default search action
EIDWT 2020: Kitakyushu, Japan
- Leonard Barolli, Yoshihiro Okada, Flora Amato:
Advances in Internet, Data and Web Technologies, The 8th International Conference on Emerging Internet, Data and Web Technologies, EIDWT 2020, Kitakyushu, Japan. 24-26 February 2020. Lecture Notes on Data Engineering and Communications Technologies 47, Springer 2020, ISBN 978-3-030-39745-6 - Noriyasu Yamamoto:
Judging Students' Learning Style from Big Video Data Using Neural Network. 1-6 - Yusi Machidori, Ko Takayama, Kaoru Sugita:
A Multi-modal Interface for Control of Omnidirectional Video Playing on Head Mount Display. 7-11 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Evaluation of a TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT. 12-23 - Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
A Dynamic Tree-Based Fog Computing (DTBFC) Model for the Energy-Efficient IoT. 24-34 - Takumi Saito, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Topic-Based Subgroups for Reducing Messages Exchanged Among Subgroups. 35-45 - Yinzhe Guo, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Subtree-Based Fog Computing in the TWTBFC Model. 46-52 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Actor Node Selection in WSANs Considering Task Accomplishment Time as a New Parameter. 53-63 - Miralda Cuka, Donald Elmazi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
IoT Node Selection in Opportunistic Networks: A Fuzzy-Based Approach Considering Node's Successful Delivery Ratio (NSDR) as a New Parameter. 64-72 - Phudit Ampririt, Seiji Ohara, Yi Liu, Makoto Ikeda, Hiroshi Maeda, Leonard Barolli:
A Fuzzy-Based System for Admission Control in 5G Wireless Networks Considering Software-Defined Network Approach. 73-81 - Yi Liu, Phudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Leonard Barolli, Makoto Takizawa:
A Fuzzy-Based Decision System for Sightseeing Spots Considering Natural Scenery and Visiting Cost as New Parameters. 82-88 - Seiji Ohara, Admir Barolli, Phudit Ampririt, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMN-PSODGA Hybrid Simulation System for Node Placement Problem Considering Normal Distribution and Different Fitness Functions. 89-101 - Kevin Bylykbashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Effect of Driver's Condition for Driving Risk Measurement in VANETs: A Comparison Study of Simulation and Experimental Results. 102-113 - Ermioni Qafzezi, Kevin Bylykbashi, Tomoyuki Ishida, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
Resource Management in SDN-VANETs: Coordination of Cloud-Fog-Edge Resources Using Fuzzy Logic. 114-126 - Admir Barolli, Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering Evolution Steps and Computation Time. 127-137 - Shinji Sakamoto, Seiji Ohara, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of WMNs Using an Hybrid Intelligent System Based on Particle Swarm Optimization and Hill Climbing Considering Different Number of Iterations. 138-149 - Ryota Sakai, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
A Software-Oriented Approach to Energy-Efficiently Unicasting Messages in Wireless Ad-Hoc Networks. 150-157 - Kosuke Gima, Takumi Saito, Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Evaluation of Parallel Data Transmission in the Mobile Fog Computing Model. 158-170 - Natwadee Ruedeeniraman, Makoto Ikeda, Leonard Barolli:
Performance Evaluation of VegeCare Tool for Insect Pest Classification with Different Life Cycles. 171-180 - Tomoya Enokido, Makoto Takizawa:
The Improved Redundant Energy Consumption Laxity-Based Algorithm with Differentiating Starting Time of Process Replicas. 181-188 - Noriki Uchida, Misaki Fukumoto, Tomoyuki Ishida, Yoshitaka Shibata:
Implementations on Static Body Detections by Locational Sensors on Mobile Phone for Disaster Information System. 189-196 - Kyohei Toyoshima, Tetsuya Oda, Masaharu Hirota, Kengo Katayama, Leonard Barolli:
A DQN Based Mobile Actor Node Control in WSAN: Simulation Results of Different Distributions of Events Considering Three-Dimensional Environment. 197-209 - Marek R. Ogiela, Lidia Ogiela:
Cognitive Approaches for Sensor Data Analysis in Transformative Computing. 210-214 - Yong-Woon Hwang, Im-Yeong Lee, Kangbin Yim:
A Study on Access Control Scheme Based on ABE Using Searchable Encryption in Cloud Environment. 215-221 - Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Computing in Knowledge Extraction and Service Management Processes. 222-225 - Naoki Higashinaka, Hiroshi Maeda:
