The proceedings contain 16 papers. The topics discussed include: research on the development and application of English for specific purposes corpora;study on the characteristics and prevention methods of seeper in mi...
ISBN:
(纸本)9781665461504
The proceedings contain 16 papers. The topics discussed include: research on the development and application of English for specific purposes corpora;study on the characteristics and prevention methods of seeper in mined-out area based on big dataanalysis and geophysical exploration technology;research on the decision support model of investment and financing based on bp neural network algorithm;research on the influence of visual merchandising on customer value in mobile recommendation system-based on the intermediary effect of brand image;analyzing and comparing national innovation system and regional innovation system literatures: a bibliometric study;research on literature evaluation method based on content analysis;knowledge and networking innovations: a mosaic;and the perspective of digital communication with intangible cultural heritage information under the media technology environment: in case study of Molan culture.
The proceedings contain 132 papers. The special focus in this conference is on Florida Artificial Intelligence Research Society. The topics include: Causanom: Anomaly Detection With Flexible Causal Graphs;answering St...
The proceedings contain 132 papers. The special focus in this conference is on Florida Artificial Intelligence Research Society. The topics include: Causanom: Anomaly Detection With Flexible Causal Graphs;answering Student Queries with a Supervised Memory Conversational Agent;topological dataanalysis in Natural Language Processing – A Tutorial;k-medianoids Clustering Algorithm;automatic Generation of Paragraph Templates Using a Textual Energy Approach: Applications in Literary Text Production;on Bounding the Behavior of a Neuron;semantics-based Framework for Incentivized Research data Sharing;considerations in the Design of Realistic Agents for Serious Games;impact of Artificial Intelligence Regulations on Organizational Risks;an Interactive Interpretation viewer for Typed First-order Logic;security of Text to Icon/Image conversions;Code Generation for Collectible Card Games with Complex APIs;a Study of Compressed Language Models in Social Media Domain;biogeography-based optimization for feature selection;malicious or Benign? Towards Effective Content Moderation for Children’s videos;a Multi-Dictionary Approach to Abstractness/Concreteness-Based Authorship Attribution;bayesian Network Conflict Detection for Normative Monitoring of Black-Box Systems;relative Performance of Bilateral Multiattribute Negotiation Strategies in Open Markets;relative Effects of Positive and Negative Explanations on Satisfaction and Performance in Human-Agent Teams;ARCHIMEDES: Active Reasoning Conducted with Heterogeneous Information Monitors for Evading Dangers and Extended Surveillance;increasing Fairness in Predictions Using Bias Parity Score Based Loss Function Regularization;visual Episodic Memory-based exploration;A Comparison of AutoML Hyperparameter Optimization Tools For Tabular data;DynamicG2B: Dynamic Node Classification with Layered Graph Neural Networks and BiLSTM;unsupervised Keyword Extraction for Hashtag Recommendation in Social Media;deep Separable Hypercomplex Networks.
With the development of networks and financial technologies, credit card data is increasingly being used in various fields of dataanalysis such as user behavior, financial transactions, and market analysis. These fie...
详细信息
This paper presents a methodology for increasing human-centric production systems flexibility using human factors-enabled digital twins. The paper includes an analysis of the relevant projects that incorporate human-r...
详细信息
In the landscape of machine learning, the dominance of supervised learning in crafting specialized models for specific tasks is evident, yet its confinement in terms of broader generalization has underscored the quest...
详细信息
Here in this paper, a model that has been proposed for predicting and visually representing congestion of traffic using machine learning as well as deep learning. This initiative with the purpose of examining traffic ...
详细信息
ISBN:
(数字)9798350388602
ISBN:
(纸本)9798350388619
Here in this paper, a model that has been proposed for predicting and visually representing congestion of traffic using machine learning as well as deep learning. This initiative with the purpose of examining traffic data to obtain insights for traffic regulation and planning. The process initiates with an initial exploration of data through an Exploratory dataanalysis (EDA) and to perceive the distribution and patterns within the dataset. Descriptive statistics, correlation analysis, and visual aids are employed for this purpose. Following the EDA phase, tactics for manifold learning are utilized to simplify the dataset while retaining crucial information. Identifying significant features influencing the prediction of traffic volume is facilitated by methods for feature importance and selection. The obtained features are rigorously evaluated to comprehend traffic patterns and traffic jam levels. visual representations capture the distribution of traffic volume based on factors like time, day, and month, assisting in pinpointing congestion hotspots and optimizing traffic flow. This project underscores the powerful impact of dataanalysis and feature extraction in offering practical insights for traffic regulation strategies.
The procedure of analyzing and integrating text information from cutting descriptions collected during drilling process with formation evaluation models is a tedious task that is demanding in terms of time and human l...
详细信息
This paper first studies the origin and flow of IP images from the interactive perspective of design, explores the definition and rules of IP in the form of knowledge graph based on semiotics, and puts this problem in...
详细信息
ISBN:
(纸本)9783031610400;9783031610417
This paper first studies the origin and flow of IP images from the interactive perspective of design, explores the definition and rules of IP in the form of knowledge graph based on semiotics, and puts this problem into the background of the current wave of AI and virtual reality, and raises the following questions: - The definition of IP in virtual reality and the original IP in the network? What is the way forward? Based on the AI data era background of IP business image for induction automation design processor, to achieve better IP cultural communication and exchange. The author selected the female ethnic characteristic clothing of Hui 'an area of Fujian Province as the representative object of design. In this realization part, the article first takes Hui 'an women's ethnic clothing as an example to explore the characteristics of ethnic clothing induction methods - structure multi-modal form and cross-comparison analysis of horizontal multi-cultural pattern design and extract the elements. Then, according to the formula points summarized, the virtual IP image is designed with the characteristic ethnic dress of women in Hui 'an area of Fujian Province, China. According to the cultural gene and regional characteristics contained in the regional ethnic image, the pattern factors are decomposed reconstructed, and applied to the IP image design under the meta-structure virtual reality technology. On this basis, the vR system of the minority cultural IP generator is built. It allows users to generate IP images of featured nationalities in a more immersive environment through shapes, colors, lines, etc., summarized by patterns. Finally, the team tested the vR system. According to the five aspects of "whether the generated IP image is more vivid/whether it can integrate national characteristics/whether it is more immersive/whether it is more memorable/whether it is easier to understand", a total of 20 members participated in the evaluation. In the answer, we finally fin
Energy and Security remain two of the biggest obstacles that Wireless Sensor Networks (WSNs) must overcome. Protecting WSNs from Denial of Service (DoS) attacks are some of the security challenges associated with WSNs...
详细信息
In this paper, the Gobi Desert landform is used as a test site to analysis the results on surface wave survey. The body wave exploration methods are used to determined velocity structure of the site as a reference sta...
详细信息
暂无评论