Abstract is missing.
- Resiliency of the Area-Segmentation in Vehicle Routing for Collecting the Disaster InformationSanjukta Khwairakpam, Masahiro Shibata, Masato Tsuru. 1-14 [doi]
- The Probability of Encounters of Nomadic Lévy Walk on Unit Disk GraphsKazuma Matsubara, Naohiro Hayashibara. 15-25 [doi]
- Investigating SIC Performance Using Sequential Power Allocation for Downlink NOMAHurianti Vidyaningtyas, Iskandar, Hendrawan, Aloysius Adya Pramudita, Desti Madya Saputri. 26-34 [doi]
- Information Flow Control in the Fog Computing Model Based on a Component Degree ConceptShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 35-44 [doi]
- Implementation and Benchmarking of Kubernetes Horizontal Pod Autoscaling Method to Event-Driven Messaging SystemXavier Pilyai, Rafsanjani Nurul Irsyad, Ikhwan Nashir Zaini, Ridha Muldina Negara, Sofia Naning Hertiana, Rohmat Tulloh. 45-56 [doi]
- Application of Convolutional Neural Network Method with MobileNet V1 and ResNet-152 V2 Architecture in Batik Motif ClassificationAulia Chusnyriani Sani Zulkarnaen, I Gusti Ngurah Rejski Ariantara Putra, Nada Fauzia Reviana, Rahmawati Hidayah, Nur Ibrahim, Nor Kumalasari Caecar Pratiwi, Yunendah Nur Fuadah. 57-68 [doi]
- Web Viewer for Educational VR Contents of 3D Scene Models Supporting VR GogglesYoshihiro Okada, Kosuke Kaneko, Wei Shi 0008. 69-80 [doi]
- Human Factors Impacting the Security Actions of Help RecipientsAyane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki. 81-93 [doi]
- Proposal for Approaches to Updating Software on Android SmartphoneAyane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki. 94-108 [doi]
- Scheme for Selection of Deceptions as a Countermeasure for Insider ThreatsSana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki. 109-121 [doi]
- Device Classification via Passive Fingerprints with Clustering AlgorithmMasaki Ichino, Naoyuki Masuda, Takahiro Hayashi, Naoki Kodama, Takamichi Saito. 122-134 [doi]
- A Scheme for Source Location Privacy of Multiple Sources in Wireless Sensor NetworksSain Saginbekov. 135-148 [doi]
- Blockchain Application for Fish Origin CertificationRiccardo Petracci, Rosario Culmone, Leonardo Mostarda. 149-158 [doi]
- A Fuzzy-Based System for Assessment of Recognition Error in VANETsErmioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli. 159-167 [doi]
- An Intelligent System Based on Cuckoo Search for Node Placement Problem in WMNs: Tuning of Scale and Host Bird Recognition Rate HyperparametersShinji Sakamoto, Kaho Asakura, Leonard Barolli, Makoto Takizawa 0001. 168-177 [doi]
- Dynamic Spatiotemporal Graph Convolution Network for Cellular Communication Traffic PredictionRuifeng Pan. 178-186 [doi]
- Caching Strategy Utilizing Social Network Analysis Algorithm for Effective Cache Storage Allocation in Named Data NetworkingRidha Muldina Negara, Nana Rachmana Syambas, Eueung Mulyana, Rashid Muhammad Fajri. 187-198 [doi]
- A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible PathsDavid W. White, Isaac Woungang, Felix O. Akinladejo, Sanjay K. Dhurandher. 199-208 [doi]
- An Effective Technique for Collecting Multi-languages Hotel Reviews: A Case Study of 5 Stars Hotels in Bali IslandDahlan Nariman. 209-217 [doi]
- Applying High-Quality Test Case Management Mechanisms to Improve Regression Testing Speed and QualitySen-Tarng Lai, Fang-Yie Leu. 218-227 [doi]
- Case Study in Generating RFC Maps of IETF StandardsJeng-Wei Lin, Yi-Ting Lin, Fang-Yie Leu. 228-237 [doi]
- Enhancing Resource Allocation for Cloud Computation Platform with Priority Based SchedulingLung-Pin Chen, Fang-Yie Leu, Junrui Pan, Chia-Chen Kuo, Ming-Jen Wang. 238-243 [doi]
- 5G Network Base Station Timeline SchedulingYu-Han Chen, Chao-Hsiang Hsu, Heru Susanto, Fang-Yie Leu. 244-252 [doi]
- Assessment of RIWM and FC-RDVM for Small and Middle Scale WMNs Considering Stadium Distribution and UNDX-M Crossover MethodLeonard Barolli. 253-262 [doi]
- A New DTN Routing Strategy Considering Age of InformationFuka Isayama, Tetsuya Shigeyasu. 263-272 [doi]
- DTN Routing Method Based on Records of Data Transmission PathsKazunori Ueda, Kouki Yano. 273-281 [doi]
- Effect of Polarization Loss on Channel CapacityTrasma Yunita, Chairunnisa, A. Adya Pramudita, Achmad Munir. 282-291 [doi]
- FSALT: A Fuzzy-Based System for Assessment of Logical Trust and Its Performance EvaluationShunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 292-301 [doi]
- Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection SystemKamronbek Yusupov, Md Rezanur Islam, Insu Oh, Kangbin Yim. 302-311 [doi]
- Wireless Visual Sensor Node Placement Optimization Considering Different Distributions of EventsYuki Nagai, Tetsuya Oda, Chihiro Yukawa, Kyohei Toyoshima, Kei Tabuchi, Leonard Barolli. 312-322 [doi]
- A Music Therapy Model Based on Consortium Blockchain Platform with Evidence and Tracking Efficacy of Hypertension TreatmentHsing-Chung Chen, Pei-Yu Hsu, Jhih-Sheng Su. 323-334 [doi]
- Effect of Multiple Unmanned Aerial Vehicles on Data Transmission Considering DTN-Based V2V Communication in Urban AreaShura Tachibana, Ryuki Shiromoto, Makoto Ikeda, Leonard Barolli. 335-344 [doi]
- Moving Accuracy Measurement of Omnidirectional Robot for MOAP and Wheelchair TennisKeita Matsuo, Elis Kulla, Leonard Barolli. 345-353 [doi]
- Data Augmentation Method for Improving Object Detection Accuracy of Recumbent Human in DisasterTakahiro Uchiya, Taiga Yamada. 354-364 [doi]
- Optimal Compressing and Decompressing Digital-Ink Handwriting via Sparse Gaussian Process Regression and Dynamic ProgrammingJinya Yano, Hiroyuki Fujioka. 365-373 [doi]