Abstract is missing.
- Electricity Load Forecasting in Smart Grids Using Support Vector MachineNasir Ayub, Nadeem Javaid, Sana Mujeeb, Maheen Zahid, Wazir Zada Khan, Muhammad Umar Khattak. 1-13 [doi]
- Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy WalkAyesha Anjum Butt, Zahoor Ali Khan, Nadeem Javaid, Annas Chand, Aisha Fatima, Muhammad Talha Islam. 14-25 [doi]
- On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart HomeSajjad Khan, Zahoor Ali Khan, Nadeem Javaid, Waleed Ahmad, Raza Abid Abbasi, Hafiz Muhammad Faisal. 26-38 [doi]
- Towards Efficient Energy Management in a Smart Home Using Updated PopulationHafiz Muhammad Faisal, Nadeem Javaid, Zahoor Ali Khan, Fahad Mussadaq, Muhammad Akhtar, Raza Abid Abbasi. 39-52 [doi]
- A New Memory Updation Heuristic Scheme for Energy Management System in Smart GridWaleed Ahmad, Nadeem Javaid, Sajjad Khan, Maria Zuraiz, Tayyab Awan, Muhammad Amir, Raza Abid Abbasi. 53-66 [doi]
- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart GridSahibzada Muhammad Shuja, Nadeem Javaid, Muhammad Zeeshan Rafique, Umar Qasim, Raja Farhat Makhdoom Khan, Ayesha Anjum Butt, Murtaza Hanif. 67-81 [doi]
- Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart HomeRaza Abid Abbasi, Nadeem Javaid, Shujat ur Rehman, Amanulla, Sajjad Khan, Hafiz Muhammad Faisal, Sajawal Ur Rehman Khan. 82-94 [doi]
- Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination AlgorithmMuhammad Abdullah, Nadeem Javaid, Inam Ullah Khan, Zahoor Ali Khan, Annas Chand, Noman Ahmad. 95-107 [doi]
- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO SystemsShigenari Nakamura, Tomoya Enokido, Leonard Barolli, Makoto Takizawa 0001. 108-119 [doi]
- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power LossesShohreh Monshizadeh, Gunne John Hegglid, Svein Thore Hagen. 120-131 [doi]
- Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) ModelRyuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 132-143 [doi]
- Energy-Efficient Group Migration of Virtual Machines in a ClusterDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 144-155 [doi]
- A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy LogicKevin Bylykbashi, Yi Liu 0011, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 156-165 [doi]
- Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition SystemXiaobing Liang, Bing Zhao, Qian Ma, Bang Sun, Baojiang Cui. 166-175 [doi]
- Multi-level Authentication Protocols Using Scientific Expertise ApproachMarek R. Ogiela, Lidia Ogiela. 176-180 [doi]
- Biometric-Based Linguistic Solutions for Data Encryption and SharingUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 181-187 [doi]
- Dependability Analysis for On-Demand Computing Based Transaction Processing SystemDharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Kamlesh Dutta. 188-199 [doi]
- A Comparative Analysis of Trust Requirements in Decentralized Identity ManagementAndreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel. 200-213 [doi]
- Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor NetworksOussama Ghorbel, Aya Ayadi, Rami Ayadi, Mohammed Aseeri, Mohamed Abid. 214-224 [doi]
- The Improved Energy-Efficient Quorum Selection with Excluding Meaningless MethodsTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 225-237 [doi]
- A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received SignalDonald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 238-250 [doi]
- Selection of IoT Devices in Opportunistic Networks: A Fuzzy-Based Approach Considering IoT Device's Selfish BehaviourMiralda Cuka, Donald Elmazi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa 0001. 251-264 [doi]
- Detecting Mental Health Illness Using Short CommentsTakahiro Baba, Kensuke Baba, Daisuke Ikeda. 265-271 [doi]
- On the Weakest Failure Detector for Read/Write-Based Mutual ExclusionCarole Delporte-Gallet, Hugues Fauconnier, Michel Raynal. 272-285 [doi]
- An Active Signaling Mechanism to Reduce Access Collisions in a Distributed TDMA Based MAC Protocol for Vehicular NetworksFouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar. 286-300 [doi]
- Estimation of Tags Using Various Data for Online VideosHiroki Sakaji, Akio Kobayashi, Masaki Kohana, Yasunao Takano, Kiyoshi Izumi. 301-312 [doi]
- Framework for Feature Selection in Health Assessment SystemsAyesha Ubaid, Fan Dong, Farookh Khadeer Hussain. 313-324 [doi]
- A Framework to Achieve Full Waypoint Enforcement in Hybrid SDN NetworksSandhya Rathee, T. Dinesh Ram Kumar, K. Haribabu, Ashutosh Bhatia. 325-340 [doi]
- A New Fuzzy Logic Based Model for Location Trust Estimation in Electric Vehicular NetworksIlhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said. 341-352 [doi]
- Angular Histogram-Based Visualisation of Network Traffic Flow Measurement DataAdrián Pekár, Mona B. H. Ruan, Winston K. G. Seah. 353-365 [doi]
- Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Weibull and Chi-square Client DistributionsAdmir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 366-375 [doi]
- An NSH-Enabled Architecture for Virtualized Network Function PlatformsVinícius Fülber Garcia, Leonardo da Cruz Marcuzzo, Giovanni Venâncio de Souza, Lucas Bondan, Jéferson Campos Nobre, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Elias Procópio Duarte Jr.. 376-387 [doi]
- Personal Book Management Application on BlockchainHiryu Kawaguchi, Yasunao Takano, Hiroshi Sakuta. 388-396 [doi]
- Performance Evaluation of WMNs by WMN-PSOSA System Considering Chi-square and Exponential Client DistributionsShinji Sakamoto, Leonard Barolli, Shusuke Okamoto. 397-406 [doi]
- Realization and Preliminary Evaluation of MPI Runtime Environment on Android ClusterMasahiro Nissato, Hiroki Sugiyama, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota. 407-418 [doi]
- Accelerating the Digital Transformation of Business and Society Through Composite Business EcosystemsShridhar Choudhary, Ian Thomas, Mehdi Bahrami, Motoshi Sumioka. 419-430 [doi]
- An IP Multimedia Subsystem Service Discovery and Exposure Approach Based on Opinion Mining by Exploiting Twitter Trending TopicsArmielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair. 431-445 [doi]
- A Hybrid Cross-Layer Protocol for Wireless Sensor Networks Based on BackbonePiercarlo Fermino Soares, João Carlos Giacomin, Tales Heimfarth. 446-457 [doi]
- Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance EvaluationYan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai. 458-469 [doi]
- Quantifying the Limitations of Learning-Assisted Grammar-Based FuzzingYuma Jitsunari, Yoshitaka Arahori, Katsuhiko Gondow. 470-484 [doi]
- Predicting Elephant Flows in Internet Exchange Point Programmable NetworksMarcus Vinicius Brito da Silva, Arthur Selle Jacobs, Ricardo José Pfitscher, Lisandro Zambenedetti Granville. 485-497 [doi]
- ISDI: A New Window-Based Framework for Integrating IoT Streaming Data from Multiple SourcesDoan Quang Tu, A. S. M. Kayes, Wenny Rahayu, Kinh Nguyen. 498-511 [doi]
- Improving Document Similarity Calculation Using Cosine-Similarity GraphsYasunao Takano, Yusuke Iijima, Kou Kobayashi, Hiroshi Sakuta, Hiroki Sakaji, Masaki Kohana, Akio Kobayashi. 512-522 [doi]
- An Efficient Event-Based Protocol for Emergency Situations in Smart CitiesSediane C. L. Hernandes, Marcelo E. Pellenz, Alcides Calsavara, Manoel Camillo Penna. 523-534 [doi]
- Gossip Message Dissemination Protocols in the Presence of Link InstabilityTakumu Hirooka, Naohiro Hayashibara. 535-545 [doi]
- Analysis of Ethereum Smart Contracts and OpcodesStefano Bistarelli, Gianmarco Mazzante, Matteo Micheletti, Leonardo Mostarda, Francesco Tiezzi. 546-558 [doi]
- Towards 802.11g Signal Strength Estimation in an Industrial Environment: A Practical StudyDalton Cézane Gomes Valadares, Joseana Macêdo Fechine Régis de Araújo, Angelo Perkusich, Marco Aurélio Spohn, Elmar Uwe Kurt Melcher, Natália Porfírio Albuquerque. 559-570 [doi]
- Revealing Storage and Speed Transmission Emerging Technology of Big DataHeru Susanto, Fang-Yie Leu, Didi Rosiyadi, Chen Chin Kang. 571-583 [doi]
- A Web-Based Artwork Editing System Empowered by Neural Style TransferKenta Goto, Hiroaki Nishino. 584-594 [doi]
- Mobile App and Malware Classifications by Mobile Usage with Time DynamicsYong Zheng, Sridhar Srinivasan. 595-606 [doi]
- Improvement of Self Position Estimation of Electric Wheelchair Combining Multiple Positioning MethodsFumiai Sato. 607-618 [doi]
- A Roadside Unit Placement Scheme for Vehicular Ad-hoc NetworksSeif Ben Chaabene, Taoufik Yeferny, Sadok Ben Yahia. 619-630 [doi]
- Personality-Aware Collaborative Learning: Models and ExplanationsYong Zheng, Archana Subramaniyan. 631-642 [doi]
- Interfacer: A Model-Driven Development Method for SDN ApplicationsJoão Eurípedes Pereira Júnior, Flávio de Oliveira Silva, João Henrique de Souza Pereira, Pedro Frosi Rosa. 643-654 [doi]
- Reducing the IEEE 802.11 Beacon Overhead in Low Mobility NetworksGabriel de Carvalho Ferreira, Priscila Solís Barreto, Eduardo Alchieri. 655-666 [doi]
- AXARPS: Scalable ARP Snooping Using Policy-Based Mirroring of Core SwitchesMotoyuki Ohmori, Naoki Miyata, Ichiroh Suzuta. 667-676 [doi]
- DCS-MAC: A Distributed Cross-Layer Communication Protocol for Directional Sensor NetworksShamanth Nagaraju, V. Sreejith, Nipun Sood, Lucy J. Gudino, Mehul Kasliwal, Rajas Kejriwal. 677-689 [doi]
- An MQTT-SN-Based QoS Dynamic Adaptation Method for Wireless Sensor NetworksHelbert da Rocha, Tânia L. Monteiro, Marcelo Eduardo Pellenz, Manuel C. Penna, Joilson Alves Junior. 690-701 [doi]
- Centrality Based Geocasting for Opportunistic NetworksJagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Makoto Takizawa 0001. 702-712 [doi]
- An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G NetworksRicha Siddavaatam, Isaac Woungang, Sanjay Kumar Dhurandher. 713-724 [doi]
- Backhaul-Based Cooperative Caching in Small Cell NetworkYu-Ting Wang, Yun-Zhan Cai, Lo-An Chen, Sian-Jhe Lin, Meng-Hsun Tsai. 725-736 [doi]
- A MEC-Assisted Method for Early Handover Using the Fully Distributed Mobility Management (MEC-F-DMM) ArchitectureChung-Ming Huang, Duy-Tuan Dao, Meng-Shu Chiang. 737-750 [doi]
- Link Level Capacity Analysis of Precoded FBMC/OQAM SystemsJihed Ghodhbane, Noureddine Boujnah, Ridha Bouallegue. 751-761 [doi]
- A QoS-Based Flow Assignment for Traffic Engineering in Software-Defined NetworksLakshmi Priya Thiruvasakan, Quoc-Tuan Vien, Jonathan Loo, Glenford Mapp. 762-774 [doi]
- A UAV-Collaborative Sensing Method for Efficient Monitoring of Disaster SitesAkimitsu Kanzaki, Hideyuki Akagi. 775-786 [doi]
- A Scheme to Improve Stream Transaction Rates for Real-Time IoT ApplicationsChaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo. 787-798 [doi]
- A Video Data Distribution Method for Flexible Bandwidth Allocation in Hybrid Broadcasting EnvironmentsSatoru Matsumoto, Tomoki Yoshihisa. 799-809 [doi]
- Multilingual Entity MatchingIlgiz Mustafin, Marius-Cristian Frunza, Jooyoung Lee. 810-820 [doi]
- Evaluating DASH Player QoE with MPTCP in Presence of Packet LossSunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi. 821-833 [doi]
- VoIP Traffic Management Using a Software-Defined Networking ApproachPaulo Vieira Jr., Adriano Fiorese. 834-845 [doi]
- A Self Healing Microservices Architecture: A Case Study in Docker Swarm ClusterBasel Magableh, Muder Almiani. 846-858 [doi]
- Transparent State Machine Replication for KubernetesFelipe Borges, Luis Pacheco, Eduardo Alchieri, Marcos F. Caetano, Priscila Solís. 859-871 [doi]
- An Optimal Travel Route Recommendation System for Tourists' First Visit to JapanChen Yuan, Minoru Uehara. 872-882 [doi]
- Simulation of Secure Volunteer Computing by Using BlockchainJohjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai. 883-894 [doi]
- A Novel Movie Recommendation System Based on Collaborative Filtering and Neural NetworksChu-Hsing Lin, Hsuan Chi. 895-903 [doi]
- Response to Co-resident Threats in Cloud Computing Using Machine LearningChu-Hsing Lin, Hsiao-Wen Lu. 904-913 [doi]
- Automatic Graph-Based Clustering for Security LogsHudan Studiawan, Christian Payne, Ferdous Sohel. 914-926 [doi]
- Retrieving Text-Based Surrounding Objects in Spatial DatabasesBojie Shen, Md. Saiful Islam, David Taniar, Junhu Wang. 927-939 [doi]
- Forecasting Crypto-Asset Price Using Influencer TweetsHirofumi Yamamoto, Hiroki Sakaji, Hiroyasu Matsushima, Yuki Yamashita, Kyohei Osawa, Kiyoshi Izumi, Takashi Shimada. 940-951 [doi]
- Challenges and Strategies for Developing Decentralized Applications Based on Blockchain TechnologyThanh-Chung Dao, Binh Minh Nguyen, Ba-Lam Do. 952-962 [doi]
- Design of Remote Heart Monitoring System for Cardiac PatientsAfef Ben Jemmaa, Hela Ltifi, Mounir Ben Ayed. 963-976 [doi]
- An Efficient Virtual Machine Placement via Bin Packing in Cloud Data CentersAisha Fatima, Nadeem Javaid, Tanzeela Sultana, Mohammed Y. Aalsalem, Shaista Shabbir, Durr-e-Adan. 977-987 [doi]
- Commodore: Fail Safe Container Scheduling in KubernetesChristos Christodoulopoulos, Euripides G. M. Petrakis. 988-999 [doi]
- Dynamic Ranking System of Cloud SaaS Based on Consumer Preferences - Find SaaS M2NFCPMohammed Abdulaziz Ikram, Nabin Sharma, Muhammad Raza, Farookh Khadeer Hussain. 1000-1010 [doi]
- A Methodology for Automating the Cloud Data Center Availability AssessmentGuto Leoni Santos, Daniel Rosendo, Demis Gomes, Leylane Ferreira, André Moreira, Djamel Sadok, Judith Kelner, Glauco Estacio Gonçalves, Mattias Wilderman, Patricia Takako Endo. 1011-1023 [doi]
- Job Scheduling Simulator for Assisting the Mapping Configuration Between Queue and Computing NodesYuki Matsui, Yasuhiro Watashiba, Susumu Date, Takashi Yoshikawa, Shinji Shimojo. 1024-1033 [doi]
- MVMM: Data Center Scheduler Algorithm for Virtual Machine MigrationNawel Kortas, Habib Youssef. 1034-1046 [doi]
- A Large-Scale Wired Network Energy Model for Flow-Level SimulationsLoic Guegan, Betsegaw Lemma Amersho, Anne-Cécile Orgerie, Martin Quinson. 1047-1058 [doi]
- An Inter-slice Management Solution for Future Virtualization-Based 5G SystemsBorja Bordel, Ramón Alcarria, Diego Sánchez de Rivera, Álvaro Sánchez-Picot. 1059-1070 [doi]
- IoT Security Viewer System Using Machine LearningYuya Kunugi, Hiroyuki Suzuki, Akio Koyama. 1071-1081 [doi]
- Service Oriented Architecture for Interconnecting LoRa Devices with the CloudKonstantinos Tsakos, Euripides G. M. Petrakis. 1082-1093 [doi]
- Self-adaptive RFID Authentication for Internet of ThingsBacem Mbarek, Mouzhi Ge, Tomás Pitner. 1094-1105 [doi]
- Limiting the Influence to Vulnerable Users in Social Networks: A Ratio PerspectiveHuiping Chen, Grigorios Loukides, Jiashi Fan, Hau Chan. 1106-1122 [doi]
- IoT Based Wide Area Road Surface State Sensing and Communication System for Future Safety DrivingYoshitaka Shibata, Akira Sakuraba, Goshi Sato, Noriki Uchida. 1123-1132 [doi]
- Expressing Trust with Temporal Frequency of User Interaction in Online CommunitiesEkaterina Yashkina, Arseny Pinigin, Jooyoung Lee, Manuel Mazzara, Akinlolu Solomon Adekotujo, Adam Zubair, Luca Longo. 1133-1146 [doi]
- Hot Spot Tracking by Time-Decaying Bloom Filters and Reservoir SamplingKai Cheng. 1147-1156 [doi]
- A Fuzzy Logic Based Trust-ABAC Model for the Internet of ThingsHamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said. 1157-1168 [doi]
- Decision Support System Using Trust Planning Among Food-Energy-Water ActorsSuleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens. 1169-1180 [doi]
- iHome: Smart Home Management as a Service in the Cloud and the FogGeorge Myrizakis, Euripides G. M. Petrakis. 1181-1192 [doi]
- Design of Robot Service Functions for a Framework Establishing Human-Machine TrustFumi Ito, Eri Ozawa, Yuka Kato. 1193-1204 [doi]
- A Proposal for a Dynamic Digital Map to Prevent Heatstroke Using IoT DataKanae Matsui, Keiya Sakai. 1205-1216 [doi]
- Analysis of Consumers Perceptions of Food Safety Risk in Social NetworksAlessandra Amato, Walter Balzano, Giovanni Cozzolino, Francesco Moscato 0001. 1217-1227 [doi]
- Implicit and Continuous Authentication of Smart Home UsersNoureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari. 1228-1239 [doi]
- Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage SolutionMuhammad I. H. Sukmana, Kennedy A. Torkura, Hendrik Graupner, Ankit Chauhan, Feng Cheng 0002, Christoph Meinel. 1240-1253 [doi]
- Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third PartyT. Dinesh Ram Kumar, Ashutosh Bhatia, R. C. Hansdah. 1254-1265 [doi]
- Deniable Secret Handshake Protocol - RevisitedSomnath Panja, Sabyasachi Dutta, Kouichi Sakurai. 1266-1278 [doi]
- Detection of Algorithmically Generated Domain Names in BotnetsDeepak Kumar Vishvakarma, Ashutosh Bhatia, Zdenek Ríha. 1279-1290 [doi]
- How Important Are Logs of Ordinary Operations? Empirical Investigation of Anomaly DetectionAkinori Muramatsu, Masayoshi Aritsugi. 1291-1302 [doi]
- Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security ClearanceUdaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar. 1303-1315 [doi]
- Interactive Aggregate Message Authentication Scheme with Detecting FunctionalityShingo Sato, Junji Shikata. 1316-1328 [doi]
- Basic Study on Targeted E-mail Attack Method Using OSINTKota Uehara, Kohei Mukaiyama, Masahiro Fujita, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki. 1329-1341 [doi]
- Network Location Privacy Protection with Multi-access Edge ComputingPing Zhang 0017, Mimoza Durresi, Arjan Durresi. 1342-1352 [doi]