The proceedings contain 150 papers. The topics discussed include: analysis of communication strategy of Guzheng art based on artificial intelligence;research on the health detection and seismic performance evaluation ...
The proceedings contain 150 papers. The topics discussed include: analysis of communication strategy of Guzheng art based on artificial intelligence;research on the health detection and seismic performance evaluation of high-rise buildings;application of ecological energy saving design in building reconstruction project;computer network communication security encryption system based on ant colony optimization algorithm;an analysis of datamining techniques in software engineering database design;intelligent analysis algorithm for hidden danger identification of intelligent network monitoring system from the perspective of big data;human behavior recognition of video surveillance system based on neural network;application of AI intelligent learning system in multimedia demonstration;and application of artificial intelligence technology in power system stability assessment.
The proceedings contain 12 papers. The special focus in this conference is on miningdata for Financial Applications. The topics include: Privacy risk for individual basket patterns;exploring students eating habits th...
ISBN:
(纸本)9783030134624
The proceedings contain 12 papers. The special focus in this conference is on miningdata for Financial Applications. The topics include: Privacy risk for individual basket patterns;exploring students eating habits through individual profiling and clustering analysis;calibrating the mean-reversion parameter in the hull-white model using neural networks;deep factor model: Explaining deep learning decisions for forecasting stock returns with layer-wise relevance propagation;a comparison of neural network methods for accurate sentiment analysis of stock market tweets;a progressive resampling algorithm for finding very sparse investment portfolios;ICIE 1.0: A novel tool for interactive contextual interaction explanations;testing for self-excitation in financial events: A bayesian approach;a web crawling environment to support financial strategies and trend correlation: – extended abstract –;a differential privacy workflow for inference of parameters in the rasch model.
The proceedings contain 23 papers. The special focus in this conference is on database and Expert Systems Applications. The topics include: Semantic Influence Score: Tracing Beautiful Minds Through Knowledge Diffusion...
ISBN:
(纸本)9783030871000
The proceedings contain 23 papers. The special focus in this conference is on database and Expert Systems Applications. The topics include: Semantic Influence Score: Tracing Beautiful Minds Through Knowledge Diffusion and Derivative Works;robust and Efficient Bio-Inspired data-Sampling Prototype for Time-Series Analysis;membership-Mappings for data Representation learning: Measure Theoretic Conceptualization;membership-Mappings for data Representation learning: A Bregman Divergence Based Conditionally Deep Autoencoder;data Catalogs: A Systematic Literature Review and Guidelines to Implementation;task-Specific Automation in Deep learning Processes;approximate Fault Tolerance for Edge Stream Processing;deep learning Rule for Efficient Changepoint Detection in the Presence of Non-Linear Trends;time Series Pattern Discovery by Deep learning and Graph mining;a Conceptual Model for Mitigation of Root Causes of Uncertainty in Cyber-Physical Systems;integrating Gene Ontology Based Grouping and Ranking into the machinelearning Algorithm for Gene Expression data Analysis;SVM-RCE-R-OPT: Optimization of Scoring Function for SVM-RCE-R;short-Term Renewable Energy Forecasting in Greece Using Prophet Decomposition and Tree-Based Ensembles;a Comparative Study of Deep learning Approaches for Day-Ahead Load Forecasting of an Electric Car Fleet;Security-Based Safety Hazard Analysis Using FMEA: A DAM Case Study;Privacy Preserving machinelearning for Malicious URL Detection;remote Attestation of Bare-Metal Microprocessor Software: A Formally Verified Security Monitor;Provenance and Privacy in ProSA: A Guided Interview on Privacy-Aware Provenance;placeholder Constraint Evaluation in Simulation Graphs;Walk Extraction Strategies for Node Embeddings with rdF2Vec in Knowledge Graphs;bridging Semantic Web and machinelearning: First Results of a Systematic Mapping Study.
This study aims to improve the accuracy of the quality detection of water conservancy projects, and to identify and analyze the outliers in the detection data by introducing machinelearning algorithms. A variety of t...
详细信息
In the dynamic era of online education, the pursuit of a personalized and effective learning experience is paramount. A transformative approach in online education by integrating Multimodal datamining and data Synthe...
详细信息
Based on the text data of authoritative skin care community, this study analyzes the user39;s needs and summarizes six topics on the premise that it has the option of repurchase intention. We need to calculate the e...
详细信息
Traditional English teaching evaluation has problems such as subjectivity, limitations, quantitative bias, and lacks feedback and support. The evaluation algorithm based on data analysis technology provides an accurat...
详细信息
Aiming at the problems of low data collaboration rate and weak storage capacity of police surveillance data in national border police cooperation, the research is based on Parallel Distributed Clustering with Semantic...
详细信息
ISBN:
(纸本)9798400709777
Aiming at the problems of low data collaboration rate and weak storage capacity of police surveillance data in national border police cooperation, the research is based on Parallel Distributed Clustering with Semantic Constraints (PDCSC) algorithm. Police surveillance data processing model is constructed. The research firstly utilizes local density clustering algorithm to mine and classify the surveillance data, and then introduces the concept of parallelism and constructs the processing model using PDCSC algorithm. The results show that the clustering purity of police surveillance data based on PDCSC method is 92.37% and the data clustering accuracy is 93.67%. Meanwhile, the surveillance data summary of PDCSC method is 7108 which is 1085 and 2241 higher than that of DBSCAN and K-means. This indicates that the PDCSC algorithm can effectively process and classify police surveillance data, providing accurate police incident identification and analysis. The research aims to provide strong support for international police cooperation and improve the efficiency and accuracy of police work.
In the digital age, society is faced with an increasing number of destructive messages on the Internet, including insults, racism, violent extremism and national extremism. This paper presents a machinelearning-based...
详细信息
In the process of deepening the data processing of State Grid Power, a machinelearning algorithm is proposed to solve the problem that the data efficiency of State Grid Power cannot be effectively improved. Using mec...
详细信息
暂无评论