Abstract is missing.
- Ubiquitous and Pervasive Computing for Real-Time Energy Management and Saving - A System ArchitectureSimone Scannapieco, Claudio Tomazzoli. 3-15 [doi]
- Performance Evaluation of Intelligent Hybrid Systems for Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-PSOHC and WMN-PSOSAShinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli. 16-26 [doi]
- Design of a Smart Desk for an IoT Testbed: Improving Learning Efficiency and System SecurityMasafumi Yamada, Miralda Cuka, Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli. 27-35 [doi]
- Performance Evaluation of a Deep Q-Network Based Simulation System for Actor Node Mobility Control in Wireless Sensor and Actor Networks Considering Different Distributions of EventsTetsuya Oda, Elis Kulla, Miralda Cuka, Donald Elmazi, Makoto Ikeda, Leonard Barolli. 36-49 [doi]
- Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Exponential and Weibull DistributionsKeita Matsuo, Shinji Sakamoto, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli. 50-62 [doi]
- Proposal of Traffic Accident Prevention System with Chronological Variations of Wireless Signals and Sensors on Mobile NodesShoma Takeuchi, Noriki Uchida, Yoshitaka Shibata. 63-72 [doi]
- Implementation of a WLAN Triage Testbed Using Fuzzy Logic: Evaluation for Different Number of ClientsKosuke Ozera, Takaaki Inaba, Shinji Sakamoto, Leonard Barolli. 73-86 [doi]
- A Fuzzy-Based Testbed for Wireless Sensor and Actuator Networks: Performance Evaluation for Different Remaining Energy of ActuatorsGaku Tsuchiya, Keisuke Ebisu, Makoto Ikeda, Donald Elmazi, Leonard Barolli, Elis Kulla. 87-97 [doi]
- Simple Energy-Aware Algorithms to Selecting a Server for Storage and Computation Processes in a ClusterAtsuhiro Sawada, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. 98-109 [doi]
- An Energy-Saving Unicast Routing Protocol in Wireless Ad-hoc NetworkEmi Ogawa, Shigenari Nakamura, Makoto Takizawa. 110-120 [doi]
- Performance Evaluation of Clustering and Collaborative Filtering Algorithms for Resource Scheduling in a Public Cloud EnvironmentKlodiana Goga, Fatos Xhafa, Olivier Terzo. 121-134 [doi]
- BioGraphBot: A Conversational Assistant for Bioinformatics Graph DatabasesAntonio Messina, Agnese Augello, Giovanni Pilato, Riccardo Rizzo. 135-146 [doi]
- Utilizing Augmented Reality and Wearables in Industrial ApplicationsMarkus Aleksy, Johannes Schmitt. 147-155 [doi]
- Security Assessment of the Image-Based Authentication Using Screen-Capture ToolsInsu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim. 156-161 [doi]
- Monitoring of Power Transmission Lines Through Wireless Sensor Networks in Smart GridMalik Ali Judge, Awais Manzoor, Fahim Ahmed, Saqib Kazmi, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 162-170 [doi]
- User Comfort Oriented Residential Power Scheduling in Smart HomesAwais Manzoor, Fahim Ahmed, Malik Ali Judge, Adnan Ahmed, Mirza Amaad Ul Haq Tahir, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 171-180 [doi]
- Two Hop Adaptive Routing Protocol for Underwater Wireless Sensor NetworksFarwa Ahmed, Saba Gul, Muhammad Amir Khalil, Arshad Sher, Zahoor Ali Khan, Umer Qasim, Nadeem Javed. 181-189 [doi]
- User Satisfaction Based Home Energy Management System for Smart CitiesFozia Feroze, Itrat Fatima, Saman Zahoor, Nabeeha Qayyum, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 190-199 [doi]
- Fuzzy Energy Management Controller for Smart HomesRabiya Khalid, Samia Abid, Ayesha Zafar, Anila Yasmeen, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 200-207 [doi]
- Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge GraphXiaobo Hu, Xinhuai Tang, Feilong Tang. 208-218 [doi]
