Abstract is missing.
- Efficient Resource Allocation for Residential Smart Buildings Using Integrated Cloud and Fog Environment in Smart GridAmna Abbas, Nadeem Javaid, Muhammad Ismail, Maria Naeem, Zaheer Ahmed, Tamoor Wakeel. 3-14 [doi]
- Min-Min Scheduling Algorithm for Efficient Resource Distribution Using Cloud and Fog in Smart BuildingsSaniah Rehman, Nadeem Javaid, Sadia Rasheed, Kanza Hassan, Farkhanda Zafar, Maria Naeem. 15-27 [doi]
- Cloud Computing Based Resource Allocation by Random Load Balancing TechniqueHamida Bano, Nadeem Javaid, Komal Tehreem, Kainat Ansar, Maheen Zahid, Tooba Nazar. 28-39 [doi]
- A Hybrid HS-Mean Technique for Efficient Load Balancing in Cloud ComputingKainat Ansar, Nadeem Javaid, Maheen Zahid, Komal Tehreem, Hamida Bano, Momina Waheed. 40-48 [doi]
- Shortest Job First Load Balancing Algorithm for Efficient Resource Management in CloudMoomina Waheed, Nadeem Javaid, Aisha Fatima, Tooba Nazar, Komal Tehreem, Kainat Ansar. 49-62 [doi]
- Modified Shortest Job First for Load Balancing in Cloud-Fog ComputingTooba Nazar, Nadeem Javaid, Moomina Waheed, Aisha Fatima, Hamida Bano, Nouman Ahmad. 63-76 [doi]
- Big Data Analytics for Price and Load Forecasting in Smart GridsSana Mujeeb, Nadeem Javaid, Mariam Akbar, Rabiya Khalid, Orooj Nazeer, Mahnoor Khan. 77-87 [doi]
- Uplink Multi-user Beamforming for Contention-Based Wireless LANYi-Hsiu Lee, Wen-Rong Wu. 88-96 [doi]
- A Fuzzy-Based System for Actor Node Selection in WSANs Considering Load Balancing of ActorsDonald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli. 97-109 [doi]
- Performance Behavior of WMN-PSODGA Simulation System for WMNs Considering Uniform and Chi-Square Client DistributionsAdmir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 110-124 [doi]
- Evaluation of Object-Based Information Flow Control in P2PPS SystemsShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 125-134 [doi]
- A Real-Time Robot Motion Generation System Based on Human GestureToshiyuki Haramaki, Kenta Goto, Hokuto Tsutsumi, Akihito Yatsuda, Hiroaki Nishino. 135-146 [doi]
- A Framework for Automatically Generating Medical Quizzes with Multi-media Contents Based on Linked DataWei Shi, Kosuke Kaneko, Chenguang Ma, Yoshihiro Okada. 147-158 [doi]
- Linguistic and Biometric Approaches for Data and Services Management in Cloud ComputingUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 159-167 [doi]
- Group Migration of Virtual Machines in a Server ClusterDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 168-180 [doi]
- The Improved Transmission Energy Consumption Laxity-Based Algorithm with Parallel Data TransmissionTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 181-192 [doi]
- Flexible Resource Management for Raft ClustersTakuro Nakagawa, Naohiro Hayashibara. 193-203 [doi]
- A New Contents Migration Method for Reducing Network Traffic and Improving Cache Hit Rate on NDNYuya Nakata, Tetsuya Shigeyasu. 204-212 [doi]
- Leap Motion for Telerehabilitation: A Feasibility StudyLinlin Zhang, Kin Fun Li, Jingjing Lin, Jenna Ren. 213-223 [doi]
- Intersection Traffic Control Method Considering Remaining Distance to Destination and Congestion of Next Road SegmentYusuke Okabe, Minato Dan, Hiroshi Shigeno. 224-236 [doi]
- Implementation of an Alternating Least Square Model Based Collaborative Filtering Movie Recommendation System on Hadoop and Spark PlatformsJung-Bin Li, Szu-Yin Lin, Yu-Hsiang Hsu, Ying-Chu Huang. 237-249 [doi]
