International Conference on Cloud Computing and Computer Networks: CCCN 2023 (Signals and Communication Technology)
โ Scribed by Lei Meng (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 144
- Edition
- 1st ed. 2024
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book covers selected and presented papers of CCCN 2023, the International Conference on Cloud Computing and Computer Network which was held in Singapore April 21-23, 2023. CCCN 2023 provides a premier forum for researchers and scholars from multiple disciplines to come together to share knowledge, discuss ideas, exchange information, and learn about cutting-edge research in diverse fields of cloud computing and computer networks. Topics covered in this book contain cloud computing and semantic web technologies, cloud applications in vertical industries, cloud computing architecture and systems, cloud computing models, simulations and designs among others. The content is relevant to academics, researchers, students, and professionals in cloud computing and computer networks.
โฆ Table of Contents
Preface
Conference Committees
Contents
Part I: Digital Image Detection and Application
Application of Convolutional Neural Networks for the Detection of Diseases in the CCN-51 Cocoa Fruit by Means of a Mobile Appl...
1 Introduction
2 Background
2.1 Importance of Cocoa in Ecuador
2.2 Cocoa Pests
2.3 Cocoa Diseases
2.4 Technology in Agriculture
3 System Architecture
4 System Development
4.1 Deploy
5 Result and Discussion
5.1 Interaction with the System
5.2 Validation
6 Conclusion and Future Work
References
Target Detection Algorithm of Forward-Looking Sonar Based on Swin Transformer
1 Introduction
2 Swin_FLS Model
2.1 Dataset Introduction
2.2 Network Description
3 Analysis of Experimental Results
3.1 Ablation Study
3.2 Comparative Experiment
3.3 Real-Time Experiment
3.4 Actual Target Detection Effect
4 Conclusion
References
An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-Pixel Net Model
1 Introduction
2 Related Work
2.1 PIPNet
2.2 Resnet
2.3 MobileNetV2
3 Algorithms
3.1 NME (Normalized Mean Error)
3.2 AUC
3.3 MobileNetV2 Network Integrated into Ghost Module
4 Experiments and Results
4.1 Experimental Data
4.2 Experimental Results
5 Conclusion
References
Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction
1 Introduction
2 Related Works
3 Methodology
3.1 Problem Definition
3.2 Iterative Reconstruction Methods
3.3 Algorithm Acceleration: Row-Action Structure
4 Experimental Results
5 Conclusions and Discussions
References
Part II: Machine Learning and Intelligent Applications
Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers, and Digital Copiers: A Gateway to Breach Our En...
1 Introduction
1.1 Background of the Study
2 Literature Review
2.1 You Over Trust Your Printer
2.2 SoK: Exploiting Network Printers
2.3 Printer Security Vulnerabilities and What You Can Do About It!
3 Methodology
3.1 Research Design
3.2 Results and Key Findings
3.3 Reconnaissance Simulation
4 Conclusions
References
Provisioning Deep Learning Inference on a Fog Computing Architecture
1 Introduction
1.1 A Subsection Sample
2 Methodology
3 Analysis of Results
4 Conclusions
References
A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues
1 Introduction
1.1 Background of the Study
1.2 Significance of the Study
1.3 Objectives of the Study
2 Literature Review
2.1 Virtual Private Network Defined
2.2 VPN User Experience
2.3 Security
2.4 Impact of Virtual Private Network
2.5 Comparison of Virtual Private Networks for Business and User Usage
2.6 Results and Discussion
3 Conclusion
References
Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight
1 Introduction
2 Grey Wolf Optimization Algorithm
3 Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight
3.1 Logarithmic Inertia Weight Strategy
3.2 Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight
4 Simulation Experiment and Results
4.1 Experimental Design
4.2 Analysis of Experimental Results
5 Conclusion and Prospect
References
Radio Frequency Identification Vulnerabilities: An Analysis on RFID-Related Physical Controls in an Infrastructure
1 Introduction
2 Literature Review
2.1 RFID Tag, Reader, Antenna, Management Software, Action
2.2 RFID Layer Vulnerabilities, Attacks, and Security Measures
2.3 RFID Standards
2.4 Research Survey
3 Conclusion
References
Part III: Computer Models and Artificial Intelligence Algorithms
Analysis of Bee Population and the Relationship with Time
1 Introduction
2 Models Overview
2.1 Logic Flow of Model
2.2 Data Approaching
2.3 A Primary Model for Problem 1
2.4 Models for Problem 2
2.5 Linear Programming Model for Problem 3
References
Synthetic Speech Data Generation Using Generative Adversarial Networks
1 Introduction
2 Text-to-Speech Synthesis
2.1 Legacy Synthesis
2.2 Deep Learning Speech Synthesis
2.3 GAN
2.4 Tacotron 2
2.5 Database and Settings
3 Evaluation
3.1 Settings
3.2 Training
3.3 Synthesizing Speech from Text
4 Conclusion
References
Prediction of Bee Population and Number of Beehives Required for Pollination of a 20-Acre Parcel Crop
1 Introduction
2 Bee Population Prediction Model A
2.1 Model Introduction
2.2 Data Collection and Processing
2.3 Model (1a)
2.4 Evaluation (1a)
3 Bee Population Prediction Model B
3.1 Model Introduction
3.2 Data Collection and Processing
3.3 Model (1b)
3.4 Evaluation (1b)
3.5 Results for Both Models
4 Bee Population Sensitivity Test
4.1 Model Introduction
4.2 Data Collection and Processing
4.3 Model (2a)
4.4 Evaluation
4.5 Function Analysis Result
5 Beehive Number Estimation Model
5.1 Model Introduction
5.2 Data Collection
5.3 Model
5.4 Evaluation
5.5 Results
References
Index
๐ SIMILAR VOLUMES
<span>This book includes selected peer-reviewed papers presented at the International Conference on Computing and Communication Networks (ICCCN 2021), held at Manchester Metropolitan University, United Kingdom, during 19โ20 November 2021. The book covers topics of network and computing technologies,
<p><p>The book features research papers presented at the International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2018), offering significant contributions from researchers and practitioners in academia and industry. The topics covered include computer networks,
<p><span>This book presents new communication and networking technologies, an area that has gained significant research attention from both academia and industry in recent years. It also discusses the development of more intelligent and efficient communication technologies, which are an essential pa
<span>This book presents the proceedings of the 6th International Conference on Signal Processing and Information Communications (ICSPIC 2023), which was held in Singapore, on February 25-27, 2023. The conference aims to provide a leading international forum for researchers, practitioners, and profe
<span>This book constitutes the refereed proceedings of the Second International Conference on Advances in Communication, Network, and Computing, CNC 2011, held in Bangalore, India, in March 2011. The 41 revised full papers, presented together with 50 short papers and 39 poster papers, were carefull