


default search action
36th AINA 2022: Sydney, NSW, Australia
- Leonard Barolli, Farookh Hussain, Tomoya Enokido:

Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 3. Lecture Notes in Networks and Systems 451, Springer 2022, ISBN 978-3-030-99618-5 - Kalthoum Zaouali, Mohamed Lassaad Ammari, Ridha Bouallegue

:
LSTM-Based Reinforcement Q Learning Model for Non Intrusive Load Monitoring. 1-13 - Besma Korchani

, Kaouthar Sethom:
Machine Learning for Student QoE Prediction in Mobile Learning During COVID-19. 14-22 - Mohammad Faiz Iqbal Faiz, Mohammad Zafar Iqbal:

XceptionUnetV1: A Lightweight DCNN for Biomedical Image Segmentation. 23-32 - Neder Karmous

, Mohamed Ould-Elhassen Aoueileyine
, Manel Abdelkader, Neji Youssef:
A Proposed Intrusion Detection Method Based on Machine Learning Used for Internet of Things Systems. 33-45 - Sana Fakhfakh, Yousra Ben Jemaa

:
Shape Trajectory Analysis Based on HOG Descriptor for Isolated Word Sign Language Recognition. 46-54 - Kawser Irom Rushee, Md Shamsur Rahim, Andrew Vakarau Levula, Mehregan Mahdavi:

How Australians Are Coping with the Longest Restrictions: An Exploratory Analysis of Emotion and Sentiment from Tweets. 55-68 - Sanidhya Vijayvargiya, Lov Kumar, Aruna Malapati, Lalita Bhanu Murthy Neti, Aneesh Krishna:

COVID-19 Article Classification Using Word-Embedding and Extreme Learning Machine with Various Kernels. 69-81 - Marco Agizza, Walter Balzano, Silvia Stranieri:

An Improved Ant Colony Optimization Based Parking Algorithm with Graph Coloring. 82-94 - Antonino Ferraro

, Marco Giacalone
:
A Review About Machine and Deep Learning Approaches for Intelligent User Interfaces. 95-103 - Flora Amato

, Francesco Di Cicco, Mattia Fonisto, Marco Giacalone
:
A Survey on Neural Recommender Systems: Insights from a Bibliographic Analysis. 104-114 - Alfonso Marino, Paolo Pariso, Michele Picariello

:
Information Networking and e-Government in United Nations and Europe. 115-120 - Beniamino Di Martino, Vincenzo Bombace, Salvatore D'Angelo, Antonio Esposito:

A Microservices Based Architecture for the Sentiment Analysis of Tweets. 121-130 - Gennaro Junior Pezzullo, Beniamino Di Martino, Marian Bubak

:
Container-Based Platform for Computational Medicine. 131-140 - Geir Horn

, Rudolf Schlatte, Einar Broch Johnsen:
Digital Twins for Autonomic Cloud Application Management. 141-152 - Beniamino Di Martino, Luigi Colucci Cante

, Nicla Cerullo:
Opportunities and Advantages of Cloud Migration of a Smart Restaurant System. 153-162 - Beniamino Di Martino, Mariangela Graziano

, Luigi Colucci Cante
, Datiana Cascone:
Analysis of Techniques for Mapping Convolutional Neural Networks onto Cloud Edge Architectures Using SplitFed Learning Method. 163-172 - Beniamino Di Martino, Mariangela Graziano

, Serena Angela Gracco:
In-cloud Migration of a Custom and Automatic Booking System. 173-182 - Beniamino Di Martino, Salvatore D'Angelo, Antonio Esposito, Pietro Lupi:

Anomalous Witnesses and Registrations Detection in the Italian Justice System Based on Big Data and Machine Learning Techniques. 183-192 - Hamza Salem, Manuel Mazzara:

A NLP Framework to Generate Video from Positive Comments in Youtube. 193-198 - Salma Saidani, Rim Haddad, Ridha Bouallegue

, Raed M. Shubair
:
Smart Insole Monitoring System for Fall Detection and Bad Plantar Pressure. 199-208 - Trinh Viet Thong, Kosuke Takano, Kin Fun Li:

A Recommendation Method of Health Articles Based on Association Rules for Health Terms Appeared on Web Documents and Their Application Systems. 209-219 - Aoto Hirata, Tetsuya Oda, Nobuki Saito, Yuki Nagai, Tomoya Yasunaga, Kengo Katayama, Leonard Barolli:

A Voronoi Edge and CCM-Based SA Approach for Mesh Router Placement Optimization in WMNs: A Comparison Study for Different Edges. 220-231 - Mriyank Roy, Purav Shah:

Internet of Things (IoT) Enabled Smart Navigation Aid for Visually Impaired. 232-244 - Mattia Paccamiccio

, Leonardo Mostarda:
Reasoning About Inter-procedural Security Requirements in IoT Applications. 245-254 - Stefano Bistarelli, Marco Marcozzi

, Gianmarco Mazzante, Leonardo Mostarda, Alfredo Navarra, Davide Sestili:
Blockchain and IoT Integration for Pollutant Emission Control. 255-264 - Diletta Cacciagrano, Rosario Culmone, Leonardo Mostarda, Alfredo Navarra, Emanuele Scala:

Robot Based Computing System: An Educational Experience. 265-274 - Yomna Ben Jmaa, David Duvivier

, Mohamed Abid:
ARM vs FPGA: Comparative Analysis of Sorting Algorithms. 275-287 - Eduardo Castilho Rosa

, Flávio de Oliveira Silva
:
A Review on Recent NDN FIB Implementations for High-Speed Switches. 288-300 - Rajdeep Niyogi:

Formal Specification of a Team Formation Protocol. 301-313 - Erika Saito, Kosuke Takano:

Source Code Recommendation with Sequence Learning of Code Functions. 314-323 - Shigeaki Tanimoto, Yudai Watanabe, Hiroyuki Sato, Atsushi Kanai:

Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation. 324-333 - Rayed A. Alakhtar, Sam Ferguson, Hada Alsobhi:

User Expectations When Augmented Reality Mediates Historical Artifacts. 334-344 - Mekhled Alharbi, Farookh Khadeer Hussain:

A Systematic Literature Review of Blockchain Technology for Identity Management. 345-359 - Prachi Kale, Pallabi Hazarika, Sajal Jain, Biswajit Bhowmik

:
Performance Evaluation in 2D NoCs Using ANN. 360-369 - Roland Montalvan Pires Torres Filho, Luciana Pereira Oliveira, Leonardo Nunes Carneiro:

Security, Power Consumption and Simulations in IoT Device Networks: A Systematic Review. 370-379 - Maksim Iavich, Razvan Bocu

, Avtandil Gagnidze:
Real Time Self-developing Cybersecurity Function for 5G. 380-387 - Kaouther Mansour, Issam Jabri:

Analysis of A-MPDU Aggregation Schemes for HT/VHT WLANs. 388-398 - Akira Sakuraba, Yoshitaka Shibata, Mamoru Ohara:

An Implementation of V2R Data Delivery Method Based on MQTT for Road Safety Application. 399-410 - Juan Carlos Olivares Rojas

, José Antonio Gutiérrez Gnecchi
, Wuqiang Yang
, Enrique Reyes-Archundia
, Adriana Del Carmen Tellez Anguiano
:
Smart Metering Architecture for Agriculture Applications. 411-419 - Shigeru Kato

, Renon Toyosaki, Fuga Kitano, Shunsaku Kume, Naoki Wada, Tomomichi Kagawa, Takanori Hino, Kazuki Shiogai, Yukinori Sato, Muneyuki Unehara, Hajime Nobuhara:
Apple Brand Texture Classification Using Neural Network Model. 420-430 - Ricardo Rodríguez Jorge

, Paola Huerta-Solis, Jirí Bíla, Jirí Skvor:
Adaptive Analysis of Electrocardiogram Prediction Using a Dynamic Cubic Neural Unit. 431-440 - Shigeru Kato

, Naoki Wada, Kazuki Shiogai, Takashi Tamaki:
Evaluation of the Crack Severity in Squared Timber Using CNN. 441-447 - Masataka Kakinouchi, Kazumasa Omote:

Information Security Fatigue in Visually Impaired University Students. 448-458 - R. Madhusudhan, Saurabh V. Surashe:

Privacy and Security Comparison of Web Browsers: A Review. 459-470 - Marius Iulian Mihailescu, Stefania Loredana Nita:

Blockchain Search Using Searchable Encryption Based on Elliptic Curves. 471-481 - Nadia Kammoun, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:

Ensuring Data Integrity Using Digital Signature in an IoT Environment. 482-491 - Huafei Zhu, Wee Keong Ng:

Beaver Triple Generator from Multiplicatively Homomorphic Key Management Protocol. 492-503 - Huafei Zhu, Wee Keong Ng:

Highly Scalable Beaver Triple Generator from Additively Homomorphic Encryption. 504-514 - Omid Ameri Sianaki, Sabeetha Peiris

:
The Impact of the Blockchain Technology on the Smart Grid Customer Domain: Toward the Achievement of the Sustainable Development Goals (SDGs) of the United Nations. 515-530 - Archita Negi, Farshid Hajati:

Analysis of Variants of KNN for Disease Risk Prediction. 531-545 - Shorouq Al-Eidi, Omar Darwish, Yuanzhu Peter Chen, Mahmoud Elkhodr:

Covert Timing Channels Detection Based on Image Processing Using Deep Learning. 546-555 - Belal Alsinglawi, Lihong Zheng

, Muhammad Ashad Kabir
, Md Zahidul Islam
, Dave Swain, Will Swain:
Internet of Things and Microservices in Supply Chain: Cybersecurity Challenges, and Research Opportunities. 556-566 - Marta Rózanska

, Pawel Skrzypek, Katarzyna Materka, Geir Horn
:
An Architecture for Autonomous Proactive and Polymorphic Optimization of Cloud Applications. 567-577 - Kamal K. Agarwal, Haribabu Kotakula:

Fault Tolerance in Cloud: A Brief Survey. 578-589 - Thomas Dreibholz

, Somnath Mazumdar
:
Load Distribution for Mobile Edge Computing with Reliable Server Pooling. 590-601 - Ermioni Qafzezi, Kevin Bylykbashi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

A Survey on Advances in Vehicular Networks: Problems and Challenges of Architectures, Radio Technologies, Use Cases, Data Dissemination and Security. 602-613 - Alkhansaa A. Abuhashim:

Intelligent Blockchain-Enabled Applications for Sharing Economy. 614-623 - Shanshan Jiang, Marit K. Natvig, Svein O. Hallsteinsen, Karen Byskov Lindberg:

Lessons Learned from Demonstrating Smart and Green Charging in an Urban Living Lab. 624-636 - Marilisa Botte, Antonio Santonastaso, Luca D'Acierno:

Assessment of Rail Service Capacity Under the Current Regulations Aimed at Ensuring Social Distancing Conditions Against the COVID-19 Pandemic. 637-646 - Armando Cartenì, Ilaria Henke

, Assunta Errico, Luigi Di Francesco, Antonella Falanga, Mario Bellotti, Fabiola Filardo, Giuseppe Cutrupi:
A Floating Car Data Application to Estimate the Origin-Destination Car Trips Before and During the COVID-19 Pandemic. 647-656 - Rocco Aversa, Dario Branco

, Beniamino Di Martino, Luigi Iaiunese, Salvatore Venticinque:
Simulation and Evaluation of Charging Electric Vehicles in Smart Energy Neighborhoods. 657-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














