ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
4
views
23
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,207
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017)
A Fuzzy-Based Testbed for Wireless Sensor and Actuator Networks: Performance Evaluation for Different Remaining Energy of Actuators
other
Author(s):
Gaku Tsuchiya
,
Keisuke Ebisu
,
Makoto Ikeda
,
Donald Elmazi
,
Leonard Barolli
,
Elis Kulla
Publication date
(Online):
July 05 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
23
Record
: found
Abstract
: not found
Article
: not found
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
Ala Al-Fuqaha
,
Mohsen Guizani
,
Mehdi Mohammadi
…
(2016)
0
comments
Cited
839
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Fuzzy logic systems for engineering: a tutorial
J.M. Mendel
(1995)
0
comments
Cited
163
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Fuzzy logic, neural networks, and soft computing
Lotfi A. Zadeh
(1994)
0
comments
Cited
120
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2018
Publication date (Online):
July 05 2017
Pages
: 87-97
DOI:
10.1007/978-3-319-61542-4_8
SO-VID:
6f50ee15-d826-481a-aa72-0bd650a79cb7
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Ubiquitous and Pervasive Computing for Real-Time Energy Management and Saving
pp. 16
Performance Evaluation of Intelligent Hybrid Systems for Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-PSOHC and WMN-PSOSA
pp. 27
Design of a Smart Desk for an IoT Testbed: Improving Learning Efficiency and System Security
pp. 36
Performance Evaluation of a Deep Q-Network Based Simulation System for Actor Node Mobility Control in Wireless Sensor and Actor Networks Considering Different Distributions of Events
pp. 50
Performance Analysis of WMNs by WMN-GA Simulation System for Different WMN Architectures and TCP Congestion-Avoidance Algorithms Considering Exponential and Weibull Distributions
pp. 63
Proposal of Traffic Accident Prevention System with Chronological Variations of Wireless Signals and Sensors on Mobile Nodes
pp. 73
Implementation of a WLAN Triage Testbed Using Fuzzy Logic: Evaluation for Different Number of Clients
pp. 87
A Fuzzy-Based Testbed for Wireless Sensor and Actuator Networks: Performance Evaluation for Different Remaining Energy of Actuators
pp. 98
Simple Energy-Aware Algorithms to Selecting a Server for Storage and Computation Processes in a Cluster
pp. 110
An Energy-Saving Unicast Routing Protocol in Wireless Ad-hoc Network
pp. 121
Performance Evaluation of Clustering and Collaborative Filtering Algorithms for Resource Scheduling in a Public Cloud Environment
pp. 135
BioGraphBot: A Conversational Assistant for Bioinformatics Graph Databases
pp. 147
Utilizing Augmented Reality and Wearables in Industrial Applications
pp. 156
Security Assessment of the Image-Based Authentication Using Screen-Capture Tools
pp. 162
Monitoring of Power Transmission Lines Through Wireless Sensor Networks in Smart Grid
pp. 171
User Comfort Oriented Residential Power Scheduling in Smart Homes
pp. 181
Two Hop Adaptive Routing Protocol for Underwater Wireless Sensor Networks
pp. 190
User Satisfaction Based Home Energy Management System for Smart Cities
pp. 200
Fuzzy Energy Management Controller for Smart Homes
pp. 208
Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge Graph
pp. 219
Converging Human Knowledge for Opinion Mining
pp. 231
Accuracy Is Not Enough: Serendipity Should Be Considered More
pp. 242
Movie Recommendation Based on Visual Features of Trailers
pp. 254
A Study on the Motion Recognition of Basketball Players Based on Unit Gesture Decomposition
pp. 266
Indoor Navigation System Based on Augmented Reality Markers
pp. 275
Study on Android Native Layer Code Protection Based on Improved O-LLVM
pp. 286
A Two-Tiered Defence of Techniques to Prevent SQL Injection Attacks
pp. 296
The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse
pp. 310
An Anonymous Access Authentication Scheme for VANETs Based on ISGS
pp. 321
EE-CFI: Externalized Control Flow Integrity for Embedded Devices
pp. 330
An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network
pp. 342
Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms
pp. 354
Application of Improved Software Phase-Locked-Loop in DSTATCOM
pp. 364
Digital Harmonic Detection with Rapid Response and High Steady Precision
pp. 374
A Prospect of Interdisciplinary Methodology of QoE Assessment
pp. 385
A Macro-Assisted Cooperative Edge Caching in Heterogeneous Mobile Networks
pp. 395
Security of Selected Secret Sharing Schemes
pp. 401
Supporting Hypothesis Generation by Machine Learning in Smart Health
pp. 413
A Novel and Practical Pseudonym Change Scheme in VANETs
pp. 423
An Efficient Provably Secure Password-Based Authenticated Key Agreement
pp. 435
Proposal and Implementation of a Countermeasure Against Event Tracking on the Web
pp. 445
Self-aware Access Control System for Android
pp. 455
Counterfeit Detection by Smartphone Using Double-Encoded Two-Dimensional Code
pp. 467
Suspicious User Detection Based on File Server Usage Features
pp. 473
Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan
pp. 483
An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project
pp. 493
Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station
pp. 502
MIH-Based Congestion Control with Seamless Handover in Untrusted Networks
pp. 513
Integration of Ubiquitous Specifications in the Lifecycle of Design Object Oriented
pp. 520
Cuckoo Search Optimization Technique for Multi-objective Home Energy Management
pp. 530
The Application of Heuristic Neural Network in Speed Estimation of Asynchronous Motor
pp. 539
Performance of Power Allocation of Relay Stations for Cognitive Radio Based Cooperative Communication Systems
pp. 547
Enabling D2D Transmission Mode in Cellular Networks: Instantaneous Rate Consideration
pp. 554
Performance Analysis of Wireless Powered Cognitive Radio Networks
pp. 563
A New Collaborative Knowledge Integration Scheme
pp. 573
Effect of Polling Interval Distributions on the Performance of MAC Protocols in Wireless Sensor Networks
pp. 580
Lightweight Authentication for Distributed Mobile P2P Communications
pp. 590
A Search for Computationally Efficient Supervised Learning Algorithms of Anomalous Traffic
pp. 601
Ontology Development for Dynamic Service Composition in Cyber-Physical Systems (CPSs)
pp. 611
Cross-Recommendation Depending on Commonly Shared Users’ Preferences in IoT Environment
pp. 620
Power Beacon-Assisted Relaying Scheme for Cellular Networks: System Model and Performance Analysis
pp. 629
On the Outage Probability of Device-to-Device Communication Enabled NOMA
pp. 636
Performance Analysis of Device-To-Device Communication Using AF Relaying Under Impact of Co-channel Interferences
pp. 647
Approaching to Mobile 5G Communications
pp. 657
Terrorists Spatio-Temporal Analysis Based on Social Network Tools
pp. 666
Reliable Homomorphic Matrix Disguising Scheme
pp. 676
Contention Window Prioritization for Heterogeneous Traffic in Wireless Sensor Networks
pp. 686
An Optimal Algorithm for Multiscale Segmentation of High Resolution Remote Sensing Image Based on Spectral Clustering
pp. 699
Moving Average Timing Strategy from a Volatility Perspective: Evidence of the Taiwan Stock Market
pp. 708
The Impact of Golden Cross and Death Cross Frequency on Stock Returns in Pre- and Post-financial Crisis
pp. 714
Managers’ Bargaining Power and the Intrinsic Value
pp. 720
Investigation into the Relationships Among Sponsorship, Identification and Purchase Intention
pp. 730
The Effects of CSR Announcement on Long-Life Business
pp. 735
Serious Leisure and Flow Experience of Teenagers - A Case Study on the Activities of Orchestra
pp. 741
The Impact of Government Shareholding on Firm Performance: A Corporate Governance Perspective
pp. 751
The Impact of Corporate Social Responsibility and Organization Identification on Employee Engagement
pp. 759
A Study of Impact of Social Welfare from Public-Private-Partnerships: A Case of Taipei City Youbike
pp. 771
The Influence of Senior Supervisors’ Professional Degree and Their Job Changes and Part-Time Duties on Corporate Performance
pp. 781
Causal Relationship Between Research and Development Input, Research and Development Output, and Corporate Value
pp. 788
A Study on the Influencing Factors of Consumers Repeat Purchasing Intention in International Travel Fair
pp. 795
Examining the Relationships Among Electronic Word of Mouth, Perceived Value and Risk, and Consumer Purchase Intention
pp. 802
The Influence of Internationalization on Value Drivers: Song Ho Industrial Corporation, Ltd. vs. Chih Lien Industrial Corporation, Ltd.
pp. 812
A Comparative Study of Valuation and Value Drivers in the Textile Industry: Kwang Ming Silk Mill Co., Ltd. vs. Eclat Textile Co., Ltd.
pp. 821
Study of Social Loafing and Employee Creativity
pp. 831
Customer Satisfaction and Quality of Service Towards Public Servants in a Governmental Education Training Center in Taiwan
pp. 841
The Effect of Flipped Classroom on Self-efficacy and Satisfaction of Computer Auditing
pp. 849
Moving Smartphones to Send Emergency Messages During Assaults
pp. 860
Low-Level Service Management in Cyber-Physical Systems
pp. 873
Flexible Service Provision in Context-Aware Cyber-Physical Systems
pp. 884
NOSE: A NOmadic Scalable Ecosystem for Pervasive Sensing, Computing and Communication
pp. 894
Geo-Based Content Sharing for Disaster Relief Applications
pp. 904
Towards the Development of a Smart Tourism Application Based on Smart POI and Recommendation Algorithms: Ceutí as a Study Case
pp. 917
Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts
pp. 929
Software Abnormal Behavior Detection Based on Hidden Markov Model
pp. 941
RTF Editor XSS Fuzz Framework
pp. 952
Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers
pp. 959
A Context-Aware Smart Office Application System
pp. 967
A Novel Algorithm for Feature Selection Used in Intrusion Detection
Similar content
1,207
Unified IoT ontology to enable interoperability and federation of testbeds
Authors:
Rachit Agarwal
,
David Gomez Fernandez
,
Tarek Elsaleh
…
Pacific Northwest GridWise? Testbed Demonstration Projects; Part II. Grid Friendly? Appliance Project
Authors:
Donald J. Hammerstrom
,
Jerry Brous
,
David Chassin
…
A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges
Authors:
Tao Huang
,
F. Richard Yu
,
Chen Zhang
…
See all similar