Abstract is missing.
- A Fuzzy-Based Method for Selection of Actor Nodes in Wireless Sensor and Actor NetworksElis Kulla, Tetsuya Oda, Leonard Barolli. 1-7 [doi]
- ACE: Adaptive Cooperation in EEDBR for Underwater Wireless Sensor NetworksH. Nasir, Nadeem Javaid, M. Murtaza, S. Manzoor, Zahoor Ali Khan, Umar Qasim, M. Sher. 8-14 [doi]
- A Study on the Feasibility of Mobile Ad-Hoc Networks Applied to Foreign Objective Debris Detection SystemLiangyou Wang, Liangyou Wang, Wancheng Ge, Haoyu Xu, Han Zhou. 15-19 [doi]
- THEEM: Threshold-Sensitive Energy Efficient Multi-hop Routing Protocol for WSNsW. Raza, I. Khan, F. Arshad, I. Naqvi, Umar Qasim, Zahoor Ali Khan, N. Javai. 20-25 [doi]
- Underwater Wireless Sensor Network's Performance Enhancement with Cooperative Routing and Sink MobilityA. Umar, M. Akbar, S. Ahmed, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim. 26-33 [doi]
- The Study on Three-Stage Matching Algorithm Framework of Semantic SimilarityChijun Zhang, Na Huang, Ying Liu, Zhanwei Du. 34-37 [doi]
- Gaussian Process Machine Learning Based ITO AlgorithmChuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang. 38-41 [doi]
- Overview of Routing Algorithm in Pocket Switched NetworksChuang Ma, Yongjian Yang, Zhanwei Du, Chijun Zhang. 42-46 [doi]
- Research on the User Behavior-Based QoE Evaluation Method for HTTP Mobile StreamingYajun Huang, Wenan Zhou, Yu Du. 47-51 [doi]
- CoDBR: Cooperative Depth Based Routing for Underwater Wireless Sensor NetworksH. Nasir, Nadeem Javaid, H. Ashraf, S. Manzoor, Zahoor Ali Khan, Umar Qasim, M. Sher. 52-57 [doi]
- Research of Optimal Clustering Routing Algorithm for NGB with Small-World PropertyY. Wang, Y. Cui, Y. L. Wang. 58-63 [doi]
- The Location Privacy of Wireless Sensor Networks: Attacks and CountermeasuresLin Zhou, Changsheng Wan, Jie Huang, Bei Pei, Changsong Chen. 64-71 [doi]
- Volunteer Sensor Networks Node Availability Prediction via Stronger Intelligent Selection Optimization AlgorithmYu Wang, Wenbin Zhou, Fanfan Zhou. 72-77 [doi]
- TSDDR: Threshold Sensitive Density Controlled Divide and Rule Routing Protocol for Wireless Sensor NetworksM. Behzad, Nadeem Javaid, A. Sana, M. A. Khan, N. Saeed, Zahoor Ali Khan, Umar Qasim. 78-83 [doi]
- A Novel Text Watermarking Algorithm Based on Graphic Watermarking FrameworkXiaowei Liu, Jin Zhang, Haozhou Wang, Xiaoli Gong, Yuanyuan Cheng. 84-88 [doi]
- Research on Polymorphism and Inertial Reading Application in Text Watermarking AlgorithmYuanyuan Cheng, Jin Zhang, Xiaoli Gong, Haozhou Wang, Xiaowei Liu. 89-95 [doi]
- On the Security of a Remote Data Possession Checking Scheme in Cloud StorageXinlong Liang, Rui Jiang. 96-99 [doi]
- Shorten Reed-Solomon Code for Wireless USBRunfeng Yang, Xiaoning Chen, Jian Zhao. 100-103 [doi]
- Detecting and Defending against Sybil Attacks in Social Networks: An OverviewFaxin Li, Bo Liu, Zhefeng Xiao, Yi Fu. 104-112 [doi]
- Incremental Relay-Based Co-CEStat Protocol for Wireless Body Area NetworksS. Yousaf, S. Ahmed, M. Akbar, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim. 113-119 [doi]
- A GA-Based Simulation System for WMNs: Performance Analysis for Different WMN Architectures Considering TCPTetsuya Oda, Shinji Sakamoto, Admir Barolli, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 120-126 [doi]
- Co-CEStat: Cooperative Critical Data Transmission in Emergency in Static Wireless Body Area NetworkS. Yousaf, S. Ahmed, M. Akbar, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim. 127-132 [doi]
- Optimization of Number of Mesh Routers in WMNs Using WMN-SA System Considering Uniform Distribution for Different Number of Mesh ClientsShinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Santi Caballé, Fatos Xhafa. 133-138 [doi]
- Analysis of WMN-GA Simulation System Results: A Comparison Study for Node Placement in WMNs Considering Exponential and Weibull Distributions and Different Transmission RatesAdmir Barolli, Tetsuya Oda, Leonard Barolli, Fatos Xhafa, Makoto Takizawa, Vincenzo Loia. 139-144 [doi]
- A Low-Complexity Decoding Algorithm for RaptorQ CodeRucheng Zhang, Yajun Kou. 145-150 [doi]
- Non-supervised Rule for Direct Sequence Spread Spectrum Signal Sequence AcquisitionHao Cheng, Zhenghua Luo, Guolin Sun. 151-154 [doi]
- Mobility Model for WBANsMuhammad Moid Sandhu, M. Akbar, M. Behzad, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim. 155-160 [doi]
- Impact of Sensor Sensitivity in Assistive EnvironmentKin Fun Li, Ana-Maria Sevcenco, Lei Cheng. 161-168 [doi]
- The Redundant Delay Time-Based (RDTB) Algorithm for Fault Tolerant Server ClustersTomoya Enokido, Makoto Takizawa. 169-176 [doi]
- Multiple DAGs Dynamic Workflow Scheduling Based on the Primary Backup Algorithm in Cloud Computing SystemYu Wang, Changyun Jia, Yang Xu. 177-182 [doi]
- Time Series QoS Forecasting for Management of Cloud ServicesZia-ur Rahman, Omar Khadeer Hussain, Farookh Khadeer Hussain. 183-190 [doi]
- A Process Migration Approach to Energy-Efficient Computation in a Cluster of ServersDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 191-198 [doi]
- Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time SequenceYanli Lv, Yuanlong Li, Shouzhong Tu, Shuang Xiang, Chunhe Xia. 199-206 [doi]
- An Optimized Resource Allocation and CoMP Based Interference Coordination Scheme for LTE-A Het-NetHai-Tao Du, Wenan Zhou, Xian-Qi Lu, Jing-Yuan Sun. 207-211 [doi]
- Outage Analysis of Interference-Limited Dual-Hop Amplify-and-Forward Bidirectional Relaying SystemsHonghang Wen, Jianhua Ge, Jifu Wang. 212-215 [doi]
- An ACO-Based Trust Inference AlgorithmLeyi Shi, Yao Wang, Xin Liu. 216-220 [doi]
- Implementation of a Trust-Behavior Based Reputation System for Mobile ApplicationsTianli Dang, Zheng Yan, Fei Tong, Weidong Zhang, Peng Zhang. 221-228 [doi]
- An Improved Authenticated Skip List for Relational Query AuthenticationJian Xu, Ze Cao, Qiong Xiao, Fucai Zhou. 229-232 [doi]
- A New Security and Privacy Risk Assessment Model for Information System Considering Influence Relation of Risk ElementsTianshui Wu, Gang Zhao. 233-238 [doi]
- An Efficient and Flexible Dynamic Remote Attestation MethodHongjiao Li, Shan Wang. 239-246 [doi]
- Performance Comparison of DTN Routing Protocols in Vehicular-DTN EnvironmentMakoto Ikeda, Taiki Honda, Seiichiro Ishikawa, Leonard Barolli. 247-252 [doi]
- Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc NetworksChang-ji Wang, Dong-Yuan Shi, Xi-Lei Xu. 253-260 [doi]
- A Jammer Deployment Method for Multi-hop Wireless Network Based on Degree DistributionXianglin Wei, Yongyang Hu, Jianhua Fan, Baoqiang Kan. 261-266 [doi]
- QoE Issues of OTT Services over 5G NetworkFeng-Hui Huang, Wenan Zhou, Yu Du. 267-273 [doi]
- Estimation on Dynamic Correlations Among Foreign Reserve Growing, Liquidity Shock and Stock Market Fluctuation in ChinaYongmao Wang. 274-276 [doi]
- Consumption Tilting and the Current Account: Evidence from ChinaYajun Zhou. 277-280 [doi]
- A Principal Component Analysis Fusion Method on Infrared Multi-Light-Intensity Finger Vein ImagesLiukui Chen, Zuojin Li, Ying Wu, Lixiao Feng. 281-286 [doi]
- S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTPChin-Yu Liu, Fang-Yie Leu, Jung-Chun Liu. 287-291 [doi]
- Combining IID with BDD to Enhance the Critical Quality of Security Functional RequirementsSen-Tarng Lai, Fang-Yie Leu, William Cheng-Chung Chu. 292-299 [doi]
- Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMAFang-Yie Leu, Hsin-Liang Chen, Jung-Chun Liu. 300-305 [doi]
- A Wandering Path Tracking and Fall Detection System for People with DementiaChia-Yin Ko, Fang-Yie Leu, I.-Tsen Lin. 306-311 [doi]
- B-Mobishare: Privacy-Preserving Location Sharing Mechanism in Mobile Online Social NetworksNan Shen, Ke Yuan, Jun Yang, Chunfu Jia. 312-316 [doi]
- Rule-Based Business Data Processing in Service Coordination SystemsJie Yuan, Lirong Qiu. 317-320 [doi]
- Erasing the JPEG Compression Artifacts: An Improved Counter-Forensic Algorithm Based on Parameter AdjustmentGuorui Sheng, Qingtang Su. 321-324 [doi]
- Construction of Semantic Associative Network Based on Topic MapsLirong Qiu, Jie Yuan. 325-328 [doi]
- A Method for Tibetan Text Orientation IdentificationXiaodong Yan. 329-333 [doi]
- A Bidirectional Process Algorithm for Mining Probabilistic Frequent ItemsetsXiaomei Yu, Hong Wang, Xiangwei Zheng. 334-339 [doi]
- A CAC Scheme Based on Fuzzy Logic for Cellular Networks Considering Security and Priority ParametersTakaaki Inaba, Shinji Sakamoto, Vladi Kolici, Gjergji Mino, Leonard Barolli. 340-346 [doi]
- Experimental Results on Energy Harvesting by Using AM Radio BroadcastingShingo Otsuka, Norimasa Nakashima. 347-350 [doi]
- A Message Suppression Method for Vehicular Delay Tolerant NetworkingTaiki Honda, Seiichiro Ishikawa, Makoto Ikeda, Leonard Barolli. 351-356 [doi]
- Propagation Constant Measurement in Two Dimensional Post Array Waveguide with Triangular Lattice by Metallic PillarsHuili Chen, Yuting Bao, Jianming Jin, Hiroshi Maeda. 357-361 [doi]
- Numerical Analysis of Y-Shaped Branch Waveguide in Photonic Crystal Structures and Its ApplicationJianming Jin, Yuting Bao, Huili Chen, Hiroshi Maeda. 362-365 [doi]
- Experimental Study on Crank-Shaped Waveguide in 2D Post ArrayYuting Bao, Huili Chen, Jianming Jin, Hiroshi Maeda. 366-370 [doi]
- Optical Ray Tracing Based on Dijkstra Algorithm in Inhomogeneous MediumKazunori Uchida. 371-376 [doi]
