Proceedings of CECNet 2022
eBook - PDF

Proceedings of CECNet 2022

The 12th International Conference on Electronics, Communications and Networks (CECNet 2022), 4-7 November 2022

  1. 696 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Proceedings of CECNet 2022

The 12th International Conference on Electronics, Communications and Networks (CECNet 2022), 4-7 November 2022

About this book

Electronics, communication and networks coexist, and it is not possible to conceive of our current society without them. Within the next decade we will probably see the consolidation of 6G-based technology, accompanied by many compatible devices, and fiber-optic is already an advanced technology with many applications. This book presents the proceedings of CECNet 2022, the 12th International Conference on Electronics, Communications and Networks, held as a virtual event with no face-to-face participation in Xiamen, China, from 4 to 7 November 2022. CECNet is held annually, and covers many interrelated groups of topics such as electronics technology, communication engineering and technology, wireless communications engineering and technology and computer engineering and technology. This year the conference committee received 313 submissions. All papers were carefully reviewed by program committee members, taking into consideration the breadth and depth of research topics falling within the scope of the conference, and after further discussion, 79 papers were selected for presentation at the conference and for publication in this book. This represents an acceptance rate of about 25%. The book offers an overview of the latest research and developments in these rapidly evolving fields, and will be of interest to all those working with electronics, communication and networks.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Proceedings of CECNet 2022 by A.J. Tallón-Ballesteros,Antonio J. Tallón-Ballesteros in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Title Page
  2. Preface
  3. About the Conference
  4. Contents
  5. Attack and Improvement of a Hidden Vector Encryption Scheme
  6. Performance Analysis of Aerial Base Station Cellular Network
  7. Lightweight Application of SM2 Co-Signature Algorithm in the Power IOT
  8. Research of Communication Protocols for Energy Metering Devices
  9. A Method for Exchanging Data Between Master Station and Terminal Based on Key Agreement Mechanism
  10. A Method for Scientific Cultivation Analysis Based on Knowledge Graphs
  11. Warning of Dangerous Driving Behavior Caused by Drivers and Road Environmental Factors
  12. A Low Power Test Data Compression Scheme for Scan Test
  13. Traffic Flow Imputation Based on Multi-Perspective Spatiotemporal Generative Adversarial Networks
  14. Kernel Data Evaluation System and Modeling Based on ABC-BP Hybrid Algorithm
  15. PIXDet: Prohibited Items X-Ray Image Detection in Complex Background
  16. Research on Cultivating Senior High School Students' Innovative Thinking in Mathematics Based on Bloom's Taxonomy of Educational Objectives
  17. Anti-Jamming Method of Cognitive Radio Based on Q-Learning
  18. Real-Time Detection and Early Warning System for Public Security Key Places Based on Human Posture Characteristics
  19. Study Analysis of Printed Monopole Antenna for C and X Band Application
  20. A Method for Power Amplifier Distortions Compensation at the RX Side for the 5G NR Communication Systems
  21. Intelligent Patrol Route Visualization Design Based on Police Big Data
  22. Advantage Analysis of MBSE in the Context of Multi-Historical Development Trends
  23. Analysis of the Mainstream MBSE Methodologies from the Modeling Practice View
  24. Quantitative Inversion Radar Imaging: A Physical Remote Sensing Modality of High Resolution
  25. A Lowpass-Bandpass Diplexer Using Common Lumped-Element Dual-Resonance Resonator
  26. Low Time-Complexity Chaotic Image Encryption Algorithm Based on Plaintext Information
  27. Research on Security Sharing Model System of Power Digital Spatial Data
  28. Chicken and Egg Food Traceability System Based on NFC and QR Code Technology
  29. The Light and Image Synchronous Method Based on Adaptive Color Segmentation Algorithm
  30. A Generative Learning Architecture Based on CycleGAN for Steganalysis with Unpaired Training Images
  31. Multi-Path Propagation Prediction of 433MHz Wave in the Ship Environment Based on the Ray-Tracing Model
  32. A Study on the Strategy of Vocational English Digital Teaching Materials Development in the Context of Internet+ - Taking the Integrated Course of English as an Example
  33. Approach for Cryptography Digital Ecosystem Deployment
  34. Citrus Appearance Quality Grading System Based on OpenCV Image Processing
  35. A Design of Hierarchical Bloom Filter
  36. Constellation Configuration Analysis Based on Angle Condition Number for Tri-satellite TDOA Geolocation System
  37. A Discrete Clutter Reduction Method for Drone Detection with High Resolution Radars
  38. Algorithm Based on Deep Learning to Improve the Logistics Management of a Company That Distributes Reading Material
  39. Performance Analysis of 256-QAM Demodulation for 5G NR Sidelink
  40. Application of SCMA Based on LoRaWAN Architecture
  41. Efficient Security Detection Strategy Based on K-Means Algorithm in LPWAN
  42. Research on the Construction and Evolution Model of Cloud Ecosystem
  43. Artificial Intelligence Project Practice Based on K210
  44. Research on Intelligent Research Model of Clues in Cases of Production and Sale of Counterfeit Drugs
  45. Low Complexity and High Spectrum Efficiency Hybrid Precoding for Massive MIMO Systems
  46. The Continuous Time Dynamical Analysis of Heart Rate Asymmetry
  47. Continuous-Speech Spoken Dialogue System Based on Joint Decision-Making of Audio and Semantics
  48. A One-to-Two Filter Power Divider Based on LTCC
  49. Tiny Deep Convolution Recurrent Network for Online Speech Enhancement with Various Noise Types
  50. Degradation-Oriented Adaptive Network for Blind Super-Resolution
  51. Spin Sensitivity and Magnetic Response Analysis of Nano-SQUIDs
  52. Research and Evaluation of Early Warning Models for Crowd Density Monitoring Based on Drones
  53. A Method of Anti-Nonsynchronous Short Pulse Jamming Based on Waveform Entropy
  54. Measuring the State of ECN Readiness in Mail Servers on the Internet
  55. Intelligent Judgment Method of Superimposed Label Recognition Technology Based on a Deep Learning Target Detection Algorithm for Detecting Wiring Errors in Current Transformer Tests
  56. Coherent Accumulation Algorithm for Maneuvering Weak Target Based on Angular-Stepped-GRFT
  57. Analysis of Artificial Intelligence Applied in Virtual Learning Environments in Higher Education for Ecuador
  58. Content Connectivity Based Polyhedron Protection Against Multiple Link Failures in Optical Data Center Networks
  59. RL-Based Load Balancing for Software-Defined WiFi Networks
  60. 3D Point Cloud and BIM Component Retrieval for Subway Stations via Deep Learning
  61. Emulation of the Updated CANARIE Backbone Network Topology Under IPv6 Up to 2022
  62. Cost-Efficient Service Function Chaining with CoMP Zero-Forcing Beamforming in Mobile Edge Networks
  63. Study on Fault Prognostics and Health Management for UAV
  64. Online and Offline Analysis of Planck Constant Measurement
  65. Comparison of Deep Learning Methods and a Transfer-Learning Semi-Supervised GAN Combined Framework for Pavement Crack Image Identification
  66. A Massive-Cargo Transportation Routing Model Based on Reinforcement Learning
  67. Robust Estimation Method Using Successive Approximation Algorithm to Correct Errors
  68. Uncertainty Measurement of Variable Precision Fuzzy Soft Rough Set Model
  69. Prediction and Analysis of Stock Logarithmic Returns Based on ARMA-GARCH Model
  70. Time-Domain Feature Parameter Extraction Algorithm of Pulse Wave Based on Morphological Features
  71. Image Restoration of an Object Viewed Through a Polycapillary X-Ray Lens with Square Channels Using the Concept of a Space-Variant Point-Spread Function
  72. Deep Learning Based Method for the Estimation of Patient's Angles from Lateral Skull Radiographs
  73. Stability Evaluation of Computational Intelligence-Based Subset Feature Selection Methods on Breast Cancer Data Analysis
  74. Research on Radar Burn-Through Range Under Noise Jamming Based on Radar Equation
  75. Classification of Characteristic Factors of Brain Functional Network Using Decision Tree
  76. A Stability Evaluation of Feature Ranking Algorithms on Breast Cancer Data Analysis
  77. A Distribution Network Reconfiguration Continuous Method Based on Efficient Solution Space Coding
  78. Tribological Property Behavior of Sinusoidal Texture with Various Intervals Under Scarce Oil Supply
  79. Research on Spatial Distribution in Power Frequency Magnetic Field Immunity Test
  80. Design and Application of Fully Hydraulic Intelligent Screw Clearing Machine for Grain Silos
  81. Integrated Management System of Expressway Intelligent Service Area
  82. Analysis of Expressway Intelligent Service Area for Better Vehicles/Passengers Service
  83. Optimizing IEEE 802.11a Preamble Design for Vehicle-to-Vehicle Communication
  84. Subject Index
  85. Author Index