Advanced technologies, embedded and multimedia for human-centric computing : HumanCom and EMC 2013 / / Yueh-Min Huang, Han-Chieh Chao, Der-Jiunn Deng, James J. (Jong Hyuk) Park, editors |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Dordrecht, Netherlands : , : Springer, , 2014 |
Descrizione fisica | 1 online resource (xix, 1281 pages) : illustrations (chiefly color) |
Disciplina | 006.6 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico | Human-computer interaction |
ISBN | 94-007-7262-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | HumanCom -- Special Session -- Exploration of Scientific Evidence on Affective Learning -- Multimedia Technology for Education -- Modern Learning Technologies and Applications with Smart Mobile Devices -- Embedded Computing -- Multimedia Computing -- Smart System -- Cross Strait Conference on Information Science and Technology -- Advances in Multimedia Algorithms, Architectures, and Applications -- Virtual Reality for Medical Applications -- Recent Advances on Video Analysis and its Applications -- All-IP Platforms, Services and Internet of Things in Future -- Networking and Applications. |
Record Nr. | UNINA-9910299710003321 |
Dordrecht, Netherlands : , : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IoT as a Service : Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Ilsun You, Chun-Cheng Lin |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 400 p. 215 illus.) |
Disciplina |
004
004.678 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Special purpose computers Application software User interfaces (Computer systems) Coding theory Information theory Computer security Computer Communication Networks Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) User Interfaces and Human Computer Interaction Coding and Information Theory Systems and Data Security |
ISBN | 3-030-00410-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Contention Window Size Adjustment in Unsaturated IEEE 802.11 WLANs -- Interoperability in Internet of Things Infrastructure: Classification, Challenges, and Future Work -- Orientation Training System for Elders with Dementia Using Internet of Things -- Demand-Based Radio Resource Allocation for Device-to-Device Communications: A Game Approach -- A Cooperative RBAC-Based IoTs Server with Trust Evaluation Mechanism -- Home Healthcare Matching Service System Using IoT -- Medical Internet of Things and Legal issues regarding Cybersecurity -- Fuzzy-based protocol for secure remote diagnosis of IoT devices in 5G networks -- An overview of 802.21a-2012 and its incorporation into IoT-Fog networks using osmotic framework -- Loading Aware Green Power Control (LAGPC) for the Mitigation of Co-Tier Downlink Interference for Femtocell in the Future 5G Networks -- Analyzing Traffic Characteristics and Performance for LTE Uplink Resource Allocation -- Reusing Resource Blocks by Efficient Grouping for D2D in LTE Networks -- An IoT Platform for Smart Plant Care -- Dandelion Mirror: An Interactive Visual Design using IoTtalk -- Metaheuristic-based Scheme for Spectrum Resource Schedule over 5G IoT Network -- A Fuel-Efficient Route Plan App Based on Game Theory -- Personalized Mobile Learning System via Smart Glasses -- Retransmission-Based Access Class Barring for Machine Type Communications -- A Study on Online Corrosion Risk Perception Technology for Process Industry Safety IoTs Based on Demands of Assets Integrity Management -- A Machine Learning based PM2.5 Forecasting Framework using Internet of Environmental Things -- Improved Single Packet Traceback Scheme with Bloom Filters -- Using Nonverbal Information for Conversation Partners Inference by Wearable Devices -- Enabling Over-The-Air Provisioning for Wearable Devices -- Multiple User Activities Recognition in Smart Home -- D2D-Based Resource Saving and Throughput -- Enhancement for Massive Smart Devices in LTE eMBMS -- Intelligent Trashcan Applications Relying on Internet of Things Technologies -- A Local Customizable Gateway in General-Purpose IoT Framework -- Analysis of Maximum Depth of Wireless Sensor Network based on RPL and IEEE 802.15.4 -- Lightweight, Low-Rate Denial-of-Service Attack Prevention and Control Program for IoT Devices -- The Applications for IoT Sensor Bricks -- An optimized implementation of Speech Recognition combining GPU with Deep Belief Network for IoT -- An Adaptive Solution for Images Streaming in Vehicle Networks Using MQTT Protocol -- Development of Path Planning Approach Based on Improved A-star Algorithm in AGV System -- A self-administered healthcare warning mechanism based on