the proceedings contain 35 papers. the special focus in this conference is on Computational Intelligence in Security for Information Systems. the topics include: Deep Wavelet Extreme Learning Machine for Data Classifi...
ISBN:
(纸本)9783030200046
the proceedings contain 35 papers. the special focus in this conference is on Computational Intelligence in Security for Information Systems. the topics include: Deep Wavelet Extreme Learning Machine for Data Classification;palm Vein Age and Gender Estimation Using Center Symmetric-Local Binary pattern;neuro-Evolutionary Feature Selection to Detect Android Malware;improving Blockchain Security Validation and Transaction Processing through Heterogeneous computing;anomaly Detection on Patients Undergoing General Anesthesia;an Internet Voting Proposal Towards Improving Usability and Coercion Resistance;linearization of Cryptographic Sequences;On-the-Fly Testing an Implementation of Arrow Lightweight PRNG Using a LabVIEW Framework;a Novel Construction for Streaming Networks with Delays;comparison of System Call Representations for Intrusion Detection;hyot: Leveraging Hyperledger for Constructing an Event-Based Traceability System in IoT;data Mining for Statistical Evaluation of Summative and Competency-Based Assessments in Mathematics;looking for the Antidote for Contaminated Water: Learning through an Escape Game;enhancing Collaborative Learning through Pedagogical Alignment;rules_Math: Establishing Assessment Standards;evaluate Mathematical Competencies in Engineering Using Video-Lessons;statistical Methods – What Is the Problem Here?;enhancing the Learning of Cryptography through Concept Maps;analysis of Student Achievement Scores: A Machine Learning Approach;analysis of Teacher Training in Mathematics in Paraguay’s Elementary Education System Using Machine Learning Techniques;Efficient Verification of Security Protocols Time Properties Using SMT Solvers;cooperative Evaluation Using Moodle;automatic Categorization of Introductory Programming Students;using Scratch to Improve Undergraduate Students’ Skills on Artificial Intelligence;project-Based Methodology to Lecture on Web Frameworks Applied to the Management of Health-Related Data;mirkwood: An Online Parallel Craw
Writing is an important aspect of literacy and an important learning foundation in addition to reading for children. the main challenge is to handle the unique characteristics and writing styles that are not yet fully...
详细信息
Regularization looks for an interpolating function which is close to the data and also "smooth". this function is obtained by minimizing an error functional which is the weighted sum of a "fidelity term...
详细信息
Regularization looks for an interpolating function which is close to the data and also "smooth". this function is obtained by minimizing an error functional which is the weighted sum of a "fidelity term" and a "smoothness term". However, using only one set of weights does not guarantee that this function will be the MAP estimate. One has to consider all possible weights in order to find the MAP function. Also, using only one combination of weights makes the algorithm very sensitive to the data. the solution suggested here is through the Bayesian approach: a probability distribution over all weights is constructed and all weights are considered when reconstructing the function or computingthe expectation of a linear functional on the function space.
the proceedings contain 12 papers. the topics discussed include: circular polarized multi band dual sense square slot antenna fed by coplanar waveguide;spectral features based speech emotion recognition using artifici...
ISBN:
(纸本)9781839539107
the proceedings contain 12 papers. the topics discussed include: circular polarized multi band dual sense square slot antenna fed by coplanar waveguide;spectral features based speech emotion recognition using artificial neural network;design and analysis of infrastructure to vehicle visible light communication channel modeling;asymmetric CPW - FED ground plane with circularly polarized printed monopole antenna with SRR;Classifying Internet of things (IoT) devices and non-IoT devices in data center edge network using statistical and network flow features by one dimensional convolutional neural network;on-chain off-chain blockchain model for IoT using IPFS;an efficient hybrid MPI-OpenMP based parallel approach for longest common subsequence;and design of false data injection attacks and their detection and mitigation in cyber-physical systems.
In this paper we have presented new algorithms to handle the pattern matching problem where the pattern can contain variable length gaps. Given a pattern P with variable length gaps and a text T our algorithm works in...
详细信息
ISBN:
(纸本)3540369252
In this paper we have presented new algorithms to handle the pattern matching problem where the pattern can contain variable length gaps. Given a pattern P with variable length gaps and a text T our algorithm works in O(n+m+alpha log(max(1 <=i <=l)(b(i)-ai))) time where n is the length of the text, m is the summation of the lengths of the component subpatterns, alpha is the total number of occurrences of the component subpatterns in the text and a(i) and b(i) are, respectively, the minimum and maximum number of don't cares allowed between the ith and (i+1)st component of the pattern. We also present another algorithm which, given a suffix array of the text, can report whether P occurs in T in O(m+alpha log log n) time. Boththe algorithms record information to report all the occurrences of Pin T. Furthermore, the techniques used in our algorithms are shown to be useful in many other contexts.
the paper is devoted to studying the issues of pre-training of deep neural network models. A generalized approach for pre-training deep models is proposed, which allows achieving better performance in final accuracy a...
详细信息
this paper discusses the recognition of textual entailment in a text-hypothesis pair by applying a wide variety of lexical measures. We consider that the entailment phenomenon can be tackled from three general levels:...
详细信息
In this paper, we identify the computational requirements for structural pattern analysis, particularly for the operations of spatial grouping and matching. We describe two such algorithms that are in wide use here at...
详细信息
In this paper, we identify the computational requirements for structural pattern analysis, particularly for the operations of spatial grouping and matching. We describe two such algorithms that are in wide use here at USC and discuss approaches to reducing their execution times via parallel implementation. We provide brief descriptions and results of two research projects geared generally, toward the parallel implementation of computer vision systems and specifically, towards these algorithms.
the two-volume set LNCS 5761 and LNCS 5762 constitute the refereed proceedings of the 12thinternationalconference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2009, held in London, UK, in Se...
详细信息
ISBN:
(数字)9783642042683
ISBN:
(纸本)9783642042676
the two-volume set LNCS 5761 and LNCS 5762 constitute the refereed proceedings of the 12thinternationalconference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2009, held in London, UK, in September 2009. Based on rigorous peer reviews, the program committee carefully selected 259 revised papers from 804 submissions for presentation in two volumes. the first volume includes 125 papers divided in topical sections on cardiovascular image guided intervention and robotics; surgical navigation and tissue interaction; intra-operative imaging and endoscopic navigation; motion modelling and image formation; image registration; modelling and segmentation; image segmentation and classification; segmentation and atlas based techniques; neuroimage analysis; surgical navigation and robotics; image registration; and neuroimage analysis: structure and function.
the paper presents a Markov model of the basic scheme of interaction between project participants. A Markov chain has been identified to describe a specific project, based on the determination of a set of transition p...
详细信息
暂无评论