The proceedings contain 34 papers. The topics discussed include: effectiveness evaluation method for cyber deception based on dynamic Bayesian attack graph;the performance evaluation of recommendation algorithm using ...
ISBN:
(纸本)9781450375528
The proceedings contain 34 papers. The topics discussed include: effectiveness evaluation method for cyber deception based on dynamic Bayesian attack graph;the performance evaluation of recommendation algorithm using mahout framework;the distributed Gauss Newton methods for solving the inverse of approximated hessian with application to target localization;semi-automatic causal graph construction system;integrating design thinking into scrum framework in the context of requirements engineering management;design of software copyright registration system based on workflow;research on uni-app based cross-platform digital textbook system;the identification of corn leaf diseases based on transfer learning and data augmentation;approach to the lock chamber arrangement with adaptive ant algorithm;asymmetric u-shape network for contour detection on nonwoven images;and data-driven point sampling with blue-noise properties for triangular meshes.
The proceedings contain 28 papers. The topics discussed include: experimentation for decentralized resource-based multi-pool mining in Ethereum blockchain;performance enhancement in agriculture sector based on image p...
ISBN:
(纸本)9781665461412
The proceedings contain 28 papers. The topics discussed include: experimentation for decentralized resource-based multi-pool mining in Ethereum blockchain;performance enhancement in agriculture sector based on image processing;frameworks, applications and challenges in streaming big data analytics: a review;prevention and safety strategies for road accidents by using evolutionary algorithms;intrusion detection using deep learning techniques;analyzing applicant’s pre-admission data and predicting applicant’s performance in pre-admission test using data mining techniques;quantum computing and machine learning algorithms - a review;real-time violence detection using deep learning techniques;a study on the e-commerce trends using data analysis;and a systematic review on the motivations of cyber-criminals and their attacking policies.
Compiler bugs critically impact the correctness of software applications, making their detection and resolution vital for improving software quality. This paper proposes a novel approach leveraging sequential deep lea...
详细信息
In the software industry, software Reliability Growth Models (SRGMs) with confidence intervals (C.I.) are frequently employed as valuable tools to assist manager to determine the optimal timing for software releases a...
详细信息
A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p...
详细信息
Multi-Criteria Decision-Making (MCDM) plays a pivotal role in the field of computerscience and softwareengineering, offering a systematic approach to decision-making processes. The integration of various MCDM method...
详细信息
Face recognition under occlusion presents a persistent challenge in computer vision, primarily due to difficulties in capturing and effectively integrating visible and obscured facial features. This paper introduces a...
详细信息
Predicting water quality is essential to preserving human health and environmental sustainability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accurac...
详细信息
AI39;s revolutionary potential in higher education is examined in this proposal, including how it could revolutionize teaching, learning, administration, and research. Adaptive learning platforms, intelligent tutori...
详细信息
暂无评论