دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Jian Dong. Long Zhang
سری: Lecture Notes in Electrical Engineering, 1015
ISBN (شابک) : 9819904153, 9789819904150
ناشر: Springer
سال نشر: 2023
تعداد صفحات: 805
[806]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 66 Mb
در صورت تبدیل فایل کتاب Proceedings of the International Conference on Internet of Things, Communication and Intelligent Technology به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی اینترنت اشیا، ارتباطات و فناوری هوشمند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات تحقیقاتی اصلی و بررسی شده از کنفرانس بین المللی اینترنت اشیا، ارتباطات و فناوری هوشمند (IoTCIT) 2022 است. این کتاب شامل کاربرد مهندسی ارتباطات و اینترنت اشیا در عصر فناوری هوشمند + از نقطه نظر ادغام رشته ای، ترکیب نظریه و الگوریتم های مرتبط با اینترنت اشیا و فناوری هوشمند. این موضوعات طیف کاملی از راهحلهای اینترنت اشیا، از اینترنت اشیا گرفته تا امنیت شبکه را پوشش میدهند و بر بسیاری از اشکال ارتباطی مانند ارتباطات موبایل نسل بعدی (6G)، ارتباطات D2D و M2M تمرکز دارند. علاوه بر این، فناوری هوشمند را با تمرکز بر مدل سازی و شبیه سازی سیستم اطلاعاتی بررسی می کند. همچنین محاسبات ابری، محاسبات فراگیر و سیار، محاسبات توزیع شده، محاسبات با عملکرد بالا، و محاسبات همه جا حاضر را بررسی می کند.
This book includes original, peer-reviewed research papers from the International Conference on Internet of Things, Communication and Intelligent Technology (IoTCIT) 2022. It contains the application of communication and IoT engineering in the age of intelligent technology+ from the standpoint of disciplinary integration, combining theory and associated IoT and intelligent technology algorithms. The topics cover the full range of IoT solutions, from IoT to network security, and focus on many forms of communication, such as Next Generation (6G) Mobile Communication, D2D, and M2M Communication. Additionally, it examines Intelligent Technology, with a focus on Information System Modeling and Simulation. It also explores Cloud Computing, Pervasive and Mobile Computing, Distributed Computing, High Performance Computing, and Ubiquitous Computing.
Preface Introduction Contents Internet of Things The Real-Time LOS Calibration Method by Using MCP for Linear Array Whiskbroom Optical Sensor 1 Introduction 2 LOS Calibration Model 2.1 Rigorous Imaging Model 2.2 LOS Attitude Angles Model 3 Technical Approach 3.1 Determine the Background Observations 3.2 The Procedure of Proposed Method 3.3 Derivation of EKF 4 Experiment 4.1 Method Comparison 4.2 Method Verification 5 Conclusions References Design and Research of Aquaculture Monitoring Equipment Based on IoTs 1 Introduction 2 System Design 2.1 The Overall Framework of the System 2.2 Monitoring Terminal Equipment 2.3 System Upper Computer Design 3 Experiments 4 Conclusion References A New Generation of Intelligent IoT Technology in Power Distribution System 1 Introduction 2 Application Requirements for a New Generation of Intelligent Power Distribution System 2.1 Necessity of Digital Transformation of Power Distribution System 2.2 Demand Analysis of Power Distribution System 3 Intelligent Power Distribution IoT System 3.1 Architecture of Power Distribution and Internet of Things System 3.2 Key Technologies 4 Intelligent Internet of Things Solutions for Electrical Systems 4.1 IoT System of Low-Voltage Transformer Area 4.2 Three-Phase Imbalance Treatment of Transformer Area Based on Smart Switch 5 Prospect 5.1 Construction of Multi-level Partition Management and Control System for Power Distribution System 5.2 Research on HPLC-Based Dual Module Network Technology 5.3 IoT Intelligent Circuit Breaker and Its System 6 Conclusion References New Intelligent Sensing Terminal System Architecture of Internet of Things 1 Introduction 2 Intelligent Sensing Layer 2.1 Intelligent Sensor 2.2 Intelligent Sensor Hardware Interface 2.3 Intelligent Sensor Software Interface 3 