Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 17th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2023)

دانلود کتاب Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 17th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2023)

55000 تومان موجود

کتاب خدمات نوآورانه موبایل و اینترنت در محاسبات همه جا حاضر: مجموعه مقالات هفدهمین کنفرانس بین المللی خدمات نوآورانه موبایل و اینترنت در محاسبات همه جا حاضر (IMIS-2023) نسخه زبان اصلی

دانلود کتاب خدمات نوآورانه موبایل و اینترنت در محاسبات همه جا حاضر: مجموعه مقالات هفدهمین کنفرانس بین المللی خدمات نوآورانه موبایل و اینترنت در محاسبات همه جا حاضر (IMIS-2023) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 17th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2023)

نام کتاب : Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 17th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2023)
عنوان ترجمه شده به فارسی : خدمات نوآورانه موبایل و اینترنت در محاسبات همه جا حاضر: مجموعه مقالات هفدهمین کنفرانس بین المللی خدمات نوآورانه موبایل و اینترنت در محاسبات همه جا حاضر (IMIS-2023)
سری : Lecture Notes on Data Engineering and Communications Technologies, 177
نویسندگان :
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 413
ISBN (شابک) : 303135835X , 9783031358357
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 40 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Welcome Message of IMIS-2023 International Conference Organizers
Organization
IMIS-2023 Keynote Talks
Evolution of Intelligent Software Agents
Securing Mobile Wireless Networks
Contents
An Enhanced AI-Based Vehicular Driver Support System Considering Hyperparameter Optimization
1 Introduction
2 Overview of YOLO Series
3 Distracted Driving Detection System
3.1 Overview
3.2 Classification
3.3 Dataset
4 Evaluation Results
4.1 Impact from GA Generations
4.2 Classification Performacne Using Optimized Hyperparameter
5 Conclusions
References
An AOI-Based Surface Painting Equipment
1 Introduction
2 Painting Process Planning
3 Metal Parts Painting Equipment Based on AOI
4 Discussions
5 Conclusions
References
An Aircraft Assembly System Based on Improved YOLOv5
1 Introduction
2 Preliminaries
2.1 Computer-Aided Aircraft Assembly
2.2 Object Detection
2.3 Synthetic Dataset
3 Method
3.1 Mixed Aircraft Component Dataset (MACD)
3.2 Basic Network Framework
3.3 A Priori Anchor Box Computing
3.4 SE-YOLOv5
4 Experiment
4.1 Dataset
4.2 Evaluation Metrics
4.3 Network Training and Testing
4.4 AR Assembly Assistant System
5 Conclusion
References
Hyperparameter Tuning and Comparison Analysis of the DNN Model to Predict Wireless Network Conditions of Live Video Services
1 Introduction
2 Related Work
2.1 Hyperparameter – Activation Function
2.2 Hyperparameter – Dropout
2.3 Hyperparameter – Batch Size
2.4 Hyperparameter – Weight Initialization
3 Proposed Scheme
3.1 Dataset
3.2 Deep Neural Network Architecture
3.3 Hyperparameter Values
4 Performance Evaluation
5 Conclusion
References
A Soldering Motion Analysis System for Monitoring Whole Body of People with Developmental Disabilities
1 Introduction
2 Proposed System
3 Experimental Results
4 Conclusions
References
A Fuzzy Theory Based Attitude Control for Takeoff of Quadrotor
1 Introduction
2 Proposed System
2.1 Architecture of Quadrotor
2.2 Fuzzy Theory Based Attitude Control in Takeoff Method
3 Experimental Results
4 Conclusions
References
A New Method for Improving Cache Hit Ratio by Utilizing Near Network Cache on NDN
1 Introduction
2 Related Works
2.1 Overview of NDN
2.2 Cache Finding Except from CRs Belonging FIB Forwarding Path
3 Method for Utilizing Nearby Cache for Improving Cache Hit Ratio
3.1 MUNC: Method for Utilizing Nearby Cache
4 Performance Evaluations
4.1 Effects of Number of Contents and CS Size for Cache Hit Ratio
4.2 Characteristics of Cache Hit Ratio of Each User
5 Conclusion
References
An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusion
References
Universal Intrusion Detection System on In-Vehicle Network
1 Introduction
2 CAN Specification
3 Related Works on Automotive Security
4 Data Pre-processing and Deep Learning Architectures
4.1 Data Pre-processing
4.2 Deep Learning Architectures
5 Result Evaluation
6 Conclusion
References
The Comparison of Machine Learning Methods for Email Spam Detection
1 Introduction
2 Related Work
3 Machine Learning Algorithms
3.1 Random Forest (RF)
3.2 Support Vector Machine (SVM)
3.3 Decision Tree
3.4 Naïve Bayes (NB)
3.5 K-Nearest Neighbors (K-NN)
4 Email Dataset
5 A Method for Email Spam Detection
6 Conclusion
References
A Lightweight Intrusion Detection System on In-Vehicle Network Using Polynomial Features
1 Introduction
2 Related Works
3 Data Pre-processing and Deep Learning Architectures
3.1 Data Pre-processing
3.2 Deep Learning Model Architecture
4 Result Evaluation
5 Conclusion
References
Fuzz Testing and Safe Framework Development for Vehicle Security Analysis
1 Introduction
2 Related Works of Related Research
2.1 CAN Fuzzing Method
2.2 CAN Message Analysis Method
3 Proposed Framework
3.1 CAN Network Background
3.2 Building an In-vehicle Network Test Framework
4 Designing the Automatic Fuzzing Test
4.1 Dataset Preparation
4.2 Input Preparation and Injection
4.3 Experimental Result
5 Conclusion and Future Plan
References
Advanced Mathematics Curriculum Reform Based on Nine Screen Method and CDIO Educational Concept
1 Introduction
1.1 Reform on Advanced Mathematics Teaching Mode
1.2 Reform on Advanced Mathematics Teaching Model
2 Teaching Content Reform
3 Teaching Strategies and Techniques
4 Effect of Teaching Reform
5 Conclusions
References
Proposal of a Music Auditioning Application Using Music Compact Disk Jacket as Augmented Reality Marker
1 Introduction
2 Related Works
3 System Architecture
3.1 Mobile Agent
3.2 CD Jacket Image Markers Management Server
3.3 Sample Sound Source/Artists Information Management Server
3.4 Database Server Group
4 Prototype System
5 System Evaluation
6 Conclusion
References
Proposal of a Real-Time Video Avatar Generation Method for Metaverse Environment
1 Introduction
2 Related Works
3 Previous Study
4 Research Objective
5 System Configuration
5.1 Person Extraction Manager
5.2 Image Processing Manager
5.3 Canvas
6 Real-Time Video Avatar Generation Method
6.1 Person Extraction Function
6.2 Image Joining Function
6.3 Background Clipping Function
7 System Evaluation
7.1 Sense of Presence
7.2 Room-Sharing Feeling
7.3 Information Sharing and Decision-Making Effectiveness
8 Conclusion
References
An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs
1 Introduction
2 Preliminaries
2.1 ECDLP
2.2 Mathematical Hard Problems
2.3 Shamir Secret Sharing
3 The Proposed Scheme
3.1 Setup
3.2 V2I Authentication Protocol
3.3 Pseudonym Acquiring and Changing Mechanism
3.4 V2V Authentication Protocol
4 Security Analysis
5 Performance Evaluation
6 Conclusion
References
A Fuzzy-Based System for Selection of Radio Access Technology in 5G Wireless Networks Considering QoE as a New Parameter
1 Introduction
2 Software-Defined Networks (SDNs)
3 Fuzzy Logic
3.1 Linguistic Variables
3.2 Fuzzy Control Rules
3.3 Defuzzificaion Method
4 Proposed Fuzzy-Based System
5 Simulation Results
6 Conclusions and Future Work
References
Assessment of FC-RDVM and LDIWM Router Replacement Methods by WMN-PSOHC Hybrid Simulation System Considering Chi-Square Mesh Client Distribution
1 Introduction
2 Node Placement Problem in WMNs
3 Intelligent Algorithms
3.1 Particle Swarm Optimization
3.2 Hill Climbing
4 WMN-PSOHC Hybrid Simulation System
5 Simulation Results
6 Conclusions
References
Implementation of FC-RDVM in WMN-PSOHCDGA System Considering Two Islands Distribution of Mesh Clients: A Comparison Study of FC-RDVM and RDVM Methods for Small Scale and Middle Scale WMNs
1 Introduction
2 Intelligent Algorithms for WMN-PSOHCDGA System
2.1 Particle Swarm Optimization
2.2 Hill Climbing Algorithm
2.3 Genetic Algorithm
2.4 Comparision of GA, PSO and HC
3 WMN-PSOHCDGA System Description
4 Simulation Results
5 Conclusions
References
A Comparison Study of FBR and FBRD Protocols for Underwater Optical Wireless Communication Using Transporter Autonomous Underwater Vehicles
1 Introduction
2 FBR and FBRD Protocols
3 Implementation of FBR and FBRD Protocol in the ONE Simulator
4 Simulations Scenario for Comparing FBR and FBRD Protocol for UOWC Using Transporter AUVs
5 Simulation Results
6 Conclusions and Future Work
References
General Dynamic Difficulty Adjustment System for Major Game Genres
1 Introduction
2 Related Works
3 Dynamic Difficulty Adjustment System
4 Results and Discussion
5 Conclusion
References
Method of Facial De-identification Using Machine Learning in Real-Time Video
1 Introduction
2 Related Work
2.1 YOLO
2.2 Facial Landmark
3 Proposed Method
3.1 Methodology
3.2 Experiment
4 Conclusions
References
Softprocessor RISCV-EC for Edge Computing Applications
1 Introduction
2 Related Work
3 Microarchitecture
3.1 Softprocessor Design
3.2 Instructions Type
4 Numerical Results
4.1 Resource Usage
4.2 Performance Comparison
5 Conclusions
References
Vulnerability of the Hypercube Network Based on P2-cuts
1 Introduction
2 Preliminary
3 Main Results
4 Conclusion
References
Applications of Artificial Fish Swarm Algorithms for Indoor Positioning and Target Tracking
1 Introduction
2 AFSA
3 AFSA Target Positioning and Tracking Methods
3.1 Target Positioning Method
3.2 Target Tracking Method
4 Simulation Results
5 Conclusions
References
Attacks and Threats Verification Based on 4G/5G Security Architecture
1 Introduction
2 Background
2.1 Attach Process
2.2 Key Hierarchy
2.3 Authentication and Key Agreement
3 Experiment and Results
3.1 Extracting IMSI Code Using DoS Attack
3.2 Sending Malicious SMS Using Downgrade Attack
4 Conclusion
References
Design of a Composite IoT Sensor Stack System for Smart Agriculture
1 Introduction
2 System Principle
2.1 MPPT Solar Controller
2.2 Wind Direction Sensor, Wind Speed Sensor
2.3 5-in-1 Air Sensor
2.4 Rain Sensor
2.5 6-in-1 Soil Sensor
3 System Design
4 System Validation
5 Conclusion
References
The Implement of a Reconfigurable Intelligence Trust Chain Platform with Anti-counterfeit Traceable Version Function for the Customized System-Module-IC
1 Introduction
2 Related Works
3 The Implement Platform of Anti-counterfeit Traceable Version of the Customized System-Module-IC by Using Reconfigurable Intelligence Trust Chain
3.1 Registration Phase
3.2 Reconfigurable Intelligence Trust Chain Phase
3.3 Real-Time Challenge for the Customized System, Module, or IC Chip Phase
4 Experimental Results
5 Conclusion
References
Prototyping of Haptic Datagloves for Deafblind People
1 Introduction
2 Literature Overview
3 The Haptic Dataglove Prototyping Process
3.1 The Dataglove Input and Its Enhancements
3.2 The Haptic Feedback
3.3 The Integrated System Prototype
4 Conclusions and Future Works
References
The Design and Implementation of a Weapon Detection System Based on the YOLOv5 Object Detection Algorithm
1 Introduction
2 Literature Review and Background
2.1 Deep Learning-Based Object Detection
2.2 R-CNN
2.3 Fast RCNN
2.4 Faster RCNN
3 Analysis and Study of YOLO Algorithm
3.1 Backbone and Neck Structures
3.2 Analysis of YOLOv5 Algorithm
4 YOLOv5 Improvements and Experiments
4.1 Experimental Dataset (Weapon Dataset)
4.2 Experimental Results
5 Conclusions
References
DR.QG: Enhancing Closed-Domain Question Answering via Retrieving Documents for Question Generation
1 Introduction
2 Methodology
2.1 DR.QG
2.2 DR.MQG
3 Experiments
3.1 Automatic Metrics
3.2 Experiment Datasets
3.3 Implementation Details
3.4 Results
4 Conclusion
References
QoS-Oriented Uplink OFDMA Random Access Scheme for IEEE 802.11be
1 Introduction
2 Uplink OFDMA Random Access (UORA)
3 Related Studies
4 Proposed Solutions
5 Simulation and Discussion
6 Conclusions and Future Work
References
Regression Testing Measurement Model to Improve CI/CD Process Quality and Speed
1 Introduction
2 CI/CD Process and Regression Testing
2.1 Relationship between CI/CD Process and Regression Testing
2.2 Importance of Regression Testing
3 Quality Items and Influencing Factors of Regression Testing
3.1 Main Features of Regression Testing
3.2 Quality Influencing Factors of Regression Testing
4 Regression Testing Measurement Model and Improvements
4.1 Regression Testing Measurement Model
4.2 RT Workflow Improvements
5 Advantages of RTM-Based Regression Testing
6 Conclusion
References
A Study on the Abnormal Stock Returns of Listed Companies in Taiwan\'s Construction Sub-industry due to the Covid-19 Epidemic Announcement
1 Introduction
2 Methodology
2.1 Research Periods and Event Days
2.2 Samples and Data
2.3 Building Expected Return on Stocks
2.4 Test for Abnormal Rate of Return
3 Empirical Results
3.1 Building Sub-Industry
3.2 Construction Sub-industry
3.3 Other Sub-industry
4 Results and Suggestions
Reference
The Business Model of Cross-Border E-Commerce: Source Globally, Sell Globally
1 Introduction
2 Literature Review
2.1 Definition and Application of B2B
2.2 Definition and Application of B2C
2.3 Definition and Application of O2O
3 Case Study and Research Methods
3.1 Case Profile
3.2 Business Model Diagram Analysis
4 Analysis Results
4.1 Value Propositions
4.2 Core Competencies (Key Resources)
4.3 Key Activities
4.4 Partners (Key Partnerships)
4.5 Target Customers (Customer Segments)
4.6 Channels
4.7 Customer Relationships
4.8 Sources of Income (Revenue Streams)
4.9 Cost Structure
5 Conclusion
References
Impact of SARS and COVID-19 on Taiwan’s Tourism Industry
1 Introduction
2 Literature Review
3 Research Methods
3.1 Event Study Method
3.2 Data Sources and Samples
4 Empirical Results
4.1 Verification of the Average Abnormal Rate of Return (AR) of E1 on the Event day
4.2 Verification of E1 Average Cumulative Abnormal Rate of Return (CAAR) on the Event day
4.3 Verification of E2 Average Abnormal Rate of Return (AR) on the Event day
4.4 Verification of E2 Average Cumulative Abnormal Rate of Return (CAAR) on the Event day
4.5 Verification of the Average Abnormal Rate of Return (AR) of E3 on the Event day
4.6 Verification of E3 Average Cumulative Abnormal Rate of Return (CAAR) on the Event day
4.7 Verification of E4 Average Abnormal Rate of Return (AR) on the Event day
4.8 Verification of E4 Average Cumulative Abnormal Rate of Return (CAAR) on the Event day
5 Conclusion
References
Using the Balanced Scorecard to Analyze Bank Operational Performance – Comparison of Domestic and Foreign Banks
1 Introduction
2 Literature Review
2.1 The Nature of the Balanced Scorecard
2.2 Four Aspects of Balanced Scorecard
3 Research Design
3.1 Research Methods
3.2 Research Object
3.3 Case Company Profile
4 Empirical Results
4.1 Situation of the Four Aspects of the Balanced Scorecard
5 Conclusion
5.1 Consider the Balanced Scorecard Indicators
5.2 Integration with Existing Enterprise Systems
5.3 Systematic Architecture
References
The Influence of CEO/CFO Turnover on Company Value
1 Introduction
2 Literature Review
2.1 The Literature on Corporate Value
2.2 Literature on Managerial Turnovers
3 Research Methods
References
The Relationships Between Underpricing and Turnover: The Study of Seasoned Equity Offerings
1 Introduction
2 Literature Review
2.1 Underpricing
2.2 Performance
3 Methodology
3.1 Model
3.2 Abnormal Return
3.3 Sample
4 Empirical Result
4.1 Descriptive Statistical Analysis
5 Conclusion
References
Research on the Influence of On-the-go Cross-store Access through APPs on Consumer Behavior
1 Introduction
2 Literature Review
2.1 Features and Characteristics of APP
2.2 Unified Theory of Acceptance and Use of Technology (UTAUT)
3 Research Model and Hypothesis
4 Data Analysis
5 Conclusions
References
Author Index




پست ها تصادفی