Abstract is missing.
- Modified Algorithm for Enhancing the Performance of Grid Systems in Task SchedulingOsama Alfarraj, Ahmad Ali AlZubi, Salem Alkhalaf, Thamer Alhussain, Asma AlKhalaf. 3-10 [doi]
- A Fuzzy-Based System for Actor Node Selection in WSANS: Simulation and Experimental ResultsDonald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 11-24 [doi]
- Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Load Balancing and Client Uniform DistributionSeiji Ohara, Admir Barolli, Shinji Sakamoto, Leonard Barolli. 25-38 [doi]
- Performance Evaluation of WMNs by WMN-PSOHC System Considering Random Inertia Weight and Linearly Decreasing Inertia Weight Replacement MethodsShinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto. 39-48 [doi]
- An Innovative Model Based on FCRBM for Load Forecasting in the Smart GridGhulam Hafeez, Nadeem Javaid, Muhammad Riaz, Umar Khalid, zafar iqbal, Ammar Ali. 49-62 [doi]
- Capability-Based Information Flow Control Model in the IoTShigenari Nakamura, Tomoya Enokido, Leonard Barolli, Makoto Takizawa 0001. 63-71 [doi]
- Evaluation of a Two-Way Tree-Based Fog Computing (TWTBFC) ModelYinzhe Guo, Ryuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 72-81 [doi]
- A Balanced Energy Efficient (BEE) Routing Scheme for Underwater WSNsWahab Khan, Wang Hua, Muhammad Ayaz, Muhammad Shahid Anwar, Sadique Ahmad. 82-93 [doi]
- The Improved Energy Consumption Laxity Based (IECLB) Algorithm to Perform Computation ProcessesTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 94-105 [doi]
- Effects of Sharing Information for Available Routes by Ad-Hoc Communication on a Disaster Stricken AreaTetsuya Shigeyasu. 106-113 [doi]
- Design and Implementation of a Weather Measurement System Using Agile-KanbanTakeru Kurita, Keita Matsuo, Leonard Barolli. 114-124 [doi]
- Real-Time Ray Tracing Algorithm for Dynamic SceneTianhan Gao, Ying Li. 125-131 [doi]
- TensorFlow: A Vegetable Classification System and Its Performance EvaluationNatwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli. 132-141 [doi]
- Image Recognition Based Adaptive Array Antenna Controls for Winter Road Surveillance System in Local Mountain AreaNoriki Uchida, Goshi Sato, Yoshitaka Shibata. 142-151 [doi]
- Impact of Mobile Network Operators' Incentive for Public Health: A Study Based on Saudi 2030 VisionHamad Balhareth, Alsaleh Saad. 152-161 [doi]
- Cyber Security Situation Prediction Model Based on GWO-SVMHongxia Lu, Guidong Zhang, Yongjun Shen. 162-171 [doi]
- Half Hourly Electricity Load Forecasting Using Convolutional Neural NetworkAbdul Basit Majeed Khan, Sajjad Khan, Sayed Aimal, Mudassar Khan, Bibi Ruqia, Nadeem Javaid. 172-184 [doi]
- Hourly Electricity Load Forecasting in Smart Grid Using Deep Learning TechniquesAbdul Basit Majeed Khan, Nadeem Javaid, Orooj Nazeer, Maheen Zahid, Mariam Akbar, Majid Hameed Khan. 185-196 [doi]
- Blockchain-Based Public Auditing Scheme for Shared DataHan Wang, Xu an Wang, Shuai Xiao, Zichen zhou. 197-206 [doi]
- Classifying Serious Depression Based on Blood Test: A Machine Learning ApproachHyunhee Park. 207-214 [doi]
- A Technical Survey on Methods for Detecting Rogue Access PointsMyoungsu Kim, Soonhong Kwon, Donald Elmazi, Jong-Hyouk Lee, Leonard Barolli, Kangbin Yim. 215-226 [doi]
- An Implementation of LTE MAC-Layer Channel Multiplexing and Scheduling Mechanism Porting Upon an FPGA Embedded System Platform to Support Massive NB-IoT Devices AccessesWen-Chung Tsai, Nien-Ting Huang, Song-Hao Huang, Ting-Ming Tsai. 227-235 [doi]
- Improved SM4 Encryption Algorithm Based on Mixed Congruence MethodJingling Zhao, Qingyang Bao, Yunze Ni. 236-245 [doi]
- Key Technologies of Anomaly Detection Using PCA-LSTMZhong-shi Gao, Yang Su, Yi Ding, Yu-dong Liu, Xu an Wang, Junwei Shen. 246-254 [doi]
- Electricity Load and Price Forecasting Using Enhanced Machine Learning TechniquesHamida Bano, Aroosa Tahir, Ishtiaq Ali, Raja Jalees ul Hussen Khan, Abdul Haseeb, Nadeem Javaid. 255-267 [doi]
- RobotFarm: A Smart and Sustainable Hydroponic Appliance for Meeting Individual and Collective NeedsSilvia Angeloni, Giorgia Pontetti. 268-280 [doi]
- A Fuzzy-Based System for Decision of Sightseeing Spots Considering Different ConditionsYi Liu 0011, Leonard Barolli. 281-290 [doi]
- Large-Scale Electronic Voting Based on Conflux Consensus MechanismShuai Xiao, Xu an Wang, Han Wang. 291-299 [doi]
- An Image Denosing Algorithm for Strong Noise Image Based on Structural Similarity of Contourlet Domain via Grey Relational AnalysisLili Jiao. 300-309 [doi]
- Construction of a Historical Information Visualization System by Superposition of Old MapTomoyuki Ishida, Hayato Ito. 310-318 [doi]
- Study on Resistance Parameter Setting of Acupuncture Treatment Training SystemMeguru Yamashita, Shingo Sasaki, Akio Doi, Kiwamu Satoh, Hajime Ogawa. 319-325 [doi]
- Bidirectional LSTM: An Innovative Approach for Phishing URL IdentificationYuchen Liang, Jiangdong Deng, Baojiang Cui. 326-337 [doi]
- Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling AttackYusuke Nozaki, Masaya Yoshikawa. 338-347 [doi]
- Secure Kubernetes Networking Design Based on Zero Trust Model: A Case Study of Financial Service Enterprise in IndonesiaNico Surantha, Felix Ivan. 348-361 [doi]
- State-Based Fuzzing for S1APWeiqi Li, Qian Wu, Baojiang Cui. 362-372 [doi]
- Service-Aware Resource Allocation Based on RAN Slicing for Smart GridSachula Meng, Zhihui Wang, Huixia Ding, Lili Sun, Delong Yang, Sai Wu, Xinzhi Cao, Xue Wang, Ying Wang, Yuanbin Chen. 373-384 [doi]
- A Dynamic Scene Recognition Method for Event-Based Social NetworkHaidong Kang, Tianhan Gao, Nan Guo. 385-392 [doi]
- A Static Instrumentation Method for ELF BinaryWenchuan Yang, Yifei Wang, Baojiang Cui, Chen Chen. 393-403 [doi]
- Personalized Topic Graph Generation Method Using Image Labels in Image-Sharing SNSKunyoung Kim, Minhwan Kim, Jongmo Kim, Mye M. Sohn. 404-415 [doi]
- Wireless Sensor Network to Collect Training Data from CyclingCristian Alberoni, Ernesto Leon, Miguel A. Wister, José Adán Hernández-Nolasco. 416-425 [doi]
- The Impact of Patients' Trust and Privacy on Use of Medical Mobile ApplicationsAlsaleh Saad, Hassan Kasim Haridi, Alzabin Sulaiman, Talal Alzabni. 429-436 [doi]
- Conceptual Security System Design for Mobile Platforms Based on Human Nervous SystemNanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho. 437-446 [doi]
