the need for increased memory in the electronics industry and the technical scaling issues of existing memory technologies have motivated researchers to develop next-generation memory technology. Scaling down of techn...
详细信息
Nowadays electronic gadgets play an important role in students' life as a source of learning. the Dependency of services provided by electronic gadgets has reached a large scale. Electronic gadgets like smart phon...
详细信息
Fuzzy control theory generates fuzzy rules based on expert experience and experimental data, so fuzzy control method can control complex and large-scale systems without precise mathematical models. But fuzzy control m...
详细信息
the proceedings contain 157 papers. the special focus in this conference is on Innovative computing. the topics include: Proactive Auto Scaling Based on Marginal Request Change Analysis for Reducing Tail Latency in Ku...
ISBN:
(纸本)9789819741205
the proceedings contain 157 papers. the special focus in this conference is on Innovative computing. the topics include: Proactive Auto Scaling Based on Marginal Request Change Analysis for Reducing Tail Latency in Kubernetes Cluster;Integration of Generative Adversarial Networks (GAN) and AI Drawing in Criminal Sketches—Applied in Crime Scene Investigation by Law Enforcement;implementation of a High Quality Cardiopulmonary Resuscitation Teaching Intelligence Training and Assessment System;Predicting Twitter Posts from Fake Accounts Using XGBoost Model;the Interplay Between Self-regulated Learning and Programming Learning Achievement;a Study on the Continued Viewing Intention of YouTuber Videos: Experiential Marketing, Social Capital, and Habit Perspectives;an Exploratory Study on the Design of Human-Computer Interaction Interfaces for Augmented Reality Integrated Museum Exhibitions;communication-Aware Optimization of Microservice Scheduling on Edge computing;Design of Computer Model for Raw Material Supplier Selection Based on Entropy Weight TOPSIS Method;exploring How Cybersecurity Competitions Can Help Improve Students’ Practical Abilities in Cybersecurity;Adversarially Residual U2Net for COVID-19 Lung Infection Segmentation from CT Images;partnerships Analysis Based on Measurements of Common Research Interest;System Design of Operating Costs of Intelligent Healthcare Services for the AHP Algorithm;a Multi-party Private Set Union Protocol Against Malicious Adversary;analysis of the Current Status of Research on Unmanned Collaborative Equipment Above and Below Water;data Mining Analysis of New Energy Vehicles Based on Cluster Analysis technology;Two-Layer Minimum Variance FIR Filter-Based DPLL Design;fuzzy Proximity Two-Dimension Inductance Gesture Recognition System Analysis and Implement;proximity Capacitive Gesture Recognition for Recursive Neighbor Memory Neural Network;application of Genetic Algorithms in Automated Mechanical Design.
To improve the performance of acoustic adversarial examples, this paper proposes an adversarial generation model based on Generative Adversarial Network (GAN) for audio classification. By introducing the classificatio...
详细信息
Wildfires are one of the major threats to forest sustainability. therefore, there is an urgent need for an early prevention system for wildfires. the flight controller comprises a Node Micro-Controller Unit board and ...
详细信息
One of the main hurdles of Industry 4.0 is to predict Aircraft failures Since downtime costs money and reduces productivity, the ability to prevent failures is essential. Knowing how many cycles or RULs remain before ...
详细信息
Blockchain being a distributed ledger preserves data in a highly secured environment which cannot be modified even by the user who created the data. this security aspect makes the blockchain technology popular in rece...
详细信息
Analyzing the students' in-class behaviors is able to intuitively reflect their learning states, which are important for teaching evaluations and for designing instruction. In order to automatically detect and rec...
详细信息
Because of the high risk of construction work, the safety of construction personnel have been widely paid attention from all walks of life. Some construction personnel does not obey the rules and regulations of the co...
详细信息
暂无评论