Abstract is missing.
- Implementation of a New Function for Preventing Short Reconnection in a WLAN Triage SystemKosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Leonard Barolli. 1-17 [doi]
- A Web-Based English Listening System for Learning Different Pronunciations in Various CountriesKohei Kamimura, Kosuke Takano. 18-28 [doi]
- FOG Computing and Low Latency Context-Aware Health Monitoring in Smart Interconnected EnvironmentsPhilip Moore, Hai Van Pham. 29-40 [doi]
- Application of Fuzzy Logic for Improving Human Sleeping Conditions in an Ambient Intelligence TestbedKevin Bylykbashi, Ryoichiro Obukata, Yi Liu 0011, Evjola Spaho, Leonard Barolli, Makoto Takizawa. 41-50 [doi]
- Performance Evaluation of WMN-PSOSA Considering Four Different Replacement MethodsShinji Sakamoto, Kosuke Ozera, Admir Barolli, Leonard Barolli, Vladi Kolici, Makoto Takizawa. 51-64 [doi]
- Improving Team Collaboration in MobilePeerDroid Mobile System: A Fuzzy-Based Approach Considering Four Input ParametersYi Liu 0011, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Vladi Kolici. 65-78 [doi]
- Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization and Distributed Genetic AlgorithmAdmir Barolli, Shinji Sakamoto, Kosuke Ozera, Leonard Barolli, Elis Kulla, Makoto Takizawa. 79-93 [doi]
- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security ParametersMiralda Cuka, Donald Elmazi, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli. 94-105 [doi]
- Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Failure of Assigned Task as New ParameterDonald Elmazi, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli. 106-118 [doi]
- Malicious Information Flow in P2PPS SystemsShigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa. 119-129 [doi]
- Eco Migration Algorithms of Processes with Virtual Machines in a Server ClusterRyo Watanabe, Dilawaer Duolikun, Cuiqin Qin, Tomoya Enokido, Makoto Takizawa. 130-141 [doi]
- Collision Avoidance for Omnidirectional Automated Transportation Robots Considering Entropy ApproachKeita Matsuo, Leonard Barolli. 142-151 [doi]
- Performance Evaluation of an Active Learning System Using Smartphone: A Case Study for High Level ClassNoriyasu Yamamoto, Noriki Uchida. 152-160 [doi]
- Performance Evaluation of an Enhanced Message Suppression Controller Considering Delayed Ack Using Different Road Traffic ConditionsDaichi Koga, Yu Yoshino, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli. 161-170 [doi]
- Improved Energy-Efficient Quorum Selection Algorithm by Omitting Meaningless MethodsTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa. 171-182 [doi]
- Improving Data Loss Prevention Using ClassificationBrunela Karamani. 183-189 [doi]
- Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson CoefficientHong Zhao, Yi Wang. 190-201 [doi]
- Stochastic Power Management in Microgrid with Efficient Energy StorageItrat Fatima, Nadeem Javaid, Abdul Wahid, Zunaira Nadeem, Muqqadas Naz, Zahoor Ali Khan. 202-213 [doi]
- A Metaheuristic Scheduling of Home Energy Management SystemAnila Yasmeen, Nadeem Javaid, Itrat Fatima, Zunaira Nadeem, Asif Khan, Zahoor Ali Khan. 214-224 [doi]
- Void Hole and Collision Avoidance in Geographic and Opportunistic Routing in Underwater Wireless Sensor NetworksAasma Khan, Nadeem Javaid, Ghazanfar Latif, Obaida Abdul Karim, Faisal Hayat, Zahoor Ali Khan. 225-236 [doi]
- Optimized Energy Management Strategy for Home and OfficeSaman Zahoor, Nadeem Javaid, Anila Yasmeen, Isra Shafi, Asif Khan, Zahoor Ali Khan. 237-246 [doi]
- Energy Balanced Load Distribution Through Energy Gradation in UWSNsGhazanfar Latif, Nadeem Javaid, Aasma Khan, Faisal Hayat, Umar Rasheed, Zahoor Ali Khan. 247-257 [doi]
- Routing Protocol with Minimized Load Distribution for UASNsFaisal Hayat, Nadeem Javaid, Mehreen Shah, Umar Rasheed, Aasma Khan, Zahoor Ali Khan. 258-269 [doi]
- Transmission Range Adjustment for Void Hole Avoidance in UWSNsMehreen Shah, Nadeem Javaid, Umar Rasheed, Faisal Hayat, Ghazanfar Latif, Zahoor Ali Khan. 270-280 [doi]
- Exploiting Meta-heuristic Technique for Optimal Operation of MicrogridSaman Zahoor, Nadeem Javaid, Ayesha Zafar, Anila Yasmeen, Asad-ur-rehman, Zahoor Ali Khan. 281-291 [doi]
- Appliances Scheduling Using State-of-the-Art Algorithms for Residential Demand ResponseRasool Bukhsh, zafar iqbal, Nadeem Javaid, Usman Ahmed, Asif Khan, Zahoor Ali Khan. 292-302 [doi]
- Optimal Energy Management in Microgrids Using Meta-heuristic TechniqueAnila Yasmeen, Nadeem Javaid, Saman Zahoor, Hina Iftikhar, Sundas Shafiq, Zahoor Ali Khan. 303-314 [doi]
- Usage Optimization of Mobile Devices Resources in Mobile WebNebojsha Ilijoski, Vladimir Trajkovik. 315-325 [doi]
- The Performance Comparison for Low and Medium Earth Orbiting Satellite Search and Rescue ServicesBexhet Kamo, Joana Jorgji, Shkelzen Cakaj, Vladi Kolici, Algenti Lala. 326-338 [doi]
- An Integrated System Considering WLAN and DTN for Improving Network Performance: Evaluation for Different Scenarios and ParametersEvjola Spaho, Kevin Bylykbashi, Leonard Barolli, Makoto Takizawa. 339-348 [doi]
- An Efficient Algorithm to Energy Savings for Application to the Wireless Multimedia Sensor NetworksAstrit Hulaj, Adrian Shehu. 349-358 [doi]
- Endowing IoT Devices with Intelligent ServicesAneta Poniszewska-Maranda, Daniel Kaczmarek, Natalia Kryvinska, Fatos Xhafa. 359-370 [doi]
- VM Deployment Methods for DaaS Model in CloudsKlodiana Goga, Fatos Xhafa, Olivier Terzo. 371-382 [doi]
- A Capability and Compatibility Approach to Modelling of Information Reuse and Integration for InnovationValentina Plekhanova. 383-393 [doi]
- Vehicle Insurance Payment System Based on IoTElma Zanaj, Kristi Verushi, Indrit Enesi, Blerina Zanaj. 394-402 [doi]
- Software as a Service (SaaS) Service Selection Based on Measuring the Shortest Distance to the Consumer's PreferencesMohammed Abdulaziz Ikram, Farookh Khadeer Hussain. 403-415 [doi]
- Efficient Content Sharing with File Splitting and Differences Between Versions in Hybrid Peer-to-Peer NetworksToshinobu Hayashi, Shinji Sugawara. 416-428 [doi]
- Improving Security with Cognitive WorkflowsGiovanni Cammarata, Rao Mikkilineni, Giovanni Morana, Riccardo Nocita. 429-436 [doi]
- Threshold Model Based on Relative Influence Weight of UserDeyang Zhang, Xu an Wang, Xiaolong Li, Chunfen Xu. 437-448 [doi]
- Design of a Low-Power Cold Chain Logistics Internet of Things SystemHeshuai Shao, Ronglin Hu, Chengdong Ma. 449-461 [doi]
- Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key SettingYudong Liu, Xu an Wang, Arun Kumar Sangaiah, Heshuai Shao. 462-469 [doi]
- Evaluation of Techniques for Improving Performance and Security in Relational DatabasesRenalda Kushe, Kevin Karafili. 470-478 [doi]
- E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security EducationChenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose. 479-491 [doi]
- Automatic Test Case Generation Method for Large Scale Communication Node SoftwareKazuhiro Kikuma, Takeshi Yamada, Kiyoshi Ueda, Akira Fukuda. 492-503 [doi]
- Big Data in Cloud Computing: A Review of Key Technologies and Open IssuesElena Canaj, Aleksander Xhuvani. 504-513 [doi]
- A Novel Question Answering System for Albanian LanguageEvis Trandafili, Elinda Kajo Meçe, Kristjan Kica, Hakik Paci. 514-524 [doi]
- A Thorough Experimental Evaluation of Algorithms for Opinion Mining in AlbanianNelda Kote, Marenglen Biba, Evis Trandafili. 525-536 [doi]
- Performance Evaluation of Text Categorization Algorithms Using an Albanian CorpusEvis Trandafili, Nelda Kote, Marenglen Biba. 537-547 [doi]
- Battery Size Impact in Green Coverage of Datacenters Powered by Renewable Energy: A Latitude ComparisonEnida Sheme, Sébastien Lafond, Dorian Minarolli, Elinda Kajo Meçe, Simon Holmbacka. 548-559 [doi]
- A Comparison of Data Fragmentation Techniques in Cloud ServersSalvatore Lentini, Enrico Grosso, Giovanni Luca Masala. 560-571 [doi]
- SimpleCloud: A Simple Simulator for Modeling Resource Allocations in Cloud ComputingDorian Minarolli, Elinda Kajo Meçe, Enida Sheme, Igli Tafa. 572-583 [doi]
- Multimodal Attention Agents in Visual ConversationLorena Kodra, Elinda Kajo Meçe. 584-596 [doi]
- Data Interpretation Using Mobile Uncalibrated Sensor for Urban Environmental MonitoringElson Agastra, Bexhet Kamo, Ilir Shinko, Renalda Kushe. 597-605 [doi]
- Reducing Excess Traffic in Urban Areas with Microscopic Traffic Modeling in SUMOAlban Rakipi, Joana Jorgji, Desar Shahu. 606-614 [doi]
- An Empirical Evaluation of Sequential Pattern Mining AlgorithmsMarjana Prifti Skenduli, Corrado Loglisci, Michelangelo Ceci, Marenglen Biba, Donato Malerba. 615-626 [doi]
- Towards Internet of Things and Cloud Computing for Management of Cars NetworkKrzysztof Stepien, Aneta Poniszewska-Maranda. 627-638 [doi]
- An Edge Computer Based Driver Monitoring System for Assisting Safety DrivingToshiyuki Haramaki, Hiroaki Nishino. 639-650 [doi]
- A Mobile Wireless Network Visualizer for Assisting AdministratorsDai Shimizu, Toshiyuki Haramaki, Hiroaki Nishino. 651-662 [doi]
- C++ Memory Detection Tool Based on Dynamic InstrumentationSiran Fu, Baojiang Cui, Tao Guo, Xuyan Song. 663-674 [doi]
- Flying Ad Hoc Network for Emergency Applications Connected to a Fog SystemDan Radu, Adrian Cretu, Benoît Parrein, Jiazi Yi, Camelia Avram, Adina Astilean. 675-686 [doi]
- An Improved Informative Test Code Approach for Code Writing Problem in Java Programming Learning Assistant SystemNobuo Funabiki, Khin Khin Zaw, Ei Ei Mon, Wen-Chung Kao. 687-698 [doi]
- Tourism Support System Using AR for Tourists' Migratory BehaviorsHaruna Sonobe, Hiroaki Nishino, Yoshihiro Okada, Kousuke Kaneko. 699-710 [doi]
- Some Improvements in VCP for Data Traffic Reduction in WSNEzmerina Kotobelli, Mario Banushi, Igli Tafaj, Alban Allkoçi. 711-722 [doi]
- Indoor Self Localization Method for Connected Wheelchair Based on LED Optical Frequency ModulationKazuyuki Kojima. 723-731 [doi]
- An Auction Framework for DaaS in Cloud ComputingAnjan Bandyopadhyay, Fatos Xhafa, Sajal Mukhopadhyay. 732-741 [doi]
- A Fingerprint Enhancement Algorithm in Spatial and Wavelet DomainIndrit Enesi, Algenti Lala, Elma Zanaj. 742-753 [doi]
- Android OS Stack Power Management CapabilitiesOlimpjon Shurdi, Luan Ruçi, Vladi Kolici, Algenti Lala, Bexhet Kamo. 754-764 [doi]
- Signal Routing by Cavities in Photonic Crystal WaveguideHiroshi Maeda, Xiang Zheng Meng, Keisuke Haari, Naoki Higashinaka. 765-772 [doi]
- Image Semantic Segmentation Algorithm Based on Self-learning Super-Pixel Feature ExtractionJuan Wang, Hao Shi, Min Liu, Wei Xiong, Kaiwen Cheng, Yuhan Jiang. 773-781 [doi]
- Research and Implementation of Indoor Positioning Algorithm for Personnel Based on Deep LearningHanhui Yue, Xiao Zheng, Juan Wang, Li Zhu, Chunyan Zeng, Cong Liu, Meng Liu. 782-791 [doi]
- Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key SizeCong Li, Xu an Wang, Arun Kumar Sangaiah, Haibing Yang, Chun Shan. 792-800 [doi]
- Subjective Annoyance Caused by Low Frequency NoiseLing Lu, Hong-Wei Zhuang, Liang Xu. 801-809 [doi]
- The Relationship Between Personality Traits and Aggressive Behavior in People with Long Term NoiseLing Lu, Hong-Wei Zhuang, Liang Xu. 810-817 [doi]
- Efficient Expanded Mixed Finite Element Method for the Forchheimer ModelYanping Li, Qingli Zhao. 818-827 [doi]
- Research on Indoor Location Method Based on WLAN Signal Location FingerprintsTao Wang, Tan Wang, Huanbing Gao, Yanping Li. 828-840 [doi]
- Homomorphic Authentication Based on Rank-Based Merkle Hash TreePing Bai, Wei Zhang, Xu an Wang, Yudong Liu, Haibin Yang, Chun Shan. 841-848 [doi]
- Behavioral Security in Cloud and Fog ComputingMarek R. Ogiela, Lidia Ogiela. 849-854 [doi]
- Voice Quality Testing Using VoIP Applications over 4G Mobile NetworksDesar Shahu, Alban Rakipi, Joana Jorgji, Ismail Baxhaku, Irena Galic. 855-862 [doi]
- Service Management Protocols in Cloud ComputingUrszula Ogiela, Makoto Takizawa, Lidia Ogiela. 863-869 [doi]
- An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated AttacksRyohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki. 870-879 [doi]
- A Data Sharing Method Using WebRTC for Web-Based Virtual WorldMasaki Kohana, Shusuke Okamoto. 880-888 [doi]
- A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMGTokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki. 889-900 [doi]
- The Analysis of MATE Attack in SDN Based on STRIDE ModelAbeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry. 901-910 [doi]
- Performance Evaluation of Lévy Walk on Message Dissemination in Unit Disk GraphsKenya Shinki, Naohiro Hayashibara. 911-921 [doi]
- Human vs. Automatic Annotation Regarding the Task of Relevance Detection in Social NetworksNuno Guimarães, Filipe Miranda, Álvaro Figueira. 922-933 [doi]
- Performance Evaluation of Support Vector Machine and Convolutional Neural Network Algorithms in Real-Time Vehicle Type ClassificationAli Sentas, Isabek Tashiev, Fatmanur Küçükayvaz, Seda Kul, Süleyman Eken, Ahmet Sayar, Yasar Becerikli. 934-943 [doi]
- Cloud Orchestration with ORCS and OpenStackFlora Amato, Francesco Moscato 0001, Fatos Xhafa. 944-955 [doi]
- Improving Results of Forensics Analysis by Semantic-Based Suggestion SystemFlora Amato, Leonard Barolli, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato 0001. 956-967 [doi]
- Modeling of Radio Base Stations with the Numerical FDTD Method, for the Electromagnetic Field EvaluationAlgenti Lala, Bexhet Kamo, Joana Jorgji, Elson Agastra. 968-977 [doi]
- Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing ResistanceMakoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park. 978-989 [doi]
- Phishing Detection Research Based on PSO-BP Neural NetworkWenwu Chen, Xu an Wang, Wei Zhang, Chunfen Xu. 990-998 [doi]
- Evaluation of Index Poisoning Method in Large Scale Winny NetworkKentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki. 999-1006 [doi]
- A Hybrid Technique for Residential Load Scheduling in Smart Grids Demand Side ManagementMuhammad Hassan Rahim, Adia Khalid, Ayesha Zafar, Fozia Feroze, Sahar Rahim, Nadeem Javaid. 1007-1017 [doi]
- Modeling Research on Time-Varying Impulse Resistance of Grounding GridTao Wang, Xianzhe Hu, Yangping Li, Qi Wang. 1018-1026 [doi]
- Research on Intelligent Parking Area Division and Path PlanningYanping Li, Boying Shi, Tao Wang, Qi Wang, Linyan Wu. 1027-1036 [doi]
- Moving Applications to an On-demand, Software-as-a-Service Model in the Albanian Government CloudEnkeleda Kuka, Alba Haveriku, Aleksander Xhuvani. 1037-1048 [doi]
- Performance Evaluation of an IoT-Based E-learning Testbed Considering Meditation ParameterMasafumi Yamada, Kevin Bylykbashi, Yi Liu 0011, Keita Matsuo, Leonard Barolli, Vladi Kolici. 1049-1060 [doi]
- Towards Integrating Conversational Agents and Learning Analytics in MOOCsStavros N. Demetriadis, Anastasios Karakostas, Thrasyvoulos Tsiatsos, Santi Caballé, Yannis A. Dimitriadis, Armin Weinberger, Pantelis M. Papadopoulos, George Palaigeorgiou, Costas Tsimpanis, Matthew Hodges. 1061-1072 [doi]