- Converging Human Knowledge for Opinion MiningJiacheng Liu, Feilong Tang, Long Chen, Liang Qiao, Yanqin Yang, Wenchao Xu. 219-230 [doi]
- Accuracy Is Not Enough: Serendipity Should Be Considered MoreHuan Yu, Ying Wang, Yaning Fan, Sachula Meng, Rui Huang. 231-241 [doi]
- Movie Recommendation Based on Visual Features of TrailersYaning Fan, Ying Wang, Huan Yu, Baoling Liu. 242-253 [doi]
- A Study on the Motion Recognition of Basketball Players Based on Unit Gesture DecompositionXiaochen Lai, Wenzhe Shi, Lu Liu, Xin Liu, Yu Zhao. 254-265 [doi]
- Indoor Navigation System Based on Augmented Reality MarkersFumiaki Sato. 266-274 [doi]
- Study on Android Native Layer Code Protection Based on Improved O-LLVMBaojiang Cui, Qi Zhao, Tianyu Liu. 275-285 [doi]
- A Two-Tiered Defence of Techniques to Prevent SQL Injection AttacksYan Zhu, Guidong Zhang, Zhiquan Lai, Boya Niu, Yongjun Shen. 286-295 [doi]
- The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary ReverseBaojiang Cui, Yi Ren, Pin Mao. 296-309 [doi]
- An Anonymous Access Authentication Scheme for VANETs Based on ISGSTianhan Gao, Yanqiang Li, Nan Guo. 310-320 [doi]
- EE-CFI: Externalized Control Flow Integrity for Embedded DevicesValentin Lefils, Gilles Grimaud, Julien Iguchi-Cartigny. 321-329 [doi]
- An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 NetworkTianhan Gao, Xinyang Deng, Nan Guo. 330-341 [doi]
- Evaluating User Vulnerability to Privacy Disclosures over Online Dating PlatformsMona Nandwani, Rishabh Kaushal. 342-353 [doi]
- Application of Improved Software Phase-Locked-Loop in DSTATCOMXiaoliang Wang, Xuhui Zhu, Xiaochen Lai, Chi Lin, Shouwei Li. 354-363 [doi]
- Digital Harmonic Detection with Rapid Response and High Steady PrecisionXiaoliang Wang, Xiaochen Lai, Chi Lin, Zhen Xu, Shouwei Li. 364-373 [doi]
- A Prospect of Interdisciplinary Methodology of QoE AssessmentMengyu Gao, Wenan Zhou, Zheng Hu, Wenji Zhang. 374-384 [doi]
- A Macro-Assisted Cooperative Edge Caching in Heterogeneous Mobile NetworksBingqian Li, Wenan Zhou, Xuhui Yang. 385-394 [doi]
- Security of Selected Secret Sharing SchemesUrszula Ogiela, Makoto Takizawa, Lidia Ogiela. 395-400 [doi]
- Supporting Hypothesis Generation by Machine Learning in Smart HealthAlba Amato, Antonio Coronato. 401-410 [doi]
- A Novel and Practical Pseudonym Change Scheme in VANETsYuanyuan Pan, Yongdong Shi, Jianqing Li. 413-422 [doi]
- An Efficient Provably Secure Password-Based Authenticated Key AgreementHanqiu Xu, Qingping Wang, Jing Zhou, Ou Ruan. 423-434 [doi]
- Proposal and Implementation of a Countermeasure Against Event Tracking on the WebTakamichi Saito, Ryohei Hosoya, Koki Yasuda, Kazushi Takahashi, Yuta Tsunoda, Kazuhisa Tanabe, Masayuki Taneoka, Satoshi Yashiro. 435-444 [doi]
- Self-aware Access Control System for AndroidNanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho. 445-454 [doi]
- Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional CodeNobuyuki Teraura. 455-466 [doi]
- Suspicious User Detection Based on File Server Usage FeaturesRyuichi Ohori, Satoru Torii. 467-470 [doi]
- Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle TaiwanXiu-Shu Zhang, Fang-Yie Leu, Ching-Wen Yang. 473-482 [doi]
- An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data ProjectSen-Tarng Lai, Fang-Yie Leu. 483-492 [doi]
- Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base StationChien-Hsiang Kao, Fang-Yie Leu. 493-501 [doi]
- MIH-Based Congestion Control with Seamless Handover in Untrusted NetworksFang-Yie Leu, Chih-Chung Cheng. 502-510 [doi]
- Integration of Ubiquitous Specifications in the Lifecycle of Design Object OrientedSonia Aimene, Idir Rassoul. 513-519 [doi]
- Cuckoo Search Optimization Technique for Multi-objective Home Energy ManagementAdia Khalid, Ayesha Zafar, Samia Abid, Rabiya Khalid, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid. 520-529 [doi]
