Stop the war!
Остановите войну!
for scientists:
default search action
33rd AINA 2019: Matsue, Japan
- Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications, AINA 2019, Matsue, Japan, March 27-29, 2019. Advances in Intelligent Systems and Computing 926, Springer 2020, ISBN 978-3-030-15031-0 - Nasir Ayub, Nadeem Javaid, Sana Mujeeb, Maheen Zahid, Wazir Zada Khan, Muhammad Umar Khattak:
Electricity Load Forecasting in Smart Grids Using Support Vector Machine. 1-13 - Ayesha Anjum Butt, Zahoor Ali Khan, Nadeem Javaid, Annas Chand, Aisha Fatima, Muhammad Talha Islam:
Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk. 14-25 - Sajjad Khan, Zahoor Ali Khan, Nadeem Javaid, Waleed Ahmad, Raza Abid Abbasi, Hafiz Muhammad Faisal:
On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home. 26-38 - Hafiz Muhammad Faisal, Nadeem Javaid, Zahoor Ali Khan, Fahad Mussadaq, Muhammad Akhtar, Raza Abid Abbasi:
Towards Efficient Energy Management in a Smart Home Using Updated Population. 39-52 - Waleed Ahmad, Nadeem Javaid, Sajjad Khan, Maria Zuraiz, Tayyab Awan, Muhammad Amir, Raza Abid Abbasi:
A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid. 53-66 - Sahibzada Muhammad Shuja, Nadeem Javaid, Muhammad Zeeshan Rafique, Umar Qasim, Raja Farhat Makhdoom Khan, Ayesha Anjum Butt, Murtaza Hanif:
Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid. 67-81 - Raza Abid Abbasi, Nadeem Javaid, Shujat ur Rehman, Amanullah, Sajjad Khan, Hafiz Muhammad Faisal, Sajawal Ur Rehman Khan:
Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home. 82-94 - Muhammad Abdullah, Nadeem Javaid, Inam Ullah Khan, Zahoor Ali Khan, Annas Chand, Noman Ahmad:
Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm. 95-107 - Shigenari Nakamura, Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems. 108-119 - Shohreh Monshizadeh, Gunne John Hegglid, Svein Thore Hagen:
Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses. 120-131 - Ryuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model. 132-143 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Group Migration of Virtual Machines in a Cluster. 144-155 - Kevin Bylykbashi, Yi Liu, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic. 156-165 - Xiaobing Liang, Bing Zhao, Qian Ma, Bang Sun, Baojiang Cui:
Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System. 166-175 - Marek R. Ogiela, Lidia Ogiela:
Multi-level Authentication Protocols Using Scientific Expertise Approach. 176-180 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Biometric-Based Linguistic Solutions for Data Encryption and Sharing. 181-187 - Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Kamlesh Dutta:
Dependability Analysis for On-Demand Computing Based Transaction Processing System. 188-199 - Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel:
A Comparative Analysis of Trust Requirements in Decentralized Identity Management. 200-213 - Oussama Ghorbel, Aya Ayadi, Rami Ayadi, Mohammed Aseeri, Mohamed Abid:
Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks. 214-224 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods. 225-237 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal. 238-250 - Miralda Cuka, Donald Elmazi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
Selection of IoT Devices in Opportunistic Networks: A Fuzzy-Based Approach Considering IoT Device's Selfish Behaviour. 251-264 - Takahiro Baba, Kensuke Baba, Daisuke Ikeda:
Detecting Mental Health Illness Using Short Comments. 265-271 - Carole Delporte-Gallet, Hugues Fauconnier, Michel Raynal:
On the Weakest Failure Detector for Read/Write-Based Mutual Exclusion. 272-285 - Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
An Active Signaling Mechanism to Reduce Access Collisions in a Distributed TDMA Based MAC Protocol for Vehicular Networks. 286-300 - Hiroki Sakaji, Akio Kobayashi, Masaki Kohana, Yasunao Takano, Kiyoshi Izumi:
Estimation of Tags Using Various Data for Online Videos. 301-312 - Ayesha Ubaid, Fan Dong, Farookh Khadeer Hussain:
Framework for Feature Selection in Health Assessment Systems. 313-324 - Sandhya Rathee, T. Dinesh Ram Kumar, K. Haribabu, Ashutosh Bhatia:
A Framework to Achieve Full Waypoint Enforcement in Hybrid SDN Networks. 325-340 - Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said:
A New Fuzzy Logic Based Model for Location Trust Estimation in Electric Vehicular Networks. 341-352 - Adrián Pekár, Mona B. H. Ruan, Winston K. G. Seah:
Angular Histogram-Based Visualisation of Network Traffic Flow Measurement Data. 353-365 - Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Weibull and Chi-square Client Distributions. 366-375 - Vinícius Fülber Garcia, Leonardo da Cruz Marcuzzo, Giovanni Venâncio de Souza, Lucas Bondan, Jéferson Campos Nobre, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Elias P. Duarte Jr.:
An NSH-Enabled Architecture for Virtualized Network Function Platforms. 376-387 - Hiryu Kawaguchi, Yasunao Takano, Hiroshi Sakuta:
Personal Book Management Application on Blockchain. 388-396 - Shinji Sakamoto, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of WMNs by WMN-PSOSA System Considering Chi-square and Exponential Client Distributions. 397-406 - Masahiro Nissato, Hiroki Sugiyama, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota:
Realization and Preliminary Evaluation of MPI Runtime Environment on Android Cluster. 407-418 - Shridhar Choudhary, Ian Thomas, Mehdi Bahrami, Motoshi Sumioka:
Accelerating the Digital Transformation of Business and Society Through Composite Business Ecosystems. 419-430 - Armielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair:
An IP Multimedia Subsystem Service Discovery and Exposure Approach Based on Opinion Mining by Exploiting Twitter Trending Topics. 431-445 - Piercarlo Fermino Soares, João Carlos Giacomin, Tales Heimfarth:
A Hybrid Cross-Layer Protocol for Wireless Sensor Networks Based on Backbone. 446-457 - Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. 458-469 - Yuma Jitsunari, Yoshitaka Arahori, Katsuhiko Gondow:
Quantifying the Limitations of Learning-Assisted Grammar-Based Fuzzing. 470-484 - Marcus Vinicius Brito da Silva, Arthur Selle Jacobs, Ricardo José Pfitscher, Lisandro Zambenedetti Granville:
Predicting Elephant Flows in Internet Exchange Point Programmable Networks. 485-497 - Doan Quang Tu, A. S. M. Kayes, Wenny Rahayu, Kinh Nguyen:
ISDI: A New Window-Based Framework for Integrating IoT Streaming Data from Multiple Sources. 498-511 - Yasunao Takano, Yusuke Iijima, Kou Kobayashi, Hiroshi Sakuta, Hiroki Sakaji, Masaki Kohana, Akio Kobayashi:
Improving Document Similarity Calculation Using Cosine-Similarity Graphs. 512-522 - Sediane C. L. Hernandes, Marcelo E. Pellenz, Alcides Calsavara, Manoel Camillo Penna:
An Efficient Event-Based Protocol for Emergency Situations in Smart Cities. 523-534 - Takumu Hirooka, Naohiro Hayashibara:
Gossip Message Dissemination Protocols in the Presence of Link Instability. 535-545 - Stefano Bistarelli, Gianmarco Mazzante, Matteo Micheletti, Leonardo Mostarda, Francesco Tiezzi:
Analysis of Ethereum Smart Contracts and Opcodes. 546-558 - Dalton Cézane Gomes Valadares, Joseana Macêdo Fechine Régis de Araújo, Angelo Perkusich, Marco Aurélio Spohn, Elmar Uwe Kurt Melcher, Natália Porfírio Albuquerque:
Towards 802.11g Signal Strength Estimation in an Industrial Environment: A Practical Study. 559-570 - Heru Susanto, Fang-Yie Leu, Didi Rosiyadi, Chen Chin Kang:
Revealing Storage and Speed Transmission Emerging Technology of Big Data. 571-583 - Kenta Goto, Hiroaki Nishino:
A Web-Based Artwork Editing System Empowered by Neural Style Transfer. 584-594 - Yong Zheng, Sridhar Srinivasan:
Mobile App and Malware Classifications by Mobile Usage with Time Dynamics. 595-606 - Fumiai Sato:
Improvement of Self Position Estimation of Electric Wheelchair Combining Multiple Positioning Methods. 607-618 - Seif Ben Chaabene, Taoufik Yeferny, Sadok Ben Yahia:
A Roadside Unit Placement Scheme for Vehicular Ad-hoc Networks. 619-630 - Yong Zheng, Archana Subramaniyan:
Personality-Aware Collaborative Learning: Models and Explanations. 631-642 - João Eurípedes Pereira Júnior, Flávio de Oliveira Silva, João Henrique de Souza Pereira, Pedro Frosi Rosa:
Interfacer: A Model-Driven Development Method for SDN Applications. 643-654 - Gabriel de Carvalho Ferreira, Priscila Solís Barreto, Eduardo Alchieri:
Reducing the IEEE 802.11 Beacon Overhead in Low Mobility Networks. 655-666 - Motoyuki Ohmori, Naoki Miyata, Ichiroh Suzuta:
AXARPS: Scalable ARP Snooping Using Policy-Based Mirroring of Core Switches. 667-676 - Shamanth Nagaraju, V. Sreejith, Nipun Sood, Lucy J. Gudino, Mehul Kasliwal, Rajas Kejriwal:
DCS-MAC: A Distributed Cross-Layer Communication Protocol for Directional Sensor Networks. 677-689 - Helbert da Rocha, Tânia L. Monteiro, Marcelo Eduardo Pellenz, Manuel C. Penna, Joilson Alves Junior:
An MQTT-SN-Based QoS Dynamic Adaptation Method for Wireless Sensor Networks. 690-701 - Jagdeep Singh, Sanjay K. Dhurandher, Isaac Woungang, Makoto Takizawa:
Centrality Based Geocasting for Opportunistic Networks. 702-712 - Richa Siddavaatam, Isaac Woungang, Sanjay Kumar Dhurandher:
An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks. 713-724 - Yu-Ting Wang, Yun-Zhan Cai, Lo-An Chen, Sian-Jhe Lin, Meng-Hsun Tsai:
Backhaul-Based Cooperative Caching in Small Cell Network. 725-736 - Chung-Ming Huang, Duy-Tuan Dao, Meng-Shu Chiang:
A MEC-Assisted Method for Early Handover Using the Fully Distributed Mobility Management (MEC-F-DMM) Architecture. 737-750 - Jihed Ghodhbane, Noureddine Boujnah, Ridha Bouallegue:
Link Level Capacity Analysis of Precoded FBMC/OQAM Systems. 751-761 - Lakshmi Priya Thiruvasakan, Quoc-Tuan Vien, Jonathan Loo, Glenford Mapp:
A QoS-Based Flow Assignment for Traffic Engineering in Software-Defined Networks. 762-774 - Akimitsu Kanzaki, Hideyuki Akagi:
A UAV-Collaborative Sensing Method for Efficient Monitoring of Disaster Sites. 775-786 - Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:
A Scheme to Improve Stream Transaction Rates for Real-Time IoT Applications. 787-798 - Satoru Matsumoto, Tomoki Yoshihisa:
A Video Data Distribution Method for Flexible Bandwidth Allocation in Hybrid Broadcasting Environments. 799-809 - Ilgiz Mustafin, Marius-Cristian Frunza, JooYoung Lee:
Multilingual Entity Matching. 810-820 - Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss. 821-833 - Paulo Vieira Jr., Adriano Fiorese:
VoIP Traffic Management Using a Software-Defined Networking Approach. 834-845 - Basel Magableh, Muder Almiani:
A Self Healing Microservices Architecture: A Case Study in Docker Swarm Cluster. 846-858 - Felipe Borges, Luís Pacheco, Eduardo Alchieri, Marcos F. Caetano, Priscila Solís:
Transparent State Machine Replication for Kubernetes. 859-871 - Chen Yuan, Minoru Uehara:
An Optimal Travel Route Recommendation System for Tourists' First Visit to Japan. 872-882 - Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. 883-894 - Chu-Hsing Lin, Hsuan Chi:
A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks. 895-903 - Chu-Hsing Lin, Hsiao-Wen Lu:
Response to Co-resident Threats in Cloud Computing Using Machine Learning. 904-913 - Hudan Studiawan, Christian Payne, Ferdous Sohel:
Automatic Graph-Based Clustering for Security Logs. 914-926 - Bojie Shen, Md. Saiful Islam, David Taniar, Junhu Wang:
Retrieving Text-Based Surrounding Objects in Spatial Databases. 927-939 - Hirofumi Yamamoto, Hiroki Sakaji, Hiroyasu Matsushima, Yuki Yamashita, Kyohei Osawa, Kiyoshi Izumi, Takashi Shimada:
Forecasting Crypto-Asset Price Using Influencer Tweets. 940-951 - Thanh-Chung Dao, Binh Minh Nguyen, Ba-Lam Do:
Challenges and Strategies for Developing Decentralized Applications Based on Blockchain Technology. 952-962 - Afef Ben Jemmaa, Hela Ltifi, Mounir Ben Ayed:
Design of Remote Heart Monitoring System for Cardiac Patients. 963-976 - Aisha Fatima, Nadeem Javaid, Tanzeela Sultana, Mohammed Y. Aalsalem, Shaista Shabbir, Durr-e-Adan:
An Efficient Virtual Machine Placement via Bin Packing in Cloud Data Centers. 977-987 - Christos Christodoulopoulos, Euripides G. M. Petrakis:
Commodore: Fail Safe Container Scheduling in Kubernetes. 988-999 - Mohammed Abdulaziz Ikram, Nabin Sharma, Muhammad Raza, Farookh Khadeer Hussain:
Dynamic Ranking System of Cloud SaaS Based on Consumer Preferences - Find SaaS M2NFCP. 1000-1010 - Guto Leoni Santos, Daniel Rosendo, Demis Gomes, Leylane Ferreira, André L. C. Moreira, Djamel Sadok, Judith Kelner, Glauco Estácio Gonçalves, Mattias Wildeman, Patricia Takako Endo:
A Methodology for Automating the Cloud Data Center Availability Assessment. 1011-1023 - Yuki Matsui, Yasuhiro Watashiba, Susumu Date, Takashi Yoshikawa, Shinji Shimojo:
Job Scheduling Simulator for Assisting the Mapping Configuration Between Queue and Computing Nodes. 1024-1033 - Nawel Kortas, Habib Youssef:
MVMM: Data Center Scheduler Algorithm for Virtual Machine Migration. 1034-1046 - Loic Guegan, Betsegaw Lemma Amersho, Anne-Cécile Orgerie, Martin Quinson:
A Large-Scale Wired Network Energy Model for Flow-Level Simulations. 1047-1058 - Borja Bordel, Ramón Alcarria, Diego Sánchez de Rivera, Álvaro Sánchez-Picot:
An Inter-slice Management Solution for Future Virtualization-Based 5G Systems. 1059-1070 - Yuya Kunugi, Hiroyuki Suzuki, Akio Koyama:
IoT Security Viewer System Using Machine Learning. 1071-1081 - Konstantinos Tsakos, Euripides G. M. Petrakis:
Service Oriented Architecture for Interconnecting LoRa Devices with the Cloud. 1082-1093 - Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Self-adaptive RFID Authentication for Internet of Things. 1094-1105 - Huiping Chen, Grigorios Loukides, Jiashi Fan, Hau Chan:
Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective. 1106-1122 - Yoshitaka Shibata, Akira Sakuraba, Goshi Sato, Noriki Uchida:
IoT Based Wide Area Road Surface State Sensing and Communication System for Future Safety Driving. 1123-1132 - Ekaterina Yashkina, Arseny Pinigin, Jooyoung Lee, Manuel Mazzara, Akinlolu Solomon Adekotujo, Adam Zubair, Luca Longo:
Expressing Trust with Temporal Frequency of User Interaction in Online Communities. 1133-1146 - Kai Cheng:
Hot Spot Tracking by Time-Decaying Bloom Filters and Reservoir Sampling. 1147-1156 - Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said:
A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things. 1157-1168 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:
Decision Support System Using Trust Planning Among Food-Energy-Water Actors. 1169-1180 - George Myrizakis, Euripides G. M. Petrakis:
iHome: Smart Home Management as a Service in the Cloud and the Fog. 1181-1192 - Fumi Ito, Eri Ozawa, Yuka Kato:
Design of Robot Service Functions for a Framework Establishing Human-Machine Trust. 1193-1204 - Kanae Matsui, Keiya Sakai:
A Proposal for a Dynamic Digital Map to Prevent Heatstroke Using IoT Data. 1205-1216 - Alessandra Amato, Walter Balzano, Giovanni Cozzolino, Francesco Moscato:
Analysis of Consumers Perceptions of Food Safety Risk in Social Networks. 1217-1227 - Noureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari:
Implicit and Continuous Authentication of Smart Home Users. 1228-1239 - Muhammad I. H. Sukmana, Kennedy A. Torkura, Hendrik Graupner, Ankit Chauhan, Feng Cheng, Christoph Meinel:
Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution. 1240-1253 - T. Dinesh Ram Kumar, Ashutosh Bhatia, R. C. Hansdah:
Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party. 1254-1265 - Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. 1266-1278 - Deepak Kumar Vishvakarma, Ashutosh Bhatia, Zdenek Ríha:
Detection of Algorithmically Generated Domain Names in Botnets. 1279-1290 - Akinori Muramatsu, Masayoshi Aritsugi:
How Important Are Logs of Ordinary Operations? Empirical Investigation of Anomaly Detection. 1291-1302 - Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance. 1303-1315 - Shingo Sato, Junji Shikata:
Interactive Aggregate Message Authentication Scheme with Detecting Functionality. 1316-1328 - Kota Uehara, Kohei Mukaiyama, Masahiro Fujita, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Basic Study on Targeted E-mail Attack Method Using OSINT. 1329-1341 - Ping Zhang, Mimoza Durresi, Arjan Durresi:
Network Location Privacy Protection with Multi-access Edge Computing. 1342-1352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.