Login

Barolli, Leonard

Advances in Internet, Data & Web Technologies

Barolli, Leonard - Advances in Internet, Data & Web Technologies, ebook

353,30€

Ebook, PDF with Adobe DRM
ISBN: 9783319759289
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. Implementation of a New Function for Preventing Short Reconnection in a WLAN Triage System
Kosuke Ozera, Takaaki Inaba, Kevin Bylykbashi, Shinji Sakamoto, Leonard Barolli

2. A Web-Based English Listening System for Learning Different Pronunciations in Various Countries
Kohei Kamimura, Kosuke Takano

3. FOG Computing and Low Latency Context-Aware Health Monitoring inSmart Interconnected Environments
Philip Moore, Hai Pham

4. Application of Fuzzy Logic for Improving Human Sleeping Conditions inanAmbient Intelligence Testbed
Kevin Bylykbashi, Ryoichiro Obukata, Yi Liu, Evjola Spaho, Leonard Barolli, Makoto Takizawa

5. Performance Evaluation of WMN-PSOSA Considering Four Different Replacement Methods
Shinji Sakamoto, Kosuke Ozera, Admir Barolli, Leonard Barolli, Vladi Kolici, Makoto Takizawa

6. Improving Team Collaboration in MobilePeerDroid Mobile System: A Fuzzy-Based Approach Considering Four Input Parameters
Yi Liu, Kosuke Ozera, Keita Matsuo, Makoto Ikeda, Leonard Barolli, Vladi Kolici

7. Design and Implementation of a Hybrid Intelligent System Based on Particle Swarm Optimization and Distributed Genetic Algorithm
Admir Barolli, Shinji Sakamoto, Kosuke Ozera, Leonard Barolli, Elis Kulla, Makoto Takizawa

8. A Fuzzy-Based System for Selection of IoT Devices in Opportunistic Networks Considering IoT Device Storage, Waiting Time and Security Parameters
Miralda Cuka, Donald Elmazi, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli

9. Selection of Actor Nodes in Wireless Sensor and Actor Networks Considering Failure of Assigned Task as New Parameter
Donald Elmazi, Miralda Cuka, Kevin Bylykbashi, Evjola Spaho, Makoto Ikeda, Leonard Barolli

10. Malicious Information Flow in P2PPS Systems
Shigenari Nakamura, Lidia Ogiela, Tomoya Enokido, Makoto Takizawa

11. Eco Migration Algorithms of Processes with Virtual Machines in a Server Cluster
Ryo Watanabe, Dilawaer Duolikun, Cuiqin Qin, Tomoya Enokido, Makoto Takizawa

12. Collision Avoidance for Omnidirectional Automated Transportation Robots Considering Entropy Approach
Keita Matsuo, Leonard Barolli

13. Performance Evaluation of an Active Learning System Using Smartphone: A Case Study for High Level Class
Noriyasu Yamamoto, Noriki Uchida

14. Performance Evaluation of an Enhanced Message Suppression Controller Considering Delayed Ack Using Different Road Traffic Conditions
Daichi Koga, Yu Yoshino, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli

15. Improved Energy-Efficient Quorum Selection Algorithm by Omitting Meaningless Methods
Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa

16. Improving Data Loss Prevention Using Classification
Brunela Karamani

17. Integrated Model of the Wavelet Neural Network Based on the Most Similar Interpolation Algorithm and Pearson Coefficient
Hong Zhao, Yi Wang

18. Stochastic Power Management inMicrogrid with Efficient EnergyStorage
Itrat Fatima, Nadeem Javaid, Abdul Wahid, Zunaira Nadeem, Muqqadas Naz, Zahoor Ali Khan

19. A Metaheuristic Scheduling of Home Energy Management System
Anila Yasmeen, Nadeem Javaid, Itrat Fatima, Zunaira Nadeem, Asif Khan, Zahoor Ali Khan

20. Void Hole and Collision Avoidance in Geographic and Opportunistic Routing in Underwater Wireless Sensor Networks
Aasma Khan, Nadeem Javaid, Ghazanfar Latif, Obaida Abdul Karim, Faisal Hayat, Zahoor Ali Khan

21. Optimized Energy Management Strategy for Home and Office
Saman Zahoor, Nadeem Javaid, Anila Yasmeen, Isra Shafi, Asif Khan, Zahoor Ali Khan

22. Energy Balanced Load Distribution Through Energy Gradation in UWSNs
Ghazanfar Latif, Nadeem Javaid, Aasma Khan, Faisal Hayat, Umar Rasheed, Zahoor Ali Khan

23. Routing Protocol with Minimized Load Distribution for UASNs
Faisal Hayat, Nadeem Javaid, Mehreen Shah, Umar Rasheed, Aasma Khan, Zahoor Ali Khan

24. Transmission Range Adjustment for Void Hole Avoidance in UWSNs
Mehreen Shah, Nadeem Javaid, Umar Rasheed, Faisal Hayat, Ghazanfar Latif, Zahoor Ali Khan

25. Exploiting Meta-heuristic Technique for Optimal Operation of Microgrid
Saman Zahoor, Nadeem Javaid, Ayesha Zafar, Anila Yasmeen, Asad-ur-rehman, Zahoor Ali Khan

26. Appliances Scheduling Using State-of-the-Art Algorithms forResidential Demand Response
Rasool Bukhsh, Zafar Iqbal, Nadeem Javaid, Usman Ahmed, Asif Khan, Zahoor Ali Khan

27. Optimal Energy Management in Microgrids Using Meta-heuristic Technique
Anila Yasmeen, Nadeem Javaid, Saman Zahoor, Hina Iftikhar, Sundas Shafiq, Zahoor Ali Khan

28. Usage Optimization of Mobile Devices Resources in Mobile Web
Nebojsha Ilijoski, Vladimir Trajkovik

29. The Performance Comparison for Low and Medium Earth Orbiting Satellite Search and Rescue Services
Bexhet Kamo, Joana Jorgji, Shkelzen Cakaj, Vladi Kolici, Algenti Lala

30. An Integrated System Considering WLAN and DTN for Improving Network Performance: Evaluation for Different Scenarios and Parameters
Evjola Spaho, Kevin Bylykbashi, Leonard Barolli, Makoto Takizawa

31. An Efficient Algorithm to Energy Savings for Application to the Wireless Multimedia Sensor Networks
Astrit Hulaj, Adrian Shehu

32. Endowing IoT Devices with Intelligent Services
Aneta Poniszewska-Maranda, Daniel Kaczmarek, Natalia Kryvinska, Fatos Xhafa

33. VM Deployment Methods for DaaS Model in Clouds
Klodiana Goga, Fatos Xhafa, Olivier Terzo

34. A Capability and Compatibility Approach to Modelling of Information Reuse and Integration for Innovation
Valentina Plekhanova

35. Vehicle Insurance Payment System Based on IoT
Elma Zanaj, Kristi Verushi, Indrit Enesi, Blerina Zanaj

36. Software as a Service (SaaS) Service Selection Based on Measuring the Shortest Distance to the Consumer’s Preferences
Mohammed Abdulaziz Ikram, Farookh Khadeer Hussain

37. Efficient Content Sharing with File Splitting and Differences Between Versions in Hybrid Peer-to-Peer Networks
Toshinobu Hayashi, Shinji Sugawara

38. Improving Security with Cognitive Workflows
Giovanni Cammarata, Rao Mikkilineni, Giovanni Morana, Riccardo Nocita

39. Threshold Model Based on Relative Influence Weight of User
Deyang Zhang, Xu An Wang, Xiaolong Li, Chunfen Xu

40. Design of a Low-Power Cold Chain Logistics Internet of Things System
Heshuai Shao, Ronglin Hu, Chengdong Ma

41. Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting
Yudong Liu, Xu An Wang, Arun Kumar Sangaiah, Heshuai Shao

42. Evaluation of Techniques for Improving Performance and Security in Relational Databases
Renalda Kushe, Kevin Karafili

43. E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education
Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose

44. Automatic Test Case Generation Method for Large Scale Communication Node Software
Kazuhiro Kikuma, Takeshi Yamada, Kiyoshi Ueda, Akira Fukuda

45. Big Data in Cloud Computing: A Review of Key Technologies and Open Issues
Elena Canaj, Aleksandër Xhuvani

46. A Novel Question Answering System for Albanian Language
Evis Trandafili, Elinda Kajo Meçe, Kristjan Kica, Hakik Paci

47. A Thorough Experimental Evaluation of Algorithms for Opinion Mining in Albanian
Nelda Kote, Marenglen Biba, Evis Trandafili

48. Performance Evaluation of Text Categorization Algorithms Using an Albanian Corpus
Evis Trandafili, Nelda Kote, Marenglen Biba

49. Battery Size Impact in Green Coverage of Datacenters Powered by Renewable Energy: A Latitude Comparison
Enida Sheme, Sébastien Lafond, Dorian Minarolli, Elinda Kajo Meçe, Simon Holmbacka

50. A Comparison of Data Fragmentation Techniques in Cloud Servers
Salvatore Lentini, Enrico Grosso, Giovanni L. Masala

51. SimpleCloud: A Simple Simulator forModeling Resource Allocations inCloudComputing
Dorian Minarolli, Elinda Kajo Meçe, Enida Sheme, Igli Tafa

52. Multimodal Attention Agents in Visual Conversation
Lorena Kodra, Elinda Kajo Meçe

53. Data Interpretation Using Mobile Uncalibrated Sensor for Urban Environmental Monitoring
Elson Agastra, Bexhet Kamo, Ilir Shinko, Renalda Kushe

54. Reducing Excess Traffic in Urban Areas with Microscopic Traffic Modeling in SUMO
Alban Rakipi, Joana Jorgji, Desar Shahu

55. An Empirical Evaluation of Sequential Pattern Mining Algorithms
Marjana Prifti Skenduli, Corrado Loglisci, Michelangelo Ceci, Marenglen Biba, Donato Malerba

56. Towards Internet of Things and Cloud Computing for Management of Cars Network
Krzysztof Stepień, Aneta Poniszewska-Marańda

57. An Edge Computer Based Driver Monitoring System for Assisting Safety Driving
Toshiyuki Haramaki, Hiroaki Nishino

58. A Mobile Wireless Network Visualizer for Assisting Administrators
Dai Shimizu, Toshiyuki Haramaki, Hiroaki Nishino

59. C++ Memory Detection Tool Based on Dynamic Instrumentation
Siran Fu, Baojiang Cui, Tao Guo, Xuyan Song

60. Flying Ad Hoc Network for Emergency Applications Connected to a Fog System
Dan Radu, Adrian Cretu, Benoît Parrein, Jiazi Yi, Camelia Avram, Adina Aştilean

61. An Improved Informative Test Code Approach for Code Writing Problem in Java Programming Learning Assistant System
Nobuo Funabiki, Khin Khin Zaw, Ei Ei Mon, Wen-Chung Kao

62. Tourism Support System Using AR for Tourists’ Migratory Behaviors
Haruna Sonobe, Hiroaki Nishino, Yoshihiro Okada, Kousuke Kaneko

63. Some Improvements in VCP for Data Traffic Reduction in WSN
Ezmerina Kotobelli, Mario Banushi, Igli Tafaj, Alban Allkoçi

64. Indoor Self Localization Method forConnected Wheelchair Based on LED Optical Frequency Modulation
Kazuyuki Kojima

65. An Auction Framework for DaaS inCloud Computing
Anjan Bandyopadhyay, Fatos Xhafa, Sajal Mukhopadhyay

66. A Fingerprint Enhancement Algorithm in Spatial and Wavelet Domain
Indrit Enesi, Algenti Lala, Elma Zanaj

67. Android OS Stack Power Management Capabilities
Olimpjon Shurdi, Luan Ruçi, Vladi Kolici, Algenti Lala, Bexhet Kamo

68. Signal Routing by Cavities in Photonic Crystal Waveguide
Hiroshi Maeda, Xiang Zheng Meng, Keisuke Haari, Naoki Higashinaka

69. Image Semantic Segmentation Algorithm Based on Self-learning Super-Pixel Feature Extraction
Juan Wang, Hao Shi, Min Liu, Wei Xiong, Kaiwen Cheng, Yuhan Jiang

70. Research and Implementation of Indoor Positioning Algorithm for Personnel Based on Deep Learning
Hanhui Yue, Xiao Zheng, Juan Wang, Li Zhu, Chunyan Zeng, Cong Liu, Meng Liu

71. Verifiable Outsourced Attribute Based Encryption Scheme with Fixed Key Size
Cong Li, Xu An Wang, Arun Kumar Sangaiah, Haibing Yang, Chun Shan

72. Subjective Annoyance Caused by Low Frequency Noise
Ling Lu, Hong-Wei Zhuang, Liang Xu

73. The Relationship Between Personality Traits and Aggressive Behavior in People with Long Term Noise
Ling Lu, Hong-Wei Zhuang, Liang Xu

74. Efficient Expanded Mixed Finite Element Method for the Forchheimer Model
Yanping Li, Qingli Zhao

75. Research on Indoor Location Method Based on WLAN Signal Location Fingerprints
Tao Wang, Tan Wang, Huanbing Gao, Yanping Li

76. Homomorphic Authentication Based on Rank-Based Merkle Hash Tree
Ping Bai, Wei Zhang, Xu An Wang, Yudong Liu, HaiBin Yang, Chun Shan

77. Behavioral Security in Cloud and Fog Computing
Marek R. Ogiela, Lidia Ogiela

78. Voice Quality Testing Using VoIP Applications over 4G Mobile Networks
Desar Shahu, Alban Rakipi, Joana Jorgji, Ismail Baxhaku, Irena Galić

79. Service Management Protocols in Cloud Computing
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela

80. An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks
Ryohei Tatsuda, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Norio Shiratori, Naonobu Okazaki

81. A Data Sharing Method Using WebRTC for Web-Based Virtual World
Masaki Kohana, Shusuke Okamoto

82. A Study on a User Identification Method Using Dynamic Time Warping to Realize an Authentication System by s-EMG
Tokiyoshi Kurogi, Hisaaki Yamaba, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki

83. The Analysis of MATE Attack in SDN Based on STRIDE Model
Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry

84. Performance Evaluation of Lévy Walk onMessage Dissemination in Unit Disk Graphs
Kenya Shinki, Naohiro Hayashibara

85. Human vs. Automatic Annotation Regarding the Task of Relevance Detection in Social Networks
Nuno Guimarães, Filipe Miranda, Álvaro Figueira

86. Performance Evaluation of Support Vector Machine and Convolutional Neural Network Algorithms in Real-Time Vehicle Type Classification
Ali Şentaş, İsabek Tashiev, Fatmanur Küçükayvaz, Seda Kul, Süleyman Eken, Ahmet Sayar, Yaşar Becerikli

87. Cloud Orchestration with ORCS andOpenStack
Flora Amato, Francesco Moscato, Fatos Xhafa

88. Improving Results of Forensics Analysis by Semantic-Based Suggestion System
Flora Amato, Leonard Barolli, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato

89. Modeling of Radio Base Stations with the Numerical FDTD Method, for the Electromagnetic Field Evaluation
Algenti Lala, Bexhet Kamo, Joana Jorgji, Elson Agastra

90. Evaluation of Mouse Operation Authentication Method Having Shoulder Surfing Resistance
Makoto Nagatomo, Yoshihiro Kita, Kentaro Aburada, Naonobu Okazaki, Mirang Park

91. Phishing Detection Research Based on PSO-BP Neural Network
Wenwu Chen, Xu An Wang, Wei Zhang, Chunfen Xu

92. Evaluation of Index Poisoning Method in Large Scale Winny Network
Kentaro Aburada, Yoshihiro Kita, Hisaaki Yamaba, Tetsuro Katayama, Mirang Park, Naonobu Okazaki

93. A Hybrid Technique for Residential Load Scheduling in Smart Grids Demand Side Management
Muhammad Hassan Rahim, Adia Khalid, Ayesha Zafar, Fozia Feroze, Sahar Rahim, Nadeem Javaid

94. Modeling Research on Time-Varying Impulse Resistance of Grounding Grid
Wang Tao, Hu Xianzhe, Li Yangping, Wang Qi

95. Research on Intelligent Parking Area Division and Path Planning
Yanping Li, Boying Shi, Tao Wang, Qi Wang, Linyan Wu

96. Moving Applications to an On-demand, Software-as-a-Service Model in the Albanian Government Cloud
Enkeleda Kuka, Alba Haveriku, Aleksander Xhuvani

97. Performance Evaluation of an IoT-Based E-learning Testbed Considering Meditation Parameter
Masafumi Yamada, Kevin Bylykbashi, Yi Liu, Keita Matsuo, Leonard Barolli, Vladi Kolici

98. Towards Integrating Conversational Agents and Learning Analytics in MOOCs
Stavros Demetriadis, Anastasios Karakostas, Thrasyvoulos Tsiatsos, Santi Caballé, Yannis Dimitriadis, Armin Weinberger, Pantelis M. Papadopoulos, George Palaigeorgiou, Costas Tsimpanis, Matthew Hodges

Keywords: Engineering, Computational Intelligence, Communications Engineering, Networks, Information Systems Applications (incl. Internet)

Editor
 
 
 
 
Publisher
Springer
Publication year
2018
Language
en
Edition
1
Series
Lecture Notes on Data Engineering and Communications Technologies
Page amount
32 pages
Category
Technology, Energy, Traffic
Format
Ebook
eISBN (PDF)
9783319759289
Printed ISBN
978-3-319-75927-2

Similar titles