top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
1999 International Workshops on Parallel Processing : proceedings : 21-24 September, 1999, Aizu-Wakamatsu City, Japan / / Institute of Electrical and Electronics Engineers
1999 International Workshops on Parallel Processing : proceedings : 21-24 September, 1999, Aizu-Wakamatsu City, Japan / / Institute of Electrical and Electronics Engineers
Pubbl/distr/stampa Los Alamitos, California : , : IEEE Computer Society, , 1999
Descrizione fisica 1 online resource (622 pages)
Disciplina 004.35
Altri autori (Persone) PandaDhabaleswar K
TakizawaMakoto
Soggetto topico Parallel processing (Electronic computers)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996201986103316
Los Alamitos, California : , : IEEE Computer Society, , 1999
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (717 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Artificial intelligence
ISBN 3-030-99584-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- An Approach for Mitigating Disruptions on Resources' Consumption Cycles -- 1 Introduction -- 2 Related Work -- 3 Resource Consumption in Brief -- 3.1 Consumption Properties -- 3.2 Disruption Handling -- 4 Scenarios to Mitigate Disruptions.
5 PN-based Verification of Consumption Cycles -- 6 Conclusion -- References -- Text Detection and Recognition Using Augmented Reality and Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Text detection and recognition based on Deep learning method -- 2.2 Text Detection and Recognition Based on Augmented Reality Method -- 3 Proposed Approach -- 3.1 Text Detection and Recognition Using DL -- 3.2 Text Visualization Using AR -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Energy Consumption Model of Servers to Make Virtual Machines Migrate -- 1 Introduction -- 2 Power Consumption and Computation Models of a Server -- 3 An Estimation Model of Energy Consumption -- 4 Migration of Virtual Machines -- 4.1 Energy Consumption for Migration of a Virtual Machine -- 4.2 Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- Development of a Blockchain-Based Ad Listing Application -- 1 Introduction -- 2 Terminology and Literature Review -- 3 Methodology -- 4 Design and Implementation -- 5 Conclusion and Future Work -- References -- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses -- 1 Introduction -- 2 Proposed Approach -- 2.1 Main Workflows -- 2.2 Neighborhood Rough Set and Three-Way Decisions -- 2.3 Time-Related Aspects of the Approach -- 3 Case Study -- 3.1 Dataset Description and Preparation -- 3.2 Experimentation and Evaluation -- 4 Final Remarks -- References -- Enhanced Autonomous Driving Through Improved 3D Objects Detection -- 1 Introduction -- 2 Presentation of the Proposed Model -- 2.1 Description of the Objects Detection Component -- 3 The Experimental Dataset -- 4 The Training Process -- 5 Presentation of the Performance Assessment Process -- 5.1 Performance Assessment Metrics -- 5.2 Investigation Concerning the Number and Placement of Sensors.
5.3 Remarks Regarding Additional Road Traffic Scenarios -- 6 Conclusions and Future Work -- References -- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel -- 1 Introduction -- 2 The Principle of Studied WuR-Based MAC -- 2.1 WuR-CA -- 2.2 WuR-NCA -- 3 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Throughput -- 4.3 Delay -- 4.4 Power Consumption -- 5 Results and Discussion -- 5.1 Variation in Number of Nodes -- 5.2 Effect of the Traffic Load -- 5.3 Variation in Data Packet Length -- 5.4 Variation in BER -- 6 Conclusion -- References -- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks -- 1 Introduction -- 2 Related Work -- 3 Protocol Design and DTMC Modeling of CaWuQoS-MAC -- 3.1 Protocol Design -- 3.2 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Delay -- 4.3 Power Consumption -- 5 Results and Discussion -- 5.1 Performance Analysis with Variable N -- 5.2 Performance Analysis vs. BER -- 5.3 Performance Analysis with Variable Traffic Load -- 6 Conclusion -- References -- A Dynamic ID Assignment Approach for Modular Robots -- 1 Introduction -- 2 Background on Unique ID Assignment -- 3 Dynamic ID Assignment Algorithm -- 3.1 Module Removal Handling -- 3.2 Module Addition Handling -- 4 Discussion -- 5 Experimental results -- 6 Conclusion and Future Work -- References -- Open-Source Publish-Subscribe Systems: A Comparative Study -- 1 Introduction -- 2 Related Work and Background -- 3 Functional Evaluation and Comparison -- 4 Performance Evaluation and Comparison -- 4.1 Experimental Results -- 5 Conclusions and Future Work -- References -- Conceptual Foundations of Code Rationalization Through a Case Study in Haskell -- 1 Introduction -- 2 Relevant Existing Contributions.
