The proceedings contain 162 papers. The topics discussed include: summary and experiment on the exploration of brain tumor image classification recognition: initial experience of artificial intelligence technology;res...
ISBN:
(纸本)9781665421867
The proceedings contain 162 papers. The topics discussed include: summary and experiment on the exploration of brain tumor image classification recognition: initial experience of artificial intelligence technology;research progress of monitoring system based on wearable fall detection equipment for the elderly;automatic classification of Chinese long texts based on deep transfer learning algorithm;analysis of library loan records based on hybrid apriori- genetic algorithm;mixing pooling instead of class token representation learning for vision transformer;an gradient-based continuous-time trajectory optimization method for real-time collision avoidance on collaborative robot;research on the scheduling strategy of intelligent manufacturing workshop based on machinelearning;a firefly optimization fault-tolerant control algorithm for 4500m human occupied vehicle;a blockchain-based smart agriculture privacy protection data aggregation scheme;and improved method of multi-objective particle swarm algorithm learning factor based on fitness change.
Nowadays, Social Media websites have become increasingly popular, hosting millions of users daily and accounting for countless interactions. Among them, Twitter is extraordinarily popular, boasting a huge user base an...
详细信息
With the continuous development of computer network technology, its application in learning and education management also occupies an important position. With the advent of the information age, overseas students from ...
详细信息
The proceedings contain 210 papers. The topics discussed include: research on anti-lock braking system of electro-mechanical braking vehicle based on feature extraction;research on vehicle control system of constructi...
The proceedings contain 210 papers. The topics discussed include: research on anti-lock braking system of electro-mechanical braking vehicle based on feature extraction;research on vehicle control system of construction machinery based on machine vision;research on key technologies of basketball object segmentation and tracking based on image analysis;research on optimization method of computer network service quality based on feature matching algorithm;research on artificial intelligence machinelearning character recognition method based on feature fusion;ultimate strength analysis of longitudinal bending of hull girder based on image analysis;research on character behavior recognition based on local spatio-temporal relationship in surveillance video;andapplication of wireless sensor networks in the sensitive data security of intelligent data center under the big data environment.
The Seismic attenuation compensation is very important in seismic data processing, which can improve the resolution of the seismic profile. Most of the traditional attenuation compensation methods have complex calcula...
详细信息
Software fault prediction is a key area in the field of software engineering. Fault can occur in any stage of software development but if it is not correctly identified and removed, it may lead to system failure. The ...
详细信息
In recent years, there have been major changes in Automatic Speech Recognition (ASR). And due to the development of deep learning, Neural Networks (NNs) are more used in ASR, such as Deep Neural Network - Hidden Marko...
In recent years, there have been major changes in Automatic Speech Recognition (ASR). And due to the development of deep learning, Neural Networks (NNs) are more used in ASR, such as Deep Neural Network - Hidden Markov Model (DNN-HMM) and End-to-End model. The cost of manual speech transcription is very high. Active learning (AL) can choose to label only the samples with the most information, so as to reduce the labeling cost on the premise of ensuring the same performance as the machinelearning model. However, despite its current popularity, active learning is rarely used in conjunction with ASR. This paper list all scenarios in AL and distinguish query strategies based on confidence, uncertainty, version space reduction and expected error reduction by categorization, and investigate the prevalence of these strategies in recent studies. We analyze AL for ASR based on Gaussian Mixture Model - Hidden Markov Model (GMM-HMM), DNN-HMM and End-to-End models. In addition, we assess recent NN-based ASR research using active learning methods, investigating current state-of-the- art intersection of AL, NNs and related recent advances in ASR. Finally, the research analyzes recent work on AL for ASR according to different kinds of query strategies, and outlines commonalities and weaknesses of previous experiments. Therefore, we raise current research gaps and open research questions. We propose that the comparison of AL methods is difficult due to inconsistent datasets and models and the uncertainty of NNs still remains challenging. The existing approach for low resources conditions is a combination of semi-supervised/unsupervised learning and AL.
The proceedings contain 301 papers. The topics discussed include: study on performance optimization and physical properties testing of a new type of high thermal conductive damping coating;study of a multi-fusion posi...
The proceedings contain 301 papers. The topics discussed include: study on performance optimization and physical properties testing of a new type of high thermal conductive damping coating;study of a multi-fusion positioning system based on Beidou indoor inertial navigation;research on aging dielectric properties and physical testing of electric vehicle insulating silicone rubber under first principles;computer intelligent dynamic simulation and optimization for structural platform of water treatment subsystem on the spacecraft;computer intelligent evaluation model of Jining water quality by fuzzy mathematics and intelligent computing;research on dynamic knowledge map service system using computer big data;study andapplication of computer information big data in basketball vision system using high-definition camera motion data capture;research on fan operation evaluation and error state judgment relying on improved neural network and intelligent;and research on the application of artificial intelligence machinelearning technology in improving the accuracy of engineering image processing.
The proceedings contain 301 papers. The topics discussed include: study on performance optimization and physical properties testing of a new type of high thermal conductive damping coating;study of a multi-fusion posi...
The proceedings contain 301 papers. The topics discussed include: study on performance optimization and physical properties testing of a new type of high thermal conductive damping coating;study of a multi-fusion positioning system based on Beidou indoor inertial navigation;research on aging dielectric properties and physical testing of electric vehicle insulating silicone rubber under first principles;computer intelligent dynamic simulation and optimization for structural platform of water treatment subsystem on the spacecraft;computer intelligent evaluation model of Jining water quality by fuzzy mathematics and intelligent computing;research on dynamic knowledge map service system using computer big data;study andapplication of computer information big data in basketball vision system using high-definition camera motion data capture;research on fan operation evaluation and error state judgment relying on improved neural network and intelligent;and research on the application of artificial intelligence machinelearning technology in improving the accuracy of engineering image processing.
The proceedings contain 6 papers. The special focus in this conference is on Deployable machinelearning for Security Defense. The topics include: Few-Sample Named Entity Recognition for Security Vulnerability Reports...
ISBN:
(纸本)9783030878382
The proceedings contain 6 papers. The special focus in this conference is on Deployable machinelearning for Security Defense. The topics include: Few-Sample Named Entity Recognition for Security Vulnerability Reports by Fine-Tuning Pre-trained Language Models;dexRay: A Simple, yet Effective Deep learning Approach to Android Malware Detection Based on Image Representation of Bytecode;attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability;a Survey on Common Threats in npm and PyPi Registries.
暂无评论