the proceedings contain 112 papers. the topics discussed include: federated learning assisted model for android malware detection using gannet optimization algorithm;a deep q-learning framework for enhanced QoE and en...
ISBN:
(纸本)9798350369441
the proceedings contain 112 papers. the topics discussed include: federated learning assisted model for android malware detection using gannet optimization algorithm;a deep q-learning framework for enhanced QoE and energy optimization in fog computing;traffic data augmentation using GANs for ITS;EdgeBoost: confidence boosting for resource constrained inference via selective offloading;FedLSF: federated local graph learning via specformers;an efficient approach for merging multidimensional blockchains in mobile IoT;predicting solar-harvested energy for resource-constrained IoT devices using machine learning;tremor detection in Parkinson’s disease from wearable data: a comparative study of centralized learning versus federated learning;DNA-inspired image encryption: leveraging chaos for enhanced security;and obscured wildfire flame detection by spatio-temporal analysis of smoke patterns using frame-wise transformers.
the proceedings contain 115 papers. the topics discussed include: detecting targeted interference in NB-IoT;fabric composition classification using hyper-spectral imaging;data market places: best practices, challenges...
ISBN:
(纸本)9798350346497
the proceedings contain 115 papers. the topics discussed include: detecting targeted interference in NB-IoT;fabric composition classification using hyper-spectral imaging;data market places: best practices, challenges, and advancements for embedded finance;exploring the impact of locations and activities in person-wise data mismatch in CSI-based HAR;A fault-tolerant distributed air-to-ground communication architecture for urban air mobility;EDICT: simulation of edge interactions across IoT-enhanced environments;insights from executing TinyML models on smartphones and microcontrollers;Acconotate: exploiting acoustic changes for automatic annotation of inertial data at the source;and autonomous driving through deep learning in video games: a visual-based perception and action approach.
the proceedings contain 20 papers. the special focus in this conference is on distributedcomputing and internettechnology. the topics include: Parameterized complexity of defensive and offensive alliances in graphs;...
ISBN:
(纸本)9783030656201
the proceedings contain 20 papers. the special focus in this conference is on distributedcomputing and internettechnology. the topics include: Parameterized complexity of defensive and offensive alliances in graphs;a reconstructive model for identifying the global spread in a pandemic;cost effective method for ransomware detection: An ensemble approach;exploring Alzheimer’s disease network using social network analysis;stroke prediction using machine learning in a distributed environment;Automated diagnosis of breast cancer with roi detection using YOLO and heuristics;an efficient approach for event prediction using collaborative distance score of communities;A distributed system for optimal scale feature extraction and semantic classification of large-scale airborne LiDAR point clouds;load balancing approach for a mapreduce job running on a heterogeneous hadoop cluster;Model development in the tool use: Explorative, consolidating and analytic steps for UML and OCL models;Study the significance of ML-ELM using combined pagerank and content-based feature selection;reLink: Open information extraction by linking phrases and its applications;energy-efficient scheduling of deadline-sensitive and budget-constrained workflows in the cloud;an efficient renewable energy-based scheduling algorithm for cloud computing;a revenue-based service management algorithm for vehicular cloud computing;interference reduction in directional wireless networks;automated deadlock detection for large java libraries;DNet: An efficient privacy-preserving distributed learning framework for healthcare systems.
internet of things (IoT) technology is increasingly prevalent across various sectors, including the military and healthcare. IoT devices play a pivotal role in collecting and analyzing crucial data while executing ass...
详细信息
Blockchain technology is a distributed ledger system designed to securely process and store data. Although it offers several advantages when the number of participants increased, bolckchain will suffer from significan...
详细信息
In order to improve the accuracy and real-time performance of remote monitoring and diagnosis of electrical equipment, a technical framework based on the internet of things is introduced into the power industry. the s...
详细信息
the proceedings contain 29 papers. the special focus in this conference is on distributedcomputing and internettechnology. the topics include: A Very Gentle Introduction to Multiparty Session Types;trust: Anthropomo...
ISBN:
(纸本)9783030369866
the proceedings contain 29 papers. the special focus in this conference is on distributedcomputing and internettechnology. the topics include: A Very Gentle Introduction to Multiparty Session Types;trust: Anthropomorphic Algorithmic;Prospero’s Books: A distributed Architecture for AI: Invited Extended Abstract;uniform Circle Formation by Swarm Robots Under Limited Visibility;Identifying Reduced Features Based on IG-threshold for DoS Attack Detection Using PART;transcript Management Using Blockchain Enabled Smart Contracts;healthChain: A Secure Scalable Health Care Data Management System Using Blockchain;distributed and Lazy Auditing of Outsourced Data;an Efficient and Novel Buyer and Seller’s distributed Ledger Based Protocol Using Smart Contracts;text Document Clustering Using Community Discovery Approach;word2vec’s distributed Word Representation for Hindi Word Sense Disambiguation;a distributed and Trusted Web of Formal Proofs;a Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid;online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms;a Hybrid Approach for Fake News Detection in Twitter Based on User Features and Graph Embedding;multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks;community Detection in Social Networks Using Deep Learning;bearing Fault Classification Using Wavelet Energy and Autoencoder;resource Scheduling for Tasks of a Workflow in Cloud Environment;design of a Scheduling Approach for Budget-Deadline Constrained Applications in Heterogeneous Clouds;secure Content-Based Image Retrieval Using Combined Features in Cloud;verifying Implicitly Quantified Modal Logic over Dynamic Networks of Processes;distributed Graph Analytics;preface.
We explore innovative voice-based authentication methods designed for high-stakes environments, distinguishing between knowledge-based authentication and voice-based authentication. Traditional methods, relying on pas...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
We explore innovative voice-based authentication methods designed for high-stakes environments, distinguishing between knowledge-based authentication and voice-based authentication. Traditional methods, relying on passwords, face limitations against advanced cyber threats. Voice-based authentication, utilizing distinct vocal traits, emerges as a secure and userfriendly alternative. the paper aims to contribute to securing critical infrastructures by introducing an efficient authentication solution tailored for mission-critical operations through a random forest algorithm. the study concludes with experimental results that demonstrate the effectiveness of the Random Forest technique in achieving high accuracy levels when parameter tuning is applied (0.85816) compared to not using parameter tuning (0.8564).
Starting from the analysis of music fans, through the analysis of the behavior characteristics of music users, this paper establishes a music user fans model, and then uses some basic data (such as users' online r...
详细信息
ISBN:
(纸本)9798350391961;9798350391954
Starting from the analysis of music fans, through the analysis of the behavior characteristics of music users, this paper establishes a music user fans model, and then uses some basic data (such as users' online records and base station information) for association matching to eliminate some interference factors. Especially withthe gradual maturity of big data and block chain technology, we can make full use of block chain technology to solve the problem Research on music fans, finally get the music user list, provide accurate data support for product innovation and marketing strategy.
the electrification of the transport sector is crucial to achieve the environmental goals. the application of internet of things (IoT) and Cloud computing can be part of the solution for improving efficiency and fault...
详细信息
ISBN:
(纸本)9798350396690
the electrification of the transport sector is crucial to achieve the environmental goals. the application of internet of things (IoT) and Cloud computing can be part of the solution for improving efficiency and fault detection, and increasing the driving range for electric vehicles. the growing data generation and new data analysis methods demand high computing power and data storage capabilities. By combining IoT devices with Cloud computing, the condition of a vehicle can be monitored in real time from anywhere in the world. In this paper, a new cloud architecture for the analysis of stationary and mobile measurements is presented. Additionally, a web application is developed for a detailed visualization and analysis of historical and real time data.
暂无评论