Abstract is missing.
- Study on Extracting Keywords that Reveal the Value of Research Data Through Comparisons Between Academic and Data PapersNaoto Kai, Hayato Tomisu, Toshiki Shimbaru, Tomoki Yoshihisa. 1-8 [doi]
- Similar Experimental Flow Search with Operation Grouping for Chemical Material DevelopmentHideya Yoshiuchi, Naoki Takeishi, Hidekazu Morita. 9-20 [doi]
- BP-Pearson Residual for Detecting Outliers in Beta Regression ModelOktsa Dwika Rahmashari, Wuttichai Srisodaphol. 21-33 [doi]
- CDBER: A Method for Detecting Outliers in Linear-Circular RegressionThunchanok Chaitongdee, Oktsa Dwika Rahmashari, Wuttichai Srisodaphol, Benjawan Rattanawong, Khanuengnij Prakhammin. 34-42 [doi]
- Reliability Calculation for Captured Images in Mobile Observation for Natural EnvironmentsYukito Seo, Kosuke Takano, Nobuya Watanabe, Kin Fun Li. 43-53 [doi]
- Implementation of a Fuzzy-Based System for Assessment of Tie Strength in Online Social Networks Considering Reciprocity as a New ParameterShunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 54-64 [doi]
- Characteristic Analysis and Attack Group Identification of Phishing Sites Targeting JapanShingo Matsugaya, Makoto Shimamura, Kosuke Takeshige, Keisuke Sakai, Masaki Hashimoto. 65-76 [doi]
- IoT Attack Detection Based on Continuous Learning Across Multiple RegionsWei Xiang, Eiichiro Kodama, Jiahong Wang, Bhed Bahadur Bista, Toyoo Takata. 77-87 [doi]
- GRLfuzz: Gan-Powered Fuzzing Based on Deep Reinforcement LearningYuan Zhang, Baojiang Cui, Chen Chen. 88-97 [doi]
- Evaluation of the Trust Algorithm to Prevent Illegal Information Flow in the Trust Zone ModelShigenari Nakamura, Lidia Ogiela, Makoto Takizawa 0001. 98-106 [doi]
- Investigation Towards Detecting Landing Websites for Fake Japanese Shopping WebsitesDaigo Michishita, Satoru Kobayashi, Toshihiro Yamauchi. 107-119 [doi]
- Evaluating the Effectiveness of Customised Phishing Simulations in Enhancing Cybersecurity Awareness at a University in ThailandDamrongsak Naparat, Opas Muensaen, Worajak Chaikaew. 120-129 [doi]
- Energy-Aware Concurrency Control with the Purpose and Read-Data-From SerializabilityTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 130-139 [doi]
- Implementation of a Motor Control Learning Device and Its Evaluation for Voice Control Using Multi LanguagesKeita Matsuo, Leonard Barolli. 140-148 [doi]
- An Algorithm to Select an Energy-Efficient Succeeding Fog Node in the NBFC ModelDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 149-158 [doi]
- Advancing Federated Virtual Sensors for IoT with Privacy Safeguards and Robustness to Adversarial ThreatsKlea Elmazi, Donald Elmazi, Jonatan Lerga. 159-172 [doi]
- Structuring Clinical Image Reports: Attempt to Implement a Local-Large Language ModelKoji Sakai, Tomohiro Kajikawa, Yu Ohara, Takeshi Takahashi, Kei Yamada. 173-181 [doi]
- Survey on Technologies of Video Deepfake DetectionChanchan Li, Zuyi Song, Yutong Liang, Xu'an Wang. 182-193 [doi]
- Research on Patent Technology Recognition Based on Fusion Dependency Parsing and ALBERT-BiLSTM-CRF ModelYujia Wang, Na Deng, Xu Cheng. 194-203 [doi]
- A Comparative Study of Various Mesh Router Replacement Methods for Middle-Scale WMN and Boulevard Distribution of Mesh ClientsYusuke Irie, Paboth Kraikritayakul, Shinji Sakamoto, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 204-215 [doi]
- A Comparison Study of UNDX and SPX Crossover Methods Considering RDVM and FC-RDVM Router Replacement Methods for Two Islands Distribution of Mesh ClientsPaboth Kraikritayakul, Admir Barolli, Yusuke Irie, Phudit Ampririt, Shinji Sakamoto, Leonard Barolli. 216-226 [doi]
- An Intelligent Fuzzy-Based System for Handover in 5G/B5G Wireless Networks: Effects of Radio Access Technology Condition Parameter on Handover DecisionPhudit Ampririt, Shunya Higashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 227-240 [doi]
- FCRP: A Fuzzy-Based Routing Protocol for Vehicular Opportunistic Networks and Its Performance Evaluation Considering Average Latency and Hop Count ParametersErmioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli. 241-250 [doi]
- Performance Evaluation of an Enhanced Recovery Method Integrated with SpW and Epidemic Protocols in Vehicular DTNShura Tachibana, Makoto Ikeda, Leonard Barolli. 251-260 [doi]
- A Cellular Multi-links Method for Autonomous Driving Considering Vehicle-to-Everything CommunicationYoshitaka Shibata, Hiroyuki Ishii, Tadachika Minato, Shoichi Noguchi. 261-268 [doi]
- An Optimization Method for Wide-Area Monitoring Using Amphibious RobotToshiyuki Sato, Tetsuya Oda, Kenya Okage, Genki Moriya, Takeharu Sato, Kengo Katayama, Leonard Barolli. 269-278 [doi]
- Evaluation of Gaze Estimation Variance Considering Different Number of Web CamerasKiichi Honsho, Yurika Nagamori, Shinji Sakamoto, Taisuke Kawamata. 279-289 [doi]
- An Emotion Classification System Considering Analytic Hierarchy ProcessYurika Nagamori, Kiichi Honsho, Hiroaki Narisawa, Shinji Sakamoto, Taisuke Kawamata. 290-300 [doi]
- Rehabilitation Support System Based on Mixed Reality TechnologyNaho Kuriya, Tomoyuki Ishida. 301-311 [doi]
- Physique-Aware Skilled Motion Decision System Based on Depth Camera and Skeletal EstimationKyohei Wakabayashi, Tetsuya Oda, Hideyuki Shimada, Leonard Barolli. 312-321 [doi]
- A Multispectral Camera System for Augmented Reality Marker DetectionYuma Yamashita, Tetsuya Oda, Kenya Okage, Takeharu Sato, Hideyuki Shimada, Leonard Barolli. 322-332 [doi]
- Development of a Framework for Web-Based Collaborative VR Tours Using Point Cloud DataYoshihiro Okada, Kosuke Kaneko, Wei Shi 0008. 333-344 [doi]
- A Web-Based Collaborative Virtual Reality Class for Gamified Learning of Chemical MoleculesEduardo Seiti Yamatsumi, Yoshihiro Okada. 345-355 [doi]
- Data-Driven Peer Tutoring: Machine Learning for Effective Group CompositionMattia Fonisto, Antonio Marino, Marcello Pelosi, Alberto Moccardi. 356-364 [doi]
- Operation and Evaluation of Flow Information-Based Incident Detection System in Campus NetworkDaisuke Yagyu, Yoshifumi Ueshige, Masato Tsuru 0001. 365-376 [doi]
- Automatic Routing by Modulation Frequency of Envelope Pulse Wave in Photonic Crystal WaveguideItsuki Ishibashi, Hiroshi Maeda. 377-386 [doi]
- A Transformer Based Behavioral Control Method for Quadruped RobotKaiju Hasuoka, Tetsuya Oda, Kenya Okage, Genki Moriya, Masaharu Hirota, Hideyuki Shimada, Leonard Barolli. 387-397 [doi]
- Evaluation of Essential Functions for Data-Plane Programming on P4 Hardware SwitchKazumi Kumazoe, Kenji Kawahara, Masato Tsuru 0001. 398-408 [doi]
- Scheduling High-Affinity Services in KubernetesVasileios Skevakis, Euripides G. M. Petrakis. 409-422 [doi]
- Ethical and Technical Challenges in the European Conflict Resolution Project: The Role of Equitative Algorithm (CREA3)Egidia Cirillo, Marco Giacalone, Alberto Moccardi, Marcello Pelosi. 423-433 [doi]
- A Web-Based Online Lecture System Using User Operation SynchronizationMasaki Kohana, Shusuke Okamoto, Masaru Kamada. 434-443 [doi]
- Leveraging Prompt-Based Large Language Models for Code Smell Detection: A Comparative Study on the MLCQ DatasetDjamel Mesbah, Nour El Madhoun, Khaldoun Al Agha, Hani Chalouati. 444-454 [doi]