the proceedings contain 14 papers. the topics discussed include: an on-demand cloud-native containerized storage design and its practice of HDFS-on-Kubernetes;profiling cultural tourists by using user generated big da...
ISBN:
(纸本)9781450398022
the proceedings contain 14 papers. the topics discussed include: an on-demand cloud-native containerized storage design and its practice of HDFS-on-Kubernetes;profiling cultural tourists by using user generated big data from online travel agencies;classification and prediction on cardiovascular disease datasets;new fitness evaluation for a single machine scheduling problem with an overtime option;efficient face generation and clustering using generative adversarial networks;a closed-loop detection algorithm for online updating of bag-of-words model;research on the prediction method of rural industry integration based on improved RBF neural network model;multi-view subspace clustering with complex noise modeling;breast microcalcification detection in digital mammograms using deep transfer learning approaches;an anchor free car damage detection method;and computer-aided design system for anti-corrosion of coal preparation equipment based on improved technology of high-salt coal washing wastewater.
the proceedings contain 35 papers. the topics discussed include: a survey of weakly-supervised semantic segmentation;privacy analysis of federated learning via dishonest servers;a new method of construction of permuta...
ISBN:
(纸本)9798350312935
the proceedings contain 35 papers. the topics discussed include: a survey of weakly-supervised semantic segmentation;privacy analysis of federated learning via dishonest servers;a new method of construction of permutation trinomials with coefficients 1;cross-consensus measurement of individual-level decentralization in blockchains;an expert knowledge generation model in smart contract vulnerability fuzzing;cyber-attack detection using secret sharing schemes;exploring downvoting in blockchain-based online social media platforms;inventory big data management for internet of things based on privacy preserving;securitizing microcredits using blockchain;an efficient transformer with distance-aware attention;application of profiled analysis to ADC-based remote side-channel attacks;and an individual-differences-based method for discovering viewpoints on interactive behavior.
the proceedings contain 45 papers. the topics discussed include: bridging the European earth-observation and AI communities for data-intensive innovation;ECG classification using deep CNN and Gramian angular field;dig...
ISBN:
(纸本)9798350333794
the proceedings contain 45 papers. the topics discussed include: bridging the European earth-observation and AI communities for data-intensive innovation;ECG classification using deep CNN and Gramian angular field;digital twin-driven degradation modeling method for control moment gyroscope health management;safe route recommendation based on crime risk prediction with urban and crime data;illicit item detection in X-ray images for security applications;hybrid deep learning for efficient detection of recalled products;attribute-based access control rules supported by biclique patterns;innovative and successful real-time automatization for production in oil and gas industry detection of anomalies in multivariate time series using ensemble techniques;and data-driven analysis of EV energy prediction and planning of EV charging infrastructure.
the proceedings contain 40 papers. the topics discussed include: DBFed: debiasing federated learning framework based on domain-independent;information fusion channel pruning for accelerating neural networks;multi-skil...
ISBN:
(纸本)9798350331240
the proceedings contain 40 papers. the topics discussed include: DBFed: debiasing federated learning framework based on domain-independent;information fusion channel pruning for accelerating neural networks;multi-skill policy transfer by option-based deep reinforcement learning for autonomous driving;JP-DouZero: an enhanced DouDiZhu AI based on reinforcement learning with peasant collaboration and intrinsic rewards;SolScope: effectively hunting potential permission backdoor threats in smart contracts;IoT device identification base on inter-flow correlation analysis using graph neural network;weakly supervised target-speaker voice activity detection;joint optimization of energy distribution, path selection and time allocation for smart reflector assisted mmWave communication system;INVA: an intelligent network virtualization architecture for big data platform;SAC: dynamic caching upon sketch for in-memory big data analytics;and a coalitional autonomous guiding model considering traffic and non-traffic participants.
the proceedings contain 140 papers. the topics discussed include: user experience analysis on mobile banking applications with system usability scale and usability testing;automatic tooth enumeration on panoramic radi...
ISBN:
(纸本)9798350370126
the proceedings contain 140 papers. the topics discussed include: user experience analysis on mobile banking applications with system usability scale and usability testing;automatic tooth enumeration on panoramic radiographs using deep learning;a study on behavioral intention to use in cryptocurrency applications among generation Z using UTAUT model;network anomaly detection analysis using artillery honeypot and Wazuh SIEM;behavioral intention to use quick response code Indonesian standard as digital payment methods: a moderator of ownership;recent trends for text summarization in scientific documents;database implementation using Citus on telecommunication data;wireless resilience: a LoRa-based sensor network and mobile application for flood victim rescue system;and analysis of website content as an environmental communication media: case study of ***.
the proceedings contain 24 papers. the special focus in this conference is on Big data and Cloud computing Challenges. the topics include: Early Planning of Virtual Machines to Servers in Cloud Server Farms is an Appr...
ISBN:
(纸本)9789819910502
the proceedings contain 24 papers. the special focus in this conference is on Big data and Cloud computing Challenges. the topics include: Early Planning of Virtual Machines to Servers in Cloud Server Farms is an Approach for Energy-Efficient Resource Allocation;performance Analysis of Distributed Algorithms for Big data Classification;achieving Sustainability by Rectifying Challenges in IoT-Based Smart Cities;framework for Implementation of Smart Driver Assistance System Using Augmented Reality;ioT-Based Mental Health Monitoring System Using Machine Learning Stress Prediction Algorithm in Real-Time Application;fish Feeder System Using Internet of things;an Efficient and Recoverable Symmetric data Aggregation Approach for Ensuring the Content Privacy of Internet of things;Implementation and Comparative Analysis of Various Energy-Efficient Clustering Schemes in AODV;secure Web Gateway on Website in Cloud;adaptive End-To-End Network Slicing on 5G Networks;zero Trust Framework in Integrated Cloud Edge IoT Environment;o2Q: Deteriorating Inventory Model with Stock-Dependent Demand Under Trade Credit Policy;embedding (K9-C9)n into Certain Necklace Graphs;Lyrics Generation Using LSTM and RNN;design a Quantum Cryptography Algorithm and Evaluate the Risks of Quantum-Based Nano computing;human Odor Security Using E-nose;automated Road Surveillance System Using Machine Learning;an Artificial Intelligence-Based Technique to Optimize Hybrid Vehicle Using Renewable Energy Sources;stock Market Prediction Using Machine Learning Techniques: A Comparative Study;comparative Study on Different Intrusion Detection datasets Using Machine Learning and Deep Learning Algorithms;mitigating Postnatal Depression: A Big data Self-help therapy.
the proceedings contain 126 papers. the topics discussed include: extended TLS security and defensive algorithm in OpenFlow SDN;meta-learner with sparsified backpropagation;FAID: feature aftermath for irony discernmen...
ISBN:
(纸本)9781538659335
the proceedings contain 126 papers. the topics discussed include: extended TLS security and defensive algorithm in OpenFlow SDN;meta-learner with sparsified backpropagation;FAID: feature aftermath for irony discernment;resource selection in federated web search;extension of the PingER project onto mobile devices using android applications;task resource usage analysis and failure prediction in cloud;an intelligent approach for UAV and drone privacy security using blockchain methodology;big data analytics using machine learning techniques;energy distance clustering algorithm (EDCA) for wireless sensor networks;and a novel distributed semi-supervised approach for detection of network based attacks.
As ship information network systems continue to increase in payload scale, problems such as difficult information storage and low interaction rate have become increasingly prominent. To address this, this paper propos...
详细信息
ISBN:
(纸本)9798350312935
As ship information network systems continue to increase in payload scale, problems such as difficult information storage and low interaction rate have become increasingly prominent. To address this, this paper proposes a distributed system for a ship cloud storage data center based on DDS, with a focus on system architecture and information interaction flow. A simulation platform for the warship system is built, and different types of information are tested to assess the information interaction and storage capabilities of the system. the experimental results demonstrate that DDS has good applicability in the distributed system of a ship cloud storage data center and has significant advantages in reliability.
Recently, edge computing has attracted a lot of attention from academia and industry. One of the important problems in edge computing is the task assignment problem. Many task assignment optimization problems in the l...
详细信息
ISBN:
(纸本)9798350312935
Recently, edge computing has attracted a lot of attention from academia and industry. One of the important problems in edge computing is the task assignment problem. Many task assignment optimization problems in the literature do not consider uncertain parameters. In this paper, we adopt the chance-constrained method as a powerful paradigm to model uncertainty in our task assignment optimization problem. Chance-constrained programming is one of the most difficult classes of optimization problems. To solve our defined problem, we propose a method called FMS that finds the optimal solution accurately and quickly. We first transform the original probabilistic problem into an equivalent problem using the Gauss error function, and then rely on an auxiliary problem to decrease the search space and find the candidate points that lead to the optimal solution and, therefiire, solve the defined problem. Simulation results confirm the correctness and efficiency of our method.
In this paper, we proposed an interactive behavior model for opinion tolerance and relationship difference. Furthermore, we used the tolerance measurement method based on trust mechanism to calculate the tolerance dif...
详细信息
ISBN:
(纸本)9798350312935
In this paper, we proposed an interactive behavior model for opinion tolerance and relationship difference. Furthermore, we used the tolerance measurement method based on trust mechanism to calculate the tolerance difference of individual opinion interaction, and constructed an individual opinion interaction behavior model based on attribute difference. this model is extended to social networks with relationship differences, and the occurrence probability of opinion interaction behavior is obtained by normalization method, so as to fit the change of real individual opinion and the polarization process of group opinion. We explored sociologically the corresponding relationship between parameter changes in the model and social phenomena. According to the specific needs, the optimization objective of the model is determined, which is solved by non-convex optimization method. Experiments show that the model can accurately describe the change of individual opinion and the process of polarization of group opinion, and can be applied to the non-polarization intervention of Internet opinion.
暂无评论