- A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Number of Interaction, Security, and Packet Loss ParametersYi Liu, Shinji Sakamoto, Leonard Barolli, Makoto Ikeda, Fatos Xhafa. 377-382 [doi]
- A P2P Model of Publish/Subscribe SystemsHiroki Nakayama, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 383-388 [doi]
- Scalable and Accurate Data Aggregation Mechanism on Structured P2P NetworkAtsushi Takeda, Takuma Oide, Akiko Takahashi, Takuo Suganuma. 389-394 [doi]
- A Digital Fabrication Assistant for 3D Arts and CraftsJiaqing Lin, Hiroaki Nishino, Tsuneo Kagawa. 395-400 [doi]
- Proposal of Seeking Wireless Station by Flight Drones Based on Delay Tolerant NetworksNoriki Uchida, Norihiro Kawamura, Tomoyuki Ishida, Yoshitaka Shibata. 401-405 [doi]
- Performance Evaluation of Software Defined and Cognitive Wireless Network Based Disaster Resilient SystemGoshi Sato, Noriki Uchida, Koji Hashimoto, Yoshitaka Shibata. 406-409 [doi]
- User Location Anonymization Based on Secret ComputationFumiaki Sato. 410-415 [doi]
- A Circuit Switching Method for Improving Congestion of Tor NetworkKale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato. 416-421 [doi]
- A Language-Learning Support System with a Handwriting-Based Communication InterfaceShu Li, Masato Kasahara, Kosuke Takano, Kin Fun Li. 422-427 [doi]
- An Interactive Learning System Using Smartphone: Improving Students' Learning Motivation and Self-LearningNoriyasu Yamamoto. 428-431 [doi]
- Proposal of the Relief Supplies Support System at the Time of Large-Scale Natural DisasterKazuhiro Takahagi, Tomoyuki Ishida, Akira Sakuraba, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata. 432-435 [doi]
- Construction of a Communication Support Tool for Understanding Emotion in an Unstable Narrowband NetworkKaoru Sugita, Kaori Urabe, Ken Nishimura. 436-439 [doi]
- Node Placement in WMNs for Different Movement Methods: A Hill Climbing System Considering Exponential and Weibull DistributionsXinyue Chang, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa. 440-445 [doi]
- REEC: Reliable Energy Efficient Critical Data Routing in Wireless Body Area NetworksMuhammad Moid Sandhu, M. Akbar, M. Behzad, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim. 446-451 [doi]
- MASEHA: Multi-hop Communication Using Active and Sleep Nodes for Energy Hole Avoidance in Wireless Sensor NetworksY. Moeen, Nadeem Javaid, F. Saleem, A. Umar, M. Akbar, Zahoor Ali Khan, Umar Qasim. 452-457 [doi]
- Interference Estimation of Analog TV and LTE System Based on Cognitive RadioMingxing Liu, Wenwen Ma. 458-461 [doi]
- Localization Scheme of Multistatic Radars System Based on the Information of Measured SignalJyh-Horng Wen, Jheng-Sian Li, Cheng-Ying Yang, Chun-Hung Chen, Hsing-Chung Chen. 462-466 [doi]
- The Performance Analysis of Direct/Cooperative Transmission with TXOP Scheme in WLANsChien-Erh Weng, Lie Yang, Hsing-Chung Chen. 467-471 [doi]
- A Secure End-to-End Mobile Chat SchemeHsing-Chung Chen, Jyh-Horng Wen, Cheng-Ying Yang. 472-477 [doi]
- MEET: Multi-hop Energy Efficient Protocol for Energy Hole Avoidance Using Variable Transmission Range in Wireless Sensor NetworksF. Saleem, Nadeem Javaid, Y. Moeen, M. Akbar, Zahoor Ali Khan, Umar Qasim. 478-484 [doi]