Internet of Things -- IoT Service Provider Recommender Model using Trust Strength -- Research on the condition monitoring of transmission and transformation equipment based on improved support vector machine in the Internet of things -- A Dynamic Detection Point Frame Length Adjustment Method for RFID Anti-Collision -- Fault Diagnosis and Monitoring Device Design for the Electrical Life Test of Low Voltage Circuit Breaker Mainland China -- Sound-wave Transmission System in Mobile Device -- UE-group based Multi-beams Subchannel Assignment for mmWave Cellular Networks -- SVC based Multiple Access Protocol with QoS Guarantee for Next Generation WLAN -- Light-weight Global Feature for Mobile Clothing Search -- Spatial Clustering Group Based OFDMA Multiple Access Scheme for the Next Generation WLAN -- T-SCMA : Time Domain Sparse Code Multiple Access for Narrow Band Internet of Things (NB-IoT) -- Semi-granted Sparse Code Multiple Access (SCMA) for 5G Networks -- A Flow Network based Backhaul Path Planning Algorithm for mmWave Small Cell Networks. |
Record Nr. | UNINA-9910299359603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Grid and Internet of Things : 6th EAI International Conference, SGIoT 2022, TaiChung, Taiwan, November 19-20, 2022, Proceedings / / Der-Jiunn Deng, Han-Chieh Chao, and Jyh-Cheng Chen, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , [2023] |
Descrizione fisica | 1 online resource (392 pages) |
Disciplina | 621.319 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series |
Soggetto topico |
Smart power grids
Internet of things |
ISBN |
9783031312755
9783031312748 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | IoT, Communication Security, Data Mining or Big Data -- Research on informatization platform of university performance appraisal based on big data collection based on Internet of Things technology -- The impact of disposal effects generated by Internet of Things technology on quantitative investment -- A Survey on IoT Modules: Architecture, Key Technologies and Future Directions -- The Calibration of inspection data on juvenile theft cases in 5G context and IOT age -- A Cross-domain Authentication Scheme Based Master-slave Chain In Edge Computing -- Balance of interests: the legal path of data circulation and utilization in the Internet of Things era -- Hybrid AI-based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof -- Digital Transformation Application of Precision Industrial Quotation System -- Balance between Data Circulation and Personal Information Protection -- Artificial Intelligence, Machine Leaning, Deep Learning & Neural network -- Combined Short-term Load Forecasting Method Based on HHT -- Research on edge computing offloading based on reinforcement learning in multi-user scenarios -- Design of Malicious Code Detection System Based on Convolutional Neural Network -- Comprehensive Task Priority Queue for Resource Allocation in Vehicle Edge Computing Network Based on Deep Reinforcement Learning -- Applying the Shapley Value Method to Predict Mortality in Liver Cancer based on Explainable AI -- Face Emotion Expression Recognition using DLIB Model and Convolutional Neural Network Approach for Supporting Online Learning -- Image Classification for Smoke and Flame Recognition using CNN and Transfer Learning on Edge Device -- WLAN, Wireless Internet 5G -- Non-Uniform Time Slice Parallel Simulation Method Based on Offline Learning for IEEE 802 -- A Joint Optimization Method for Scheduling and Random Access Based on the Idea of Particle-based Access in IEEE 802.11ax -- A Two-Level Adaptive Resource Allocation Algorithm for Quality of Service Guarantee in Home WiFi Networks -- Joint Energy Detection and Transmission Power Adjustment for FIM problem in High Density WLANs -- An Uplink OFDMA Access Method for Low Latency in Next-generation WLANs -- Edge Station Throughput Enhancement Method based on Energy Detection Threshold and Transmission Power Joint Dynamic Adjustment -- A Channel Reservation Mechanism in IEEE 802.11be for Multi-Cell Scenarios -- An Adaptive Beamtracking Method for the Next Generation mmWave WLAN -- A Collision Aware Multi-link Operation for Next Generation WLAN -- Protocol, Algorithm, Services and Applications -- Angular Position Estimation For Human-Following and Robot Navigation -- Social Risk Analysis of Smart Grid Based on Emerging Technologies in the Chinese Context: A Review Based on CiteSpace -- Using HTC Vive to Design a Virtual Reality Simulation Environment on Radiography -- Bidirectional Scanning Based Medium Access Control Algorithm in Directional Aviation Relay Network with Multiple Air Nodes -- Research on Backbone Routing Protocol of Ad Hoc Network based on SDN -- A Coexistence Method of Short-range Heterogeneous Network based on Cell Cooperation -- Using Push Technology to Discover Factors Influencing Consumers’ Intention to Purchase Greenwashed Products -- A Real-time Streaming Application for License Plate Recognition Using OpenALPR. |
