| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996485670003316 |
|
|
Titolo |
Data science . Part II : 8th international conference of pioneering computer scientists, engineers and educators, ICPCSEE 2022, Chengdu, China, August 19-22, 2022, proceedings / / Yang Wang [and five others], editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (520 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science ; ; v.1629 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Big Data Management and Applications -- Research on the Realization Path and Application of a Data Governance System Based on Data Architecture -- 1 Introduction -- 2 Research Status and Development of Data Governance -- 3 Functional Composition of Data Architecture -- 3.1 The Method of Integrating Heterogeneous Data with Internal and External Centralized Data Management -- 3.2 Data Security Classification, Data Right Confirmation and Authorization Methods -- 3.3 Basic Composition and Form of the Data Architecture -- 3.4 Data Governance System Supported by Data Architecture -- 4 Understanding the Data Architecture Supporting the Data Governance System -- 4.1 The Impact of Data on Human Civilization - Recognizing the Importance of Data -- 4.2 Comparison Between Data and Material - Similarity and Particularity of Data and Material -- 4.3 Comparison of Data and Information - the Difference Between Data and Information Determines the Difference in Research Data Governance Methods -- 4.4 The Relationship Between Data and Applications - the Systematicness, Integrity, Relevance and Essence of Data -- 5 Implementation Path of the Data Governance System Supported by the Data Architecture -- 5.1 Distinguish the Information System |
|
|
|
|
|
|
|
|
|
and Data System, and Develop the Data System by Using the Data-Oriented Software Engineering Method -- 5.2 Unify the Database of the Existing Information System, Build a Data System and Crack the "Data Island" -- 5.3 The Separation of Data Management and Use is Adopted to Simplify the Complexity of Data and Business -- 5.4 The Public Key Infrastructure of the Domestic Commercial Key Algorithm is Used to Realize Data Right Confirmation, Data Ownership Authorization and Data Protection. |
5.5 Data Architecture Supports the Construction of a Data Governance System and Solves Data Governance Problems in a Package -- 5.6 Application Example of Data Governance System Based on Data Architecture in County New Smart City -- 6 Conclusion -- References -- Data Quality Identification Model for Power Big Data -- 1 Introduction -- 2 Background and Related Works -- 2.1 Related Works -- 2.2 Related Technologies -- 3 Problem Definition -- 4 Proposed Approach -- 4.1 Data Quality Identification Architecture -- 4.2 Data Preprocessing and Grouping -- 4.3 Data Augmentation -- 4.4 Tri-Training Based Detection -- 5 Experiments -- 5.1 Training Data and Baselines -- 5.2 Analysis -- 6 Conclusion -- References -- Data Security and Privacy -- Effective and Lightweight Defenses Against Website Fingerprinting on Encrypted Traffic -- 1 Introduction -- 2 Background and Related Work -- 2.1 WF Attacks -- 2.2 WF Defense -- 3 Threat Model -- 4 The Propose TED -- 4.1 Overview of TED -- 4.2 Similar Scale Traces Clustering -- 4.3 Interconversion -- 4.4 Key Feature Extraction -- 5 Performance Evaluation -- 5.1 Preliminary -- 5.2 Performance Metrics -- 5.3 Parameter Tuning -- 5.4 Evaluation -- 6 Conclusion -- References -- Data Hiding in the Division Domain: Simultaneously Achieving Robustness to Scaling and Additive Attacks -- 1 Introduction -- 2 Preliminaries -- 2.1 QIM -- 2.2 Related Work on Resisting Scaling Attacks -- 3 Proposed Method -- 3.1 Division Domain for Data Hiding -- 3.2 D-QIM -- 3.3 Theoretical Analysis for D-QIM -- 4 Simulations -- 5 Conclusions -- References -- BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum -- 1 Introduction -- 2 Related Works -- 3 Zreo-Knowledge Proof -- 4 BMSC: Anonymous Transaction Scheme -- 4.1 Groth16 -- 4.2 Scheme Construction -- 5 Analysis of Anonymity and Security -- 5.1 Analysis of Anonymity. |
5.2 Hide Account Balances and Transaction Amounts -- 5.3 Hide the Transfer Relationships -- 5.4 Analysis of Security -- 5.5 Overspending Attack -- 5.6 Double-Spending Attack -- 6 Conclusion -- References -- Research on the Design and Education of Serious Network Security Games -- 1 Introduction -- 2 Related Work -- 3 Feasibility Analysis -- 3.1 Educational Dilemma -- 3.2 Education Status -- 4 Theoretical Basis -- 4.1 Constructivist Theory -- 4.2 Situational Cognition -- 5 Teaching Design -- 5.1 Design Principle -- 5.2 Design Principle -- 6 Game Design -- 6.1 Game Theme -- 6.2 Game Components -- 6.3 Rules of the Game -- 6.4 Hands-On Game -- 7 Conclusion -- References -- KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Paillier Cryptosystem -- 3.2 Chinese Remainder Theorem -- 3.3 CRT-Based Paillier Cryptosystem -- 3.4 An Optimized Paillier Cryptosystem -- 3.5 Fujisaki-Okamoto Commitment -- 3.6 Blockchain Data Sharing Model -- 4 Privacy Protection Model for Blockchain Data Sharing -- 4.1 Hidden Amount -- 4.2 Transaction Verification -- 4.3 Update Account Balance -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption -- 1 Introduction -- 2 Related Works -- 3 |
|
|
|
|
|
|
|
Preliminaries -- 3.1 Bilinear Mapping -- 3.2 Access Control Structure -- 3.3 Linear Secret Sharing Scheme -- 4 Blockchain Access Control Scheme Based on MA-ABE -- 4.1 Scheme Overview -- 4.2 Autonomous Identity Management -- 4.3 Selection of Attribute Authorities -- 4.4 Hierarchical Linear Secret Sharing Scheme -- 4.5 Blockchain Access Control Algorithm -- 5 Scheme Analysis -- 5.1 Security Analysis -- 5.2 Comparison of Scheme Cost -- 6 Conclusion -- References -- Applications of Data Science. |
Study on the Intelligent Control Model of a Greenhouse Flower Growing Environment -- 1 Introduction -- 2 Problem Scenario -- 2.1 A Floral Growth Factor Analysis -- 2.2 Fuzzy Neural Network -- 2.3 Practice Site and Flowers -- 3 Methods -- 3.1 Framework -- 3.2 Fuzzy Neural Network Model -- 3.3 Design Implementation -- 4 Experimental Results and Analysis -- 4.1 Simulation Analysis -- 4.2 Field Site Experiments -- 4.3 Model Evaluation -- 5 Conclusion and Discussion -- References -- A Multi-event Extraction Model for Nursing Records -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Dataset Annotation -- 3.2 Dataset Analysis -- 3.3 Model -- 4 Experiments -- 4.1 Experiment Settings -- 4.2 Comparison Methods -- 4.3 Main Results -- 4.4 Analysis on the Multi-event Argument Attribution Problem -- 5 Discussion -- 5.1 Analysis on High Score Performance -- 5.2 Application of Missing Item Detection -- 6 Conclusion -- References -- Cuffless Blood Pressure Estimation Based on Both Artificial and Data-Driven Features from Plethysmography -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Empirical Feature Extracting Branch -- 3.2 Data-Driven Feature Extracting Branch Based on LSTM -- 3.3 Feature Gathering and Multichannel Output Module -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Competing Methods -- 4.3 Results and Analysis -- 5 Conclusions -- References -- User Attribute Prediction Method Based on Stacking Multimodel Fusion -- 1 Introduction -- 2 Related Machine Learning Algorithms -- 3 Multimodel-LightGBM -- 3.1 Stacking Algorithm -- 3.2 Multimodel-LightGBM -- 4 Experiment and Result Analysis -- 4.1 Dataset -- 4.2 Feature Engineering -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- How is the Power of the Baidu Index for Forecasting Hotel Guest Arrivals? -A Case Study of Guilin -- 1 Introduction. |
2 Literature Review -- 2.1 Baidu Index and Tourism Research -- 2.2 Tourism Forecasting with Big Data -- 3 Data -- 3.1 Data Collection -- 3.2 Keyword Selection for the Baidu Search -- 3.3 Data Preprocessing -- 4 Variable Test and Metrics -- 4.1 Unit Root -- 4.2 Granger Casualty Test -- 4.3 Metrics -- 5 Model Fitting and Performance Evaluation -- 5.1 Forecasting Model Without Any Baidu Index -- 5.2 Autoregressive Distributed Lag Model Establishment with Univariate Baidu Index -- 5.3 Autoregressive Distributed Lag Model Establishment with Multiple Baidu Indexes -- 5.4 Summary -- 6 Conclusions, Limitations, and Future Work -- 6.1 Conclusions -- 6.2 Limitations -- 6.3 Future Work -- References -- A Facial Size Automatic Measurement and Analysis Technology -- 1 Introduction -- 2 Facial Data Acquisition -- 3 Facial Morphology Analysis System -- 3.1 Feature Point Recognition -- 3.2 Location of Three-Dimensional Facial Feature Points -- 3.3 Facial Morphology Analysis -- 3.4 Output Module -- 4 Experimental Comparison -- 5 Conclusion -- References -- Intelligent Industrial Auxiliary System Based on AR Technology -- 1 Introduction -- 2 System Design and Implementation -- 2.1 Real-Time Display -- 2.2 Human-Computer Interaction -- 2.3 Perception and Positioning -- 2.4 Scene Switch -- 3 Example Display -- 4 Summary and Outlook -- References -- Infrastructure for Data Science -- Industry-Oriented |
|
|
|
|
|
|
|
|
Cloud Edge Intelligent Assembly Guidance System -- 1 Introduction -- 2 Method -- 2.1 Instance Segmentation -- 2.2 Pose Estimation -- 2.3 Cloud-Edge Joint Technology -- 3 Experiment and Analysis -- 3.1 Experimental Setup -- 3.2 Experimental Results -- 4 Conclusion -- References -- An Intelligent Data Routing Scheme for Multi-UAV Avionics System Based on Integrated Communication Effectiveness -- 1 Introduction -- 2 Proposed Integrated Communication Effectiveness Metric. |
2.1 Link Effectiveness. |
|
|
|
|
|
| |