The proceedings contain 301 papers. The topics discussed include: a general object oriented description for DNA computing technique;3D modeling methods of aerodynamic shape for large-scale wind turbine blades;model an...
ISBN:
(纸本)9780769536880
The proceedings contain 301 papers. The topics discussed include: a general object oriented description for DNA computing technique;3D modeling methods of aerodynamic shape for large-scale wind turbine blades;model and solution for steelmaking-continuous casting scheduling problem based on constraint programming method;research on anti-printing & scanning watermark algorithm based on spread spectrum coding;information share and propagation issues in ad hoc network along with its simulation evaluations;image encoding and decoding scheme based on digital image inpainting technology;research on derivate construction of supply chain based on China 3C e-commerce;design and implementation of a NE2000 compatible Ethernet interface for embedded system;research on kernel-based feature fusion algorithm in multimodal recognition;and design and application of virtual ancient culture exhibition.
The proceedings contain 301 papers. The topics discussed include: a general object oriented description for DNA computing technique;3D modeling methods of aerodynamic shape for large-scale wind turbine blades;model an...
ISBN:
(纸本)9780769536880
The proceedings contain 301 papers. The topics discussed include: a general object oriented description for DNA computing technique;3D modeling methods of aerodynamic shape for large-scale wind turbine blades;model and solution for steelmaking-continuous casting scheduling problem based on constraint programming method;research on anti-printing & scanning watermark algorithm based on spread spectrum coding;information share and propagation issues in ad hoc network along with its simulation evaluations;image encoding and decoding scheme based on digital image inpainting technology;research on derivate construction of supply chain based on China 3C e-commerce;design and implementation of a NE2000 compatible Ethernet interface for embedded system;research on kernel-based feature fusion algorithm in multimodal recognition;and design and application of virtual ancient culture exhibition.
The proceedings contain 141 papers. The topics discussed include: research of similarity measurements in the clustering analysis;a novel protein secondary structure prediction system based on compound pyramid model;a ...
ISBN:
(纸本)9780769540740
The proceedings contain 141 papers. The topics discussed include: research of similarity measurements in the clustering analysis;a novel protein secondary structure prediction system based on compound pyramid model;a median filter method for image noise variance estimation;a security routing algorithm of P2P network based on asymmetric nested encryption;pairwise key management scheme using sub key pool for wireless sensor networks;adaptive correction of errors from segmented digital ink texts in Chinese based on context;summarizing similar questions for Chinese community question answering portals;web content extraction based on webpage layout analysis;an optimized multi-class classification algorithm based on SVM decision tree;Chinese sign language animation system on mobile devices;energy-balanced scheme based unequal density of backbone for wireless sensor networks under coal mine;higher order spectra analysis of EEG signals in emotional stress states;and an automatic carving method for RAR file based on content and structure.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second internationalconference on computerscience and informationtechnology, CCSIT 2012, held in Bangalore, India, in January 2012...
ISBN:
(数字)9783642273179
ISBN:
(纸本)3642273165
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second internationalconference on computerscience and informationtechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson advances in computerscience and informationtechnology; and ad hoc andubiquitous computing.
The proceedings contain 28 papers. The special focus in this conference is on Image Processing, computer Vision, and Pattern Recognition. The topics include: Image-Based Seal Recognition: Approaches and Challenge...
ISBN:
(纸本)9783031859328
The proceedings contain 28 papers. The special focus in this conference is on Image Processing, computer Vision, and Pattern Recognition. The topics include: Image-Based Seal Recognition: Approaches and Challenges in Current Automated Systems;Deep Learning Techniques for Lunar Impact Crater Identification Based on CCD and DEM Data;silicon Wafer Map Defect Classification Using Artificial Intelligence Models;low Light Image Enhancement Using Autoencoder-Based Deep Neural Networks;towards Elephants Intelligent Monitoring in Zakouma National Park, Chad;a Review of Multi-modal and Multi-view Applications in Hand-Drawn Sketch Images;residential Real Estate Image Classification for Property Valuation;Novel Method to Investigate Decay in Rotting Bananas Using RGB Color Images;lalitha: A Hand Gesture-Based computer Control System;dishari: A Novel Gesture-Based Educational Application for Specially Challenged People;mobility Anomaly Detection with Intelligent Video Surveillance;Weakly-Supervised Video Anomaly Detection Using Modified Anomaly Score Module and Modified BERT;Contour Detection of Seeds Based on Traditional and Convolutional Neural Network (CNN) Based Algorithms;Early Detection of Lameness in Dairy Cattle Using Activity Data, Image Analysis, AI and ML - An Approach for Improved Animal Welfare and Economic Impact;implications for Designing Hawks Detection with Data Augmentation and Network Optimizations;a Review of Detecting and Quantification of Cracks Using Convolutional Neural Networks and Image Processing Techniques;using Linkage Context for Automated Correction in Unsupervised Entity Resolution;the Rising Threat Against Modern technology in Cybersecurity;an Online Bookstore Design and Implementation;cybersecurity: Sight and Foresight;the Application of Blockchain technology in the Transmission of Semiconductor Process Recipes;the Use of Social Media and the Internet for the Facilitation of Human Trafficking.
The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational sciences and informationtechnology to disseminate t...
ISBN:
(数字)9788132217589;9788132217596
ISBN:
(纸本)9788132217589;9788132217596
The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational sciences and informationtechnology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computerscience, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.
The proceedings contain 73 papers. The topics discussed include: hybrid chaos synchronization of Liu and Lü systems by active nonlinear control;methods for preventing search engine-based web server attacks;sea ob...
ISBN:
(纸本)9783642240423
The proceedings contain 73 papers. The topics discussed include: hybrid chaos synchronization of Liu and Lü systems by active nonlinear control;methods for preventing search engine-based web server attacks;sea object detection using shape and hybrid color texture classification;multi-layer logon verification system: a case study of indian banks;image compression using two dimensional spherical coder in wavelet lifting;an efficient visible watermarking for copyright protection using discrete wavelet transform;evolving test patterns for use case maps;a novel approach for compression of encrypted grayscale images using huffman coding;global chaos synchronization of hyperchaotic pang and wang systems by active nonlinear control;and mining web path traversals based on generation of FP tree with utility.
This volume constitutes the selected papers of the 2009 internationalconference on Control and Automation (CA 2009) as a partner of internationalconference on Future Generation informationtechnology (FGIT 2009).
ISBN:
(纸本)9783642107429;3642107427
This volume constitutes the selected papers of the 2009 internationalconference on Control and Automation (CA 2009) as a partner of internationalconference on Future Generation informationtechnology (FGIT 2009).
暂无评论