top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Intelligent Networking and Collaborative Systems : The 13th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2021)
Advances in Intelligent Networking and Collaborative Systems : The 13th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2021)
Autore Barolli Leonard
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (351 pages)
Altri autori (Persone) ChenHsing-Chung
MiwaHiroyoshi
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-84910-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from the INCoS-2021 Organizing Committee -- INCoS-2021 Organizing Committee -- Honorary Chairs -- General Co-chairs -- Programme Co-chairs -- International Advisory Committee -- International Liaison Co-chairs -- Award Co-chairs -- Web Administrator Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Steering Committee Chair -- Track Areas and PC Members -- Track 1: Data Mining, Machine Learning and Collective Intelligence -- Track Co-chairs -- TPC Members -- Track 2: Intelligent Systems and Knowledge Management -- Track Co-chairs -- TPC Members -- Track 3: Wireless and Sensor Systems for Intelligent Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 4: Service-Based Systems -- Track Co-chairs -- TPC Members -- Track 5: Networking Security and Privacy -- Track Co-chairs -- TPC Members -- Track 6: Big Data Analytics for Learning, Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 7: Cloud Computing: Services, Storage, Security and Privacy -- Track Co-chairs -- TPC Members -- Track 8: Social Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 9: Intelligent and Collaborative Systems for e-Health -- Track Co-chairs -- TPC Members -- Track 10: Big Data Analytics for Learning, Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- INCoS-2021 Reviewers -- INCoS-2021 Keynotes -- Big Data Management for Data Streams -- Convergence of Broadcast and Broadband in 5G Era -- Contents -- Performance Comparison of CM and LDVM Router Replacement Methods for WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Velocities and Positions of Particles -- 2.2 Routers Replacement Methods -- 2.3 DGA Operations.
2.4 Fitness and Migration Functions -- 2.5 Particle-Pattern and Gene Coding -- 3 Simulation Results -- 4 Conclusions -- References -- Effects of Augmented Reality Markers for Networked Robot Navigation -- 1 Introduction -- 2 Welfare Robot Navigation System -- 3 Experiments on Planar AR Markers -- 3.1 Geometrical Measurement -- 3.2 Identification Accuracy in Terms of Markers' Feature Points -- 4 Conclusion -- References -- Algorithm Based on Local Search Method for Examination Proctors Assignment Problem Considering Various Constraints -- 1 Introduction -- 2 Previous Research -- 3 Examination Proctors Assignment Problem -- 4 Local Search Algorithm -- 5 Performance Evaluation -- 6 Conclusion -- References -- Bio-inspired VM Introspection for Securing Collaboration Platforms -- 1 Introduction -- 2 Security and Privacy in Collaboration Platforms -- 3 Artificial Immune System Based Intrusion Detection -- 3.1 Negative Selection Algorithm -- 4 Proposed Security Approach -- 5 Experimental Evaluation -- 6 Conclusions -- References -- Artificial Intelligence-Based Early Prediction Techniques in Agri-Tech Domain -- 1 Introduction -- 2 Research Objectives -- 3 A Case of Study: Early Warning Prediction of Mastitis -- 4 Conclusions -- References -- Automatic Measurement of Acquisition for COVID-19 Related Information -- 1 Introduction -- 2 CORD-19 -- 3 CORD-19 Applications -- 4 NLP Pipeline in Python -- 5 Conclusions -- References -- Algorithms for Mastering Board Game Nanahoshi Considering Deep Neural Networks -- 1 Introduction -- 2 Previous Research -- 3 Game AI for Nanahoshi Using Game Tree Search -- 3.1 Game Tree Search -- 3.2 Monte Carlo Tree Search -- 4 Game Tree Search Using Deep Learning -- 4.1 Basic Idea of Game Tree Search Using Deep Learning -- 4.2 Monte Carlo Tree Search Using Deep Learning -- 5 Performance Evaluation -- 6 Conclusion -- References.
