Barolli, Leonard
Advances on Broad-Band Wireless Computing, Communication and Applications
1. Real Time Pricing Based Appliance Scheduling in Home Energy Management Using Optimization Techniques
Basit Amin, Adia Khalid, Muhammad Azeem Sarwar, Asad Ghaffar, Adnan Satti, Nasir Ayub, Nadeem Javaid
2. Pigeon Inspired Optimization and Bacterial Foraging Optimization for Home Energy Management
Saadia Batool, Adia Khalid, Zunaira Amjad, Hafsa Arshad, Syeda Aimal, Mashab Farooqi, Nadeem Javaid
3. GreyWolf Optimization Technique for HEMS Using Day Ahead Pricing Scheme
Asad Ghafar, Rabiya Khalid, Mudabbir Ali, CH Anwar ul Hassan, Adnan Ishaq, Basit Amin, Nadeem Javaid
4. Efficient Energy Management System Using Firefly and Harmony Search Algorithm
Anwar Ur Rehman, Sheraz Aslam, Zain Ul Abideen, Asma Zahra, Waqar Ali, Muhammad Junaid, Nadeem Javaid
5. Demand Side Management Using Meta-Heuristic Optimization Techniques
Sidra Razzaq, Adia Khalid, Sughra Razzaq, Zain Ul Abideen, Asma Zahra, Mahnoor Khan, Nadeem Javaid
6. Scheduling of Appliances in HEMS Using Elephant Herding Optimization and Harmony Search Algorithm
Komal Parvez, Sheraz Aslam, Arje Saba, Syeda Aimal, Zunaira Amjad, Sikandar Asif, Nadeem Javaid
7. Enhanced Differential Evolution and Crow Search Algorithm Based Home Energy Management in Smart Grid
Pamir, Sakeena Javaid, Ishtiaq Ali, Noreen Mushtaq, Zafar Faiz, Hazrat Abubakar Sadiq, Nadeem Javaid
8. Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Actor-Sensor Coordination Quality Parameter
Donald Elmazi, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli
9. Effect of Storage Size on IoT Device Selection in Opportunistic Networks: A Comparison Study of Two Fuzzy-Based Systems
Miralda Cuka, Donald Elmazi, Tetsuya Oda, Elis Kulla, Makoto Ikeda, Leonard Barolli
10. Performance Evaluation of WMNs by WMN-PSOSA Simulation System Considering Random Inertia Weight Method and Linearly Decreasing Vmax Method
Shinji Sakamoto, Kosuke Ozera, Admir Barolli, Makoto Ikeda, Leonard Barolli, Makoto Takizawa
11. A Fuzzy-Based Approach for Task Accomplishment in MobilePeerDroid Mobile System
Yi Liu, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli
12. A Flexible Synchronization Protocol for Hidden Topics to Prevent Illegal Information Flow in P2PPS Systems
Shigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa
13. A Simple Migration Algorithm of Virtual Machine in a Server Cluster
Ryo Watanabe, Dilawaer Duolikun, Cuiqin Qin, Tomoya Enokido, Makoto Takizawa
14. Energy-Aware Dynamic Migration of Virtual Machines in a Server Cluster
Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
15. A Low-Energy Unicast Ad-Hoc Routing Protocol in Wireless Networks
Emi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
16. An Energy Efficient Load Balancing Algorithm Based on the Active Time of Cores
Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa
17. Development of an Adult Care System Based on Interactions with a Communication Robot
Akihito Yatsuda, Toshiyuki Haramaki, Hiroaki Nishino
18. Development of Unified Model to Increase Coverage Area in 5G Networks Using Femtocells
M. Usman Younus, Rabia Shafi
19. Comparison of Spray and Wait and Epidemic Protocols in Different DTN Scenarios
Kevin Bylykbashi, Evjola Spaho, Leonard Barolli, Makoto Takizawa
20. Interest Re-Route Control According to Degree of Similarity on Cached Contents Using Bloom Filter on NDN
Haruka Watano, Tetsuya Shigeyasu
21. A Mobility Network for Disaster and Emergent Information Systems in Challenged Network Environment
Yoshitaka Shibata, Kenta Ito, Goshi Sato
22. Visual CAPTCHA for Data Understanding and Cognitive Management
Natalia Krzyworzeka, Lidia Ogiela
23. Swarm Intelligence Based Home Energy Management Controller Under Dynamic PricingScheme
Adnan Ahmed, Muhammad Hassan Rahim, Fozia Feroze, Ayesha Zafar, Itrat Fatima, Sheraz Aslam, Nadeem Javaid
24. Home Energy Management System Using Ant Colony Optimization Technique in Microgrid
Itrat Fatima, Adia Khalid, Saman Zahoor, Anila Yasmeen, Shahan Arif, Umara Zafar, Nadeem Javaid
25. An Object Management and Fuzzy Based Location Estimation Method Using Active RFID Tags
Kaiki Ohkoshi, Hiroyuki Suzuki, Akio Koyama
26. Application of Cognitive Cryptography in Fog and Cloud Computing
Marek R. Ogiela, Lidia Ogiela
27. Energy Savings in Power Control for 5G Dense Femtocells
Christos Bouras, Georgios Diles, Theodoros Moulias
28. Classification of Cognitive Service Management Systems in Cloud Computing
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
29. Trust-Based Multi-stakeholder Decision Making in Water Allocation System
Lina Alfantoukh, Yefeng Ruan, Arjan Durresi
30. Modeling and Performance Evaluation of Protocols in Mobile Wireless Sensor Networks
Manel Houimli, Laid Kahloul
31. LTE-LAA and Wi-Fi Physical Layer Performance and Coverage Comparison
Oudomsack Pierre Pasquero, Marie Bot, Marie-Hélène Hamon, Christian Gallard
32. A Hybrid-Distributed Base Station Wake-up Algorithm in Dense Heterogeneous Cellular Networks
Li Da, Zhou Wen’an, Liu Jianlong, Li Bingqian
33. Design of MIMO System with Individual Transmit Power Constraint and Improper Constellation
Raja Muthalagu
34. Implementation of 1:N Communication Model Using Serial Communication in an RF-Based Environment
Yeon-Ju Lee, Jeong-In Kim, Eun-Ji Lee, Tak-Eun Hong, Pan-Koo Kim
35. Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A
MyoungSu Kim, Kyungroul Lee, Kangbin Yim
36. Web Browser Tampering: Inspecting CPU Features from Side-Channel Information
Takamichi Saito, Koki Yasuda, Kazuhisa Tanabe, Kazushi Takahashi
37. Mocov: Model Based Fuzzing Through Coverage Guided Technology
Chen Chen, Zhouguo Chen, Yongle Hao, Baojiang Cui
38. A Security Vulnerability Threat Classification Method
Yuanwei Hou, Xingzhang Ren, Yongle Hao, Tong Mo, Weiping Li
39. A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction
Chong Wang, Jianwei Ding, Tao Guo, Baojiang Cui
40. Embedded System Vulnerability Mining Technology Based on In-memory Fuzzing Test
Baojiang Cui, Xiangqian Zhang, Tianxin Zhang, Qin Zhang
41. Research on UPnP Protocol Security of Gateway Device
Baojiang Cui, Qin Zhang, Xiangqian Zhang, Tao Guo
42. Hinge Classification Algorithm Based on Asynchronous Gradient Descent
Xiaodan Yan, Tianxin Zhang, Baojiang Cui, Jiangdong Deng
43. Digital Communication System with High Security and High Noise Immunity: Security Analysis and Simulation
Ahmed S. Alshammari, Mohamed I. Sobhy, Peter Lee
44. Payload-Based Web Attack Detection Using Deep Neural Network
Xiaohui Jin, Baojiang Cui, Jun Yang, Zishuai Cheng
45. Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning and Brute-Force Attack Defensibility Along with User Convenience Consideration
Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki
46. Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks
Abhishek Kumar, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar, Makoto Takizawa
47. A Comparison of Fuzzy Control Schemes to Enhance Sustainability in Microgrid
Muhammad Shahid Laiq, Sheeraz Ahmed, Zahoor Ali Khan, M. Irfan Khattak, Aatra Sadaf
48. A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT)
Mohammad Dahman Alshehri, Farookh Khadeer Hussain
49. Home Energy Management in Smart Grid Using Bacterial Foraging and Strawberry Algorithm
Noreen Mushtaq, Muhammad Hassan Rahim, Rabiya Khalid, Samia Abid, Pamir, Sajawal ur Rehman Khan, Nadeem Javaid
50. Implementing Critical Peak Pricing in Home Energy Management Using Biography BasedOptimization and Genetic Algorithm inSmart Grid
Khadija Ambreen, Rabiya Khalid, Rubab Maroof, Hasan Nasir Khan, Salma Asif, Hina Iftikhar, Nadeem javaid
51. Home Energy Management Using Fish Swarm Optimization Bacterial Foraging Algorithm and Genetic Algorithm in Smart Grid
Shahab Ali, Samia Abid, Zain Ul Abideen, Saman Zahoor, Itrat Fatima, Zunaira Nadeem, Nadeem Javaid
52. Earth Worm Optimization for Home Energy Management System in Smart Grid
Mudabbir Ali, Samia Abid, Asad Ghafar, Nasir Ayub, Hafsa Arshad, Sajawal Khan, Nadeem Javaid
53. Hybrid Replication Schemes of Processes forFault-Tolerance Systems in Energy-Efficient Server Clusters
Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
54. Coordinate Assignment: Self-outer-Recognition in OpenFlow Mesh
Minoru Uehara
55. A Survey of Optimization Techniques forScheduling in Home Energy Management Systems in Smart Grid
Fozia Feroze, Asif Khan, Nabeeha Qayyum, Sakeena Javaid, Adnan Ahmed, Muhammad Hassan Rahim, Nadeem Javaid
56. The Trends of Integrating Renewable Energy Sources: A Survey
Sardar Mehboob Hussain, Muhammad Hassan Rahim, Zunaira Nadeem, Iqra Fatima, Zafar Iqbal, Sikandar Asif, Nadeem Javaid
57. Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain
Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa
58. Towards a Collaborative Editing System on 3DSpace
Tasuku Takahashi, Kengo Imae, Naohiro Hayashibara
59. Sausage-Style One-Time Authentication Schemes
Yuji Suga
60. Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Gamma Type of Brain Waves
Masafumi Yamada, Miralda Cuka, Yi liu, Kevin Bylykbashi, Keita Matsuo, Leonard Barolli
61. A Fuzzy-Based System for Actor Node inanAmbient Intelligence Testbed: EffectsofDifferent Parameters on Human Sleeping Conditions
Ryoichiro Obukata, Kevin Bylykbashi, Kosuke Ozera, Yi Liu, Shinji Sakamoto, Leonard Barolli
62. A New Space-Time Coding Method Based on OCML
Zhao Chen, Jiang-Yan Wu
63. Experimental Evaluation of a WLAN Triage Testbed Considering Relation of Connection Success Ratio and Connected Time Ratio with User Priority and RSSI Parameters
Kosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Leonard Barolli
64. Circular Microstrip Patch Antenna Design for LTE, ISM, WIMAX, Satellite Communication and in Ultra WideBand Applications
Zain Ul Abedin
65. Optimal Base Station Planning Using Genetic Algorithm for LTE Network
Ouamri Med Amine, Zenadji Cilia, Abdelkrim KHireddine
66. Line of Sight Procedure for Dijkstra-Algorithm Based Ray-Tracing
Kazunori Uchida, Leonard Barolli
67. A Message Suppression Method Considering Priority for Inter-vehicle Communications
Yu Yoshino, Daichi Koga, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli
68. Signal Routing by Dispersive Medium
Hiroshi Maeda, Keisuke Haari, Xiang Zheng Meng, Naoki Higashinaka
69. A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks
Sen-Tarng Lai, Fang-Yie Leu
70. A Light Weight Data Encryption Method for WSN Communication
Kun-Lin Tsai, Fang-Yie Leu, Tung-Hung Su, Yi-Chen Chang
71. Predicting Video Stream Fragments in a Reactive Mode
Chien-Hsiang Kao, Fang-Yie Leu
72. Relay Base-Station Handover in a 5G Environment
Zong-Ying Yang, Fang-Yie Leu
73. Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation
Hua Ma, Enting Dong, Zhenhua Liu, Linchao Zhang
74. Omnidirectional Wheelchair Vision with Small Reflect Mirrors for Tennis Ball Tracking
Keita Matsuo, Leonard Barolli
75. Investigation Using Multi-Agent Simulation Environment for Evacuation Guidance withRobots
Ryuta Sugie, Takahiro Uchiya, Ichi Takumi
76. Design of Reminiscence Therapy System for Elderly People with Dementia
Takahiro Uchiya, Ryota Nishimura, Takahiro Hirano, Masaru Sakurai
77. A Disaster Information Gathering System Design Using Fuzzy Logic
Gaku Tsuchiya, Makoto Ikeda, Donald Elmazi, Leonard Barolli, Elis Kulla
Keywords: Engineering, Communications Engineering, Networks, Computer Communication Networks
- Editor
- Barolli, Leonard
- Conesa, Jordi
- Xhafa, Fatos
- Publisher
- Springer
- Publication year
- 2018
- Language
- en
- Edition
- 1
- Series
- Lecture Notes on Data Engineering and Communications Technologies
- Page amount
- 48 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9783319698113
- Printed ISBN
- 978-3-319-69810-6