As the public pays more and more attention to fire, the importance of fire prevention is becoming increasingly prominent. This paper focuses on the realization of fire alarm software that can alarm in real time. Throu...
详细信息
In the field of the fashion industry, the introduction of deep learning technology has taken an innovative revolution by providing assistance in the construction of intellectual systems that are intelligent to deliver...
详细信息
To protect the services and data of the main servers, Rapidly Deployed Cyber Attack Bait is proposed for the unpredictable cybersecurity attack in this research. Based on Software Defined Network, the data packet and ...
详细信息
The proposed study addresses the pressing challenge of enabling visually impaired individuals to navigate their surroundings with enhanced safety and autonomy. To this end, we propose a wearable assistive device desig...
详细信息
This article analyzes aspects of the problem of remote state estimation (RSE) via noisy communication channels for their Blum–Shub–Smale (BSS) computability, motivated by an exemplary application to a formal model o...
详细信息
With the rapid development of cloud computing, video, smart home, and Internet of things (IoT), the bandwidth requirements of communication networks are also greatly increasing. This paper investigates dynamic spectru...
详细信息
Forensic odontology is the branch of dentistry that deals with the proper collection, handling, and presentation of dental evidence to the court of law. It requires the expertise of a forensic odontologist. It can be ...
详细信息
The proceedings contain 24 papers. The special focus in this conference is on information Science, communication and computing. The topics include: The AIoT Ward Management and Health Monitori...
ISBN:
(纸本)9789819617807
The proceedings contain 24 papers. The special focus in this conference is on information Science, communication and computing. The topics include: The AIoT Ward Management and Health Monitoring System based on Aliyun IoT Platform;blockchain-Based Verifiable Multi-Keyword Ciphertext Retrieval Scheme;a Secure and Efficient Signcryption Scheme Applying in IoT Scenarios;a Distraction Mining Network for Polyp Segmentation;ORLQ: A Link Quality-Based Routing Protocol for UWSN;A Method for Lightweight DDoS Attack Detection Based on LightGBM;smart Contract Vulnerability Detection Method Based on Node Feature Augmentation Graph Convolutional Network;smart Contract Vulnerability Detection Method Based on Edge-Deactivation Graph Convolutional Network;an Exhaustive Survey on the Methods and Applications of Graph Neural Networks;assessment of Forecast Algorithms of Aircraft Icing in Southwestern China;Research on Topic Mining Based on LDA Model;from Text to Emotion: Applying Fine-Tuning Techniques to Large Language Models for Sentiment Analysis of Children’s Reading;fine-Grained Sketch-Based Image Retrieval Using a Contrastive Learning Framework;radiometric Difference Measurement Method Based on Infrared Thermal Imager;automatic Measurement of Knee Joint Space Width on Anteroposterior X-ray Images Based on U2-Net;detection of Hip-Knee-Ankle Angle in Lower Limb X-rays Based on Multi-Classification U2-Net (Angles to Angle);target Association of Heterogeneous Sensors Based on Attribute-Position Fusion;verification and Testing of Chinese informationtechnology Application Innovation Network Security for the Tobacco Industry;Fine-Grained Image Classification Based on BAM Attention Mechanism and PPM Pyramid Enhancement Methodological Studies;multimodal Machine Translation Based on Text-Image Aggregation;adaptive Multi-scale Fusion Transformer for Image Super-Resolution.
Facial recognition systems has been adopted widely now in security systems of today's world but the drawbacks methodologies lack capability to identify suspicious activities. Other approaches, including CNNs appli...
详细信息
Big Data analysis has played a great role in extracting valuable insights from a vast amount of data, which can help companies make better business decisions and gain significant benefits. This paper investigates a Bi...
详细信息
暂无评论