Weichao Gong, Dongyan Zhao, Yidong Yuan, W. Zhang, Sujie Shao
{"title":"A Distributed Software-Defined Content Delivery Network Architecture Based on Blockchain","authors":"Weichao Gong, Dongyan Zhao, Yidong Yuan, W. Zhang, Sujie Shao","doi":"10.1007/978-981-16-6554-7_150","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_150","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126853479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Control Mechanism Based on Deep Reinforcement Learning in Narrow Bandwidth Wireless Network Environment","authors":"Hao Li, Jianli Guo, Xu Li, Xiujuan Shi, YU Peng","doi":"10.1007/978-981-16-6554-7_42","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_42","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Channel Attention CNN for Facial Expression Recognition","authors":"Xingwei Wang, Ziqin Guo, Haiqiang Duan, Wei Chen","doi":"10.1007/978-981-16-6554-7_8","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_8","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Leng, Lai Wei, Zi-heng Liu, Zhiqiang Wang, Tao Yang
{"title":"Design of Epidemic Tracing System Based on Blockchain Technology and Domestic Cipher Algorithm","authors":"C. Leng, Lai Wei, Zi-heng Liu, Zhiqiang Wang, Tao Yang","doi":"10.1007/978-981-16-6554-7_51","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_51","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121056706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Analysis Based on FMECA Megawatt Wind Turbine","authors":"Weicai Xie, F. Peng, C. Tang, Shibo Liu","doi":"10.1007/978-981-16-6554-7_108","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_108","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epidemic Real-Time Monitor Based on Spark Streaming Real-Time Computing Algorithm","authors":"Jiaxin Yang, Yaqi Sun, Xiaoman Lian, Xiaoyang He","doi":"10.1007/978-981-16-6554-7_23","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_23","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Grid Data Security Sharing Mechanism Based on Alliance Blockchain","authors":"Zhijian Si, Dahai Xiao, Chao Yang, Xi-ke Tian, Zhenjiang Lei, Xiaoning Ma","doi":"10.1007/978-981-16-6554-7_85","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_85","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"os-14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Median Filtering Forensics CNN Approach Based on Local Binary Pattern","authors":"Tao Zhu, Haiyan Gu, Zenan Chen","doi":"10.1007/978-981-16-6554-7_30","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_30","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Wang, T. Ji, Xiangdong Zhang, Wen Hu, Haiyan Xia, Bo Zou, X. Qiu, Wenli Wang
{"title":"Research on Application Method of NB-IOT in Power Consumption Information Collection System","authors":"G. Wang, T. Ji, Xiangdong Zhang, Wen Hu, Haiyan Xia, Bo Zou, X. Qiu, Wenli Wang","doi":"10.1007/978-981-16-6554-7_157","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_157","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114687860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Log Analysis System Based on Deep Learning for Operation System Anomaly Detection","authors":"Jiaao Yu, Yanbin Jiao, Qing Guo, Chong Liang, Lanlan Rui, Xingyu Chen","doi":"10.1007/978-981-16-6554-7_95","DOIUrl":"https://doi.org/10.1007/978-981-16-6554-7_95","url":null,"abstract":"","PeriodicalId":438284,"journal":{"name":"Proceedings of the 11th International Conference on Computer Engineering and Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}