skip to main content
10.1145/3510513acmotherconferencesBook PagePublication PagesicnccConference Proceedingsconference-collections
ICNCC '21: Proceedings of the 2021 10th International Conference on Networks, Communication and Computing
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICNCC 2021: 2021 The 10th International Conference on Networks, Communication and Computing Beijing China December 10 - 12, 2021
ISBN:
978-1-4503-8584-8
Published:
10 May 2022

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Session 1 - Software and Information Engineering
research-article
A Convolutional Neural Network Based on Self-Attention Mechanism for Molecular Property Prediction Using Molecular Hidden Fingerprints: An efficient molecular property prediction method

With the development of artificial intelligence, the project of using deep learning for molecular property prediction has gained much attention. The current widely used molecular description methods, such as Morgan molecular fingerprinting, need further ...

research-article
DeTable: Table data extraction model based on deep

The rapid development of the information age leads to the mass production and frequent transmission of data, which is difficult to deal with by human alone. With the rise and development of artificial intelligence, the use of data is becoming more ...

research-article
Co-attention Based Deep Model with Domain-Adversarial Training for Spam Review Detection

Douban has become one of the most popular Chinese film review platforms and has been attacked by various spammers. In our research based on real data from Douban, we found that many spammers spontaneously form different groups, which have different ...

research-article
Fair Personalized Recommendation through Improved Matrix Factorization by Neural Networks

Existing recommendation systems mainly focus on the improvement of accuracy but neglect to involve non-popular items, which leads to the unfairness problem of recommendation results. More specifically, the low exposure rate of non-popular items impairs ...

research-article
An Automated Approach to Domain-specific Term Extraction for Programming Language

Automatic Term Extraction is a common upstream task of both natural language and programming language processing tasks. However, most existing domain-specific term extraction methods are designed for natural language, and do not satisfy demand for ...

research-article
Application-based KNOWLEDGE CAPTURE amongst youth can be a reason for public concern. Evidence from the UK

This paper examines the knowledge capture, play liberation of application-based gambling amongst youth in the U.K. As a growing social phenomenon that is becoming an issue of concern because of the addictive effects on younger consumers, particularly ...

research-article
The Iot Malware Classification Method Based On Visual Local Features

This paper proposed a Internet of things (IoT) malware classification method, which uses a novel visual local feature based on sections of the malware binary. This method filter binary file section of malware samples, then divides the section contents ...

SESSION: Session 2 - Image and Signal Processing
research-article
Calculation of Brain Cortical Complexity Based on T1-weighted Imaging by Edge Fitting

The complexity of human cerebral cortex has important clinical value for the prediction, diagnosis and prevention of certain diseases. In this paper, we mainly used edge extraction and curve fitting to assess the cortical complexity by calculating the ...

research-article
Fingerprint Feature Extraction Method of Specific Emitter Based on Correlation of IQ Signal

The I/Q imbalance of modulator model leads to individual differences in gain and phase mismatch. In this paper, a new method of specific emitter identification is proposed based on these differences. In the method, I/Q signals is decomposed by I/Q ...

research-article
Brain MR image registration based on an Improved CNN Model

Brain image registration is a key part of brain image processing, so the research of brain image registration technology has important value. This paper proposes a brain MR image registration algorithm based on an improved convolutional neural network (...

research-article
Image segmentation technique based on boundary gray threshold algorithm

Chromosome karyotype analysis is an important technique in cytogenetics and plays an important role in modern medical system. Chromosome karyotype analysis is to observe the physical images of chromosomes under a microscope with a high-definition camera,...

research-article
A FCN-based signal extraction for spectrum sensing with considering simultaneously parameters estimation

In this paper, An end-to-end, pixels-to-pixels deep learning method of signal extraction and parameters estimation for spectrum sensing was developed. A novel spectrum density map was designed for counting signal number at each time, computing signal-to-...

research-article
Cooperative Spectrum Handoff based on Counterfactual Multi-agent Method

Cognitive radio networks (CRNs) improve spectrum resource utilization rate by providing dynamic spectrum access for second users (SUs) when the spectrum is used by primary users (PUs). When multiple SUs exist in a CRN at the same time, spectrum handoff ...

research-article
Radar Target Tracking Algorithm Based On New Particle Swarm Optimization Particle Filter

The particle filter based on particle swarm optimization algorithm has low precision and is easy to fall into local optimization, which is difficult to meet the needs of target tracking. In this paper, a new particle swarm optimization particle filter ...

research-article
Accurate Multicarrier Waveform Classification Using Convolutional Neural Networks

To improve spectrum utilization efficiency and flexibility in diverse application scenarios, several new multicarrier modulation techniques have been proposed in recent years, and thus accurate recognition of various multicarrier waveforms is critical ...

SESSION: Session 3 - Digital Communication and Network Security
research-article
Spectrum Handoff Based on Bilateral Auction Mechanism in Centralized Cognitive Radio Networks

With the exponential explosion of radio services, spectrum scarcity has become a thorny issue in wireless communications. Cognitive radio networks (CRNs) emerge as the times require. However, choosing the best channel for spectrum handoff becomes a ...

research-article
Universal Interactive Verification Framework for Federated Learning Protocol

Federated learning protocol provides an applicable solution for large-scale deep learning in distributed scenario. However, existing federated learning system is vulnerable to many attacks and threats. This paper proposes a universal verification ...

research-article
An Adaptive Swarm Intelligence-Based Task Scheduling Framework for Heterogeneous IoT Systems

Task scheduling is one of the most fundamental technologies in a cloud computing environment. The essence of resource scheduling is to determine the appropriate executor and provide the on-demand resources to meet the task overhead. Due to the ...

research-article
Open Access
All Pairs Routing Path Enumeration using Latin Multiplication and Julia

Enumerating all routing paths among Autonomous Systems (ASes) at an Internet-scale is an intractable problem. The Border Gateway Protocol (BGP) is the standard exterior gateway protocol through which ASes exchange reachability information. Building an ...

research-article
Simulation Study of Routing Mechanism in the Computing-aware Network

Traditional routing algorithms select the path based on the cost, hop, or other network-related metrics. However, with cloud computing and edge computing development, it is essential to develop a computing-aware routing mechanism to distribute the task ...

research-article
An Energy Efficiency Evaluation Scheme of IPHC over CSMA and TSCH in 6LoWPAN Networks

Many studies have focused on the impact of Media Access Control (MAC) layer protocols on wireless sensor networks (WSN). In realistic Internet of Things (IoT) scenarios, multiple protocols are used to ensure the efficient operation of the network. IP ...

research-article
Research on Multi-station Integrated 5G Communication Scheme for Smart Energy Station

Smart energy station is a new generation of energy hub infrastructure based on substation, which realizes the multi-station functions of substation, energy storage station, photovoltaic station, charging station and data center station. To improve the ...

Index terms have been assigned to the content through auto-classification.

Recommendations