Leonard Barolli

Leonard Barolli
Fukuoka Institute of Technology · Department of Information and Communication Engineering

We held 5 events for 8 International Conferences: AINA, EIDWT, CISIS, IMIS, NBiS, INCoS, BWCCA and 3PGCIC.

About

1,523
Publications
106,936
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,171
Citations

Publications

Publications (1,523)
Conference Paper
The development of low-cost aircraft surveillance systems based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology has gained considerable interest, leading to many applications. Our interest is particularly in harnessing these data for developing flight prediction models and their applications considering the information in ADS-B sig...
Conference Paper
In the manufacturing field, the soldering process of brazing electronic components into circuit boards and the milling process of using cutting tools to remove unnecessary parts from materials are part of the manual labor process. To ensure worker safety and improve product quality in the many tasks performed by humans, studies are promoting the co...
Conference Paper
In this paper, we present a comparison study of Linearly Decreasing Inertia Weight Method (LDIWM) and Fast Convergence Rational Decrement of Vmax Method (FC-RDVM) for optimization of mesh routers in Wireless Mesh Networks (WMNs). We consider UNDX-m crossover method and Stadium distribution of mesh clients. Then, we perform simulations for small and...
Conference Paper
There are various water reservoir tanks such as septic tanks, industrial cisterns, agricultural cisterns and fire protection cisterns. Generally, they are installed outdoors and water levels vary depending on weather conditions. By monitoring water level in water reservoir tanks, the flooding can be predicted and flood damage can be mitigated. The...
Conference Paper
In the manufacturing industry, automation is crucial for increasing the efficiency of production processes. The robot-based automation is being used in all tasks required in the factory such as transport, processing, inspection and testing. Robot vision, in which a camera is mounted on a robot arm, is actively used in automated inspection. However,...
Conference Paper
In recent years, there are designed and developed various robots which can collaborate with a wide range of devices to assist humans. Also, industrial robots have many applications in factory operations. Moreover, robots such as vacuum cleaners, security bots, therapy robots, and wheelchair robots offer valuable assistance in various human tasks. T...
Conference Paper
A Wireless Visual Sensor Network (WVSN) has a mesh mechanism and performs multi-hop communication between multiple sensor nodes equipped with visual sensors. They can be used to monitor infrastructure facilities and rivers. However, the placement of sensor nodes has a significant impact on wireless communication connectivity and transmission loss....
Conference Paper
The Direct Injection (DI) is used by electric bass guitar players during live house performances and recordings. A DI is an impedance converter for connecting an instrument such as an electric guitar, electric bass guitar, or electronic keyboard directly to a mixer or interface. When an electric bass guitars output is connected to a DI, the mixer o...
Conference Paper
Deer repelling sound is affected by the attenuation of reflected sound due to terrain undulations and air absorption. Therefore, sound wave propagation analysis can be used to decide the location of devices. This paper deals with the optimization of deer repellent device placement using the mountaineering and acoustic ray tracking methods. A Digita...
Conference Paper
In this paper, we propose an accident detection system for private lavatories (toilets) using fuzzy control and thermal camera. In the proposed system, fuzzy control input values are obtained from a low-resolution thermal camera and the output value is used for detecting the accidents or falls of persons. The proposed Fuzzy-based system uses simpli...
Conference Paper
In general, the accidents are often attributed to the decline of driving skills and reduced attention among the aging population. Moreover, the rise of infotainment features in vehicles has led to loss of concentration while driving. To address this issue, we previously developed an intelligent driver assistance system to identify instances of dist...
Conference Paper
In recent years, floods caused by overflowing rivers due to heavy rains have caused significant damages. To prevent human casualties in the event of a disaster, it is necessary to provide appropriate information for prompt evacuation. However, in general the municipalities that provide evacuation information use low computational resource computers...
Conference Paper
Unmanned Aerial Vehicles (UAVs) are utilized in various fields such as aerial shots, transportation, spraying chemicals in agriculture and surveys of plant growth in forestry. In particular, aerial photography by drones is used for 3D surveying. Compared to surveying from the ground, 3D surveying with a drone provides more accurate surveying and a...
Conference Paper
Wireless Mesh Networks (WMNs) are a technology that is not only cost-effective but also easily deployable and has a high level of robustness. But, WMNs have several issues related with wireless communication. By optimizing the location of mesh routers is possible to deal with these issues. However, the node placement problem is an NP-hard problem....
Conference Paper
This paper introduces an innovative system that uses Fuzzy Logic (FL) to detect recognition errors in Vehicular Ad Hoc Networks (VANETs). The system considers various input parameters to assess recognition errors in VANETs. In our previous work, we considered three parameters: Internal and External Distraction, Driver’s Inattention, and Inadequate...
Conference Paper
The propulsion system in multirotor Unmanned Aerial Vehicle (UAV) affects the flight speed, operating time and payload of UAVs. The propulsion system consists of a motor, propeller, electronic speed controller, power distribution board and battery. When implementing a multirotor UAV, the selection of components is very important in order to achieve...
Conference Paper
Pointing and calling is a method for ensuring safety during working by pointing at work objects or tools and verbally calling and telling the situation in order to predict accidents and raise safety awareness. Therefore, pointing and calling are implemented at production sites to reduce human error and prevent accidents. This method can be used for...
Conference Paper
The human-to-human and human-to-devices communications are becoming increasingly intricate and unpredictable, which complicate the decision-making in different scenarios. So, many researcher are developing methods for assessing the trustworthiness of these kinds of communications. The Logical Trust (LT) is one crucial concept in trust computing tha...
Conference Paper
Recently, there are developed and implemented diverse robots that collaborate with various devices to assist humans. Also, the industrial robots have many applications in factory operations. Additionally, robots like vacuum cleaners, security robots, therapy robots, and wheelchair robots can assist humans in various tasks. Therefore, the utilizatio...
Conference Paper
The 5th Generation (5G) wireless networks mark the transition towards Ultra-Dense Heterogeneous Networks (UDHetNets), characterized by densely packed network and a diverse range of networks serving user devices. This evolution brings the challenge of efficiently connecting to optimal Radio Access Technology (RAT). This is a complicated task because...
Conference Paper
In this research work, we present a simulation system called WMN-PSOHCDGA for optimization of node placement in Wireless Mesh Networks (WMNs). We implement BLX-\(\alpha \) crossover method in our simulation system and carry out simulations for different instances (scales) of WMNs considering Fast Convergence Rational Decrement of Vmax Method (FC-RD...
Conference Paper
The transition to the 5th Generation (5G) mobile networks will rely on Ultra-Dense Heterogeneous Networks (UDHetNets). These networks introduce dense packed network configurations along with a diverse range of networks catering to user devices. The crucial challenge lies in establishing efficiently connections with an appropriate Radio Access Techn...
Conference Paper
In Japan, pointing and calling are carried out to improve the safety, reduce human errors and prevent accidents. Via pointing and calling concept the safety is improved by pointing to the work object or tool and voicing the situation in order to predict the accidents during the work. In factories, soldering is part of the handicraft industry and on...
Conference Paper
In general, accidents involving school buses and parents leaving their infants in the car due to a lack of attention are increasing. Also, in-vehicle inspections are being neglected. In this paper, we focus on this problem and propose an AI-based support system for detecting left-behind children in vehicles. In the proposed system, we use YOLO whic...
Conference Paper
In this research work, we assess the performance of FC-RDVM router replacement method for small and middle scale WMNs considering Subway distribution of mesh clients. We carry out a comparison study of UNDX-m and SPX crossover methods. The simulation results indicate that for UNDX-m and SPX methods and both scales of WMNs, all mesh routers are conn...
Conference Paper
The Public Address (PA) system engineer performs mixing and adjust the sound in order that the live performance is comfortable for the performers and the audience. However, there are many cases where only one PA engineer is assigned and the burden of the PA engineer is very serious in the case of small live music clubs. Therefore, it is required to...
Conference Paper
In P2P systems, especially in mobile P2P, it is necessary to consider the mobility tolerance of nodes and the instability of the network. The goal of this research is to develop a system for selecting reliable and best peers in a P2P communication environment. Previous research has focused on improving the reliability of peers and evaluating the re...
Article
In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based Sys...
Chapter
Wireless Mesh Networks (WMNs) have become popular and they have many advantages. However, they have inherent wireless communication issues. To solve the problem, optimization of locations of mesh routers is a good approach. But optimizing the locations of mesh routers is an NP-hard problem. In this research work, we present an intelligent simulatio...
Chapter
Wireless Visual Sensor Networks (WVSNs) have a mesh mechanism, which enables a wide area imaging and image collection is done through multi-hop communication between multiple sensor nodes equipped with visual sensors. Therefore, they can be used for monitoring infrastructure facilities and rivers. However, the placement of sensor nodes has a signif...
Chapter
In this paper, we present WMN-PSOHCDGA simulation system and implement two router replacement methods: RIWM and FC-RDVM for Wireless Mesh Networks (WMNs). We consider Stadium distribution of mesh clients and UNDX-m crossover method, and carry out a comparison study for small scale and middle scale WMNs. The simulation results indicate that for smal...
Chapter
This paper introduces a novel system for recognition error detection in Vehicular Ad Hoc Networks (VANETs) using Fuzzy Logic (FL). The proposed system leverages a comprehensive set of input parameters, including Internal and External Distraction, Driver’s Inattention, and Inadequate Surveillance, to effectively evaluate and mitigate potential error...
Chapter
Recently, many kinds of robots are developed and they collaborate with various things to help humans. Over the past few decades, industrial robots have been used in factory operations. Also, these robots such as vacuum cleaner robot, security robot, therapy robot and wheelchair robot can support humans for many operations. Thus, using robots and re...
Chapter
In this paper, we present the performance of multiple Unmanned Aerial Vehicles (UAVs) and Vehicle-to-Vehicle (V2V) communication in an urban environment. We employ the Epidemic protocol as the communication method to evaluate the dissemination of bundle messages by multiple UAVs and regular vehicles. We consider the urban grid and Tenjin area in Fu...
Chapter
Recently, the human-to-human and human-to-things connections are becoming significantly more complicated and less trustworthy in decision-making for diverse scenarios. As a result, the trust computing is getting interest from many study domains. The Logical Trust is one of the trust concepts. In this paper, we consider three parameters (Belief (Be)...
Article
In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of these router rep...
Article
Full-text available
Vehicular Ad Hoc Networks (VANETs) have gained significant attention due to their potential to enhance road safety, traffic efficiency, and passenger comfort through vehicle-to-vehicle and vehicle-to-infrastructure communication. However, VANETs face resource management challenges due to the dynamic and resource constrained nature of vehicular envi...
Chapter
In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented four mesh router replacement methods: CM, RIWM, LDIWM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of four router replacement met...
Chapter
In Japan, inland flooding caused by heavy rainfall and overflowing rivers is a serious problem. The inland flooding can cause many damages to people’s lives and property. Also, the evacuation is very difficult. Therefore, it is necessary to identify areas where it may occur and take evacuation action. In order to estimate the inland flooding are ne...
Chapter
The 5-th Generation (5G) heterogeneous networks are expected to provide various applications and wide area networks to fulfill user requirements. They consist of many types of Radio Access Technologies (RATs) and the selection of a RAT should consider many parameters, which makes the selection decision an NP-hard problem. One of critical parameter...
Chapter
In this paper, we consider three intelligent algorithms: Particle Swarm Optimization (PSO), Hill Climbing (HC) and Distributed Genetic Algorithm (DGA), and implement a new hybrid intelligent system for Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. For distribution of mesh clients, we consider Subway distribution and we carry out simulations fo...
Chapter
In this paper, we present the performance of a Dynamic Threshold-based Anti-packet Generation (DTAG) method for Delay-/Disruption-/Disconnection-Tolerant Networking (DTN) considering a real road map scenario. We imported road data around Kagoshima central station, which is located in South Kyushu region in Japan. We considered the combination of DT...
Chapter
The primary reason for car accidents is caused by driver’s error. In this work, we consider some critical factors related to driver’s behavior that can lead to a car accident such as recognition error, decision error and performance error. We propose a fuzzy logic system to determine the Driver’s Error Value (DEV) for evaluating the driver’s decisi...
Chapter
A Wireless Mesh Network (WMN) is expected to be used for temporary networks during disasters and networks for IoT devices in factories since it can provide a stable wireless sensor network over a wide area. Since the placement of mesh routers has a significant impact on the overall WMN communication, a mesh router placement problem is defined to de...
Chapter
Trust is used as the foundation for decision-making in many situations. Therefore, the concept of trust is attracting attention in various research fields. Emotional trust is one of the essential aspects of the trust. In this paper, we propose a fuzzy-based system for assessment of emotional trust considering three parameters: Expectation (Ex), Wil...
Chapter
Recently, underwater communication technology has been developing in many ways. Because signals are affected by a number of circumstances, communication interruptions are the fundamental problem in underwater communication. In this paper, we introduce transporter nodes, which can move linearly along with a particular Horizontal (H) or Vertical (V)...
Chapter
In general, the accidents are caused by declining of driving skills and the lack of attention due to the increasing number of elderly people. With the expansion of infotainment functions, concentration while driving is also hindered. In this paper, we focus on this problem and propose a enhanced intelligent driving support system to detect distract...
Chapter
Unmanned Aerial Vehicles (UAVs) are utilized in various fields such as aerial shots, transportation, spraying chemicals in agriculture and surveys of plant growth in forestry. It is necessary to consider the ground effect when operating UAVs/AAVs. The lift coefficient changes and significantly affects the controllability when operating sharp turns...
Chapter
In this paper, we present WMN-PSOHCDGA hybrid simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs). We implemented FC-RDVM in WMN-PSOHCDGA. We consider Two Islands distribution of mesh clients and carry out a comparison study of FC-RDVM and RDVM router replacement methods for small scale and middle scale WMNs. Both me...
Chapter
With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. However, there are many issues in WMNs such as hidden terminal problem, guaranteeing network connectivity and coverage, which are closely...
Chapter
The 5-th Generation (5G) heterogeneous networks will offer dense network services and a wide range of networks to satisfy customers ’ demands in order to enable User Equipment (UE) to connect with the preferable Radio Access Technology (RAT). Selection of an appropriate RAT requires consideration of many variables, which makes the task HP-hard. In...
Chapter
The employment situation for people with developmental disabilities is different for different countries and types of disability. But in many cases, there are significant challenges in finding and keeping employment. For employment, it is essential to consider individual differences. Soldering work in factories is one of the options for persons wit...
Chapter
In this work, we deal with the node placement problem in Wireless Mesh Networks (WMNs). We present a hybrid intelligent simulation system called WMN-PSOHC, which combines Particle Swarm Optimization (PSO) and Hill Climbing (HC). We implement in WMN-PSOHC system the Fast Convergence Rational Decrement of Vmax Method (FC-RDVM) and Random Inertia Weig...
Chapter
The 5-th Generation (5G) heterogeneous networks are expected to provide dense network services and a plethora of different networks for fulfilling the user requirements. They are supposed to give User Equipment (UE) the ability to connect with the appropriate Radio Access Technology (RAT). However, many parameters should be considered for the selec...
Chapter
In SDN-VANETs, the processing capabilities of new generation vehicles offer not only processing and data repository resources for their own applications, but also they are able to share their available resources with other neighbors within their range of communication. In this work, we implement a testbed to assess the processing and storage capabi...
Chapter
In this paper, we propose a Dynamic Threshold-based Anti-packet Generation (DTAG) method, which considers replication progress of the adjacent nodes. We considered Epidemic and Spray and Wait (SpW) protocols and combined with the proposed DTAG method and conventional anti-packet. Thus, we implemented four scenarios by simulations. From the simulati...
Chapter
Different robots such as Automatic Guided Vehicles (AGVs) and Autonomous Mobile Robots (AMRs) need to know their position in a building in order to operate automatically and autonomously. They can receive the environmental data by Light Detection And Ranging (LiDAR) based on Simultaneous Localization and Mapping (SLAM) to perform autonomous control...
Chapter
There are different water reservoir tanks such as septic tanks, agricultural water storage tanks and fire protection tanks. The water level of a water reservoir tank in outdoor environment changes depending on weather conditions. In the case of heavy rains, the water level rises leading to flooding. Therefore, it is necessary to monitor the water r...
Chapter
In this paper, we present WMN-PSODGA hybrid simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs). We consider Chi-square distribution of mesh clients and compare the results of a Fast Convergence Rational Decrement of Vmax Method (FC-RDVM) with Linearly Decreacing Inertia Weight Method (LDIWM). The simulation results...
Chapter
The automation is a very important in manufacturing industry to improve the efficiency of production processes. Recently, there are some research works that consider the use of robot vision for inspection and early recognition of malfunctions and abnormalities in order to prevent many accidents. In this paper, we propose and implement an anomaly de...
Chapter
Wireless Mesh Networks (WMNs) enable large and stable networks to be built at low cost through wireless communication among multiple mesh routers. There are many methods, algorithms and systems to optimize the placement of mesh routers. In our previous work, we proposed Coverage Construction Method (CCM), CCM-based Hill Climbing (HC), and CCM-based...
Chapter
Recently, governments are promoting the employment of persons with disabilities, and employers must ensure safety in the workplace. On the other hand, a single manager has difficulty in preventing accidents and injuries caused by human error. In addition, in order to learn soldering techniques, persons with disabilities need to repeat the same proc...
Article
Opportunistic Delay Tolerant Networks also referred to as Opportunistic Networks (OppNets) are a subset of wireless networks having mobile nodes with discontinuous opportunistic connections. As such, developing a performant routing protocol in such an environment remains a challenge. Most research in the literature have shown that reinforcement lea...
Article
The Internet of Things (IoT) and 5G wireless networks have made it possible to connect intelligent devices with each other and to the Internet. Different kind of networks and applications are appearing and they support us in everyday life. The Wireless Mesh Networks (WMNs) have emerged as a good approach for edge computing and last miles networks....
Chapter
The Vehicle Routing Problem (VRP) is an optimization problem that satisfies various constraints and minimizes the total route cost by multiple vehicles. In this paper, we propose a transportation routing method based on \(A^{*}\) algorithm and Hill Climbing (HC) considering WLAN connected Swarm Robots (WSRs). In addition, we compare the simulation...
Chapter
Wireless Mesh Networks (WMNs) provide a stable network over a wide area by configuring the network like a mesh. In order to provide a lower cost and more stable network, various methods for optimizing the placement of mesh routers are being studied. In this paper, we propose a simulation system for mobility control of swarm drones based on DQN to p...
Chapter
Healthcare has always been of paramount importance in the world of scientific research, and the advent of Artificial Intelligence (AI) has contributed to enormous strides in the field of prevention. In particular, research has focused on developing Machine Learning (ML)-based approaches to provide accurate prediction mechanisms to prevent and minim...
Chapter
Vehicular Ad hoc Networks (VANETs) require advanced processing capability due to their need for complex big data analysis. Vehicular cloud computing approaches are considered good solutions for handling large scales of data. However, it is essential for time-sensitive applications that a continuous low-latency service is always provided. Therefore,...
Chapter
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost, and high robustness. However, designing a robust WMN at low cost requires the use of the least possible mesh routers but still interconnected and able to offer full coverage. Therefore, the placement of m...
Chapter
Wireless Mesh Networks (WMNs) are low-cost and have easy maintenance. However, WMNs have some problems such as node placement problem, security, transmission power and so on. In this work, we deal with node placement problem. In our previous work, we implemented a hybrid simulation system based on Particle Swarm Optimization (PSO) and Hill Climbing...
Chapter
Delay Tolerant Networks (DTNs) are characterized by the fact that there is no continuous path between the source and destination. The DTNs transmit messages using a store-carry-forward approach. However, storing, sending, and receiving messages are energy-consuming processes. Therefore, it is important to design an appropriate routing protocol in D...
Chapter
Handover in 5G wireless networks introduces new and complex challenges because a user not only changes between base stations or access technologies, but also between slices. Users should select the slices that satisfy their requirements or preferences. When making a handover decision to satisfy user requirements, the constraints on Network Slicing...

Network