Vai al contenuto principale della pagina

Advances on broad-band wireless computing, communication and applications : proceedings of the 17th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2022) / / edited by Leonard Barolli



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Advances on broad-band wireless computing, communication and applications : proceedings of the 17th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2022) / / edited by Leonard Barolli Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2023]
©2023
Descrizione fisica: 1 online resource (419 pages)
Disciplina: 016.22
Soggetto topico: Broadband communication systems
Persona (resp. second.): BarolliLeonard
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Welcome Message of BWCCA-2022 International Conference Organizers -- BWCCA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- International Advisory Committee -- Publicity Co-chairs -- Finance Chair -- Web Administrator Chairs -- Local Organizing Co-chairs -- Steering Committee Chair -- Track Areas -- Next Generation Wireless Networks -- Track Co-chairs -- PC Members -- Cloud and Service Computing -- Track Co-chairs -- PC Members -- Multimedia and Web Applications -- Track Co-chairs -- PC Members -- Security and Privacy -- Track Co-chairs -- PC Members -- Network Protocols and Performance Analysis -- Track Co-chairs -- PC Members -- Intelligent and Cognitive Computing -- Track Co-chairs -- PC Members -- Distributed and Parallel Computing -- Track Co-chairs -- PC Members -- IoT and Smart Environment -- Track Co-chairs -- PC Members -- Database, Data Mining, and Big Data -- Track Co-chairs -- PC Members -- Ubiquitous and Pervasive Computing -- Track Co-chairs -- PC Members -- BWCCA-2022 Reviewers -- BWCCA-2022 Keynote Talks -- Humanics Information Security: How to Go Above and Beyond? -- Multi-objective Methods for Wireless Sensor Network Optimization -- Contents -- A Comparison Study of UNDX and UNDX-m Methods for LDVM and RDVM Router Replacement Methods by WMN-PSODGA Hybrid Intelligent System Considering Stadium Distribution -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Proposed and Implemented WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Performance Comparison of Roulette Wheel and Random Selection Methods by WMN-PSODGA Simulation System Considering Stadium Distribution and LDIWM -- 1 Introduction.
2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Proposed and Implemented WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- A Fuzzy-Based System for Handover in 5G Wireless Networks Considering Different Network Slicing Constraints: Effects of Slice Reliability Parameter on Handover Decision -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 5G Network Slicing -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- A Simulated Annealing Based Simulation System for Optimization of Wild Deer Damage Prevention Devices -- 1 Introduction -- 2 Proposed System -- 2.1 OSM Extraction for DD Placement Candidate Locations -- 2.2 DD Placement Optimization -- 3 Simulation Results -- 4 Conclusions -- References -- Techno-Economic Analysis of Cloud Computing Supported by 5G: A Cloud vs on Premise Based Solutions Comparison -- 1 Introduction -- 2 Proposed Models -- 2.1 Cloud Based Solution -- 2.2 On Premise Based Solution -- 3 Pricing Model -- 3.1 Cloud Based Solution -- 3.2 On Premise Based Solution -- 4 Parameter Selection -- 4.1 Cost Comparison -- 4.2 On Premises Solution Cost Adjustments -- 4.3 Cloud Based Solution Cost Adjustments -- 4.4 Performance Evaluation -- 5 5G and Cloud Computing -- 6 Conclusions and Future Work -- References -- An Integrated Fog-VDTN Architecture for Data Dissemination -- 1 Introduction -- 2 Proposed Architecture -- 3 Simulation System and Scenarios -- 4 Simulation Results -- 5 Conclusions -- References -- Energy-Consumption Evaluation of the Tree-Based Fog Computing (TBFC) Model -- 1 Introduction -- 2 The TBFC Model -- 3 Power Consumption and Computation Models of the TBFC Model -- 4 Evaluation -- 5 Concluding Remarks.
References -- Evaluation of the Information Flow Control in the Fog Computing Model -- 1 Introduction -- 2 System Model -- 2.1 CBAC (Capability-Based Access Control) Model -- 2.2 Information Flow Relations -- 2.3 FC (Fog Computing) Model -- 3 Information Flow Control -- 3.1 Protocols -- 3.2 FC-Based Protocols -- 4 Evaluation -- 5 Concluding Remarks -- References -- A Study of Network Attack Strategy Using AS Topology Map -- 1 Introduction -- 2 Preliminaries -- 2.1 Outline -- 2.2 Adjacency Matrix -- 2.3 Laplacian Matrix -- 3 Proposed Attack Strategy -- 3.1 Topology Map of AS -- 3.2 Attack Strategy -- 4 Example Execution -- 4.1 Preparation (Step-1 Step-3) -- 4.2 Simulation of Tactics and Result (Step-4) -- 4.3 Select of Attack Strategy (Step-5) -- 4.4 Consideration -- 5 Discussion -- 5.1 Feasibility of Proposed Attack Strategy -- 5.2 Effectiveness of Stopped Terminal AS -- 5.3 Appropriate Values of max(A) and R -- 6 Conclusion -- References -- Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Polynomial Approximation of the Mish Function -- 3.2 Accuracy Optimization -- 4 Evaluation -- 4.1 Evaluation Setup -- 4.2 Experimental Results for Classification Accuracy -- 4.3 Experimental Results for Different Networks -- 5 Disucussion -- 5.1 Effective Optimization Method for Activation Functions in CNN -- 5.2 Application of Optimization to Different Networks -- 5.3 Limitations -- 6 Conclusion -- References -- An Attention Mechanism for Visualizing Word Weights in Source Code of PowerShell Samples: Experimental Results and Analysis -- 1 Introduction -- 2 Related Work -- 3 Related Technique -- 3.1 Long Short-Term Memory -- 3.2 Attention Mechanism -- 4 Experimental Method -- 4.1 Outline -- 4.2 Preprocessing.
4.3 Training Phase -- 4.4 Test Phase -- 5 Experimental Model and Evaluation Results -- 5.1 Experimental Model -- 5.2 Dataset -- 5.3 Environment -- 5.4 Evaluation Metrics -- 5.5 Experiment Contents -- 5.6 Result -- 6 Discussion -- 6.1 Important Words -- 6.2 Possibility of Evasion Attack -- 6.3 Research Ethics -- 6.4 Limitations -- 7 Conclusion -- References -- Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Palmprint-Region Estimation Using Hand Shape -- 2.2 Palmprint-Region Estimation Using Interdigital Spaces -- 2.3 Palmprint-Region Estimation Using Skeletal Information -- 3 Proposed Methods -- 3.1 Improvement of Region Quality -- 3.2 Proposed Method 1 -- 3.3 Proposed Method 2 -- 3.4 Proposed Method 3 -- 4 Evaluation -- 4.1 Evaluation Dataset -- 4.2 Evaluation Method -- 4.3 Verification Process -- 4.4 Results -- 4.5 Discussions -- 5 Conclusion -- References -- Real Vehicle-Based Attack Dataset for Security Threat Analysis in a Vehicle -- 1 Introduction -- 2 Related Work -- 3 Method of Generate Attack CAN Dataset Based on Actual Vehicle -- 3.1 Method for Collection CAN Dataset in Vehicle -- 3.2 Vehicle Internal CAN Network Attack Tool -- 3.3 Collection of Attack CAN Data Packet Based on Actual Vehicle -- 4 Evaluation -- 4.1 Result of DoS Attack -- 4.2 Result of Fuzzing Attack -- 4.3 Result of Replay Attack -- 5 Conclusion and Future Work -- References -- Performance Analysis of HARQ in 2-step RACH Procedure Using Markov Chain Model -- 1 Introduction -- 2 2-step RACH Procedure -- 3 Hybrid Automatic Repeat and Request -- 4 Analytical Markov Chain Model -- 5 Simulation -- 6 Conclusion -- References -- A Comparison Study of FC-RDVM with LDVM Router Replacement Methods by WMN-PSOHC Simulation System Considering Weibull Distribution of Mesh Clients -- 1 Introduction.
2 Intelligent Algorithms -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 3 WMN-PSOHC Hybrid Simulation System and FC-RDVM -- 4 Simulation Results -- 5 Conclusions -- References -- A Fuzzy-Based System for Estimation of Landslide Disasters Risk Considering Digital Elevation Model -- 1 Introduction -- 2 Proposed System -- 2.1 LDR Estimation -- 2.2 Danger Area Estimation Based on LDR -- 3 Evaluation Results -- 3.1 LDR Estimation Results -- 3.2 Evaluation Results for Danger Area Estimation Based on LDR -- 4 Conclusions -- References -- Human-Centered Protocols for Secure Data Management in Distributed Systems -- 1 Introduction -- 2 Human-Centered Protocols for Secure Data Management -- 3 Secure Data Management in Distributed Systems -- 4 Conclusions -- References -- Multi-Version Concurrency Control to Reduce the Electric Energy Consumption of Servers -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Multi-Version Timestamp Ordering (MVTO) Algorithm -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Improved EEMVTO (IEEMVTO) Algorithm -- 3.1 Meaningless Methods -- 3.2 IEEMVTO Algorithm -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Study on Increasing Simultaneous Transmissions After Extended RTS/CTS Handshake on Full-duplex Wireless LANs -- 1 Introduction -- 2 Full-duplex Wireless Transmission -- 2.1 Full-duplex Transmission Fassions -- 2.2 Challenges of Full-duplex Wireless Transmission -- 3 Method for Selecting Multiple Nodes for Synchronous Transmission -- 3.1 Transmission Procedure -- 3.2 Selection Algorithm of Candidate Transmitters -- 3.3 Method for Selecting Destination of Synchronous Transmission -- 4 Performance Evaluation.
4.1 Characteristics of Throughput Performance.
Titolo autorizzato: Advances on Broad-Band Wireless Computing, Communication and Applications  Visualizza cluster
ISBN: 9783031200298
9783031200281
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910627279303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems