<span>This book constitutes the refereed post-conference proceedings of the 2nd International Conference on Edge Computing and IoT, ICECI 2021, held in December 2021 in Shenzhen, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous
Edge Computing and IoT: Systems, Management and Security: First EAI International Conference, ICECI 2020, Virtual Event, November 6, 2020, Proceedings ... and Telecommunications Engineering)
✍ Scribed by Hongbo Jiang (editor), Hongyi Wu (editor), Fanzi Zeng (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 191
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The rapidly increasing devices and data traffic in the Internet-of-Things (IoT) era are posing significant burdens on the capacity-limited Internet and uncontrollable service delay.
The 11 full papers of ICECI 2020 were selected from 79 submissions and present results and ideas in the area of edge computing and IoT.
✦ Table of Contents
Preface
Conference Organization
Contents
Cloud-Edge Computing
Energy Efficient Service Composition with Delay Guarantee in a Cloud-Edge System
1 Introduction
2 Problem Statement
2.1 Service Path
2.2 Service Instance
2.3 Service Graph
2.4 Service (Instance) Chain
3 Service Composition Algorithm
3.1 The Delay of a Service Chain
3.2 Data-Aware Service Composition Algorithm
4 Evaluation
4.1 Simulation Settings
4.2 Results Analysis
5 Conclusion
References
SmartDis: Near-Optimal Task Scheduling in Multi-edge Networks
1 Introduction
2 Related Work
3 Model and Problem Formulation
3.1 System Model
3.2 Problem Formulation
4 The SmartDis Algorithm
4.1 Determining Upload Orders
4.2 Computing Slot Selection and Task Scheduling
5 Experiments
5.1 Experimental Setup
5.2 Execution Performance
5.3 Fairness
5.4 Sensitivity
5.5 Scheduling Execution Cost
6 Conclusion
References
Low-Carbon Emission Driven Traffic Speed Optimization for Internet of Vehicles
1 Introduction
2 Interaction Between Vehicles and Traffic Signals Within IoV
3 Simulation Framework of Traffic Flow-CO2 Emission
4 Impact of Speed on Vehicle CO2 Emission
5 Recommended Speed Calculation Scheme
5.1 Road Condition Detection
5.2 Information Exchange
5.3 Recommended Speed Calculation
6 Simulations and Results
6.1 Simulation Settings
6.2 Simulation Results and Analysis
7 Conclusions
References
Data Gathering System Based on Multi-layer Edge Computing Nodes
1 Introduction
2 Related Work
3 Theoretical Basis
3.1 Compressed Sensing
3.2 Random Walk
4 Multi-layer Edge Data Collection System
4.1 System Model and Problem Description
4.2 Data Collection Process
4.3 Train the Task Assignment Process
5 Analysis of Experimental Results
5.1 Performance Measures
5.2 Experimental Setup
5.3 Comparison of Experimental Results
6 Summary
References
Resource Allocation Method of Edge-Side Server Based on Two Types of Virtual Machines in Cloud and Edge Collaborative Computing Architecture
1 Introduction
2 Related Work
3 Architecture and Workflow
3.1 Computing Architecture
3.2 Workflow
4 Resource Allocation for IO-intensive Virtual Machines
4.1 Computing Architecture
4.2 Resource Allocation Model
4.3 Priority List and Resource Allocation
5 Resource Allocation for CPU-intensive Virtual Machines
5.1 Resource Allocation Model
5.2 Resource Allocation
6 Experiment and the Results
6.1 Experimental Configuration
6.2 Experimental Results
7 Conclusions
References
Few Shot Learning Based on the Street View House Numbers (SVHN) Dataset
1 Introduction
2 Related Work
3 MAML Algorithm Introduction
3.1 Convolution Neural Network
3.2 Pseudo Code
3.3 Apply to SVHN
4 Experiment
4.1 Preparation
4.2 Two Way One Shot Learning
4.3 Two Way Five Shot Learning
4.4 Five Way Five Shot Learning
5 Comparison with Siamese Network
5.1 Siamese Neural Networks
5.2 Experiment
5.3 Comparison
6 Conclusions and Future Works
References
Smart Sensing
TouchSense: Accurate and Transparent User Re-authentication via Finger Touching
1 Introduction
2 Background
2.1 Behavior-Based User Re-authentication
2.2 Biometric-Based User Re-authentication
3 Scheme Design
3.1 Data Sampling
3.2 Curve Fitting
3.3 Feature Vector Extraction
3.4 Feature Matching (Authentication)
3.5 User-Legitimate Model
4 Evaluation Results
4.1 Experimental Platform Setup
4.2 Test Results
5 Discussion
5.1 Feature Works
5.2 Ethical Concerns
6 Conclusion
References
Android Malware Detection Using Ensemble Learning on Sensitive APIs
1 Introduction
2 Related Work
2.1 Dynamic Detection Method
2.2 Static Detection Method
3 Feature Extraction and Analysis
3.1 Preliminaries
3.2 Feature Generation
4 Detection System Design
4.1 Ensemble Learning Detection Model
4.2 Base Classifiers
4.3 Weighting Combination Strategy
5 The Results of Experimental
5.1 Experimental Environment
5.2 Evaluation Indeces
5.3 Analysis of Experimental
6 Conclusion
References
Efficient Missing Tag Identification in Large High-Dynamic RFID Systems
1 Introduction
2 Related Work
3 System Model and Problem Statement
3.1 System Model
3.2 Problem Formulation
4 Protocol Design
4.1 Design Overview
4.2 Detail Description
5 Parameter Optimization
5.1 Setting the Key Length l
5.2 Determining the Optimal Frame Size f
6 Performance Evaluation
6.1 The Impact of Required Identification Accuracy
6.2 The Impact of the Number of Unknown Tags
6.3 The Impact of the Number of Missing Tags
6.4 The Impact of the Number of Initial Known Tags
6.5 False Positive Tags
7 Conclusion
References
Internet of Things
Self-secure Communication for Internet of Things
1 Introduction
2 Related Work
3 Self-secure Communication
3.1 Notations
3.2 Key Establishment Stage
3.3 Secure Communication Stage
4 Experiment
5 Conclusion
References
Characterization of OFDM Based Free Space Optical (FSO) Transmission System Under Heavy Rain Weather
1 Introduction
2 Characterization of the FSO Channel Model
2.1 Receive Optical Power
2.2 Beam Divergence Impact Analysis
2.3 Rain-Attenuation Models
3 Simulation Setup
4 Simulation Results
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually.<br> The explosion of the big data generated b
This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquito
<span>This book constitutes the refereed post-conference proceedings of the 9</span><span><sup>th</sup></span><span> International Conference on Mobile Communication and Healthcare, MobiHealth 2020, held in December 2020. Due to Covid-19 pandemic the conference was held virtually.</span><p><span> Th
This book constitutes the thoroughly refereed post-conference proceedings of the 4<sup>th</sup> International Conference on Industrial IoT Technologies and Applications, IoT 2020, held in December 2020. Due to Covid-19 pandemic the conference was held virtually.<p> The widespread deployment of wirel