Abstract is missing.
- Using Postal Mail System to Teach Packet Switching in Computer NetworksJianhua Yang, Yongzhong Zhang. 1-5 [doi]
- Characterizing Students' Behavior Based on their Participation in Property Course in New ZealandShadi Esnsashari, Lesley Gardner, Michael Rehm. 6-11 [doi]
- Analysis and Forecasting of Web Content DynamicsMaria Carla Calzarossa, Daniele Tessera. 12-17 [doi]
- Early Detection of Network Incident Using Open Security InformationHiroki Kuzuno, Shintaro Otsuka. 18-23 [doi]
- Rules to Transform Specific Description Language Diagram Into Coloured Petri NetsHana Mejdi, Oussama Kallel, Salem Hasnaoui. 24-27 [doi]
- Sheaf Theory as a Mathematical Foundation for Distributed Applications Involving Heterogeneous Data SetsSeyed M.-H. Mansourbeigi. 28-33 [doi]
- Implementing Distributed Lamda-Calculus InterpreterAlexandr Basov, Daniel de Carvalho, Manuel Mazzara. 34-39 [doi]
- A Parallel Calculation Method on Web Browser for Contents CategorizationMasaki Kohana, Hiroki Sakaji, Akio Kobayashi, Shusuke Okamoto. 40-44 [doi]
- Open Source Platform Digital Personal AssistantAzat Khusnutdinov, Denis Usachev, Manuel Mazzara, Adil Khan, Ivan Panchenko. 45-50 [doi]
- Appliance Scheduling in Smart Homes with Harmony Search Algorithm for Different Operation Time IntervalsSyed Muhammad Mohsin, Nadeem Javaid, Sajjad Ahmad Madani, Syed Kashif Abbas, Syed Muhammad Abrar Akber, Zahoor Ali Khan. 51-60 [doi]
- Virtualized SDN-Based End-to-End Reference Architecture for Fog NetworkingPooyan Habibi, Soroush Baharlooei, Mohammad Farhoudi, Sepehr Kazemian, Siavash Khorsandi. 61-66 [doi]
- The Evolution of the Hadoop Distributed File SystemStathis Maneas, Bianca Schroeder. 67-74 [doi]
- Reliability Modeling and Analysis for Deadline-Constrained Grid ServiceDharmendra Prasad Mahato, Ravi Shankar Singh. 75-81 [doi]
- Dijkstra Algorithm Based Ray Tracing: A Case Study for Tunnel StructuresKazunori Uchida, Leonard Barolli. 82-87 [doi]
- Towards a Secured Clustering Mechanism for Messages Exchange in VANETAmira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi. 88-93 [doi]
- Design of a Small Metamtrial Antenna for Millimetric Wave ApplicationsBouthaina Smari, Mondher Labidi, Fethi Choubani. 94-97 [doi]
- A Miniaturized Invasive Antenna Study for a Better Performance in Medical ApplicationAmal Bouazizi, Ghada Zaibi, Mounir Samet, Abdennaceur Kachouri. 98-103 [doi]
- TBEENISH: Threshold Balanced Energy Efficient Network Integrated Super Heterogeneous Protocol for WSNsAqdas Naz, Nadeem Javaid, Muhammad Mudassar Iqbal, Mujahid Ali, Muhammad Imran 0001, Zahoor Ali Khan. 104-111 [doi]
- Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information SystemsNoriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Yoshitaka Shibata. 112-117 [doi]
- A Filtered RSSI Model Based on Hardware Characteristic for Localization Algorithm in Wireless Sensor NetworksDhouha El Houssaini, Zina Mohamed, Sabrine Khriji, Kamel Besbes, Olfa Kanoun. 118-123 [doi]
- A Novel Multi Verifier Device Attestation Scheme for Swarm of DevicesShivraj VL, Meena Singh Dilip Thakur, Rajan Ma. 124-129 [doi]
- A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETsShogo Nakasaki, Yu Yoshino, Makoto Ikeda, Leonard Barolli. 130-135 [doi]
- Multihop Transmission Strategy to Improve Energy Efficiency in WSNsMaha Abderrahim, Hela Hakim, Hatem Boujemaa, Raed al Hamad. 136-140 [doi]
- Residual Energy and Density Control Aware Cluster Head Election in Wireless Sensor NetworkMeriem Meddah, Rim Haddad, Tahar Ezzedine. 141-146 [doi]
- How Modeling QoE Requirements Using Game TheoryTasnim Abar, Asma Ben Letaifa, Sadok El Asmi. 147-152 [doi]
- Content Based Algorithm Aiming to Improve the WEB_QoE Over SDN NetworksNawres Abdelwahed, Asma Ben Letaifa, Sadok El Asmi. 153-158 [doi]
- An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNsYu Yoshino, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli. 159-163 [doi]
- Ameliorating the Web QoE Using SPANawres Abdelwahed, Asma Ben Letaifa, Sadok El Asmi. 164-169 [doi]
- Experimental Study of Characterizing Frequent Itemsets Using Representation LearningSaki Kawanobe, Tomonobu Ozaki. 170-174 [doi]
- Detecting Network Intrusions Using a Confidence-Based Reward SystemKole Nunley, Wei Lu. 175-180 [doi]
- An Estimation Method of User Roles Based on Online Technical Communication ActivitiesHayato Tsukiji, Kosuke Takano. 181-186 [doi]
- Network Event Classification for Security of IT InfrastructureDeepali Arora, Panajotis Agathoklis, Alex Loffler. 187-192 [doi]
- Education Analytics: Challenges and ApproachesLinlin Zhang, Kin Fun Li. 193-198 [doi]
- Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple DronesNoriyasu Yamamoto, Noriki Uchida. 199-202 [doi]
- Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWavesKeita Matsuo, Masafumi Yamada, Kevin Bylykbashi, Miralda Cuka, Yi Liu 0011, Leonard Barolli. 203-209 [doi]
- Appliances Scheduling Using Hybrid Scheme of Genetic Algorithm and Elephant Herd Optimization for Residential Demand ResponseRasool Bukhsh, Nadeem Javaid, zafar iqbal, Usman Ahmed, Zeeshan Ahmad, Muhammad Nadeem Iqbal. 210-217 [doi]
- EDHBPSO: Enhanced Differential Harmony Binary Particle Swarm Optimization for Demand Side Management in Smart GridAqdas Naz, Nadeem Javaid, Talha Naeem Qureshi, Muhammad Imran 0001, Mujahid Ali, Zahoor Ali Khan. 218-225 [doi]
- An Approach Towards Efficient Scheduling of Home Energy Management System Using Backtracking Search Optimization and Tabu SearchSundas Shafiq, Sikandar Asif, Iqra Fatima, Kubra Yousaf, Wajiha Safat, Nadeem Javaid. 226-231 [doi]
- Gene Expression for Simulation of Biological TissueSadyk Sayfullin, Fedor Akhmetov, Manuel Mazzara, Ruslan Mustafin, Victor Rivera. 232-239 [doi]
- Implementing Elephant Herding Optimization Algorithm with different Operation Time Intervals for Appliance Scheduling in Smart GridSyed Muhammad Mohsin, Nadeem Javaid, Sajjad Ahmad Madani, Syed Muhammad Abrar Akber, Sohaib Manzoor, Javed Ahmad. 240-249 [doi]
- Bio-Inspired Optimization Techniques for Home Energy Management in Smart GridAbdul Mateen, Nadeem Javaid, Muhammad Awais, Nasir Khan, Urva Latif, Ihtisham Ullah. 250-257 [doi]
- Enhancing QoE Based on Machine Learning and DASH in SDN NetworksTasnim Abar, Asma Ben Letaifa, Sadok El Asmi. 258-263 [doi]
- M-SPOT: A Hybrid Multiobjective Evolutionary Algorithm for Node Placement in Wireless Sensor NetworksAlfredo J. Perez. 264-269 [doi]
- Mobility Management Architecture in Different RATs Based Network SlicingAli Saeed Dayem Alfoudi, Mohammed Dighriri, Abayomi Moradeyo Otebolaku, Rubem Pereira, Gyu Myoung Lee. 270-274 [doi]
- Resource Allocation Scheme in 5G Network SlicesMohammed Dighriri, Ali Saeed Dayem Alfoudi, Gyu Myoung Lee, Thar Baker, Rubem Pereira. 275-280 [doi]
- A Robust CSI-HARQ MIMO Visible Light Communication Scheme for Wireless Industrial NetworkingShih-Hao Chang, Teh-Sheng Huang. 281-286 [doi]
- An SDN-Based Architecture for Smart Handover to Improve QoE in IEEE 802.11 WLANsOmar Aldhaibani, Faycal Bouhafs, Michael Mackay, Alessandro Raschellà. 287-292 [doi]
- A Simple Algorithm to Select Energy-Efficient Servers for Storage and Computation ProcessesAtsuhiro Sawada, Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa 0001. 293-300 [doi]
- An Energy-Efficient Model of Fog and Device Nodes in IoTRyuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 301-306 [doi]
- Cloud-Based Global Monitoring System for Smart CitiesYosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga. 307-312 [doi]
- Clustering Student Participation: Implications for EducationShadi Esnaashari, Lesley Gardner, Paul Watters. 313-318 [doi]
- Blended Learning Technologies in the Automotive Industry Specialists' TrainingIrina Makarova, Anton Pashkevich, Ksenia Shubenkova. 319-324 [doi]
- Real Time Automation of Agriculture Land, by automatically Detecting Plant Leaf Diseases and Auto MedicineChannamallikarjuna Mattihalli, Edemialem Gedefaye, Fasil Endalamaw, Adugna Necho. 325-330 [doi]
- A Semantic Model for Document Management in Business ProcessesImen Allani, Belhassen Zouari. 331-336 [doi]
- How Cloud Computing, IoT and Multicore Systems Affect Software Engineering PrinciplesLutz Schubert, Athanasios Tsitsipas, Keith Jeffery. 337-342 [doi]
- Building a Smart City Service Platform in Messina with the #SmartME ProjectDario Bruneo, Sebastiano Chillari, Salvatore Distefano, Maurizio Giacobbe, Antonino Longo Minnolo, Francesco Longo 0001, Giovanni Merlino, Davide Mulfari, Alfonso Panarello, Giuseppe Patanè, Antonio Puliafito, Carlo Puliafito, Marco Scarpa, Nachiket Tapas, Giancarlo Visalli. 343-348 [doi]
- Edge Computing-Enabled Body Area NetworksGianluca Aloi, Giancarlo Fortino, Raffaele Gravina, Pasquale Pace, Giuseppe Caliciuri. 349-353 [doi]
- A Cloud-Based Approach to Assess the Quality of Local Transportation Services in Apulia RegionAntonella Longo, Mario A. Bochicchio, Marco Zappatore. 354-359 [doi]
- MELODIC: Utility Based Cross Cloud Deployment OptimisationGeir Horn, Pawel Skrzypek. 360-367 [doi]
- Coordination Pattern-Based Approach for Auto-Scaling in Multi-cloudseva Kühn, Stefan Craß. 368-373 [doi]
- BYOS: Bring Your Own Security in Clouds and Service Oriented InfrastructuresDimosthenis Kyriazis. 374-379 [doi]
- An Application of Semantic Techniques for Forensic AnalysisFlora Amato, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato 0001. 380-385 [doi]
- Declarative Modeling for Deploying a Container PlatformGiuseppe Attardi, Alex Barchiesi, Alberto Colla, Roberto di Lallo, Fulvio Galeazzi. 386-389 [doi]
- A Game Theory-Based Effective Network Management in SDN NetworksMarwa Abderrahim, Asma Ben Letaifa, Amel Haji, Sami Tabbane. 390-395 [doi]
- Parallel Primitives for Vendor-Agnostic Implementation of Big Data Mining AlgorithmsCesare Bandirali, Stefano Lodi, Gianluca Moro, Andrea Pagliarani, Claudio Sartori 0001. 396-401 [doi]
- ROCK Algorithm Parallelization with TOREADOR PrimitivesBeniamino Di Martino, Salvatore D'Angelo, Antonio Esposito, Riccardo Cappuzzo, Anderson Santana de Oliveira. 402-407 [doi]
- Parallelization and Deployment of Big Data Algorithms: The TOREADOR ApproachIvan Martinez, Jorge Montero, Tomás Pariente Lobo, Beniamino Di Martino, Salvatore D'Angelo, Antonio Esposito. 408-412 [doi]
- Using Federated Cloud Platform to Implement Academia Services for Research and AdministrationGiuseppe Attardi, Beniamino Di Martino, Antonio Esposito, Michele Mastroianni. 413-418 [doi]
- From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic ComputingLorenzo Carnevale, Antonio Celesti, Antonino Galletta, Schahram Dustdar, Massimo Villari. 419-424 [doi]
- Elastic Architecture Based NFV and OpenStack to Deploy VA ServiceAmel Haji, Asma Ben Letaifa, Sami Tabbane. 425-429 [doi]
- The Impact of Data Residency on Cloud ComputingClaude R. Baudoin. 430-435 [doi]
- Cloud Services Categories Identification from Requirements SpecificationsBeniamino Di Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, Pietro Iannucci, Fabio Cerri. 436-441 [doi]
