Vai al contenuto principale della pagina

Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Innovative Mobile and Internet Services in Ubiquitous Computing : Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Hsing-Chung Chen Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Edizione: 1st ed. 2022.
Descrizione fisica: 1 online resource (544 pages)
Disciplina: 006.3
Soggetto topico: Computational intelligence
Engineering - Data processing
Wireless communication systems
Mobile communication systems
Computational Intelligence
Data Engineering
Wireless and Mobile Communication
Persona (resp. second.): BarolliLeonard
YimKangbin
ChenHsing-Chung
Nota di contenuto: Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function.
3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning.
2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes.
2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References.
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References.
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Sommario/riassunto: This book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services.
Titolo autorizzato: Innovative Mobile and Internet Services in Ubiquitous Computing  Visualizza cluster
ISBN: 3-030-79728-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910522969703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems, . 2367-3389 ; ; 279