Revealing COVID-19 Data by Data Mining and Visualization -- 1 Introduction -- 2 Related Works -- 3 Our Data Science Solution -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Mining and Visualization -- 4 Evaluation -- 5 Conclusions -- References -- An Approach to Enhance Academic Ranking Prediction with Augmented Social Perception Data -- 1 Introduction -- 2 Related Work -- 3 Data and Methodology -- 3.1 Data Collection -- 3.2 Data Preparation -- 4 Results -- 4.1 Exploratory Data Analysis -- 4.2 Correlation Analysis -- 4.3 Predictive Model -- 5 Discussion -- 6 Conclusion -- References -- A Fuzzy-Based System for User Service Level Agreement in 5G Wireless Networks -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Cognitive Approach for Creation of Visual Security Codes -- 1 Introduction -- 2 Cognitive Solutions in Security Technologies -- 3 An Idea of Visual Security Codes -- 4 Conclusions -- References -- Transformative Computing Based on Advanced Human Cognitive Processes -- 1 Introduction -- 2 Advanced Human Cognitive Processes in Data Interpretation -- 3 New Transformative Computing Value Based on Cognitive Processes -- 4 Conclusions -- References -- Topology as a Factor in Overlay Networks Designed to Support Dynamic Systems Modeling -- 1 Introduction -- 2 Overlay Network -- 3 Network Topologies and Graph Models of Networks -- 4 What Constitutes a Good Overlay Network Topology? -- 4.1 Hypercube -- 4.2 Toroidal Grid Graph -- 4.3 Kautz Graph -- 5 Example of an Overlay Topology to Support a Mobile Application -- 6 Work in Progress -- 7 Conclusion -- References.
A Genetic Algorithm for Parallel Unmanned Aerial Vehicle Scheduling: A Cost Minimization Approach -- 1 Introduction -- 2 Problem Formulation -- 2.1 Notation -- 3 Methodology -- 3.1 Genetic Algorithm (GA) -- 3.2 Genetic Algorithm with Job Delay Mechanism -- 4 Result and Discussion -- 5 Conclusions and Future Research -- References -- A Movement Adjustment Method for DQN-Based Autonomous Aerial Vehicle -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 Proposed Method -- 3.1 TLS-DQN -- 3.2 Movement Adjustment Method -- 4 Performance Evaluation -- 4.1 Simulation Results of TLS-DQN -- 4.2 Results of Movement Adjustment Method -- 5 Conclusions -- References -- A Self-learning Clustering Protocol in Wireless Sensor Networks for IoT Applications -- 1 Introduction -- 2 A Self-learning Clustering Protocol in WSN-IoT -- 2.1 Network Model -- 2.2 Energy Consumption Model -- 2.3 The Self-learning Clustering Protocol (SLCP) -- 3 Performance Evaluation -- 3.1 Simulation Environment -- 3.2 Simulation Results -- 4 Conclusions -- References -- The Effect of Agents' Diversities on the Running Time of the Random Walk-Based Rendezvous Search -- 1 Introduction -- 2 Random Walk on a Network -- 3 Random Walk-Based Rendezvous Search(RRS) -- 3.1 Overview -- 3.2 Procedure of a Random Walk Agent -- 3.3 Characteristics -- 4 Experiment -- 4.1 Procedures of Experiment -- 4.2 The Effect of Agents' Diversity About Starting Times on the Running Time of RRS -- 4.3 The Effect of the Difference of Agents' Stochastic Rules for Selecting Adjacent Nodes on the Running Time -- 4.4 The Effect of the Agents' Diversity About Frequencies of Moving Agents on the Running Time -- 5 Conclusion and Future Work -- References.
A Study on Designing Autonomous Decentralized Method of User-Aware Resource Assignment in Large-Scale and Wide-Area Networks -- 1 Introduction -- 2 System Model -- 3 Design -- 3.1 Formularization of Assignment Problem and Its Stochastic Solution -- 3.2 Autonomous Action of Entities -- 3.3 Macroscopic Characteristics and Solving Multi-objective Problem -- 4 Experiment -- 4.1 Setting -- 4.2 Comparison -- 4.3 Result -- 5 Conclusion and Future Work -- References -- Social Media Data Misuse -- 1 Introduction -- 2 Social Media Data Misuse -- 3 Facebook Data Misuse -- 4 Twitter Data Misuse -- 5 Instagram Data Misuse -- 6 LinkedIn Data Misuse -- 7 Approaches to Restrict Social Media Data Misuse -- 8 Conclusion -- References -- Deep Learning Approaches to Detect Real Time Events Recognition in Smart Manufacturing Systems - A Short Survey -- 1 Introduction -- 1.1 The Advantages of a Data Driven Industry 4.0 -- 2 Deep Learning for Real Time Events Recognition -- 3 Conclusions -- References -- A Comparison Study of CM and RIWM Router Replacement Methods for WMNs Considering Boulevard Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 2.3 WMN-PSODGA Hybrid Simulation System -- 3 Simulation Results -- 4 Conclusions -- References -- Consideration of Presentation Timing in Bicycle Navigation Using Smart Glasses -- 1 Introduction -- 2 Smart Glasses -- 3 Presentation Timing Evaluation Experiment -- 3.1 Experiment Purpose -- 3.2 Experiment Environment -- 3.3 Experiment Conditions -- 3.4 Experiment Procedure -- 3.5 Experiment Results -- 3.6 Consideration -- 4 Conclusion -- References -- Graph Convolution Network for Urban Mobile Traffic Prediction -- 1 Introduction -- 2 Problem Formulation -- 3 Traffic Prediction Algorithm -- 4 Performance Evaluation.
5 Conclusion.
Altri titoli varianti Advances in Intelligent Networking and Collaborative Systems
Record Nr. UNINA-9910497081903321
Barolli Leonard  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in intelligent networking and collaborative systems : the 13th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2021), Taichung, Taiwan, 1-3 September 2021 / / editors, Leonard Barolli, Hsing-Chung Chen, Hiroyoshi Miwa
Advances in intelligent networking and collaborative systems : the 13th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2021), Taichung, Taiwan, 1-3 September 2021 / / editors, Leonard Barolli, Hsing-Chung Chen, Hiroyoshi Miwa
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (351 pages) : illustrations (chiefly color)
Disciplina 004.6
Collana Lecture notes in networks and systems
Soggetto topico Cloud computing
Wireless communication systems
Online social networks
Computer networks
ISBN 3-030-84910-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from the INCoS-2021 Organizing Committee -- INCoS-2021 Organizing Committee -- Honorary Chairs -- General Co-chairs -- Programme Co-chairs -- International Advisory Committee -- International Liaison Co-chairs -- Award Co-chairs -- Web Administrator Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Steering Committee Chair -- Track Areas and PC Members -- Track 1: Data Mining, Machine Learning and Collective Intelligence -- Track Co-chairs -- TPC Members -- Track 2: Intelligent Systems and Knowledge Management -- Track Co-chairs -- TPC Members -- Track 3: Wireless and Sensor Systems for Intelligent Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 4: Service-Based Systems -- Track Co-chairs -- TPC Members -- Track 5: Networking Security and Privacy -- Track Co-chairs -- TPC Members -- Track 6: Big Data Analytics for Learning, Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 7: Cloud Computing: Services, Storage, Security and Privacy -- Track Co-chairs -- TPC Members -- Track 8: Social Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- Track 9: Intelligent and Collaborative Systems for e-Health -- Track Co-chairs -- TPC Members -- Track 10: Big Data Analytics for Learning, Networking and Collaborative Systems -- Track Co-chairs -- TPC Members -- INCoS-2021 Reviewers -- INCoS-2021 Keynotes -- Big Data Management for Data Streams -- Convergence of Broadcast and Broadband in 5G Era -- Contents -- Performance Comparison of CM and LDVM Router Replacement Methods for WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Velocities and Positions of Particles -- 2.2 Routers Replacement Methods -- 2.3 DGA Operations.
