Abstract is missing.
- A Comparison Study of Chi-square and Uniform Distributions of Mesh Clients by WMN-PSODGA Simulation System for RIWM and LDIWM Router Replacement MethodsAdmir Barolli, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, Leonard Barolli. 1-13 [doi]
- Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Number of Mesh Routers and Chi-Square Distribution of Mesh ClientsShinji Sakamoto, Yi Liu 0011, Leonard Barolli, Shusuke Okamoto. 14-24 [doi]
- An Energy-Efficient Algorithm to Make Virtual Machines Migrate in a Server ClusterDilawaer Duolikun, Tomoya Enokido, Leonard Barolli, Makoto Takizawa 0001. 25-36 [doi]
- Evaluation of Focused Beam Routing Protocol for Different Applications of Underwater Sensor NetworksElis Kulla, Keita Matsuo, Leonard Barolli. 37-45 [doi]
- Performance Evaluation of V2X Communication for Road State Information Platform Based on 5G and HighSpeed LANYoshitaka Shibata, Akira Sakuraba. 46-56 [doi]
- An Energy-Efficient Process Replication by Differentiating Starting Time of Process Replicas in Virtual Machine EnvironmentsTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 57-66 [doi]
- Traffic Reduction for Information Flow Control in the IoTShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 67-77 [doi]
- A Simulation System for Mesh Router Placement in WMNs Considering Coverage Construction Method and Simulated AnnealingAoto Hirata, Tetsuya Oda, Nobuki Saito, Tomoya Yasunaga, Kengo Katayama, Leonard Barolli. 78-87 [doi]
- On the Latency of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant NetworksKoichiro Sugihara, Naohiro Hayashibara. 88-99 [doi]
- A Machine Learning Based Network Intrusion Detection System with Applying Different Algorithm in Multiple StagesSeiichi Sasa, Hiroyuki Suzuki, Akio Koyama. 100-110 [doi]
- In-vehicle Network IDS Using Message Time Interval InfrastructureChanMin Kim, Insu Oh, Yeji Koh, Myoungsu Kim, Kangbin Yim. 111-119 [doi]
- A Fuzzy-Based System for Assessment of Quality of Service Communication Links in SDN-VANETsErmioni Qafzezi, Kevin Bylykbashi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 120-128 [doi]
- Malware Classification Based on Graph Neural Network Using Control Flow GraphRongze Xia, Baojiang Cui. 129-138 [doi]
- Hand Gesture Input Interface of IntelligentBox Using Leap Motion Controller and Its Application ExampleTakumi Takeshita, Kosuke Kaneko, Yoshihiro Okada. 139-147 [doi]
- Toward Automated Audit of Client-Side Vulnerability Against Cross-Site ScriptingMamoru Mimura, Takumi Yamasaki. 148-157 [doi]
- Single Sign-On Using Contactless Smart Cards and Fingerprint AuthenticationSriram Bobba, Vamsi Paruchuri. 158-166 [doi]
- Blockchain-Based Identity Management for Personal Data: A SurveyMekhled Alharbi, Farookh Khadeer Hussain. 167-178 [doi]
- Effects of Buffer Management Considering Time Continuity on Disaster Information on DTN Based Information Sharing SystemTetsuya Shigeyasu, Shogo Utahara. 179-188 [doi]
- Fusion Techniques for Strong Data ProtectionUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 189-192 [doi]
- Predictive Intelligence Approaches for Security TechnologiesUrszula Ogiela, Marek R. Ogiela. 193-196 [doi]
- Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project FailureSen-Tarng Lai, Heru Susanto, Fang-Yie Leu. 197-205 [doi]
- The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G NetworksPei-Hua Yu, Heru Susanto, Li-Xuan Liu, Shang-Jie Wu, Fang-Yie Leu. 206-215 [doi]
- Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource DatasetsPei-Xuan Cai, Yao-Chung Fan, Fang-Yie Leu. 216-225 [doi]
- Efficient Execution of Malleable Applications in Desktop Grids Using Credit DampingLung-Bin Chen, Fang-Yie Leu. 226-233 [doi]
- An Adaptive Anti-packet Recovery Method for Vehicular DTN: Performance Evaluation Considering Shuttle Buses and Roadside Units ScenarioMasaya Azuma, Shota Uchimura, Yoshiki Tada, Makoto Ikeda, Leonard Barolli. 234-241 [doi]
- Proposal of Vehicular Real-Time Sensing Method for Amount of Snow Accumulation on the RoadAkira Sakuraba, Yoshitaka Shibata, Mamoru Ohara. 242-250 [doi]
- Numerical Analysis of Electromagnetic Wave Propagation in Photonic Crystal Waveguide with Stubs for Wavelength FilteringHiroshi Maeda. 251-259 [doi]
- Evaluating the Impact of Node Density and Area Shape in Underwater Wireless Sensor NetworksElis Kulla, Kuya Shintani, Keita Matsuo. 260-267 [doi]
- Improving Peer Reliability in P2P Networks: Implementation of an Integrated Simulation System Considering Fuzzy Logic and NS-3Yi Liu 0011, Shinji Sakamoto, Leonard Barolli. 268-278 [doi]
- Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product DWontae Jung, Kangbin Yim, Kyungroul Lee. 279-283 [doi]
- SPEC: Frame Filtering for CAN Protocol on ECUMunkhdelgerekh Batzorig, Insu Oh, ChanMin Kim, Yeji Koh, Kangbin Yim. 284-293 [doi]
- A Concept of IDS for CAN Protocol Based on Statics TheoryMd Rezanur Islam, Insu Oh, Munkhdelgerekh Batzorig, Seoyeon Kim, Kangbin Yim. 294-302 [doi]
- Design and Implementation of a Control Interface for Indoor Position Detection of Moving Omnidirectional Access Point Robot Using Super Sonic SignalsKenshiro Mitsugi, Atushi Toyama, Keita Matsuo, Elis Kulla, Leonard Barolli. 303-314 [doi]
- An Intelligent Fallen Object Detection System for Safe DrivingShota Uchimura, Yoshiki Tada, Makoto Ikeda, Leonard Barolli. 315-320 [doi]
- A Simulation System for Optimal Positions of MOAP Robots Using Elbow and Silhouette Theories: Simulation Results Considering Minimum Transmission Power of MOAP RobotsKeita Matsuo, Kenshiro Mitsugi, Atushi Toyama, Elis Kulla, Leonard Barolli. 321-332 [doi]
- Proposal of Indoor Navigation System Using Mixed Reality TechnologyTakahiro Uchiya, Yudai Furuta, Ichi Takumi. 333-340 [doi]