the proceedings contain 28 papers. the special focus in this conference is on Advancements in Smart computing and Information Security. the topics include: Prediction of Anti-Cholinesterase Inhibitor for Alzheimer Dis...
ISBN:
(纸本)9783031862922
the proceedings contain 28 papers. the special focus in this conference is on Advancements in Smart computing and Information Security. the topics include: Prediction of Anti-Cholinesterase Inhibitor for Alzheimer Disease Using Machine Learning Techniques;scrutinize Search Engine Optimization Strategies with Artificial Intelligence to Rank a Website;a Study on Machine Learning algorithms: Forecasting Crop Prices;improving Student Stress Analysis: Novel Methods for Collecting, Preprocessing, and Fusing Features;extraction of Normal and Abnormal Region in Colposcopy Image to Support Cervical Cancer Clinical Decision;optimizing Pricing Strategies: A Comprehensive Framework Using Bayesian Inference and Game theory;hybrid Ensemble Gradient Boosting Algorithm to Predict Diabetes Health Care Analytics;a Review on Machine Learning algorithms for Real-Time Traffic Management;hyperparameter-Tuned Intention Mining for Mental Health Diagnosis Using Logistic Regression;machine Learning for Accessible and Precise Assessment in Smart Monitoring systems;an Efficient Model for Academic Performance Prediction of the University Students;comprehensive Comparative Study on Data Mining and Machine Learning Approaches for Fraud Detection in Financial Services;prediction of Stock Price and Detection of Stock Market Trends Using Adaptive Learning Techniques;asthma Prediction Using Fuzzification and Machine Learning Based Ensemble Classifier;detection and Analysis of Features of Optic Nerve Head Using Retinal Fundus Images of an Eye for a Priori Prediction of Glaucoma;a Hybrid Deep Learning Framework for Uncertain Supply Chains: An Optimization Approach;a Comprehensive Review of Machine Learning Techniques in Recommender System for E-Commerce Platform;Ethics of AI in the Educational Sector - Navigating the Moral Landscape;international Law and AI Interface.
Smart question answering (QA) systems have been the focus of research for many years. this is known to be a challenging task due to the randomness of user input. As deep learning technology is evolving fast, closed-do...
详细信息
Semi-supervised segmentation methods have demonstrated promising results in natural scenarios, providing a solution to reduce dependency on manual annotation. However, these methods face significant challenges when di...
详细信息
Digital trust in Industry 4.0 and 5.0 is a crucial aspect. the digital age is working in real-time; agility is required in this digital era. the digital nature of businesses has bought significant changes such as tran...
Digital trust in Industry 4.0 and 5.0 is a crucial aspect. the digital age is working in real-time; agility is required in this digital era. the digital nature of businesses has bought significant changes such as transparency, advancement in technological usage, and, most notably, customer experience. the focus of this study is the impact of fraud that may occur in Industry 4.0 & 5.0 as an element of digital trust that must be secured. A secondary research method to understand digital trust, industry 4.0 & 5.0 and fraud, with ramifications on repute while organisations try their best to protect data and information. Maintaining digital trust achieved by mitigating the risk of fraud using various techniques is discussed here by its priority and digital transformation of technologies to achieve trust with discussion on types of fraud and their mitigation practices. the implications are far-reaching for organisations and society where the bar is raised to keep unwanted attention and frauds kept at bay in the standardisation by way of technological transformations for the satisfaction of consumers and have a sense of responsibility as the practitioners, policymakers and organisations.
the proceedings contain 212 papers. the topics discussed include: implementation of the algorithm for improving the frontier in DEA models;a decision model and method for the bi-objective parallel machine ScheLoc prob...
ISBN:
(纸本)9781728159539
the proceedings contain 212 papers. the topics discussed include: implementation of the algorithm for improving the frontier in DEA models;a decision model and method for the bi-objective parallel machine ScheLoc problem;deep imitation learning for broom-manipulation tasks using small-sized training data;performance and usage frequency based policy for products recovery and remanufacturing;voltage oriented control of indirect matrix converter applied to wind energy conversion system using PMSM generator;optimal trajectories synthesis of a mobile robots group using Cartesian genetic programming;minimization of an aircraft's energy;a multi-objective and multi-decision maker approach for the balancing market in distribution grids in presence of aggregators;actor-critic algorithm for optimal synchronization of Kuramoto oscillator;and estimation of the distance to moving vehicles in a traffic stream.
the rise of cyber-attacks has become a serious problem due to our growing reliance on technology, making it essential for both individuals and businesses to use efficient cybersecurity solutions. this work continues o...
