the proceedings contain 89 papers. the special focus in this conference is on Neural computing for Advanced Applications. the topics include: Online Car-Hailing Order Matching Method Based on Demand Clustering an...
ISBN:
(纸本)9789819770038
the proceedings contain 89 papers. the special focus in this conference is on Neural computing for Advanced Applications. the topics include: Online Car-Hailing Order Matching Method Based on Demand Clustering and Reinforcement Learning;Multi-objective Optimization of Antenna Based on Improved WOA-BP Neural Network;A Multi-mechanism Collaborative Seagull Optimization Algorithm for Optimizing BP Neural Network Classification Model;an Analysis on Balance Model of Exploration and Exploitation Under Decoupled-Learning Pattern for Large-Scale Particle Swarm Optimizers;marine Ship Detection Under Fog Conditions Based on an Improved Deep-Learning Approach;skeleton-Based Point Cloud Sampling and Its Facilitation to Classification;multi-agent Reinforcement Learning for Taxi-Fleet Cruising Strategy in Ride-Hailing Services;a New Indoor Occupancy Detection Model by Integrating the Efficient Multi-scale Attention Mechanism into the EfficientDet Model;a Novel Automatic Generation Method for Neural Network by Using Iterative Function System;a Predictive Maintenance Platform for a Conveyor Motor Sensor System Using Recurrent Neural Networks;A Deep Learning-Based Method Facilitates scRNA-seq Cell Type Identification;adaptive Hierarchical Clustering Based Student Group Exercise Recommendation via Multi-objective Evolutionary Method;Quantile Regression and GCN Ensembled Hybrid Interval Forecasting Model for Wind Power Generation;efficient Path Planning for Large-Scale Vehicular Networks via Multi-agent Mean Field Reinforcement Learning;a Fast and Accurate Reconstruction Method for Boiler Temperature Field Based on Inverse Distance Weight and Long Short-Term Memory;RoBERTa-wwm-CBA: A Mental Disease Identification Model Based on RoBERTa-wwm and Hybrid Neural Networks;3D Pose Estimation of Markerless Fish on Deep Learning;safety Helmet-Wearing Detection Method Fusing Pose Estimation;Clothes Image Retrieval via Learnable FashionCLIP;mannequin2Real+: A Two-Stage Framework for Generating P
the proceedings contain 89 papers. the special focus in this conference is on Neural computing for Advanced Applications. the topics include: Online Car-Hailing Order Matching Method Based on Demand Clustering an...
ISBN:
(纸本)9789819770069
the proceedings contain 89 papers. the special focus in this conference is on Neural computing for Advanced Applications. the topics include: Online Car-Hailing Order Matching Method Based on Demand Clustering and Reinforcement Learning;Multi-objective Optimization of Antenna Based on Improved WOA-BP Neural Network;A Multi-mechanism Collaborative Seagull Optimization Algorithm for Optimizing BP Neural Network Classification Model;an Analysis on Balance Model of Exploration and Exploitation Under Decoupled-Learning Pattern for Large-Scale Particle Swarm Optimizers;marine Ship Detection Under Fog Conditions Based on an Improved Deep-Learning Approach;skeleton-Based Point Cloud Sampling and Its Facilitation to Classification;multi-agent Reinforcement Learning for Taxi-Fleet Cruising Strategy in Ride-Hailing Services;a New Indoor Occupancy Detection Model by Integrating the Efficient Multi-scale Attention Mechanism into the EfficientDet Model;a Novel Automatic Generation Method for Neural Network by Using Iterative Function System;a Predictive Maintenance Platform for a Conveyor Motor Sensor System Using Recurrent Neural Networks;A Deep Learning-Based Method Facilitates scRNA-seq Cell Type Identification;adaptive Hierarchical Clustering Based Student Group Exercise Recommendation via Multi-objective Evolutionary Method;Quantile Regression and GCN Ensembled Hybrid Interval Forecasting Model for Wind Power Generation;efficient Path Planning for Large-Scale Vehicular Networks via Multi-agent Mean Field Reinforcement Learning;a Fast and Accurate Reconstruction Method for Boiler Temperature Field Based on Inverse Distance Weight and Long Short-Term Memory;RoBERTa-wwm-CBA: A Mental Disease Identification Model Based on RoBERTa-wwm and Hybrid Neural Networks;3D Pose Estimation of Markerless Fish on Deep Learning;safety Helmet-Wearing Detection Method Fusing Pose Estimation;Clothes Image Retrieval via Learnable FashionCLIP;mannequin2Real+: A Two-Stage Framework for Generating P
the proceedings contain 89 papers. the special focus in this conference is on Neural computing for Advanced Applications. the topics include: Online Car-Hailing Order Matching Method Based on Demand Clustering an...
