<div>This book states that information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at diff
Advances on Broad-Band and Wireless Computing, Communication and Applications. Proceedings of the 18th International Conference on Broad-Band and Wireless Computing, Communication and Applications (BWCCA-2023)
â Scribed by Leonard Barolli
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 398
- Series
- Lecture Notes on Data Engineering and Communications Technologies, 186
- Category
- Library
No coin nor oath required. For personal study only.
⊠Table of Contents
Welcome Message of BWCCA-2023 International Conference Organizers
BWCCA-2023 Organizing Committee
BWCCA-2023 Keynote Talks
Secure Connected and Autonomous Vehicles: Research Trends and Challenges
Toward Human-Friendly Information System Design
Contents
Resiliency of the Area-Segmentation in Vehicle Routing for Collecting the Disaster Information
1 Introduction
2 Model
3 The Whole Area Approach and Area-Segmentation Approach
4 Experimental Results
4.1 Grid Streets
4.2 Non-grid Streets
4.3 Partially Damaged Condition
4.4 Discussion
5 Conclusion
References
The Probability of Encounters of Nomadic Lévy Walk on Unit Disk Graphs
1 Introduction
2 Related Work
3 System Model
4 Nomadic Lévy Walk on Unit Disk Graphs
4.1 Definition
4.2 The Base Relocation Strategy
4.3 Algorithm on Unit Disk Graphs
5 Simulation
5.1 Simulation Setup
5.2 Simulation Result
6 Conclusion
References
Investigating SIC Performance Using Sequential Power Allocation for Downlink NOMA
1 Introduction
2 System Model
3 Result and Analysis
4 Conclusion
References
Information Flow Control in the Fog Computing Model Based on a Component Degree Concept
1 Introduction
2 System Model
2.1 CBAC Model
2.2 Component Degree
3 Information Flow Relations
4 Information Flow Control
5 Evaluation
6 Concluding Remarks
References
Implementation and Benchmarking of Kubernetes Horizontal Pod Autoscaling Method to Event-Driven Messaging System
1 Introduction
2 Literature Research
2.1 Microservice
2.2 Kubernetes
2.3 Event-Driven
2.4 RabbitMQ
2.5 Prometheus
2.6 Horizontal Pod Autoscaler
2.7 Keda
2.8 Grafana
2.9 Siege
3 Proposed Architecture and Autoscaling Method
3.1 System Architecture Design and System
3.2 Autoscaling Method
4 Experimental Result
4.1 Comparison of Number of Replicas on KEDA, PCM, and KEDA + PCM
4.2 Comparison Against CPU Usage RabbitMQ Server
4.3 Comparison Against Memory Usage RabbitMQ Server
5 Conclusion
References
Application of Convolutional Neural Network Method with MobileNet V1 and ResNet-152 V2 Architecture in Batik Motif Classification
1 Introduction
2 Convolutional Neural Network
2.1 Mobilenet Architecture
2.2 ResNet Architecture
3 Methodology
3.1 Dataset and Pre-processing
3.2 Implementation of MobileNet V1 and ResNet-152 V2 Architecture
3.3 Model Testing
4 Experimental Result
5 Conclusion
References
Web Viewer for Educational VR Contents of 3D Scene Models Supporting VR Goggles
1 Introduction
2 Related Work
3 Current Web Viewers
3.1 Web Viewer for 3D Models
3.2 Current Web Viewer for Point Cloud Data(PCD)
3.3 Current Web Viewer for 360VR Images/videos
4 Web Viewer for 3D Scene Models
5 Conclusions
References
Human Factors Impacting the Security Actions of Help Recipients
1 Introduction
2 Related Works
2.1 Approaches to Bridge Digital Divide
2.2 Difference of Security Awareness Between User Characteristics
3 Methodology
4 Result
4.1 Causes of Anxiety in Users
4.2 Status of Taking Security Action
4.3 Reasons Why the Help Recipients Delegated Security Action to Helpers
4.4 Security Actions that the Help Recipients Came to Take by Themselves
