Vai al contenuto principale della pagina

Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (170 pages)
Disciplina: 354.81150006
Soggetto topico: Internet of things
Persona (resp. second.): LinYi-Bing <1961->
DengDer-Jiunn
YangChao-Tung
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Applications on Internet of Things -- Intellectual Property Protection of Zhuang Nationality Funeral Culture on Internet of Things -- 1 Introduction -- 2 Literature Review of Intangible Cultural Heritage -- 2.1 Researches on the Intellectual Property Rights of the Intangible Cultural Heritage -- 2.2 Researches on the Digital Protection of Intangible Cultural Heritage -- 3 Analysis of the Intangible Cultural Heritage Problems -- 4 Countermeasures for Intellectual Property Protection of Zhuang Nationality Funeral Culture -- 4.1 Countermeasures for the Trademark Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.2 Countermeasures for the Copyright Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.3 Countermeasures for Protecting Guangxi Zhuang Nationality Funeral Culture by Using the Big Data -- 5 Conclusion -- References -- China IoT UBI Car Insurance Regulatory Development Trend -- 1 Introduction -- 2 Introduction -- 2.1 Research on Driving Behavior -- 2.2 Research on Risk Assessment of UBI and Construction of Related Data Model -- 2.3 Research on the Dilemma of UBI in China -- 3 Analysis of UBI in China -- 3.1 History of UBI in China -- 3.2 UBI Technology in China -- 3.3 China IoT UBI Car Insurance System -- 3.4 CHina's Auto Insurance Laws and Regulations -- 4 CHINA's Regulatory Measures for IoT UBI -- 4.1 Legislative Supervision -- 4.2 Supervision from Government -- 4.3 Supervision of Enterprises -- 5 Conclusion -- References -- Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability -- 1 Introduction -- 2 Literature Review -- 2.1 Posture Detection Method Based on Human Skeleton Extraction -- 2.2 Analysis and Comparison Based on the Human Skeleton Extraction Method -- 2.3 Violent Incident Detection Based on Image Recognition.
3 Data Collection and Human Skeleton Extraction -- 3.1 Data Collection in Daily Care Environment -- 3.2 Human Skeleton Extraction Based on OpenPose -- 4 Real-Time Violence Detection Method -- 4.1 Extraction of Feature Values -- 4.2 Model Pre-training Stage -- 4.3 Real-Time Violence Detection Stage -- 5 Results -- 6 Conclusions -- References -- Aquaculture Monitoring Systems Based on Lightweight Kubernetes and Rancher -- 1 Introduction -- 2 Literature Review -- 2.1 LoraWAN -- 2.2 Rancher Kubernetes Engine -- 2.3 Docker -- 2.4 InfluxDB -- 3 System Design -- 3.1 Edge Devices -- 3.2 Network -- 4 Experimental Results -- 4.1 Edge Devices -- 4.2 Networks and Sensors -- 5 Discussion -- 6 Conclusion -- References -- Design and Implementation of Water Monitoring Using LoRa and NB-IoT -- 1 Introduction -- 2 Background Review and Related Study -- 2.1 The Internet of Things (IoT) -- 2.2 The Array of Things (AoT) -- 2.3 NB-IoT -- 2.4 Related Study -- 3 System Architecture -- 4 Experimental Results -- 4.1 Device Installation -- 4.2 Water Monitoring System -- 5 Conclusion -- References -- InterWorking Function for Mission Critical Push to Talk Services -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 1.3 Goal and Contributions -- 2 The Design and Implementation of the IWF Prototype Platform -- 2.1 System Architecture -- 2.2 Related Protocols -- 3 Group Configuration Procedures -- 3.1 Requesting the List of Existing Groups -- 3.2 Requesting the List of Affiliated Groups -- 3.3 Affiliation -- 3.4 De-affiliation -- 4 Floor Control -- 5 Procedures for Initiating Group Call -- 5.1 LMR User Initiates Group Call -- 5.2 MC User Initiates Group Call -- 6 Verification of the Implemented Procedures -- 6.1 Group Configuration -- 6.2 LMR User Initiating Group Call -- 6.3 MC User Initiating Group Call -- 7 Conclusion -- References.
Communication Security, Big Data, Neural Networks and Machine Learning -- Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications -- 1 Introduction -- 2 Related Works and Limitations -- 2.1 Generic System Model -- 2.2 Preliminaries -- 2.3 Adversary Model -- 2.4 Security Requirements -- 3 Proposed Scheme -- 4 Security Analysis and Performance Evaluation -- 4.1 Security Requirements Analysis -- 4.2 Performance Evaluation -- 4.3 Computation Cost -- 4.4 Communication Cost -- 5 Conclusion -- References -- Design and Implementation of Distributed Image Recognition App with Federal Learning Techniques -- 1 Introduction -- 2 Background Review and Related Works -- 2.1 Federated Learning -- 2.2 Convolutional Neural Networks -- 2.3 Kotlin -- 3 Background Review and Related Works -- 4 Experimental Results -- 4.1 The Hardware and Software Environment -- 4.2 Datasets -- 4.3 Implementation of App System -- 5 Conclusion -- References -- Improving Vision Clarity and Object Detection Accuracy in Heavy Rain Base on Neural Network -- 1 Introduction -- 2 Related Works -- 2.1 Object Detection -- 2.2 Image Restoration -- 3 Methods -- 3.1 Networks -- 3.2 Obtaining Rain and Restoring Street Images -- 3.3 Tracking Object Recognition Accuracy -- 4 Result -- 5 Conclusions -- References -- An Enhanced Location-Data Differential Privacy Protection Method Based on Filter -- 1 Introduction -- 2 Related Work -- 3 Differential Privacy -- 3.1 Differential Privacy Conceptions -- 3.2 Mechanisms to Achieving Differential Privacy -- 4 Location Data Query Differential Privacy Protection Algorithm Based on Filter Mechanism -- 4.1 Location Data -- 4.2 Location Data Query Privacy Protection Mechanism -- 4.3 Kalman Filtering Mechanism -- 5 Experimental Evaluation -- 5.1 Experimental Datasets and Environment.
5.2 Validation of Parameter R Selection in Filter Mechanism -- 5.3 Experiment and Analysis -- 6 Conclusions -- References -- Big Data Grave Register Information Management System Outside Cemeteries Under Internet of Things -- 1 Introduction -- 2 Literature Review -- 3 The Analysis of Tomb Information Management System Through Big Data -- 3.1 Data Collection of Tomb Information Management System -- 3.2 Data Analysis of Tomb Information Management System -- 4 The Construction of Big Data Tomb Information Management System -- 5 Conclusion -- References -- Critical Feature Selection and Machine Learning-based Models for Monofacial and Bifacial Photovoltaics -- 1 Introduction -- 2 Methodology -- 2.1 Simulations Model Details -- 2.2 Range of Parameters -- 2.3 Selection of Locations -- 2.4 Feature Selection -- 2.5 Machine Learning Model -- 3 Results and Discussion -- 4 Conclusion -- References -- Study on the Discovery of Personal Information on the Network of People Diagnosed with COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Problem Analysis -- 3.1 Global Pandemic Situation and Impact Analysis -- 3.2 Analysis of the Current Situation of Disclosure of Personal Information of COVID-19 Patients -- 3.3 Analysis of Information Disclosure of COVID-19 Confirmed Patients -- 4 Perfection and Suggestions -- 4.1 Balance Between Public Interests and Private Interests -- 4.2 Improve the System of Personal Privacy Information Disclosure -- 5 Summarize -- References -- Author Index.
Titolo autorizzato: Smart Grid and Internet of Things  Visualizza cluster
ISBN: 3-031-20398-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996499854003316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering