- Neu
Meng 3rd International Conference on Cloud Computing and Computer Networks
Erscheinungsjahr 2025
ISBN: 978-3-032-03632-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
CCCN 2025
E-Book, Englisch, 194 Seiten
Reihe: Signals and Communication Technology
ISBN: 978-3-032-03632-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
The book consists of peer reviewed and presented papers of the 3rd International Conference on Cloud Computing and Computer Network (CCCN 2025), which took place in Singapore during May 16-18, 2025. The conference is held annually to gather scholars, researchers and engineers working in the field of cloud computing to share their newest research findings and results, discuss and exchange their thoughts and information, and learn about cutting-edge technologies. The papers are solicited on a broad range of topics, including cloud computing and semantic web technologies, cloud computing models, simulations and designs, cloud computing applications, cloud computing services, mobile cloud networking, service-oriented architecture in cloud computing, Case studies and theories in cloud computing, Cloud storage and file systems, Blockchain for emerging networks, network management, measurement and analysis, and network virtualization.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Introduction.- Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Provisioning Deep Learning Inference on a Fog Computing Architecture.- A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Radio Frequency Identification Vulnerabilities: An Analysis on RFID-Related Physical Controls in an Infrastructure.- Analysis of Bee Population and the Relationship with Time.- Synthetic speech data generation using Generative Adversarial Networks.- Prediction of bee population and number of beehives required for pollination of a 20-acre parcel crop.- Conclusion.