| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910586578103321 |
|
|
Titolo |
Data Science : 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022, Chengdu, China, August 19–22, 2022, Proceedings, Part II / / edited by Yang Wang, Guobin Zhu, Qilong Han, Liehui Zhang, Xianhua Song, Zeguang Lu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (520 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 1629 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data mining |
Application software |
Artificial intelligence |
Education - Data processing |
Computer engineering |
Computer networks |
Data Mining and Knowledge Discovery |
Computer and Information Systems Applications |
Artificial Intelligence |
Computers and Education |
Computer Engineering and Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data Management and Applications -- Research on the Realization Path and Application of a Data Governance System Based on Data Architecture -- 1 Introduction -- 2 Research Status and Development of Data Governance -- 3 Functional Composition of Data Architecture -- 3.1 The Method of Integrating Heterogeneous Data with Internal and External Centralized Data Management -- 3.2 Data Security Classification, Data Right Confirmation and Authorization Methods -- 3.3 Basic Composition and Form of the Data Architecture -- 3.4 Data Governance System Supported by Data Architecture -- 4 |
|
|
|
|
|
|
|
|
|
Understanding the Data Architecture Supporting the Data Governance System -- 4.1 The Impact of Data on Human Civilization - Recognizing the Importance of Data -- 4.2 Comparison Between Data and Material - Similarity and Particularity of Data and Material -- 4.3 Comparison of Data and Information - the Difference Between Data and Information Determines the Difference in Research Data Governance Methods -- 4.4 The Relationship Between Data and Applications - the Systematicness, Integrity, Relevance and Essence of Data -- 5 Implementation Path of the Data Governance System Supported by the Data Architecture -- 5.1 Distinguish the Information System and Data System, and Develop the Data System by Using the Data-Oriented Software Engineering Method -- 5.2 Unify the Database of the Existing Information System, Build a Data System and Crack the "Data Island" -- 5.3 The Separation of Data Management and Use is Adopted to Simplify the Complexity of Data and Business -- 5.4 The Public Key Infrastructure of the Domestic Commercial Key Algorithm is Used to Realize Data Right Confirmation, Data Ownership Authorization and Data Protection. |
5.5 Data Architecture Supports the Construction of a Data Governance System and Solves Data Governance Problems in a Package -- 5.6 Application Example of Data Governance System Based on Data Architecture in County New Smart City -- 6 Conclusion -- References -- Data Quality Identification Model for Power Big Data -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Related Technologies -- 3 Problem Definition -- 4 Proposed Approach -- 4.1 Data Quality Identification Architecture -- 4.2 Data Preprocessing and Grouping -- 4.3 Data Augmentation -- 4.4 Tri-Training Based Detection -- 5 Experiments -- 5.1 Training Data and Baselines -- 5.2 Analysis -- 6 Conclusion -- References -- Data Security and Privacy -- Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic -- 1 Introduction -- 2 Background and Related Work -- 2.1 WF Attacks -- 2.2 WF Defense -- 3 Threat Model -- 4 The Propose TED -- 4.1 Overview of TED -- 4.2 Similar Scale Traces Clustering -- 4.3 Interconversion -- 4.4 Key Feature Extraction -- 5 Performance Evaluation -- 5.1 Preliminary -- 5.2 Performance Metrics -- 5.3 Parameter Tuning -- 5.4 Evaluation -- 6 Conclusion -- References -- Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks -- 1 Introduction -- 2 Preliminaries -- 2.1 QIM -- 2.2 Related Work on Resisting Scaling Attacks -- 3 Proposed Method -- 3.1 Division Domain for Data Hiding -- 3.2 D-QIM -- 3.3 Theoretical Analysis for D-QIM -- 4 Simulations -- 5 Conclusions -- References -- BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum -- 1 Introduction -- 2 Related Works -- 3 Zreo-Knowledge Proof -- 4 BMSC: Anonymous Transaction Scheme -- 4.1 Groth16 -- 4.2 Scheme Construction -- 5 Analysis of Anonymity and Security -- 5.1 Analysis of Anonymity. |
