Buch, Englisch, 194 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 481 g
CCCN 2025
Buch, Englisch, 194 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 481 g
Reihe: Signals and Communication Technology
ISBN: 978-3-032-03631-5
Verlag: Springer
The book consists of peer reviewed and presented papers of the 3rd International Conference on Cloud Computing and Computer Network (CCCN 2025), which took place in Singapore during May 16-18, 2025. The conference is held annually to gather scholars, researchers and engineers working in the field of cloud computing to share their newest research findings and results, discuss and exchange their thoughts and information, and learn about cutting-edge technologies. The papers are solicited on a broad range of topics, including cloud computing and semantic web technologies, cloud computing models, simulations and designs, cloud computing applications, cloud computing services, mobile cloud networking, service-oriented architecture in cloud computing, Case studies and theories in cloud computing, Cloud storage and file systems, Blockchain for emerging networks, network management, measurement and analysis, and network virtualization.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction.- Application of convolutional neural networks for the detection of diseases in the CCN-51 cocoa fruit by means of a mobile application.- Target Detection Algorithm of Forward Looking Sonar Based on Swin Transformer.- An Optimization Strategy for Efficient Facial Landmark Detection Based on Improved Pixel-in-pixel Net Model.- Nonlinear Filter Combined Regularization of Compressed Sensing for CT Image Reconstruction. Vulnerabilities in Office Printers, Multifunction Printers (MFP), 3D Printers and Digital Copiers, A gateway to breach our enterprise network.- Provisioning Deep Learning Inference on a Fog Computing Architecture.- A Comparative Analysis of VPN Applications and Their Security Capabilities Towards Security Issues.- Improved Grey Wolf Optimization Algorithm Based on Logarithmic Inertia Weight.- Radio Frequency Identification Vulnerabilities: An Analysis on RFID-Related Physical Controls in an Infrastructure.- Analysis of Bee Population and the Relationship with Time.- Synthetic speech data generation using Generative Adversarial Networks.- Prediction of bee population and number of beehives required for pollination of a 20-acre parcel crop.- Conclusion.




