


default search action
38th AINA 2024: Kitakyushu, Japan
- Leonard Barolli:

Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 3. Lecture Notes on Data Engineering and Communications Technologies 201, Springer 2024, ISBN 978-3-031-57869-4 - Jean-Paul A. Yaacoub, Benoît Piranda, Frédéric Lassabe, Hassan N. Noura:

Efficient Communication Protocol for Programmable Matter. 1-11 - Rajdeep Niyogi, Amar Nath:

IoRT-Based Distributed Algorithm for Robust Team Formation and Its Application to Smart City Operation. 12-23 - Shreeram Hudda

, K. Haribabu, Rishabh Barnwal, Abhishek Khurana:
A WSN and Vision Based Energy Efficient and Smart Surveillance System Using Computer Vision and AI at Edge. 24-36 - Neminath Hubballi, Nisha Kumari Barsha:

Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems. 37-47 - Aimilios Tzavaras

, Chrisa Tsinaraki
, Euripides G. M. Petrakis
:
API Descriptions for the Web of Things. 48-58 - Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, Ashutosh Bhatia, Kamlesh Tiwari:

SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep Learning. 59-72 - Gaurav Prasad, Aditya Gupta, Avnish Aryan, Sudhir Kumar:

A Vision Transformer Based Indoor Localization Using CSI Signals in IoT Networks. 73-83 - Wided Khemili, Jalel Eddine Hajlaoui, Mohand Yazid Saidi, Mohamed Nazih Omri, Ken Chen:

Deep Reinforcement Learning for VNF Placement and Chaining of Cloud Network Services. 84-96 - Mahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine

, Lamia Romdhani, Ridha Bouallegue:
Optimising Water Quality Classification in Aquaculture Using a New Parameter Pre-selection Approach. 97-107 - Kenshin Tsumuraya, Yonghui Huang, Minoru Uehara, Yoshihiro Adachi:

Topic Analysis of Japanese Sentences Using Sentence Embeddings. 108-122 - Kenshin Tsumuraya, Minoru Uehara, Yoshihiro Adachi:

Performance Improvement of Semantic Search Using Sentence Embeddings by Dimensionality Reduction. 123-132 - Ermioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo, Leonard Barolli:

A Fuzzy-Based System for Assessment of Performance Error in VANETs. 133-142 - Inam Alanazi, Firas Al-Doghman

, Abdulrahman Alsubhi, Farookh Khadeer Hussain:
Carbon Credits Price Prediction Model (CCPPM). 143-150 - Haibo Zhang, Kouichi Sakurai:

Experimental Exploration of the Power of Conditional GAN in Image Reconstruction-Based Adversarial Attack Defense Strategies. 151-162 - Enock Cabral Almeida Vieira, Paulo Carvalho, Flávio de Oliveira Silva

:
Framework for Cognitive Self-Healing of Real Broadband Networks. 163-174 - Aman Verma, Sanat Thakur, Ankush Kumar, Dharmendra Prasad Mahato:

Honey Bee Inspired Routing Algorithm for Sparse Unstructured P2P Networks. 175-186 - Kartikeya Dubey

, Chittaranjan Hota:
Anomaly Detection in WBANs Using CNN-Autoencoders and LSTMs. 187-197 - Davinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi:

LLM-Based Agents Utilized in a Trustworthy Artificial Conscience Model for Controlling AI in Medical Applications. 198-209 - Vitor Gabriel Reis Lux Barboza, Janine Kniess:

Task Allocation Based on Simulated Annealing for Edge Industrial Internet. 210-221 - Janel Huang, Murugaraj Odiathevar, Alvin C. Valera, Jyoti Sahni

, Marcus Frean, Winston K. G. Seah:
Realtime BGP Anomaly Detection Using Graph Centrality Features. 222-233 - Pratyush Mishra, Vikram Singh

