


default search action
12th IMIS 2018: Matsue, Japan
- Leonard Barolli, Fatos Xhafa, Nadeem Javaid, Tomoya Enokido:

Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS-2018, Matsue, Japan, July 4-6, 2018. Advances in Intelligent Systems and Computing 773, Springer 2019, ISBN 978-3-319-93553-9
The 12th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2018)
- Aqib Jamil, Nadeem Javaid

, Muhammad Usman Khalid, Muhammad Nadeem Iqbal, Saad Rashid, Naveed Anwar:
An Energy Efficient Scheduling of a Smart Home Based on Optimization Techniques. 3-14 - Nadeem Javaid

, Ihtisham Ullah, Syed Shahab Zarin, Mohsin Kamal, Babatunji Omoniwa
, Abdul Mateen
:
Differential-Evolution-Earthworm Hybrid Meta-heuristic Optimization Technique for Home Energy Management System in Smart Grid. 15-31 - Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa

:
Performance Analysis of Simulation System Based on Particle Swarm Optimization and Distributed Genetic Algorithm for WMNs Considering Different Distributions of Mesh Clients. 32-45 - Pamir, Nadeem Javaid

, Attiq ullah Khan, Syed Muhammad Mohsin
, Yasir Khan Jadoon, Orooj Nazeer:
A Hybrid Flower-Grey Wolf Optimizer Based Home Energy Management in Smart Grid. 46-59 - Yi Liu, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli:

A Fuzzy-Based Approach for Improving Peer Coordination Quality in MobilePeerDroid Mobile System. 60-73 - Miralda Cuka, Donald Elmazi

, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Contact Duration, Storage and Remaining Energy. 74-85 - Ghazanfar Latif

, Nadeem Javaid
, Aasma Khan, Aisha Fatima, Landing Jatta, Wahab Khan
:
Efficient Routing in Geographic and Opportunistic Routing for Underwater WSNs. 86-95 - Fatos Xhafa, David Zaragoza, Santi Caballé

:
Supporting Online/Offline Collaborative Work with WebRTC Application Migration. 96-104 - Emi Ogawa, Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa
:
One-to-One Routing Protocols for Wireless Ad-Hoc Networks Considering the Electric Energy Consumption. 105-115 - Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

:
Virtual Machine Migration Algorithms to Reduce Electric Energy Consumption of a Server Cluster. 116-127 - Miguel A. Wister

, Pablo Pancardo
, Ivan Rodriguez:
Evaluating Motion and Heart Rate Sensors to Measure Intensity of Physical Activity. 128-138 - Noriki Uchida, Haruki Kuga, Tomoyuki Ishida, Yoshitaka Shibata:

Implementation of WiFi P2P Based DTN Routing and Gateway for Disaster Information Networks. 139-146 - Shoko Takabatake, Tetsuya Shigeyasu:

A New Contents Delivery Network Mixing on Static/Dynamic Heterogeneous DTN Environment. 147-158 - Jongmo Kim, Junsik Kong, DaEun Park, Mye M. Sohn:

Predicate Clustering-Based Entity-Centered Graph Pattern Recognition for Query Extension on the LOD. 159-170 - Shogo Matsuno, Masatoshi Tanaka, Keisuke Yoshida, Kota Akehi, Naoaki Itakura, Tota Mizuno, Kazuyuki Mito:

Discrimination of Eye Blinks and Eye Movements as Features for Image Analysis of the Around Ocular Region for Use as an Input Interface. 171-182 - Noriyasu Yamamoto, Noriki Uchida:

Dynamic Group Formation for an Active Learning System Using Smartphone to Improve Learning Motivation. 183-189 - Kiyotaka Fujisaki:

Evaluation of 13.56 MHz RFID System Considering Communication Distance Between Reader and Tag. 190-200 - Ghazanfar Latif

, Nadeem Javaid
, Arshad Iqbal
, Javed Ahmad, Ather Abdul Jabbar, Muhammad Imran:
An Efficient Routing Protocol via Depth Adjustment and Energy Gradation in Underwater Wireless Sensor Networks. 201-211 - Insu Oh, Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Hyobeom Ahn, Kangbin Yim:

Vulnerability Analysis on the Image-Based Authentication Through the PS/2 Interface. 212-219 - Peng Wei, Liwei Zhang, Qiong Wu, Miaoxin Wang, Jian Li:

A Spacecraft AIT Visualization Control System Based on VR Technology. 220-230 - Sheraz Aslam

, Sakeena Javaid
, Nadeem Javaid
, Syed Muhammad Mohsin
, Saad Sulman Khan, Mariam Akbar:
An Efficient Home Energy Management and Power Trading in Smart Grid. 231-241 - Aqib Jamil, Nadeem Javaid

, Zafar Iqbal, Muhammad Abdullah, Muhammad Zaid Riaz, Mariam Akbar:
Hierarchical Based Coordination Strategy to Efficiently Exchange the Power Among Micro-grids. 242-251 - Muhammad Hassan Rahim, Nadeem Javaid

, Sahar Rahim, Muqaddas Naz, Mariam Akbar, Farhana Javed:
Weighted Cuckoo Search Based Load Balanced Cloud for Green Smart Grids. 252-264 - Ayesha Anjum Butt, Nadeem Javaid

, Sana Mujeeb
, Salman Ahmed, Malik Muhammad Shahid Ali, Waqar Ali
:
Foged Energy Optimization in Smart Homes. 265-275 - Ghulam Hafeez

, Nadeem Javaid
, Safeer Ullah
, Zafar Iqbal, Mahnoor Khan, Aziz Ur Rehman, Zia Ullah
:
Short Term Load Forecasting based on Deep Learning for Smart Grid Applications. 276-288 - Aisha Fatima, Nadeem Javaid

, Momina Waheed
, Tooba Nazar, Shaista Shabbir, Tanzeela Sultana:
Efficient Resource Allocation Model for Residential Buildings in Smart Grid Using Fog and Cloud Computing. 289-298 - Isra Shafi, Nadeem Javaid

, Aqdas Naz, Yasir Amir, Israr Ishaq, Kashif Naseem:
Feature Selection and Extraction Along with Electricity Price Forecasting Using Big Data Analytics. 299-309 - Tatsuya Oyanagi, Tomoyuki Ishida, Noriki Uchida, Yoshitaka Shibata, Hiromasa Habuchi:

Proposal of a Disaster Support Expert System Using Accumulated Empirical Data. 310-319 - Hayato Ito, Tatsuya Ohyanagi, Tomoyuki Ishida, Tatsuhiro Yonekura:

Proposal of a Regional Knowledge Inheritance System Using Location-Based AR and Historical Maps. 320-328 - Ko Takayama, Kaoru Sugita:

QoS Management for Virtual Reality Contents. 329-335 - Wenchuan Yang, Bang Sun, Baojiang Cui:

A Webshell Detection Technology Based on HTTP Traffic Analysis. 336-342 - Jun Yang, Ruiqing Liu, Baojiang Cui:

Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism. 343-353 - Ze Zhang, Guidong Zhang, Yongjun Shen, Yan Zhu:

Intrusion Detection Model Based on GA Dimension Reduction and MEA-Elman Neural Network. 354-365 - Tianhan Gao, Xin Xin:

Location Privacy Protection Scheme Based on Random Encryption Period in VANETs. 366-374 - Haowen Sun, Peng Li, He Xu, Feng Zhu:

An Improvement RFID Security Authentication Protocol Based on Hash Function. 375-384 - Jingling Zhao, Nan Wang, Qian Ma, Zishuai Cheng

:
Classifying Malicious URLs Using Gated Recurrent Neural Networks. 385-394 - Jingsong Shan, Yongjun Zhang, Ming-Xin Jiang, Chunhua Jin, Zhengwei Zhang:

A Fast PQ Hash Code Indexing. 395-402 - Nan Zhao

, Pengfei Fan, Minghu Wu, Xiao He, Menglin Fan, Chao Tian:
Dynamic Incentive Mechanism for Direct Energy Trading. 403-411 - Marwan Kadhim Mohammed Al-shammari

, Tianhan Gao:
Improve Memory for Alzheimer Patient by Employing Mind Wave on Virtual Reality with Deep Learning. 412-419 - Bo Xie, Guidong Zhang, Yongjun Shen, Shun Liu, Yabin Ge:

Fast FFT-Based Inference in 3D Convolutional Neural Networks. 420-431 - Marek R. Ogiela, Lidia Ogiela:

Cognitive Informatics Approaches for Data Sharing and Management in Cloud Computing. 432-437 - Hyunhee Park:

Implementation of Lane Detection Algorithm for Self-driving Vehicles Using Tensor Flow. 438-447 - Hongyu Gan, Chenghao Wu, Jie Xu, Peng Li, He Xu:

Design and Implementation of Cognitive System of Children's Education Based on RFID. 448-455 - Shan Guo, Ying Wang, Sachula Meng, Nan Ma:

Delay Optimization for Mobile Cloud Computing Application Offloading in Smart Cities. 456-466 - Hong Wang, Ying Wang, Ruijin Sun, Runcong Su, Baoling Liu:

Joint User Association and Power Allocation for Minimizing Multi-bitrate Video Transmission Delay in Mobile-Edge Computing Networks. 467-478 - Borja Bordel

, Teresa Iturrioz-Aguirre
, Ramón Alcarria
, Diego Sánchez de Rivera:
Cyber-Physical Sensors and Devices for the Provision of Next-Generation Personalized Services. 479-490 - Toshihiko Yamakami:

Device Stand-by Management of IoT: A Framework for Dealing with Real-World Device Fault in City Platform as a Service. 491-502
The 12th International Workshop on Advances in Information Security (WAIS-2018)
- Kosuke Ozera, Kevin Bylykbashi

, Yi Liu, Leonard Barolli:
A Security-Aware Fuzzy-Based Cluster Head Selection System for VANETs. 505-516 - Jie Ding, He Xu, Peng Li, Feng Zhu:

Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code. 517-526 - Hsing-Chung Chen, Shyi-Shiun Kuo:

DoS Attack Pattern Mining Based on Association Rule Approach for Web Server. 527-536 - Maki Inui, Tetsuya Izu:

Current Status on Elliptic Curve Discrete Logarithm Problem - (Extended Abstract). 537-539 - Eunseon Jeong, Junyoung Park, Byeonggeun Son, Myoungsu Kim, Kangbin Yim:

Study on Signature Verification Process for the Firmware of an Android Platform. 540-545 - Kyungroul Lee, Sun-Young Lee, Kyunghwa Do, Kangbin Yim:

Detecting and Extracting Hidden Information from Stego-Images Based on JPG File on StegoMagic. 546-553
The 8th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2018)
- Vorakit Vorakitphan, Fang-Yie Leu, Yao-Chung Fan

:
Clickbait Detection Based on Word Embedding Models. 557-564 - Sen-Tarng Lai, Fang-Yie Leu:

A Micro Services Quality Measurement Model for Improving the Efficiency and Quality of DevOps. 565-575 - Fang-Yie Leu, Ping-Hung Chou:

A Study on Firewall Services with Edge Computers of vEPC in 5G Networks. 576-584 - Fang-Yie Leu, Cheng-Yan Gu:

The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers. 585-595
The 8th International Workshop on Intelligent Techniques and Algorithms for Ubiquitous Computing (ITAUC-2018)
- Orooj Nazeer, Nadeem Javaid

, Adnan Ahmed Rafique, Sajid Kiani, Yasir Javaid, Zeeshan Khurshid:
Home Energy Management Using Hybrid Meta-heuristic Optimization Technique. 599-609 - Tzu-Liang Kung, Chun-Nan Hung, Yuan-Hsiang Teng:

On the Channel Congestion of the Shortest-Path Routing for Unidirectional Hypercube Networks. 610-619 - Lidan Wang, Ningning Liu, Cheng-Kuan Lin, Tzu-Liang Kung, Yuan-Hsiang Teng:

A Diagnosis Algorithm on the 2D-torus Network. 620-625 - Chun-Nan Hung, Tzu-Liang Kung, En-Cheng Zhang:

Construction Schemes for Edge Fault-Tolerance of Ring Networks. 626-631 - Jingkai Zhu, He Xu:

Review of RFID-Based Indoor Positioning Technology. 632-641 - Shian-Shyong Tseng, Tsung-Yu Yang, Yuh-Jye Wang, Ai-Chin Lu:

Designing a Cybersecurity Board Game Based on Design Thinking Approach. 642-650
The 8th International Workshop on Future Internet and Next Generation Networks (FINGNet-2018)
- Megumi Yamamoto, Shigetomo Kimura

:
A Localization Algorithm Based on Availability of Direct Signal from Neighbor Anchor Nodes in a Sensor Networks. 653-664 - Minjun Ji, Hyunhee Park:

Prediction Model of Optimal Bid Price Based on Keyword Auction Data Through Machine Learning Algorithms. 665-674 - Jaewoong Kang

, Jooyeong Kim, Kunyoung Kim, Mye M. Sohn:
Complex Activity Recognition Using Polyphonic Sound Event Detection. 675-684 - Jiyoung Lim, Inshil Doh, Kijoon Chae:

Dynamic Group Key Management for Efficient Fog Computing. 685-694 - Andrea Fendt, Lars-Christoph Schmelz, Wieslawa Wajda, Simon Lohmüller, Bernhard Bauer:

A Network Slice Resource Allocation Process in 5G Mobile Networks. 695-704
The 7th International Workshop on Frontiers in Innovative Mobile and Internet Services (FIMIS-2018)
- Zunaira Nadeem, Nadeem Javaid

, Asad Waqar Malik
, Abdul Basit Khan, Muhammad Kamran, Rida Hafeez:
An Intelligent Opportunistic Scheduling of Home Appliances for Demand Side Management. 707-718 - Saman Zahoor, Nadeem Javaid

, Adia Khalid, Anila Yasmeen, Zunaira Nadeem:
Fog Computing Based Energy Management System Model for Smart Buildings. 719-727 - Yizhuo Wang, Xuan Xu, Xinyu Wang, He Xu:

A Novel Indoor Navigation System Based on RFID and LBS Technology. 728-737 - Toshihiko Yamakami:

A Social Dimension View Model of Divergence of IoT Standardization. 738-747 - Shogo Nakasaki, Yu Yoshino, Makoto Ikeda, Leonard Barolli:

Design and Implementation of a VANET Testbed: Performance Evaluation Considering DTN Transmission over VANETs. 748-755 - JeeSoo Jurn, Taeeun Kim, Hwankuk Kim

:
A Survey of Automated Root Cause Analysis of Software Vulnerability. 756-761
The 7th International Workshop on Sustainability Management of e-Business and Ubiquitous Commerce Engineering (SMEUCE-2018)
- Chia-Ju Lu, Chiung-Chi Pen, Chiou-Shya Torng:

The Effect of Personal Moral Philosophy on Perceived Moral Intensity in Hotel Industry. 765-770 - Kuei-Yuan Wang, Xiao-Hong Lin, Chien-Kuo Han, Chi-Cheng Lin, Yi-Chi Liao, Tzu-Yun Ting, Ting-Shiuan Fang:

Study on Production and Marketing of Tea: A Company. 771-782 - Xiao-Hong Lin, Kuei-Yuan Wang, Chien-Kuo Han, Yu-Sin Huang, Yi-Chi Liao, Tzu-Yun Ting, Ting-Shiuan Fang:

The Influence of U.S. FED's Interest Rate-Raising Event Announcements on the Abnormal Returns in the Taiwan Stock Market. 783-792 - Yung-Shun Tsai, Shyh-Weir Tzang

, Chih-Hsing Hung, Chun-Ping Chang:
The Relationship Between Dividend, Business Cycle, Institutional Investor and Stock Risk. 793-800 - Shyh-Weir Tzang, Chih-Hsing Hung, Chun-Ping Chang, Yung-Shun Tsai:

Commercial Real Estate Evaluation: The Real Options Approach. 801-807 - Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang

, Yong Zulina Zubairi:
A Dynamic Model of Optimal Share Repurchase. 808-811 - Ying-Li Lin, Yi-Jing Chen:

Direct and Indirect Effects of Job Complexity of Senior Managers on Their Compensation and Operating Performances. 812-821 - Mei Hua Huang, Wen-Shin Huang, Chiung-Yen Chen, An-Chi Kuan:

The Impact of Online Commentary on Young Consumer's Purchase Decision. 822-828 - Wen-Hsin Huang, Suming Lin, Mei-Hua Huang:

Penalty or Benefit? The Effect of Dividend Taxes on Stock Valuation. 829-838 - Ling-Yi Chou, Yi-Yang Li:

The Determinants of Admission Strategy and School Choice: A Case Study of a Private Senior Vocational School in Taiwan. 839-848 - Chiung-Yen Chen, Mei-Hua Huang, Zhen-Xin Xu:

Professional Training and Operational Performance: Considering the Impact of CPA Disciplinary Incidents. 849-861 - Chiung-Yao Huang, Chung-Jen Fu:

Constructing a System for Effective Implementation of Strategic Corporate Social Responsibility. 862-866 - Chien-Wen Lai, Candra Adi Kurnia, Shao-Chun Chiu, Ya-Lan Chan:

Study of the Factors that Influence Brand Loyalty Toward the Use of Tablets in Indonesia. 867-878 - Mei-Hua Liao, Shih-Han Hong, Norihisa Yoshimura:

Five Elements and Stock Market. 879-883 - Mei-Hua Liao, Yi-Jun Guo, Hidekazu Sone:

Asset Structure of Long-Lived Company. 884-887 - Ya-Lan Chan, Sue-Ming Hsu:

An Inventory Policy for Perishable Products with Permissible Delay in Payment. 888-902 - Sue-Ming Hsu, Ya-Lan Chan:

The Research on Lifestyle, Physical and Mental Health, and Potential Consumption for Elderly. 903-909
The 4th International Workshop on Big Data and IoT Security (BDITS-2018)
- Hsing-Chung Chen, Bambang Irawan

, Zon-Yin Shae:
A Cooperative Evaluation Approach Based on Blockchain Technology for IoT Application. 913-921 - Baojiang Cui, Pin Mao:

The Study and Realization of Vulnerability-Oriented Fuzzing Technology for ActiveX Plug-Ins. 922-931 - Jun Yang, Xuyan Song, Yu Xiong, Yu Meng:

An Open Source Software Defect Detection Technique Based on Homology Detection and Pre-identification Vulnerabilitys. 932-940 - Simin Yin, Jingye Sheng, Tong Wang, He Xu:

Analysis on Mobile Payment Security and Its Defense Strategy. 941-946

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