- TEECH-ME: Threshold Sensitive Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for WSNsI. Khan, W. Raza, F. Arshad, F. Kalsoom, Umar Qasim, Zahoor Ali Khan, Nadeem Javaid. 485-490 [doi]
- An Alternative Flocking Algorithm with Additional Dynamic ConditionsNingping Sun, Yusuke Tokunaga. 491-496 [doi]
- Detection of JavaScript of Malware with Un-readability Using Mahalanobis-DistanceKentaro Takamori, Mai Iwamoto, Shunsuke Oshima, Takuo Nakashima. 497-502 [doi]
- The Evaluation Method of Consumer Behavior Pattern Using an Illuminance Sensor Function on a Smart-TabletKyoko Taguchi, Masataka Iwasaki, Shinich Ogata, Yoshifumi Oyama. 503-508 [doi]
- Extraction of Physical Motion Dictating the Difference between Skilled Cyclist and BeginnerTatsushi Tokuyasu, Takuhiro Sato, Shimpei Matsumoto, Tomoki Kitawaki. 509-513 [doi]
- Facial Emotion Recognition Using Active Shape Models and Statistical Pattern RecognizersGil-Jin Jang, Jeong-Sik Park, Ahra Jo, Ji-Hwan Kim. 514-517 [doi]
- An Objective Assessment of Mental Condition Based on EEG and ECGTakako Otabe, Tomochika Kaneda, Makoto Yoshikai, Tatsushi Tokuyasu. 518-522 [doi]
- Simulation of Slash-and-Burn Using a Cellular AutomatonSayaka Abe, Kaoru Fujioka. 523-526 [doi]
- An Efficient Head Pose Determination and its Application to Face Recognition Using Multi-pose Face DB and SVMJun Lee, Yong-Ho Seo. 527-531 [doi]
- Design and Implementation of an Omnidirectional Wheelchair: Control System and Its ApplicationsKeita Matsuo, Leonard Barolli. 532-535 [doi]
- Development of Small Footprint Korean Large Vocabulary Speech Recognition for Commanding a Standalone RobotDonghyun Lee, Minkyu Lim, Myoung-Wan Koo, Jungyun Seo, Gil-Jin Jang, Ji-Hwan Kim, Jeong-Sik Park. 536-540 [doi]
- Training System for Endoscopic Surgery by Using Augmented Reality and Forceps Control DevicesTatsushi Tokuyasu, Wako Okamura, Toru Kusano, Masafumi Inomata, Norio Shiraishi, Seigo Kitanou. 541-544 [doi]
- Reconstructing Dynamic Character Font Models with Incorrect Stroke OrderHirotsugu Matsukida, Yuta Mieno, Hiroyuki Fujioka. 545-548 [doi]
- Response Surface Learning for Face Misalignment CorrectionYoungmin Park, Yeong-Jae Choi, Hyun Seung Yang, Yongho Seo. 549-553 [doi]
- Controlling Mobile Robot Using IMU and EMG Sensor-Based Gesture RecognitionSeong-Og Shin, Dong Han Kim, Yong-Ho Seo. 554-557 [doi]
- A XOR Based Public Auditing Scheme for Proof-of-storageBei Pei, Changsong Chen, Changsheng Wan. 558-565 [doi]
- Online/Offline Attribute Based SignatureShaojun Zhang, Peng Chen, Jianfeng Wang. 566-571 [doi]
- Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No SolutionHaixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen 0001. 572-577 [doi]
- Secure Approximate Nearest Neighbor Search over Encrypted DataYaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen 0001. 578-583 [doi]
- Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABEPengliang Liu, Jianfeng Wang, Hua Ma, Haixin Nie. 584-589 [doi]
- A Study on Service Performance Evaluation of OpenstackQifeng Xu, Jie Yuan. 590-593 [doi]