Abstract is missing.
- Route Lifetime Prediction Method in VANET by Using AODV Routing Protocol (AODV-LP)Elis Kulla, Soushi Morita, Kengo Katayama, Leonard Barolli. 3-11 [doi]
- Home Energy Management Using Optimization TechniquesIsra Shafi, Nadeem Javaid, Yasir Amir, Asma Tahir, Kashif Naseem, Tariq Hanif. 12-24 [doi]
- Hybrid Bacterial Foraging Tabu Search Energy Optimization Technique in Smart HomesMuhammad Usman Khalid, Nadeem Javaid, Muhammad Nadeem Iqbal, Aqib Jamil, Naveed Anwar, Qazi Muhammad Fazal E. Haq. 25-36 [doi]
- A Hybrid Tabu-Enhanced Differential Evolution Meta-Heuristic Optimization Technique for Demand Side Management in Smart GridNadeem Javaid, Syed Shahab Zarin, Ihtisham Ullah, Mohsin Kamal, Urva Latif, Rahim Ullah. 37-50 [doi]
- Performance Evaluation of WMN-PSOSA Considering Exponential and Weibull DistributionsShinji Sakamoto, Admir Barolli, Kosuke Ozera, Leonard Barolli, Shusuke Okamoto, Makoto Takizawa. 51-63 [doi]
- CRRP Analysis of Cloud Computing in Smart GridRahim Ullah, Nadeem Javaid, zafar iqbal, Iftikhar Ahmad, Avais Jan, Yasir Khan Jadoon. 64-74 [doi]
- A Hybrid Bat-Crow Search Algorithm Based Home Energy Management in Smart GridPamir, Nadeem Javaid, Syed Muhammad Mohsin, Arshad Iqbal, Anila Yasmeen, Ihsan Ali. 75-88 [doi]
- A Fuzzy-Based Approach for Selection of Actor Nodes in WSANs Considering Size of Giant Component as New ParameterDonald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli. 89-101 [doi]
- Evaluation of a Protocol to Prevent Malicious Information Flow in P2PPS SystemsShigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 102-114 [doi]
- An Eco IDMMV Migration Algorithm of Dynamic Virtual Machines in a Server ClusterDilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa. 115-126 [doi]
- A Fuzzy-Based Plant Cultivation Support SystemGaku Tsuchiya, Eri Takebayashi, Makoto Ikeda, Leonard Barolli. 127-135 [doi]
- Implementation of Omnidirectional Wheelchair Vision with Small Reflect Mirrors: Performance Evaluation for Tennis Ball Tracking Considering Different Mirror AnglesKeita Matsuo, Leonard Barolli. 136-148 [doi]
- Energy-Efficient Process Replication by Forcing Meaningless Replicas to Terminate in Virtual Machine EnvironmentTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa. 149-160 [doi]
- Performance of WRF Cloud Resolving Simulations with Data Assimilation on Public Cloud and HPC EnvironmentsKlodiana Goga, Luca Pilosu, Antonio Parodi, Martina Lagasio, Olivier Terzo. 161-171 [doi]
- Towards Energy Efficient Orchestration of Cloud Computing InfrastructureAlberto Scionti, Klodiana Goga, F. Lubrano, Olivier Terzo. 172-183 [doi]
- Proposal of Navigation System Based on System Optimal Traffic AssignmentWeibin Wang, Minoru Uehara, Haruo Ozaki. 184-195 [doi]
- Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor NetworksHanxiao Zhi, Peng Li, He Xu, Feng Zhu. 196-205 [doi]
- Personalized Group Recommendation Model Based on Argumentation TopicCaiquan Xiong, Ke Lv, Hao Wang, Caiyun Qi. 206-217 [doi]
- A User-Centric Wireless Networks' Optimization Method for Data ServiceJun Luo, Wenan Zhou, Wenji Zhang, Qiang Zhou, Yu Du. 218-227 [doi]
