the proceedings contain 121 papers. the special focus in this conference is on Multimedia technology and Enhanced Learning. the topics include: Security Awareness Method of Opportunistic Network Routing Protocol Based...
ISBN:
(纸本)9783031505768
the proceedings contain 121 papers. the special focus in this conference is on Multimedia technology and Enhanced Learning. the topics include: Security Awareness Method of Opportunistic Network Routing Protocol Based on Deep Learning and Knowledge Graph;research on Pedestrian Intrusion Detection Method in Coal Mine Based on Deep Learning;personalized Recommendation Method of College Art Education Resources Based on Deep Learning;global Planning Method of Village Public Space Based on Deep Neural Network;a Multi Stage data Attack Traceability Method Based on Convolutional Neural Network for Industrial Internet;machine Learning Based Method for Mining Anomaly Features of Network Multi Source data;data Anti-jamming Method for Ad Hoc Networks Based on Machine Learning Algorithm;a data Fusion Method of Information Teaching Feedback Based on Heuristic Firefly Algorithm;research on Pain Information Management System Based on Deep Learning;research on database Language Query Method Based on Cloud Computing Platform;reliability Evaluation Method of Intelligent Transportation System Based on Deep Learning;forecasting Method of Power Consumption Information for Power Users Based on Cloud Computing;power Consumption Behavior Analysis Method Based on Improved Clustering Algorithm of bigdatatechnology;anomaly Detection of bigdata Based on Improved Fast Density Peak Clustering Algorithm;data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm;Evaluation Method of Enterprise Circular Economy Development Level Based on AHP Fuzzy Inference;research on Performance Evaluation of Industrial Economic Management Based on Improved Machine Learning;application of bigdata Processing technology in Power Consumption Information Acquisition.
the proceedings contain 66 papers. the topics discussed include: detection of benign and malignant thyroid nodules: an reinforcement region selection network framework;research and application of transmission line int...
ISBN:
(纸本)9798350359930
the proceedings contain 66 papers. the topics discussed include: detection of benign and malignant thyroid nodules: an reinforcement region selection network framework;research and application of transmission line intelligent monitoring technology based on UAV inspection;natural scene text detection based on recursive convolutional networks;an ensemble predictive model for vascular cognitive impairment using genetic algorithm;research on pedestrian recognition based on deep learning;multimodal emotion recognition based on hybrid fusion;research on pedestrian tracking detection based on YOLOv5 and improved DeepSORT;enhanced structural information over-sampling with graph neural networks for imbalanced node classification on graphs;and event extraction model based on dependency syntax and label pointer network.
In this paper, the requirements of spacecraft energy consumption and in-orbit accuracy are studied. A time-varying intelligent control system suitable for Halo in orbit is studied by using multi-objective optimization...
详细信息
the proceedings contain 121 papers. the special focus in this conference is on Multimedia technology and Enhanced Learning. the topics include: Security Awareness Method of Opportunistic Network Routing Protocol Based...
ISBN:
(纸本)9783031505737
the proceedings contain 121 papers. the special focus in this conference is on Multimedia technology and Enhanced Learning. the topics include: Security Awareness Method of Opportunistic Network Routing Protocol Based on Deep Learning and Knowledge Graph;research on Pedestrian Intrusion Detection Method in Coal Mine Based on Deep Learning;personalized Recommendation Method of College Art Education Resources Based on Deep Learning;global Planning Method of Village Public Space Based on Deep Neural Network;a Multi Stage data Attack Traceability Method Based on Convolutional Neural Network for Industrial Internet;machine Learning Based Method for Mining Anomaly Features of Network Multi Source data;data Anti-jamming Method for Ad Hoc Networks Based on Machine Learning Algorithm;a data Fusion Method of Information Teaching Feedback Based on Heuristic Firefly Algorithm;research on Pain Information Management System Based on Deep Learning;research on database Language Query Method Based on Cloud Computing Platform;reliability Evaluation Method of Intelligent Transportation System Based on Deep Learning;forecasting Method of Power Consumption Information for Power Users Based on Cloud Computing;power Consumption Behavior Analysis Method Based on Improved Clustering Algorithm of bigdatatechnology;anomaly Detection of bigdata Based on Improved Fast Density Peak Clustering Algorithm;data Privacy Access Control Method Based on Ciphertext Policy Attribute-Based Encryption Algorithm;Evaluation Method of Enterprise Circular Economy Development Level Based on AHP Fuzzy Inference;research on Performance Evaluation of Industrial Economic Management Based on Improved Machine Learning;application of bigdata Processing technology in Power Consumption Information Acquisition.
this paper introduces how equipment can be properly managed by means of device monitoring system base on quality management *** sufficiently control equipment reserve and supply, protect and maintenance, calibration a...
详细信息
the cloud and mobile cloud deployment in large scale distributed systems offer excellent service that enhances both individual and organizational effectiveness. these cloud and blockchain based systems can provide res...
详细信息
In the current active optimisation of the grid fault disposal plan auxiliary decision logic, the logical relationships are more ambiguous, resulting in a low accuracy of the active optimisation results. To this end, a...
详细信息
People are enamoured withthe Cryptocurrencies Bitcoin and Ethereum, which have recently gained enormous popularity. the success of various Cryptocurrencies is due to blockchain. Every sector is aware of and using the...
详细信息
People are enamoured withthe Cryptocurrencies Bitcoin and Ethereum, which have recently gained enormous popularity. the success of various Cryptocurrencies is due to blockchain. Every sector is aware of and using the advantages of blockchain. Because of the daily expansion of the technological revolution, practically everything is now done digitally. As a result, security, the most important factor, is required. Blockchain acts as a super hero by offering a protected conduit for transactions. It is a chain of blocks, as the namewould imply. Digital data is referred to as a block, and the public database is referred to as a chain. It is utilized in supply chains, healthcare, property records, and other areas. the purpose of this paper to expose the implementation of the blockchain in IoT Platforms and provides an in-depth analysis of several categories of consensus protocols implemented in different blockchain systems, as well as the advantages and disadvantages of every algorithm. We additionally present an underlying comparison of several algorithms to help in better comprehend consensus protocol choosing. We elicit the IoT issues being taken into account as well as the specifics of the blockchain-based solutions.
Aiming at the problems of traditional clustering algorithms in the process of large amount of bigdata anomaly monitoring under the background of bigdata, a bigdata anomaly detection method based on improved fast de...
详细信息
Satellites are often used to make scientific observations of space or earth which are different from traditional application satellites. the mission operation and control requirements revolve around different scientif...
详细信息
暂无评论