the proceedings contain 19 papers. the special focus in this conference is on Applied computing for Software and Smart systems. the topics include: CCD Array Spectrometer-Based FBG Bragg Wavelength Detection Using ANN...
ISBN:
(纸本)9789819797615
the proceedings contain 19 papers. the special focus in this conference is on Applied computing for Software and Smart systems. the topics include: CCD Array Spectrometer-Based FBG Bragg Wavelength Detection Using ANN Algorithm;performance Assessment of Sequential Models for Solar Radiation Forecasting Over Varying Forecast Horizon;advancing Smartphone Sensor-Based Keystroke Dynamics for Implicit and Active Authentication: Addressing Challenges and Enhancing Usability Control;a Prototype for Peer-to-Peer Transient Microservices with Wi-Fi Direct;comparison of the Effectiveness of Face Recognition algorithms in Terms of Photo Distortion Level;multi-class Histology Image Analysis Using Handcrafted Texture and Colour Features for Breast Abnormality Classification;fvFc-Net: Forged Video Frame Classification Network;semi-automated Ground Truth Generation System for Bangla Offline Handwritten Text Documents;SWFEM: Sparse Weighted Fine-Tuned Ensemble Model for Leaf Disease Detection;a Comparative Study of Hospital Length of Stay Prediction of Indoor Patients for Admission, Post Admission, and Discharge Stage Data Using Machine Learning algorithms;BEN-RS-ANN: An Innovative Approach for Revealing Emotion from Bengali Text with Exposure to Polysemy Resolution;Flood Detection in UAV Images of Urban Area Using Machine Learning and Deep Learning Techniques;supervised Classification Approach for Precise Cell Type Identification Improves Single Cell Data Analysis;quality-Driven Web Service Selection: Machine Learning Based Approach;contextual Correlation Inference in Multi-fleet Robotic systems;risk Assessment in Agile Software Development;Adaptive Cyber Defence: Leveraging GANs for Simulating and Mitigating Advanced Network Attacks in IoT Environments.
this paper presents a novel nonlinear, time-domain numerical model for simulating offshore floating wind turbines, known as MOST. the tool evaluates platform dynamics in six degrees of freedom, power production, and b...
详细信息
the emergence of 6G networks, characterized by ultra-low latency, high bandwidth, and dense device connectivity, demands robust and adaptive security mechanisms to counter sophisticated cyber threats. this paper prese...
详细信息
In recent years, withthe growing demand for real-time video transmission, ensuring the security of video stream data has become critical. this paper addresses the secure transmission of real-time video streams by usi...
详细信息
the proceedings contain 38 papers. the topics discussed include: a strong authentication method for web/mobile services;efficient shoulder surfing resistant PIN authentication scheme based on localized tactile feedbac...
ISBN:
(纸本)9781728116600
the proceedings contain 38 papers. the topics discussed include: a strong authentication method for web/mobile services;efficient shoulder surfing resistant PIN authentication scheme based on localized tactile feedback;detection of sources being used in DDoS attacks;automatic question tagging using multi-label classification in community question answering sites;enabling privacy-preserving sharing of cyber threat information in the cloud;a survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms;cost and effect of using scheduling security model in a cloud environment;estimating web attack detection via model uncertainty from inaccurate annotation;and assessing the security risks of multicloud SaaS applications: a real-world case study.
In contemporary diagnostic workflows, medical image captioning has emerged as a pivotal advancement, combining deep learning methodologies and transformer architectures to enhance accuracy and efficiency in medical in...
详细信息
the proceedings contain 70 papers. the topics discussed include: disease outbreak /epidemic in public health sector;multi-GANs with shared generator: an approach for handling mode collapse issue;time series prediction...
ISBN:
(纸本)9798350373875
the proceedings contain 70 papers. the topics discussed include: disease outbreak /epidemic in public health sector;multi-GANs with shared generator: an approach for handling mode collapse issue;time series prediction analysis of long short term memory models;a novel inception deep learning model for mobile ai stroke prediction system: ai research and industry perspectives for connected health;android malware detection and prevention based on deep learning and tweets analysis;a new security mechanism for MIL-STD-1553 using authenticated encryption algorithms;from vision to precision: the dynamic transformation of object detection in autonomous systems;a comprehensive investigation for quantifying and assessing the advantages of blockchain adoption in banking industry;and leveraging entangled quantum states to develop consensus mechanisms in blockchain networks for smart forestry applications.
the proceedings contain 35 papers. the topics discussed include: the Nornir run-time system for parallel programs using Kahn process networks;network performance of pruned hierarchical Torus network;super-peer availab...
ISBN:
(纸本)9780769538372
the proceedings contain 35 papers. the topics discussed include: the Nornir run-time system for parallel programs using Kahn process networks;network performance of pruned hierarchical Torus network;super-peer availability prediction strategy in unstructured P2P network;VirtualNet: mapping distributed communication on a single node;DPM: a demand-driven virtual disk prefetch mechanism for mobile personal computing environments;explorations of honeycomb topologies for network-on-chip;adaptive energy-efficient packet transmission for voice delivering in wireless sensor networks;sleep scheduling and gradient query in sensor networks for target monitoring;re-exploring the potential of using tree structure in P2P live streaming networks;reliable downloading algorithms for BitTorrent-like systems;a theoretical model of lock-keeper data exchange and its practical verification;and system level speedup oriented cache partitioning for multi-programmed systems.
暂无评论