LEADER 04326nam 22005175 450 001 9910483615603321 005 20230717162647.0 010 $a3-030-22263-2 024 7 $a10.1007/978-3-030-22263-5 035 $a(CKB)4100000008493396 035 $a(DE-He213)978-3-030-22263-5 035 $a(MiAaPQ)EBC5795874 035 $a(PPN)243766459 035 $a(EXLCZ)994100000008493396 100 $a20190618d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Mobile and Internet Services in Ubiquitous Computing $eProceedings of the 13th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2019) /$fedited by Leonard Barolli, Fatos Xhafa, Omar K. Hussain 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XLIX, 916 p. 442 illus., 317 illus. in color.) 225 1 $aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v994 311 $a3-030-22262-4 327 $aModified Algorithm for Enhancing the Performance of Grid Systems in Task Scheduling -- An Innovative Model Based on FCRBM for Load Forecasting in the Smart Grid -- Effects of Sharing Information for Available Routes by Ad-Hoc Communication on a Disaster Stricken Area -- Image Recognition Based Adaptive Array Antenna Controls for Winter Road Surveillance System in Local Mountain Area -- Blockchain-Based Public Auditing Scheme for Shared Data -- Key Technologies of Anomaly Detection Using PCA­-LSTM -- State-based Fuzzing for S1AP -- Examination and Comparison of Countermeasures Against Web Tracking Technologies -- Development of a Cyber Incident Information Crawler -- A LoRaWAN Based Energy Efficient Data Encryption Method -- MIH and CRRM Handover in Trusted or Untrusted Environments -- Using CBR Approach to Enhance Collaborative Design Ability -- Object Detection and Tracking Based on Deep Learning -- Malicious Adware Detection on Android Platform Using Dynamic Random Forest -- Emotion Recognition Scheme via EEG Signal Analysis -- Controlled Quantum Dialogue Based on Logical Qubits -- A Deterministic Multi-item Inventory Model with Limited Warehouse Capacity -- A Survey on Attack Cases Exploiting Computer Architectural Vulnerabilities -- Unintended Certificate Installation into Remote IoT Nodes -- A Study: Fiber Bragg Gratings and its Recent Applications -- Interpretation of Photonic Crystals with Hexagonal Symmetry. 330 $aThis book highlights the latest research findings, methods and techniques, as well as challenges and solutions related to Ubiquitous and Pervasive Computing (UPC). In this regard, it employs both theoretical and practical perspectives, and places special emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC). UPC makes it possible to create a human-oriented computing environment in which computer chips are embedded in everyday objects and interact with the physical world. Through UPC, people can remain online even while underway, thus enjoying nearly permanent access to their preferred services. Though it has a great potential to revolutionize our lives, UPC also poses a number of new research challenges. 410 0$aAdvances in Intelligent Systems and Computing,$x2194-5365 ;$v994 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 676 $a006.3 676 $a621.39167 702 $aBarolli$b Leonard$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXhafa$b Fatos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHussain$b Omar K$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483615603321 996 $aInnovative Mobile and Internet Services in Ubiquitous Computing$92084558 997 $aUNINA