3 The Theoretical and Technological Fundamentals of Code Rationalization -- 3.1 Compliance with the Fundamental Principles of Software Systems Engineering -- 3.2 Elaboration and Systematic Utilization of Design Patterns -- 3.3 Elaboration and Systematic Utilization of Implementational Patterns -- 3.4 Consideration of the Optimal Programming Paradigms for a Certain Type of Problem -- 4 Generic Code Rationalization -- 4.1 Problem Statement -- 4.2 Code Rationalization as a Process to Seek the Optimal State of the Software Systems -- 5 Case Study -- 5.1 The Considered Problem -- 5.2 Example of Code Rationalization in Three Haskell Iterations -- 5.3 Final Remarks Related to the Presented Use Case -- 6 Conclusions -- References -- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Two-Phase Locking (2PL) Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Energy-Efficient Two-Phase Locking (EE2PL) Protocol -- 3.1 Meaningless Write Methods -- 3.2 Energy-Efficient 2PL (EE2PL) Protocol -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media -- 1 Introduction -- 2 Related Work -- 3 Co-owned Image Sharing -- 3.1 Multi-agent Model -- 4 Experimental Setup and Results -- 4.1 Results -- 5 Conclusion -- References -- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks -- 1 Introduction -- 2 Preliminary Assumptions for Analysis -- 3 Structural Controllability Restoration -- 3.1 STG-1: Strategy Using Backup Instances -- 3.2 STG-2: Strategy Using Edge Allocation.
3.3 STG-3: Strategy Using Diameter-Based Relinking -- 3.4 STG-4: Driver Node Injection Strategy -- 4 Experimental Results and Discussion -- 4.1 Network and Attacks Models -- 4.2 Analysis and Validation -- 4.3 Time Complexity Analysis -- 5 Conclusion and Future Work -- References -- Resource Authorization Methods for Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Requirements for the Authorization on Edge Computing Models -- 3.1 Edge Computing Models -- 3.2 Requirement for Applying the OAuth Flow to Resource Authorization on Edge Computing -- 4 Participant Relationships in Edge Computing Authorization -- 4.1 Concept of Privilege Delegation Model -- 4.2 Pattern Classification by Participant Relationship -- 4.3 Use Case of Each Pattern -- 4.4 Authorization Flow on Each Pattern -- 5 Discussion for Authorization Flow -- 5.1 Identifying User Location -- 5.2 Comparison with Original Flow -- 6 Conclusion -- References -- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Method -- 3.2 Dataset and Classification Features -- 4 Evaluation -- 4.1 Classification Results -- 4.2 Computational Performance -- 5 Conclusion -- References -- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 System Architecture -- 3.2 Data -- 3.3 Implementation -- 4 Evaluation Results -- 5 Conclusion -- References -- Automatic Monitoring System for Security Using IoT Devices and Smart Contracts -- 1 Introduction -- 2 Predicting the Failure of IoT Devices -- 3 Related Work -- 4 Proposed Method -- 4.1 System Flow -- 4.2 Concrete Example -- 5 Experiment -- 5.1 Experimental Methods and Results -- 5.2 Discussion -- 6 Conclusion -- References.
A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet.
Record Nr. UNINA-9910558499803321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced information networking and applications . Volume 3 : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Advanced information networking and applications . Volume 3 : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (697 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Artificial intelligence
ISBN 3-030-99619-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- LSTM-Based Reinforcement Q Learning Model for Non Intrusive Load Monitoring -- 1 Introduction -- 2 Related Work -- 3 Design of the Proposed Intelligent Algorithm -- 3.1 Recurrent Long Short-Term Memory (LSTM).
3.2 Reinforcement Learning: Q-Reinforcement Learning -- 3.3 Proposed Model: Reinforcement Learning Based on Recurrent LSTM -- 3.4 Description of the Training Database for NILM -- 3.5 Evaluation Metrics -- 4 Simulation Results -- 5 Conclusion -- References -- Machine Learning for Student QoE Prediction in Mobile Learning During COVID-19 -- 1 Introduction -- 2 QoE Definition and Metric -- 3 Proposed Framework -- 3.1 Student Engagement Detection Module -- 4 QoE Estimation for MOS Prediction -- 5 Conclusion -- References -- XceptionUnetV1: A Lightweight DCNN for Biomedical Image Segmentation -- 1 Introduction -- 2 Motivation -- 3 Proposed Model -- 3.1 Xception Units -- 3.2 Residual Learning -- 3.3 Atrous Convolution -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Network Architecture -- 4.3 Loss Function -- 4.4 Training and Testing -- 4.5 Comparative Results -- 5 Conclusion -- References -- A Proposed Intrusion Detection Method Based on Machine Learning Used for Internet of Things Systems -- 1 Introduction -- 2 Methodology -- 3 Related Works -- 3.1 Binary Classification -- 3.2 Multi-class Classification -- 4 Evaluation Metrics for Classification Models -- 4.1 ML Algorithms -- 4.2 Evaluation Fundamental -- 5 Proposed Method and Simulation -- 5.1 Proposed Method Motivation -- 6 Implementation -- 7 Simulation -- 8 Conclusion -- References -- Shape Trajectory Analysis Based on HOG Descriptor for Isolated Word Sign Language Recognition -- 1 Introduction -- 2 Trajectories Matrix Extraction -- 2.1 The Static-Level -- 2.2 The Dynamic-Level -- 3 Shape Trajectory Analysis -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Test Protocol -- 4.3 Results -- 4.4 Comparative Study with Existing Work -- 5 Conclusion and Future Works -- References -- How Australians Are Coping with the Longest Restrictions: An Exploratory Analysis of Emotion and Sentiment from Tweets.
1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Experiment -- 4 Results and Discussion -- 5 Conclusion -- References -- COVID-19 Article Classification Using Word-Embedding and Extreme Learning Machine with Various Kernels -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Word Embedding -- 3.3 Feature Selection Techniques -- 3.4 Extreme Learning Machine -- 4 Research Methodology -- 5 Empirical Results and Analysis -- 5.1 Comparative Analysis -- 5.2 Word-Embedding -- 5.3 Feature Selection -- 5.4 Extreme Learning Machine -- 5.5 Title and Content -- 6 Conclusion -- References -- An Improved Ant Colony Optimization Based Parking Algorithm with Graph Coloring -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 ACO -- 4 Model Definition -- 5 An Ant Colony Optimization Parking Algorithm -- 5.1 Graph Coloring -- 5.2 The Pheromone Model -- 5.3 Constraint Relaxation -- 5.4 The Algorithm -- 6 Valuation -- 6.1 Simulation Results -- 6.2 Benchamarks -- 7 Conclusions -- References -- A Review About Machine and Deep Learning Approaches for Intelligent User Interfaces -- 1 Introduction -- 1.1 Application Trends for Intelligent User Interfaces -- 2 IUIs Overview -- 3 IUIs Classification -- 3.1 Machine Learning-Based Papers -- 3.2 Deep Neural Network-Based Papers -- 4 Conclusions -- References -- A Survey on Neural Recommender Systems: Insights from a Bibliographic Analysis -- 1 Introduction -- 2 Conventional and Deep Learning Approaches to Recommendation -- 2.1 Conventional Approaches -- 2.2 Neural Approaches -- 3 Bibliographic Analysis -- 4 Conclusions -- References -- Information Networking and e-Government in United Nations and Europe -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Empirical Results -- 5 Discussion -- 6 Conclusions -- References.
