default search action
12th BWCCA 2017: Barcelona, Spain
- Leonard Barolli, Fatos Xhafa, Jordi Conesa:
Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2017, Barcelona, Spain, November 8-10, 2017. Lecture Notes on Data Engineering and Communications Technologies 12, Springer 2018, ISBN 978-3-319-69810-6
The 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2017)
- Basit Amin, Adia Khalid, Muhammad Azeem Sarwar, Asad Ghaffar, Adnan Satti, Nasir Ayub, Nadeem Javaid:
Real Time Pricing Based Appliance Scheduling in Home Energy Management Using Optimization Techniques. 3-13 - Saadia Batool, Adia Khalid, Zunaira Amjad, Hafsa Arshad, Syeda Aimal, Mashab Farooqi, Nadeem Javaid:
Pigeon Inspired Optimization and Bacterial Foraging Optimization for Home Energy Management. 14-24 - Asad Ghafar, Rabiya Khalid, Mudabbir Ali, C. H. Anwar ul Hassan, Adnan Ishaq, Basit Amin, Nadeem Javaid:
GreyWolf Optimization Technique for HEMS Using Day Ahead Pricing Scheme. 25-36 - Anwar Ur Rehman, Sheraz Aslam, Zain Ul Abideen, Asma Zahra, Waqar Ali, Muhammad Junaid, Nadeem Javaid:
Efficient Energy Management System Using Firefly and Harmony Search Algorithm. 37-49 - Sidra Razzaq, Adia Khalid, Sughra Razzaq, Zain Ul Abideen, Asma Zahra, Mahnoor Khan, Nadeem Javaid:
Demand Side Management Using Meta-Heuristic Optimization Techniques. 50-61 - Komal Parvez, Sheraz Aslam, Arje Saba, Syeda Aimal, Zunaira Amjad, Sikandar Asif, Nadeem Javaid:
Scheduling of Appliances in HEMS Using Elephant Herding Optimization and Harmony Search Algorithm. 62-72 - Pamir, Sakeena Javaid, Ishtiaq Ali, Noreen Mushtaq, Zafar Faiz, Hazrat Abubakar Sadiq, Nadeem Javaid:
Enhanced Differential Evolution and Crow Search Algorithm Based Home Energy Management in Smart Grid. 73-86 - Donald Elmazi, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli:
Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Actor-Sensor Coordination Quality Parameter. 87-99 - Miralda Cuka, Donald Elmazi, Tetsuya Oda, Elis Kulla, Makoto Ikeda, Leonard Barolli:
Effect of Storage Size on IoT Device Selection in Opportunistic Networks: A Comparison Study of Two Fuzzy-Based Systems. 100-113 - Shinji Sakamoto, Kosuke Ozera, Admir Barolli, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
Performance Evaluation of WMNs by WMN-PSOSA Simulation System Considering Random Inertia Weight Method and Linearly Decreasing Vmax Method. 114-124 - Yi Liu, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based Approach for Task Accomplishment in MobilePeerDroid Mobile System. 125-137 - Shigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa:
A Flexible Synchronization Protocol for Hidden Topics to Prevent Illegal Information Flow in P2PPS Systems. 138-148 - Ryo Watanabe, Dilawaer Duolikun, Cuiqin Qin, Tomoya Enokido, Makoto Takizawa:
A Simple Migration Algorithm of Virtual Machine in a Server Cluster. 149-160 - Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa:
Energy-Aware Dynamic Migration of Virtual Machines in a Server Cluster. 161-172 - Emi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
A Low-Energy Unicast Ad-Hoc Routing Protocol in Wireless Networks. 173-184 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
An Energy Efficient Load Balancing Algorithm Based on the Active Time of Cores. 185-196 - Akihito Yatsuda, Toshiyuki Haramaki, Hiroaki Nishino:
Development of an Adult Care System Based on Interactions with a Communication Robot. 197-205 - Muhammad Usman Younus, Rabia Shafi:
Development of Unified Model to Increase Coverage Area in 5G Networks Using Femtocells. 206-217 - Kevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa:
Comparison of Spray and Wait and Epidemic Protocols in Different DTN Scenarios. 218-229 - Haruka Watano, Tetsuya Shigeyasu:
Interest Re-Route Control According to Degree of Similarity on Cached Contents Using Bloom Filter on NDN. 230-240 - Yoshitaka Shibata, Kenta Ito, Goshi Sato:
A Mobility Network for Disaster and Emergent Information Systems in Challenged Network Environment. 241-248 - Natalia Krzyworzeka, Lidia Ogiela:
Visual CAPTCHA for Data Understanding and Cognitive Management. 249-255 - Adnan Ahmed, Muhammad Hassan Rahim, Fozia Feroze, Ayesha Zafar, Itrat Fatima, Sheraz Aslam, Nadeem Javaid:
Swarm Intelligence Based Home Energy Management Controller Under Dynamic Pricing Scheme. 256-266 - Itrat Fatima, Adia Khalid, Saman Zahoor, Anila Yasmeen, Shahan Arif, Umara Zafar, Nadeem Javaid:
Home Energy Management System Using Ant Colony Optimization Technique in Microgrid. 267-279 - Kaiki Ohkoshi, Hiroyuki Suzuki, Akio Koyama:
An Object Management and Fuzzy Based Location Estimation Method Using Active RFID Tags. 280-292 - Marek R. Ogiela, Lidia Ogiela:
Application of Cognitive Cryptography in Fog and Cloud Computing. 293-298 - Christos Bouras, Georgios Diles, Theodoros Moulias:
Energy Savings in Power Control for 5G Dense Femtocells. 299-308 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Classification of Cognitive Service Management Systems in Cloud Computing. 309-313 - Lina Alfantoukh, Yefeng Ruan, Arjan Durresi:
Trust-Based Multi-stakeholder Decision Making in Water Allocation System. 314-327 - Manel Houimli, Laïd Kahloul:
Modeling and Performance Evaluation of Protocols in Mobile Wireless Sensor Networks. 328-339 - Oudomsack Pierre Pasquero, Marie Le Bot, Marie-Hélène Hamon, Christian Gallard:
LTE-LAA and Wi-Fi Physical Layer Performance and Coverage Comparison. 340-351 - Da Li, Wen'an Zhou, Jianlong Liu, Bingqian Li:
A Hybrid-Distributed Base Station Wake-up Algorithm in Dense Heterogeneous Cellular Networks. 352-362 - Raja Muthalagu:
Design of MIMO System with Individual Transmit Power Constraint and Improper Constellation. 363-375 - Yeonju Lee, Jeongin Kim, Eunji Lee, Taekeun Hong, Pan-Koo Kim:
Implementation of 1: N Communication Model Using Serial Communication in an RF-Based Environment. 376-385 - Myoungsu Kim, Kyungroul Lee, Kangbin Yim:
Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A. 386-391 - Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, Kazushi Takahashi:
Web Browser Tampering: Inspecting CPU Features from Side-Channel Information. 392-403 - Chen Chen, Zhouguo Chen, Yongle Hao, Baojiang Cui:
Mocov: Model Based Fuzzing Through Coverage Guided Technology. 404-413 - Yuanwei Hou, Xingzhang Ren, Yongle Hao, Tong Mo, Weiping Li:
A Security Vulnerability Threat Classification Method. 414-426 - Chong Wang, Jianwei Ding, Tao Guo, Baojiang Cui:
A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction. 427-438 - Baojiang Cui, Xiangqian Zhang, Tianxin Zhang, Qin Zhang:
Embedded System Vulnerability Mining Technology Based on In-memory Fuzzing Test. 439-449 - Baojiang Cui, Qin Zhang, Xiangqian Zhang, Tao Guo:
Research on UPnP Protocol Security of Gateway Device. 450-458 - Xiaodan Yan, Tianxin Zhang, Baojiang Cui, Jiangdong Deng:
Hinge Classification Algorithm Based on Asynchronous Gradient Descent. 459-468 - Ahmed S. Alshammari, Mohamed I. Sobhy, Peter Lee:
Digital Communication System with High Security and High Noise Immunity: Security Analysis and Simulation. 469-481 - Xiaohui Jin, Baojiang Cui, Jun Yang, Zishuai Cheng:
Payload-Based Web Attack Detection Using Deep Neural Network. 482-488 - Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki:
Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning and Brute-Force Attack Defensibility Along with User Convenience Consideration. 489-501 - Abhishek Kumar, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar, Makoto Takizawa:
Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks. 502-515 - Muhammad Shahid Laiq, Sheeraz Ahmed, Zahoor Ali Khan, M. Irfan Khattak, Aatra Sadaf:
A Comparison of Fuzzy Control Schemes to Enhance Sustainability in Microgrid. 516-532 - Mohammad Dahman Alshehri, Farookh Khadeer Hussain:
A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT). 533-543
The 19th International Symposium on Multimedia Network Systems and Applications (MNSA-2017)
- Noreen Mushtaq, Muhammad Hassan Rahim, Rabiya Khalid, Samia Abid, Pamir, Sajawal Ur Rehman Khan, Nadeem Javaid:
Home Energy Management in Smart Grid Using Bacterial Foraging and Strawberry Algorithm. 547-559 - Khadija Ambreen, Rabiya Khalid, Rubab Maroof, Hasan Nasir Khan, Salma Asif, Hina Iftikhar, Nadeem Javaid:
Implementing Critical Peak Pricing in Home Energy Management Using Biography Based Optimization and Genetic Algorithm in Smart Grid. 560-569 - Shahab Ali, Samia Abid, Zain Ul Abideen, Saman Zahoor, Itrat Fatima, Zunaira Nadeem, Nadeem Javaid:
