Abstract is missing.
- Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity CurriculumJianhua Yang, Yongzhong Zhang, Guoqing Zhao. 1-6 [doi]
- Securing OppNets from Packet Integrity Attacks Using Trust and ReputationAsma'a Ahmad, Robin Doss, Majeed Alajeely, Khlood Ahmad. 7-12 [doi]
- Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing SchemeNaoto Kaneko, Keiichi Iwamura. 13-18 [doi]
- An Efficient and Secure User Authentication Scheme with Anonymity in Global Mobility NetworksR. Madhusudhan, K. S. Suvidha. 19-24 [doi]
- Low Complexity Variable Leaky Normalised Orthogonal Gradient Adaptive AlgorithmSuchada Sitjongsataporn, Piyaporn Nurarak. 25-28 [doi]
- A Two-Stage Codebook Design Based on Beam Perturbation for Massive MIMO SystemsJiangwei Yuan, Xiaohui Li 0001, Wenjuan Pu, Ruiyang Yuan. 29-34 [doi]
- ECU Software Updating in Future Vehicle NetworksYutaka Onuma, Yoshiaki Terashima, Ryozo Kiyohara. 35-40 [doi]
- Background Radiation Effect on Ground Sensor-to-UAV Free-Space Optical Link With Inexpensive LaserWeilian Su, Tri T. Ha. 41-43 [doi]
- A Performant Funnel Based Mobile Service Discovery and Exposure ModelWalid El Ayeb, Zièd Choukair. 44-49 [doi]
- Inject Stenography into Cybersecurity EducationDianyuan Han, Jianhua Yang, Wayne Summers. 50-55 [doi]
- Security Evaluation on Secret Computation without Changing the Polynomial DegreeKen Aoi, Takeshi Shingu, Keiichi Iwamura. 56-61 [doi]
- An Anonymous Authentication Protocol for Smart GridHikaru Kishimoto, Naoto Yanai, Shingo Okamura. 62-67 [doi]
- Model-Based Attack ToleranceGeorges Ouffoue, Fatiha Zaïdi, Ana R. Cavalli, Mounir Lallali. 68-73 [doi]
- Security Oriented Malicious Activity Diagrams to Support Information Systems SecurityOthmar O. Mwambe, Isao Echizen. 74-81 [doi]
- Study of the Patterns of Automatic Car Washing in the Era of Internet of ThingsShigen Zhong, Liangjie Zhang, Hsing-Chung Chen, Huan Zhao, Ling Guo. 82-86 [doi]
- Adaptation of Information Retrieval Methods for Identifying of Destructive Informational Influence in Social NetworksElena Okhapkina, Valentin Okhapkin, Oleg Kazarin. 87-92 [doi]
- A Trust Management Framework for Network Applications within an SDN EnvironmentAliyu Lawal Aliyu, Peter Bull, Ali Abdallah. 93-98 [doi]
- A Survey on Sharing Economy and Its Effect on Human Behavior ChangesMoloud Abdar, Neil. Y. Yen. 99-103 [doi]
- Building a Social MANET Based on an SNS Community TokenKoichi Hirai, Kazumasa Takami. 104-109 [doi]
- Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning ToolYien Wang, Jianhua Yang. 110-113 [doi]
- Graph-Based Semantic Segmentation for 3D Digital ImagesDumitru Dan Burdescu, Marius Brezovan, Liana Stanescu, Cosmin Stoica Spahiu, Daniel Costin Ebânca. 114-119 [doi]
- An Alternative Method of Pattern Recognition and Tracking of Moving Objects Using 3D Depth SensorsNingping Sun, Ryosuke Okumura. 120-125 [doi]
- New Approaches to Human Gait Simulation Using Motion SensorsNingping Sun, Yuya Sakai. 126-131 [doi]
- An Enhanced Differential Evolution Based Energy Management System for Smart GridsNaveed ur Rehman, Nadeem Javaid, Zahoor Ali Khan. 132-137 [doi]
