Vai al contenuto principale della pagina

Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Advanced information networking and applications : proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) / / edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (717 pages)
Disciplina: 004.6
Soggetto topico: Artificial intelligence
Persona (resp. second.): EnokidoTomoya
BarolliLeonard
TakizawaMakoto
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- An Approach for Mitigating Disruptions on Resources' Consumption Cycles -- 1 Introduction -- 2 Related Work -- 3 Resource Consumption in Brief -- 3.1 Consumption Properties -- 3.2 Disruption Handling -- 4 Scenarios to Mitigate Disruptions.
5 PN-based Verification of Consumption Cycles -- 6 Conclusion -- References -- Text Detection and Recognition Using Augmented Reality and Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Text detection and recognition based on Deep learning method -- 2.2 Text Detection and Recognition Based on Augmented Reality Method -- 3 Proposed Approach -- 3.1 Text Detection and Recognition Using DL -- 3.2 Text Visualization Using AR -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Energy Consumption Model of Servers to Make Virtual Machines Migrate -- 1 Introduction -- 2 Power Consumption and Computation Models of a Server -- 3 An Estimation Model of Energy Consumption -- 4 Migration of Virtual Machines -- 4.1 Energy Consumption for Migration of a Virtual Machine -- 4.2 Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- Development of a Blockchain-Based Ad Listing Application -- 1 Introduction -- 2 Terminology and Literature Review -- 3 Methodology -- 4 Design and Implementation -- 5 Conclusion and Future Work -- References -- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses -- 1 Introduction -- 2 Proposed Approach -- 2.1 Main Workflows -- 2.2 Neighborhood Rough Set and Three-Way Decisions -- 2.3 Time-Related Aspects of the Approach -- 3 Case Study -- 3.1 Dataset Description and Preparation -- 3.2 Experimentation and Evaluation -- 4 Final Remarks -- References -- Enhanced Autonomous Driving Through Improved 3D Objects Detection -- 1 Introduction -- 2 Presentation of the Proposed Model -- 2.1 Description of the Objects Detection Component -- 3 The Experimental Dataset -- 4 The Training Process -- 5 Presentation of the Performance Assessment Process -- 5.1 Performance Assessment Metrics -- 5.2 Investigation Concerning the Number and Placement of Sensors.
5.3 Remarks Regarding Additional Road Traffic Scenarios -- 6 Conclusions and Future Work -- References -- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel -- 1 Introduction -- 2 The Principle of Studied WuR-Based MAC -- 2.1 WuR-CA -- 2.2 WuR-NCA -- 3 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Throughput -- 4.3 Delay -- 4.4 Power Consumption -- 5 Results and Discussion -- 5.1 Variation in Number of Nodes -- 5.2 Effect of the Traffic Load -- 5.3 Variation in Data Packet Length -- 5.4 Variation in BER -- 6 Conclusion -- References -- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks -- 1 Introduction -- 2 Related Work -- 3 Protocol Design and DTMC Modeling of CaWuQoS-MAC -- 3.1 Protocol Design -- 3.2 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Delay -- 4.3 Power Consumption -- 5 Results and Discussion -- 5.1 Performance Analysis with Variable N -- 5.2 Performance Analysis vs. BER -- 5.3 Performance Analysis with Variable Traffic Load -- 6 Conclusion -- References -- A Dynamic ID Assignment Approach for Modular Robots -- 1 Introduction -- 2 Background on Unique ID Assignment -- 3 Dynamic ID Assignment Algorithm -- 3.1 Module Removal Handling -- 3.2 Module Addition Handling -- 4 Discussion -- 5 Experimental results -- 6 Conclusion and Future Work -- References -- Open-Source Publish-Subscribe Systems: A Comparative Study -- 1 Introduction -- 2 Related Work and Background -- 3 Functional Evaluation and Comparison -- 4 Performance Evaluation and Comparison -- 4.1 Experimental Results -- 5 Conclusions and Future Work -- References -- Conceptual Foundations of Code Rationalization Through a Case Study in Haskell -- 1 Introduction -- 2 Relevant Existing Contributions.
3 The Theoretical and Technological Fundamentals of Code Rationalization -- 3.1 Compliance with the Fundamental Principles of Software Systems Engineering -- 3.2 Elaboration and Systematic Utilization of Design Patterns -- 3.3 Elaboration and Systematic Utilization of Implementational Patterns -- 3.4 Consideration of the Optimal Programming Paradigms for a Certain Type of Problem -- 4 Generic Code Rationalization -- 4.1 Problem Statement -- 4.2 Code Rationalization as a Process to Seek the Optimal State of the Software Systems -- 5 Case Study -- 5.1 The Considered Problem -- 5.2 Example of Code Rationalization in Three Haskell Iterations -- 5.3 Final Remarks Related to the Presented Use Case -- 6 Conclusions -- References -- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Two-Phase Locking (2PL) Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Energy-Efficient Two-Phase Locking (EE2PL) Protocol -- 3.1 Meaningless Write Methods -- 3.2 Energy-Efficient 2PL (EE2PL) Protocol -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media -- 1 Introduction -- 2 Related Work -- 3 Co-owned Image Sharing -- 3.1 Multi-agent Model -- 4 Experimental Setup and Results -- 4.1 Results -- 5 Conclusion -- References -- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks -- 1 Introduction -- 2 Preliminary Assumptions for Analysis -- 3 Structural Controllability Restoration -- 3.1 STG-1: Strategy Using Backup Instances -- 3.2 STG-2: Strategy Using Edge Allocation.
3.3 STG-3: Strategy Using Diameter-Based Relinking -- 3.4 STG-4: Driver Node Injection Strategy -- 4 Experimental Results and Discussion -- 4.1 Network and Attacks Models -- 4.2 Analysis and Validation -- 4.3 Time Complexity Analysis -- 5 Conclusion and Future Work -- References -- Resource Authorization Methods for Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Requirements for the Authorization on Edge Computing Models -- 3.1 Edge Computing Models -- 3.2 Requirement for Applying the OAuth Flow to Resource Authorization on Edge Computing -- 4 Participant Relationships in Edge Computing Authorization -- 4.1 Concept of Privilege Delegation Model -- 4.2 Pattern Classification by Participant Relationship -- 4.3 Use Case of Each Pattern -- 4.4 Authorization Flow on Each Pattern -- 5 Discussion for Authorization Flow -- 5.1 Identifying User Location -- 5.2 Comparison with Original Flow -- 6 Conclusion -- References -- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Method -- 3.2 Dataset and Classification Features -- 4 Evaluation -- 4.1 Classification Results -- 4.2 Computational Performance -- 5 Conclusion -- References -- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 System Architecture -- 3.2 Data -- 3.3 Implementation -- 4 Evaluation Results -- 5 Conclusion -- References -- Automatic Monitoring System for Security Using IoT Devices and Smart Contracts -- 1 Introduction -- 2 Predicting the Failure of IoT Devices -- 3 Related Work -- 4 Proposed Method -- 4.1 System Flow -- 4.2 Concrete Example -- 5 Experiment -- 5.1 Experimental Methods and Results -- 5.2 Discussion -- 6 Conclusion -- References.
A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet.
Titolo autorizzato: Advanced Information Networking and Applications  Visualizza cluster
ISBN: 3-030-99584-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910558499803321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems