feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV047832661
    Format: 1 Online-Ressource (xxvii, 521 Seiten) , Illustrationen, Diagramme
    ISBN: 9783030797287
    Series Statement: Lecture notes in networks and systems volume 279
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-79727-0
    Language: English
    Keywords: Konferenzschrift ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949115079102882
    Format: XXX, 761 p. 262 illus., 199 illus. in color. , online resource.
    Edition: 1st ed. 2021.
    ISBN: 9783030797256
    Series Statement: Lecture Notes in Networks and Systems, 278
    Content: This book includes the proceedings of the 15th International Conference on Complex, Intelligent, and Software Intensive Systems, which took place in Asan, Korea, on July 1-3, 2021. Software intensive systems are systems, which heavily interact with other systems, sensors, actuators, devices, and other software systems and users. More and more domains are involved with software intensive systems, e.g., automotive, telecommunication systems, embedded systems in general, industrial automation systems, and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems. Complex systems research is focused on the overall understanding of systems rather than its components. Complex systems are very much characterized by the changing environments in which they act by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions. The development of intelligent systems and agents, which is each time more characterized by the use of ontologies and their logical foundations build a fruitful impulse for both software intensive systems and complex systems. Recent research in the field of intelligent systems, robotics, neuroscience, artificial intelligence, and cognitive sciences is very important factor for the future development and innovation of software intensive and complex systems. The aim of the book is to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: Software intensive systems, complex systems, and intelligent systems.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030797249
    Additional Edition: Printed edition: ISBN 9783030797263
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV043862352
    Format: 1 Online-Ressource (lvii, 903 Seiten) , Illustrationen, Diagramme
    ISBN: 9783319491066
    Series Statement: Lecture notes on data engineering and communications technologies 2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-49105-9
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949226765602882
    Format: XXVII, 521 p. 226 illus., 152 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9783030797287
    Series Statement: Lecture Notes in Networks and Systems, 279
    Content: This book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783030797270
    Additional Edition: Printed edition: ISBN 9783030797294
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almafu_9959888245102883
    Format: 1 online resource (788 pages)
    Edition: 1st ed. 2021.
    ISBN: 3-030-79725-2
    Series Statement: Lecture Notes in Networks and Systems, 278
    Content: This book includes the proceedings of the 15th International Conference on Complex, Intelligent, and Software Intensive Systems, which took place in Asan, Korea, on July 1–3, 2021. Software intensive systems are systems, which heavily interact with other systems, sensors, actuators, devices, and other software systems and users. More and more domains are involved with software intensive systems, e.g., automotive, telecommunication systems, embedded systems in general, industrial automation systems, and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems. Complex systems research is focused on the overall understanding of systems rather than its components. Complex systems are very much characterized by the changing environments in which they act by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions. The development of intelligent systems and agents, which is each time more characterized by the use of ontologies and their logical foundations build a fruitful impulse for both software intensive systems and complex systems. Recent research in the field of intelligent systems, robotics, neuroscience, artificial intelligence, and cognitive sciences is very important factor for the future development and innovation of software intensive and complex systems. The aim of the book is to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: Software intensive systems, complex systems, and intelligent systems.
    Note: Intro -- Welcome Message of CISIS-2021 International Conference Organizers -- Organization -- CISIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- International Advisory Board -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrator Chairs -- Steering Committee Chair -- Track Areas and PC Members -- 1. Database and Data Mining Applications -- Sec101 -- Sec102 -- 2. Artificial Intelligence and Bio-inspired Computing -- Sec104 -- Sec105 -- 3. Multimedia Systems and Virtual Reality -- Sec106 -- Sec161 -- 4. Next Generation Wireless Networks -- Sec107 -- Sec108 -- 5. Semantic Web and Web Services -- Sec109 -- Sec110 -- 6. Security and Trusted Computing -- Sec112 -- Sec113 -- 7. HPC and Cloud Computing Services and Orchestration Tools -- Sec116 -- Sec1177 -- 8. Parallel, Distributed and Multicore Computing -- Sec119 -- Sec1200 -- Sec1700 -- Sec121 -- Sec122 -- 10. Complex Systems, Software Modeling and Analytics -- Sec125 -- Sec126 -- 11. Multi-agent Systems, SLA Cloud and Social Computing -- Sec131 -- Sec138 -- 12. Internet of Everything and Machine Learning -- Sec141 -- Sec142 -- CISIS-2021 Reviewers -- CISIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence -- Coevolution of Semantic and Blockchain Technologies -- Contents -- Four Grade Levels-Based Models with Random Forest for Student Performance Prediction at a Multidisciplinary University -- 1 Introduction -- 2 Related Work -- 3 Data Description -- 4 Proposed Approach -- 5 Experimental Results -- 6 Conclusion -- References -- The Role of Collective Engagement to Strengthen Organizational Identity -- Abstract -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 Collaboration and Competition. , 2.2 Managerial Motivation and Collective Engagement -- 2.3 Engagement and Community Identity -- 2.4 Collapetition Management Practices -- 3 Method -- 4 Result and Discussion -- 5 Conclusion, Implication and Future Research -- References -- A Novel Structural and Semantic Similarity in Social Recommender Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dependency Graph of Users -- 3.2 Homophily Concept -- 3.3 User Modeling -- 3.4 Structural Information Extraction -- 4 Experiment and Results -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Trustworthy Explainability Acceptance: A New Metric to Measure the Trustworthiness of Interpretable AI Medical Diagnostic Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need for AI Explainability Metrics -- 2.2 Trust Mechanism -- 3 AI Trustworthy Explainability Acceptance Metric -- 4 Evaluating AI System for DCIS Recurrence Prediction -- 4.1 Background -- 4.2 Data -- 4.3 Experiments and Results -- 5 Conclusions -- References -- Entity Relation Extraction Based on Multi-attention Mechanism and BiGRU Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Model Structure -- 3.1 Embedding Layer -- 3.2 BiGRU Neural Network -- 3.3 Multi-attention Strategy -- 4 Experiment and Analysis -- 4.1 Dataset -- 4.2 Settings -- 4.3 Baseline -- 4.4 Results -- 5 Conclusion -- Acknowledgments -- References -- Time Series Prediction of Wind Speed Based on SARIMA and LSTM -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Establishment of Combined Prediction Model Based on SARIMA-LSTM -- 3.1 Seasonal Auto Regressive Integrated Moving Average -- 3.2 Long Short-Term Memory -- 3.2.1 Recurrent Neural Network -- 3.2.2 LSTM -- 3.3 Modeling Process -- 4 Experiment and Analysis -- 4.1 Data Source and Preprocessing. , 4.2 SARIMA Model Construction and Testing -- 4.3 SARIMA-LSTM Model Wind Speed Prediction -- 4.4 Error Analysis -- 5 Conclusion -- Acknowledgments -- References -- Dimensionality Reduction on Metagenomic Data with Recursive Feature Elimination -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 3.1 Implementing Process for Study -- 3.2 Using Recursive Feature Elimination for Feature Selection -- 3.3 Using Random Forest Algorithm -- 3.4 Using Feature Selection Randomly for Comparison -- 3.5 Using K-Fold Cross-Validation for Separating Training and Testing Data -- 3.6 Using Scoring Metrics to Evaluate Predicting Results -- 4 Experiments -- 4.1 Dataset -- 4.2 Using RFE with Random Forest Algorithm to Select Features and Train Model -- 4.3 Predicting Results and Comparison with Randomly Selected Features -- 5 Conclusion -- References -- The Application of Improved Grasshopper Optimization Algorithm to Flight Delay Prediction-Based on Spark -- Abstract -- 1 Introduction -- 2 Grasshopper Optimization Algorithm -- 2.1 The Adaptive Descent of S-shaped Curve -- 2.2 Sigmoid Curve Descent Based on Logistic Mapping -- 3 SPGOA-RF Algorithm -- 3.1 Distributed Grasshopper Optimization Algorithm -- 3.2 Optimization of Random Forest Parameter Based on SPGOA -- 4 Simulation Experiment and Analysis -- 4.1 Analysis of the Effectiveness of Improved GOA -- 4.2 Sample Data Set Construction -- 4.3 Flight Delay Detection Analysis -- 4.4 Analysis of Distributed Algorithm Effect -- 5 Conclusion -- Acknowledgments -- References -- Application of Distributed Seagull Optimization Improved Algorithm in Sentiment Tendency Prediction -- Abstract -- 1 Introduction -- 2 Relevant Knowledge -- 3 Improving SOA -- 3.1 Population Uniform Distribution Strategy -- 3.2 Cauchy Mutation -- 3.3 CC-SOA Based on Spark -- 4 Analysis of Experimental Results -- 4.1 Experimental Environment. , 4.2 Experimental Analysis -- 5 Conclusion -- Acknowledgments -- References -- Performance Evaluation of WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distribution of Mesh Clients and Different Number of Mesh Routers -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Velocities and Positions of Particles -- 2.2 Routers Replacement Methods -- 2.3 DGA Operations -- 2.4 Fitness and Migration Functions -- 2.5 Particle-Pattern and Gene Coding -- 3 Simulation Results -- 4 Conclusions -- References -- A New Scheme for Slice Overloading Cost in 5G Wireless Networks Considering Fuzzy Logic -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- COVID-Prevention-Based Parking with Risk Factor Computation -- 1 Introduction -- 2 Related Work -- 3 Anti-COVID-Standards-Based Parking -- 3.1 First Phase: Information Loading -- 3.2 Second Phase: Parking Classification -- 3.3 Third Phase: Risk Factor Computation -- 4 Example -- 5 Conclusions -- References -- Coarse Traffic Classification for High-Bandwidth Connections in a Computer Network Using Deep Learning Techniques -- Abstract -- 1 Introduction -- 2 The Proposed Approach -- 2.1 Research Stand -- 2.2 Acquiring Data -- 2.3 Adjusting the Data -- 2.4 Adjusting the Data -- 2.5 Predictive Model -- 2.6 Interpretation of the Results Obtained -- 3 Examples of Application -- 4 Conclusion -- Acknowledgments -- References -- A Privacy Preserving Hybrid Blockchain Based Announcement Scheme for Vehicular Energy Network -- 1 Introduction -- 2 Related Work -- 2.1 Authentication -- 2.2 Trust Management -- 2.3 Privacy -- 2.4 Efficiency -- 3 Problem Statement. , 4 System Model -- 4.1 Entities -- 4.2 Conclusion -- References -- Prediction of Wide Area Road State Using Measurement Sensor Data and Meteorological Mesh Data -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Road State Sensor System -- 4 Temporal and Geological Prediction of Road Conditions -- 4.1 Temporal Prediction Method of Road State -- 4.2 Geological Prediction Method of Road State -- 5 Conclusions and Future Works -- Acknowledgments -- References -- A Coverage Construction and Hill Climbing Approach for Mesh Router Placement Optimization: Simulation Results for Different Number of Mesh Routers and Instances Considering Normal Distribution of Mesh Clients -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed System -- 3.1 CCM for Mesh Router Placement Optimization -- 3.2 CCM-based HC for Mesh Router Placement Optimization -- 4 Simulation Results -- 5 Conclusion -- References -- Related Entity Expansion and Ranking Using Knowledge Graph -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Search Log-Based Model -- 5 Search Log and Knowledge Graph-Based Model -- 6 Evaluation -- 7 Conclusion -- References -- Zero Trust Security in the Mist Architecture -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Mist Architecture -- 2.2 Zero Trust Network -- 3 Mist Architecture for ZTN -- 3.1 System Overview -- 3.2 IAM -- 3.3 IAP and IAP Connector -- 3.4 SIEM -- 3.5 MDM -- 3.6 Others -- 4 Evaluations -- 5 Conclusions -- Acknowledgments -- References -- Blockchain Based Authentication for End-Nodes and Efficient Cluster Head Selection in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Registration and Authentication of Nodes -- 2.2 Storage Issues in Network Nodes -- 2.3 Data Privacy of Nodes -- 2.4 Excessive Energy Consumption -- 2.5 Malicious Nodes Detection and Removal from Networks. , 2.6 Single Point of Failure Issue Due to Centralized Authority.
    Additional Edition: ISBN 3-030-79724-4
    Language: English
    Keywords: Congressos ; Llibres electrònics ; Congressos ; Llibres electrònics
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_9960152495602883
    Format: 1 online resource (544 pages)
    Edition: 1st ed. 2022.
    ISBN: 3-030-79728-7
    Series Statement: Lecture Notes in Networks and Systems, 279
    Content: This book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services.
    Note: Intro -- Welcome Message of IMIS-2021 International Conference Organizers -- IMIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- Advisory Committee Members -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrators -- Steering Committee Chair -- Track Areas and PC Members -- 1. Multimedia and Web Computing -- Track Co-chairs -- PC Members -- 2. Context and Location-aware Computing -- Track Co-chairs -- PC Members -- 3. Data Management and Big Data -- Track Co-chairs -- PC Members -- 4. Security, Trust and Privacy -- Track Co-chairs -- PC Members -- 5. Energy Aware and Pervasive Systems -- Track Co-chairs -- PC Member -- 6. Modeling, Simulation and Performance Evaluation -- Track Co-chairs -- PC Members -- 7. Wireless and Mobile Networks -- Track Co-chairs -- PC Members -- 8. Intelligent Technologies and Applications -- Track Co-chairs -- PC Members -- 9. Cloud Computing and Service-Oriented Applications -- Track Co-chairs -- PC Members -- 10. Ontology and Semantic Web -- Track Co-chairs -- PC Members -- 11. IoT and Social Networking -- Track Co-chairs -- PC Members -- 12. Embedded Systems and Wearable Computers -- Track Co-chairs -- PC Members -- IMIS-2021 Reviewers -- IMIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence Jayh (Hyunhee) Park Myongji University, Yongin, Korea -- Co-evolution of Semantic and Blockchain Technologies Antonio Esposito University of Campania "Luigi Vanvitelli", Aversa, Italy -- Contents -- Implementation of a VR Preview Simulation System by Capturing the Human Body Movements -- 1 Introduction -- 2 Research Objective -- 3 System Configuration -- 3.1 VR Preview Space Control Function -- 3.2 VR Preview Space -- 3.3 Avatar Control Function. , 3.4 Object Storage -- 4 System Architecture -- 5 VR Preview Simulation System -- 5.1 Walk-Through Function -- 5.2 Door/Window Opening/Closing Function -- 5.3 Interior Layout Function -- 6 Functionality Evaluation -- 7 Conclusion -- References -- Projection Region Detection Model Based on BASNet -- 1 Introduction -- 2 Related Work -- 2.1 Traditional Salient Object Detection Methods -- 2.2 Salient Object Detection Based on Deep Learning -- 3 CS-BASNet -- 3.1 CS-BASNet Architecture -- 3.2 Attention Module -- 3.3 Loss Function -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Evaluation Metrics -- 4.4 Evaluation of BASNet and CS-BASNet -- 5 Conclusion -- References -- Analysis of Epidemic Events Based on Event Evolutionary Graph -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Design Knowledge Graph Based on EEG -- 3.2 Event Extraction -- 3.3 Relationship Recognition -- 4 Experiments -- 5 Conclusions -- References -- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators -- 1 Introduction -- 1.1 Anonymously Processed Information -- 1.2 Definition of Terms -- 1.3 Aims of This Paper -- 2 Motivation and Related Works -- 3 Development of Anonymization Dictionary -- 3.1 Overview -- 3.2 Construction Procedure for Anonymization Dictionary -- 4 Evaluation -- 4.1 Evaluation Method -- 4.2 Scenario-Based Evaluation -- 5 Discussion -- 5.1 Synonym Retrieval -- 5.2 Automatic Update -- 5.3 Limitation -- 6 Conclusion -- References -- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 1 Introduction -- 2 VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain -- 2.1 System Architecture -- 2.2 Vehicle Certification -- 2.3 Road Condition Warning. , 2.4 Reward and Punishment Mechanism -- 3 Security Analysis -- 3.1 Security Analysis -- 3.2 Performance Analysis -- 4 Conclusion -- References -- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Preliminaries -- 2.1 Zero-Knowledge Proof -- 2.2 Paillier's Homomorphic Encryption -- 3 The Proposed Scheme -- 3.1 Network Model -- 3.2 Construction -- 4 Use Case -- 5 Security Analysis and Performance Analysis -- 5.1 Security Analysis -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C -- 1 Introduction -- 2 Related Works -- 3 Analysis of Copyright Protection Technology and Restriction Function of Software C -- 4 Software C Piracy Vulnerability Analysis -- 4.1 License Authentication Vulnerability Analysis -- 5 Conclusion -- References -- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format -- 1 Introduction -- 2 Background -- 2.1 Intel Processor Trace -- 2.2 Peach Test Cases Mutation Strategies -- 3 Design and Implementation -- 3.1 Getting the Coverage of the Program -- 3.2 Key Field Type Targeting -- 3.3 Mutation Strategy Optimization -- 3.4 Experiment and Evaluation -- 4 Conclusion -- References -- An Efficient Approach to Enhance the Robustness of Scale-Free Networks -- 1 Introduction -- 2 Related Work -- 3 Scale-Free Networks Topology and Robustness Optimization -- 3.1 Construction of Initial Topology -- 3.2 Centrality Measures -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Based Localization of Sensor Nodes -- 2.2 Authentication of Sensor Nodes -- 2.3 Secure Routing Schemes. , 2.4 Blockchain for IoT Devices -- 2.5 Data Security and Attack Detection -- 3 Proposed System Model -- 4 Simulations and Results -- 5 Conclusion -- References -- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Trust Evaluation for Malicious Nodes Detection -- 2.2 Node's Authentication to Ensure Data Confidentiality and Validity -- 2.3 Secure Routing Protocols in a WSN -- 2.4 Lightweight Blockchain for IoT -- 2.5 Good Performance Regarding Data Storage -- 2.6 Data Security and Privacy -- 2.7 Blockchain Based Fair Non-repudiation Mechanism -- 3 System Model -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM -- 1 Introduction -- 2 Related Work -- 3 Proposed System Model -- 4 Model Evaluation -- 4.1 Performance Metrics -- 4.2 Simulation Results -- 5 Conclusion -- References -- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids -- 1 Background Study -- 2 Acquiring Dataset and Handling Class Imbalanced Problem -- 3 State-of-the-Art NTL Detection Techniques -- 4 Experimental Results -- 5 Conclusion -- References -- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Adapted Predict Obstacle -- 3.1 Forwarding Direction -- 3.2 Phenomenon When Nodes Are Close to Obstacles -- 3.3 Connections Change Rate -- 3.4 The Oldest Survival Age -- 3.5 Probability for Predicting Obstacles -- 3.6 Select Unlimited Nodes -- 4 Performance Evaluation -- 5 Conclusion -- References. , Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol -- 1 Introduction -- 2 N2 Interface and NGAP Protocol Analysis -- 2.1 N2 Interface -- 2.2 NGAP Protocol -- 3 Fuzzing Tool Architecture -- 4 Selection Mutation Algorithms Based on Partition Weight Table -- 5 Experimental Results -- 5.1 Testing Environment Free5GC -- 5.2 Testing Results -- 6 Conclusion -- References -- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN -- 1 Introduction -- 2 DQN Based AAV Testbed -- 2.1 Quadrotor for AAV -- 2.2 DQN for AAV Mobility -- 3 TLS-DQN -- 4 Simulation Results -- 5 Conclusion -- References -- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Mixture Gamma Approximation Based Fading Model -- 3 System Model -- 3.1 Network Model -- 3.2 Channel Model -- 4 Performance Analysis -- 5 Numerical Results -- 6 Conclusion -- References -- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Particle Swarm Optimization -- 2.2 Hill Climbing -- 2.3 WMN-PSOHC System Description -- 3 WMN-PSOHC Web GUI Tool -- 4 Simulation Results -- 5 Conclusions -- References -- Web Page Classification Based on Graph Neural Network -- 1 Introduction -- 2 Related Word -- 2.1 Graph Neural Network -- 3 Problem Formulation and Definition -- 3.1 Web Page Html -- 3.2 Web Page Graph -- 4 Model -- 4.1 Overview -- 4.2 Build Web Page Graph -- 4.3 Web-GNN -- 5 Experiments -- 5.1 Baseline -- 5.2 Dataset -- 5.3 Experimental Setup and Tools -- 5.4 Experimental Results -- 6 Conclusion -- References. , Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
    Additional Edition: ISBN 3-030-79727-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages