The proceedings contain 118 papers. The topics discussed include: hate speech detection using transformers;tweet analysis: what changed over time?;analysis of transfers learning techniques for early detection and grad...
ISBN:
(纸本)9798350348347
The proceedings contain 118 papers. The topics discussed include: hate speech detection using transformers;tweet analysis: what changed over time?;analysis of transfers learning techniques for early detection and grading of diabetic retinopathy on retinal images;FarmWise: crop cultivation analysis using image recognition and ArcGIS mapping;systematic literature review of rainforest surveillance;flood location, management and solution(FLMS): a flood prediction and management system for Kurla;machine learning technique for crop selection and prediction of crop cultivation;vision based floating garbage classification using SIFT;is LinkedIn going to become the next Facebook?;MSMEs readiness for adopting artificial intelligence and machine learning;and multimodal emotion recognition in video, audio, and text using deep and transfer learning.
The proceedings contain 86 papers. The special focus in this conference is on Innovations in Bio-Inspired computing and applications. The topics include: A Novel Approach to the Two-Dimensional Cargo Load Problem;vehi...
ISBN:
(纸本)9783031274985
The proceedings contain 86 papers. The special focus in this conference is on Innovations in Bio-Inspired computing and applications. The topics include: A Novel Approach to the Two-Dimensional Cargo Load Problem;vehicle Detection from Aerial Imagery Using Principal Component Analysis and Deep Learning;bio-inspired Heterogeneity in Swarm Robots;software Defect Prediction Using Cellular Automata as an Ensemble Strategy to Combine Classification Techniques;a Systematic Literature Review on Home Health Care Management;the Impact of the Size of the Partition in the Performance of Bat Algorithm;automatic Diagnosis Framework for Catheters and Tubes Semantic Segmentation and Placement Errors Detection;how Artificial Intelligence Can Revolutionize Software Testing Techniques;e-Assessment in Medical Education: From Paper to Platform;Evolution of Configuration Data in CGP Format Using Parallel GA on Embryonic Fabric;DeepPRS: A Deep Learning Integrated Pattern Recognition Methodology for Secure Data in cloud Environment;Automated Depression Diagnosis in MDD (Major Depressive Disorder) Patients Using EEG Signal;an Effective Deep Learning Classification of Diabetes Based Eye Disease Grades: An Retinal Analysis Approach;extracting and Analyzing Terms with the Component ‘Green’ in the Bulgarian Language: A Big Data Approach;Apartments Waste Disposal Location Evaluation Using TOPSIS and Fuzzy TOPSIS Methods;detection of Cracks in Building Facades Using Infrared Thermography;optimizing Pre-processing for Foetal Cardiac Ultra Sound Image Classification;a Review on Dimensionality Reduction for Machine Learning;detecting Depression on Social Platforms Using Machine Learning;impact of Green Hydrogen Production on Energy Pricing;Cross Synergetic Mobilenet-VGG16 for UML Multiclass Diagrams Classification;the Future in Fishfarms: An Ocean of technologies to Explore;breast Cancer Identification Using Improved DarkNet53 Model;anomaly Detection Framework.
The proceedings contain 40 papers. The topics discussed include: detection of uncertainty in exceedance of threshold (DUET): an adversarial patch localizer;context-aware resemblance detection based deduplication ratio...
ISBN:
(纸本)9781665460903
The proceedings contain 40 papers. The topics discussed include: detection of uncertainty in exceedance of threshold (DUET): an adversarial patch localizer;context-aware resemblance detection based deduplication ratio prediction for cloud storage;fast exploratory analysis with spatio-temporal aggregation over polygonal regions;triggerability of backdoor attacks in multi-source transfer learning-based intrusion detection;enhanced deep learning super-resolution for bathymetry data;payload-byte: a tool for extracting and labeling packet capture files of modern network intrusion detection datasets;compressed matrix computations;mining large data to create a balanced vulnerability detection dataset for embedded Linux system;development of open-source, edge energy management system for tactical power networks;and atmospheric gravity wave detection using transfer learning techniques.
The proceedings contain 28 papers. The topics discussed include: real-time route planning to reduce pedestrian pollution exposure in urban settings;improving the validation of automotive self-learning systems through ...
ISBN:
(纸本)9798400704734
The proceedings contain 28 papers. The topics discussed include: real-time route planning to reduce pedestrian pollution exposure in urban settings;improving the validation of automotive self-learning systems through the synergy of scenario-based testing and metamorphic relations;EPSAPG: a pipeline combining MMseqs2 and PSI-BLAST to quickly generate extensive protein sequence alignment profiles;sleep well: pragmatic analysis of the idle states of intel processors;workload-aware cache management of bitmap indices;a framework for profiling spatial variability in the performance of classification models;privacy-preserving intrusion detection system for internet of vehicles using split learning;an approach for dynamic behavioral prediction and fault injection in cyber-physical systems;and cardiotocography signal abnormality detection based on deep semi-unsupervised learning.
The proceedings contain 46 papers. The special focus in this conference is on Security and Information technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyr...
ISBN:
(纸本)9789819777853
The proceedings contain 46 papers. The special focus in this conference is on Security and Information technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyright Systems;a Zero-Watermarking Image Scheme in Normalized Cross-Correlation with Robust Copyright Protections;a Novel Approach for Detecting and Analyzing Cyber-Attacks in Cyber-Physical Systems;white-Box Penetration Testing for Hash Collision Attack on Web applications;towards Zero Trust for Financial Sectors: A Proposed Framework on Trust Evaluation;FiT-DPKI: Decentralized Public Key Infrastructure with Flexibility and Transparency for IoT Networks;Revolutionizing Healthcare: Case Studies of AI Algorithms Transforming the Field of Medicine;analysis and Detection of Abnormal Transactions on Ethereum;feasibility Analysis Study on Constructing a Grid Intrusion Detection System Using Semi-supervised Learning Models;Securing NLP Systems: A Comprehensive AI-Based Approach;A New Scheme Modeling Gym Membership Transactions with NFT Systems;A Text to Human-Like Speech Using Tacotron-Based TTS Model;A Novel Malware Classification Using CNN-SVM Deep Learning Method Based on Transfer Learning Architecture;enhancing Project Programming Hour Prediction with Regression Analysis Techniques—A Case Study of Company D;a New Traceable One-Time Address Scheme Secure Against Privilege Escalation Attack;An Object-Based Multi-level Authentication Framework for AR e-Book;a Door Lock System Based on Visual Cryptography;Automatic APT Attack Reconstruction Supporting Lateral Movement;using Open-Source Intelligence to Archive Criminal Organizations;FIDO-Based Access Control Mechanism in Named Data Networking;empirical Approach to a Fine-Tuning Using Forgetting in Large Language Models;automatic Wound Segmentation with Deep Convolutional Neural Networks;Prediction of the Prevalence of COVID-19 Using Epidemic Differential Equations and Deep Learning Network.
The proceedings contain 136 papers. The topics discussed include: learning disability predictions using machine learning : a detailed evaluation on predicting risk of dyslexia;K-means based LEACH protocol implementati...
ISBN:
(纸本)9798350314090
The proceedings contain 136 papers. The topics discussed include: learning disability predictions using machine learning : a detailed evaluation on predicting risk of dyslexia;K-means based LEACH protocol implementation;performance analysis of deep learning models over BreakHis dataset using up-sampling and down-sampling techniques for classification of breast cancer;classification of retinal occlusion in fundus images;cellular base station deployment using PSO and genetic algorithm;Github recommendation system and user analytics;live music popularity prediction using genre and clustering based classification system: a machine learning approach;drowsiness detection system;energy conservation building code for a six storey building;and model based design of DVB S2 transmitter and realization on SDR platform.
The proceedings contain 28 papers. The special focus in this conference is on Parallel and Distributed computing, applications and technologies. The topics include: Insider Trading Detection Algorithm in Industrial Ch...
ISBN:
(纸本)9789819982103
The proceedings contain 28 papers. The special focus in this conference is on Parallel and Distributed computing, applications and technologies. The topics include: Insider Trading Detection Algorithm in Industrial Chain Based on Logistics Time Interval Characteristics;link Attributes Based Multi-service Routing for Software-Defined Satellite Networks;A Fuzzy Logical RAT Selection Scheme in SDN-Enabled 5G HetNets;SSR-MGTI: Self-attention Sequential Recommendation Algorithm Based on Movie Genre Time Interval;fine Time Granularity Allocation Optimization of Multiple Networks Industrial Chains in Task Processing Systems;Ε-Maximum Critic Deep Deterministic Policy Gradient for Multi-agent Reinforcement Learning;effective Density-Based Concept Drift Detection for Evolving Data Streams;an End-to-End Multiple Hyper-parameters Prediction Method for Distributed Constraint Optimization Problem;Formalization and Verification of the Zab Protocol Using CSP;dynamic Priority Coflow Scheduling in Optical Circuit Switched Networks;Deep Reinforcement Learning Based Multi-WiFi Offloading of UAV Traffic;Triple-Path RNN Network: A Time-and-Frequency Joint Domain Speech Separation Model;design of Query Based Gallery Selector and Mask-Aware Loss for Person Search;a Privacy-Preserving Blockchain Scheme for the Reliable Exchange of IoT Data;R-RPT-A Reliable Routing Protocol for Industrial Wireless Sensor Networks;action Segmentation Based on Encoder-Decoder and Global Timing Information;Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher;The Prediction Model of Water Level in Front of the Check Gate of the LSTM Neural Network Based on AIW-CLPSO;Using MPIs Non-Blocking Allreduce for Health Checks in Dynamic Simulations;parallelizable Loop Detection using Pre-trained Transformer Models for Code Understanding;list-Based Workflow Scheduling Utilizing Deep Reinforcement Learning.
The proceedings contain 40 papers. The special focus in this conference is on Parallel and Distributed computing, applications and technologies. The topics include: Edge-Gateway Intrusion Detection for Smart Home;ener...
ISBN:
(纸本)9783031299261
The proceedings contain 40 papers. The special focus in this conference is on Parallel and Distributed computing, applications and technologies. The topics include: Edge-Gateway Intrusion Detection for Smart Home;energy-Delay Tradeoff in Parallel Task Allocation and Execution for Autonomous Platooning applications;a Reservation-Based List Scheduling for Embedded Systems with Memory Constraints;Formalization and Verification of SIP Using CSP;Towards a Blockchain and Fog-Based Proactive Data Distribution Framework for ICN;research on User Influence Weighted Scoring Algorithm Incorporating Incentive Mechanism;bloodMan-Chain: A Management of Blood and Its Products Transportation Based on Blockchain Approach;a Systematic Comparison on Prevailing Intrusion Detection Models;enhancing Resolution of Inferring Hi-C Data Integrating U-Net and ResNet Networks;detecting Network Intrusions with Resilient Approaches Based on Convolutional Neural Networks;Multi-GPU Scaling of a Conservative Weakly Compressible Solver for Large-Scale Two-Phase Flow Simulation;analysis of Precision Vectors for Ising-Based Linear Regression;Evaluating and Analyzing Irregular Tree Search in the Tascell and HOPE Parallel Programming Languages;Distributed Parallel Tall-Skinny QR Factorization: Performance Evaluation of Various Algorithms on Various Systems;a Partitioned Memory Architecture with Prefetching for Efficient Video Encoders;a Hardware Trojan Exploiting Coherence Protocol on NoCs;A System-Wide Communication to Couple Multiple MPI Programs for Heterogeneous computing;a Task-Parallel Runtime for Heterogeneous Multi-node Vector Systems;Accelerating Radiative Transfer Simulation on NVIDIA GPUs with OpenACC;QR Factorization of Block Low-Rank Matrices on Multi-instance GPU;equivalence Checking of Code Transformation by Numerical and Symbolic Approaches;improving the Performance of Lattice Boltzmann Method with Pipelined Algorithm on A Heterogeneous Multi-zone Processor;MEA: A Framework for Model Chec
暂无评论