Abstract is missing.
- Real Time Pricing Based Appliance Scheduling in Home Energy Management Using Optimization TechniquesBasit Amin, Adia Khalid, Muhammad Azeem Sarwar, Asad Ghaffar, Adnan Satti, Nasir Ayub, Nadeem Javaid. 3-13 [doi]
- Pigeon Inspired Optimization and Bacterial Foraging Optimization for Home Energy ManagementSaadia Batool, Adia Khalid, Zunaira Amjad, Hafsa Arshad, Syeda Aimal, Mashab Farooqi, Nadeem Javaid. 14-24 [doi]
- GreyWolf Optimization Technique for HEMS Using Day Ahead Pricing SchemeAsad Ghafar, Rabiya Khalid, Mudabbir Ali, C. H. Anwar ul Hassan, Adnan Ishaq, Basit Amin, Nadeem Javaid. 25-36 [doi]
- Efficient Energy Management System Using Firefly and Harmony Search AlgorithmAnwar Ur Rehman, Sheraz Aslam, Zain Ul Abideen, Asma Zahra, Waqar Ali, Muhammad Junaid, Nadeem Javaid. 37-49 [doi]
- Demand Side Management Using Meta-Heuristic Optimization TechniquesSidra Razzaq, Adia Khalid, Sughra Razzaq, Zain Ul Abideen, Asma Zahra, Mahnoor Khan, Nadeem Javaid. 50-61 [doi]
- Scheduling of Appliances in HEMS Using Elephant Herding Optimization and Harmony Search AlgorithmKomal Parvez, Sheraz Aslam, Arje Saba, Syeda Aimal, Zunaira Amjad, Sikandar Asif, Nadeem Javaid. 62-72 [doi]
- Enhanced Differential Evolution and Crow Search Algorithm Based Home Energy Management in Smart GridPamir, Sakeena Javaid, Ishtiaq Ali, Noreen Mushtaq, Zafar Faiz, Hazrat Abubakar Sadiq, Nadeem Javaid. 73-86 [doi]
- Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Actor-Sensor Coordination Quality ParameterDonald Elmazi, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli. 87-99 [doi]
- Effect of Storage Size on IoT Device Selection in Opportunistic Networks: A Comparison Study of Two Fuzzy-Based SystemsMiralda Cuka, Donald Elmazi, Tetsuya Oda, Elis Kulla, Makoto Ikeda, Leonard Barolli. 100-113 [doi]
- Performance Evaluation of WMNs by WMN-PSOSA Simulation System Considering Random Inertia Weight Method and Linearly Decreasing Vmax MethodShinji Sakamoto, Kosuke Ozera, Admir Barolli, Makoto Ikeda, Leonard Barolli, Makoto Takizawa. 114-124 [doi]
- A Fuzzy-Based Approach for Task Accomplishment in MobilePeerDroid Mobile SystemYi Liu 0011, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 125-137 [doi]
- A Flexible Synchronization Protocol for Hidden Topics to Prevent Illegal Information Flow in P2PPS SystemsShigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa. 138-148 [doi]
- A Simple Migration Algorithm of Virtual Machine in a Server ClusterRyo Watanabe, Dilawaer Duolikun, Cuiqin Qin, Tomoya Enokido, Makoto Takizawa. 149-160 [doi]
- Energy-Aware Dynamic Migration of Virtual Machines in a Server ClusterDilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa. 161-172 [doi]
- A Low-Energy Unicast Ad-Hoc Routing Protocol in Wireless NetworksEmi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 173-184 [doi]
- An Energy Efficient Load Balancing Algorithm Based on the Active Time of CoresTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa. 185-196 [doi]
- Development of an Adult Care System Based on Interactions with a Communication RobotAkihito Yatsuda, Toshiyuki Haramaki, Hiroaki Nishino. 197-205 [doi]
- Development of Unified Model to Increase Coverage Area in 5G Networks Using FemtocellsM. Usman Younus, Rabia Shafi. 206-217 [doi]
- Comparison of Spray and Wait and Epidemic Protocols in Different DTN ScenariosKevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa. 218-229 [doi]
- Interest Re-Route Control According to Degree of Similarity on Cached Contents Using Bloom Filter on NDNHaruka Watano, Tetsuya Shigeyasu. 230-240 [doi]
- A Mobility Network for Disaster and Emergent Information Systems in Challenged Network EnvironmentYoshitaka Shibata, Kenta Ito, Goshi Sato. 241-248 [doi]
- Visual CAPTCHA for Data Understanding and Cognitive ManagementNatalia Krzyworzeka, Lidia Ogiela. 249-255 [doi]
- Swarm Intelligence Based Home Energy Management Controller Under Dynamic Pricing SchemeAdnan Ahmed, Muhammad Hassan Rahim, Fozia Feroze, Ayesha Zafar, Itrat Fatima, Sheraz Aslam, Nadeem Javaid. 256-266 [doi]
- Home Energy Management System Using Ant Colony Optimization Technique in MicrogridItrat Fatima, Adia Khalid, Saman Zahoor, Anila Yasmeen, Shahan Arif, Umara Zafar, Nadeem Javaid. 267-279 [doi]
- An Object Management and Fuzzy Based Location Estimation Method Using Active RFID TagsKaiki Ohkoshi, Hiroyuki Suzuki, Akio Koyama. 280-292 [doi]
- Application of Cognitive Cryptography in Fog and Cloud ComputingMarek R. Ogiela, Lidia Ogiela. 293-298 [doi]
- Energy Savings in Power Control for 5G Dense FemtocellsChristos Bouras, Georgios Diles, Theodoros Moulias. 299-308 [doi]
- Classification of Cognitive Service Management Systems in Cloud ComputingUrszula Ogiela, Makoto Takizawa, Lidia Ogiela. 309-313 [doi]
- Trust-Based Multi-stakeholder Decision Making in Water Allocation SystemLina Alfantoukh, Yefeng Ruan, Arjan Durresi. 314-327 [doi]
- Modeling and Performance Evaluation of Protocols in Mobile Wireless Sensor NetworksManel Houimli, Laïd Kahloul. 328-339 [doi]
- LTE-LAA and Wi-Fi Physical Layer Performance and Coverage ComparisonOudomsack Pierre Pasquero, Marie Le Bot, Marie-Hélène Hamon, Christian Gallard. 340-351 [doi]
- A Hybrid-Distributed Base Station Wake-up Algorithm in Dense Heterogeneous Cellular NetworksDa Li, Wen'an Zhou, Jianlong Liu, Bingqian Li. 352-362 [doi]
- Design of MIMO System with Individual Transmit Power Constraint and Improper ConstellationRaja Muthalagu. 363-375 [doi]
- Implementation of 1: N Communication Model Using Serial Communication in an RF-Based EnvironmentYeonju Lee, Jeongin Kim, Eunji Lee, Takeun Hong, Pan-Koo Kim. 376-385 [doi]
- Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product AMyoungsu Kim, Kyungroul Lee, Kangbin Yim. 386-391 [doi]
- Web Browser Tampering: Inspecting CPU Features from Side-Channel InformationTakamichi Saito, Koki Yasuda, Kazuhisa Tanabe, Kazushi Takahashi. 392-403 [doi]
- Mocov: Model Based Fuzzing Through Coverage Guided TechnologyChen Chen, Zhouguo Chen, Yongle Hao, Baojiang Cui. 404-413 [doi]
- A Security Vulnerability Threat Classification MethodYuanwei Hou, Xingzhang Ren, Yongle Hao, Tong Mo, Weiping Li. 414-426 [doi]
- A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature ExtractionChong Wang, Jianwei Ding, Tao Guo, Baojiang Cui. 427-438 [doi]
- Embedded System Vulnerability Mining Technology Based on In-memory Fuzzing TestBaojiang Cui, Xiangqian Zhang, Tianxin Zhang, Qin Zhang. 439-449 [doi]
- Research on UPnP Protocol Security of Gateway DeviceBaojiang Cui, Qin Zhang, Xiangqian Zhang, Tao Guo. 450-458 [doi]
- Hinge Classification Algorithm Based on Asynchronous Gradient DescentXiaodan Yan, Tianxin Zhang, Baojiang Cui, Jiangdong Deng. 459-468 [doi]
- Digital Communication System with High Security and High Noise Immunity: Security Analysis and SimulationAhmed S. Alshammari, Mohamed I. Sobhy, Peter Lee. 469-481 [doi]
- Payload-Based Web Attack Detection Using Deep Neural NetworkXiaohui Jin, Baojiang Cui, Jun Yang, Zishuai Cheng. 482-488 [doi]
- Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning and Brute-Force Attack Defensibility Along with User Convenience ConsiderationAyane Sano, Masahiro Fujita, Masakatsu Nishigaki. 489-501 [doi]
- Interference Aware Metric-Based Routing Protocol in Cognitive Radio NetworksAbhishek Kumar, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar, Makoto Takizawa. 502-515 [doi]
- A Comparison of Fuzzy Control Schemes to Enhance Sustainability in MicrogridMuhammad Shahid Laiq, Sheeraz Ahmed, Zahoor Ali Khan, M. Irfan Khattak, Aatra Sadaf. 516-532 [doi]
- A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT)Mohammad Dahman Alshehri, Farookh Khadeer Hussain. 533-543 [doi]
- Home Energy Management in Smart Grid Using Bacterial Foraging and Strawberry AlgorithmNoreen Mushtaq, Muhammad Hassan Rahim, Rabiya Khalid, Samia Abid, Pamir, Sajawal Ur Rehman Khan, Nadeem Javaid. 547-559 [doi]
- Implementing Critical Peak Pricing in Home Energy Management Using Biography Based Optimization and Genetic Algorithm in Smart GridKhadija Ambreen, Rabiya Khalid, Rubab Maroof, Hasan Nasir Khan, Salma Asif, Hina Iftikhar, Nadeem Javaid. 560-569 [doi]
- Home Energy Management Using Fish Swarm Optimization Bacterial Foraging Algorithm and Genetic Algorithm in Smart GridShahab Ali, Samia Abid, Zain Ul Abideen, Saman Zahoor, Itrat Fatima, Zunaira Nadeem, Nadeem Javaid. 570-582 [doi]
- Earth Worm Optimization for Home Energy Management System in Smart GridMudabbir Ali, Samia Abid, Asad Ghafar, Nasir Ayub, Hafsa Arshad, Sajawal Khan, Nadeem Javaid. 583-596 [doi]
- Hybrid Replication Schemes of Processes for Fault-Tolerance Systems in Energy-Efficient Server ClustersRyuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa. 597-607 [doi]
- Coordinate Assignment: Self-outer-Recognition in OpenFlow MeshMinoru Uehara. 608-615 [doi]
- A Survey of Optimization Techniques for Scheduling in Home Energy Management Systems in Smart GridFozia Feroze, Asif Khan, Nabeeha Qayyum, Sakeena Javaid, Adnan Ahmed, Muhammad Hassan Rahim, Nadeem Javaid. 616-626 [doi]
- The Trends of Integrating Renewable Energy Sources: A SurveySardar Mehboob Hussain, Muhammad Hassan Rahim, Zunaira Nadeem, Iqra Fatima, zafar iqbal, Sikandar Asif, Nadeem Javaid. 627-636 [doi]
- Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Specific DomainKazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 637-647 [doi]
- Towards a Collaborative Editing System on 3D SpaceTasuku Takahashi, Kengo Imae, Naohiro Hayashibara. 648-657 [doi]
- Sausage-Style One-Time Authentication SchemesYuji Suga. 658-667 [doi]
- Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Gamma Type of Brain WavesMasafumi Yamada, Miralda Cuka, Yi Liu 0011, Kevin Bylykbashi, Keita Matsuo, Leonard Barolli. 671-681 [doi]
- A Fuzzy-Based System for Actor Node in an Ambient Intelligence Testbed: Effects of Different Parameters on Human Sleeping ConditionsRyoichiro Obukata, Kevin Bylykbashi, Kosuke Ozera, Yi Liu 0011, Shinji Sakamoto, Leonard Barolli. 682-690 [doi]
- A New Space-Time Coding Method Based on OCMLZhao Chen, Jiang-Yan Wu. 691-700 [doi]
- Experimental Evaluation of a WLAN Triage Testbed Considering Relation of Connection Success Ratio and Connected Time Ratio with User Priority and RSSI ParametersKosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Leonard Barolli. 701-717 [doi]
- Circular Microstrip Patch Antenna Design for LTE, ISM, WIMAX, Satellite Communication and in Ultra WideBand ApplicationsZain Ul Abedin. 718-727 [doi]
- Optimal Base Station Planning Using Genetic Algorithm for LTE NetworkOuamri Med Amine, Zenadji Cilia, Abdelkrim Khireddine. 731-740 [doi]
- Line of Sight Procedure for Dijkstra-Algorithm Based Ray-TracingKazunori Uchida, Leonard Barolli. 741-753 [doi]
- A Message Suppression Method Considering Priority for Inter-vehicle CommunicationsYu Yoshino, Daichi Koga, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli. 754-763 [doi]
- Signal Routing by Dispersive MediumHiroshi Maeda, Keisuke Haari, Xiang Zheng Meng, Naoki Higashinaka. 764-773 [doi]
- A Critical Quality Measurement Model for Managing and Controlling Big Data Project RisksSen-Tarng Lai, Fang-Yie Leu. 777-787 [doi]
- A Light Weight Data Encryption Method for WSN CommunicationKun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang. 788-795 [doi]
- Predicting Video Stream Fragments in a Reactive ModeChien-Hsiang Kao, Fang-Yie Leu. 796-802 [doi]
- Relay Base-Station Handover in a 5G EnvironmentZong-Ying Yang, Fang-Yie Leu. 803-810 [doi]
- Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with RevocationHua Ma, Enting Dong, Zhenhua Liu, Linchao Zhang. 811-820 [doi]
- Omnidirectional Wheelchair Vision with Small Reflect Mirrors for Tennis Ball TrackingKeita Matsuo, Leonard Barolli. 823-833 [doi]
- Investigation Using Multi-Agent Simulation Environment for Evacuation Guidance with RobotsRyuta Sugie, Takahiro Uchiya, Ichi Takumi. 834-843 [doi]
- Design of Reminiscence Therapy System for Elderly People with DementiaTakahiro Uchiya, Ryota Nishimura, Takahiro Hirano, Masaru Sakurai. 844-853 [doi]
- A Disaster Information Gathering System Design Using Fuzzy LogicGaku Tsuchiya, Makoto Ikeda, Donald Elmazi, Leonard Barolli, Elis Kulla. 854-861 [doi]