Keywords:
Computer networks-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (1217 pages)
Edition:
1st ed.
ISBN:
9783030150358
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.927
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=5730784
DDC:
004.6
Language:
English
Note:
Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshop Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Welcome Message from FINA-2019 Symposium Co-chairs -- FINA-2019 Organizing Committee -- FINA-2019 Symposium Co-chairs -- Program Committee Members -- Welcome Message from HWISE-2019 International Workshop Co-chairs -- Workshop Co-chairs -- Advisory Co-chairs -- Program Committee Members -- Web Administrator Co-chairs -- Welcome Message from MAW-2019 International Symposium Co-chairs -- MAW-2019 Organizing Committee -- Symposium Organizers -- Program Committee Members -- Welcome Message from BICom-2019 International Workshop Co-chairs -- BICom-2019 Organizing Committee -- Workshop Co-chairs -- Advisory Co-chairs -- Program Committee Members -- Web Administrator Co-chairs -- Welcome Message from TeNAS-2019 Workshop Organizers -- TeNAS-2019 Organizing Committee -- Steering Committee Chair -- General Co-chairs -- Program Co-chairs -- Program Committee Members -- Welcome Message from IWDENS-2019 Workshop Organizers -- IWDENS-2019 Organizing Committee -- Program Co-chairs -- Program Committee Members -- Welcome Message from COLLABES-2019 International Workshop Organizer -- COLLABES-2019 Organizing Committee -- Workshop Organizer -- Program Committee Members -- Welcome Message from INTRICATE-SEC-2019 Workshop Chair -- INTRICATE-SEC-2019 Organizing Committee -- Workshop Chair.
,
Program Committee Members -- Welcome Message from E3WSN-2019 International Workshop Co-chairs -- E3WSN-2019 Organizing Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from WITIN-2019 International Workshop Organizers -- WITIN-2019 Organizing Committee -- Workshop Co-chairs -- Program Committee Members -- Welcome Message from BOSON-2019 International Workshop Chair -- BOSON-2019 Organizing Committee -- Workshop Chair -- Workshop Program Committee Co-chairs -- Program Committee Members -- Welcome Message from IOEMLA-2019 International Workshop Co-chair -- IOEMLA-2019 Organizing Committee -- Workshop Co-chair -- Program Committee Members -- Welcome Message from M2EC-2019 Workshop Organizers -- General Co-chairs -- Publicity Chairs -- Program Committee Members -- Welcome Message from AIMAL-2019 Workshop Chair -- AIMAL-2019 Organizing Committee -- Workshop Chair -- Program Committee Members -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search -- Contents -- The 15th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2019) -- Adaptive Waveform Design of Polarimetric Radar for Extended Targets in Signal-Dependent Clutter -- 1 Introduction -- 2 System Model -- 3 Problem Formulation -- 4 Transmit Code and Receive Filter Design -- 4.1 Receive Filter Optimization: Solution to Problem Pw(m) -- 4.2 Radar Code Optimization: Solution to Problem Ps(m) -- 4.3 Transmit-Receive System Design: Optimization Procedure -- 5 Numerical Results -- 5.1 Monotonic Property of the Proposed Method -- 5.2 SINR Behavior vs. TAA Uncertainty Interval -- 6 Conclusions -- References -- CRAWL: A Trace Routing Algorithm Based on Hybrid Two-Layer Topology -- Abstract -- 1 Introduction.
,
2 System Structure -- 3 Description of CRAWL Algorithm -- 3.1 Algorithmic Process -- 3.2 Path Blocking and Recovery -- 4 CDM Algorithm -- 5 Experimental Results and Analysis -- 5.1 Method Realization -- 5.2 Parameter Settings -- 5.3 Routing Message Overhead -- 5.4 Content Matching Overhead -- 6 Conclusion -- References -- Design and Implementation of IoT Based Class Attendance Monitoring System Using Computer Vision and Embedded Linux Platform -- Abstract -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Proposed Approach -- 5 Hardware Requirements -- 5.1 Raspberry Pi 3 Model B -- 5.2 Pi Camera -- 6 Software and Algorithm -- 6.1 OpenCV -- 6.2 Haar Cascade Classifier Algorithm -- 6.3 Python -- 6.4 Numpy -- 6.5 Flask Framework -- 6.6 HTML and Bootstrap -- 7 Experimental Result -- 8 Conclusion -- Acknowledgement -- References -- An Indoor 3D Positioning Technology Based on NB-IoT -- Abstract -- 1 Introduction -- 2 The Advantages and Deployment of NB-IoT -- 2.1 The Advantages of NB-IoT -- 2.2 NB-IoT Deployment Method -- 2.3 NB-IoT Physical Layer Frame Structure -- 3 Location Algorithm -- 3.1 Delay Estimation -- 3.1.1 Calculation of Arrival Time -- 3.1.2 Cycle Estimation -- 3.2 Non-Line-of-Sight Error Optimization -- 3.2.1 Original CLS Algorithm -- 3.2.2 CLS Algorithm for Lagrange Multiplier [9] -- 3.3 Height Estimation -- 4 Conclusion -- Acknowledgements -- References -- Consideration of Implementation Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain -- Abstract -- 1 Introduction -- 2 Motivation and Related Research -- 3 Existing DACS SCHEME and wDACS System -- 3.1 Basic Principle of the DACS Scheme -- 3.2 Communication Control on Client -- 3.3 Security Mechanism of the DACS Scheme -- 3.4 The Cloud Type Virtual PBNM for the Common Use Between Plural Organizations.
