<span>This book constitutes the refereed post-conference proceedings of the First International Conference Edge Computing and IoT, ICECI 2020, held in November 2020 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The rapidly increasing devices and data traffic in the
Edge Computing and IoT: Systems, Management and Security: Second EAI International Conference, ICECI 2021, Virtual Event, December 22–23, 2021, ... and Telecommunications Engineering)
✍ Scribed by Kaishun Wu (editor), Lu Wang (editor), Yanjiao Chen (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 143
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed post-conference proceedings of the 2nd International Conference on Edge Computing and IoT, ICECI 2021, held in December 2021 in Shenzhen, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 12 full papers of ICECI 2021 were selected from 26 submissions and present results and ideas in the area of edge computing and IoT.
✦ Table of Contents
Preface
Organization
Contents
Edge Computing
An Improved Audio Processing Method for Campus Broadcast System
1 Introduction
2 Audio Compressed Sensing
2.1 The Sparse Matrix
2.2 Observation Matrix
2.3 Reconstruction Algorithm
3 Audio Processing Methods
3.1 Sparse Representation of Audio Signals in DWT
3.2 Signal Reconstruction
3.3 OROMP Algorithm
4 Simulation Test
4.1 Reconstruction of Audio Signal by the OROMP Algorithm in DWT Domain
4.2 Reconstruction Quality Analysis
4.3 Influence of Parameter Setting on the Success Rate of Recovery
5 Conclusions
References
Committee Selection Based on Game Theory in Sharding Blockchain
1 Introduction
2 Sharding Fundamentals
3 Committee Selection Game
3.1 Problem Formulation
3.2 Hierarchical Game Model
4 Game Analysis
4.1 DS Committee Member Selection Sub-game
4.2 Shards Formation Sub-game
5 Experimental Results
5.1 Game Analysis
5.2 Cost Coefficients Analysis
6 Related Work
7 Conclusion
References
Green Transition Driven Carbon Trading Mechanism and Design Based on Urban Vehicle Trajectory Data
1 Introduction
2 Materials and Methods
2.1 Block Chain-Based Carbon Trading Application Design
2.2 Prediction of Carbon Emission and Allocation of Carbon Quota
3 Results and Discussion
3.1 Parameter Selection
3.2 Analysis of Fitting Effect
4 Conclusions
References
Matching with Externalities for Device Assignment in IoT Sharding Blockchain
1 Introduction
2 Background
2.1 Sharding Blockchain
2.2 Matching Theory
3 System Model and Problem Formulation
3.1 Shards and Accounts Model
3.2 Problem Formulation
4 Many-to-One Matching for Accounts Assignment
4.1 Accounts Assignment Matching Model
4.2 Accounts Assignment Algorithm
5 Experimental Results
5.1 Simulation Setup
5.2 Convergence Efficiency
5.3 Compare with Random Assignment
6 Related Work
7 Conclusion
References
Openflow-Extended Queue Scheduling for Multi-tenants in Access Network
1 Introduction
2 Related Work
3 Motivation and Problem Statement
4 Basic Idea of the Solution
5 Solution Design and Implementation
5.1 Solution Design and Implementation
6 Conclusion
References
Research and Improvement on Detection Algorithm of SCMA System
1 The Introduction
2 Research on Principle and Decoding Algorithm of Serial SCMA System
2.1 System Description
2.2 Algorithm Research and Design
2.3 Performance Analysis of Decoding Algorithm
3 Conclusion
References
Internet of Things
A Survey of Adversarial Attacks on Wireless Communications
1 Introduction
2 Attack Mechanisms
2.1 The Evasion Attacks
2.2 The Poisoning Attacks
2.3 The Trojan Attacks
2.4 The Membership Inference Attacks
2.5 The Spoofing Attacks
3 Conclusions
References
Adversarial Examples in Wireless Networks: A Comprehensive Survey
1 Introduction
2 Background
2.1 Adversarial Example
2.2 Wireless Network
3 Adversarial Example Attacks in Wireless Networks
3.1 Consideration of Channel Effect
3.2 Consideration of Multi-target Attack
4 Adversarial Example Attack Countermeasures
4.1 Adversarial Train
4.2 Random Transmission Error
4.3 Statistics-Based Detection
5 Conclusion
References
Headmotion: Human-Machine Interaction Requires Only Your Head Movement
1 Introduction
2 Hardware and Software Design of Equipment
2.1 Hardware Introduction
2.2 Hardware Programming
3 Experimental Environment and Database Construction
4 Construction of the Human-Computer Interactive System
4.1 Overall Architecture of Interactive System
4.2 Construction of Recognition Model
4.3 Evaluation of Recognition Model
4.4 Endpoint Detection in Real-Time Interactive System
5 Actual Interactive Application
6 Summary and Prospect
References
Implementation of the Bone Grid Reconstruction Based on CT Data
1 Introduction
2 Problem Analysis
2.1 Noise Processing
2.2 Partition of Regions of Interest
2.3 Contour Detection
3 Experiment and Evaluation
4 Discussion
References
Intelligent Vocal Training Assistant System
1 Introduction
2 Related Work
2.1 Detection of the Closed State of the Vocal Cords Based on Electroglottograph
2.2 Detection of the Closed State of the Vocal Cords Based on Accelerometer
2.3 Detection of the Closed State of the Vocal Cords Based on Audio Signal Analysis
2.4 Some Problems Existed in Related Research
3 System Design
4 Data Set
5 Experiment and Result
6 Conclusion
References
Wearable-Based Human Emotion Inference System
1 Introduction
2 Related Work
3 System Design
3.1 Multi-modal Sensing Signal Design
3.2 Multi-modal Signal Preprocessing
3.3 Experiment Setup
3.4 Emotion Recognition Model
4 Experiment
4.1 Results and Evaluation
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually.<br> The explosion of the big data generated b
This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquito
<span>This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually.</span><p><span> The 33 full papers were selected from 61 submi
This book constitutes the thoroughly refereed post-conference proceedings of the 4<sup>th</sup> International Conference on Industrial IoT Technologies and Applications, IoT 2020, held in December 2020. Due to Covid-19 pandemic the conference was held virtually.<p> The widespread deployment of wirel
<span>This book constitutes the thoroughly refereed post-conference proceedings of the 4</span><span><sup>th</sup></span><span> International Conference on Industrial IoT Technologies and Applications, IoT 2020, held in December 2020. Due to Covid-19 pandemic the conference was held virtually.</span