the proceedings contain 316 papers. the topics discussed include: early screening for Alzheimer’s disease based on OCT image classification;AUV 3D path planning based on improved sparrow search algorithm;a new offloa...
ISBN:
(纸本)9798350361445
the proceedings contain 316 papers. the topics discussed include: early screening for Alzheimer’s disease based on OCT image classification;AUV 3D path planning based on improved sparrow search algorithm;a new offloading method in cloud platforms: reducing latency based on data compression;optimization study of variable spray technology in dust removal systems;a filtering non-discriminative features method for person re-identification based on transformer;measurement of water content in oil-water two-phase system based on optimized EWT-FK algorithm;RRT-trained DDQN algorithm for pathfinding problem of automated guided vehicle;patient's emotion computing under robot vision;an estimation method for state of charge of lithium-ion batteries based on adaptive multi-innovation fractional order unscented Kalman filtering;apple detection and yield estimation based on YOLOv5;and optimization of multi-UUV cooperative detection formation based on particle swarm optimization.
the proceedings contain 47 papers. the topics discussed include: a domain-specific language for supporting event log extraction from ERP systems;multidimensional data model for the analysis of information of productiv...
ISBN:
(纸本)9781538619346
the proceedings contain 47 papers. the topics discussed include: a domain-specific language for supporting event log extraction from ERP systems;multidimensional data model for the analysis of information of productive, scientific or service processes;robot path planning using rapidly-exploring random trees: a membrane computing approach;technological options selection to produce ferric chloride using analytic hierarchy process enhanced with fuzzy logic;self-healing of electric distribution networks: a review;intelligent management of the energy in copper mining, using predictive supervision systems;using drones in a warehouse with minimum energy consumption;using drones in a warehouse with minimum energy consumption;short-term load forecasting software tool;can series and parallel compositions improve on hammocks?;on algorithms for evaluating the reliability of large hammock networks;and when energy efficiency is not enough: homeostaticity of energy systems and why electric utilities should care.
the proceedings contain 186 papers. the topics discussed include: design scalability and power optimization of power management unit;physical design implementation of SoC module with performance optimization;low-power...
ISBN:
(纸本)9798350343144
the proceedings contain 186 papers. the topics discussed include: design scalability and power optimization of power management unit;physical design implementation of SoC module with performance optimization;low-power 4 x 4 SRAM memory array design using voltage mode technology;decentralized money transaction security system using HMBC algorithm;NLP based hate speech detection and moderation;an analytical approach for Cetacean family species detection using auditory hybrid algorithms for multi-class classification;development of machine learning model for medicinal plant identification;smart technology for people with food disorder;PV powered BLDC motor using fuzzy logic MPPT controller for electric vehicle;and android dashboard app development for autonomous vehicles using FireBase.
the proceedings contain 58 papers. the special focus in this conference is on Evolutionary computation and optimization, Intelligent systems, Applications, Classification and clustering methods, Soft computing methods...
ISBN:
(纸本)9783319079943
the proceedings contain 58 papers. the special focus in this conference is on Evolutionary computation and optimization, Intelligent systems, Applications, Classification and clustering methods, Soft computing methods in manufacturing and management systems, Applications of intelligent methods for security and Infrastructure and network security. the topics include: A strength pareto approach and a novel formulation in the reporting cells planning;a new iterative approach for finding nearest neighbors using space-filling curves for fast graphs visualization;classification via nearest prototype classifier utilizing artificial bee colony on CUDA;a proposal of good practice in the formulation and comparison of meta-heuristics for solving routing problems;soft computing meta models for the failure prediction of T-stub bolted connections;an overall performance comparative of GA-PARSIMONY methodology with regression algorithms;evolutionary simulation of complex networks’ structures with specific functional properties;inventory routing problem with stochastic demand and lead time;hybrid evolutionary workflow scheduling algorithm for dynamic heterogeneous distributed computational environment;a bi-objective harmony search approach for deploying cost-effective multi-hop communications over large-area wildfires;hyperspectral image analysis based on quad tree decomposition;gaussian process-based inferential control system and effect of initial conditioning of reinforcement learning agents on feedback control tasks over continuous state and action spaces.
the proceedings contain 57 papers. the topics discussed include: analysis of DFT-spread technique for mitigating nonlinear effects of HPA in FBMC/OQAM systems;monitoring system design and controlling smart home featur...
ISBN:
(纸本)9798350385526
the proceedings contain 57 papers. the topics discussed include: analysis of DFT-spread technique for mitigating nonlinear effects of HPA in FBMC/OQAM systems;monitoring system design and controlling smart home features withthe Blynk app;the application of three-phase induction motor protection automated system to overcome overload conditions and Zelio logic-based high temperatures;utilizing microtransaction as an incentive system in a volunteer computing project;classification of types of betel leaves (Piper Betel Linn) using an android-based neural network backpropagation;implementation of celiac disease detection using a website-based artificial neural network approach;and diesel engine fault detection using deep learning based on LSTM.
the proceedings contain 118 papers. the topics discussed include: cloud computing in academic institutions;applying hadoop for log analysis toward distributed IDS;SETMES: a scalable and efficient tree-based mechanical...
ISBN:
(纸本)9781450319584
the proceedings contain 118 papers. the topics discussed include: cloud computing in academic institutions;applying hadoop for log analysis toward distributed IDS;SETMES: a scalable and efficient tree-based mechanical scheme for multi-channel wireless data broadcast;proposal for an optimal job allocation method for data-intensive applications based on multiple costs balancing in a hybrid cloud environment;genetic SWARM based robust image watermarking;knowledge retrieval in lexical ontology-based semantic web search engine;proposal of automatic reporting system against unauthorized use of smart phone;features selection approaches for intrusion detection systems based on evolution algorithms;implementation of relaxed ACID properties for distributed load management in the electrical power industry;and improving information dissemination and collective data directory for focus group via web based system and SMS.
the proceedings contain 65 papers. the topics discussed include: enhancing sentiment analysis performance with blend of features and deep learning algorithms;a deep learning based approach for mask detection;breast ca...
详细信息
ISBN:
(纸本)9781839537042
the proceedings contain 65 papers. the topics discussed include: enhancing sentiment analysis performance with blend of features and deep learning algorithms;a deep learning based approach for mask detection;breast cancer detection using optimized hidden convolutional neural network;plant disease detection and management using deep learning approach;remote sensing image fusion using machine learning and deep learning: a systematic review;smart tour advisor using machine learning and natural language processing;image analysis using convolutional neural network to detect bird species;secure image watermarking using MLDWT and SVD for secure medical data transmission model in healthcare systems;and automatic detection of tuberculosis withthe help of image processing and machine learning classifier.
the proceedings contain 21 papers. the special focus in this conference is on Mobile Internet Security. the topics include: computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile E...
ISBN:
(纸本)9789819744640
the proceedings contain 21 papers. the special focus in this conference is on Mobile Internet Security. the topics include: computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge computing;lattice-Based Multi-entity Identification Protocols;Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic computing;Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR;SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE;existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping;a Heterogeneous computing Framework for Accelerating Fully Homomorphic Encryption;generic Construction of Forward-Secure Chameleon Hash Function;exploring Leakage Characteristics and Attacks through Profiles of Screaming Channels;Revisiting an Extension of Kannan’s Embedding for Ring-LWE;revisiting the algorithms for the Quaternion -Isogeny Path Problems;the Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection systems for DoS Detection in IoT Networks;integrating Machine Learning Models into the Linux Kernel: Opportunities and Challenges;early Weather Warning System with Real-Time Monitoring by IoT Sensors Considering Scalability and Reliability;privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities;research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks;Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis;intelligent Cooperative Routing for Services in computing Integration Networking;A Biometric-Based Data Protection Scheme for RSDs.
the proceedings contain 58 papers. the topics discussed include: deep learning model for IDS In the internet of things;real-time big data analytics perspective on applications, frameworks and challenges;real-time rout...
ISBN:
(纸本)9781665420327
the proceedings contain 58 papers. the topics discussed include: deep learning model for IDS In the internet of things;real-time big data analytics perspective on applications, frameworks and challenges;real-time routing for Internet of things: a survey on techniques and protocols;contagious patient tracking application spotlight: privacy and security rights;predicting QoS for web service recommendations based on reputation and location clustering with collaborative filtering;multiclass model for quality of web service using machine learning and cloud computing;classification personality traits by using pretrained deep learning models;a comparative study of algorithms of software effort estimation for the robotic and communication systems based on improved accuracy;cohesive summary extraction from multi-document based on artificial neural network;and state of art survey for deep learning effects on semantic web performance.
the proceedings contain 23 papers. the special focus in this conference is on Autonomic and Trusted computing. the topics include: Opportunistic trust based P2P services framework for disconnected MANETs;a risk-aware ...
ISBN:
(纸本)9783642165757
the proceedings contain 23 papers. the special focus in this conference is on Autonomic and Trusted computing. the topics include: Opportunistic trust based P2P services framework for disconnected MANETs;a risk-aware resource service decision strategy for global computing;Message race detection for Web Services by an SMT-based analysis;a user-oriented approach to assessing Web service trustworthiness;improving the trustworthiness of service QoS information in service-based systems;Using ELECTRE TRI outranking method to evaluate trustworthy software;the testing method for interface customized component;a new monitor model for enhancing trust-based systems;design and analysis of “Flexible” k-out-of-n signatures;a formal framework for compositional verification of Organic computingsystems;a formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints;towards autonomic mode control of a scalable intrusion tolerant architecture;agent-augmented Co-Space: Toward merging of real world and cyberspace;On alleviating reader collisions towards high efficient RFID systems;on-line adaptive algorithms in autonomic restart control;designing self-healing in automotive systems;trustworthy Organic computingsystems: Challenges and perspectives;adaptive control of sensor networks;Design of location-based hierarchical overlay network supporting P2PSIP conferencing service;effects of displaying trust information on mobile application usage;context based trust normalization in service-oriented environments.
暂无评论