2.4 Fitness and Migration Functions -- 2.5 Particle-Pattern and Gene Coding -- 3 Simulation Results -- 4 Conclusions -- References -- Effects of Augmented Reality Markers for Networked Robot Navigation -- 1 Introduction -- 2 Welfare Robot Navigation System -- 3 Experiments on Planar AR Markers -- 3.1 Geometrical Measurement -- 3.2 Identification Accuracy in Terms of Markers' Feature Points -- 4 Conclusion -- References -- Algorithm Based on Local Search Method for Examination Proctors Assignment Problem Considering Various Constraints -- 1 Introduction -- 2 Previous Research -- 3 Examination Proctors Assignment Problem -- 4 Local Search Algorithm -- 5 Performance Evaluation -- 6 Conclusion -- References -- Bio-inspired VM Introspection for Securing Collaboration Platforms -- 1 Introduction -- 2 Security and Privacy in Collaboration Platforms -- 3 Artificial Immune System Based Intrusion Detection -- 3.1 Negative Selection Algorithm -- 4 Proposed Security Approach -- 5 Experimental Evaluation -- 6 Conclusions -- References -- Artificial Intelligence-Based Early Prediction Techniques in Agri-Tech Domain -- 1 Introduction -- 2 Research Objectives -- 3 A Case of Study: Early Warning Prediction of Mastitis -- 4 Conclusions -- References -- Automatic Measurement of Acquisition for COVID-19 Related Information -- 1 Introduction -- 2 CORD-19 -- 3 CORD-19 Applications -- 4 NLP Pipeline in Python -- 5 Conclusions -- References -- Algorithms for Mastering Board Game Nanahoshi Considering Deep Neural Networks -- 1 Introduction -- 2 Previous Research -- 3 Game AI for Nanahoshi Using Game Tree Search -- 3.1 Game Tree Search -- 3.2 Monte Carlo Tree Search -- 4 Game Tree Search Using Deep Learning -- 4.1 Basic Idea of Game Tree Search Using Deep Learning -- 4.2 Monte Carlo Tree Search Using Deep Learning -- 5 Performance Evaluation -- 6 Conclusion -- References.
Revealing COVID-19 Data by Data Mining and Visualization -- 1 Introduction -- 2 Related Works -- 3 Our Data Science Solution -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Mining and Visualization -- 4 Evaluation -- 5 Conclusions -- References -- An Approach to Enhance Academic Ranking Prediction with Augmented Social Perception Data -- 1 Introduction -- 2 Related Work -- 3 Data and Methodology -- 3.1 Data Collection -- 3.2 Data Preparation -- 4 Results -- 4.1 Exploratory Data Analysis -- 4.2 Correlation Analysis -- 4.3 Predictive Model -- 5 Discussion -- 6 Conclusion -- References -- A Fuzzy-Based System for User Service Level Agreement in 5G Wireless Networks -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Cognitive Approach for Creation of Visual Security Codes -- 1 Introduction -- 2 Cognitive Solutions in Security Technologies -- 3 An Idea of Visual Security Codes -- 4 Conclusions -- References -- Transformative Computing Based on Advanced Human Cognitive Processes -- 1 Introduction -- 2 Advanced Human Cognitive Processes in Data Interpretation -- 3 New Transformative Computing Value Based on Cognitive Processes -- 4 Conclusions -- References -- Topology as a Factor in Overlay Networks Designed to Support Dynamic Systems Modeling -- 1 Introduction -- 2 Overlay Network -- 3 Network Topologies and Graph Models of Networks -- 4 What Constitutes a Good Overlay Network Topology? -- 4.1 Hypercube -- 4.2 Toroidal Grid Graph -- 4.3 Kautz Graph -- 5 Example of an Overlay Topology to Support a Mobile Application -- 6 Work in Progress -- 7 Conclusion -- References.
A Genetic Algorithm for Parallel Unmanned Aerial Vehicle Scheduling: A Cost Minimization Approach -- 1 Introduction -- 2 Problem Formulation -- 2.1 Notation -- 3 Methodology -- 3.1 Genetic Algorithm (GA) -- 3.2 Genetic Algorithm with Job Delay Mechanism -- 4 Result and Discussion -- 5 Conclusions and Future Research -- References -- A Movement Adjustment Method for DQN-Based Autonomous Aerial Vehicle -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 Proposed Method -- 3.1 TLS-DQN -- 3.2 Movement Adjustment Method -- 4 Performance Evaluation -- 4.1 Simulation Results of TLS-DQN -- 4.2 Results of Movement Adjustment Method -- 5 Conclusions -- References -- A Self-learning Clustering Protocol in Wireless Sensor Networks for IoT Applications -- 1 Introduction -- 2 A Self-learning Clustering Protocol in WSN-IoT -- 2.1 Network Model -- 2.2 Energy Consumption Model -- 2.3 The Self-learning Clustering Protocol (SLCP) -- 3 Performance Evaluation -- 3.1 Simulation Environment -- 3.2 Simulation Results -- 4 Conclusions -- References -- The Effect of Agents' Diversities on the Running Time of the Random Walk-Based Rendezvous Search -- 1 Introduction -- 2 Random Walk on a Network -- 3 Random Walk-Based Rendezvous Search(RRS) -- 3.1 Overview -- 3.2 Procedure of a Random Walk Agent -- 3.3 Characteristics -- 4 Experiment -- 4.1 Procedures of Experiment -- 4.2 The Effect of Agents' Diversity About Starting Times on the Running Time of RRS -- 4.3 The Effect of the Difference of Agents' Stochastic Rules for Selecting Adjacent Nodes on the Running Time -- 4.4 The Effect of the Agents' Diversity About Frequencies of Moving Agents on the Running Time -- 5 Conclusion and Future Work -- References.
A Study on Designing Autonomous Decentralized Method of User-Aware Resource Assignment in Large-Scale and Wide-Area Networks -- 1 Introduction -- 2 System Model -- 3 Design -- 3.1 Formularization of Assignment Problem and Its Stochastic Solution -- 3.2 Autonomous Action of Entities -- 3.3 Macroscopic Characteristics and Solving Multi-objective Problem -- 4 Experiment -- 4.1 Setting -- 4.2 Comparison -- 4.3 Result -- 5 Conclusion and Future Work -- References -- Social Media Data Misuse -- 1 Introduction -- 2 Social Media Data Misuse -- 3 Facebook Data Misuse -- 4 Twitter Data Misuse -- 5 Instagram Data Misuse -- 6 LinkedIn Data Misuse -- 7 Approaches to Restrict Social Media Data Misuse -- 8 Conclusion -- References -- Deep Learning Approaches to Detect Real Time Events Recognition in Smart Manufacturing Systems - A Short Survey -- 1 Introduction -- 1.1 The Advantages of a Data Driven Industry 4.0 -- 2 Deep Learning for Real Time Events Recognition -- 3 Conclusions -- References -- A Comparison Study of CM and RIWM Router Replacement Methods for WMNs Considering Boulevard Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 2.3 WMN-PSODGA Hybrid Simulation System -- 3 Simulation Results -- 4 Conclusions -- References -- Consideration of Presentation Timing in Bicycle Navigation Using Smart Glasses -- 1 Introduction -- 2 Smart Glasses -- 3 Presentation Timing Evaluation Experiment -- 3.1 Experiment Purpose -- 3.2 Experiment Environment -- 3.3 Experiment Conditions -- 3.4 Experiment Procedure -- 3.5 Experiment Results -- 3.6 Consideration -- 4 Conclusion -- References -- Graph Convolution Network for Urban Mobile Traffic Prediction -- 1 Introduction -- 2 Problem Formulation -- 3 Traffic Prediction Algorithm -- 4 Performance Evaluation.
5 Conclusion.
Record Nr. UNINA-9910523761903321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Networked-Based Information Systems : The 24th International Conference on Network-Based Information Systems (NBiS-2021)
Advances in Networked-Based Information Systems : The 24th International Conference on Network-Based Information Systems (NBiS-2021)
Autore Barolli Leonard
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (425 pages)
Altri autori (Persone) ChenHsing-Chung
EnokidoTomoya
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-84913-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Advances in Networked-Based Information Systems
Record Nr. UNINA-9910497107703321
Barolli Leonard  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances on Broadband and Wireless Computing, Communication and Applications : Proceedings of the 13th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2018) / / edited by Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, Hsing-Chung Chen
Advances on Broadband and Wireless Computing, Communication and Applications : Proceedings of the 13th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2018) / / edited by Leonard Barolli, Fang-Yie Leu, Tomoya Enokido, Hsing-Chung Chen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (815 pages)
Disciplina 621.382
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Electrical engineering
Computational intelligence
Communications Engineering, Networks
Computational Intelligence
ISBN 3-030-02613-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient Resource Allocation for Residential Smart Buildings using Integrated Cloud and Fog Environment in Smart Grid -- Cloud Computing Based Resource Allocation by Random Load Balancing Technique -- Shortest Job First Load Balancing Algorithm for Efficient Resource Management In Cloud -- Modified Shortest Job First for Load Balancing in Cloud-Fog Computing -- Big Data Analytics for Price and Load Forecasting in Smart Grids -- A Fuzzy-based System for Actor Node Selection in WSANs Considering Load Balancing of Actors -- Evaluation of Object-based Information Flow Control in P2PPS Systems -- Flexible Resource Management for Raft Clusters -- Integration of CNN and Faster R-CNN for Tire Bubble Defects Detection -- Privacy Mining from IoT-based Smart Homes -- Cooperation for Rechargeable Heterogeneous Sensor Networks.