A Microservices Based Architecture for the Sentiment Analysis of Tweets -- 1 Introduction -- 2 The Container Based Framework -- 2.1 Design of the Framework -- 3 Platform Implementation -- 4 Conclusion and Future Works -- References -- Container-Based Platform for Computational Medicine -- 1 Introduction -- 2 Descriptions of the Functionality Provided by Atmosphere -- 3 New Architecture Based on Containerization Concept -- 3.1 Design Providing Functionality for Administrators -- 3.2 Design Providing Functionality for Developers -- 3.3 Design Providing Functionality for End-Users -- 4 Container-Based Platform -- 5 Implementation and Proof of Concept -- 6 Conclusion -- References -- Digital Twins for Autonomic Cloud Application Management -- 1 Introduction -- 2 The Cloud Application and Its Digital Twin -- 2.1 Cloud Application Modelling -- 2.2 Digital Twins -- 2.3 Optimized Cloud Application Management -- 3 Abstract Behavioral Specification Model as the Digital Twin -- 3.1 The Abstract Behavioral Specification Language -- 3.2 Modelling Cloud Applications with ABS -- 4 Discussion -- 5 Conclusion -- References -- Opportunities and Advantages of Cloud Migration of a Smart Restaurant System -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Smart Restaurant System Architecture -- 5 Cloud Migration of Smart Restaurant System -- 5.1 Agnostic Cloud Architecture -- 5.2 AWS Cloud Architecture -- 6 Conclusion -- References -- Analysis of Techniques for Mapping Convolutional Neural Networks onto Cloud Edge Architectures Using SplitFed Learning Method -- 1 Introduction -- 2 Background and Related Works -- 3 Federate Learning -- 3.1 Split Learning -- 3.2 SplitFed Learning -- 4 Computational and Architectural Patterns for Federate Learning -- 5 An Implementation Proposal of CNN in Federate Learning -- 6 Conclusion -- References.
In-cloud Migration of a Custom and Automatic Booking System -- 1 Introduction -- 2 Background and Related Work -- 3 Off-Cloud Booking System Architecture -- 4 In-Cloud Migration of on Premise Custom and Automatic Lodge Booking System -- 4.1 Agnostic Cloud Architecture -- 4.2 AWS Cloud Architecture -- 5 Conclusions and Future Works -- References -- Anomalous Witnesses and Registrations Detection in the Italian Justice System Based on Big Data and Machine Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 The Data Analysis Pipeline -- 4 Anomalies Detection -- 4.1 Identification of ``Serial Witnesses'' -- 4.2 Recognition of Anomalous Registrations -- 5 Microservices Architecture -- 6 Conclusion and Future Works -- References -- A NLP Framework to Generate Video from Positive Comments in Youtube -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 5 Conclusion -- References -- Smart Insole Monitoring System for Fall Detection and Bad Plantar Pressure -- 1 Introduction -- 2 Related Works -- 3 Gait Analysis -- 4 Hardware and Software Design -- 4.1 Hardware Descriptions -- 4.2 Software Implementation -- 5 Conclusion -- References -- A Recommendation Method of Health Articles Based on Association Rules for Health Terms Appeared on Web Documents and Their Application Systems -- 1 Introduction -- 2 Rerated Work -- 3 Proposed Method -- 3.1 Overview -- 3.2 Extraction of Association Rules -- 3.3 Calculation of Recommendation Score for Health Articles -- 4 Experiment -- 4.1 Experimental Purpose -- 4.2 Experimental Environment -- 4.3 Experimental Method -- 4.4 Experimental Result -- 5 Conclusion -- References -- A Voronoi Edge and CCM-Based SA Approach for Mesh Router Placement Optimization in WMNs: A Comparison Study for Different Edges -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed Method.
3.1 CCM for Mesh Router Placement Optimization.
Record Nr. UNINA-9910558491003321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced information networking and applications . Volume 2 : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Advanced information networking and applications . Volume 2 : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (728 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Computer networks
ISBN 3-030-99587-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- A Fuzzy-Based System for Determining Driver Stress in VANETs Considering Driving Experience and History -- 1 Introduction -- 2 Overview of VANETs -- 3 Proposed Fuzzy-Based System -- 4 Simulation Results -- 5 Conclusions -- References.