Computing Fusion Collaboration Layer 3.1 Calculation 3.2 Fuse 3.3 Coordination 4 Local Application Layer 4.1 Middleware 4.2 Application 5 Communication Layer 5.1 Communication Mode 5.2 Communication Format 5.3 Communication Data Sheet 6 Summary References A Truthful Revenue-Maximizing Resource Allocation Auction Mechanism in the Internet of Vehicles Cloud-Edge Environment 1 Introduction 2 Related Works 3 IoV Cloud-Edge Collaboration Problem Description and Mechanism Design Related Theories 4 Online Cloud-Edge Server RA Auction Mechanism OCESRAP 4.1 Highlighted Idea 4.2 The Framework of OCESRAP 5 Experimental Results 5.1 Experimental Setup 5.2 Analysis of the Results 6 Conclusion References An Energy-Efficient Computing Offloading Strategy Based on Improved Sparrow Search Algorithm in Mobile Edge Computing 1 Introduction 2 Related Work 3 System Model 3.1 Mobile Edge Computing System 3.2 Communication Model 3.3 Computation Model 3.4 Problem Formulation 4 Optimization Based on SSA Algorithm 4.1 Improved Sparrow Search Algorithm 4.2 ISSA for Edge Computing 5 Experiment and Performance Evaluation 5.1 Simulation Setting 5.2 Convergence Analysis 5.3 Performance Analysis 6 Conclusion References Effective Capacity Analysis of RIS-Aided Wireless Networks in the Finite Blocklength Regime 1 Introduction 2 System Model 3 Performance Analysis 3.1 Effective Capacity in the FBL Regime 3.2 Statistical Characterization of End-to-End Channel 3.3 Performance Evaluation of the EC in the FBL Regime 4 Simulation and Numerical Results 5 Conclusion References Cooperative UAV-Assisted Joint Scheduling of Coexisting URLLC and eMBB Services 1 Introduction 2 System Model 2.1 System Description 2.2 Channel Model 2.3 URLLC Communication Model 2.4 eMBB Communication Model 3 Problem Formulation and Solution 3.1 Problem Formulation 3.2 eMBB Bandwidth Allocation Optimization 3.3 URLLC Puncturing Scheduling Optimization 3.4 UAV Trajectory Optimization 4 Simulation Results 5 Conclusion References Localization of Wireless Sensor Network Using Neural Network and Line Segment Secondary Calibration 1 Introduction 1.1 Background 1.2 FlagLoc Algorithm 1.3 Contribution 1.4 Paper Structure 2 Related Work 3 Algorithm 3.1 Use FCNN for Preliminary Positioning 3.2 Line Segment Secondary Calibration 3.3 Principle 3.4 Performance of Line Segment Secondary Calibration 4 Experimental Results and Analysis 4.1 Experimental Environment and Experiment Setup 4.2 Experimental Process and Results 5 Summary and Future Outlook References Design of Illumination Data Acquisition System Based on NB-IoT 1 Introduction 2 System Design 2.1 The Overall Framework of the System 2.2 Monitoring Terminal Equipment 3 Design of Data Acquisition Software 3.1 Instruction Sending Program Design 3.2 Main Programming 3.3 CoAP Protocol Based Data Transmission Procedures 4 NB-IoT Module Access to OceanConnect Platform 4.1 CoAP Protocol Based Data Transmission Procedures 4.2 Device Access to the Network 5 Experimental Tests 6 Conclusion References Digital High-Precision Wax Mold Casting Workshop Based on Internet of Things 1 Introduction 2 System Design 2.1 System Architecture 2.2 Hardware Design 3 Indoor Location Based on KILA Algorithm 3.1 RFID Technology 3.2 LoRa Module Localization Based on TDOA Algorithm 3.3 Indoor Positioning Algorithm Based on Data Fusion 4 Scheduling Optimization Based on Genetic Algorithm 5 Conclusion References Dynamic Resource Allocation for Containerized Applications in Edge Computing 1 Introduction 2 System Design 3 Evaluation 4 Conclusions References Research of Lightweight Detection Method of Distributed Denial of Service Attack on Satellite Internet 1 Introduction 2 Related Work 3 Connection Counting and Attack Detection Methods Based on the Bloom Filter 3.1 Connection Counting Method Based on Improved Bloom Filter 3.2 Attack Detection Method Based on Probability Distribution 