The proceedings contain 81 papers. The topics discussed include: research on distributedcomputing power scheduling based on ant path optimization;facial expression recognition in museum settings using an enhanced res...
ISBN:
(纸本)9798331530280
The proceedings contain 81 papers. The topics discussed include: research on distributedcomputing power scheduling based on ant path optimization;facial expression recognition in museum settings using an enhanced residual networks;LSD3K: a benchmark for smoke removal from laparoscopic surgery images;enhancing single image de-raining with a sparse spatial transformer;research on image recognition and intelligent management of accounting bills based on information technology;cloud-based flight test data management and application platform;design and simulation of biped robot based on ball screw;thinking about anti-drone strategies;RGembed: a knowledge graph embedding model integrating dual-prediction and graph attention networks;and improving the CodeGeeX model based on the relative convolutional multi-head attention method.
This paper explores the issue of secure distributed estimation in the presence of attacks. Due to the presence of attacks, compromised nodes send erroneous information to their neighboring nodes, leading to a decline ...
详细信息
The internet of Things (IoT) is a contemporary technology that enhances user experience and adds intelligence to objects. Numerous applications have already embraced the internet of Things. The internet of Things (IoT...
详细信息
Intelligent Transportation Systems (ITS) have been identified as a key application of the internet of Things (IoT). In order to reduce latency and bandwidth needs, edge computing offers a distributedcomputing archite...
详细信息
distributed systems based on the internet allow resources widely dispersed throughout the network to be utilized cooperatively and shared. This allows the end-user to obtain massive computational power to perform a co...
详细信息
Power internet of Things(PIot) has absorbed edge computingtechnology, reducing the computing pressure of cloud service centers and providing intelligent services for edge devices through edge server. Due to the compu...
详细信息
ISBN:
(纸本)9798400717048
Power internet of Things(PIot) has absorbed edge computingtechnology, reducing the computing pressure of cloud service centers and providing intelligent services for edge devices through edge server. Due to the computing resources constraints,unattended and widely distributed of end devices,attacks on edge devices and edge servers are becoming more ***-based encryption can provide a higher level of protection for the edge computing model and a more flexible operation relationship. In the current attribute-based encryption scheme, the attributes assigned by the cloud server to the edge device are not authenticated, which may lead to the situation that the assigned attributes are stolen. we propose an identity authentication scheme that can authenticate for attributes. The scheme realizes mutual authentication between edge devices and edge servers. It combines attributes and ID to authenticate, thereby avoiding the misuse of attributes. This scheme can provide higher security without affecting the efficiency.
In many fields, equipment control management systems are often used. The main purpose is to monitor and manage various types of equipment and software systems required for work, aiming to improve the efficiency and ma...
详细信息
In order to cope with the intermittency and uncertainty of photovoltaic power generation and improve the accuracy of short-term load forecasting, a distributed photovoltaic grid connected short-term nonlinear load for...
详细信息
The rapid development of computer technology, communication technology, network technology and sensor technology has led to the birth of the internet of Things (IoT). Applying IoT to the field of medical care has give...
详细信息
ISBN:
(纸本)9798400717048
The rapid development of computer technology, communication technology, network technology and sensor technology has led to the birth of the internet of Things (IoT). Applying IoT to the field of medical care has given rise to the internet of Medical Things (IoMT). With IoMT, it is feasible to provide a new home health care model for the elderly and those who do not have convenient access to hospitals for medical services. In this paper, an IoMT-based framework with five layers is designed to provide adequate healthcare services to the elderly people. Wireless body area networks (WBANs) are adopted to address the long-term continuous monitoring issue. Deep learning and federated learning are used to process the collected data to obtain knowledge and models. 5G is employed to transmit the emergent data and models quickly. Cloud computing, edge computing and fog computing are collaboratively used to design an architecture for federal learning process. By integrating all the techniques, the framework can provide an adequate computing platform for the healthcare work of the elderly people.
Today, many important internet services are provided on cloud computing platforms. The ever-increasing expansion of services and user requirements has necessitated the optimal use of resources. Therefore, several algo...
详细信息
暂无评论