International Conference on Cloud Computing and Computer Networks (eBook, PDF)
CCCN 2023
213,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
International Conference on Cloud Computing and Computer Networks (eBook, PDF)
CCCN 2023
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book covers selected and presented papers of CCCN 2023, the International Conference on Cloud Computing and Computer Network which was held in Singapore April 21-23, 2023. CCCN 2023 provides a premier forum for researchers and scholars from multiple disciplines to come together to share knowledge, discuss ideas, exchange information, and learn about cutting-edge research in diverse fields of cloud computing and computer networks. Topics covered in this book contain cloud computing and semantic web technologies, cloud applications in vertical industries, cloud computing architecture and…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 6.92MB
- Upload möglich
Andere Kunden interessierten sich auch für
- The Second International Adaptive and Sustainable Science, Engineering and Technology Conference (eBook, PDF)181,89 €
- 4th International Conference on Electronics and Signal Processing (eBook, PDF)213,99 €
- 6th International Conference on Signal Processing and Information Communications (eBook, PDF)223,63 €
- The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication (eBook, PDF)223,63 €
- 2nd International Congress of Electrical and Computer Engineering (eBook, PDF)181,89 €
- 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (eBook, PDF)213,99 €
- Proceedings of the 5th International Conference on Signal Processing and Information Communications (eBook, PDF)234,33 €
-
-
-
This book covers selected and presented papers of CCCN 2023, the International Conference on Cloud Computing and Computer Network which was held in Singapore April 21-23, 2023. CCCN 2023 provides a premier forum for researchers and scholars from multiple disciplines to come together to share knowledge, discuss ideas, exchange information, and learn about cutting-edge research in diverse fields of cloud computing and computer networks. Topics covered in this book contain cloud computing and semantic web technologies, cloud applications in vertical industries, cloud computing architecture and systems, cloud computing models, simulations and designs among others. The content is relevant to academics, researchers, students, and professionals in cloud computing and computer networks.
Produktdetails
- Produktdetails
- Verlag: Springer Nature Switzerland
- Erscheinungstermin: 23. Januar 2024
- Englisch
- ISBN-13: 9783031471001
- Artikelnr.: 69841654
- Verlag: Springer Nature Switzerland
- Erscheinungstermin: 23. Januar 2024
- Englisch
- ISBN-13: 9783031471001
- Artikelnr.: 69841654
Lei Meng selected in the Qilu Young Scholar (Tier-1) program, has been Professor with the School of Software, Shandong University since 2020. He received the B.Eng.’s degree in Shandong University, China in 2010, and obtained the PhD’s degree in Nanyang Technological University, Singapore in 2015, supervised by Prof. Ah-Hwee Tan. Taking the position of Research Fellow in 2015, he joined the Joint NTU-UBC Research Center of Excellence in Active Living for the Elderly (LILY), Nanyang Technological University, working with Prof. Chunyan Miao (Nanyang Technological University) and Prof. Cyril Leung (University of British Columbia). In 2018, he joined the NUS-Tsinghua-Southampton Centre for Extreme Search (NExT++), National University of Singapore, working as Senior Research Fellow with Prof. Tat-Seng Chua. He has been engaged in the research of machine learning theory and technology for big multimedia data analytics, with a focus on the directions of clustering, knowledge discoveryand data mining, and multimodal recognition and retrieval. His current research interests lie in the topics of adaptive resonance theory (ART), deep learning and their AI-powered applications in multimedia, data mining, and healthcare. He has published a book with Springer and more than twenty conference and journal papers at top and renowned venues, such as TKDE, TCYB, TMM, TNNLS, Neural Networks, MM, and AAAI. He has filed two international patents and taken in charge of a national program from the national natural science foundation of China. He is the editorial board member of Applied Soft Computing and have served as Program/Technical Committee member and Reviewer for a number of high-quality conferences and journals, such as MM, SIGIR, AAAI, IJCAI, KDD, ICDM, SDM, and TNNLS. He is a member of the International Neural Network Society (INNS), the Institute of Electrical and Electronics Engineers (IEEE), and the Association for the Advancement of Artificial Intelligence (AAAI).
Part I- Chapter 1. Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Chapter 2. Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- Chapter 3. An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Chapter 4. Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction.- Part II- Chapter 5. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Chapter 6. Provisioning Deep Learning Inference on a Fog Computing Architecture.- Chapter 7. A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Chapter 8. Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Chapter 9. Radio Frequency Identification Vulnerabilities: AnAnalysis on RFID-Related Physical Controls in an Infrastructure .- Part III- Chapter 10. Analysis of Bee Population and the Relationship with Time.- Chapter 11. Synthetic speech data generation using Generative Adversarial Networks.- Chapter 12. Prediction of bee population and number of beehives required for pollination of a 20-acre parcel crop.
Part I- Chapter 1. Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Chapter 2. Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- Chapter 3. An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Chapter 4. Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction.- Part II- Chapter 5. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Chapter 6. Provisioning Deep Learning Inference on a Fog Computing Architecture.- Chapter 7. A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Chapter 8. Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Chapter 9. Radio Frequency Identification Vulnerabilities: AnAnalysis on RFID-Related Physical Controls in an Infrastructure .- Part III- Chapter 10. Analysis of Bee Population and the Relationship with Time.- Chapter 11. Synthetic speech data generation using Generative Adversarial Networks.- Chapter 12. Prediction of bee population and number of beehives required for pollination of a 20-acre parcel crop.
Part I- Chapter 1. Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Chapter 2. Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- Chapter 3. An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Chapter 4. Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction.- Part II- Chapter 5. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Chapter 6. Provisioning Deep Learning Inference on a Fog Computing Architecture.- Chapter 7. A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Chapter 8. Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Chapter 9. Radio Frequency Identification Vulnerabilities: AnAnalysis on RFID-Related Physical Controls in an Infrastructure .- Part III- Chapter 10. Analysis of Bee Population and the Relationship with Time.- Chapter 11. Synthetic speech data generation using Generative Adversarial Networks.- Chapter 12. Prediction of bee population and number of beehives required for pollination of a 20-acre parcel crop.
Part I- Chapter 1. Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Chapter 2. Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- Chapter 3. An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Chapter 4. Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction.- Part II- Chapter 5. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Chapter 6. Provisioning Deep Learning Inference on a Fog Computing Architecture.- Chapter 7. A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Chapter 8. Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Chapter 9. Radio Frequency Identification Vulnerabilities: AnAnalysis on RFID-Related Physical Controls in an Infrastructure .- Part III- Chapter 10. Analysis of Bee Population and the Relationship with Time.- Chapter 11. Synthetic speech data generation using Generative Adversarial Networks.- Chapter 12. Prediction of bee population and number of beehives required for pollination of a 20-acre parcel crop.