In the digital Internet era, the computer has become more important in our lives. To meet the needs of society, we should carry out a series of scientific and practical teaching reforms in university computer courses....
详细信息
ISBN:
(纸本)9781728194202
In the digital Internet era, the computer has become more important in our lives. To meet the needs of society, we should carry out a series of scientific and practical teaching reforms in university computer courses. Especially in art universities, the computer courses' features still should conform to the characteristics of these art students. the computer basic education practical teaching reform is based on the multi-dimensional teaching methods and the teaching environment of art universities and use the Zhejiang Conservatory of Music as a case. It has carried out a series of effective curriculum reforms and practices: 1. Internet resources, including the ChaoXing online learning platform, Cloud disk, QQ, and WeChat; 2. Inter-school learning, on which the teachers from other schools share the teaching methods and resources with us in computer basic education. 3. other multiple teaching methods, including project-driven and curriculum content adjustment.
the fifth generation wireless network, known as 5G, is the first network that was considered to meet some requirements to help IoT become a reality. 5G is also envisioned as a network that will support a diverse set o...
详细信息
the fifth generation wireless network, known as 5G, is the first network that was considered to meet some requirements to help IoT become a reality. 5G is also envisioned as a network that will support a diverse set of performance and service requirements and help create a wide range of vertical markets. One of the main facilitators of 5G that will provide such flexibility is slicing a single physical network into multiple isolated logical networks, each with different requirements. Different technologies have been studied to make it possible to create this end-to-end network on demand, such as Software Defined networking (SDN), Network Function Virtualization (NFV) and Cloud computing. However, allocating enough resources to guarantee the desired QoS for specific services even when this virtual network fails remains forgotten by the literature. In this paper, we identify challenges and open issues related to this subject. Moreover, we discuss relevant proposals and point some possible directions to overcome this problem.
In this paper, we try to predict the card prices of the trading card game using their information. the trading card game market is growing by the increasing popularity of the board game or the digital card game in the...
详细信息
ISBN:
(纸本)9783030290290;9783030290283
In this paper, we try to predict the card prices of the trading card game using their information. the trading card game market is growing by the increasing popularity of the board game or the digital card game in the e-sports in recent years. the trading card game is a kind of card game which two or more people plays a card with some text or symbols those characteristics expresses a ruling or interaction to the other card. this interaction of cards may work effectively in the game, prices of those card pairs will be increased withthe popularity of its combination. We have a hypothesis that card text is useful for prediction of card prices from the importance of card combinations. therefore, in this research, we focus on not only the basic card information but also card text. Moreover, we use several machine learning method for prediction of card prices, and we analyze which machine learning method is an effect.
the proceedings contain 11 papers. the topics discussed include: accelerate distributed stochastic descent for Nonconvex optimization with momentum;accelerating GPU-based machine learning in python using MPI library: ...
ISBN:
(纸本)9780738110783
the proceedings contain 11 papers. the topics discussed include: accelerate distributed stochastic descent for Nonconvex optimization with momentum;accelerating GPU-based machine learning in python using MPI library: a case study with MVAPICH2-GDR;deep learning-based low-dose tomography reconstruction with hybrid-dose measurements;EventGraD: event-triggered communication in parallel stochastic gradient descent;a benders decomposition approach to correlation clustering;high-bypass learning: automated detection of tumor cells that significantly impact drug response;deep generative models that solve PDEs: distributedcomputing for training large data-free models;automatic particle trajectory classification in plasma simulations;reinforcement learning-based solution to power grid planning and operation under uncertainties;and predictions of steady and unsteady flows using machine-learned surrogate models.
Withthe rapid progress of the Internet, security incidents are increasing and are becoming more sophisticated. Current trends in security incidents include not only cyber security threats such as viruses, malware, an...
详细信息
ISBN:
(纸本)9783030290290;9783030290283
Withthe rapid progress of the Internet, security incidents are increasing and are becoming more sophisticated. Current trends in security incidents include not only cyber security threats such as viruses, malware, and unauthorized access, but also methods of stealing information, such as phishing, shoulder hacking, and electromagnetic wave eavesdropping. thus, security incidents tend to diversify, and it is therefore important to consider physical countermeasures and psychological countermeasures other than the cyber security countermeasures typically taken. In this paper, in addition to the current cyber security countermeasures, we propose new multi-layer defense security countermeasures taking into consideration non-cyber security countermeasures that reflect physical viewpoints and psychological viewpoints. Specifically, we propose the concept of multi-layer defense security countermeasures based on dynamic reconfiguration multi-perimeter lines. Furthermore, a desktop simulation is performed with TPO (time, place, occasion) conditions in the office as specific perimeter lines, and the effectiveness of the concept is clarified. this contributes to the construction of a new paradigm of information security management in the digital transformation era.
the rise of social media offers users to share their state of mind and opinions in all aspects of their life. Vast amount of textual content is available and needs techniques to use of information meaningfully by sepa...
详细信息
ISBN:
(数字)9781665414517
ISBN:
(纸本)9781665430340
the rise of social media offers users to share their state of mind and opinions in all aspects of their life. Vast amount of textual content is available and needs techniques to use of information meaningfully by separating and examining them. Sentimental Analysis mines the opinion of human being for a viewpoint. In this Pandemic condition of Corona, whole world is sharing their opinions on the social media. this paper shows a analysis of sentiments to get the opinion of people if they are positivity during this situation or not. the paper is using the technique of polarity to know the opinion is positive, negative, or nonpartisan [1]. three main keywords "COVID", "Corona virus" and "COVID-19" are used to check the polarity.
It is known that social media has become a part and parcel in everyone's life. Human emotions are constantly being expressed in real time on various social networking sites. the availability of an enormous amount ...
详细信息
ISBN:
(数字)9781665414517
ISBN:
(纸本)9781665430340
It is known that social media has become a part and parcel in everyone's life. Human emotions are constantly being expressed in real time on various social networking sites. the availability of an enormous amount of opinion rich data from various social networking sites has fueled interest in opinion mining and sentiment analysis. there are mainly two approaches for performing sentiment analysis that is a lexicon-based approach and a machine learning based approach. In this paper, we chose to limit our study to just the lexicon-based approach of sentiment analysis. Lexicon based approach relies on the lexicons for classifying input data. Lexicon is a set of words, idioms, phrases, etc. having a semantic meaning. In this paper, prior research done in lexicon-based sentiment analysis has been studied; Also, a review of some state-of-the-art lexicon-based solutions have been presented for polarity classification of Sentiment Analysis. this paper is mainly oriented towards the various lexicons used for polarity classification.
the proceedings contain 16 papers. the topics discussed include: performance anomaly and change point detection for large-scale system management;extended abstract of performance analysis and prediction of model trans...
ISBN:
(纸本)9781450371094
the proceedings contain 16 papers. the topics discussed include: performance anomaly and change point detection for large-scale system management;extended abstract of performance analysis and prediction of model transformation;issues arising in using kernel traces to make a performance model;how to apply modeling to compare options and select the appropriate cloud platform;towards performance modeling of speculative execution for cloud applications;kubernetes: towards deployment of distributed IoT applications in fog computing;acceleration opportunities in linear algebra applications via idiom recognition;and tutorial on benchmarking big data analytics systems.
Feature Selection (FS) is the selection of certain features by using a criterion assessment application. In the age of technological advancements and innovations, there has been a significant rise in the use of differ...
详细信息
ISBN:
(数字)9781665414517
ISBN:
(纸本)9781665430340
Feature Selection (FS) is the selection of certain features by using a criterion assessment application. In the age of technological advancements and innovations, there has been a significant rise in the use of different social networking applications such as Facebook, YouTube, Twitter, and e-commerce platforms such as Amazon, Alibaba, Flipkart, and others. It has increased the use of sentiment analysis in the different real-world applications so that there is a classification of text in different preset polarities such as optimistic, pessimistic, and impartial. the current research aims to find out the selection process involved in choosing the optimal features for classification using sentimental textual data. the study presents the scope of the sentimental analysis using textual data, fundamentals of the classification process, and the significance of the feature selection schemes so that there is an implementation of effective feature selection for text classification and analysis of sentiments.
Hybrid optimization is used by reconfiguration, type-1 and type-2 distributed generators (DG) placement to enhancing savings. For reconfiguration and DG positioning the PSO and SSA are used, respectively. For this alg...
详细信息
ISBN:
(数字)9781665414517
ISBN:
(纸本)9781665430340
Hybrid optimization is used by reconfiguration, type-1 and type-2 distributed generators (DG) placement to enhancing savings. For reconfiguration and DG positioning the PSO and SSA are used, respectively. For this algorithm, the main goal is to optimize the economy by cutting down losses, involving failure costs. On two radial distribution systems (RDS), which are 33 (RDN) and 69 (RDN), the suggested algorithm is tested. DG's implementation and maintenance costs are included in the aim of hybrid optimization during DG installation, along with restructuring and without restructuring.
暂无评论