Home Energy Management Using Fish Swarm Optimization Bacterial Foraging Algorithm and Genetic Algorithm in Smart Grid. 570-582 - Mudabbir Ali, Samia Abid, Asad Ghafar, Nasir Ayub, Hafsa Arshad, Sajawal Khan, Nadeem Javaid:
Earth Worm Optimization for Home Energy Management System in Smart Grid. 583-596 - Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Hybrid Replication Schemes of Processes for Fault-Tolerance Systems in Energy-Efficient Server Clusters. 597-607 - Minoru Uehara:
Coordinate Assignment: Self-outer-Recognition in OpenFlow Mesh. 608-615 - Fozia Feroze, Asif Khan, Nabeeha Qayyum, Sakeena Javaid, Adnan Ahmed, Muhammad Hassan Rahim, Nadeem Javaid:
A Survey of Optimization Techniques for Scheduling in Home Energy Management Systems in Smart Grid. 616-626 - Sardar Mehboob Hussain, Muhammad Hassan Rahim, Zunaira Nadeem, Iqra Fatima, Zafar Iqbal, Sikandar Asif, Nadeem Javaid:
The Trends of Integrating Renewable Energy Sources: A Survey. 627-636 - Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa:
Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain. 637-647 - Tasuku Takahashi, Kengo Imae, Naohiro Hayashibara:
Towards a Collaborative Editing System on 3D Space. 648-657 - Yuji Suga:
Sausage-Style One-Time Authentication Schemes. 658-667
The 10th International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN-2017)
- Masafumi Yamada, Miralda Cuka, Yi Liu, Kevin Bylykbashi, Keita Matsuo, Leonard Barolli:
Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Gamma Type of Brain Waves. 671-681 - Ryoichiro Obukata, Kevin Bylykbashi, Kosuke Ozera, Yi Liu, Shinji Sakamoto, Leonard Barolli:
A Fuzzy-Based System for Actor Node in an Ambient Intelligence Testbed: Effects of Different Parameters on Human Sleeping Conditions. 682-690 - Zhao Chen, Jiang-Yan Wu:
A New Space-Time Coding Method Based on OCML. 691-700 - Kosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Leonard Barolli:
Experimental Evaluation of a WLAN Triage Testbed Considering Relation of Connection Success Ratio and Connected Time Ratio with User Priority and RSSI Parameters. 701-717 - Zain Ul Abedin:
Circular Microstrip Patch Antenna Design for LTE, ISM, WIMAX, Satellite Communication and in Ultra WideBand Applications. 718-727
The 8th International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2017)
- Ouamri Med Amine, Zenadji Cilia, Abdelkrim Khireddine:
Optimal Base Station Planning Using Genetic Algorithm for LTE Network. 731-740 - Kazunori Uchida, Leonard Barolli:
Line of Sight Procedure for Dijkstra-Algorithm Based Ray-Tracing. 741-753 - Yu Yoshino, Daichi Koga, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli:
A Message Suppression Method Considering Priority for Inter-vehicle Communications. 754-763 - Hiroshi Maeda, Keisuke Haari, Xiang Zheng Meng, Naoki Higashinaka:
Signal Routing by Dispersive Medium. 764-773
The 8th International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2017)
- Sen-Tarng Lai, Fang-Yie Leu:
A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks. 777-787 - Kun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang:
A Light Weight Data Encryption Method for WSN Communication. 788-795 - Chien-Hsiang Kao, Fang-Yie Leu:
Predicting Video Stream Fragments in a Reactive Mode. 796-802 - Zong-Ying Yang, Fang-Yie Leu:
Relay Base-Station Handover in a 5G Environment. 803-810 - Hua Ma, Enting Dong, Zhenhua Liu, Linchao Zhang:
Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation. 811-820
The 6th International Workshop on Robot Interaction, Control, Communication and Cooperation (RI3C-2017)
- Keita Matsuo, Leonard Barolli:
Omnidirectional Wheelchair Vision with Small Reflect Mirrors for Tennis Ball Tracking. 823-833 - Ryuta Sugie, Takahiro Uchiya, Ichi Takumi:
Investigation Using Multi-Agent Simulation Environment for Evacuation Guidance with Robots. 834-843 - Takahiro Uchiya, Ryota Nishimura, Takahiro Hirano, Masaru Sakurai:
Design of Reminiscence Therapy System for Elderly People with Dementia. 844-853 - Gaku Tsuchiya, Makoto Ikeda, Donald Elmazi, Leonard Barolli, Elis Kulla:
A Disaster Information Gathering System Design Using Fuzzy Logic. 854-861
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.