Abstract is missing.
- A Fuzzy-Based Decision System for Sightseeing Spots Considering Hot Spot Access as a New ParameterYi Liu 0011, Kevin Bylykbashi, Leonard Barolli. 3-11 [doi]
- A Multi-sensor Based Physical Condition Estimator for Home HealthcareToshiyuki Haramaki, Hiroaki Nishino. 12-21 [doi]
- Performance Evaluation of WMNs WMN-PSOHC System Considering Constriction and Linearly Decreasing Inertia Weight Replacement MethodsShinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto. 22-31 [doi]
- A Fuzzy-Based Simulation System for IoT Node Selection in Opportunistic Networks and Testbed ImplementationMiralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli. 32-43 [doi]
- Consensus Based Mechanism Using Blockchain for Intensive Data of VehiclesTehreem Ashfaq, Muhammad Ahmed Younis, Shahzad Rizwan, Zahid Iqbal, Shahid Mehmood, Nadeem Javaid. 44-55 [doi]
- Block-VN: A Distributed Blockchain-Based Efficient Communication and Storage SystemHassan Farooq, Muhammad Usman Arshad, Muhammad Faraz Akhtar, Shahid Abbas, Bilal Zahid, Nadeem Javaid. 56-66 [doi]
- Electric Vehicles Privacy Preserving Using Blockchain in Smart CommunityOmaji Samuel, Nadeem Javaid, Faisal Shehzad, Muhammad Sohaib Iftikhar, Muhammad Zohaib Iftikhar, Hassan Farooq, Muhammad Ramzan. 67-80 [doi]
- A Nodes Selection Algorithm for Fault Recovery in the GTBFC ModelRyuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 81-92 [doi]
- A TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoTShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 93-104 [doi]
- Enhancement of Binary Spray and Wait Routing Protocol for Improving Delivery Probability and Latency in a Delay Tolerant NetworkEvjola Spaho, Klodian Dhoska, Leonard Barolli, Vladi Kolici, Makoto Takizawa 0001. 105-113 [doi]
- Data Exchange Algorithm at Aggregate Level in the TWTBFC ModelYinzhe Guo, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 114-124 [doi]
- Trust-Based Game-Theoretical Decision Making for Food-Energy-Water ManagementSuleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens. 125-136 [doi]
- Energy-Efficient Purpose Ordering SchedulerTomoya Enokido, Makoto Takizawa 0001. 137-149 [doi]
- NFC-Based Commissioning of Adaptive Sensing Applications for the 5G IIoTHadil Abukwaik, Christian Groß, Markus Aleksy. 150-161 [doi]
- SCHC-Based Solution for Roaming in LoRaWANWael Ayoub, Mohamad Mroué, Abed Ellatif Samhat, Fabienne Nouvel, Jean-Christophe Prévotet. 162-172 [doi]
- Reputation System for IoT Data Monetization Using BlockchainAtia Javaid, Maheen Zahid, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Zainib Noshad, Nadeem Javaid. 173-184 [doi]
- Blockchain Based Balancing of Electricity Demand and SupplyMaheen Zahid, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Zainib Noshad, Atia Javaid, Nadeem Javaid. 185-198 [doi]
- Data Replication Based on Cuckoo Search in Mobile Ad-Hoc NetworksTakeru Kurokawa, Naohiro Hayashibara. 199-209 [doi]
- Trusted, Decentralized and Blockchain-Based M2M Application Service ProvisionBesfort Shala, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles. 210-221 [doi]
- A New Mobile Agent System for Sharing Disaster Information Under Unstable Network ConditionsNatsuki Matsumoto, Tetsuya Shigeyasu. 222-230 [doi]
- A Deep Hybrid Collaborative Filtering Based on Multi-dimension AnalysisChunyan Zeng, Songnan Lv, Shangli Zhou, Zhifeng Wang. 231-240 [doi]
- An Energy Efficient Mechanism for Downlink and Uplink Decoupling in 5G NetworksChristos Bouras, Georgios Diles, Rafail Kalogeropoulos. 241-252 [doi]
- Efficient 5G Network Decoupling Using Dynamic Modulation and Coding Scheme SelectionChristos Bouras, Vasileios Kokkinos, Evangelos Michos. 253-265 [doi]
- A Probabilistic Offloading Approach in Mobile Edge ComputingBhed Bahadur Bista, Jiahong Wang, Toyoo Takata. 266-278 [doi]
- Fuzzy Geocasting in Opportunistic NetworksSanjay Kumar Dhurandher, Jagdeep Singh, Isaac Woungang, Makoto Takizawa 0001, Geetanshu Gupta, Raghav Kumar. 279-292 [doi]
- Digital Content Refinement by Collecting Partly Unreliable Attributes over a NetworkShinji Sugawara. 293-302 [doi]
- Web Version of IntelligentBox (WebIB) and Its Extension for Web-Based VR Applications - WebIBVRYoshihiro Okada. 303-314 [doi]
- Enemy Attack Management Algorithm for Action Role-Playing GamesTianhan Gao, Qingwei Mi. 315-326 [doi]
- Apply Lagrange Interpolation Based Access Control Mechanism in Personal Health Record Medical SystemKuang-Yen Tai, Dai-Lun Chiang, Chun-Yen Chuang, Tzer-Shyong Chen, Frank Yeong-Sung Lin. 327-337 [doi]
- Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted EmailsKota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki. 338-351 [doi]
- Gait-Based Authentication Using Anomaly Detection with Acceleration of Two Devices in Smart LockKazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park. 352-362 [doi]
- Accurate Online Energy Consumption Estimation of IoT Devices Using EnergestAdnan Sabovic, Carmen Delgado, Jan Bauwens, Eli De Poorter, Jeroen Famaey. 363-373 [doi]
- Comparison of LoRa Simulation EnvironmentsChristos Bouras, Apostolos Gkamas, Spyridon Aniceto Katsampiris Salgado, Vasileios Kokkinos. 374-385 [doi]
- Proactive Network Slices Management Algorithm Based on Fuzzy Logic System and Support Vector Regression ModelAmal Kammoun, Nabil Tabbane, Gladys Diaz, Nadjib Achir, Abdulhalim Dandoush. 386-397 [doi]
- An Optimal Route Recommendation Method for a Multi-purpose Travel Route Recommendation SystemChen Yuan, Minoru Uehara. 398-408 [doi]
- Artificial Intelligence Technique for Optimal Allocation of Renewable Energy Based DGs in Distribution NetworksZia Ullah, M. R. Elkadeem, Shaorong Wang. 409-422 [doi]
- Impact of Sharing Algorithms for Cloud Services ManagementLidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. 423-427 [doi]
- Application of Cognitive Protocols in Transformative ComputingMarek R. Ogiela, Lidia Ogiela. 428-432 [doi]
- Analyzing Mobile Cycling Applications for Monitoring WorkoutsFabricio Landero Cristobal, Miguel A. Wister, Pablo Payro Campos. 433-444 [doi]
- Road State Information Platform Based on Multi-sensors and Bigdata AnalysisYoshitaka Shibata, Goshi Sato, Noriki Uchida. 445-454 [doi]
- A New Discounting Approach to Conflict Information Fusion Using Multi-criteria of Reliability in Dempster-Shafer Evidence TheoryJin Zhu. 455-467 [doi]
- The Group-Based Linear Time Causally Ordering Protocol in a Scalable P2PPS SystemTakumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 471-482 [doi]
- Algorithm for Detecting Implicitly Faulty Replicas Based on the Power Consumption ModelHazuki Ishii, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 483-493 [doi]
- Parallel Data Transmission Protocols in the Mobile Fog Computing ModelKosuke Gima, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 494-503 [doi]
- Recovery of Fiber Networks C/M-Plane via an IoT-Based Narrow-Band Links System Based on LoRa Mesh PlatformGoshi Sato, Yoshitaka Shibata, Noriki Uchida. 504-511 [doi]
- Clustering Analysis and Visualization of TCM Patents Based on Deep LearningNa Deng, Xu Chen, Caiquan Xiong. 512-520 [doi]
- Efficient Resource Utilization Using Blockchain Network for IoT Devices in Smart CityMuhammad Zohaib Iftikhar, Muhammad Sohaib Iftikhar, Muhammad Jawad, Annas Chand, Zain Ahmad Khan, Abdul Basit Majeed Khan, Nadeem Javaid. 521-534 [doi]
- Recommendation System Based on Deep LearningTianhan Gao, Lei Jiang, Xibao Wang. 535-543 [doi]
- Routing Method Based on Data Transfer Path in DTN EnvironmentsKazuma Ikenoue, Kazunori Ueda. 544-552 [doi]
- A Hybrid Intelligent Simulation System for Node Placement in WMNs Considering Load Balancing: A Comparison Study for Exponential and Normal Distribution of Mesh ClientsSeiji Ohara, Heidi Durresi, Admir Barolli, Shinji Sakamoto, Leonard Barolli. 555-569 [doi]
- Multi-dimensional Contract Incentive Design for Mobile Crowdsourcing NetworksNan Zhao 0006, Menglin Fan, Chao Tian, Pengfei Fan, Xiao He. 570-578 [doi]
