Abstract is missing.
- An Energy Efficient Scheduling of a Smart Home Based on Optimization TechniquesAqib Jamil, Nadeem Javaid, Muhammad Usman Khalid, Muhammad Nadeem Iqbal, Saad Rashid, Naveed Anwar. 3-14 [doi]
- Differential-Evolution-Earthworm Hybrid Meta-heuristic Optimization Technique for Home Energy Management System in Smart GridNadeem Javaid, Ihtisham Ullah, Syed Shahab Zarin, Mohsin Kamal, Babatunji Omoniwa, Abdul Mateen. 15-31 [doi]
- Performance Analysis of Simulation System Based on Particle Swarm Optimization and Distributed Genetic Algorithm for WMNs Considering Different Distributions of Mesh ClientsAdmir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa. 32-45 [doi]
- A Hybrid Flower-Grey Wolf Optimizer Based Home Energy Management in Smart GridPamir, Nadeem Javaid, Attiq ullah Khan, Syed Muhammad Mohsin, Yasir Khan Jadoon, Orooj Nazeer. 46-59 [doi]
- A Fuzzy-Based Approach for Improving Peer Coordination Quality in MobilePeerDroid Mobile SystemYi Liu 0011, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 60-73 [doi]
- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Contact Duration, Storage and Remaining EnergyMiralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 74-85 [doi]
- Efficient Routing in Geographic and Opportunistic Routing for Underwater WSNsGhazanfar Latif, Nadeem Javaid, Aasma Khan, Aisha Fatima, Landing Jatta, Wahab Khan. 86-95 [doi]
- Supporting Online/Offline Collaborative Work with WebRTC Application MigrationFatos Xhafa, David Zaragoza, Santi Caballé. 96-104 [doi]
- One-to-One Routing Protocols for Wireless Ad-Hoc Networks Considering the Electric Energy ConsumptionEmi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 105-115 [doi]
- Virtual Machine Migration Algorithms to Reduce Electric Energy Consumption of a Server ClusterRyo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 116-127 [doi]
- Evaluating Motion and Heart Rate Sensors to Measure Intensity of Physical ActivityMiguel A. Wister, Pablo Pancardo, Ivan Rodriguez. 128-138 [doi]
- Implementation of WiFi P2P Based DTN Routing and Gateway for Disaster Information NetworksNoriki Uchida, Haruki Kuga, Tomoyuki Ishida, Yoshitaka Shibata. 139-146 [doi]
- A New Contents Delivery Network Mixing on Static/Dynamic Heterogeneous DTN EnvironmentShoko Takabatake, Tetsuya Shigeyasu. 147-158 [doi]
- Predicate Clustering-Based Entity-Centered Graph Pattern Recognition for Query Extension on the LODJongmo Kim, Junsik Kong, DaEun Park, Mye M. Sohn. 159-170 [doi]
- Discrimination of Eye Blinks and Eye Movements as Features for Image Analysis of the Around Ocular Region for Use as an Input InterfaceShogo Matsuno, Masatoshi Tanaka, Keisuke Yoshida, Kota Akehi, Naoaki Itakura, Tota Mizuno, Kazuyuki Mito. 171-182 [doi]
- Dynamic Group Formation for an Active Learning System Using Smartphone to Improve Learning MotivationNoriyasu Yamamoto, Noriki Uchida. 183-189 [doi]
- Evaluation of 13.56 MHz RFID System Considering Communication Distance Between Reader and TagKiyotaka Fujisaki. 190-200 [doi]
- An Efficient Routing Protocol via Depth Adjustment and Energy Gradation in Underwater Wireless Sensor NetworksGhazanfar Latif, Nadeem Javaid, Arshad Iqbal, Javed Ahmad, Ather Abdul Jabbar, Muhammad Imran. 201-211 [doi]
- Vulnerability Analysis on the Image-Based Authentication Through the PS/2 InterfaceInsu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyobeom Ahn, Kangbin Yim. 212-219 [doi]
- A Spacecraft AIT Visualization Control System Based on VR TechnologyPeng Wei, Liwei Zhang, Qiong Wu, Miaoxin Wang, Jian Li. 220-230 [doi]
- An Efficient Home Energy Management and Power Trading in Smart GridSheraz Aslam, Sakeena Javaid, Nadeem Javaid, Syed Muhammad Mohsin, Saad Sulman Khan, Mariam Akbar. 231-241 [doi]
- Hierarchical Based Coordination Strategy to Efficiently Exchange the Power Among Micro-gridsAqib Jamil, Nadeem Javaid, zafar iqbal, Muhammad Abdullah, Muhammad Zaid Riaz, Mariam Akbar. 242-251 [doi]
- Weighted Cuckoo Search Based Load Balanced Cloud for Green Smart GridsMuhammad Hassan Rahim, Nadeem Javaid, Sahar Rahim, Muqaddas Naz, Mariam Akbar, Farhana Javed. 252-264 [doi]
- Foged Energy Optimization in Smart HomesAyesha Anjum Butt, Nadeem Javaid, Sana Mujeeb, Salman Ahmed, Malik Muhammad Shahid Ali, Waqar Ali. 265-275 [doi]
- Short Term Load Forecasting based on Deep Learning for Smart Grid ApplicationsGhulam Hafeez, Nadeem Javaid, Safeer Ullah, zafar iqbal, Mahnoor Khan, Aziz Ur Rehman, Zia Ullah. 276-288 [doi]
- Efficient Resource Allocation Model for Residential Buildings in Smart Grid Using Fog and Cloud ComputingAisha Fatima, Nadeem Javaid, Momina Waheed, Tooba Nazar, Shaista Shabbir, Tanzeela Sultana. 289-298 [doi]
- Feature Selection and Extraction Along with Electricity Price Forecasting Using Big Data AnalyticsIsra Shafi, Nadeem Javaid, Aqdas Naz, Yasir Amir, Israr Ishaq, Kashif Naseem. 299-309 [doi]
- Proposal of a Disaster Support Expert System Using Accumulated Empirical DataTatsuya Oyanagi, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata, Hiromasa Habuchi. 310-319 [doi]
- Proposal of a Regional Knowledge Inheritance System Using Location-Based AR and Historical MapsHayato Ito, Tatsuya Ohyanagi, Tomoyuki Ishida, Tatsuhiro Yonekura. 320-328 [doi]
- QoS Management for Virtual Reality ContentsKo Takayama, Kaoru Sugita. 329-335 [doi]
- A Webshell Detection Technology Based on HTTP Traffic AnalysisWenchuan Yang, Bang Sun, Baojiang Cui. 336-342 [doi]
- Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update MechanismJun Yang, Ruiqing Liu, Baojiang Cui. 343-353 [doi]
- Intrusion Detection Model Based on GA Dimension Reduction and MEA-Elman Neural NetworkZe Zhang, Guidong Zhang, Yongjun Shen, Yan Zhu. 354-365 [doi]
- Location Privacy Protection Scheme Based on Random Encryption Period in VANETsTianhan Gao, Xin Xin. 366-374 [doi]
- An Improvement RFID Security Authentication Protocol Based on Hash FunctionHaowen Sun, Peng Li, He Xu, Feng Zhu. 375-384 [doi]
- Classifying Malicious URLs Using Gated Recurrent Neural NetworksJingling Zhao, Nan Wang, Qian Ma, Zishuai Cheng. 385-394 [doi]
- A Fast PQ Hash Code IndexingJingsong Shan, Yongjun Zhang, Mingxin Jiang, Chunhua Jin, Zhengwei Zhang. 395-402 [doi]
- Dynamic Incentive Mechanism for Direct Energy TradingNan Zhao, Pengfei Fan, Minghu Wu, Xiao He, Menglin Fan, Chao Tian. 403-411 [doi]
- Improve Memory for Alzheimer Patient by Employing Mind Wave on Virtual Reality with Deep LearningMarwan Kadhim Mohammed Al-shammari, Tianhan Gao. 412-419 [doi]
- Fast FFT-Based Inference in 3D Convolutional Neural NetworksBo Xie, Guidong Zhang, Yongjun Shen, Shun Liu, Yabin Ge. 420-431 [doi]
- Cognitive Informatics Approaches for Data Sharing and Management in Cloud ComputingMarek R. Ogiela, Lidia Ogiela. 432-437 [doi]
- Implementation of Lane Detection Algorithm for Self-driving Vehicles Using Tensor FlowHyunhee Park. 438-447 [doi]
- Design and Implementation of Cognitive System of Children's Education Based on RFIDHongyu Gan, Chenghao Wu, Jie Xu, Peng Li, He Xu. 448-455 [doi]
- Delay Optimization for Mobile Cloud Computing Application Offloading in Smart CitiesShan Guo, Ying Wang, Sachula Meng, Nan Ma. 456-466 [doi]
- Joint User Association and Power Allocation for Minimizing Multi-bitrate Video Transmission Delay in Mobile-Edge Computing NetworksHong Wang, Ying Wang, Ruijin Sun, Runcong Su, Baoling Liu. 467-478 [doi]
- Cyber-Physical Sensors and Devices for the Provision of Next-Generation Personalized ServicesBorja Bordel, Teresa Iturrioz-Aguirre, Ramón Alcarria, Diego Sánchez de Rivera. 479-490 [doi]
- Device Stand-by Management of IoT: A Framework for Dealing with Real-World Device Fault in City Platform as a ServiceToshihiko Yamakami. 491-502 [doi]
- A Security-Aware Fuzzy-Based Cluster Head Selection System for VANETsKosuke Ozera, Kevin Bylykbashi, Yi Liu 0011, Leonard Barolli. 505-516 [doi]
- Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional CodeJie Ding, He Xu, Peng Li, Feng Zhu. 517-526 [doi]
- DoS Attack Pattern Mining Based on Association Rule Approach for Web ServerHsing-Chung Chen, Shyi-Shiun Kuo. 527-536 [doi]
- Current Status on Elliptic Curve Discrete Logarithm Problem - (Extended Abstract)Maki Inui, Tetsuya Izu. 537-539 [doi]
- Study on Signature Verification Process for the Firmware of an Android PlatformEunseon Jeong, Junyoung Park, Byeonggeun Son, Myoungsu Kim, Kangbin Yim. 540-545 [doi]
- Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagicKyungroul Lee, Sun-Young Lee, Kyunghwa Do, Kangbin Yim. 546-553 [doi]
- Clickbait Detection Based on Word Embedding ModelsVorakit Vorakitphan, Fang-Yie Leu, Yao-Chung Fan. 557-564 [doi]
- A Micro Services Quality Measurement Model for Improving the Efficiency and Quality of DevOpsSen-Tarng Lai, Fang-Yie Leu. 565-575 [doi]
- A Study on Firewall Services with Edge Computers of vEPC in 5G NetworksFang-Yie Leu, Ping-Hung Chou. 576-584 [doi]
- The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN ControllersFang-Yie Leu, Cheng-Yan Gu. 585-595 [doi]
- Home Energy Management Using Hybrid Meta-heuristic Optimization TechniqueOrooj Nazeer, Nadeem Javaid, Adnan Ahmed Rafique, Sajid Kiani, Yasir Javaid, Zeeshan Khurshid. 599-609 [doi]
- On the Channel Congestion of the Shortest-Path Routing for Unidirectional Hypercube NetworksTzu-Liang Kung, Chun-Nan Hung, Yuan-Hsiang Teng. 610-619 [doi]
- A Diagnosis Algorithm on the 2D-torus NetworkLidan Wang, Ningning Liu, Cheng-Kuan Lin, Tzu-Liang Kung, Yuan-Hsiang Teng. 620-625 [doi]
- Construction Schemes for Edge Fault-Tolerance of Ring NetworksChun-Nan Hung, Tzu-Liang Kung, En-Cheng Zhang. 626-631 [doi]
- Review of RFID-Based Indoor Positioning TechnologyJingkai Zhu, He Xu. 632-641 [doi]
- Designing a Cybersecurity Board Game Based on Design Thinking ApproachShian-Shyong Tseng, Tsung-Yu Yang, Yuh-Jye Wang, Ai-Chin Lu. 642-650 [doi]
- A Localization Algorithm Based on Availability of Direct Signal from Neighbor Anchor Nodes in a Sensor NetworksMegumi Yamamoto, Shigetomo Kimura. 653-664 [doi]
- Prediction Model of Optimal Bid Price Based on Keyword Auction Data Through Machine Learning AlgorithmsMinjun Ji, Hyunhee Park. 665-674 [doi]
- Complex Activity Recognition Using Polyphonic Sound Event DetectionJaewoong Kang, Jooyeong Kim, Kunyoung Kim, Mye Sohn. 675-684 [doi]
- Dynamic Group Key Management for Efficient Fog ComputingJiyoung Lim, Inshil Doh, Kijoon Chae. 685-694 [doi]
- A Network Slice Resource Allocation Process in 5G Mobile NetworksAndrea Fendt, Lars-Christoph Schmelz, Wieslawa Wajda, Simon Lohmüller, Bernhard Bauer. 695-704 [doi]
- An Intelligent Opportunistic Scheduling of Home Appliances for Demand Side ManagementZunaira Nadeem, Nadeem Javaid, Asad Waqar Malik, Abdul Basit Khan, Muhammad Kamran, Rida Hafeez. 707-718 [doi]
- Fog Computing Based Energy Management System Model for Smart BuildingsSaman Zahoor, Nadeem Javaid, Adia Khalid, Anila Yasmeen, Zunaira Nadeem. 719-727 [doi]
