Abstract is missing.
- Optimized Handover Mechanism between eNBs and the Dynamic Network of HeNBs in 3GPP LTEMohamed Emam Mohamed Fathy. 1-8 [doi]
- Investigating Latency in GNU Software Radio with USRP Embedded Series SDR PlatformNguyen B. Truong, Chansu Yu. 9-14 [doi]
- Proposal of Data Triage Methods for Disaster Information Network System Based on Delay Tolerant NetworkingNoriki Uchida, Noritaka Kawamura, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori. 15-21 [doi]
- On Protected Traffic Routing in Wireless Networks with Partial Multiple Link FailuresMichal Pióro, Dritan Nace, Yoann Foquet. 22-28 [doi]
- AM-DisCNT: Angular Multi-hop DIStance Based Circular Network Transmission Protocol for WSNsA. Rao, M. Akbar, Nadeem Javaid, S. N. Mohammad, S. Sarfraz. 29-35 [doi]
- A Novel Approach for Faulty Sensor Detection and Data Correction in Wireless Sensor NetworkAlfonso Farruggia, Salvatore Vitabile. 36-42 [doi]
- DREEM-ME: Distributed Regional Energy Efficient Multi-hop Routing Protocol Based on Maximum Energy in WSNsN. Amjad, Nadeem Javaid, A. Haider, A. A. Awan, M. Rahman. 43-48 [doi]
- OLDA: An Efficient On-Line Data Aggregation Method for Wireless Sensor NetworksMeisam Kamarei, Mojtaba Hajimohammadi, Ahmad Patooghy, Mahdi Fazeli. 49-53 [doi]
- A Framework for Solving the Configuration Problem in Wireless Sensor NetworksAda Gogu, Dritan Nace, Yacine Challal. 54-60 [doi]
- Mesh Router Node Placement in Wireless Mesh Networks Considering Different Initial Router Placement MethodsTetsuya Oda, Shinji Sakamoto, Evjola Spaho, Admir Barolli, Fatos Xhafa. 61-67 [doi]
- Effects of Selection Operators for Mesh Router Placement in Wireless Mesh Networks Considering Weibull Distribution of Mesh ClientsAdmir Barolli, Tetsuya Oda, Leonard Barolli, Evjola Spaho, Fatos Xhafa, Makoto Takizawa. 68-73 [doi]
- Performance Comparison for Different Communication Distances of Mesh Routers in WMN-SA Simulation SystemShinji Sakamoto, Elis Kulla, Tetsuya Oda, Leonard Barolli, Makoto Ikeda, Fatos Xhafa. 74-79 [doi]
- Mesh Net Viewer: A Visualization System for Wireless Mesh NetworksYuki Kumata, Akio Koyama. 80-87 [doi]
- REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNsA. Haider, Nadeem Javaid, N. Amjad, A. A. Awan, A. Khan, N. Khan. 88-92 [doi]
- AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor NetworksMohsin Raza Jafri, S. Ahmed, Nadeem Javaid, Z. Ahmad, R. J. Qureshi. 93-99 [doi]
- LPCH and UDLPCH: Location-Aware Routing Techniques in WSNsY. Khan, Nadeem Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah. 100-105 [doi]
- Braided Disjoint Branch Routing Protocol for WSNsAzeddine Attir, Yacine Challal, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah. 106-113 [doi]
- Target Identification by Radar Sensor Networks with Variable-Interval Sampling and Linear InterpolationJen-Shiun Chen. 114-119 [doi]
- BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surrounding a BuildingShinya Matsuo, Weihua Sun, Naoki Shibata, Tomoya Kitani, Minoru Ito. 120-127 [doi]
- ACK with Interference Detection Technique for ZigBee Network under Wi-Fi InterferenceZhipeng Wang, Tianyu Du, Yong Tang, Dimitrios Makrakis, Hussein T. Mouftah. 128-135 [doi]
