Barolli, Leonard

Innovative Mobile and Internet Services in Ubiquitous Computing

Barolli, Leonard - Innovative Mobile and Internet Services in Ubiquitous Computing, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783319615424
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Ubiquitous and Pervasive Computing forReal-Time Energy Management and Saving
Simone Scannapieco, Claudio Tomazzoli

2. Performance Evaluation of Intelligent Hybrid Systems for Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-PSOHC and WMN-PSOSA
Shinji Sakamoto, Kosuke Ozera, Tetsuya Oda, Makoto Ikeda, Leonard Barolli

3. Design of a Smart Desk for an IoT Testbed: Improving Learning Efficiency and System Security
Masafumi Yamada, Miralda Cuka, Yi Liu, Tetsuya Oda, Keita Matsuo, Leonard Barolli

4. Performance Evaluation of a Deep Q-Network Based Simulation System for Actor Node Mobility Control in Wireless Sensor and Actor Networks Considering Different Distributions of Events
Tetsuya Oda, Elis Kulla, Miralda Cuka, Donald Elmazi, Makoto Ikeda, Leonard Barolli

5. Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Exponential and Weibull Distributions
Keita Matsuo, Shinji Sakamoto, Tetsuya Oda, Admir Barolli, Makoto Ikeda, Leonard Barolli

6. Proposal of Traffic Accident Prevention System with Chronological Variations of Wireless Signals and Sensors on Mobile Nodes
Shoma Takeuchi, Noriki Uchida, Yoshitaka Shibata

7. Implementation of a WLAN Triage Testbed Using Fuzzy Logic: Evaluation for Different Number of Clients
Kosuke Ozera, Takaaki Inaba, Shinji Sakamoto, Leonard Barolli

8. A Fuzzy-Based Testbed for Wireless Sensor and Actuator Networks: Performance Evaluation for Different Remaining Energy of Actuators
Gaku Tsuchiya, Keisuke Ebisu, Makoto Ikeda, Donald Elmazi, Leonard Barolli, Elis Kulla

9. Simple Energy-Aware Algorithms to Selecting a Server for Storage and Computation Processes in a Cluster
Atsuhiro Sawada, Shigenari Nakamura, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa

10. An Energy-Saving Unicast Routing Protocol in Wireless Ad-hoc Network
Emi Ogawa, Shigenari Nakamura, Makoto Takizawa

11. Performance Evaluation of Clustering and Collaborative Filtering Algorithms for Resource Scheduling in a Public Cloud Environment
Klodiana Goga, Fatos Xhafa, Olivier Terzo

12. BioGraphBot: A Conversational Assistant for Bioinformatics Graph Databases
Antonio Messina, Agnese Augello, Giovanni Pilato, Riccardo Rizzo

13. Utilizing Augmented Reality and Wearables in Industrial Applications
Markus Aleksy, Johannes Schmitt

14. Security Assessment of the Image-Based Authentication Using Screen-Capture Tools
Insu Oh, Yeunsu Lee, Hyeji Lee, Kyungroul Lee, Kangbin Yim

15. Monitoring of Power Transmission Lines Through Wireless Sensor Networks in Smart Grid
Malik Ali Judge, Awais Manzoor, Fahim Ahmed, Saqib Kazmi, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid

16. User Comfort Oriented Residential Power Scheduling in Smart Homes
Awais Manzoor, Fahim Ahmed, Malik Ali Judge, Adnan Ahmed, Mirza Amaad Ul Haq Tahir, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid

17. Two Hop Adaptive Routing Protocol for Underwater Wireless Sensor Networks
Farwa Ahmed, Saba Gul, Muhammad Amir Khalil, Arshad Sher, Zahoor Ali Khan, Umer Qasim, Nadeem Javed

18. User Satisfaction Based Home Energy Management System for Smart Cities
Fozia Feroze, Itrat Fatima, Saman Zahoor, Nabeeha Qayyum, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid

19. Fuzzy Energy Management Controller for Smart Homes
Rabiya Khalid, Samia Abid, Ayesha Zafar, Anila Yasmeen, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid

20. Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge Graph
Xiaobo Hu, Xinhuai Tang, Feilong Tang

21. Converging Human Knowledge for Opinion Mining
Jiacheng Liu, Feilong Tang, Long Chen, Liang Qiao, Yanqin Yang, Wenchao Xu

22. Accuracy Is Not Enough: Serendipity Should Be Considered More
Huan Yu, Ying Wang, Yaning Fan, Sachula Meng, Rui Huang

23. Movie Recommendation Based on Visual Features of Trailers
Yaning Fan, Ying Wang, Huan Yu, Baoling Liu

24. A Study on the Motion Recognition of Basketball Players Based on Unit Gesture Decomposition
Xiaochen Lai, Wenzhe Shi, Lu Liu, Xin Liu, Yu Zhao

25. Indoor Navigation System Based on Augmented Reality Markers
Fumiaki Sato

26. Study on Android Native Layer Code Protection Based on Improved O-LLVM
Baojiang Cui, Qi Zhao, Tianyu Liu

27. A Two-Tiered Defence of Techniques to Prevent SQL Injection Attacks
Yan Zhu, Guidong Zhang, Zhiquan Lai, Boya Niu, Yongjun Shen

28. The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse
Baojiang Cui, Yi Ren, Pin Mao

29. An Anonymous Access Authentication Scheme for VANETs Based on ISGS
Tianhan Gao, Yanqiang Li, Nan Guo

30. EE-CFI: Externalized Control Flow Integrity for Embedded Devices
Valentin Lefils, Gilles Grimaud, Julien Iguchi-Cartigny

31. An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network
Tianhan Gao, Xinyang Deng, Nan Guo

32. Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms
Mona Nandwani, Rishabh Kaushal

33. Application of Improved Software Phase-Locked-Loop in DSTATCOM
Xiaoliang Wang, Xuhui Zhu, Xiaochen Lai, Chi Lin, Shouwei Li

34. Digital Harmonic Detection with Rapid Response and High Steady Precision
Xiaoliang Wang, Xiaochen Lai, Chi Lin, Zhen Xu, Shouwei Li

35. A Prospect of Interdisciplinary Methodology of QoE Assessment
Mengyu Gao, Wen’an Zhou, Zheng Hu, Wenji Zhang

36. A Macro-Assisted Cooperative Edge Caching in Heterogeneous Mobile Networks
Bingqian Li, Wen’an Zhou, Xuhui Yang

37. Security of Selected Secret Sharing Schemes
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela

38. Supporting Hypothesis Generation by Machine Learning in Smart Health
Alba Amato, Antonio Coronato

39. A Novel and Practical Pseudonym Change Scheme in VANETs
Yuanyuan Pan, Yongdong Shi, Jianqing Li

40. An Efficient Provably Secure Password-Based Authenticated Key Agreement
Hanqiu Xu, Qingping Wang, Jing Zhou, Ou Ruan

41. Proposal and Implementation of a Countermeasure Against Event Tracking on the Web
Takamichi Saito, Ryohei Hosoya, Koki Yasuda, Kazushi Takahashi, Yuta Tsunoda, Kazuhisa Tanabe, Masayuki Taneoka, Satoshi Yashiro

42. Self-aware Access Control System for Android
Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho

43. Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code
Nobuyuki Teraura

44. Suspicious User Detection Based on File Server Usage Features
Ryuichi Ohori, Satoru Torii

45. Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan
Xiu-Shu Zhang, Fang-Yie Leu, Ching-Wen Yang

46. An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project
Sen-Tarng Lai, Fang-Yie Leu

47. Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station
Chien-Hsiang Kao, Fang-Yie Leu

48. MIH-Based Congestion Control with Seamless Handover in Untrusted Networks
Fang-Yie Leu, Chih-Chung Cheng

49. Integration of Ubiquitous Specifications in the Lifecycle of Design Object Oriented
Sonia Aimene, Idir Rassoul

50. Cuckoo Search Optimization Technique for Multi-objective Home Energy Management
Adia Khalid, Ayesha Zafar, Samia Abid, Rabiya Khalid, Zahoor Ali Khan, Umar Qasim, Nadeem Javaid

51. The Application of Heuristic Neural Network in Speed Estimation of Asynchronous Motor
Shuqing Wang, Ruotian Yao, Yuexiang Mao

52. Performance of Power Allocation of Relay Stations for Cognitive Radio Based Cooperative Communication Systems
Yung-Fa Huang, Tan-Hsu Tan, Yu-Shing Lee, Hsing-Chung Chen

53. Enabling D2D Transmission Mode in Cellular Networks: Instantaneous Rate Consideration
Huu-Phuc Dang, Hong-Nhu Nguyen, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak

54. Performance Analysis of Wireless Powered Cognitive Radio Networks
Thanh-Duc Le, Hong-Nhu Nguyen, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak

55. A New Collaborative Knowledge Integration Scheme
Shian-Shyong Tseng, Yuh-Jye Wang

56. Effect of Polling Interval Distributions on the Performance of MAC Protocols in Wireless Sensor Networks
Shama Siddiqui, Sayeed Ghani, Anwar Ahmed Khan

57. Lightweight Authentication for Distributed Mobile P2P Communications
Jiyoung Lim, Inshil Doh, Kijoon Chae

58. A Search for Computationally Efficient Supervised Learning Algorithms of Anomalous Traffic
Hae-Duck J. Jeong, Gil-Seong Jeong, Won-Jung Kim, Jinwon Kim, Hanbin Song, Myeong-Un Ryu, Jongsuk R. Lee

59. Ontology Development for Dynamic Service Composition in Cyber-Physical Systems (CPSs)
Sunghwan Jeong, Jun-Sik Kong, Mye Sohn, Hyun Jung Lee

60. Cross-Recommendation Depending on Commonly Shared Users’ Preferences in IoT Environment
Hyun Jung Lee, Mye Sohn

61. Power Beacon-Assisted Relaying Scheme for Cellular Networks: System Model and Performance Analysis
Si-Phu Le, Hong-Nhu Nguyen, Thanh-Duc Le, Huu-Phuc Dang, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak

62. On the Outage Probability of Device-to-Device Communication Enabled NOMA
Hong-Nhu Nguyen, Huu-Phuc Dang, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak

63. Performance Analysis of Device-To-Device Communication Using AF Relaying Under Impact of Co-channel Interferences
Nguyen Thai Anh, Huu-Phuc Dang, Hong-Nhu Nguyen, Thanh-Duc Le, Si-Phu Le, Dinh-Thuan Do, Jaroslav Zdralek, Miroslav Voznak

64. Approaching to Mobile 5G Communications
Jahangir Dadkhah Chimeh, Mojtaba Mazoochi

65. Terrorists Spatio-Temporal Analysis Based on Social Network Tools
Xuan Guo, Zhi-ting Xiao, Pin-shan Zeng, Ying Yang

66. Reliable Homomorphic Matrix Disguising Scheme
Yonghui Chen, Mingwu Zhang, Chao Xu

67. Contention Window Prioritization for Heterogeneous Traffic in Wireless Sensor Networks
Anwar Ahmed Khan, Sayeed Ghani, Shama Siddiqui

68. An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering
Huazhong Jin, Feng Guan, Fang Wan, Ou Ruan, Qing Li

69. Moving Average Timing Strategy from a Volatility Perspective: Evidence of the Taiwan Stock Market
Shyh-Weir Tzang, Yung-Shun Tsai, Chun-Ping Chang, Ya-Ping Yang

70. The Impact of Golden Cross and Death Cross Frequency on Stock Returns in Pre- and Post-financial Crisis
Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang

71. Managers’ Bargaining Power and the Intrinsic Value
Chun-Ping Chang, Yung-Shun Tsai, Shyh-Weir Tzang

72. Investigation into the Relationships Among Sponsorship, Identification and Purchase Intention
Chaio-Hsing Chen, Mei-Hua Huang, Perng-Fei Huang, Chiung-Yen Chen

73. The Effects of CSR Announcement on Long-Life Business
Mei-Hua Liao, Xiang-Ling Zhan, Hidekazu Sone

74. Serious Leisure and Flow Experience of Teenagers - A Case Study on the Activities of Orchestra
Chiou-Shya Torng, Ming-Sui Weng, Chai-Ju Lu

75. The Impact of Government Shareholding on Firm Performance: A Corporate Governance Perspective
Wen-Hsin Huang, Mei-Juh Huang, Mei-Hua Huang

76. The Impact of Corporate Social Responsibility and Organization Identification on Employee Engagement
Chia-Ju Lu, Chiou-Shya Torng

77. A Study of Impact of Social Welfare from Public-Private-Partnerships: A Case of Taipei City Youbike
Wen-Hsin Huang, Hsien-Feng Lee

78. The Influence of Senior Supervisors’ Professional Degree and Their Job Changes and Part-Time Duties on Corporate Performance
Ying-Li Lin, Li-Yu Lin, Hsiu-Feng Huang

79. Causal Relationship Between Research and Development Input, Research and Development Output, and Corporate Value
Ying-Li Lin, Yu-Ju Chen, Tin-Chang Chang

80. A Study on the Influencing Factors of Consumers Repeat Purchasing Intention in International Travel Fair
Hsiang-Chih Hu, Mei-Ying Chen, Shu-Hui Chuang

81. Examining the Relationships Among Electronic Word of Mouth, Perceived Value and Risk, and Consumer Purchase Intention
Chung-Yi Hsu, Ya-Wen Huang, Shu-Hui Chuang

82. The Influence of Internationalization on Value Drivers: Song Ho Industrial Corporation, Ltd. vs. Chih Lien Industrial Corporation, Ltd.
Kuei-Yuan Wang, Chien-Kuo Han, Xiao-Hong Lin, Ming-De Lin

83. A Comparative Study of Valuation and Value Drivers in the Textile Industry: Kwang Ming Silk Mill Co., Ltd. vs. Eclat Textile Co., Ltd.
Kuei-Yuan Wang, Chien-Kuo Han, Xiao-Hong Lin, Chia-Hua Lin

84. Study of Social Loafing and Employee Creativity
Ching-Hui Shih, Chun-Chiu Shao, Yao-Hua Wang

85. Customer Satisfaction and Quality of Service Towards Public Servants in a Governmental Education Training Center in Taiwan
Pei-Shih Chen, Tin-Chang Chang, Ying-Li Lin

86. The Effect of Flipped Classroom on Self-efficacy and Satisfaction of Computer Auditing
Ling-Yi Chou

87. Moving Smartphones to Send Emergency Messages During Assaults
Francisco Acosta, Miguel A. Wister, Jose A. Hernandez-Nolasco, Pablo Pancardo

88. Low-Level Service Management in Cyber-Physical Systems
Borja Bordel, Ramón Alcarria, Diego Sánchez-de-Rivera, Antonio Jara

89. Flexible Service Provision in Context-Aware Cyber-Physical Systems
Ramón Alcarria, Borja Bordel, Antonio Jara

90. NOSE: A NOmadic Scalable Ecosystem for Pervasive Sensing, Computing and Communication
Audrey Dupont, Yann Bocchi, Gianluca Rizzo

91. Geo-Based Content Sharing for Disaster Relief Applications
Gianluca Rizzo, Helmut Neukirchen

92. Towards the Development of a Smart Tourism Application Based on Smart POI and Recommendation Algorithms: Ceutí as a Study Case
Joanna Alvarado-Uribe, Andrea Gómez-Oliva, Germán Molina, Miguel Gonzalez-Mendoza, María Concepción Parra-Meroño, Antonio J. Jara

93. Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts
Salvador Pérez, Domenico Rotondi, Diego Pedone, Leonardo Straniero, María José Núñez, Fernando Gigante

94. Software Abnormal Behavior Detection Based on Hidden Markov Model
Jingling Zhao, Guoxiao Huang, Tianyu Liu, Baojiang Cui

95. RTF Editor XSS Fuzz Framework
Jun Yang, Qiyi Tang

96. Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers
Luca Casati, Andrea Visconti

97. A Context-Aware Smart Office Application System
Hou Yuan Wei, Hao Yong Le, Xin Shu, Caiyuan Chen

98. A Novel Algorithm for Feature Selection Used in Intrusion Detection
Yongle Hao, Ying Hou, Longjie Li

Keywords: Engineering, Computational Intelligence, Artificial Intelligence (incl. Robotics)

Publication year
Advances in Intelligent Systems and Computing
Page amount
50 pages
Technology, Energy, Traffic
Printed ISBN

Similar titles