As a new machinelearning method, deep reinforcement learning has made important progress in various fields of people's production and life since it was proposed. However, there are still many difficulties in func...
详细信息
Withthe continuous development of the Internet era, people's demand for network security is increasingly high, information is an essential component of the network, which implies numerous privacy, secrets, but al...
详细信息
ISBN:
(纸本)9781450387811
Withthe continuous development of the Internet era, people's demand for network security is increasingly high, information is an essential component of the network, which implies numerous privacy, secrets, but also contains a large number of value, thus generating a multiparty trust issues of data security. Blockchain technology itself is still in the early stages of rapid development, the existing blockchain system in the design and implementation of the use of distributed systems, cryptography, game theory, network protocols and many other disciplines, for learningthe principles and practical applications have brought considerable challenges. the blockchain, with its decentralized quality, quickly captures the attention of the public and solves many security problems derived from data security, thus attracting wide attention from people. In recent years, along withthe increasing maturity of homomorphic encryption technology and push new, it is more and more people's favour and *** encryption is an encryption technology that provides the ability to perform various operations on data in an encrypted state without compromising its confidentiality. Its concern is the security of data processing. that is, others can process the encrypted data, but the process does not reveal any of the original content. Also, the user who has the Key decrypts the processed data and gets the result of the processing *** main encryption technique used in blockchain applications is the RSA encryption algorithm, [1] which is used to ensure that the user's private key is not compromised, but no project has been noticed about the homomorphic encryption method for smart contracts. [2] the purpose of this paper is to analyze the principle of homomorphic encryption and discuss its practical application in data security in combination with blockchain technology.
Determining which crop is to be grown; when the soil needs more water and fertilizers; and if the crop is infected by pests are well understood withthe help of IoT sensors and the use of machinelearning models. the ...
ISBN:
(数字)9781728148762
ISBN:
(纸本)9781728148779
Determining which crop is to be grown; when the soil needs more water and fertilizers; and if the crop is infected by pests are well understood withthe help of IoT sensors and the use of machinelearning models. the proposed system aims to collect the current soil conditions to determine the water quantity and fertilizers needed by the soil. the IoT camera sensor module will help to determine if the crop is infected by pests so that the farmer will be able to take suitable actions. Soil conditions and weather conditions will be used to determine the suitable crop and will lead to maximum yield and profit. the system provides alert notifications to the farmer and other relevant information related to the crops and the soil through mobile application. It helps the farmer to take suitable actions in order to minimize the loss and maximize the crop yield.
the proceedings contain 96 papers. the special focus in this conference is on Cognitive Systems and Information Processing. the topics include: How to Understand the Basic Graphic Analysis Method;image Elementary Mani...
ISBN:
(纸本)9789811379826
the proceedings contain 96 papers. the special focus in this conference is on Cognitive Systems and Information Processing. the topics include: How to Understand the Basic Graphic Analysis Method;image Elementary Manifold and Its application in Image Analysis;SAR Image Fast Online ATR Based on Visual Attention and Scale Analysis;image Artistic Style Transfer Based on Color Distribution Preprocessing;depthwise Separable Convolution Feature learning for Ihomogeneous Rock Image Classification;an Efficient Network for Lane Segmentation;optimize Expert Knowledge Acquisition with Attribute Calculation: How to Understand Twin Turing machine;an Unsupervised Joint Model for Claim Detection;how to Understand the Basic Structural Unit;a Novel Remote Sensing Image Classification Method Based on Semi-supervised Fuzzy C-Means;algorithms for Maximum Lifetime of Covering Path;active learning-Based Semi-supervised Spectral Clustering Algorithm;secondary Filtering Update Algorithm for Nonlinear Systems—Based on Extended Kalman Filter;probabilistic Context-Aware Ambients;how to Understand three Types of Cognitive Models;intelligent Measurement and Management of Aircraft Structural Deformation;Design and FPGA Implementation of an High Efficient XGBoost Based Sleep Staging Algorithm Using Single Channel EEG;how to Understand the Mathematical Basis of Two Basic Types of Computational Behavior;improved Direct Chaotic Nonlinear Filters;a Hotel Review Corpus for Argument Mining;vision-Based Joint Attention Detection for Autism Spectrum Disorders;the Formal Understanding Models;application of PSO-LSSVM in Bias Correction of Shipborne Anemometer Measurement;two-Stage Weighted Regularized Extreme learningmachine for Class Imbalanced learning;covering Path with Minimum Movement: Complexity and Algorithms;Intelligence’s Dilemma: AI Algorithms May Cause Anti-Intelligence.
the proceedings contain 145 papers. the topics discussed include: face recognition based on two-stage CNN combined with transfer learning;traffic lights detection and recognition algorithm based on multi-feature fusio...
ISBN:
(纸本)9781728123257
the proceedings contain 145 papers. the topics discussed include: face recognition based on two-stage CNN combined with transfer learning;traffic lights detection and recognition algorithm based on multi-feature fusion;application of SSR for bridge deflection measurement by using of digital image correlation;intelligent work order recognition system based on end-to-end deep neural network;HMApriori - an improved association analysis algorithm and its application research;research on requirement prediction of equipment maintenance supporting resources based on data mining;video text processing method based on image stitching;research on false alarm removal method for aircraft target detection under small sample conditions;and multi-feature fusion for ultrasound breast image classification of benign and malignant.
the proceedings contain 46 papers. the special focus in this conference is on machinelearning, Optimization, and Data Science. the topics include: Adaptive dimensionality reduction in multiobjective optimization with...
