by Gurram, Harshavardhan Netha, Mohamad, Hafeez, Sriram, Abhinav, Endurthi, Anjaneyulu

    “…Proof of stake is one of the consensus protocols in Blockchain technology. Within PoS, there are two common strategies employed for validator selection:…”
    Get full text
    Conference Proceeding
  11. 11

    Distributed Asynchronous Protocol for Service Provisioning in the Edge-Cloud Continuum by Cohen, Itamar, Giaccone, Paolo, Chiasserini, Carla Fabiana

    “…In the edge-cloud continuum, datacenters provide microservices (MSs) to mobile users, with each MS having specific latency constraints and computational…”
    Get full text
    Conference Proceeding
  12. 12

    Spectrum Occupancy Detection Supported by Federated Learning by Kulacz, L.

    “…Dynamic spectrum access is essential for radiocommunication and its limited spectrum resources. The key element of dynamic spectrum access systems is effective…”
    Get full text
    Conference Proceeding
  13. 13

    Performance Optimization in Transition Toward Open Industrial Control Systems by Sverko, Mladen, Grbac, Tihana Galinac, Huljenic, Darko

    “…Digital transformation implies the comprehensive availability of data generated by the underlying process through-out the entire enterprise. In this regard,…”
    Get full text
    Conference Proceeding
  14. 14

    Challenges for Conflict Mitigation in O-RAN's RAN Intelligent Controllers by Adamczyk, Cezary

    “…The O-RAN architecture enables a more flexible and dynamic radio access network (RAN) control by separating hardware and software components. However, the…”
    Get full text
    Conference Proceeding
  15. 15

    Towards the Adoption of a Plugable Architecture for Network Features Visualization by Jesi, Gian Paolo, Odorizzi, Andrea, Mazzini, Gianluca

    “…In this paper we identify a set of metrics regarding the infrastructural level over the territory of our broadband regional network and we define a flexible…”
    Get full text
    Conference Proceeding
  16. 16

    Driver Monitoring System using an Embedded Computer Platform by Rimal, Rajesh, Herceg, Marijan, Vranjes, Mario, Grbic, Ratko

    “…In this paper, the driver monitoring system (DMS), which monitors the inattention and drowsiness of the driver, is proposed. For the face detection and…”
    Get full text
    Conference Proceeding
  17. 17

    Securing Cyber-Physical Systems Against GPS Spoofing Attacks Using Confidence Attribution by Wagner, Matheus, Frohlich, Antonio Augusto

    “…This work addresses the use of a machine-learning based confidence attribution scheme to detect GPS spoofing attacks against cyber-physical systems. The…”
    Get full text
    Conference Proceeding
  18. 18

    Time Series LSTM Prediction of Water Consumption in the Republic of Croatia by Regions by Polic, Tea, Mutka, Alan, Zagar, Martin

    “…Water consumption is a critical factor in water resource management, particularly in regions that experience water scarcity or have limited water supplies…”
    Get full text
    Conference Proceeding
  19. 19

    Embedding Delay-Constrained VNF Forwarding Graphs into Reconfigurable WDM Optical Networks by Kirchner, Valentin, Karl, Holger

    “…Operators of reconfigurable wavelength-division-multiplexed (WDM) optical networks adapt the lightpath topology to balance load and reduce transmission delays…”
    Get full text
    Conference Proceeding
  20. 20

    Demonstration of QKD Integration into 5G Campus Network by Burdiak, Patrik, Kapicak, Lukas, Michalek, Libor, Dervisevic, Emir, Mehic, Miralem, Voznak, Miroslav

    “…The paper deals with a proposal and implementation of the quantum key distribution in the 5G campus network. The authors share here their practical experience…”
    Get full text
    Conference Proceeding