default search action
38th AINA 2024: Kitakyushu, Japan
- Leonard Barolli:
Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 6. Lecture Notes on Data Engineering and Communications Technologies 204, Springer 2024, ISBN 978-3-031-57941-7 - Mohammad Khalil, Manuel Mazzara:
Survival Strategies for IT Companies During Crisis: A Case Study of Russia. 1-10 - Alba Amato, Giuseppe Cirillo:
Comparative Analysis of Ontologies for Archival Representation. 11-19 - Luigi Alberico, Dario Branco, Antonio Coppa, Salvatore D'Angelo, Stefania Quilici Gigli, Giuseppina Renda, Salvatore Venticinque:
Augmented Reality for Cyberphisical Exploration of Archeological Sites. 20-28 - Jingyi Zeng:
Research on Archive Digital Editing and Studying Mode. 29-36 - Alba Amato, Angelo Di Falco:
An Ontology for the Annotation of the Archives of the Royal Site of San Leucio. 37-44 - Alba Amato, Dario Branco, Salvatore Venticinque:
An Architecture for Metadata and Semantic Annotation of Historical Archives. 45-54 - Theodor-Radu Grumeza, Thomas-Andrei Lazar, Alexandra Emilia Fortis:
Social Robots and Edge Computing: Integrating Cloud Robotics in Social Interaction. 55-64 - Diogen Babuc, Alexandra Emilia Fortis:
Fine-Tuned CNN for Clothing Image Classification on Mobile Edge Computing. 65-75 - Shamsher Ullah, Jianqiang Li, Farhan Ullah, Diletta Cacciagrano, Muhammad Tanveer Hussain, Victor C. M. Leung:
Homomorphic Cryptography Authentication Scheme to Eliminate Machine Tools Gaps in Industry 4.0. 76-85 - Alessandro Aloisio:
Fixed-Parameter Tractability for Branchwidth of the Maximum-Weight Edge-Colored Subgraph Problem. 86-95 - Alessandro Aloisio, Alfredo Navarra:
On Coverage in Multi-Interface Networks with Bounded Pathwidth. 96-105 - Marco Marcozzi, Antinisca Di Marco, Leonardo Mostarda:
Sensitivity Analysis of Performability Model to Evaluate PBFT Systems. 106-113 - Alessandro Aloisio:
Algorithmic Aspects of Distributing Energy Consumption in Multi-interface Networks. 114-123 - Ramiz Salama, Diletta Cacciagrano, Fadi Al-Turjman:
Blockchain and Financial Services a Study of the Applications of Distributed Ledger Technology (DLT) in Financial Services. 124-135 - Zhi-Wei Kao, Chi-Yi Lin:
A Personalized Parking Guidance Service Based on Computer Vision Technology for Large Car Parks. 136-144 - Dharmendra Prasad Mahato, Radha Rani:
Mathematical Modelling of COVID-19 Using ODEs. 145-156 - Rajni Goyal, Amar Nath, Utkarsh Niranjan, Rajdeep Niyogi:
Analyzing Monitoring and Controlling Techniques for Water Optimization Used in Precision Irrigation. 157-168 - Nour El Madhoun, Badis Hammi, Saad El Jaouhari, Djamel Mesbah, Elsi Ahmadieh:
Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective. 169-182 - Ziyang Zhang, Lin Guan, Qinggang Meng:
A Hybrid Deep Reinforcement Learning Routing Method Under Dynamic and Complex Traffic with Software Defined Networking. 183-192 - Nouredine Tamani, Saad El Jaouhari, Abdul-Qadir Khan, Bastien Pauchet:
Improving ML/DL Solutions for Anomaly Detection in IoT Environments. 193-206 - Chin-Ling Chen, Yong-Yuan Deng, Yao-Yuan Hsu, Hsing-Chung Chen, Der-Chen Huang, Ling-Chun Liu:
A Survey and Planning Advice of Blockchain-Based Used Car Bidding Platform. 207-216 - Mohamed Aly Amin, Adnan Harun Dogan, Elif Sena Kuru, Yigit Sever, Pelin Angin:
Misuse Detection and Response for Orchestrated Microservices Based Software. 217-226 - Suleiman Karim Eddin, Hadi Salloum, Mohamad Nour Shahin, Badee Salloum, Manuel Mazzara, Mohammad Reza Bahrami:
Quantum Microservices: Transforming Software Architecture with Quantum Computing. 227-237 - Maroua Ben Gharbia, Ridha Bouallegue:
Handover Management Scheme in Macrocell-Femtocell Networks. 238-248 - Marwa Rjili, Abdelhakim Khlifi, Fatma Ben Salah, Belgacem Chibani, Said Chniguir:
An α-Rotated Fourier Transform Used as OTFS Enhancement. 249-260 - Chaima Bejaoui, Nasreddine Hajlaoui:
Monitoring a Rice Field with a Low-Cost Wireless Sensor Network. 261-272 - Ghofrane Fersi, Mohamed Khalil Baazaoui, Rawdha Haddad, Faouzi Derbel:
Machine Learning Based-RSSI Estimation Module in OMNET++ for Indoor Wireless Sensor Networks. 273-285 - Henda Hnaien, Ahmed Aboud, Haifa Touati, Hichem Snoussi:
Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research Issues. 286-297 - Emna Jebabli, Mohamed Hayouni, Fethi Choubani:
Design of Low Sidelobe Microstrip Antenna Array with Non-uniform Excitation Amplitude Based on Dolph-Tschebyscheff Synthesis at 28 GHz. 298-306 - Ratiros Phaenthong, Sudsanguan Ngamsuriyaroj:
Analyzing Security and Privacy Risks in Android Video Game Applications. 307-319 - Mohamed Ould-Elhassen Aoueileyine, Neder Karmous, Ridha Bouallegue, Neji Youssef, Anis Yazidi:
Detecting and Mitigating MitM Attack on IoT Devices Using SDN. 320-330 - Katja Assaf:
Anonymous Credentials and Self-Sovereign Identity - An Initial Assessment. 331-343 - Münteha Nur Bedir Tüzün, Pelin Angin:
Network Intrusion Detection with Incremental Active Learning. 344-353 - Hadi Salloum, Murhaf Alawir, Mohammad Anas Alatasi, Saleem Asekrea, Manuel Mazzara, Mohammad Reza Bahrami:
Quantum Advancements in Securing Networking Infrastructures. 354-363 - Masoud Hemmatpour, Tore Heide Larsen, Nikshubha Kumar, Ernst Gunnar Gran:
In-Network Monitoring Strategies for HPC Cloud. 364-373 - Jan Marius Evang, Thomas Dreibholz:
Optimizing Network Latency: Unveiling the Impact of Reflection Server Tuning. 374-384 - Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai:
Extension of Resource Authorization Method with SSI in Edge Computing. 385-394 - Hibiki Tanaka, Kazuki Shimomura, Naoki Tanaka, Makoto Ikeda, Leonard Barolli:
An AI-Driven System for Identifying Dangerous Driving Vehicles. 395-400 - Eric Brown, John Fisher, Aaron Hudon, Erick Colston, Wei Lu:
Multiclassification Analysis of Volumetric, Protocol, and Application Layer DDoS Attacks. 401-413 - Yukito Seo, Rafly Arief Kanza, Nobuya Watanabe, Kin Fun Li, Kosuke Takano:
A Classification Method of Image Feature Using Neural Metric Learning for Natural Environment Video. 414-421 - Chihiro Yukawa, Tetsuya Oda, Yuki Nagai, Kyohei Wakabayashi, Leonard Barolli:
An Imaging Camera Anomaly Detection System Based on Optical Flow. 422-431 - R. Madhusudhan, Vishnu K. K.:
A Framework for Blockchain-Based Scalable E-Voting System Using Sharding and Time-Slot Algorithm. 432-443 - Mehak, Dharmendra Prasad Mahato:
Hop-Constrained Oblivious Routing Using Prim's-Sollin's Algorithm. 444-452 - Oscar G. Lira, Alberto Marroquin, Marco Antonio To:
Harnessing the Advanced Capabilities of LLM for Adaptive Intrusion Detection Systems. 453-464 - Ying-Tso Wen, Sz-Hsien Wu, Chia-Yi Chen, Yen-Yuan Hsu, Po-Hsueh Wang, Shun-Min Hsu, Chen-Yuan Chang, Bo-Chen Kung:
Real-Time Rogue Base Stations Detection System in Cellular Networks. 465-474 - Nessrine Trabelsi, Lamia Chaari Fourati:
A Brief Review of Machine Learning-Based Approaches for Advanced Interference Management in 6G In-X Sub-networks. 475-487 - Meryem Hamdi, Mohamed Hayouni, Emna Jebabli:
A Comparative Study of Adaptive and Switched Beamforming for 5G Mobile Network Applications. 488-497
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.