GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Schlagwort(e): Information networks-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (1396 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030150327
    Serie: Advances in Intelligent Systems and Computing Series ; v.926
    DDC: 004.6
    Sprache: Englisch
    Anmerkung: Intro -- Welcome Message from AINA-2019 Steering Committee Co-chairs -- Welcome Message from AINA-2019 General Co-chairs -- Welcome Message from AINA-2019 Program Committee Co-chairs -- Welcome Message from AINA-2019 Workshops' Co-chairs -- AINA-2019 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops' Co-chairs -- International Special Issue Journal Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec14 -- Sec15 -- 2. Next Generation Wireless Networks -- Sec17 -- Sec18 -- 3. Multimedia Systems and Applications -- Sec20 -- Sec21 -- 4. Pervasive and Ubiquitous Computing -- Sec23 -- Sec24 -- 5. Internet Computing and E-Learning -- Sec26 -- Sec27 -- 6. Distributed Systems Database and Data Mining -- Sec29 -- Sec30 -- 7. Grid, P2P, and Scalable Computing -- Sec32 -- Sec33 -- 8. Agents, Semantics and Intelligent Computing -- Sec35 -- Sec36 -- 9. Cloud, Data Centers, and Services Computing -- Sec38 -- Sec39 -- 10. Internet of Things and Social Networking -- Sec41 -- Sec42 -- 11. Security, Privacy, and Trust Computing -- Sec44 -- Sec45 -- 12. Cognitive and Neural Computing with Application -- Sec47 -- Sec48 -- AINA-2019 Reviewers -- AINA-2019 Keynote Talks -- Utilizing Wireless Communication to Enable New Types of Industrial Applications Markus Aleksy ABB AG Corporate Research Center, Ladenburg, Germany -- Lévy Walk on Graphs: Message Dissemination and Uninformed Search Naohiro Hayashibara Kyoto Sangyo University, Kyoto, Japan -- Contents -- Electricity Load Forecasting in Smart Grids Using Support Vector Machine -- 1 Introduction -- 2 Contributions -- 3 System Model -- 3.1 Preprocessing Data. , 3.2 Training and Forecasting of Data -- 3.3 Proposed Model -- 4 Simulations -- 4.1 Feature Selection Using XGBoost and DTC -- 4.2 Load Forecasting -- 4.3 Performance Evaluation -- 5 Conclusions and Future Work -- References -- Optimization of Response and Processing Time for Smart Societies Using Particle Swarm Optimization and Levy Walk -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Proposed Scheme -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- On Maximizing User Comfort Using a Novel Meta-Heuristic Technique in Smart Home -- 1 Introduction -- 2 Related Work -- 3 Motivation and Problem Statement -- 4 System Model -- 5 Optimization Techniques -- 5.1 FPA -- 5.2 Jaya Algorithm -- 5.3 User Comfort Maximization -- 6 Simulation Results and Discussion -- 7 Conclusion -- References -- Towards Efficient Energy Management in a Smart Home Using Updated Population -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 System Model -- 5 Optimization Algorithms -- 5.1 GWO -- 5.2 Jaya Algorithm -- 5.3 Updated Population -- 6 Pseudo Code of the Proposed Scheme -- 7 Simulation and Reasoning -- 8 Conclusion -- References -- A New Memory Updation Heuristic Scheme for Energy Management System in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 System Model -- 4.1 Appliances Classification -- 4.2 Price Tariff -- 5 Meta-heuristic Algorithms -- 5.1 CSA -- 5.2 GWO -- 5.3 MUHS -- 6 Simulation and Reasoning -- 7 Conclusion -- References -- Towards Efficient Scheduling of Smart Appliances for Energy Management by Candidate Solution Updation Algorithm in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Scheduling Techniques -- 5.1 Bat Algorithm (BA) -- 5.2 Jaya Algorithm. , 5.3 Candidate Solution Updation Algorithm (CSUA) -- 6 Simulation Results and Reasoning -- 7 Conclusion -- References -- Minimizing Daily Electricity Cost Using Bird Chase Scheme with Electricity Management Controller in a Smart Home -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed System Model -- 5 Metaheuristic Optimization Algorithms -- 5.1 CSA -- 5.2 Jaya -- 5.3 BCS -- 6 Simulation Results and Discussion -- 6.1 RTP Tariff -- 7 Conclusion -- References -- Optimal Power Flow with Uncertain Renewable Energy Sources Using Flower Pollination Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 RESs Uncertainty Model -- 3.1 Wind Generator Power Model -- 3.2 Solar Photovoltaic Power Model -- 3.3 Hydro Generation Power Model -- 4 Objective Function -- 5 Algorithms -- 6 Application and Results -- 7 Conclusion -- References -- Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems -- 1 Introduction -- 2 System Model -- 2.1 P2PPSO Model -- 2.2 Information Flow -- 3 Protocols to Prevent Illegal Information Flow -- 3.1 TOBSCO Protocol -- 3.2 ETOBSCO (Efficient TOBSCO) Protocol -- 4 Evaluation -- 5 Concluding Remarks -- References -- Comparison of Intelligent Algorithms with FACTS Devices for Minimization of Total Power Losses -- Abstract -- 1 Introduction -- 2 Optimal Power Flow -- 3 Intelligent Algorithms -- 3.1 Particle Swarm Optimization (PSO) Algorithm -- 3.2 Imperialist Competitive Algorithm (ICA) -- 4 FACTS Devices -- 5 Simulation Results -- 6 Conclusions -- References -- Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model -- 1 Introduction -- 2 System Model -- 2.1 Tree Structure of Fog Nodes -- 2.2 Energy Consumption of Fog Nodes -- 3 A Modified Fault-Tolerant Tree-Based Fog Computing (MFTBFC) Model -- 4 Evaluation -- 5 Concluding Remarks. , References -- Energy-Efficient Group Migration of Virtual Machines in a Cluster -- 1 Introduction -- 2 System Model -- 3 Estimation of Energy Consumption -- 4 A Dynamic Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- A Secure and Trustworthy Intelligent System for Clustering in VANETs Using Fuzzy Logic -- 1 Introduction -- 2 VANETs -- 3 Proposed System -- 4 Simulation Results -- 5 Conclusions -- References -- Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System -- Abstract -- 1 Introduction -- 2 Related Work -- 3 A Terminal Access Data Anomaly Detection Model Based on Random Forest for Power User Electric Energy Data Acquisition System -- 3.1 The Framework of Access Data Anomaly Detection -- 3.2 Feature Extraction -- 3.3 Random Forest Basics -- 4 Performance Evaluation -- 4.1 Introduction to the Dataset -- 4.2 Model Selection Method -- 4.3 Model Evaluation Indexes -- 4.4 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Multi-level Authentication Protocols Using Scientific Expertise Approach -- Abstract -- 1 Introduction -- 2 Multi-level Authentication Based on Expert Knowledge -- 3 Security Features of Multi-level Protocols -- 4 Conclusions -- Acknowledgments -- References -- Biometric-Based Linguistic Solutions for Data Encryption and Sharing -- Abstract -- 1 Introduction -- 2 New Classes of Biometric-Based Threshold Schemes -- 3 Example of Application of Biometric-Based Threshold Schemes -- 4 Conclusions -- Acknowledgments -- References -- Dependability Analysis for On-Demand Computing Based Transaction Processing System -- 1 Introduction -- 2 Model Description -- 2.1 The Exponential Model of Goel and Okumoto -- 2.2 Delayed S-shaped Model -- 2.3 Inflected S-shaped Model -- 2.4 Weibull Model -- 2.5 Jump Diffusion Modeling. , 3 Parameter Estimation -- 3.1 Method of Maximum-Likelihood -- 3.2 Estimation of the Jump Diffusion Parameters -- 4 Dependability Assessment Measures -- 4.1 Reliability in Transaction Processing System -- 4.2 Performability -- 5 Optimal Maintenance Problem -- References -- A Comparative Analysis of Trust Requirements in Decentralized Identity Management -- 1 Introduction -- 2 Related Work -- 3 Analysing Trust in Identity Management -- 3.1 The Notion of Trust -- 3.2 Trust Domains and Requirements -- 3.3 Objective and Evaluation Methodology -- 4 Trust Requirements in Decentralized Identity Management -- 4.1 Decentralization Characteristics -- 4.2 Decentralized Identity Management Based on Blockchain -- 4.3 Decentralized Identity Management Patterns -- 4.4 Comparison to Trust Requirements in Traditional Models -- 5 Conclusion -- References -- Combined Methods Based Outlier Detection for Water Pipeline in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Outlier Detection in Wireless Sensor Networks -- 4 Data Reduction Techniques -- 4.1 Kernel Fisher Discriminant Analysis Technique (KFDA) -- 4.2 Support Vectors Machine Technique (SVM) -- 5 Experimental Results -- 6 Conclusion -- References -- The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Quorum-Based Locking Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 The IEEQS-EMM Algorithm -- 3.1 Quorum Selection -- 3.2 IEEQS-EMM Algorithm -- 4 Evaluation -- 4.1 Environment -- 4.2 Average Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 4.4 Average Number of Aborted Transaction Instances -- 5 Concluding Remarks -- References. , A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...