Record Nr. UNINA-9910337644703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021)
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021)
Autore Barolli Leonard
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (544 pages)
Altri autori (Persone) YimKangbin
ChenHsing-Chung
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-79728-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function.
3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning.
2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes.
2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References.
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References.
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Record Nr. UNINA-9910497106203321
Barolli Leonard  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (544 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Wireless communication systems
Mobile communication systems
Computational Intelligence
Data Engineering
Wireless and Mobile Communication
ISBN 3-030-79728-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function.
3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning.
2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes.
2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References.
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References.
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Record Nr. UNINA-9910522969703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / / edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko
Mobile Internet Security : Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers / / edited by Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor Kotenko
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 181 p. 146 illus., 75 illus. in color.)
Disciplina 787.61
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer communication systems
Artificial intelligence
Security
Computer Communication Networks
Artificial Intelligence
ISBN 981-13-3732-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Networks using the Graph-based Schemes for Combining the Support Vector Machines -- Generating Dynamic Box by using an Input String -- SAAS:A Secure Anonymous Authentication Scheme for PMIPv6 -- FAIR-based Cyber Influence Damage Assessment for Exploit in Mobile Device -- Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads -- Steganalysis method for detecting embedded coefficients of discrete-wavelet image transformation into high-frequency domains -- Voronoi Maps for planar sensor networks visualization -- Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies -- Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems -- An Efficient Facebook Place Information Extraction Strategy -- Performance of Sub-Optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction -- A Frame-based Approach to Generating Insider Threat Test Suite on Cloud File-sharing -- User Keystroke Authentication Based On Convolutional Neural Network -- An SDN-based Secure Mobility Model for UAV-Ground Communications.
Record Nr. UNINA-9910350236703321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers / / edited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko
Mobile Internet Security : First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers / / edited by Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor Kotenko
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 175 p. 90 illus.)
Disciplina 004.67
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer security
Computer system failures
Security
Systems and Data Security
System Performance and Evaluation
ISBN 981-10-7850-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Performance on clustering routing for naturally deployed wireless sensor networks -- Mobile security assurance for automotive software through ArchiMate -- A generalized data inconsistency detection model for wireless sensor networks -- Building a frame-based cyber security learning game -- personal identification using time and frequency domain features of ECG lead-I -- A secure color-code key exchange protocol for mobile chat application -- Design and implement SPEEX speech technology on ARM processor -- A discrete wavelet transformation based fast and secure transmission of images for group communication -- An automated graph based approach to risk assessment for computer networks with mobile components -- Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion -- The cryptanalysis of WPA & WPA2 Using the parallel-computing with GPUs -- A policy management system based on multi-dimensional attribution label -- Access control for cross-border transfer of sensor data -- Security analysis oriented physical components modeling in quantum key distribution -- A novel hybrid architecture for high speed regular expression matching.
Record Nr. UNINA-9910299288003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)
Autore Pau Giovanni
Pubbl/distr/stampa Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021
Descrizione fisica 1 electronic resource (236 p.)
Soggetto topico Technology: general issues
Soggetto non controllato normalized cross-correlation
fast algorithm
first-order moment
systolic array
multiplication complexity
IoT
sustainability
hybrid RAM disk
direct byte read
secondary storage
operating system
PM2.5 concentration estimation
digital image processing
automatic region of interest selection
data exclusion
linear regression
census transform
sparse census transform
disparity
stereo vision
data hiding
multidimensional
embedding efficiency
mini-SuDoKu
security
NAND flash memory
P/E cycle
compression
adaptive ECC
RAID scattering
stripe log
parity
secret image sharing
maze matrix
cheat detection
cheater identification
controller area network
intrusion detection system
in-vehicle network security
machine learning
hierarchical approach
anomaly detection
MLHC
IWSNs
error models
IEEE 802.15.4
second-order Markov chain
OpenWSN
transmission reliability
certificateless signature
aggregate signature
arbitrated signature
public key replace attack
epidemic management
GNSS/GPS
infectious disease
isolation
social networking service
hot spot
adaptive data rate (ADR)
transmit power control (TPC)
time division multiple access (TDMA)
wireless sensor network (WSN)
power consumption
Internet of Things (IoT)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Selected Papers from the First International Symposium on Future ICT
Record Nr. UNINA-9910557530903321
Pau Giovanni  
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui