top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances on Broad-Band Wireless Computing, Communication and Applications : Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications (BWCCA–2016) November 5–7, 2016, Korea / / edited by Leonard Barolli, Fatos Xhafa, Kangbin Yim
Advances on Broad-Band Wireless Computing, Communication and Applications : Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications (BWCCA–2016) November 5–7, 2016, Korea / / edited by Leonard Barolli, Fatos Xhafa, Kangbin Yim
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (LVII, 903 p. 375 illus.)
Disciplina 620
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Telecommunication
Communications Engineering, Networks
ISBN 3-319-49106-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From the Content -- C++ Memory Check Tool Based on Dynamic Binary Instrumentation Platform -- A Program Behavior Recognition Algorithm Based on Assembly Instruction Sequence Similarity -- Energy-aware Migration of Virtual Machines in a Cluster -- An Energy-efficient Migration Model of Processes with Virtual Machines in a Server Cluster.
Record Nr. UNINA-9910136062203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Complex, Intelligent and Software Intensive Systems : Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Tomoya Enokido
Complex, Intelligent and Software Intensive Systems : Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Tomoya Enokido
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (788 pages)
Disciplina 620.00151
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Dynamics
Nonlinear theories
Computational Intelligence
Data Engineering
Applied Dynamical Systems
Intel·ligència artificial
Informàtica tova
Sistemes complexos
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79725-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message of CISIS-2021 International Conference Organizers -- Organization -- CISIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- International Advisory Board -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrator Chairs -- Steering Committee Chair -- Track Areas and PC Members -- 1. Database and Data Mining Applications -- Sec101 -- Sec102 -- 2. Artificial Intelligence and Bio-inspired Computing -- Sec104 -- Sec105 -- 3. Multimedia Systems and Virtual Reality -- Sec106 -- Sec161 -- 4. Next Generation Wireless Networks -- Sec107 -- Sec108 -- 5. Semantic Web and Web Services -- Sec109 -- Sec110 -- 6. Security and Trusted Computing -- Sec112 -- Sec113 -- 7. HPC and Cloud Computing Services and Orchestration Tools -- Sec116 -- Sec1177 -- 8. Parallel, Distributed and Multicore Computing -- Sec119 -- Sec1200 -- Sec1700 -- Sec121 -- Sec122 -- 10. Complex Systems, Software Modeling and Analytics -- Sec125 -- Sec126 -- 11. Multi-agent Systems, SLA Cloud and Social Computing -- Sec131 -- Sec138 -- 12. Internet of Everything and Machine Learning -- Sec141 -- Sec142 -- CISIS-2021 Reviewers -- CISIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence -- Coevolution of Semantic and Blockchain Technologies -- Contents -- Four Grade Levels-Based Models with Random Forest for Student Performance Prediction at a Multidisciplinary University -- 1 Introduction -- 2 Related Work -- 3 Data Description -- 4 Proposed Approach -- 5 Experimental Results -- 6 Conclusion -- References -- The Role of Collective Engagement to Strengthen Organizational Identity -- Abstract -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 Collaboration and Competition.
2.2 Managerial Motivation and Collective Engagement -- 2.3 Engagement and Community Identity -- 2.4 Collapetition Management Practices -- 3 Method -- 4 Result and Discussion -- 5 Conclusion, Implication and Future Research -- References -- A Novel Structural and Semantic Similarity in Social Recommender Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dependency Graph of Users -- 3.2 Homophily Concept -- 3.3 User Modeling -- 3.4 Structural Information Extraction -- 4 Experiment and Results -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Trustworthy Explainability Acceptance: A New Metric to Measure the Trustworthiness of Interpretable AI Medical Diagnostic Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need for AI Explainability Metrics -- 2.2 Trust Mechanism -- 3 AI Trustworthy Explainability Acceptance Metric -- 4 Evaluating AI System for DCIS Recurrence Prediction -- 4.1 Background -- 4.2 Data -- 4.3 Experiments and Results -- 5 Conclusions -- References -- Entity Relation Extraction Based on Multi-attention Mechanism and BiGRU Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Model Structure -- 3.1 Embedding Layer -- 3.2 BiGRU Neural Network -- 3.3 Multi-attention Strategy -- 4 Experiment and Analysis -- 4.1 Dataset -- 4.2 Settings -- 4.3 Baseline -- 4.4 Results -- 5 Conclusion -- Acknowledgments -- References -- Time Series Prediction of Wind Speed Based on SARIMA and LSTM -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Establishment of Combined Prediction Model Based on SARIMA-LSTM -- 3.1 Seasonal Auto Regressive Integrated Moving Average -- 3.2 Long Short-Term Memory -- 3.2.1 Recurrent Neural Network -- 3.2.2 LSTM -- 3.3 Modeling Process -- 4 Experiment and Analysis -- 4.1 Data Source and Preprocessing.
4.2 SARIMA Model Construction and Testing -- 4.3 SARIMA-LSTM Model Wind Speed Prediction -- 4.4 Error Analysis -- 5 Conclusion -- Acknowledgments -- References -- Dimensionality Reduction on Metagenomic Data with Recursive Feature Elimination -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 3.1 Implementing Process for Study -- 3.2 Using Recursive Feature Elimination for Feature Selection -- 3.3 Using Random Forest Algorithm -- 3.4 Using Feature Selection Randomly for Comparison -- 3.5 Using K-Fold Cross-Validation for Separating Training and Testing Data -- 3.6 Using Scoring Metrics to Evaluate Predicting Results -- 4 Experiments -- 4.1 Dataset -- 4.2 Using RFE with Random Forest Algorithm to Select Features and Train Model -- 4.3 Predicting Results and Comparison with Randomly Selected Features -- 5 Conclusion -- References -- The Application of Improved Grasshopper Optimization Algorithm to Flight Delay Prediction-Based on Spark -- Abstract -- 1 Introduction -- 2 Grasshopper Optimization Algorithm -- 2.1 The Adaptive Descent of S-shaped Curve -- 2.2 Sigmoid Curve Descent Based on Logistic Mapping -- 3 SPGOA-RF Algorithm -- 3.1 Distributed Grasshopper Optimization Algorithm -- 3.2 Optimization of Random Forest Parameter Based on SPGOA -- 4 Simulation Experiment and Analysis -- 4.1 Analysis of the Effectiveness of Improved GOA -- 4.2 Sample Data Set Construction -- 4.3 Flight Delay Detection Analysis -- 4.4 Analysis of Distributed Algorithm Effect -- 5 Conclusion -- Acknowledgments -- References -- Application of Distributed Seagull Optimization Improved Algorithm in Sentiment Tendency Prediction -- Abstract -- 1 Introduction -- 2 Relevant Knowledge -- 3 Improving SOA -- 3.1 Population Uniform Distribution Strategy -- 3.2 Cauchy Mutation -- 3.3 CC-SOA Based on Spark -- 4 Analysis of Experimental Results -- 4.1 Experimental Environment.
4.2 Experimental Analysis -- 5 Conclusion -- Acknowledgments -- References -- Performance Evaluation of WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distribution of Mesh Clients and Different Number of Mesh Routers -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Velocities and Positions of Particles -- 2.2 Routers Replacement Methods -- 2.3 DGA Operations -- 2.4 Fitness and Migration Functions -- 2.5 Particle-Pattern and Gene Coding -- 3 Simulation Results -- 4 Conclusions -- References -- A New Scheme for Slice Overloading Cost in 5G Wireless Networks Considering Fuzzy Logic -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- COVID-Prevention-Based Parking with Risk Factor Computation -- 1 Introduction -- 2 Related Work -- 3 Anti-COVID-Standards-Based Parking -- 3.1 First Phase: Information Loading -- 3.2 Second Phase: Parking Classification -- 3.3 Third Phase: Risk Factor Computation -- 4 Example -- 5 Conclusions -- References -- Coarse Traffic Classification for High-Bandwidth Connections in a Computer Network Using Deep Learning Techniques -- Abstract -- 1 Introduction -- 2 The Proposed Approach -- 2.1 Research Stand -- 2.2 Acquiring Data -- 2.3 Adjusting the Data -- 2.4 Adjusting the Data -- 2.5 Predictive Model -- 2.6 Interpretation of the Results Obtained -- 3 Examples of Application -- 4 Conclusion -- Acknowledgments -- References -- A Privacy Preserving Hybrid Blockchain Based Announcement Scheme for Vehicular Energy Network -- 1 Introduction -- 2 Related Work -- 2.1 Authentication -- 2.2 Trust Management -- 2.3 Privacy -- 2.4 Efficiency -- 3 Problem Statement.
4 System Model -- 4.1 Entities -- 4.2 Conclusion -- References -- Prediction of Wide Area Road State Using Measurement Sensor Data and Meteorological Mesh Data -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Road State Sensor System -- 4 Temporal and Geological Prediction of Road Conditions -- 4.1 Temporal Prediction Method of Road State -- 4.2 Geological Prediction Method of Road State -- 5 Conclusions and Future Works -- Acknowledgments -- References -- A Coverage Construction and Hill Climbing Approach for Mesh Router Placement Optimization: Simulation Results for Different Number of Mesh Routers and Instances Considering Normal Distribution of Mesh Clients -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed System -- 3.1 CCM for Mesh Router Placement Optimization -- 3.2 CCM-based HC for Mesh Router Placement Optimization -- 4 Simulation Results -- 5 Conclusion -- References -- Related Entity Expansion and Ranking Using Knowledge Graph -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Search Log-Based Model -- 5 Search Log and Knowledge Graph-Based Model -- 6 Evaluation -- 7 Conclusion -- References -- Zero Trust Security in the Mist Architecture -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Mist Architecture -- 2.2 Zero Trust Network -- 3 Mist Architecture for ZTN -- 3.1 System Overview -- 3.2 IAM -- 3.3 IAP and IAP Connector -- 3.4 SIEM -- 3.5 MDM -- 3.6 Others -- 4 Evaluations -- 5 Conclusions -- Acknowledgments -- References -- Blockchain Based Authentication for End-Nodes and Efficient Cluster Head Selection in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Registration and Authentication of Nodes -- 2.2 Storage Issues in Network Nodes -- 2.3 Data Privacy of Nodes -- 2.4 Excessive Energy Consumption -- 2.5 Malicious Nodes Detection and Removal from Networks.
2.6 Single Point of Failure Issue Due to Centralized Authority.
Record Nr. UNINA-9910488715903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021)
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021)
Autore Barolli Leonard
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2021
Descrizione fisica 1 online resource (544 pages)
Altri autori (Persone) YimKangbin
ChenHsing-Chung
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 3-030-79728-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function.
3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning.
2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes.
2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References.
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References.
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Record Nr. UNINA-9910497106203321
Barolli Leonard  
Cham : , : Springer International Publishing AG, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen
Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (544 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Wireless communication systems
Mobile communication systems
Computational Intelligence
Data Engineering
Wireless and Mobile Communication
ISBN 3-030-79728-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function.
3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning.
2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes.
2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References.
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References.
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Record Nr. UNINA-9910522969703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui