the proceedings contain 56 papers. the special focus in this conference is on Cyber Security Intelligence and Analytics. the topics include: Comparative Study of ARIMA Model and Long Short Term Memory Network (LSTM) i...
ISBN:
(纸本)9783031882869
the proceedings contain 56 papers. the special focus in this conference is on Cyber Security Intelligence and Analytics. the topics include: Comparative Study of ARIMA Model and Long Short Term Memory Network (LSTM) in Economic Management;the Application and Empirical Study of Causality in the theory Graph;research on Machining and Simulation Optimization System of Automobile Steering Knuckle Based on advanced Algorithm;network Partitioning and Demand Characterization for Management of Urban Low Voltage Power Distribution systems;automation and Data Aggregation Algorithm for Low Code Development in Power Grid Mobile Report Generation;big Data Analysis and Smart Grid Security Event Monitoring and Response in the Power Internet of things;Construction of an Online Autonomous Learning Model Based on Artificial Intelligence ChatGPT;Application of PMS Graphic Intelligent Recognition and Analysis Based on Contact Diagram Automatic Generation Technology;application of Genetic Algorithm in Reasonableness Evaluation of Environmental Design Space Layout;construction of an Intelligent Recommendation Model for Digital Media Content Based on Artificial Intelligence;research on Link Selection and Allocation for IoT Localization systems Based on an Improved Ant Colony Algorithm;cross-Domain Sharing and Privacy Protection Method of Fused Multi-source Data in Visual Internet of things;construction of Cold Chain Logistics and Distribution Site Selection System Based on Multi-objective Optimization Model;hole Detection Algorithm Based on Channel Fusion Siamese Network;intelligent database Triggers Enable advanced Analysis of Data Recorded in Audit Logs;improvement of Principal Component Analysis Algorithm and Its Simulation Experiment;OLAP Technology Financial Statistics Information Platform Based on Big Data Analysis.
the proceedings contain 17 papers. the topics discussed include: a review of backdoor control techniques for embedded devices;design of general detection circuit for analog signal of equipment electrical and electroni...
ISBN:
(纸本)9798400717789
the proceedings contain 17 papers. the topics discussed include: a review of backdoor control techniques for embedded devices;design of general detection circuit for analog signal of equipment electrical and electronic system;mitigating injection and phishing attacks through input validation and phishing detection techniques;performance analysis of a hybrid self-sufficient coverless video steganography method for IoT applications;MemoRecall: a senior friendly web application for holistic intervention of early memory lapses in geriatric individuals;make applications FaaS-ready: challenges and guidelines;and research on user behavior analysis and growth strategies in digital exhibitions based on pattern recognition.
the proceedings contain 52 papers. the topics discussed include: web data and the resurrection of databasetheory;integrating web based applications - challenges and opportunities;modeling and manipulating multidimens...
ISBN:
(纸本)0769509967
the proceedings contain 52 papers. the topics discussed include: web data and the resurrection of databasetheory;integrating web based applications - challenges and opportunities;modeling and manipulating multidimensional data in semistructured databases;a new query processing technique for xml based on signature;a similarity-based soft clustering algorithm for documents;gradual clustering algorithms;a binary-categorization approach for classifying multiple-record web documents using application ontologies and a probabilistic model;an empirical study on the visual cluster validation method with fastmap;distance courseware discrimination based on representative sentence assaying;introducing cooperation and actions in amalgamated knowledge bases;a logical foundation for deductive object-oriented databases;and analyzing the critical path for the well-formed workflow schema.
this paper aims to examine the utilization of some alternative energy resources onboard such as solar power, wind power, and battery systems. the analyses in the relevant literature regarding these strategies are eval...
详细信息
the proceedings contain 40 papers. the topics discussed include: similarity join for low- and high- dimensional data;spatial query processing for high resolutions;discovering direct and indirect matches for schema ele...
ISBN:
(纸本)0769518958
the proceedings contain 40 papers. the topics discussed include: similarity join for low- and high- dimensional data;spatial query processing for high resolutions;discovering direct and indirect matches for schema elements;gangam: a transformation modeling framework;ascending frequency ordered prefix-tree: efficient mining of frequent patterns;an efficient sliding window algorithm for detection of sequential patterns;caucus-based transaction clustering;TAX-PQ: dynamic taxonomy probing and query modification for topic-focused web search;scalable view expansion in a peer mediator system;mining emerging substrings;fast text classification: a training-corpus pruning based approach;efficient record linkage in large data sets;and error minimization for approximate computation of range aggregates.
Nowadays, web applications are generally utilized as a busybody between PC clients. Also, web applications are utilized by online business organizations, government agencies, research organizations, etc. that need to ...
详细信息
In recent years, there has been a notable rise in the application of machine learning to cost estimation for query optimization. Central to an effective cost model are the abilities of accuracy, efficiency, lightness,...
详细信息
ISBN:
(纸本)9789819609130;9789819609147
In recent years, there has been a notable rise in the application of machine learning to cost estimation for query optimization. Central to an effective cost model are the abilities of accuracy, efficiency, lightness, and generalizability. However, traditional cost models are based on heuristics thus lack of accuracy. On the other hand, the learned cost models frequently struggle to strike a balance between accuracy and efficiency, with many lacking broad applicability. To combat these challenges, we introduce FAIth, a fast, accurate, and database-agnostic learned cost model. FAIth harnesses data from multiple sources to learn cross-database meta-knowledge. It is then effectively refined, leveraging the unique data information from the target database via an Adapter we developed. Proven through various benchmarks, FAIth consistently showcases its prowess in delivering accurate and robust cost estimations.
In this work, we introduce a novel methodology called Fusion Grad-CAM for generating attention maps in ensemble classification systemsthat utilize majority voting. Currently, there is no established technique for pro...
详细信息
Sequence recommendation systems usually learn users personalized preferences based on historical behavior sequences of users. Previous methods often use rich item interaction informations combined with context to mine...
详细信息
ISBN:
(纸本)9789819757787;9789819757794
Sequence recommendation systems usually learn users personalized preferences based on historical behavior sequences of users. Previous methods often use rich item interaction informations combined with context to mine user sequential patterns. However, the time decay and dynamic evolution of users preferences are rarely taken into consideration. In this paper, we propose TDH4Rec(Time-aware Dual-kernel Hawkes process for sequential recommendation). First, we establish a time-aware attention embedding module. We utilize time sensitivity and importance of interactions to capture the time dependence and frequency dependence of items during the interaction process. Secondly, we design a Hawkes process based dual-kernel learning module. the Hawkes interaction kernel function with historical interaction effect and the Hawkes time kernel function with time decay effect are designed to capture the influence of historical interaction and the influence of time change of interacted items, respectively. Finally, extensive experiments on three real-world datasets show the efficacy of our model compared with conventional methods and state-of-the-art methods.
暂无评论