The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601387
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling grid Stability: Harnessing μPMU Data for Data-Driven Analysis of grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601424
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling grid Stability: Harnessing μPMU Data for Data-Driven Analysis of grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Te...
ISBN:
(纸本)9789819601462
The proceedings contain 49 papers. The special focus in this conference is on Frontiers of Intelligent computing: Theory and applications. The topics include: Nepali Word Spelling Correction Using Ensemble Learning Technique;the Impact of Information Security Policies and Innovations in Digital Technology on the Transformation of Healthcare in Developing Nations: A Literature Review;integrating Multi-omics and Clinical Narratives for Predictive Modeling: Genomics, Transcriptomics, Proteomics, and Medical Texts in Disease Analysis;a Comprehensive Survey of Fake Review Detection Technology;a Hybrid Intelligent Decision Support System for Automating Financial Credit Evaluation;Advancing Taxation in the New Era: Enhancing Tax Ratios with the Core Tax Administration System (CTAS);Enabling grid Stability: Harnessing μPMU Data for Data-Driven Analysis of grid Frequency Events;machine Learning Techniques to Detect Fake News on Social Media: A Systematic Review;cutting-Edge Technology-Based Social Enterprises in India for Sustainable, Inclusive Healthcare;enhancing Telugu Sarcasm Classification Models with Word Embeddings in Imbalanced Datasets;capital Punishment: Analyzing Trends in the United States (1976–2016);exploring the Technostress Issue Among Indonesian Young Entrepreneurs;Teaching Computer Science Using Cloud-Based IDE with Perspectives in Inclusivity;Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in Security Issues of Cloud computing: A Literature Review;enhancing Corporate and Factory Training Through Game Development: A Comparative Review;usability of Intelligent System in Implementing Tutoring Lesson in Education: A Literature Review;performance Efficiency of Cloud computing—A Literature Review;decentralized Finance (DeFi) Wallets: A Review of its Efficiency, Usability, and Effectiveness;Social Networks on WEB 3.0.
The proceedings contain 306 papers. The topics discussed include: surveillance bot for detecting the intruders in border area;smart drug delivering system in hospitals using RFID;single input fuzzy logic control for D...
ISBN:
(纸本)9798350321425
The proceedings contain 306 papers. The topics discussed include: surveillance bot for detecting the intruders in border area;smart drug delivering system in hospitals using RFID;single input fuzzy logic control for Dfig based Wecs in standalone and grid connected mode;password authentication key exchange protocol with two servers by IBE in data analytics;an intelligent framework for driver fatigue detection based on hybrid model of gradient boost decision tree-CNN-LR;blockchain technology based privacy protection scheme for large-scale distributed systems;architecture heritage recognition using YOLACT instance segmentation;development of healthcare monitoring system with pollution control in industrial sectors using the Internet of things;hybrid energy management system using solar, windmill, fuel cell and battery;and Q-learning based reinforcement learning controller for concentration control of food preparation.
The proceedings contain 46 papers. The special focus in this conference is on Security and Information Technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyr...
ISBN:
(纸本)9789819777853
The proceedings contain 46 papers. The special focus in this conference is on Security and Information Technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyright Systems;a Zero-Watermarking Image Scheme in Normalized Cross-Correlation with Robust Copyright Protections;a Novel Approach for Detecting and Analyzing Cyber-Attacks in Cyber-Physical Systems;white-Box Penetration Testing for Hash Collision Attack on Web applications;towards Zero Trust for Financial Sectors: A Proposed Framework on Trust Evaluation;FiT-DPKI: Decentralized Public Key Infrastructure with Flexibility and Transparency for IoT Networks;Revolutionizing Healthcare: Case Studies of AI Algorithms Transforming the Field of Medicine;analysis and Detection of Abnormal Transactions on Ethereum;feasibility Analysis Study on Constructing a grid Intrusion Detection System Using Semi-supervised Learning Models;Securing NLP Systems: A Comprehensive AI-Based Approach;A New Scheme Modeling Gym Membership Transactions with NFT Systems;A Text to Human-Like Speech Using Tacotron-Based TTS Model;A Novel Malware Classification Using CNN-SVM Deep Learning Method Based on Transfer Learning Architecture;enhancing Project Programming Hour Prediction with Regression Analysis Techniques—A Case Study of Company D;a New Traceable One-Time Address Scheme Secure Against Privilege Escalation Attack;An Object-Based Multi-level Authentication Framework for AR e-Book;a Door Lock System Based on Visual Cryptography;Automatic APT Attack Reconstruction Supporting Lateral Movement;using Open-Source Intelligence to Archive Criminal Organizations;FIDO-Based Access Control Mechanism in Named Data Networking;empirical Approach to a Fine-Tuning Using Forgetting in Large Language Models;automatic Wound Segmentation with Deep Convolutional Neural Networks;Prediction of the Prevalence of COVID-19 Using Epidemic Differential Equations and Deep Learning Network.
The proceedings contain 136 papers. The topics discussed include: a survey paper on computer aided detection of tuberculosis;sentiment analysis approaches, types, challenges, and applications: an exploratory analysis;...
ISBN:
(纸本)9781665454018
The proceedings contain 136 papers. The topics discussed include: a survey paper on computer aided detection of tuberculosis;sentiment analysis approaches, types, challenges, and applications: an exploratory analysis;enigmas in emotion detection techniques tools: challenges and concerns;analysis of apple plant leaf diseases detection and classification: a review;does metaverse a technological revolution in artificial intelligence? a bibliometric analysis;credit card fraud detection using machine learning, deep learning, and ensemble of the both;machine learning based data classification methods in cloud security using cloudlightning framework;parallel chaos hash based LSB steganography technique using logistic map;a review on sentiment analysis of twitter data for diabetes classification and prediction;an analysis of deep learning models for detection of COVID-19 diseases;and engagement measurement of a learner during e-learning: a deep learning architecture.
The proceedings contain 84 papers. The special focus in this conference is on Neural computing for Advanced applications. The topics include: Self-Attention-Based Reconstruction for Planetary Magnetic Field;semi-super...
ISBN:
(纸本)9789819958436
The proceedings contain 84 papers. The special focus in this conference is on Neural computing for Advanced applications. The topics include: Self-Attention-Based Reconstruction for Planetary Magnetic Field;semi-supervised Multi-class Classification Methods Based on Laplacian Vector Projection;Integrating EMD, LMD and TCN Methods for COVID-19 Forecasting;LOS Guidance Law for Unmanned Surface Vehicle Path Following with Unknown Time-Varying Sideslip Compensation;application of Bat Algorithm to Reduce Power Loss in Electrical Power Systems;an Enhanced Subregion Dominance Relation for Evolutionary Many-Objective Optimization;a Stacked Autoencoder Based Meta-Learning Model for Global Optimization;optimization Design of Photovoltaic Power Generation System Under Complex Lighting Conditions;analysis of the Impact of Regional Customer Charging on the grid Under the Aggregator Model;image Reconstruction and Recognition of Optical Flow Based on Local Feature Extraction Mechanism of Visual Cortex;indicators Directed Multi-strategy Artificial Bee Colony Algorithm;Energy-Efficient Cellular Offloading Optimization for UAV-Aided Networks;artificial Bee Colony Based on Adaptive Search Strategies and Elite Selection Mechanism;minimization of Active Power Loss Using Enhanced Particle Swarm Optimization;preference Weight Vector Adjustment Strategy Based Dynamic Multiobjective Optimization;complementary Environmental Selection for Evolutionary Many-Objective Optimization;an Investigation on the Effects of Exemplars Selection on Convergence and Diversity in Large-Scale Particle Swarm Optimizer;A LSTM Assisted Prediction Strategy for Evolutionary Dynamic Multiobjective Optimization;an Adaptive Brain Storm Optimization Based on Hierarchical Learning for Community Detection;optimization Method of Multi-body Integrated Energy System Considering Air Compression Energy Storage;conditional Diffusion Model-Based Data Augmentation for Alzheimer’s Prediction;Sequential Seeding Initialization for
The proceedings contain 84 papers. The special focus in this conference is on Neural computing for Advanced applications. The topics include: Self-Attention-Based Reconstruction for Planetary Magnetic Field;semi-super...
ISBN:
(纸本)9789819958467
The proceedings contain 84 papers. The special focus in this conference is on Neural computing for Advanced applications. The topics include: Self-Attention-Based Reconstruction for Planetary Magnetic Field;semi-supervised Multi-class Classification Methods Based on Laplacian Vector Projection;Integrating EMD, LMD and TCN Methods for COVID-19 Forecasting;LOS Guidance Law for Unmanned Surface Vehicle Path Following with Unknown Time-Varying Sideslip Compensation;application of Bat Algorithm to Reduce Power Loss in Electrical Power Systems;an Enhanced Subregion Dominance Relation for Evolutionary Many-Objective Optimization;a Stacked Autoencoder Based Meta-Learning Model for Global Optimization;optimization Design of Photovoltaic Power Generation System Under Complex Lighting Conditions;analysis of the Impact of Regional Customer Charging on the grid Under the Aggregator Model;image Reconstruction and Recognition of Optical Flow Based on Local Feature Extraction Mechanism of Visual Cortex;indicators Directed Multi-strategy Artificial Bee Colony Algorithm;Energy-Efficient Cellular Offloading Optimization for UAV-Aided Networks;artificial Bee Colony Based on Adaptive Search Strategies and Elite Selection Mechanism;minimization of Active Power Loss Using Enhanced Particle Swarm Optimization;preference Weight Vector Adjustment Strategy Based Dynamic Multiobjective Optimization;complementary Environmental Selection for Evolutionary Many-Objective Optimization;an Investigation on the Effects of Exemplars Selection on Convergence and Diversity in Large-Scale Particle Swarm Optimizer;A LSTM Assisted Prediction Strategy for Evolutionary Dynamic Multiobjective Optimization;an Adaptive Brain Storm Optimization Based on Hierarchical Learning for Community Detection;optimization Method of Multi-body Integrated Energy System Considering Air Compression Energy Storage;conditional Diffusion Model-Based Data Augmentation for Alzheimer’s Prediction;Sequential Seeding Initialization for
The proceedings contain 58 papers. The topics discussed include: analysis of database programming technology in computer software engineering;loan default prediction with machine learning techniques;design of laborato...
ISBN:
(纸本)9798350396393
The proceedings contain 58 papers. The topics discussed include: analysis of database programming technology in computer software engineering;loan default prediction with machine learning techniques;design of laboratory cloud visual intercom access control system based on NFC technology;a mode study on the integration of computer network technology and college English curriculum;research on the protection of strong electromagnetic pulse to reinforce the computer interface;applications of new technologies to recognition of financial statement fraud;the evaluation of fatigue of construction workers by heart rate monitoring technology and model establishment;research on semantic segmentation algorithm based on deep learning control tools;summary of research on security and privacy of smart grid;a small sample DDoS attack detection method based on deep transfer learning;and research on the technology of artificial intelligence in computer network under the background of big data.
The Smart grid (SG) represents the next-generation power system in the future grid infrastructure, designed for self-healing, adaptability, and sustainability. However, the inter-connected and geographically dispersed...
详细信息
ISBN:
(纸本)9798350318562;9798350318555
The Smart grid (SG) represents the next-generation power system in the future grid infrastructure, designed for self-healing, adaptability, and sustainability. However, the inter-connected and geographically dispersed nature of SG systems introduces cybersecurity risks, potentially leading to severe incidents. Cyber attacks on SG applications could result in significant events, including outages and infrastructure damage. These attacks may compromise energy data, starting with the leakage of personal information from grid members. To address these risks, confidentiality, device authentication, and data integrity are essential, traditionally implemented through publickey cryptography (PKC). The rise of quantum computers and the potential adaptation of algorithms like Shor's poses a threat to PKC algorithms in SG communications. In response, we propose a security protocol for post-quantum communication in SG applications, ensuring resilience against classical and quantum attacks. The protocol has been tested through rigorous informal security analysis, and comparative analysis demonstrates its scalability and effectiveness in real-world scenarios.
暂无评论