The proceedings contain 48 papers. The special focus in this conference is on cloudcomputing and Security. The topics include: Coverless text information hiding method using the frequent words distance;Improved STDM ...
ISBN:
(纸本)9783319685410
The proceedings contain 48 papers. The special focus in this conference is on cloudcomputing and Security. The topics include: Coverless text information hiding method using the frequent words distance;Improved STDM watermarking using semantic information-based JND model;the categories of quantum information hiding protocol;coverless information hiding technology research based on news aggregation;SIEM based on big data analysis;Workload-Aware VM consolidation in cloud based on max-min ant system;parallel service selection method based on adaptive cloud model for mobile application;a Hybrid Artificial Bee Colony Algorithm to Solve Multi-objective Hybrid Flowshop in cloudcomputing Systems;a group-based replica consistency schema for cloud storage;A New Universal Quantum Gates and Its Simulation on GPGPU;a multi-objective optimization scheduling method based on the improved differential evolution algorithm in cloudcomputing;a network calculus analysis for the baseband processing capacity in cloud radio access network;Live migration among cloudbased on MOOSE address;achieving proof of shared ownership for the shared file in collaborative cloudapplications;design and test of the intelligent rubber tapping technology evaluation equipment based on cloud model;an affective computing and fuzzy logic framework to recognize affect for cloud-based e-learning environment using emoticons;cloud management systems and virtual desktop infrastructure load balancing algorithms -A survey;design and deployment of wireless sensor networks for flood detection in Indonesia;an android app recommendation approach by merging network traffic cost;A virtual grid-based routing protocol for mobile sink-based WSNs;data hiding-based video error concealment method using compressed sensing.
The proceedings contain 71 papers. The special focus in this conference is on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems. The topics include: Developing of emerging internet applicati...
ISBN:
(纸本)9783319673790
The proceedings contain 71 papers. The special focus in this conference is on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems. The topics include: Developing of emerging internet applications for home healthcare;digital business model and SMART economy sectoral development trajectories substantiation;ontology matching for socio-cyberphysical systems;battery monitoring within industry 4.0 landscape;opportunistic data collection for IoT-based indoor air quality monitoring;the IoT identification procedure based on the degraded flash memory sector;cloudcomputing solution for investment efficiency measurement in biomedicine;time series distributed analysis in IoT with ETL and data mining technologies;exploring SDN to deploy flexibl sampling-based network monitoring;VNF orchestration and modeling with ETSI MANO compliant frameworks;performance evaluation of openflow enabled commodity and raspberry pi wireless routers;design issues of information and communication systems for new generation industrial enterprises;supporting data communications in IoT-enabled waste management;fiber-optic transmission system for the testing of active phased antenna arrays in an anechoic chamber;advanced materials for fiber communication systems;dynamic data packaging protocol for real-time medical applications of nanonetworks;nano communication device with an embedded molecular film: electromagnetic signals integration with dynamic;a formal definition for nanorobots and nanonetworks;digital watermarking method based on image compression algorithms;virtual telecommunication enterprises and their risk assessment.
Because of the rapid progress in image acquisition technologies, 3D images become increasingly popular in magnetic resonance imaging (MRI) and other applications. 3D image registration attracts more and more interesti...
详细信息
ISBN:
(纸本)9781538608401
Because of the rapid progress in image acquisition technologies, 3D images become increasingly popular in magnetic resonance imaging (MRI) and other applications. 3D image registration attracts more and more interesting researches. However, most existing image registration methods are based on 2D image processing. But, the structure of a typical 3D image is substantially more complicated than that of a typical 2D image. So, 3D image registration could be more challenging. Moreover, it is also a key challenge to choose good features because different applications should use different features accordingly. In this paper, we develop a 3D rigid image registration method which registers the 3D images using direct image intensity without any feature. It is shown that this method works well in various cases and greatly reduces the processed data size which makes it attractive for 3D image applications since 3D images often have a big data sizes and the reduction of size could significantly benefit follow-up processing for efficient computation.
The book is a compilation of high-quality scientific papers presented at the 3rdinternationalconference on Computer & Communication technologies (IC3T 2016). The individual papers address cutting-edge technologi...
ISBN:
(数字)9789811032264
ISBN:
(纸本)9789811032257
The book is a compilation of high-quality scientific papers presented at the 3rdinternationalconference on Computer & Communication technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.
The book is a compilation of high-quality scientific papers presented at the 3rdinternationalconference on Computer & Communication technologies (IC3T 2016). The individual papers address cutting-edge technologi...
ISBN:
(纸本)9789811032226
The book is a compilation of high-quality scientific papers presented at the 3rdinternationalconference on Computer & Communication technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.
As information technologies develop, 3D model retrieval is paid more and more attentions by researchers. But the limitations of image features poses a great challenge to view-based 3D model retrieval. In this paper, a...
详细信息
ISBN:
(纸本)9783319685427;9783319685410
As information technologies develop, 3D model retrieval is paid more and more attentions by researchers. But the limitations of image features poses a great challenge to view-based 3D model retrieval. In this paper, a novel 3D model retrieval method based on distance learning is introduced. The objective function with respective to two latent variables was formulated especially. The variables are the clique information in the original graph and the pairwise clique correspondence constrained by the one-to-one matching. The proposed method has the following benefits: (1) the local and global attributes of a graph with the designed structure can be preserved;(2) redundant and noisy information can be eliminated by strengthening inliers and suppressing outliers;and (3) the difficulty of defining high-order attributes and solving hyper-graph matching can be avoided. By extensive experiments on ETH, NTU60 and MV-RED datasets with Zernike moments, Histograms of Oriented Gradients (HoG) and convolutional neural networks (CNN) features, the effectiveness of the proposed method could be tested.
The paper discusses the properties of the partial fractional integrals, the partial fractional derivatives, and the composite fractional integrals and derivatives. Some basic formulas are derived;and the relations bet...
详细信息
The proceedings contain 112 papers. The special focus in this conference is on Pioneer Computer Scientists, Engineers, and Educators. The topics include: A fine-grained emotion analysis method for chinese microblog;re...
ISBN:
(纸本)9789811063848
The proceedings contain 112 papers. The special focus in this conference is on Pioneer Computer Scientists, Engineers, and Educators. The topics include: A fine-grained emotion analysis method for chinese microblog;research of detection algorithm for time series abnormal subsequence;an improved SVM based wind turbine multi-fault detection method;GPU based hash segmentation index for fast t-overlap query;research on pattern matching method of multivariate hydrological time series;desktop data driven approach to personalize query recommendation;disease prediction based on transfer learning in individual healthcare;research on fuzzy matching query algorithm based on spatial multi-keyword;a new approach to dense spectrum analysis of infrasonic signals;research on XDR bill compression under big data technology;the scalability of volunteer computing for mapreduce big data applications;an improved FP-growth algorithm based on SOM partition;a novel recommendation service method based on cloud model and user personality;a cooperative abnormal behavior detection framework based on big data analytics;composite graph publication considering important data;hierarchical access control scheme of private data based on attribute encryption;template protection based on chaotic map for face recognition;a fast and secure transmission method based on optocoupler for mobile storage;elderly health care - security and privacy issue;secure multi-party comparison protocol and application;security analysis of secret image sharing;a real-time visualization defense framework for DDoS attack and an improved data packet capture method based on multicore platform.
According to The current situation of high demand for mobile applications, combined with the mainstream and the current development trend of mobile information technology, three kinds of mobile application development...
详细信息
A large amount and different types of mobile applications are being offered to end users via app markets. Existing mobile app markets generally recommend the most popular mobile apps to mobile users for purpose of fac...
详细信息
ISBN:
(纸本)9783319685052;9783319685045
A large amount and different types of mobile applications are being offered to end users via app markets. Existing mobile app markets generally recommend the most popular mobile apps to mobile users for purpose of facilitate the proper selection of mobile apps. However, these apps normally generate network traffic, which will consumes user mobile data plan and may even cause potential security issues. Therefore, more and more mobile users are hesitant or even reluctant to use the mobile apps that are recommended by the mobile app markets. To fill this crucial gap, we propose a mobile app recommendation approach which can provide app recommendations by considering both the app popularity and their traffic cost. To achieve this goal, we first estimate app network traffic score based on bipartite graph. Then, we propose a flexible approach based on Benefit-Cost analysis, which can recommend apps by maintaining a balance between the app popularity and the traffic cost concern. Finally, we evaluate our approach with extensive experiments on a large-scale data set collected from Google Play. The experimental results clearly validate the effectiveness and efficiency of our approach.
暂无评论