- Efficient Load Balancing and Integration Protocols for Mobile Cloud Computing in Disaster SituationsYoshitaka Shibata, Masaki Otomo, Goshi Sato, Noriki Uchida. 228-239 [doi]
- DNAR: Depth and Noise Aware Routing for Underwater Wireless Sensor NetworksJunaid Qadar, Anwar Khan, Hasan Mahmood. 240-251 [doi]
- A Fine-Grained Ontology-Based Sentiment Aggregation ApproachMonireh Alsadat Mirtalaie, Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain. 252-262 [doi]
- Influence of Management and Sharing Protocols for Decision Making Processes in Cloud ComputingUrszula Ogiela, Makoto Takizawa, Lidia Ogiela. 263-268 [doi]
- Conflict-free Multi-user Collaborative Editing System for 3D ModelsTasuku Takahashi, Kengo Imae, Naohiro Hayashibara. 269-279 [doi]
- Application of Bird Swarm Algorithm for Solution of Optimal Power Flow ProblemsManzoor Ahmad, Nadeem Javaid, Iftikhar Azim Niaz, Sundas Shafiq, Obaid Ur Rehman, Hafiz Majid Hussain. 280-291 [doi]
- An Optimal Power Flow Approach for Stochastic Wind and Solar Energy Integrated Power SystemsSundas Shafiq, Nadeem Javaid, Sikandar Asif, Farwa Ali, Nasir Hussain Chughtai, Nouman Khurshid. 292-304 [doi]
- Load Prediction Based on Multivariate Time Series Forecasting for Energy Consumption and Behavioral AnalyticsMahnoor Khan, Nadeem Javaid, Muhammad Nabeel Iqbal, Muhammad Bilal, Syed Farhan Ali Zaidi, Rashid Ali Raza. 305-316 [doi]
- Cooperative Energy Management Using Coalitional Game Theory for Reducing Power Losses in MicrogridsMuhammad Usman Khalid, Nadeem Javaid, Muhammad Nadeem Iqbal, Ali Abdur Rehman, Muhammad Umair Khalid, Mian Ahmer Sarwar. 317-328 [doi]
- Thai Sentiment Resource Using Thai WordNetPonrudee Netisopakul, Kanlaya Thong-iad. 329-340 [doi]
- A PCA Interpretation of the Glasgow Coma Scale in the Trauma Brain Injury PECARN DatasetOrazio Gambino, Antonia India, Mariangela Sciandra, Roberto Pirrone. 341-350 [doi]
- Negotiating Agents: A Model Based on BDI Architecture and Multi-Context Systems Using Aspiration Adaptation Theory as a Negotiation StrategyRodrigo Rodrigues Pires de Mello, Thiago Ângelo Gelaim, Ricardo Azambuja Silveira. 351-362 [doi]
- iEnsemble2: Committee Machine Model-Based on Heuristically-Accelerated Multiagent Reinforcement LearningArnoldo Uber Junior, Paulo José de Freitas Filho, Ricardo Azambuja Silveira, Juliano Mueloschat. 363-374 [doi]
- Prediction of Mechanical Properties of Polymer Materials Using Extreme Gradient Boosting on High Molecular Weight PolymersManop Phankokkruad, Sirirat Wacharawichanant. 375-385 [doi]
- Cyber Kill Chain Defender for Smart MetersMikhail Simonov, Fabrizio Bertone, Klodiana Goga, Olivier Terzo. 386-397 [doi]
- Deep Q-Network for User Association in Heterogeneous Cellular NetworksNan Zhao, Xiao He, Minghu Wu, Pengfei Fan, Menglin Fan, Chao Tian. 398-407 [doi]
- Cooperative Spectrum Sensing Using Dual Nonparametric Cumulative Sum AlgorithmJingcheng Miao, Hang Yang, Xiao-ou Song, Zili Wang. 408-418 [doi]
- Information Extraction for Cultural Heritage Knowledge Acquisition Using Word Vector RepresentationWatchira Buranasing, Suronapee Phoomvuthisarn. 419-430 [doi]
- Measurement and Algorithm for Overlapping Community Partitioning in Bipartite NetworksBolun Chen, Yan Yuan, Yong-jun Zhang, Fen-Fen Li, Qiang Yu. 431-439 [doi]
