This completed downloadable of Advanced Information Networking and Applications: Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019) Leonard Barolli
Instant downloaded Advanced Information Networking and Applications: Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019) Leonard Barolli pdf docx epub after payment.
Product details:
- ISBN-10: 3030150313
- ISBN-13: 978-3030150310
- Author:
The aim of the book is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.
Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need tocollaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This book covers the theory, design and applications of computer networks, distributed computing and information systems.
Table of contents:
- Electricity Load Forecasting in Smart Grids Using Support Vector Machine
- Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk
- On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home
- Towards Efficient Energy Management in a Smart Home Using Updated Population
- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid
- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid
- Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home
- Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm
- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems
- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses
- Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model
- Energy-Efficient Group Migration of Virtual Machines in a Cluster
- A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic
- Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System
- Multi-level Authentication Protocols Using Scientific Expertise Approach
- Biometric-Based Linguistic Solutions for Data Encryption and Sharing
- Dependability Analysis for On-Demand Computing Based Transaction Processing System
- A Comparative Analysis of Trust Requirements in Decentralized Identity Management
- Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks
- The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods
- A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal
- Selection of IoT Devices in Opportunistic Networks: A Fuzzy-Based Approach Considering IoT Device’s Selfish Behaviour
- Detecting Mental Health Illness Using Short Comments
- On the Weakest Failure Detector for Read/Write-Based Mutual Exclusion
- An Active Signaling Mechanism to Reduce Access Collisions in a Distributed TDMA Based MAC Protocol for Vehicular Networks
- Estimation of Tags Using Various Data for Online Videos
- Framework for Feature Selection in Health Assessment Systems
- A Framework to Achieve Full Waypoint Enforcement in Hybrid SDN Networks
- A New Fuzzy Logic Based Model for Location Trust Estimation in Electric Vehicular Networks
- Angular Histogram-Based Visualisation of Network Traffic Flow Measurement Data
- Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Weibull and Chi-square Client Distributions
- An NSH-Enabled Architecture for Virtualized Network Function Platforms
- Personal Book Management Application on Blockchain
- Performance Evaluation of WMNs by WMN-PSOSA System Considering Chi-square and Exponential Client Distributions
- Realization and Preliminary Evaluation of MPI Runtime Environment on Android Cluster
- Accelerating the Digital Transformation of Business and Society Through Composite Business Ecosystems
- An IP Multimedia Subsystem Service Discovery and Exposure Approach Based on Opinion Mining by Exploiting Twitter Trending Topics
- A Hybrid Cross-Layer Protocol for Wireless Sensor Networks Based on Backbone
- Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation
- Quantifying the Limitations of Learning-Assisted Grammar-Based Fuzzing
- Predicting Elephant Flows in Internet Exchange Point Programmable Networks
- ISDI: A New Window-Based Framework for Integrating IoT Streaming Data from Multiple Sources
- Improving Document Similarity Calculation Using Cosine-Similarity Graphs
- An Efficient Event-Based Protocol for Emergency Situations in Smart Cities
- Gossip Message Dissemination Protocols in the Presence of Link Instability
- Analysis of Ethereum Smart Contracts and Opcodes
- Towards 802.11g Signal Strength Estimation in an Industrial Environment: A Practical Study
- Revealing Storage and Speed Transmission Emerging Technology of Big Data
- A Web-Based Artwork Editing System Empowered by Neural Style Transfer
- Mobile App and Malware Classifications by Mobile Usage with Time Dynamics
- Improvement of Self Position Estimation of Electric Wheelchair Combining Multiple Positioning Methods
- A Roadside Unit Placement Scheme for Vehicular Ad-hoc Networks
- Personality-Aware Collaborative Learning: Models and Explanations
- Interfacer: A Model-Driven Development Method for SDN Applications
- Reducing the IEEE 802.11 Beacon Overhead in Low Mobility Networks
- AXARPS: Scalable ARP Snooping Using Policy-Based Mirroring of Core Switches
- DCS-MAC: A Distributed Cross-Layer Communication Protocol for Directional Sensor Networks
- An MQTT-SN-Based QoS Dynamic Adaptation Method for Wireless Sensor Networks
- Centrality Based Geocasting for Opportunistic Networks
- An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks
- Backhaul-Based Cooperative Caching in Small Cell Network
- A MEC-Assisted Method for Early Handover Using the Fully Distributed Mobility Management (MEC-F-DMM) Architecture
- Link Level Capacity Analysis of Precoded FBMC/OQAM Systems
- A QoS-Based Flow Assignment for Traffic Engineering in Software-Defined Networks
- A UAV-Collaborative Sensing Method for Efficient Monitoring of Disaster Sites
- A Scheme to Improve Stream Transaction Rates for Real-Time IoT Applications
- A Video Data Distribution Method for Flexible Bandwidth Allocation in Hybrid Broadcasting Environments
- Multilingual Entity Matching
- Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss
- VoIP Traffic Management Using a Software-Defined Networking Approach
- A Self Healing Microservices Architecture: A Case Study in Docker Swarm Cluster
- Transparent State Machine Replication for Kubernetes
- An Optimal Travel Route Recommendation System for Tourists’ First Visit to Japan
- Simulation of Secure Volunteer Computing by Using Blockchain
- A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks
- Response to Co-resident Threats in Cloud Computing Using Machine Learning
- Automatic Graph-Based Clustering for Security Logs
- Retrieving Text-Based Surrounding Objects in Spatial Databases
- Forecasting Crypto-Asset Price Using Influencer Tweets
- Challenges and Strategies for Developing Decentralized Applications Based on Blockchain Technology
- Design of Remote Heart Monitoring System for Cardiac Patients
- An Efficient Virtual Machine Placement via Bin Packing in Cloud Data Centers
- Commodore: Fail Safe Container Scheduling in Kubernetes
- Dynamic Ranking System of Cloud SaaS Based on Consumer Preferences – Find SaaS M2NFCP
- A Methodology for Automating the Cloud Data Center Availability Assessment
- Job Scheduling Simulator for Assisting the Mapping Configuration Between Queue and Computing Nodes
- MVMM: Data Center Scheduler Algorithm for Virtual Machine Migration
- A Large-Scale Wired Network Energy Model for Flow-Level Simulations
- An Inter-slice Management Solution for Future Virtualization-Based 5G Systems
- IoT Security Viewer System Using Machine Learning
- Service Oriented Architecture for Interconnecting LoRa Devices with the Cloud
- Self-adaptive RFID Authentication for Internet of Things
- Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective
- IoT Based Wide Area Road Surface State Sensing and Communication System for Future Safety Driving
- Expressing Trust with Temporal Frequency of User Interaction in Online Communities
- Hot Spot Tracking by Time-Decaying Bloom Filters and Reservoir Sampling
- A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things
- Decision Support System Using Trust Planning Among Food-Energy-Water Actors
- iHome: Smart Home Management as a Service in the Cloud and the Fog
- Design of Robot Service Functions for a Framework Establishing Human-Machine Trust
- A Proposal for a Dynamic Digital Map to Prevent Heatstroke Using IoT Data
- Analysis of Consumers Perceptions of Food Safety Risk in Social Networks
- Implicit and Continuous Authentication of Smart Home Users
- Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution
- Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party
- Deniable Secret Handshake Protocol – Revisited
- Detection of Algorithmically Generated Domain Names in Botnets
- How Important Are Logs of Ordinary Operations? Empirical Investigation of Anomaly Detection
- Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance
- Interactive Aggregate Message Authentication Scheme with Detecting Functionality
- Basic Study on Targeted E-mail Attack Method Using OSINT
- Network Location Privacy Protection with Multi-access Edge Computing
People also search:
ict50220 diploma of information technology (advanced networking)
what is advanced networking
networking advanced topics
advanced networking commands