|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910682550903321 |
|
|
Titolo |
Advanced information networking and applications . Volume 2. : proceedings of the 37th international conference on advanced information networking and applications (AINA-2023) / / edited by Leonard Barolli |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
|
©2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9783031284519 |
9783031284502 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (601 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems, , 2367-3389 ; ; 654 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Information networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Welcome Message from AINA-2023 Organizers -- Organization -- AINA-2023 Keynote Talks -- Blockchain and IoT Integration: Challenges and Future Directions -- Toward Sustainable, Intelligent, Secure, Fully Programmable, and Multisensory (SENSUOUS) Networks -- Contents -- Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments -- 1 Introduction -- 2 Background -- 2.1 Blockchain -- 2.2 Consensus Mechanisms -- 3 Integration of Consensus Algorithms and Evaluations -- 3.1 Integrations -- 3.2 Evaluation -- 4 Related Work -- 5 Conclusions and Future Work -- References -- Nexus: Proxy Service for the Web of Things -- 1 Introduction -- 2 Background and Related Work -- 3 Design and Architecture -- 3.1 Nexus Architecture -- 3.2 Front-End -- 3.3 Security -- 3.4 IoT Management -- 3.5 Directory -- 3.6 Publication and Subscription -- 4 Evaluation -- 5 Conclusions and Future Work -- References -- ABIDI: A Reference Architecture for Reliable Industrial Internet of Things -- 1 Introduction -- 2 The ABIDI Framework -- 3 A Building Management Use Case -- 4 Key Research Challenges -- 5 Conclusions -- References -- DASA: An Efficient Data Aggregation |
|
|
|
|
|
|
|
|
|
Algorithm for LoRa Enabled Fog Layer in Smart Agriculture*-4pt -- 1 Introduction -- 2 Related Work -- 3 Proposed Communication Framework -- 4 DASA: Proposed Data Aggregation Algorithm -- 5 Performance Evaluation -- 6 Conclusions and Future Work -- References -- FSET: Fast Structure Embedding Technique for Self-reconfigurable Modular Robotic Systems -- 1 Introduction -- 2 Related Work -- 3 FSET Technique -- 3.1 Recall of SET Algorithm -- 3.2 FSET: Fast SET Algorithm -- 4 Simulation and Results -- 4.1 Execution Time -- 4.2 Iteration Loop -- 4.3 Energy Consumption -- 5 Conclusion and Future Work -- References -- A Blockchain Based Authentication Mechanism for IoT in Agriculture 4.0. |
1 Introduction -- 2 Literature Review -- 2.1 IoT Vulnerabilities and Threats in Agriculture 4.0 -- 2.2 Blockchain Technology -- 2.3 Blockchain Solutions in IoT Agriculture -- 3 Proposed Architecture -- 3.1 Iot Devices -- 3.2 Edge Gateway -- 3.3 Blockchain for Authentication -- 4 Conclusion -- References -- Performance Evaluation of FC-RDVM and LDIWM Router Placement Methods for WMNs by WMN-PSODGA Hybrid Simulation System Considering Load Balancing and Chi-Square Distribution of Mesh Clients -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Description of WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Uncertainty Handling with Type-2 Interval-Valued Fuzzy Logic in IoT Resource Classification -- 1 Introduction -- 2 EXEHDA-RR: Software Architecture -- 3 EXEHDA-RR Proposal Validation -- 4 Related Works -- 5 Conclusions -- References -- An Analysis of Representative Works of Japanese Literature Based on Emotions and Topics -- 1 Introduction -- 2 Analytical Techniques -- 2.1 Heat -- 2.2 TBAT -- 3 Analysis of Literary Works Based on Emotions -- 3.1 Target Literary Works -- 3.2 Emotional Analysis Results -- 4 Analysis of Literary Works Based on Topics -- 5 Conclusion -- References -- Analysis and Comparison of Machine Learning Models for Glucose Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 Forecasting Strategies -- 2.2 Forecasting Models -- 2.3 Walk-Forward Evaluation -- 3 Experiments -- 3.1 Data and Pre-processing -- 3.2 Results -- 4 Conclusions -- References -- On Enhancing Network Slicing Life-Cycle Through an AI-Native Orchestration Architecture -- 1 Introduction -- 2 Related Work -- 3 SFI2 AI-Native Architecture -- 4 Experimental Setup -- 5 Results and Discussion. |
6 Concluding Remarks -- References -- Adaptive Inference on Reconfigurable SmartNICs for Traffic Classification -- 1 Introduction -- 2 Background and Related Work -- 3 Framework -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- eDeepRFID-IPS: Enhanced RFID Indoor Positioning with Deep Learning for Internet of Things -- 1 Introduction -- 2 Related Work -- 3 The proposed eDeepRFID-IPS System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Model for Artificial Conscience to Control Artificial Intelligence -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need to Control AI -- 2.2 Artificial Conscience and Controlling AI -- 2.3 Role of Trust -- 3 Trust Based Artificial Conscience - A Control Module for AI Systems -- 3.1 Trust Engine -- 3.2 Trust Pressure and Trust Sensitivity -- 3.3 Artificial Conscience - Control Module -- 4 Implementation -- 4.1 Data -- 4.2 Experimentation Setup and Results -- 5 Conclusion -- References -- A Vulnerability Risk Assessment Methodology Using Active Learning -- 1 Introduction -- 2 Related Work -- 3 Proposal and Methodology -- 3.1 ML-Based Risk Assessment -- 3.2 The Dataset -- 3.3 The Vulnerability Risk Labels -- 3.4 Labeling Strategy via Active |
