Abstract is missing.
- Detecting DoS and DDoS Attacks by Using CuSum Algorithm in 5G NetworksShih-Ting Chiu, Fang-Yie Leu. 1-9 [doi]
- A Fuzzy-Based System for Assessment of Available Edge Computing Resources in a Cloud-Fog-Edge SDN-VANETs ArchitectureErmioni Qafzezi, Kevin Bylykbashi, Phudit Ampririt, Makoto Ikeda, Leonard Barolli, Makoto Takizawa 0001. 10-19 [doi]
- Optimization of JavaScript Large-Scale Urban SimulationsMaria Patrou, Kenneth B. Kent, Dane Sheppard. 20-31 [doi]
- Performance Evaluation of WMN-PSOSA-DGA Simulation System Considering Uniform and Chi-Square Client DistributionsAdmir Barolli, Shinji Sakamoto, Phudit Ampririt, Seiji Ohara, Leonard Barolli, Makoto Takizawa 0001. 32-42 [doi]
- Topic-Based Processing Protocol in a Mobile Fog Computing ModelTakumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 43-53 [doi]
- The Energy-Efficient Object Replication Scheme by Omitting Meaningless Write Methods in Virtual Machine EnvironmentsTomoya Enokido, Makoto Takizawa 0001. 54-63 [doi]
- Strategies for Alternate Group Trip Planning Queries in Location-Based ServicesWendy Osborn, Shahul Shaik. 64-76 [doi]
- A Cost Analysis of Routing Algorithms in Pedestrian-Based Delay Tolerant NetworksTomoyuki Sueda, Naohiro Hayashibara. 77-88 [doi]
- Secure Cognitive Protocols for Data Fusion in Transformative ComputingLidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. 89-93 [doi]
- A Dynamic Network-Based Fog Computing Model for Energy-Efficient IoTYinzhe Guo, Takumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 94-104 [doi]
- Requirements for Trustworthy Artificial Intelligence - A ReviewDavinder Kaur, Suleyman Uslu, Arjan Durresi. 105-115 [doi]
- Optimal Number of MOAP Robots for WMNs Using Elbow TheoryKenshiro Mitsugi, Atushi Toyama, Keita Matsuo, Leonard Barolli. 116-126 [doi]
- An Area-Efficient FPGA Implementation of a Real-Time Binary Object Detection SystemNarges Attarmoghaddam, Kin Fun Li. 127-139 [doi]
- Consideration of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole InternetKazuya Odagiri, Shogo Shimizu, Naohiro Ishii. 140-150 [doi]
- The Antikythera Framework: A Novel Design Approach for Accommodating a Large Number of Web ServicesToshihiko Yamakami, Shunsuke Kirino, Masaki Takahashi. 151-162 [doi]
- An Ensemble Deep Learning Technique to Detect COVID-19 Misleading InformationMohamed K. Elhadad, Kin Fun Li, Fayez Gebali. 163-175 [doi]
- Community Mining and Cross-Community Discovery in Online Social NetworksBelkacem Chikhaoui, Jean Marie Tshimula, Shengrui Wang. 176-187 [doi]
- Address Usage Estimation Based on Bitcoin Traffic BehaviorHiroki Matsumoto, Shusei Igaki, Hiroaki Kikuchi. 188-199 [doi]
- Comparison of OAuth/OpenID Connect Security in America and JapanTakamichi Saito, Satoshi Shibata, Tsubasa Kikuta. 200-210 [doi]
- Enhanced Secure Comparison Schemes Using Homomorphic EncryptionLihua Wang 0001, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai. 211-224 [doi]
- The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoSTetsuya Hirakawa, Toyoo Takata. 225-237 [doi]
- Malware Detection Using Machine Learning ModelsGlaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré, Leonard Barolli. 238-246 [doi]
- A Performance Evaluating Simulation for PSO Algorithm by Applying Traceroute FeatureHsing-Chung Chen, Agung Mulyo Widodo, Bambang Irawan, Cahya Damarjati, Aristophane Nshimiyimana. 247-260 [doi]
- Considerations for Using DPDK in a Hypervisor Virtual EnvironmentSouta Kawahara, Atsushi Kanai. 261-268 [doi]
- The Bloom Clock to Characterize Causality in Distributed SystemsAjay D. Kshemkalyani, Anshuman Misra. 269-279 [doi]
- CySec: Cybersecurity Review Program for Professionals in JapanYoshio Kakizaki, Ryôichi Sasaki, Tomohide Okochi, Hiroshi Yasuda. 280-289 [doi]
- Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP ConceptShigeaki Tanimoto, Yuzuka Sato, Prajak Chertchom, Hiroyuki Sato, Atsushi Kanai. 290-302 [doi]
- Trusted Records Scheme in Scene InvestigationYitao Yang, Yubao Wu, Xu an Wang. 303-308 [doi]
- Energy-Efficient Migration of Virtual MachinesNaomichi Noaki, Takumi Saito, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 309-319 [doi]
- An Opportunistic Communication Protocol to Reduce Energy Consumption of NodesNanami Kitahara, Shigenari Nakamura, Takumi Saito, Tomoya Enokido, Makoto Takizawa 0001. 320-326 [doi]
- A Scheduling Method for Division-Based Broadcasting Considering Consumption Rate of Multiple VideosYusuke Gotoh, Kanto Nishino. 327-337 [doi]
- Improvement and Evaluation of a Function for Tracing the Diffusion of Classified Information on KVMHideaki Moriyama, Toshihiro Yamauchi, Masaya Sato, Hideo Taniguchi. 338-349 [doi]
- A Continuous Media Data Broadcasting Model for Orbiting Base StationsTomoki Yoshihisa, Yusuke Gotoh, Akimitsu Kanzaki. 350-358 [doi]
- A Method for Displaying Puncture Information in CT-Guided Puncture Assistance SystemYusuke Gotoh, Manoka Yamashita, Koji Sakai, Koji Masui. 359-368 [doi]
- An Integrated Online Learning Approach Using a Smartphone-Based Active Learning System and a Web Video On-Demand SystemNoriyasu Yamamoto. 369-374 [doi]
- Effects of Early Update Cost in Cloud Object Storage SchedulingTitipat Sukhvibul, Juggapong Natwichai. 375-381 [doi]
- Construction and Application of Online and Offline Mixed Teaching Mode Under the Background of "Internet + Education"Ke Wang, Shuguang Liu, Xiaofeng Zhang. 382-389 [doi]
- Robust Speaker Recognition Based on Stacked Auto-encodersZhifeng Wang, Chunyan Zeng, Surong Duan, Hongjie Ouyang, Hongmin Xu. 390-399 [doi]
- A Portal for Air Pollution Mitigation for Northern ThailandRattapol Pornprasit, Methasit Pengmatchaya, Waranya Mahanan, Paskorn Champrasert, Juggapong Natwichai. 400-404 [doi]
- A Comparison of Thai Sentence Boundary Detection Approaches Using Online Product Review DataPree Thiengburanathum. 405-412 [doi]
- Implementation of a Mixed Reality Space Interior Layout System by Gesture OperationTomoyuki Ishida, Kazuma Iwama. 413-421 [doi]
- Predicted Viewer System of Road State Based on Crowd IoT Sensing Toward Autonomous EV DrivingYoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Goshi Sato, Noriki Uchida. 422-431 [doi]
- Construction of Information Presentation Environment Where Various Objects Talk Using Multiple IoT SpeakersTetsuro Ogi, Keita Enomoto, Shohei Akita, Toshifumi Miyahashi, Takehito Akima, Takumi Sano. 432-439 [doi]
- Implementation of a Traditional Craft Presentation System Using Smart Glass and Augmented RealityTomoyuki Ishida, Yuki Sanefuji. 440-449 [doi]
- Field Experiment on Cognitive Wireless V2X Communication Over High-Speed WLANAkira Sakuraba, Goshi Sato, Noriki Uchida, Yoshitaka Shibata. 450-460 [doi]
- Application of Fuzzy Logic for Event Evaluation in WSANsDonald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa 0001. 461-469 [doi]
- Performance Evaluation of VegeCare Tool for Potato Disease ClassificationNatwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli. 470-478 [doi]
- Effect of Parasitic Coil on Communication Performance on Table Type 13.56 MHz RFID ReaderKiyotaka Fujisaki, Yuki Yoshigai. 479-487 [doi]
- Wavelength Tuning of Output Optical Signal Through Resonant Filter for WDM System by Periodic Structure Composed of Silica GlassHiroshi Maeda, Naoki Higashinaka. 488-497 [doi]
- A Grading System of Pot-Phalaenopsis Orchid Using YOLO-V3 Deep Learning ModelYi-Wei Chang, Yu-Kai Hsiao, Chien-Chuan Ko, Rong-Show Shen, Wei-Yang Lin, Keng-Pei Lin. 498-507 [doi]
- Effect of Network Slice Duration for 5G Wireless Networks: A Fuzzy-Based Admission Control System Considering Software-Defined Network ApproachPhudit Ampririt, Seiji Ohara, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa 0001. 508-517 [doi]
- Proposal of Container Management Mechanism on Multi-agent FrameworkYafei Zhou, Takahiro Uchiya, Ichi Takumi. 518-527 [doi]
- Development of Indoor Evacuation Training System Using VR HMDTakahiro Uchiya, Ichi Takumi. 528-537 [doi]
- Dialogbook: Simple e-Portfolio System for International Communication LearningJun Iio, Shigenori Wakabayashi. 538-548 [doi]
- A Practical Implementation of Searchable Encrypted Audit Logging SystemYasuhiro Ohtaki, Kenta Togashi. 549-559 [doi]
- Another HTML5 Implementation of Web-Com for Embedding Chalk Annotations and Talk Voices into HTML DocumentsKoki Maruyama, Yasuhiro Ohtaki, Michitoshi Niibori, Tatsuhiro Yonekura, Masaru Kamada. 560-566 [doi]
- Recovering Lost Connection for Web Browser NetworkMasaki Kohana, Shinji Sakamoto, Shusuke Okamoto. 567-575 [doi]
- A Web-Based Attendance Management System with NFC Seat IdentifiersKohei Takahashi, Michitoshi Niibori, Masaru Kamada. 576-581 [doi]
- Preliminary Experiment for Location Tracking from Camera Image Using CNNShiori Kawakami, Shinji Sakamoto, Shusuke Okamoto. 582-589 [doi]
- A Proposal of Children Learning System to Promote Self-directed Choosing of Learning Tasks and Analysis of Learning Data in a Programming ClassroomYoshihiro Kawano, Yuka Kawano. 590-599 [doi]
- An Environment for Computer Programming Classes Under COVID-19 SituationShusuke Okamoto, Shinji Sakamoto, Masaki Kohana. 600-608 [doi]