ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Mobile Multimedia Communications: 15th EAI International Conference, MobiMedia 2022, Virtual Event, July 22-24, 2022, Proceedings

دانلود کتاب ارتباطات چند رسانه ای موبایل: پانزدهمین کنفرانس بین المللی EAI، MobiMedia 2022، رویداد مجازی، 22-24 ژوئیه، 2022، مجموعه مقالات

Mobile Multimedia Communications: 15th EAI International Conference, MobiMedia 2022, Virtual Event, July 22-24, 2022, Proceedings

مشخصات کتاب

Mobile Multimedia Communications: 15th EAI International Conference, MobiMedia 2022, Virtual Event, July 22-24, 2022, Proceedings

ویرایش:  
نویسندگان: , ,   
سری: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 451 
ISBN (شابک) : 3031239016, 9783031239014 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 408
[409] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 34 Mb 

قیمت کتاب (تومان) : 43,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Mobile Multimedia Communications: 15th EAI International Conference, MobiMedia 2022, Virtual Event, July 22-24, 2022, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ارتباطات چند رسانه ای موبایل: پانزدهمین کنفرانس بین المللی EAI، MobiMedia 2022، رویداد مجازی، 22-24 ژوئیه، 2022، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ارتباطات چند رسانه ای موبایل: پانزدهمین کنفرانس بین المللی EAI، MobiMedia 2022، رویداد مجازی، 22-24 ژوئیه، 2022، مجموعه مقالات

این کتاب مجموعه مقالات پس از کنفرانس با داوری کامل پانزدهمین کنفرانس بین المللی EAI در زمینه ارتباطات چندرسانه ای موبایل، MobiMedia 2022 است که در 22 تا 24 ژوئیه 2022 برگزار شد. به دلیل همه گیری COVID-19 کنفرانس به صورت مجازی برگزار شد.
29 مقاله کامل ارائه شده با دقت از بین ارسالی های متعدد انتخاب شدند. مقالات در بخش های موضوعی به شرح زیر سازماندهی شده اند: اینترنت اشیا و ارتباطات بی سیم بهینه سازی استراتژی ارتباطات. امنیت فضای مجازی در رمزنگاری، حفاظت از حریم خصوصی، به اشتراک گذاری داده ها، کنترل دسترسی و پیش بینی وظایف؛ شبکه های عصبی و یادگیری ویژگی. و تشخیص و تشخیص شیء.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the thoroughly refereed post-conference proceedings of the 15th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2022, held in July 22-24, 2022. Due to COVID-19 pandemic the conference was held virtually.
The 29 full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication Strategy Optimization; Cyberspace Security on Cryptography, Privacy Protection, Data Sharing, Access Control and Task Prediction; Neural Networks and Feature Learning; and Object Recognition and Detection.



