Abstract is missing.
- A Fuzzy-Based System for Cloud-Fog-Edge Selection in VANETsKevin Bylykbashi, Yi Liu 0011, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 1-12 [doi]
- Group Speed Parameter Effect for Clustering of Vehicles in VANETs: A Fuzzy-Based ApproachKosuke Ozera, Kevin Bylykbashi, Yi Liu 0011, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 13-24 [doi]
- A Fuzzy-Based System for Selection of Actor Nodes in WSANs Considering Actor Reliability and Load DistributionDonald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 25-38 [doi]
- IoT Device Selection in Opportunistic Networks: A Fuzzy Approach Considering IoT Device Failure RateMiralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 39-52 [doi]
- A Comparison Study for Chi-Square and Uniform Client Distributions by WMN-PSOSA Simulation System for WMNsShinji Sakamoto, Leonard Barolli, Shusuke Okamoto. 53-65 [doi]
- Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Exponential and Chi-Square Client DistributionsAdmir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 66-79 [doi]
- Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC ModelShohei Hayashi, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 80-91 [doi]
- Implementation of Fog Nodes in the Tree-Based Fog Computing (TBFC) Model of the IoTRyusei Chida, Yinzhe Guo, Ryuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 92-102 [doi]
- A Framework for Automatically Generating IoT Security Quizzes in a Virtual 3D Environment Based on Linked DataWei Shi, Chenguang Ma, Srishti Kulshrestha, Ranjan Bose, Yoshihiro Okada. 103-113 [doi]
- Authentication Protocols Using Multi-level Cognitive CAPTCHAMarek R. Ogiela, Lidia Ogiela. 114-119 [doi]
- Linguistic-Based Security in Fog and Cloud ComputingUrszula Ogiela, Makoto Takizawa 0001, Lidia Ogiela. 120-127 [doi]
- Obfuscation Algorithms Based on Congruence Equation and Knapsack ProblemDa Xiao, Shouying Bai, Qian Wu, Baojiang Cui. 128-136 [doi]
- Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition SystemQian Ma, Bin Xu, Bang Sun, Feng Zhai, Baojiang Cui. 137-147 [doi]
- E-Learning Material Development Framework Supporting 360VR Images/Videos Based on Linked Data for IoT Security EducationYoshihiro Okada, Akira Haga, Shi Wei, Chenguang Ma, Srishti Kulshrestha, Ranjan Bose. 148-160 [doi]
- Domain Formalization for Metaphorical ReasoningFlora Amato, Giovanni Cozzolino, Francesco Moscato 0001. 161-169 [doi]
- A Hybrid Approach for Document Analysis in Digital Forensic DomainFlora Amato, Giovanni Cozzolino, Marco Giacalone, Francesco Moscato 0001, Francesco Romeo, Fatos Xhafa. 170-179 [doi]
- Evaluating Indoor Location Triangulation Using Wi-Fi SignalsYasir Javed, Zahoor Khan, Sayed Asif. 180-186 [doi]
- Big Data Role in Improving Intelligent Transportation Systems Safety: A SurveyMohammed Arif Amin, Samah Hadouej, Tasneem S. J. Darwish. 187-199 [doi]
- Predicting Cancer Survivability: A Comparative StudyOla Abu Elberak, Loai M. Alnemer, Majdi Sawalha, Jamal Alsakran. 200-209 [doi]
- Enhanced Classification of Sentiment Analysis of Arabic ReviewsLoai M. Alnemer, Bayan Alammouri, Jamal Alsakran, Omar el Ariss. 210-220 [doi]
- Load and Price Forecasting Based on Enhanced Logistic Regression in Smart GridAroosa Tahir, Zahoor Ali Khan, Nadeem Javaid, Zeeshan Hussain, Aimen Rasool, Syeda Aimal. 221-233 [doi]
- Effect of Peer Mobility for a Fuzzy-Based Peer Coordination Quality System in Mobile P2P NetworksVladi Kolici, Yi Liu 0011, Keita Matsuo, Leonard Barolli. 234-246 [doi]
- Load and Price Forecasting in Smart Grids Using Enhanced Support Vector MachineAmmara Nayab, Tehreem Ashfaq, Syeda Aimal, Aimen Rasool, Nadeem Javaid, Zahoor Ali Khan. 247-258 [doi]
- Data Analytics for Load and Price Forecasting via Enhanced Support Vector RegressionTanzeela Sultana, Zahoor Ali Khan, Nadeem Javaid, Syeda Aimal, Aisha Fatima, Shaista Shabbir. 259-270 [doi]
- A Deep Learning Approach Towards Price Forecasting Using Enhanced Convolutional Neural Network in Smart GridFahad Ahmed, Maheen Zahid, Nadeem Javaid, Abdul Basit Majeed Khan, Zahoor Ali Khan, Zain Murtaza. 271-283 [doi]
- Semantic Multi Agent Architecture for Chronic Disease Monitoring and ManagementLina Nachabe, Bachar El Hassan, Jean Taleb. 284-294 [doi]
- Big Data Analytics in E-procurement of a Chain HotelElezabeth Mathew. 295-308 [doi]
- Data Modeling and Visualization of Tax Strategies Employed by Overseas American Individuals and FirmsAlfred Howard Miller. 309-321 [doi]
- A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat MapBenson Raj, L. Jani Anbarasi, Modigari Narendra, V. J. Subashini. 322-332 [doi]
- Feasibility Approach Based on SecMonet Framework to Protect Networks from Advanced Persistent Threat AttacksMaher Salem, Moayyad Mohammed. 333-343 [doi]
- Trust Analysis for Information Concerning Food-Related RisksAlessandra Amato, Giovanni Cozzolino. 344-354 [doi]
- Outgoing Data Filtration for Detecting Spyware on Personal ComputersAishwarya Afzulpurkar, Mouza Alshemaili, Khalid Samara. 355-362 [doi]
- Formulation of Information Hiding Model for One-Time Authentication Methods Using the Merkle TreeYuji Suga. 363-373 [doi]
- An Approach to Discover Malicious Online Users in Collaborative SystemsOssama Embarak, Maryam Khaleifah, Alya Ali. 374-382 [doi]
- Understanding Students Personality to Detect Their Learning DifferencesOssama Embarak, Zahoor Khan, Binod Gurung. 383-390 [doi]
- A Novel Simulation Based Classifier Using Random Tree and Reinforcement LearningIsrar Ahmed, Munir Naveed, Mohammed Adnan. 391-400 [doi]
- Perceiving Intellectual Style to Solve Privacy Problem in Collaborative SystemsOssama Embarak, Kholoud Saeed, Manal Ali. 401-410 [doi]
- An Enhanced Knowledge Integration of Association Rules in the Privacy Preserved Distributed Environment to Identify the Exact Interesting PatternSujni Paul. 411-424 [doi]
- Application of Fog and Cloud Computing for Patient's Data in the Internet of ThingsSoulat Waheed, Peer A. Shah. 425-436 [doi]
- Adoption of Emerging Technologies in Supply Chain Operations for Cost Reduction and Enhancement of Shareholder Wealth: A Case Study of UAE OrganizationBenjamin S. Bvepfepfe, Amjad khan Suri, Ali El Asad. 437-446 [doi]
- Hybrid Approach for Heart Disease Prediction Using Data Mining TechniquesMonther Tarawneh, Ossama Embarak. 447-454 [doi]
- A Hybrid Optimization GNA Algorithm for the Quadratic Assignment Problem SolvingKefaya Qaddoum, Azmi Al Azzam. 455-464 [doi]
- An Enhanced Model for Abusive Behavior Detection in Social NetworkKefaya Qaddoum, Israr Ahmad, Yasir Javed, Ali Rodan. 465-471 [doi]
- Proposal of a Regional Culture Inheritance System by AR TechnologyHengyi Li, Tomoyuki Ishida. 472-481 [doi]
- Clinical Trial on Computer-Aided Design in Pre-operative Alveolar Bone Grafting in Cleft Lip - Cleft Palate PatientKrit Khwanngern, Vivatchai Kaveeta, Suriya Sitthikham, Watcharaporn Sitthikamtiub, Sineenuch Changkai, Tanyakorn Namwong. 482-491 [doi]
- Large-Scale Simulation of Site-Specific Propagation Model: Defining Reference Scenarios and Performance EvaluationZeeshan Hameed Mir. 492-503 [doi]
- Security Approach for In-Vehicle Networking Using Blockchain TechnologyMaher Salem, Moayyad Mohammed, Ali Rodan. 504-515 [doi]
- Towards Optimizing Energy Efficiency and Alleviating Void Holes in UWSNAbdul Mateen, Nadeem Javaid, Muhammad Bilal, Muhammad Arslan Farooq, Zahoor Ali Khan, Fareena Riaz. 516-527 [doi]
- Cluster-Based Routing Protocols with Adaptive Transmission Range Adjustment in UWSNsMuhammad Awais 0002, Zahoor Ali Khan, Nadeem Javaid, Abdul Mateen, Aymen Rasul, Hassan Farooq. 528-539 [doi]
- A Unicast Rate-Based Protocol for Video Streaming Applications over the InternetG. A. Lusilao-Zodi, T. Ankome, J. Mateus, L. Iiyambo, J. Silaa. 540-551 [doi]
- TCP with Network Coding Performance Under Packet ReorderingNguyen Viet Ha, Masato Tsuru. 552-563 [doi]
- A Common Ontology Based Approach for Clinical Practice Guidelines Using OWL-OntologiesKhalid Samara, Munir Naveed, Yasir Javed, Mouza Alshemaili. 564-575 [doi]