default search action
38th AINA 2024: Kitakyushu, Japan
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 3. Lecture Notes on Data Engineering and Communications Technologies 201, Springer 2024, ISBN 978-3-031-57869-4 - Jean-Paul A. Yaacoub, Benoît Piranda, Frédéric Lassabe, Hassan N. Noura:
Efficient Communication Protocol for Programmable Matter. 1-11 - Rajdeep Niyogi, Amar Nath:
IoRT-Based Distributed Algorithm for Robust Team Formation and Its Application to Smart City Operation. 12-23 - Shreeram Hudda, K. Haribabu, Rishabh Barnwal, Abhishek Khurana:
A WSN and Vision Based Energy Efficient and Smart Surveillance System Using Computer Vision and AI at Edge. 24-36 - Neminath Hubballi, Nisha Kumari Barsha:
Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems. 37-47 - Aimilios Tzavaras, Chrisa Tsinaraki, Euripides G. M. Petrakis:
API Descriptions for the Web of Things. 48-58 - Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, Ashutosh Bhatia, Kamlesh Tiwari:
SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep Learning. 59-72 - Gaurav Prasad, Aditya Gupta, Avnish Aryan, Sudhir Kumar:
A Vision Transformer Based Indoor Localization Using CSI Signals in IoT Networks. 73-83 - Wided Khemili, Jalel Eddine Hajlaoui, Mohand Yazid Saidi, Mohamed Nazih Omri, Ken Chen:
Deep Reinforcement Learning for VNF Placement and Chaining of Cloud Network Services. 84-96 - Mahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine, Lamia Romdhani, Ridha Bouallegue:
Optimising Water Quality Classification in Aquaculture Using a New Parameter Pre-selection Approach. 97-107 - Kenshin Tsumuraya, Yonghui Huang, Minoru Uehara, Yoshihiro Adachi:
Topic Analysis of Japanese Sentences Using Sentence Embeddings. 108-122 - Kenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi:
Performance Improvement of Semantic Search Using Sentence Embeddings by Dimensionality Reduction. 123-132 - Ermioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based System for Assessment of Performance Error in VANETs. 133-142 - Inam Alanazi, Firas Al-Doghman, Abdulrahman Alsubhi, Farookh Hussain:
Carbon Credits Price Prediction Model (CCPPM). 143-150 - Haibo Zhang, Kouichi Sakurai:
Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies. 151-162 - Enock Cabral Almeida Vieira, Paulo Carvalho, Flávio de Oliveira Silva:
Framework for Cognitive Self-Healing of Real Broadband Networks. 163-174 - Aman Verma, Sanat Thakur, Ankush Kumar, Dharmendra Prasad Mahato:
Honey Bee Inspired Routing Algorithm for Sparse Unstructured P2P Networks. 175-186 - Kartikeya Dubey, Chittaranjan Hota:
Anomaly Detection in WBANs Using CNN-Autoencoders and LSTMs. 187-197 - Davinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi:
LLM-Based Agents Utilized in a Trustworthy Artificial Conscience Model for Controlling AI in Medical Applications. 198-209 - Vitor Gabriel Reis Lux Barboza, Janine Kniess:
Task Allocation Based on Simulated Annealing for Edge Industrial Internet. 210-221 - Janel Huang, Murugaraj Odiathevar, Alvin C. Valera, Jyoti Sahni, Marcus Frean, Winston K. G. Seah:
Realtime BGP Anomaly Detection Using Graph Centrality Features. 222-233 - Pratyush Mishra, Vikram Singh, Aneesh Krishna, Lov Kumar:
An Empirical Analysis on Leveraging User Reviews with NLP-Enhanced Word Embeddings for App Rating Prediction. 234-244 - Yiting Wang, Yawen Li, Zequn Wei, Junqi Li:
Hybrid Evolutionary Algorithm for the Overlap Constrained Resource Allocation Problem in Wireless Networks. 245-256 - Mahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine, Lamia Romdhani, Ridha Bouallegue:
An Efficient Method for Underwater Fish Detection Using a Transfer Learning Techniques. 257-267 - Timothy Stockton, Brandon Peddle, Angelica Gaulin, Emma Wiechert, Wei Lu:
Comparative Analysis of Data Preprocessing Methods in Machine Learning for Breast Cancer Classification. 268-279 - Chih-Fong Tsai, Ya-Han Hu, Ming-Chang Wang, Kang Ernest Liu:
Hybrid Technical-Visual Features for Stock Prediction. 280-289 - Gabriel Fernandes Silva, Victor Ströele, Regina Braga, Mario A. R. Dantas, Michael A. Bauer:
Intelligent Health Promotion: Machine Learning in the Prevention of Stress-Related Diseases. 290-301 - Thanawin Sakpuaram, Chantana Chantrapornchai:
RsViT - A Scalable Vision Transformer Backbone for Diffusion Model. 302-312 - Sabina Sapkota, Haojun Huang, Yining Hu, Farookh Hussain:
A Deep Neural Network (DNN) Based Contract Policy on Hyperledger Fabric for Secure Internet of Things (IoTs). 313-325 - R. Madhusudhan, Shubham Kumar Thakur, P. Pravisha:
Enhancing Intrusion Detection System Using Machine Learning and Deep Learning. 326-337 - Hadi Salloum, Hamza Shafee Aldaghstany, Osama Orabi, Ahmad Haidar, Mohammad Reza Bahrami, Manuel Mazzara:
Integration of Machine Learning with Quantum Annealing. 338-348 - Jefferson Amará, Victor Ströele, Regina Braga, José Maria N. David:
From Context to Forecast: Ontology-Based Data Integration and AI for Events Prediction. 349-361 - Matheus Saueressig, Muriel Figueredo Franco, Eder J. Scheid, Alberto Huertas Celdrán, Gérôme Bovet, Burkhard Stiller, Lisandro Z. Granville:
FEVER: Intelligent Behavioral Fingerprinting for Anomaly Detection in P4-Based Programmable Networks. 362-373 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
Improved Purpose-Based Concurrency Control to Reduce the Electric Energy Consumption of a Server Cluster. 374-384 - André Luiz Tinassi D'Amato, Mario A. R. Dantas:
Proposal for a Resource Allocation Model Aimed at Fog Computing. 385-396 - Keita Matsuo, Leonard Barolli:
Implementation of a Cloud Based Voice Recognition Motor Control System for Omnidirectional Wheelchair. 397-403 - Asma AlKhalaf, Farookh Khadeer Hussain:
Towards Priority VM Placement in Fog Networks. 404-414 - Omessead BenMarak, Anis Naanaa, Sadok ElAsmi:
A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing. 415-425 - Nirali Sanghvi, Rajdeep Niyogi:
LoRa and Cloud-Based Multi-robot Pesticide Spraying for Precision Agriculture. 426-436 - Athanasios Prountzos, Euripides G. M. Petrakis:
DeFog: Adaptive Microservice Scheduling on Kubernetes Clusters in Cloud-Edge-Fog Infrastructures. 437-448 - Francesco Lubrano, Giuseppe Caragnano, Alberto Scionti, Olivier Terzo:
Challenges, Novel Approaches and Next Generation Computing Architecture for Hyper-Distributed Platforms Towards Real Computing Continuum. 449-459
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.