Descripción del título

Monografía
monografia Rebiun32108331 https://catalogo.rebiun.org/rebiun/record/Rebiun32108331 m o d | cr cnu|||||||| 221113s2022 sz a ob 001 0 eng d 9783030995843 electronic bk.) 9783030995836 UPVA 998068833903706 UAM 991008182751604211 CBUC 991005082325506711 CBUC 991010723895006709 UCAR 991008310108604213 CBUC 991010723895006709 MiAaPQ eng rda pn MiAaPQ MiAaPQ 004.6 23 Advanced information networking and applications proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022) edited by Leonard Barolli, Farookh Hussain, Tomoya Enokido Cham, Switzerland Springer [2022] Cham, Switzerland Cham, Switzerland Springer 2022 1 online resource (717 pages) 1 online resource (717 pages) Text txt rdacontent computer c rdamedia online resource cr rdacarrier Lecture Notes in Networks and Systems Ser. v.449 Includes bibliographical references and index Intro -- Welcome Message from AINA-2022 Organizers -- Organization -- AINA-2022 Organizing Committee -- Honorary Chair -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chair -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Track Co-chairs -- TPC Members -- 2. Next-Generation Wireless Networks -- Track Co-chairs -- TPC Members -- 3. Multimedia Systems and Applications -- Track Co-chairs -- TPC Members -- 4. Pervasive and Ubiquitous Computing -- Track Co-chairs -- TPC Members -- 5. Web-Based and E-Learning Systems -- Track Co-chairs -- TPC Members -- 6. Distributed and Parallel Computing -- Track Co-chairs -- TPC Members -- 7. Data Mining, Big Data Analytics and Social Networks -- Track Co-chairs -- TPC Members -- 8. Internet of Things and Cyber-Physical Systems -- Track Co-chairs -- TPC Members -- 9. Intelligent Computing and Machine Learning -- Track Co-chairs -- TPC Members -- 10. Cloud and Services Computing -- Track Co-chairs -- TPC Members -- 11. Security, Privacy and Trust Computing -- Track Co-chairs -- TPC Members -- 12. Software-Defined Networking and Network Virtualization -- Track Co-chairs -- TPC Members -- AINA-2022 Reviewers -- AINA-2022 Keynote Talks -- Data Intensive Scalable Computing in Edge/Fog/Cloud Environments -- Resource Management in 5G Cloudified Infrastructure: Design Issues and Challenges -- Contents -- An Approach for Mitigating Disruptions on Resources' Consumption Cycles -- 1 Introduction -- 2 Related Work -- 3 Resource Consumption in Brief -- 3.1 Consumption Properties -- 3.2 Disruption Handling -- 4 Scenarios to Mitigate Disruptions 5 PN-based Verification of Consumption Cycles -- 6 Conclusion -- References -- Text Detection and Recognition Using Augmented Reality and Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Text detection and recognition based on Deep learning method -- 2.2 Text Detection and Recognition Based on Augmented Reality Method -- 3 Proposed Approach -- 3.1 Text Detection and Recognition Using DL -- 3.2 Text Visualization Using AR -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Energy Consumption Model of Servers to Make Virtual Machines Migrate -- 1 Introduction -- 2 Power Consumption and Computation Models of a Server -- 3 An Estimation Model of Energy Consumption -- 4 Migration of Virtual Machines -- 4.1 Energy Consumption for Migration of a Virtual Machine -- 4.2 Migration Algorithm -- 5 Evaluation -- 6 Concluding Remarks -- References -- Development of a Blockchain-Based Ad Listing Application -- 1 Introduction -- 2 Terminology and Literature Review -- 3 Methodology -- 4 Design and Implementation -- 5 Conclusion and Future Work -- References -- Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses -- 1 Introduction -- 2 Proposed Approach -- 2.1 Main Workflows -- 2.2 Neighborhood Rough Set and Three-Way Decisions -- 2.3 Time-Related Aspects of the Approach -- 3 Case Study -- 3.1 Dataset Description and Preparation -- 3.2 Experimentation and Evaluation -- 4 Final Remarks -- References -- Enhanced Autonomous Driving Through Improved 3D Objects Detection -- 1 Introduction -- 2 Presentation of the Proposed Model -- 2.1 Description of the Objects Detection Component -- 3 The Experimental Dataset -- 4 The Training Process -- 5 Presentation of the Performance Assessment Process -- 5.1 Performance Assessment Metrics -- 5.2 Investigation Concerning the Number and Placement of Sensors 5.3 Remarks Regarding Additional Road Traffic Scenarios -- 6 Conclusions and Future Work -- References -- Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel -- 1 Introduction -- 2 The Principle of Studied WuR-Based MAC -- 2.1 WuR-CA -- 2.2 WuR-NCA -- 3 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Throughput -- 4.3 Delay -- 4.4 Power Consumption -- 5 Results and Discussion -- 5.1 Variation in Number of Nodes -- 5.2 Effect of the Traffic Load -- 5.3 Variation in Data Packet Length -- 5.4 Variation in BER -- 6 Conclusion -- References -- CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks -- 1 Introduction -- 2 Related Work -- 3 Protocol Design and DTMC Modeling of CaWuQoS-MAC -- 3.1 Protocol Design -- 3.2 DTMC Modeling -- 4 Performance Analysis -- 4.1 Reliability -- 4.2 Delay -- 4.3 Power Consumption -- 5 Results and Discussion -- 5.1 Performance Analysis with Variable N -- 5.2 Performance Analysis vs. BER -- 5.3 Performance Analysis with Variable Traffic Load -- 6 Conclusion -- References -- A Dynamic ID Assignment Approach for Modular Robots -- 1 Introduction -- 2 Background on Unique ID Assignment -- 3 Dynamic ID Assignment Algorithm -- 3.1 Module Removal Handling -- 3.2 Module Addition Handling -- 4 Discussion -- 5 Experimental results -- 6 Conclusion and Future Work -- References -- Open-Source Publish-Subscribe Systems: A Comparative Study -- 1 Introduction -- 2 Related Work and Background -- 3 Functional Evaluation and Comparison -- 4 Performance Evaluation and Comparison -- 4.1 Experimental Results -- 5 Conclusions and Future Work -- References -- Conceptual Foundations of Code Rationalization Through a Case Study in Haskell -- 1 Introduction -- 2 Relevant Existing Contributions 3 The Theoretical and Technological Fundamentals of Code Rationalization -- 3.1 Compliance with the Fundamental Principles of Software Systems Engineering -- 3.2 Elaboration and Systematic Utilization of Design Patterns -- 3.3 Elaboration and Systematic Utilization of Implementational Patterns -- 3.4 Consideration of the Optimal Programming Paradigms for a Certain Type of Problem -- 4 Generic Code Rationalization -- 4.1 Problem Statement -- 4.2 Code Rationalization as a Process to Seek the Optimal State of the Software Systems -- 5 Case Study -- 5.1 The Considered Problem -- 5.2 Example of Code Rationalization in Three Haskell Iterations -- 5.3 Final Remarks Related to the Presented Use Case -- 6 Conclusions -- References -- Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems -- 1 Introduction -- 2 System Model -- 2.1 Object-Based Systems -- 2.2 Two-Phase Locking (2PL) Protocol -- 2.3 Data Access Model -- 2.4 Power Consumption Model of a Server -- 3 Energy-Efficient Two-Phase Locking (EE2PL) Protocol -- 3.1 Meaningless Write Methods -- 3.2 Energy-Efficient 2PL (EE2PL) Protocol -- 4 Evaluation -- 4.1 Environment -- 4.2 Total Processing Electric Energy Consumption -- 4.3 Average Execution Time of Each Transaction -- 5 Concluding Remarks -- References -- A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media -- 1 Introduction -- 2 Related Work -- 3 Co-owned Image Sharing -- 3.1 Multi-agent Model -- 4 Experimental Setup and Results -- 4.1 Results -- 5 Conclusion -- References -- Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks -- 1 Introduction -- 2 Preliminary Assumptions for Analysis -- 3 Structural Controllability Restoration -- 3.1 STG-1: Strategy Using Backup Instances -- 3.2 STG-2: Strategy Using Edge Allocation 3.3 STG-3: Strategy Using Diameter-Based Relinking -- 3.4 STG-4: Driver Node Injection Strategy -- 4 Experimental Results and Discussion -- 4.1 Network and Attacks Models -- 4.2 Analysis and Validation -- 4.3 Time Complexity Analysis -- 5 Conclusion and Future Work -- References -- Resource Authorization Methods for Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Requirements for the Authorization on Edge Computing Models -- 3.1 Edge Computing Models -- 3.2 Requirement for Applying the OAuth Flow to Resource Authorization on Edge Computing -- 4 Participant Relationships in Edge Computing Authorization -- 4.1 Concept of Privilege Delegation Model -- 4.2 Pattern Classification by Participant Relationship -- 4.3 Use Case of Each Pattern -- 4.4 Authorization Flow on Each Pattern -- 5 Discussion for Authorization Flow -- 5.1 Identifying User Location -- 5.2 Comparison with Original Flow -- 6 Conclusion -- References -- Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Method -- 3.2 Dataset and Classification Features -- 4 Evaluation -- 4.1 Classification Results -- 4.2 Computational Performance -- 5 Conclusion -- References -- Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 System Architecture -- 3.2 Data -- 3.3 Implementation -- 4 Evaluation Results -- 5 Conclusion -- References -- Automatic Monitoring System for Security Using IoT Devices and Smart Contracts -- 1 Introduction -- 2 Predicting the Failure of IoT Devices -- 3 Related Work -- 4 Proposed Method -- 4.1 System Flow -- 4.2 Concrete Example -- 5 Experiment -- 5.1 Experimental Methods and Results -- 5.2 Discussion -- 6 Conclusion -- References A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet Artificial intelligence Enokido, Tomoya editor Barolli, Leonard editor Takizawa, Makoto editor Print version Barolli, Leonard. Advanced Information Networking and Applications Cham : Springer International Publishing AG,c2022 9783030995836 Lecture Notes in Networks and Systems Ser