The proceedings contain 34 papers. The topics discussed include: effectiveness evaluation method for cyber deception based on dynamic Bayesian attack graph;the performance evaluation of recommendation algorithm using ...
ISBN:
(纸本)9781450375528
The proceedings contain 34 papers. The topics discussed include: effectiveness evaluation method for cyber deception based on dynamic Bayesian attack graph;the performance evaluation of recommendation algorithm using mahout framework;the distributed Gauss Newton methods for solving the inverse of approximated hessian with application to target localization;semi-automatic causal graph construction system;integrating design thinking into scrum framework in the context of requirements engineering management;design of software copyright registration system based on workflow;research on uni-app based cross-platform digital textbook system;the identification of corn leaf diseases based on transfer learning and data augmentation;approach to the lock chamber arrangement with adaptive ant algorithm;asymmetric u-shape network for contour detection on nonwoven images;and data-driven point sampling with blue-noise properties for triangular meshes.
The proceedings contain 28 papers. The topics discussed include: experimentation for decentralized resource-based multi-pool mining in Ethereum blockchain;performance enhancement in agriculture sector based on image p...
ISBN:
(纸本)9781665461412
The proceedings contain 28 papers. The topics discussed include: experimentation for decentralized resource-based multi-pool mining in Ethereum blockchain;performance enhancement in agriculture sector based on image processing;frameworks, applications and challenges in streaming big data analytics: a review;prevention and safety strategies for road accidents by using evolutionary algorithms;intrusion detection using deep learning techniques;analyzing applicant’s pre-admission data and predicting applicant’s performance in pre-admission test using data mining techniques;quantum computing and machine learning algorithms - a review;real-time violence detection using deep learning techniques;a study on the e-commerce trends using data analysis;and a systematic review on the motivations of cyber-criminals and their attacking policies.
The proceedings contain 59 papers. The special focus in this conference is on computerscience, engineering and Education Applications. The topics include: Construction of Individual Learning Scenarios;technology-Enha...
ISBN:
(纸本)9783030555054
The proceedings contain 59 papers. The special focus in this conference is on computerscience, engineering and Education Applications. The topics include: Construction of Individual Learning Scenarios;technology-Enhanced Financial Education and Sustainability Goals;health Status Recognition System for Communication Equipment Based on Data Mining;use of Sustainable Innovation in Information System: Integrate Individual’s Spirit and Team Climate;relations of the Genetic Code with Algebraic Codes and Hypercomplex Double Numbers;research on Logistics Center Location-Allocation Problem Based on Two-Stage K-Means Algorithms;operational Intelligence software Concepts for Continuous Healthcare Monitoring and Consolidated Data Storage Ecosystem;method of Recognition and Indexing of People’s Faces in Videos Using Model of Machine Learning;deduplication Method for Ukrainian Last Names, Medicinal Names, and Toponyms Based on Metaphone Phonetic Algorithm;two-Layer Perceptron for Voice Recognition of Speaker’s Identity;significant Parameters of the Keystroke for the Formation of the Input Field of a Convolutional Neural Network;detection of Ventricular Late Potentials in Electrocardiograms Using Machine Learning;smart Prothesis: Sensorization, Humane Vibration and Processor Control;optimization of Stock Basing on Improved Grey Prediction Model: A Case Study on Garment Supply Chain;improved Post-quantum Merkle Algorithm Based on Threads;improvement of Merkle Signature Scheme by Means of Optical Quantum Random Number Generators;integrated Water Management and Environmental Rehabilitation of River Basins Using a System of Non-linear Criteria;distribution of Resources Between Composite Applications in a Hyperconverged System;the Possibilistic Gustafson-Kessel Fuzzy Clustering Procedure for Online Data Processing;information System Penetration Testing Using Web Attack Automated Simulation.
Community search over bipartite graphs is a critical issue that has garnered considerable interest. Nevertheless, existing research often neglects the importance of vertex weights in community formation, which leads t...
详细信息
With the increasing requirements for supply chain security, traceability and efficiency in the healthcare industry, existing centralized or decentralized management systems show obvious limitations in dynamic environm...
详细信息
Multilayer graphs are an effective framework for mode ling complex systems and have garnered significant research attention. Previous studies on dense structure decomposition in multilayer graphs have generally relied...
详细信息
In recent years, large language models (LLMs) have demonstrated exceptional capabilities across various tasks. However, the effectiveness of LLMs in software requirement classification has yet to be thoroughly explore...
详细信息
With an association of principles created to improve collaboration amidst the operations and development teams, DevOps offers few agile practices. The paper39;s main goal is to conduct research about how the practic...
详细信息
Compiler bugs critically impact the correctness of software applications, making their detection and resolution vital for improving software quality. This paper proposes a novel approach leveraging sequential deep lea...
详细信息
暂无评论