Abstract is missing.
- Evaluation of an OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoTShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 3-14 [doi]
- Evaluation of Data and Subprocess Transmission Strategies in the Tree-Based Fog Computing ModelRyuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 15-26 [doi]
- Performance Evaluation of WMNs by WMN-PSOHC System Considering Random Inertia Weight and Linearly Decreasing Vmax Replacement MethodsShinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto. 27-36 [doi]
- Implementation of a Fuzzy-Based Simulation System and a Testbed for Improving Driving Conditions in VANETs Considering Drivers's Vital SignsKevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 37-48 [doi]
- Multi-cloud System for Content Sharing Using RAID-Like FragmentationTakumi Murakami, Shinji Sugawara. 49-61 [doi]
- A VR System for Alleviating a Fear of Heights Based on Vital Sensing and Placebo EffectIku Kitanosono, Toshiyuki Haramaki, Tsuneo Kagawa, Hiroaki Nishino. 62-72 [doi]
- Exploring Bit Arrays for Join Processing in Spatial Data StreamsWendy Osborn. 73-85 [doi]
- 2D Color Image Enhancement Based on Conditional Generative Adversarial Network and InterpolationYen-Ju Li, Chun-hsiang Chang, Chitra Meghala Yelamandala, Yu-Cheng Fan. 86-95 [doi]
- Position Follow-up Control for Hand Delivery of Object Between Moving Robot Arms of Remote Robot Systems with Force FeedbackQin Qian, Yutaka Ishibashi, Pingguo Huang, Yuichiro Tateiwa. 96-107 [doi]
- A SOA Based SLA Negotiation and Formulation Architecture for Personalized Service Delivery in SDNShuraia Khan, Farookh Khadeer Hussain. 108-119 [doi]
- An Energy-Efficient Process Replication Algorithm with Multi-threads AllocationTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 120-131 [doi]
- Application of Perceptual Features for User Authentication in Distributed SystemsMarek R. Ogiela, Lidia Ogiela. 132-136 [doi]
- User Oriented Protocols for Data Sharing and Services ManagementLidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. 137-141 [doi]
- Development of Borehole Imaging Method with Using Visual-SLAMTsuneo Kagawa. 142-153 [doi]
- A Mechanism of Window Switching Prediction Based on User Operation History to Facilitate MultitaskingKeizo Sato, Shotaro Imada, Shinya Mazume, Makoto Nakashima. 154-166 [doi]
- Opportunistic Communication by Pedestrians with Roadside Units as Message CachesTomoyuki Sueda, Naohiro Hayashibara. 167-177 [doi]
- VLSI Implementation of K-Best MIMO Detector with Cost-Effective Pre-screening and Fast Sorting DesignJheng-Jhan He, Chih-Peng Fan. 178-188 [doi]
- Meal Information Recognition Based on Smart Tableware Using Multiple Instance LearningLiyang Zhang, Kohei Kaiya, Hiroyuki Suzuki, Akio Koyama. 189-199 [doi]
- From Ivory Tower to Democratization and Industrialization: A Landscape View of Real-World Adaptation of Artificial IntelligenceToshihiko Yamakami. 200-211 [doi]
- Data Exportation Framework for IoT Simulation Based DevicesYahya Al-Hadhrami, Nasser Al-Hadhrami, Farookh Khadeer Hussain. 212-222 [doi]
- Earthquake and Tsunami Workflow Leveraging the Modern HPC/Cloud Environment in the LEXIS ProjectThierry Goubier, Andrea Ajmar, Carmine D'Amico, Paul Dubrulle, Susanna Grita, Stéphane Louise, Jan Martinovic, Tomás Martinovic, Natalja Rakowsky, Paolo Savio, Danijel Schorlemmer, Alberto Scionti, Olivier Terzo. 223-234 [doi]
- Alternative Paths Reordering Using Probabilistic Time-Dependent RoutingMartin Golasowski, Jakub Beránek, Martin Surkovský, Lukás Rapant, Daniela Szturcová, Jan Martinovic, Katerina Slaninová. 235-246 [doi]
- A Proposal of Recommendation Function for Solving Element Fill-in-Blank Problem in Java Programming Learning Assistant SystemNobuo Funabiki, Shinpei Matsumoto, Su Sandy Wint, Minoru Kuribayashi, Wen-Chun Kao. 247-257 [doi]
