With the rapid development of multimedia technology, images have become the main data form of people's daily communication and information expression. In order to ensure fast data transmission, much effort has bee...
详细信息
The proceedings contain 54 papers. The special focus in this conference is on Big Data and Security. The topics include: Research on the Evolution of New Energy Industry Financing Ecosystem Under the Background of Big...
ISBN:
(纸本)9789819932993
The proceedings contain 54 papers. The special focus in this conference is on Big Data and Security. The topics include: Research on the Evolution of New Energy Industry Financing Ecosystem Under the Background of Big Data;a Survey of the State-of-the-Art and Some Extensions of Recommender System Based on Big Data;an Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data;Feature Fusion Based IPSO-LSSVM Fault Diagnosis of On-Load Tap Changers;graphlet-Based Measure to Assess Institutional Research Teams;Logical Relationship Extraction of Multimodal South China Sea Big Data Using BERT and Knowledge Graph;research on Application of Knowledge Graph in War Archive Based on Big Data;Semi-supervised Learning Enabled Fault Analysis Method for Power Distribution network Based on LSTM Autoencoder and Attention Mechanism;fault Detection Method for Power Distribution network Based on Ensemble Learning;Research on Data-Driven AGC Instruction Execution Effect Recognition Method;factors Influencing Chinese Users’ Willingness to Pay for O2O Knowledge Products Based on Information Adoption Model;a Survey of Integrating Federated Learning with Smart Grids: Application Prospect, Privacy Preserving and Challenges Analysis;application of the Fusion Access technology of Carrier and 5G in Power Communication;Muscle Fatigue Classification Based on GA Optimization of BP Neural network;research on Typical Scenario Generation Based on Distribution network Data Mining and Improved Policy Clustering;a Data-Driven and Deep Learning-Based Economic Evaluation Method for New Power System Distribution Grid;study on Random Generation of Virtual Avatars Based on Big Data;an Explainable Optimization Method for Assembly Process Parameter.
In view of the key resource conflict problems in multi-project management, this paper combines the delay Petri network with the actual operation process of enterprises, and establishes a resource conflict delay Petri ...
详细信息
In order to ensure the safety of passengers in the elevator, this paper takes the abnormal behavior of passengers in the elevator car as the research object, and proposes an intelligent identification method for abnor...
详细信息
Internet of Things is a global network infrastructure consisting of aspects of 'Things' that are connected to an information network and have identity, physical form, virtual personality, and intelligent appea...
详细信息
In this paper, we propose an improved way low light image-enhancing model for Smartphone devices by training a U-Net based fully convolutional neural network (CNN) with raw sensor images. We collected a new dataset ca...
详细信息
This paper demonstrates the design and implementation of a new home automation system that uses Wi-Fi technology as network architecture. The paper presents a proposed architecture of smart home along with smart parki...
详细信息
The proceedings contain 27 papers. The special focus in this conference is on Human Centered Computing. The topics include: A Pedestrian Detection Method Based on Improved ResNet for Container Terminal;Detection of Ad...
ISBN:
(纸本)9783031237409
The proceedings contain 27 papers. The special focus in this conference is on Human Centered Computing. The topics include: A Pedestrian Detection Method Based on Improved ResNet for Container Terminal;Detection of Advertising Users Based on K-SMOTE and Ensemble Learning;quantitative Relationship Between Achievement Motivation and Game Behavior Based on Structural Equation Model;dictionary-Based Classical Chinese Word Segmentation and Its Application on Imperial Edicts of Jin Dynasties;visualization Analysis of Hot Event Propagation Topic Map;Pilot Reuse Joint Partial APs in Cell-Free Massive MIMO System;multi-task Allocation Under Multiple Constraints in Mobile Crowdsensing;Optimization of Kalman Filter Indoor Positioning Method Fusing WiFi and PDR;Constructing an UAV network with Relative Positioning;a Combining Forecasting Method Based on Seasonal Unit Root Test and Support Vector Regression;Resource Allocation for Multi-service NOMA System Based on Deep Reinforcement Learning;5G Resource Sharing Scheme and Consensus Algorithm Based on Blockchain;5G Message Log Credit Management and Verification System Based on Blockchain;a Graph-Based Service Composition Method for Science and technology Resources;Optimization of Energy Transaction Strategy Between Microgrids Based on MADDPG;research on the Elements of Future Holographic Scene Design Based on Card Sorting-Fuzzy Comprehensive Evaluation Method;fault Diagnosis Method of Automatic Sorter Equipment Based on Association Rules;innovation Framework for Green Ports;Adaptive ICP Registration Algorithm Based on the Neighborhood of SIFT Feature Points;A PSO Based Multi-view Hierarchical Clustering Method;GCN-ARIMA Based Sales Demand Prediction;dynamic Adjustment of the Learning Rate Using Gradient;predicting Personalities of Ancient Chinese Emperors Based on Relational Knowledge Transfer Model.
The proceedings contain 58 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications and Technologies. The topics include: Traffic Matrix Prediction Based on Differential...
ISBN:
(纸本)9783030967710
The proceedings contain 58 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications and Technologies. The topics include: Traffic Matrix Prediction Based on Differential Privacy and LSTM;patient-Chain: Patient-centered Healthcare System a Blockchain-based technology in Dealing with Emergencies;federated Data Integration for Heterogeneous Partitions Based on Differential Privacy;multimodal Fusion Representation Learning Based on Differential Privacy;bayesian Optimization-Based Task Scheduling Algorithm on Heterogeneous System;MOFIT: An Efficient Access Control Scheme with Attribute Merging and Outsourcing Capability for Fog-Enhanced IoT;enhanced Discriminant Local Direction Pattern Learning for Robust Palmprint Identification;jointly Super Resolution and Degradation Learning on Unpaired Real-World Images;roman Amphitheater Classification Using Convolutional Neural network and Data Augmentation;Multi-zone Residential HVAC Control with Satisfying Occupants’ Thermal Comfort Requirements and Saving Energy via Reinforcement Learning;Evaluating the Performance and Conformance of a SYCL Implementation for SX-Aurora TSUBASA;distributed Fair k-Center Clustering Problems with Outliers;MACSQ: Massively Accelerated DeepQ Learning on GPUs Using On-the-fly State Construction;optimizing Data Locality by Executor Allocation in Reduce Stage for Spark Framework;low Latency Execution Guarantee Under Uncertainty in Serverless Platforms;an Effective and Reliable Cross-Blockchain Data Migration Approach;A MVCC Approach to Parallelizing Interoperability of Consortium Blockchain;realtime Physics Simulation of Large Virtual Space with Docker Containers;temperature Matrix-Based Data Placement Using Improved Hungarian Algorithm in Edge Computing Environments;FastDCF: A Partial Index Based Distributed and Scalable Near-Miss Code Clone Detection Approach for Very Large Code Repositories;matching Program Implementations and Heterogeneous Computing System
Artificial intelligence is currently in an era of change, not only changing the artificial intelligence technology itself, but also changing human society. It has become more and more common to use artificial intellig...
详细信息
暂无评论