default search action
33rd AINA 2019: Matsue, Japan
- Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications, AINA 2019, Matsue, Japan, March 27-29, 2019. Advances in Intelligent Systems and Computing 926, Springer 2020, ISBN 978-3-030-15031-0 - Nasir Ayub, Nadeem Javaid, Sana Mujeeb, Maheen Zahid, Wazir Zada Khan, Muhammad Umar Khattak:
Electricity Load Forecasting in Smart Grids Using Support Vector Machine. 1-13 - Ayesha Anjum Butt, Zahoor Ali Khan, Nadeem Javaid, Annas Chand, Aisha Fatima, Muhammad Talha Islam:
Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk. 14-25 - Sajjad Khan, Zahoor Ali Khan, Nadeem Javaid, Waleed Ahmad, Raza Abid Abbasi, Hafiz Muhammad Faisal:
On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home. 26-38 - Hafiz Muhammad Faisal, Nadeem Javaid, Zahoor Ali Khan, Fahad Mussadaq, Muhammad Akhtar, Raza Abid Abbasi:
Towards Efficient Energy Management in a Smart Home Using Updated Population. 39-52 - Waleed Ahmad, Nadeem Javaid, Sajjad Khan, Maria Zuraiz, Tayyab Awan, Muhammad Amir, Raza Abid Abbasi:
A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid. 53-66 - Sahibzada Muhammad Shuja, Nadeem Javaid, Muhammad Zeeshan Rafique, Umar Qasim, Raja Farhat Makhdoom Khan, Ayesha Anjum Butt, Murtaza Hanif:
Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid. 67-81 - Raza Abid Abbasi, Nadeem Javaid, Shujat ur Rehman, Amanullah, Sajjad Khan, Hafiz Muhammad Faisal, Sajawal Ur Rehman Khan:
Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home. 82-94 - Muhammad Abdullah, Nadeem Javaid, Inam Ullah Khan, Zahoor Ali Khan, Annas Chand, Noman Ahmad:
Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm. 95-107 - Shigenari Nakamura, Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems. 108-119 - Shohreh Monshizadeh, Gunne John Hegglid, Svein Thore Hagen:
Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses. 120-131 - Ryuji Oma, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model. 132-143 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
Energy-Efficient Group Migration of Virtual Machines in a Cluster. 144-155 - Kevin Bylykbashi, Yi Liu, Donald Elmazi, Keita Matsuo, Makoto Ikeda, Leonard Barolli:
A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic. 156-165 - Xiaobing Liang, Bing Zhao, Qian Ma, Bang Sun, Baojiang Cui:
Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System. 166-175 - Marek R. Ogiela, Lidia Ogiela:
Multi-level Authentication Protocols Using Scientific Expertise Approach. 176-180 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Biometric-Based Linguistic Solutions for Data Encryption and Sharing. 181-187 - Dharmendra Prasad Mahato, Jasminder Kaur Sandhu, Nagendra Pratap Singh, Kamlesh Dutta:
Dependability Analysis for On-Demand Computing Based Transaction Processing System. 188-199 - Andreas Grüner, Alexander Mühle, Tatiana Gayvoronskaya, Christoph Meinel:
A Comparative Analysis of Trust Requirements in Decentralized Identity Management. 200-213 - Oussama Ghorbel, Aya Ayadi, Rami Ayadi, Mohammed Aseeri, Mohamed Abid:
Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks. 214-224 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods. 225-237 - Donald Elmazi, Miralda Cuka, Makoto Ikeda, Leonard Barolli, Makoto Takizawa:
A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal. 238-250 - Miralda Cuka, Donald Elmazi, Makoto Ikeda, Keita Matsuo, Leonard Barolli, Makoto Takizawa:
Selection of IoT Devices in Opportunistic Networks: A Fuzzy-Based Approach Considering IoT Device's Selfish Behaviour. 251-264 - Takahiro Baba, Kensuke Baba, Daisuke Ikeda:
Detecting Mental Health Illness Using Short Comments. 265-271 - Carole Delporte-Gallet, Hugues Fauconnier, Michel Raynal:
On the Weakest Failure Detector for Read/Write-Based Mutual Exclusion. 272-285 - Fouzi Boukhalfa, Mohamed Hadded, Paul Mühlethaler, Oyunchimeg Shagdar:
An Active Signaling Mechanism to Reduce Access Collisions in a Distributed TDMA Based MAC Protocol for Vehicular Networks. 286-300 - Hiroki Sakaji, Akio Kobayashi, Masaki Kohana, Yasunao Takano, Kiyoshi Izumi:
Estimation of Tags Using Various Data for Online Videos. 301-312 - Ayesha Ubaid, Fan Dong, Farookh Khadeer Hussain:
Framework for Feature Selection in Health Assessment Systems. 313-324 - Sandhya Rathee, T. Dinesh Ram Kumar, K. Haribabu, Ashutosh Bhatia:
A Framework to Achieve Full Waypoint Enforcement in Hybrid SDN Networks. 325-340 - Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said:
A New Fuzzy Logic Based Model for Location Trust Estimation in Electric Vehicular Networks. 341-352 - Adrián Pekár, Mona B. H. Ruan, Winston K. G. Seah:
Angular Histogram-Based Visualisation of Network Traffic Flow Measurement Data. 353-365 - Admir Barolli, Shinji Sakamoto, Leonard Barolli, Makoto Takizawa:
Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Weibull and Chi-square Client Distributions. 366-375 - Vinícius Fülber-Garcia, Leonardo da Cruz Marcuzzo, Giovanni Venâncio de Souza, Lucas Bondan, Jéferson Campos Nobre, Alberto E. Schaeffer Filho, Carlos Raniery Paula dos Santos, Lisandro Zambenedetti Granville, Elias P. Duarte Jr.:
An NSH-Enabled Architecture for Virtualized Network Function Platforms. 376-387 - Hiryu Kawaguchi, Yasunao Takano, Hiroshi Sakuta:
Personal Book Management Application on Blockchain. 388-396 - Shinji Sakamoto, Leonard Barolli, Shusuke Okamoto:
Performance Evaluation of WMNs by WMN-PSOSA System Considering Chi-square and Exponential Client Distributions. 397-406 - Masahiro Nissato, Hiroki Sugiyama, Kanemitsu Ootsu, Takeshi Ohkawa, Takashi Yokota:
Realization and Preliminary Evaluation of MPI Runtime Environment on Android Cluster. 407-418 - Shridhar Choudhary, Ian Thomas, Mehdi Bahrami, Motoshi Sumioka:
Accelerating the Digital Transformation of Business and Society Through Composite Business Ecosystems. 419-430 - Armielle Noulapeu Ngaffo, Walid El Ayeb, Zièd Choukair:
An IP Multimedia Subsystem Service Discovery and Exposure Approach Based on Opinion Mining by Exploiting Twitter Trending Topics. 431-445 - Piercarlo Fermino Soares, João Carlos Giacomin, Tales Heimfarth:
A Hybrid Cross-Layer Protocol for Wireless Sensor Networks Based on Backbone. 446-457 - Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. 458-469 - Yuma Jitsunari, Yoshitaka Arahori, Katsuhiko Gondow:
Quantifying the Limitations of Learning-Assisted Grammar-Based Fuzzing. 470-484 - Marcus Vinicius Brito da Silva, Arthur Selle Jacobs, Ricardo José Pfitscher, Lisandro Zambenedetti Granville:
Predicting Elephant Flows in Internet Exchange Point Programmable Networks. 485-497 - Doan Quang Tu, A. S. M. Kayes, Wenny Rahayu, Kinh Nguyen:
ISDI: A New Window-Based Framework for Integrating IoT Streaming Data from Multiple Sources. 498-511 - Yasunao Takano, Yusuke Iijima, Kou Kobayashi, Hiroshi Sakuta, Hiroki Sakaji, Masaki Kohana, Akio Kobayashi:
Improving Document Similarity Calculation Using Cosine-Similarity Graphs. 512-522 - Sediane C. L. Hernandes, Marcelo E. Pellenz, Alcides Calsavara, Manoel Camillo Penna:
An Efficient Event-Based Protocol for Emergency Situations in Smart Cities. 523-534 - Takumu Hirooka, Naohiro Hayashibara:
Gossip Message Dissemination Protocols in the Presence of Link Instability. 535-545 - Stefano Bistarelli, Gianmarco Mazzante, Matteo Micheletti, Leonardo Mostarda, Francesco Tiezzi:
Analysis of Ethereum Smart Contracts and Opcodes. 546-558 - Dalton Cézane Gomes Valadares, Joseana Macêdo Fechine Régis de Araújo, Angelo Perkusich, Marco Aurélio Spohn, Elmar Uwe Kurt Melcher, Natália Porfírio Albuquerque:
Towards 802.11g Signal Strength Estimation in an Industrial Environment: A Practical Study. 559-570 - Heru Susanto, Fang-Yie Leu, Didi Rosiyadi, Chen Chin Kang:
Revealing Storage and Speed Transmission Emerging Technology of Big Data. 571-583 - Kenta Goto, Hiroaki Nishino:
A Web-Based Artwork Editing System Empowered by Neural Style Transfer. 584-594 - Yong Zheng, Sridhar Srinivasan:
Mobile App and Malware Classifications by Mobile Usage with Time Dynamics. 595-606 - Fumiai Sato:
Improvement of Self Position Estimation of Electric Wheelchair Combining Multiple Positioning Methods. 607-618 - Seif Ben Chaabene, Taoufik Yeferny, Sadok Ben Yahia:
A Roadside Unit Placement Scheme for Vehicular Ad-hoc Networks. 619-630 - Yong Zheng, Archana Subramaniyan:
Personality-Aware Collaborative Learning: Models and Explanations. 631-642 - João Eurípedes Pereira Júnior, Flávio de Oliveira Silva, João Henrique de Souza Pereira, Pedro Frosi Rosa:
Interfacer: A Model-Driven Development Method for SDN Applications. 643-654 - Gabriel de Carvalho Ferreira, Priscila Solís Barreto, Eduardo Alchieri:
Reducing the IEEE 802.11 Beacon Overhead in Low Mobility Networks. 655-666 - Motoyuki Ohmori, Naoki Miyata, Ichiroh Suzuta:
AXARPS: Scalable ARP Snooping Using Policy-Based Mirroring of Core Switches. 667-676 - Shamanth Nagaraju, V. Sreejith, Nipun Sood, Lucy J. Gudino, Mehul Kasliwal, Rajas Kejriwal:
DCS-MAC: A Distributed Cross-Layer Communication Protocol for Directional Sensor Networks. 677-689 - Helbert da Rocha, Tânia L. Monteiro, Marcelo Eduardo Pellenz, Manuel C. Penna, Joilson Alves Junior:
An MQTT-SN-Based QoS Dynamic Adaptation Method for Wireless Sensor Networks. 690-701 - Jagdeep Singh, Sanjay K. Dhurandher, Isaac Woungang, Makoto Takizawa:
Centrality Based Geocasting for Opportunistic Networks. 702-712 - Richa Siddavaatam, Isaac Woungang, Sanjay Kumar Dhurandher:
An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks. 713-724 - Yu-Ting Wang, Yun-Zhan Cai, Lo-An Chen, Sian-Jhe Lin, Meng-Hsun Tsai:
Backhaul-Based Cooperative Caching in Small Cell Network. 725-736 - Chung-Ming Huang, Duy-Tuan Dao, Meng-Shu Chiang:
A MEC-Assisted Method for Early Handover Using the Fully Distributed Mobility Management (MEC-F-DMM) Architecture. 737-750 - Jihed Ghodhbane, Noureddine Boujnah, Ridha Bouallegue:
Link Level Capacity Analysis of Precoded FBMC/OQAM Systems. 751-761 - Lakshmi Priya Thiruvasakan, Quoc-Tuan Vien, Jonathan Loo, Glenford Mapp:
A QoS-Based Flow Assignment for Traffic Engineering in Software-Defined Networks. 762-774 - Akimitsu Kanzaki, Hideyuki Akagi:
A UAV-Collaborative Sensing Method for Efficient Monitoring of Disaster Sites. 775-786 - Chaxiong Yukonhiatou, Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo:
A Scheme to Improve Stream Transaction Rates for Real-Time IoT Applications. 787-798 - Satoru Matsumoto, Tomoki Yoshihisa:
A Video Data Distribution Method for Flexible Bandwidth Allocation in Hybrid Broadcasting Environments. 799-809 - Ilgiz Mustafin, Marius-Cristian Frunza, JooYoung Lee:
Multilingual Entity Matching. 810-820 - Sunit Kumar Nandi, Pranav Kumar Singh, Sukumar Nandi:
Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss. 821-833 - Paulo Vieira Jr., Adriano Fiorese:
VoIP Traffic Management Using a Software-Defined Networking Approach. 834-845 - Basel Magableh, Muder Almiani:
A Self Healing Microservices Architecture: A Case Study in Docker Swarm Cluster. 846-858 - Felipe Borges, Luís Pacheco, Eduardo Alchieri, Marcos F. Caetano, Priscila Solís:
Transparent State Machine Replication for Kubernetes. 859-871 - Chen Yuan, Minoru Uehara:
An Optimal Travel Route Recommendation System for Tourists' First Visit to Japan. 872-882 - Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. 883-894 - Chu-Hsing Lin, Hsuan Chi:
A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks. 895-903 - Chu-Hsing Lin, Hsiao-Wen Lu:
Response to Co-resident Threats in Cloud Computing Using Machine Learning. 904-913 - Hudan Studiawan, Christian Payne, Ferdous Sohel:
Automatic Graph-Based Clustering for Security Logs. 914-926 - Bojie Shen, Md. Saiful Islam, David Taniar, Junhu Wang:
Retrieving Text-Based Surrounding Objects in Spatial Databases. 927-939 - Hirofumi Yamamoto, Hiroki Sakaji, Hiroyasu Matsushima, Yuki Yamashita, Kyohei Osawa, Kiyoshi Izumi, Takashi Shimada:
Forecasting Crypto-Asset Price Using Influencer Tweets. 940-951 - Thanh-Chung Dao, Binh Minh Nguyen, Ba-Lam Do:
Challenges and Strategies for Developing Decentralized Applications Based on Blockchain Technology. 952-962 - Afef Ben Jemmaa, Hela Ltifi, Mounir Ben Ayed:
Design of Remote Heart Monitoring System for Cardiac Patients. 963-976 - Aisha Fatima, Nadeem Javaid, Tanzeela Sultana, Mohammed Y. Aalsalem, Shaista Shabbir, Durr-e-Adan:
An Efficient Virtual Machine Placement via Bin Packing in Cloud Data Centers. 977-987 - Christos Christodoulopoulos, Euripides G. M. Petrakis:
Commodore: Fail Safe Container Scheduling in Kubernetes. 988-999 - Mohammed Abdulaziz Ikram, Nabin Sharma, Muhammad Raza, Farookh Khadeer Hussain:
Dynamic Ranking System of Cloud SaaS Based on Consumer Preferences - Find SaaS M2NFCP. 1000-1010 - Guto Leoni Santos, Daniel Rosendo, Demis Gomes, Leylane Ferreira, André L. C. Moreira, Djamel Sadok, Judith Kelner, Glauco Estácio Gonçalves, Mattias Wildeman, Patricia Takako Endo:
A Methodology for Automating the Cloud Data Center Availability Assessment. 1011-1023 - Yuki Matsui, Yasuhiro Watashiba, Susumu Date, Takashi Yoshikawa, Shinji Shimojo:
Job Scheduling Simulator for Assisting the Mapping Configuration Between Queue and Computing Nodes. 1024-1033 - Nawel Kortas, Habib Youssef:
MVMM: Data Center Scheduler Algorithm for Virtual Machine Migration. 1034-1046 - Loic Guegan, Betsegaw Lemma Amersho, Anne-Cécile Orgerie, Martin Quinson:
A Large-Scale Wired Network Energy Model for Flow-Level Simulations. 1047-1058 - Borja Bordel, Ramón Alcarria, Diego Sánchez de Rivera, Álvaro Sánchez-Picot:
An Inter-slice Management Solution for Future Virtualization-Based 5G Systems. 1059-1070 - Yuya Kunugi, Hiroyuki Suzuki, Akio Koyama:
IoT Security Viewer System Using Machine Learning. 1071-1081 - Konstantinos Tsakos, Euripides G. M. Petrakis:
Service Oriented Architecture for Interconnecting LoRa Devices with the Cloud. 1082-1093 - Bacem Mbarek, Mouzhi Ge, Tomás Pitner:
Self-adaptive RFID Authentication for Internet of Things. 1094-1105 - Huiping Chen, Grigorios Loukides, Jiashi Fan, Hau Chan:
Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective. 1106-1122 - Yoshitaka Shibata, Akira Sakuraba, Goshi Sato, Noriki Uchida:
IoT Based Wide Area Road Surface State Sensing and Communication System for Future Safety Driving. 1123-1132 - Ekaterina Yashkina, Arseny Pinigin, Jooyoung Lee, Manuel Mazzara, Akinlolu Solomon Adekotujo, Adam Zubair, Luca Longo:
Expressing Trust with Temporal Frequency of User Interaction in Online Communities. 1133-1146 - Kai Cheng:
Hot Spot Tracking by Time-Decaying Bloom Filters and Reservoir Sampling. 1147-1156 - Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said:
A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things. 1157-1168 - Suleyman Uslu, Davinder Kaur, Samuel J. Rivera, Arjan Durresi, Meghna Babbar-Sebens:
Decision Support System Using Trust Planning Among Food-Energy-Water Actors. 1169-1180 - George Myrizakis, Euripides G. M. Petrakis:
iHome: Smart Home Management as a Service in the Cloud and the Fog. 1181-1192 - Fumi Ito, Eri Ozawa, Yuka Kato:
Design of Robot Service Functions for a Framework Establishing Human-Machine Trust. 1193-1204 - Kanae Matsui, Keiya Sakai:
A Proposal for a Dynamic Digital Map to Prevent Heatstroke Using IoT Data. 1205-1216 - Alessandra Amato, Walter Balzano, Giovanni Cozzolino, Francesco Moscato:
Analysis of Consumers Perceptions of Food Safety Risk in Social Networks. 1217-1227 - Noureddine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari:
Implicit and Continuous Authentication of Smart Home Users. 1228-1239 - Muhammad I. H. Sukmana, Kennedy A. Torkura, Hendrik Graupner, Ankit Chauhan, Feng Cheng, Christoph Meinel:
Supporting Internet-Based Location for Location-Based Access Control in Enterprise Cloud Storage Solution. 1240-1253 - T. Dinesh Ram Kumar, Ashutosh Bhatia, R. C. Hansdah:
Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party. 1254-1265 - Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. 1266-1278 - Deepak Kumar Vishvakarma, Ashutosh Bhatia, Zdenek Ríha:
Detection of Algorithmically Generated Domain Names in Botnets. 1279-1290 - Akinori Muramatsu, Masayoshi Aritsugi:
How Important Are Logs of Ordinary Operations? Empirical Investigation of Anomaly Detection. 1291-1302 - Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance. 1303-1315 - Shingo Sato, Junji Shikata:
Interactive Aggregate Message Authentication Scheme with Detecting Functionality. 1316-1328 - Kota Uehara, Kohei Mukaiyama, Masahiro Fujita, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Basic Study on Targeted E-mail Attack Method Using OSINT. 1329-1341 - Ping Zhang, Mimoza Durresi, Arjan Durresi:
Network Location Privacy Protection with Multi-access Edge Computing. 1342-1352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.