the proceedings contain 70 papers. the special focus in this conference is on Intelligent Computing and Applications. the topics include: RNN Learning for Dynamic Selection of Channel Access Scheme in F...
ISBN:
(纸本)9789819717231
the proceedings contain 70 papers. the special focus in this conference is on Intelligent Computing and Applications. the topics include: RNN Learning for Dynamic Selection of Channel Access Scheme in FANETs;a Crime Knowledge Discovery Scheme Based on Entity Recognition, Relation Extraction, and Development of Criminal Profiling Using Modus Operandi;optimized Biometric Key Management System for Enhanced Security;human Posture Identification and Recognition Using Deep Learning Techniques;twitter Sentiment Analysis Using Different Machine Learning Techniques;exploring Empirical Mode Decomposition for Music Genre Classification Using Deep Learning;a Comparative Analysis of Fog Computing’s Problems, Challenges and Future Directions;explainable Artificial Intelligence Insight: An Orderly Survey;deep Learning-Based Sign Language Translator;Analysis of Arrhythmia from Electrocardiogram (ECG) Data Using ML Framework;brain Tumor Detection Using Quantum Neural Network;augmented Reality-Based Application for Indian Monuments;fog Obscurity Mitigation;a Load Balancing Using Multi-population Grasshopper Optimization Approach for Workflow Tasks in Clouds;parental Control for Techie Child Using Keylogger;modified Box Filter design and Noise Analysis on Two-Dimensional Images;Change Detection in Remote Sensing SAR Image Using a Ratio-Based Operator;automatic Question Generation: A Comparative Analysis of Rule-Based and Neural Network-Based Models;mango Leaf Images Quality Improvement Techniques Using Subjective Approach of Image Enhancement;real-Time 3D Texture and Motion Analysis for Face Anti-spoofing Using Deep Learning and computer Vision;Hybrid Sentiment Polarity Prediction Scheme in Social Networks using Attention Mechanism and Improved CNN;survival Analysis of Heart Failure Patients with Advanced Machine Learning Models;a Differential Privacy Perturbation with Random Forest Classifier in Medical Database;smart Application for Early Detection of Rice Plant Disease Using Incept
Estimating junction temperature during the operation of power semiconductors is essential to avoid damage and to increase lifetime. However, published literature usually presents complex solutions to determine tempera...
详细信息
thyroid cancer is currently the fifth most common malignancy diagnosed in women. Since differentiation of cancer sub-types is important for treatment and current, manual methods are time consuming and subjective, auto...
详细信息
ISBN:
(纸本)9781665469647
thyroid cancer is currently the fifth most common malignancy diagnosed in women. Since differentiation of cancer sub-types is important for treatment and current, manual methods are time consuming and subjective, automatic computer-aided differentiation of cancer types is crucial. Manual differentiation of thyroid cancer is based on tissue sections, analysed by pathologists using histological features. Due to the enormous size of gigapixel whole slide images, holistic classification u sing deep learning methods is not feasible. Patch based multiple instance learning approaches, combined with aggregations such as bag-of-words, is a common approach. this work's contribution is to extend a patch based state-of-the-art method by generating and combining feature vectors of three different patch resolutions and analysing three distinct ways of combining them. the results showed improvements in one of the three multi-scale approaches, while the others led to decreased scores. this provides motivation for analysis and discussion of the individual approaches.
this paper proposes an output voltage control method of an inductive power transfer (IPT) system for electric vehicles (EVs) considering the coupling coefficient variation as a result of magnetic pad misalignment. Sin...
详细信息
Withthe rapid emergence of the Internet of Vehicles (IoV) and 6G networks, the exponential growth in data traffic has presented a formidable challenge to the limited computational capabilities of in-vehicle devices. ...
详细信息
computer-aided drug design (CADD) plays a crucial role in accelerating the drug discovery process, particularly when structural information of the target is unavailable. this paper proposed a drug design model based o...
详细信息
ISBN:
(纸本)9789819756919;9789819756926
computer-aided drug design (CADD) plays a crucial role in accelerating the drug discovery process, particularly when structural information of the target is unavailable. this paper proposed a drug design model based on the protein sequence features. the model utilizes Transformer and a graph neural network (GNN) algorithm based on the weighted protein graph to obtain protein sequence features. this approach allows model to effectively understand and utilize complex information about protein sequences and their spatial structure. By fusing these features through an attentional mechanism, it is used as a constraint to guide the generation of drug molecules. In order to comprehensively evaluate and screen out the most promising molecular candidates, this paper applies the non-dominated sorting algorithm (NSGA) to sort various drug properties of newly generated drug molecules. Finally, the newly generated drug molecules were evaluated for quality and molecular docking. the results showed that the proposed method is capable of generating drug molecules with high affinity for the target and optimized binding conformation.
the proceedings contain 25 papers. the special focus in this conference is on Analysis of Images, Social Networks and Texts. the topics include: Transformers Compression: A Study of Matrix Decomposition Methods U...
ISBN:
(纸本)9783031545337
the proceedings contain 25 papers. the special focus in this conference is on Analysis of Images, Social Networks and Texts. the topics include: Transformers Compression: A Study of Matrix Decomposition Methods Using Fisher Information;leveraging Taxonomic Information from Large Language Models for Hyponymy Prediction;content Selection in Abstractive Summarization with Biased Encoder Mixtures;RuCAM: Comparative Argumentative Machine for the Russian Language;paraphrasers and Classifiers: Controllable Text Generation for Text Style Transfer;less than Necessary or More than Sufficient: Validating Probing Dataset Size;unsupervised Ultra-Fine Entity Typing with Distributionally Induced Word Senses;static, Dynamic, or Contextualized: What is the Best Approach for Discovering Semantic Shifts in Russian Media?;controllable Story Generation Based on Perplexity Minimization;automatic Detection of Dialectal Features of Pskov Dialects in the Speech of Native Speakers;needle in a Haystack: Finding Suitable Idioms Based on Text Descriptions;DeepLOC: Deep Learning-Based Bone Pathology Localization and Classification in Wrist X-Ray Images;MiVOLO: Multi-input Transformer for Age and Gender Estimation;handwritten Text Recognition and Browsing in Archive of Prisoners’ Letters from Smolensk Convict Prison;greedy Algorithm for Fast Finding Curvilinear Symmetry of Binary Raster Images;ensemble Clustering with Heterogeneous Transfer Learning;Detecting design Patterns in Android Applications with CodeBERT Embeddings and CK Metrics;metamorphic Testing for Recommender Systems;Application of Dynamic Graph CNN* and FICP for Detection and Research Archaeology Sites;visualization-Driven Graph Sampling Strategy for Exploring Large-Scale Networks;limit Distributions of Friendship Index in Scale-Free Networks;the Problem of Finding Several Given Diameter Spanning Trees of Maximum Total Weight in a Complete Graph;is Canfield Right? On the Asymptotic Coefficients for the Maximum Antichain of Partitio
Due to the emergence of smart city applications, various smart city models and architectures have been proposed in different domains. Since there are strengths and weaknesses among those smart city models, it is there...
详细信息
Single geophysical method faces challenges in accurately depicting water-bearing anomalies due to complex factors in underground spaces. In response to this issue, our design innovatively proposes a combined approach,...
详细信息
In the era of Internet informatization, a series of network attacks on Web applications have surfaced both domestically and internationally, thereby increasing the focus on network security. this paper presents the de...
详细信息
暂无评论