- Development of a Cyber Incident Information CrawlerKazuki Ikegami, Michihiro Yamada, Hiroaki Kikuchi, Koji Inui. 447-455 [doi]
- A Review of General Data Protection Regulation for Supply Chain EcosystemAvirup Dasgupta, Asif Qumer Gill, Farookh Khadeer Hussain. 456-465 [doi]
- Implementation of a Digital Signature in Backward-Compatible QR Codes Using Subcell Division and Double EncodingNobuyuki Teraura, Isao Echizen, Keiichi Iwamura. 466-476 [doi]
- Examination and Comparison of Countermeasures Against Web Tracking TechnologiesTakamichi Saito, Rikita Koshiba. 477-489 [doi]
- A LoRaWAN Based Energy Efficient Data Encryption MethodKun-Lin Tsai, Fang-Yie Leu, Shuo-Wen Chang, Jiun-Yi Lin, Huei-Tang Luo. 493-502 [doi]
- Firewall Services Provided by Edge Computers Under AMF and gNB in 5GSheng-Zheng Lin, Fang-Yie Leu. 503-513 [doi]
- Air Pollution Source Identification by Using Neural Network with Bayesian OptimizationFang-Yie Leu, Jia-Sheng Ho. 514-524 [doi]
- MIH and CRRM Handover in Trusted or Untrusted EnvironmentsMei-Yu Wu, Fang-Yie Leu. 525-536 [doi]
- Applicable Dynamic Forensics Investigation via Client-Server Architecture with MYANFOSISTin Maung Maung, Mie Mie Su Thwin. 537-545 [doi]
- Influential Reasonable Robust Virtual Machine Placement for Efficient Utilization and Saving EnergyBibi Ruqia, Nadeem Javaid, Altaf Husain, Najeeba Muhammad Hassan, Hafiza Ghulam Hassan, Yumna Memon. 549-561 [doi]
- The Hot Security Topics Analysis for the Announcements in ICANN Website by Using Web Crawler and Association Rule TechnologyHsing-Chung Chen, Tzu-Ya Chen, Shian-Shyong Tseng, Kang-Ming Chang, Fengming Chang, Mei-He Jiang. 562-571 [doi]
- Using CBR Approach to Enhance Collaborative Design AbilityShian-Shyong Tseng, Shih-Nung Chen, Tsung-Yu Yang, Edgar Chia-Han Lin. 572-586 [doi]
- Performance Evaluations of Packet Encapsulation Using Scatter-Gather Direct Memory Access to Support Massive Devices Accesses for NB-IoT Small CellWen-Chung Tsai, Nien-Ting Huang, Ting-Ming Tsai, Te-Jen Wang. 587-596 [doi]
- Road Junction Identification in High Resolution Urban SAR Images Based on SVMJianghua Cheng, Tong Liu, Yueyong Zhou, Yanye Xiong. 597-606 [doi]
- Malicious Adware Detection on Android Platform using Dynamic Random ForestKyungmin Lee, Hyunhee Park. 609-617 [doi]
- A Smart Contract to Facilitate Goods Purchasing Based on Online HaggleHsing-Chung Chen, Bambang Irawan, Chieh-Yang Shih, Cahya Damarjati, Zon-Yin Shae, Fengming Chang. 618-628 [doi]
- Object Detection and Tracking Based on Deep LearningYong-Hwan Lee, Wan-Bum Lee. 629-635 [doi]
- Serendipity-Based Recommendation Framework for SNS Users Using Tie Strength and Relation ClusteringDaEun Park, Jongmo Kim, Mye M. Sohn. 636-645 [doi]
- Proposal of QoS Controls by Using OpenFlow for Heterogeneous Wireless Networks Considered with the IoT Traffic PerformanceKanji Nakano, Noriki Uchida. 649-657 [doi]
- Emotion Recognition Scheme via EEG Signal AnalysisTianhan Gao, Song Zhou. 658-663 [doi]
- A Review of Applying Blockchain Technology for Privacy ProtectionHaoyu Ji, He Xu. 664-674 [doi]
- Side Information Generation Algorithm Based on Weighted KSVD DictionaryJingmei Zhao, Rui Chen. 675-681 [doi]
- Controlled Quantum Dialogue Based on Logical QubitsHong-Mei Huang. 682-690 [doi]
- Residual Reversal Strategy: Empirical Evidence in the Taiwan Stock MarketShyh-Weir Tzang, Chun-Ping Chang, Yong Zulina Zubairi, Yung-Shun Tsai. 693-707 [doi]
- Free Cash Flow and Firm ValueChun-Ping Chang, Yung-Shun Tsai, Sheena Kaur, Shyh-Weir Tzang. 708-716 [doi]
- Social Impact Bonds (SIBs): Introduction and Cases ReviewShyh-Weir Tzang, Munkhzaya Usukhjargal, Chun-Ping Chang. 717-726 [doi]
- Demographic Structure, Business Fluctuations, Tax Shock and Housing BubblesYung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang. 727-737 [doi]
- The Causes and Influences of Institutional Investors Herding Behavior in the Taiwan Stock MarketKuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Yu-Sin Huang. 738-748 [doi]
- International Students' Career Intention-Resource Based ViewMei Hua Huang, Onnavia Laura, Bae-Ling Chen, Chiung Yen Chen. 749-757 [doi]
- Do Institutional Investors like Local Longevity Companies?Mei-Hua Liao, Hidekazu Sone. 758-761 [doi]
- Key Success Factors of Online Learning Website A - Balanced Scorecard PerspectiveYing-Li Lin, Kuei-Yuan Wang, Mei-Lien Chen. 762-770 [doi]
- Exploring the Design of Forestry Experience Activities by IPAChai-Ju Lu, Chiou-Shya Torng. 771-780 [doi]
- A Model of Chain Restaurant Organizational Achievement in Taiwan: A Structural Equation Modeling ApproachShu-Chuan Lin, Chung-Hao Chen. 781-790 [doi]
- A Deterministic Multi-item Inventory Model with Limited Warehouse CapacityYa-Lan Chan. 791-802 [doi]
- Innovation Strategy of Productive Farm - A Case on Taiwan Mushroom IndustryShao-Chieh Lin, Jen-Son Cheng, Shieh-Liang Chen, Chia-Ju Lu. 803-812 [doi]
- Novel Encryption Method of GPS Information in Image File Using Format-Preserving EncryptionChanghyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, Sun-Young Lee. 815-823 [doi]
- Improvement of QR Code Access Control System Based on Lamport Hash ChainHyeongmin Park, Taeeun Kim, Gaeul Kim, Wonyoung Jang, Kyungroul Lee, Sun-Young Lee. 824-833 [doi]
- A Survey on Attack Cases Exploiting Computer Architectural VulnerabilitiesKwangjun Kim, HeeDong Yang, Byeonggeun Son, Hanjae Yoon, Kangbin Yim, Manhee Lee. 834-844 [doi]
- Unintended Certificate Installation into Remote IoT NodesJunghoon Park, Byeonggeun Son, Junyoung Park, Myoungsu Kim, Kangbin Yim. 845-854 [doi]
- Optimizing the Placement of Wavelength Converters in WDMS. Ramya, T. S. Indumathi. 857-867 [doi]
- Analysis of Fiber Bragg Grating Spectral Characteristics Using Couple Mode Theory for Sensor ApplicationsSomesh Nandi, T. S. Indumathi, R. V. Sai Priya, Aparna Kori. 868-879 [doi]
- A Study on Fiber Bragg Gratings and Its Recent ApplicationsTejasrikumar Kori, Amogh Kori, Akshata Kori, Somesh Nandi. 880-889 [doi]
- Maximizing the Placement of Wavelength Converters in WDM Optical Networks Using Adaptive Equal Opportunity Genetic AlgorithmP. C. Shruthi, T. S. Indumathi, K. C. Jagadeesh. 890-901 [doi]
- Interpretation of Photonic Crystals with Hexagonal SymmetryHarshada J. Patil, T. S. Indumathi, Preeta Sharan, Somesh Nandi. 902-912 [doi]