- A Novel Coordinated Method with Enhanced Feedback in MIMO Cooperate CommunicationsYingni Zhang, Xiaofeng Tao, Dejian Xu. 136-140 [doi]
- Performance Analysis of a Positioning Algorithm Using Raw Measurements Taken from a GPS ReceiverAlban Rakipi, Enik Shytermeja, Shkelzen Cakaj, Rozeta Miho, Bexhet Kamo. 141-145 [doi]
- Coverage Estimation in Floorplan Visual Sensor NetworksAhmad Movahedian Attar, M. Hamed Izadi, Maedeh Movahedian, Shantia Yarahmadian. 146-150 [doi]
- Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor NetworksCesare Celozzi, Filippo Gandino, Maurizio Rebaudengo. 151-157 [doi]
- MODLEACH: A Variant of LEACH for WSNsD. Mahmood, Nadeem Javaid, S. Mahmood, S. Qureshi, A. M. Memon, T. Zaman. 158-163 [doi]
- M-GEAR: Gateway-Based Energy-Aware Multi-hop Routing Protocol for WSNsQ. Nadeem, M. B. Rasheed, Nadeem Javaid, Z. A. Khan, Y. Maqsood, A. Din. 164-169 [doi]
- A Power Control Mechanism Based on Priority Grouping for Small Cell NetworksAntonios G. Alexiou, Dimitrios Bilios, Christos Bouras. 170-176 [doi]
- Rapid Ray Tracing Analysis of Scattered Field from an Aircraft Model in Super Wide AreaJunichi Honda, Takuya Otsuyama. 177-183 [doi]
- Context Aware Identity Management Using Smart PhonesVamsi Paruchuri, Sriram Chellappan. 184-190 [doi]
- Evaluation of a Hybrid Method of User Location AnonymizationKenta Miura, Fumiaki Sato. 191-198 [doi]
- Evaluation of a MANET Testbed for Central Bridge and V-Shape Bridge Scenarios Using BATMAN Routing ProtocolElis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Bexhet Kamo. 199-205 [doi]
- Distance Aware Relaying Energy-Efficient: DARE to Monitor Patients in Multi-hop Body Area Sensor NetworksA. Tauqir, Nadeem Javaid, S. Akram, A. Rao, S. N. Mohammad. 206-213 [doi]
- THE-FAME: THreshold Based Energy-Efficient FAtigue MEasurement for Wireless Body Area Sensor Networks Using Multiple SinksS. Akram, Nadeem Javaid, A. Tauqir, A. Rao, S. N. Mohammad. 214-220 [doi]
- SIMPLE: Stable Increased-Throughput Multi-hop Protocol for Link Efficiency in Wireless Body Area NetworksQ. Nadeem, Nadeem Javaid, S. N. Mohammad, M. Y. Khan, S. Sarfraz, M. Gull. 221-226 [doi]
- Measuring Fatigue of Soldiers in Wireless Body Area Sensor NetworksNadeem Javaid, S. Faisal, Z. A. Khan, D. Nayab, M. Zahid. 227-231 [doi]
- Non-invasive Induction Link Model for Implantable Biomedical Microsystems: Pacemaker to Monitor Arrhythmic Patients in Body Area NetworksA. Tauqir, S. Akram, A. H. Khan, Nadeem Javaid, M. Akbar. 232-237 [doi]
- Modeling and Performance Analysis of Scalable Web Servers Deployed on the CloudA. M. Aljohani, D. R. W. Holton, Irfan Awan. 238-242 [doi]
- The Evaluations of Energy Management Methods in Supersaturated CloudYuichiro Takabe, Minoru Uehara. 243-247 [doi]
- Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency ManagementAhmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal. 248-252 [doi]
- Energy-Efficient Dynamic Clusters of ServersDiawaer Doulikun, Ailixier Aikebaier, Tomoya Nokido, Makoto Takizawa. 253-260 [doi]
- Known-Key Attack-Resilient Cluster Key ManagementGowun Jeong, Hyun S. Yang, Sang-Soo Yeo, Yong-Ho Seo. 261-264 [doi]
