The proceedings contain 33 papers. The special focus in this conference is on IoT as a Service. The topics include: Highway Obstacle Recognition based on Improved YOLOv7 and Defogging Algorithm;cloud Gaming Resource M...
ISBN:
(纸本)9783031705069
The proceedings contain 33 papers. The special focus in this conference is on IoT as a Service. The topics include: Highway Obstacle Recognition based on Improved YOLOv7 and Defogging Algorithm;cloud Gaming Resource Management Platform based on Edge Intelligence;hardware-Efficient Polar Decoder for 5G internet of Things Communication;Design and Optimization of a Solar-Powered IRS and Relay Assisted MEC System;highway image Enhancement Method based on Jade;method and Practice of Borehole Group Detection in Borehole Drilling based on Six-Axis Sensing;Deep Reinforcement Learning-based Channel and Power Allocation in Multibeam LEO Satellite systems;CSI-basedsignal Reconstruction for WiFi Localization;an Indoor Navigation Algorithm Using Multi-dimensional Euclidean Distance and the Adaptive Particle Filter;Research on the PID Controllers Algorithm of the Quad Rotor;based on the Nonlinear State Equations of 6-DOF Robot with Application to Autonomous Flight;a Study on Collaborative Lane Change Decision Making of Multi-automated Vehicles based on Deep Graph Reinforcement Learning;a Short Term Traffic Prediction Model based on Deep Capture of Temporal Periodic Drift;multi-agent Reinforcement Learning for Cooperative On-Ramp Merging of Connected Automated Vehicles;SVM Multi-class Classification Method for Device Identification Using Eye Diagram Parameters;users Collaborative Computing for Hierarchical Federated Learning based on Incentive Mechanism;spatio-Temporal Traffic Prediction of Wireless Communication Network based on Multi-source Data;flying Ad-Hoc Network Routing Protocol based on Backward Algorithm;A Novel HPSO-IGWO Algorithm for Rapidly Searching Optimal Fire Rescue Paths based on IoT Architecture;A Hybrid WOA-MTCNN Algorithm for Accurate Face Detection based on IoT Architecture.
The proceedings contain 109 papers. The special focus in this conference is on Advanced Hybrid Information Processing. The topics include: Design of Remote Video Surveillance System based on Cloud Computing;physical M...
ISBN:
(纸本)9783031287862
The proceedings contain 109 papers. The special focus in this conference is on Advanced Hybrid Information Processing. The topics include: Design of Remote Video Surveillance System based on Cloud Computing;physical Movement Monitoring Method of College Physical Education Students based on Genetic Algorithm;research on Large Data Mining for Online Education of Mobile Terminal based on Block Chain technology;Separation Algorithm of Fixed Wing UAV Positioning signalbased on AI;research on Hybrid Maintenance Cost Prediction of Smart Grid based on Multi-dimensional Information;infrared image Face Recognition Method based on signal Interference technology;remote Tutoring System of Ideological and Political Course based on Mobile Client;operational Risk Prevention and Control Monitoring of Smart Financial System based on Deep Learning;remote Monitoring Method of Athlete Training Intensity based on Mobile internet of Things;research on Equipment Management System of Smart Hospital based on Data Visualization;Design of Pond Water Quality Monitoring System based on Mobile UAV technology;Design of Information Consultation System for the Whole Process of Construction Engineering based on BIM technology;the Mobile Teaching Method of Law Course based on Wireless Communication technology;design of Financial and Economic Monitoring System based on Big Data Clustering;recommendation Method of College English Online Mobile Teaching Resources based on Big Data Mining Algorithm;Design of Electronic Communication Power Monitoring System based on GPRS technology;online Interactive Platform for College English Intensive Reading Teaching based on Cloud Service;intelligent Platform for College English Blended Teaching based on Mobile Learning;preface.
This paper proposed a two-image real-time and reversible data hiding method based on the staggered turtle shell concealment technology. First, the dual-turtle shells are continuously staggered on the diagonal of a ref...
详细信息
ISBN:
(纸本)9789811910531;9789811910524
This paper proposed a two-image real-time and reversible data hiding method based on the staggered turtle shell concealment technology. First, the dual-turtle shells are continuously staggered on the diagonal of a reference matrix. The embedding rules are developed to conceal confidential message accordingly. The experimental results show that the time that our proposed method takes to build the reference matrix, and embed secret information is faster than other TS-based dual-image data hiding schemes. Moreover, the scheme is simple and maintains certain good performance.
image encryption using a chaotic system is a widely used technique. But, cryptanalysis of most chaotic encryption algorithms pointed out the disadvantages or drawbacks of the chaotic systems. As a remedy, a new and mo...
详细信息
The utilization of CT scans in medical diagnostics has seen a consistent and substantial rise. However, this increased usage has raised concerns regarding the potential harmful effects of radiation exposure on patient...
详细信息
Medical image fusion (MIF) merges the data from various medical images into one image to get the more detailed data. This technique can improve the accuracy of medical diagnosis and treatment. image Processing (IP) is...
详细信息
To improve the performance of spectrum sensing at low SNR, a collaborative spectrum sensing method based on feature extraction and fusion clustering is proposed (FEFC). First, the sampling matrix of the received signa...
详细信息
In this paper, an innovative reversible dual image information hiding technique is proposed, which utilizes the coordinate vectors generated by the original pixel pairs to hide secret information at two combined locat...
详细信息
In the modern world, technology is intricately intertwined with every aspect of our daily lives. Additionally, tasks including file access, downloading, cloud computing, image recognition, and video cassette playback ...
详细信息
This paper explores the ethical and security challenges of integrating internet of Things technologies into health-care systems. We examine real-world ethical dilemmas, including privacy and security of personal and m...
详细信息
暂无评论