- How to use MEC and ML to Improve Resources Allocation in SDN Networks?Marwa Abderrahim, Asma Ben Letaifa, Amel Haji, Sami Tabbane. 442-447 [doi]
- Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific DomainKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa 0001. 448-453 [doi]
- A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart GridTalha Naeem Qureshi, Nadeem Javaid, Aqdas Naz, Waseem Ahmad, Muhammad Imran 0001, Zahoor Ali Khan. 454-461 [doi]
- Hikester - The Event Management ApplicationRinat Khatipov, Aydar Negimatzhanov, Ilgiz Zamaleev, Anvar Zakirov, Manuel Mazzara, Victor Rivera. 462-468 [doi]
- SLAs in 5G: A Complete Framework Facilitating VNF- and NS- Tailored SLAs ManagementEvgenia Kapassa, Marios Touloupou, Dimosthenis Kyriazis. 469-474 [doi]
- Security Analysis of Open Source Network Access Control in Virtual NetworksMohammed Suhel Inamdar, Ali Tekeoglu. 475-480 [doi]
- MANETs Interoperability: Current Trends and Open ResearchJose Alfredo Alvarez Aldana, Stephane Maag, Fatiha Zaïdi. 481-487 [doi]
- Symmetric Key-Based Lightweight Authentication Protocols for RFID SecurityRajaguru K, R. C. Hansdah. 488-495 [doi]
- Towards the Formal Validation of a Ticket-Based Authentication Scheme for VANETsOns Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. 496-501 [doi]
- Study on Sensitive Data Protection Based on SEAndroidZijian Li, Jun Yang, Baojiang Cui. 502-507 [doi]
- Security-Aware Network Analysis for Network ControllabilityShuo Zhang, Stephen D. Wolthusen. 508-514 [doi]
- Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion DetectionJianhua Yang, Yongzhong Zhang, Robert King, Tim Tolbert. 515-520 [doi]
- Improved Secure ZigBee Light Link Touchlink Commissioning Protocol DesignRuiqing Liu, Jun Yang, Baojiang Cui. 521-526 [doi]
- Privacy Risks in Resource Constrained Smart Micro-GridsPacome Landry Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel. 527-532 [doi]
- Unicast Routing Protocols to Reduce Electric Energy Consumption in Wireless Ad-Hoc NetworksEmi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 533-538 [doi]
- Reducing Power Consumption in HetNet Network Using Power Adjustment and Coordinated Multipoint TechniqueNarjes Lassoued, Noureddine Boujnah, Ridha Bouallegue. 539-544 [doi]
- Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNsMaha Abderrahim, Hela Hakim, Hatem Boujemaa. 545-549 [doi]
- A Hybrid Bacterial Foraging Tabu Search Heuristic Optimization for Demand Side Management in Smart GridAhmad Jaffar Khan, Nadeem Javaid, zafar iqbal, Naveed Anwar, Abdul Saboor, Inzimam ul-Haq, Umar Qasim. 550-558 [doi]
- Covert Channels in IoT Deployments Through Data Hiding TechniquesLuca Caviglione, Alessio Merlo, Mauro Migliardi. 559-563 [doi]
- An Adaptive Typing Biometric System with Varying users ModelCarlo Ferrari, Daniele Marini, Michele Moro. 564-568 [doi]
- Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)Gianluca Fimiani. 569-572 [doi]
- How to Protect Public Administration from Cybersecurity Threats: The COMPACT ProjectLuigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione. 573-578 [doi]
- Formal Semantics of an IoT-Specific LanguageDiletta Romana Cacciagrano, Rosario Culmone. 579-584 [doi]
- Multi-agent Based Simulations of Block-Free Distributed LedgersMichele Bottone, Franco Raimondi, Giuseppe Primiero. 585-590 [doi]
- Energy Saving and Collision-Free Motion Planning for Oblivious RobotsAlfredo Navarra, Diletta Cacciagrano. 591-596 [doi]
- An Intelligent Car Park Management System : Hierarchical Placement Algorithm Based on Nearest LocationBurak Kizilkaya, Mehmet Caglar, Fadi Al-Turjman, Enver Ever. 597-602 [doi]
- Performance of IEEE802.15.4e TSCH Protocol for Multi-hop Wireless Sensor NetworksInes Hosni. 603-608 [doi]
- Real-Time Face Detection Using a Moving CameraDeng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Jian-He Wu, Chien-Chuan Ko. 609-614 [doi]
- Stereo-Based 3D Space Handwriting RecognitionYing-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan. 615-617 [doi]
- Drone-Based Vacant Parking Space DetectionCheng-Fang Peng, Jun-Wei Hsieh, Shao-Wei Leu, Chi-Hung Chuang. 618-622 [doi]
- Toward an Improvement of UAV-Aerial Image Using Non-linear Image EnhancementLung-Jen Wang, Wen-Shyong Hsieh. 623-626 [doi]
- Real-Time Static and Dynamic Gesture Recognition Using Mixed Space Features for 3D Virtual World's InteractionsS. P. Kasthuri Arachchi, Noorkholis Luthfil Hakim, Hui-Huang Hsu, Stanislav Vladimirovich Klimenko, Timothy K. Shih. 627-632 [doi]
- Application of Deep Learning for Infant Vomiting and Crying DetectionChuan-Yu Chang, Fu Ren Chen. 633-635 [doi]
- Apply Scikit-Learn in Python to Analyze Driver Behavior Based on OBD DataChi-Pan Hwang, Mu-Song Chen, Chih-Min Shih, Hsing-Yu Chen, Wen-Kai Liu. 636-639 [doi]
- An Improved Steganographic Scheme Implemented on the Compression Domain of Image Using BTC and Histogram ModificationShih-Chieh Shie, Ji-Han Jiang, Yi-Jen Su, Wei-Yan Chang. 640-644 [doi]
- Secure OTT Service Scheme Based on Blockchain TechnologyHsing-Chung Chen, Shyi-Shiun Kuo, Han-Mi Chen. 645-650 [doi]
- A Subword-Based Deep Learning Approach for Sentiment Analysis of Political TweetsMarco Pota, Massimo Esposito, Marco A. Palomino, Giovanni Luca Masala. 651-656 [doi]
- Text Analysis on User Generated Content: The Rap Lyrics ChallengeAlessandro Maisto, Serena Pelosi, Raffaele Guarasci, Pierluigi Vitale. 657-662 [doi]
- Towards a Virtual Reality Cognitive Training System for Mild Cognitive Impairment and Alzheimer's Disease PatientsGiuseppe Caggianese, Andrea Chirico, Giuseppe De Pietro, Luigi Gallo, Antonio Giordano, Marco Predazzi, Pietro Neroni. 663-667 [doi]
- Open Information Extraction for Italian SentencesEmanuele Damiano, Aniello Minutolo, Massimo Esposito. 668-673 [doi]
- Smart Priority Park Framework Based on DDGP3Walter Balzano, Vinicio Barbieri, Giovanni Riccardi. 674-680 [doi]
- Strategies for Social Networks ModelingFlora Amato, Leonard Barolli, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì. 681-686 [doi]
- Enabling IoT Stream Management in Multi-cloud Environment by OrchestrationFlora Amato, Francesco Moscato 0001, Fatos Xhafa. 687-692 [doi]
- Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future ChallengesMohammad Alhabashneh, Bilal Abu Salih, Shirlee-ann Knight. 693-697 [doi]
- Extending a Conventional Chatbot Knowledge Base to External Knowledge Source and Introducing User Based Sessions for Diabetes EducationHussain Shafquat, Athula Ginige. 698-703 [doi]
- Internet of Everything and Machine Learning Applications: Issues and ChallengesOmid Ameri Sianaki, Ashkan Yousefi, Azadeh Rajabian Tabesh, Mehregan Mahdavi. 704-708 [doi]
- A Deep Learning Framework to Enhance Software Defined Networks SecurityAhmed Dawoud, Seyed Shahristani, Chun Raun. 709-714 [doi]
- Analysis of Scientific Production of IoE Big Data ResearchJaswinder Kaur, Pornpit Wongthongtham, Bilal Abu Salih, Sogand Fathy. 715-720 [doi]
- A Decision Support System for Selecting Sustainable Materials in Construction ProjectsMuhammad Rashid Minhas, Vidyasagar Potdar, Omid Ameri Sianaki. 721-726 [doi]
- Data Provenance in the Internet of ThingsMahmoud Elkhodr, Belal Alsinglawi, Mohammad Alshehri. 727-731 [doi]