Computational Intelligence is sometimes also referred to as soft computing, which is a specific field of study where the task is to make computers learn some real-life or complex problems from the experimental data or...
详细信息
the proceedings contain 27 papers. the special focus in this conference is on Advanced computing, Networking, and Informatics. the topics include: Hash Code Based Image Authentication Using Rotation Invariant Local Ph...
ISBN:
(纸本)9789811396823
the proceedings contain 27 papers. the special focus in this conference is on Advanced computing, Networking, and Informatics. the topics include: Hash Code Based Image Authentication Using Rotation Invariant Local Phase Quantization;novel Competitive Swarm Optimizer for Sampling-Based Image Matting Problem;note Transcription from Carnatic Music;sentence-Based Dialect Identification System Using Extreme Gradient Boosting Algorithm;characterization of Consonant Sounds Using Features Related to Place of Articulation;named Entity Recognition Using Part-of-Speech Rules for Telugu;objective Assessment of Pitch Accuracy in Equal-Tempered Vocal Music Using Signal Processing Approaches;gibbs Sampled Hierarchical Dirichlet Mixture Model Based Approach for Clustering Scientific Articles;experimental Evaluation of Dynamic Typing Mechanism: A Case Study;A Robust and Blind Watermarking for Color Videos Using Redundant Wavelet Domain and SVD;integrating Digital Forensics and Digital Discovery to Improve E-mail Communication Analysis in Organisations;speaker Verification systems: A Comprehensive Review;A Fast Method for Segmenting ECG Waveforms;Removal of Eye-Blink Artifact from EEG Using LDA and Pre-trained RBF Neural Network;skin Cancer Detection Using Advanced Imaging Techniques;auto-associative Neural Network Based Concrete Crack Detection;image Filter Selection, Denoising and Enhancement Based on Statistical Attributes of Pixel Array;Enhanced Security Credentials for Image Steganography Using QR Code;Clustering-Based Melanoma Detection in Dermoscopy Images Using ABCD Parameters;optimized Object Detection Technique in Video Surveillance System Using Depth Images;automated Histogram-Based Seed Selection for the Segmentation of Natural Scene;application of Image Fusion Approaches for Image Differencing in Satellite Images;a Novel Method for Detecting Bone Contours in Hand Radiographic Images.
the proceedings contain 12 papers. the topics discussed include: a conclusive algorithm to model-fit current-voltage characteristics curves of FinFET transistor;combining symbolic execution and parameter tracking to d...
ISBN:
(纸本)9781728175362
the proceedings contain 12 papers. the topics discussed include: a conclusive algorithm to model-fit current-voltage characteristics curves of FinFET transistor;combining symbolic execution and parameter tracking to detect time of check to time of use in c language;localized surface plasmon resonance effect of gold nanoparticles – TiO2 as mesoporous layer for perovskite solar cells;development of an automated dimensional inspection planning program for coordinate measuring machines;development and comparison of simple ultrasonic motor drivers;artificial neural network-based emotion classification using physiological signal;wearable-based fluid intake assessment system based on micro-activity recognition and fill level estimation;and design and implementation of smart honey bees breeding IoT systems with electromagnetic radiation free.
the advancement of Digital Twin (DT) technology has enabled the creation of digital replicas of physical entitics, significantly enhancing the functionality and performance of mobile networks. However, this innovative...
详细信息
Knowledge Graph Embedding (KGE) aims to learn how to represent the low-dimensional vectors for entities and relations based on the observed triplets in knowledge graph. Most of the existing models use simple structura...
详细信息
the proceedings contain 144 papers. the topics discussed include: machine explanations and human understanding;broadening AI ethics narratives: an Indic art view;how to explain and justify almost any decision: potenti...
ISBN:
(纸本)9781450372527
the proceedings contain 144 papers. the topics discussed include: machine explanations and human understanding;broadening AI ethics narratives: an Indic art view;how to explain and justify almost any decision: potential pitfalls for accountability in AI decision-making;‘we are adults and deserve control of our phones’: examining the risks and opportunities of a right to repair for mobile apps;fairness in machine learning from the perspective of sociology of statistics: how machine learning is becoming scientific by turning its back on metrological realism;two reasons for subjecting medical AI systems to lower standards than humans;optimization’s neglected normative commitments;humans, AI, and context: understanding end-users’ trust in a real-world computer vision application;multi-dimensional discrimination in law and machine learning – a comparative overview;reconciling individual probability forecasts;the gradient of generative AI release: methods and considerations;and in the name of fairness: assessing the bias in clinical record de-identification.
the proceedings contain 9 papers. the topics discussed include: narrowing and stretching: addressing the challenge of multi-track programming;promoting engagement in remote computing ethics education;gender parity in ...
ISBN:
(纸本)9781450395618
the proceedings contain 9 papers. the topics discussed include: narrowing and stretching: addressing the challenge of multi-track programming;promoting engagement in remote computing ethics education;gender parity in peer assessment of team software development projects;automated code tracing exercises for CS1;feedback and engagement on an introductory programming module;co-constructing a community of practice for early-career computer science academics in the UK;application of Amazon Web services within teaching & learning at Coventry University group;assessing knowledge and skills in forensics with alternative assessment pathways;and LMC + scratch: a recipe to construct a mental model of program execution.
the aim of this paper is to show what can be achieved by installing photovoltaic (PV) generation capacities in some hybrid systems from the aspects of greenhouse gases (GHG) emissions, electricity generation and heat ...
详细信息
Considering the issues of lack of integrity, authentication and confidentiality of Modbus/TCP protocol broadly utilized in SCADA system, this study suggests a trusted Modbus/TCP protocol based on digital envelope tech...
详细信息
Withthe rapid development of intelligent devices in wireless communication, the fifth generation (5G) mobile networks have limited high data rates, low latency, high availability demands. the sixth -generation (6G) m...
详细信息
ISBN:
(纸本)9781665495127
Withthe rapid development of intelligent devices in wireless communication, the fifth generation (5G) mobile networks have limited high data rates, low latency, high availability demands. the sixth -generation (6G) mobile network can use Digital -twin (DT) techniques to meet these demands. DT is the virtual representation of physical aspects such as 6G edge nodes. DT optimize the 6G edge nodes parameters using artificial intelligence (AI) and especially machine learning (ML) algorithms. However, AI and ML bring along privacy and security concerns. therefore, user data must be protected from unauthorized persons during the 6G edge network recovery and expansion phases. In this paper, we proposed a new reliable Digital Twin -based 6G edge network recovery framework using Blockchain technology. We applied the Transfer Learning (TL) technique to improve our proposed framework's performance. We ensured data privacy and security using TL and Blockchain.
暂无评论