Analyzing and forecasting network traffic for different applications has gained popularity in recent years. Several tests have been carried out to find issues with the computer network apps that are in use today. Anti...
详细信息
In order to solve the problem of missed detection and false detection caused by light change, leaf occlusion, fruit overlap and other citrus detection factor, an improved YOLOv3 citrus detection depth learning algorit...
详细信息
The proceedings contain 60 papers. The special focus in this conference is on Computing and Communication Networks. The topics include: Enhancing Security in Wireless Sensor Networks: A Broadcast/Multicast Authenticat...
ISBN:
(纸本)9789819726707
The proceedings contain 60 papers. The special focus in this conference is on Computing and Communication Networks. The topics include: Enhancing Security in Wireless Sensor Networks: A Broadcast/Multicast Authentication Framework with Identity-Based Signature Schemes;TSFTO: A Two-Stage Fuzzy-Based Tasks Orchestration Algorithm for Edge and Fog Computing Environments;tracking Climatic Variations Through Smart IoT-Driven Approach: An Exploratory Analysis;Design and Manufacturing of an Efficient Low-Cost Fire Surveillance System Based on GSM Communications and IoT Technology;a Comparative Analysis of Optimized Routing Protocols for High-Performance Mobile Ad Hoc Networks;integrating Sandpiper Optimization Algorithm and Secure Aware Routing Protocol for Efficient Cluster Head Selection in Wireless Sensor Networks;the Effects of Weather Conditions on data Transmission in Free Space for Wireless Sensor Networks;Using Wireless Sensor Network Performance and Optimizing in Underground Mines with Virtual MIMO Antenna;a Novel Logistic Regression-Based Fire Detection Model Using IoT in Underground Coal Mines;An MQTT IoT Intrusion Detection System Using Deep-learning;multi-objective Optimal Feature Selection for Cyber Security Integrated with Deep learning;application of Gradient Boosting Classifier-Based Computational Intelligence to Detect Drug Addiction Threat in Society;insurance 4.0: Smart Insurance Technologies and Challenges Ahead;review on Vision Transformer for Satellite Image Classification;primitive Roots and Euler Totient Function-Based Progressive Visual Cryptography;approach for Fire Detection Using Image Processing;review of Various Approaches for Authorship Identification in Digital Forensics;machinelearning Model for Traffic Prediction and pattern Extraction in High-Speed Optical Networks;improved Markov Decision Process in Wireless Sensor Network for Optimal Energy Consumption.
The proceedings contain 11 papers. The topics discussed include: metaheuristic firefly and C5.0 algorithms based intrusion detection for critical infrastructures;a novel spatial-temporal deep neural network for electr...
ISBN:
(纸本)9798350328929
The proceedings contain 11 papers. The topics discussed include: metaheuristic firefly and C5.0 algorithms based intrusion detection for critical infrastructures;a novel spatial-temporal deep neural network for electricity price forecasting;temporal-spatial graph neural network for wind power forecasting considering the blockage effects;European standardization efforts from fair toward explainable-AI-ready data documentation in materials modelling;detection of pneumonia from chest X-ray images using convolutional neural network (CNN);SVM at edge: low cost caching prediction for connected edge intelligence in federated machinelearning;staying ahead of the curve: early prediction of academic probation among first-year cs students;facial expression recognition using deep neural network;human posture detection on lightweight DCNN and SVM in a digitalized healthcare system;and fishing trawler event detection: an important step towards digitization of sustainable fishing.
With the development of computer technology and the national aerospace industry, remote sensing satellites have been successively projected into the air, and the resolution of remote sensing images is becoming higher ...
详细信息
Autonomous driving technology has gradually matured. The main application is unmanned vehicles, which have begun to test on the road. However, there is a critical technical problem with mitigating interfering factors ...
详细信息
Tools from the machinelearning and datamining domain become even more popular in the fields of economics, entrepreneurship, and policy-making. At the same time, the research on small and medium-sized enterprises (SM...
详细信息
Throughout the course of careers, a large number of employees encounter a variety of normal life events that can have an impact on their performance and job environment satisfaction. Under these circumstances, some em...
详细信息
The proceedings contain 40 papers. The topics discussed include: calculation of soft magnetic high-entropy alloys systems;enhancement of tribological properties of tool metal-ceramic materials by high-power ion beams;...
ISBN:
(纸本)9781510681590
The proceedings contain 40 papers. The topics discussed include: calculation of soft magnetic high-entropy alloys systems;enhancement of tribological properties of tool metal-ceramic materials by high-power ion beams;some features of the formation of gas hydrates in solutions of common salt;study of the features of formation of gas hydrates in solutions of common salt and calcium chloride;development of mathematical models for nonlinear nonstationary random processes;detecting anomalies in forest input data in a supply chain system using machinelearning;grid approximation in the problems of synthesis of UAV control systems;development of an emotion and age recognition model based on the combination of local binary patterns and squeeze-and-excitation block method;and simulation modeling as a decision support system tool for improving the environmental safety of road transport.
In the evolving fields of biometric authentication and recognition, ongoing efforts are aimed at overcoming various challenges related to accuracy, robustness, computational complexity, and generalization. Notably, th...
详细信息
暂无评论