5.2 Hide Account Balances and Transaction Amounts -- 5.3 Hide the Transfer Relationships -- 5.4 Analysis of Security -- 5.5 Overspending Attack -- 5.6 Double-Spending Attack -- 6 Conclusion -- References -- Research on the Design and Education of Serious Network Security Games -- 1 Introduction -- 2 Related Work -- 3 Feasibility Analysis -- 3.1 Educational Dilemma -- 3.2 Education Status -- 4 Theoretical Basis -- 4.1 Constructivist Theory -- 4.2 Situational Cognition -- 5 Teaching Design -- 5.1 Design Principle -- 5.2 Design Principle -- 6 Game Design -- 6.1 Game Theme -- 6.2 Game Components -- 6.3 Rules of the Game -- 6.4 Hands-On Game -- 7 Conclusion -- References -- KPH: A Novel Blockchain Privacy |
|
|
|
|
|
|
|
Preserving Scheme Based on Paillier and FO Commitment -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Paillier Cryptosystem -- 3.2 Chinese Remainder Theorem -- 3.3 CRT-Based Paillier Cryptosystem -- 3.4 An Optimized Paillier Cryptosystem -- 3.5 Fujisaki-Okamoto Commitment -- 3.6 Blockchain Data Sharing Model -- 4 Privacy Protection Model for Blockchain Data Sharing -- 4.1 Hidden Amount -- 4.2 Transaction Verification -- 4.3 Update Account Balance -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Bilinear Mapping -- 3.2 Access Control Structure -- 3.3 Linear Secret Sharing Scheme -- 4 Blockchain Access Control Scheme Based on MA-ABE -- 4.1 Scheme Overview -- 4.2 Autonomous Identity Management -- 4.3 Selection of Attribute Authorities -- 4.4 Hierarchical Linear Secret Sharing Scheme -- 4.5 Blockchain Access Control Algorithm -- 5 Scheme Analysis -- 5.1 Security Analysis -- 5.2 Comparison of Scheme Cost -- 6 Conclusion -- References -- Applications of Data Science. |
Study on the Intelligent Control Model of a Greenhouse Flower Growing Environment -- 1 Introduction -- 2 Problem Scenario -- 2.1 A Floral Growth Factor Analysis -- 2.2 Fuzzy Neural Network -- 2.3 Practice Site and Flowers -- 3 Methods -- 3.1 Framework -- 3.2 Fuzzy Neural Network Model -- 3.3 Design Implementation -- 4 Experimental Results and Analysis -- 4.1 Simulation Analysis -- 4.2 Field Site Experiments -- 4.3 Model Evaluation -- 5 Conclusion and Discussion -- References -- A Multi-event Extraction Model for Nursing Records -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Dataset Annotation -- 3.2 Dataset Analysis -- 3.3 Model -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Comparison Methods -- 4.3 Main Results -- 4.4 Analysis on the Multi-event Argument Attribution Problem -- 5 Discussion -- 5.1 Analysis on High Score Performance -- 5.2 Application of Missing Item Detection -- 6 Conclusion -- References -- Cuffless Blood Pressure Estimation Based on Both Artificial and Data-Driven Features from Plethysmography -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Empirical Feature Extracting Branch -- 3.2 Data-Driven Feature Extracting Branch Based on LSTM -- 3.3 Feature Gathering and Multichannel Output Module -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Competing Methods -- 4.3 Results and Analysis -- 5 Conclusions -- References -- User Attribute Prediction Method Based on Stacking Multimodel Fusion -- 1 Introduction -- 2 Related Machine Learning Algorithms -- 3 Multimodel-LightGBM -- 3.1 Stacking Algorithm -- 3.2 Multimodel-LightGBM -- 4 Experiment and Result Analysis -- 4.1 Dataset -- 4.2 Feature Engineering -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- How is the Power of the Baidu Index for Forecasting Hotel Guest Arrivals? -A Case Study of Guilin -- 1 Introduction. |
2 Literature Review -- 2.1 Baidu Index and Tourism Research -- 2.2 Tourism Forecasting with Big Data -- 3 Data -- 3.1 Data Collection -- 3.2 Keyword Selection for the Baidu Search -- 3.3 Data Preprocessing -- 4 Variable Test and Metrics -- 4.1 Unit Root -- 4.2 Granger Casualty Test -- 4.3 Metrics -- 5 Model Fitting and Performance Evaluation -- 5.1 Forecasting Model Without Any Baidu Index -- 5.2 Autoregressive Distributed Lag Model Establishment with Univariate Baidu Index -- 5.3 Autoregressive Distributed Lag Model Establishment with Multiple Baidu Indexes -- 5.4 Summary -- 6 Conclusions, Limitations, and Future Work -- 6.1 Conclusions -- 6.2 Limitations -- 6.3 Future Work -- References -- A Facial Size Automatic Measurement and Analysis |
|
|
|
|
|
|
|
|
|
Technology -- 1 Introduction -- 2 Facial Data Acquisition -- 3 Facial Morphology Analysis System -- 3.1 Feature Point Recognition -- 3.2 Location of Three-Dimensional Facial Feature Points -- 3.3 Facial Morphology Analysis -- 3.4 Output Module -- 4 Experimental Comparison -- 5 Conclusion -- References -- Intelligent Industrial Auxiliary System Based on AR Technology -- 1 Introduction -- 2 System Design and Implementation -- 2.1 Real-Time Display -- 2.2 Human-Computer Interaction -- 2.3 Perception and Positioning -- 2.4 Scene Switch -- 3 Example Display -- 4 Summary and Outlook -- References -- Infrastructure for Data Science -- Industry-Oriented Cloud Edge Intelligent Assembly Guidance System -- 1 Introduction -- 2 Method -- 2.1 Instance Segmentation -- 2.2 Pose Estimation -- 2.3 Cloud-Edge Joint Technology -- 3 Experiment and Analysis -- 3.1 Experimental Setup -- 3.2 Experimental Results -- 4 Conclusion -- References -- An Intelligent Data Routing Scheme for Multi-UAV Avionics System Based on Integrated Communication Effectiveness -- 1 Introduction -- 2 Proposed Integrated Communication Effectiveness Metric. |
2.1 Link Effectiveness. |
|
|
|
|
|
|
Sommario/riassunto |
|
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Management and Applications; Data Security and Privacy; Applications of Data Science; Infrastructure for Data Science; Education Track; Regulatory Technology in Finance. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910144183803321 |
|
|
Titolo |
Knowledge Management in Electronic Government : 5th IFIP International Working Conference, KMGov 2004, Krems, Austria, May 17-19, 2004, Proceedings / / edited by Maria A. Wimmer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-280-30806-0 |
9786610308064 |
3-540-24683-5 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2004.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 328 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Artificial Intelligence ; ; 3035 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Political science |
Data structures (Computer science) |
Artificial intelligence |
Application software |
Computers and civilization |
Management information systems |
Computer science |
Political Science |
Data Structures and Information Theory |
Artificial Intelligence |
Information Systems Applications (incl. Internet) |
Computers and Society |
Management of Computing and Information Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
KM Concepts and Methodologies -- Knowledge Management for E-service-Delivery – A Conceptual Approach within E-government -- The Role of Knowledge Mapping in Electronic Government -- Strategies to Implement KM in the Public Sector -- Reconceptualising Government in the New E-Ra -- Business Models and Governance Strategy of Policy |
|
|
|
|
|
|
|
|
|
|
|
Knowledge Service for National Knowledge Management -- Knowledge Management in Delivering Customer Oriented Services in Public Sector -- Intercultural E-government -- Bürgerzufriedenheit mit Portalen der öffentlichen Verwaltung – Ergebnisse einer Untersuchung über Zufriedenheitsmodelle und Vertrauensfragen im E-government -- Analysis of Best Practice Policy and Benchmarking Behavior for Government Knowledge Management -- Rewarding Quality and Innovation: Awards, Charters, and International Standards as Catalysts for Change -- Knowledge Ontologies and Structuring Concepts for Public Administration -- Model of Experience for Public Organisations with Staff Mobility -- The Governance Enterprise Architecture (GEA) High-Level Object Model -- Retrieving Knowledge in E-government: The Prospects of Ontology for Regulatory Domain Record Keeping Systems -- Ontology-Enabled E-gov Service Configuration: An Overview of the OntoGov Project -- Simple Life-Events Ontology in SU(M)O-KIF -- Technologies for KM Support in Public Administrations -- Knowledge Management and Modelling in Health Care Organizations: The Standard Operating Procedures -- Architecture of an Active Life-Event Portal: A Knowledge-Based Approach -- Metadata Repository Support for Legacy Knowledge Discovery in Public Administrations -- Requirements Engineering for KM -- Knowledge Elicitation and Modeling for E-government -- Designing a Brokerage Platform for the Delivery of E-government Services to the Public -- How to Develop E-government: The Italian Case -- Modeling the Penetration of the Information Society Paradigm -- Representing (Legal/Procedural) Knowledge -- Formal Models for a Legislative Grammar. Explicit Text Amendment -- The Legal Atlas ©: Map-Based Navigation and Accessibility of Legal Knowledge Sources -- E-CRIME System: A Knowledge Management Application in Public Administration -- KM Support for Democratic Processes and Citizen Participation -- Designing Participatory Processes -- Developing a Collaborative Learning Support System for a Natural Protected Area -- Learning to Become an E-citizen: The European and Italian Policies -- Examples of KM in Public Administrations and Case Studies -- Organizational Factors Affecting Knowledge Sharing Capabilities in E-government: An Empirical Study -- Knowledge Sharing and Creation: The Bricks and Mortar of Intra-organisational Co-operation within a Scottish Local Authority -- PETALE: Case Study of a Knowledge Reengineering Project -- The U.S. vs. Fiber Materials, Inc.: -- Research in Progress -- E-government: A Catalyst to Good Governance in China -- Priming E-governance for Quality of Growth -- A Framework for Developing Local E-government. |
|
|
|
|
|
|
Sommario/riassunto |
|
“We know more than we can tell and we can know nothing without relying upon those things which we may not be able to tell” (Michael Polanyi) The importance of knowledge management (KM) is increasingly recognized in the public sector and in relation with e-government implementations. Because governments and public administrations deal with information and knowledge on a large scale, this domain is particularly predestined to actively practice KM: much of the work of public authorities refers to the elaboration of data, information and knowledge on citizens, businesses, society, the markets, the environment, laws, politics, etc. Even many “products” of public administration and government are delivered in the shape of information and knowledge themselves. This aspect especially applies to the policies, management, regulation and monitoring of society, markets and the environment. With the recent evolution of e-government projects, high expectations are linked. As a consequence, efficient support from adequate KM |
|
|
|
|
|
|
|
|
|
|
conceptsandtoolstoexploitthehugeknowledgeandinformationresourcesdealt with in e-government is expected. Not only the trend towards a knowledge society calls for KM solutions. Current e-government developments significantly influence the public sector. These require the rethinking of knowledge distribution and management: Citizen- and business- oriented service delivery, including one-stop service provision, inter-oganizational co-operation between government agencies and cross-border support for complex administrative decision making call for largely opened-up access to remote information and knowledge resources. E-government – and specifically the concept of online one-stop government – integrates dislocated information and knowledge sources into a global virtual knowledge fabric. |
|
|
|
|
|
| |