- The Application of Heuristic Neural Network in Speed Estimation of Asynchronous MotorShuqing Wang, Ruotian Yao, Yuexiang Mao. 530-538 [doi]
- Performance of Power Allocation of Relay Stations for Cognitive Radio Based Cooperative Communication SystemsYung-Fa Huang, Tan-Hsu Tan, Yu-Shing Lee, Hsing-Chung Chen. 539-546 [doi]
- Enabling D2D Transmission Mode in Cellular Networks: Instantaneous Rate ConsiderationHuu-Phuc Dang, Hong-Nhu Nguyen, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak. 547-553 [doi]
- Performance Analysis of Wireless Powered Cognitive Radio NetworksThanh-Duc Le, Hong-Nhu Nguyen, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak. 554-562 [doi]
- A New Collaborative Knowledge Integration SchemeShian-Shyong Tseng, Yuh-Jye Wang. 563-570 [doi]
- Effect of Polling Interval Distributions on the Performance of MAC Protocols in Wireless Sensor NetworksShama Siddiqui, Sayeed Ghani, Anwar Ahmed Khan. 573-579 [doi]
- Lightweight Authentication for Distributed Mobile P2P CommunicationsJiyoung Lim, Inshil Doh, Kijoon Chae. 580-589 [doi]
- A Search for Computationally Efficient Supervised Learning Algorithms of Anomalous TrafficHae-Duck J. Jeong, Gil-Seong Jeong, Won-Jung Kim, Jinwon Kim, Hanbin Song, Myeong-Un Ryu, Jongsuk R. Lee. 590-600 [doi]
- Ontology Development for Dynamic Service Composition in Cyber-Physical Systems (CPSs)SungHwan Jeong, Jun-Sik Kong, Mye M. Sohn, Hyun Jung Lee. 601-610 [doi]
- Cross-Recommendation Depending on Commonly Shared Users' Preferences in IoT EnvironmentHyun Jung Lee, Mye M. Sohn. 611-619 [doi]
- Power Beacon-Assisted Relaying Scheme for Cellular Networks: System Model and Performance AnalysisSi-Phu Le, Hong-Nhu Nguyen, Thanh-Duc Le, Huu-Phuc Dang, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak. 620-628 [doi]
- On the Outage Probability of Device-to-Device Communication Enabled NOMAHong-Nhu Nguyen, Huu-Phuc Dang, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak. 629-635 [doi]
- Performance Analysis of Device-To-Device Communication Using AF Relaying Under Impact of Co-channel InterferencesNguyen Thai Anh, Huu-Phuc Dang, Hong-Nhu Nguyen, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak. 636-644 [doi]
- Approaching to Mobile 5G CommunicationsJahangir Dadkhah Chimeh, Mojtaba Mazoochi. 647-656 [doi]
- Terrorists Spatio-Temporal Analysis Based on Social Network ToolsXuan Guo, Zhiting Xiao, Pin-shan Zeng, Ying Yang. 657-665 [doi]
- Reliable Homomorphic Matrix Disguising SchemeYonghui Chen, Mingwu Zhang, Chao Xu. 666-675 [doi]
- Contention Window Prioritization for Heterogeneous Traffic in Wireless Sensor NetworksAnwar Ahmed Khan, Sayeed Ghani, Shama Siddiqui. 676-685 [doi]
- An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral ClusteringHuazhong Jin, Feng Guan, Fang Wan, Ou Ruan, Qing Li. 686-695 [doi]
- Moving Average Timing Strategy from a Volatility Perspective: Evidence of the Taiwan Stock MarketShyh-Weir Tzang, Yung-Shun Tsai, Chun-Ping Chang, Ya-Ping Yang. 699-707 [doi]
- The Impact of Golden Cross and Death Cross Frequency on Stock Returns in Pre- and Post-financial CrisisYung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang. 708-713 [doi]
- Managers' Bargaining Power and the Intrinsic ValueChun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang. 714-719 [doi]
- Investigation into the Relationships Among Sponsorship, Identification and Purchase IntentionChaio-Hsing Chen, Mei Hua Huang, Perng-Fei Huang, Chiung Yen Chen. 720-729 [doi]
- The Effects of CSR Announcement on Long-Life BusinessMei-Hua Liao, Xiang-Ling Zhan, Hidekazu Sone. 730-734 [doi]
