the proceedings contain 327 papers. the topics discussed include: natural constant computed by Excel according to human method;an analysis system of infrared non-contact recognition of raw-milk gas-liquid two-phase fl...
ISBN:
(纸本)9781467381727
the proceedings contain 327 papers. the topics discussed include: natural constant computed by Excel according to human method;an analysis system of infrared non-contact recognition of raw-milk gas-liquid two-phase flows;research on the simulation model of medical service pricing;development of a virtual training system for marine engineers;a direct data fetch technology applied in disaster-tolerant model of distributed file system;factory planning model of aircraft engine transmission parts based on the genetic annealing algorithm;analysis of electromagnetic scattering characteristics of target coated with finite-difference time-domain method;achieve high availability about point-single failures in OpenStack;a novel clustering and KWNN-based strategy for Wi-Fi fingerprint indoor localization;and classification of college students' mobile learning strategies based on principal component analysis and probabilistic neural network.
For semantic branching in a two-branch network structure, it is crucial to quickly improve the feeling field, in addition, the feature fusion interaction of two-branching needs to take into account the structural and ...
详细信息
Social media platforms like Instagram, Twitter, and Facebook have completely changed our world. People today exhibit a kind of digital character and are more linked than ever. While social media undoubtedly offers man...
详细信息
network Intrusion Detection Systems (NIDS) play a crucial role in safeguarding computernetworks from unauthorized access and malicious activities. In this work, conducted a systematic examination of diverse machine l...
详细信息
Optimal weight selection in a novel model of Deep Belief Neural network (DBBN) is employed in this study to try to identify individuals in the video using a Dragonfly Algorithm (DA). With a learning rate of 0.001, the...
详细信息
Withthe global population steadily increasing, ensuring food security is a major concern, especially in agriculture. Detecting plant diseases early can make farming more efficient and prevent significant food losses....
详细信息
In this era of the internet, malware poses a severe threat to cyber security and modern communication networks. It is very difficult to get protected from the exponential increase of malware threats and its variants w...
详细信息
Facial Expression Recognition (FER) is a hot topic in computer vision, thanks to its many uses in the fields including psychology, security, and human-computer interaction. In this paper, we present a method for face ...
详细信息
the growth of wireless sensor networks has transformed all automation and industrial systems. Nonetheless, guaranteeing safe and privacy-preserving connectivity in sensor networks continues to be a difficult task. Cur...
详细信息
One of the main areas researchers are looking into nowadays is how to change words from one language to another, known as transliteration. this is especially useful for cross-lingual applications where people need to ...
详细信息
暂无评论