An increased prevalence of fraudulent techniques has revealed the limitations in performance and detection speed of existing Spoofed Speech Detection(SSD) algorithms. To address these challenges, a more stable and rap...
详细信息
With the growing trend of cloud computing, the necessity for secure data storage arises as traditional security measures fail with different types of new emerging cyber threats. The paper introduces a file storage sys...
详细信息
The distributed hybrid flow shop scheduling problems (DHFSP) widely exist in various industrial production processes, and thus have received widespread attention. However, studies on HFSP considering green objective i...
详细信息
The rapid proliferation of IoT devices has created an unprecedented need for real-time data processing and decision-making. This paper proposes an Edge Intelligence Hybrid Framework designed for real-time IoT applicat...
详细信息
The proceedings contain 86 papers. The topics discussed include: predicting academic procrastination among university students using autoencoder model;design of metaverse-supported blockchain test process;implementati...
ISBN:
(纸本)9791188428137
The proceedings contain 86 papers. The topics discussed include: predicting academic procrastination among university students using autoencoder model;design of metaverse-supported blockchain test process;implementation of IoT-based control system for maintenance operation of long-distance air pollution prevention device RTO;radar pulse repetition interval estimation based on blind source separation;communication countermeasure strategy decision-making based on incomplete information game;anti-jamming weighted clustering algorithm for UAV-mounted weapon self-organizing network;load balancing in cloud computing based on ant colony optimization and crow search algorithm;demand forecasting in transportation: a graph attention networks for predicting bus ridership;and foundation models: from current developments, challenges, and risks to future opportunities.
We consider the problem of identifying defective items in a population with non-adaptive quantitative group testing. For this scenario, Mashauri et al. recently proposed a low-density parity-check (LDPC) code-based qu...
详细信息
With the advent of the big data era, the traditional von Neumann architecture, which has separate processing units and storage units, brings huge delay and energy consumption, and suffers from high data transmission c...
详细信息
With the deepening reform and construction of the police system, it is imperative to fully utilize technologies such as artificial intelligence, big data, blockchain, cloud computing, and the Internet of Things to rap...
详细信息
The advancement of Digital Twin (DT) technology has enabled the creation of digital replicas of physical entitics, significantly enhancing the functionality and performance of mobile networks. However, this innovative...
详细信息
As the carrier of information assets, the importance of accounting information systems is increasing with the development of informatization. Meanwhile, information systems are facing more security threats. How to eff...
详细信息
暂无评论