GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Information networks-Congresses.  (1)
  • Cham :Springer International Publishing AG,  (1)
  • 1
    Keywords: Information networks-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1396 pages)
    Edition: 1st ed.
    ISBN: 9783030150327
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.926
    DDC: 004.6
    Language: English
    Note: Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops' Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec14 -- Sec15 -- 2. Next Generation Wireless Networks -- Sec17 -- Sec18 -- 3. Multimedia Systems and Applications -- Sec20 -- Sec21 -- 4. Pervasive and Ubiquitous Computing -- Sec23 -- Sec24 -- 5. Internet Computing and E-Learning -- Sec26 -- Sec27 -- 6. Distributed Systems Database and Data Mining -- Sec29 -- Sec30 -- 7. Grid, P2P, and Scalable Computing -- Sec32 -- Sec33 -- 8. Agents, Semantics and Intelligent Computing -- Sec35 -- Sec36 -- 9. Cloud, Data Centers, and Services Computing -- Sec38 -- Sec39 -- 10. Internet of Things and Social Networking -- Sec41 -- Sec42 -- 11. Security, Privacy, and Trust Computing -- Sec44 -- Sec45 -- 12. Cognitive and Neural Computing with Application -- Sec47 -- Sec48 -- AINA-2019 Reviewers -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications Markus Aleksy ABB AG Corporate Research Center, Ladenburg, Germany -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search Naohiro Hayashibara Kyoto Sangyo University, Kyoto, Japan -- Contents -- Electricity Load Forecasting in Smart Grids Using Support Vector Machine -- 1 Introduction -- 2 Contributions -- 3 System Model -- 3.1 Preprocessing Data. , 3.2 Training and Forecasting of Data -- 3.3 Proposed Model -- 4 Simulations -- 4.1 Feature Selection Using XGBoost and DTC -- 4.2 Load Forecasting -- 4.3 Performance Evaluation -- 5 Conclusions and Future Work -- References -- Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Proposed Scheme -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 5 Optimization Techniques -- 5.1 FPA -- 5.2 Jaya Algorithm -- 5.3 User Comfort Maximization -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- Towards Efficient Energy Management in a Smart Home Using Updated Population -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 System Model -- 5 Optimization Algorithms -- 5.1 GWO -- 5.2 Jaya Algorithm -- 5.3 Updated Population -- 6 Pseudo Code of the Proposed Scheme -- 7 Simulation and Reasoning -- 8 Conclusion -- References -- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 System Model -- 4.1 Appliances Classification -- 4.2 Price Tariff -- 5 Meta-heuristic Algorithms -- 5.1 CSA -- 5.2 GWO -- 5.3 MUHS -- 6 Simulation and Reasoning -- 7 Conclusion -- References -- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Scheduling Techniques -- 5.1 Bat Algorithm (BA) -- 5.2 Jaya Algorithm. , 5.3 Candidate Solution Updation Algorithm (CSUA) -- 6 Simulation Results and Reasoning -- 7 Conclusion -- References -- Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 CSA -- 5.2 Jaya -- 5.3 BCS -- 6 Simulation Results and Discussion -- 6.1 RTP Tariff -- 7 Conclusion -- References -- Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 RESs Uncertainty Model -- 3.1 Wind Generator Power Model -- 3.2 Solar Photovoltaic Power Model -- 3.3 Hydro Generation Power Model -- 4 Objective Function -- 5 Algorithms -- 6 Application and Results -- 7 Conclusion -- References -- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems -- 1 Introduction -- 2 System Model -- 2.1 P2PPSO Model -- 2.2 Information Flow -- 3 Protocols to Prevent Illegal Information Flow -- 3.1 TOBSCO Protocol -- 3.2 ETOBSCO (Efficient TOBSCO) Protocol -- 4 Evaluation -- 5 Concluding Remarks -- References -- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses -- Abstract -- 1 Introduction -- 2 Optimal Power Flow -- 3 Intelligent Algorithms -- 3.1 Particle Swarm Optimization (PSO) Algorithm -- 3.2 Imperialist Competitive Algorithm (ICA) -- 4 FACTS Devices -- 5 Simulation Results -- 6 Conclusions -- References -- Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model -- 1 Introduction -- 2 System Model -- 2.1 Tree Structure of Fog Nodes -- 2.2 Energy Consumption of Fog Nodes -- 3 A Modified Fault-Tolerant Tree-Based Fog Computing (MFTBFC) Model -- 4 Evaluation -- 5 Concluding Remarks. , References -- Energy-Efficient Group Migration of Virtual Machines in a Cluster -- 1 Introduction -- 2 System Model -- 3 Estimation of Energy Consumption -- 4 A Dynamic Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic -- 1 Introduction -- 2 VANETs -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusions -- References -- Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 A Terminal Access Data Anomaly Detection Model Based on Random Forest for Power User Electric Energy Data Acquisition System -- 3.1 The Framework of Access Data Anomaly Detection -- 3.2 Feature Extraction -- 3.3 Random Forest Basics -- 4 Performance Evaluation -- 4.1 Introduction to the Dataset -- 4.2 Model Selection Method -- 4.3 Model Evaluation Indexes -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Multi-level Authentication Protocols Using Scientific Expertise Approach -- Abstract -- 1 Introduction -- 2 Multi-level Authentication Based on Expert Knowledge -- 3 Security Features of Multi-level Protocols -- 4 Conclusions -- Acknowledgments -- References -- Biometric-Based Linguistic Solutions for Data Encryption and Sharing -- Abstract -- 1 Introduction -- 2 New Classes of Biometric-Based Threshold Schemes -- 3 Example of Application of Biometric-Based Threshold Schemes -- 4 Conclusions -- Acknowledgments -- References -- Dependability Analysis for On-Demand Computing Based Transaction Processing System -- 1 Introduction -- 2 Model Description -- 2.1 The Exponential Model of Goel and Okumoto -- 2.2 Delayed S-shaped Model -- 2.3 Inflected S-shaped Model -- 2.4 Weibull Model -- 2.5 Jump Diffusion Modeling. , 3 Parameter Estimation -- 3.1 Method of Maximum-Likelihood -- 3.2 Estimation of the Jump Diffusion Parameters -- 4 Dependability Assessment Measures -- 4.1 Reliability in Transaction Processing System -- 4.2 Performability -- 5 Optimal Maintenance Problem -- References -- A Comparative Analysis of Trust Requirements in Decentralized Identity Management -- 1 Introduction -- 2 Related Work -- 3 Analysing Trust in Identity Management -- 3.1 The Notion of Trust -- 3.2 Trust Domains and Requirements -- 3.3 Objective and Evaluation Methodology -- 4 Trust Requirements in Decentralized Identity Management -- 4.1 Decentralization Characteristics -- 4.2 Decentralized Identity Management Based on Blockchain -- 4.3 Decentralized Identity Management Patterns -- 4.4 Comparison to Trust Requirements in Traditional Models -- 5 Conclusion -- References -- Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Outlier Detection in Wireless Sensor Networks -- 4 Data Reduction Techniques -- 4.1 Kernel Fisher Discriminant Analysis Technique (KFDA) -- 4.2 Support Vectors Machine Technique (SVM) -- 5 Experimental Results -- 6 Conclusion -- References -- The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Quorum-Based Locking Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 The IEEQS-EMM Algorithm -- 3.1 Quorum Selection -- 3.2 IEEQS-EMM Algorithm -- 4 Evaluation -- 4.1 Environment -- 4.2 Average Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 4.4 Average Number of Aborted Transaction Instances -- 5 Concluding Remarks -- References. , A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...