,
4 Consideration of Implementation Method for the Scheme to Manage the Specific Domain -- 4.1 Concept of the Scheme to Manage the Specific Domain -- 4.2 Implementation Method for the Scheme to Manage the Specific Domain -- 5 Conclusion -- Acknowledgments -- References -- A Model of Virtual Machines to Support Storage Processes -- 1 Introduction -- 2 System Model -- 2.1 Virtual Machines -- 2.2 Clones -- 3 Experiments -- 4 A Model of Storage Applications on Virtual Machines -- 5 Concluding Remarks -- References -- Energy Efficient Scheduling of Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 4.1 Appliances Categories -- 4.2 Problem Formulation -- 5 Scheduling Techniques -- 5.1 Strawberry Algorithm (SA) -- 5.2 Salp Swarm Algorithm (SSA) -- 5.3 IAPR -- 6 Simulation Results and Discussions -- 7 Conclusion and Future Work -- References -- Minimizing Daily Cost and Maximizing User Comfort Using a New Metaheuristic Technique -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 SBA -- 5.2 EWA -- 5.3 Proposed -- 6 Simulation Results and Discussion -- 6.1 Pricing Tariff -- 7 Conclusion -- References -- Efficiency Analysis of TFHE Fully Homomorphic Encryption Software Library Based on GPU -- Abstract -- 1 Introduction -- 2 Preliminary -- 2.1 Algorithm -- 2.2 GPU Parallel Computing -- 3 TFHE Library Debug and Analysis -- 3.1 TFHE Library -- 3.2 TFHE Library Installation and Debugging -- 3.3 TFHE Library Debug Process -- 4 cuFHE Library Debugging and Analysis -- 4.1 cuFHE Library -- 4.2 cuFHE Library Installation and Debugging -- 4.3 cuFHE Library Debug Process -- 5 Performance Analysis -- 6 Conclusion -- References -- NADEEM: A Novel Reliable Data Delivery Routing Protocol for Underwater WSNs -- 1 Introduction.
,
2 Related Work and Problem Statement -- 3 Proposed System Model -- 3.1 UWSNs Propagation Model -- 4 Proposed Work -- 4.1 Dissemination of Beacon Message -- 4.2 The FA-NADEEM -- 4.3 The TA-NADEEM -- 5 Simulation Results and Discussion -- 5.1 Performance Control Parameters -- 5.2 Fraction of Local Maximum Nodes -- 5.3 Packet Delivery Ratio -- 5.4 Energy Consumption -- 6 Conclusion -- References -- An Architecture for Distributed Ledger-Based M2M Auditing for Electric Autonomous Vehicles -- 1 Introduction -- 2 Platform Architecture -- 2.1 Physical Layer -- 2.2 Network Layer -- 2.3 Services Layer -- 3 Unmanned EAV Charging -- 4 Research Challenges -- 5 Threat Model -- 6 Conclusions -- References -- Is QUIC Quicker Than TCP? -- 1 Introduction -- 1.1 Contribution -- 1.2 Paper Organization -- 2 Related Work -- 3 Background -- 3.1 Transport Control Protocol (TCP) -- 3.2 Quick UDP Internet Connections (QUIC) -- 4 Methodology -- 5 Analysis -- 5.1 Generate Raw Data -- 5.2 Data Analysis -- 5.3 Visualization -- 6 Conclusions -- 7 Future Work -- References -- PRAN: A Provenance Based Model and Prototype to Strengthen Authentication -- Abstract -- 1 Introduction -- 1.1 Motivation and Contributions -- 2 Problem Statement -- 3 Related Work -- 4 Provenance Based Authentication Model -- 4.1 Authentication Provenance -- 4.2 Policy Model -- 5 Prototype -- 5.1 Authentication Validation Point (AVP) -- 5.2 Authentication Server -- 5.3 Authentication Policy Specification -- 5.4 Policy Engine -- 5.5 Provenance Mechanism -- 6 Prototype Evaluation -- 6.1 Primary Detection -- 6.2 Secondary Detection -- 6.3 Evaluation Results -- 7 Limitations and Challenges -- 8 Conclusions and Future Directions -- References -- The Deepest Vertex First Reboot: Rebooting Network Edge Switches in a Campus Network -- 1 Introduction -- 2 Deepest Vertex First Reboot -- 2.1 Pre-condition.
,
2.2 Campus Network in Graph Theory.
Permalink