- SPTrust: Reputation Aggregation Method Based on Similarity to Reputation Scores of Power Nodes in Unstructured P2P NetworksSonoko Takeda, Hiroki Ushikubo, Hiroshi Shigeno. 265-272 [doi]
- Empirical Evidence for Non-equilibrium Behaviors within Peer-to-Peer Structured BotnetsDeepali Arora, Teghan Godkin, Adam Verigin, Stephen W. Neville. 273-281 [doi]
- An IoT-Based System for Supporting Children with Autism Spectrum DisorderArdiana Sula, Evjola Spaho, Keita Matsuo, Leonard Barolli, Rozeta Miho, Fatos Xhafa. 282-289 [doi]
- A Health Management Support System Using Fuzzy TheoryAkio Koyama, Kanako Endo. 290-295 [doi]
- Investigating the Effect of HELLO Validity Time of OLSR in a MANET TestbedMasahiro Hiyama, Elis Kulla, Shinji Sakamoto, Makoto Ikeda, Leonard Barolli. 296-301 [doi]
- Performance Evaluation of AODV Routing Protocol in VANETs Considering Multi-flows TrafficEvjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vladi Kolici, Jiro Iwashige. 302-307 [doi]
- Efficient Coupling of Routing and Location-based Service for VANETsMarwane Ayaida, Hacène Fouchal, Yacine Ghamri-Doudane, Lissan Afilal. 308-315 [doi]
- Reliable Data Delivery in Vehicular Ad Hoc NetworksMahantesh G. Kambalimath, S. K. Mahabaleshwar, S. S. Manvi. 316-322 [doi]
- Effect of Buildings in VANETs Communication: Performance of OLSR Protocol for Video Streaming ApplicationTaiki Honda, Makoto Ikeda, Evjola Spaho, Masahiro Hiyama, Leonard Barolli. 323-327 [doi]
- Local Search and Genetic Algorithms for Satellite Scheduling ProblemsVladi Kolici, Xavier Herrero, Fatos Xhafa, Leonard Barolli. 328-335 [doi]
- Differentiating the Starting Time of Processes in Energy-Efficient Redundant Execution AlgorithmTomoya Enokido, Ailixier Aikebaier, Makoto Takizawa. 336-343 [doi]
- Real-Time Hand Pose Recognition Based on a Neural Network Using Microsoft KinectSalvatore Sorce, Vito Gentile, Antonio Gentile. 344-350 [doi]
- Network Anomaly Detection for M-Connected SCADA NetworksSi-Jung Kim, Bong-Han Kim, Sang-Soo Yeo, Do-Eun Cho. 351-354 [doi]
- Data Transfer in Delay-Tolerant NetworksRonan Bocquillon, Antoine Jouglet. 355-359 [doi]
- A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection CoreYi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo, William Cheng-Chung Chu. 360-365 [doi]
- A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce SecuritySen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu. 366-371 [doi]
- An Analysis of Operating Efficiency in Senior Citizen Welfare Institutions - Application of Bounded-Variable and Meta-frontier Data Envelopment AnalysisChing-Yu Chen, Jwu Rong Lin, Tso-Kwei Peng, Ya-Han Yu. 372-377 [doi]
- An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's Senior Care Market: A Case Study of Fitness Equipment IndustrySueming Hsu, Yalan Chan, Kai-I. Huang, Fang-Yie Leu. 378-381 [doi]
- The Simulation of a Robot with Emotions Implemented with Fuzzy LogicYa-Ting Hsu, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu. 382-386 [doi]
- A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical ImagesRaffaele Pizzolante, Bruno Carpentieri, Arcangelo Castiglione. 387-392 [doi]
