the proceedings contain 93 papers. the topics discussed include: a data quality quantitative evaluation of marine policy based on PMC model;text guided road marking point cloud completion;EFSNet: a threat detection me...
ISBN:
(纸本)9798350388374
the proceedings contain 93 papers. the topics discussed include: a data quality quantitative evaluation of marine policy based on PMC model;text guided road marking point cloud completion;EFSNet: a threat detection method based on system event feature sequence;multi-test knowledge tracing prediction model based on learning cycle;MAGIC: memory advanced general index compression for learned indexes;microservices crowdsourcing platform for industrial control systems;IoT-based smart farming system with security powered by solar energy;MMLT: a novel multimodal lightweight convolutional transformer for fault diagnosis with imbalanced data in IoT;GPMBC-FZ: a query optimization method in distributed database;and energy and effective computing contract toward heterogeneity in terminal-edge-cloud computing network.
To solve the problems of limited computing resources and data privacy in the IoE scenario of 6G networks, this paper propose an efficient transmission and secure sharing architecture of sensing data based on federated...
详细信息
ISBN:
(纸本)9798350333398
To solve the problems of limited computing resources and data privacy in the IoE scenario of 6G networks, this paper propose an efficient transmission and secure sharing architecture of sensing data based on federated learning. the architecture considers an integrated sensing and communication (ISAC) approach, employs knowledge distillation techniques to compress and accelerate data processing models, and implements data communication technology based on airborne computing aggregation to reduce data transmission delays and improve the efficiency of data communication and computation among nodes. To address the challenge of data sharing for large-scale heterogeneous network nodes in the integrated scenario, this paper adopts a sample expansion technology of distributed remote sensing data based on WGAN-GP to address the issue of insufficient data, and considers blockchain encryption technology to protect data privacy, thus promoting progress in data privacy sharing under distributed ISAC conditions and facilitating the construction of the 6G communication network.
Now days, internet of things (IoTs) is the most promising area of research, for the problems, in order to create distributed and innovative solutions. An IoT connects large amount of heterogeneous devices in the netwo...
详细信息
Withthe development of new technologies such as big data, cloud computing, internet of things, mobile internet, and artificial intelligence, the connotation of integrated energy services continues to expand. Integrat...
详细信息
through providing cheap rack and network hosting services, third-party internet data centers (IDCs) have gained significant popularity among cloud service providers. Real-time monitoring of the quality of the IDC netw...
详细信息
ISBN:
(纸本)9798350386066;9798350386059
through providing cheap rack and network hosting services, third-party internet data centers (IDCs) have gained significant popularity among cloud service providers. Real-time monitoring of the quality of the IDC network and proactively alarming is crucial to guaranteeing the reliability of cloud services. the prevailing approach to addressing this problem involves utilizing active probes and making evaluations based on the results of single-link or multi-link probing. However, the existing efforts still tend to generate a significant number of unnecessary alerts, resulting in enormous operational costs. For this reason, we first build a large-scale distributed ping-based dial test system that enables monitoring the quality of the IDC network in a many-to-one probe mode. We develop an efficient exporter tool based on the standard Prometheus' data interface to ensure real-time and precise measurement data collection. To quickly and accurately detect potential network issues, we also design a multi-step heuristic-based fault detection and alarm method. Furthermore, we propose a comprehensive alarm life-cycle model based on the results of multi-link probing to guide alarm management in production practice. this system has been successfully deployed in the production environment of Sangfor company's managed cloud for over a year, enabling proactive diagnosis of hundreds of IDC gateway IP addresses. the actual statistical results indicate a significant improvement in the mean time to repair (MTTR) for IDC network failures, reducing it from a few hours to just a few minutes. the average daily number of alarms generated by this system is less than 15, decreasing approximately 85% compared to before. the alarm accuracy exceeds 95% and the false negative rate is less than 2%.
Today, gas leakage has become a common problem in both industrial and household sectors as it can cause explosions, fires, and toxic exposures. the real time gas alert system ensures that gas leaks are not only detect...
详细信息
the field of internet of things (IoT) has experienced rapid growth, but it has also introduced significant security and privacy challenges. In particular, the authentication and authorization of edge devices pose majo...
详细信息
Currently, increasing attention is being devoted to the optimization of routing schemes in the field of distributed data collection, as effective data collection relies on efficient data transmission and routing. the ...
详细信息
ISBN:
(纸本)9798400717857
Currently, increasing attention is being devoted to the optimization of routing schemes in the field of distributed data collection, as effective data collection relies on efficient data transmission and routing. the crucial role in data transmission is played by routing schemes, while their practical application is constrained by issues such as energy limitations of sensor nodes and security concerns in data transmission. Comparatively popular planar-based and hierarchical-based routing schemes in this field have been investigated over the past five years in this study, objectively evaluating the performance of widely used routing schemes, examining the advantages and disadvantages of current routing scheme improvements, and proposing future research directions. the practical application of routing schemes in this field will be advanced by our work.
SDN is gaining popularity for a few years now. there has been a massive increase in the adoption of SDN, especially withthe rise in demand for IoT, and 5G networks which have led to a lot of research in this area. As...
详细信息
In the industrial sector, we are currently witnessing the advent of the fourth industrial revolution, commonly known as the Industrial internet of things (IIoT). this cutting-edge digital technology relies heavily on ...
详细信息
ISBN:
(纸本)9783031718472;9783031718489
In the industrial sector, we are currently witnessing the advent of the fourth industrial revolution, commonly known as the Industrial internet of things (IIoT). this cutting-edge digital technology relies heavily on connectivity, real-time processing, machine-to-machine communication, and machine learning. In this context, the imperatives of reliability, flexibility, mobility, and cost-effectiveness have led to a strong push towards Low-power and Lossy Networks (LLN) solutions for industrial systems. IP multicast presents a solution for a multitude of IIoT applications, ranging from over-the-air programming and information sharing to device configuration and resource discovery. It achieves this by enabling the transmission of packets from a single source to multiple destinations, thereby conserving resources such as bandwidth, energy, and time. the IPv6 over IEEE 802.15.4 TSCH (6TiSCH), as implemented, does not handle multicast traffic. To meet their needs, this document aims to propose an approach for implementing multicast in 6TiSCH networks via unicast without affecting MAC layer protocols. A series of extensive simulations were conducted to evaluate the performance of the multicast protocols under scrutiny. the obtained results not only affirm the viability of our proposed approach for implementing multicasting in 6TiSCH networks but also highlight the superior performance of ESMRF and BMFA when compared to MPL in terms of resource consumption and end-to-end delays. they also demonstrate the reliability of MPL.
暂无评论