- Web-Based Interactive 3D Educational Material Development Framework and Its Authoring FunctionalitiesDaiki Hirayama, Wei Shi, Yoshihiro Okada. 258-269 [doi]
- Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular NetworkJun Yajima, Takayuki Hasebe, Takao Okubo. 270-280 [doi]
- Gait-Based Authentication for Smart Locks Using Accelerometers in Two DevicesKazuki Watanabe, Makoto Nagatomo, Kentaro Aburada, Naonobu Okazaki, Mirang Park. 281-291 [doi]
- Automatic Vulnerability Identification and Security Installation with Type Checking for Source CodeShun Hinatsu, Koichi Shimizu, Takeshi Ueda, Benoît Boyer, David Mentré. 292-304 [doi]
- Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware FilesRyusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki. 305-316 [doi]
- Draft Design of Li-Fi Based Acquisition Layer of DataLake Framework for IIoT and Smart FactoryByungRae Cha, Sun Park, ByeongChun Shin, JongWon Kim 0001. 317-324 [doi]
- A Novel Hybrid Recommendation System Integrating Content-Based and Rating InformationTan Nghia Duong, Viet Duc Than, Tuan Anh Vuong, Trong Hiep Tran, Quang Hieu Dang, Duc-Minh Nguyen, Hung-Manh Pham. 325-337 [doi]
- Proposal of a High-Presence Japanese Traditional Crafts Presentation System Integrated with Different CulturesYangzhicheng Lu, Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata, Hiromasa Habuchi. 341-349 [doi]
- Proposal of Interactive Information Sharing System Using Large Display for Disaster ManagementRyo Nakai, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata, Hiromasa Habuchi. 350-358 [doi]
- A TEFL Virtual Reality System for High-Presence Distance LearningSteven H. Urueta, Tetsuro Ogi. 359-368 [doi]
- A Trial Development of 3D Statues Map with 3D Point ServerHideo Miyachi. 369-376 [doi]
- Driving Simulator System for Disaster Evacuation Guide Based on Road State Information PlatformYoshitaka Shibata, Akira Sakuraba. 377-384 [doi]
- Estimation Method of Traffic Volume Using Big-DataKazuki Someya, Ryozo Kiyohara, Masashi Saito. 387-395 [doi]
- Experimental Evaluation of Publish/Subscribe-Based Spatio-Temporal Contents Management on Geo-Centric Information PlatformKaoru Nagashima, Yuzo Taenaka, Akira Nagata, Katsuichi Nakamura, Hitomi Tamura, Kazuya Tsukamoto. 396-405 [doi]
- DTN Sub-ferry Nodes Placement with Consideration for Battery ConsumptionKazunori Ueda. 406-412 [doi]
- Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter LinesShigeaki Tanimoto, Yuuki Takahashi, Ayaka Takeishi, Sonam Wangyal, Tenzin Dechen, Hiroyuki Sato, Atsushi Kanai. 413-422 [doi]
- Fault Detection of Process Replicas on Reliable ServersHazuki Ishii, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 423-433 [doi]
- Deep Recurrent Neural Networks for Wi-Fi Based Indoor Trajectory SensingHao Li, Joseph K. Ng, Junxing Ke. 434-444 [doi]
- A Model for Mobile Fog Computing in the IoTKosuke Gima, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 447-458 [doi]
- Converting Big Video Data into Short Video: Using 360-Degree Cameras for Searching Students Location and Judging Students Learning StyleNoriyasu Yamamoto. 459-464 [doi]
- Crowdsourcing Platform for Healthcare: Cleft Lip and Cleft Palate Case StudiesKrit Khwanngern, Juggapong Natwichai, Suriya Sitthikham, Watcharaporn Sitthikamtiub, Vivatchai Kaveeta, Arakin Rakchittapoke, Somboon Martkamjan. 465-474 [doi]
- Jaw Surgery Simulation in Virtual Reality for Medical TrainingKrit Khwanngern, Narathip Tiangtae, Juggapong Natwichai, Aunnop Kattiyanet, Vivatchai Kaveeta, Suriya Sitthikham, Kamolchanok Kammabut. 475-483 [doi]
- Fusion Method of Depth Images and Visual Images for Tire InspectionChien-Chou Lin, Chun-Cheng Chang, Ching-Lung Chang, Chuan-Yu Chang. 487-492 [doi]
- A Research on Constructing the Recognition System for the Dynamic Pedestrian Traffic Signals Through Machine VisionChien-Chung Wu, Yi-Chieh Hsug. 493-501 [doi]
- Learning Depth from Monocular Sequence with Convolutional LSTM NetworkChia-Hung Yeh, Yao-Pao Huang, Chih-Yang Lin, Min-Hui Lin. 502-507 [doi]
- Two-Dimensional Inductance Plane Sensor for Smart Home Door LockWen-Shan Lin, Chao-Ting Chu, Chian C. Ho. 508-516 [doi]
- Wearable EMG Gesture Signal Acquisition Device Based on Single-Chip MicrocontrollerWen-Shan Lin, Chao-Ting Chu, Chian C. Ho. 517-525 [doi]
- Ring-Based Routing for Industrial Wireless Sensor NetworksChing-Lung Chang, Hao-Ting Lee, Chuan-Yu Chang. 526-536 [doi]
- Proposal of Research Information Collection SystemTakahiro Uchiya, Ryoa Sugisaki, Ichi Takumi. 537-544 [doi]
- Agricultural Pests Damage Detection Using Deep LearningChing-Ju Chen, Jian-Shiun Wu, Chuan-Yu Chang, Yueh-Min Huang. 545-554 [doi]
- Analysis of Actual Propagation Behavior of WannaCry Within an Intranet (Extended Abstract)Takanori Oikawa, Masahiko Takenaka, Yuki Unno. 557-559 [doi]
- Proposal and Evaluation of Authentication Method Having Shoulder-Surfing Resistance for Smartwatches Using Shift RuleMakoto Nagatomo, Kazuki Watanabe, Kentaro Aburada, Naonobu Okazaki, Mirang Park. 560-569 [doi]
- Evaluation of Manual Alphabets Based Gestures for a User Authentication Method Using s-EMGHisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki. 570-580 [doi]
- Analysis of the Reasons Affecting the Simulation Results of SAR ImagingXing-Xiu Song. 581-585 [doi]
- Finite Element Simulation of Blasting Robote with ANSYSXing-Xiu Song. 586-592 [doi]
- Performance Evaluation of VegeCare Tool for Tomato Disease ClassificationNatwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli. 595-603 [doi]
- Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Load Balancing: A Comparison Study for Exponential and Weibull Distribution of Mesh ClientsSeiji Ohara, Admir Barolli, Shinji Sakamoto, Leonard Barolli. 604-619 [doi]
- Evaluation of 13.56 MHz RFID System Considering Tag Magnetic Field IntensityYuki Yoshigai, Kiyotaka Fujisaki. 620-629 [doi]
- Numerical Analysis of Fano Resonator in 2D Periodic Structure for Integrated Microwave CircuitHiroshi Maeda, Naoki Higashinaka, Akihito Ochi. 630-637 [doi]
- Evaluation of I/O Performance Regulating Function with a Virtual MachineTakashi Nagao, Nasanori Tanabe, Kazutoshi Yokoyama, Hideo Taniguchi. 641-649 [doi]
- A Continuous Media Data Broadcasting Model for Base Stations Moving StraightTomoki Yoshihisa, Yusuke Gotoh, Akimitsu Kanzaki. 650-657 [doi]
- A Support System for Second TourismYusuke Gotoh. 658-668 [doi]
- Omotenashi Robots: Generating Funny Dialog Using Visitor Geographical InformationKazuki Haraguchi, Satoshi Aoki, Tomohiro Umetani, Tatsuya Kitamura, Akiyo Nadamoto. 669-679 [doi]
- Web Service for Searching Halal Compliant RestaurantsImama, Masaki Kohana, Masaru Kamada. 683-691 [doi]
- Implementation of Interactive Tutorial for IslayPub by Hooking User EventsDaisuke Tanaka, Masaki Kohana, Michitoshi Niibori, Yasuhiro Ohtaki, Shusuke Okamoto, Masaru Kamada. 692-699 [doi]
- A Smart Lock Control System with Home SituationKatsumi Ohkura, Masaki Kohana. 700-704 [doi]
- Card Price Prediction of Trading Cards Using Machine Learning MethodsHiroki Sakaji, Akio Kobayashi, Masaki Kohana, Yasunao Takano, Kiyoshi Izumi. 705-714 [doi]
- Kawaii in Tweets: What Emotions Does the Word Describe in Social Media?Jun Iio. 715-721 [doi]
- Development of Goals Achievement Sharing System Based on Approach Goals in Positive PsychologyYoshihiro Kawano. 722-730 [doi]
- A Real-Time Programming Battle Web Application by Using WebRTCRyoya Fukutani, Shusuke Okamoto, Shinji Sakamoto, Masaki Kohana. 731-737 [doi]