International Conference on Cloud Computing and Computer Networks : CCCN 2023 (Signals and Communication Technology)

個数:

International Conference on Cloud Computing and Computer Networks : CCCN 2023 (Signals and Communication Technology)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 140 p.
  • 商品コード 9783031470998

Full Description

This book covers selected and presented papers of CCCN 2023, the International Conference on Cloud Computing and Computer Network which was held in Singapore April 21-23, 2023. CCCN 2023 provides a premier forum for researchers and scholars from multiple disciplines to come together to share knowledge, discuss ideas, exchange information, and learn about cutting-edge research in diverse fields of cloud computing and computer networks. Topics covered in this book contain cloud computing and semantic web technologies, cloud applications in vertical industries, cloud computing architecture and systems, cloud computing models, simulations and designs among others. The content is relevant to academics, researchers, students, and professionals in cloud computing and computer networks.

Contents

Part I- Chapter 1. Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Chapter 2. Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- Chapter 3. An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Chapter 4. Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction.- Part II- Chapter 5. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Chapter 6. Provisioning Deep Learning Inference on a Fog Computing Architecture.- Chapter 7. A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Chapter 8. Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Chapter 9. Radio Frequency Identification Vulnerabilities: AnAnalysis on RFID-Related Physical Controls in an Infrastructure .- Part III- Chapter 10. Analysis of Bee Population and the Relationship with Time.- Chapter 11. Synthetic speech data generation using Generative Adversarial Networks.- Chapter 12. Prediction of bee population and number of beehives  required for pollination of a 20-acre parcel crop.

最近チェックした商品