- Web-Based Operation Training System of Medical Therapy Devices Using VR/AR DevicesKotaro Kuroda, Kosuke Kaneko, Toshioh Fujibuchi, Yoshihiro Okada. 250-259 [doi]
- Web Based Interactive Viewer for 360VR Images/Videos Supporting VR/AR Devices with Human Face DetectionAkira Haga, Wei Shi, Ginpei Hayashida, Yoshihiro Okada. 260-270 [doi]
- Efficient Scheduling for Concurrent Contents Searching with Idle Computational ResourcesChikara Miura, Shinji Sugawara. 271-284 [doi]
- Integration of CNN and Faster R-CNN for Tire Bubble Defects DetectionChuan-Yu Chang, Wei-chun Wang. 285-294 [doi]
- Monocular Camera Tracking Curve Optimization Algorithm in Augmented RealityTianhan Gao, Wei Jiang. 295-303 [doi]
- Privacy Mining from IoT-Based Smart HomesMing-Chang Lee, Jia-Chun Lin, Olaf Owe. 304-315 [doi]
- ASVG: Automated Software Vulnerability Sample Generation Technology Based on Source CodeJun Yang, Peng Zhou, Yunze Ni. 316-325 [doi]
- Automatic Examination-Based Whitelist Generation for XSS Attack DetectionKeisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, Masakatsu Nishigaki. 326-338 [doi]
- A Proposal and the Evaluation of a Hands-On Training System for Cyber SecurityTakamichi Saito, Satoshi Yashiro, Kazuhisa Tanabe, Yuta Saito. 339-349 [doi]
- An Implementation of Interactive RFID Positioning Healthcare System on Mobile PlatformKuang-Yen Tai, Shun-Li Yen, Tzer-Shyong Chen, Yu-Hsuan Tseng. 350-360 [doi]
- Development of Decision Algorithm for Road Surface Conditions by Crowd Sensing TechnologyTakanori Ito, Akira Sakuraba, Yoshitaka Shibata. 361-366 [doi]
- On Semantic Annotation for Sports Video Highlights by Mining User Comments from Live Broadcast Social NetworkPo-Fang Hsu, Yao-Chung Fan, Huan Chen 0002. 367-380 [doi]
- A Prototype System for V2X Communication Platform for Safety Driving by IoT TechnologyYoshitaka Shibata, Goshi Sato, Noriki Uchida. 381-390 [doi]
- Cooperation for Rechargeable Heterogeneous Sensor NetworksLi-Ling Hung. 391-401 [doi]
- Demand Side Management Scheduling of Appliances Using Meta Heuristic AlgorithmsNasir Ayub, Nadeem Javaid, Assad Abbas, Adnan Ishaq, Anam Yousaf, Muhammad Awais Ishtiaq. 405-417 [doi]
- Efficient Energy Management Assisted by Fog ComputingShakeeb Murtaza, Nadeem Javaid, Muhammad KaleemUllah Khan, Farkhanda Zafar, Rameez Iqbal, Muhammad Abubaker Hamid. 418-430 [doi]
- A Cloud Fog Based Framework for Efficient Resource Allocation Using Firefly AlgorithmKanza Hassan, Nadeem Javaid, Farkhanda Zafar, Saniah Rehman, Maheen Zahid, Sadia Rasheed. 431-443 [doi]
- Object-Based Selective Delivery of Event Messages in Topic-Based Publish/Subscribe SystemsTakumi Saito, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 444-455 [doi]
- 2 Wavelength V2X Cognitive Wireless Communication SystemAkira Sakuraba, Takanori Ito, Yoshitaka Shibata. 456-467 [doi]
- Passive Neighbor Discovery with Scanning Mechanism for Mobile Ad Hoc Devices in WUR NetworksHyunhee Park. 471-480 [doi]
- A Pseudonym Ring Building Scheme for Anonymous Authentication in VANETsTianhan Gao, Xinyang Deng. 481-489 [doi]
- An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group SignatureTianhan Gao, Jiayu Qi. 490-497 [doi]
- Vulnerability Analysis on a Secure USB: Based on a Commercial Product AKyungroul Lee, Insu Oh, Wonyoung Jang, Chang Choi, Kangbin Yim. 498-502 [doi]
- Performance of Transmission Latency in Software Defined Vehicle NetworksYung-Fa Huang, Hsing-Chung Chen, Bing-Chen He, Tan-Hsu Tan, Shao-Chieh Huang, Fengming Chang. 503-512 [doi]
- A Threshold-Based Adaptive Method for Message Suppression Controller in Vehicular DTNsYu Yoshino, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli. 515-524 [doi]
- A Synchronization Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the Role-Based Access Control ModelShohei Hayashi, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 525-533 [doi]
- Estimation of Propagation Order of Distance Along Random Rough SurfaceKazunori Uchida, Leonard Barolli. 534-547 [doi]
- Numerical Analysis of Optical Duplexer Composed of Photonic Crystal with Square LatticeKeisuke Haari, Hiroshi Maeda, Xiang Zheng Meng, Naoki Higashinaka. 548-558 [doi]
- A Banking Chatbot Security Control Procedure for Protecting User Data Security and PrivacySen-Tarng Lai, Fang-Yie Leu, Jeng-Wei Lin. 561-571 [doi]
- A Survey of Authentication Protocols in VANETChin-Ling Chen, Yue-Xun Chen, Chin-Feng Lee, Yong-Yuan Deng. 572-577 [doi]
- Migration of Edge Computing Services in 5G Networks - Firewall as a Service ExampleFang-Yie Leu, Heru Susanto, Ping-Hung Chou, Jeng-Wei Lin. 578-585 [doi]
- Non-contact Pulse Rate Measurement of Hand and Wrist Using RGB CameraChi-Heng Lu, Jen-Hua Low, Chiu-Ching Tuan. 586-596 [doi]
- High Performance Grid Computing: Challenges and Opportunities of High Speed NetworkingHeru Susanto, Fang-Yie Leu, Chen Chin Kang. 597-610 [doi]
- Self-parameter Based Bilateral Session Key Exchange MethodKun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang. 611-620 [doi]
- Performance Evaluation of a Fuzzy-Based Cluster-Management System for VANETsKosuke Ozera, Kevin Bylykbashi, Yi Liu 0011, Makoto Ikeda, Leonard Barolli. 623-636 [doi]
- A Multi Positions Detection System with Supersonic Sensors for Omnidirectional Wheelchair TennisKeita Matsuo, Leonard Barolli. 637-647 [doi]
- A Fuzzy-Based System for Safe Driving Information in VANETsKevin Bylykbashi, Yi Liu 0011, Kosuke Ozera, Leonard Barolli, Makoto Takizawa 0001. 648-658 [doi]
- Proposal of Disaster Mitigation Method Using Multiple RobotsTakahiro Uchiya, Ryuta Sugie, Kota Hayashi, Tetsuo Kinoshita. 659-668 [doi]
- Combining Features in Browser FingerprintingKazuhisa Tanabe, Ryohei Hosoya, Takamichi Saito. 671-681 [doi]
- Survey on Joint Operational Intelligence Support in Recent Local WarsXiang Pan, Tianye Xu, Zhiting Xiao, Xuan Guo. 682-694 [doi]
- The Enlightenment of Nine Classical Cyber Warfare to the National Cyberspace Security StrategyXiang Pan, Tianye Xu, Zhiting Xiao, Xuan Guo. 695-703 [doi]
- HACKFOSICS: Forensics Tool for Extract Live Remnant Data and Examine Dead ArtifactTin Maung Maung, Mie Mie Su Thwin. 704-712 [doi]
- Feature Recognition Method for Hand-Written Signature ImageHsing-Chung Chen, Han-Mi Chen. 713-721 [doi]
- Priority Based Load Balancing in Cloud and Fog Based SystemsSubhan Tariq, Nadeem Javaid, Mahad Majeed, Fahad Ahmed, Saqib Nazir. 725-736 [doi]
- Load Stabilizing in Fog Computing Environment Using Load Balancing AlgorithmSadam Hussain Abbasi, Nadeem Javaid, Muhammad Hassaan Ashraf, Mubashar Mehmood, Maria Naeem, Mubariz Rehman. 737-750 [doi]
- A Virtual Machine Migration for Storage ProcessesNaohiro Ogura, Dilawaer Duolikun, Tomoya Enokido, Ryo Watanabe, Makoto Takizawa 0001. 751-758 [doi]
- A Study on Reducing Network Traffic of Disaster Information Delivery System Based on DTNShoko Takabatake, Tetsuya Shigeyasu. 759-768 [doi]
- Score-Based Message Ferrying Approach for Evacuees on Delay Tolerant NetworksKazuma Ikenoue, Kazunori Ueda. 769-774 [doi]