- A Study on the Integration of ISO 27001 & 27011 and the New Personal Information Protection Act in the Telecom Enterprises in TaiwanI.-Long Lin, Che-Min Lin, Che-Jui Sun. 393-398 [doi]
- A Handover Scheme for LTE Wireless Networks under the Assistance of GPSYu-Shin Huang, Fang-Yie Leu, Jung-Chun Liu, Yi-Li Huang, William Cheng-Chung Chu. 399-403 [doi]
- Improve Two Remote User Authentication Scheme Using Smart CardChin-Ling Chen, Wei-Chen Tsai, Fang-Yie Leu. 404-407 [doi]
- Diffracted Fields in Buildings and Wedges: A Comparison StudyJiro Iwashige, Leonard Barolli, Saki Kameyama, Motohiko Iwaida. 408-413 [doi]
- Path Loss Estimation for Analytically Expressed Inhomogeneous Random Rough SurfaceKazunori Uchida, Masafumi Takematsu, Junichi Honda. 414-421 [doi]
- Resonance of Cavity in Two-Dimensional Square-Lattice Photonic Crystal by Metallic PillarsHiroshi Maeda, Kiyotoshi Yasumoto, Kazuya Tomiura, Huili Chen, Daichi Ogata. 422-426 [doi]
- Interferometric Coherence Optimization: A Comparative StudySofiane Tahraoui, Mounira Ouarzeddine, Boularbah Souissi. 427-431 [doi]
- Effect of Roadside APs in VANETs: A Comparison StudyMakoto Ikeda, Taiki Honda, Evjola Spaho, Masahiro Hiyama, Leonard Barolli. 432-436 [doi]
- A Quantitative Measure of the Security Risk Level of Enterprise NetworksRashid Munir, Jules Pagna Disso, Irfan Awan, Muhammad Rafiq Mufti. 437-442 [doi]
- A Plausible Solution to SCADA Security Honeypot SystemsJules Pagna Disso, Kevin Jones, Steven Bailey. 443-448 [doi]
- CMMI Security Model for Cloud Manufacturing System's NetworkAnna Kang, Jong Hyuk Park, Leonard Barolli, Hwa-Young Jeong. 449-452 [doi]
- Metabolic Ring: Tape Based Renewable SystemMinoru Uehara, Hideki Mori. 453-458 [doi]
- A Survey of Home Energy Management Systems in Future Smart Grid CommunicationsNadeem Javaid, I. Khan, M. N. Ullah, A. Mahmood, M. U. Farooq. 459-464 [doi]
- Very High Resolution Satellite Images FilteringAssia Kourgli, Youcef Oukil. 465-470 [doi]
- Classification of Dayas Formations on Landsat TM Imagery Using Morphological ProfilesAkila Kemmouche, Nassim Atmani. 471-475 [doi]
- Image Medical Diagnostic Using Dynamic ProgrammingMinh Hoan Pham, Andrei Doncescu, Sébastien Régis. 476-480 [doi]
- Parallel Greedy Randomized Adaptive Search Procedure with Delay and Delay Variation for RP Selection in PIM-SM Multicast RoutingYoussef Baddi, Mohamed Dâfir Ech-Cherif El Kettani. 481-487 [doi]
- Default Logic for Diagnostic of Discrete Time SystemTan Le, Andrei Doncescu, Pierre Siegel. 488-493 [doi]
- Group Communication Protocols Based on Hybrid Types of Logical and Physical ClocksDiawaer Doulikun, Ailixier Aikebaier, Tomoya Nokido, Makoto Takizawa. 494-499 [doi]
- Design and Implementation of a Cache-less P2P Web ProxyMasashi Nishimine, Kazunori Ueda. 500-505 [doi]
- Dynamic Data Forwarding in Wireless Sensor NetworksS. M. Iddalagi, S. K. Mahabaleshwar. 506-511 [doi]
- Energy-Efficient Routing Based on Geo-location for Heterogeneous Sensor NetworksUsama Iqbal, Muhammad Mohsin Rahmatullah. 512-517 [doi]
- Managing a Coastal Sensors Network in a Nowcast-Forecast Information SystemJoao Gomes, Marta Rodrigues, Alberto Azevedo, Gonçalo Jesus, Joao Rogeiro, Anabela Oliveira. 518-523 [doi]