- Trust-Based Decision Support System for Planning Among Food-Energy-Water ActorsSuleyman Uslu, Yefeng Ruan, Arjan Durresi. 440-451 [doi]
- Securing of Clouds Based on Lightweight Secure Multi-party ComputationKouta Takahashi, Fumiaki Sato. 452-464 [doi]
- Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC ProtocolJingling Zhao, Zhan Su, Jinxin Ma, Baojiang Cui. 465-475 [doi]
- An Optimization Safety Solution for Sip Call Base on ESPWenchuan Yang, Zhen Fu, Jinxin Ma. 476-485 [doi]
- A P2P-Based Data Storing Method for Participatory SensingAkimitsu Kanzaki, Katsumi Kuwabara. 486-496 [doi]
- Architecture and Implementation of Real-Time Analysis System Based on Cold Chain DataWenkang Xie, Peng Li, He Xu. 497-505 [doi]
- FPGA Implementation of Lightweight Communication Protocol Processing for IoTRyouhei Tsugami, Yuichiro Shibata. 506-517 [doi]
- Light-Weight Fine-Grain Dynamic Partial Reconfiguration on Xilinx FPGAsKunihiro Ueda, Keisuke Dohi, Yuichiro Shibata. 518-526 [doi]
- A Study of FPGA Instance Based PLC Architecture Design and Automatic Generation Algorithm of Logic CodeRenya Yamamoto, Masaharu Tanaka, Haruhi Eto, Fujio Kurokawa. 527-537 [doi]
- Discussion on High Level Synthesis FPGA Design of Camera CalibrationKazuya Uetsuhara, Hiroki Nagayama, Yuichiro Shibata, Kiyoshi Oguri. 538-549 [doi]
- Web-Based Wireless Controlled Robot for Night Vision Surveillance Using Shell Script with Raspberry PiHasan Salman, Samuel Acheampong, He Xu. 550-560 [doi]
- IoT/M2M Application Development Method Using Real Object Oriented ModelHiroyuki Suzuki, Akio Koyama. 561-572 [doi]
- Analysis of Localization Algorithms in Wireless Sensor NetworksLu Dong, Peng Li, He Xu, Cheng Yang. 573-582 [doi]
- Ada-Boosted Locally Enhanced Probabilistic Neural Network for IoT Intrusion DetectionTony Jan. 583-589 [doi]
- Fall Detection System Based on Deep Learning and Image Processing in Cloud EnvironmentLeixian Shen, Qingyun Zhang, Guoxu Cao, He Xu. 590-598 [doi]
- Residual Reconstruction Algorithm Based on Sub-pixel Multi-hypothesis Prediction for Distributed Compressive Video SensingRui Chen, Ying Tong, Jie Yang, Minghu Wu. 599-605 [doi]
- Robust Facial Expression Recognition Based on Local Tri-directional Coding PatternYing Tong, Rui Chen, Jie Yang, Minghu Wu. 606-614 [doi]
- Storing and Compressing Video into Neural Networks by OverfittingHiroki Egawa, Yuichiro Shibata. 615-626 [doi]
- Network Malicious Behavior Detection Using Bidirectional LSTMWenwu Chen, Su Yang, Xu an Wang, Wei Zhang, Jindan Zhang. 627-635 [doi]
- Improved Cooperative Spectrum Sensing Algorithm with Artificial Neural NetworkJingcheng Miao, Xiao-ou Song, Zili Wang, Xu an Wang. 639-649 [doi]
- A Survey on Platooning Techniques in VANETsElis Kulla, Ningling Jiang, Evjola Spaho, Noritaka Nishihara. 650-659 [doi]
- Web API-Based NAT Traversal in Managed Network BlocksRyusei Saka, Minoru Uehara. 660-669 [doi]
- A Restart Diversification Strategy for Iterated Local Search to Maximum Clique ProblemKazuho Kanahara, Kengo Katayama, Takeshi Okano, Elis Kulla, Tetsuya Oda, Noritaka Nishihara. 670-680 [doi]
- Differential Evolution: An Updated SurveyNadeem Javaid. 681-691 [doi]
- Modeling and Simulation of Ship Swaying Attitude Based on Linear System TheoryHaiwen Sun, Chengcheng Wang, Wei Pang. 695-703 [doi]
