


default search action
32nd AINA 2018: Krakow, Poland - Workshops
- Leonard Barolli, Makoto Takizawa, Tomoya Enokido, Marek R. Ogiela, Lidia Ogiela, Nadeem Javaid:
32nd International Conference on Advanced Information Networking and Applications Workshops, AINA 2018 workshops, Krakow, Poland, May 16-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-5395-1
Network Applications (FINA-2018)
Session 1: Multimedia and Network-Based Applications
- Jianhua Yang, Yongzhong Zhang:
Using Postal Mail System to Teach Packet Switching in Computer Networks. 1-5 - Shadi Esnaashari, Lesley A. Gardner
, Michael Rehm
:
Characterizing Students' Behavior Based on their Participation in Property Course in New Zealand. 6-11 - Maria Carla Calzarossa
, Daniele Tessera
:
Analysis and Forecasting of Web Content Dynamics. 12-17 - Hiroki Kuzuno, Shintaro Otsuka:
Early Detection of Network Incident Using Open Security Information. 18-23 - Hana Mejdi
, Oussama Kallel, Salem Hasnaoui:
Rules to Transform Specific Description Language Diagram Into Coloured Petri Nets. 24-27
Session 2: Distributed and Parallel Computing
- Seyed M.-H. Mansourbeigi:
Sheaf Theory as a Mathematical Foundation for Distributed Applications Involving Heterogeneous Data Sets. 28-33 - Alexandr Basov, Daniel de Carvalho, Manuel Mazzara
:
Implementing Distributed Lamda-Calculus Interpreter. 34-39 - Masaki Kohana, Hiroki Sakaji, Akio Kobayashi, Shusuke Okamoto:
A Parallel Calculation Method on Web Browser for Contents Categorization. 40-44 - Azat Khusnutdinov, Denis Usachev, Manuel Mazzara
, Adil Khan, Ivan Panchenko:
Open Source Platform Digital Personal Assistant. 45-50
Session 3: Cloud and Grid Computing
- Syed Muhammad Mohsin
, Nadeem Javaid
, Sajjad Ahmad Madani
, Syed Kashif Abbas, Syed Muhammad Abrar Akber
, Zahoor Ali Khan:
Appliance Scheduling in Smart Homes with Harmony Search Algorithm for Different Operation Time Intervals. 51-60 - Pooyan Habibi, Soroush Baharlooei, Mohammad Farhoudi, Sepehr Kazemian, Siavash Khorsandi:
Virtualized SDN-Based End-to-End Reference Architecture for Fog Networking. 61-66 - Stathis Maneas, Bianca Schroeder:
The Evolution of the Hadoop Distributed File System. 67-74 - Dharmendra Prasad Mahato
, Ravi Shankar Singh
:
Reliability Modeling and Analysis for Deadline-Constrained Grid Service. 75-81
The 14th International Workshop on Heterogeneous Wireless Networks (HWISE-2018)
Session 1: Mobile Communication Systems and Networking
- Kazunori Uchida, Leonard Barolli:
Dijkstra Algorithm Based Ray Tracing: A Case Study for Tunnel Structures. 82-87 - Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi:
Towards a Secured Clustering Mechanism for Messages Exchange in VANET. 88-93 - Bouthaina Smari, Mondher Labidi, Fethi Choubani:
Design of a Small Metamtrial Antenna for Millimetric Wave Applications. 94-97 - Amal Bouazizi, Ghada Zaibi, Mounir Samet, Abdennaceur Kachouri:
A Miniaturized Invasive Antenna Study for a Better Performance in Medical Application. 98-103
Session 2: Next Generation Networks
- Aqdas Naz, Nadeem Javaid
, Muhammad Mudassar Iqbal, Mujahid Ali, Muhammad Imran, Zahoor Ali Khan:
TBEENISH: Threshold Balanced Energy Efficient Network Integrated Super Heterogeneous Protocol for WSNs. 104-111 - Noriki Uchida, Takahiro Shingai, Takato Shigetome, Tomoyuki Ishida, Yoshitaka Shibata:
Proposal of Static Body Object Detection Methods with the DTN Routing for Life Safety Information Systems. 112-117 - Dhouha El Houssaini
