| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910523784103321 |
|
|
Titolo |
Advances on Broad-Band Wireless Computing, Communication and Applications : Proceedings of the 16th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2021) / / edited by Leonard Barolli |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (365 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 346 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Computational intelligence |
Communications Engineering, Networks |
Computational Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Welcome Message of BWCCA-2021 International Conference Organizers -- BWCCA-2021 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- Finance Chair -- Web Administrator Chairs -- Local Organizing Co-chairs -- Steering Committee Chair -- Track Areas -- 1. Next Generation Wireless Networks -- Track Co-chairs -- PC Members -- 2. Cloud and Service Computing -- Track Co-chairs -- PC Members -- 3. Multimedia and Web Applications -- Track Co-chairs -- PC Members -- 4. Security and Privacy -- Track Co-chairs -- PC Members -- 5. Network Protocols and Performance Analysis -- Track Co-chairs -- PC Members -- 6. Intelligent and Cognitive Computing -- Track Co-chairs -- PC Members -- 7. Distributed and Parallel Computing -- Track Co-chairs -- PC Members -- 8. IoT and Smart Environment -- Track Co-chairs -- PC Members -- 9. Database, Data Mining, and Big Data -- Track Co-chairs -- PC Members -- 10. Ubiquitous and Pervasive Computing -- Track Co-chairs -- PC Members -- BWCCA-2021 Reviewers -- BWCCA-2021 Keynote Talks -- Developing Trustworthy Artificial Intelligencs -- Pandemic Prevention |
|
|
|
|
|
|
|
|
|
by Technology - The Contactless Healthcare via The IoT Platform -- Contents -- A Comparison Study of Chi-square and Uniform Distributions of Mesh Clients by WMN-PSODGA Simulation System for RIWM and LDIWM Router Replacement Methods -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Proposed and Implemented WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Number of Mesh Routers and Chi-Square Distribution of Mesh Clients -- 1 Introduction. |
2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- An Energy-Efficient Algorithm to Make Virtual Machines Migrate in a Server Cluster -- 1 Introduction -- 2 System Model -- 3 A Modified MI (MMI) Estimation Algorithm -- 4 A Migration Algorithm of Virtual Machines -- 5 Evaluation -- 6 Concluding Remarks -- References -- Evaluation of Focused Beam Routing Protocol for Different Applications of Underwater Sensor Networks -- 1 Introduction -- 2 Focused Beam Routing -- 3 Implementation of FBR in the ONE Simulator -- 4 Underwater Applications -- 5 Simulations -- 6 Conclusions and Future Works -- References -- Performance Evaluation of V2X Communication for Road State Information Platform Based on 5G and HighSpeed LAN -- 1 Introduction -- 2 Related Works -- 3 System Configuration -- 4 Cognitive Wireless Network -- 4.1 920 MHz Band LPWA -- 4.2 2.4 GHz Band WLAN -- 4.3 5.6 GHz Band WLAN -- 4.4 28 GHz Band 5G -- 5 Prototype and Performance Evaluation -- 5.1 Performance Results by Highspeed LAN -- 5.2 Performance Results by 5G -- 6 Conclusion -- References -- An Energy-Efficient Process Replication by Differentiating Starting Time of Process Replicas in Virtual Machine Environments -- 1 Introduction -- 2 System Model -- 2.1 A Server Cluster System with Virtual Machines -- 2.2 Computation Model -- 2.3 Power Consumption Model -- 3 Process Replication -- 3.1 The RATB Algorithm -- 3.2 The RATB-DSTPR Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- Traffic Reduction for Information Flow Control in the IoT -- 1 Introduction -- 2 System Model -- 3 Information Flow Control -- 3.1 Protocols -- 3.2 MRCTSD (Minimum Required Capability Token Selection for Devices) Algorithm. |
3.3 MRCTSS (MRCTS for Subjects) Algorithm -- 4 Experiments -- 4.1 Implementation -- 4.2 Evaluation -- 5 Concluding Remarks -- References -- A Simulation System for Mesh Router Placement in WMNs Considering Coverage Construction Method and Simulated Annealing -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed Method -- 3.1 CCM for Mesh Router Placement Optimization -- 3.2 CCM-based SA for Mesh Router Placement Optimization -- 4 Simulation Results -- 5 Conclusions -- References -- On the Latency of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant Networks -- 1 Introduction -- 2 Related Work -- 2.1 Message Ferry in DTNs and WSNs -- 2.2 Movement Models -- 2.3 Routing Protocols for DTNs -- 3 System Model -- 4 Nomadic Lévy Walk -- 4.1 Sink Relocation Strategy -- 5 Performance Evaluation -- 5.1 Environment -- 5.2 Parameters -- 5.3 Simulation Result -- 6 Conclusion -- References -- A Machine Learning Based Network Intrusion Detection System with Applying Different Algorithm in Multiple Stages -- 1 Introduction -- 2 Related Work -- 2.1 Overview -- 2.2 Methods to Improve Performance -- 2.3 Detection Flow -- 2.4 Evaluation Way and Results |
|
|
|
|
|
|
|
-- 3 Verification Method -- 3.1 Outline -- 3.2 Datasets -- 3.3 Pre-verification of Machine Learning Algorithms -- 3.4 Comparison Contents -- 3.5 Data Preprocessing -- 3.6 Evaluation Metrics -- 3.7 Verification Results -- 4 Conclusions -- References -- In-vehicle Network IDS Using Message Time Interval Infrastructure -- 1 Introduction -- 2 Controller Area Network -- 2.1 Structure of CAN Frame -- 2.2 CAN Network Vulnerability -- 3 Propose Instruction Detection System -- 3.1 Attack Scenario -- 3.2 Data Collection -- 3.3 CAN Network Simulation Test Framework -- 3.4 Development of Tools for CAN Network Attack -- 3.5 Message Time Interval -- 4 Experiments -- 5 Conclusions and Future Work -- References. |
A Fuzzy-Based System for Assessment of Quality of Service Communication Links in SDN-VANETs -- 1 Introduction -- 2 Cloud-Fog-Edge SDN-VANETs -- 3 Proposed Fuzzy-Based System -- 4 Simulation Results -- 5 Conclusions -- References -- Malware Classification Based on Graph Neural Network Using Control Flow Graph -- 1 Introduction -- 2 System Overview -- 2.1 Control Flow Graph Formulation -- 2.2 Node Feature Based on TF-IDF -- 2.3 Classification Model -- 3 Experiment -- 3.1 Dataset -- 3.2 Experiment Design -- 3.3 Evaluation -- 3.4 Results -- 4 Conclusions -- References -- Hand Gesture Input Interface of IntelligentBox Using Leap Motion Controller and Its Application Example -- 1 Introduction -- 2 Related Work -- 2.1 Essential Mechanism of IntelligentBox -- 2.2 Leap Motion Controller -- 3 Hand Gesture Input Interface of IntelligentBox Using Leap Motion Controller -- 3.1 Implementation of the Input Interface -- 3.2 Demonstration -- 4 Discussion -- 4.1 Misrecognition of Leap Motion Controller -- 4.2 Recognition Accuracy of Leap Motion Controller -- 5 Conclusion -- References -- Toward Automated Audit of Client-Side Vulnerability Against Cross-Site Scripting -- 1 Introduction -- 2 Cross Site Scripting (XSS) -- 2.1 Types -- 2.2 Browser Exploitation Framework (BeEF) -- 3 Related Work -- 3.1 Automation of Penetration Testing -- 3.2 Detection Methods of XSS Vulnerabilities -- 4 Proposed Method -- 4.1 Outline -- 4.2 Selecting Modules -- 4.3 Obtaining Results -- 4.4 Algorithm -- 5 Evaluation -- 6 Discussion -- 7 Conclusion -- References -- Single Sign-On Using Contactless Smart Cards and Fingerprint Authentication -- 1 Introduction -- 2 Literature Review -- 3 Smart Card Technologies -- 4 Single Sign-On Using Smartcards and Fingerprint Authentication -- 4.1 Database -- 4.2 Security -- 4.3 Components -- 4.4 Limitations of the Proposed Model -- 5 Application Overview. |
6 Conclusion and Future Work -- References -- Blockchain-Based Identity Management for Personal Data: A Survey -- 1 Introduction -- 2 Blockchain-Based Identity Management -- 2.1 Privacy of Personal Data in Decentralised Blockchain Systems -- 3 Research Methods -- 3.1 Locating Studies -- 3.2 Study Selection and Evaluation -- 3.3 Analysis and Synthesis -- 4 Analysis -- 4.1 Blockchain-Based Identity Management -- 4.2 Decentralisation of Blockchain -- 4.3 Privacy of Personal Data in Decentralised Blockchain Systems -- 5 Conclusion -- References -- Effects of Buffer Management Considering Time Continuity on Disaster Information on DTN Based Information Sharing System -- 1 Introduction -- 2 DTN -- 2.1 Information Sharing on DTN -- 2.2 Problem of Information Sharing on DTN -- 3 Buffer Management Considering Time Continuity of Disaster Information -- 3.1 Buffer Management Method Considering Time Continuity -- 4 Performance Evaluation -- 4.1 Evaluation Settings -- 4.2 Evaluation Results -- 5 Conclusion -- References -- Fusion Techniques for Strong Data Protection -- 1 Introduction -- 2 The Main Idea of Fusion Technology -- 3 Strong Data Protection Using Fuzion Techniques -- 4 Conclusions |
|
|
|
|
|
|
|
|
|
-- References -- Predictive Intelligence Approaches for Security Technologies -- 1 Introduction -- 2 Security of Human-Oriented Systems -- 3 Predictive Analysis in Transformative Computing Systems -- 4 Conclusions -- References -- Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure -- 1 Introduction -- 2 Importance of Software Project Progress Monitoring -- 2.1 Burndown Chart to Monitor Project Progress -- 2.2 Advantages and Disadvantages of Burndown Chart -- 3 Situations and Checklist of Progress Delay -- 4 Quantified Measurement Model and Improvement Manner -- 4.1 Quantified Measurement Model of Problem Identification. |
4.2 Rule-Based Improvement Manner of Delay Problem. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book states that information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the network resources. The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the book is to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of broad-band and wireless computing. |
|
|
|
|
|
|
|
| |