派博傳思國際中心

標(biāo)題: Titlebook: Edge Computing and IoT: Systems, Management and Security; Third EAI Internatio Zhu Xiao,Ping Zhao,Jinmei Shu Conference proceedings 2023 IC [打印本頁]

作者: JADE    時間: 2025-3-21 17:43
書目名稱Edge Computing and IoT: Systems, Management and Security影響因子(影響力)




書目名稱Edge Computing and IoT: Systems, Management and Security影響因子(影響力)學(xué)科排名




書目名稱Edge Computing and IoT: Systems, Management and Security網(wǎng)絡(luò)公開度




書目名稱Edge Computing and IoT: Systems, Management and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Edge Computing and IoT: Systems, Management and Security被引頻次




書目名稱Edge Computing and IoT: Systems, Management and Security被引頻次學(xué)科排名




書目名稱Edge Computing and IoT: Systems, Management and Security年度引用




書目名稱Edge Computing and IoT: Systems, Management and Security年度引用學(xué)科排名




書目名稱Edge Computing and IoT: Systems, Management and Security讀者反饋




書目名稱Edge Computing and IoT: Systems, Management and Security讀者反饋學(xué)科排名





作者: CLIFF    時間: 2025-3-21 20:58
1867-8211 ull papers of ICECI 2022 were selected from 76 submissions and present results and ideas in the area of edge computing and IoT..978-3-031-28989-7978-3-031-28990-3Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: intangibility    時間: 2025-3-22 03:45
Iveta Silova,Zsuzsa Millei,Nelli Piattoevaare briefly introduced. Then the rest of paper mainly discusses the performance of four models implementing greedy algorithm in IoV fields based on MATLAB by pairwise comparison of experimental results and analysis.
作者: 改正    時間: 2025-3-22 05:14
Adrienne E. Gavin,Andrew F. Humphriestion. The YOLO approach will be mainly talked about for application, since it can be easily used combined with other algorithms like semantic segmentation, FCN, and etc. to enhance its performance. What’s more, the computation speed of Poly-YOLO is the main advantage why people choose YOLO.
作者: catagen    時間: 2025-3-22 10:27
On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithmare briefly introduced. Then the rest of paper mainly discusses the performance of four models implementing greedy algorithm in IoV fields based on MATLAB by pairwise comparison of experimental results and analysis.
作者: 有斑點    時間: 2025-3-22 14:18
Precise Segmentation on?Poly-Yolo, YoloV5 and?FCNtion. The YOLO approach will be mainly talked about for application, since it can be easily used combined with other algorithms like semantic segmentation, FCN, and etc. to enhance its performance. What’s more, the computation speed of Poly-YOLO is the main advantage why people choose YOLO.
作者: 有斑點    時間: 2025-3-22 21:02
Forecasting the?Temperature of?BEV Battery Pack Based on?Field Testing Dataan one year to build a machine-learning model that can forecast the battery pack’s average temperature in real-world driving. Our best Bi-LSTM model achieved the mean absolute error of 2.92?.C on test data and 1.7?.C on cross-validation for prediction of 10?min on the battery pack’s temperature.
作者: tattle    時間: 2025-3-22 22:28

作者: magnanimity    時間: 2025-3-23 03:17
1867-8211 held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually.. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Mach
作者: Gorilla    時間: 2025-3-23 09:37
Childhood Trauma in Mental Disordersan one year to build a machine-learning model that can forecast the battery pack’s average temperature in real-world driving. Our best Bi-LSTM model achieved the mean absolute error of 2.92?.C on test data and 1.7?.C on cross-validation for prediction of 10?min on the battery pack’s temperature.
作者: GET    時間: 2025-3-23 12:37
: An Industrial Electricity Consumption Forecasting and Optimization Frameworkdes, we realize an electricity consumption optimization module based on clustering methods, including typical abnormal electricity consumption action identification, electricity consumption pattern recognition, and electricity consumption optimization suggestions.
作者: INCH    時間: 2025-3-23 16:32

作者: 發(fā)出眩目光芒    時間: 2025-3-23 18:50

作者: 膽小鬼    時間: 2025-3-23 22:55

作者: HAWK    時間: 2025-3-24 02:48

作者: 虛構(gòu)的東西    時間: 2025-3-24 07:07
The Data Exchange Protocol over?Multi-chain Blockchain Using Zero-Knowledge Proofnd privacy issues. In this position paper, we leverage zero-knowledge proof and multichain technology to propose an efficient system for data transferring across different components. Each component may maintain a private chain storing its data, and the system acts as a relayer between different cha
作者: deactivate    時間: 2025-3-24 13:17

作者: NIP    時間: 2025-3-24 18:52
On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithmused to make a vehicle can detect the position and movement of other vehicles up to a specified range, which plays a significant role in upcoming cellular networks is expected to reduce the traffic jam and accidents in social life. Based on the idea of Greedy algorithm, a method to find the partial
作者: FOVEA    時間: 2025-3-24 20:13
Precise Segmentation on?Poly-Yolo, YoloV5 and?FCNing in construction area [.]. It can also used for auto-vehicle driving, object detection, and so on. Currently, there are several ways to realize this like FCN and YOLO. However, they all exist some limitation. For example, the bounding box of YOLO is always being castigated by the user. There are
作者: Limpid    時間: 2025-3-24 23:44

作者: ULCER    時間: 2025-3-25 04:38
A Detection and Information Processing Model Based on an Automatic Mechanism for Tax Payment Controlctices and developing new technologies. However, most of these activities are done to satisfy people’s needs, but they have a negative impact on their health and well-being. This is the reason why man seeks ways to develop and protect himself from fatigue and anything that can harm his health by usi
作者: alabaster    時間: 2025-3-25 10:42
: An Industrial Electricity Consumption Forecasting and Optimization Frameworklutions for energy saving and cost reduction. We propose a framework for industrial electricity consumption prediction and optimization based on multi-source information fusion named .. We design the electricity consumption prediction module by utilizing historical data, weather, and date info. Besi
作者: Bravura    時間: 2025-3-25 14:57
Demons Hidden in?the?Light: Unrestricted Adversarial Illumination Attacks neural networks, adversarial attacks are a stealthy means of attack, which can mislead model decisions during the testing phase. Therefore, the exploration of adversarial attacks can help to understand the vulnerability of models in advance and make targeted defense..Existing unrestricted adversari
作者: 伙伴    時間: 2025-3-25 17:54

作者: 水獺    時間: 2025-3-25 22:13
Evaluation of Higher Education System Firstly, after analyzing the two evaluation models of grey comprehensive evaluation and analytic hierarchy process (AHP), the analytic hierarchy process (AHP) was selected to construct the model. Next, we selected 14 indicators related to the higher education system and conducted a data search. The
作者: 強行引入    時間: 2025-3-26 02:38
Defense Mechanisms Against Audio Adversarial Attacks: Recent Advances and?Future Directionshings (IoT) devices. However, studies have demonstrated that such systems are vulnerable to attacks using manipulated inputs. During the last few years, defense mechanisms have been studied and discussed from various aspects to protect voice systems from such attacks. Notwithstanding, there is lacki
作者: ANT    時間: 2025-3-26 07:17
An Empirical Study of?Worldwide Plastic Waste Mitigationally, we first propose the model, MPMV, that estimates the .aximum .olume of single-use or disposable .lastic product waste that can safely be .itigated without further environmental damage. Then, we design a three-level evaluation system for .lastic waste .itigation .apacity, PMC, to investigate th
作者: 宣傳    時間: 2025-3-26 10:52
Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edgct and control the surface subsidence caused by shield excavation, this paper takes the shield construction of Luoyang Metro Line 2 from Longmen Station to Longmen Avenue Station as the background, and proposes a method based on edge intelligence for shield construction in water-rich sand egg strata
作者: IOTA    時間: 2025-3-26 15:04
Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligencee reason for its rapid development is due to the emergence of deep learning and artificial intelligence under today’s society. Due to dynamic gestural interactions, such large intelligent models are often characterized by many parameters, large sample size, frequent parameter updates, and high commu
作者: 轎車    時間: 2025-3-26 20:04
https://doi.org/10.1007/978-1-4471-3011-6ing but the statement is true; therefore it protects anonymity for the data owners. This system is secure and satisfies relevant properties such as ledger indistinguishability, transaction non-malleability, and matchability.
作者: Cupidity    時間: 2025-3-26 23:15
Rebecca Budde,Urszula Markowska-Manista a 0–1 knapsack algorithm to realize dynamic service caching based on task popularity based on the original offloading decision. Based on the results of service caching, if the task initially decides to offload to the edge server and the edge server does not cache the services required by the task,
作者: allergy    時間: 2025-3-27 02:39
https://doi.org/10.1007/978-0-585-27406-5treatment of transactions the throughput of blockchain can be significantly improved. Finally, to improve the limited computation and storage capability, we use container edge service engine in system design.
作者: 流動才波動    時間: 2025-3-27 07:28
https://doi.org/10.1007/978-3-662-44443-6s especially in developing countries. The proposed mechanism is based on a case of paying parking tax. The mechanical part of our system is controlled by an ARDUINO micro controller under which works in parallel with a Windows application on a computer to control a servomotor that operates the barri
作者: FEIGN    時間: 2025-3-27 09:55

作者: Tidious    時間: 2025-3-27 16:36
Wayne S. Wooden,Martha Lou BerkeyeNet model is compared with ResNet, DenseNet and MobileNet models. The results show that the edge devices equipped with PeleeNet model not only have the fastest computation speed and the highest accuracy, but also occupy the least memory. It is fully demonstrated that the method studied in the paper
作者: IOTA    時間: 2025-3-27 20:22
Marisa O. Ensor,El?bieta M. Go?dziakit with the weight, and find the shortcomings of the selected country, the United States. In view of the shortcomings, we put forward some policies and implementation schedule. The effectiveness of the policy is verified by model evaluation. Finally, we discussed some practical problems in the proce
作者: Interferons    時間: 2025-3-27 23:22

作者: 文件夾    時間: 2025-3-28 04:37

作者: 專橫    時間: 2025-3-28 07:55

作者: Tempor    時間: 2025-3-28 11:05

作者: 時間等    時間: 2025-3-28 16:28
A Hybrid Task Offloading and?Service Cache Scheme for?Vehicular Edge Computing a 0–1 knapsack algorithm to realize dynamic service caching based on task popularity based on the original offloading decision. Based on the results of service caching, if the task initially decides to offload to the edge server and the edge server does not cache the services required by the task,
作者: 期滿    時間: 2025-3-28 22:41
Research on DAG Based Consensus Mechanism for Adjustable Load Metering Datatreatment of transactions the throughput of blockchain can be significantly improved. Finally, to improve the limited computation and storage capability, we use container edge service engine in system design.
作者: LATHE    時間: 2025-3-28 23:33
A Detection and Information Processing Model Based on an Automatic Mechanism for Tax Payment Controls especially in developing countries. The proposed mechanism is based on a case of paying parking tax. The mechanical part of our system is controlled by an ARDUINO micro controller under which works in parallel with a Windows application on a computer to control a servomotor that operates the barri
作者: DEAWL    時間: 2025-3-29 04:43

作者: formula    時間: 2025-3-29 11:11
Edge Intelligence Based Garbage Classification Detection MethodeNet model is compared with ResNet, DenseNet and MobileNet models. The results show that the edge devices equipped with PeleeNet model not only have the fastest computation speed and the highest accuracy, but also occupy the least memory. It is fully demonstrated that the method studied in the paper
作者: GET    時間: 2025-3-29 12:11

作者: poliosis    時間: 2025-3-29 16:14
An Empirical Study of?Worldwide Plastic Waste Mitigationy of task distribution of plastic waste reduction among countries. At last, we evaluate the performance of the proposed models via selecting thirteen countries with different levels of development, i.e., United States, Germany, India, Philippines, Vietnam, Canada, Yemen, Japan, Brazil, Chilie, Cuba,
作者: 戲法    時間: 2025-3-29 23:00
Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edgdeployed on the edge equipment; finally, the model was evaluated using the monitoring data of surface subsidence of the water-rich sand egg formation in Luoyang area. The research results show that the edge computing-based system has lower latency and higher processing speed than only deploying clou
作者: 衰弱的心    時間: 2025-3-30 01:09
Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence is also improved by 3.6%. The parameter model is only 43.6% of the original one. This shows the practicality and operability of using edge computing as a technique in gesture recognition, as well as the small improvement cost and obvious effect.
作者: inflame    時間: 2025-3-30 06:59

作者: 桶去微染    時間: 2025-3-30 10:12
Edge Computing and IoT: Systems, Management and Security978-3-031-28990-3Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: palette    時間: 2025-3-30 14:49
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engihttp://image.papertrans.cn/e/image/302228.jpg
作者: Commission    時間: 2025-3-30 20:32

作者: embolus    時間: 2025-3-30 21:15
https://doi.org/10.1007/978-1-4471-3011-6nd privacy issues. In this position paper, we leverage zero-knowledge proof and multichain technology to propose an efficient system for data transferring across different components. Each component may maintain a private chain storing its data, and the system acts as a relayer between different cha
作者: 草本植物    時間: 2025-3-31 04:46
Rebecca Budde,Urszula Markowska-Manistag, and so on. These applications are usually delay-sensitive and energy intensive, which have strict delay constraints and need to consume a lot of computing resources. In order to ensure the quality of service of these applications, this study proposes a framework that combines task offloading and
作者: cognizant    時間: 2025-3-31 05:07
Iveta Silova,Zsuzsa Millei,Nelli Piattoevaused to make a vehicle can detect the position and movement of other vehicles up to a specified range, which plays a significant role in upcoming cellular networks is expected to reduce the traffic jam and accidents in social life. Based on the idea of Greedy algorithm, a method to find the partial
作者: menopause    時間: 2025-3-31 12:26
Adrienne E. Gavin,Andrew F. Humphriesing in construction area [.]. It can also used for auto-vehicle driving, object detection, and so on. Currently, there are several ways to realize this like FCN and YOLO. However, they all exist some limitation. For example, the bounding box of YOLO is always being castigated by the user. There are
作者: aptitude    時間: 2025-3-31 17:10

作者: TRAWL    時間: 2025-3-31 20:53

作者: Highbrow    時間: 2025-3-31 21:54
https://doi.org/10.1057/9780230505896lutions for energy saving and cost reduction. We propose a framework for industrial electricity consumption prediction and optimization based on multi-source information fusion named .. We design the electricity consumption prediction module by utilizing historical data, weather, and date info. Besi
作者: 浪蕩子    時間: 2025-4-1 04:52





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
襄城县| 襄汾县| 河南省| 栖霞市| 大同县| 开鲁县| 江都市| 东海县| 琼结县| 威远县| 宿州市| 台安县| 普安县| 东乡族自治县| 惠来县| 皮山县| 阜宁县| 新平| 舟山市| 鸡泽县| 义乌市| 抚顺市| 顺义区| 柞水县| 马山县| 大埔区| 吴川市| 鹤岗市| 鄯善县| 齐河县| 景宁| 东至县| 平昌县| 交口县| 岑巩县| 龙胜| 中卫市| 伽师县| 峨山| 南川市| 武功县|