- A Novel Indoor Navigation System Based on RFID and LBS TechnologyYizhuo Wang, Xuan Xu, Xinyu Wang, He Xu. 728-737 [doi]
- A Social Dimension View Model of Divergence of IoT StandardizationToshihiko Yamakami. 738-747 [doi]
- Design and Implementation of a VANET Testbed: Performance Evaluation Considering DTN Transmission over VANETsShogo Nakasaki, Yu Yoshino, Makoto Ikeda, Leonard Barolli. 748-755 [doi]
- A Survey of Automated Root Cause Analysis of Software VulnerabilityJeeSoo Jurn, Taeeun Kim, Hwankuk Kim. 756-761 [doi]
- The Effect of Personal Moral Philosophy on Perceived Moral Intensity in Hotel IndustryChia-Ju Lu, Chiung-Chi Pen, Chiou-Shya Torng. 765-770 [doi]
- Study on Production and Marketing of Tea: A CompanyKuei-Yuan Wang, Xiao-hong Lin, Chien-Kuo Han, Chi-Cheng Lin, Yi-Chi Liao, Tzu-Yun Ting, Ting-Shiuan Fang. 771-782 [doi]
- The Influence of U.S. FED's Interest Rate-Raising Event Announcements on the Abnormal Returns in the Taiwan Stock MarketXiao-hong Lin, Kuei-Yuan Wang, Chien-Kuo Han, Yu-Sin Huang, Yi-Chi Liao, Tzu-Yun Ting, Ting-Shiuan Fang. 783-792 [doi]
- The Relationship Between Dividend, Business Cycle, Institutional Investor and Stock RiskYung-Shun Tsai, Shyh-Weir Tzang, Chih-Hsing Hung, Chun-Ping Chang. 793-800 [doi]
- Commercial Real Estate Evaluation: The Real Options ApproachShyh-Weir Tzang, Chih-Hsing Hung, Chun-Ping Chang, Yung-Shun Tsai. 801-807 [doi]
- A Dynamic Model of Optimal Share RepurchaseChun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang, Yong Zulina Zubairi. 808-811 [doi]
- Direct and Indirect Effects of Job Complexity of Senior Managers on Their Compensation and Operating PerformancesYing-Li Lin, Yi-Jing Chen. 812-821 [doi]
- The Impact of Online Commentary on Young Consumer's Purchase DecisionMei Hua Huang, Wen-Shin Huang, Chiung Yen Chen, An-Chi Kuan. 822-828 [doi]
- Penalty or Benefit? The Effect of Dividend Taxes on Stock ValuationWen-Hsin Huang, Suming Lin, Mei Hua Huang. 829-838 [doi]
- The Determinants of Admission Strategy and School Choice: A Case Study of a Private Senior Vocational School in TaiwanLing-Yi Chou, Yi-Yang Li. 839-848 [doi]
- Professional Training and Operational Performance: Considering the Impact of CPA Disciplinary IncidentsChiung Yen Chen, Mei Hua Huang, Zhen-Xin Xu. 849-861 [doi]
- Constructing a System for Effective Implementation of Strategic Corporate Social ResponsibilityChiung-Yao Huang, Chung-Jen Fu. 862-866 [doi]
- Study of the Factors that Influence Brand Loyalty Toward the Use of Tablets in IndonesiaChien-Wen Lai, Candra Adi Kurnia, Shao-Chun Chiu, Ya-Lan Chan. 867-878 [doi]
- Five Elements and Stock MarketMei-Hua Liao, Shih-Han Hong, Norihisa Yoshimura. 879-883 [doi]
- Asset Structure of Long-Lived CompanyMei-Hua Liao, Yi-Jun Guo, Hidekazu Sone. 884-887 [doi]
- An Inventory Policy for Perishable Products with Permissible Delay in PaymentYa-Lan Chan, Sue-Ming Hsu. 888-902 [doi]
- The Research on Lifestyle, Physical and Mental Health, and Potential Consumption for ElderlySue-Ming Hsu, Ya-Lan Chan. 903-909 [doi]
- A Cooperative Evaluation Approach Based on Blockchain Technology for IoT ApplicationHsing-Chung Chen, Bambang Irawan, Zon-Yin Shae. 913-921 [doi]
- The Study and Realization of Vulnerability-Oriented Fuzzing Technology for ActiveX Plug-InsBaojiang Cui, Pin Mao. 922-931 [doi]
- An Open Source Software Defect Detection Technique Based on Homology Detection and Pre-identification VulnerabilitysJun Yang, Xuyan Song, Yu Xiong, Yu Meng. 932-940 [doi]
- Analysis on Mobile Payment Security and Its Defense StrategySimin Yin, Jingye Sheng, Tong Wang, He Xu. 941-946 [doi]