- Algorithms to Energy-Efficiently Select a Server for a General Process in a Scalable ClusterAtsuhiro Sawada, Shigenari Nakamura, Hiroki Kataoka, Tomoya Enokido, Makoto Takizawa. 138-145 [doi]
- Simple Energy-Aware Algorithms for Selecting a Server in a Scalable ClusterHiroki Kataoka, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 146-153 [doi]
- A Comprehensive Analysis on Data Hazard for RISC32 5-Stage Pipeline ProcessorWei Pau Kiat, Kai Ming Mok, Wai-Kong Lee, Hock Guan Goh, Ivan Andonovic. 154-159 [doi]
- Fair Adaptive Resouce Allocation Scheme for an OpenFlow-Based Virtual NetworkNihed Bahria El Asghar, Mounir Frikha. 160-165 [doi]
- Fault Tolerance in a Cloud of Databases EnvironmentSyrine Chatti, Habib Ounelli. 166-171 [doi]
- Merging Topic Groups of a Publish/Subscribe System in Causal OrderYuta Yamamoto, Naohiro Hayashibara. 172-177 [doi]
- Context Aware Cell Selection in Heterogenious Radio Access EnvironmentMasafumi Katoh, Yoshiharu Tajima, Hiroaki Senoo, Dai Kimura. 178-183 [doi]
- Cloud RAN Architecture Model Based upon Flexible RAN Functionalities Split for 5G NetworksOlfa Chabbouh, Sonia Ben Rejeb, Nazim Agoulmine, Zièd Choukair. 184-188 [doi]
- Dijkstra-Algorithm Based Ray-Tracing by Controlling Proximity Node MappingKazunori Uchida, Leonard Barolli. 189-194 [doi]
- Design and Implementation of a Simulation System Based on Deep Q-Network for Mobile Actor Node Control in Wireless Sensor and Actor NetworksTetsuya Oda, Ryoichiro Obukata, Makoto Ikeda, Leonard Barolli, Makoto Takizawa. 195-200 [doi]
- An Integrated Intelligent System for IoT Device Selection and Placement in Opportunistic Networks Using Fuzzy Logic and Genetic AlgorithmMiralda Cuka, Donald Elmazi, Ryoichiro Obukata, Kesuke Ozera, Tetsuya Oda, Leonard Barolli. 201-207 [doi]
- Towards Safer Roads through Cooperative Hazard Awareness and Avoidance in Connected VehiclesFatma Outay, Faouzi Kammoun, Florent Kaisser, Mohammed Atiquzzaman. 208-215 [doi]
- SVC-Based Cooperative Video Streaming in Highway Vehicular NetworksRuijian An, Zhi Liu, Yusheng Ji. 216-221 [doi]
- Performance Evaluation of the Optimized Weighted Clustering Algorithm in Wireless Sensor NetworksFatma Belabed, Ridha Bouallegue. 222-225 [doi]
- Energy Efficient Data Collection Scheme in Mobile Wireless Sensor NetworksWeimin Wen, Zaixiu Dong, Guilin Chen, Shenghui Zhao, Chih-Yung Chang. 226-230 [doi]
- A Balanced Energy Consuming and Hole Alleviating Algorithm for Wireless Sensor NetworksNaeem Jan, Ahmad Raza Hameed, Babar Ali, Rahim Ullah, Kaleem Ullah, Nadeem Javaid. 231-237 [doi]
- Application of Deep Recurrent Neural Networks for Prediction of User Behavior in Tor NetworksTaro Ishitaki, Ryoichiro Obukata, Tetsuya Oda, Leonard Barolli. 238-243 [doi]
- A Meta-Heuristic Home Energy Management SystemAyesha Zafar, Samia Shah, Rabiya Khalid, Sardar Mehboob Hussain, Muhammad Hassan Rahim, Nadeem Javaid. 244-250 [doi]
- A Fuzzy Approach for Secure Clustering in MANETs: Effects of Distance Parameter on System PerformanceKosuke Ozera, Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Leonard Barolli. 251-258 [doi]
- Apply Deep Learning Neural Network to Forecast Number of TouristsYu-wei Chang, Chih-Yung Tsai. 259-264 [doi]
- Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Delta Type of Brain WavesMasafumi Yamada, Miralda Cuka, Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli. 265-270 [doi]
- Performance Evaluation of an AmI Testbed for Improving QoL: Evaluation Using Clustering Approach Considering Distributed Concurrent ProcessingRyoichiro Obukata, Miralda Cuka, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Leonard Barolli. 271-275 [doi]
- Evaluation of Spatial Trees for the Simulation of Biological TissueIlya Dmitrenok, Viktor Drobnyy, Leonard Johard, Manuel Mazzara. 276-282 [doi]
- A Novel Pricing Mechanism for Demand Side Load Management in Smart GridMuhammad Babar Rasheed, Nadeem Javaid, Muhammad Awais, Mariam Akbar, Zahoor Ali Khan. 283-290 [doi]
- Experimental Evaluation of a Fast Demand Response System for Small/Medium-Scale Office BuildingsToshihiro Mega, Shinji Kitagami, Shigenori Kawawaki, Noriyuki Kushiro. 291-295 [doi]
- Load Experiment of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural OrganizationsKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 296-301 [doi]
- Microservice-Based IoT for Smart BuildingsKevin Khanda, Dilshat Salikhov, Kamill Gusmanov, Manuel Mazzara, Nikolaos Mavridis. 302-308 [doi]
- Group Detection Based on User-to-User Distance in Everyday Life for Office Lunch Group RecommendationRyota Koshiba, Yuko Hirabe, Manato Fujimoto, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto. 309-314 [doi]
- Developing Control and Monitor System with Recording of Operational Expense of Electrical DevicesSiti Sendari, Heru Wahyu Herwanto, Yuni Rahmawati, Dendi Mukti Putranto, Fauzy Satrio Wibowo, Indriyani Rachman, Matsumoto Toru. 315-320 [doi]
- Enterprise Digital Rights Management for Document ProtectionRajidi Satish Chandra Reddy, Srinivas Reddy Gopu. 321-326 [doi]
- Topic-Based Selective Delivery of Event Messages in Peer-to-Peer Model of Publish/Subscribe Systems in Heterogeneous NetworksHiroki Nakayama, Emi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 327-334 [doi]
- Effective Content Management Technique Based on Cooperation Cache among Neighboring Routers in Content-Centric NetworkingMiho Aoki, Tetsuya Shigeyasu. 335-340 [doi]
- Deep Learning Analysis of Amodal Completion CAPTCHA with Colors and Hidden PositionsTomoka Azakami, Ryuya Uda. 341-346 [doi]
- DNSNAv4: DNS Name Autoconfiguration for Internet-of-Things Devices in IPv4 NetworksKeuntae Lee, Seokhwa Kim, Jaehoon (Paul) Jeong. 347-351 [doi]
- Architecture for Automatic Generation of User Interaction Guides with Intelligent AssistantInchul Hwang, Jinhe Jung, Jaedeok Kim, Youngbin Shin, Jeong-Su Seol. 352-355 [doi]
- OCF: A New Open IoT ConsortiumSoohong Park. 356-359 [doi]
- TOMS: TCP Context Migration Scheme for Efficient Data Services in Vehicular NetworksJunsik Jeong, Yiwen Chris Sheny, Jaehoon (Paul) Jeong, Tae Tom Oh, Jung-Hyun Jun, Sang Hyuk Son. 360-364 [doi]
- Design and Implementation of Vehicular Network Simulator for Data Forwarding Scheme EvaluationBien Aime Mugabarigira, Yiwen Chris Shen, Jaehoon (Paul) Jeong, Tae (Tom) Oh, Sang Hyuk Son. 365-369 [doi]
- An Assistive System for Android Malware Analysis to Increase Malware Analysis EfficiencySuyash Jadhav, Tae Tom Oh, Jaehoon (Paul) Jeong, Young-Ho Kim, Jeong Neyo Kim. 370-374 [doi]
- Design of a Secure Digital Recording Protection System with Network Connected DevicesHyoungshick Kim. 375-378 [doi]
- MRSIM: Mitigating Reducer Skew In MapReduceLei Chen, Wei Lu, Xiaoping Che, Weiwei Xing, Liqiang Wang, Yong Yang. 379-384 [doi]
- Application-Aware Realtime Monitoring with Data Visualization in OpenFlow-Based NetworkYun-Zhan Cai, Chia-Ying Lin, Meng-Hsun Tsai. 385-390 [doi]
- Performance Implication and Analysis of the OpenFlow SDN ProtocolAliyu Lawal Aliyu, Peter Bull, Ali Abdallah. 391-396 [doi]
- A Software Measurement Framework Guided by Support Vector MachinesSarah A. Dahab, Stephane Maag, Xiaoping Che. 397-402 [doi]
- Toward a Flexible and Scalable Monitoring Framework in Software-Defined NetworksXuan Thien Phan, Kensuke Fukuda. 403-408 [doi]
- The Regressive QoE Model for VoLTEChing-Fang Yang. 409-414 [doi]
- Performance Evaluations of LXC Based Educational Cloud in a Bare Metal ServerMinoru Uehara. 415-420 [doi]
- An Adaptive DTN Routing Protocol Considering Replication StateYoshishige Kuronuma, Hiroyuki Suzuki, Akio Koyama. 421-426 [doi]
- Energy-Aware Volunteer Computing Using Solar Photovoltaics and Older Models of Single Board ComputersMotoi Yamagiwa, Minoru Uehara. 427-432 [doi]
- Dependable Small World Network ArchitecturesHideki Mori, Minoru Uehara. 433-437 [doi]
- An Evaluation of Psychological-Competitive Ability for Rugby Players Using the Analytic Hierarchy ProcessKoichiro Aoki, Minoru Uehara, Chieko Kato, Hiroyuki Hirahara. 438-442 [doi]
- Design of a Sports Mental CloudXu Gao, Minoru Uehara. 443-448 [doi]
- Research on Giant Isopod Concerning the Importance of Biodiversity and Its Publicity by Using ICTAzusa Ono, Terutoshi Tada, Hiroyuki Kose. 449-454 [doi]
- Relationship between a Rugby Player's Personality, Length of Experience and Personality and PositionNatsumi Yamagata, Yoshinori Watanuki, Koichiro Aoki, Chieko Kato. 455-460 [doi]
- Space Time Block Codes Finite Feedback Schemes for Power-Line CommunicationsShu-Ming Tseng, Chun-Chieh Chen. 461-466 [doi]
- A Dynamic Reward Model Using SDP-Based MechanismWan-Hsun Hu, Ying-Che Chen, Fang-Sun Lu, Jeu-Yih Jeng. 467-471 [doi]
- Heterogeneous Interconnection between SDN and Layer2 Networks Based on NSITa-Yuan Chou, Wun-Yuan Huang, Hui-Lan Lee, Te-Lung Liu, Joe Mambretti, Jim Hao Chen, Fei Yeh. 472-477 [doi]
- A Visible Light Vessel Navigation Mechanism for Waterway Management SystemShih-Hao Chang, Kuei-Ping Shih. 478-483 [doi]
- Mobile Data Usage Prediction System and MethodYueh-Ting Lai, Ya-Ping Wu, Chia-Hsuan Yu, Fang-Sun Lu, Chi-Hua Chen. 484-486 [doi]
- Location Recommendation and Power Adjustment for D2D Communication Underlying LTE Cellular NetworksChiapin Wang, Fang-Ru Fu, Meng-Yuan Tsai. 487-491 [doi]
- Comparison Data Traffic Scheduling Techniques for Classifying QoS over 5G Mobile NetworksMohammed Dighriri, Ali Saeed Dayem Alfoudi, Gyu Myoung Lee, Thar Baker, Rubem Pereira. 492-497 [doi]
- Stacked Denoising Autoencoder-Based Deep Collaborative Filtering Using the Change of SimilarityYosuke Suzuki, Tomonobu Ozaki. 498-502 [doi]
- Sequential Representation of Clinical Data for Full-Fitting Survival PredictionJianfei Zhang, Lifei Chen, Aurélien Bach, Josiane Courteau, Alain Vanasse, Shengrui Wang. 503-508 [doi]
- Extraction of Characteristic Sets of Ingredients and Cooking Actions on Cuisine TypeTomonobu Ozaki, Xia Gao, Mako Mizutani. 509-513 [doi]
- Tracking Positions of Human Body Parts Based on Distance Measurement with Sound WaveMasatoshi Matsumoto, Kazumasa Kaneta, Miyabi Naruoka, Hiroshi Tanaka, Kosuke Takano. 514-518 [doi]
- A General Framework for Privacy Preserving Sequential Data PublishingA. S. M. Touhidul Hasan, Qingshan Jiang. 519-524 [doi]
- Extraction of Characteristic Frequent Visual Patterns by Distributed RepresentationSaki Kawanobe, Tomonobu Ozaki. 525-530 [doi]
- Improvement of the Interface of Smartphone for an Active Learning with High Learning ConcentrationNoriyasu Yamamoto, Noriki Uchida. 531-534 [doi]
- The Need for Audit-Capable E-Voting SystemsSuzanne Mello-Stark, Edmund A. Lamagna. 535-540 [doi]
- Detecting Anomalies in the Data Residing over the CloudDeepali Arora, Kin Fun Li. 541-546 [doi]
- A Priority-Based Energy Replenishment Scheme for Wireless Rechargeable Sensor NetworksChi-Ming Yang, Kuei-Ping Shih, Shih-Hao Chang. 547-552 [doi]
- Secure Data Collection Scheme for Wireless Sensor NetworksRen-Junn Hwang, Yan Zhi Huang. 553-558 [doi]
- BSQ: Barrier Coverage Mechanism for Guaranteeing Surveillance Quality in Wireless Sensor NetworksXuemei Shao, Guilin Chen, Shenghui Zhao, Jinjun Liu, Chih-Yung Chang. 559-563 [doi]
- Applying a Fuzzy-Based Dynamic Channel Allocation Mechanism to Cognitive Radio NetworksYing-Hong Wang, Shou-Li Liao. 564-569 [doi]
- An Off-Line Mobile Payment Protocol Providing Double-Spending DetectionRaylin Tso, Chen-Yi Lin. 570-575 [doi]
- A Passive Localization Scheme Based on Channel State Information in an Indoor EnvironmentHongli Yu, Guilin Chen, Shenghui Zhao, Chih-Yung Chang. 576-580 [doi]
- Campus Digital Signage: Connection of Correlated Information between Distributor and ReceiverYilang Wu, Tatsuki Kawaguchi, Lei Jing, Junbo Wang, Zixue Cheng. 581-582 [doi]
- A Panorama-Based Book Searching Service for LibrariesHsuan-Pu Chang, Yue Li, Sheng-Hong Yu. 583-585 [doi]
- FPGA Implementation of VLC Communication TechnologyHaochang Guo, Ka Lok Man, Qilei Ren, Qian Huang, Vladimir Hahanov, Eugenia Litvinova, Svetlana Chumachenko. 586-590 [doi]
- A Study of Content-Aware Classification of POIChieh-Chi Chiu, Zhong-Xing Xie, Hsin-Wen Wei, Wei-Tsong Lee. 591-596 [doi]
- Construction of a Metadata Schema for Medical Data in Networking ApplicationsChi-Jane Chen, Tun-Wen Pai, Jhen-Li Huang, Ying-Tsang Lo, Shih-Syun Lin, Chun-Chao Yeh. 597-600 [doi]
- A MRT Daily Passenger Flow Prediction Model with Different Combinations of Influential FactorsLijuan Liu, Rung Ching Chen. 601-605 [doi]
- Extensible Activity Recognition System for Behavior SupportTomoharu Imai, Kazuki Matsui. 606-611 [doi]
- Face Liveness Verification Based on Hyperspectrum AnalysisYiFei Liu, Min Zheng, Qingyong Li. 612-615 [doi]
- Adaptive Thresholding for Skin Lesion Segmentation Using Statistical ParametersAshmita Gupta, Ashish Issac, Malay Kishore Dutta, Hui-Huang Hsu. 616-620 [doi]
- Disaster Information Sharing System Considering Communication Status and Elapsed TimeYoshitaka Shibata, Tatsuya Goto, Goshi Sato, Koji Hashimoto. 621-626 [doi]
- Information Communication System Consisted of Multiple Unmanned Aerial Vehicles on DisasterYoshitaka Shibata, Norifumi Tanaka, Noriki Uchida. 627-632 [doi]
- Imprementation of Shift Array Antenna Control Systems with Image Recognitions for Vehicle-to-Vehicle NetworksNoriki Uchida, Ryo Ichimaru, Kenta Ito, Tomoyuki Ishida, Yoshitaka Shibata. 633-638 [doi]
- Research on Realization of a Multi-hop Network Based on Delay Tolerant Network on DisastersYoshitaka Shibata, Shinya Kitada, Goshi Sato, Koji Hashimoto. 639-644 [doi]
- IoT Based Mobility Information Infrastructure in Challenged Network Environment toward Aging SocietyYoshitaka Shibata, Goshi Sato. 645-648 [doi]
- An Implementation of Operation Method for Disaster GIS on Ultra Definition DisplayYoshitaka Shibata, Akira Sakuraba, Tomoyuki Ishida, Koji Hashimoto. 649-654 [doi]
- Road Surface Condition Understanding and Sharing System Using Various Sensing TechnologiesKenta Ito, Go Hirakawa, Koji Hashimoto, Yoshikazu Arai, Yoshitaka Shibata. 655-658 [doi]
- Development of Light-Weight Information Sharing System for Disaster Volunteer HeadquarterHiroaki Yuze, Shinichi Nabeta, Kazuki Matsunaga. 659-663 [doi]
- Proposal of a Disaster Information Cloud System for Disaster Prevention and ReductionYusuke Hirohara, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata. 664-667 [doi]
- Correlation of Digital Evidences in Forensic Investigation through Semantic TechnologiesFlora Amato, Giovanni Cozzolino, Antonino Mazzeo, Nicola Mazzocca. 668-673 [doi]
- Formal Procedural Content Generation in Games Driven by Social AnalysesFlora Amato, Francesco Moscato. 674-679 [doi]
- A Deterministic Approach to Improve Inter-Domain Parallelism of Clustered MPSoC InterconnectsEdoardo Fusella. 680-685 [doi]
- Multilayer Perceptron: An Intelligent Model for Classification and Intrusion DetectionFlora Amato, Nicola Mazzocca, Francesco Moscato, Emilio Vivenzio. 686-691 [doi]
- Automatic Personalization of Visiting Path Based on Users BehaviourFlora Amato, Giovanni Cozzolino, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì. 692-697 [doi]
- DiG-Park: A Smart Parking Availability Searching Method Using V2V/V2I and DGP-Class ProblemWalter Balzano, Fabio Vitale. 698-703 [doi]
- Let's Gossip: Exploring Malware Zero-Day Time Windows by Social Network AnalysisFiammetta Marulli, Francesco Mercaldo. 704-709 [doi]
- Comparison of Theoretical and Practical Performances with 802.11n and 802.11ac Wireless NetworkingDavid Newell, Philip Davies, Russell Wade, Perry Decaux, Mak Sharma. 710-715 [doi]
- Impact of Cell Load on 5GHz IEEE 802.11 WLANMamun I. Abu-Tair, Saleem N. Bhatti. 716-721 [doi]
- A Testbed for Admission Control in WLANs: Effects of RSSI on Connection Keep-Alive TimeTakaaki Inaba, Kosuke Ozera, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 722-729 [doi]
- A Wireless Sensor Networks Balanced Energy Consumption ProtocolNaeem Jan, Ahmad Raza Hameed, Babar Ali, Rahim Ullah, Kaleem Ullah, Nadeem Javaid. 730-736 [doi]