4.5 Opportunities that Enabled the Help Recipients to Take Security Action by Themselves
4.6 Helpers
5 Discussion and Limitation of Works
5.1 Characteristics of Help Recipient
5.2 Approach for Help Recipients
5.3 Limitation
6 Conclusion and Future Works
References
Proposal for Approaches to Updating Software on Android Smartphone
1 Introduction
2 Related Works
2.1 User Awareness of Updating OS and Application
2.2 Interventions for Behavior Change
2.3 Approaches that Promote the Taking of Security Actions
3 Proposed Method
4 Evaluation
4.1 Methodology
4.2 Analysis
4.3 Result
5 Discussion
5.1 Appropriate Phrases
5.2 Appropriate Incentives
5.3 Limitations
6 Conclusion and Future Works
Appendix: Questionnaire
References
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats
1 Introduction
2 Related Work
2.1 Insider Threats
2.2 Deceptions
2.3 Selection of Security Measures
3 Selection of Security Measures with Deception Mechanisms
3.1 Effects of Deceptions
3.2 Extending Existing Method
3.3 Extending the MITRE ATT&CK
4 Formulation of Proposed Method
4.1 Extending Objective Function by Implementing Explicit/Implicit Effectiveness
4.2 Setting Constraints Based on Usability Degradation
4.3 Determination of the Best Deceptions
5 Conclusion
References
Device Classification via Passive Fingerprints with Clustering Algorithm
1 Introduction
2 Related Work
2.1 Browser Fingerprinting
2.2 Passive Fingerprinting
3 Proposed Method
3.1 Pair Reduction
3.2 Grouping
4 Dataset and Feature Engineering
4.1 Dataset Splitting
4.2 Features
4.3 Creation of Data for Pair Reduction Process
5 Experiments
5.1 Evaluation Metrics
5.2 Experiment 1
5.3 Experiment 2
5.4 Experiment 3
6 Discussion and Limitations
7 Conclusion
8 Ethics
References
A Scheme for Source Location Privacy of Multiple Sources in Wireless Sensor Networks
1 Introduction
2 Related Work
3 System Models and Problem Statement
3.1 Network Model
3.2 Attacker Model
3.3 Problem Statement
4 Proposed Scheme
4.1 Setup Phase
4.2 Routing Phase
5 Simulation Setup and Results
5.1 Simulation Setup
5.2 Simulation Results
6 Conclusion
References
Blockchain Application for Fish Origin Certification
1 Introduction
2 Tyrrhenian Anchovy Case Study
2.1 Potential Attacks on the Fish-to-Fork Case Study
2.2 System Requirements
3 CERTFish System
4 Implementation
5 Discussion and Results
6 Related Work
7 Conclusions and Future Work
References
A Fuzzy-Based System for Assessment of Recognition Error in VANETs
1 Introduction
2 Overview of VANETs
3 Network Technological Advancement in VANETs
4 Proposed Fuzzy-Based System
5 Simulation Results
6 Conclusions
References
An Intelligent System Based on Cuckoo Search for Node Placement Problem in WMNs: Tuning of Scale and Host Bird Recognition Rate Hyperparameters
1 Introduction
2 Node Placement Problem in WMNs
3 CS Algorithm
3.1 CS Overview
3.2 Lévy Flight
4 Overview of WMN-CS Simulation System
5 Simulation Results
6 Conclusions
References
Dynamic Spatiotemporal Graph Convolution Network for Cellular Communication Traffic Prediction
1 Introduction
2 DSGCN Predictive Model
2.1 Cellular Traffic Prediction Problem
2.2 Spatiotemporal Module
2.3 Input and Output
3 Performance Experiments
4 Conclusion
References
Caching Strategy Utilizing Social Network Analysis Algorithm for Effective Cache Storage Allocation in Named Data Networking
1 Introduction
2 Related Works
3 System Models
3.1 Icarus Simulator
3.2 Formulas
4 Evaluation Performance
4.1 Cache Hit Rate (CHR)
4.2 Latency
4.3 Link Load
4.4 Path Stretch
5 Conclusion
References
A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusion
References
An Effective Technique for Collecting Multi-languages Hotel Reviews: A Case Study of 5 Stars Hotels in Bali Island
1 Introduction
2 Aims and Objectives
2.1 Aims
2.2 Objectives
3 Existing Methods and Problem Statement
3.1 Using Online Survey
3.2 Manual Data Collection
3.3 Using API
3.4 Third Party Scrapers Tool
4 Proposed System
5 Demonstration of Experiment Result
6 Advantages and Future Possibilities
7 Conclusion
References
Applying High-Quality Test Case Management Mechanisms to Improve Regression Testing Speed and Quality
1 Introduction
2 Regression Testing and Test Case Management
2.1 Importance of Regression Testing
2.2 Importance of Test Case Management for Regression Testing
3 Quality Characteristics and Influencing Factors of TCMM
3.1 Quality Characteristics of TCMM
3.2 Quality Influencing Factors of TCMM
4 TCMM Measurement Model and Quality Improvement
4.1 TCMM Measurement Model
4.2 TCMM Quality Improvement Manners
5 Evaluation of TCMM
6 Conclusion
References
Case Study in Generating RFC Maps of IETF Standards
1 Introduction
2 System Architecture
2.1 Preprocessing
2.2 Algorithm to Generate an RFC Map
3 System Implementation and Experiment Results
3.1 RFC Map of RPKI (Resource Public Key Infrastructure)
3.2 Number of RFCs Listed in RFC Maps
4 Conclusions and Future Works
References
Enhancing Resource Allocation for Cloud Computation Platform with Priority Based Scheduling
1 Introduction
2 Research Background
2.1 Render Farm
2.2 Weight Priority Scheduling
3 Resource Prediction for a Job
3.1 Estimating the Number of Workers Allocated for a Job
3.2 Experimental Verification
4 Conclusion
References
5G Network Base Station Timeline Scheduling
1 Introduction
2 Background and Related Work
2.1 5G â Air â Simulator
2.2 Packet Data Convergence Protocol (PDCP)
2.3 Scheduling and Resource Allocation (SRA) Algorithm
3 Design Architecture
3.1 Architecture
3.2 Implementation Method
4 Experiment and Validation
4.1 CBR
4.2 VoIP
4.3 Video
5 Conclusion and Future Studies
References
Assessment of RIWM and FC-RDVM for Small and Middle Scale WMNs Considering Stadium Distribution and UNDX-M Crossover Method
1 Introduction
2 PSO, HC and DGA Intelligent Algorithms
2.1 Particle Swarm Optimization
2.2 Hill Climbing Algorithm
2.3 Distributed Genetic Algorithm
3 WMN-PSOHCDGA Simulation System Design
4 Simulation Results
5 Conclusions
References
A New DTN Routing Strategy Considering Age of Information
1 Introduction
2 Measuring Freshness of Information by AoI
3 Disaster Information System Considering AoI
3.1 Network Model of Disaster Affected Area
3.2 Message Relay Methods for Disaster Information
3.3 A New DTN Routing Algorithm Considering AoI
4 Performance Evaluations
4.1 Conditions of Evaluation
4.2 Basic Evaluation of Traditional Relay Method
4.3 Performance Evaluation of Effects of Buffer Management and Transmission Order Control Considering AoI
4.4 Advanced Buffer Management for Large Number of Message Originators
5 Conclusion
References
DTN Routing Method Based on Records of Data Transmission Paths
1 Introduction
2 Delay Tolerant Networking
2.1 Background of DTN
2.2 Data Transferring in DTN
2.3 Routing Methods for DTN
2.4 Message Ferry Method
2.5 Aggregated Message Ferry Method
3 Routing Method Based on Records of Data Transmission Paths
3.1 Assumption of the Proposed Method
3.2 Adding Ferry Score
3.3 Methods for Determining the Communication Destination
4 Evaluations
5 Simulation Conditions
5.1 Simulation Results
5.2 Discussions
6 Summary
References
Effect of Polarization Loss on Channel Capacity
1 Introduction
2 Simulation and Measurement
3 Result and Discussion
4 Conclusion
References
FSALT: A Fuzzy-Based System for Assessment of Logical Trust and Its Performance Evaluation
1 Introduction
2 Trust Computing Overview
3 Fuzzy Logic Overview
4 Proposed Fuzzy-Based System
5 Simulation Results
6 Conclusions and Future Work
References
Time Series Mean Normalization for Enhanced Feature Extraction in In-Vehicle Network Intrusion Detection System
1 Introduction
2 Related Work
3 CAN Bus and Attack Datasets
3.1 Controller Area Network (CAN)
3.2 Denial of Service (DoS)
3.3 Fuzzing
3.4 Replay
3.5 Malfunction
4 Mean Normalization and Time Series for LSTM
4.1 Long Short-Term Memory (LSTM)
4.2 Feature Extraction and Dataset Pre-Processing
5 Evaluation Performance
6 Conclusion
References
Wireless Visual Sensor Node Placement Optimization Considering Different Distributions of Events
1 Introduction
2 Proposed Intelligent System
2.1 CCM
2.2 CCM-Based SA
3 Simulation Results
4 Conclusions
References
A Music Therapy Model Based on Consortium Blockchain Platform with Evidence and Tracking Efficacy of Hypertension Treatment
1 Introduction
2 Related Works
3 System Design
4 Experimental Results and Discussion
5 Conclusion and Future Work
References
Effect of Multiple Unmanned Aerial Vehicles on Data Transmission Considering DTN-Based V2V Communication in Urban Area
1 Introduction
2 Background of Delay-Tolerant Networking
2.1 DTN Overview
2.2 Epidemic Protocol
3 DTN-Based Delivery Platform Using UAV and V2V
4 Evaluation Results
5 Conclusions
References
Moving Accuracy Measurement of Omnidirectional Robot for MOAP and Wheelchair Tennis
1 Introduction
2 Implementation and Application of Omnidirectional Robot
2.1 Application for Moving Omnidirectional Access Point Robot
2.2 Apprication for Wheelchair Tennis
3 Proposed System for Control of Omnidirectional Robot
4 Experimental Results for Control of Omnidirectional Robot
5 Conclusions and Future Work
References
Data Augmentation Method for Improving Object Detection Accuracy of Recumbent Human in Disaster
1 Introduction
2 Object Detection
2.1 Overview
2.2 Single Shot MultiBox Detector (SSD)
2.3 Data Augmentation of SSD
3 Proposed Method
3.1 Outline of Proposed Method
3.2 Learning Environment
4 Validating the Effectiveness of the Proposed Method
4.1 Test Data
4.2 Model Evaluation Metrics
5 Evaluation Experiment
5.1 Learning Curve
5.2 Accuracy Evaluation
6 Conclusion
6.1 Summary
6.2 Future Work
References
Optimal Compressing and Decompressing Digital-Ink Handwriting via Sparse Gaussian Process Regression and Dynamic Programming
1 Introduction
2 Preliminaries
3 Digital-Ink Compression and Decompression Using Sparse GPR
4 Optimal Pseudo-input Point Selection Using Dynamic Programming
5 Experimental Studies
5.1 Experimental System
5.2 Experimental Results
6 Concluding Remarks
References
Author Index
đ SIMILAR VOLUMES
<p><p>This book aims to provide the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing.</p><p>Information networks of today are going through a ra
<p><p>This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8â10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different
<p><p></p><p>This proceedings book presents the latest research findings, innovative research results, methods and development techniques related to the emerging areas of broadband and wireless computing, from both theoretical and practical perspectives.</p><p>Todayâs information networks are going
<p><p>The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all el
<p><p></p><p>This book presents on the latest research findings, and innovative research methods and development techniques related to the emerging areas of broadband and wireless computing from both theoretical and practical perspectives.</p><p></p><p>Information networking is evolving rapidly with