Abstract is missing.
- Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Linearly Decreasing Vmax Method and Rational Decreament of Vmax MethodAdmir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa 0001. 1-10 [doi]
- IoT Node Elimination and Selection for Completing Tasks in Opportunistic Networks: A Fuzzy Logic ApproachMiralda Cuka, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 11-22 [doi]
- A Fuzzy-Based Simulation System for Driving Risk Management in VANETs Considering Weather Condition as a New ParameterKevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa 0001. 23-32 [doi]
- Research on Association Analysis Technology of Network Attack Trace Based on Web LogShiyu Li, Baojiang Cui. 33-43 [doi]
- Ethical Use of Mobile Technology in the Academic EnvironmentLiliana Mâta. 44-55 [doi]
- A Hybrid Information-Based Smartphone Indoor-Position ApproachSzu-Yin Lin, Fang-Yie Leu, Chia-Yin Ko, Ming-Chien Shih, Wei-Jia Tang. 56-64 [doi]
- An Accounting Ledger System Using the Hyperledger Fabric-Based BlockchainJiha Kim, Hyewon Kim, WooSeok Hyun, Hae-Duck J. Jeong. 65-72 [doi]
- Protocol Design for Boarding Confirmation Through Arduino SensingJiyoon Kim, Soobin Ahn, Jiyoung Lim. 73-80 [doi]
- A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN LogicHsing-Chung Chen, Mosiur Rahaman, Cahya Damarjati. 81-93 [doi]
- An UWB Cyclostationary Detection Algorithm Based on Nonparametric CusumXiao-ou Song, Xiao-rong Wang. 94-103 [doi]
- Proposal of a Disaster Evacuation Support System Using BeaconTomoyuki Ishida, Kanae Sakamoto. 104-113 [doi]
- A Convolutional Neural Network Model for Object Detection Based on Receptive FieldYifeng Dong, Tianhan Gao. 114-124 [doi]
- The Study and Realization of a Binary-Based Address Sanitizer Based on Code InjectionYuchao Wang, Baojiang Cui. 125-134 [doi]
- Modeling the Risk of Data Breach Incidents at the Firm LevelKazuki Ikegami, Hiroaki Kikuchi. 135-148 [doi]
- IoT Cryptosecurity: Overview and Potential SolutionsJacek Wytrebowicz, Michal Goworko. 149-160 [doi]
- "Guess Who?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web AuthenticationNampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit. 161-172 [doi]
- Adaptive Architecture and Principles for Securing the IoT SystemsAsif Qumer Gill, Ghassan Beydoun, Mahmood Niazi, Habib Ullah Khan. 173-182 [doi]
- A Visual Particle System Based on Mechanism Model Data in Digital TwinZuan Gu, Tianhan Gao. 183-193 [doi]
- An EEG Emotion Classification System Based on One-Dimension Convolutional Neural Networks and Virtual RealityXinbei Jiang, Tianhan Gao. 194-202 [doi]
- Implementation of a Moving Omnidirectional Access Point Robot and a Position Detecting SystemAtushi Toyama, Kenshiro Mitsugi, Keita Matsuo, Leonard Barolli. 203-212 [doi]
- Uplink Resource Allocation Based on Short Block-Length Regime in Heterogeneous Cellular Networks for Smart GridSai Wu, Zhihui Wang, Zhe Li, Zheng WeiJun, Weiping Shao, Baojuan Ma, Shunyu Yao, Ying Wang. 213-224 [doi]
- Multiuser Channel Access with RTS-CTS Algorithm for Li-Fi CommunicationsHyunhee Park. 225-233 [doi]
- Design and Implementation of a Novel Testbed for Automotive Security AnalysisYoungho An, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim. 234-243 [doi]
- Reinforcement Learning-Based Fuzzing TechnologyZheng Zhang, Baojiang Cui, Chen Chen. 244-253 [doi]
- Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring AnalysisMin Yao, Baojiang Cui, Chen Chen. 254-263 [doi]
- Computer-Aided English Education in China: An Online Automatic Essay Scoring SystemDapeng Li, Shaodong Zhong, Zhizhang Song, Yijia Guo. 264-278 [doi]
- Survey of Cyberspace Resources Scanning and AnalyzingYuanwei Hou, Xiaoxiao Chen, Yongle Hao, Zhiwei Shi, Shiyu Yang. 279-291 [doi]
- Modeling and Analysis of Cyberspace Threat Sources Based on VulnerabilitiesYijia Guo, Yuanwei Hou, Yongle Hao, Wenjue Xu. 292-303 [doi]
- A Dynamic Instrumentation Technology for IoT DevicesChen Chen, Weikong Qi, Wenting Jiang, Peng Sun. 304-312 [doi]
- Theoretical Research and Practical Exploration on the Teaching Reform of Higher MathematicsYiyue Sun. 313-323 [doi]
- Research on Experimental Teaching Reform of Electronic Technology CourseChunming Zhang, Yiyue Sun, Xiaofeng Zhang. 324-333 [doi]
- The Exploration and Research of Blended Teaching Mode Based on "Internet+" Big Data Cloud PlatformXiang Ma, Xuhui Fan, Wei Li, Jiangtao Li, Qiong Li. 334-343 [doi]
- The Analysis of Higher Mathematics Teaching Strategy Based on the Innovative Teaching ModeXuhui Fan, Wei Li, Zhimin Wang, Yiyue Sun, Lili Su. 344-353 [doi]
- Design of Gradient Push Algorithm in Time-Varying Directed GraphQingchao Zhu, Yue Wang, Xiao-ou Song, Hongmei Huang. 354-363 [doi]
- Generalized Snell's Law and Its Verification by MetasurfaceLiming Zheng, Yi Zhao. 364-372 [doi]
- A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm OptimizationYuyue Wang, Chen Chen, Baojiang Cui. 373-383 [doi]
- Anomaly Network Traffic Detection Based on Deep Transfer LearningPengfei Xiong, Baojiang Cui, Zishuai Cheng. 384-393 [doi]
- Distributed Facial Feature Clustering Algorithm Based on Spatiotemporal LocalityQiutong Lin, Bihua Zhuo, Lili Jiao, Li Liao, Jiangtao Guo. 394-403 [doi]
- Developing an AR-Based Ubiquitous Learning System for a Smart CampusShian-Shyong Tseng, Shih-Nung Chen, Tsung-Yu Yang. 404-414 [doi]
- The Development and Evaluation of a Smart E-Learning Platform for Programming InstructionAnthony Y. H. Liao, Shun-Pin Huang. 415-425 [doi]
- Research on Logistics Distribution Model of E-commerce Based on Improved Ant Colony AlgorithmYue Wang, Qingchao Zhu, Xiao-ou Song, Hongmei Huang, Qiu Yang. 426-435 [doi]
- Logical Network Separation and Update Inducing Techniques of Non-updated Vaccine Host by Creating Flow Rule in SDNDohyeon Bak, Mintae Kim, Jonghoon Lim, Raeseung Jang, Wonyoung Jang, Sun-Young Lee. 436-446 [doi]
- Group Delegated ID-Based Proxy Re-encryption for PHRWon-Bin Kim, Im-Yeong Lee, Kangbin Yim. 447-456 [doi]
- Analysis on Account Hijacking and Remote Dos Vulnerability in the CODESYS-Based PLC RuntimeEunseon Jeong, Junyoung Park, Insu Oh, Myoungsu Kim, Kangbin Yim. 457-467 [doi]
- Vestiges of Past Generation: Threats to 5G Core NetworkSeongmin Park, Bomin Choi, Youngkwon Park, Dowon Kim, Eunseon Jeong, Kangbin Yim. 468-480 [doi]
- Feasibility Study of Introducing Daily Rental Suites Business Model into Long-Term Care InstitutionsKuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Tsung-Chih Hung. 481-489 [doi]
- Black-Litterman Model and Momentum Strategy: Evidence of Taiwan Top 50 ETFShyh-Weir Tzang, Chun-Ping Chang, Chih-Hsing Hung, Yung-Shun Tsai. 490-497 [doi]
- Investment Timing and External EffectsChun-Ping Chang, Munkhnaran Duurenjargal, Zolzaya Batjargal, Shyh-Weir Tzang. 498-503 [doi]
- The Choice Between Foreign Direct Investment and Export with Industry Competition and Marginal CostChun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang, Zolzaya Batjargal. 504-509 [doi]
- Information Asymmetry, Market Liquidity and Abnormal ReturnsYung-Shun Tsai, Shyh-Weir Tzang, Chun-Ping Chang. 510-518 [doi]
- Examining the Impacts of Strategic Alliance - Examples of the Taiwan Semiconductor IndustryMei Hua Huang, Chia-Hui Hsieh, Perng-Fei Huang, Chiung Yen Chen. 519-528 [doi]
- The Relationship Between Long-Term Care Issues and Disability InsuranceYing-Li Lin, Kuei-Yuan Wang, Li-Lu Hsu. 529-539 [doi]
- Is Enforcing the Production and Filing of Corporate Social Responsibility Reports Conducive to Improving Corporate Performance?Chiung Yen Chen, Mei Hua Huang, Kuan-Ling Li, Ho-Yun Chao, Ke-Jie Shen, Szu-Han Yu. 540-551 [doi]
- An Inventory Model for Perishable Items Under Upstream and Downstream Trade CreditYa-Lan Chan, Sue-Ming Hsu, Mei-Hua Liao. 552-560 [doi]
- The Social Performance of University Social Responsibility Elderly Project: The Perspective of Social Return on InvestmentYa-Lan Chan, Sue-Ming Hsu, Neo Koe Hsin, Mei-Hua Liao. 561-572 [doi]
- Investment Concentration and Home BiasMei-Hua Liao, Wei-Li Kuo, Ya-Lan Chan. 573-578 [doi]
- Investor Sentiment and Governance MechanismsMei-Hua Liao, Chieh-Lin He, Ruirui Cui, Ya-Lan Chan. 579-585 [doi]
- A Static Instrumentation Method for IoT Firmware ELF Binary Emulation PatchingYiqi Sun, Baojiang Cui, Chen Chen, Yifei Wang. 586-596 [doi]
- Pseudonym Schemes Based on Location Privacy Protection in VANETs: A SurveyTianhan Gao, Lei Zhao. 597-605 [doi]
- Application of Blockchain Technology in Data Management of University Scientific ResearchXiao-feng Zhang. 606-613 [doi]
- Research on Vulnerability Site Location and Vulnerability Similarity TechnologyXiaochen Wang, Baojiang Cui, Xinda Xu, Qian Ma. 614-623 [doi]
- Implementation of Digital Signature on QR Symbol by Area Division Using Rhombic Sub-cellsNobuyuki Teraura, Isao Echizen, Keiichi Iwamura. 624-638 [doi]