Record Nr. | UNINA-9910720065203321 |
Cham, Switzerland : , : ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Grid and Internet of Things : 6th EAI International Conference, SGIoT 2022, TaiChung, Taiwan, November 19-20, 2022, Proceedings / / Der-Jiunn Deng, Han-Chieh Chao, and Jyh-Cheng Chen, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , [2023] |
Descrizione fisica | 1 online resource (392 pages) |
Disciplina | 621.319 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series |
Soggetto topico |
Smart power grids
Internet of things |
ISBN |
9783031312755
9783031312748 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | IoT, Communication Security, Data Mining or Big Data -- Research on informatization platform of university performance appraisal based on big data collection based on Internet of Things technology -- The impact of disposal effects generated by Internet of Things technology on quantitative investment -- A Survey on IoT Modules: Architecture, Key Technologies and Future Directions -- The Calibration of inspection data on juvenile theft cases in 5G context and IOT age -- A Cross-domain Authentication Scheme Based Master-slave Chain In Edge Computing -- Balance of interests: the legal path of data circulation and utilization in the Internet of Things era -- Hybrid AI-based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof -- Digital Transformation Application of Precision Industrial Quotation System -- Balance between Data Circulation and Personal Information Protection -- Artificial Intelligence, Machine Leaning, Deep Learning & Neural network -- Combined Short-term Load Forecasting Method Based on HHT -- Research on edge computing offloading based on reinforcement learning in multi-user scenarios -- Design of Malicious Code Detection System Based on Convolutional Neural Network -- Comprehensive Task Priority Queue for Resource Allocation in Vehicle Edge Computing Network Based on Deep Reinforcement Learning -- Applying the Shapley Value Method to Predict Mortality in Liver Cancer based on Explainable AI -- Face Emotion Expression Recognition using DLIB Model and Convolutional Neural Network Approach for Supporting Online Learning -- Image Classification for Smoke and Flame Recognition using CNN and Transfer Learning on Edge Device -- WLAN, Wireless Internet 5G -- Non-Uniform Time Slice Parallel Simulation Method Based on Offline Learning for IEEE 802 -- A Joint Optimization Method for Scheduling and Random Access Based on the Idea of Particle-based Access in IEEE 802.11ax -- A Two-Level Adaptive Resource Allocation Algorithm for Quality of Service Guarantee in Home WiFi Networks -- Joint Energy Detection and Transmission Power Adjustment for FIM problem in High Density WLANs -- An Uplink OFDMA Access Method for Low Latency in Next-generation WLANs -- Edge Station Throughput Enhancement Method based on Energy Detection Threshold and Transmission Power Joint Dynamic Adjustment -- A Channel Reservation Mechanism in IEEE 802.11be for Multi-Cell Scenarios -- An Adaptive Beamtracking Method for the Next Generation mmWave WLAN -- A Collision Aware Multi-link Operation for Next Generation WLAN -- Protocol, Algorithm, Services and Applications -- Angular Position Estimation For Human-Following and Robot Navigation -- Social Risk Analysis of Smart Grid Based on Emerging Technologies in the Chinese Context: A Review Based on CiteSpace -- Using HTC Vive to Design a Virtual Reality Simulation Environment on Radiography -- Bidirectional Scanning Based Medium Access Control Algorithm in Directional Aviation Relay Network with Multiple Air Nodes -- Research on Backbone Routing Protocol of Ad Hoc Network based on SDN -- A Coexistence Method of Short-range Heterogeneous Network based on Cell Cooperation -- Using Push Technology to Discover Factors Influencing Consumers’ Intention to Purchase Greenwashed Products -- A Real-time Streaming Application for License Plate Recognition Using OpenALPR. |
Record Nr. | UNISA-996547950203316 |
Cham, Switzerland : , : ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (170 pages) |
Disciplina | 354.81150006 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Internet of things |
ISBN | 3-031-20398-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Applications on Internet of Things -- Intellectual Property Protection of Zhuang Nationality Funeral Culture on Internet of Things -- 1 Introduction -- 2 Literature Review of Intangible Cultural Heritage -- 2.1 Researches on the Intellectual Property Rights of the Intangible Cultural Heritage -- 2.2 Researches on the Digital Protection of Intangible Cultural Heritage -- 3 Analysis of the Intangible Cultural Heritage Problems -- 4 Countermeasures for Intellectual Property Protection of Zhuang Nationality Funeral Culture -- 4.1 Countermeasures for the Trademark Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.2 Countermeasures for the Copyright Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.3 Countermeasures for Protecting Guangxi Zhuang Nationality Funeral Culture by Using the Big Data -- 5 Conclusion -- References -- China IoT UBI Car Insurance Regulatory Development Trend -- 1 Introduction -- 2 Introduction -- 2.1 Research on Driving Behavior -- 2.2 Research on Risk Assessment of UBI and Construction of Related Data Model -- 2.3 Research on the Dilemma of UBI in China -- 3 Analysis of UBI in China -- 3.1 History of UBI in China -- 3.2 UBI Technology in China -- 3.3 China IoT UBI Car Insurance System -- 3.4 CHina's Auto Insurance Laws and Regulations -- 4 CHINA's Regulatory Measures for IoT UBI -- 4.1 Legislative Supervision -- 4.2 Supervision from Government -- 4.3 Supervision of Enterprises -- 5 Conclusion -- References -- Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability -- 1 Introduction -- 2 Literature Review -- 2.1 Posture Detection Method Based on Human Skeleton Extraction -- 2.2 Analysis and Comparison Based on the Human Skeleton Extraction Method -- 2.3 Violent Incident Detection Based on Image Recognition.
3 Data Collection and Human Skeleton Extraction -- 3.1 Data Collection in Daily Care Environment -- 3.2 Human Skeleton Extraction Based on OpenPose -- 4 Real-Time Violence Detection Method -- 4.1 Extraction of Feature Values -- 4.2 Model Pre-training Stage -- 4.3 Real-Time Violence Detection Stage -- 5 Results -- 6 Conclusions -- References -- Aquaculture Monitoring Systems Based on Lightweight Kubernetes and Rancher -- 1 Introduction -- 2 Literature Review -- 2.1 LoraWAN -- 2.2 Rancher Kubernetes Engine -- 2.3 Docker -- 2.4 InfluxDB -- 3 System Design -- 3.1 Edge Devices -- 3.2 Network -- 4 Experimental Results -- 4.1 Edge Devices -- 4.2 Networks and Sensors -- 5 Discussion -- 6 Conclusion -- References -- Design and Implementation of Water Monitoring Using LoRa and NB-IoT -- 1 Introduction -- 2 Background Review and Related Study -- 2.1 The Internet of Things (IoT) -- 2.2 The Array of Things (AoT) -- 2.3 NB-IoT -- 2.4 Related Study -- 3 System Architecture -- 4 Experimental Results -- 4.1 Device Installation -- 4.2 Water Monitoring System -- 5 Conclusion -- References -- InterWorking Function for Mission Critical Push to Talk Services -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 1.3 Goal and Contributions -- 2 The Design and Implementation of the IWF Prototype Platform -- 2.1 System Architecture -- 2.2 Related Protocols -- 3 Group Configuration Procedures -- 3.1 Requesting the List of Existing Groups -- 3.2 Requesting the List of Affiliated Groups -- 3.3 Affiliation -- 3.4 De-affiliation -- 4 Floor Control -- 5 Procedures for Initiating Group Call -- 5.1 LMR User Initiates Group Call -- 5.2 MC User Initiates Group Call -- 6 Verification of the Implemented Procedures -- 6.1 Group Configuration -- 6.2 LMR User Initiating Group Call -- 6.3 MC User Initiating Group Call -- 7 Conclusion -- References. Communication Security, Big Data, Neural Networks and Machine Learning -- Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications -- 1 Introduction -- 2 Related Works and Limitations -- 2.1 Generic System Model -- 2.2 Preliminaries -- 2.3 Adversary Model -- 2.4 Security Requirements -- 3 Proposed Scheme -- 4 Security Analysis and Performance Evaluation -- 4.1 Security Requirements Analysis -- 4.2 Performance Evaluation -- 4.3 Computation Cost -- 4.4 Communication Cost -- 5 Conclusion -- References -- Design and Implementation of Distributed Image Recognition App with Federal Learning Techniques -- 1 Introduction -- 2 Background Review and Related Works -- 2.1 Federated Learning -- 2.2 Convolutional Neural Networks -- 2.3 Kotlin -- 3 Background Review and Related Works -- 4 Experimental Results -- 4.1 The Hardware and Software Environment -- 4.2 Datasets -- 4.3 Implementation of App System -- 5 Conclusion -- References -- Improving Vision Clarity and Object Detection Accuracy in Heavy Rain Base on Neural Network -- 1 Introduction -- 2 Related Works -- 2.1 Object Detection -- 2.2 Image Restoration -- 3 Methods -- 3.1 Networks -- 3.2 Obtaining Rain and Restoring Street Images -- 3.3 Tracking Object Recognition Accuracy -- 4 Result -- 5 Conclusions -- References -- An Enhanced Location-Data Differential Privacy Protection Method Based on Filter -- 1 Introduction -- 2 Related Work -- 3 Differential Privacy -- 3.1 Differential Privacy Conceptions -- 3.2 Mechanisms to Achieving Differential Privacy -- 4 Location Data Query Differential Privacy Protection Algorithm Based on Filter Mechanism -- 4.1 Location Data -- 4.2 Location Data Query Privacy Protection Mechanism -- 4.3 Kalman Filtering Mechanism -- 5 Experimental Evaluation -- 5.1 Experimental Datasets and Environment. 5.2 Validation of Parameter R Selection in Filter Mechanism -- 5.3 Experiment and Analysis -- 6 Conclusions -- References -- Big Data Grave Register Information Management System Outside Cemeteries Under Internet of Things -- 1 Introduction -- 2 Literature Review -- 3 The Analysis of Tomb Information Management System Through Big Data -- 3.1 Data Collection of Tomb Information Management System -- 3.2 Data Analysis of Tomb Information Management System -- 4 The Construction of Big Data Tomb Information Management System -- 5 Conclusion -- References -- Critical Feature Selection and Machine Learning-based Models for Monofacial and Bifacial Photovoltaics -- 1 Introduction -- 2 Methodology -- 2.1 Simulations Model Details -- 2.2 Range of Parameters -- 2.3 Selection of Locations -- 2.4 Feature Selection -- 2.5 Machine Learning Model -- 3 Results and Discussion -- 4 Conclusion -- References -- Study on the Discovery of Personal Information on the Network of People Diagnosed with COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Problem Analysis -- 3.1 Global Pandemic Situation and Impact Analysis -- 3.2 Analysis of the Current Situation of Disclosure of Personal Information of COVID-19 Patients -- 3.3 Analysis of Information Disclosure of COVID-19 Confirmed Patients -- 4 Perfection and Suggestions -- 4.1 Balance Between Public Interests and Private Interests -- 4.2 Improve the System of Personal Privacy Information Disclosure -- 5 Summarize -- References -- Author Index. |
Record Nr. | UNISA-996499854003316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart grid and internet of things : 5th EAI international conference, SGIoT 2021, virtual event, December 18-19, 2021, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng, Chao-Tung Yang |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (170 pages) |
Disciplina | 354.81150006 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Internet of things |
ISBN | 3-031-20398-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Applications on Internet of Things -- Intellectual Property Protection of Zhuang Nationality Funeral Culture on Internet of Things -- 1 Introduction -- 2 Literature Review of Intangible Cultural Heritage -- 2.1 Researches on the Intellectual Property Rights of the Intangible Cultural Heritage -- 2.2 Researches on the Digital Protection of Intangible Cultural Heritage -- 3 Analysis of the Intangible Cultural Heritage Problems -- 4 Countermeasures for Intellectual Property Protection of Zhuang Nationality Funeral Culture -- 4.1 Countermeasures for the Trademark Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.2 Countermeasures for the Copyright Protection of Guangxi Zhuang Nationality Funeral Culture -- 4.3 Countermeasures for Protecting Guangxi Zhuang Nationality Funeral Culture by Using the Big Data -- 5 Conclusion -- References -- China IoT UBI Car Insurance Regulatory Development Trend -- 1 Introduction -- 2 Introduction -- 2.1 Research on Driving Behavior -- 2.2 Research on Risk Assessment of UBI and Construction of Related Data Model -- 2.3 Research on the Dilemma of UBI in China -- 3 Analysis of UBI in China -- 3.1 History of UBI in China -- 3.2 UBI Technology in China -- 3.3 China IoT UBI Car Insurance System -- 3.4 CHina's Auto Insurance Laws and Regulations -- 4 CHINA's Regulatory Measures for IoT UBI -- 4.1 Legislative Supervision -- 4.2 Supervision from Government -- 4.3 Supervision of Enterprises -- 5 Conclusion -- References -- Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability -- 1 Introduction -- 2 Literature Review -- 2.1 Posture Detection Method Based on Human Skeleton Extraction -- 2.2 Analysis and Comparison Based on the Human Skeleton Extraction Method -- 2.3 Violent Incident Detection Based on Image Recognition.
3 Data Collection and Human Skeleton Extraction -- 3.1 Data Collection in Daily Care Environment -- 3.2 Human Skeleton Extraction Based on OpenPose -- 4 Real-Time Violence Detection Method -- 4.1 Extraction of Feature Values -- 4.2 Model Pre-training Stage -- 4.3 Real-Time Violence Detection Stage -- 5 Results -- 6 Conclusions -- References -- Aquaculture Monitoring Systems Based on Lightweight Kubernetes and Rancher -- 1 Introduction -- 2 Literature Review -- 2.1 LoraWAN -- 2.2 Rancher Kubernetes Engine -- 2.3 Docker -- 2.4 InfluxDB -- 3 System Design -- 3.1 Edge Devices -- 3.2 Network -- 4 Experimental Results -- 4.1 Edge Devices -- 4.2 Networks and Sensors -- 5 Discussion -- 6 Conclusion -- References -- Design and Implementation of Water Monitoring Using LoRa and NB-IoT -- 1 Introduction -- 2 Background Review and Related Study -- 2.1 The Internet of Things (IoT) -- 2.2 The Array of Things (AoT) -- 2.3 NB-IoT -- 2.4 Related Study -- 3 System Architecture -- 4 Experimental Results -- 4.1 Device Installation -- 4.2 Water Monitoring System -- 5 Conclusion -- References -- InterWorking Function for Mission Critical Push to Talk Services -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 1.3 Goal and Contributions -- 2 The Design and Implementation of the IWF Prototype Platform -- 2.1 System Architecture -- 2.2 Related Protocols -- 3 Group Configuration Procedures -- 3.1 Requesting the List of Existing Groups -- 3.2 Requesting the List of Affiliated Groups -- 3.3 Affiliation -- 3.4 De-affiliation -- 4 Floor Control -- 5 Procedures for Initiating Group Call -- 5.1 LMR User Initiates Group Call -- 5.2 MC User Initiates Group Call -- 6 Verification of the Implemented Procedures -- 6.1 Group Configuration -- 6.2 LMR User Initiating Group Call -- 6.3 MC User Initiating Group Call -- 7 Conclusion -- References. Communication Security, Big Data, Neural Networks and Machine Learning -- Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications -- 1 Introduction -- 2 Related Works and Limitations -- 2.1 Generic System Model -- 2.2 Preliminaries -- 2.3 Adversary Model -- 2.4 Security Requirements -- 3 Proposed Scheme -- 4 Security Analysis and Performance Evaluation -- 4.1 Security Requirements Analysis -- 4.2 Performance Evaluation -- 4.3 Computation Cost -- 4.4 Communication Cost -- 5 Conclusion -- References -- Design and Implementation of Distributed Image Recognition App with Federal Learning Techniques -- 1 Introduction -- 2 Background Review and Related Works -- 2.1 Federated Learning -- 2.2 Convolutional Neural Networks -- 2.3 Kotlin -- 3 Background Review and Related Works -- 4 Experimental Results -- 4.1 The Hardware and Software Environment -- 4.2 Datasets -- 4.3 Implementation of App System -- 5 Conclusion -- References -- Improving Vision Clarity and Object Detection Accuracy in Heavy Rain Base on Neural Network -- 1 Introduction -- 2 Related Works -- 2.1 Object Detection -- 2.2 Image Restoration -- 3 Methods -- 3.1 Networks -- 3.2 Obtaining Rain and Restoring Street Images -- 3.3 Tracking Object Recognition Accuracy -- 4 Result -- 5 Conclusions -- References -- An Enhanced Location-Data Differential Privacy Protection Method Based on Filter -- 1 Introduction -- 2 Related Work -- 3 Differential Privacy -- 3.1 Differential Privacy Conceptions -- 3.2 Mechanisms to Achieving Differential Privacy -- 4 Location Data Query Differential Privacy Protection Algorithm Based on Filter Mechanism -- 4.1 Location Data -- 4.2 Location Data Query Privacy Protection Mechanism -- 4.3 Kalman Filtering Mechanism -- 5 Experimental Evaluation -- 5.1 Experimental Datasets and Environment. 5.2 Validation of Parameter R Selection in Filter Mechanism -- 5.3 Experiment and Analysis -- 6 Conclusions -- References -- Big Data Grave Register Information Management System Outside Cemeteries Under Internet of Things -- 1 Introduction -- 2 Literature Review -- 3 The Analysis of Tomb Information Management System Through Big Data -- 3.1 Data Collection of Tomb Information Management System -- 3.2 Data Analysis of Tomb Information Management System -- 4 The Construction of Big Data Tomb Information Management System -- 5 Conclusion -- References -- Critical Feature Selection and Machine Learning-based Models for Monofacial and Bifacial Photovoltaics -- 1 Introduction -- 2 Methodology -- 2.1 Simulations Model Details -- 2.2 Range of Parameters -- 2.3 Selection of Locations -- 2.4 Feature Selection -- 2.5 Machine Learning Model -- 3 Results and Discussion -- 4 Conclusion -- References -- Study on the Discovery of Personal Information on the Network of People Diagnosed with COVID-19 -- 1 Introduction -- 2 Literature Review -- 3 Problem Analysis -- 3.1 Global Pandemic Situation and Impact Analysis -- 3.2 Analysis of the Current Situation of Disclosure of Personal Information of COVID-19 Patients -- 3.3 Analysis of Information Disclosure of COVID-19 Confirmed Patients -- 4 Perfection and Suggestions -- 4.1 Balance Between Public Interests and Private Interests -- 4.2 Improve the System of Personal Privacy Information Disclosure -- 5 Summarize -- References -- Author Index. |
Record Nr. | UNINA-9910632477003321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart grid and internet of things : 4th eai international conference, sgiot 2020, taichung, taiwan, december 5-6, 2020, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XII, 544 p. 299 illus., 204 illus. in color.) |
Disciplina | 004.6 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Smart power grids
Internet of things |
ISBN | 3-030-69514-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484675203321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart grid and internet of things : 4th eai international conference, sgiot 2020, taichung, taiwan, december 5-6, 2020, proceedings / / edited by Yi-Bing Lin, Der-Jiunn Deng |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XII, 544 p. 299 illus., 204 illus. in color.) |
Disciplina | 004.6 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Smart power grids
Internet of things |
ISBN | 3-030-69514-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464440203316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Grid and Internet of Things [[electronic resource] ] : Third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings / / edited by Der-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (148 pages) : illustrations |
Disciplina | 621.31 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Data structures (Computer science) Application software Data protection Computer Communication Networks Data Structures and Information Theory Computer Applications Security |
ISBN | 3-030-49610-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Flag-assisted Early Release of RRC Scheme for Power Saving in NB-IoT System -- DTMFTalk: A DTMF-based Realization of IoT Remote Control for Smart Elderly Care -- IoT Insider Attack – Survey -- Energy Management for Zones-based Isolated DC Multi-microgrids -- Mining network security holes based on data flow analysis technology -- Network Design for Internet of Things in Energy Sector -- Power Prediction via Module Temperature for Solar Modules Under Soiling Conditions -- Customized Attack Detection Under Power Industrial Control System -- HomeTalk: A Smart Home Platform -- Deep Learning Based Pest Identification on Mobile Prediction Traffic Flow with Combination Arima and PageRank. . |
Record Nr. | UNISA-996465450803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Grid and Internet of Things : Third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings / / edited by Der-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (148 pages) : illustrations |
Disciplina | 621.31 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Data structures (Computer science) Application software Data protection Computer Communication Networks Data Structures and Information Theory Computer Applications Security |
ISBN | 3-030-49610-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Flag-assisted Early Release of RRC Scheme for Power Saving in NB-IoT System -- DTMFTalk: A DTMF-based Realization of IoT Remote Control for Smart Elderly Care -- IoT Insider Attack – Survey -- Energy Management for Zones-based Isolated DC Multi-microgrids -- Mining network security holes based on data flow analysis technology -- Network Design for Internet of Things in Energy Sector -- Power Prediction via Module Temperature for Solar Modules Under Soiling Conditions -- Customized Attack Detection Under Power Industrial Control System -- HomeTalk: A Smart Home Platform -- Deep Learning Based Pest Identification on Mobile Prediction Traffic Flow with Combination Arima and PageRank. . |
Record Nr. | UNINA-9910410037003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|