, Aneesh Krishna, Lov Kumar:
An Empirical Analysis on Leveraging User Reviews with NLP-Enhanced Word Embeddings for App Rating Prediction. 234-244 - Yiting Wang, Yawen Li, Zequn Wei

, Junqi Li:
Hybrid Evolutionary Algorithm for the Overlap Constrained Resource Allocation Problem in Wireless Networks. 245-256 - Mahdi Hamzaoui, Mohamed Ould-Elhassen Aoueileyine

, Lamia Romdhani, Ridha Bouallegue:
An Efficient Method for Underwater Fish Detection Using a Transfer Learning Techniques. 257-267 - Timothy Stockton, Brandon Peddle, Angelica Gaulin, Emma Wiechert, Wei Lu:

Comparative Analysis of Data Preprocessing Methods in Machine Learning for Breast Cancer Classification. 268-279 - Chih-Fong Tsai, Ya-Han Hu, Ming-Chang Wang, Kang Ernest Liu:

Hybrid Technical-Visual Features for Stock Prediction. 280-289 - Gabriel Fernandes Silva, Victor Ströele

, Regina Braga
, Mario A. R. Dantas
, Michael A. Bauer
:
Intelligent Health Promotion: Machine Learning in the Prevention of Stress-Related Diseases. 290-301 - Thanawin Sakpuaram, Chantana Chantrapornchai:

RsViT - A Scalable Vision Transformer Backbone for Diffusion Model. 302-312 - Sabina Sapkota, Haojun Huang, Yining Hu, Farookh Hussain:

A Deep Neural Network (DNN) Based Contract Policy on Hyperledger Fabric for Secure Internet of Things (IoTs). 313-325 - R. Madhusudhan, Shubham Kumar Thakur, P. Pravisha:

Enhancing Intrusion Detection System Using Machine Learning and Deep Learning. 326-337 - Hadi Salloum

, Hamza Shafee Aldaghstany, Osama Orabi
, Ahmad Haidar, Mohammad Reza Bahrami, Manuel Mazzara:
Integration of Machine Learning with Quantum Annealing. 338-348 - Jefferson Amará, Victor Ströele, Regina Braga, José Maria N. David:

From Context to Forecast: Ontology-Based Data Integration and AI for Events Prediction. 349-361 - Matheus Saueressig, Muriel Figueredo Franco, Eder J. Scheid, Alberto Huertas Celdrán, Gérôme Bovet, Burkhard Stiller, Lisandro Z. Granville:

FEVER: Intelligent Behavioral Fingerprinting for Anomaly Detection in P4-Based Programmable Networks. 362-373 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:

Improved Purpose-Based Concurrency Control to Reduce the Electric Energy Consumption of a Server Cluster. 374-384 - André Luiz Tinassi D'Amato, Mario A. R. Dantas:

Proposal for a Resource Allocation Model Aimed at Fog Computing. 385-396 - Keita Matsuo, Leonard Barolli:

Implementation of a Cloud Based Voice Recognition Motor Control System for Omnidirectional Wheelchair. 397-403 - Asma AlKhalaf, Farookh Khadeer Hussain:

Towards Priority VM Placement in Fog Networks. 404-414 - Omessead BenMarak

, Anis Naanaa, Sadok ElAsmi:
A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing. 415-425 - Nirali Sanghvi, Rajdeep Niyogi:

LoRa and Cloud-Based Multi-robot Pesticide Spraying for Precision Agriculture. 426-436 - Athanasios Prountzos, Euripides G. M. Petrakis

:
DeFog: Adaptive Microservice Scheduling on Kubernetes Clusters in Cloud-Edge-Fog Infrastructures. 437-448 - Francesco Lubrano

, Giuseppe Caragnano, Alberto Scionti, Olivier Terzo:
Challenges, Novel Approaches and Next Generation Computing Architecture for Hyper-Distributed Platforms Towards Real Computing Continuum. 449-459

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














