Wireless Internet: 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2020
|
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser.
v.317 |
Schlagworte: | |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (305 pages) |
ISBN: | 9783030529888 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048223070 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220516s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030529888 |9 978-3-030-52988-8 | ||
035 | |a (ZDB-30-PQE)EBC6274726 | ||
035 | |a (ZDB-30-PAD)EBC6274726 | ||
035 | |a (ZDB-89-EBL)EBL6274726 | ||
035 | |a (OCoLC)1182514844 | ||
035 | |a (DE-599)BVBBV048223070 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 340.58 | |
100 | 1 | |a Deng, Der-Jiunn |e Verfasser |4 aut | |
245 | 1 | 0 | |a Wireless Internet |b 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (305 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. |v v.317 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Organization -- Contents -- I Ad Hoc and Sensor Network -- Design and Implementation of Automatic Following Technology for Mobile Devices -- 1 Introduction -- 2 Design of Automatic Following Technology for Mobile Devices -- 3 Implementation of Automatic Following Technology for Mobile Devices -- 4 Conclusions -- References -- Efficient Deployment Based on Congestion Control Delivery in Multi-hop Wireless Sensor Network -- 1 Introduction -- 2 Deployment Strategy of Wireless Sensors -- 3 The Proposed Method -- 4 Performance Results and Discussion -- 5 Conclusion -- References -- A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network -- 1 Introduction -- 2 System Model -- 2.1 Network Model and Invulnerability Measure -- 2.2 Existing Invulnerability Assessment Method -- 3 Invulnerability Algorithm Based on Link and Node Importance -- 3.1 Invulnerability Calculation Method -- 3.2 Algorithm Innovation -- 4 Performance Analysis of Invulnerability Algorithm -- 4.1 Performance Trends for Different Link Distances -- 5 Conclusion -- References -- An OFDMA-Based Neighbor Discovery and Tracking Protocol for Directional Ad-Hoc Network -- 1 Introduction -- 2 System Model -- 3 Directional Neighbor Discovery and Tracking Protocol Design -- 3.1 The Background and Motivation -- 3.2 Protocol Description -- 3.3 Neighbor Discovering and Tracking -- 3.4 Frame Format -- 4 Simulation and Results -- 4.1 The Simulation Results in Scene I -- 4.2 The Simulation Results in Scene II -- 4.3 The Simulation Results in Scene III -- 5 Conclusion and Future Works -- References -- I Artificial Intelligence -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- 1 Introduction -- 1.1 Research Goal -- 2 Method -- 2.1 Intention2Text with Sequence-to-Sequence RNNs | |
505 | 8 | |a 2.2 Attentive Encoder-Decoder RNN Architecture -- 3 Experiments -- 3.1 Training Data Sets -- 3.2 Implementation Details -- 4 Results -- 5 Conclusion -- References -- Relay Selection Exploiting Genetic Algorithms for Multi-hop Device-to-Device Communication -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Relay Selection -- 4 Performance Evaluation -- 4.1 Simulation Scenario -- 4.2 Simulation Result and Discussion -- 4.3 Conclusion -- References -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things -- 1 Introduction -- 2 Proposed Model -- 2.1 Classification of Attacks -- 2.2 Preprocessing -- 2.3 Reinforcement Learning Based IDS. -- 2.4 Deep Q-Network -- 2.5 Performance Evaluation Metrics -- 3 Performance Evaluation and Results -- 3.1 Simulation Environment Description -- 3.2 Learning Performance -- 3.3 Impact of Proposed IDS Metrics -- 4 Related Work -- 5 Conclusion -- References -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Technical Use -- 3.1 Neural Network - Convolutional Neural Network -- 3.2 OpenCV -- 4 Dataset -- 4.1 Collecting Images -- 4.2 Training Dataset -- 4.3 Training Images -- 4.4 Test Model Dataset -- 5 Methods -- 5.1 Get Coin Images -- 5.2 Create CNN -- 5.3 Data Augmentation -- 5.4 Training Model -- 5.5 Test Model -- 6 Conclusions -- References -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- 1 Introduction -- 2 System Design and Clustering Algorithm -- 2.1 System Design -- 2.2 Clustering Algorithm -- 3 Experiments and Results -- 3.1 Dataset -- 3.2 Experiment Result -- 4 Evaluation and Discussion -- 4.1 Evaluation Criteria | |
505 | 8 | |a 4.2 Evaluation Results -- 4.3 Discussion -- 5 Conclusion -- References -- I Security and BlockChain -- A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing -- 1 Introduction -- 2 Preliminaries -- 2.1 BMEC -- 2.2 Security Threats -- 2.3 Group Signature -- 2.4 Bilinear Pairings -- 3 Proposed Group Signature Scheme in BMEC -- 4 Security Analysis -- 4.1 General Situation -- 4.2 Effect of Deterring Double-Spending -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Research on Blockchain-Based Central Bank Digital Currency -- 1 Foreword -- 2 The Concept of Private Digital Currency -- 2.1 Definition and Current Development -- 2.2 Issues -- 3 CBDC Based on Blockchain Technology -- 3.1 Core Elements -- 3.2 The Use of Blockchain Technology -- 4 The Legal Framework for CBDC -- 4.1 Overview of the System -- 4.2 Monetary Powers and Obligations of the Central Bank -- 4.3 The Monetary Rights and Obligations of Commercial Banks -- 4.4 The Monetary Rights and Obligations of the Public -- 5 Conclusion -- References -- Application of the Blockchain Technology in Smart Contracts: Legal Analysis -- 1 Introduction -- 2 Smart Contracts and Contract Law -- 3 Automated Transactions and Smart Contracts -- 4 Human Involvement -- 5 Instantiations of Smart Contracts -- 6 Conclusion -- References -- I Internet of Things -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Wireless Sensor Network (WSN) -- 2.2 Software-Defined Network (SDN) -- 2.3 Artificial Bee Colony (ABC) Algorithm -- 3 System Framework -- 4 Experiments -- 4.1 Sensor Clustering -- 4.2 ABC Path Planning -- 4.3 Software Defined Network (SDN) Controller -- 5 Conclusions -- References -- Network Protocols and Connectivity for Internet of Things -- 1 Network Protocols | |
505 | 8 | |a 1.1 Introduction -- 1.2 IIoT Connections and Network -- 2 Three-Dimensional Network Design Model -- 2.1 Introduction -- 2.2 Comparison of Network Protocols and Hypothesis -- 3 Results -- 3.1 Three-Dimensional Model and Hypothesis Results -- 4 Conclusions -- References -- BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technology -- 1 Introduction -- 2 An Overview to Asian Parti-Colored Bat in the Big Chimney -- 3 The BatTalk Architecture -- 4 Location Accuracy of Bat Tracking -- 5 Conclusion -- References -- Using Multi-channel Transmission Technology to Construct an IoT Mechanism for Homecare Service -- 1 Introduction -- 2 Literature Review -- 2.1 Home Care -- 2.2 Smart Home -- 2.3 Edge Computing and Fog Computing -- 3 Research Method and Analysis -- 3.1 Multi-channel Gateway Entity Development -- 3.2 Staged Alarm Notification Mechanism -- 4 Example and Discussion -- 5 Conclusion -- References -- The Application of Internet to Evaluation of Land Expropriation -- 1 Introduction -- 2 Literature Reviews -- 3 Methodology -- 3.1 Steps of the Hierarchy Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- I Wireless Internet -- An Edge Computing Architecture for Object Detection -- 1 Introduction -- 2 Method -- 2.1 Edge Computing -- 2.2 Neural Compute Stick -- 2.3 Related Works -- 3 Experimental Procedure -- 4 Results and Discussion -- 4.1 Object Detection on the Edge Node -- 4.2 Resource Performance -- 5 Conclusion -- References -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- 1 Introduction -- 2 Method -- 2.1 Internet of Things (IoT) -- 2.2 Cloud Computing -- 2.3 Edge Computing -- 2.4 Low Power Wide Area Networks (LoRaWAN) -- 2.5 Related Works -- 3 Experimental Procedure -- 3.1 System Implementation -- 4 Results and Discussion -- 4.1 Data Collection | |
505 | 8 | |a 4.2 Data Visualization Platform -- 5 Conclusion -- References -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improvement of Signal Quality in OFDM Systems -- 1 Introduction -- 2 Performance of a M-QAM OFDM Single User System -- 2.1 Presentation of a M-QAM OFDM System -- 2.2 Constellation Size Impact on the Single User System BER -- 2.3 Number of Paths Impact on the Single User System BER -- 3 Presentation of the Proposed System -- 4 M-QAM OFDM-CDMA System Performance -- 4.1 Constellation Size Impact on the BER of a Two Users System -- 4.2 SF Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.3 Number of Paths Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.4 Comparison of a 4-QAM OFDM Single User System and of a 4-QAM OFDM-CDMA Multiuser System -- 5 Conclusion -- References -- Traffic Load Perception Based OFDMA MAC Protocol for the Next Generation WLAN -- 1 Introduction -- 2 System Model -- 3 Traffic Load Perception Based OFDMA MAC Protocol Design -- 3.1 Motivation -- 3.2 Protocol Description -- 3.3 Traffic Threshold -- 4 Simulation and Results -- 4.1 The Simulation Configuration -- 4.2 The Simulation Results in Scene I -- 4.3 The Simulation Results in Scene II -- 5 Conclusion -- References -- Environment Sensing Based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- 1 Introduction -- 2 Protocol Description -- 2.1 Related Work -- 2.2 Motivation -- 3 Protocol Design -- 3.1 Protocol Flow -- 3.2 Link Adaptive Design -- 3.3 Pseudo Code -- 4 Design and Implementation of Simulation -- 4.1 Related Work -- 4.2 Simulation Configuration -- 5 Performance Analysis -- 5.1 Trends in Performance Versus Service Rate -- 5.2 Trends in Performance Versus Number of Users -- 6 Conclusion -- References | |
505 | 8 | |a Multi-BSS Association and Cooperation Based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay | |
650 | 4 | |a Computer architecture | |
700 | 1 | |a Pang, Ai-Chun |e Sonstige |4 oth | |
700 | 1 | |a Lin, Chun-Cheng |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Deng, Der-Jiunn |t Wireless Internet |d Cham : Springer International Publishing AG,c2020 |z 9783030529871 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033603803 |
Datensatz im Suchindex
_version_ | 1804184004844322816 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Deng, Der-Jiunn |
author_facet | Deng, Der-Jiunn |
author_role | aut |
author_sort | Deng, Der-Jiunn |
author_variant | d j d djd |
building | Verbundindex |
bvnumber | BV048223070 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Organization -- Contents -- I Ad Hoc and Sensor Network -- Design and Implementation of Automatic Following Technology for Mobile Devices -- 1 Introduction -- 2 Design of Automatic Following Technology for Mobile Devices -- 3 Implementation of Automatic Following Technology for Mobile Devices -- 4 Conclusions -- References -- Efficient Deployment Based on Congestion Control Delivery in Multi-hop Wireless Sensor Network -- 1 Introduction -- 2 Deployment Strategy of Wireless Sensors -- 3 The Proposed Method -- 4 Performance Results and Discussion -- 5 Conclusion -- References -- A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network -- 1 Introduction -- 2 System Model -- 2.1 Network Model and Invulnerability Measure -- 2.2 Existing Invulnerability Assessment Method -- 3 Invulnerability Algorithm Based on Link and Node Importance -- 3.1 Invulnerability Calculation Method -- 3.2 Algorithm Innovation -- 4 Performance Analysis of Invulnerability Algorithm -- 4.1 Performance Trends for Different Link Distances -- 5 Conclusion -- References -- An OFDMA-Based Neighbor Discovery and Tracking Protocol for Directional Ad-Hoc Network -- 1 Introduction -- 2 System Model -- 3 Directional Neighbor Discovery and Tracking Protocol Design -- 3.1 The Background and Motivation -- 3.2 Protocol Description -- 3.3 Neighbor Discovering and Tracking -- 3.4 Frame Format -- 4 Simulation and Results -- 4.1 The Simulation Results in Scene I -- 4.2 The Simulation Results in Scene II -- 4.3 The Simulation Results in Scene III -- 5 Conclusion and Future Works -- References -- I Artificial Intelligence -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- 1 Introduction -- 1.1 Research Goal -- 2 Method -- 2.1 Intention2Text with Sequence-to-Sequence RNNs 2.2 Attentive Encoder-Decoder RNN Architecture -- 3 Experiments -- 3.1 Training Data Sets -- 3.2 Implementation Details -- 4 Results -- 5 Conclusion -- References -- Relay Selection Exploiting Genetic Algorithms for Multi-hop Device-to-Device Communication -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Relay Selection -- 4 Performance Evaluation -- 4.1 Simulation Scenario -- 4.2 Simulation Result and Discussion -- 4.3 Conclusion -- References -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things -- 1 Introduction -- 2 Proposed Model -- 2.1 Classification of Attacks -- 2.2 Preprocessing -- 2.3 Reinforcement Learning Based IDS. -- 2.4 Deep Q-Network -- 2.5 Performance Evaluation Metrics -- 3 Performance Evaluation and Results -- 3.1 Simulation Environment Description -- 3.2 Learning Performance -- 3.3 Impact of Proposed IDS Metrics -- 4 Related Work -- 5 Conclusion -- References -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Technical Use -- 3.1 Neural Network - Convolutional Neural Network -- 3.2 OpenCV -- 4 Dataset -- 4.1 Collecting Images -- 4.2 Training Dataset -- 4.3 Training Images -- 4.4 Test Model Dataset -- 5 Methods -- 5.1 Get Coin Images -- 5.2 Create CNN -- 5.3 Data Augmentation -- 5.4 Training Model -- 5.5 Test Model -- 6 Conclusions -- References -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- 1 Introduction -- 2 System Design and Clustering Algorithm -- 2.1 System Design -- 2.2 Clustering Algorithm -- 3 Experiments and Results -- 3.1 Dataset -- 3.2 Experiment Result -- 4 Evaluation and Discussion -- 4.1 Evaluation Criteria 4.2 Evaluation Results -- 4.3 Discussion -- 5 Conclusion -- References -- I Security and BlockChain -- A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing -- 1 Introduction -- 2 Preliminaries -- 2.1 BMEC -- 2.2 Security Threats -- 2.3 Group Signature -- 2.4 Bilinear Pairings -- 3 Proposed Group Signature Scheme in BMEC -- 4 Security Analysis -- 4.1 General Situation -- 4.2 Effect of Deterring Double-Spending -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Research on Blockchain-Based Central Bank Digital Currency -- 1 Foreword -- 2 The Concept of Private Digital Currency -- 2.1 Definition and Current Development -- 2.2 Issues -- 3 CBDC Based on Blockchain Technology -- 3.1 Core Elements -- 3.2 The Use of Blockchain Technology -- 4 The Legal Framework for CBDC -- 4.1 Overview of the System -- 4.2 Monetary Powers and Obligations of the Central Bank -- 4.3 The Monetary Rights and Obligations of Commercial Banks -- 4.4 The Monetary Rights and Obligations of the Public -- 5 Conclusion -- References -- Application of the Blockchain Technology in Smart Contracts: Legal Analysis -- 1 Introduction -- 2 Smart Contracts and Contract Law -- 3 Automated Transactions and Smart Contracts -- 4 Human Involvement -- 5 Instantiations of Smart Contracts -- 6 Conclusion -- References -- I Internet of Things -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Wireless Sensor Network (WSN) -- 2.2 Software-Defined Network (SDN) -- 2.3 Artificial Bee Colony (ABC) Algorithm -- 3 System Framework -- 4 Experiments -- 4.1 Sensor Clustering -- 4.2 ABC Path Planning -- 4.3 Software Defined Network (SDN) Controller -- 5 Conclusions -- References -- Network Protocols and Connectivity for Internet of Things -- 1 Network Protocols 1.1 Introduction -- 1.2 IIoT Connections and Network -- 2 Three-Dimensional Network Design Model -- 2.1 Introduction -- 2.2 Comparison of Network Protocols and Hypothesis -- 3 Results -- 3.1 Three-Dimensional Model and Hypothesis Results -- 4 Conclusions -- References -- BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technology -- 1 Introduction -- 2 An Overview to Asian Parti-Colored Bat in the Big Chimney -- 3 The BatTalk Architecture -- 4 Location Accuracy of Bat Tracking -- 5 Conclusion -- References -- Using Multi-channel Transmission Technology to Construct an IoT Mechanism for Homecare Service -- 1 Introduction -- 2 Literature Review -- 2.1 Home Care -- 2.2 Smart Home -- 2.3 Edge Computing and Fog Computing -- 3 Research Method and Analysis -- 3.1 Multi-channel Gateway Entity Development -- 3.2 Staged Alarm Notification Mechanism -- 4 Example and Discussion -- 5 Conclusion -- References -- The Application of Internet to Evaluation of Land Expropriation -- 1 Introduction -- 2 Literature Reviews -- 3 Methodology -- 3.1 Steps of the Hierarchy Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- I Wireless Internet -- An Edge Computing Architecture for Object Detection -- 1 Introduction -- 2 Method -- 2.1 Edge Computing -- 2.2 Neural Compute Stick -- 2.3 Related Works -- 3 Experimental Procedure -- 4 Results and Discussion -- 4.1 Object Detection on the Edge Node -- 4.2 Resource Performance -- 5 Conclusion -- References -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- 1 Introduction -- 2 Method -- 2.1 Internet of Things (IoT) -- 2.2 Cloud Computing -- 2.3 Edge Computing -- 2.4 Low Power Wide Area Networks (LoRaWAN) -- 2.5 Related Works -- 3 Experimental Procedure -- 3.1 System Implementation -- 4 Results and Discussion -- 4.1 Data Collection 4.2 Data Visualization Platform -- 5 Conclusion -- References -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improvement of Signal Quality in OFDM Systems -- 1 Introduction -- 2 Performance of a M-QAM OFDM Single User System -- 2.1 Presentation of a M-QAM OFDM System -- 2.2 Constellation Size Impact on the Single User System BER -- 2.3 Number of Paths Impact on the Single User System BER -- 3 Presentation of the Proposed System -- 4 M-QAM OFDM-CDMA System Performance -- 4.1 Constellation Size Impact on the BER of a Two Users System -- 4.2 SF Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.3 Number of Paths Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.4 Comparison of a 4-QAM OFDM Single User System and of a 4-QAM OFDM-CDMA Multiuser System -- 5 Conclusion -- References -- Traffic Load Perception Based OFDMA MAC Protocol for the Next Generation WLAN -- 1 Introduction -- 2 System Model -- 3 Traffic Load Perception Based OFDMA MAC Protocol Design -- 3.1 Motivation -- 3.2 Protocol Description -- 3.3 Traffic Threshold -- 4 Simulation and Results -- 4.1 The Simulation Configuration -- 4.2 The Simulation Results in Scene I -- 4.3 The Simulation Results in Scene II -- 5 Conclusion -- References -- Environment Sensing Based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- 1 Introduction -- 2 Protocol Description -- 2.1 Related Work -- 2.2 Motivation -- 3 Protocol Design -- 3.1 Protocol Flow -- 3.2 Link Adaptive Design -- 3.3 Pseudo Code -- 4 Design and Implementation of Simulation -- 4.1 Related Work -- 4.2 Simulation Configuration -- 5 Performance Analysis -- 5.1 Trends in Performance Versus Service Rate -- 5.2 Trends in Performance Versus Number of Users -- 6 Conclusion -- References Multi-BSS Association and Cooperation Based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay |
ctrlnum | (ZDB-30-PQE)EBC6274726 (ZDB-30-PAD)EBC6274726 (ZDB-89-EBL)EBL6274726 (OCoLC)1182514844 (DE-599)BVBBV048223070 |
dewey-full | 340.58 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 340 - Law |
dewey-raw | 340.58 |
dewey-search | 340.58 |
dewey-sort | 3340.58 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>11047nmm a2200457zcb4500</leader><controlfield tag="001">BV048223070</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220516s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030529888</subfield><subfield code="9">978-3-030-52988-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6274726</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6274726</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6274726</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1182514844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048223070</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">340.58</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Deng, Der-Jiunn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless Internet</subfield><subfield code="b">12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (305 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser.</subfield><subfield code="v">v.317</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Organization -- Contents -- I Ad Hoc and Sensor Network -- Design and Implementation of Automatic Following Technology for Mobile Devices -- 1 Introduction -- 2 Design of Automatic Following Technology for Mobile Devices -- 3 Implementation of Automatic Following Technology for Mobile Devices -- 4 Conclusions -- References -- Efficient Deployment Based on Congestion Control Delivery in Multi-hop Wireless Sensor Network -- 1 Introduction -- 2 Deployment Strategy of Wireless Sensors -- 3 The Proposed Method -- 4 Performance Results and Discussion -- 5 Conclusion -- References -- A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network -- 1 Introduction -- 2 System Model -- 2.1 Network Model and Invulnerability Measure -- 2.2 Existing Invulnerability Assessment Method -- 3 Invulnerability Algorithm Based on Link and Node Importance -- 3.1 Invulnerability Calculation Method -- 3.2 Algorithm Innovation -- 4 Performance Analysis of Invulnerability Algorithm -- 4.1 Performance Trends for Different Link Distances -- 5 Conclusion -- References -- An OFDMA-Based Neighbor Discovery and Tracking Protocol for Directional Ad-Hoc Network -- 1 Introduction -- 2 System Model -- 3 Directional Neighbor Discovery and Tracking Protocol Design -- 3.1 The Background and Motivation -- 3.2 Protocol Description -- 3.3 Neighbor Discovering and Tracking -- 3.4 Frame Format -- 4 Simulation and Results -- 4.1 The Simulation Results in Scene I -- 4.2 The Simulation Results in Scene II -- 4.3 The Simulation Results in Scene III -- 5 Conclusion and Future Works -- References -- I Artificial Intelligence -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- 1 Introduction -- 1.1 Research Goal -- 2 Method -- 2.1 Intention2Text with Sequence-to-Sequence RNNs</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2 Attentive Encoder-Decoder RNN Architecture -- 3 Experiments -- 3.1 Training Data Sets -- 3.2 Implementation Details -- 4 Results -- 5 Conclusion -- References -- Relay Selection Exploiting Genetic Algorithms for Multi-hop Device-to-Device Communication -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Relay Selection -- 4 Performance Evaluation -- 4.1 Simulation Scenario -- 4.2 Simulation Result and Discussion -- 4.3 Conclusion -- References -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things -- 1 Introduction -- 2 Proposed Model -- 2.1 Classification of Attacks -- 2.2 Preprocessing -- 2.3 Reinforcement Learning Based IDS. -- 2.4 Deep Q-Network -- 2.5 Performance Evaluation Metrics -- 3 Performance Evaluation and Results -- 3.1 Simulation Environment Description -- 3.2 Learning Performance -- 3.3 Impact of Proposed IDS Metrics -- 4 Related Work -- 5 Conclusion -- References -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Technical Use -- 3.1 Neural Network - Convolutional Neural Network -- 3.2 OpenCV -- 4 Dataset -- 4.1 Collecting Images -- 4.2 Training Dataset -- 4.3 Training Images -- 4.4 Test Model Dataset -- 5 Methods -- 5.1 Get Coin Images -- 5.2 Create CNN -- 5.3 Data Augmentation -- 5.4 Training Model -- 5.5 Test Model -- 6 Conclusions -- References -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- 1 Introduction -- 2 System Design and Clustering Algorithm -- 2.1 System Design -- 2.2 Clustering Algorithm -- 3 Experiments and Results -- 3.1 Dataset -- 3.2 Experiment Result -- 4 Evaluation and Discussion -- 4.1 Evaluation Criteria</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Evaluation Results -- 4.3 Discussion -- 5 Conclusion -- References -- I Security and BlockChain -- A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing -- 1 Introduction -- 2 Preliminaries -- 2.1 BMEC -- 2.2 Security Threats -- 2.3 Group Signature -- 2.4 Bilinear Pairings -- 3 Proposed Group Signature Scheme in BMEC -- 4 Security Analysis -- 4.1 General Situation -- 4.2 Effect of Deterring Double-Spending -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Research on Blockchain-Based Central Bank Digital Currency -- 1 Foreword -- 2 The Concept of Private Digital Currency -- 2.1 Definition and Current Development -- 2.2 Issues -- 3 CBDC Based on Blockchain Technology -- 3.1 Core Elements -- 3.2 The Use of Blockchain Technology -- 4 The Legal Framework for CBDC -- 4.1 Overview of the System -- 4.2 Monetary Powers and Obligations of the Central Bank -- 4.3 The Monetary Rights and Obligations of Commercial Banks -- 4.4 The Monetary Rights and Obligations of the Public -- 5 Conclusion -- References -- Application of the Blockchain Technology in Smart Contracts: Legal Analysis -- 1 Introduction -- 2 Smart Contracts and Contract Law -- 3 Automated Transactions and Smart Contracts -- 4 Human Involvement -- 5 Instantiations of Smart Contracts -- 6 Conclusion -- References -- I Internet of Things -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Wireless Sensor Network (WSN) -- 2.2 Software-Defined Network (SDN) -- 2.3 Artificial Bee Colony (ABC) Algorithm -- 3 System Framework -- 4 Experiments -- 4.1 Sensor Clustering -- 4.2 ABC Path Planning -- 4.3 Software Defined Network (SDN) Controller -- 5 Conclusions -- References -- Network Protocols and Connectivity for Internet of Things -- 1 Network Protocols</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.1 Introduction -- 1.2 IIoT Connections and Network -- 2 Three-Dimensional Network Design Model -- 2.1 Introduction -- 2.2 Comparison of Network Protocols and Hypothesis -- 3 Results -- 3.1 Three-Dimensional Model and Hypothesis Results -- 4 Conclusions -- References -- BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technology -- 1 Introduction -- 2 An Overview to Asian Parti-Colored Bat in the Big Chimney -- 3 The BatTalk Architecture -- 4 Location Accuracy of Bat Tracking -- 5 Conclusion -- References -- Using Multi-channel Transmission Technology to Construct an IoT Mechanism for Homecare Service -- 1 Introduction -- 2 Literature Review -- 2.1 Home Care -- 2.2 Smart Home -- 2.3 Edge Computing and Fog Computing -- 3 Research Method and Analysis -- 3.1 Multi-channel Gateway Entity Development -- 3.2 Staged Alarm Notification Mechanism -- 4 Example and Discussion -- 5 Conclusion -- References -- The Application of Internet to Evaluation of Land Expropriation -- 1 Introduction -- 2 Literature Reviews -- 3 Methodology -- 3.1 Steps of the Hierarchy Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- I Wireless Internet -- An Edge Computing Architecture for Object Detection -- 1 Introduction -- 2 Method -- 2.1 Edge Computing -- 2.2 Neural Compute Stick -- 2.3 Related Works -- 3 Experimental Procedure -- 4 Results and Discussion -- 4.1 Object Detection on the Edge Node -- 4.2 Resource Performance -- 5 Conclusion -- References -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- 1 Introduction -- 2 Method -- 2.1 Internet of Things (IoT) -- 2.2 Cloud Computing -- 2.3 Edge Computing -- 2.4 Low Power Wide Area Networks (LoRaWAN) -- 2.5 Related Works -- 3 Experimental Procedure -- 3.1 System Implementation -- 4 Results and Discussion -- 4.1 Data Collection</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.2 Data Visualization Platform -- 5 Conclusion -- References -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improvement of Signal Quality in OFDM Systems -- 1 Introduction -- 2 Performance of a M-QAM OFDM Single User System -- 2.1 Presentation of a M-QAM OFDM System -- 2.2 Constellation Size Impact on the Single User System BER -- 2.3 Number of Paths Impact on the Single User System BER -- 3 Presentation of the Proposed System -- 4 M-QAM OFDM-CDMA System Performance -- 4.1 Constellation Size Impact on the BER of a Two Users System -- 4.2 SF Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.3 Number of Paths Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.4 Comparison of a 4-QAM OFDM Single User System and of a 4-QAM OFDM-CDMA Multiuser System -- 5 Conclusion -- References -- Traffic Load Perception Based OFDMA MAC Protocol for the Next Generation WLAN -- 1 Introduction -- 2 System Model -- 3 Traffic Load Perception Based OFDMA MAC Protocol Design -- 3.1 Motivation -- 3.2 Protocol Description -- 3.3 Traffic Threshold -- 4 Simulation and Results -- 4.1 The Simulation Configuration -- 4.2 The Simulation Results in Scene I -- 4.3 The Simulation Results in Scene II -- 5 Conclusion -- References -- Environment Sensing Based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- 1 Introduction -- 2 Protocol Description -- 2.1 Related Work -- 2.2 Motivation -- 3 Protocol Design -- 3.1 Protocol Flow -- 3.2 Link Adaptive Design -- 3.3 Pseudo Code -- 4 Design and Implementation of Simulation -- 4.1 Related Work -- 4.2 Simulation Configuration -- 5 Performance Analysis -- 5.1 Trends in Performance Versus Service Rate -- 5.2 Trends in Performance Versus Number of Users -- 6 Conclusion -- References</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Multi-BSS Association and Cooperation Based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer architecture</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pang, Ai-Chun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Chun-Cheng</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Deng, Der-Jiunn</subfield><subfield code="t">Wireless Internet</subfield><subfield code="d">Cham : Springer International Publishing AG,c2020</subfield><subfield code="z">9783030529871</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033603803</subfield></datafield></record></collection> |
id | DE-604.BV048223070 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:37Z |
indexdate | 2024-07-10T09:32:27Z |
institution | BVB |
isbn | 9783030529888 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033603803 |
oclc_num | 1182514844 |
open_access_boolean | |
physical | 1 Online-Ressource (305 pages) |
psigel | ZDB-30-PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. |
spelling | Deng, Der-Jiunn Verfasser aut Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings Cham Springer International Publishing AG 2020 ©2020 1 Online-Ressource (305 pages) txt rdacontent c rdamedia cr rdacarrier Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Ser. v.317 Description based on publisher supplied metadata and other sources Intro -- Preface -- Organization -- Contents -- I Ad Hoc and Sensor Network -- Design and Implementation of Automatic Following Technology for Mobile Devices -- 1 Introduction -- 2 Design of Automatic Following Technology for Mobile Devices -- 3 Implementation of Automatic Following Technology for Mobile Devices -- 4 Conclusions -- References -- Efficient Deployment Based on Congestion Control Delivery in Multi-hop Wireless Sensor Network -- 1 Introduction -- 2 Deployment Strategy of Wireless Sensors -- 3 The Proposed Method -- 4 Performance Results and Discussion -- 5 Conclusion -- References -- A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network -- 1 Introduction -- 2 System Model -- 2.1 Network Model and Invulnerability Measure -- 2.2 Existing Invulnerability Assessment Method -- 3 Invulnerability Algorithm Based on Link and Node Importance -- 3.1 Invulnerability Calculation Method -- 3.2 Algorithm Innovation -- 4 Performance Analysis of Invulnerability Algorithm -- 4.1 Performance Trends for Different Link Distances -- 5 Conclusion -- References -- An OFDMA-Based Neighbor Discovery and Tracking Protocol for Directional Ad-Hoc Network -- 1 Introduction -- 2 System Model -- 3 Directional Neighbor Discovery and Tracking Protocol Design -- 3.1 The Background and Motivation -- 3.2 Protocol Description -- 3.3 Neighbor Discovering and Tracking -- 3.4 Frame Format -- 4 Simulation and Results -- 4.1 The Simulation Results in Scene I -- 4.2 The Simulation Results in Scene II -- 4.3 The Simulation Results in Scene III -- 5 Conclusion and Future Works -- References -- I Artificial Intelligence -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- 1 Introduction -- 1.1 Research Goal -- 2 Method -- 2.1 Intention2Text with Sequence-to-Sequence RNNs 2.2 Attentive Encoder-Decoder RNN Architecture -- 3 Experiments -- 3.1 Training Data Sets -- 3.2 Implementation Details -- 4 Results -- 5 Conclusion -- References -- Relay Selection Exploiting Genetic Algorithms for Multi-hop Device-to-Device Communication -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Relay Selection -- 4 Performance Evaluation -- 4.1 Simulation Scenario -- 4.2 Simulation Result and Discussion -- 4.3 Conclusion -- References -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things -- 1 Introduction -- 2 Proposed Model -- 2.1 Classification of Attacks -- 2.2 Preprocessing -- 2.3 Reinforcement Learning Based IDS. -- 2.4 Deep Q-Network -- 2.5 Performance Evaluation Metrics -- 3 Performance Evaluation and Results -- 3.1 Simulation Environment Description -- 3.2 Learning Performance -- 3.3 Impact of Proposed IDS Metrics -- 4 Related Work -- 5 Conclusion -- References -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Technical Use -- 3.1 Neural Network - Convolutional Neural Network -- 3.2 OpenCV -- 4 Dataset -- 4.1 Collecting Images -- 4.2 Training Dataset -- 4.3 Training Images -- 4.4 Test Model Dataset -- 5 Methods -- 5.1 Get Coin Images -- 5.2 Create CNN -- 5.3 Data Augmentation -- 5.4 Training Model -- 5.5 Test Model -- 6 Conclusions -- References -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- 1 Introduction -- 2 System Design and Clustering Algorithm -- 2.1 System Design -- 2.2 Clustering Algorithm -- 3 Experiments and Results -- 3.1 Dataset -- 3.2 Experiment Result -- 4 Evaluation and Discussion -- 4.1 Evaluation Criteria 4.2 Evaluation Results -- 4.3 Discussion -- 5 Conclusion -- References -- I Security and BlockChain -- A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing -- 1 Introduction -- 2 Preliminaries -- 2.1 BMEC -- 2.2 Security Threats -- 2.3 Group Signature -- 2.4 Bilinear Pairings -- 3 Proposed Group Signature Scheme in BMEC -- 4 Security Analysis -- 4.1 General Situation -- 4.2 Effect of Deterring Double-Spending -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Research on Blockchain-Based Central Bank Digital Currency -- 1 Foreword -- 2 The Concept of Private Digital Currency -- 2.1 Definition and Current Development -- 2.2 Issues -- 3 CBDC Based on Blockchain Technology -- 3.1 Core Elements -- 3.2 The Use of Blockchain Technology -- 4 The Legal Framework for CBDC -- 4.1 Overview of the System -- 4.2 Monetary Powers and Obligations of the Central Bank -- 4.3 The Monetary Rights and Obligations of Commercial Banks -- 4.4 The Monetary Rights and Obligations of the Public -- 5 Conclusion -- References -- Application of the Blockchain Technology in Smart Contracts: Legal Analysis -- 1 Introduction -- 2 Smart Contracts and Contract Law -- 3 Automated Transactions and Smart Contracts -- 4 Human Involvement -- 5 Instantiations of Smart Contracts -- 6 Conclusion -- References -- I Internet of Things -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Wireless Sensor Network (WSN) -- 2.2 Software-Defined Network (SDN) -- 2.3 Artificial Bee Colony (ABC) Algorithm -- 3 System Framework -- 4 Experiments -- 4.1 Sensor Clustering -- 4.2 ABC Path Planning -- 4.3 Software Defined Network (SDN) Controller -- 5 Conclusions -- References -- Network Protocols and Connectivity for Internet of Things -- 1 Network Protocols 1.1 Introduction -- 1.2 IIoT Connections and Network -- 2 Three-Dimensional Network Design Model -- 2.1 Introduction -- 2.2 Comparison of Network Protocols and Hypothesis -- 3 Results -- 3.1 Three-Dimensional Model and Hypothesis Results -- 4 Conclusions -- References -- BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technology -- 1 Introduction -- 2 An Overview to Asian Parti-Colored Bat in the Big Chimney -- 3 The BatTalk Architecture -- 4 Location Accuracy of Bat Tracking -- 5 Conclusion -- References -- Using Multi-channel Transmission Technology to Construct an IoT Mechanism for Homecare Service -- 1 Introduction -- 2 Literature Review -- 2.1 Home Care -- 2.2 Smart Home -- 2.3 Edge Computing and Fog Computing -- 3 Research Method and Analysis -- 3.1 Multi-channel Gateway Entity Development -- 3.2 Staged Alarm Notification Mechanism -- 4 Example and Discussion -- 5 Conclusion -- References -- The Application of Internet to Evaluation of Land Expropriation -- 1 Introduction -- 2 Literature Reviews -- 3 Methodology -- 3.1 Steps of the Hierarchy Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- I Wireless Internet -- An Edge Computing Architecture for Object Detection -- 1 Introduction -- 2 Method -- 2.1 Edge Computing -- 2.2 Neural Compute Stick -- 2.3 Related Works -- 3 Experimental Procedure -- 4 Results and Discussion -- 4.1 Object Detection on the Edge Node -- 4.2 Resource Performance -- 5 Conclusion -- References -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- 1 Introduction -- 2 Method -- 2.1 Internet of Things (IoT) -- 2.2 Cloud Computing -- 2.3 Edge Computing -- 2.4 Low Power Wide Area Networks (LoRaWAN) -- 2.5 Related Works -- 3 Experimental Procedure -- 3.1 System Implementation -- 4 Results and Discussion -- 4.1 Data Collection 4.2 Data Visualization Platform -- 5 Conclusion -- References -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improvement of Signal Quality in OFDM Systems -- 1 Introduction -- 2 Performance of a M-QAM OFDM Single User System -- 2.1 Presentation of a M-QAM OFDM System -- 2.2 Constellation Size Impact on the Single User System BER -- 2.3 Number of Paths Impact on the Single User System BER -- 3 Presentation of the Proposed System -- 4 M-QAM OFDM-CDMA System Performance -- 4.1 Constellation Size Impact on the BER of a Two Users System -- 4.2 SF Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.3 Number of Paths Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.4 Comparison of a 4-QAM OFDM Single User System and of a 4-QAM OFDM-CDMA Multiuser System -- 5 Conclusion -- References -- Traffic Load Perception Based OFDMA MAC Protocol for the Next Generation WLAN -- 1 Introduction -- 2 System Model -- 3 Traffic Load Perception Based OFDMA MAC Protocol Design -- 3.1 Motivation -- 3.2 Protocol Description -- 3.3 Traffic Threshold -- 4 Simulation and Results -- 4.1 The Simulation Configuration -- 4.2 The Simulation Results in Scene I -- 4.3 The Simulation Results in Scene II -- 5 Conclusion -- References -- Environment Sensing Based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- 1 Introduction -- 2 Protocol Description -- 2.1 Related Work -- 2.2 Motivation -- 3 Protocol Design -- 3.1 Protocol Flow -- 3.2 Link Adaptive Design -- 3.3 Pseudo Code -- 4 Design and Implementation of Simulation -- 4.1 Related Work -- 4.2 Simulation Configuration -- 5 Performance Analysis -- 5.1 Trends in Performance Versus Service Rate -- 5.2 Trends in Performance Versus Number of Users -- 6 Conclusion -- References Multi-BSS Association and Cooperation Based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay Computer architecture Pang, Ai-Chun Sonstige oth Lin, Chun-Cheng Sonstige oth Erscheint auch als Druck-Ausgabe Deng, Der-Jiunn Wireless Internet Cham : Springer International Publishing AG,c2020 9783030529871 |
spellingShingle | Deng, Der-Jiunn Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings Intro -- Preface -- Organization -- Contents -- I Ad Hoc and Sensor Network -- Design and Implementation of Automatic Following Technology for Mobile Devices -- 1 Introduction -- 2 Design of Automatic Following Technology for Mobile Devices -- 3 Implementation of Automatic Following Technology for Mobile Devices -- 4 Conclusions -- References -- Efficient Deployment Based on Congestion Control Delivery in Multi-hop Wireless Sensor Network -- 1 Introduction -- 2 Deployment Strategy of Wireless Sensors -- 3 The Proposed Method -- 4 Performance Results and Discussion -- 5 Conclusion -- References -- A Combined Routing Path and Node Importance Network Invulnerability Evaluating Method for Ad Hoc Network -- 1 Introduction -- 2 System Model -- 2.1 Network Model and Invulnerability Measure -- 2.2 Existing Invulnerability Assessment Method -- 3 Invulnerability Algorithm Based on Link and Node Importance -- 3.1 Invulnerability Calculation Method -- 3.2 Algorithm Innovation -- 4 Performance Analysis of Invulnerability Algorithm -- 4.1 Performance Trends for Different Link Distances -- 5 Conclusion -- References -- An OFDMA-Based Neighbor Discovery and Tracking Protocol for Directional Ad-Hoc Network -- 1 Introduction -- 2 System Model -- 3 Directional Neighbor Discovery and Tracking Protocol Design -- 3.1 The Background and Motivation -- 3.2 Protocol Description -- 3.3 Neighbor Discovering and Tracking -- 3.4 Frame Format -- 4 Simulation and Results -- 4.1 The Simulation Results in Scene I -- 4.2 The Simulation Results in Scene II -- 4.3 The Simulation Results in Scene III -- 5 Conclusion and Future Works -- References -- I Artificial Intelligence -- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs -- 1 Introduction -- 1.1 Research Goal -- 2 Method -- 2.1 Intention2Text with Sequence-to-Sequence RNNs 2.2 Attentive Encoder-Decoder RNN Architecture -- 3 Experiments -- 3.1 Training Data Sets -- 3.2 Implementation Details -- 4 Results -- 5 Conclusion -- References -- Relay Selection Exploiting Genetic Algorithms for Multi-hop Device-to-Device Communication -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Relay Selection -- 4 Performance Evaluation -- 4.1 Simulation Scenario -- 4.2 Simulation Result and Discussion -- 4.3 Conclusion -- References -- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things -- 1 Introduction -- 2 Proposed Model -- 2.1 Classification of Attacks -- 2.2 Preprocessing -- 2.3 Reinforcement Learning Based IDS. -- 2.4 Deep Q-Network -- 2.5 Performance Evaluation Metrics -- 3 Performance Evaluation and Results -- 3.1 Simulation Environment Description -- 3.2 Learning Performance -- 3.3 Impact of Proposed IDS Metrics -- 4 Related Work -- 5 Conclusion -- References -- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Technical Use -- 3.1 Neural Network - Convolutional Neural Network -- 3.2 OpenCV -- 4 Dataset -- 4.1 Collecting Images -- 4.2 Training Dataset -- 4.3 Training Images -- 4.4 Test Model Dataset -- 5 Methods -- 5.1 Get Coin Images -- 5.2 Create CNN -- 5.3 Data Augmentation -- 5.4 Training Model -- 5.5 Test Model -- 6 Conclusions -- References -- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes -- 1 Introduction -- 2 System Design and Clustering Algorithm -- 2.1 System Design -- 2.2 Clustering Algorithm -- 3 Experiments and Results -- 3.1 Dataset -- 3.2 Experiment Result -- 4 Evaluation and Discussion -- 4.1 Evaluation Criteria 4.2 Evaluation Results -- 4.3 Discussion -- 5 Conclusion -- References -- I Security and BlockChain -- A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing -- 1 Introduction -- 2 Preliminaries -- 2.1 BMEC -- 2.2 Security Threats -- 2.3 Group Signature -- 2.4 Bilinear Pairings -- 3 Proposed Group Signature Scheme in BMEC -- 4 Security Analysis -- 4.1 General Situation -- 4.2 Effect of Deterring Double-Spending -- 5 Related Work -- 6 Conclusions and Future Work -- References -- A Research on Blockchain-Based Central Bank Digital Currency -- 1 Foreword -- 2 The Concept of Private Digital Currency -- 2.1 Definition and Current Development -- 2.2 Issues -- 3 CBDC Based on Blockchain Technology -- 3.1 Core Elements -- 3.2 The Use of Blockchain Technology -- 4 The Legal Framework for CBDC -- 4.1 Overview of the System -- 4.2 Monetary Powers and Obligations of the Central Bank -- 4.3 The Monetary Rights and Obligations of Commercial Banks -- 4.4 The Monetary Rights and Obligations of the Public -- 5 Conclusion -- References -- Application of the Blockchain Technology in Smart Contracts: Legal Analysis -- 1 Introduction -- 2 Smart Contracts and Contract Law -- 3 Automated Transactions and Smart Contracts -- 4 Human Involvement -- 5 Instantiations of Smart Contracts -- 6 Conclusion -- References -- I Internet of Things -- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Wireless Sensor Network (WSN) -- 2.2 Software-Defined Network (SDN) -- 2.3 Artificial Bee Colony (ABC) Algorithm -- 3 System Framework -- 4 Experiments -- 4.1 Sensor Clustering -- 4.2 ABC Path Planning -- 4.3 Software Defined Network (SDN) Controller -- 5 Conclusions -- References -- Network Protocols and Connectivity for Internet of Things -- 1 Network Protocols 1.1 Introduction -- 1.2 IIoT Connections and Network -- 2 Three-Dimensional Network Design Model -- 2.1 Introduction -- 2.2 Comparison of Network Protocols and Hypothesis -- 3 Results -- 3.1 Three-Dimensional Model and Hypothesis Results -- 4 Conclusions -- References -- BatTalk: Monitoring Asian Parti-Colored Bats Through the IoT Technology -- 1 Introduction -- 2 An Overview to Asian Parti-Colored Bat in the Big Chimney -- 3 The BatTalk Architecture -- 4 Location Accuracy of Bat Tracking -- 5 Conclusion -- References -- Using Multi-channel Transmission Technology to Construct an IoT Mechanism for Homecare Service -- 1 Introduction -- 2 Literature Review -- 2.1 Home Care -- 2.2 Smart Home -- 2.3 Edge Computing and Fog Computing -- 3 Research Method and Analysis -- 3.1 Multi-channel Gateway Entity Development -- 3.2 Staged Alarm Notification Mechanism -- 4 Example and Discussion -- 5 Conclusion -- References -- The Application of Internet to Evaluation of Land Expropriation -- 1 Introduction -- 2 Literature Reviews -- 3 Methodology -- 3.1 Steps of the Hierarchy Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- I Wireless Internet -- An Edge Computing Architecture for Object Detection -- 1 Introduction -- 2 Method -- 2.1 Edge Computing -- 2.2 Neural Compute Stick -- 2.3 Related Works -- 3 Experimental Procedure -- 4 Results and Discussion -- 4.1 Object Detection on the Edge Node -- 4.2 Resource Performance -- 5 Conclusion -- References -- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications -- 1 Introduction -- 2 Method -- 2.1 Internet of Things (IoT) -- 2.2 Cloud Computing -- 2.3 Edge Computing -- 2.4 Low Power Wide Area Networks (LoRaWAN) -- 2.5 Related Works -- 3 Experimental Procedure -- 3.1 System Implementation -- 4 Results and Discussion -- 4.1 Data Collection 4.2 Data Visualization Platform -- 5 Conclusion -- References -- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improvement of Signal Quality in OFDM Systems -- 1 Introduction -- 2 Performance of a M-QAM OFDM Single User System -- 2.1 Presentation of a M-QAM OFDM System -- 2.2 Constellation Size Impact on the Single User System BER -- 2.3 Number of Paths Impact on the Single User System BER -- 3 Presentation of the Proposed System -- 4 M-QAM OFDM-CDMA System Performance -- 4.1 Constellation Size Impact on the BER of a Two Users System -- 4.2 SF Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.3 Number of Paths Impact on the BER of a 4-QAM OFDM-CDMA Two Users System -- 4.4 Comparison of a 4-QAM OFDM Single User System and of a 4-QAM OFDM-CDMA Multiuser System -- 5 Conclusion -- References -- Traffic Load Perception Based OFDMA MAC Protocol for the Next Generation WLAN -- 1 Introduction -- 2 System Model -- 3 Traffic Load Perception Based OFDMA MAC Protocol Design -- 3.1 Motivation -- 3.2 Protocol Description -- 3.3 Traffic Threshold -- 4 Simulation and Results -- 4.1 The Simulation Configuration -- 4.2 The Simulation Results in Scene I -- 4.3 The Simulation Results in Scene II -- 5 Conclusion -- References -- Environment Sensing Based Adaptive Acknowledgement and Backoff for the Next Generation WLAN -- 1 Introduction -- 2 Protocol Description -- 2.1 Related Work -- 2.2 Motivation -- 3 Protocol Design -- 3.1 Protocol Flow -- 3.2 Link Adaptive Design -- 3.3 Pseudo Code -- 4 Design and Implementation of Simulation -- 4.1 Related Work -- 4.2 Simulation Configuration -- 5 Performance Analysis -- 5.1 Trends in Performance Versus Service Rate -- 5.2 Trends in Performance Versus Number of Users -- 6 Conclusion -- References Multi-BSS Association and Cooperation Based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay Computer architecture |
title | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_auth | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_exact_search | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_exact_search_txtP | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_full | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_fullStr | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_full_unstemmed | Wireless Internet 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
title_short | Wireless Internet |
title_sort | wireless internet 12th eai international conference wicon 2019 taichung taiwan november 26 27 2019 proceedings |
title_sub | 12th EAI International Conference, WiCON 2019, TaiChung, Taiwan, November 26-27, 2019, Proceedings |
topic | Computer architecture |
topic_facet | Computer architecture |
work_keys_str_mv | AT dengderjiunn wirelessinternet12theaiinternationalconferencewicon2019taichungtaiwannovember26272019proceedings AT pangaichun wirelessinternet12theaiinternationalconferencewicon2019taichungtaiwannovember26272019proceedings AT linchuncheng wirelessinternet12theaiinternationalconferencewicon2019taichungtaiwannovember26272019proceedings |