ISBN:
(纸本)9783030137083
the proceedings contain 46 papers. the special focus in this conference is on machinelearning, Optimization, and Data Science. the topics include: Adaptive dimensionality reduction in multiobjective optimization with multiextremal criteria;REFINE: Representation learning from diffusion events;augmented design-space exploration by nonlinear dimensionality reduction methods;classification and survival prediction in diffuse large B-cell lymphoma by gene expression profiling;learning consistent tree-augmented dynamic bayesian networks;designing ships using constrained multi-objective efficient global optimization;a new approach to measuring distances in dense graphs;ant colony optimization for markov blanket-based feature selection. application for precision medicine;Average performance analysis of the stochastic gradient method for online PCA;simple learning with a teacher via biased regularized least squares;Improving traditional dual ascent algorithm for the uncapacitated multiple allocation hub location problem: A RAMP approach;supervised learning approach for surface-mount device production;crawling in Rogue’s dungeons with (partitioned) A3C;decision of neural networks hyperparameters with a population-based algorithm;strong duality of the kantorovich-rubinstein mass transshipment problem in metric spaces;evolutionary construction of convolutional neural networks;improving clinical subjects clustering by learning and optimizing feature weights;a framework to automatically extract funding information from text;Speeding up budgeted stochastic gradient descent SVM training with precomputed golden section search;an unsupervised learning classifier with competitive error performance;feature based multivariate data imputation;A GRASP/VND heuristic for the max cut-clique problem;a modelica-based simulation method for black-box optimal control problems with level-set dynamic programming;a clonal selection algorithm for multiobjective energy reduction multi-depot vehicle r
the proceedings contain 222 papers. the topics discussed include: research on enterprise risk identification and early warning system based on big data background;modeling and optimization of heterogeneous vehicle rou...
the proceedings contain 222 papers. the topics discussed include: research on enterprise risk identification and early warning system based on big data background;modeling and optimization of heterogeneous vehicle routing problem in emergency resource distribution after disaster;empirical study of the impact of QFII shareholdings on board governance and corporate performances - based on Chinese listed companies data;multi-person pose estimation via learning feature integration;fuzzy twin support vector machine based on intra-class hyperplane;the research on the simulation of VHF radio broadcasting loss;and saliency object detection based on regions merging and its application in image retrieval.
the proceedings contain 222 papers. the topics discussed include: research on enterprise risk identification and early warning system based on big data background;modeling and optimization of heterogeneous vehicle rou...
the proceedings contain 222 papers. the topics discussed include: research on enterprise risk identification and early warning system based on big data background;modeling and optimization of heterogeneous vehicle routing problem in emergency resource distribution after disaster;empirical study of the impact of QFII shareholdings on board governance and corporate performances - based on Chinese listed companies data;multi-person pose estimation via learning feature integration;fuzzy twin support vector machine based on intra-class hyperplane;the research on the simulation of VHF radio broadcasting loss;and saliency object detection based on regions merging and its application in image retrieval.
the proceedings contain 21 papers. the special focus in this conference is on Conceptual Modeling Meets Artificial Intelligence and Data-Driven Decision Making. the topics include: Mapping the Web Ontology Language to...
ISBN:
(纸本)9783030658465
the proceedings contain 21 papers. the special focus in this conference is on Conceptual Modeling Meets Artificial Intelligence and Data-Driven Decision Making. the topics include: Mapping the Web Ontology Language to the OpenAPI Specification;Evaluating FAIRness of Genomic Databases;Reusable FAIR Implementation Profiles as Accelerators of FAIR Convergence;Deimos: A Model-Based NoSQL Data Generation Language;Managing Physical Schemas in MongoDB Stores;JSON Schema Inference Approaches;Empirical Evaluation of a New DEMO Modelling Tool that Facilitates Model Transformations;acquiring and Sharing the Monopoly of Legitimate Naming in Organizations, an application in Conceptual Modeling;replicability and Reproducibility of a Schema Evolution Study in Embedded Databases;towards Automated Support for Conceptual Model Diagnosis and Repair;Challenges in Checking JSON Schema Containment over Evolving Real-World Schemas;experimental Practices for Measuring the Intuitive Comprehensibility of Modeling Constructs: An Example Design;Superimposition: Augmenting machinelearning Outputs with Conceptual Models for Explainable AI;Evaluating Tree Explanation Methods for Anomaly Reasoning: A Case Study of SHAP TreeExplainer and TreeInterpreter;the Importance of the Temporal Dimension in Identifying Relevant Genomic Variants: A Case Study;towards the Generation of a Species-Independent Conceptual Schema of the Genome;Conceptual Human Emotion Modeling (HEM);towards an Ontology for Tertiary Bioinformatics Research Process;Using BioPAX-Parser (BiP) to Annotate Lists of Biological Entities with Pathway Data.
the blind-assistive devices promote the detection of objects and alerting the user by a buzzer or an alarm. In this project, a camera is placed inside a cap which is used by the visually impaired person. the machine-l...
详细信息
ISBN:
(数字)9789811501999
ISBN:
(纸本)9789811501999;9789811501982
the blind-assistive devices promote the detection of objects and alerting the user by a buzzer or an alarm. In this project, a camera is placed inside a cap which is used by the visually impaired person. the machine-learning algorithm is used for accurate detection of the object and provides an alarm. the ultrasonic sensor is used to measure the distance between the visually impaired person and the real-time object detected when the object is detected the alarm is actuated. Nowadays, the assistive devices include the involvement of both hardware and software section to assist the blind user. the proposed method for the visually impaired person aims to detect the object more accurately so that the visually impaired person can navigate to their full potential in real-time application.
暂无评论