详细信息
the proceedings contain 108 papers. the topics discussed include: deep learning-based data augmentation for hydraulic condition monitoring system;mobile light storage: make the light smarter;enhanced cloud acknowledge...
the proceedings contain 108 papers. the topics discussed include: deep learning-based data augmentation for hydraulic condition monitoring system;mobile light storage: make the light smarter;enhanced cloud acknowledgement scheme for a node network;concepts and solutions of the digital teams platform to support mobile work and virtual teams;time-series data augmentation based on interpolation;an weighted CNN ensemble model with small amount of data for bearing fault diagnosis;segmentation process and spectral characteristics in the determination of musical genres;analysis of crowd behavior through pattern virtualization;unbalanced data processing using oversampling: machine learning;and analysis of behavior of automatic learning algorithms to identify criminal messages.
the on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cl...
详细信息
the on-demand availableness of computer systems resources, especially storage of data (cloud storage) and rectifying power, with no direct ongoing administration by the user is what they call cloud computing. Large cloud functions are usually spread among several locations, each of which constitutes a data center. Customers may save money on capital expenses by using cloud computing, which frequently takes a “pay-as-you-go” approach. Coherence in cloud computing is achieved by sharing resources. In today's world of the Internet, demand for cloud services is increasing drastically leading to the production of new services day by day. As the services increase, the data gets primarily targeted by spiteful users who attempt to steal the data for their own atrocious and unethical activities. Users and trustworthy applications are considering more security and privacy and services get more in demand. Moreover, this study has reviewed several algorithms such as CPE-ABE (Ciphertext policy attribute-based encryption), ABE, KP-ABE (Key policy attribute-based encryption) CSP (Constraint satisfaction problem), PKG, AES (Advanced Encryption Standards), SHA-1 (Secure Hash Algorithm), Photo encryption, Photo decryption, PRE, IDEA (international Data Encryption algorithm) and LSBG (Least Significant Bit Grouping) for image data security. As already discussed, the increasing threats and frauds around the world, safe and secure applications and services should be created to resolve this problem so that people can store data on a platform that can be relied on. this research study has discussed about the concept of what are the paradigms required for securing and protecting the data and securing the image data at an encrypted level. this study has reviewed several existing research works, studied different algorithms which have been used in different research articles, and compared their strengths and drawbacks accordingly. Different research works have been summarized in a form of ta
the proceedings contain 63 papers. the topics discussed include: performance benchmarking of visual human tracking algorithms for UAVs;community detection at scale: a comparison study among Apache spark and Neo4j;secu...
ISBN:
(纸本)9781450398541
the proceedings contain 63 papers. the topics discussed include: performance benchmarking of visual human tracking algorithms for UAVs;community detection at scale: a comparison study among Apache spark and Neo4j;security operations center in education: building an educational environment for attack and defense scenarios;smart business processing in industry 4.0;a survey on vulnerability prediction using GNNs;design for smart home devices: an exploratory eye-tracking study;intelligent emergency evacuation systems for buildings;better solutions for the thesis defense timetabling problem using a three-phase approach;self-adaptive privacy in cloud computing: an overview under an interdisciplinary spectrum;evaluation of the relationship between the smart packaging technology and disability in Greece;an exact based approach for the post enrollment course timetabling problem;and a neuro-symbolic approach for fault diagnosis in smart power grids.
the proceedings contain 7 papers. the topics discussed include: directional-IPeR: enhanced direction and interest aware PeopleRank for opportunistic mobile social networks;ESP32 based edge devices to bridge smart devi...
ISBN:
(纸本)9789897584770
the proceedings contain 7 papers. the topics discussed include: directional-IPeR: enhanced direction and interest aware PeopleRank for opportunistic mobile social networks;ESP32 based edge devices to bridge smart devices to MQTT broker for healthcare purposes in the COVID scenario;analysis of free time intervals between buyers at cash register using generating functions;internal and external factor analysis in bottleneck detection in shop sales: the case of grocery shops in Lithuania;AHP-based evaluation of the acceptance of autonomous driving;and systematic crowd mobility management to avoid catastrophic disasters of human stampedes: the case of Mina Hajj.
暂无评论