- High-Fidelity Reversible Data Hiding Algorithm Based on SVDTianxue Li, Minqing Zhang, Jianping Wang. 704-712 [doi]
- Research on Security Critical Task Scheduling Algorithm Based on ARINC 653 StandardYi an Zhu, Shuyan Luo, He Lin, LinLin Huang. 713-725 [doi]
- μC/OS-II Based RTOS KernelLian Li, Xianchen Shi. 726-734 [doi]
- An Improved Method for Voiceprint RecognitionWen-shuai Yang, Xu an Wang, Sha Zhou, Hong-xu Zhao, Jiaxing Huang. 735-746 [doi]
- Region Oriented Integrated Fog and Cloud Based Environment for Efficient Resource Distribution in Smart BuildingsItrat Fatima, Sakeena Javaid, Nadeem Javaid, Isra Shafi, Zunaira Nadeem, Rahim Ullah. 749-759 [doi]
- An Evaluation of Neural Networks Performance for Job Scheduling in a Public Cloud EnvironmentKlodiana Goga, Fatos Xhafa, Olivier Terzo. 760-769 [doi]
- An Enhanced Smart Card and Biometrics-Based Authentication Scheme in Multi-server EnvironmentHaiyan Xiao, Lifang Wang. 770-779 [doi]
- Combining Vector Space Features and Convolution Neural Network for Text Sentiment AnalysisYun Wang, Xu an Wang, Jindan Zhang, Chenghai Yu. 780-790 [doi]
- Short Term Load Forcasting Using Heuristic Algorithm and Support Vector MachineOrooj Nazeer, Nadeem Javaid, Abdul Basit Majeed Khan, Arif Hussain, Tariq Basheer, Muhammad Mukhtar Ahmed Ratyal. 791-799 [doi]
- Towards Real-Time Opportunistic Scheduling of the Home Appliances Using Evolutionary TechniquesZunaira Nadeem, Nadeem Javaid, Asad Waqar Malik, Aqib Jamil, Itrat Fatima, Muhammad Usman Khalid. 803-814 [doi]
- Network System Integration Technique Research Based on DDSHaiwen Sun, Xiaofang Xie, Wei Pang. 815-823 [doi]
- Channel Routing by T-shaped Branch Waveguide with Periodic StructureHiroshi Maeda. 824-831 [doi]
- Officer Profile Management System Using by Cloud Computing ServicesKyaw Zaw Ye, Kyaw Myo Htun, Zaw Htet, Soe Myint Maung. 832-841 [doi]
- A Deep Q-Network Based Simulation System for Actor Node Mobility Control in WSANs Considering Three-Dimensional Environment: A Comparison Study for Normal and Uniform DistributionsTetsuya Oda, Elis Kulla, Kengo Katayama, Makoto Ikeda, Leonard Barolli. 842-852 [doi]
- A Proposal of Code Completion Problem for Java Programming Learning Assistant SystemHtoo Htoo Sandi Kyaw, Shwe Thinzar Aung, Hnin Aye Thant, Nobuo Funabiki. 855-864 [doi]
- Draft Design of Distributed Ledger Based Peer-to-Peer Business PlatformByungRae Cha, Sun Park, ByeongChun Shin, JongWon Kim. 865-872 [doi]
- Tangible Social Content Service System: Making Digital Technology Easier to Use by Elderly and Its Usability EvaluationMasooma Zehra Syeda, Meeree Park, Yujeong Kim, Yong-Moo Kwon. 873-883 [doi]
- Classification of Arteriovenous Fistula Stenosis Using Shunt Murmurs Analysis and Support Vector MachineDaisuke Higashi, Keiko Tanaka, Satoko Shin, Keisuke Nishijima, Ken'ichi Furuya. 884-892 [doi]
- Reducing Computational Complexity of Multichannel Nonnegative Matrix Factorization Using Initial Value Setting for Speech RecognitionTaiki Izumi, Ryo Aihara, Toshiyuki Hanazawa, Yohei Okato, Takanobu Uramoto, Shingo Uenohara, Ken'ichi Furuya. 893-900 [doi]