Input Amplitude Dependency of Duplexer with Dispersive and Nonlinear Dielectric in 2-D Photonic Crystal Waveguide. 226-236 - Takumi Iwamoto, Kiyotaka Fujisaki:
A Beam Power Allocating Method for Ka-band Multi-beam Broadcasting Satellite Based on Meteorological Data. 237-246 - Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. 247-258 - Wei Shi, Tianhao Gao, Srishti Kulshrestha, Ranjan Bose, Akira Haga, Yoshihiro Okada:
A Framework for Automatically Generating IoT Security Quizzes in 360VR Images/Videos Based on Linked Data. 259-267 - Yoshitaka Shibata, Yoshikazu Arai, Yoshiya Saito, Jun Hakura:
Development and Evaluation of Road State Information Platform Based on Various Environmental Sensors in Snow Countries. 268-276 - Akira Sakuraba, Yoshitaka Shibata, Goshi Sato, Noriki Uchida:
Evaluation of End-to-End Performance on N-Wavelength V2X Cognitive Wireless System Designed for Exchanging Road State Information. 277-289 - Jiasen Liu, Xu An Wang, Kaiyang Zhao, Han Wang:
Secure Public Cloud Storage Auditing with Deduplication: More Efficient and Secure. 290-300 - Usman Ali, Usman Qamar, Kanwal Wahab, Khawaja Sarmad Arif:
A Knapsack Problem Based Algorithm for Local Level Management in Smart Grid. 301-310 - Yiyi Wang, Koji Okamura:
Automatic Generation of E-Learning Contents Based on Deep Learning and Natural Language Processing Techniques. 311-322 - Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki:
Identification of Manual Alphabets Based Gestures Using s-EMG for Realizing User Authentication. 323-333 - Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. 334-341 - Keisuke Takano, Tetsuya Oda, Masaki Kohata:
Design of a DSL for Converting Rust Programming Language into RTL. 342-350 - Tsu-Hao Hsieh, Kuan-Yu Ho, Meng-Yo Tsai, Kuan-Chou Lai:
Usage-Oriented Resource Allocation Strategy in Edge Computing Environments. 351-360 - Kosuke Kaneko, Yusuke Tsutsumi, Subodh Sharma, Yoshihiro Okada:
PACKUARIUM: Network Packet Visualization Using Mixed Reality for Detecting Bot IoT Device of DDoS Attack. 361-372 - Toshihiko Yamakami:
A Handover Challenge of Data Analytics: Multi-user Issues in Sustainable Data Analytics. 373-383 - Toshihiko Yamakami:
A Privacy Threat Model in XR Applications. 384-394 - Tomoyuki Sueda, Naohiro Hayashibara:
Human Mobility and Message Caching in Opportunistic Networks. 395-405 - Wei-Sheng Chen, Fang-Yie Leu:
The Study on AUSF Fault Tolerance. 406-415 - Hira Gul, Arooj Arif, Sahiba Fareed, Mubbashra Anwar, Afrah Naeem, Nadeem Javaid:
Classification and Regression Based Methods for Short Term Load and Price Forecasting: A Survey. 416-426 - Mubbashra Anwar, Afrah Naeem, Hira Gul, Arooj Arif, Sahiba Fareed, Nadeem Javaid:
Electricity Price and Load Forecasting Using Data Analytics in Smart Grid: A Survey. 427-439 - Xiao Tan:
Genetic Algorithm Based Bi-directional Generative Adversary Network for LIBOR Prediction. 440-447 - Ryo Nakai, Tomoyuki Ishida:
Proposal of an Interactive Brainstorming Environment for Various Content Sharing and Meeting Progress. 448-457 - YoungEun Choe, Jun-Sik Shin, Seunghyung Lee, JongWon Kim:
eBPF/XDP Based Network Traffic Visualization and DoS Mitigation for Intelligent Service Protection. 458-468 - Liao Sichao, Hiroyoshi Miwa:
Recognition of Historical Characters by Combination of Method Detecting Character in Photo Image of Document and Method Separating Block to Characters. 469-477 - Yuuhi Okahana, Yusuke Gotoh:
A Study for Semi-supervised Learning with Random Erasing. 478-490 - Kenta Henmi, Akio Koyama:
Hybrid Type DTN Routing Protocol Considering Storage Capacity. 491-502 - Yoshihiro Okada, Taiki Ura:
IntelligentBox for Web-Based VR Applications (WebIBVR) and Its Collaborative Virtual Environments. 503-515 - Hiroki Yano, Hiroyoshi Miwa:
Optimization Problem for Network Design by Link Protection and Link Augmentation. 516-521 - Yujin Hong, JongWon Kim:
Workflow Improvement for KubeFlow DL Performance over Cloud-Native SmartX AI Cluster. 522-531 - GeumSeong Yoon, Jung-Su Han, Seunghyung Lee, Jongwon Kim:
DevOps Portal Design for SmartX AI Cluster Employing Cloud-Native Machine Learning Workflows. 532-539 - Takeru Kurita, Keita Matsuo, Leonard Barolli:
A Management System for Electric Wheelchair Considering Agile-Kanban Using IoT Sensors and Scikit-Learn. 540-551 - Muhammad Talha Riaz, Farooque Azam, Nazish Yousaf, Muhammad Waseem Anwar, Adil Aziz:
An Approach of Usability Testing for Web User Interface Through Interaction Flow Modeling Language (IFML) Models. 552-563 - Haibo Zhang, Kouichi Sakurai:
Blockchain for IoT-Based Digital Supply Chain: A Survey. 564-573
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.