4 Simulation and Results 4.1 DDoS Attack Detection and Evaluation Index 4.2 Effectiveness and Sensitivity Test 4.3 TP and FP Rate Test 5 Conclusion References A MANET Delay Guaranteed Cross-Layer Optimization Protocol—DGCOP 1 Instruction 2 Related Work 2.1 Network Routing Technology 2.2 Link Access Technology 2.3 Network Scheduling Technology 3 DGCOP 3.1 Pre-allocation Mechanism 3.2 Dynamic Time Slot Allocation Mechanism 3.3 Dynamic Delay Task Allocation Mechanism 3.4 Access Control Self-adaptive Queue Scheduling Mechanism 4 Experimental Results 4.1 Impact of Mobility on Performance 4.2 Impact of User Expectation Delay on Performance 5 Conclusion References Unmanned Collaborative Computing Offloading Based on Double-Greedy Joint Optimization of LODCO 1 Introduction 2 System Modeling 2.1 Computation Offload Model 2.2 Energy Harvesting Model 2.3 Computation Cost Model 2.4 Optimization Objectives and Constraints 3 JOLDO Algorithm Design and Simulation 4 Conclusion References Comparison and Experimental Analysis of Information Interaction Models in Operation Simulation System 1 Introduction 2 Related Work 3 Hierarchy Model 3.1 Information Interaction State 3.2 Computation Logic 3.3 Model Analysis 4 Graph Model 4.1 Information Interaction State 4.2 Computation Logic 4.3 Model Analysis 5 Simulation Experiment 5.1 Experiment Design 5.2 Analysis of Modeling Ability 5.3 Analysis of Computation Performance 6 Conclusion References Energy-Efficient Data Collection Scheme Based on Data Integrity Degree in UAV-Assisted IoT Network 1 Introduction 2 System Model 2.1 Network Topology and Targets Coverage 2.2 Communication Model and Energy Consumption 3 Solution 3.1 Non-dominated Sorting Genetic Algorithm-II 3.2 Variable Neighborhood Path Optimization Algorithm 4 Simulation Results and Discussions 5 Conclusion References Analysis of Internet of Vehicles Technology Evolution and Trends Based on Bibliometric Visualization 1 Introduction 2 Data and Research Method 2.1 Data 2.2 Research Method 3 Analysis of the Research Results 3.1 Analysis of the Volume of Papers 3.2 Keyword Co-occurrence Analysis 3.3 Keyword Betweenness Centrality Analysis 3.4 Keyword Burst Analysis 4 Conclusions References Research on Operation and Maintenance of Decentralized Data Microservice Automation Based on Kubernetes 1 Introduction 2 Kubernetes-Based Automated Operation and Maintenance Strategy for Decentralized Data Microservices 3 Performance Evaluation 3.1 Experiment Setting 3.2 Experimental Results and Analysis 4 Conclusion References Communication 5G OFDM Signal Design Approach for Target Detection 1 Introduction 2 Signal Model and Problem Formulation 2.1 OFDM Signal Model and Parameter Design 2.2 Optimization Problem Formulation 3 OFDM Signal Design Algorithm 4 Simulation Results 5 Conclusion References A New Type of Voter Based on Photoelectric Memristor 1 Introduction 2 Analysis of Photoelectric Memristor 3 Design and Simulation of the Three-Input-Majority-Voter Based on Photoelectric Memristor 4 Function Verification and Simulation of the New Three-Input-Majority-Voter 5 Conclusion References Research and Analysis on the Signal Regime of 802.15.4z Protocol LRP UWB Communication and Navigation Integration 1 Introduction 2 Materials and Methods 2.1 LPR UWB Symbol Structure and Ranging Flow Design 2.2 HPR UWB Symbol Structure 2.3 HRP UWB and LPR UWB Signal Models 3 Results 3.1 System BER Versus S/N Ratio 3.2 System Range Error Versus Signal-To-Noise Ratio 3.3 System Range Error Versus Range Distance 4 Discussion 5 Conclusions References Cross-Technology Interference Mitigation for Wearable Devices 1 Introduction 2 CT-CooM Design 2.1 Design Overview 2.2 Beacons with CTC Message 2.3 Selection of CT-WiFi 3 Evaluation 3.1 Impact of WiFi Interference 3.2 Evaluation of CT-CooM Performance 4 Conclusion References 3D SAR Iterative Imaging Algorithm Via Joint Low-Rank and Sparsity 1 Introduction 2 3D SAR Model 3 Low-Rank 3-D SAR Sparse Imaging 4 Experimental Results 4.1 Simulation 4.2 Real Scene Data 5 Conclusion References Spectral Efficiency Optimization for an Intelligent Reflecting Surface-Assisted Bistatic MIMO Radar 1 Introduction 2 System Model 3 Algorithm Design 3.1 Optimize u with Fixed w and 3.2 Optimize with Fixed u and w 3.3 Optimize w with Fixed u and 3.4 Computational Complexity Analyses 4 Simulation Results 5 Conclusion References Cooperative Beam Assignment and Power Allocation in Phased Array Radar Network for Multi-target Localization 1 Introduction 2 System Model 2.1 Signal Model 2.2 Estimation Metric 3 Proposed Strategy 3.1 Problem Formulation 3.2 Solution Scheme 4 Numerical Results 5 Concluding Remarks References A Wireless Covert Channel Based on Syndrome-Trellis Codes 1 Introduction 2 Wireless Covert Channel 3 Proposed Scheme 4 Simulation Results 4.1 Reliability 4.2 Undetectability 5 Conclusions References Hardware Design of Data Acquisition and Processing Module of Fiber Grating Demodulator 1 Introduction 2 Hardware Circuit Design of Data Acquisition and Processing Module 2.1 Power Module Design 2.2 Data Processing Module Design 3 Data Processing Algorithm 4 Data Result Analysis 5 Conclusion References Hybrid Precoding for Multicast Downlink Transmit in LEO Satellite Communications 1 Introduction 2 System Model 3 Problem Formulation for Hybrid Precoding 3.1 Optimal Precoder for Multicast Scenario 3.2 Alternative Minimization Algorithm for Hybrid Precoder 4 Simulation Results 5 Conclusion References Correlation Analysis of Full-Polarized Antenna Systems 1 Introduction 2 Obtaining the Correlation Coefficients 2.1 System Model 2.2 Calculation of Correlation Coefficients 3 Correlation Coefficients and Channel Capacity 3.1 Capacity Behavior Factor 3.2 Simulation Results 4 Conclusion References Time Synchronization for Wearable Devices Via Cross-Technology Communication 1 Introduction 2 Design 2.1 Design Overview 2.2 Compensation of Skew and Offset 2.3 Recovering Timestamp Errors 3 Evaluation 3.1 Synchronization Errors 3.2 Comparison with Other Schemes 3.3 Generality and Scalability of SynCTC 4 Conclusion References Circular Constellation Method for OFDM-VLC System with ISDD Enabled SFO 1 Introduction 2 Principle 2.1 SFO Compensation Scheme with ISDE/ISDD 2.2 64-Points Circular Constellation Method 2.3 DSP Procedures for VLC-OFDM Transmission System 3 Experimental Verifications 4 Conclusion References Information Hiding Method for Multi-channel Flexible Sensors 1 Introduction 2 Related Work 2.1 Information Hiding 2.2 Flexible Sensors 3 Information Hiding Method 3.1 Flexible Sensors 3.2 Methods of Encrypting and Decrypting Information 4 Experiments and Results 4.1 Time Consumption of Encryption 4.2 Analysis of the Encryption Effect of Selecting a Channel Method on a Single Channel 4.3 Analysis of Encryption Effect in the Case of Different Number of Channels 5 Summary References Intelligent Technology Studies on Improved LEACH Algorithm for Micro-power Wireless Communication Nodes 1 Introduction 2 LEACH Algorithm 3 The Proposed Improved LEACH Algorithm 3.1 Model of Energy Consumption in WSN 3.2 Stage of Cluster Establishment 3.3 Data Transmission 4 Simulation and Numerical Analysis 4.1 Simulation Model 4.2 Analysis of Simulation Results 5 In-Filed Experiments 6 Conclusions References A Design of ALU Comparator for High Performance RISC-V Processor 1 Introduction 2 Comparator Algorithm Design 3 Simulation and Synthesis and Implementation 3.1 Unsigned Comparison Module 3.2 Signed Comparison Module 3.3 Synthesis and Implementation 4 Conclusion References A Novel Hybrid Routing Algorithm for In-Network Compressive Sensing in Wireless Sensor Networks 1 Introduction 2 Related Works 3 System Model and Problem Definition 4 Proposed Routing Algorithm 4.1 Proposed KDS-MST 4.2 Proposed B-SPT 5 Simulations 6 Conclusion References Improvement and Application of Image Segmentation Algorithm for Outdoor Augmented Reality 1 Introduction 2 GrabCut Algorithm 3 Improved GrabCut Averaging Algorithm 3.1 Pretreatment of Histogram Equalization 3.2 Optimization of Boundary Function 4 System Implementation Method 4.1 Improved Algorithmic Processes 5 Experimental Results and Analysis 5.1 Image Segmentation Experiments 5.2 Augmented Reality Experiments 6 Conclusion References A Deep RL Algorithm for Location Optimization of Regional Express Distribution Center Using IoT Data 1 Introduction 2 Preliminaries 3 Methods 3.1 Problem Definition 3.2 Cost Calculation Model 3.3 Vision Double Dueling DQN 4 Experiments 4.1 Setup 4.2 Results Comparison 5 Conclusion References Melanoma Classification with IoT Devices from Local and Global Aggregation by Multiple Instance Learning 1 Introduction 2 Methodology 2.1 Instance Feature Transformations 2.2 Multi-instance Awareness Module (MIAM) 2.3 Global Awareness Module (GAM) 2.4 Information Fusion 3 Experiments 3.1 Dataset and Implementation Details 3.2 Evaluation Metrics 3.3 Compare with Other Methods 4 Conclusion References A Simulated Annealing Approach for Multi-objective Portfolio Optimization 1 Introduction 2 Monte Carlo Portfolio Optimization 3 Simulated Annealing Approach 3.1 Framework 3.2 Mean and Standard Deviation Estimation 3.3 Weight Perturbation 4 Experiments 4.1 Profile Vector 4.2 Experimental Results 5 Conclusion References Research on Intrusion Detection Technology for Naval Ship Networks 1 Introduction 2 Business Characteristics of Naval Ship Networks 2.1 The Limited Number of Network Devices 2.2 The Limited Number of Message Types 2.3 Some Network Messages Are Cyclical 2.4 Some Network Messages Are Time-Sensitive 3 Naval Ship Networks Intrusion Detection Model 3.1 Detection Model 3.2 Feature Dimensionality Reduction Module Based on DBN 3.3 Intrusion Detection Module Based on Multi-class SVM 4 Naval Ship Networks Intrusion Detection Experiments 4.1 Intrusion Detection Evaluation Indicators 4.2 Naval Ship Networks Intrusion Detection Dataset 4.3 Naval Ship Networks Intrusion Detection Experiments and Analysis of Results 5 Conclusion References Enhancing Robustness for Facial Emotion Recognize 1 Introduction 2 Related Work 2.1 Facial Expression Classification 2.2 Noise Label 2.3 Face Occlusion and Angle Variant 2.4 More Feature 3 Anti-noise Network 3.1 Surrogate Loss 3.2 Noise Estimator 3.3 Ghostv2 Module 4 Experiment 4.1 Negative Effects of Noise Labels 4.2 Effectiveness of Noise Estimator 4.3 Effectiveness of Ghostv2 4.4 Ghostv2 on Dataset with Noise Label Samples 4.5 Exploring Anti-noise Network on Real-World Uncertainties 5 Conclusion References A Multi-target Tracking Method Against Intelligent RGPO Jamming 1 Introduction 2 Problem Formulation 3 Algorithm Design 4 Simulation Results 5 Conclusion References Network Architecture Design of Big Data Real-Time Processing System 1 Introduction 2 Topological Structure of the Network 2.1 Switch Node Design 2.2 Data Stream Transmission Path Design 2.3 The Use of Communication Protocols 3 Network Traffic Load Balancing Design 3.1 Hardware Load Balancing 3.2 Software Load Balancing 4 Optimization of Network Transmission and Analysis and Solution of Common Problems 4.1 Network Broadcast Storm 4.2 IP Conflict 4.3 Programming Implementation of SOCKET 5 Conclusion References Fine Linear Equation Algorithm for Geo-Fence 1 Introduction 2 Related Work 3 Principle 3.1 Position Relationship Between Point and Line 3.2 Linear Equations and Geo-Fence 4 Linear Equations Algorithm to Solve Point and Polygon Geo-Fence 4.1 Point and Convex Polygon Geo-Fence 4.2 Point and Non-convex Polygon Geo-Fence 5 Implement 5.1 Algorithm Pseudo Code Implementation 5.2 Implementation Code (Java) 6 Verification and Analysis 6.1 Single Point Test 6.2 A Large Number of Points Contain Tests 7 Summary References Balancing Bandwidth Utilization and Energy Consumption for Security-Related CAN FD-Based Automotive Cyber-Physical Systems 1 Introduction 1.1 Background and Motivations 1.2 Contributions 2 Related Works 3 System Models and Key Assumptions 3.1 System Architecture 3.2 Models and Problem Definition 4 Design Optimization Algorithm 4.1 Minimize Energy Consumption Algorithm 4.2 Algorithm Based on Security Level Clustering 5 Experiment Results 6 Conclusion References Optimization of Cloud Datacenters’ Benefit Using Monte Carlo Algorithm 1 Introduction 2 Problem Modelling 3 Reinforcement Learning 4 Simulation and Result 5 Conclusion References UAV Assisted Outdoor Visible Light Positioning with Intelligent Ambient Light Noise Elimination 1 Introduction 2 System Model 2.1 Optical Wireless Channel Modeling 2.2 Outdoor Ambient Light Noise Modeling 3 UAV Assisted Outdoor Visible Light Positioning Technique 3.1 Intelligent Ambient Light Noise Elimination Technique 3.2 Noise Eliminated Outdoor Positioning 4 Simulation Results 5 Conclusions References Monocular Occlusion-Robust Tracking Novel for Campus Intelligent Monitor System 1 Introduction 2 Related Works 3 Method 3.1 Moving Object Detection 3.2 Monocular Anti-occlusion Tracking Technology 4 Experiments 5 Conclusion References Human Activity Classification Based-On Micro-Doppler Simulations with DNNs and Transfer Learning 1 Introduction 2 Methods for Different Simulation Source Data 2.1 Radar Processing 2.2 CMU-Based Simulation 2.3 Kinect-Based Simulation 3 DCNNs for Different Categories 3.1 The Structure of Bistatic-CNN 3.2 The Structure of Bistatic-DenseNet 4 Experimental Results 4.1 7-Class Recognition 4.2 13-Class Recognition 5 Conclusion References 6G Intelligent Network Based on AI-Native 1 Preface 2 AI-Native 3 New Wireless Network Architecture Based on AI-Native 3.1 A New Terminal-Fog-Cloud Multi-level Collaborative Management and Control System Based on AI-Native 3.2 AI-Enabled Intelligent Network Maintenance 4 AI-Native-Based Wireless Intelligent Management and Control 5 New Air Interface Based on AI-Native 5.1 AI-Powered New Protocol Stack 5.2 AI-Enabled Physical Layer Technology 5.3 AI-Enabled MAC Layer Technology 6 Conclusion References A Planar Object Tracking Algorithm with Balanced Speed and Accuracy 1 Introduction 2 Related Work 2.1 Keypoint-Based Planar Object Tracking 2.2 Hand-Designed Feature Descriptors 2.3 Deep Feature Descriptors 3 Approach 3.1 Building ORB Feature Descriptors 3.2 Building GIFT Feature Descriptors 3.3 Tracking Process Combining GIFT and ORB 4 Experiment 4.1 Dataset 4.2 Evaluation Metric 4.3 Analysis of Results 5 Conclusion References A Multi-scale Convolutional Neural Network for Skeleton-Based Human Action Recognition with Insufficient Training Samples 1 Introduction 2 Related Work 3 Our Method 3.1 The Quantifying Representation of the Actions 3.2 Scale Normalization and Data Augmentation 3.3 The Universal Multi-scale Upgrade Method for the CNNs 4 Experiment Results 4.1 Experimental Setup and Dataset 4.2 The Evaluation of the Proposed Method 5 Conclusions and Future Work References Multi-task Simpleformer Model Based Lung Cancer Biomarker Toluene Detection Algorithm 1 Introduction 2 Proposed Net Architecture 3 Experimental Results and Comparison 3.1 Experimental Results 3.2 Comparison 4 Conclusion References SA-NMS: Multi-document Summarization with Self-attention and Non-maximum Suppression Selection 1 Introduction 2 Related Work 3 SA-NMS Model 3.1 Self-attention Computation 3.2 Sentence Selection with NMS 3.3 The Loss Function 4 Experiments and Result 4.1 Datasets 4.2 Implementation 4.3 Evaluation 4.4 Result 4.5 Case Study 5 Conclusion References Intelligent Logistics Scheduling Model Based on Q-Learning 1 Introduction 2 Modeling Process 2.1 Data Preprocessing Process 2.2 Intelligent Logistics Scheduling Model Based on Q-Learning 2.3 Flow Chart of Model Operation 3 Model Testing and Evaluation 4 Conclusion References Identification of Walkie-Talkie Individual Based on Precise Measurement of Frequency and Discriminant Analysis 1 Introduction 2 Algorithm and Implementation Architecture 2.1 Principle of Walkie-Talkie Individual Recognition 2.2 System Framework 2.3 The Important Role of FFT in Signal Processing 2.4 Signal Source and Acquisition Equipment 2.5 Precise Measurement of Frequency Characteristics 2.6 The Discriminant Analysis Classification Method 3 Identification Accuracy Test and Result Analysis 4 Conclusion References Design of Polar Coding in Filtered-OFDM 1 Introduction 2 The Architecture of F-OFDM 2.1 Notation Conventions 2.2 System Structure of F-OFDM 2.3 The Design of Filter 3 Rate-Matching Scheme and Channel Polarization Transform 3.1 Rate-Matching Scheme 3.2 Channel Polarization Transform 4 Polar Coding Scheme in F-OFDM 4.1 Reliability for the f-OFDM Synthesized Channels: 4.2 Reliability Calculation of Bit-Polarized Channels 5 Performance Evaluation of Polar Coding F-OFDM Systems 6 Conclusion References Regional People Counting Approach Based on Multi-frames Fusion Features Using MIMO Radar 1 Introduction 2 Radar System 3 Proposed People Counting Approach 3.1 Motion State Classification 3.2 People Counting Under Multi-motion States Models 4 Experiments and Results 5 Conclusions References Pedestrian Flow Early Warning System Based on WiFi Probe 1 Introduction 2 Method 2.1 Data Mining with WiFi Probe 2.2 Build an Analysis Platform to Analyze the Collected Data 3 Early Warning Experiment in Crowded Areas 4 Discussion 4.1 Analysis of Experimental Results 4.2 Behavior Analysis of Dense Population 5 Conclusion References An Adaptive High-Speed Serial Receiver Design Based on FPGA 1 Introduction 2 System Architecture Design 2.1 Data Transmission Process 2.2 SerDes Principle 2.3 Data Receiving Control Module 3 Simulation and Board-Level Verification 3.1 Engineering Simulation 3.2 Board-Level Verification 4 Conclusion References Multicast-Based Opportunistic Content Delivery in Fog-Aided D2D Networks 1 Introduction 2 Network Model 3 Activation Probability of F-UEs 4 The Probability of Successful Content Delivery 5 Numerical Results 6 Conclusion References On Pre-reflow PCB Defect Detection Based on Object Detection and Template Matching 1 Introduction 2 Data Acquisition and Pre-processing 3 Object Detection 3.1 Overview of CentreNet Algorithm 3.2 Knowledge Distillation Based CentreNet Model Improvement 3.3 Experimental Analyses 4 Defect Identification 4.1 Defect Identification Procedures 4.2 Experimental Analyses 5 Conclusions References Research on Energy Saving of Network Function Virtualization Based on OpenStack 1 Introduction 2 Related Work 2.1 VMware Resource Scheduling Technology 2.2 OpenStack Resource Scheduling Techniques 3 Architecture Design 3.1 Module Design 3.2 Energy Consumption Model 3.3 Distribution and Migration Algorithms 4 Experiment 4.1 Experimental Environment 4.2 Analysis of Experimental Results 4.3 Experiment Summary 5 Conclusion References Research on ka-Band Helical Corrugated Waveguide Gyro-TWT 1 Introduction 2 Design and Simulation of HCW 3 Conclusion References Non-line-of-Sight Recognition Algorithm Based on Deep Learning 1 Introduction 2 LOS/NLOS Recognition Algorithm Based on Convolutional Neural Network 2.1 Denoising Algorithm Based on EMD-WD 2.2 LOS/NLOS Recognition Model Based on EMD-WD-CNN 3 Experimental and Simulation Results 3.1 Experimental Environment Construction 3.2 NLOS/LOS Denoising Results 4 Summary References A Sub-terahertz-Band Rectangular TE10 to Circular TE01 Mode Converter 1 Introduction 2 Design and Simulation 3 Conclusion References Multi-step Focused Graph Convolution Network: Traffic Speed Prediction 1 Introduction 2 Related Work 3 Preliminaries 3.1 Symbol Definition 3.2 K-th Order Adjacency 3.3 Spectral Domain Graph Convolution 4 Methodology 4.1 k-Adjacency Matrix 4.2 MS-Convolution 4.3 AS-Attention 4.4 Temporal Convolution Layer 5 Experiments 5.1 Dataset 5.2 Parameter Setting 5.3 Comparison Baselines 6 Conclusion References Dimmable Hybrid Modulation Based on VOOK/VPPM and Optical OFDM for Visible Light Communications 1 Introduction 2 Dimmable Single-carrier Modulation in IEEE 802.15.7 3 Hybrid VOOK/VPPM and Optical OFDM 3.1 A Subsection Sample 3.2 Receiver 4 Simulation Results and Discussion 5 Conclusion References An Elliptic-Shaped Double-Staggered Grating Waveguide for Millimeter Wave TWT Applications 1 Introduction 2 Configuration Description 3 Beam Wave Interaction 4 Fabrication and Measurement 5 Conclusion References Reconfigurable and Tunable Multi-output Optoelectronic Oscillator Based on Stimulated Brillouin Scattering Effect 1 Introduction 2 Operating Principle and Numerical Calculation 3 Conclusion References Weak Stability Boundary Transfer into DRO Based on Numerical Continuation Method 1 Introduction 2 Statement of the Problem 2.1 PBRFBP 2.2 Distant Retrograde Orbit 2.3 Transfer into DRO 3 Design WSB Transfer 3.1 Perigee Poincare Map 3.2 Multiple Shooting Method 3.3 Pseudo-Arclength Continuation 4 Numerical Simulation 5 Conclusion Appendix References Design and Measurement of a Terahertz High-Order Circular TE13 Mode Converter 1 Introduction 2 Terahertz TE13 Mode Converter Design 3 Measurement and Verification at W-band 4 Conclusion References A Data Centre Traffic Scheduling Algorithm Based on Task Type 1 Introduction 2 Related Work 2.1 Data Center Network 2.2 Three Layer Network Architecture and Topology of Data Center Network 3 SDN Data Center 3.1 SDN Architecture 3.2 Analysis of Data Center Network Traffic Scheduling 4 Data Centre Traffic Scheduling Algorithm Based On Task Type 4.1 System Model 4.2 The Key Problem of the Algorithm 5 Simulation Experiment and Result Analysis 5.1 Experimental Environment 5.2 Analysis of Experimental Results 6 Conclusion References Preliminary Research of a Terahertz Band High-Order Mode Backward Wave Oscillator 1 Introduction 2 Simulation 3 Conclusion References Design of a Terahertz Broadband Logarithmic Spiral Antenna 1 Introduction 2 Simulation 3 Conclusion References Research on the Framework of Confederate Modelling System 1 Background 2 Confederate Modelling 2.1 Linguistic Consistency 2.2 Relation Extraction, Classification and Reconstruction 3 Horizontal Confederation Modelling 4 Longitudinal Confederate Modelling 5 Conclusion References A Domain-Aware Crowdsourcing System with Copier Removal 1 Introduction 2 Related Work 3 Problem Definition 3.1 A Subsection Sample 4 Task Assignment 4.1 Task-Level Worker Credibility Calculation 4.2 Worker Selection 4.3 Copier Detection and Removal 5 Truth Discovery 5.1 Truth Computation Step 5.2 Worker Credibility Estimation Step 6 Experiments 6.1 Experimental Settings 6.2 Experiments on Datasets Without Copiers 6.3 Experiments on Datasets with Copiers 7 Conclusions References A Proposed Method for Using Edge Computing to Secure Existing IoT Devices 1 Introduction 2 Overall Process and Threat Modeling Diagram 3 Malfunction Detection for IoT Devices 3.1 Device-Function-Based Malfunction Detection System 3.2 Device-Based Malfunction Detection System 3.3 Discussion 4 Conclusion and Future Work References A Novel Coordinated Virtual Embedding for Software Defined Networks Using Hub-Spokes Clusters 1 Introduction 2 Related Work 3 Problem Description and Performance Metrics 3.1 Problem Description 3.2 Performance Metrics 4 Our Virtual Network Embedding Algorithm 4.1 Ranking of Nodes 4.2 Forming Hub-Spokes Clusters 4.3 Mapping 5 Performance Evaluation 5.1 Acceptance Ration and Revenue-to-Cost Ratio 5.2 Average Delay 5.3 Maximum Delay 6 Conclusion References Author Index