| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911018760503321 |
|
|
Autore |
Huang De-Shuang |
|
|
Titolo |
Advanced Intelligent Computing Technology and Applications : 21st International Conference, ICIC 2025, Ningbo, China, July 26–29, 2025, Proceedings, Part IV / / edited by De-Shuang Huang, Wei Chen, Yijie Pan, Haiming Chen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (895 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15845 |
|
|
|
|
|
|
Altri autori (Persone) |
|
ChenWei |
PanYijie |
ChenHaiming |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computational intelligence |
Computer networks |
Machine learning |
Application software |
Computational Intelligence |
Computer Communication Networks |
Machine Learning |
Computer and Information Systems Applications |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Information Security -- DDos Attack Identification Based on Temporal Features. -- An Intonation-Based Black-Box Generative Adversarial Attack Method for Audio. -- RanHunter: Advancing Ransomware Detection with Channel Attention and Multi-Head Attention. -- Cellular-Snooper: A General and Real-Time Mobile Application Fingerprinting Attack in LTE Networks. -- True or False? Dually Perceiving Relevance of Source Post and Comment Flow for Rumor Detection. -- Explanation-Inspired Transferable Adversarial Attacks with Layer-Wise Increment Decomposition. -- CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. -- PPAGAN: A Privacy-Preserving Self-Attention GAN Framework for Image |
|
|
|
|
|
|
|
|
|
|
|
Synthesis. -- ADPF: Adversarial Sample Detection Based on Prediction Feature. -- MvSMIA: Multi-View Source Membership Inference Attack in Federated Learning. -- RDP-FedAB: A Federated Learning Framework Balancing Privacy Protection and Model Performance. -- Transferable Adversarial Attacks via Diffusion-Based Keyword Embedding and Latent Optimization. -- Optimization of IoUT Systems: A Hierarchical Federated Transfer Learning Approach Based on UAV Computation Offloading. -- Malicious Encrypted Traffic Detection with Transformer and Dual-Layer Meta-Update Incremental Learning. -- ElevPatch: An Adversarial Patch Attack Scheme Based on YOLO11 Object Detector. -- MetaSSL-ETD: Robust Detection of Malicious Encrypted Traffic Based on Semi-Supervised Meta-Learning. -- A Steganalysis Framework for Enhancing Model Generalization Performance. -- Frequency-Aware Purification: A Black-box Defense against Backdoor Attacks. -- Stealthy Backdoors in Vertical Federated Learning. -- CTI-Shapley: An ATT&CK-Guided Enhanced Shapley Value Mechanism for Benefit Distribution in Cyber Threat Intelligence Sharing. -- Distributed Cumulative Gradient Backdoor Attack Against Federated Learning. -- MSIAA: Multi-Scale Inversion Adversarial Attack on Face Recognition. -- Leveraging Fine-Tuned Large Language Models for Device Fingerprint Extraction in IoT Security. -- MICD: Deepfake Detection with Masked Identity Consistency Detector. -- PGAE: A Perturbed Graph Autoencoder Integrating Explicit and Implicit Features for APT Detection. -- Durability-Optimized Model Poisoning Attack against Federated Learning Systems. -- Explainable Machine Learning Models for Phishing Website Detection: Enhancing Transparency and Accuracy in Cybersecurity. -- FRIFL: A Fair and Robust Incentive Mechanism for Heterogeneous Federated Learning. -- Reversible Data Hiding for 3D Mesh Models in Encrypted Domain Based on Adaptive MSB and Difference Prediction. -- FedFIP: A Personalized Federated Learning Optimization Method with Differential Privacy Protection. -- ProAnalyzer: Inferring Network Service's Fuzzing Format with Grey-box Metric. -- Research on Differential Privacy in Personalized Heterogeneous Federated Learning Based on Fisher Information Matrix. -- APFedEmb: An Adaptive and Personalized Federated Knowledge Graph Embedding Framework for Link Prediction. -- Federated Knowledge Collaborative Recommendation System with Privacy Preserving. -- Towards Reliable Detection of Malicious DNS-over-HTTPS (DoH) Tunneling Traffic under Low-quality Training Data. -- Ensemble Partitioning: A Defense Mechanism Against Membership Inference Attacks in ML Models. -- A Trusted Computing Power Network Scheduling Algorithm Based on Federated Learning. -- Secure Outsourced Matrix Multiplication of Floating Point Numbers. -- Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy. -- Alias6: An IPv6 Alias Resolution Technology Based on Multiple Fingerprint Features. -- Update Recovery Attacks on Two-Dimensional Encrypted Databases: Exploiting Volume Pattern Leakage in Range Queries. -- VulPelican: an LLM and Interactive Static Analysis Tool Based Vulnerability Detection Framework. -- Energy-aware Task Scheduling Using DVFS and On/Off Switching in Data Center. |
|
|
|
|
|
|
Sommario/riassunto |
|
This 20-volume set LNCS 15842-15861 constitutes - in conjunction with the 4-volume set LNAI 15862-15865 and the 4-volume set LNBI 15866-15869 - the refereed proceedings of the 21st International Conference on Intelligent Computing, ICIC 2025, held in Ningbo, China, during July 26-29, 2025. The total of 1206 regular papers were carefully reviewed and selected from 4032 submissions. This year, the conference concentrated mainly on the theories and methodologies as |
|
|
|
|
|
|
|
|
|
|
|
|
|
well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9911020202703321 |
|
|
Autore |
Balan Vladimir <1958-> |
|
|
Titolo |
Jet single-time Lagrange geometry and its applications / / Vladimir Balan, Mircea Neagu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : John Wiley & Sons, c2011 |
|
|
|
|
|
|
|
ISBN |
|
9786613282866 |
9781283282864 |
1283282860 |
9781118143780 |
1118143787 |
9781118143759 |
1118143752 |
9781118143766 |
1118143760 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (212 p.) |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Geometry, Differential |
Lagrange equations |
Field theory (Physics) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Jet Single-Time Lagrange Geometry and Its Applications; CONTENTS; Preface; PART I THE JET SINGLE-TIME LAGRANGE GEOMETRY; 1 Jet geometrical objects depending on a relativistic time; 1.1 d-tensors on the 1-jet space J1 (R, M); 1.2 Relativistic time-dependent semisprays. |
|
|
|
|
|
|
|
|
|
|
|
Harmonic curves; 1.3 Jet nonlinear connections. Adapted bases; 1.4 Relativistic time-dependent semisprays and jet nonlinear connections; 2 Deflection d-tensor identities in the relativistic time-dependent Lagrange geometry; 2.1 The adapted components of jet Γ-linear connections; 2.2 Local torsion and curvature d-tensors |
2.3 Local Ricci identities and nonmetrical deflection d-tensors3 Local Bianchi identities in the relativistic time-dependent Lagrange geometry; 3.1 The adapted components of h-normal Γ-linear connections; 3.2 Deflection d-tensor identities and local Bianchi identities for d-connections of Cartan type; 4 The jet Riemann-Lagrange geometry of the relativistic time-dependent Lagrange spaces; 4.1 Relativistic time-dependent Lagrange spaces; 4.2 The canonical nonlinear connection; 4.3 The Cartan canonical metrical linear connection; 4.4 Relativistic time-dependent Lagrangian electromagnetism |
4.4.1 The jet single-time electromagnetic field4.4.2 Geometrical Maxwell equations; 4.5 Jet relativistic time-dependent Lagrangian gravitational theory; 4.5.1 The jet single-time gravitational field; 4.5.2 Geometrical Einstein equations and conservation laws; 5 The jet single-time electrodynamics; 5.1 Riemann-Lagrange geometry on the jet single-time Lagrange space of electrodynamics εDL1n; 5.2 Geometrical Maxwell equations on εDL1n; 5.3 Geometrical Einstein equations on εDL1n; 6 Jet local single-time Finsler-Lagrange geometry for the rheonomic Berwald-Moór metric of order three |
6.1 Preliminary notations and formulas6.2 The rheonomic Berwald-Moór metric of order three; 6.3 Cartan canonical linear connection, d-torsions and d-curvatures; 6.4 Geometrical field theories produced by the rheonomic Berwald-Moór metric of order three; 6.4.1 Geometrical gravitational theory; 6.4.2 Geometrical electromagnetic theory; 7 Jet local single-time Finsler-Lagrange approach for the rheonomic Berwald-Moór metric of order four; 7.1 Preliminary notations and formulas; 7.2 The rheonomic Berwald-Moór metric of order four; 7.3 Cartan canonical linear connection, d-torsions and d-curvatures |
7.4 Geometrical gravitational theory produced by the rheonomic Berwald-Moór metric of order four7.5 Some physical remarks and comments; 7.5.1 On gravitational theory; 7.5.2 On electromagnetic theory; 7.6 Geometric dynamics of plasma in jet spaces with rheonomic Berwald-Moór metric of order four; 7.6.1 Introduction; 7.6.2 Generalized Lagrange geometrical approach of the non-isotropic plasma on 1-jet spaces; 7.6.3 The non-isotropic plasma as a medium geometrized by the jet rheonomic Berwald-Moór metric of order four |
8 The jet local single-time Finsler-Lagrange geometry induced by the rheonomic Chernov metric of order four |
|
|
|
|
|
|
Sommario/riassunto |
|
Develops the theory of jet single-time Lagrange geometry and presents modern-day applications Jet Single-Time Lagrange Geometry and Its Applications guides readers through the advantages of jet single-time Lagrange geometry for geometrical modeling. With comprehensive chapters that outline topics ranging in complexity from basic to advanced, the book explores current and emerging applications across a broad range of fields, including mathematics, theoretical and atmospheric physics, economics, and theoretical biology. The authors begin by presenting basic theoretical |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910974081703321 |
|
|
Titolo |
Measuring inclusive education / / edited by Tim Loreman, Chris Forlin |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
West Yorkshire, England : , : Emerald, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (329 p.) |
|
|
|
|
|
|
Collana |
|
International perspectives on inclusive education, , 1479-3636 ; ; v. 3 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Education - Inclusive Education |
Education - General |
Education - Administration - General |
Inclusive education - Mainstreaming |
Schools |
Inclusive education |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Conceptualising and measuring inclusive education / Tim Loreman ... [et al.] -- Ethical challenges and dilemmas in measuring inclusive education / Agnes Gajewski -- What is effective inclusion? Interpreting and evaluating a Western concept in an Indian context / Richard Rose ... [et al.] -- Data collection to inform international policy issues on inclusive education / Amanda Watkins, Serge Ebersold, András Lénárt -- Resourcing inclusive education / Donna Barrett -- Measuring effective teacher preparation for inclusion / Sarah Copfer, Jacqueline Specht -- Leading inclusive education : measuring 'effective' leadership for inclusive education through a Bourdieuian lens / Joseph S. Agbenyega, Umesh Sharma -- Identifying effective teaching practices in inclusive classrooms / Anne Jordan, Donna McGhie-Richmond -- Measuring indicators of inclusive education : a systematic review of the literature / Tim Loreman, Chris Forlin, Umesh Sharma -- Learning about inclusion from developing countries : using the index for |
|
|
|
|
|
|
|
|
|
|
|
inclusion / Suzanne Carrington, Jennie Duke -- Using networking to measure the promotion of inclusive education in developing countries : the case of the Pacific region / Susie Miles, Laisiasa Merumeru, Donna Lene -- School and classroom indicators of inclusive education / Julie Lancaster -- Assessing teacher competencies for inclusive settings : comparative pre-service teacher preparation programs / Kymberly Drawdy, Meng Deng, Catherine Howerter -- Developing and using a framework for gauging the use of inclusive pedagogy by new and experienced teachers / Lani Florian, Jennifer Spratt -- Using graduation rates of students with disabilities as an indicator of successful inclusive education / Janet I. Goodman ... [et al.]. |
|
|
|
|
|
|
Sommario/riassunto |
|
In the first section, broad issues associated with assessment for, of, and in learning in inclusive classrooms; measuring the implementation of inclusive policy; identifying and removing barriers to inclusion; resourcing and financing; and, evaluating effective teacher preparation for inclusion provide the structure for discussion. The second section commences with a current and in-depth review of the literature on the development of international indicators for measuring inclusive education. Examples of some of the models presently employed to frame an evaluation of inclusive practice are studied. These provide illustrations of effective measurement strategies to evaluate inclusive educational practice at all levels of administration, from governments to classrooms, and ways to recognize the positive outcomes attained by all involved. |
|
|
|
|
|
|
|
| |