|
|
|
|
|
|
|
Learning -- 3.5 Learning Strategy -- 4 Results -- 4.1 Experiments -- 4.2 Data Preprocessing and Evaluation Metrics -- 4.3 Discussion of Results -- 5 Conclusion and Future Work -- References -- A Fuzzy Inference and Posture Detection Based Soldering Motion Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Experimental Results -- 4 Conclusions -- References -- An Anomaly Detection System for Intelligent Robot Vision Using LSTM -- 1 Introduction -- 2 Proposed System -- 2.1 Anomaly Detection for Robot Vision -- 2.2 Visualization and Danger Notification for Robot Arm -- 3 Experimental Results -- 4 Conclusions -- References. |
GDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 The GDLS-FS Architecture -- 5 Proof-of-Concept: Implementation -- 6 Experiments and Results -- 6.1 Neighborhood Structure Microservices -- 6.2 Local Search Microservices -- 7 Conclusion -- References -- Multi-agent Deep Q-Learning Based Navigation -- 1 Introduction -- 2 Related Work -- 3 Preliminary Concepts -- 3.1 Q-Learning -- 3.2 Deep Q-Learning -- 4 Distributed Multi-agent Deep Q-learning Algorithm -- 4.1 Description of the Algorithm -- 5 Implementation and Results -- 6 Conclusion -- References -- Identifying Network Congestion on SDN-Based Data Centers with Supervised Classification*-6pt -- 1 Introduction -- 2 Motivation and Problem Definition -- 2.1 Congestion Control and Avoidance in SDN Data Centers -- 2.2 Related Work -- 3 Design and Implementation -- 3.1 Data Monitoring and Adjustments -- 3.2 Generating Classification Labels and Training the Models -- 4 Experimental Analysis -- 4.1 Metrics and Scenarios -- 4.2 Control Traffic -- 4.3 Results and Discussions -- 5 Conclusion -- References -- Detection of Malicious Sites Using Graph Machine Learning -- 1 Introduction -- 2 Preliminaries -- 3 Related Works -- 4 Our Proposal -- 5 Results and Discussions -- 6 Conclusion and Future Works -- References -- Bonet Detection Mechanism Using Graph Neural Network -- 1 Introduction -- 2 Background and Related Work -- 2.1 Activity and Event Network Model -- 2.2 Related Work -- 3 Proposed Graph Network Model -- 4 Experiments and Results -- 4.1 Datasets -- 4.2 Performance Metrics -- 4.3 Considered Scenarios and Results -- 5 Conclusion -- References -- Object Placement Algorithm with Information Flow Control in Fog Computing Model -- 1 Introduction -- 2 System Model. |
2.1 CBAC (Capability-Based Access Control) Model -- 2.2 FC (Fog Computing) Model -- 2.3 Information Flow Relations -- 3 Object Placement Algorithm -- 4 Information Flow Control in the FC Model -- 5 Concluding Remarks -- References -- An Energy-Aware Algorithm for Changing Tree Structure and Process Migration in the Flexible Tree-Based Fog Computing Model -- 1 Introduction -- 2 The TBFC Model -- 2.1 Tree Structure of Nodes -- 2.2 Power Consumption and Computation Models -- 3 The FTBFC Model -- 3.1 Operations on the FTBFC Model -- 3.2 Flexible Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- SANKMO: An Approach for Ingestion, Processing, Storing, and Sharing IoT Data in Near Real-Time -- 1 Introduction -- 2 Related Work -- 3 SANKMO -- 3.1 Architectural Vision -- 3.2 Implementation View -- 4 Results and Discussion -- 4.1 Experimental Evaluation -- 4.2 Production Layer -- 4.3 Data Transformation -- 4.4 Discussion -- 5 Concluding Remarks -- References -- A Polystore Proposed Environment Supported by an Edge-Fog Infrastructure -- 1 Introduction -- 2 Related Work -- 3 Proposed Environment -- 3.1 Development -- 3.2 Experimental Environment -- 4 Conclusion and Future Work -- References -- OASL: |
|
|
|
|
|
|
|
|
|
SPARQL Query Language for OpenAPI Ontologies -- 1 Introduction -- 2 Related Work and Background -- 3 OpenAPI Ontology -- 4 The OASL Query Language -- 5 Query Translation -- 6 Evaluation -- 6.1 Query Translation Overhead -- 6.2 Lack of Resulting Query Optimization -- 6.3 Schema Information Duplication Overhead -- 7 Conclusions and Future Work -- References -- Orchestrating Fog Computing Resources Based on the Multi-dimensional Multiple Knapsacks Problem -- 1 Introduction -- 2 Review Work -- 3 Multi-dimensional Multiple Knapsack Problem -- 4 Proposed Method -- 4.1 Problem Formulation -- 5 Simulation and Evaluation -- 5.1 Background -- 5.2 Results. |
6 Conclusions. |
|
|
|
|
|
|
Sommario/riassunto |
|
Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems. The aim of the volume “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. |
|
|
|
|
|
|
|
| |