the proceedings contain 56 papers. the topics discussed include: LEPaNTU: long polling based energy efficient passive NAT traversal through UDP;defining the communication architecture for data aggregation in wireless ...
ISBN:
(纸本)9781728128887
the proceedings contain 56 papers. the topics discussed include: LEPaNTU: long polling based energy efficient passive NAT traversal through UDP;defining the communication architecture for data aggregation in wireless sensor networks: application to communicating concrete design;intelligent IoTSP - implementation of embedded ML AI tensorflow algorithms on the NVIDIA Jetson Tx chip;systemsthat sustain themselves: energy harvesting sensor nodes for monitoring the environment;a change detection approach for processing outdoor scenes on hadoop clusters;secure and efficient cluster head election in a UAV-aided wireless sensor network;SD: a divergence-based estimation method for service demands in cloud systems;high quality video traffic Ateb-forecasting and fuzzy logic management;and infrastructureless IoT-as-a-service for public safety and disaster response.
the proceedings contain 24 papers. the topics discussed include: learners’ clustering in MOOCs: state of the art;sign language handshape recognition using Myo Armban;reconciling needs and feasibility when developing ...
ISBN:
(纸本)9781728161839
the proceedings contain 24 papers. the topics discussed include: learners’ clustering in MOOCs: state of the art;sign language handshape recognition using Myo Armban;reconciling needs and feasibility when developing technologies for persons with cognitive disabilities: a case study;understanding prosodic pauses in sign language from motion-capture and video-data;cloud computing services and its effect on tertiary education: using Google classroom;harnessing the characteristics of open educational resources to the challenges of rural education: a holistic understanding;Mada innovation program: a go-to-market ecosystem for Arabic accessibility solutions;Ar-SLoTE: a recognizing textual entailment tool for Arabic question/answering system;and fostering teachers-led open education in universities: recommendations emerging from research.
the proceedings contain 21 papers. the special focus in this conference is on Security in computing and Communications. the topics include: Benchmarking Behavior-Based Intrusion Detection systems with Bio-inspired Alg...
ISBN:
(纸本)9789811604218
the proceedings contain 21 papers. the special focus in this conference is on Security in computing and Communications. the topics include: Benchmarking Behavior-Based Intrusion Detection systems with Bio-inspired algorithms;thermal Management in Large Data Centres: Security threats and Mitigation;Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm;conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data;performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm;saaS - Microservices-Based Scalable Smart Contract Architecture;GIDS: Anomaly Detection Using Generative Adversarial Networks;Audio Steganography Using Multi LSB and IGS Techniques;A Forensic Analysis on the Availability of MQTT Network Traffic;a Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database systems;the Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications;analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment;evading Static and Dynamic Android Malware Detection Mechanisms;multilevel Secure Container Deployment Framework in Edge computing;deep Hierarchical App Recommendation with Dynamic Behaviors;New Security Architecture of Access Control in 5G MEC;a Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments;A Survey of Security Attacks on Silicon Based Weak PUF Architectures;on the Feasibility of DoS Attack on Smart Door Lock IoT Network.
the proceedings contain 36 papers. the topics discussed include: novel learning strategy based on genetic programming for credit card fraud detection in big data;transformation of systems of interactive simulation of ...
ISBN:
(纸本)9789898533920
the proceedings contain 36 papers. the topics discussed include: novel learning strategy based on genetic programming for credit card fraud detection in big data;transformation of systems of interactive simulation of conflict situations into systems based on decision patterns;a knowledge based two-stage cascade model for test-question/answer retrieval;reviewing data access patterns and computational redundancy for machine learning algorithms;driving model of big data governance in urban community safety service;a study on big data frameworks and machine learning tool kits;and strum: a semantic trust-based miner model for detecting influential spreaders in social networks.
the proceedings contain 33 papers. the special focus in this conference is on Integer Programming and Combinatorial Optimization. the topics include: algorithms for Flows over Time with Scheduling Costs;integer Plane ...
ISBN:
(纸本)9783030457709
the proceedings contain 33 papers. the special focus in this conference is on Integer Programming and Combinatorial Optimization. the topics include: algorithms for Flows over Time with Scheduling Costs;integer Plane Multiflow Maximisation: Flow-Cut Gap and One-Quarter-Approximation;stochastic Makespan Minimization in Structured Set systems (Extended Abstract);continuous Facility Location on Graphs;recognizing Even-Cycle and Even-Cut Matroids;a Combinatorial Algorithm for computingthe Rank of a Generic Partitioned Matrix with 2 × 2 Submatrices;fair Colorful k-Center Clustering;popular Branchings and their Dual Certificates;sparse Graphs and an Augmentation Problem;flexible Graph Connectivity: Approximating Network Design Problems Between 1- and 2-Connectivity;About the Complexity of Two-Stage Stochastic IPs;packing Under Convex Quadratic Constraints;weighted Triangle-Free 2-Matching Problem with Edge-Disjoint Forbidden Triangles;single Source Unsplittable Flows with Arc-Wise Lower and Upper Bounds;maximal Quadratic-Free Sets;on Generalized Surrogate Duality in Mixed-Integer Nonlinear Programming;the Integrality Number of an Integer Program;persistency of Linear Programming Relaxations for the Stable Set Problem;constructing Lattice-Free Gradient Polyhedra in Dimension Two;sequence Independent Lifting for the Set of Submodular Maximization Problem;faster algorithms for Next Breakpoint and Max Value for Parametric Global Minimum Cuts;a Fast (2 + 2/7)-Approximation Algorithm for Capacitated Cycle Covering;graph Coloring Lower Bounds from Decision Diagrams;On Convex Hulls of Epigraphs of QCQPs;on the Convexification of Constrained Quadratic Optimization Problems with Indicator Variables;optimizing Sparsity over Lattices and Semigroups;a Technique for Obtaining True Approximations for k-Center with Covering Constraints;tight Approximation Bounds for Maximum Multi-coverage.
the proceedings contain 74 papers. the topics discussed include: mitigating evasion attacks on machine learning based NIDS systems in SDN;elastic slicing in programmable networks;providing in-network support to coflow...
ISBN:
(纸本)9781665405225
the proceedings contain 74 papers. the topics discussed include: mitigating evasion attacks on machine learning based NIDS systems in SDN;elastic slicing in programmable networks;providing in-network support to coflow scheduling;revisiting heavy-hitter detection on commodity programmable switches;Alviu: an intent-based SD-WAN orchestrator of network slices for enterprise networks;tenant-oriented resource optimization for cloud network slicing with performance guarantees;a dynamic recommendation-based trust scheme for the smart grid;leveraging the 5G architecture to mitigate amplification attacks;on slice isolation options in the transport network and associated feasibility indicators;design and manufacture of narrow-band BPF for local 5G network slicing;and mind the semantic gap: policy intent inference from network metadata.
One of the most significant functions of the tax system, which characterize its various activities, includes fiscal, social, regulatory, distributive, stimulative, and control functions. For the proper functioning of ...
详细信息
ISBN:
(纸本)9798400709036
One of the most significant functions of the tax system, which characterize its various activities, includes fiscal, social, regulatory, distributive, stimulative, and control functions. For the proper functioning of each of these roles, tax monitoring is essential, a significant part of which is tax audits. However, earlier studies have shown that conducting tax audits with optimal probability is a costly procedure. Given the limited budget of tax authorities, such audits aren't always feasible. Hence, to increase tax collection, it's essential to use additional methods to encourage taxpayers to pay their taxes honestly. this study investigates a tax monitoring model that considers spreading information about potential tax audits among taxpayers as an additional incentive. Within the evolutionary approach to modeling, taxpayers are viewed as agents of the population with different risk profiles: risk-prone, risk-neutral, and risk-averse. the idea of disseminating information in the population was studied based on a Markov process in networks with varying structures. the study examined the influence of this information on the final distribution of risk profiles and taxpayer evasions. A series of experiments on modeling networks and the process of information dissemination within them was conducted. Models with artificially introduced influence centers and without them were considered. A comparative analysis of the obtained results is presented.
the proceedings contain 44 papers. the topics discussed include: overview of pheromone control method based on ant colony algorithm in wireless communication;fundamental phase-matched second harmonic generation from m...
ISBN:
(纸本)9781728104263
the proceedings contain 44 papers. the topics discussed include: overview of pheromone control method based on ant colony algorithm in wireless communication;fundamental phase-matched second harmonic generation from mid-infrared to near-infrared;enhanced performance of data interleaved and block hybrid modulation bitloading algorithms in underwater VLC system;research on physical downlink control channel transmission mode for 5G new radio;nonlinear characteristic analysis of ballistocardiogram signals based on chaotic time series;the auto-focus method on scanning acoustic microscope based on wavelet analysis;new investment strategy based on the big data-volatility index breaking out signal rule;and design of double resonant coil ferrite rod antenna for RF energy harvesting on MF band.
the internet became a common communication platform for many people. However, information transmission is not secure, and there is a high probability of copying and altering the information easily. In the public netwo...
ISBN:
(纸本)9798400709036
the internet became a common communication platform for many people. However, information transmission is not secure, and there is a high probability of copying and altering the information easily. In the public network, transmitting sensitive or private information needs some kind of protection. Unless a secure channel is utilized for the transmission. Hiding the information is one of the efficient techniques that provides a solution for transmitting confidential data over communication channels. these techniques should meet various application requirements such as high robustness against attacks, real-time, and high hiding capacity. Generally, information-hiding techniques suffer from many challenges. this paper provides an insight into these techniques, their applications, and challenges to fill the gap of missing such an overview.
Supervoxel segmentation for video is a video pre-processing technique that groups voxels with similar spatiotemporal features into supervoxels, effectively reducing the number of elemental voxels for downstream comput...
ISBN:
(纸本)9798400708305
Supervoxel segmentation for video is a video pre-processing technique that groups voxels with similar spatiotemporal features into supervoxels, effectively reducing the number of elemental voxels for downstream computer vision applications, or applications in other fields, e.g., hardware design or video visualization. Existing methods for video supervoxel generation primarily rely on traditional techniques, such as graph theory, mean shift, and clustering, which have yielded promising results. Recent deep learning-based methods mainly worked on object segmentation or semantic segmentation from videos, paying less attention to video oversegmentation. However, the quality of supervoxels directly affects the results of subsequent tasks. In this paper, we introduce a novel approach SVNet which enables direct end-to-end segmentation of voxels into supervoxels from a deep iterative clustering network. the process begins by utilizing the spatiotemporal features learned by the deep neural network to construct a soft association map between voxels and supervoxels. Subsequently, through an iterative update process, the features of supervoxels and the soft association map between voxels and supervoxels are continually refined to enhance the accuracy of voxels segmentation into supervoxels withthe supervised loss using the reconstructed video features and labels. We evaluate our method and the representative supervoxel algorithms for their capability on the performance of video segmentation. Experiments show that our SVNet excels particularly in terms of the BRD metric, and its accuracy is roughly on par withthe compared methods.
暂无评论