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Instances: A Comparison Study for RDVM and LDIWM Replacement Methods -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Millimeter-Wave Dual-Band Slotted Antenna for 5G Applications -- 1 Introduction -- 2 Antenna Design -- 2.1 Design Equations -- 2.2 Antenna Specification -- 2.3 Substrate Material Selection -- 3 Result Analysis -- 3.1 Bandwidth -- 3.2 2-D Radiation Pattern -- 3.3 Directivity, Gain and Efficiency -- 3.4 VSWR, Reflection Co-efficient or S-Parameter -- 4 Comparative Analysis -- 5 Future Work -- 6 Conclusion -- References -- NARUN-PC: Caching Strategy for Noise Adaptive Routing in Utility Networks -- 1 Introduction -- 1.1 Research Problem -- 1.2 Paper Contribution -- 2 NARUN and NARUN-PC Protocols -- 3 Simulation -- 3.1 Experimental Results -- 4 Conclusions and Future Work -- References -- HYPE: CNN Based HYbrid PrEcoding Framework for 5G and Beyond -- 1 Introduction -- 2 System Model and Problem Formulation -- 3 HYPE: CNN Based HYbrid PrEcoding Framework for 5G and Beyond -- 3.1 Acquiring Partial CSI -- 3.2 Structure of HP-CNN -- 3.3 Training Strategy of HP-CNN -- 4 Simulation Results and Discussions -- 5 Conclusion and Future work -- References -- The Multi-access Edge Computing (MEC)-Based Bit Rate Adaptive Multicast SVC Streaming Using the Adaptive FEC Mechanism -- 1 Introduction -- 2 Relative Work -- 3 Bandwidth Estimation and Adaptive FEC -- 4 The Proposed MM-CSVC Method -- 5 Performance Evaluation -- 6 Conclusion -- References -- PROA: Pipelined Receiver Oriented Anycast MAC for IoT -- 1 Introduction -- 2 Related Work -- 3 PROA Protocol.
3.1 Anycast Communication -- 3.2 Two Phase Transmission Process -- 3.3 Segmented Transmission -- 3.4 Imminent Collision -- 3.5 FCS Selection -- 4 Experimental Results -- 4.1 Setup -- 4.2 Results -- 5 Conclusion -- References -- A Watchdog Proposal to a Personal e-Health Approach -- 1 Introduction -- 2 Related Work -- 3 Stress and Anxiety Prediction Architecture -- 4 Experimental Results -- 4.1 Body Sensors Data -- 4.2 Monitoring Environment Solution -- 5 Conclusions and Future Works -- References -- Computation Offloading by Two-Sided Matching in Fog Computing -- 1 Introduction -- 2 Related Research -- 2.1 Fog Computing -- 2.2 Computation Offloading -- 2.3 Matching Theory -- 3 Student Project Allocation -- 4 Experiment and Results -- 5 Summary and Future Work -- References -- Distributed Log Search Based on Time Series Access and Service Relations -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Rule Generator -- 3.2 Log Searcher -- 4 Implementation -- 5 Experimental Results -- 6 Discussion and Conclusions -- References -- Detector: Hierarchical Distributed Fault Detection Algorithm for Lattice Based Modular Robots -- 1 Introduction -- 2 Background -- 3 Detector: Disconnection Detection -- 3.1 Definitions -- 3.2 The Proposed Algorithm -- 4 Simulation Results -- 5 Conclusion -- References -- ManufactSim: Manufacturing Line Simulation Using Heterogeneous Distributed Robots -- 1 Introduction -- 2 Industrial Context -- 3 Related Work -- 4 Our Proposal -- 5 Experiments -- 6 Conclusion -- References -- Sports Data Management, Mining, and Visualization -- 1 Introduction -- 2 Background -- 2.1 Bell Curve -- 2.2 Linear Regression -- 2.3 Pythagorean Expectation -- 3 Our Sports Data Mining Solution -- 3.1 Data Collection -- 3.2 Outcome Prediction -- 4 Evaluation -- 4.1 Bell Curve Expectation -- 4.2 Linear Regression.