فهرست مطالب

Preface
Organization
Contents
Internet of Things, Wireless Communications and Communication Strategy Optimization
A Novel Cross-Resolution Image Alignment for Multi-camera System
	1 Introduction
	2 Related Work
	3 The Proposed Method
		3.1 Coarse Matching in Low-Resolution
		3.2 Model Estimation in High-Resolution
	4 Experiments
		4.1 Implementation
		4.2 Results
	5 Conclusion
	References
IOT Water Meter Reading System Based on Multi-agent and Ah Hoc
	1 Introduction
	2 System Model Based on Multi-agent
		2.1 System Architecture
		2.2 Coordination Mechanism Between Agents
	3 System Hardware Design
		3.1 Collector Agent
		3.2 Concentrator Agent
	4 FMCOS-SE Security Module File Structure Design
	5 Agent Communication Protocol Design
		5.1 Command 1
		5.2 Command 2
		5.3 Command 3
		5.4 Check Unit
	6 Routing Protocol Design
		6.1 Ad Hoc routing protocol
		6.2 Four Basic Messages Design
		6.3 Route Discovery
	7 Conclusion
	References
The Optimization of Higher Vocational Accounting Curriculum System Under the Background of Intelligentization: A Web Crawler Based Method
	1 OBE Education Concept
	2 Problems Existing in Cultivating Accounting Professionals in Higher Vocational Colleges
		2.1 Market Demand Positioning is Not Accurate
		2.2 Talent Cultivation Target Positioning is Not Clear
		2.3 The Setting of Professional Curriculum is Out of Date
	3 The Market Demand of Accounting Talents’ Knowledge, Ability and Accomplishment
		3.1 Accounting Personnel Knowledge Structure Demand Data and Analysis
		3.2 Accounting Personnel Post Ability Demand Data and Analysis
		3.3 Accounting Personnel’s Professional Literacy Demand Data and Analysis
	4 Establishment of Cultivation Objectives for Higher Vocational Accounting Professionals in the Era of Intelligence
	5 Construction of Curriculum System of Higher Vocational Accounting in Intelligent Era
	6 Conclusion
	References
A Direct Location Algorithm Based on Gauss Newton Iteration
	1 Introduction
	2 Normal Shadow Fading Model
	3 Methodology
		3.1 Data Preprocessing
		3.2 Gauss Newton Iterative Algorithm
		3.3 Direct Location Algorithm
		3.4 Error Correction
	4 Experimental Results and Conclusions
	References
Angle of Arrival Based Signal Classification in Intelligent Reflecting Surface-Aided Wireless Communications
	1 Introduction
	2 Related Works
		2.1 Intelligent Reflecting Surface-Aided Wireless Communication
		2.2 Angle of Arrival Estimation
	3 System Model and Proposed Methodology
		3.1 System Model
		3.2 AoA Based Signal Classification
	4 Numerical Results
	5 Conclusions
	References
An Efficient Compression and Reconstruction Framework for Electromagnetic Spectrum Data
	1 Introduce
	2 Dictionary Learning and QRK-SVD
		2.1 Dictionary Learning
		2.2 QRK-SVD
	3 Data Set and System Model
		3.1 Electromagnetic Spectrum Data Set
		3.2 System Model
	4 Experiments
		4.1 Evaluation Indicators
		4.2 Dictionary Error and Reconstruction Error
		4.3 Reconstruction Capability with Different Dictionary Sizes
		4.4 Reconstruction Capability with Different Sample Sizes
		4.5 The Amount of Data at the Same Reconstruction Accuracy
	5 Summarize
	References
A Survey on Intelligent Question and Answer Systems
	1 Introduction
	2 Qualified Domain Oriented QA Systems
		2.1 Pipelined Task-Based QA Systems
		2.2 End-to-End Task-Based QA Systems
	3 Open Domain Oriented QA Systems
		3.1 Retrieval-Based QA Systems
		3.2 Generative-Based QA Systems
		3.3 Hybrid-Based QA Systems
	4 Conclusion
	References
Cyberspace Security on Cryptography, Privacy Protection, Data Sharing, Access Control and Task Prediction
Privacy-Preserving Decision Tree Classification Protocol Based on Bitwise Comparison
	1 Introduction
	2 Preliminaries
		2.1 Decision Tree Classification
		2.2 Beaver Multiplicative Triple
		2.3 Paillier Encryption Algorithm
	3 System Model and Security Model
		3.1 System Model
		3.2 Security Model
	4 Privacy-Preserving Decision Tree Classification
		4.1 Secure Decision Node Comparison
		4.2 Secure Path Evaluation
		4.3 Secure Classification Result Generation
	5 Security Analysis
	6 Performance Evaluation
		6.1 Complex Analysis
		6.2 Efficiency Analysis
	7 Conclusion
	References
A Bi-objective Source Hiding Method for Network Propagation
	1 Introduction
	2 Source Hiding Analysis
	3 Metric and Method
		3.1 Metric for Source Hiding
		3.2 Metric for Source Dissemination Capability
		3.3 Bi-objective Source Hiding Method
	4 Experiment
		4.1 Dataset
		4.2 Evaluation Metrics
		4.3 Experimental Results on Scale-Free Network
		4.4 Experimental Results on Small-World Network
		4.5 Experimental Results on Real Network
	5 Conclusion
	References
Proof of Storage with Corruption Identification and Recovery for Dynamic Group Users
	1 Introduction
		1.1 Related Work
	2 Models and Goals
		2.1 System Model
		2.2 Threat Model
		2.3 Design Goals
	3 Preliminaries and Definitions
		3.1 Preliminaries
		3.2 Definitions
	4 CIRG Scheme
		4.1 High-Level Explanation
		4.2 Data Encoding of Group Users
		4.3 Description of CIRD Scheme
		4.4 Dynamic Group Users and Data Recovery
	5 Security Analysis
	6 Conclusion
	References
A Coding Management System for Traceability of Chinese Agricultural Products Based on Blockchain
	1 Introduction
		1.1 A Subsection Sample
	2 Related Work
	3 Technical Background
		3.1 The Blockchain Technology
		3.2 Item Coding Technology
	4 Detailed Description of System Functions
		4.1 System Implementation Functions and Requirements
		4.2 Detailed Description of Functional Requirements
	5 Conclusion
	References
Blockchain Traceability Platform Based on Green Agricultural Products
	1 Research and Development
	2 Technical Route
		2.1 Platform Design Ideas
		2.2 Platform Design Principles
		2.3 Development Language Selection
		2.4 Database Selection
		2.5 System Functional Structure
	3 Key Points and Innovation Points
	4 Summarize
	References
FPPNet: Fast Privacy-Preserving Neural Network via Three-Party Arithmetic Secret Sharing
	1 Introduction
	2 Related Work
	3 Problem Statement
	4 Basic Protocols
		4.1 Concepts and Descriptions
		4.2 Secure Conversion Protocols
	5 The Construction of FPPNet
		5.1 Secure Linear Layer
		5.2 Secure ReLU and Max-Pooling Layers
		5.3 Secure Sigmoid Layer
	6 Theoretical Analysis
		6.1 Security Analysis
		6.2 Complexity Analysis
	7 Experimental Results
	8 Conclusion
	References
Broadband Long-Term Spectrum Prediction Based on Trend Based SAX
	1 Introduction
	2 Trend Based Symbolic Aggregate Approximation Method
		2.1 Monitoring Data Autocorrelation Analysis
		2.2 Trend Based Symbolic Aggregate Approximation (TrSAX)
	3 Spectrum Prediction Based on Seq2seq
		3.1 Long Short-Term Memory Network (LSTM)
		3.2 Spectrum Prediction Based on Seq2seq
	4 Experimental and Results
		4.1 Datasets and Preprocessing
		4.2 Analysis of Results
	5 Conclusion
	References
A Joint Weighted Nonnegative Matrix Factorization Model via Fusing Attribute Information for Link Prediction
	1 Introduction
	2 Related Work
	3 Preliminary
		3.1 Network Representation
		3.2 Link Prediction Problem
	4 Proposed Method
		4.1 Link Prediction Model: JWNMF
		4.2 Update Rules
	5 Experiment
		5.1 Datasets
		5.2 Datasets Division Method
		5.3 Evaluation Metrics
		5.4 Baseline Methods
		5.5 Experimental Results and Analysis
		5.6 Model Parameter Setting
		5.7 Performance Analysis
	6 Conclusion
	References
Neural Networks and Feature Learning
Research on Music Genre Classification Based on Residual Network
	1 Introduction
		1.1 Related Work
		1.2 Contribution and Thesis Structure of the Paper
	2 Data
		2.1 Data Sets and Hardware Settings
		2.2 Additional Settings
	3 Method
		3.1 Short-Time Fourier Transform (STFT)
		3.2 Mel-Frequency Spectrum Factor
		3.3 Deep Learning Models
	4 Experiments and Analysis
		4.1 Quantification Results
		4.2 Qualitative Results
		4.3 Comparison of Results
	5 Conclusion
	References
Individual Identification Based on ECG Signal Driven by Multi-layer LSTM and EEMD Algorithm
	1 Introduction
	2 Related Works
	3 Methods
		3.1 Denoising
		3.2 Ensemble Empirical Mode Decomposition
		3.3 Long Short-Term Memory
		3.4 EEMD-LSTM ECG Authentication Model
	4 Experimental Results and Discussion
		4.1 Data Description
		4.2 Model Evaluation Index
		4.3 Results of the ECG-Based Biometric Algorithm
	5 Conclusion
	References
Electromagnetic Signal Interference Based on Convolutional Autoencoder
	1 Introduction
	2 Method
		2.1 System Model
		2.2 Convolutional Auto-encoder
	3 Interference Effect Analysis
	4 Conclusion
	References
Integrating Higher-Order Features for Structural Role Discovery
	1 Introduction
	2 Related Work
	3 Method
		3.1 Notions
		3.2 Model
	4 Experiment
		4.1 Dataset
		4.2 Baseline
		4.3 Experiment Setting
		4.4 Role Classification
		4.5 Visualization
		4.6 Ablation Study
		4.7 Parameter Analysis
	5 Conclusion
	References
An Overview of Multimodal Fusion Learning
	1 Introduction
	2 Definition and Development Process of Multimodal Learning
		2.1 Definition of Multimodal Learning
		2.2 Development of Multimodal Learning
	3 Multimodal Fusion Methods
		3.1 Model-Independent Fusion Methods
		3.2 Model-Based Fusion Methods
	4 Research Challenges in Multimodal Fusion Technology
	5 Summary and Outlooks
	References
Exploring Spatial Patterns of Emergency Call Behavior in a Metropolitan City of China
	1 Introduction
	2 Materials and Methods
		2.1 Dataset Description
		2.2 Methods
	3 Empirical Results
		3.1 Spatial Patterns of Emergency Call Behavior
		3.2 Relative Position of Incident Location
	4 Model
	5 Conclusions
	References
Event Annotation Enhanced Pre-trained Language Model in Event Extraction
	1 Introduction
	2 Related Work
	3 Method
		3.1 Event Type Classifier
		3.2 Event Extraction Model
	4 Expriment
		4.1 Datasets and Evaluation Metric
		4.2 Implementation Details
		4.3 Overall Evaluation Results
		4.4 Effectiveness of Event Annotations
		4.5 Effect of w and
	5 Conclusion
	References
Dynamic Style Transferring and Content Preserving for Domain Generalization
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Preliminary
		3.2 Overview of Proposed Method
		3.3 Dynamic Style Transferring
		3.4 Dynamic Content Preserving
	4 Experiments
		4.1 Datasets and Implementation Details
		4.2 Results on PACS
		4.3 Ablation Study
		4.4 Results on Office-Home
	5 Conclusion
	References
Graph Representation Learning for Assisting Administrative Penalty Decisions
	1 Introduction
	2 Related Work
	3 The Proposed Framework
		3.1 The Framework for Intelligent Assisted Penalty Decisions Based on Node Classification
		3.2 The Framework for Intelligent Assisted Penalty Decisions Based on Graph Classification
	4 Results
		4.1 Evaluation Metric
		4.2 Parameters Setting
		4.3 Datasets
		4.4 Experiment Analysis
	5 Conclusion
	References
Object Recognition and Detection
A Robust Signal Modulation Recognition Method Against Black-Box Detection Attack
	1 Introduction
	2 Methodology
		2.1 Black-Box Detection Attack
		2.2 Defensive Distillation
		2.3 Framework of Teacher Network and Student Network
		2.4 Datasets
	3 Experiments
	4 Conclusion
	References
Electric Energy Meter Information Recognition System Based on Deep Learning
	1 Introduction
	2 OCR Text Detection Method
		2.1 The Basic Process of CTPN Network Detection
	3 OCR Text Recognition Method
		3.1 The CRNN Network is Mainly Divided into Three Modules
		3.2 The Specific Implementation Steps of CRNN
	4 Experiment
		4.1 Evaluation Indicators
		4.2 Electric Energy Meter Detection
		4.3 Electric Energy Meter Identification
		4.4 Model Comparison
	5 Conclusion
	References
Towards Defending Adversarial Attacks with Temperature Regularization in Automatic Modulation Recognition
	1 Introduction
	2 Preliminaries
	3 Methodology
		3.1 Temperature Regularization
		3.2 Datasets and Target Model
		3.3 Implementation
	4 Experiments
		4.1 Temperature Parameter Space Exploration
		4.2 Defending Against Adversarial Attacks
	5 Conclusion
	References
PF-Net: Personalized Filter for Speaker Recognition from Raw Waveform
	1 Introduction
	2 The SincNet Architecture
		2.1 Model Properties
	3 Related Work
	4 Experimental Setup
		4.1 Corpora
		4.2 PF-Net Setup
		4.3 Baseline Setups
	5 Results
		5.1 Filter Analysis
		5.2 Speaker Identification
		5.3 Speaker Verification
	6 Conclusion
	References
Retrospective Evaluation of COVID-19 Therapeutics
	1 Introduction
	2 Methods
		2.1 Study Design and Participants
		2.2 Data Collection
		2.3 Statistical Analysis
	3 Results
	4 Discussion
	References
Author Index




نظرات کاربران