The proceedings contain 33 papers. The special focus in this conference is on internetcomputing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Da...
ISBN:
(纸本)9783031859229
The proceedings contain 33 papers. The special focus in this conference is on internetcomputing and IoT. The topics include: Malware Detection in the IoT Home Network;IoT-Based Analysis of Environmental and Motion Data for Comfort and Energy Conservation in Optimizing HVAC Systems;improving Critical Controls Using IoT and Computer Vision;A Data-Driven Driving Under the Influence (DUI) Detection, Notification and Prevention System Using Artificial Intelligence and internet-Of-Things (IoT);understanding User Interactions with IoT Process Models: A Demographic Perspective;Advancing IoT Process Modeling: A Comparative Evaluation of BPMNE4IoT and Traditional BPMN on User-Friendliness, Effectiveness, and Workload;Threat Detection Using MLP for IoT Network;harnessing Social Robotics and the internet of Things to Reduce the Risk of Older Adults Developing Hypothermia and Dehydration;re/Imagining Smart Home Automation Framework in the Era of 6G-Enabled Smart Cities;smart Roadway Monitoring: Pothole Detection and Mapping via Google Street View;Energy-Efficiency Modeling for AI Applications on Edge computing;optimizing Wireless Sensor Network Node Placement Using Bacterial Foraging Optimization;The Vital Role of Small and Marginal Farmer in Future of Our Climate: Democratization of Machine Learning, Artificial Intelligence, and Dairy Cow Necklace Sensors in Achieving the UN Climate Change Goals (COP21) and the Paris Agreement;autonomous Driving Prototype with Raspberry Pi by Using Image Processing Technology;towards Implementation of Privacy-Preserving Federated Learning Aggregation Using Multi-key Homomorphic Encryption;advancing Nursing Education Through Virtual Reality Training: A Revolutionary Approach to Ensuring Patient Safety;multiDrone Simulator An Open Source Multi-plataform Tool to Use in Tests of Optimized Flight of Group of Drones;Revolutionizing Multiplayer Gaming: A Deep Dive into VisionXO, a 3D Multiplayer Tic-Tac-Toe Game.
The proceedings contain 25 papers. The topics discussed include: systems architecture design of cloud-based human resources information management systems (cHRIMS) for higher education institutions;survey analysis of ...
ISBN:
(纸本)9780769551180
The proceedings contain 25 papers. The topics discussed include: systems architecture design of cloud-based human resources information management systems (cHRIMS) for higher education institutions;survey analysis of knowledge structure of talents for Chinese SMEs e-commerce;design and realization of educational resources management system based on learning object metadata;hidden process detection system based on hardware-assisted virtualization;an efficient mesh simplification method in 3D graphic model rendering;an affine scaling interior method for solving system of bound-constrained semismooth equations;a convenient method of video see-through augmented reality based on image-guided surgery system;a knowledge-driven segmentation method for ribs in bone scintigraphy using MRF model;shearlet-based ultrasound texture features for classification of breast tumor;and 3D facial expression classification based on self-organizing mapping network.
In the development of China's power internet construction, in order to better meet the characteristics of network transportation, the key technology to the edge computing framework as the core has been highly valu...
详细信息
Data processing and publication are crucial today with the advancements in technologies such as edge computing and IoT(internet of Things). A vast volume of data is being generated by internet-connected devices, often...
详细信息
In the past ten years, the internet of Things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and ra...
详细信息
In the past ten years, the internet of Things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and rapidly escalating demand for intelligent devices and networks mean that IoT is currently encountering unprecedented security challenges. While there are established security protocols in place for IoT, these conventional methods fall short in effectively addressing the escalating frequency and severity of attacks. The term 'security' is used to encompass various concepts, including integrity, confidentiality, and privacy. Therefore, a strong and up-to-date security system is necessary for the next generation of industrial IoT. One area of technological advancement that can address the ongoing and future challenges of IoT security is Soft computing. It has opened up many possible research avenues for detecting attacks and identifying abnormal behaviors in smart devices and networks. This paper explores the architecture of IoT and provides a comprehensive literature review of Soft computing based approaches to IoT security, including the different types of possible attacks. It also presents potential Soft computing-based solutions for IoT security and discusses open research issues along with future research scope.
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p...
详细信息
This study investigates the design and execution of an automated attendance tracking system using facial recognition CCTV based. Facial recognition technology and CCTV cameras are integrated in this system to provide ...
详细信息
Edge computing has emerged as a crucial paradigm to fulfill the increasing demand for rapid data processing, low latency, and efficient resource utilization, particularly in applications such as the internet of Things...
详细信息
The rapid growth of the internet of Things (IoT) has created a pressing need for efficient service allocation methods to manage the multitude of connected devices. Edge computing has become essential to fulfill the lo...
详细信息
ISBN:
(纸本)9783031814037;9783031814044
The rapid growth of the internet of Things (IoT) has created a pressing need for efficient service allocation methods to manage the multitude of connected devices. Edge computing has become essential to fulfill the low-latency and high-bandwidth demands of IoT applications. This paper investigates the use of game theory as a framework for optimizing service allocation in edge computing environments. By treating the interactions between IoT devices and edge servers as a strategic game, we propose strategies to achieve optimal allocation and resource utilization. Our approach tackles key challenges such as minimizing latency, improving energy efficiency, and balancing load. Experimental results indicate that game-theoretic methods greatly improve the performance and scalability of IoT systems in edge computing, positioning them a promising solution for future applications.
暂无评论