Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (717 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Artificial intelligence |
ISBN | 3-030-99584-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- An Approach for Mitigating Disruptions on Resources' Consumption Cycles -- 1 Introduction -- 2 Related Work -- 3 Resource Consumption in Brief -- 3.1 Consumption Properties -- 3.2 Disruption Handling -- 4 Scenarios to Mitigate Disruptions.
5 PN-based Verification of Consumption Cycles -- 6 Conclusion -- References -- Text Detection and Recognition Using Augmented Reality and Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Text detection and recognition based on Deep learning method -- 2.2 Text Detection and Recognition Based on Augmented Reality Method -- 3 Proposed Approach -- 3.1 Text Detection and Recognition Using DL -- 3.2 Text Visualization Using AR -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Energy Consumption Model of Servers to Make Virtual Machines Migrate -- 1 Introduction -- 2 Power Consumption and Computation Models of a Server -- 3 An Estimation Model of Energy Consumption -- 4 Migration of Virtual Machines -- 4.1 Energy Consumption for Migration of a Virtual Machine -- 4.2 Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- Development of a Blockchain-Based Ad Listing Application -- 1 Introduction -- 2 Terminology and Literature Review -- 3 Methodology -- 4 Design and Implementation -- 5 Conclusion and Future Work -- References -- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses -- 1 Introduction -- 2 Proposed Approach -- 2.1 Main Workflows -- 2.2 Neighborhood Rough Set and Three-Way Decisions -- 2.3 Time-Related Aspects of the Approach -- 3 Case Study -- 3.1 Dataset Description and Preparation -- 3.2 Experimentation and Evaluation -- 4 Final Remarks -- References -- Enhanced Autonomous Driving Through Improved 3D Objects Detection -- 1 Introduction -- 2 Presentation of the Proposed Model -- 2.1 Description of the Objects Detection Component -- 3 The Experimental Dataset -- 4 The Training Process -- 5 Presentation of the Performance Assessment Process -- 5.1 Performance Assessment Metrics -- 5.2 Investigation Concerning the Number and Placement of Sensors. 5.3 Remarks Regarding Additional Road Traffic Scenarios -- 6 Conclusions and Future Work -- References -- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel -- 1 Introduction -- 2 The Principle of Studied WuR-Based MAC -- 2.1 WuR-CA -- 2.2 WuR-NCA -- 3 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Throughput -- 4.3 Delay -- 4.4 Power Consumption -- 5 Results and Discussion -- 5.1 Variation in Number of Nodes -- 5.2 Effect of the Traffic Load -- 5.3 Variation in Data Packet Length -- 5.4 Variation in BER -- 6 Conclusion -- References -- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks -- 1 Introduction -- 2 Related Work -- 3 Protocol Design and DTMC Modeling of CaWuQoS-MAC -- 3.1 Protocol Design -- 3.2 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Delay -- 4.3 Power Consumption -- 5 Results and Discussion -- 5.1 Performance Analysis with Variable N -- 5.2 Performance Analysis vs. BER -- 5.3 Performance Analysis with Variable Traffic Load -- 6 Conclusion -- References -- A Dynamic ID Assignment Approach for Modular Robots -- 1 Introduction -- 2 Background on Unique ID Assignment -- 3 Dynamic ID Assignment Algorithm -- 3.1 Module Removal Handling -- 3.2 Module Addition Handling -- 4 Discussion -- 5 Experimental results -- 6 Conclusion and Future Work -- References -- Open-Source Publish-Subscribe Systems: A Comparative Study -- 1 Introduction -- 2 Related Work and Background -- 3 Functional Evaluation and Comparison -- 4 Performance Evaluation and Comparison -- 4.1 Experimental Results -- 5 Conclusions and Future Work -- References -- Conceptual Foundations of Code Rationalization Through a Case Study in Haskell -- 1 Introduction -- 2 Relevant Existing Contributions. 3 The Theoretical and Technological Fundamentals of Code Rationalization -- 3.1 Compliance with the Fundamental Principles of Software Systems Engineering -- 3.2 Elaboration and Systematic Utilization of Design Patterns -- 3.3 Elaboration and Systematic Utilization of Implementational Patterns -- 3.4 Consideration of the Optimal Programming Paradigms for a Certain Type of Problem -- 4 Generic Code Rationalization -- 4.1 Problem Statement -- 4.2 Code Rationalization as a Process to Seek the Optimal State of the Software Systems -- 5 Case Study -- 5.1 The Considered Problem -- 5.2 Example of Code Rationalization in Three Haskell Iterations -- 5.3 Final Remarks Related to the Presented Use Case -- 6 Conclusions -- References -- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Two-Phase Locking (2PL) Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Energy-Efficient Two-Phase Locking (EE2PL) Protocol -- 3.1 Meaningless Write Methods -- 3.2 Energy-Efficient 2PL (EE2PL) Protocol -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media -- 1 Introduction -- 2 Related Work -- 3 Co-owned Image Sharing -- 3.1 Multi-agent Model -- 4 Experimental Setup and Results -- 4.1 Results -- 5 Conclusion -- References -- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks -- 1 Introduction -- 2 Preliminary Assumptions for Analysis -- 3 Structural Controllability Restoration -- 3.1 STG-1: Strategy Using Backup Instances -- 3.2 STG-2: Strategy Using Edge Allocation. 3.3 STG-3: Strategy Using Diameter-Based Relinking -- 3.4 STG-4: Driver Node Injection Strategy -- 4 Experimental Results and Discussion -- 4.1 Network and Attacks Models -- 4.2 Analysis and Validation -- 4.3 Time Complexity Analysis -- 5 Conclusion and Future Work -- References -- Resource Authorization Methods for Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Requirements for the Authorization on Edge Computing Models -- 3.1 Edge Computing Models -- 3.2 Requirement for Applying the OAuth Flow to Resource Authorization on Edge Computing -- 4 Participant Relationships in Edge Computing Authorization -- 4.1 Concept of Privilege Delegation Model -- 4.2 Pattern Classification by Participant Relationship -- 4.3 Use Case of Each Pattern -- 4.4 Authorization Flow on Each Pattern -- 5 Discussion for Authorization Flow -- 5.1 Identifying User Location -- 5.2 Comparison with Original Flow -- 6 Conclusion -- References -- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Method -- 3.2 Dataset and Classification Features -- 4 Evaluation -- 4.1 Classification Results -- 4.2 Computational Performance -- 5 Conclusion -- References -- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 System Architecture -- 3.2 Data -- 3.3 Implementation -- 4 Evaluation Results -- 5 Conclusion -- References -- Automatic Monitoring System for Security Using IoT Devices and Smart Contracts -- 1 Introduction -- 2 Predicting the Failure of IoT Devices -- 3 Related Work -- 4 Proposed Method -- 4.1 System Flow -- 4.2 Concrete Example -- 5 Experiment -- 5.1 Experimental Methods and Results -- 5.2 Discussion -- 6 Conclusion -- References. A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet. |
Record Nr. | UNINA-9910558499803321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced information networking and applications . Volume 3 : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (697 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Artificial intelligence |
ISBN | 3-030-99619-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- LSTM-Based Reinforcement Q Learning Model for Non Intrusive Load Monitoring -- 1 Introduction -- 2 Related Work -- 3 Design of the Proposed Intelligent Algorithm -- 3.1 Recurrent Long Short-Term Memory (LSTM).
3.2 Reinforcement Learning: Q-Reinforcement Learning -- 3.3 Proposed Model: Reinforcement Learning Based on Recurrent LSTM -- 3.4 Description of the Training Database for NILM -- 3.5 Evaluation Metrics -- 4 Simulation Results -- 5 Conclusion -- References -- Machine Learning for Student QoE Prediction in Mobile Learning During COVID-19 -- 1 Introduction -- 2 QoE Definition and Metric -- 3 Proposed Framework -- 3.1 Student Engagement Detection Module -- 4 QoE Estimation for MOS Prediction -- 5 Conclusion -- References -- XceptionUnetV1: A Lightweight DCNN for Biomedical Image Segmentation -- 1 Introduction -- 2 Motivation -- 3 Proposed Model -- 3.1 Xception Units -- 3.2 Residual Learning -- 3.3 Atrous Convolution -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Network Architecture -- 4.3 Loss Function -- 4.4 Training and Testing -- 4.5 Comparative Results -- 5 Conclusion -- References -- A Proposed Intrusion Detection Method Based on Machine Learning Used for Internet of Things Systems -- 1 Introduction -- 2 Methodology -- 3 Related Works -- 3.1 Binary Classification -- 3.2 Multi-class Classification -- 4 Evaluation Metrics for Classification Models -- 4.1 ML Algorithms -- 4.2 Evaluation Fundamental -- 5 Proposed Method and Simulation -- 5.1 Proposed Method Motivation -- 6 Implementation -- 7 Simulation -- 8 Conclusion -- References -- Shape Trajectory Analysis Based on HOG Descriptor for Isolated Word Sign Language Recognition -- 1 Introduction -- 2 Trajectories Matrix Extraction -- 2.1 The Static-Level -- 2.2 The Dynamic-Level -- 3 Shape Trajectory Analysis -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Test Protocol -- 4.3 Results -- 4.4 Comparative Study with Existing Work -- 5 Conclusion and Future Works -- References -- How Australians Are Coping with the Longest Restrictions: An Exploratory Analysis of Emotion and Sentiment from Tweets. 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Experiment -- 4 Results and Discussion -- 5 Conclusion -- References -- COVID-19 Article Classification Using Word-Embedding and Extreme Learning Machine with Various Kernels -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Word Embedding -- 3.3 Feature Selection Techniques -- 3.4 Extreme Learning Machine -- 4 Research Methodology -- 5 Empirical Results and Analysis -- 5.1 Comparative Analysis -- 5.2 Word-Embedding -- 5.3 Feature Selection -- 5.4 Extreme Learning Machine -- 5.5 Title and Content -- 6 Conclusion -- References -- An Improved Ant Colony Optimization Based Parking Algorithm with Graph Coloring -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 ACO -- 4 Model Definition -- 5 An Ant Colony Optimization Parking Algorithm -- 5.1 Graph Coloring -- 5.2 The Pheromone Model -- 5.3 Constraint Relaxation -- 5.4 The Algorithm -- 6 Valuation -- 6.1 Simulation Results -- 6.2 Benchamarks -- 7 Conclusions -- References -- A Review About Machine and Deep Learning Approaches for Intelligent User Interfaces -- 1 Introduction -- 1.1 Application Trends for Intelligent User Interfaces -- 2 IUIs Overview -- 3 IUIs Classification -- 3.1 Machine Learning-Based Papers -- 3.2 Deep Neural Network-Based Papers -- 4 Conclusions -- References -- A Survey on Neural Recommender Systems: Insights from a Bibliographic Analysis -- 1 Introduction -- 2 Conventional and Deep Learning Approaches to Recommendation -- 2.1 Conventional Approaches -- 2.2 Neural Approaches -- 3 Bibliographic Analysis -- 4 Conclusions -- References -- Information Networking and e-Government in United Nations and Europe -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Empirical Results -- 5 Discussion -- 6 Conclusions -- References. A Microservices Based Architecture for the Sentiment Analysis of Tweets -- 1 Introduction -- 2 The Container Based Framework -- 2.1 Design of the Framework -- 3 Platform Implementation -- 4 Conclusion and Future Works -- References -- Container-Based Platform for Computational Medicine -- 1 Introduction -- 2 Descriptions of the Functionality Provided by Atmosphere -- 3 New Architecture Based on Containerization Concept -- 3.1 Design Providing Functionality for Administrators -- 3.2 Design Providing Functionality for Developers -- 3.3 Design Providing Functionality for End-Users -- 4 Container-Based Platform -- 5 Implementation and Proof of Concept -- 6 Conclusion -- References -- Digital Twins for Autonomic Cloud Application Management -- 1 Introduction -- 2 The Cloud Application and Its Digital Twin -- 2.1 Cloud Application Modelling -- 2.2 Digital Twins -- 2.3 Optimized Cloud Application Management -- 3 Abstract Behavioral Specification Model as the Digital Twin -- 3.1 The Abstract Behavioral Specification Language -- 3.2 Modelling Cloud Applications with ABS -- 4 Discussion -- 5 Conclusion -- References -- Opportunities and Advantages of Cloud Migration of a Smart Restaurant System -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Smart Restaurant System Architecture -- 5 Cloud Migration of Smart Restaurant System -- 5.1 Agnostic Cloud Architecture -- 5.2 AWS Cloud Architecture -- 6 Conclusion -- References -- Analysis of Techniques for Mapping Convolutional Neural Networks onto Cloud Edge Architectures Using SplitFed Learning Method -- 1 Introduction -- 2 Background and Related Works -- 3 Federate Learning -- 3.1 Split Learning -- 3.2 SplitFed Learning -- 4 Computational and Architectural Patterns for Federate Learning -- 5 An Implementation Proposal of CNN in Federate Learning -- 6 Conclusion -- References. In-cloud Migration of a Custom and Automatic Booking System -- 1 Introduction -- 2 Background and Related Work -- 3 Off-Cloud Booking System Architecture -- 4 In-Cloud Migration of on Premise Custom and Automatic Lodge Booking System -- 4.1 Agnostic Cloud Architecture -- 4.2 AWS Cloud Architecture -- 5 Conclusions and Future Works -- References -- Anomalous Witnesses and Registrations Detection in the Italian Justice System Based on Big Data and Machine Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 The Data Analysis Pipeline -- 4 Anomalies Detection -- 4.1 Identification of ``Serial Witnesses'' -- 4.2 Recognition of Anomalous Registrations -- 5 Microservices Architecture -- 6 Conclusion and Future Works -- References -- A NLP Framework to Generate Video from Positive Comments in Youtube -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 5 Conclusion -- References -- Smart Insole Monitoring System for Fall Detection and Bad Plantar Pressure -- 1 Introduction -- 2 Related Works -- 3 Gait Analysis -- 4 Hardware and Software Design -- 4.1 Hardware Descriptions -- 4.2 Software Implementation -- 5 Conclusion -- References -- A Recommendation Method of Health Articles Based on Association Rules for Health Terms Appeared on Web Documents and Their Application Systems -- 1 Introduction -- 2 Rerated Work -- 3 Proposed Method -- 3.1 Overview -- 3.2 Extraction of Association Rules -- 3.3 Calculation of Recommendation Score for Health Articles -- 4 Experiment -- 4.1 Experimental Purpose -- 4.2 Experimental Environment -- 4.3 Experimental Method -- 4.4 Experimental Result -- 5 Conclusion -- References -- A Voronoi Edge and CCM-Based SA Approach for Mesh Router Placement Optimization in WMNs: A Comparison Study for Different Edges -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed Method. 3.1 CCM for Mesh Router Placement Optimization. |
Record Nr. | UNINA-9910558491003321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced information networking and applications . Volume 2 : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (728 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Computer networks |
ISBN | 3-030-99587-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- A Fuzzy-Based System for Determining Driver Stress in VANETs Considering Driving Experience and History -- 1 Introduction -- 2 Overview of VANETs -- 3 Proposed Fuzzy-Based System -- 4 Simulation Results -- 5 Conclusions -- References.
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Instances: A Comparison Study for RDVM and LDIWM Replacement Methods -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Millimeter-Wave Dual-Band Slotted Antenna for 5G Applications -- 1 Introduction -- 2 Antenna Design -- 2.1 Design Equations -- 2.2 Antenna Specification -- 2.3 Substrate Material Selection -- 3 Result Analysis -- 3.1 Bandwidth -- 3.2 2-D Radiation Pattern -- 3.3 Directivity, Gain and Efficiency -- 3.4 VSWR, Reflection Co-efficient or S-Parameter -- 4 Comparative Analysis -- 5 Future Work -- 6 Conclusion -- References -- NARUN-PC: Caching Strategy for Noise Adaptive Routing in Utility Networks -- 1 Introduction -- 1.1 Research Problem -- 1.2 Paper Contribution -- 2 NARUN and NARUN-PC Protocols -- 3 Simulation -- 3.1 Experimental Results -- 4 Conclusions and Future Work -- References -- HYPE: CNN Based HYbrid PrEcoding Framework for 5G and Beyond -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 HYPE: CNN Based HYbrid PrEcoding Framework for 5G and Beyond -- 3.1 Acquiring Partial CSI -- 3.2 Structure of HP-CNN -- 3.3 Training Strategy of HP-CNN -- 4 Simulation Results and Discussions -- 5 Conclusion and Future work -- References -- The Multi-access Edge Computing (MEC)-Based Bit Rate Adaptive Multicast SVC Streaming Using the Adaptive FEC Mechanism -- 1 Introduction -- 2 Relative Work -- 3 Bandwidth Estimation and Adaptive FEC -- 4 The Proposed MM-CSVC Method -- 5 Performance Evaluation -- 6 Conclusion -- References -- PROA: Pipelined Receiver Oriented Anycast MAC for IoT -- 1 Introduction -- 2 Related Work -- 3 PROA Protocol. 3.1 Anycast Communication -- 3.2 Two Phase Transmission Process -- 3.3 Segmented Transmission -- 3.4 Imminent Collision -- 3.5 FCS Selection -- 4 Experimental Results -- 4.1 Setup -- 4.2 Results -- 5 Conclusion -- References -- A Watchdog Proposal to a Personal e-Health Approach -- 1 Introduction -- 2 Related Work -- 3 Stress and Anxiety Prediction Architecture -- 4 Experimental Results -- 4.1 Body Sensors Data -- 4.2 Monitoring Environment Solution -- 5 Conclusions and Future Works -- References -- Computation Offloading by Two-Sided Matching in Fog Computing -- 1 Introduction -- 2 Related Research -- 2.1 Fog Computing -- 2.2 Computation Offloading -- 2.3 Matching Theory -- 3 Student Project Allocation -- 4 Experiment and Results -- 5 Summary and Future Work -- References -- Distributed Log Search Based on Time Series Access and Service Relations -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Rule Generator -- 3.2 Log Searcher -- 4 Implementation -- 5 Experimental Results -- 6 Discussion and Conclusions -- References -- Detector: Hierarchical Distributed Fault Detection Algorithm for Lattice Based Modular Robots -- 1 Introduction -- 2 Background -- 3 Detector: Disconnection Detection -- 3.1 Definitions -- 3.2 The Proposed Algorithm -- 4 Simulation Results -- 5 Conclusion -- References -- ManufactSim: Manufacturing Line Simulation Using Heterogeneous Distributed Robots -- 1 Introduction -- 2 Industrial Context -- 3 Related Work -- 4 Our Proposal -- 5 Experiments -- 6 Conclusion -- References -- Sports Data Management, Mining, and Visualization -- 1 Introduction -- 2 Background -- 2.1 Bell Curve -- 2.2 Linear Regression -- 2.3 Pythagorean Expectation -- 3 Our Sports Data Mining Solution -- 3.1 Data Collection -- 3.2 Outcome Prediction -- 4 Evaluation -- 4.1 Bell Curve Expectation -- 4.2 Linear Regression. 4.3 Pythagorean Expectation -- 5 Conclusions -- References -- Mining for Fake News -- 1 Introduction -- 2 Related Works -- 3 Our Fake News Mining Solution -- 3.1 Data Cleaning -- 3.2 Vectorization -- 3.3 News Classification -- 4 Evaluation -- 5 Conclusions -- References -- Software Functional and Non-function Requirement Classification Using Word-Embedding -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Data Normalization -- 3.3 Feature Extraction using Word Embedding -- 3.4 Feature Selection and Dimensionality Reduction -- 3.5 Classification -- 3.6 Minority Oversampling -- 4 Research Methodology -- 5 Empirical Results and Analysis -- 5.1 Comparative Analysis -- 5.2 Word-Embedding -- 5.3 Classification Techniques -- 5.4 Feature Selection Techniques -- 5.5 SMOTE -- 6 Conclusion -- References -- Topic Guided Image Captioning with Scene and Spatial Features -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Visual Feature Extraction -- 3.2 Textual Feature Extraction -- 4 Experiments -- 5 Conclusion -- References -- A Socially-Aware, Privacy-Preserving, and Scalable Federated Learning Protocol for Distributed Online Social Networks -- 1 Introduction -- 2 Related Work -- 3 Solution -- 3.1 Construction of Socially-Aware Random Overlay -- 3.2 Push-Based Merging Gossip Federated Learning -- 4 Evaluation -- 5 Experiment Results -- 5.1 Successful Construction of a Random Overlay on the Fly by the Sampling Service -- 5.2 Removal of the Sampling Bias in Random Overlay -- 5.3 Convergence of all the Network Nodes to a Similar Model -- 5.4 Comparison of Prediction Error with Centralized Training -- 6 Conclusions and Future Work -- References -- A Multi-layer Modeling for the Generation of New Architectures for Big Data Warehousing -- 1 Introduction -- 2 Related Works. 3 Contribution: A New Multi-layered Conceptual Model for Big Data Warehousing -- 4 Validation of the Proposed Model: An Implementation for Multi-source Data Warehousing and Analysis -- 4.1 Proposed Business Model Process -- 4.2 An Architecture for COVID-19 Data Warehousing and Analysis -- 5 Results Analysis and Interpretation -- 6 Discussion and Findings -- 7 Conclusion -- References -- Efficient Retransmission Algorithm for Ensuring Packet Delivery to Sleeping Destination Node -- 1 Introduction -- 2 Related Work -- 2.1 Pure Flooding -- 2.2 Probabilistic Flooding -- 3 Background -- 3.1 Sleeping Mechanism -- 3.2 Full Retransmission Algorithm -- 4 Probabilistic Retransmission Algorithm -- 5 Evaluation -- 6 Conclusion -- References -- The Development of an Elderly Monitoring System with Multiple Sensors -- 1 Introduction -- 2 Background -- 2.1 Pifaa -- 3 Proposed system -- 3.1 Overview -- 3.2 Selecting and Discarding Sensors -- 3.3 Using Camera Images -- 4 Application to Display the Results -- 4.1 Overview -- 4.2 Native and Web Versions of the Application -- 4.3 Data Interpretation -- 5 Related Research -- 6 Summary -- References -- Predicting Cyber-Attacks on IoT Networks Using Deep-Learning and Different Variants of SMOTE -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Feature Selection Techniques -- 3.3 Deep Learning Architecture -- 3.4 SMOTE -- 4 Results and Analysis -- 5 Comparative Analysis -- 5.1 Sampling Techniques -- 5.2 Feature Selection Techniques -- 5.3 Deep Learning Technique -- 5.4 Cost Benefit Analysis -- 6 Conclusion -- References -- A Decentralized Federated Learning Architecture for Intrusion Detection in IoT Systems -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Decentralized Federated Learning-Based IDS for IoT -- 5 Discussion -- 6 Conclusions and Future Work -- References. Regression Analysis Using Machine Learning Approaches for Predicting Container Shipping Rates. |
Record Nr. | UNINA-9910558485703321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 2 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (xxx, 797 pages) : illustrations (some color) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence Xarxes d'ordinadors Computació distribuïda Xarxes d'informació Intel·ligència artificial |
Soggetto genere / forma |
Llibres electrònics
Congressos |
ISBN | 3-030-75075-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483963403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 3 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (753 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence Xarxes d'ordinadors Computació distribuïda Sistemes d'informació Intel·ligència artificial |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-75078-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2021 Organizers -- AINA-2021 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec300 -- Sec301 -- 2. Next Generation Wireless Networks -- Sec303 -- Sec304 -- 3. Multimedia Systems and Applications -- Sec305 -- Sec306 -- 4. Pervasive and Ubiquitous Computing -- Sec105 -- Sec106 -- 5. Web-Based and E-Learning Systems -- Sec331 -- Sec312 -- 6. Distributed and Parallel Computing -- Sec256 -- Sec251 -- 7. Data Mining, Big Data Analytics and Social Networks -- Sec261 -- Sec389 -- 8. Internet of Things and Cyber-Physical Systems -- Sec265 -- Sec266 -- 9. Intelligent Computing and Machine Learning -- Sec291 -- Sec298 -- 10. Cloud and Services Computing -- Sec351 -- Sec352 -- 11. Security, Privacy and Trust Computing -- Sec365 -- Sec366 -- 12. Software-Defined Networking and Network Virtualization -- Sec382 -- Sec399 -- AINA-2021 Reviewers -- AINA-2021 Keynote Talks -- The Role of Artificial Intelligence in the Industry 4.0 -- Localization in 6G -- Contents -- An Improved DOA Estimation Algorithm of Neural Network Based on Interval Division -- 1 Introduction -- 2 Signal Model of DOA Estimation -- 3 Improved DOA Estimation Algorithm of Neural Networks Based on Interval Division -- 3.1 DOA Estimation Algorithm of Neural Networks Based on Interval Division -- 3.2 Improved Interval Division Method -- 3.3 Performance Analysis -- 4 Conclusion -- References -- The Application in Handwritten Digit Recognition of Deep Belief Network Based on Improved Genetic Algorithm.
1 Introduction -- 2 The DBN Optimized by Adaptive Genetic Algorithm (IAGA-DBN) -- 2.1 DBN -- 2.2 IAGA -- 2.3 The Algorithm Fow of IAGA-DBN -- 3 Realization of Handwritten Digit Recognition Based on IAGA-DBN -- 3.1 Experimental Data -- 3.2 Test Comparison and Analysis of Each Model -- 4 Conclusion -- References -- A Fuzzy-Based Scheme for Admission Control in 5G Wireless Networks: Improvement of Slice QoS Considering Slice Reliability as a New Parameter -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Evaluation of a User Finger Movement Capturing Device for Control of Self-standing Omnidirectional Robot -- 1 Introduction -- 2 Related Work -- 3 Proposed Self-standing Omnidirectional Robot -- 3.1 Kinematics -- 3.2 Control System of the Proposed Self-standing Omnidirectional Robot -- 4 Implementation of User Finger Capturing Device -- 5 Experimental Results -- 6 Conclusions and Future Work -- References -- Adaptive Architecture for Fault Diagnosis of Rotating Machinery -- 1 Introduction -- 2 Related Work -- 3 Motivating Example -- 4 Fault Diagnosis of Rotating Machinery -- 4.1 RTRL Training -- 4.2 Online Monitoring -- 5 Experimental Results -- 5.1 Visualization of Variability Markers -- 6 Conclusions -- References -- Unsupervised Classification of Medical Documents Through Hybrid MWEs Discovery -- 1 Introduction -- 2 State of Art -- 3 Classification Methodology -- 3.1 Hybrid MWEs Discovery -- 3.2 Document Classification -- 4 Experiment -- 5 Conclusion and Future Work -- References -- Building a Pos Tagger and Lemmatizer for the Italian Language -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach. 4 Experiment and Evaluation -- 5 Conclusions and Future Work -- References -- Extracting Information from Food-Related Textual Sources -- 1 Introduction -- 2 Motivation -- 3 WEB Scraping -- 3.1 Extracting Meta-data -- 4 Extracting Images -- 5 Ontology Building -- 6 Conclusions -- References -- PaSy - Management of a Smart-Parking System Based on Priority Queues -- 1 Introduction -- 2 Related Work -- 3 Integration Model -- 3.1 Profiling -- 3.2 Mathematical Model -- 3.3 Priority Queues -- 3.4 Queues Categories -- 4 Conclusions -- References -- An Ontological Model to Represent Food Consumption Risks -- 1 Introduction -- 2 Case Study -- 3 The Represented