ISBN:
(纸本)9789819770007
the proceedings contain 89 papers. the special focus in this conference is on Neural computing for Advanced Applications. the topics include: Online Car-Hailing Order Matching Method Based on Demand Clustering and Reinforcement Learning;Multi-objective Optimization of Antenna Based on Improved WOA-BP Neural Network;A Multi-mechanism Collaborative Seagull Optimization Algorithm for Optimizing BP Neural Network Classification Model;an Analysis on Balance Model of Exploration and Exploitation Under Decoupled-Learning Pattern for Large-Scale Particle Swarm Optimizers;marine Ship Detection Under Fog Conditions Based on an Improved Deep-Learning Approach;skeleton-Based Point Cloud Sampling and Its Facilitation to Classification;multi-agent Reinforcement Learning for Taxi-Fleet Cruising Strategy in Ride-Hailing Services;a New Indoor Occupancy Detection Model by Integrating the Efficient Multi-scale Attention Mechanism into the EfficientDet Model;a Novel Automatic Generation Method for Neural Network by Using Iterative Function System;a Predictive Maintenance Platform for a Conveyor Motor Sensor System Using Recurrent Neural Networks;A Deep Learning-Based Method Facilitates scRNA-seq Cell Type Identification;adaptive Hierarchical Clustering Based Student Group Exercise Recommendation via Multi-objective Evolutionary Method;Quantile Regression and GCN Ensembled Hybrid Interval Forecasting Model for Wind Power Generation;efficient Path Planning for Large-Scale Vehicular Networks via Multi-agent Mean Field Reinforcement Learning;a Fast and Accurate Reconstruction Method for Boiler Temperature Field Based on Inverse Distance Weight and Long Short-Term Memory;RoBERTa-wwm-CBA: A Mental Disease Identification Model Based on RoBERTa-wwm and Hybrid Neural Networks;3D Pose Estimation of Markerless Fish on Deep Learning;safety Helmet-Wearing Detection Method Fusing Pose Estimation;Clothes Image Retrieval via Learnable FashionCLIP;mannequin2Real+: A Two-Stage Framework for Generating P
the proceedings contain 24 papers. the special focus in this conference is on Applications and Techniques in Information Security. the topics include: Optical Neural Networks – A Strategy for Secure Quantum computing...
ISBN:
(纸本)9789819797424
the proceedings contain 24 papers. the special focus in this conference is on Applications and Techniques in Information Security. the topics include: Optical Neural Networks – A Strategy for Secure Quantum computing;guarding Against Quantum threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations;cryptographic Distinguishers through Deep Learning for Lightweight Block Ciphers;detection and Mitigation of Email Phishing;securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques;Design of Image Encryption Technique Using MSE Approach;Low Latency Binary Edward Curve Crypto Processor for FPGA Platforms;Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions;machine Learning Approach for Malware Detection Using Malware Memory Analysis Data;DDOS Attack Detection in Virtual Machine Using Machine Learning algorithms;an Unsupervised Method for Intrusion Detection Using Novel Percentage Split Clustering;HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control systems Using MLPNN and Attention Mechanisms;silent threats: Monitoring Insider Risks in Healthcare Sector;Enhanced Deep Learning for IIoT threat Intelligence: Revealing Advanced Persistent threat Attack Patterns;Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities;Enhancing FGSM Attacks with Genetic algorithms for Robust Adversarial Examples in Remote Sensing Image Classification systems;GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks;IOT Based Locker Access System with MFA & Remote Authentication;a Secure Authentication Scheme between Edge Devices Using Hypergraph Hashing Technique in Iot Environment;enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System.
the proceedings contain 12 papers. the topics discussed include: performance evaluation of distributed networks for Internet of things;connectivity pattern analysis for virtual simulation design, based on high-perform...
the proceedings contain 12 papers. the topics discussed include: performance evaluation of distributed networks for Internet of things;connectivity pattern analysis for virtual simulation design, based on high-performance game analysis;computational study for improvement of aerodynamic performance of airfoil by changing various aerodynamic properties;an experimental design approach to IoT enabled smart parallel irrigation system using embedded microcontrollers;to develop, test and record a 3 lead EMG electrode and flex sensor on a 3D prosthetic limb with different gait patterns using Arduino microcontroller;and low-cost system for the management of hospital services, applied to hospitalized patients through the use of IoT technology.
the proceedings contain 28 papers. the special focus in this conference is on Image Processing, Computer Vision, and Pattern Recognition. the topics include: Image-Based Seal Recognition: Approaches and Challenge...
ISBN:
(纸本)9783031859328
the proceedings contain 28 papers. the special focus in this conference is on Image Processing, Computer Vision, and Pattern Recognition. the topics include: Image-Based Seal Recognition: Approaches and Challenges in Current Automated systems;Deep Learning Techniques for Lunar Impact Crater Identification Based on CCD and DEM Data;silicon Wafer Map Defect Classification Using Artificial Intelligence Models;low Light Image Enhancement Using Autoencoder-Based Deep Neural Networks;towards Elephants Intelligent Monitoring in Zakouma National Park, Chad;a Review of Multi-modal and Multi-view Applications in Hand-Drawn Sketch Images;residential Real Estate Image Classification for Property Valuation;Novel Method to Investigate Decay in Rotting Bananas Using RGB Color Images;lalitha: A Hand Gesture-Based Computer Control System;dishari: A Novel Gesture-Based Educational Application for Specially Challenged People;mobility Anomaly Detection with Intelligent Video Surveillance;Weakly-Supervised Video Anomaly Detection Using Modified Anomaly Score Module and Modified BERT;Contour Detection of Seeds Based on Traditional and Convolutional Neural Network (CNN) Based algorithms;Early Detection of Lameness in Dairy Cattle Using Activity Data, Image Analysis, AI and ML - An Approach for Improved Animal Welfare and Economic Impact;implications for Designing Hawks Detection with Data Augmentation and Network Optimizations;a Review of Detecting and Quantification of Cracks Using Convolutional Neural Networks and Image Processing Techniques;using Linkage Context for Automated Correction in Unsupervised Entity Resolution;the Rising threat Against Modern Technology in Cybersecurity;an Online Bookstore Design and Implementation;cybersecurity: Sight and Foresight;the Application of Blockchain Technology in the Transmission of Semiconductor Process Recipes;the Use of Social Media and the Internet for the Facilitation of Human Trafficking.
As quantum computing progresses, the need for optimized task allocation and scheduling becomes paramount to efficiently harness quantum resources. Simultaneously, ensuring the security of communications in quantum sys...
详细信息
Cybersquatting, the unauthorized registration of domain names mimicking established trademarks, threatens online identity management and intellectual property rights. this study examines the legal and regulatory frame...
详细信息
High data speeds, low latency, and huge connection are becoming increasingly important in 5G networks, making energy efficiency a significant concern. In order to achieve the twin objectives of lowering energy consump...
详细信息
After 20 weeks of pregnancy, pre-eclampsia, a severe pregnancy syndrome, usually manifests as increased blood pressure and injury to other organs. In order to prevent adverse consequences for boththe mother and the f...
详细信息
暂无评论