4.3 Pythagorean Expectation -- 5 Conclusions -- References -- Mining for Fake News -- 1 Introduction -- 2 Related Works -- 3 Our Fake News Mining Solution -- 3.1 Data Cleaning -- 3.2 Vectorization -- 3.3 News Classification -- 4 Evaluation -- 5 Conclusions -- References -- Software Functional and Non-function Requirement Classification Using Word-Embedding -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Data Normalization -- 3.3 Feature Extraction using Word Embedding -- 3.4 Feature Selection and Dimensionality Reduction -- 3.5 Classification -- 3.6 Minority Oversampling -- 4 Research Methodology -- 5 Empirical Results and Analysis -- 5.1 Comparative Analysis -- 5.2 Word-Embedding -- 5.3 Classification Techniques -- 5.4 Feature Selection Techniques -- 5.5 SMOTE -- 6 Conclusion -- References -- Topic Guided Image Captioning with Scene and Spatial Features -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Visual Feature Extraction -- 3.2 Textual Feature Extraction -- 4 Experiments -- 5 Conclusion -- References -- A Socially-Aware, Privacy-Preserving, and Scalable Federated Learning Protocol for Distributed Online Social Networks -- 1 Introduction -- 2 Related Work -- 3 Solution -- 3.1 Construction of Socially-Aware Random Overlay -- 3.2 Push-Based Merging Gossip Federated Learning -- 4 Evaluation -- 5 Experiment Results -- 5.1 Successful Construction of a Random Overlay on the Fly by the Sampling Service -- 5.2 Removal of the Sampling Bias in Random Overlay -- 5.3 Convergence of all the Network Nodes to a Similar Model -- 5.4 Comparison of Prediction Error with Centralized Training -- 6 Conclusions and Future Work -- References -- A Multi-layer Modeling for the Generation of New Architectures for Big Data Warehousing -- 1 Introduction -- 2 Related Works.
3 Contribution: A New Multi-layered Conceptual Model for Big Data Warehousing -- 4 Validation of the Proposed Model: An Implementation for Multi-source Data Warehousing and Analysis -- 4.1 Proposed Business Model Process -- 4.2 An Architecture for COVID-19 Data Warehousing and Analysis -- 5 Results Analysis and Interpretation -- 6 Discussion and Findings -- 7 Conclusion -- References -- Efficient Retransmission Algorithm for Ensuring Packet Delivery to Sleeping Destination Node -- 1 Introduction -- 2 Related Work -- 2.1 Pure Flooding -- 2.2 Probabilistic Flooding -- 3 Background -- 3.1 Sleeping Mechanism -- 3.2 Full Retransmission Algorithm -- 4 Probabilistic Retransmission Algorithm -- 5 Evaluation -- 6 Conclusion -- References -- The Development of an Elderly Monitoring System with Multiple Sensors -- 1 Introduction -- 2 Background -- 2.1 Pifaa -- 3 Proposed system -- 3.1 Overview -- 3.2 Selecting and Discarding Sensors -- 3.3 Using Camera Images -- 4 Application to Display the Results -- 4.1 Overview -- 4.2 Native and Web Versions of the Application -- 4.3 Data Interpretation -- 5 Related Research -- 6 Summary -- References -- Predicting Cyber-Attacks on IoT Networks Using Deep-Learning and Different Variants of SMOTE -- 1 Introduction -- 2 Related Work -- 3 Study Design -- 3.1 Experimental Dataset -- 3.2 Feature Selection Techniques -- 3.3 Deep Learning Architecture -- 3.4 SMOTE -- 4 Results and Analysis -- 5 Comparative Analysis -- 5.1 Sampling Techniques -- 5.2 Feature Selection Techniques -- 5.3 Deep Learning Technique -- 5.4 Cost Benefit Analysis -- 6 Conclusion -- References -- A Decentralized Federated Learning Architecture for Intrusion Detection in IoT Systems -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Decentralized Federated Learning-Based IDS for IoT -- 5 Discussion -- 6 Conclusions and Future Work -- References.
Regression Analysis Using Machine Learning Approaches for Predicting Container Shipping Rates.
Record Nr. UNINA-9910558485703321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Networking and Applications : Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019) / / edited by Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido
Advanced Information Networking and Applications : Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019) / / edited by Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (1,357 pages)
Disciplina 004.6
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-15032-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Electricity Load Forecasting in Smart Grids using Support Vector Machine -- Optimization of Response and Processing Time for Smart Societies using Particle Swarm Optimization and Levy Walk -- On Maximizing User Comfort using a Novel Meta-Heuristic Technique in Smart Home -- Towards Efficient Energy Management in a Smart Home using Updated Population -- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid -- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid -- Minimizing Daily Electricity Cost using Bird Chase Scheme with Electricity Management Controller in a Smart Home -- Optimal Power Flow with Uncertain Renewable Energy Sources using Flower Pollination Algorithm -- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems -- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses.
Record Nr. UNINA-9910483016403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Networking and Applications : Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020) / / edited by Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa
Advanced Information Networking and Applications : Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020) / / edited by Leonard Barolli, Flora Amato, Francesco Moscato, Tomoya Enokido, Makoto Takizawa
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (1,535 pages)
Disciplina 004.6
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
ISBN 3-030-44041-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483510103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network-Based Information Systems : The 21st International Conference on Network-Based Information Systems (NBiS-2018) / / edited by Leonard Barolli, Natalia Kryvinska, Tomoya Enokido, Makoto Takizawa
Advances in Network-Based Information Systems : The 21st International Conference on Network-Based Information Systems (NBiS-2018) / / edited by Leonard Barolli, Natalia Kryvinska, Tomoya Enokido, Makoto Takizawa
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (1,024 pages)
Disciplina 001.64404
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-98530-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Fuzzy-based System for Actor Node Selection in WSANs for Improving Network -- A Fuzzy-based Approach for Improving Peer Awareness and Group Synchronization in MobilePeerDroid System -- A Position Detecting System Using Supersonic Sensors for Omnidirectional Wheelchair Tennis -- Distributed Approach for Detecting Collusive Interest Flooding Attack on Named Data Networking -- An Energy-efficient Dynamic Live Migration of Multiple Virtual Machines -- Developing a Low-cost Thermal Camera for Industrial Predictive Maintenance Applications -- Effective Resource Allocation in Fog for Efficient Energy Distribution -- Efficient Energy Management using Fog Computing -- Deterrence System for Texting-While-Walking Focused on User Situation -- Slovak Broadcast News Speech Recognition and Transcription System -- Implementation of Mass Transfer Model on Parallel Computational System.
Record Nr. UNINA-9910484926203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network-Based Information Systems : The 20th International Conference on Network-Based Information Systems (NBiS-2017) / / edited by Leonard Barolli, Tomoya Enokido, Makoto Takizawa
Advances in Network-Based Information Systems : The 20th International Conference on Network-Based Information Systems (NBiS-2017) / / edited by Leonard Barolli, Tomoya Enokido, Makoto Takizawa
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (LV, 1154 p. 627 illus.)
Disciplina 004.6
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
Telecommunication
Artificial intelligence
Computational Intelligence
Communications Engineering, Networks
Artificial Intelligence
ISBN 3-319-65521-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910299884603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in networked-based information systems : the 23rd International Conference on Network-Based Information Systems (NBiS-2020) / / editors, Leonard Barolli [et al.]
Advances in networked-based information systems : the 23rd International Conference on Network-Based Information Systems (NBiS-2020) / / editors, Leonard Barolli [et al.]
Edizione [1st edition 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (639 pages)
Disciplina 004.6
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computer networks
Information networks
Network computers
ISBN 3-030-57811-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483750103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Networked-based Information Systems : The 22nd International Conference on Network-Based Information Systems (NBiS-2019) / / edited by Leonard Barolli, Hiroaki Nishino, Tomoya Enokido, Makoto Takizawa
Advances in Networked-based Information Systems : The 22nd International Conference on Network-Based Information Systems (NBiS-2019) / / edited by Leonard Barolli, Hiroaki Nishino, Tomoya Enokido, Makoto Takizawa
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (778 pages)
Disciplina 006.3
004.6
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Telecommunication
Engineering - Data processing
Application software
Computational Intelligence
Communications Engineering, Networks
Data Engineering
Computer and Information Systems Applications
ISBN 3-030-29029-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483287303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui