Vai al contenuto principale della pagina
Autore: | Maglaras Leandros A |
Titolo: | Wireless Internet : 16th EAI International Conference, WiCON 2023, Athens, Greece, December 15-16, 2023, Proceedings |
Pubblicazione: | Cham : , : Springer, , 2024 |
©2024 | |
Edizione: | 1st ed. |
Descrizione fisica: | 1 online resource (230 pages) |
Altri autori: | DouligerisChristos |
Nota di contenuto: | Intro -- Preface -- Organization -- Contents -- Wireless Networks -- Cellular-V2X and VANET(DSRC) Based End-to-End Guidance for Smart Parking -- 1 Introduction -- 2 Related Works -- 3 Analysis and Critical -- 4 Proposal -- 5 Conclusion -- References -- TTWiFi: Time-Triggered WiFi for Mobile Robotics in Human Environments -- 1 Introduction -- 2 The Issue of Packet Loss and Packet Delay -- 3 The TTWiFi Protocol -- 4 Experiments with Mobile Robots -- 4.1 Split Group Movement Pattern -- 4.2 Increasing Distance Pattern -- 5 Discussion -- 6 Conclusions -- References -- Proximity-Driven, Load-Balancing Task Offloading Algorithm for Enhanced Performance in Satellite-Enabled Mist Computing -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 Methodology -- 4.1 Task Orchestration Algorithm Development -- 4.2 Used Metrics -- 4.3 Task Orchestration Algorithms -- 5 Results and Discussion -- 5.1 Simulation Environment -- 5.2 Simulation Results -- 6 Conclusion and Future Work -- References -- AI/ML Systems -- Advanced Digital Services in Health: Global Insights on Security and Privacy Issues -- 1 Introduction -- 2 Digital Health -- 2.1 Artificial Intelligence in Healthcare -- 2.2 Applications of Digital Health in Dynamic Economies -- 2.3 Applications of Digital Health in Developing Nations: The District Health Information System 2 -- 3 Open Issues in Digital Healthcare -- 3.1 Privacy and Security Challenges -- 3.2 Regulatory Framework Challenges -- 4 Conclusion -- References -- ACSIS: Αn Intelligent Medical System for Improving the Pre-hospital Healthcare Process -- 1 Introduction -- 2 Analysis and Design of ACSIS -- 3 Demonstration of Applications' Operation -- 3.1 "Hospitals" Operation in Mobile Application -- 3.2 ACSIS Web Application -- 4 Evaluation -- 4.1 Empirical Results from Cross-Sectional Research -- 4.2 ACSIS Simulation Evaluation. |
4.3 Simulation Evaluation Results -- 5 Discussion and Future Work -- Appendix -- References -- Study of Dimensionality Reduction and Clustering Machine Learning Algorithms for the Analysis of Ship Engine Data -- 1 Introduction -- 2 Application of Machine Learning Algorithms for Dimensionality Reduction and Data Clustering -- 2.1 Dimensionality Reduction Algorithms -- 2.2 Clustering Machine Learning Algorithms -- 3 Performance Analysis -- 3.1 Evaluation of Dimensionality Reduction Algorithms -- 3.2 Evaluation of Clustering Algorithms -- 4 Conclusion -- References -- Supervised Machine Learning Algorithms for the Analysis of Ship Engine Data -- 1 Introduction -- 2 Overview of Supervised Machine Learning Algorithms -- 2.1 The Linear Regression (LR) Algorithm -- 2.2 The Ridge Regression (RR) Algorithm -- 2.3 The Decision Tree (DT) Algorithm -- 2.4 The Ensemble Algorithms -- 3 Performance Analysis -- 4 Conclusion -- References -- Machine Learning and Explainable Artificial Intelligence in Education and Training - Status and Trends -- 1 Introduction -- 2 Artificial Intelligence and Machine Learning -- 2.1 Artificial Intelligence -- 2.2 Machine Learning -- 2.3 Machine Learning in Education -- 3 Definition of XAI -- 3.1 Why Do We Need XAI? -- 3.2 Basic Aspects of XAI -- 3.3 XAI Use Cases -- 4 XAI in Education -- 5 Enhancing Network Management Training with Explainable AI -- 5.1 The Network Management Course Use Case -- 5.2 Proposed Extensions -- 6 Conclusion -- References -- 5G/6G Networks -- Comparative Analysis of Terahertz MAC Protocols for Wireless Data Center -- 1 Introduction -- 2 THz Channel Characteristics and Data Center Environment -- 2.1 Channel Characteristics of THz Band -- 2.2 Data Center Unique Environment -- 2.3 Unique Requirements of THz MAC for Wireless DC -- 3 MAC Protocols Mechanism -- 3.1 ADAPT-1 MAC Mechanism. | |
3.2 ADAPT-3 MAC Mechanism -- 4 Performance Evaluation -- 4.1 Simulation Setup -- 4.2 Performance Metrics -- 4.3 Simulation Results -- 5 Conclusion -- References -- Optimization of Energy Distribution with Demand Response Control in 6G Next Generation Smart Grids -- 1 Introduction -- 2 Energy Based Management Architecture -- 2.1 Architecture Modules -- 2.2 Loads Sizing and Renewable Energy Sources Modeling -- 2.3 Energy Distribution Methodology at the Virtual Power Plant -- 3 Evaluation of Architecture Performance -- 3.1 Availability function -- 3.2 Performance Results -- 4 Conclusion -- Statements and Declarations -- References -- Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Collaborative Cache in 5G+ Edge Computing Environment -- 1 Introduction -- 1.1 Research Background and Significance -- 1.2 Study the Current Situation and Problems -- 1.3 Research Content and Objectives -- 2 System Modeling and Analysis -- 2.1 The Concept and Characteristics of Federated Cooperative Cache -- 2.2 The Principle and Model of Federated Cooperative Cache -- 2.3 The Application Scenarios and Advantages of Federated Collaborative Caching in Intelligent Logistics Services -- 2.4 Features of 5G+ Edge Computing Environment -- 3 Design of Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Cooperative Cache -- 3.1 Data Partition Module -- 3.2 Data Transmission Module -- 3.3 Data Fusion Module -- 3.4 Data Access Module -- 3.5 Data Update Module -- 4 Evaluation of Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Cooperative Cache -- 4.1 The Purpose of Simulation Experiment -- 4.2 Environment and Parameter Setting of Simulation Experiment -- 4.3 The Result and Analysis of Simulation Experiment -- 5 Conclusion and Prospect -- References -- Digital Services. | |
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing -- 1 Introduction -- 2 Background -- 2.1 Extended Reality Metaverse: An Introduction -- 2.2 Extended Reality Metaverse: Applications -- 3 Extended Reality Metaverse Security Analysis -- 4 Extended Reality- Digital Life Security Optimization -- 4.1 Edge Initialization -- 4.2 Proof of Unforgeability -- 5 Conclusion and Outlook -- 5.1 The Metaverse of Extended Reality Education Lacks Top-Level Design, and Digital Twin Colleges and Universities have not Formed a Unified Plan -- 5.2 Avoid the Profit-Oriented and Commercial Development of the Educational Metaverse -- References -- Research on Metaverse Multi-person Linkage Using Mobile Edge Computing Based on Extended Reality Under the Immersive Experience of Zhijiang Peace Culture Memorial Hall -- 1 Introduction -- 1.1 Research Background and Significance -- 1.2 Extended Reality -- 2 Application of Extended Reality Technology in Zhijiang Peace Culture Memorial Hall -- 3 Metaverse Education Integration: Education of Revolutionary History by Multiplayer Linkage -- 4 Technology and Equipment Selection -- 5 Conclusion -- References -- An Ethereum Based e-Voting System -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Functionality -- 3.2 Implementation -- 4 Testing and Evaluation -- 4.1 Test Cases -- 5 Security Analysis -- 5.1 Potential Threats in Voting Principles -- 5.2 Potential Threats and Resistance to Attacks -- 6 Discussion and Conclusion -- References -- Author Index. | |
Titolo autorizzato: | Wireless Internet |
ISBN: | 3-031-58053-2 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910861096503321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |