default search action
36th AINA 2022: Sydney, NSW, Australia
- Leonard Barolli, Farookh Hussain, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 2. Lecture Notes in Networks and Systems 450, Springer 2022, ISBN 978-3-030-99586-7 - Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Determining Driver Stress in VANETs Considering Driving Experience and History. 1-9 - Shinji Sakamoto, Yi Liu, Leonard Barolli:
Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Instances: A Comparison Study for RDVM and LDIWM Replacement Methods. 10-18 - Prince Mahmud Ridoy, Arajit Saha, Khadija Yeasmin Fariya, Pranta Saha, Khan Md. Elme, Farhadur Arifin:
Millimeter-Wave Dual-Band Slotted Antenna for 5G Applications. 19-30 - Fabio Pagnotta, Leonardo Mostarda, Alfredo Navarra:
NARUN-PC: Caching Strategy for Noise Adaptive Routing in Utility Networks. 31-42 - Deepti Sharma, Kuldeep Marotirao Biradar, Santosh Kumar Vipparthi, Ramesh Babu Battula:
HYPE: CNN Based HYbrid PrEcoding Framework for 5G and Beyond. 43-54 - Chung-Ming Huang, Kai-Jiun Yang:
The Multi-access Edge Computing (MEC)-Based Bit Rate Adaptive Multicast SVC Streaming Using the Adaptive FEC Mechanism. 55-67 - João Carlos Giacomin, Tales Heimfarth:
PROA: Pipelined Receiver Oriented Anycast MAC for IoT. 68-80 - Gabriel Di Iorio Silva, Wagno Leão Sergio, Victor Ströele, Mario A. R. Dantas:
A Watchdog Proposal to a Personal e-Health Approach. 81-94 - Meng Wang, Minoru Uehara:
Computation Offloading by Two-Sided Matching in Fog Computing. 95-104 - Tomoyuki Koyama, Takayuki Kushida:
Distributed Log Search Based on Time Series Access and Service Relations. 105-117 - Edy Hourany, Benoît Piranda, Abdallah Makhoul, Julien Bourgeois, Bachir Habib:
Detector: Hierarchical Distributed Fault Detection Algorithm for Lattice Based Modular Robots. 118-129 - Benoît Piranda, Ishan Gautam, Jerome Meyer, Anass El Houd, Julien Bourgeois:
ManufactSim: Manufacturing Line Simulation Using Heterogeneous Distributed Robots. 130-140 - Bamibo C. Isichei, Carson K. Leung, Lam Thu Nguyen, Luke B. Morrow, Anh Tuan Ngo, Trang Doan Pham, Alfredo Cuzzocrea:
Sports Data Management, Mining, and Visualization. 141-153 - Renz M. Cabusas, Brenna N. Epp, Justin M. Gouge, Tyson N. Kaufmann, Carson K. Leung, James R. A. Tully:
Mining for Fake News. 154-166 - Lov Kumar, Siddarth Baldwa, Shreya Manish Jambavalikar, Lalita Bhanu Murthy Neti, Aneesh Krishna:
Software Functional and Non-function Requirement Classification Using Word-Embedding. 167-179 - Usman Zia, Muhammad Mohsin Riaz, Abdul Ghafoor:
Topic Guided Image Captioning with Scene and Spatial Features. 180-191 - Mansour Khelghatdoust, Mehregan Mahdavi:
A Socially-Aware, Privacy-Preserving, and Scalable Federated Learning Protocol for Distributed Online Social Networks. 192-203 - Asma Dhaouadi, Khadija Bousselmi, Sébastien Monnet, Mohamed Mohsen Gammoudi, Slimane Hammoudi:
A Multi-layer Modeling for the Generation of New Architectures for Big Data Warehousing. 204-218 - Ali Medlej, Eugen Dedu, Dominique Dhoutaut, Kamal Beydoun:
Efficient Retransmission Algorithm for Ensuring Packet Delivery to Sleeping Destination Node. 219-230 - Yasunao Takano, Hiroyuki Adachi, Hiroji Ochii, Mikio Okazaki, Sena Takeda:
The Development of an Elderly Monitoring System with Multiple Sensors. 231-242 - Bathini Sai Akash, Pavan Kumar Reddy Yannam, Bokkasam Venkata Sai Ruthvik, Lov Kumar, Lalita Bhanu Murthy Neti, Aneesh Krishna:
Predicting Cyber-Attacks on IoT Networks Using Deep-Learning and Different Variants of SMOTE. 243-255 - Francisco Assis Moreira do Nascimento, Fabiano Hessel:
A Decentralized Federated Learning Architecture for Intrusion Detection in IoT Systems. 256-268 - Ibraheem Abdulhafiz Khan, Farookh Khadeer Hussain:
Regression Analysis Using Machine Learning Approaches for Predicting Container Shipping Rates. 269-280 - Naji Najari, Samuel Berlemont, Grégoire Lefebvre, Stefan Duffner, Christophe Garcia:
Robust Variational Autoencoders and Normalizing Flows for Unsupervised Network Anomaly Detection. 281-292 - Anna Pogoda, Ewa Lyko, Michal Kedziora, Ireneusz Jozwiak, Jolanta Pietraszko:
Multiplatform Comparative Analysis of Intelligent Robots for Communication Efficiency in Smart Dialogs. 293-305 - Rafal Chalupnik, Katarzyna Bialas, Zofia Majewska, Michal Kedziora:
Using Simplified EEG-Based Brain Computer Interface and Decision Tree Classifier for Emotions Detection. 306-316 - Florencia Cavallin, Rudolf Mayer:
Anomaly Detection from Distributed Data Sources via Federated Learning. 317-328 - Md. Mafijul Islam Bhuiyan, Mondar Maruf Moin Ahmed, Anik Alvi, Md. Safiqul Islam, Prasenjit Mondal, Md. Akbar Hossain, S. N. M. Azizul Hoque:
On Predicting COVID-19 Fatality Ratio Based on Regression Using Machine Learning Model. 329-338 - Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distributed Training from Multi-sourced Data. 339-347 - Jolanta Mizera-Pietraszko, Jolanta Tancula:
Viterbi Algorithm and HMM Implementation to Multicriteria Data-Driven Decision Support Model for Optimization of Medical Service Quality Selection. 348-360 - Nobuki Saito, Tetsuya Oda, Aoto Hirata, Chihiro Yukawa, Kyohei Toyoshima, Tomoaki Matsui, Leonard Barolli:
Performance Evaluation of a DQN-Based Autonomous Aerial Vehicle Mobility Control Method in Corner Environment. 361-372 - Ioanna-Maria Stergiou, Nikolaos Mainas, Euripides G. M. Petrakis:
OpenAPI QL: Searching in OpenAPI Service Catalogs. 373-385 - Slim Abbes, Slim Rekhis:
Sensor Virtualization and Provision in Internet of Vehicles. 386-397 - Houaida Ghanmi, Nasreddine Hajlaoui, Haifa Touati, Mohamed Hadded, Paul Muhlethaler:
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm. 398-408 - Fernando de Almeida Silva, Walkíria Garcia de Souza Silveira, Mario A. R. Dantas:
A Differentiated Approach Based on Edge-Fog-Cloud Environment to Support e-Health on Rural Areas. 421-432 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Mimoza Durresi, Meghna Babbar-Sebens:
Trustworthy Fairness Metric Applied to AI-Based Decisions in Food-Energy-Water. 433-445 - Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle:
New Security Protocols for Offline Point-of-Sale Machines. 446-467 - Zhanwen Chen, Kazumasa Omote:
Building a Blockchain-Based Social Network Identification System. 468-479 - Takahiro Baba, Kensuke Baba, Toshihiro Yamauchi:
Malware Classification by Deep Learning Using Characteristics of Hash Functions. 480-491 - Ryuji Ueno, Kazumasa Omote:
Toward a Blockchain Healthcare Information Exchange. 492-502 - Lukas König, Simon Tjoa:
A Design Thinking Approach on Information Security. 503-515 - Noah Neundorfer, Jianhua Yang, Lixin Wang:
Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption. 516-527 - Takumi Yamamoto, Aiko Iwasaki, Hajime Kobayashi, Kiyoto Kawauchi, Ayako Yoshimura:
A Study on Enhancing Anomaly Detection Technology with Synthetic-Log Generation. 528-538 - Marek R. Ogiela, Lidia Ogiela:
Application of Hybrid Intelligence for Security Purposes. 539-542 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Semantic-Based Techniques for Efficient and Secure Data Management. 543-546 - Anonnya Ghosh, Hussain Mohammed Ibrahim, Wasif Mohammad, Farhana Chowdhury Nova, Amit Hasan, Raqeebir Rab:
CoWrap: An Approach of Feature Selection for Network Anomaly Detection. 547-559 - Amal Sayari, Yacine Djemaiel, Slim Rekhis, Ali Mabrouk, Belhassen Jerbi:
Attack Modeling and Cyber Deception Resources Deployment Using Multi-layer Graph. 560-572 - Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. 573-585 - Takamichi Terada, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation. 586-597 - Dorsaf Swessi, Hanen Idoudi:
Comparative Study of Ensemble Learning Techniques for Fuzzy Attack Detection in In-Vehicle Networks. 598-610 - Flavio Corradini, Leonardo Mostarda, Emanuele Scala:
ZeroMT: Multi-transfer Protocol for Enabling Privacy in Off-Chain Payments. 611-623 - R. Madhusudhan, Mohammad Ahsan:
Prevention of SQL Injection Attacks Using Cryptography and Pattern Matching. 624-634 - Jithin Kallukalam Sojan, K. Haribabu:
Monitoring Jitter in Software Defined Networks. 635-645 - Diego Nunes Molinos, Romerson Deiny Oliveira, Marcelo Silva Freitas, Natal Vieira de Souza Neto, Marcelo Barros de Almeida, Flávio de Oliveira Silva, Pedro Frosi Rosa:
Designing and Prototyping of SDN Switch for Application-Driven Approach. 646-658 - Junjie Wang, Lihong Zheng:
SD-WAN: Edge Cloud Network Acceleration at Australia Hybrid Data Center. 659-670 - Rahul Poddar, Hari Babu:
Decision Tree Based IoT Attack Detection in Programmable Data Plane Using P4 Language. 671-683 - Shail Saharan, Vishal Gupta:
Prevention of DrDoS Amplification Attacks by Penalizing the Attackers in SDN Environment. 684-696
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.