, Zina Mohamed, Sabrine Khriji
, Kamel Besbes
, Olfa Kanoun:
A Filtered RSSI Model Based on Hardware Characteristic for Localization Algorithm in Wireless Sensor Networks. 118-123 - Shivraj VL, Meena Singh Dilip Thakur, Rajan MA:
A Novel Multi Verifier Device Attestation Scheme for Swarm of Devices. 124-129 - Shogo Nakasaki, Yu Yoshino, Makoto Ikeda, Leonard Barolli:
A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs. 130-135
Enhancement of Wireless Networks (PAEWN-2018)
Session 1: Network Performance Analysis and Enhancement
- Maha Abderrahim, Hela Hakim, Hatem Boujemaa, Raed al Hamad
:
Multihop Transmission Strategy to Improve Energy Efficiency in WSNs. 136-140 - Meriem Meddah, Rim Haddad, Tahar Ezzedine:
Residual Energy and Density Control Aware Cluster Head Election in Wireless Sensor Network. 141-146 - Tasnim Abar, Asma Ben Letaifa
, Sadok El Asmi:
How Modeling QoE Requirements Using Game Theory. 147-152 - Nawres Abdelwahed, Asma Ben Letaifa
, Sadok El Asmi:
Content Based Algorithm Aiming to Improve the WEB_QoE Over SDN Networks. 153-158 - Yu Yoshino, Shogo Nakasaki, Makoto Ikeda, Leonard Barolli:
An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs. 159-163 - Nawres Abdelwahed, Asma Ben Letaifa
, Sadok El Asmi:
Ameliorating the Web QoE Using SPA. 164-169
The 11th International Symposium on Mining and Web (MAW-2018)
Session 1: Collaborative and Secure Systems
- Saki Kawanobe, Tomonobu Ozaki:
Experimental Study of Characterizing Frequent Itemsets Using Representation Learning. 170-174 - Kole Nunley, Wei Lu
:
Detecting Network Intrusions Using a Confidence-Based Reward System. 175-180 - Hayato Tsukiji, Kosuke Takano:
An Estimation Method of User Roles Based on Online Technical Communication Activities. 181-186 - Deepali Arora, Panajotis Agathoklis, Alex Loffler:
Network Event Classification for Security of IT Infrastructure. 187-192 - Linlin Zhang, Kin Fun Li:
Education Analytics: Challenges and Approaches. 193-198 - Noriyasu Yamamoto, Noriki Uchida:
Improvement of Image Processing for a Collaborative Security Flight Control System with Multiple Drones. 199-202
The 12th International Workshop on Bio and Intelligent Computing (BICom-2018)
Session 1: Intelligent Systems and Algorithms
- Keita Matsuo, Masafumi Yamada, Kevin Bylykbashi
, Miralda Cuka, Yi Liu, Leonard Barolli:
Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves. 203-209 - Rasool Bukhsh
, Nadeem Javaid
, Zafar Iqbal, Usman Ahmed, Zeeshan Ahmad, Muhammad Nadeem Iqbal:
Appliances Scheduling Using Hybrid Scheme of Genetic Algorithm and Elephant Herd Optimization for Residential Demand Response. 210-217 - Aqdas Naz, Nadeem Javaid
, Talha Naeem Qureshi
, Muhammad Imran, Mujahid Ali, Zahoor Ali Khan:
EDHBPSO: Enhanced Differential Harmony Binary Particle Swarm Optimization for Demand Side Management in Smart Grid. 218-225 - Sundas Shafiq, Sikandar Asif, Iqra Fatima, Kubra Yousaf, Wajiha Safat, Nadeem Javaid
:
An Approach Towards Efficient Scheduling of Home Energy Management System Using Backtracking Search Optimization and Tabu Search. 226-231
Session 2: Bio-Computing and Machine Learning
- Sadyk Sayfullin, Fedor Akhmetov, Manuel Mazzara
, Ruslan Mustafin, Victor Rivera:
Gene Expression for Simulation of Biological Tissue. 232-239 - Syed Muhammad Mohsin
, Nadeem Javaid
, Sajjad Ahmad Madani
, Syed Muhammad Abrar Akber
, Sohaib Manzoor, Javed Ahmad:
Implementing Elephant Herding Optimization Algorithm with different Operation Time Intervals for Appliance Scheduling in Smart Grid. 240-249 - Abdul Mateen
, Nadeem Javaid
, Muhammad Awais, Nasir Khan, Urva Latif, Ihtisham Ullah:
Bio-Inspired Optimization Techniques for Home Energy Management in Smart Grid. 250-257 - Tasnim Abar, Asma Ben Letaifa
, Sadok El Asmi:
Enhancing QoE Based on Machine Learning and DASH in SDN Networks. 258-263
The 12th International Workshop on Telecommunication Networking, Applications and Systems (TeNAS-2018)
Session 1: Wireless and Mobile Technology
- Alfredo J. Perez
:
M-SPOT: A Hybrid Multiobjective Evolutionary Algorithm for Node Placement in Wireless Sensor Networks. 264-269 - Ali Saeed Dayem Alfoudi, Mohammed Dighriri, Abayomi Moradeyo Otebolaku, Rubem Pereira, Gyu Myoung Lee:
Mobility Management Architecture in Different RATs Based Network Slicing. 270-274 - Mohammed Dighriri, Ali Saeed Dayem Alfoudi, Gyu Myoung Lee, Thar Baker
, Rubem Pereira:
Resource Allocation Scheme in 5G Network Slices. 275-280 - Shih-Hao Chang, Teh-Sheng Huang:
A Robust CSI-HARQ MIMO Visible Light Communication Scheme for Wireless Industrial Networking. 281-286 - Omar Aldhaibani, Faycal Bouhafs
, Michael Mackay, Alessandro Raschellà:
An SDN-Based Architecture for Smart Handover to Improve QoE in IEEE 802.11 WLANs. 287-292 - Atsuhiro Sawada, Dilawaer Duolikun, Ryo Watanabe, Tomoya Enokido, Makoto Takizawa
:
A Simple Algorithm to Select Energy-Efficient Servers for Storage and Computation Processes. 293-300
The 6th International Workshop on Collaborative Enterprise Systems (COLLABES-2018)
Session 1: Collaborative Systems and Applications
- Ryuji Oma, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
:
An Energy-Efficient Model of Fog and Device Nodes in IoT. 301-306 - Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Cloud-Based Global Monitoring System for Smart Cities. 307-312 - Shadi Esnaashari, Lesley A. Gardner
, Paul A. Watters
:
Clustering Student Participation: Implications for Education. 313-318 - Irina Makarova
, Anton Pashkevich, Ksenia Shubenkova
:
Blended Learning Technologies in the Automotive Industry Specialists' Training. 319-324 - Channamallikarjuna Mattihalli, Edemialem Gedefaye, Fasil Endalamaw, Adugna Necho
:
Real Time Automation of Agriculture Land, by automatically Detecting Plant Leaf Diseases and Auto Medicine. 325-330 - Imen Allani, Belhassen Zouari:
A Semantic Model for Document Management in Business Processes. 331-336
The International Workshop on Cloud Computing Project and Initiatives (CCPI-2018)
Session 1: Smart Platforms I
- Lutz Schubert
, Athanasios Tsitsipas, Keith G. Jeffery
:
How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles. 337-342 - Dario Bruneo, Sebastiano Chillari, Salvatore Distefano, Maurizio Giacobbe
, Antonino Longo Minnolo, Francesco Longo
, Giovanni Merlino
, Davide Mulfari, Alfonso Panarello, Giuseppe Patanè
, Antonio Puliafito, Carlo Puliafito
, Marco Scarpa, Nachiket Tapas
, Giancarlo Visalli:
Building a Smart City Service Platform in Messina with the #SmartME Project. 343-348 - Gianluca Aloi
, Giancarlo Fortino
, Raffaele Gravina, Pasquale Pace, Giuseppe Caliciuri:
Edge Computing-Enabled Body Area Networks. 349-353 - Antonella Longo
, Mario A. Bochicchio
, Marco Zappatore:
A Cloud-Based Approach to Assess the Quality of Local Transportation Services in Apulia Region. 354-359 - Geir Horn
, Pawel Skrzypek
:
MELODIC: Utility Based Cross Cloud Deployment Optimisation. 360-367
Session 2: Smart Platforms II
- Eva Kühn, Stefan Craß:
Coordination Pattern-Based Approach for Auto-Scaling in Multi-clouds. 368-373 - Dimosthenis Kyriazis
:
BYOS: Bring Your Own Security in Clouds and Service Oriented Infrastructures. 374-379 - Flora Amato
, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato:
An Application of Semantic Techniques for Forensic Analysis. 380-385 - Giuseppe Attardi, Alex Barchiesi, Alberto Colla, Roberto di Lallo, Fulvio Galeazzi:
Declarative Modeling for Deploying a Container Platform. 386-389 - Marwa Abderrahim, Asma Ben Letaifa
, Amel Haji, Sami Tabbane:
A Game Theory-Based Effective Network Management in SDN Networks. 390-395
Session 3: Cloud Federations, Big Data, Edge and IoT
- Cesare Bandirali, Stefano Lodi, Gianluca Moro
, Andrea Pagliarani, Claudio Sartori:
Parallel Primitives for Vendor-Agnostic Implementation of Big Data Mining Algorithms. 396-401 - Beniamino Di Martino, Salvatore D'Angelo
, Antonio Esposito
, Riccardo Cappuzzo, Anderson Santana de Oliveira:
ROCK Algorithm Parallelization with TOREADOR Primitives. 402-407 - Ivan Martinez, Jorge Montero, Tomás Pariente Lobo
, Beniamino Di Martino, Salvatore D'Angelo
, Antonio Esposito
:
Parallelization and Deployment of Big Data Algorithms: The TOREADOR Approach. 408-412 - Giuseppe Attardi, Beniamino Di Martino, Antonio Esposito
, Michele Mastroianni
:
Using Federated Cloud Platform to Implement Academia Services for Research and Administration. 413-418 - Lorenzo Carnevale
, Antonio Celesti, Antonino Galletta, Schahram Dustdar
, Massimo Villari:
From the Cloud to Edge and IoT: a Smart Orchestration Architecture for Enabling Osmotic Computing. 419-424
Session 4: Cloud Management
- Amel Haji, Asma Ben Letaifa
, Sami Tabbane:
Elastic Architecture Based NFV and OpenStack to Deploy VA Service. 425-429 - Claude R. Baudoin:
The Impact of Data Residency on Cloud Computing. 430-435 - Beniamino Di Martino, Jessica Pascarella, Stefania Nacchia
, Salvatore Augusto Maisto, Pietro Iannucci, Fabio Cerri:
Cloud Services Categories Identification from Requirements Specifications. 436-441 - Marwa Abderrahim, Asma Ben Letaifa
, Amel Haji, Sami Tabbane:
How to use MEC and ML to Improve Resources Allocation in SDN Networks? 442-447
The 6th International Workshop on Network and System Management and Monitoring (NetSMM-2018)
Session 1: Network Monitoring and Management
- Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa
:
Concept of User Authentication Method for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain. 448-453 - Talha Naeem Qureshi
, Nadeem Javaid
, Aqdas Naz, Waseem Ahmad, Muhammad Imran, Zahoor Ali Khan:
A Novel Meta-Heuristic Hybrid Enhanced Differential Harmony Wind Driven (EDHWDO) Optimization Technique for Demand Side Management in Smart Grid. 454-461 - Rinat Khatipov, Aydar Negimatzhanov, Ilgiz Zamaleev, Anvar Zakirov, Manuel Mazzara
, Victor Rivera:
Hikester - The Event Management Application. 462-468 - Evgenia Kapassa
, Marios Touloupou, Dimosthenis Kyriazis
:
SLAs in 5G: A Complete Framework Facilitating VNF- and NS- Tailored SLAs Management. 469-474 - Mohammed Suhel Inamdar, Ali Tekeoglu:
Security Analysis of Open Source Network Access Control in Virtual Networks. 475-480 - Jose Alfredo Alvarez Aldana, Stephane Maag, Fatiha Zaïdi:
MANETs Interoperability: Current Trends and Open Research. 481-487
The 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATE-SEC-2018)
