LEADER 12635nam 2200565 450 001 9910682550903321 005 20230729144112.0 010 $a9783031284519$b(electronic bk.) 010 $z9783031284502 024 7 $a10.1007/978-3-031-28451-9 035 $a(MiAaPQ)EBC7214765 035 $a(Au-PeEL)EBL7214765 035 $a(CKB)26270991400041 035 $a(DE-He213)978-3-031-28451-9 035 $a(PPN)269096280 035 $a(EXLCZ)9926270991400041 100 $a20230729d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAdvanced information networking and applications$hVolume 2. $eproceedings of the 37th international conference on advanced information networking and applications (AINA-2023) /$fedited by Leonard Barolli 205 $a1st ed. 2023. 210 1$aCham, Switzerland :$cSpringer Nature Switzerland AG,$d[2023] 210 4$d©2023 215 $a1 online resource (601 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v654 311 08$aPrint version: Barolli, Leonard Advanced Information Networking and Applications Cham : Springer International Publishing AG,c2023 9783031284502 320 $aIncludes bibliographical references and index. 327 $aIntro -- Welcome Message from AINA-2023 Organizers -- Organization -- AINA-2023 Keynote Talks -- Blockchain and IoT Integration: Challenges and Future Directions -- Toward Sustainable, Intelligent, Secure, Fully Programmable, and Multisensory (SENSUOUS) Networks -- Contents -- Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments -- 1 Introduction -- 2 Background -- 2.1 Blockchain -- 2.2 Consensus Mechanisms -- 3 Integration of Consensus Algorithms and Evaluations -- 3.1 Integrations -- 3.2 Evaluation -- 4 Related Work -- 5 Conclusions and Future Work -- References -- Nexus: Proxy Service for the Web of Things -- 1 Introduction -- 2 Background and Related Work -- 3 Design and Architecture -- 3.1 Nexus Architecture -- 3.2 Front-End -- 3.3 Security -- 3.4 IoT Management -- 3.5 Directory -- 3.6 Publication and Subscription -- 4 Evaluation -- 5 Conclusions and Future Work -- References -- ABIDI: A Reference Architecture for Reliable Industrial Internet of Things -- 1 Introduction -- 2 The ABIDI Framework -- 3 A Building Management Use Case -- 4 Key Research Challenges -- 5 Conclusions -- References -- DASA: An Efficient Data Aggregation Algorithm for LoRa Enabled Fog Layer in Smart Agriculture*-4pt -- 1 Introduction -- 2 Related Work -- 3 Proposed Communication Framework -- 4 DASA: Proposed Data Aggregation Algorithm -- 5 Performance Evaluation -- 6 Conclusions and Future Work -- References -- FSET: Fast Structure Embedding Technique for Self-reconfigurable Modular Robotic Systems -- 1 Introduction -- 2 Related Work -- 3 FSET Technique -- 3.1 Recall of SET Algorithm -- 3.2 FSET: Fast SET Algorithm -- 4 Simulation and Results -- 4.1 Execution Time -- 4.2 Iteration Loop -- 4.3 Energy Consumption -- 5 Conclusion and Future Work -- References -- A Blockchain Based Authentication Mechanism for IoT in Agriculture 4.0. 327 $a1 Introduction -- 2 Literature Review -- 2.1 IoT Vulnerabilities and Threats in Agriculture 4.0 -- 2.2 Blockchain Technology -- 2.3 Blockchain Solutions in IoT Agriculture -- 3 Proposed Architecture -- 3.1 Iot Devices -- 3.2 Edge Gateway -- 3.3 Blockchain for Authentication -- 4 Conclusion -- References -- Performance Evaluation of FC-RDVM and LDIWM Router Placement Methods for WMNs by WMN-PSODGA Hybrid Simulation System Considering Load Balancing and Chi-Square Distribution of Mesh Clients -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Description of WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Uncertainty Handling with Type-2 Interval-Valued Fuzzy Logic in IoT Resource Classification -- 1 Introduction -- 2 EXEHDA-RR: Software Architecture -- 3 EXEHDA-RR Proposal Validation -- 4 Related Works -- 5 Conclusions -- References -- An Analysis of Representative Works of Japanese Literature Based on Emotions and Topics -- 1 Introduction -- 2 Analytical Techniques -- 2.1 Heat -- 2.2 TBAT -- 3 Analysis of Literary Works Based on Emotions -- 3.1 Target Literary Works -- 3.2 Emotional Analysis Results -- 4 Analysis of Literary Works Based on Topics -- 5 Conclusion -- References -- Analysis and Comparison of Machine Learning Models for Glucose Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 Forecasting Strategies -- 2.2 Forecasting Models -- 2.3 Walk-Forward Evaluation -- 3 Experiments -- 3.1 Data and Pre-processing -- 3.2 Results -- 4 Conclusions -- References -- On Enhancing Network Slicing Life-Cycle Through an AI-Native Orchestration Architecture -- 1 Introduction -- 2 Related Work -- 3 SFI2 AI-Native Architecture -- 4 Experimental Setup -- 5 Results and Discussion. 327 $a6 Concluding Remarks -- References -- Adaptive Inference on Reconfigurable SmartNICs for Traffic Classification -- 1 Introduction -- 2 Background and Related Work -- 3 Framework -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- eDeepRFID-IPS: Enhanced RFID Indoor Positioning with Deep Learning for Internet of Things -- 1 Introduction -- 2 Related Work -- 3 The proposed eDeepRFID-IPS System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Model for Artificial Conscience to Control Artificial Intelligence -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need to Control AI -- 2.2 Artificial Conscience and Controlling AI -- 2.3 Role of Trust -- 3 Trust Based Artificial Conscience - A Control Module for AI Systems -- 3.1 Trust Engine -- 3.2 Trust Pressure and Trust Sensitivity -- 3.3 Artificial Conscience - Control Module -- 4 Implementation -- 4.1 Data -- 4.2 Experimentation Setup and Results -- 5 Conclusion -- References -- A Vulnerability Risk Assessment Methodology Using Active Learning -- 1 Introduction -- 2 Related Work -- 3 Proposal and Methodology -- 3.1 ML-Based Risk Assessment -- 3.2 The Dataset -- 3.3 The Vulnerability Risk Labels -- 3.4 Labeling Strategy via Active Learning -- 3.5 Learning Strategy -- 4 Results -- 4.1 Experiments -- 4.2 Data Preprocessing and Evaluation Metrics -- 4.3 Discussion of Results -- 5 Conclusion and Future Work -- References -- A Fuzzy Inference and Posture Detection Based Soldering Motion Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Experimental Results -- 4 Conclusions -- References -- An Anomaly Detection System for Intelligent Robot Vision Using LSTM -- 1 Introduction -- 2 Proposed System -- 2.1 Anomaly Detection for Robot Vision -- 2.2 Visualization and Danger Notification for Robot Arm -- 3 Experimental Results -- 4 Conclusions -- References. 327 $aGDLS-FS: Scaling Feature Selection for Intrusion Detection with GRASP-FS and Distributed Local Search -- 1 Introduction -- 2 Background -- 3 Related Works -- 4 The GDLS-FS Architecture -- 5 Proof-of-Concept: Implementation -- 6 Experiments and Results -- 6.1 Neighborhood Structure Microservices -- 6.2 Local Search Microservices -- 7 Conclusion -- References -- Multi-agent Deep Q-Learning Based Navigation -- 1 Introduction -- 2 Related Work -- 3 Preliminary Concepts -- 3.1 Q-Learning -- 3.2 Deep Q-Learning -- 4 Distributed Multi-agent Deep Q-learning Algorithm -- 4.1 Description of the Algorithm -- 5 Implementation and Results -- 6 Conclusion -- References -- Identifying Network Congestion on SDN-Based Data Centers with Supervised Classification*-6pt -- 1 Introduction -- 2 Motivation and Problem Definition -- 2.1 Congestion Control and Avoidance in SDN Data Centers -- 2.2 Related Work -- 3 Design and Implementation -- 3.1 Data Monitoring and Adjustments -- 3.2 Generating Classification Labels and Training the Models -- 4 Experimental Analysis -- 4.1 Metrics and Scenarios -- 4.2 Control Traffic -- 4.3 Results and Discussions -- 5 Conclusion -- References -- Detection of Malicious Sites Using Graph Machine Learning -- 1 Introduction -- 2 Preliminaries -- 3 Related Works -- 4 Our Proposal -- 5 Results and Discussions -- 6 Conclusion and Future Works -- References -- Bonet Detection Mechanism Using Graph Neural Network -- 1 Introduction -- 2 Background and Related Work -- 2.1 Activity and Event Network Model -- 2.2 Related Work -- 3 Proposed Graph Network Model -- 4 Experiments and Results -- 4.1 Datasets -- 4.2 Performance Metrics -- 4.3 Considered Scenarios and Results -- 5 Conclusion -- References -- Object Placement Algorithm with Information Flow Control in Fog Computing Model -- 1 Introduction -- 2 System Model. 327 $a2.1 CBAC (Capability-Based Access Control) Model -- 2.2 FC (Fog Computing) Model -- 2.3 Information Flow Relations -- 3 Object Placement Algorithm -- 4 Information Flow Control in the FC Model -- 5 Concluding Remarks -- References -- An Energy-Aware Algorithm for Changing Tree Structure and Process Migration in the Flexible Tree-Based Fog Computing Model -- 1 Introduction -- 2 The TBFC Model -- 2.1 Tree Structure of Nodes -- 2.2 Power Consumption and Computation Models -- 3 The FTBFC Model -- 3.1 Operations on the FTBFC Model -- 3.2 Flexible Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- SANKMO: An Approach for Ingestion, Processing, Storing, and Sharing IoT Data in Near Real-Time -- 1 Introduction -- 2 Related Work -- 3 SANKMO -- 3.1 Architectural Vision -- 3.2 Implementation View -- 4 Results and Discussion -- 4.1 Experimental Evaluation -- 4.2 Production Layer -- 4.3 Data Transformation -- 4.4 Discussion -- 5 Concluding Remarks -- References -- A Polystore Proposed Environment Supported by an Edge-Fog Infrastructure -- 1 Introduction -- 2 Related Work -- 3 Proposed Environment -- 3.1 Development -- 3.2 Experimental Environment -- 4 Conclusion and Future Work -- References -- OASL: SPARQL Query Language for OpenAPI Ontologies -- 1 Introduction -- 2 Related Work and Background -- 3 OpenAPI Ontology -- 4 The OASL Query Language -- 5 Query Translation -- 6 Evaluation -- 6.1 Query Translation Overhead -- 6.2 Lack of Resulting Query Optimization -- 6.3 Schema Information Duplication Overhead -- 7 Conclusions and Future Work -- References -- Orchestrating Fog Computing Resources Based on the Multi-dimensional Multiple Knapsacks Problem -- 1 Introduction -- 2 Review Work -- 3 Multi-dimensional Multiple Knapsack Problem -- 4 Proposed Method -- 4.1 Problem Formulation -- 5 Simulation and Evaluation -- 5.1 Background -- 5.2 Results. 327 $a6 Conclusions. 330 $aNetworks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems. The aim of the volume ?Advanced Information Networking and Applications? is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v654 606 $aComputer networks$vCongresses 606 $aInformation networks$vCongresses 615 0$aComputer networks 615 0$aInformation networks 676 $a004.6 702 $aBarolli$b Leonard 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910682550903321 996 $aAdvanced Information Networking and Applications$92073388 997 $aUNINA LEADER 01817oam 2200529 450 001 9910715970103321 005 20210402140027.0 035 $a(CKB)5470000002516392 035 $a(OCoLC)760927075 035 $a(EXLCZ)995470000002516392 100 $a20111114j196808 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCalibration of 30° included-angle cone for determining local flow conditions in Mach number range of 1.51 to 3.51 /$fWalter A. Vahl and Robert L. Weirich 210 1$aWashington, D.C. :$cNational Aeronautics and Space Administration,$dAugust 1968. 215 $a1 online resource (39 pages) $cillustrations 225 1 $aNASA/TN ;$vD-4679 300 $a"August 1968." 320 $aIncludes bibliographical references (page 11). 606 $aBase flow$2nasat 606 $aSupersonic transports$2nasat 606 $aBase flow (Aerodynamics)$2fast 606 $aCone$xAerodynamics$2fast 606 $aMach number$2fast 606 $aSupersonic transport planes$2fast 615 7$aBase flow. 615 7$aSupersonic transports. 615 7$aBase flow (Aerodynamics) 615 7$aCone$xAerodynamics. 615 7$aMach number. 615 7$aSupersonic transport planes. 700 $aVahl$b Walter A.$01410462 702 $aWeirich$b Robert L. 712 02$aUnited States.$bNational Aeronautics and Space Administration, 801 0$bOCLCE 801 1$bOCLCE 801 2$bOCLCQ 801 2$bOCLCF 801 2$bOCLCQ 801 2$bGPO 906 $aBOOK 912 $a9910715970103321 996 $aCalibration of 30° included-angle cone for determining local flow conditions in Mach number range of 1.51 to 3.51$93499148 997 $aUNINA