- 2 and Fuel Consumption for Different Car Following ModelsNingling Jiang, Elis Kulla. 579-588 [doi]
- Individually Separated Wireless Access Point to Protect User's Private InformationMyoungsu Kim, Kangbin Yim. 589-596 [doi]
- Long-Term Care (LTC) Monitoring System for Caregivers Based on Wireless Sensing TechnologyHsing-Chung Chen, Mei-He Jiang, Tzu-Ya Chen. 597-605 [doi]
- Concatenated Path Domain for Dijkstra's Algorithm Based Ray Tracing to Enhance Computational AreasKazunori Uchida, Leonard Barolli. 609-620 [doi]
- Routing of Optical Baseband Signal Depending on Wavelength in Periodic StructureNaoki Higashinaka, Hiroshi Maeda. 621-629 [doi]
- Two-Stage Dynamic Contract Design Under Asymmetric Information in Cooperative CommunicationNan Zhao 0006, Pengfei Fan, Xiao He, Menglin Fan, Chao Tian. 630-637 [doi]
- Minimizing Control Overhead of Routing Protocols in Wireless Multihop Networks: Simulation EvaluationSoushi Morita, Elis Kulla. 638-645 [doi]
- Effect of Parasitic Element on Communication Performance of 13.56 MHz RFID SystemKiyotaka Fujisaki, Yuki Yoshigai. 646-654 [doi]
- Perception Mining of Network Protocol's Stealth Attack BehaviorsYanjing Hu, Xu an Wang. 657-669 [doi]
- Digital Image Anti-counterfeiting TechnologyChin-Ling Chen, Chin-Feng Lee, Fang-Wei Hsu, Yong-Yuan Deng, Ching-Cheng Liu. 670-677 [doi]
- System Implementation of AUSF Fault ToleranceWei-Sheng Chen, Fang-Yie Leu, Heru Susanto. 678-687 [doi]
- News Collection and Analysis on Public Political OpinionsZhi-Qian Hong, Fang-Yie Leu, Heru Susanto. 688-697 [doi]
- Mobile Physiological Sensor Cloud System for Long-Term CarePing-Jui Chiang, Heru Susanto, Fang-Yie Leu, Hui-Ling Huang. 698-707 [doi]
- A Message Relaying Method with Enhanced Dynamic Timer Considering Decrease Rate of Neighboring Nodes for Vehicular-DTNShogo Nakasaki, Makoto Ikeda, Leonard Barolli. 711-720 [doi]
- Prediction of RSSI by Scikit-Learn for Improving Position Detecting System of Omnidirectional Wheelchair TennisKeita Matsuo, Leonard Barolli. 721-732 [doi]
- Decentralized Mechanism for Hiring the Smart Autonomous Vehicles Using BlockchainZain Abubaker, Muhammad Usman Gurmani, Tanzeela Sultana, Shahzad Rizwan, Muhammad Azeem Sarwar, Muhammad Zohaib Iftikhar, Nadeem Javaid. 733-746 [doi]
- An Intelligent Approach for Resource Management in SDN-VANETs Using Fuzzy LogicErmioni Qafzezi, Kevin Bylykbashi, Evjola Spaho, Leonard Barolli. 747-756 [doi]
- Tutorial Educating Developer of Reinforcement Learning Agent Using IDEALTakahiro Uchiya, Kodai Shimano, Ichi Takumi. 757-762 [doi]
- Trusted Remote Patient Monitoring Using Blockchain-Based Smart ContractsHafiza Syeda Zainab Kazmi, Faiza Nazeer, Sahrish Mubarak, Seemab Hameed, Aliza Basharat, Nadeem Javaid. 765-776 [doi]
- A Survey of Malicious HID DevicesSongyin Zhao, Xu an Wang. 777-786 [doi]
- Power Consumption Attack Based on Improved Principal Component AnalysisZeyu Wang, Wei Zhang, Peng Ma, Xu an Wang. 787-799 [doi]
- How Securely Are OAuth/OpenID Connect Implemented in Japan?Takamichi Saito, Tsubasa Kikuta, Rikita Koshiba. 800-811 [doi]
- Enhanced Decentralized Management of Patient-Driven Interoperability Based on BlockchainAsad Ullah Khan, Affaf Shahid, Fatima Tariq, Abdul-Ghaffar, Abid Jamal, Shahid Abbas, Nadeem Javaid. 815-827 [doi]
- Design and Construction of Intelligent Decision-Making System for Marine Protection and Law EnforcementNa Deng, Xu Chen, Caiquan Xiong. 828-837 [doi]
- Data Authenticity Analysis for Online O2O Data: A Case Study of Second-Hand Houses Posting DataXu Chen, Deliang Zhong, Yingzhou Zheng, Shudong Liu, Yipeng Li, Na Deng. 838-845 [doi]
- A Brief Survey: 3D Face ReconstructionTianhan Gao, Hui An. 846-854 [doi]
- A Feasibility Study on Wrist Rehabilitation Using the Leap MotionLinlin Zhang, Kin Fun Li. 855-864 [doi]
- Classification of Cotton and Flax Fiber Images Based on Inductive Transfer LearningYuhan Jiang, Song Cai, Chunyan Zeng, Zhifeng Wang. 865-871 [doi]