The proceedings contain 66 papers. The topics discussed include: a proposal of a multi-agent supporting system for network community formation;multimedia checkpoint protocol with lower recovery overhead;learning throu...
ISBN:
(纸本)9798331539887
The proceedings contain 66 papers. The topics discussed include: a proposal of a multi-agent supporting system for network community formation;multimedia checkpoint protocol with lower recovery overhead;learning through practice: the robot rugby design and development for the contest;fine-grained sketch retrieval for multi metric feature fusion with attentional mechanism;performance evaluation metrics for motion detection and tracking;correspondence analysis and perturbation of chi-squared value;application of large language model and in-context learning for aviation safety prediction;wideband microwave waveguide pillbox antenna with fan-beam radiation pattern and optimized matching performance;and a lightweight network-based automatic modulation recognition method applied to edge states.
The proceedings contain 42 papers. The topics discussed include: feature selection based on causal analysis algorithm for speech emotion recognition;location-aware reinforcement learning-based live virtual machine mig...
ISBN:
(纸本)9798350317534
The proceedings contain 42 papers. The topics discussed include: feature selection based on causal analysis algorithm for speech emotion recognition;location-aware reinforcement learning-based live virtual machine migration in fog computing;research on deep collaborative recommendation model based on attention mechanism;road surface depression detection based on improved YOLOV7;knowledge representation learning with hyperboloid models;hyper-relational knowledge graph embedding based on type constraints;construction of learning process ontology and application of SWRL rules;visualizing code syntax: empowering developers with a global view for enhanced code quality evaluation;salient object detection based on improved pyramid pooling network;and a deep learning-based study on multiple object tracking of small targets with application to mice tracking.
The proceedings contain 19 papers. The topics discussed include: efficient computation offloading with energy consumption constraint for multi-cloud system;experimental implementation of quantum prisoner dilemma on IB...
ISBN:
(纸本)9781665481809
The proceedings contain 19 papers. The topics discussed include: efficient computation offloading with energy consumption constraint for multi-cloud system;experimental implementation of quantum prisoner dilemma on IBM quantum computers;trash classification network based on attention mechanism;unsupervised image dehazing based on improved generative adversarial networks;few-shot remote sensing scene classification with multi-metric fusion;image extraction of thangka line drawings with transformer;textual adversarial attacks on named entity recognition in a hard label black box setting;matrix-based genetic algorithm for mobile robot global path planning;Chinese named entity recognition based on location information and word frequency;and a modular reasoning approach to knowledge graph.
The proceedings contain 13 papers. The topics discussed include: analysis and deployment of the optimal model for defect classification and target detection;a CMF design method of smart jewelry based on Kansei Enginee...
ISBN:
(纸本)9781665442442
The proceedings contain 13 papers. The topics discussed include: analysis and deployment of the optimal model for defect classification and target detection;a CMF design method of smart jewelry based on Kansei engineering and kano model;seamless remote rendering of DICOM images;multi-view 3D reconstruction with self-attention;a method of computing critical timelines and its related mathematic models for the anti-missile operation;EBF: event-based filter for exploit containment;a configurable parallel iterative tuning framework;evaluation model of the effect of banning bottled water sales based on analytic hierarchy process;cybersecurity of unmanned aerial vehicles: a survey;and application of grey model in long-term solar energy forecasting: a case study in Taiwan.
The proceedings contain 130 papers. The topics discussed include: evaluation of potential capabilities of radio electronic complex system for detecting unmanned aerial vehicles;design method of a dual-band balun, load...
ISBN:
(纸本)9798331520564
The proceedings contain 130 papers. The topics discussed include: evaluation of potential capabilities of radio electronic complex system for detecting unmanned aerial vehicles;design method of a dual-band balun, loaded with frequency-dependent complex impedances;designing the monitoring system architecture for service-oriented systems;improving the cybersecurity monitoring algorithms efficiency using neural networks;towards 6G mobile radio: what is inside?;object acquisition of stationary and moving targets;hybrid network infrastructure for campus network;method of coding video flow segments containing motion objects;development of microcontroller-based pure sine wave inverter with overload and overheating protection;and on the classification of digital images processed by the DAC algorithm.
The proceedings contain 61 papers. The special focus in this conference is on advancedengineeringtheory and Applications. The topics include: User Grouping and Relay Selection for Improving Outage Performance of Dow...
ISBN:
(纸本)9789819987023
The proceedings contain 61 papers. The special focus in this conference is on advancedengineeringtheory and Applications. The topics include: User Grouping and Relay Selection for Improving Outage Performance of Downlink Wireless Systems;Priority-Based Uplink Raw Slot Utilization in the IEEE 802.11ah Networks;a Perfect Knife—Bulk Decompilation and Preprocessing Tool;The Enhancement Chromatic Uniformity and Illuminating Flux of WLEDs with Dual-Layer Phosphorus Configuration;study of Sr,Ba3Si6O3N8:Eu phosphor for Improving Color Quality of White Light-Emitting Diodes;toward an Autonomous Operation of Wheel Loaders in Collaboration with a Truck for a Construction Site;simulation of Fluid Flow and Temperature of Automatic Hand Washing Machine;design of Negative Pressure Isolation Room Container Modularization;a Computational Fluid Dynamics Study of Force Generation by Bio-Inspired Continuous Undulating Fins;lyapunov-Based Controller for Bilinear Model Applied to Gas-Fired Furnace;design of Automatic Sliding Door System for Negative Pressure Isolation Room Modularization;a Current Sensor Fault-Tolerant Control Solution for Induction Motor Drive;PMSM Drive with Sliding Mode Direct Torque Control;fuzzy Luenberger Observer for Sensorless Control of Induction Motor Drive;Design of Torque Balance Controller for Coaxial BLDC Motor Using Hierarchical Sliding Mode Control Applied for Underwater Vehicle;a Kafka-Based Robot Automation Testing Using Genetic Algorithm;applying a Genetic Algorithm to Optimize Linear Quadratic Regulator for Ball and Beam System;apply the Metaheuristic Algorithm to Allocate Distributed Generation and Minimize the Cost of Energy Losses in the Distribution System;a Search Method for Power Transmission System Planning Problem in Ben Tre Province, Vietnam.
Deep learning, with its excellent feature extraction and classification capabilities, has shown great potential in the field of fish classification and become a crucial part of fish classification research. The tasks,...
详细信息
ISBN:
(纸本)9798331539894;9798331539887
Deep learning, with its excellent feature extraction and classification capabilities, has shown great potential in the field of fish classification and become a crucial part of fish classification research. The tasks, difficulties and typical algorithms for deep learning-based fish target detection classification are presented, as well as the current status analysis in terms of several common problems of fish target detection such as complex backgrounds, small targets and lightweighting. Finally, the dataset used for model training and the performance metrics for evaluating the model are presented, and the existing problems of deep learning-based fish classification and the prospects of fish classification algorithms in aquaculture and other fields are discussed, and the future research directions and challenges are pointed out.
As technology continues to evolve, new ways of threat began to follow its route. Attackers continuously grow in creativity to obtain access to integral information, inflict damage to property, and other malicious acts...
详细信息
ISBN:
(纸本)9798331539894;9798331539887
As technology continues to evolve, new ways of threat began to follow its route. Attackers continuously grow in creativity to obtain access to integral information, inflict damage to property, and other malicious acts. Antivirus software is a key component to the prevention of malicious software from compromising your system. With many antivirus software on the market, both free and paid and with 61% of antivirus users make use of free antivirus software (*** Team, 2023), the study selected Windows Defender, Avast, McAfee, and Malwarebytes as the main antivirus software that will be evaluated based on the users' behavioral intention of using and accepting these systems. The conducted research paper aims to gather users' acceptability to the different antivirus software utilizing the Unified theory of Acceptance and Use of Technology (UTAUT) Model by Venkatesh et al. (2003). These factors include Performance Expectancy (PE), Social Influence (SI), Facilitating Conditions (FC), Effort Expectancy (EE), and Public Trust (PT) alongside other variables such as age, experience, and voluntariness of use. For the data gathering, the researchers will survey a total of 120 users, with at least 30 users each for Windows Defender, Avast, McAfee, and Malwarebytes. Along throughout the study, the researchers will also conduct a simple test simulation of basic threat detection and create a checklist to determine whether the antiviruses that were selected were legitimate or not. The study aims to provide valuable insights into user preferences and perceptions, contributing to enhanced cybersecurity measures and improved antivirus software development in the future.
暂无评论