This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 22 full papers…mehr
This book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 22 full papers of ICECI 2022 were selected from 76 submissions and present results and ideas in the area of edge computing and IoT.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
Models and methods for data management in IoT.- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data.- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof.- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing.- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm.- Precise Segmentation on Poly-Yolo, YoloV5 and FCN.- Adaptive approaches to manage energy consumption and security of systems.- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data.- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries.- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework.- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks.- Edge Intelligence Based Garbage Classification Detection Method.- Mobile computing in wireless networks.- Evaluation of Higher Education System.- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions.- An Empirical Study of Worldwide Plastic Waste Mitigation.- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence.- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence.- Distributed computing in IOT.- Edge Intelligence Based Garbage Classification Detection Method.- Adversarial Example Attacks in Internet of Things (IoT).- Training Node Screening in Decentralized Trusted Federated Learning.- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing.- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in EdgeDevices.- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence.- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.
Models and methods for data management in IoT.- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data.- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof.- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing.- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm.- Precise Segmentation on Poly-Yolo, YoloV5 and FCN.- Adaptive approaches to manage energy consumption and security of systems.- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data.- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries.- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework.- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks.- Edge Intelligence Based Garbage Classification Detection Method.- Mobile computing in wireless networks.- Evaluation of Higher Education System.- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions.- An Empirical Study of Worldwide Plastic Waste Mitigation.- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence.- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence.- Distributed computing in IOT.- Edge Intelligence Based Garbage Classification Detection Method.- Adversarial Example Attacks in Internet of Things (IoT).- Training Node Screening in Decentralized Trusted Federated Learning.- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing.- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in EdgeDevices.- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence.- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826