- Serious Leisure and Flow Experience of Teenagers - A Case Study on the Activities of OrchestraChiou-Shya Torng, Ming-Sui Weng, Chai-Ju Lu. 735-740 [doi]
- The Impact of Government Shareholding on Firm Performance: A Corporate Governance PerspectiveWen-Hsin Huang, Mei-Juh Huang, Mei Hua Huang. 741-750 [doi]
- The Impact of Corporate Social Responsibility and Organization Identification on Employee EngagementChia-Ju Lu, Chiou-Shya Torng. 751-758 [doi]
- A Study of Impact of Social Welfare from Public-Private-Partnerships: A Case of Taipei City YoubikeWen-Hsin Huang, Hsien-Feng Lee. 759-770 [doi]
- The Influence of Senior Supervisors' Professional Degree and Their Job Changes and Part-Time Duties on Corporate PerformanceYing-Li Lin, Li-Yu Lin, Hsiu Feng Huang. 771-780 [doi]
- Causal Relationship Between Research and Development Input, Research and Development Output, and Corporate ValueYing-Li Lin, Yu-Ju Chen, Tin-Chang Chang. 781-787 [doi]
- A Study on the Influencing Factors of Consumers Repeat Purchasing Intention in International Travel FairHsiang-Chih Hu, Mei-Ying Chen, Shu-Hui Chuang. 788-794 [doi]
- Examining the Relationships Among Electronic Word of Mouth, Perceived Value and Risk, and Consumer Purchase IntentionChung-Yi Hsu, Ya-Wen Huang, Shu-Hui Chuang. 795-801 [doi]
- The Influence of Internationalization on Value Drivers: Song Ho Industrial Corporation, Ltd. vs. Chih Lien Industrial Corporation, LtdKuei-Yuan Wang, Chien-Kuo Han, Xiao-hong Lin, Ming De Lin. 802-811 [doi]
- A Comparative Study of Valuation and Value Drivers in the Textile Industry: Kwang Ming Silk Mill Co., Ltd. vs. Eclat Textile Co., LtdKuei-Yuan Wang, Chien-Kuo Han, Xiao-hong Lin, Chia-Hua Lin. 812-820 [doi]
- Study of Social Loafing and Employee CreativityChing-Hui Shih, Chun-Chiu Shao, Yao-Hua Wang. 821-830 [doi]
- Customer Satisfaction and Quality of Service Towards Public Servants in a Governmental Education Training Center in TaiwanPei-Shih Chen, Tin-Chang Chang, Ying-Li Lin. 831-840 [doi]
- The Effect of Flipped Classroom on Self-efficacy and Satisfaction of Computer AuditingLing-Yi Chou. 841-845 [doi]
- Moving Smartphones to Send Emergency Messages During AssaultsFrancisco D. Acosta, Miguel A. Wister, José Adán Hernández-Nolasco, Pablo Pancardo. 849-859 [doi]
- Low-Level Service Management in Cyber-Physical SystemsBorja Bordel, Ramón Alcarria, Diego Sánchez de Rivera, Antonio Jara. 860-872 [doi]
- Flexible Service Provision in Context-Aware Cyber-Physical SystemsRamón Alcarria, Borja Bordel, Antonio Jara. 873-883 [doi]
- NOSE: A NOmadic Scalable Ecosystem for Pervasive Sensing, Computing and CommunicationAudrey Dupont, Yann Bocchi, Gianluca Rizzo. 884-893 [doi]
- Geo-Based Content Sharing for Disaster Relief ApplicationsGianluca Rizzo, Helmut Neukirchen. 894-903 [doi]
- Towards the Development of a Smart Tourism Application Based on Smart POI and Recommendation Algorithms: Ceutí as a Study CaseJoanna Alvarado-Uribe, Andrea Gómez-Oliva, Germán Molina, Miguel González-Mendoza, María Concepción Parra-Meroño, Antonio J. Jara. 904-916 [doi]
- Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT ContextsSalvador Pérez, Domenico Rotondi, Diego Pedone, Leonardo Straniero, Maria José Nuñez, Fernando Gigante. 917-926 [doi]
- Software Abnormal Behavior Detection Based on Hidden Markov ModelJingling Zhao, Guoxiao Huang, Tianyu Liu, Baojiang Cui. 929-940 [doi]
- RTF Editor XSS Fuzz FrameworkJun Yang, Qiyi Tang. 941-951 [doi]
- Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password ManagersLuca Casati, Andrea Visconti. 952-958 [doi]
- A Context-Aware Smart Office Application SystemHou Yuan Wei, Hao Yong Le, Xin Shu, Caiyuan Chen. 959-966 [doi]
- A Novel Algorithm for Feature Selection Used in Intrusion DetectionYongle Hao, Ying Hou, Longjie Li. 967-974 [doi]