Vai al contenuto principale della pagina
Titolo: | Advances on broad-band wireless computing, communication and applications : proceedings of the 16th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2021) / / Leonard Barolli, editor |
Pubblicazione: | Cham, Switzerland : , : Springer, , [2022] |
©2022 | |
Descrizione fisica: | 1 online resource (365 pages) |
Disciplina: | 621.382 |
Soggetto topico: | Broadband communication systems |
Wireless communication systems | |
Persona (resp. second.): | BarolliLeonard |
Nota di contenuto: | Intro -- Welcome Message of BWCCA-2021 International Conference Organizers -- BWCCA-2021 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- Finance Chair -- Web Administrator Chairs -- Local Organizing Co-chairs -- Steering Committee Chair -- Track Areas -- 1. Next Generation Wireless Networks -- Track Co-chairs -- PC Members -- 2. Cloud and Service Computing -- Track Co-chairs -- PC Members -- 3. Multimedia and Web Applications -- Track Co-chairs -- PC Members -- 4. Security and Privacy -- Track Co-chairs -- PC Members -- 5. Network Protocols and Performance Analysis -- Track Co-chairs -- PC Members -- 6. Intelligent and Cognitive Computing -- Track Co-chairs -- PC Members -- 7. Distributed and Parallel Computing -- Track Co-chairs -- PC Members -- 8. IoT and Smart Environment -- Track Co-chairs -- PC Members -- 9. Database, Data Mining, and Big Data -- Track Co-chairs -- PC Members -- 10. Ubiquitous and Pervasive Computing -- Track Co-chairs -- PC Members -- BWCCA-2021 Reviewers -- BWCCA-2021 Keynote Talks -- Developing Trustworthy Artificial Intelligencs -- Pandemic Prevention by Technology - The Contactless Healthcare via The IoT Platform -- Contents -- A Comparison Study of Chi-square and Uniform Distributions of Mesh Clients by WMN-PSODGA Simulation System for RIWM and LDIWM Router Replacement Methods -- 1 Introduction -- 2 Intelligent Algorithms for Proposed Hybrid Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Distributed Genetic Algorithm -- 3 Proposed and Implemented WMN-PSODGA Hybrid Intelligent Simulation System -- 4 Simulation Results -- 5 Conclusions -- References -- Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Number of Mesh Routers and Chi-Square Distribution of Mesh Clients -- 1 Introduction. |
2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- An Energy-Efficient Algorithm to Make Virtual Machines Migrate in a Server Cluster -- 1 Introduction -- 2 System Model -- 3 A Modified MI (MMI) Estimation Algorithm -- 4 A Migration Algorithm of Virtual Machines -- 5 Evaluation -- 6 Concluding Remarks -- References -- Evaluation of Focused Beam Routing Protocol for Different Applications of Underwater Sensor Networks -- 1 Introduction -- 2 Focused Beam Routing -- 3 Implementation of FBR in the ONE Simulator -- 4 Underwater Applications -- 5 Simulations -- 6 Conclusions and Future Works -- References -- Performance Evaluation of V2X Communication for Road State Information Platform Based on 5G and HighSpeed LAN -- 1 Introduction -- 2 Related Works -- 3 System Configuration -- 4 Cognitive Wireless Network -- 4.1 920 MHz Band LPWA -- 4.2 2.4 GHz Band WLAN -- 4.3 5.6 GHz Band WLAN -- 4.4 28 GHz Band 5G -- 5 Prototype and Performance Evaluation -- 5.1 Performance Results by Highspeed LAN -- 5.2 Performance Results by 5G -- 6 Conclusion -- References -- An Energy-Efficient Process Replication by Differentiating Starting Time of Process Replicas in Virtual Machine Environments -- 1 Introduction -- 2 System Model -- 2.1 A Server Cluster System with Virtual Machines -- 2.2 Computation Model -- 2.3 Power Consumption Model -- 3 Process Replication -- 3.1 The RATB Algorithm -- 3.2 The RATB-DSTPR Algorithm -- 4 Evaluation -- 5 Concluding Remarks -- References -- Traffic Reduction for Information Flow Control in the IoT -- 1 Introduction -- 2 System Model -- 3 Information Flow Control -- 3.1 Protocols -- 3.2 MRCTSD (Minimum Required Capability Token Selection for Devices) Algorithm. | |
3.3 MRCTSS (MRCTS for Subjects) Algorithm -- 4 Experiments -- 4.1 Implementation -- 4.2 Evaluation -- 5 Concluding Remarks -- References -- A Simulation System for Mesh Router Placement in WMNs Considering Coverage Construction Method and Simulated Annealing -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed Method -- 3.1 CCM for Mesh Router Placement Optimization -- 3.2 CCM-based SA for Mesh Router Placement Optimization -- 4 Simulation Results -- 5 Conclusions -- References -- On the Latency of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant Networks -- 1 Introduction -- 2 Related Work -- 2.1 Message Ferry in DTNs and WSNs -- 2.2 Movement Models -- 2.3 Routing Protocols for DTNs -- 3 System Model -- 4 Nomadic Lévy Walk -- 4.1 Sink Relocation Strategy -- 5 Performance Evaluation -- 5.1 Environment -- 5.2 Parameters -- 5.3 Simulation Result -- 6 Conclusion -- References -- A Machine Learning Based Network Intrusion Detection System with Applying Different Algorithm in Multiple Stages -- 1 Introduction -- 2 Related Work -- 2.1 Overview -- 2.2 Methods to Improve Performance -- 2.3 Detection Flow -- 2.4 Evaluation Way and Results -- 3 Verification Method -- 3.1 Outline -- 3.2 Datasets -- 3.3 Pre-verification of Machine Learning Algorithms -- 3.4 Comparison Contents -- 3.5 Data Preprocessing -- 3.6 Evaluation Metrics -- 3.7 Verification Results -- 4 Conclusions -- References -- In-vehicle Network IDS Using Message Time Interval Infrastructure -- 1 Introduction -- 2 Controller Area Network -- 2.1 Structure of CAN Frame -- 2.2 CAN Network Vulnerability -- 3 Propose Instruction Detection System -- 3.1 Attack Scenario -- 3.2 Data Collection -- 3.3 CAN Network Simulation Test Framework -- 3.4 Development of Tools for CAN Network Attack -- 3.5 Message Time Interval -- 4 Experiments -- 5 Conclusions and Future Work -- References. | |
A Fuzzy-Based System for Assessment of Quality of Service Communication Links in SDN-VANETs -- 1 Introduction -- 2 Cloud-Fog-Edge SDN-VANETs -- 3 Proposed Fuzzy-Based System -- 4 Simulation Results -- 5 Conclusions -- References -- Malware Classification Based on Graph Neural Network Using Control Flow Graph -- 1 Introduction -- 2 System Overview -- 2.1 Control Flow Graph Formulation -- 2.2 Node Feature Based on TF-IDF -- 2.3 Classification Model -- 3 Experiment -- 3.1 Dataset -- 3.2 Experiment Design -- 3.3 Evaluation -- 3.4 Results -- 4 Conclusions -- References -- Hand Gesture Input Interface of IntelligentBox Using Leap Motion Controller and Its Application Example -- 1 Introduction -- 2 Related Work -- 2.1 Essential Mechanism of IntelligentBox -- 2.2 Leap Motion Controller -- 3 Hand Gesture Input Interface of IntelligentBox Using Leap Motion Controller -- 3.1 Implementation of the Input Interface -- 3.2 Demonstration -- 4 Discussion -- 4.1 Misrecognition of Leap Motion Controller -- 4.2 Recognition Accuracy of Leap Motion Controller -- 5 Conclusion -- References -- Toward Automated Audit of Client-Side Vulnerability Against Cross-Site Scripting -- 1 Introduction -- 2 Cross Site Scripting (XSS) -- 2.1 Types -- 2.2 Browser Exploitation Framework (BeEF) -- 3 Related Work -- 3.1 Automation of Penetration Testing -- 3.2 Detection Methods of XSS Vulnerabilities -- 4 Proposed Method -- 4.1 Outline -- 4.2 Selecting Modules -- 4.3 Obtaining Results -- 4.4 Algorithm -- 5 Evaluation -- 6 Discussion -- 7 Conclusion -- References -- Single Sign-On Using Contactless Smart Cards and Fingerprint Authentication -- 1 Introduction -- 2 Literature Review -- 3 Smart Card Technologies -- 4 Single Sign-On Using Smartcards and Fingerprint Authentication -- 4.1 Database -- 4.2 Security -- 4.3 Components -- 4.4 Limitations of the Proposed Model -- 5 Application Overview. | |
6 Conclusion and Future Work -- References -- Blockchain-Based Identity Management for Personal Data: A Survey -- 1 Introduction -- 2 Blockchain-Based Identity Management -- 2.1 Privacy of Personal Data in Decentralised Blockchain Systems -- 3 Research Methods -- 3.1 Locating Studies -- 3.2 Study Selection and Evaluation -- 3.3 Analysis and Synthesis -- 4 Analysis -- 4.1 Blockchain-Based Identity Management -- 4.2 Decentralisation of Blockchain -- 4.3 Privacy of Personal Data in Decentralised Blockchain Systems -- 5 Conclusion -- References -- Effects of Buffer Management Considering Time Continuity on Disaster Information on DTN Based Information Sharing System -- 1 Introduction -- 2 DTN -- 2.1 Information Sharing on DTN -- 2.2 Problem of Information Sharing on DTN -- 3 Buffer Management Considering Time Continuity of Disaster Information -- 3.1 Buffer Management Method Considering Time Continuity -- 4 Performance Evaluation -- 4.1 Evaluation Settings -- 4.2 Evaluation Results -- 5 Conclusion -- References -- Fusion Techniques for Strong Data Protection -- 1 Introduction -- 2 The Main Idea of Fusion Technology -- 3 Strong Data Protection Using Fuzion Techniques -- 4 Conclusions -- References -- Predictive Intelligence Approaches for Security Technologies -- 1 Introduction -- 2 Security of Human-Oriented Systems -- 3 Predictive Analysis in Transformative Computing Systems -- 4 Conclusions -- References -- Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure -- 1 Introduction -- 2 Importance of Software Project Progress Monitoring -- 2.1 Burndown Chart to Monitor Project Progress -- 2.2 Advantages and Disadvantages of Burndown Chart -- 3 Situations and Checklist of Progress Delay -- 4 Quantified Measurement Model and Improvement Manner -- 4.1 Quantified Measurement Model of Problem Identification. | |
4.2 Rule-Based Improvement Manner of Delay Problem. | |
Titolo autorizzato: | Advances on Broad-Band Wireless Computing, Communication and Applications |
ISBN: | 3-030-90072-X |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910523784103321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |