دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2022 نویسندگان: Nguyen-Son Vo (editor), Quoc-Tuan Vien (editor), Dac-Binh Ha (editor) سری: ISBN (شابک) : 3031088778, 9783031088773 ناشر: Springer سال نشر: 2022 تعداد صفحات: 289 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 47 مگابایت
در صورت تبدیل فایل کتاب Industrial Networks and Intelligent Systems: 8th EAI International Conference, INISCOM 2022, Virtual Event, April 21–22, 2022, Proceedings (Lecture ... and Telecommunications Engineering, 444) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های صنعتی و سیستم های هوشمند: هشتمین کنفرانس بین المللی EAI، INISCOM 2022، رویداد مجازی، 21–22 آوریل 2022، مجموعه مقالات (سخنرانی ... و مهندسی مخابرات، 444) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
< span> 19 مقاله کامل از 48 مقاله ارسالی انتخاب شدند و به صورت موضوعی در مسیرهای سیستمها و شبکههای مخابراتی سازماندهی شدهاند. پردازش اطلاعات و تجزیه و تحلیل داده ها؛ شبکه های صنعتی و سیستم های هوشمند؛ امنیت و حریم خصوصی.
The 19 full papers were selected from 48 submissions and are organized thematically in tracks on Telecommunications Systems and Networks; Information Processing and Data Analysis; Industrial Networks and Intelligent Systems; Security and Privacy.
Preface Organization Contents Telecommunications Systems and Networks Rate Region and Achievable Rates of Full-Duplex Cognitive Radio NOMA Channels Under Imperfect Spectrum Sensing 1 Introduction 2 System Model 2.1 Modes of Operation 2.2 Secondary Channels Under Imperfect Spectrum Sensing 2.3 Achievable Rates 3 Sensing Performance Metrics 3.1 Individual Sensing Performance 3.2 Global (Cooperative) Sensing Performance 4 Rate Region and Achievable Rates 4.1 Rate Region 4.2 Achievable Rates of SUs 5 Numerical Result 6 Conclusion References Reconfigurable Intelligent Surfaces for Downlink Cellular Networks 1 Introduction 2 System Model 2.1 Network Model 2.2 RIS-Aided Communication Models 2.3 Transmission Schemes 2.4 Information Throughput 3 Problem Statement and Methodology 4 Joint Power Allocation and Phase Shift Optimization 4.1 Power Control Coefficients Optimization 4.2 RIS Phase Shift Optimization 5 Simulation Results 6 Conclusions References QoS-Aware Load Balancing Scheme in Dense Wi-Fi 6 WLANs 1 Introduction 2 Literature Review 3 Network Architecture 3.1 Problem Definition 4 The Proposed Access Controller Scheme 4.1 Admission Control 4.2 Association Control 4.3 Adaptive CST Control 5 Evaluation 5.1 Results 6 Conclusion References Performance Analysis of Intelligent Reflecting Surface-Aided Mobile Edge Computing Network with Uplink NOMA Scheme 1 Introduction 2 System Model 3 Performance Analysis 4 Numerical Results and Discussion 4.1 The Impact of the Average Transmit SNR and the Number of IRS Elements 4.2 The Impact of the Task Length and the Bandwidth 4.3 The Impact of Power Allocation Coefficient 5 Conclusion References Performance Analysis of RF Energy Harvesting NOMA Mobile Edge Computing in Multiple Devices IIoT Networks 1 Introduction 2 System Model 2.1 Proposed Methodology 3 Performance Analysis 4 Numerical Results and Discussion 5 Conclusion References Design and Performance Evaluation of Full-Duplex Relay Node in LoRaWAN-Based System 1 Introduction 2 System Design 2.1 The Hardware of FDRN 2.2 The Software of FDRN 2.3 The Novel LoRaWAN Architecture 3 Experiment Results and Discussion 4 Conclusion and Future Work References Throughput Optimization for NOMA Cognitive Radios with Multi-UAV Assisted Relay 1 Introduction 2 System Model and Communication Protocol 2.1 System Model and Channel Assumptions 2.2 Communication Protocol 3 System Performance Analysis and Problem Formulation 4 CGA Aided Optimum Power Allocation and URs' Altitudes 5 Numerical Analysis 6 Conclusions References Information Processing and Data Analysis An Intelligent Edge System for Face Mask Recognition Application 1 Introduction 2 Related Work 2.1 COVID-19 2.2 Edge Artificial Intelligence and Containerization 2.3 Deep Learning-Based Object Detection 3 Proposed System 3.1 System Design 3.2 System Implementation 4 Experimental Results 4.1 Deep Learning Model Evaluation 4.2 High Availability and Performance Evaluation 4.3 Hardware Resource Usage Assessment 5 Conclusion References Advanced Joint Model for Vietnamese Intent Detection and Slot Tagging 1 Introduction 2 Our Model 2.1 Baseline Model 2.2 Proposed Model: BiJoint-BERT-NLU 3 Related Works 4 Experiments 4.1 Datasets 4.2 Experiment Preparation 4.3 Experimental Results 5 Conclusion References Optimising Maritime Big Data by K-means Clustering with Mapreduce Model 1 Introduction 2 KMA and Hadoop Architecture Implementation of MRM 2.1 KMA 2.2 MRM 2.3 Hadoop Architecture Implementation of MRM 3 Optimised MRM with KMC 4 Testing and Analysis 4.1 Data Input 4.2 Implementation of MRM with KMC 5 Conclusion References Histopathological Imaging Classification of Breast Tissue for Cancer Diagnosis Support Using Deep Learning Models 1 Introduction 2 EfficientNet Model 2.1 Model Scaling of EfficientNet 2.2 EfficientNet Architecture 3 Dataset and Image Pre-processing 3.1 Distinctive Features of Diseased Tissue Images 3.2 Dataset 3.3 Data Augmentation 4 The Process of Breast Tissue Imaging Classification and Building the Software Tool for Cancer Diagnosis Support 4.1 The Process of Breast Tissue Imaging Classification 4.2 Evaluation Metrics 4.3 Building the Application for Cancer Diagnosis Support 5 Conclusion References Industrial Networks and Intelligent Systems Navigation for Two-Wheeled Differential Mobile Robot in the Special Environment 1 Introduction 2 Robot Positioning Using Sensors and Virtual Paths 2.1 Kinematic Model of Mobile Robot 2.2 Position and Orientation of Mobile Robot Based on Reference Points 2.3 Application Filter for Mobile Robot 3 Tracking the Trajectory and Obstacle Avoidance 3.1 Trajectory Tracking 3.2 Obstacle Avoidance Using VFH+ with Ultrasonic Sensors 4 Simulation and Experimental Results 4.1 Track the Trajectory When There Are no Obstacles 4.2 Track the Trajectory and Avoid Obstacles 5 Conclusions References Improving the Control Performance of Jacking System of Jack-Up Rig Using Self-adaptive Fuzzy Controller Based on Particle Swarm Optimization 1 Introduction 2 Mathematical Modeling of Jacking System 2.1 The Movements of the Jack-Up Rig 2.2 Mathematical Model of the Jacking Control System 3 Effected Factors Analysis 3.1 Environmental Factors 3.2 Internal Factors 4 Self-adaptive Fuzzy Controller for Jacking System 4.1 Fuzzy PID Controller 4.2 Fuzzy Particle Swarm Optimization Controller 5 Simulation and Evaluation 5.1 Configuration Parameter 5.2 Simulation Results 6 Conclusion References Stabilization Controller Design for Differential Mobile Robot Using Lyapunov Function and Extended Kalman Filter 1 Introduction 2 Problem Description 3 Controller Design 3.1 Stability Control in the Global Configuration ΩG 3.2 Stable Control in Local Configuration ΩL 3.3 Using Kalman Filter for Feedback Control Loop 4 Simulation and Experiment 5 Conclusion References Red-Light Running Violation Detection of Vehicles in Video Using Deep Learning Methods 1 Introduction 2 Related Works 3 Vehicle Tracking Algorithm 4 Rule-Based Method 5 Recurrent-Based Methods 5.1 Long Short Term Memory (LSTM) 5.2 Attention Layer 5.3 Deep LSTM with Attention Mechanism 5.4 Dense LSTM with CNN1D Method 6 Experiments 6.1 Dataset 6.2 Evaluation Metrics 6.3 Results 6.4 Performance 7 Conclusion and Perspectives References Security and Privacy Impact of Wireless Backhaul and Imperfect Channel Estimation on Secure Communication Networks 1 Introduction 2 System Model 3 SNR Distributions 4 Secrecy Performance Analysis 5 Numerical Results 6 Conclusion References Performance Analysis of Non-profiled Side Channel Attack Based on Multi-layer Perceptron Using Significant Hamming Weight Labeling 1 Introduction 1.1 Related Works and Motivation 1.2 Paper Outline 2 Data Preparation 2.1 Attack Datasets 2.2 Imbalanced Data Problem 2.3 Significant HW Labeling 2.4 Dataset Reconstruction 3 Proposed Deep Learning Architecture 4 Experimental Results 5 Conclusion References Full-Duplex UAV Aided Communication in the Presence of Multiple Malicious Jammers 1 Introduction 2 System Model and Problem Formulation 3 Proposed Algorithm 3.1 Design for DLU Scheduling 3.2 Design for ULU Scheduling 3.3 Design for UAV Trajectory 3.4 Design for ULU Transmit Power Control 4 Numerical Results 5 Conclusion References On Secrecy Analysis of UAV-Enabled Relaying NOMA Systems with RF Energy Harvesting 1 Introduction 2 System Model and Communication Protocol 2.1 System and Channel Model 2.2 Communication Protocol 3 Secrecy Performance Analysis 4 Numerical Result 5 Conclusion A Proof of Lemma 1 B Proof of Lemma 2 References Author Index