Abstract is missing.
- Judging Students' Learning Style from Big Video Data Using Neural NetworkNoriyasu Yamamoto. 1-6 [doi]
- A Multi-modal Interface for Control of Omnidirectional Video Playing on Head Mount DisplayYusi Machidori, Ko Takayama, Kaoru Sugita. 7-11 [doi]
- Evaluation of a TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoTShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 12-23 [doi]
- A Dynamic Tree-Based Fog Computing (DTBFC) Model for the Energy-Efficient IoTRyuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 24-34 [doi]
- Topic-Based Subgroups for Reducing Messages Exchanged Among SubgroupsTakumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 35-45 [doi]
- Subtree-Based Fog Computing in the TWTBFC ModelYinzhe Guo, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 46-52 [doi]
- A Fuzzy-Based System for Actor Node Selection in WSANs Considering Task Accomplishment Time as a New ParameterDonald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 53-63 [doi]
- IoT Node Selection in Opportunistic Networks: A Fuzzy-Based Approach Considering Node's Successful Delivery Ratio (NSDR) as a New ParameterMiralda Cuka, Donald Elmazi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 64-72 [doi]
- A Fuzzy-Based System for Admission Control in 5G Wireless Networks Considering Software-Defined Network ApproachPhudit Ampririt, Seiji Ohara, Yi Liu 0011, Makoto Ikeda, Hiroshi Maeda, Leonard Barolli. 73-81 [doi]
- A Fuzzy-Based Decision System for Sightseeing Spots Considering Natural Scenery and Visiting Cost as New ParametersYi Liu 0011, Phudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Leonard Barolli, Makoto Takizawa 0001. 82-88 [doi]
- Performance Evaluation of WMN-PSODGA Hybrid Simulation System for Node Placement Problem Considering Normal Distribution and Different Fitness FunctionsSeiji Ohara, Admir Barolli, Phudit Ampririt, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa 0001. 89-101 [doi]
- Effect of Driver's Condition for Driving Risk Measurement in VANETs: A Comparison Study of Simulation and Experimental ResultsKevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 102-113 [doi]
- Resource Management in SDN-VANETs: Coordination of Cloud-Fog-Edge Resources Using Fuzzy LogicErmioni Qafzezi, Kevin Bylykbashi, Tomoyuki Ishida, Keita Matsuo, Leonard Barolli, Makoto Takizawa 0001. 114-126 [doi]
- Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering Evolution Steps and Computation TimeAdmir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa 0001. 127-137 [doi]
- Performance Evaluation of WMNs Using an Hybrid Intelligent System Based on Particle Swarm Optimization and Hill Climbing Considering Different Number of IterationsShinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto. 138-149 [doi]
- A Software-Oriented Approach to Energy-Efficiently Unicasting Messages in Wireless Ad-Hoc NetworksRyota Sakai, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 150-157 [doi]
- Evaluation of Parallel Data Transmission in the Mobile Fog Computing ModelKosuke Gima, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 158-170 [doi]
- Performance Evaluation of VegeCare Tool for Insect Pest Classification with Different Life CyclesNatwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli. 171-180 [doi]
- The Improved Redundant Energy Consumption Laxity-Based Algorithm with Differentiating Starting Time of Process ReplicasTomoya Enokido, Makoto Takizawa 0001. 181-188 [doi]
- Implementations on Static Body Detections by Locational Sensors on Mobile Phone for Disaster Information SystemNoriki Uchida, Misaki Fukumoto, Tomoyuki Ishida, Yoshitaka Shibata. 189-196 [doi]
- A DQN Based Mobile Actor Node Control in WSAN: Simulation Results of Different Distributions of Events Considering Three-Dimensional EnvironmentKyohei Toyoshima, Tetsuya Oda, Masaharu Hirota, Kengo Katayama, Leonard Barolli. 197-209 [doi]
- Cognitive Approaches for Sensor Data Analysis in Transformative ComputingMarek R. Ogiela, Lidia Ogiela. 210-214 [doi]
- A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud EnvironmentYong-Woon Hwang, Im-Yeong Lee, Kangbin Yim. 215-221 [doi]
- Transformative Computing in Knowledge Extraction and Service Management ProcessesLidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. 222-225 [doi]
- Input Amplitude Dependency of Duplexer with Dispersive and Nonlinear Dielectric in 2-D Photonic Crystal WaveguideNaoki Higashinaka, Hiroshi Maeda. 226-236 [doi]
- A Beam Power Allocating Method for Ka-band Multi-beam Broadcasting Satellite Based on Meteorological DataTakumi Iwamoto, Kiyotaka Fujisaki. 237-246 [doi]
- 3-Party Adversarial CryptographyIshak Meraouche, Sabyasachi Dutta, Kouichi Sakurai. 247-258 [doi]
- A Framework for Automatically Generating IoT Security Quizzes in 360VR Images/Videos Based on Linked DataWei Shi, Tianhao Gao, Srishti Kulshrestha, Ranjan Bose, Akira Haga, Yoshihiro Okada. 259-267 [doi]
- Development and Evaluation of Road State Information Platform Based on Various Environmental Sensors in Snow CountriesYoshitaka Shibata, Yoshikazu Arai, Yoshiya Saito, Jun Hakura. 268-276 [doi]
- Evaluation of End-to-End Performance on N-Wavelength V2X Cognitive Wireless System Designed for Exchanging Road State InformationAkira Sakuraba, Yoshitaka Shibata, Goshi Sato, Noriki Uchida. 277-289 [doi]
- Secure Public Cloud Storage Auditing with Deduplication: More Efficient and SecureJiasen Liu, Xu an Wang, Kaiyang Zhao, Han Wang. 290-300 [doi]
- A Knapsack Problem Based Algorithm for Local Level Management in Smart GridUsman Ali, Usman Qamar, Kanwal Wahab, Khawaja Sarmad Arif. 301-310 [doi]
- Automatic Generation of E-Learning Contents Based on Deep Learning and Natural Language Processing TechniquesYiyi Wang, Koji Okamura. 311-322 [doi]
- Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User AuthenticationHisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki. 323-333 [doi]
- Classification of Malicious Domains by Their LIFETIMEDaiji Hara, Kouichi Sakurai, Yasuo Musashi. 334-341 [doi]
- Design of a DSL for Converting Rust Programming Language into RTLKeisuke Takano, Tetsuya Oda, Masaki Kohata. 342-350 [doi]
- Usage-Oriented Resource Allocation Strategy in Edge Computing EnvironmentsTsu-Hao Hsieh, Kuan-Yu Ho, Meng-Yo Tsai, Kuan-Chou Lai. 351-360 [doi]
- PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS AttackKosuke Kaneko, Yusuke Tsutsumi, Subodh Sharma 0001, Yoshihiro Okada. 361-372 [doi]
- A Handover Challenge of Data Analytics: Multi-user Issues in Sustainable Data AnalyticsToshihiko Yamakami. 373-383 [doi]
- A Privacy Threat Model in XR ApplicationsToshihiko Yamakami. 384-394 [doi]
- Human Mobility and Message Caching in Opportunistic NetworksTomoyuki Sueda, Naohiro Hayashibara. 395-405 [doi]
- The Study on AUSF Fault ToleranceWei-Sheng Chen, Fang-Yie Leu. 406-415 [doi]
- Classification and Regression Based Methods for Short Term Load and Price Forecasting: A SurveyHira Gul, Arooj Arif, Sahiba Fareed, Mubbashra Anwar, Afrah Naeem, Nadeem Javaid. 416-426 [doi]
- Electricity Price and Load Forecasting Using Data Analytics in Smart Grid: A SurveyMubbashra Anwar, Afrah Naeem, Hira Gul, Arooj Arif, Sahiba Fareed, Nadeem Javaid. 427-439 [doi]
- Genetic Algorithm Based Bi-directional Generative Adversary Network for LIBOR PredictionXiao Tan. 440-447 [doi]
- Proposal of an Interactive Brainstorming Environment for Various Content Sharing and Meeting ProgressRyo Nakai, Tomoyuki Ishida. 448-457 [doi]
- eBPF/XDP Based Network Traffic Visualization and DoS Mitigation for Intelligent Service ProtectionYoungEun Choe, Jun-Sik Shin, Seunghyung Lee, JongWon Kim 0001. 458-468 [doi]
- Recognition of Historical Characters by Combination of Method Detecting Character in Photo Image of Document and Method Separating Block to CharactersLiao Sichao, Hiroyoshi Miwa. 469-477 [doi]
- A Study for Semi-supervised Learning with Random ErasingYuuhi Okahana, Yusuke Gotoh. 478-490 [doi]
- Hybrid Type DTN Routing Protocol Considering Storage CapacityKenta Henmi, Akio Koyama. 491-502 [doi]
- WebIBVR) and Its Collaborative Virtual EnvironmentsYoshihiro Okada, Taiki Ura. 503-515 [doi]
- Optimization Problem for Network Design by Link Protection and Link AugmentationHiroki Yano, Hiroyoshi Miwa. 516-521 [doi]
- Workflow Improvement for KubeFlow DL Performance over Cloud-Native SmartX AI ClusterYujin Hong, JongWon Kim. 522-531 [doi]
- DevOps Portal Design for SmartX AI Cluster Employing Cloud-Native Machine Learning WorkflowsGeumSeong Yoon, Jung-Su Han, Seunghyung Lee, JongWon Kim. 532-539 [doi]
- A Management System for Electric Wheelchair Considering Agile-Kanban Using IoT Sensors and Scikit-LearnTakeru Kurita, Keita Matsuo, Leonard Barolli. 540-551 [doi]
- An Approach of Usability Testing for Web User Interface Through Interaction Flow Modeling Language (IFML) ModelsMuhammad Talha Riaz, Farooque Azam, Nazish Yousaf, Muhammad Waseem Anwar, Adil Aziz. 552-563 [doi]
- Blockchain for IoT-Based Digital Supply Chain: A SurveyHaibo Zhang, Kouichi Sakurai. 564-573 [doi]