Abstract is missing.
- Fine Tuning a Bayesian Network and Fairly Allocating Resources to Improve Procurement PerformanceMohammad Hassan Abolbashari, Omar Khadeer Hussain, Morteza Saberi, Elizabeth Chang. 3-15 [doi]
- A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Speed, Storage and Remaining Energy ParametersMiralda Cuka, Donald Elmazi, Tetsuya Oda, Elis Kulla, Makoto Ikeda, Leonard Barolli. 16-27 [doi]
- Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Normal and Uniform DistributionsKeita Matsuo, Shinji Sakamoto, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli. 28-40 [doi]
- Performance Evaluation of a Deep Q-Network Based Simulation System for Actor Node Mobility Control in Wireless Sensor and Actor Networks Considering Three-Dimensional EnvironmentTetsuya Oda, Donald Elmazi, Miralda Cuka, Elis Kulla, Makoto Ikeda, Leonard Barolli. 41-52 [doi]
- Space-Filling Curves based on Residue Number SystemJan Platos, Jana Nowaková, Pavel Krömer, Václav Snásel. 53-61 [doi]
- Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Theta Type of Brain WavesMasafumi Yamada, Miralda Cuka, Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli. 62-72 [doi]
- Implementation of an Actor Node for an Ambient Intelligence Testbed Considering Bed Temperature and Room Lighting: Its Effects on Human Sleeping ConditionRyoichiro Obukata, Miralda Cuka, Donald Elmazi, Tetsuya Oda, Keita Matsuo, Leonard Barolli. 73-81 [doi]
- Sentiment Analysis of Specific Product's Features Using Product Tree for Application in New Product DevelopmentMonireh Alsadat Mirtalaie, Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain. 82-95 [doi]
- A Heuristic Machine Learning Based Approach for Utilizing Scarce Data in Estimating Fuel Consumption of Heavy Duty TrucksAtefe Zakeri, Morteza Saberi, Omar Khadeer Hussain, Elizabeth Chang. 96-107 [doi]
- A Rudimentary Approach to Unmanned Aerial Vehicle Guided Improvised Explosive Device Shrapnel Dispersal SimulationChristopher C. K. Chan, Alexander Ferworn, David Tran. 108-118 [doi]
- Demand Side Management Using Bacterial Foraging and Crow Search Algorithm Optimization TechniquesAlmas Tabssam, Komal Pervaz, Arje Saba, Zain ul Abdeen, Mashab Farooqi, Nadeem Javaid. 119-131 [doi]
- Scheduling of Appliances in Home Energy Management System Using Elephant Herding Optimization and Enhanced Differential EvolutionMuhammad Azeem Sarwar, Basit Amin, Nasir Ayub, Syed Hassnain Faraz, Sajawal Ur Rehman Khan, Nadeem Javaid. 132-142 [doi]
- A New Meta-heuristic Optimization Algorithm Inspired from Strawberry Plant for Demand Side Management in Smart GridMuhammad Sufyan Khan, C. H. Anwar ul Hassan, Hazrat Abubakar Sadiq, Ishtiaq Ali, Asad Rauf, Nadeem Javaid. 143-154 [doi]
- Demand Side Management Using Chicken Swarm OptimizationZafar Faiz, Tamour Bilal, Muhammad Awais, Pamir, Sundas Gull, Nadeem Javaid. 155-165 [doi]
- Energy Optimization in Smart Grid Using Grey Wolf Optimization Algorithm and Bacterial Foraging AlgorithmC. H. Anwar ul Hassan, Muhammad Sufyan Khan, Asad Ghafar, Syeda Aimal, Sikandar Asif, Nadeem Javaid. 166-177 [doi]
- An Efficient Scheduling of Power and Appliances Using Metaheuristic Optimization TechniqueNasir Ayub, Adnan Ishaq, Mudabbir Ali, Muhammad Azeem Sarwar, Basit Amin, Nadeem Javaid. 178-190 [doi]
- Demand Side Management Using Harmony Search Algorithm and BAT AlgorithmMashab Farooqi, Muhammad Awais, Zain ul Abdeen, Saadia Batool, Zunaira Amjad, Nadeem Javaid. 191-202 [doi]
- Energy Optimization in Home Energy Management System Using Artificial Fish Swarm Algorithm and Genetic AlgorithmMuhammad Talha, Muhammad Shahid Saeed, Ghulam Mohiuddin, Musa Ahmad, Muhammad Junaid Nazar, Nadeem Javaid. 203-213 [doi]
- An Efficient Scheduling Using Meta Heuristic Algorithms for Home Demand-side Management in Smart GridAdnan Ishaq, Nasir Ayub, Arje Saba, Asad Ghafar, Basit Amin, Nadeem Javaid. 214-227 [doi]
- A New Two-Stage Algorithm for Constructing Group Multicast Tree with Bandwidth ConstraintMeng Sun, Xinchang Zhang, Jianwei Zhang 0009. 228-240 [doi]
- Research on the Connotation and Measurement of Uncertainty for Reassembly Dimensions Based on EntropyConghu Liu, Kang He. 241-249 [doi]
- Multi-agent Collaborative Planning in Smart EnvironmentsFlora Amato, Nicola Mazzocca, Francesco Moscato 0001, Fatos Xhafa. 250-261 [doi]
- Open Proctor: An Academic Integrity Tool for the Open Learning EnvironmentAlexander Amigud, Joan Arnedo-Moreno, Thanasis Daradoumis, Ana-Elena Guerrero-Roldán. 262-273 [doi]
- k-core Decomposition on Giraph and GraphChiXin Hu, Fangming Liu, Venkatesh Srinivasan, Alex Thomo. 274-284 [doi]
- A Bayesian Network for Improving Organizational Regulations Effectiveness: Concurrent Modeling of Organizational Resilience Engineering and Macro-Ergonomics IndicatorsAli Azadeh, M. Partovi, Morteza Saberi, Elizabeth Chang, Omar Khadeer Hussain. 285-295 [doi]
- Behavioral Keys in Cryptography and Security SystemsMarek R. Ogiela, Lidia Ogiela. 296-300 [doi]
- Enhancing Ant Brood Clustering with Adaptive Radius of Perception and Non-parametric Estimation on Multi-core ArchitecturesMohammed Qasem, Ying-Ying Liu, Ziyue Wang, Parimala Thulasiraman, Ruppa K. Thulasiram. 301-312 [doi]
- Designing an Efficient Self-adaptive Parallel Algorithm Using Math OraclesGabriel Luque, Enrique Alba. 313-325 [doi]
- Wind Speed Prediction with Genetic AlgorithmMichal Prilepok. 326-335 [doi]
- Evaluation of Pseudorandom Number Generators Based on Residue Arithmetic in Differential EvolutionPavel Krömer, Jan Platos, Václav Snásel. 336-348 [doi]
- Research and Realization of News Gathering and Editing System Based on Distributed Search EngineYamin Han, Kun Liu, Kun Ma. 349-354 [doi]
- Evacuation Guidance Method by Using Augmented Reality and Digital SignageKazuyoshi Hikita, Hiroyoshi Miwa. 355-366 [doi]
- Evaluation of How Methods for Creating People Flow Data Affect Performance of Epidemic RoutingYusuke Sakai, Akihiro Fujihara. 367-379 [doi]
- IBM Case Analysis by Servitization in IT IndustryLukas Bickel, Natalia Kryvinska. 380-388 [doi]
- Successful Social Network Integration in an Academic Institution: Case Study of OpportunitiesMonika Dávideková, Michal Gregus. 389-400 [doi]
- Method for Determining Recovery Order Against Intermittent Link FailuresTsuyoshi Yamasaki, Hiroyoshi Miwa. 403-412 [doi]
- Method for Finding Protected Links to Keep Robust Network Against Link Failure Considering Failure ProbabilityKeyaki Uji, Hiroyoshi Miwa. 413-422 [doi]
- Network Design Method by Link Protection to Keep Connectivity and Communication Quality to ServersDaishi Irie, Hiroyoshi Miwa. 423-433 [doi]
- When Does Network Coding Benefit Store-Carry-and-Forwarding Networks in Practice?Rabenirina Aina Tsiory, Masato Tsuru, Agussalim. 434-444 [doi]
- Fairness Aspects of Secondary Radio Spectrum AccessMario Köppen, Masato Tsuru. 445-455 [doi]
- Research on Security and Interoperability in MiddlewareCheng Zhou, Mingwen Tuo, Mingfu Tuo, Xin Zhao, Lei Wang. 459-467 [doi]
- Home Energy Management Using Enhanced Differential Evolution and Chicken Swarm Optimization TechniquesMuhammad Awais, Zain ul Abadeen, Taimur Bilal, Zafar Faiz, Muhammad Junaid, Nadeem Javaid. 468-478 [doi]
- A Novel Meta-heuristic Technique for Energy Optimization in Smart GridShaista Bibi, Mahnoor Khan, Bushra Abbasi, Muhammad Fawad, Ayesha Anjum Butt, Nadeem Javaid. 479-490 [doi]
- Privacy Preserving Data Mining on Big Data Computing Platform: Trends and FutureZhiqiang Gao, Longjun Zhang. 491-502 [doi]
- Pigeon Inspired Optimization and Enhanced Differential Evolution in Smart Grid Using Critical Peak PricingZunaira Amjad, Saadia Batool, Hafsa Arshad, Komal Parvez, Mashab Farooqi, Nadeem Javaid. 505-514 [doi]
- Energy Optimization Techniques for Demand-Side Management in Smart HomesSyeda Aimal, Komal Parveez, Arje Saba, Sadia Batool, Hafsa Arshad, Nadeem Javaid. 515-524 [doi]
- DSM Using Fish Swarm Optimization and Harmony Search Algorithm Using HEMS in Smart GridShahzeb Haider, Hafiz Muhammad Faisal, Zenab Amin, Haq Nawaz, Kaleem Akram, Nadeem Javaid. 525-535 [doi]
- Extraction and Tracking of Scientific Topics by LDAYongjun Zhang, Jialin Ma, Zijian Wang, Bolun Chen. 536-544 [doi]
- Mining Unknown Network Protocol's Stealth Attack BehaviorYan-Jing Hu. 545-553 [doi]
- Research on Behavior Modeling and Property Verification for Cyber-Physical SystemsMingfu Tuo, Cheng Zhou, Zhonghai Yin, Xin Zhao, Lei Wang. 557-562 [doi]
- Pigeon Inspired Optimization and Enhanced Differential Evolution Using Time of Use Tariff in Smart GridHafsa Arshad, Saadia Batool, Zunaira Amjad, Mudabbir Ali, Syeda Aimal, Nadeem Javaid. 563-575 [doi]
- The "Gut-Feeling" in the Decision-Making Process: A Computationally Efficient Approach to Influence Relation AssessmentOlayinka Johnny, Marcello Trovati, Jeffrey Ray. 576-584 [doi]
- A Preliminary Automated Approach to Assess Hospital Patient FeedbackJeffrey Ray, Marcello Trovati, Simon Minford. 585-593 [doi]
- A Survey of Topological Data Analysis (TDA) Methods Implemented in PythonJeffrey Ray, Marcello Trovati. 594-600 [doi]