Session 1: Authentication and Cryptography
- Rajaguru K, R. C. Hansdah:
Symmetric Key-Based Lightweight Authentication Protocols for RFID Security. 488-495 - Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi:
Towards the Formal Validation of a Ticket-Based Authentication Scheme for VANETs. 496-501 - Zijian Li, Jun Yang, Baojiang Cui:
Study on Sensitive Data Protection Based on SEAndroid. 502-507
Session 2: Security and Privacy
- Shuo Zhang, Stephen D. Wolthusen:
Security-Aware Network Analysis for Network Controllability. 508-514 - Jianhua Yang, Yongzhong Zhang, Robert King, Tim Tolbert:
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection. 515-520 - Ruiqing Liu, Jun Yang, Baojiang Cui:
Improved Secure ZigBee Light Link Touchlink Commissioning Protocol Design. 521-526 - Pacome Landry Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Privacy Risks in Resource Constrained Smart Micro-Grids. 527-532
The 5th International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe-2018)
Session 1: Green Distributed Organizations and Monitoring Solutions
- Emi Ogawa, Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
:
Unicast Routing Protocols to Reduce Electric Energy Consumption in Wireless Ad-Hoc Networks. 533-538 - Narjes Lassoued, Noureddine Boujnah
, Ridha Bouallegue
:
Reducing Power Consumption in HetNet Network Using Power Adjustment and Coordinated Multipoint Technique. 539-544 - Maha Abderrahim, Hela Hakim, Hatem Boujemaa:
Energy-Efficient Transmission Strategy with Cluster Organization Phase to improve Energy Saving in WSNs. 545-549 - Ahmad Jaffar Khan, Nadeem Javaid
, Zafar Iqbal, Naveed Anwar, Abdul Saboor, Inzimam ul-Haq, Umar Qasim:
A Hybrid Bacterial Foraging Tabu Search Heuristic Optimization for Demand Side Management in Smart Grid. 550-558
Session 2: Security Issues in the Internet of Things and Smart Solutions
- Luca Caviglione, Alessio Merlo, Mauro Migliardi
:
Covert Channels in IoT Deployments Through Data Hiding Techniques. 559-563 - Carlo Ferrari, Daniele Marini, Michele Moro:
An Adaptive Typing Biometric System with Varying users Model. 564-568 - Gianluca Fimiani:
Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE). 569-572 - Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo
, Luigi Romano, Luigi Sgaglione:
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project. 573-578 - Diletta Romana Cacciagrano
, Rosario Culmone
:
Formal Semantics of an IoT-Specific Language. 579-584 - Michele Bottone
, Franco Raimondi
, Giuseppe Primiero
:
Multi-agent Based Simulations of Block-Free Distributed Ledgers. 585-590 - Burak Kizilkaya
, Mehmet Caglar, Fadi Al-Turjman
, Enver Ever
:
An Intelligent Car Park Management System : Hierarchical Placement Algorithm Based on Nearest Location. 597-602 - Ines Hosni:
Performance of IEEE802.15.4e TSCH Protocol for Multi-hop Wireless Sensor Networks. 603-608
The 3rd International Workshop on Innovative Technologies in Informatics and Networking (WITIN-2018)
Session 1: Image Recognition and Object Detection
- Deng-Yuan Huang, Chao-Ho Chen, Tsong-Yi Chen, Jian-He Wu, Chien-Chuan Ko:
Real-Time Face Detection Using a Moving Camera. 609-614 - Ying-Nong Chen, Chi-Hung Chuang, Kuo-Chin Fan:
Stereo-Based 3D Space Handwriting Recognition. 615-617 - Cheng-Fang Peng, Jun-Wei Hsieh, Shao-Wei Leu, Chi-Hung Chuang:
Drone-Based Vacant Parking Space Detection. 618-622 - Lung-Jen Wang, Wen-Shyong Hsieh:
Toward an Improvement of UAV-Aerial Image Using Non-linear Image Enhancement. 623-626 - Sandeli Priyanwada Kasthuri Arachchi, Noorkholis Luthfil Hakim
, Hui-Huang Hsu, Stanislav Vladimirovich Klimenko, Timothy K. Shih:
Real-Time Static and Dynamic Gesture Recognition Using Mixed Space Features for 3D Virtual World's Interactions. 627-632
Session 2: Multimedia Data Analysis
- Chuan-Yu Chang, Fu Ren Chen:
Application of Deep Learning for Infant Vomiting and Crying Detection. 633-635 - Chi-Pan Hwang, Mu-Song Chen, Chih-Min Shih, Hsing-Yu Chen, Wen-Kai Liu:
Apply Scikit-Learn in Python to Analyze Driver Behavior Based on OBD Data. 636-639 - Shih-Chieh Shie, Ji-Han Jiang, Yi-Jen Su, Wei-Yan Chang:
An Improved Steganographic Scheme Implemented on the Compression Domain of Image Using BTC and Histogram Modification. 640-644 - Hsing-Chung Chen, Shyi-Shiun Kuo, Han-Mi Chen:
Secure OTT Service Scheme Based on Blockchain Technology. 645-650
The 3rd International Workshop on Big Data Processing in Online Social Network (BOSON-2018
Session 1: Distributed Computing Methods and Applications
- Marco Pota, Massimo Esposito, Marco A. Palomino, Giovanni Luca Masala:
A Subword-Based Deep Learning Approach for Sentiment Analysis of Political Tweets. 651-656 - Alessandro Maisto
, Serena Pelosi, Raffaele Guarasci
, Pierluigi Vitale:
Text Analysis on User Generated Content: The Rap Lyrics Challenge. 657-662 - Giuseppe Caggianese
, Andrea Chirico
, Giuseppe De Pietro, Luigi Gallo
, Antonio Giordano
, Marco Predazzi, Pietro Neroni:
Towards a Virtual Reality Cognitive Training System for Mild Cognitive Impairment and Alzheimer's Disease Patients. 663-667 - Emanuele Damiano, Aniello Minutolo, Massimo Esposito:
Open Information Extraction for Italian Sentences. 668-673
Session 2: Modeling and Simulation of Big Data Processing
- Walter Balzano, Vinicio Barbieri, Giovanni Riccardi:
Smart Priority Park Framework Based on DDGP3. 674-680 - Flora Amato
, Leonard Barolli, Vincenzo Moscato, Antonio Picariello, Giancarlo Sperlì:
Strategies for Social Networks Modeling. 681-686 - Flora Amato
, Francesco Moscato, Fatos Xhafa:
Enabling IoT Stream Management in Multi-cloud Environment by Orchestration. 687-692
The First International Workshop on Internet of Everything and Machine Learning Applications (IOEMLA-2018)
Session 1: Machine Learning
- Mohammad Alhabashneh, Bilal Abu-Salih
, Shirlee-ann Knight
:
Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges. 693-697 - Hussain Shafquat, Athula Ginige
:
Extending a Conventional Chatbot Knowledge Base to External Knowledge Source and Introducing User Based Sessions for Diabetes Education. 698-703 - Omid Ameri Sianaki
, Ashkan Yousefi
, Azadeh Rajabian Tabesh, Mehregan Mahdavi:
Internet of Everything and Machine Learning Applications: Issues and Challenges. 704-708 - Ahmed Dawoud
, Seyed Shahristani, Chun Raun:
A Deep Learning Framework to Enhance Software Defined Networks Security. 709-714
Session 2: Internet of Everything
- Jaswinder Kaur, Pornpit Wongthongtham, Bilal Abu-Salih
, Sogand Fathy:
Analysis of Scientific Production of IoE Big Data Research. 715-720 - Muhammad Rashid Minhas, Vidyasagar M. Potdar, Omid Ameri Sianaki
:
A Decision Support System for Selecting Sustainable Materials in Construction Projects. 721-726 - Mahmoud Elkhodr
, Belal Alsinglawi
, Mohammad Dahman Alshehri:
Data Provenance in the Internet of Things. 727-731

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.