- The Accuracy Enhancement of GPS Track in Google MapJen-Yung Lin, Bo-Kai Yang, Tuan Anh Do, Hsing-Chung (Jack) Chen. 524-527 [doi]
- Analysis and Modeling of Network Connectivity in Routing Protocols for MANETs and VANETsS. N. Mohammad, M. J. Ashraf, S. Wasiq, S. Iqbal, Nadeem Javaid. 528-533 [doi]
- Modeling Probability of Path Loss for DSDV, OLSR and DYMO above 802.11 and 802.11pS. N. Mohammad, S. Wasiq, W. Arshad, Nadeem Javaid, S. Khattak, M. J. Ashraf. 534-538 [doi]
- A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc NetworksHsing-Chung (Jack) Chen, Jen-Yung Lin. 539-544 [doi]
- Residential Energy Consumption Controlling Techniques to Enable Autonomous Demand Side Management in Future Smart Grid CommunicationsM. N. Ullah, Nadeem Javaid, I. Khan, A. Mahmood, M. U. Farooq. 545-550 [doi]
- Bring Your Own Calendar: A CalDAV-Based Virtual Calendar SystemYoshinari Nomura, Yuya Murata, Hideo Taniguchi, Masakazu Urata, Shinyo Muto. 551-556 [doi]
- Development of Lecture Videos Delivery System using HTML5 Video ElementHiroki Mori, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe. 557-559 [doi]
- The Design and Development of an On-Line 3DCG Builder for Multi-playerNingping Sun, Kousei Hayata. 560-565 [doi]
- Development of Network User Authentication System Using OpenFlowShohei Yamashita, Hisaharu Tanaka, Yoshiaki Hori, Makoto Otani, Kenzi Watanabe. 566-569 [doi]
- Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless NetworkWataru Tsuda, Yoshiaki Hori, Kouichi Sakurai. 570-574 [doi]
- A Token-based Illicit Copy Detection Method Using Complexity for a Program ExerciseMai Iwamoto, Shunsuke Oshima, Takuo Nakashima. 575-580 [doi]
- Foreground Extraction Algorithm Using Depth Information for Image SegmentationSang Wook Lee, Hyun S. Yang, Yong-Ho Seo. 581-584 [doi]
- Study on Method of New Digital Watermark Generation Using QR-CodeDae-Jea Cho. 585-588 [doi]
- An Integrated System of Robot, SmartBox and RFID as an Approach for Internet of ThingsEvjola Spaho, Ardiana Sula, Keita Matsuo, Leonard Barolli, Fatos Xhafa, Jiro Iwashige. 589-594 [doi]
- Consistency Checking Rules of Variability in Software Product LinesJeong Ah Kim, Sehoon Kim. 595-597 [doi]
- Real Time Eye Blinking Detection Using Local Ternary Pattern and SVMJong Bin Ryu, Hyun S. Yang, Yong-Ho Seo. 598-601 [doi]
- Design of Cursive Handwriting Characters with Nonlinear Typeface Reshaping TransformationHirotsugu Matsukida, Hiroyuki Fujioka. 602-607 [doi]
- Design of Scenario-Based Architecture for Supporting Interoperability among Heterogeneous Home Network MiddlewaresJae-Hyuk Cho. 608-613 [doi]
- Surveillance Architecture of Evolutional Agent System on Repository-Based Agent FrameworkTakahiro Uchiya, Tetsuo Kinoshita. 614-617 [doi]
- A Method to Configure Autonomous Sensor NodesHideki Hara. 618-621 [doi]
- A Design of State Acquisition Function Using Range Image Sensor for 3D Symbiotic SpaceTakuya Kawamura, Toru Abe, Takuo Suganuma. 622-627 [doi]
- Autonomous Control Method Using AI Planning for Energy-Efficient Network SystemsKouta Awahara, Satoru Izumi, Toru Abe, Takuo Suganuma. 628-633 [doi]