Atnaujinkite slapukų nuostatas

El. knyga: Edge Computing and IoT: Systems, Management and Security: Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually.
The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace.

The 22 full papers of ICECI 2022 were selected from 76 submissions and present results and ideas in the area of edge computing and IoT.
Models and methods for data management in IoT.- Forecasting the
Temperature of BEV Battery Pack based on Field Testing Data.- The Data
Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof.- A
Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge
Computing.- On Enhancing Transmission Performance for IoV Based on Improved
Greedy Algorithm.- Precise Segmentation on Poly-Yolo, YoloV5 and
FCN.- Adaptive approaches to manage energy consumption and security of
systems.- Research on DAG Based Consensus Mechanism for Adjustable Load
Metering Data.-  A Detection and Information Processing Model based on an
Automatic Mechanism for Tax Payment Control in Developing
Countries.- IEC-FOF: An Industrial Electricity Consumption Forecasting and
Optimization Framework.- Demons Hidden in the Light: Unrestricted
Adversarial Illumination Attacks.- Edge Intelligence Based Garbage
Classification Detection Method.- Mobile computing in wireless
networks.- Evaluation of Higher Education System.- Defense Mechanisms against
Audio Adversarial Attacks: Recent Advances and Future Directions.- An
Empirical Study of Worldwide Plastic Waste Mitigation.- Prediction for
Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum
Based on Edge Intelligence.-  Highly Accurate Dynamic Gesture Recognition
Method Based on Edge Intelligence.- Distributed computing in IOT.- Edge
Intelligence Based Garbage Classification Detection Method.- Adversarial
Example Attacks in Internet of Things (IoT).- Training Node Screening in
Decentralized Trusted Federated Learning.-  Exploration and Practice of
Course Homework Metaverse Based on Extended Reality under Edge
Computing.- Federated Learning Based User Scheduling for Real-Time Multimedia
Tasks in EdgeDevices.- A Co-caching Strategy for Edges Based on
Federated Learning and Regional Prevalence.- LSTM-DAM: Malicious Network
Traffic Prediction for Cloud Manufacturing System.