Proceedings of the 9th International Conference on Computer Engineering and Networks 1st Edition by Qi Liu, Xiaodong Liu, Lang Li, Huiyu Zhou, Hui-Huang Zhao- Ebook PDF Instant Download/Delivery: 9789811537523, 9811537526
Full download Proceedings of the 9th International Conference on Computer Engineering and Networks 1st Edition after payment
Product details:
ISBN 10: 9811537526
ISBN 13: 9789811537523
Author: Qi Liu, Xiaodong Liu, Lang Li, Huiyu Zhou, Hui-Huang Zhao
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18–20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.
Table of contents:
1. Design of Collaboration Engine for Large-Scale Heterogeneous Clusters
2. Research on Multi-stage GPU Collaborative Model
3. HSO Algorithm for RRAP Problem in Three-State Device Network
4. A Method of Service Function Chain Arrangement for Load Balancing
5. The Optimal Implementation of Khudra Lightweight Block Cipher
6. Droop Control of Microgrid Based on Genetic Optimization Algorithm
7. Research and Implementation of a Remote Monitoring Platform for Antarctic Greenhouse
8. Application Research in DC Charging Pile of Full-Bridge DC–DC Converter Based on Fuzzy Control
9. Performance Analysis of Multi-user Chaos Measurement and Control System
10. Effect of Magnetic Field on the Damping Capability of Ni52.5Mn23.7Ga23.8/Polymer Composites
11. Knock Knock: A Binary Human–Machine Interactive Channel for Smartphone with Accelerometer
12. Remote Network Provisioning with Terminals Priority and Cooperative Relaying for Embedded SIM for NB-IoT Reliability
13. Design of a Fully Programmable 3D Graphics Processor for Mobile Applications
14. Outer Synchronization Between Complex Delayed Networks with Both Uncertain Parameters and Unknown Topological Structure
15. Discussion on the Application of Digital Twins in the Wear of Parts
16. Research on Key Algorithms of Segmented Spectrum Retrieval System
17. Research on Fuzzy Control Strategy for Intelligent Anti-rear-end of Automobile
18. Design and Optimization of Wind Power Electric Pitch Permanent Magnet Synchronous Servo Motor
19. Design of Step Servo Slave System Based on EtherCAT
20. Investigation of Wind Turbine Blade Defect Classification Based on Deep Convolutional Neural Network
21. Research on Weakening Cogging Torque of Permanent Magnet Synchronous Wind Generator
22. Research on Edge Network Resource Allocation Mechanism for Mobile Blockchain
23. MATSCO: A Novel Minimum Cost Offloading Algorithm for Task Execution in Multiuser Mobile Edge Computing Systems
24. Medical Data Crawling Algorithm Based on PageRank
25. The Alarm Feature Analysis Algorithm for Communication Network
26. Analysis of User Suspicious Behavior in Power Monitoring System Based on Text Vectorization and Unsupervised Machine Learning
27. Prediction of Coal Mine Accidental Deaths for 5 Years Based on 14 Years Data Analysis
28. Patent Prediction Based on Long Short-Term Memory Recurrent Neural Network
29. Chinese Aspect-Level Sentiment Analysis CNN-LSTM Based on Mixed Vector
30. Prediction of RNA Structures with Pseudoknots Using Convolutional Neural Network
31. An Improved Attribute Value-Weighted Double-Layer Hidden Naive Bayes Classification Algorithm
32. An Improved Fuzzy C-Means Clustering Algorithm Based on Intuitionistic Fuzzy Sets
33. SFC Orchestration Method Based on Energy Saving and Time Delay Optimization
34. Predict Oil Production with LSTM Neural Network
35. Improved Fatigue Detection Using Eye State Recognition with HOG-LBP
36. Portrait Style Transfer with Generative Adversarial Networks
37. Impossible Differential Analysis on 8-Round PRINCE
38. Multi-step Ahead Time Series Forecasting Based on the Improved Process Neural Networks
39. An Improved Quantum Nearest-Neighbor Algorithm
40. A Trend Extraction Method Based on Improved Sliding Window
41. Three-Dimensional Dense Study Based on Kinect
42. A Cascaded Feature Fusion Residual Network for Image Super-resolution
43. Spp-U-net: Deep Neural Network for Road Region Segmentation
44. Research on the Computational Model of Problem-Based Tutoring
45. Research on Face Recognition Algorithms and Application Based on PCA Dimension Reduction and LBP
46. Research on Algorithms for Setting up Advertising Platform Based on Minimum Weighted Vertex Covering
47. Lane Detection Based on DeepLab
48. Hybrid Program Recommendation Algorithm Based on Spark MLlib in Big Data Environment
49. A Deep Learning Method for Intrusion Detection by Spatial and Temporal Feature Extraction
50. Network Traffic Prediction in Network Security Based on EMD and LSTM
51. An Introduction to Quantum Machine Learning Algorithms
52. Design of Seat Selecting System for Self-study Room in Library Based on Smart Campus
53. An Optimized Scheme of Information Hiding-Based Visual Secret Sharing
54. Constructions of Lightweight MDS Diffusion Layers from Hankel Matrices
55. Power Analysis Attack on a Lightweight Block Cipher GIFT
56. Research and Development of Fine Management System for Underground Trackless Vehicles
57. A Certificate-Based Authentication for SIP in Embedded Devices
58. An Anti-Power Attack Circuit Design for Block Cipher
59. A New Data Placement Approach for Heterogeneous Ceph Storage System
60. Construction-Based Secret Image Sharing
61. A Novel AES Random Mask Scheme Against Correlation Power Analysis
62. Deployment Algorithm of Service Function Chain with Packet Loss Rate Optimization
63. Security Count Query and Integrity Verification Based on Encrypted Genomic Data
64. Homological Fault Attack on AES Block Cipher and Its Countermeasures
65. Researching on AES Algorithm Based on Software Reverse Engineering
66. MC-PKS: A Collaboration Public Key Services System for Mobile Applications
67. Security Analysis and Improvement of User Authentication Scheme for Wireless Body Area Network
68. Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm
69. STL-FNN: An Intelligent Prediction Model of Daily Theft Level
70. WeChat Public Platform for Customers Reserving Bank Branches Based IoT
71. Metadata Management Algorithm Based on Improved LSM Tree
72. A Text Information Hiding Method Based on Sentiment Word Substitution
73. Research on Information Hiding Based on Intelligent Creation of Tang Poem
74. Design and Evaluation of Traffic Congestion Index for Yancheng City
75. A Survey on Anomaly Detection Techniques in Large-Scale KPI Data
76. A Counterfactual Quantum Key Distribution Protocol Based on the Idea of Wheeler’s Delayed-Choice Experiment
77. A Non-intrusive Appliances Load Monitoring Method Based on Hourly Smart Meter Data
78. Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution
79. Deep Web Selection Based on Entity Association
80. Bayesian-Based Efficient Fault Location Algorithm for Power Bottom-Guaranteed Communication Networks
81. Fault Diagnosis Algorithm for Power Bottom-Guaranteed Communication Network Based on Random Forest
82. Design of a Real-Time Transmission System for TV- and Radar-Integrated Videos
83. Research on Automated Penetration Testing Framework for Power Web System Integrating Property Information and Expert Experience
84. VNF Deployment Method Based on Multipath Transmission
85. Service Chain Orchestration Based on Deep Reinforcement Learning in Intent-Based IoT
86. Design and Implementation of Wi-Fi-Trusted Authentication System Based on Blockchain
87. Efficient Fault Location Algorithm Based on D-Segmentation for Data Network Supporting Quantum Communication
88. Equipment Fault Prediction Method in Power Communication Network Based on Equipment Frequency Domain Characteristics
89. VNF Placement and Routing Algorithm for Energy Saving and QoS Guarantee
90. Research on IoT Architecture and Application Scheme for Smart Grid
91. A Method of Dynamic Resource Adjustment for 5G Network Slice
92. Network Slice Access Selection Scheme for 5G Network Power Terminal Based on Grey Analytic Hierarchy Process
93. Resource Allocation Mechanism in Electric Vehicle Charging Scenario for Ubiquitous Power-IoT Coverage Enhancement
94. Computation Resource Allocation Based on Particle Swarm Optimization for LEO Satellite Networks
95. Security Analysis and Protection for Charging Protocol of Smart Charging Pile
96. The Power Distribution Control Strategy of Fully Active Hybrid Energy Storage System Based on Sliding Mode Control
97. Secure Communication with Two-Stage Beamforming for Wireless Energy and Jamming Signal Based on Power Beacon
98. A Research of Short-Term Wind Power Prediction Based on Support Vector Regression
99. Droop Control Strategy of Microgrid Parallel Inverter Under Island Operation
100. ZigBee-Based Architecture Design of Imperceptible Smart Home System
101. Data Collection of Power Internet of Things Sensing Layer Based on Path Optimization Strategy
102. STFRC: A Multimedia Stream Congestion Control Algorithm Based on TFRC
103. Multi-controller Cooperation High-Efficiency Device Fault Diagnosis Algorithm for Power Communication Network in SDN Environment
104. Service Recovery Algorithm for Power Communication Network Based on SDN Multi-mode Channel
105. A Multi-channel Aggregation Selection Mechanism Based on TOPSIS in Electric Power Communication Network
106. Fault Diagnosis and CAN Bus/Ethernet Redundancy Design of a Monitoring and Control System
107. Terminal Communication Network Fault Diagnosis Algorithm Based on TOPSIS Algorithm
108. Real-Time Pricing Method Based on Lyapunov for Stochastic and Electric Power Demand in Smart Grid
109. Resource Allocation Algorithm for Power Bottom-Guaranteed Communication Network Based on Network Characteristics and Historical Data
110. An Outlier Detection Algorithm for Electric Power Data Based on DBSCAN and LOF
111. Power Anomaly Data Detection Algorithm Based on User Tag and Random Forest
112. Optimal Distribution in Wireless Mesh Network with Enhanced Connectivity and Coverage
113. A Traffic Anomaly Detection Method Based on Gravity Theory and LOF
114. Construction of Management and Control Platform for Bus Parking and Maintenance Field Under Hybrid Cloud Computing Mode
115. A Data Clustering Method for Communication Network Based on Affinity Propagation
116. Priority-Based Optimal Resource Reservation Mechanism in Wireless Sensor Networks for Smart Grid
117. Energy-Efficient Clustering and Multi-hop Routing Algorithm Based on GMM for Power IoT Network
People also search for:
proceedings of the 9th international conference on software engineering
proceedings of the 9th international conference on educational data mining
proceedings of the 9th international conference on learning representations
proceedings of the 9th python in science conference
proceedings of the international congress of mathematicians
Tags: Qi Liu, Xiaodong Liu, Lang Li, Huiyu Zhou, Hui Huang Zhao, Proceedings, International Conference, Computer Engineering, Networks