Research on semantic communication has advanced because of deep learning in the construction for collaborative (joint) resource-channel coding (JSCC) project. Deep learning technology (DL)-based JSCC systems currently...
详细信息
The proceedings contain 13 papers. The special focus in this conference is on information, Communication and computingtechnology. The topics include: Analysing the Role of Post Click Factors in Generating Leads Throu...
ISBN:
(纸本)9783031724824
The proceedings contain 13 papers. The special focus in this conference is on information, Communication and computingtechnology. The topics include: Analysing the Role of Post Click Factors in Generating Leads Through Search Advertising;mCLIP: Multimodal Approach to Classify Memes;Enhancing Marine Litter Management in the Gulf of Aqaba Through AI;solving the Rush Hour Puzzle Problem by Different Heuristics;advancing Precision Agriculture: Machine Learning-Based Crop Recommendation for Optimal Yield;Low-Cost Biodegradable Composite-Shaped Split Ring Resonator (SRR) Based Sensor for Breast Cancer Assessment;XR-Menu: Food Ordering System in Extended Reality Application;Predicting Crime Hot Spots Using Machine Learning Algorithms: Cities in USA and South Africa;Experience with the Implementation of Machine Learning on ESP32-Based Edge Devices;Stock Open Price Prediction of Software Companies in the BSE SENSEX 50 Index;implementation of Morphological Fractional Order Darwinian Operator for Brain Tumour Localization.
Streaming media is important in modern information consumption industry. However the limited and varied computing resources and bandwidth of client devices pose challenges for video coding. To make a balance between s...
详细信息
Channel coding is a technique used to boom the performance and reliability of records transmission. It is able to be used for facts compression and source coding, that are the procedures of reducing the amount of reco...
详细信息
3D object detection leverages sensors like LiDAR and cameras to capture scene information, enabling precise determination of objects' spatial positions and orientations. This technology finds extensive application...
详细信息
3D object detection leverages sensors like LiDAR and cameras to capture scene information, enabling precise determination of objects' spatial positions and orientations. This technology finds extensive applications in autonomous driving, smart homes, industrial automation, and intelligent security systems. However, high-precision 3D object detection algorithms often require substantial computational resources, posing limitations for deployment on resource-constrained devices. In this paper, we devise an efficient computation offloading and data transmission framework specifically tailored for edge computing networks to address this challenge. Our framework takes into account both the computing and communication capabilities of terminal devices and network conditions, offloading suitable computation tasks to the edge for processing. This approach mitigates the algorithm's performance requirements on terminal devices. Furthermore, we propose a data transmission scheme that incorporates attention mechanisms and hardware-accelerated coding. This scheme effectively reduces detection time and enhances overall system performance. Experimental results demonstrate that our proposed framework significantly enhances the efficiency of 3D object detection on resource-constrained devices within edge computing networks, while maintaining high detection accuracy.
This article presents a systematic literature review (SLR) aimed at exploring green computing initiatives in the information and Communication technology (ICT) sector. From an initial pool of 258 candidate studies, 35...
详细信息
With the rapid development of cloud computingtechnology, software engineering and mobile application development have ushered in new opportunities and challenges. This paper analyzes the application of cloud computin...
详细信息
Electric power computing resources are distributed in the respective regions of provincial data centers and transmission and transformation equipment, and the scheduling efficiency of computing resources is limited by...
详细信息
This paper introduces WaveCryptor, a hybrid framework blending encryption and steganography to secure messages within audio frequencies. Each character in a message is mapped to a unique frequency, while additional &q...
详细信息
Trusted computingtechnology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se...
详细信息
暂无评论