the proceedings contain 110 papers. the topics discussed include: review of machinelearning models in cyberbullying detection problem;quantum computing in the object-oriented model of quality management;regression an...
ISBN:
(纸本)9798350374865
the proceedings contain 110 papers. the topics discussed include: review of machinelearning models in cyberbullying detection problem;quantum computing in the object-oriented model of quality management;regression and machinelearning methods for predicting human movements based on skeletal data;application of game theory methods to optimize the stakeholder management process;conceptualizing the ICT project management in the sustainability context;human-computer testing of students’ knowledge;fuzzy inference system for test case prioritization in software testing;mobile application of convolutional neural networks for melanoma classification;an investigation of sensing and technologies for supporting the intelligent transport management system in urban area;and a comparative study of supervised machinelearning and deep learning techniques with feature selection methods for classifying Parkinson’s disease based on speech impairments.
this article describes the application of machinelearning methods to control the process of railway flaw detection. It is told about the new capabilities of computer technology, which make it possible to clarify the ...
详细信息
Protein sequence classification is a crucial task in the field of bioinformatics as it helps to reveal various types of properties of proteins. machinelearning and deep learning algorithms have great application valu...
详细信息
Withthe internationalization of the market economy, the application of intelligent translation technology has also developed vigorously on the basis of computer related technology. Rule-based machine Translation meth...
详细信息
the issue of fraud has become increasingly prevalent, with personal information frequently obtained through web addresses resulting in a high incidence of fraud. Traditional machinelearning methods or black and white...
详细信息
With a view to keeping up withthe new development of higher education, university computer teaching should also continue to improve teaching methods and means. After several years of university computer teaching prac...
详细信息
ISBN:
(纸本)9781424435197
With a view to keeping up withthe new development of higher education, university computer teaching should also continue to improve teaching methods and means. After several years of university computer teaching practice, summed up "6-Using" mode. this teaching mode shows that teachers and students in teaching activities are interaction, complementation and mutual assistance. It is also to stimulate learning motivation to develop students' ability to solve practical problems, innovative practices and it is an effective way to improve the effectiveness of the university computer teaching.
Due to the large number of things and information devices, not all IoT applications can be satisfied by processing data in the cloud. Due to the cloud's constrained ability to process and share data, edge computin...
详细信息
the rapid development and deployment of Internet-based applications has created many problems related to web security. Although the number and the variety of the methods that have been developed in order to maintain s...
详细信息
ISBN:
(纸本)9781728139647
the rapid development and deployment of Internet-based applications has created many problems related to web security. Although the number and the variety of the methods that have been developed in order to maintain security of web applications are increasing, every passing day new types of attacking methods that are targeted at these systems emerge. In order to provide a supplement method to rule and signature based security systems for web application security, it becomes more important to detect and classify the malicious web requests using machinelearning techniques. In this work, we used various machinelearning techniques to discover the patterns on web requests, and classified the malicious requests while comparing different techniques.
the proceedings contain 41 papers. the topics discussed include: generating combination of biblical baby names using recurrent neural network (RNN) and optimization comparison;DeepTestDroid a platform for automated ap...
ISBN:
(纸本)9798350300192
the proceedings contain 41 papers. the topics discussed include: generating combination of biblical baby names using recurrent neural network (RNN) and optimization comparison;DeepTestDroid a platform for automated application testing using deep learning;data-to-question generation using deep learning;the online communication station in city of learning: management of city learning for senior citizen;hybrid firefly algorithm with Rao algorithm for optimization problems;a hybrid deep learning neural network for recognizing exercise activity using inertial sensor and motion capture system;and a machinelearning and deep learning integrated model to detect criminal activities.
暂无评论