The proceedings contain 637 papers. The topics discussed include: a collaborative filtering recommendation method to the loyal-user problem;the study of characters design in PRG educational games;a survey on wireless ...
ISBN:
(纸本)9781424445196
The proceedings contain 637 papers. The topics discussed include: a collaborative filtering recommendation method to the loyal-user problem;the study of characters design in PRG educational games;a survey on wireless security protocols (WEP,WPA and WPA2/802.11i);an optimal scheduling algorithm for electronic control unit in vehicles;the application of improved spatial correlation wavelet denoising in terahertz time-domain spectroscopy;forest fire detection based on video multi-feature fusion;an approach to improve the robustness of substitution techniques of audio steganography;simulation of temperature measurement system for grain storage based on ZigBee technology;an image authentication scheme using magic square;a Research on stereo matching algorithm based on edge detection and Gaussian disparity distribution model;and an econometric analysis of development dynamics in modern Chinese industry.
The proceedings contain 616 papers. The topics discussed include: a collaborative filtering recommendation method to the loyal-user problem;the study of characters design in PRG educational games;a survey on wireless ...
ISBN:
(纸本)9781424445196
The proceedings contain 616 papers. The topics discussed include: a collaborative filtering recommendation method to the loyal-user problem;the study of characters design in PRG educational games;a survey on wireless security protocols (WEP,WPA and WPA2/802.11i);an optimal scheduling algorithm for electronic control unit in vehicles;the application of improved spatial correlation wavelet denoising in terahertz time-domain spectroscopy;forest fire detection based on video multi-feature fusion;an approach to improve the robustness of substitution techniques of audio steganography;simulation of temperature measurement system for grain storage based on ZigBee technology;an image authentication scheme using magic square;a Research on stereo matching algorithm based on edge detection and Gaussian disparity distribution model;and an econometric analysis of development dynamics in modern Chinese industry.
This research examines on the effectiveness of various Machine Learning and Deep Learning models for predicting the yield of paddy crop in East Godavari District, Andhra Pradesh, India. Dataset consist of 91 entries r...
详细信息
ISBN:
(纸本)9783031744396;9783031744402
This research examines on the effectiveness of various Machine Learning and Deep Learning models for predicting the yield of paddy crop in East Godavari District, Andhra Pradesh, India. Dataset consist of 91 entries representing 91-day paddy crop growth cycle from 2000 to 2009, this study forecast yield for the years 2017 and2018 using Machine Learning models such as Decision Tree, Random Forest, Gradient Boosting, AdaBoost, and Support Vector Machines (SVM) and Deep Learning models such as 1D Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, Multilayer Perceptron's (MLP), Feedforward Neural Networks (FNN), and Gated Recurrent Units (GRU). Performance of the Model is evaluated by using R-square, Mean Square Error (MSE) and Mean Absolute Error (MAE).
The Semantic Web has improved ontological representations, information retrieval, logic, and trust. Due to the lack of a hybrid crowdsourced co-inventive design workspace in Malaysia, this study has aimed to investiga...
详细信息
In this paper,I propose a new approach to mine all frequent itemsets that performs database scanning only once to construct data *** structure uses the conceptual of vertical data layout to contain transaction *** cha...
详细信息
ISBN:
(纸本)9781424445196
In this paper,I propose a new approach to mine all frequent itemsets that performs database scanning only once to construct data *** structure uses the conceptual of vertical data layout to contain transaction *** changing of minimal support is not effected by the data structure and rescan of database is not *** proposed algorithm has the ability to find frequent itemsets without generation of candidate *** obtains complete and correct frequent *** examples of all definitions and correctness proving are provided.
technology acceptance model(TAM)has populated in the information system(IS)researches and it has also been applied to online consumer behavior in the *** paper aims to further investigate the role of information quali...
详细信息
ISBN:
(纸本)9781424445196
technology acceptance model(TAM)has populated in the information system(IS)researches and it has also been applied to online consumer behavior in the *** paper aims to further investigate the role of information quality on online product *** primarily depicts consumer acceptance of such uses with the TAM *** on top of that,concerns of Consumer Research are *** combination forms an integrated theoretical framework of online consumer ***,this research examines how information quality of bulletin board,or alike,influences online consumers'intention to review product on that *** is a questionnaire-based empirical *** with a sample of 716 shows reasonably good fit in a structural equation model(SEM)on the proposed *** thus provides a more vigorous cause-and-effect view and is a significant step towards a better understanding of consumer behavior online.
Flash memories find wide use in storing data in any *** deletion in flash memories involves making the data unreliable on the *** contents get deleted in the flash memory,time is consumed in deleting the data on the f...
详细信息
ISBN:
(纸本)9781424445196
Flash memories find wide use in storing data in any *** deletion in flash memories involves making the data unreliable on the *** contents get deleted in the flash memory,time is consumed in deleting the data on the flash *** paper proposes a method to make the contents of the deleted blocks in the flash memory *** proposed method can be used for any algorithm used for data security in terms of error detection and *** method involves introducing appropriate number of errors in the data and control bits of the blocks of data making data recovery impossible.
As an active aspect in the practice and development of Educational technology, Education Resource platform is becoming the new growing point. The paper analyzed the problem emerged in current education resource sharin...
详细信息
ISBN:
(纸本)9781424445189
As an active aspect in the practice and development of Educational technology, Education Resource platform is becoming the new growing point. The paper analyzed the problem emerged in current education resource sharing and network, which show a frame Education Resource Grid for Training and Coaching.
The problems of conditional entropy's definition and the formula to compute conditional entropy are analyzed from various perspectives. Examples are given to prove the conclusion that conditional entropy never be ...
详细信息
ISBN:
(纸本)9781424445189
The problems of conditional entropy's definition and the formula to compute conditional entropy are analyzed from various perspectives. Examples are given to prove the conclusion that conditional entropy never be increased is not absolute, thus the representation that information is to decrease uncertainty in the definition of information is not absolutely correct. In most conditions the reduction of uncertainty is just a byproduct by the aim of reliability. It is more important to increase the reliability of information than to reduce the uncertainty of information.
暂无评论