


default search action
18th BWCCA 2023: Daegu, Korea
- Leonard Barolli:

Advances on Broad-Band and Wireless Computing, Communication and Applications - Proceedings of the 18th International Conference on Broad-Band and Wireless Computing, Communication and Applications (BWCCA-2023), Daegu, Korea, 6-8 November 2023. Lecture Notes on Data Engineering and Communications Technologies 186, Springer 2024, ISBN 978-3-031-46783-7 - Sanjukta Khwairakpam, Masahiro Shibata, Masato Tsuru:

Resiliency of the Area-Segmentation in Vehicle Routing for Collecting the Disaster Information. 1-14 - Kazuma Matsubara, Naohiro Hayashibara:

The Probability of Encounters of Nomadic Lévy Walk on Unit Disk Graphs. 15-25 - Hurianti Vidyaningtyas

, Iskandar, Hendrawan, Aloysius Adya Pramudita, Desti Madya Saputri:
Investigating SIC Performance Using Sequential Power Allocation for Downlink NOMA. 26-34 - Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Information Flow Control in the Fog Computing Model Based on a Component Degree Concept. 35-44 - Xavier Pilyai, Rafsanjani Nurul Irsyad, Ikhwan Nashir Zaini, Ridha Muldina Negara, Sofia Naning Hertiana, Rohmat Tulloh:

Implementation and Benchmarking of Kubernetes Horizontal Pod Autoscaling Method to Event-Driven Messaging System. 45-56 - Aulia Chusnyriani Sani Zulkarnaen, I Gusti Ngurah Rejski Ariantara Putra, Nada Fauzia Reviana, Rahmawati Hidayah, Nur Ibrahim, Nor Kumalasari Caecar Pratiwi, Yunendah Nur Fuadah:

Application of Convolutional Neural Network Method with MobileNet V1 and ResNet-152 V2 Architecture in Batik Motif Classification. 57-68 - Yoshihiro Okada, Kosuke Kaneko, Wei Shi:

Web Viewer for Educational VR Contents of 3D Scene Models Supporting VR Goggles. 69-80 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki

:
Human Factors Impacting the Security Actions of Help Recipients. 81-93 - Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki

:
Proposal for Approaches to Updating Software on Android Smartphone. 94-108 - Sana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki

:
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats. 109-121 - Masaki Ichino, Naoyuki Masuda, Takahiro Hayashi, Naoki Kodama, Takamichi Saito:

Device Classification via Passive Fingerprints with Clustering Algorithm. 122-134 - Sain Saginbekov:

A Scheme for Source Location Privacy of Multiple Sources in Wireless Sensor Networks. 135-148 - Riccardo Petracci

, Rosario Culmone, Leonardo Mostarda:
Blockchain Application for Fish Origin Certification. 149-158 - Ermioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli:

A Fuzzy-Based System for Assessment of Recognition Error in VANETs. 159-167 - Shinji Sakamoto, Kaho Asakura, Leonard Barolli, Makoto Takizawa:

An Intelligent System Based on Cuckoo Search for Node Placement Problem in WMNs: Tuning of Scale and Host Bird Recognition Rate Hyperparameters. 168-177 - Ruifeng Pan:

Dynamic Spatiotemporal Graph Convolution Network for Cellular Communication Traffic Prediction. 178-186 - Ridha Muldina Negara, Nana Rachmana Syambas, Eueung Mulyana, Rashid Muhammad Fajri:

Caching Strategy Utilizing Social Network Analysis Algorithm for Effective Cache Storage Allocation in Named Data Networking. 187-198 - David W. White, Isaac Woungang, Felix O. Akinladejo, Sanjay K. Dhurandher:

A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths. 199-208 - Dahlan Nariman

:
An Effective Technique for Collecting Multi-languages Hotel Reviews: A Case Study of 5 Stars Hotels in Bali Island. 209-217 - Sen-Tarng Lai, Fang-Yie Leu:

Applying High-Quality Test Case Management Mechanisms to Improve Regression Testing Speed and Quality. 218-227 - Jeng-Wei Lin

, Yi-Ting Lin, Fang-Yie Leu:
Case Study in Generating RFC Maps of IETF Standards. 228-237 - Lung-Pin Chen, Fang-Yie Leu, Junrui Pan, Chia-Chen Kuo, Ming-Jen Wang:

Enhancing Resource Allocation for Cloud Computation Platform with Priority Based Scheduling. 238-243 - Yu-Han Chen, Chao-Hsiang Hsu, Heru Susanto, Fang-Yie Leu:

5G Network Base Station Timeline Scheduling. 244-252 - Leonard Barolli:

Assessment of RIWM and FC-RDVM for Small and Middle Scale WMNs Considering Stadium Distribution and UNDX-M Crossover Method. 253-262 - Fuka Isayama, Tetsuya Shigeyasu:

A New DTN Routing Strategy Considering Age of Information. 263-272 - Kazunori Ueda, Kouki Yano:

DTN Routing Method Based on Records of Data Transmission Paths. 273-281 - Trasma Yunita

, Chairunnisa, A. Adya Pramudita, Achmad Munir:
Effect of Polarization Loss on Channel Capacity. 282-291 - Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

FSALT: A Fuzzy-Based System for Assessment of Logical Trust and Its Performance Evaluation. 292-301 - Kamronbek Yusupov, Md Rezanur Islam, Insu Oh, Kangbin Yim:

Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System. 302-311 - Yuki Nagai, Tetsuya Oda, Chihiro Yukawa, Kyohei Toyoshima, Kei Tabuchi, Leonard Barolli:

Wireless Visual Sensor Node Placement Optimization Considering Different Distributions of Events. 312-322 - Hsing-Chung Chen

, Pei-Yu Hsu
, Jhih-Sheng Su:
A Music Therapy Model Based on Consortium Blockchain Platform with Evidence and Tracking Efficacy of Hypertension Treatment. 323-334 - Shura Tachibana, Ryuki Shiromoto, Makoto Ikeda

, Leonard Barolli
:
Effect of Multiple Unmanned Aerial Vehicles on Data Transmission Considering DTN-Based V2V Communication in Urban Area. 335-344 - Keita Matsuo, Elis Kulla, Leonard Barolli:

Moving Accuracy Measurement of Omnidirectional Robot for MOAP and Wheelchair Tennis. 345-353 - Takahiro Uchiya, Taiga Yamada:

Data Augmentation Method for Improving Object Detection Accuracy of Recumbent Human in Disaster. 354-364 - Jinya Yano, Hiroyuki Fujioka:

Optimal Compressing and Decompressing Digital-Ink Handwriting via Sparse Gaussian Process Regression and Dynamic Programming. 365-373

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