Information -- 4 Conclusions -- References -- Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage -- 1 Introduction -- 2 Related Work -- 3 The Cleopatra Project -- 4 Architecture Design -- 5 Bridging Multi Users Conversation with Dyadic Agents -- 5.1 Parallel Conversations versus Multiple Threads -- 5.2 Own Messages versus Multiple Receivers -- 5.3 Replies versus Posts -- 6 Prototype Development -- 7 Conclusion -- References -- E-government and Italian Local Government: Managerial Approach in Two Macro Areas to Improve Manager's Culture and Services -- 1 Introduction -- 2 Literature Review -- 2.1 Italian Public Administration -- 2.2 Case Study Context -- 2.3 Northern vs Southern IPA -- 3 Methodology -- 4 Empirical Results -- 5 Discussion -- 6 Conclusions -- References -- Container Based Simulation of Electric Vehicles Charge Optimization -- 1 Introduction -- 2 The Greencharge Simulator -- 3 Formulating the Energy Management Problem -- 4 Optimization Algorithm -- 4.1 GA Based Load Shifting -- 4.2 Linear EV Charge Optimization -- 5 Experimental Results -- 6 Conclusion -- References -- Cloud Computing Projects: A Bibliometric Overview. 1 Introduction -- 2 Background Information -- 2.1 Bibliometric Investigations -- 2.2 The Projects Under Analysis -- 3 Data Collection and Methodology -- 3.1 Data Sources -- 3.2 Data Preparation -- 4 Results -- 4.1 Impact Overview -- 4.2 Distribution of Papers and Collaboration -- 4.3 Co-occurrences of Keywords Analysis for Research Areas -- 5 Conclusions -- References -- Applying Patterns to Support Deployment in Cloud-Edge Environments: A Case Study -- 1 Introduction -- 2 State of the Art -- 3 The Methodology -- 3.1 Selection of the Computational Pattern -- 3.2 Mapping to an Agnostic Architectural Pattern -- 3.3 Mapping to an Agnostic Deployment Pattern -- 4 Conclusion and Future Work -- References -- Obserbot: A Totally Automated Watcher to Monitor Essential Services -- 1 Introduction -- 2 The Obserbot Framework -- 3 Platform Description -- 4 The Semantic Analysis -- 5 Results -- 6 Conclusions and Further Developments -- References -- Saving Electronic Health Record (EHR) in private and secure mHealth system with blockchain Smart contracts -- 1 Introduction -- 2 Previous Work -- 3 Blockchain -- 3.1 Consortium Blockchain -- 4 System Implementation -- 5 Discussion -- 6 Conclusion and Future Work -- References -- iNote: A Low Cost Banknote Recognition System for Visually Impaired Persons -- 1 Introduction -- 2 Literature Review -- 3 System Overview and Problem Formulation -- 3.1 System Overview -- 3.2 Problem Formulation -- 4 Methodology -- 4.1 Algorithm -- 5 Results -- 5.1 Hardware -- 5.2 Experimental Results -- 6 Conclusions and Future Work -- References -- Design of a Diagnostic Support Method Utilizing Interrogation Information in Traditional Chinese Medicine -- 1 Introduction -- 2 Related Research and Issues -- 2.1 Traditional Chinese Medicine (TCM) -- 2.2 Related Research -- 2.3 Technical Issues and Proposals -- 3 Diagnostic Support Method. 3.1 Outline of the Diagnostic Support Method -- 3.2 Pattern Candidate Extraction Method -- 3.3 Interpattern Relational Model Creation Method -- 4 Conclusion -- References -- Software-Defined Networking: Open-Source Alternatives for Small to Medium Sized Enterprises -- 1 Introduction -- 2 Literature Review -- 2.1 SDN Architecture in Smaller Networks -- 3 Methodology -- 3.1 Cisco DNA Centre -- 3.2 Key Technologies in Cisco DNA Centre -- 3.3 Open Source SDN Controller for SME-Based Network -- 3.4 OpenDaylight SDN Controller -- 4 Deploying LISP, VxLAN Within OpenDaylight SDN Controller -- 4.1 Location Identifier Separation Protocol (LISP) Within OpenDaylight -- 4.2 Virtual Extensible Local Area Networks and OpenDaylight -- 5 Conclusion -- References -- A Survey of Description Methods for Fieldbus Systems -- 1 Introduction -- 2 Description Methods -- 2.1 EDDL -- 2.2 ESI and ENI -- 2.3 EDS -- 2.4 CiA 311 -- 2.5 FIBEX -- 2.6 AutomationML -- 3 Evaluation -- 4 Summary -- References -- A Hybrid Message Delivery Method for Vehicular DTN Considering Impact of Shuttle Buses and Roadside Units -- 1 Introduction -- 2 Overview of DTN Protocols -- 3 Proposed Hybrid Message Delivery Method -- 4 Evaluation of Proposed Method -- 4.1 Evaluation Setting -- 4.2 Simulation Results -- 5 Conclusions -- References -- Optimum Path Finding Framework for Drone Assisted Boat Rescue Missions -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 4 Conclusions and Future Works -- References -- Algorithmic Aspects of the Maximum 2-edge-colorable Subgraph Problem -- 1 Introduction -- 2 Problem Statement -- 3 Related Work -- 4 Graphs with Bounded Carving-Width -- 5 Graphs with Bounded Pathwidth -- 6 Conclusion and Future Work -- References -- Effective Use of Low Power Heterogeneous Wireless Multimedia Sensor Networks for Surveillance Applications Using IEEE 802.15.4 Protocol. 1 Introduction. |
Record Nr. | UNINA-9910484687603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019) / / edited by Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (1,357 pages) |
Disciplina | 004.6 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-030-15032-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Electricity Load Forecasting in Smart Grids using Support Vector Machine -- Optimization of Response and Processing Time for Smart Societies using Particle Swarm Optimization and Levy Walk -- On Maximizing User Comfort using a Novel Meta-Heuristic Technique in Smart Home -- Towards Efficient Energy Management in a Smart Home using Updated Population -- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid -- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid -- Minimizing Daily Electricity Cost using Bird Chase Scheme with Electricity Management Controller in a Smart Home -- Optimal Power Flow with Uncertain Renewable Energy Sources using Flower Pollination Algorithm -- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems -- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses. |
Record Nr. | UNINA-9910483016403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020) / / edited by Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (1,535 pages) |
Disciplina | 004.6 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Engineering - Data processing Application software Computational Intelligence Data Engineering Computer and Information Systems Applications |
ISBN | 3-030-44041-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483510103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Internet, Data and Web Technologies : The 9th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2021) / / edited by Leonard Barolli, Juggapong Natwichai, Tomoya Enokido |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (xxv, 579 pages) : illustrations |
Disciplina | 006.3 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Engineering - Data processing
Computational intelligence Big data Data Engineering Computational Intelligence Big Data Processament de dades Enginyeria de programari Dades massives Intel·ligència computacional |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-030-70639-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483245503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in network-based information systems : the 25th International Conference on Network-Based Information Systems (NBiS-2022) / / Leonard Barolli, Hiroyoshi Miwa and Tomoya Enokido, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (527 pages) |
Disciplina | 001.64404 |
Collana | Lecture notes in networks and systems |
Soggetto topico |
Information networks
Computer networks - Technological innovations |
ISBN | 3-031-14314-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910586598003321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Network-Based Information Systems : The 21st International Conference on Network-Based Information Systems (NBiS-2018) / / edited by Leonard Barolli, Natalia Kryvinska, Tomoya Enokido, Makoto Takizawa |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (1,024 pages) |
Disciplina | 001.64404 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-98530-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Fuzzy-based System for Actor Node Selection in WSANs for Improving Network -- A Fuzzy-based Approach for Improving Peer Awareness and Group Synchronization in MobilePeerDroid System -- A Position Detecting System Using Supersonic Sensors for Omnidirectional Wheelchair Tennis -- Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking -- An Energy-efficient Dynamic Live Migration of Multiple Virtual Machines -- Developing a Low-cost Thermal Camera for Industrial Predictive Maintenance Applications -- Effective Resource Allocation in Fog for Efficient Energy Distribution -- Efficient Energy Management using Fog Computing -- Deterrence System for Texting-While-Walking Focused on User Situation -- Slovak Broadcast News Speech Recognition and Transcription System -- Implementation of Mass Transfer Model on Parallel Computational System. |
Record Nr. | UNINA-9910484926203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|