the proceedings contain 50 papers. the special focus in this conference is on Data Science, machinelearning and Blockchain Technology. the topics include: An unsupervised approach to creating a restaurant recommendat...
ISBN:
(纸本)9781032426853
the proceedings contain 50 papers. the special focus in this conference is on Data Science, machinelearning and Blockchain Technology. the topics include: An unsupervised approach to creating a restaurant recommendation system;Classification of alzheimer’s disease using D-DEMNET framework;comparison of machinelearning and deep learning methods for detection of liver abnormality;soil micronutrient detection using machinelearning;a review of tracking concept drift detection in machinelearning;wearable electrogastrogram perspective for healthcare applications;computer vision based home automation;Early autism detection using ML on behavioural pattern;implementation of application prototypes for human-to-computer interactions;recommendation system for anime using machinelearning algorithms;predicting bitcoin price fluctuation by Twitter sentiment analysis;microarchitecture design and verification of co-processor for floating point operation;blockchain based higher education ecosystem;document verification using blockchain;blockchain-based traceability system for readymade food products;a cloud based interactive framework for emergency medical data sharing;the analysis and interpretation of higher education teachers based on student and teachers feedback;Implementing AI on microcontrollers in fog and edge architectures;abnormality detection in chest radiograph using deep learning models;a comprehensive review on hate speech recognition utilizing natural language processing and machinelearning;prevalence of migraine among collegiate students in greater Noida;Indoor navigation using BLE beacons;strategic health planner and exercise suggester;perspective of deep learning strategies for analysis of 1D biomedical signals;revolution in agriculture sector using blockchain technology;customer churn prediction using ensemble learning with neural networks;Securing crime case summary and E-FIR using blockchain concept.
machinelearning techniques have had a long list of applications in recent years. However, the use of machinelearning in information and network security is not new. machinelearning and cryptography have many things...
详细信息
ISBN:
(纸本)9781450366182
machinelearning techniques have had a long list of applications in recent years. However, the use of machinelearning in information and network security is not new. machinelearning and cryptography have many things in common. the most apparent is the processing of large amounts of data and large search spaces. In its varying techniques, machinelearning has been an interesting field of study with massive potential for application. In the past three decades, machinelearning techniques, whether supervised or unsupervised, have been applied in cryptographic algorithms, cryptanalysis, steganography, among other data-security-related applications. this paper presents an updated survey of applications of machinelearning techniques in cryptography and cryptanalysis. the paper summarizes the research done in these areas and provides suggestions for future directions in research.
the course of structure mechanics' design and execution is introduced in the article. And the particularity of professional course multimedia courseware is also expatiated. then, the importance of multimedia teach...
详细信息
ISBN:
(纸本)9781424435197
the course of structure mechanics' design and execution is introduced in the article. And the particularity of professional course multimedia courseware is also expatiated. then, the importance of multimedia teaching applied to professional courses in colleges is explained by a "3-step" teaching example. It is shown that the CAI courseware is applicable to bring up the active learning custom and innovation consciousness of applied talents in civil engineering.
In recent years, deep learning has gained widespread attention and importance due to its outstanding performance in image feature learning. the rapid development of machinelearning and deep learning has provided a po...
详细信息
this article discusses the problems of processing large amounts of information in databases to more efficiently execute user queries. the methods of distributed machinelearning were described in this research, which ...
详细信息
Network security is a major concern of the modern era. Withthe rapid development and massive usage of computer networks over the past decade, the vulnerabilities of network systems continue to be of significant conce...
详细信息
ISBN:
(纸本)9781665479783
Network security is a major concern of the modern era. Withthe rapid development and massive usage of computer networks over the past decade, the vulnerabilities of network systems continue to be of significant concern. Intrusion detection systems are used to monitor networks and identify unauthorized access or malicious traffic over secured networks. the application of machinelearning algorithms to the intrusion detection domain could enhance such systems. this paper presents a comparative analysis of selected machinelearning algorithms for network intrusion detection. the CICIDS 2017 dataset provided the necessary dataset for training the models. Results show that of all six considered, Decision Tree classifier was the overall best.
Purpose of review: machinelearning, a hot area of research today, has been attempted to be applied in various fields of clinical medicine. this paper reviews the current status of research on machinelearning in the ...
详细信息
ISBN:
(纸本)9798400708138
Purpose of review: machinelearning, a hot area of research today, has been attempted to be applied in various fields of clinical medicine. this paper reviews the current status of research on machinelearning in the filed of bipolar disorder, including applications in the diagnosis, identification and the accurate treatment of bipolar disorder, and the prediction of suicidal behaviors in bipolar disorder. It also discusses the advantages and shortcomings and prospects of the applications of machinelearning in bipolar disorder, in order to provide references for related researches and clinical treatment. Research methods: the literature on the application of machinelearning in the field of bipolar disorder in recent years was searched through literature navigation. the aspects of prevention, diagnosis and treatment interventions in bipolar disorder were analyzed. Research conclusion: In recent years, researches on the clinical diagnosis and treatment of bipolar disorder by machinelearning have been increasing. However, there are still some limitations and it still needs to be cautious in clinical application. As mental health practitioners, we should actively adapt to and promote the further development of machinelearning in the field of bipolar disorder.
In this paper we present the application of machinelearning techniques to the improvement of the congestion control of TCP in wired/wireless networks. TCP is suboptimal in hybrid wired/wireless networks because it re...
详细信息
ISBN:
(纸本)0769521428
In this paper we present the application of machinelearning techniques to the improvement of the congestion control of TCP in wired/wireless networks. TCP is suboptimal in hybrid wired/wireless networks because it reacts in the same way to losses due to congestion and losses due to link errors. We thus propose to use machinelearning techniques to build automatically a loss classifier from a database obtained by simulations of random network topologies. Several machinelearning algorithms are compared for this task and the best method for this application turns out to be decision tree boosting. It outperforms ad hoc classifiers proposed in the networking literature.
this article describes the application of machinelearning methods to control the process of railway flaw detection. It is told about the new capabilities of computer technology, which make it possible to clarify the ...
详细信息
Avionics equipment is composed of multiple layers and complex structure, so it is difficult to research progress based on fault mechanism, and the amount of effective fault data of the model is insufficient, and it is...
详细信息
暂无评论