- A Mechanism of Operation Monitoring for Motor-Impaired Persons in Controlling a PC Through a Mobile Touch-Type DeviceShoma Fukuhara, Soichiro Yamasita, Shigeki Matsubara, Makoto Nakashima. 901-910 [doi]
- A Method of Neural Style Transfer for Images with Artistic CharactersKenta Goto, Hiroaki Nishino. 911-920 [doi]
- Evaluating Classification Methods in Snore Activity DetectionKeisuke Nishijima, Shingo Uenohara, Ken'ichi Furuya. 921-926 [doi]
- Design of a Supporting System for Consultation of Instructional ImprovementYusei Suzuki, Ryuichi Matsuba, Katsuaki Suzuki, Toshihiro Kita, Shin-Ichiro Kubota, Hiroaki Nishino. 927-935 [doi]
- Efficient Query Transmission Using Route Selection Records and Multiple Dynamic Network AgentsYukihiro Ito, Shinji Sugawara. 936-947 [doi]
- Web-Based VR System for Operation Training of Medical Therapy DevicesKotaro Kuroda, Kosuke Kaneko, Toshioh Fujibuchi, Yoshihiro Okada. 948-957 [doi]
- A Safe Driving Support Method Using Olfactory StimuliShinya Okazaki, Toshiyuki Haramaki, Hiroaki Nishino. 958-967 [doi]
- Study on Regional Transportation Linkage System that Enables Efficient and Safe Movement Utilizing LPWAEiji Aoki, Shinji Otsuka, Takeshi Ikenaga, Masaaki Yatsuzuka, Kazuhiro Tokiwa. 968-977 [doi]
- A Method of Hardware-Trojan Detection Using Design Verification TechniquesYushiro Hiramoto, Satoshi Ohtake. 978-987 [doi]
- A Tree-Based Model of Energy-Efficient Fog Computing Systems in IoTRyuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 991-1001 [doi]
- A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-ServiceValentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano. 1002-1011 [doi]
- Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS)Domenico Redavid, Donato Malerba, Beniamino Di Martino, Antonio Esposito, Claudio Agostino Ardagna, Valerio Bellandi, Paolo Ceravolo, Ernesto Damiani. 1012-1021 [doi]
- A Federation of Cognitive Cloud Services for Trusting Data SourcesFlora Amato, Beniamino Di Martino, Fiammetta Marulli, Francesco Moscato 0001. 1022-1031 [doi]
- Intelligent Traffic System Based on Neural NetworkJian Zhao. 1035-1046 [doi]
- Research on Data Storage and Processing Optimization Based on Federation HDFS and SparkFangzhou Chen, Peng Li, He Xu, Wenkang Xie. 1047-1057 [doi]
- Research on Rumors of Social Networks Considering Game Between NodesYazhou Liu, Xiaozhong Pan, Jing Wang, Wei Fu. 1058-1068 [doi]
- Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big DataYanyu Duan, Xu an Wang, Fang Li, Jindan Zhang. 1069-1076 [doi]
- Research on the Estimation Model of Soil Moisture Content Based on the Characteristics of Thermal Infrared DataFu Qiang Qin, Li-Fang Wang. 1077-1084 [doi]
- Camshift Target Tracking Based on Gaussian Background Difference and Adaboost CombinationBin Cong, Zhefu Wang. 1087-1096 [doi]
- Research on Modeling and Control of Carrier-Based Aircraft Steam Ejection Take-Off SystemDapeng Xiu, Shenquan Wang. 1097-1105 [doi]
- Feasibility Study on Deep Learning Scheme for Sign Language Motion RecognitionKazuki Sakamoto, Eiji Ota, Tatsunori Ozawa, Hiromitsu Nishimura, Hiroshi Tanaka. 1106-1115 [doi]
- Motion Processing and Big DataKin Fun Li, Linlin Zhang. 1116-1120 [doi]
- Classification of Tennis Swing Motions Using Deep LearningHayato Tsukiji, Huynh Chi, Kosuke Takano, Kin Fun Li. 1121-1128 [doi]